No. |
Title and Author |
Area |
Country |
Page |
301 |
Information Hiding Using HR-LR Algorithm
-PATEL AMITKUMAR JAYANTILAL ; Alpesh H.Dafda
Since the rise of the internet one of the most important factors of information technology and communication has been the security of information. Cryptography was created as a new method or technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. But it is not enough to keep the contents of a message secret, it is also important to keep the existence of the information secret. The technique which provides this features, is called steganography. Steganography is the art and science of invisible communication. This accomplished through hiding information in other medium, thus hiding the existence of the information which is communicated. The word steganography is comes from the Greek words “stegos†meaning “cover†and “grafia†meaning “writing†defining it as “covered writingâ€[6]. In image hiding using steganography the information is hidden exclusively in images. Read More...
|
Image Processing |
India |
1180-1184 |
302 |
Design and Fabricated the 90 degree Hybrid Power Divider for 4X4 Multiport Amplifier
-Nikunjbhai V. Prajapati ; A. K. Sisodia
This paper presents the design and fabricated of 2.5 GHz 900 Hybrid power divider for 4X4 multiport amplifier. The multiport amplifier is an advanced technique which providesthe flexibility of channel capacity per beam in a multi beam system. It is also used the implementation of the mobile base station for shearing the power in each transmission path. Most of the multiport amplifiers use butler matrix using the 900 hybrid power divider(4X4). The output amplitude and phase shift of the 900 hybrid power divider are critical parameters for achieving the optimum performance of the MPA.The key point is analysis of 2.5 GHz 900 Hybrid power divider(4X4) for better power on the multiport amplifier.Hence a four way power divider for MPA for base station has been design, simulated and fabricated using the Advance design system software 2011.We have seen the good return loss and insertion loss in fabricated power divider using the network analyzer and signal generator. Read More...
|
Electronics & Communication Engineering |
India |
1185-1187 |
303 |
Input Filter Design For Front-end Satellite Navigation Receiver
-Nimesh Mukeshbhai Prabhakar ; Anil.K.Sisodiya
All the receivers the first section of low noise amplifier(LNA) is presided by input filter. It is mainly required to restrict the input noise to the LNA. This filter should have very low insertion loss very good return loss and sufficient out of band attenuation for suppressing the interference. In this paper input filter design for frontend satellite navigation receiver at L-S Band has been presented. The filter design is based of chebyshev characteristics. In this paper we propose a Chebyshev Band pass filter for 1.1 GHz&2.5 GHz application using Advanced design software. The filter is operated at L band frequency range in 1.1 GHz &S band frequency range in 2.5 GHz for applications of front end receiver which is similar to Indian regional navigation satellite system(IRNSS).The proposed filter is design at a center frequency of 1.8 GHz. Simulation results show that the filter operation is optimum over the frequency range 1.1 GHz to 2.5 GHz which is best in this range. Read More...
|
Communication |
India |
1188-1189 |
304 |
PARAMETRIC EVALUATION OF BALL BURNISHING PROCESS ON ALUMINIUM ALLOY 6061
-SACHIN B PATEL ; SAUMIL C PATEL
The main purpose of this paper is to optimization of newly design ball burnishing process parameters in conventional lathe using taguchi method. For this study the work piece material used is Alluminium Alloy 6061 and tool material HSS ball with 8mm diameter is selected. The input parameters during process are burnishing feed, burnishing speed, burnishing spring deflection and number of passes. The response parameter is surface hardness. Taguchi technique is employed in the present investigation to identify the most influencing parameters on surface hardness. Effort is also made to identify the optimal burnishing parameters and the factors for scientific basis of such optimization. Read More...
|
Mechanical engineering |
India |
1190-1194 |
305 |
Application Life Cycle Management
-Yamini Rathod ; Prof. Dhaval Jha; Kinjal Taylor; Srushti Anand
Application Lifecycle Management (ALM) is the discipline of overcoming organizational silos to realize a whole-team, whole-view approach to the software delivery cycle by coordinating lifecycle activities across requirements, design, project planning, change and configuration management, build, and quality management. Because of competitive pressures and the need to innovation, many organizations are faces with hastened delivery schedules. Teams are supposed to reduce the time taking in product delivery without increasing their budgets or with less quality. Read More...
|
Computer Science Engineering |
India |
1195-1197 |
306 |
Configurable Design and Simulation of PCI-Express Data Link Layer Transmitter
-TEJAS A. BAVARVA
PCI-Express is a high performance, general purpose I/O interconnect communication protocol. This paper presents the detailed implementation of configurable Data Link Layer Transmitter of PCI-Express 3.0. The proposed architecture presents the transmitter module which contains the sophisticated features of PCI-Express 3.0. It explains how TLPs are processed in data link layer transmitter by appending the next sequence number as start frame and 32-bit LCRC as end frame. Protocols of PCI-Express 3.0 like link acknowledgement time out replay mechanism, flow initialization protocol and error correction protocol have been implemented and verified. The architecture of retry buffer is also presented with all the experimental results and it also explains how the retransmission is happening in the transmitter module. At the end of the design, Linting and Synthesis have been done and analyzed timing, power and utility report. Read More...
|
M.E.-VLSI and EMBEDDED system design (Electronics and communication Engineering) |
India |
1198-1202 |
307 |
Qualitative Assessment Of Groundwater Around The Municipal Solid Waste Landfill Site At Pirana In Ahmedabad City
-Asim I Shaikh ; Prof. A. M. Malek; Harshil. H. Gajjar; Nihir. V. Gandhi; Dhaval. P. Patel
The characteristics of leachate and its probable risks on groundwater pollution were investigated following the analysis of some chemical parameters of the leachate generated in the Pirana landfill site, Ahmedabad, India. Three samples of the groundwater were collected from the different locations around the Pirana landfill site. The laboratory test results on groundwater samples show high concentration of TDS (2100 mg/lit), Total hardness (740 mg/lit), Sulphates (470 mg/lit), Calcium (196 mg/litre) and Magnesium (100 mg/lit) and have very high potential for contaminating ground and surface water. The data collected from the Ahmedabad Municipal Corporation also shows high concentrations of TDS (2272 mg/litre), Total Hardness (840 mg/lit), Sulohates (470 mg/lit), Chlorides (818 mg/lit), nitrates (668 mg/lit) and Iron (8.50 mg/lit). The surface water samples around the landfill site appear to be contaminated, most probably, through the overflow of leachate. Groundwater parameters do not satisfy drinking water quality standard so it is harmful if consumpted without proper treatment. Biological treatment through Reverse Osmosis improves the quality of groundwater significantly. The water should be used for drinking and cooking but only after its purification through RO system as it removes almost 95 % of the dissolved solids. Read More...
|
Civil and Environment Engineering |
India |
1203-1205 |
308 |
Transmitter Module of 10Gb/s Ethernet MAC
-Hothi Dharitkumar I.
10 Gb Ethernet is part of the IEEE 802.3 standard. It is also faster version of the Ethernet where half duplex operation mode is not supported. This design is based on Xilinx LogiCORE 10-Gigabit Ethernet MAC in which transmitter and receiver module are separately designed. Therefore the transmit engine will be specifically designed to interface the client and the physical layer Read More...
|
M.E. VLSI & EMBEDDED system design (Electronics & communication Engineering) |
India |
1206-1208 |
309 |
Environmental Movements in India-A special approach on Narmada Bachao Andolan
-Gautam Choubey ; SUMAN PANDEY
Environmental and ecological movements are among the important examples of the collective actions of several social groups. Protection and recognition of constitutional and democratic rights, which are not defined by law but form an important part of the day to day living of the subaltern masses like the control over their resources, the right of indigenous people to preserve their culture, protection of environment and maintenance of ecological balance are significant concerns of these movements, as they affect the human life to a great extent. In this paper a brief review on Narmada Bachao Andolan and failure of the dam project is discussed. Read More...
|
History |
India |
1209-1212 |
310 |
Economic Load Dispatch of IEEE-26 Bus System with the use of Ant Colony Optimization Technique
-Pirmahamad Jamalbhai Vasovala ; Chinmay Y. Jani; Vasim H. Ghanchi; Parth Harshad Kumar Bhavsar
Optimal System operation involves the Consideration of economy of operation, system security, emission of certain fossil-fuel plant. The main aim of this study is to minimize the fuel cost and to keep the power outputs of the generator within prescribed limit with the use of An Ant colony Optimization Techniques. It is based on the ideas of ant foraging by pheromone communication to make path. Ant Colony Optimization technique is a meta-heuristic approach for solving hard combinatorial optimization problems which can be applied for power system optimization. The work reported in this paper is carried out with the objective to make use of Ant colony Optimization for solving the economic load dispatch problem. IEEE-26 Bus 6 generator system is considered to test the Algorithm with cost functions. The proposed approach result has been compared to those which reported in the literature. Read More...
|
Electrical Engineering |
India |
1213-1217 |
311 |
An Introduction to Various Types of Contrast Patterns
-Nirav Prajapati ; Sonal Rami
Data mining is a field which is used to extract knowledge from data. Knowledge Discovery in Databases (KDD) is a process used to discover interesting or useful patterns and relationships in data, with an emphasis on large volume of observational databases. Contrast data mining is the mining of patterns and models contrasting two or more classes or conditions. The ability to distinguish, differentiate and contrast between different data sets is a key objective in data mining. Emerging patterns are sets of items whose frequency changes significantly from one dataset to another. HGEP strategy has higher accuracy than the NEP strategy. Read More...
|
Information Technology |
India |
1218-1221 |
312 |
Cloud Computing
-Yamini Rathod ; Dhaval Jha
Cloud computing refers to the use of multiple server based computational resources via Internet connection using the World Wide Web. Applications are provided and managed by cloud server. The data is stored remotely in the cloud configuration. Any computer or web device connected to the Internet may access the applications, files and computing power in a cloud computing environment. Data in cloud is centrally stored which does not need any storage medium like DVD or thumb drive.
Desktop applications connected to the Internet provide email applications such as Gmail, Yahoo!, Hotmail etc.
Read More...
|
Computer Science Engineering |
India |
1222-1224 |
313 |
Spoofing Technique for Fingerprint Biometric System
-Tanisha Aggarwal ; Dr. Chander Kant Verma
A spoof is a counterfeit biometric that is used in an attempt to circumvent a biometric sensor. Differentiating a genuine biometric trait presented from a live person versus some other source is called spoof detection (anti-spoofing). The fingerprint liveness detection refers to the inspection of the finger characteristics to ensure whether the input finger is live or artificial. There are two major approaches for liveness detection, which are reported in literature are using the additional hardware and software based techniques. In this paper, various fingerprint liveness detection methods, which are categorized as voluntary and involuntary, are explored. The main objective of this paper is to propose a method to spoof a fingerprint sensor using a mold made by a material i.e. fevicol. Read More...
|
Computer Science engineering |
India |
1225-1228 |
314 |
Optimize Performance Analysis Of OFDM System used in WiMAX Network
-Mohit Kumar Saini ; Dr.R. K.Chauhan
Future networks will be characterized by variable and high data rates, various Quality of services (QoSs) and seamless mobility. A technology is developed to fulfil these requirements is WiMAX (Worldwide Interoperability for Microwave Access). Since WiMAX is based on OFDM (Orthogonal Frequency Division Multiplexing) [6]. In this paper, an OFDM system used in WiMAX network is designed and explained. Also an optimize performance analysis of OFDM system is done on the basis of variation in BER with respect to SNR for AWGN, Rayleigh and Ricean Channel with different guard intervals. Read More...
|
Electronics and Communication Engineering |
India |
1229-1232 |
315 |
Comparative Performance Analysis of Different Pulse Shaping Filters for WCDMA System
-JITENDRA KUMAR SHUKLA ; Prof. B.S Rai
The application of pulse shaping techniques to Wireless communication is an area that has achieved a great improvement in performance of wireless communication [1, 9]. Pulse shaping filters are used at the heart of many modern data transmission systems (e.g. mobile phones, HDTV) to keep a signal in the given bandwidth, maximize its data transmission rate, and to minimize transmission errors. Different pulse shaping filters form a well-established solution to this problem for wireless communication system. This paper deals with the comparative performance analysis of different pulse shaping filters for WCDMA system using AWGN channel. A simple WCDMA based communication link has been developed using SIMULINK tool of MATLAB R2013a and its performance in terms of BER is compared for different filters at same group delay (D). Read More...
|
communication engineering |
India |
1233-1235 |
316 |
A Literature Review on Automated Manual Transmission (AMT)
-Makarand S Kumbhar ; Dr. Dhananjay Panchagade
Automated Manual Transmission as the name suggests is a manual transmission with clutch and gear actuation done with help of actuators, either electromechanical or hydraulic. The whole AMT system has a control strategy to decide the actuation of actuators. Over the last two decades, significant research effort has been directed towards developing vehicle transmissions that reduce the energy consumption of an automobile. This effort has been a direct consequence of the growing environmental concern imposing the directives of reduced exhaust emissions and increased vehicle efficiency on current vehicle manufacturers. Consumers also expect the same level of performance, comfort and ease of use as in standard cars, to a competitive price. To construct a competitive solution, it must both be comparable in terms of performance, comfort and price of existing vehicles on the market. Automated Manual Transmission (AMT) is the best competitive solution to address the problem of performance, comfort, cost, efficiency. The main aim of this paper is to study the various research work done on AMT system in terms of design and control strategy. Read More...
|
Automotive / Mechanical Engineering |
India |
1236-1239 |
317 |
A Perlustration on Localization Techniques in Mobile Ad-Hoc Network in mixed environment
-Viral patel ; Ashish Christian
In Wireless Sensor Networks (WSNs), localization techniques plays a major role in identifying the location of any object. The exact co-ordinates should be traced, which will be helpful in identifying the location of an object. In this we have few nodes with the known co-ordinate values and with the help of them we are able to find the location of unknown sources. Also considering Mobile Ad-Hoc Network (MANET) for the same. Localization algorithms are mainly subdivided into two major categories, namely Range Free and Range Based. The paper gives the classification of algorithm techniques and explore two main algorithms that is Time of Arrival (TOA) for Line of sight(LOS) and Non Line of Sight(NLOS) environments and also Time Difference of Arrival (TDOA) for the same. Read More...
|
Communication Engineering |
India |
1240-1244 |
318 |
Microcontroller based GSM control system
-Jaydeep H. Parmar ; Bharat G. Parmar
The aim of this project is to provide Automation Solution to controlling the different parameters & sensors of the control system in Industrial environment using GSM & Microcontroller. We were particularly interested to improve productivity and quality of industrial machinery outcome. The product quality was evaluated in terms of environmental specification was investigated.We provided suitable solution by keeping safety features in mind.Due to of two discrete modes, it will be possible to operate machinery in both Auto as well as Manual mode. Sometimes it is hazardous to interfering into the machine control system by different operators or users. So we used GSM to monitoring and controlling from anywhere. Read More...
|
Instrumentation & control Engineering |
India |
1245-1246 |
319 |
Resolving Problem of Bus Driver Scheduling:
-kuvadiya umesh c. ; DR. P. J. GUNDALIYA
The bus driver scheduling is an important part of every transportation system. This research study consists the solution of bus driver scheduling problem at A.M.T.S. bus depot, in Ahmedabad City of Gujarat. There are many problems coming during preparation of bus driver scheduling. In the every transportation system there is number of regulations related to the crew scheduling; like maximum work hour, least layover time, trip duration, peak hour factor, idle time, break period, etc. Thus this study considers the independence constrain for development of mathematical model of such scheduling problem. This independence constrain is basis of declaration to meet the work intensity of driver, the time shift of trip & effects of peak and off-peak hours on trip duration. Main objective of this mathematical model is to minimize the total idle time, for which the algorithm is prepared to generate the initial solution based on the ordered sequence. The result showed that the proposed mathematical model for bus driver scheduling in this paper can give the effective solution of bus driver scheduling by effective utilization of crew scheduling which leads to minimize the total idle time and hence efficient utilization of all resources available to A.M.T.S. depot, Ahmedabad, Gujarat. Read More...
|
civil trasportation engineering. |
India |
1247-1253 |
320 |
A Study on aging Behaviour of Paving Grade Bitumen using Filler Material
-Prajapati Harshad C ; Dr. P. j. Gundaliya
Bitumen aging is responsible principle factor for the deterioration of bitumen pavements. It is accountable for deterioration of physical and chemical properties of bitumen binder. In this present study cement is used in various percentages (0%, 1%, 1.5%, and 2%) as modifier in 60/70 grade bitumen. The effect on physical properties in terms of penetration, softening point and viscosity before and after aging are measured. The binders are aged using Thin Film Oven Test (TFOT).The results showes that before aging softening point, viscosity increases and penetration decreases with increasing percentage of filler material. After aging penetration of aged binders decreases than unaged binders but decrease in penetration value is more for binder having less amount of filler material. Decrease in penetration value is less for binder having 2% cement as filler than other binders after aging. Viscosity value is more for aged binders than unaged binders. Viscosity value is increases as percentage of filler increases for aged binders. For binder having 1% cement has less increase in viscosity value than other binders. Softening point increases of aged binders than unaged binders. Increase in softening value is less for binder having 2% cement as filler than other binders after aging. Read More...
|
Transportation Engineering |
India |
1254-1258 |
321 |
Intelligent Face Detection and Recognition
-Mohd Danish ; Dr. Mohd Amjad
Human face is the identity signature that helps to identify and segregate human beings. This identity signature is dependent on number of parameters ranging from skin color, to geometry of features an contours on human face .Thus face recognition is one challenging field in biometric science .Human brain can recognize these faces despite large changes in the visual stimulus, be it the change in hairstyle, expression, aging, and distractions such as glasses or a new style of beard or many such feature change. Different approaches use the specific databases which consist of single type, format and composition of image. Face detection finds whether there is a face in the given image or not, and where it is, while face recognition finds the identity of a detected face in the image. The face detection algorithm works by locating eyes in the image and the face recognition algorithm uses Principal Analysis to calculate eigenvalues and eigenvectors of the face images. The Viola &Jones face detection algorithm is a popular, learning-based technique that is used in present-day cameras and devices. Face recognition has many issues to deal with, like the type, format and composition of the face images used for recognition. The present paper carries a performance accuracy of PCA based face recognition on different face datasets, which have large variation in lighting condition ,pose variation, age variation and face size. Read More...
|
Computer Science & Engg. |
India |
1259-1263 |
322 |
An Automatic Image registration: An Introductory survey
-Patel Arpan Virenbhai ; Sandip R. Panchal
Image Registration is important operation in image processing system which is the process of aligning two or more images into one coordinate system, are taken at different times, from different sensors, or from different viewpoints. It has a lot of applications especially medical imaging and remote sensing. The main aim of this paper is to provide a comprehensive review of existing literatures available on image registration system .This paper overviews the theoretical aspects of an image registration problem. The purpose of this paper is to present a survey of image registration techniques. Registration is a fundamental task in image processing used to match two or more pictures taken, for example, at different times, from different sensors, or from different viewpoints. It geometrically aligns two images the reference and sensed images. Various applications of image registration are target recognition, monitoring global land usage using satellite images, matching stereo images to recover shape for navigation, and aligning images from different medical modalities for diagnosis. Read More...
|
Electronics And Communication |
India |
1264-1266 |
323 |
NUMERICAL INVESTIGATION OF JET EJECTORS
-BHATT PRATIKKUMAR PRAKASHCHANDRA ; Dr. Gajendra N. Asthana
Jet ejectors are the simplest devices among all compressors and vacuum pumps. They do not contain any moving parts, lubricants or seals; therefore, they are highly reliable devices with low capital and maintenance costs and also energy saving device. Furthermore, most jet ejectors use steam or compressed air as the motive fluid, which are easily found in chemical plants. Due to their simplicity and high reliability, they are widely used in chemical industrial processes; however, jet ejectors have a low efficiency. In this paper available standard manufacturer design and experiment data of jet ejector system is used and mathematical model for jet ejector design is solved with solution algorithm. The outcomes of this mathematical model is in the form of discharge pressure of diffuser, throat dia. of nozzle , exit dia. of nozzle and throat dia. of diffuser and this is compared with available design and experiment data. So we can check reliability of this mathematical model for jet ejector design. Read More...
|
MECHANICAL ENGINEERING |
India |
1267-1270 |
324 |
STABILITY ANALYSIS OF THE SYSTEM BASED ON INVERTED PENDULUM WITH DOUBLE-POLE ARRANGEMENT USING LQR CONTROLLER
-Harshad Bhakhar ; Dipkumar Patel; Ravi Baldaniya; Ankit Patel
The double-pole inverted pendulum system on a cart is highly nonlinear and unstable system which invoke the researchers to find the ways of stability with different controllers. In this paper we have demonstrated the mathematical modeling and by applying the controllability principle we found this system is inherently unstable and then we applied a modern LQR approach with different Q and R matrices weightage to check the stability. Read More...
|
Electrical Engineering |
India |
1271-1275 |
325 |
A Behavioral Study on Chemical effects of Different Types of Cement with Super Plasticizer for betterment of Concrete
-Gopani Harikrishna ; Dr. Neeraj D. Sharma; Bhavin K. Kashiyani
It has long been a concrete technologist’s dream to discover method of making concrete at the lowest possible water/cement ratio while maintaining a high workability. To a considerable extent this dream has been fulfilled with the advent of super plasticizers. Have indeed added a new dimension to the application of admixtures with regards to production of high strength and flowing concretes. It is now possible to produce concrete with compressive strength of the order of 90Mpa (90 N/mm2).
In the wake of energy conservation policy and diminishing supplies of high quality raw materials, there is a need to use marginal quality cements and aggregates for the production of concrete. In such instances the use of plasticizers/super plasticizers permits the production of concrete at low water/ cement ratios. Thus many waste materials of today become the useful by products of tomorrow. It is the particular role of plasticizers/super plasticizers, which is very importance for us here in Pakistan, because of our poor economy and less developed industrial base. Besides, the addition of plasticizers/super plasticizers to produces concrete with less cement but normal strength and workability is another application, which has received more attention.
In this research programme one types of super plasticizer (Perma Plast) of polymer has been used. The water cement ratio was maintained as 0.40 &0.45 for OPC & PPC respectively. to study the effect of these PP on various properties of concrete. The dosage of plasticizers/super plasticizers was measured as 1.5% for perma plast for OPC & 1.3% for PPC by the weight of cement.
Read More...
|
Civil Engineering |
India |
1276-1279 |
326 |
An improve AODV link prediction technique via detecting selfish nodes in MANET by using fuzzy logic
-Suhani Chauhan ; Amit Rathod
Mobile Ad Hoc Networks (MANETs) is a collection of mobile nodes connected with wireless links. A major challenge for these networks are due to their features of open medium, dynamically changing topologies, absence of centralized monitoring points, and lack of any clear lines of defence. All the nodes in MANET must co-operate with each other to route the packets. Cooperating nodes should trust each other. There are several protocols proposed based on the trust. Some trust management schemes have been proposed, to provide a general framework for trust evidence distribution or evaluation of link prediction in MANETs. However, these schemes cannot provide security against some attacks such as packet dropping by selfish nodes in the network. In this report, a new link prediction based approach has been proposed using fuzzy logic in evaluating trust for misbehavior detection of a selfish node in MANET. Read More...
|
Information Technology |
India |
1280-1283 |
327 |
Portable Security System Using Fingerprint Scanning
-Pradnya Belekar ; Mohini Patil; Sayali Kamble; G. Tamil Selvi; Priti Bhujbal
Due to the ever increasing crime rate in society, security has become a prime concern for organizations as well as for an individual.Organizations can afford sophisticated security systemwhich common man cannot afford. This paper mainly focuses on providing economical personalised security system.It is a convenient system for a user eliminating management of multiple keys or passwords for manifold applications.The proposed system utilizes time saving biometric fingerprint scanning technique for authentication. Read More...
|
Electrical Engineering |
India |
1284-1285 |
328 |
A Review Study- Design And Analysis Of Suspension System
-K.N.Patel ; B.N.Gelot; A.H.Gupta
This Review paper describes the implementation of a parametric model of an automotive damper. The goal of this research was to create a damper model to predict accurately damping forces to be used as a design tool for the damper design team. This study pertains to mono tube gas charged dampers appropriate to two wheeler automobile applications. The goal of this model was to create accurately force vs. velocity and force vs. displacement plots for examination. The dynamic model and analysis is used to correlate the model to real damper data for verification of accuracy. Read More...
|
Mechanical engineering |
India |
1286-1288 |
329 |
Intrusion Detection for Cloud using Artificial Neural Network
-Viral B. Bhabhor ; Dr. Hitesh Shah; Prof. Bhargesh Patel
In recent years, as a new distributed computing model, cloud computing has developed rapidly and become the focus of academia and industry. But now security issue of cloud computing is a main critical problem of most enterprise customer faced. Machine learning-based intrusion detection approaches have attracted increasing attention in the network intrusion detection research area because of their intrinsic capabilities in discovering novel attacks. In this paper we propose a new approach to detect network attacks, which aims to study the efficiency of the method based on machine learning in intrusion detection in artificial neural networks. The experimental results obtained by applying this approach to the KDD CUP'99 data set demonstrate that the proposed approach performs high performance.The experimental results shows that this model improves the ability of intrusion detection and can support for the security of current cloud computing. Read More...
|
Computer Engineering |
India |
1289-1292 |
330 |
Implementation of direct upload in LIGHTTPD media server
-JAGANI KEVINKUMAR PARSOTTAMBHAI ; Arjav A. Bavarva
In this paper, the lighthttp is media server which provides the facility to download, upload and stream media files. While uploading the media files, lighthttp stores the media files in 2MB chunks. Each chunk has some header and footer which identify the specific chunk. When all the chunks are uploaded, lighthttp invokes specific plugin to process these chunks and accumulate all the chunks. There are several Plugins in lighttpd for different type media files and requirement. In our case we are using Django plugin. When Django receive all the chunks from lighthttp server, It start processing chunk by chunk, remove the header and footers and combine all the chunks. Another enhancement is maximum size to be uploaded. The default lighttpd supports maximum file as 2GB and that is limited due to integer size. We used long data type to increase the maximum file to 2^64 bytes which we can consider as of now as unlimited. Remember, the whole lighttpd as multiple places was using integer and also all the Plugins uses same data types. To modify this change, we have to modify all the places of lighthttp and all the Plugins. Read More...
|
Advance embedded system |
India |
1293-1295 |
331 |
Modifying OCF for efficient load sharing between H/W & S/W crypto engine
-Chauhan Avinashsingh ; chauhan Avinashsingh; Arjav A. Bavarva
The project aims at using cryptographic service framework mainly the OCF(OpenBSD cryptographic framework) for the Linux kernel to make efficient use of crypto hardware and Software. As we know that cryptographic mechanisms are an important security component of any operating system in securing the system itself and its communication paths. So I will introspect this in detail by carefully studying OCF and Cryptographic API which is a main part of Linux Kernel and has been initiated to deliver cryptographic functionality to the whole Kernel. Next, we will see the hardware support and the Cryptographic API, that provides an inside kernel API to cryptographic resources and a device interface for user-level access to hardware-accelerated cryptographic operations. Thus by knowing the architecture of cryptographic API a device driver can be implemented. The study involves the great understanding of Linux kernel its various APIs, services, system calls, device management and finally writing the block and character device driver. Finally, we consider load balancing between multiple crypto hardware and software implemented algorithms and a priority mechanism for selecting which implementations to use first i.e. in a efficient manner for this we will make us of OCF-Linux which is a port of OpenBSD’s Cryptographic Framework (OCF) to Linux. Read More...
|
Advance Embedded system (ECE) |
India |
1296-1298 |
332 |
A Review on Laser marking by Nd-Yag Laser and Fiber Laser
-Vaibhav Y Javale ; Vidya Nair
The main objective of this project is to develop and establish of marking procedure and investigation of marking characteristics of most commonly used EN8 Bearing steel for ball bearings. To perform the experiment, an experimental design matrix was constituted using the design of the experiments. For this purpose, in the Response Surface method, Box Behnken design was chosen as a statistical tool to build an experimental layout and also for the Optimization Response Surface Method. An Nd-YAG laser and Fiber laser was used in the laser marking process of stainless steel. The influence of the pulse frequency, Focal Point, marking seed of the laser beam on the mark depth, width and mark contrast have been studied in this Dissertation. Design of Experiment was obtained using Box Behnken design. Also Anova and Regresion Analysis were performed. Optimization of that parameters has been done using Response Surface Method. Read More...
|
Mechanical Engineering |
India |
1299-1301 |
333 |
AN EXPERIMENTAL ANALYSIS OF FIBER LASER CUTTING ON STAINLESS STEEL-304
-Vikrant B. Mahajan ; Vidya Nair
Fiber Laser Cutting is non-conventional machining process in which laser is generated and highly intense laser impinge onto the surface of the material to cut. Fiber laser cutting is newly developed process which is modified from simple laser cutting. Due to using fiber optics there is less power loss as compared to the laser cutting. Nitrogen and oxygen gases are used as the assist gas. This paper enlightens on analysis of operating power, focal point and cutting speed on the performance parameters such as surface roughness, kerf width and bending force while using oxygen as the assist gas. Read More...
|
Mechanical Engineering (Production) |
India |
1302-1304 |
334 |
Thermodynamically Evolution of LPG Refrigerator for Restaurant
-Vishwadipsinh Janaksinh Ghariya ; Swastik R. Gajjar
the LPG is cheaper and possesses an environmental free in nature with no ozone depletion potential (ODP). Also LPG is available as a side product in local refineries. This work investigates the result of an experimental study carried out to determine the performance of domestic refrigerator when a propane-butane mixture is liquefied petroleum gas (LPG) which is available and comprises 56.4% butane, 24.4% propane, and 17.2% isobutene. An experimental investigation of Performance is carried out by the effect of changing capillary tube length, capillary tube inner diameter and capillary coil diameter on the mass flow rate of refrigerant in an adiabatic helical capillary tube. Large amount of electricity supply is not available easily in large part of under development country like India. It will also prove to be an effective for remote area such as research sites, mines, & deserts where electricity is generally not available. The results of the present work indicate the successful use of this propane-butane mixture as an alternative refrigerant to CFCs and HFCs in domestic refrigerator. It would include Experimental setup of working model and detailed observation of the LPG refrigerator and represents its application in refinery, hotel, chemical industries where requirement of LPG is more. Read More...
|
Mechanical Engineering |
India |
1305-1312 |
335 |
conferencing in twitter
-Praveena.M
While most of the requests nowadays furnish a little form of privacy controls to protect a user’s public content from supplementary users, these controls are not sufficiently expressive to furnish fine grained protection. In this paper, we furnish tweeting confidentially in the twitter and additionally furnish thoughts to apply video shouting in twitter inside a particular group. To accomplish this we familiarize Twitsper, to prop fine-grained manipulation above who sees a user’s messages. Twitsper provides privacy controls to the users of Twitter nowadays lacking relying on Twitter to make changes. This is because it is a wrapper concerning Twitter that enables confidential cluster contact as maintaining Twitter’s business interests. It preserves privacy both from the Twitsper server as well as from undesired Twitsper users. Read More...
|
computer engineering |
India |
1313-1316 |
336 |
Comparative Study on Discovered Rules Using Genetic Algorithm
-R. Vagitha Banu ; A. Abdul Samathu
Data mining is the computer-assisted process of digging through and analyzing enormous sets of data and then extracting the useful information. In data mining, association rules are useful for analyzing and predicting customer behavior. It is intended to identify strong rules discovered in databases using different measures of interestingness. Genetic Algorithm is a model of machine learning which derives its behavior from a metaphor of the processes of evolution in nature. It is a robust search method requiring little information to search effectively in a large search space. Global search can be achieved and system automation is developed with genetic algorithm. Many researchers have proposed Genetic Algorithms for mining interesting association rules from quantitative data. In this paper the rules discovered using Genetic Algorithm are analysed and discussed. Read More...
|
Computer Science Engineering |
India |
1317-1321 |
337 |
Experimental study for Reduce Stray Losses of 50KVA Proto Type Three Phase Transformer using Edgewise Magnetic Shielding
-Dilipkumar Arvindbhai ; Pranav N Chaudhari
The load losses in the transformer consist of I2R & stray losses. In large rating transformer, the stray losses constitute about 20-25% of the total load losses. Designers adopt various cost-effective measures to minimize the losses and make the transformer more efficient. This Stray Losses we can reduce by using Edge-wise Magnetic Shielding. These losses could be controlled by means of Edge-wise Magnetic shielding judiciously placed so as to canalize the leakage flux. By Experimental study with the help of Transformer manufacturing industry we can make 50KVA, 200/16v, 144.33/1804.22 ampere Proto Type Three Phase Transformer in which 18.43% Stray Losses reduce by using Edge-wise Magnetic shielding by Trial and Error Method .We can Compare calculation for with and without Edge-wise Magnetic shielding which specify that how much stray losses reduced by using Edge-wise Magnetic Shielding. We can also compare real data sheet and tested data sheet of three phase transformer for stray losses for without Edge-wise Magnetic shielding. Read More...
|
Electrical Engineering |
India |
1322-1324 |
338 |
Analysis of Distributed Power-Flow Controller to Improve Voltage Profile
-A. D. Parmar ; Prof. (MS.) R. A. Vyas; Prof. A. L. Vaghamshi; K. C. Chande
The distributed power flow-controller (DPFC) modified from UPFC for increasing system stability and reducing costs. The DPFC can be considered as a UPFC with an eliminated common dc link. The active power exchange between the shunt and series converters, which is through the common dc link in the UPFC, is now through the transmission lines at the third-harmonic frequency. The DPFC has the same control capability as the UPFC, which comprises the adjustment of the line impedance, the transmission angle, and the bus voltage. The objective of this review paper is to study principle of DPFC and analysis the performance to improve the voltage profile. Detailed simulations were carried out to illustrate the control features of these devices. Read More...
|
Electrical Engineering |
India |
1325-1330 |
339 |
Multi-objective Optimization for CNC turning of 2205 Duplex Stainless Steel Using Response Surface Methodology and Particle Swarm Optimization.
-Mr. Nanji N. Chaudhary ; Prof. D. R. Shah; Prof.D.A. Patel
In present study, response surface methodology has been applied to determine the optimum cutting conditions leading to minimum surface roughness as well as minimum machining time and maximum material removal rate in CNC turning operations of 2205 duplex stainless steel with carbide cutting tool. 27 experiments were conducted based on L27 orthogonal array of Taguchi’s Technique for 3 level of input parameters such as cutting speed, feed rate, depth of cut and Nose radius. The adequacy of the models on surface roughness, machining time and material removal rate have been established with Analysis of Variance (ANOVA). An attempt has also been made to optimize prediction model using particle swarm optimization to find the optimum cutting parameters. Read More...
|
Mechanical Engineering |
India |
1331-1337 |
340 |
Gabor Filter based Thresholding Level Method for Medical Image Enhancement
-PATEL ANKITKUMAR ARVINDBHAI ; kishor bamniya
Digital image enhancement techniques provide a multitude of choices for improving the visual quality of images. A frequency domain smoothing-sharpening technique is proposed and its impact is assessed to beneficially enhance the lung cancer images. This technique aims to gain the advantages of enhance and sharpening process that aims to highlight sudden changes in the image intensity and identifying the level of image for diagnosis purpose. The already developed technique also eliminates the drawbacks of each of the two sharpening and smoothing techniques resulting from their individual application in image processing field. Significant improvement in contrast of masses along with the suppression of background information.The proposed technique is tested lung cancer images of average filter and thresholding of level. The simulated results show that the high potential to advantageously enhance the image contrast hence giving extra aid to radiologists to detect it damage portion in lung. Read More...
|
IMAGE PROCESSING |
India |
1338-1341 |
341 |
Modeling And Control of DFIG In Wind Energy Conversion System
-Tank Semel Ratilal ; Vijay G Bhuva
This paper presents the simulation results of a grid-connected wind driven doubly fed induction generator (DFIG) . The modeling of the machine considers operating conditions below and above synchronous speed, which are actually achieved by means of a double-sided PWM converter joining the machine rotor to the grid. In order to decouple the active and reactive powers generated by the machine, stator-flux-oriented vector control is applied. The wind generator mathematical model developed in this paper is used to show how such a control strategy offers the independent control of active power and reactive power. Read More...
|
Electrical Engineering |
India |
1342-1347 |
342 |
A Review on Power Reduction Technique for VLSI Designs
-Dharmishtha Thakorbhai Patel ; Patel Priyanka Sumantrai
Low power has emerged as a necessity in portable electronics and communication devices. As a result, power dissipation has become an important design parameter for digital circuit designs. In this paper a survey is made regarding some existing techniques for power optimization in CMOS designs. Power optimization at logic and circuit levels is considered. Read More...
|
Electronics & communication |
India |
1348-1351 |
343 |
Develop Linux Device Driver to Optimize Power Consumption While Streaming Media
-Gondaliya Bhavdeep Dhirubhai ; shankar patel
The goal of the thesis is to design streaming media from flash by writing driver in user space and loaded in kernel space. The main objective is to make low power consumption mechanism useful for media streaming. In Present mechanism , a media is streaming from hard-disk in that the movement of mechanical part is continue so that’s why more power consumption occurs, so instead of present mechanism the concurrent mechanism will implement in that the media is streaming from flash so that’s why the mechanical part’s movement is reduce and power Saving occurs which ultimately results in power optimization. The project involves writing a character driver in blocking and non-blocking mode using Ioctl system call so that instead of using address space of secondary storage devices like hard disk, the new mechanism will use the address space of ram, which results in fast data caching so without any delay the media will be play which finally saves lot of time as well as power. The process overall includes creating multithreads, making open system call in blocking or non-blocking mode which utilizes user daemon services to call, wait(blocking or non-blocking mode) and acknowledge the process. Read More...
|
Advance Embedded System |
India |
1352-1355 |
344 |
Cellphone to Cellphone GPS Tracking System
-Naveen Mathews ; Anto P Joseph; George Paul; Naveen Mathews; Sanson Santhosh
Location-based services are to provide services to customers based on the knowledge of their locations. The purpose of this project is to design and construct a hand-held wireless GPS tracking device that can be tracked from another cellphone. The project consists of three parts. The first part is a mobile device with an embedded GPS and wireless Internet connection to transmit its current location. The second part is a mobile that will receive the data, parse it and with the user interface that will allow others to visually see where the hand-held GPS device is and has been. The third part is the server application which interconnects the paired users and holding the database of location co-ordinates and the user data. To view ones location, one could use any device that had preinstalled our android application. The data available through the application includes a scalable map of the surrounding area, latitude, longitude, speed, and altitude of the hand-held device. The system is intended to be a general purpose tracking device. Read More...
|
Information Technology |
India |
1356-1357 |
345 |
New Embedded Security Software Approach for ATM
-Nalinkumar Parshottambhai Saksena
The Conceptual Model of Multi-password System as new embedded security approach is presented in order to enhance the security of the ATM (Automated Teller Machine).The proposed system is built on open-source Linux Environment. With same User ID or User account, we can set different password each with different profile. In case of civil crimes like kidnapping, we can set secure user account by limiting amount to be withdrawn while recording such unauthorised activity by activating the webcam and stored at bank server or local machine and sending alert messages to nearest police station for second password and for third password we can set profile to enabling locking mechanisms like card lock, ATM door lock etc. and sending alert messages to bank and nearest police station. To achieve desired levels of ATM system security, The conceptual model of Multi-Password System is presented as “New Embedded Security Software Approachâ€. Read More...
|
Advance Embedded System |
India |
1358-1362 |
346 |
Review & Comparison of Fractal Antennas
-Jaymin Modi ; Trushit Upadhyay; Vaidehi Patel
In this work, the design of Sierpinski Model, Koch dipole model and Minkowski fractal geometry, which are different well-known types of fractal antenna to be used in wireless communications, is presented. For optimization of antenna's shape and dimensions, we can use properties of fractal shapes at the radiating slots. Here, analysis and design of these all model’s antenna used for wireless communication systems between 1 to 8 GHz are presented. Read More...
|
Electronics and Communication Engineering |
India |
1363-1366 |
347 |
An IEEE 11073 Based Composite Agent For Mobile Health
-Rindani Jaini Urmish
The increased use of technology in the healthcare sector has opened up the gates of many new invention to improve the current state of art of the healthcare sector. In this paper, the main focus is on development of a composite agent which can aggregate the medical data in proper format and can act as a communication interface for medical devices intended for capturing medical data. Moreover, a communication protocol is proposed to send the aggregated data from the composite agent to the receiver at the hospital side. This software component has been implemented using latest technologies such as ASN.1 and Android OS. IEEE 11073 standard has been used as the underlying component to provide standardization to our composite agent and make it widely accepted. Read More...
|
Computer Engineering |
India |
1367-1369 |
348 |
ASN.1-XML Based Optimized Exchange Protocol For Health Information
-Mruga Digant Parikh
In healthcare, the importance of obtaining the right information, at the right time is very critical. Healthcare personnel need to access the real-time medical data such as patient’s observation readings. Reliable, secure and optimized exchange protocol is developed over unreliable 3G network using TCP/IP protocol stack for Health information exchange. Security algorithm will be developed considering the criticality of Medical data. Improved QoS (Quality of service) over unreliable network by handling packet loss and reliability at application layer. And the exchange of Health Information will be in a data format that will be legible to read. Encoding standards will be used to provide compact transfer of medical data over the network. Read More...
|
Computer Engineering |
India |
1369-1372 |
349 |
TRANSITION TO SEAMLESS VIDEO COMPOSITION
-Kanimozhi ; Venitha
The main aim of the paper is to automatically discover content-consistent seamless video shots and compose into a virtual long-take video with spatial and temporal consistency while aims to provide a tree structure collection with temporal smoothing for ease of video browsing. The server can support a massive number of online clients without additional costs and ready to provide software features. A user will have their own login and password and can store large number of videos. A given video i s divided into different frames, an human related frames are captured and grouped into one group of frame and objects related frame are grouped into another group of frames. If user need human related video then by using VIOLA-JONES algorithm a person image is used as an reference image and can retrieve an related person video. An object based frames such as car, table, chair etc... are detected and given as video using SIFT (Scale Invariant Features Transform) technique. Finally object & sequence matching process are replaced by using SURF algorithm (Speeded up Robust Features) for improving matching accuracy. Read More...
|
Image Processing |
India |
1373-1378 |
350 |
A Review Paper On Cryogenic Storage Vessel For Liquid Hydrogen
-PRASHANT D. ASODARIYA ; PROF. N.V. BORA
This paper on liquid-hydrogen Dewar development conducted by various researchers. This paper provides an annotated review of the current state of the art of cryogenic tank materials, structural designs, and insulation systems along with the identification of key challenges with the intent of developing a lightweight and long-term storage system for LH2. The broad classes of insulation systems reviewed include foams (including advanced aerogels) and multilayer insulation (MLI) systems with vacuum. The MLI systems show promise for long-term applications. Potential wall material candidates are monolithic metals as well as polymer matrix composites and discontinuously reinforced metal matrix composites. For short-duration flight applications, simple tank designs may suffice. The current trends in liner material development are reviewed in the case that a liner is required to minimize or eliminate the loss of hydrogen fuel through permeation. Read More...
|
MECHANICAL ENGINEERING |
India |
1379-1380 |