No. |
Title and Author |
Area |
Country |
Page |
351 |
Experimental Study on Effect of Transient in Engine Speed on emissions of Multi-Cylinder Diesel Engine
-Dhaval M.Parekh
Growing interest in quantifying and reducing the amount of engine emissions of CO, HC, and NOx loading the environment has led to increasingly tighter environmental regulations. Non-road emission standards are performed according to a steady-state test cycle, which does not include transient effects of emissions and thus underestimates the amount of emissions produced in real use of the engine. This study shows the effects of transients in engine speed on the fuel consumption and emissions in Multi- Cylinder diesel engines. Fuel consumption and emissions from the engines were measured in an engine dynamometer during various transient load conditions. The results showed that during fast transients, the measured fuel consumption was large. The effects of transients on emissions of nitrogen oxides were even greater, as effects of transient load increase with increasing transient conditions. In this study increasing in load there was increasing in fuel consumption NOx, HC and CO emissions. Read More...
|
Mechanical |
India |
1381-1384 |
352 |
Implementation of Digital Signage Sixth Screen Device
-Kiran kapadia ; Hiren Bavarava; Shayar Rathod; Dharmisht Dalsaniya; Ankit Joshi
Digital signage is an emerging new technology. It is expected to play an important role in today’s dynamic world as digital signage displays timely information, the main focus of this paper is the design, the implementation, and evaluation of a digital signage system based on a LCD/LED to display web contents on digital displays located at one or more location. The system will display information based upon playlist that can be dynamically updated. On the basis of our evaluation, it is real world. Interface as embedded touch screen, moment, and image capture Device. Read More...
|
Electronics and communications |
India |
1385-1386 |
353 |
improved privacy presurving in association rule using rule hiding algorithm
-bhabhor chiragkumar gangjibhai ; prof chetna chand; prof mahesh panchal
The main problem is that to hide sensitive information, including personal information, fact or even patterns which are generated by any algorithm of data min- ing from the others. In order to focusing on privacy preserv- ing association rule mining, the simplistic solution to address the problem of privacy is presented. To overcome these problems, we propose a algorithm named improved Privacy Preserving Algorithm using Association Rule Mining which is based on the random Perturbation technique which is best in efficiency and performance. This method is suitable to the any type of data. Our algorithm is a good way to apply data mining techniques with security that hides our logical in-stances from others. Read More...
|
data mining |
India |
1387-1389 |
354 |
Performance & Emission Studies of Diesel Engine Using Blends of Diesel, Tyre Pyrolysis Oil & Dibutyl Maleate
-Milan G. Bhakta ; Milan Pandya; Hirenkumar M. Patel; Tushar M. Patel; Gaurav P. Rathod
The experiment have been carried out to evaluate performance and emission characteristics of single cylinder four stroke diesel engine fueled with 10%, 15% and 20% tyre pyrolysis oil which is made from tyre waste through pyrolysis process. Result showed that the brake thermal efficiency of engine fueled with pyrolysis oil-Diesel blend decrease with increase of pyrolysis oil concentration in Diesel fuel. In Pyrolysis oil-Diesel blend, HC,CO NOx emission found higher with increase in load compared to Diesel fuel.DBM (Dibutyl maleate was added as an oxygenated additives to the tyre pyrolysis oil-Diesel blend in the concentration of 5%, 10% and 15%. The best results were found in 5% DBM added blend. It is concluded that it is possible to use tyre pyrolysis oil in diesel engine as an alternative fuel without any engine modification. Read More...
|
Thermal engineering |
India |
1390-1394 |
355 |
One Cycle Controlled Three Phase Boost Converter with PFC
-Kishan V. Dobariya ; Prof. M. H. Ayalani
One cycle controller is used as a controllerin single /three phase boost converter, active filter, and power factor corrections. Three phase Rectifier are widely used in industries application like electrochemical processes, arc furnaces, and adjustable speed drive. In this paper, a three phase six-switch standard boost rectifier with one cycle control technique is proposed. For the standard bridge boost rectifier, a high power factor and low total harmonic distortion can be realized in all three phase with a simple circuit that is composed of one integrator, and some logic and linear component. It does not require multiplier and PLL or any other synchronization circuit. In addition, they offer fast dynamic response due to presence of the current control loop, it employs constant switching frequency modulation that is desirable for industrial application. The proposed control approach is simple and reliable. Detail simulation study is carried out to verify the effectiveness of the scheme. Read More...
|
Power Electronics |
India |
1395-1397 |
356 |
Thermal Design and Analysis of Shell and Tube heat exchanger with the use of Alumina (Al2O3) Nanoparticle
-Mahendra K. Sanghani ; Prof. Milap M. Madhikar
In the last decades our world is been marked by questioning of Sustainability, Resource scarcity. To guarantee the safety of future generations, governments and industries share the common goal of environment preservation and rational energy expenditure. Heat exchangers perform an important role in heating, cooling and heat recovery. This project deals with design, and analysis of a Shell and Tube type condenser. But the main limitation of current exchangers is the poor heat transfer behaviour of common operating fluids, such as oil, glycols or water. To improve fluid heat transfer, the recent advent of nano fluids having high heat transfer nanoparticle suspensions in base fluids, has taken place. These have displayed substantial heat transfer performances. For the convective heat transfer study of a nano fluid, Alumina powder suspended in water with different volumetric concentration of nanoparticle is used. After extensive literature review, Kern approach for thermal design and TEMA design code is used for mechanical design and validated based on experimental data to find the effect of nanofluid in heat exchanger. The acquired results for the nanofluid are then compared to the matching data for base-water and to common theoretical correlations. Read More...
|
Mechanical Engineering |
India |
1398-1400 |
357 |
Effect of in Cylinder Parameters on Performance and Emission of Diesel Engine: A Review
-Sapana V. Nimje ; S. M. Lawankar
The diesel engine is currently the most efficient powertrain for vehicle propulsion. Unfortunately it suffers from rather high particulate and NOx emissions that are directly related to its combustion mechanism. Future emission legislation requires drastic reduction of NOx and particulate matter compared to present values. Engine manufacturers in their effort to meet these limits propose two solutions: reduction of pollutants inside the combustion chamber using internal measures and reduction at the tailpipe using after treatment technology. NOx and PM are combined effect of injection pressure and timing. We know that NOx and PM are inversely proportional to each other so PM-NOx trade off study is important. Here effect of in cylinder parameters on engine emission and performance is reviewed. Read More...
|
Mechanical Engineering |
India |
1401-1403 |
358 |
ARTIFICIAL NEURAL NETWORKS USED IN THE PREDICTION RAW MATERIALS FOR AN INDUSTRIAL UNIT
-S.Pavithra ; S.Pavithra; Persis Dashna Paulyn; S.Anusuya
Ships square measure accustomed import and export serious cargos from countries overseas. So, Ship building is one in every of the most important criteria. Completion of the ship in time is vital for trade. Correct offer of raw materials for Ship building is a necessary criterion here. By mistreatment the NeuralNetwork algorithmicrule, weareableto get approximate quantity of raw materials needed. Read More...
|
Computer Science Engineering |
India |
1404-1406 |
359 |
Image Quality Assessment for Fake Biometric Detection
-romy wadhwa
Biometric system plays an important role in authentication but these systems are vulnerable to several attacks. Spooï¬ng and anti-spooï¬ng has become a prevalent topic in the biometrics community. This paper introduces novel and appealing techniques for fake biometric detection using liveness detection based on Image Quality assessment (IQA). The key idea of this approach is to present software based multi-biometric and multi-attack protection method that characterize real but not fake ones. Read More...
|
computer science |
India |
1407-1409 |
360 |
CLOUD COMPUTING
-D.Arvind Varma
Cloud computing is a computing concept which is currently becoming popular over the Internet .It is invariably a storage paradigm which provides dynamically scalable and virtualized resources for hosting data and information on the net. The term cloud is actually a metaphor which depicts the underlying storage concept which shrinks and expands like a cloud containing rain water. Currently everything is hosted on the internet for a fixed price for storage. Website hosting servers have to be paid a fixed sum of money for hosting information and files. In turn they provide a fixed storage which can only be used . If additional storage is needed then price relative to the amount of storage needed has to be paid in addition to waiting time till the server allocates the resources. This price has to be paid initially and even if it is not fully utilized yet the money has to be paid.Cloud computing brings in the concept of ‘pay as you use’. The present aim of Cloud computing is to provide virtually infinite workspace and storage for any client that has registered with a cloud computing server. This concept is presently adopted by the Hosting servers which provide this facility as a service. This article aims at illustrating the concept of cloud computing and also explains about the pros and cons of cloud computing technology. Read More...
|
computer science and engineering |
India |
1410-1412 |
361 |
MODELLING OF AMBA AXI4 PROTOCOL
-GURUPRASAD HEGDE ; Bharath B; DARSHAN G M; GNANESH G
Shrinking process technologies and increasing design sizes have led to highly complex billion-transistor integrated circuits (ICs). As a consequence, manufacturers are integrating increasing numbers of components on a chip. The need for high performance applications is driving the requirement for a new age of on chip communication infrastructure. On-chip bus organized communication architecture is among the top challenges in CMOS SoC technology due to rapidly increasing operation frequencies and growing chip size. This project is developed with the objective of enabling data transactions on SoC bus using AMBA AXI4 protocol modeled in Verilog hardware description language (HDL) and simulation results for read and write operation of data and address are obtained using XILINX ISE simulation tool. The operating frequency is set to 250MHz. Four test cases are run to perform multiple read and multiple write operations. The architecture developed here is not the ultimate solution. Here we had made an attempt to know about AMBA AXI protocol and developed an interconnect design for multi-masters and multi-slaves. Read More...
|
Electronics Engineering |
India |
1413-1416 |
362 |
Image Quality Assessment for Fake Biometric Detection
-G.H.CHANDANA PRIYANKA
To ensure the actual presence of a real rightful trait in difference to a fake self-manufactured synthetic or reconstructed sample is a significant trouble in biometric verification, which requires the development of new and efficient protection measures. Background to fingerprint recognition describes the biometric use of fingerprints scanning is also done by biometric technologies. The objective of proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user friendly and non-intrusive manner, through the use of image quality assessment. The experimental results, obtained on publically available data sets of fingerprints, iris, and 2D face. Collection Variables:Physical variations during biometric collection that may change the capacity. Translation or scaling or rotation usually compensated in software. Can the device detect that the subject is live?Fake face recognition with a photograph? Or a rubber print image (fingerprint)? Or a glass eye (iris encoding)? Read More...
|
computer science and engineering |
India |
1417-1419 |
363 |
Metamorphic Malware Detection using Heuristic Signature
-Milan Rajpara ; Girish Khilari
Present day malicious programs are comes with dynamic packing capability which helps them to evade detection from traditional anti-malware scanner who works on OpCode pattern matching technique. The metamorphic engine resides in malware, changes the structure of malware, which changes OpCode hence the previous signature will not work for the new variant. Here we are using a bioinformatics technique of signature alignment, to generate a heuristic signature, based on the previous database of malware. We made a signature set of malicious (single MSA signature) and benign file (group signature) and computed a threshold to detect malwares. Proposed method calculates to predict the signatures, of the metamorphic malware variants. This method showed a good result with high true positive and low false positive ratio. Read More...
|
Computer Engineering |
India |
1420-1422 |
364 |
Experimental Investigation on Effect of Plasma Nitriding on Wear of Chain-Sprocket Assembly Used In Motorcycle
-Kavit M. Shah ; Prof. Dhruv U. Panchal
Now a day’s different materials are used to coat on parts of vehicles which have friction between them to reduce wear characteristic. The wear resistance after Nitriding Process applicable to the Chain-Sprocket assembly is investigated in this study. Among Nitriding methods, plasma Nitriding is most widely applied in the automotive industries, because it is been applied at low temperature and so that the original properties of sprocket will not be harmed. Wear Resistance of Plasma nitrided chain-sprocket assembly is very high as compared to ordinary assembly. The friction due to meshing between chain and sprocket is of major concern and some of the power of engine gets wasted as friction loss. Plasma Nitriding will give high wear resistance so that, wear will decrease and eventually life of chain and sprocket will increase compared to ordinary one. Friction loss will decrease which can improve transmission efficiency of motorcycle. Read More...
|
Automobile Engineering |
India |
1423-1427 |
365 |
Implementation of a RTSP streaming based on ARM processor
-Sujal Patel
this paper presents a design and implementation of RTSP (Real Time Streaming Protocol) streaming server. It utilizes arm BCM2835 and Linux operating system as a platform and develops network streaming media on the arm BCM2835 through rtsp streaming server and VLC media player. BCM2835 is a cost optimized, full HD and multimedia processor. A real time streaming media and some basic function of Real Time Streaming Protocol is implemented in this paper. This implementation proves to stream audio and video data smoothly. So we can conclude that this RTSP server can be embedded into many multimedia applications. Read More...
|
VLSI & Embedded System Design |
India |
1428-1430 |
366 |
SPEED CONTROL OF INDUCTION MOTOR BY VECTOR CONTROL & FUZZY LOGIC
-YOGENDRA R. SHARMA
Vector control of an induction motor has permitted fast transient response by decoupling torque and flux. The PI controller has been widely used due to simple control and easy implementation, Matlab model of Induction motor drives is constructed. This paper presents a fuzzy controller of a direct field oriented induction motor drive for high performance. A superiority of the proposed fuzzy controller over conventional PI controller in handling nonlinear induction motor has been effectively demonstrated by comparing speed controller with PI controller under varying operating conditions like step change in speed reference and torque reference. The results validate the robustness and effectiveness of the proposed fuzzy logic controller for high performance of induction motor drive system. Read More...
|
POWER ELECTRONIC DRIVES ( ELECTRICAL ENGINEERING) |
India |
1431-1434 |
367 |
Simulation of sensorless speed control of induction motor using reduced order flux observer
- Miss.Vishakha s. Zade ; Dr. Ms. S. P. MULEY ; Prof. R.D.JAWALE
This paper describes a Model Reference Adaptive System (MRAS) for speed control of the Induction Motor drive (IM) without a speed sensor. In this scheme reduced-order Flux Observer is used instead of the Full-order Flux Observer, a reduced order flux observer is used for estimate the IM rotor speed, and these are used as feedback signals for the Field Oriented Control (FOC), which is a widely used control method for Induction Motor drive (IM). In comparison with the full order observer, the proposed method consumes less computation time and illustrated better speed performance. Simulation results shows that the proposed scheme can estimate the motor speed under various adaptive PI gains and estimated speed can replace to measured speed in sensorless induction motor drive. Read More...
|
Electrical Engineering |
India |
1435-1439 |
368 |
Voltage Level Shifter - Review
-JAYMIN VAGHELA ; Hardik Bhatt
A review on various CMOS voltage level shifters is presented in this paper. A voltage level-shifter shifts the level of input voltage to desired output voltage. Voltage Level Shifter circuits are compared with respect to output voltage level, power consumption and delay. Systems often require voltage level translation devices to allow interfacing between integrated circuit devices built from different voltage technologies. The choice of the proper voltage level translation device depends on many factors and will affect the performance and efficiency of the circuit application. Read More...
|
Electronics & Communication Engineering |
India |
1440-1442 |
369 |
Barcode Based Automated Parking Management System
-PARTH RAJESHBHAI ZALAWADIA ; JASMIN NARBHERAMBHAI SURANI
Barcode Based Automated Parking Management System is implemented in this paper. The automatic car parking system using barcode is an interesting project which uses barcode as its heart. This project is designed for car parking. Barcode is a very useful technology in automation of car parking system in a mall/building. It will provide security besides automation of parking though barcode based technology. In this project we are using a particular standard of barcode called UPC-A barcode standard. The project scenario represents two gates are used one at the entry side and other at the exit side which is open/close with the help Stepper motor. Now when a car comes in front of gate, driver has to push a button placed nearby gate. So by pressing this button the barcode chit pops out giving particular no of parking slot to the car. So the entry gate will be open and the car is allowed to park in its designated slot. Now at the exit time driver has to show barcode to the reader machine which is there at the exit gate thus allowing car to leave the parking arena. The advantage of this project is that it saves the high power consumption and no of security persons. The Simulation Results are generated using Matlab 9. Read More...
|
ELECTRONICS & COMMUNICATION ENGINEERING |
India |
1446-1450 |
370 |
Design, Verification and Physical Designing of FCFS Arbiter
-Saurin Shah ; Pankaj Chavda; Harshil Gajjar
In an environment where multiple masters and multiples slaves are used only one master can access the bus at a time for transaction over bus. Due to this, a mechanism is required which allows a single master to access the bus. This is accomplished by an electronic devise named as 'Arbiter’. Arbiter allocates access to shared resources. Based on priory different arbitrations schemes are required like Fair scheme, Round Robin scheme, Priority Based scheme, First Come First Serve scheme etc. Here a complete ASIC flow of First Come First Serve Arbiter is explained. Designing is done using Verilog, verification is performed using SystemVerilog and physical designing is shown. For complete process Synopsys tools are used. Read More...
|
Electronics and Communication Engineering |
India |
1451-1453 |
371 |
Detecting Phishing Email: Hybrid Feature selection
-manohar kumar kushwaha ; S.madhu
Phishing is a technique for acquiring your personal information; e.g. credit card or bank account numbers and passwords, and subsequently committing fraud in your name. E-mail has become an invaluable communication tool, both for business and personal use. Finally we can say that, Phishing email is a fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. In other words, Phishing email will direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and set up only to steal the information the user enters on the page. In This paper we focused on hybrid feature selection approach that based on the combination of content-based and behavior–based. When hybrid features selections are used in Email phishing, which is able to achieve 97% accuracy rate. Read More...
|
computer science & engineering |
India |
1454-1457 |
372 |
Green Computing
-D.Sai Krishna Reddy
Green computing or green IT , refers to Environmental sustainable computing or IT. The study and practice of designing , manufacturing disposable computers, servers and associated sub – systems such as monitor, printers, storage devices and networking and communication systems efficiently and effectively with minimal or no impact on the environment. Green computing is the environmentally responsible use of computers and related resources. Such practices include implementation of energy- efficient central processing unit, servers, peripherals as well as reduced resource consumption and proper disposal of electronic waste. One of the earliest initiatives towards green computing in the United States was the voluntary labeling program known as Energy Star. It is conceived by the Environmental Protection Agency (EPA) in 1992 to promote energy efficiency in hardware of all kinds. The Energy Star label became a common sight especially in laptops and displays. Today’s PCs are so powerful that the vast majority of applications only use a small fraction of the computer’s capacity, it can be simultaneously shared by multiple users. Consumers 90% less energy per user PCs typically consume between 110 to 200 watt light bulb. A class room, computer lab, office with PC’s warms up very quickly. PC-filled work areas always have to be air conditioned. Air conditioners raise electricity
cost & require large capital expenditures to buy, install and maintain them. Electronic waste is a large & growing problem throughout the world. On a broader scale, the Kyoto Protocol and The Climate Savers Computing Initiative (CSCI)-Global efforts to save the environment which require Active participation of governments, organizers and manufactures. The computers and peripherals draw significant amount of energy in sleep and standby modes. They contribute to harmful CO2 emissions.
These days everyone seems to talk about global warming and ways to protect the environment. Unconsciously, all of us are contributing to unwanted CO2 emissions from house through careless use of our electrical devices. According to reports from the German Federal Environment Office, devices consume around 17 billion kilowatts hour (kWh) in a year when They are in standby mode. DVD players, DVD Recorders or even multifunctional printers continue to draw electricity because of the absence remote of an ‘OFF’ button. If you press the ‘Power Off’ on the remote, these devices go into standby mode. Windows Vista never shuts down or powers off the PC completely. The default shutdown mode is a deep sleep mode that requires power. Its only when you switch off the main switch at the back of the computer that power supply unit stops drawing power.
Read More...
|
Computer Science and Engineering |
India |
1458-1459 |
373 |
PRIVACY OVER PHR USING ATTRIBUTE BASED ENCRTPTION
-AKSHAYA PRARTHANA SELVARAJ ; AKSHAYA PRARTHANA SELVARAJ
PHR) Personal Health Record is often used in the information and data exchange, on the basis of storing the data such as the cloud providers. The threat is that these data’s that are stored can be exposed to the third party or the unauthorized party. In order to ensure the control over the patient data, a promising encryption method is being followed. Yet, the flexible access and efficient user have remained the most important and challenging enforced data access control over the PHR. In this paper, we propose attribute based encryption over the patient data’s by encrypting. In this, we focus on the multiple data owner scenario, and divide the users and also provide the multiple security domains that help in reducing the complexity for the owners and users. In we also use Pseudo random code algorithm for giving different id for the patient .As a part of security the data is protected by blocking the user if the user attempts a failure to login the id twice, the user will henceforth will not be allowed to login again with the same network. Thus security, scalability and efficiency of our proposed scheme also has the random code algorithm which blocks the third party access over the data and provide full privacy of the patient’s personal health record. Read More...
|
Computer Science Engineering |
India |
1460-1462 |
374 |
BRAIN CONTROLLED CAR FOR DISABLED
-I.Dileep
Here we considers the development of a brain driven car,which would be of great help to the physically disabled people.The car integrates signals from a variety of sensors like video, weather monitor,anti –collision etc. it also has an automatic navigation system in case of emergency. The car works on the a synchronous mechanism of artificial intelligence. Read More...
|
computer science and engineering |
India |
1463-1464 |
375 |
INBUILT CHARGING TECHNIQUE FOR MOBILE PHONES USING NANO TECHNOLOGY
-C.Chennakesh
Recent survey of the electricity board of AndhraPradesh says that the: “Energy Consumed In A Month By All Mobile Phones In Andhra Pradesh For Charging Up Is Equivalent To That Required By A Cotton Mill To Be Driven For A Yearâ€. To counter this problem we have come up with an innovative idea to charge up the cell phone by means of nanoscale mechanical and thermal energy. A novel approach converts nanoscale mechanical and thermal energy into electric energy for self-powering nanodevices. In our own work, we've used piezoelectric zinc-oxide nanowire (ZnO NW) arrays and thermoelectric nanowires of nanoporous silicon cages to demonstrate a novel approach for converting nanoscale vibrations, room and body temperature into electric energy, which in turn could be used to charge the mobile phone. Using piezoelectric material, we could create nanowires that generate electricity from the vibrations suffered by the cell phone. The piezoelectric effect is a phenomenon certain materials exhibit in which when a physical force applied to a piezoelectric material, it emits an electric charge and vice versa. Piezoelectric nanowires might provide power to nano-size systems in the future. Thermoelectric devices can convert heat into electricity. Various researchers are working to produce inexpensive and efficient thermoelectric materials that can change waste heat into electricity. Recently there was an announcement that researchers at Berkeley had made silicon nanowires that convert heat into electricity using a thermoelectric effect. One possible use of these is to charge portable devices. The wires could be simply be knit as the panel of cell phone and thus the panel could become a charging station. Using the body temperature and room temperature as the source of energy, it could generate the electricity. Read More...
|
computer science and engineering |
India |
1465-1467 |
376 |
Seamless Video Streaming: A Light Weight Session Handoff Scheme for Dynamic Stream Merging based Wireless Mesh Networks
-G.Sai THRILOK
The flexibility of Wireless Mesh Network (WMNarchitecture has made it easier for the delivery of videostreams over such networks. However, delivering video streams over WMNs increases workload on the mesh nodes, increasesbandwidth usage due to dedicated streams and limits scalability. These challenges are overcome by using WMNs withDynamic Stream Merging Capability (DSM) [1]. DSM is acommunication sharing technique that can merge redundant streams at upstream nodes before flowing to downstream nodesin the multicast streaming tree. In spite of these benefits,there is a growing need to use a distributed session handoff scheme to support seamless video streaming for fast moving clients, which not many research works are concentratingon. Thus in this paper, we propose a light weight, fast anddistributed scheme that uses a novel session rate prediction technique and a novel Dynamic Relationship Tree (DRT). The proposed session handoff scheme promotes workload sharingand supports mobile clients moving at speeds as high as 250 miles per hour. Based on extensive simulations performed in NS2 we found that the proposed scheme can provide robust and seamless inter and intra-domain session handoff producing less latency and overhead compared to existing schemes. Read More...
|
computer science and engineering |
India |
1468-1471 |
377 |
A NOVEL CRYPTOGRAPHICAL SCHEME FOR MOBILE AD-HOC NETWORK SECURITY
-Surbhi Tahanguria ; Deepak Kumar Xaxa
Security in Mobile Ad hoc Network (MANET) is very vital issue. Because of dynamic topology and mobility of nodes, MANET’s are more vulnerable to security attacks than conventional wired and wireless network. Ad hoc network, infrastructure is not required for establishing communication. Various security mechanisms have been proposed, widely used, and proven to be effective in wired networks, but no single mechanism provides all the services required in a MANET.In this paper we have proposed an innovative and secured, ACS (address based cryptography scheme) as a combination of Ad- hoc node address and public/Private key cryptography. ACS is a certificate less public key cryptography solution which empowers efficient network-wide secure key update via a single broadcast message. It also provides general information about how to choose the secret key sharing parameters used with public key cryptography to meet desirable levels of security and authentication. Thus, it eliminates the need for certificate-based authenticated public-key distribution. Read More...
|
NETWORK SECURITY |
India |
1472-1476 |
378 |
Design of AHB Reconfigurable Master Arbiter
-Jasmin N. Surani
Select the right master, while dealing with number of master trying to sense a single data bus. The effectiveness of a system to resolve this priority resides in its ability to logical assignment of the chance to transmit data width of the data. The purpose of this paper is to propose the scheme to implement reconfigurable architecture. This scheme involves typical Advanced Microcontroller Bus Architecture (AMBA) features like “Single clock edge operationâ€, “non-tristate implementationâ€, “burst transferâ€, etc. In this paper, Advanced Peripheral Bus (APB) is used to reconfigure the arbiter. In this arbiter there are some register which are reconfigured with the help of APB bus. Also there are three arbitration scheme are used for arbitration. Round robin, First Come First serve (FCFS), highest priority schemes are used. The design architecture is written using the verilog hardware description language using the Xilinx ISE tools. Read More...
|
M.E.-VLSI & Embedded System design(Electronics & communication Engineering) |
India |
1477-1480 |
379 |
WLAN INTERFACE WITH BEAGLEBONE BLACK
-Dhruv Dalwadi
An embedded system is a computer system designed for specific control functions within a larger system, often with real-time computing constraints But when networking technology is combined with it, the scope of embedded systems would be further more. Here wlan interface with beaglebone black is presented. That can be used for industrial monitoring system. In h/w design beaglebone black, netgear wna 1100 wlan adepter is used. Sensors are interfaced with beaglebone black. Parameters like ldr, temperature, humidity, gas are measured and transmitted to PC through tcp/ip socket programing. The received values in PC is real time values that are coming from beaglebone black. So by giving aIP address to both server and client can sensor’s data can transmite through beaglebone black to pc. In industry single ARM board acts as data acquisition and control system and as bone script a web server also, so the system is less compact with less complexity. Read More...
|
Embedded System Design |
India |
1481-1483 |
380 |
Use of thermoplastic elastomers in road construction
-Nikhil Ahir
The use of four wheeler, two wheeler vehicles etc. is increasing day by day. As a result amount of waste tyres also increasing. Waste tyres in India are categorized as solid or hazardous waste. It is estimated that about 60 per cent of waste tyres are disposed via unknown routes in the urban as well as rural areas. This leads to various environmental problems which include air pollution associated with open burning of tyres (particulates, odor, visual impacts, and other harmful contaminants such as polycyclic aromatic hydrocarbon, dioxin, furans and oxides of nitrogen) and aesthetic pollution. Therefore, it is necessary to utilize the wastes effectively with technical development in each field. One of the technical and easy way is using SBS (styrene-butadiene-styrene) in crumb rubber modified asphalt. The incorporation of SBS into crumb rubber modified asphalt is investigated to enhance binder properties and storage stability. SBS is used in crumb rubber modified asphalt to gain the high properties of road. Read More...
|
Rubber Technology |
India |
1484-1487 |
381 |
Design, Simulation and Analysis of Shunt Active Filter
-Patel Monika Bharatbhai
Power Quality is a major area of concern for industrial as well as domestic loads. Thus power electronics has proved as a major field in the area of power quality improvement. Active Power Filters are implemented on a wide scale where voltage as well as current compensation is required. The active filtering is that it automatically adapts to changes in the network and load fluctuations. They can compensate for several harmonic orders, and are not affected by major changes in network characteristics, eliminating the risk of resonance between the filter and network impedance. The shunt active filter for reducing the current harmonics, increasing the power factor and voltage profile. Here the current reference required by the voltage source inverter is the use of the instantaneous reactive power theory. By this method we take reference current and voltage and match with actual current and reduced the error by current controller then gives the opposite with same magnitude of current harmonics to the system. Read More...
|
Electrical Engineering |
India |
1488-1491 |
382 |
Comparative Study of LDPC and Viterbi Decoder
-ASHIMA SOOD ; Shubham singh; Nagendra Sah
The main concern in any communication system is the reliable transmission of signals of information from a transmitter to a receiver. The signals are transmitted via a channel which corrupts the signal. It is necessary that the distorting effects of channel and noise are minimized and that the information sent through the channel in any given time is maximized. Channel coding techniques are employed to do this. In this paper we discuss the different decoders used to decode the channel encoded data.VLSI implementation complexity of a low density parity check (LDPC) decoder is heavily affected by the inter-connect and the storage requirements.. Several structured properties of LDPC codes and decoding algorithms are observed and are used to construct hardware implementation with reduced processing complexity.Another technique, known as Convolutional encoding is used for correction of errors at the receiver end .Convolutional codes protects information by adding redundant bits to the binary data. Viterbi decoding is the technique for decoding the Convolutional codes. The Viterbi algorithm estimates the maximum likelihood path through a trellis based on received symbols. Read More...
|
Electronics VLSI Design |
India |
1492-1493 |
383 |
ATTACKS AGAINST MOBILE Ad Hoc NETWORKS ROUTING PROTOCOLS
-E.VISHNU VARDHAN REDDY ; T.S.Sai Eswar; V.Ganesh Reddy
Cellular communication plays a vital role in the modern world. This paper outlines some important issues that relate to security attacks against mobile ad hoc networks. In designing security mechanisms for mobile ad hoc networks, one must consider the attacks variations as well as the characteristics of the attacks that could be launched against the ad hoc networks. The discussions of these two aspects are summarized in this paper. It also classifies several common attacks against the ad hoc networks routing protocols based upon the techniques that could be used by attackers to exploit routing messages. Those techniques are modification, interception, fabrication, and interruption. Read More...
|
ELECTRONICS AND COMuMUNICATION ENGINEERING |
India |
1494-1498 |
384 |
Eigenface Algorithm Based Facial Recognition
-Sneha Arora ; Rajiv Munjal
Eigenface approach was developed by Sirovich and Kirchy in 1987 and later on Marthew and Alex work on it and used in facial recognition. Eigenfaces thinks image set as 2-D and assumes that at the time of recognition the face of the image should be kept straight and frontal.For this eigenfaces are calculated using principal component analysis . For this we calculate eigenvectors and eigenvalues. To calculate eigenvectors and values we need to have training sets of images which then differentiate input signals from noisy signals. After calculating eigenvectors we chose component and form a feature vector. Eigenvectors with highest eigenvalues is chosen as principal component of data set and then we get ghost like images which we called as eigenfaces. Read More...
|
COMPUTER SCIENCE ENGINEERING |
India |
1499-1500 |
385 |
Design, Optimization & Fatigue Life Estimation of Diesel Engine Piston
-Shishir S Fakiragouda ; Vishwanatha KH
Engine pistons are one of the most complex components among all automotive and other industry field components. The engine can be called the heart of a vehicle and the piston may be considered the most important part of an engine. There are lots of research works proposing, for engine pistons, new geometries, materials and manufacturing techniques and this evolution has undergone with a continuous improvement over the last decades and required thorough examination of the smallest details. Notwithstanding all these studies, there are a huge number of damaged pistons. Damage mechanisms have different origins and are mainly wear, temperature, and fatigue related & cannot be repaired easily. The fatigue related piston damages play a dominant role mainly due to thermal and mechanical fatigue, either at room or at high temperature. The paper describes the Design, Optimization (in terms of Stress & Weight Reduction) and Fatigue Life Estimation of four stroke diesel engine piston. The main objective is to investigate the Stress Distribution, Temperature Variation, deformation & Fatigue Life estimation. In this work the FEA technique to predict the higher stress and critical region on the component. The optimization will be carried out to reduce the stress concentration on the piston using ANSYS. Fatigue life of the piston will be predicted using constant amplitude S-N data for the material used. Read More...
|
Mechanical Engineering - Diesel Engine Piston |
India |
1501-1505 |
386 |
Embedded System
-G.Hemanth
Imagine you manipulation all the arrangements concerning just by a easy gesture and the things answer to you as if it was a little magic. This might be probable alongside embedded systems. The word ‘embedded systems’ is quite a convoluted one. Plainly locale, it is a combination of hardware and multimedia that performs the constituent of a larger system. A insufficient years ago embedded knowledge continued in stand alone mechanisms such as vending mechanisms and copiers that did their jobs alongside slight regards for what went on concerning them. But as knowledge advance to link mechanisms to the internet and to every single supplementary, the possible of embedded knowledge has increased. Home appliances, mobile phones, cars, puny micro chips, avionics etc.., are all employing embedded technology.
High-profile embedded chips are scaleable, produce tiny numbers of warmth, and consume less power. These are usually favored for their speed, accuracy and reliability. As they are compact in size and skill to present time-critical and task specific operators, embedded mechanisms find request in all segments of manufacturing and business marketplace locations and residence appliances. In present years, it came to be seeming that manipulation arrangements as integral constituents of larger arrangements, ought to be industrialized and projected concurrently alongside technicians, hydraulics, and electronics. It is vital that builders have a good understanding of the implications of multimedia knowledge embedded into established engineering systems. Current mechanisms encompass of physical constituents bestowing the way and a manipulation arrangement retaining those way to fulfill the machine’s function. Together, they craft up the manipulated contraption, that can additionally be shouted an embedded system. . New innovative requests in disparate spans will make embedded arrangements as one of the fastest growing knowledge of the adjacent future. This paper deals alongside thoughts and events of embedded arrangements in manipulation of mechanisms and gives a finished overview of the frank constituents of manipulation arrangements, fluctuating from sensors to actuators.
Read More...
|
computer science and engineering |
India |
1506-1509 |
387 |
GRID COMPUTING
-G.Saichandu
These technologies have enabled the cooperative use of a wide variety of geographically distributed resources as a single more powerful computer. This new method of pooling resources for solving large-scale problems is called as grid computing. This paper describes the concepts underlying grid computing. Read More...
|
computer science and engineering |
India |
1510-1513 |
388 |
Configurable Design of PCI Express Data Link Layer Receiver
-Bhavesh S. Motiwala
PCI Express is a modern, high-performance communication protocol implementing sophisticated features to meet today’s performance demands. This paper looks at the success of the widely adopted PCI Express protocol and describes a higher performance. This paper presents the proposal of the implementation of the Data Link Layer Receiver of PCI-Express, in which the architecture contains the Receiver module which ensures the reliability conveying of the Transaction Layer Packets (TLPs) between two components using the PCI-Express protocol. The Receiver module will take part into the communication via receiving data from the Physical Layer and supplying it to the Transaction Layer with several communication parameters. Here High Level as well as Detailed Design for the Receiver section with the sub modules are presented. The attributes presented here are amongst positive/negative acknowledgements, flow control, storage and retry buffers (for failed packets), power management for successful communication. Read More...
|
VLSI Design |
India |
1514-1517 |
389 |
Understanding the Concept of Migration for Datacenter on Cloud Computing
-Kruti Shah ; Manthan Shah
Virtual Machines (VMs) refers to the software implementation of a computer that runs its own OS and applications as if it was a physical machine. Live Virtual Machine(VM) migration is the process of moving VM from one physical host to another without stopping the services or applications running on VM. Live migration is used in the case of proactive failure, load balancing, resource scheduling, and server consolidation. In this paper, we have tried to explain goals of migration and different phases of live migration. There are 3 main steps in live migration process and we have explained its importance in detail. Read More...
|
Information Technology |
India |
1518-1521 |
390 |
DESIGN AND ANALYSIS OF SIX STROKE INTERNAL COMBUSTION ENGINE
-TEJASKUMAR U KOTHARI ; Mr. Devranjan Kumar; Mr. K.D.Tandel
The modern four stroke internal combustion engine has been widely applied due to excellent power to weight ratio and reliability. However, the major downside of the even most efficient modern 4 stroke engine is the production of significant amounts of excess heat energy, dissipated though the cylinder walls of the engine and expelled as waste energy during the exhaust stroke of the cycle. The development of a more efficient six stroke internal combustion engine for increasing the efficiency of four stroke engine for that the final two strokes designed to used of exhaust and convert it into power stroke and finally six stroke working as exhaust stroke and also batter scavenging. Some of basic modifications are done in four stroke engine and made a six stroke engine we can increase the brake thermal efficiency of the engine. Also the dramatic reduction in pollution and batter scavenging is occurs. Read More...
|
AUTOMOBILE AS WELL AS MECHANICAL ENGINEERING |
India |
1522-1525 |
391 |
Node Localization in Wireless Sensor Network using Fuzzy Logic Technique
-kanika malhotra ; Mr. Bhushan dua
Node localization in wireless sensor network is exigent task for providing better network performance to the wireless environment network. Using Global positioning system is very expensive and is not affordable. So sensors are self-deployed in the network. Without localization the packet cannot send to their destination correctly, loss of integrity, intrusion attack, packet lost etc has to be faced in the wireless environment. There are many challenges concerned while localizing sensors that are cost, scalability, efficiency and time. Fuzzy localization provides the fuzzy network for efficient and accurate results. Read More...
|
Computer science and engg. |
India |
1526-1529 |
392 |
Multipath Routing process for enhancement of base station security in wireless sensor network
-deepika tyagi ; Mrs. Sarita Choudhary
Wireless Sensor Networks (WSNs) are prepared of sensor nodes with constrained battery life and diffusion potential. Routing protocols in wireless sensor networks (WSN) have been considerably investigated by researches. Wireless sense network have various challenges in which there is one security. Security is major concern in wireless sense network to improve security we try to enhancement the base station security by providing multipath routing technique. Multipath routing technique overcomes the various problems of single path routing as integrity, authentication, availability-resilience-self healing, and confidentiality by providing various multipath ways for the data transmission. Read More...
|
Computer science and engg. |
India |
1530-1532 |
393 |
A 2.5 GHz LNA Design Using 0.13μm Technology
-charel sunil savajibhai ; sunil B Patel; Jigar chaudhari
Low Noise Amplifier is a“Radio Frequency Amplifier†which amplifies weak signal without introducing internal noise. It is located very close to the “Antenna†to reduce losses in the feed line. It determines the noise performance of the overall system. LNA would offer a large dynamic range that accommodates large signals without distortions and provide good matching to its input and output. In this paper, the design of a Single-Ended LNA operating at 2.5GHz using 0.13μm technology is explained. The tools used for design the single-ended design are Cadence Orcad-Pspice for model verification, Advanced Design System (ADS 2009) for simulation at front-end and Micro-Wind for back-end core layout design. Read More...
|
Eletronics & Communication |
India |
1533-1535 |
394 |
A Study on Design of Artefact for Probe Type Co-Ordinate Measuring Machine Calibration
-Ramesh rajaram Sanas ; Prof. V.A. Kulkarni
The Co-ordinate measuring machines (CMM’s) in industrial environments have become an important resource for the quality systems, monitoring manufacturing processes, reduction errors during manufacturing process, inspection of product specifications and in continuous quality improvement. Calibration means to identify the error behavior of measuring instruments and all planned applications. Parametric calibration, kinematic reference standard and artefact based method are types of calibrations which are used for CMM. Artefact is standard object from which measured results are compared with dimensions of the artefact to determine the errors in the machine. In this paper we present a study on optimal design of ball and plate type artefact used for calibration of probe type CMM. The study is more likely concern of size, shape & positioning of the balls on base plate. Read More...
|
Manufacturing Engineering |
India |
1536-1538 |
395 |
CFD SIMULATION OF GLASS MELTING FURNACE
-Pravin C. Patel ; Prof. V.K.Matawala
Melting glass requires large amounts of energy, representing 15% of manufacturing cost for industrial producers. Melting glass furnaces’ primary source of energy is natural gas. Inefficiencies in furnaces cause energy consumption per ton of glass to range from 3.8 to 20 mm Btu. The majority, 70%, of the energy used to produce glass is for smelting and refining of the glass. The high inefficiencies cause 60% of the energy consumed for smelting and refining to be lost to the atmosphere. This represents a large amount of waste, 6.3% of total manufacturing cost. The rising cost of natural gas is expected to increase the fuel cost proportion of total manufacturing cost and decrees the competitiveness of glass producers. Thus there is a need for minimizing this amount of energy that is wasted. The development and verification of an innovative modeling technique for industrial gas fired glass melting furnaces will be discussed. Rapid and accurate modeling of industrial furnaces is needed for the development of advanced furnace control systems. Although, computational fluid dynamics modeling of industrial furnaces has been shown to be accurate, they are computational expensive. The CFD simulation match with information obtained via CCD camera for calculation heat exchange within the furnace. The calculated heat flux to the glass using turbulence and species model is in close agreement with the CFD model. It is also observed wall heat loss during combustion. Read More...
|
Mechanical Engineering |
India |
1540-1541 |
396 |
An experimental investigation to optimize the process parameters of AISI 4340 steel in hot machining
-Ketul M Trivedi ; Jayesh V Desai
In this work, the influence of the cutting parameters namely cutting speed (Vs), feed rate (fs) and depth of cut (ap) at 200°C, 400°C and 600°C hot machining of AISI 4340 steel on surface roughness are studied. The optimum results can be achieved in the experimental study by employing full factorial techniques. Combined effects of three cutting parameters i.e. cutting speed, feed rate and depth of cut on the performance measure, surface roughness are investigated by employing an full factorial and the analysis of variance (ANOVA) at 200°C, 400°C and 600°C hot machining. Optimal cutting parameters for each performance measure were obtained; also the relationship between the parameters and the performance measure is determined using multiple linear regression equation. Read More...
|
MECHANICAL |
India |
1542-1545 |
397 |
Case Study On Various Traffic Control Systems
-Rathod Yagneshkumar Trikambhai ; Mr. Hitesh C. Patel
Vehicular Ad Hoc Networks is a self-organizing, distributed communication network formed by highly Mobile Vehicles. This type of networks is developed as part of Intelligent Transportation Systems (ITS) to bring significant improvement to the transportation systems. One of the main goal of ITS, is to increase safety on road and reduce traffic congestion. This paper represents a review on various traffic system & working of vehicular adhoc network. After the review of traffic system and VANET it gives a survey on various techniques used in traffic system. Read More...
|
VANET, Information Technology |
India |
1546-1547 |
398 |
Secured File Processing System with Key Encryption in Ad-hoc Network
-Dinesh Khattri Chettri
Document transforming framework might be said to be gathering of documents and projects which forms on the different operations in a record running from creation, stockpiling and access of records. Be that as it may one of the significant issues in record handling framework is it failure to get to documents in a remote specially appointed-system. We propose a procedure of charming an open key with record preparing framework in an impromptu-arrange in order to give the office of getting to documents over the system. The proposed framework might empower to permit the clients with a secured key that might give security to the documents helping in keeping up the secrecy of them over the system. The key so fascinated might be open to the client however might additionally let the client to impart the key to make the records accessible to verified clients. Read More...
|
Information Technology and Networking |
India |
1548-1550 |
399 |
Restoration of historical wall paintings: A review
-Sukhjeet Kaur ; Amanpreet Kaur
Wall paintings are esteemed symbol of our culture and history so, there is a need to preserve them. Restoration wall painting is a process of recover the wall paintings which are corrupted by many natural phenomena like unfavorable weather conditions, dust, smoke etc. due to which the wall paintings affected by many problems like cracks. Cracks are most frequent occurs in the old wall paintings. Walls which are decorated with paintings no longer survive so there is a need to preserve them. In this paper I have reviewed various techniques which are used to restore wall paintings. Read More...
|
Digital Image processing |
India |
1551-1553 |
400 |
CFD Evaluation for a Diesel Rickshaw Poppet Valve
-Nimesh Patel ; Nimesh patel; Vinod Prajapati
Poppet valves are extensively used in hydraulic systems as relief valves, check valves, cartridge valves, and pressure regulators due to their obvious advantages. From the simulation it is conclude that the puppet valve satisfy requirement. From the simulation the result is generating within 10% error. This is desire for any CFD simulation. This simulation extends to check for different opening condition. Read More...
|
Automobile Engineering |
India |
1554-1556 |