No. |
Title and Author |
Area |
Country |
Page |
401 |
Decision Tree for Data Uncertainty with Pruning
-Jayesh R Solanki ; Sonal P Rami
Decision Tree is a widely used data classiï¬cation technique. This paper proposes a decision tree based classiï¬cation method on uncertain data. Data uncertainty is common in emerging applications, such as sensor networks, moving object databases, medical and biological bases. Data uncertainty can be caused by various factors including measure- ments precision limitation, outdated sour ces, sensor errors, and network latency and transmission problems. In this paper, we enhance the traditional decision tree algorithms and extend measures, including entropy and information gain, considering the uncertain data interval and probability distribution function. Our algorithm can handle both certain and uncertain datasets. The experiments demonstrate the utility and robust ness of the proposed algorithm as well as its satisfactory prediction accuracy. We propose a series of pruning techniques that can greatly improve the efficiency of the construction of decision trees. Read More...
|
Information Technology |
India |
1557-1560 |
402 |
Classification Techniques in Data Mining: A Review
-Prabhjot Kaur
Data mining is the form of discovering useful patterns or knowledge from data sources. As classification is a data mining function that assigns items in a collection to target categories or classes. Classification algorithms are the most commonly used data mining models that are widely used to extract valuable knowledge from huge amounts of data. This paper provides a survey of numerous data mining classification techniques for innovative database applications. There are number of classification algorithms including decision tree, SVM, Bayesian classification, KNN, Genetic algorithm and so on. The goal of this survey paper is to provide a comprehensive review of different classification techniques in data mining. Read More...
|
Computer Engineering |
India |
1561-1565 |
403 |
Design Optimization of Paver Finisher Chassis Using Topology Optimization
-Jigarkumar R. Mevada ; Prof. Prateek A. Patel
Chassis of an automobile or equipment is an important structure, which holds all the parts fitted on it and sustain all the static and dynamic loads imposed on it. So, it is necessary to design the chassis and its parts such that they are able to sustain all type of loads. Here, topology optimization method is applied to minimize the compliance of the chassis and solve the problem. Generally, Topology Optimization method is developed for compliance minimization. Solid Isotropic Material with Penalization (SIMP) using Optimality Criteria Algorithm is applied for Static response. Here, Topology Optimization is used to solve the static response problem of chassis. For achieving the best material distribution in the design domain we use the OPTISTRUCT for Topology Optimization problem. Validation is taken from the CAD model by using the reference of optimized model, and by analysing, it gives better results than earlier. The optimized model is verified by considering real load condition on the chassis. Read More...
|
Mechanical Engineering |
India |
1566-1570 |
404 |
Performance Improvement of Software Radio Networks By Automatically Varying The Modulation Techniques With The Varying Input Noise Level
-Dhaivat Shukla
This paper aims to study and simulate an automatic detection of the change in an input noise level and then the sudden change of different digital modulation techniques in accordance to the change of the noise level by establishing MATLAB/Simulink model for the Noise Level Detection. Read More...
|
Digital Communication |
India |
1571-1573 |
405 |
A Model Analysis of Window Air Conditioner by Introducing Thermo-Electric Module
-Mr. Rohit V. Dudhat ; Dr. V.K. Matawala
With the use of conventional refrigeration system we see that life of compressor is affected by moisture particles and COP is also lower due to lower cooling capacity, there have been serious concerns shown on non conventional refrigeration system. Thermoelectric refrigeration is a type of non conventional refrigeration system. Thermoelectric module in thermoelectric refrigeration is a pretty recent development. The importance of thermo electric refrigeration was realized much later than its merits. Thermoelectric refrigeration is gaining prominence and is now widely used in several western countries. In this project, a thermoelectric module is introduced in a model of window air conditioner for sub cooling and superheating the refrigerant and it is analyzed for its effect on cooling capacity, compressor work, COP, etc. Read More...
|
Mechanical Engineering |
India |
1574-1578 |
406 |
Study and Analysis of Placenta Images Using Edge Detection Approach
-Rajeshwari ; Dr. Dr.A.R.Mohamed Shanavas
Medical diagnosis is the major challenge faced by the medical experts. Specialized tools are necessary to assist the experts in diagnosing the diseases. The ultrasound images are usually low in resolution which may lead to loss of characteristic features of the ultrasound images. This pilot study involves the feasibility for classifying the ultrasound images of placenta using various Edge Detection Methods. Read More...
|
Computer Science |
India |
1579-1581 |
407 |
Priority-based Congestion Domination Protocol (PCCP) for Manipulating Upstream Congestion in Wireless Sensor Web
-Saranya.R
Congestion in Wireless Sensor Web (WSN) occurs when traffic burden allocated to each sensor node is beyond its capacity. It is vital to manipulation the congestion traffic to support established quality of ability (such as packet defeat ratios, packet stay, wasting power and throughput) especially, multimedia request of Wireless Multimedia Sensor Network (WMSN).Congestion manipulation in WSN has been shown to be very effective alongside respect to spreading lifespan of system. Hence to avoid the congestion in WSN, we counseled an effectual protocol called Priority-based Congestion Domination Protocol (PCCP) which prevents an upstream congestion in WSN. The PCCP creates priority table established an significance of every single node, and next sends this data to all the nodes inside the network. Secondly, the main purpose of PCCP is to compute congestion level in the network employing ratio of packet inter-arrival period alongside over packet ability time. PCCP uses to manipulation upstream congestion along alongside congestion degree and packet table. PCCP is hop-by hop upstream congestion manipulation protocol for WSN. PCCP provides work for packet-based computation to optimize congestion control. It can work below both solitary trail & multipath routing. PCCP ensures promise of packet defeat as well as delay, emerging every single node can circumvent unfairness and achieve flexible throughput. In this paper, we have counseled that PCCP provides larger Q o S by manipulating web recourse management and web traffic to consuming effectual energy. Read More...
|
computer engineering |
India |
1582-1587 |
408 |
JOB CARD MANAGEMENT
-Samrat Singh Bisht ; Arvind Ashok
We understand that a standard system quite often does not everything you would like to, some functionality might be not required and other functions are missing. This is why we allow for some customization in our Job Card Tracking system. Our Order workflow. System offers a base CRM system with Contact relation management and a customized Order Workflow system as we understand that each business works differently. We are taking a different approach and believe that today's systems need to be monitored and made efficient to meet these challenges. In this paper, we first discuss the possible ways in which we can apply our approaches. We have developed a feedback system to provide feedback and related details to the job card management in an easy and efficient manner. In this we can easily provide feedback about individual systems and they can be referred as in online system. This project includes 2 major active entities: - Feedback and Notice. The Admin can prepare log and can add, delete, update themdelete, update them simultaneously on the online system. These can then be viewed by the response team and can give feedback accordingly. The feedback report can be checked by the Admin and can check for related problems and provide the same to the principal and necessary actions be taken. It is less time consuming then other systems. Read More...
|
IT Engineering |
India |
1588-1590 |
409 |
Tiny Encryption Algorithm as a e-Service
-Christy Zachariah Sunny ; Unnikrishnan R K; Govinda K
In this paper we propose to offer encryption as a web service using the TEA algorithm. The TEA algorithm is chosen due to its simple design. The low memory requirement and fast execution is ideal for server implementation. It uses feistel cipher for encryption and decryption that reduces implementation overload. The algorithm can handle large workloads without exhausting server resources. The TEA algorithm is characterized by a large number of rounds or iterations to make the algorithm secure. It has a low set up time which is achieved by the lack of look up tables. The proposed system exposes two web service api for encryption and decryption, by using this client can access this service from anywhere over internet. Read More...
|
Computer Science Engineering |
India |
1591-1594 |
410 |
WEB SERVICES SECURITY BASED ON XML SIGNATURE & XML ENCRYPTION
-JOHN MATHEW ; HARI R; GOVINDA K
The web services applications were developed to a large extend and the issues regarding web service security are becoming increasingly prominent. Since the XML is a platform independent language, and has high expandability, it is widely used in deploying web service applications. Therefore it is necessary to consider adding some security features in XML document. The security features like access control, digital signature and element-wise encryption cannot be implemented using transport layer security protocol such as Transport Layer Security (TLS) or Secure Socket Layer (SSL). SSL is a reliable and secure protocol which provides end-to-end security sessions between two parties. The XML Encryption is not a replacement to the SSL. But, XML Encryption is used to provide security features that are not addressed by the SSL. For example, with XML Encryption both insecure and secure contents can be exchanged between multiple parties. This paper discusses about the use of XML Encryption and XML Digital Signature as the core of web services security technology. The paper also describes the creation and verification of XML signature and encryption and decryption of XML data. The application of XML encryption and XML digital signature is also illustrated here. Read More...
|
Computer Science |
India |
1595-1599 |
411 |
Independent Control of Active and Reactive Power in Microgrid
-Denish A. Prajapati ; Bhavik N. Suthar; Vinod S Tejwani
Now a days the increasing demand of electrical energy, renewable energy based distribution generators (DGs) are increasingly play a dominant role in electricity production. In this paper it is shown that control of generated power is achieved from the microgrid (MG) to cater the sensitive and critical load during disturbances. The effect of RL load connection and disconnection is shown by MATLAB results. The converter used is a voltage source inverter (VSI) which is controlled using d-q reference frame to inject a controlled current into the grid. Phase lock loop (PLL) is used to generate the vectorized output. Read More...
|
Electrical Engineering |
India |
1600-1604 |
412 |
Face Recognition: A Survey
-Rashim Garg
Face recognition has been one of the most interesting and important research fields in the past years. Face recognition presents a challenging problem in the field of image analysis and computer vision. The face of a human being conveys a lot of information about identity and emotional state of the person. Many public places usually have surveillance cameras for video capture and these cameras have their significant value for security purpose, identification for law enforcement, authentication for banking and security system access, and personal identification among others. Though tracking and recognizing face objects is a routine task for humans but it is difficult form a system to recognise different faces of human beings. In this paper we review existing methods of face recognition. Face recognition mainly consists of three parts, namely face representation, feature extraction and classification. Face representation represents how to model a face and determines the successive algorithms of detection and recognition. The most useful and unique features of the face image are extracted in the feature extraction phase. In the classification the face image is compared with the images from the database. Read More...
|
Computer Science Engineering |
India |
1605-1608 |
413 |
Design procedure for Lenz type vertical axis wind turbine for urban domestic application
-himmatsinh P. Gohil ; Prof. S. T. Patel
This paper presents an approach for the optimization of Lenz type vertical axis wind turbine (vawt) design. The main objective of this paper is to design the Lenz type VAWT for domestic applications which can generate electricity on diminutive scale in order to make urban areas of Gujarat state self sustainable and energy secure in the area of energy requirements. From this paper one can learn a design procedure for latest invented Lenz VAWT. From the design calculation and based on previous research data in related domain, basic design parameters of Lenz type VAWT is derived which are tip speed ratio, wing dimensions etc. Read More...
|
Wind engineering(mechanical engineering) |
India |
1609-1613 |
414 |
finite element analysis of bearing housing using ANSYS
-Unnati P Shah ; Jaydeep R Shah
In today’s competitive age foundries are required to be more active and efficient. They need to respond fast. For that casting simulation has become a powerful tool to visualize mould filling, solidification and cooling and to predict the location of the internal defects such as shrinkage, porosity, sand inclusion and cold shut. It can be used for existing casting process or for developing new casting without shop-floor trials. In present finite element analysis is done for knowing the temperature distribution after material is poured. This gives information about how the temperature varies at different portion of the bearing housing. Read More...
|
mechanical engineering |
India |
1614-1617 |
415 |
CAD modeling using reverse engineering of human knee joint
-vijay parmar ; Jaydeep R Shah
3D CAD modelling is the most important part for analysis Reverse engineering is one of the process by which 3D CAD model can be easily generated .Different techniques available for generating CAD models . The paper describes the methodology applied in the development of an anatomically detailed three-dimensional knee model from CT scan data. Medical imaging software is used for generating CAD model which requires CT data as a input. Step by step procedure is described in this paper. Read More...
|
mechanical engineering |
India |
1618-1621 |
416 |
PARAMETRIC ANALYSIS OF COMPOSITE LEAF SPRING
-Bhaumik A. Bhandari ; Bhavesh C. Patel
Weight reduction is the prime focus of automobile manufacturer. In automobile leaf spring is potential item for weight reduction which accounts for 10-25 % of unsprung weight. In present project work comparative analysis of c-glass/epoxy composite leaf spring and steel leaf spring is done by analytical, FEA using ANSYS 12. The result of FEA is also experimentally verified. The stresses induced in the C-glass/Epoxy composite leaf spring are 69% less than that of the steel spring nearly. This study leaves wide scope for future investigations. It can be extended to newer composites using other reinforcing phases and the resulting experimental findings can be similarly analyzed. Read More...
|
Mechanical Engineering |
India |
1622-1628 |
417 |
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTION Using INTERPOLATION TECHNIQUE
-A.NIZAMUDEEN ; DR.T.K.SHANTHI
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. The previous method embed data by reversibly reserving room before encryption, without number of times of hide. In this paper, we propose a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error. Experiments show that this novel method can embed more than 15 times as large payloads for the image quality as the previous methods, such as for PSNR=60dB. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
1629-1633 |
418 |
INTERGRATING OF LINEAR PROGRAMMING MODEL FOR PLANNING OF OPTIMAL CROPPING PATTERN IN M.R.B.C COMMAMD AREA KHEDA.
-APARNATHI MAHEK GIRI G ; Dr.Indra Prakash; Proff. D.K Bhatt; Proff. H.S.Devmurari
Optimal cropping pattern optimization model is formulated in which the surface and ground water as decision variables. Linear programming is used for multiple crop models and dynamic programming for single crop model. In irrigated agriculture, where various crops are competing for a limited quantity of land and water resources, linear programming is one of the best tools for optimal allocation of land and water resources (smith, 1973; mAji and heady, 1980; loucks et al., 1981. Salman et al (2001) present a linear programming model to derive regional water demands based on optimized regional cropping pattern with variable water prices based on quality. Read More...
|
CIVIL(WATER RESOURCE MANAGEMENT) ENGINEERING |
India |
1634-1639 |
419 |
Reverse Software Engineering Using UML tools
-Ravi Zala ; Jalak Vora
In this paper, we have taken the source code for social Networking sites and we are going to perform Reverse engineering. For this we are using UML Tools like Microsoft Visio and visual paradigm. Here, we are going to compare the outcome of these UML tools. This comparison will show how we can effectively produce meaningful and semantically accurate UML models using reverse engineering. Read More...
|
Computer Science and Engineering |
India |
1640-1644 |
420 |
Exergetic Efficiency Assessment of Key Psychrometric Processes
-tailor vishalkumar hasmukhbhai ; Dr.Ragesh.G.Kapadia
The study focused on finding exergy efficiencies for basic psychometric processes, such as heating, heating with humidification, cooling with dehumidification, and Adiabatic mixing. The effect of ambient air temperature, ambient relative humidity, and change in inlet air temperature on exergy efficiency was investigated by using three different definitions given by cengel, wepfer and kangolu. Experimental and theoretical analysis is carried out for all above processes by using three different definitions. This all psychrometric process was carried out on air conditioning experimental set up. The range of parameters covered included atmosphere air temperature (T0=273 -317k) and relative humidity (RH0 = 50-90%), and mass flow rate of air (0.157kg/s). All three approaches are reasonably correct, the third efficiency is more suitable for psychometric processes. Exergy efficiency of psychrometric process is very low there for energy consumption higher in HVAC System. So this observation also implies that there is great potential for improving the performance of such system. Read More...
|
mechanical engineering |
India |
1645-1652 |
421 |
VOICE BROWSER
-K.NITHYA HARIPRIYA
There is a great deal of information on the World Wide Web that is at the fingertips of anyone with access to the web. In any case, so far this information has essentially been used by people who interface with the web by method for traditional workstation. This is going to change. Late advancements in remote correspondence, speech recognition, and speech union advances have made it possible to get to this information from wherever, and at whatever point. In this paper, we analyze voice browsers as appeared differently in relation to current web browsers. A segment of the key frameworks of far reaching accessible blueprint are recorded with their association with voice browsers and a couple of contemplations are offered to help scholars executing these thought when arranging website pages. The new voice markup dialect is quickly portrayed. Read More...
|
Computer Science Engineering |
India |
1653-1655 |
422 |
VOICEPAD MOBILE APPLICATION
-M. KAMAL MANISHA
This paper aims at creating a mobile application using speech recognition. A software application is developed to meet the mobile application requirements. This mobile application is named as VOICEPAD. This could be achieved using voice recognition API. The software used to develop this mobile application is Visual Express studio 2012, Windows Phone App 8 Software Development Kit (SDK), Blend Visual Studios 2012, Microsoft Paint. The coding will be done in C#. This paper describes about how the speech recognition is done using voice recognition API, how the recognized speech will be converted to text, where the text will get displayed and how the displayed text can be utilized. This paper also focuses at the working of the Windows Phone App 8 Software Development Kit (SDK), Blend Visual Studios 2012. Read More...
|
Computer Science Engineering |
India |
1656-1658 |
423 |
Harmonics Generation by Low Capacity VFD (Variable Frequency Drive), When Used in Energy Saving
-Patel Pratik B. ; Prof. R. R. Kapadia; Prof. K. A. Sonagra
Seventy Percentages (70%) of electrical energy generated is consumed by three phase induction motors (3Ñ„ IM) all over the world and the demand is increasing day by day because of industrial growth. This means that if we save electrical energy consumed by 3Ñ„ IM, it can be a huge saving of energy as well as natural resources. To save energy consumed by 3Ñ„IM a Variable Frequency Driver (VFD) is the best solution when used in a variable speed application. With the use of VFD, 3Ñ„IM drive takes exactly the desired amount of power from the supply line. It means that power will not be lost in mechanical components. This is direct saving of electrical energy. In this paper, it is a humble effort to evaluate the harmonics generated by the VFD when used in energy conservation application. In this paper we will also give a kind of power line filters are necessary for the electronics components mounted on the same supply line. An energy conservation test setup will be made for variable flow application. The pump motor is given supply from both the VFD and direct contactor one by one. The consumed energy and harmonics generated along with Total Harmonics Distortion (THD) is measured with the help of three phase power analyzer and the results are compared internally as well as with simulation results. Read More...
|
Electrical Engineering |
India |
1659-1661 |
424 |
OLTC Contact Aging with Dynamic resistance Measurement
-Dhrupad B Purohit ; Deepa Karvat
It is known that aging of OLTC contacts is the main reason for the failure of power transformer. It is seen that OLTC is passed through several aging mechanisms in its life. It is important to understand the aging mechanism to develop any method like DRM for condition assessment of OLTC. The life of OLTC contacts includes clean contacts, contacts with an oil film layer and contacts with cocking. Here it is shown that DRM method is very sensitive to aged change over selector contact of an OLTC. Read More...
|
Electrical Engineering |
India |
1662-1664 |
425 |
A Perspective Analysis of Traffic Accident using DataMining Techniques
-Mr.Dheeraj Singh ; Rahul Singh; Sharad Singh
Nowadays vehicles are increasing day by day in town and cities roads. It is a well-known problem to manage traffics on the roads in towns and cities. A lot of accident occurs on the road due to careless driving and Technical faults in vehicles. The main problem of traffic authorities is to manage the traffic on the road for the smooth functioning of vehicles that can reduce the accident and violation on the road. There is a tremendous demand from traffic authorities to develop a system that can helps to avoid the accident and keep the accident report data and also maintain the accident report data. The main objective of this paper is to model a Traffic Accident Reporting System (TARS) through data mining using Clustering technique to solve the above problem. Read More...
|
INFORMATION TECHNOLOGY |
India |
1665-1667 |
426 |
High secured ATM using High Technique finger vein recognition
-Jayalakshmi.A ; R.Gowtham Raj
The main objective of this paper is to avoid wrong person getting accessed to the account of the other person and also to help the people who forget their PIN often. An real time embedded based finger vein recognition system is implemented MATLAB using. The finger vein based authentication is done before the subject enters the ATM room, to avoid wrong person being entered into ATM room. After entering into ATM room, subject need to enter the mobile number using keypad, an OTP is generated and send as a message to the mobile through GSM technology. The received OTP is typed and if it is valid then the subject is allowed for further access. Read More...
|
Electronics Engineering |
India |
1668-1670 |
427 |
E-Transactions by using secure web services
-karunakar lingineni ; Amith kumar tosre; Govinda K
Due to the growth of Internet, millions of users are using internet for various cases such as online shopping, banking etc. Hence it is necessary to provide security to transactions done by the users. In the modern economy, information is critical both as input and output. The Security can be provided by providing security during e-business transactions and web services. There are many options to make web service secure. We can pick any alternatives from conventions based, policy based or message based security. There are various threats are present to web services and e-business transactions such as unauthorized access and disclosing of data. It is essential to provide security to code during designing and developing the web service. The web administrations are playing a crucial role in online transactions. Read More...
|
computer science and engineering |
India |
1671-1673 |
428 |
WSN CAR PARKING SYSTEM
-Akshat Singhania ; Kalyanji Chaudhary; Amit Bhanushali
To cope with the growing problem of traffic management and parking management this paper proposes an advance solution for managing and monitoring free parking space and automated guidance for people to park their car. It aims at implementing smarter and better parking guidance system which reduces significant parking time. In this system, Optical sensor senses the status of the car space and accordingly transfer the information to the AVR controller. Then the AVR controller will sense the status of car parking space and displays the information on the LED screen for the driver, thereby reducing the time for the driver to find vacant empty space and almost reduces the chances of entering into the unusual space which might lead to traffic jam. Read More...
|
Networking |
India |
1674-1676 |
429 |
"Toilet linked Biogas Plant"-As a Means of Total Waste Management at Domestic level in Pratappura village
-Mayuri Prajapati ; Prof.Minarava Pandya
Untreated waste disposal leads to pollution which has potential threat to harm local community as well as leaving beings. In developing countries such as India, about 54.28% household lacks sanitation facilities hence pracitses open defecation.Open defecation causes odour and health risk to humans. Health risk is increased in monsoon and pollution of water sources .The use of firewood or kerosene filled stoves indoors is everyday practise in most of India.The use of such stoves is not only particularly bad for the environment but it also has detrimental health effects. Health effects due to smoke inhalation cause 1.6 million deaths per year, 28% of deaths due to indoor air pollution occur in india.These effects also account for 20% of fatalities in children under 5 years of age. To alleviate or end some of these unsustainable and dangerous practices the installation of a biogas settler with a latrine facility feed has been proposed.The system will collect waste from both human and animal faeces and convert it to energy and fertiliser. In this paper, pratappura village situated in district gandhinagar,state gujarat,India is take into consideration for toilet linked biogas plant. Read More...
|
Environmental Engineering |
India |
1677-1679 |
430 |
ANALYSIS OF BRAKE SYSTEM OF AN ATV
-AMAL TOM KUMBILUVELIL ; ABU THOMAS CHERIAN
During braking process kinetic energy is converted into heat energy and it should be removed from the breaking system for proper functioning. The heat generated is due to the friction between the disc brake rotor and breaking pad. For obtaining a good and efficient braking system the knowledge of maximum heat generated in the system and also proper ventilation methods are needed. This paper investigates the temperature field around a disc brake suitable for an all-terrain vehicle. The analysis is done in commercially available ANSYS software and the results are found to be satisfactory. Read More...
|
MECHANICAL ENGINEERING |
India |
1680-1681 |
431 |
Incorporating Privacy into Web Services using Hippocratic Database
-Swathi Suresh ; Mary Varghese; Govinda K
Web Service is a type of service that relies on XML messaging format over the internet. Web services has evolved over the years along with the growth of internet. Privacy preserving has turned out to be of vital importance for all users whose data needs to be stored and managed securely without disclosing details to a third party. Confidentially of user data can be achieved by using a suitable encryption scheme that makes it nearly impossible for an intruder to decrypt without having the key. The DES encryption Algorithm can be used for this purpose over the data that is stored in the Hippocratic database. Hippocratic database ensures the security and privacy of data stored in relational database systems. It permits only authorized users to access and modify their data. Read More...
|
Computer Science and Engineering |
India |
1682-1684 |
432 |
EXPERIMENTAL INVESTIGATION OF SOLAR AIR HEATER HAVING CYLINDRICAL FINS.
-Mr. Milan J Devani ; Prof. D.C.Gosai; Dr. V.D.Dhiman
Present study experimentally investigates thermal performance of Solar Air Heater (SAH) having three different types of absorber plate (Type-I, Type-II, and Type-III) in presence of natural solar intensity. Type-I is a simple absorber plate without any surface augmentation. While in Type- II black painted cylindrical aluminums cans as cylindrical fins are attached on the flat plate with vertical-staggered position and Type-III is similar to type-II but fins having holes on its surface. Experimental investigation reveals that the average daily thermal efficiency is highest in Type-III in presence of solar intensity. Read More...
|
MECHANICAL ENGINEERING |
India |
1685-1688 |
433 |
Parametric Evaluation and Classification of Bhaliya and Shihori Wheat Varieties
-Rachana Parikh ; ROHIT SRIVASTAVA
This paper presents parametric evaluation and classification method for Bhaliya and Shihori wheat varieties. In this paper we quantify the quality of bhaliya and Shihori wheat by counting its geometric features and after that train the neural network for Classification. Read More...
|
Information Technology |
India |
1689-1692 |
434 |
IMPLIMENTATION OF OPTIMUM ENCRYPTION ALGORITHM USING CHAOTIC SYSTEMS WITH THE APPLICATION OF PRIMITIVE ROOT THEOREM
-JATIN M PATEL ; ANUJ M PATEL
This paper describes the secure wireless communication in detail. This process is very useful in modern applications of wireless communication. First of all, we take the binary data form computer (or internet). This data is encrypted using encryption key and then it is transmitted using radio frequency transmitter. At the opposite side receiver receives the data and receiver decrypt the data using same encryption key. In this project we have added additional security by changing the encryption key every time. In this project I have added some features like it can transmit live image, videos at the speed of Bluetooth. Read More...
|
IMAGE PROCESSING |
India |
1693-1697 |
435 |
Improvement of Bus Body Aerodynamic Shape by CFD Analysis
-Ketan Govindbhai Pranami ; Bakul T. Patel; Dipen Vinaykumar Shah
To save the energy and to protect the global environment, fuel consumption reduction is a primary concern of the modern bus manufacturers. Drag reduction is essential for reducing the fuel consumption. Designing a vehicle with a minimized drag resistance provides economical and performance advantages. Decreased resistance to forward motion allows higher speed for the same power output, or lower power output for the same speed. The shape is an important factor for drag reduction. To design an efficient shape of the bus that will offer a low resistance to the forward motion, the most important functional requirement today is the low fuel consumption. The main intention behind this project is to reduce the drag co-efficient & drag force of bus body by improving the aerodynamic shape using CFD software (Autodesk Flow Design). The difference of drag force as well as drag coefficient before and after the change in aerodynamic shape of Volvo bus is carried out at different speeds. We got the desirable results of the reduction of drag force about 12 to 15%. Read More...
|
I.C. Engines & Automobiles |
India |
1698-1703 |
436 |
Soft Computing Technique to solve MHD Falkner Skan Equation
-PARVEEN KUMAR ; -
This paper examines the boundary value problem (BVP) of the MHD Falkner–Skan equation over a semi-infinite interval. The free boundary formulation has changed this problem from semi infinite into finite interval. This problem was solved with the help of genetic algorithm based shooting technique. The boundary value problem was converted into the initial value problem which was solved with the help of Runge- Kutta Fehlberg method. The results obtained are in good agreement with the existent literature. Read More...
|
PHYSICS |
India |
1704-1707 |
437 |
Secure replication of service accessibility in Mesh networking using dynamic path restoration
-A.Lakshmi Prasanna ; M.Narayanan
Mesh topology involve the scheme of routes. Memos dispatched on mesh web can seize each of countless probable trails from basis to destination. A web in that every single mechanism links to every single supplementary is shouted maximum mesh. Heterogeneous wireless mesh web will be dominant in the subsequent creation wireless networks. Handover association and trail restoration are one of the mobility association constituents manipulation the change of the mobile terminals across alert communication. A fast simulation method established on sampling is industrialized for the scutiny of trail ability potential in mesh webs alongside the aid of Vibrant trail restoration. This scheme provides the vibrant trail wreck significance sampling (DPFS) to guesstimate the trail availabilities efficiently. In DPFS, the wreck rates of web agents are biased at increased rates till trail wrecks are noted below rerouting. This simulated ideal uses "failure equivalence group"(FEG) to enable the modeling of bidirectional link wrecks, optical amplifier wrecks alongside links, node failures. The main concept utilized for this setback is polling of the continuing paths from basis to destination and coordinate them established on manipulation defeat and bandwidth availability. After the obligation is discovered whichever by node wreck or link wreck the arrangement switches to the subsequent obtainable path. If there is no potential of such trails, a rerouting is initiated. Read More...
|
computer science |
India |
1708-1711 |
438 |
Wibree the Wireless Ultra low power Technology
-A.Varshith Bhatt
Wibree is a wireless knowledge that consumes merely a fraction of the manipulation contrasted to supplementary such wireless technologies to accomplish the Bluetooth solutions. It is an interface amid computers and mobile mechanisms and a number of the electronic battery ran instruments that countless people use daily. Wibree enables tinier and less expensive implementations to accomplish Bluetooth solutions. Wibree is a digital wireless knowledge projected for ultra low manipulation consumption inside a short scope established concerning low-cost transceiver microchips in every single device. Wibree is a new low domination, low price, interoperable wireless knowledge for tiny devices. Read More...
|
computer science |
India |
1712-1715 |
439 |
Opinion Mining and Sentiment Analysis - A Review
-Haseena Rahmath P ; Dr.Tanvir Ahmad
The exponential growth of internet usage has created a new platform where people can freely communicate and exchange ideas and opinions. Review web sites, social Medias, blogs, discussion forums, community websites, etc are encouraging users to share their sentiments and opinion towards products and services. Most of these opinions are expressed in unstructured nature. Prevailing these factors such as availability of heterogeneous content and increased expectation of the customers, gives birth to a new area of research called opinion mining. Opinion mining and sentiment analysis is an extension of text mining that extract the sentiments present in the documents and analyze its polarity orientation towards positive, negative and neutral. Both supervised and unsupervised classification approach can be used for sentiment classification. This paper reviews various work carried out in this area. Read More...
|
Computer Science and Engineering |
India |
1716-1718 |
440 |
Review of Cloud Computing Service Providers and Related Challenges
-Amarjeet Singh, Wg Cdr (Retd.) ; Dr. Ramakanth Kumar P ; Er. Gaurav Bagaria
Cloud computing in recent times has gain a significant development. Current dynamic and Omni present ITES (Information Technology Enabled Services) environment has further given boost to the concept of cloud computing services. Cloud computing model offers different types of computational modes for various organizations and one can take advantages of the web applications, networks and their interoperability of computing systems. Various cloud computing service providers specialize in some particular applications and the services by which they manage upgrades, maintenance, backups, disaster recovery and failover functions of the services. Consumers of cloud services are being offered services with improved reliability and reduced costs. In this paper I have focused on the procedures of the cloud computing and its security concerns with few security techniques that may be used in tackling the security concerns in the cloud computing environment. Overviews of some cloud computing service providers are discussed in this paper. Read More...
|
Information Science Engineering |
India |
1719-1727 |
441 |
Security Issues in Live Migration and Survey of Exisiting Solutions
-Jahanvi Kolte ; Rujul Solanki; Shams Narsinh; Hardik Solanki
Live migration was introduced to support many features of cloud computing like workload balancing, fault tolerance, online system maintenance, consolidation of virtual machine, etc. Live Migration is transferring of VM from source host machine to destination host machine while being powered on. Cloud has various key points which can be exploited by attackers. As cloud is prone to security attacks, it is necessary to ensure secure transfer of VM. This paper discusses the process of live migration, various security attacks possible along with their effects and some solution to maintain security in live migration. Read More...
|
Computer Science and Engineering |
India |
1728-1731 |
442 |
A Study Paper On Analysis And Comparision Of Composite Drive Shaft With Conventional Steel Drive Shaft
-Chirag B. Gandhi ; Manthan Patel
Present study covers design, analysis and development of driveshaft for automobile applications. This covers dimension calculations of drive shaft based on engine power required. Accordingly shaft couplings e.g. universal joints, transmission gears for axle and axle design will be performed considering all static and dynamic loads acting upon it. All design process will be performed with aid of FE analysis using ANSYS software. Optimization will be followed after performing design which includes weight reduction of drive shaft and material selection. Read More...
|
Mechanical Engineering |
India |
1732-1735 |
443 |
Supervised Classification of Nal Sarovar wetland area and Trend Analysis using LISS-III data
-Bhavsar Ronit Nalinkumar ; N.P.Singh; Indra Prakash; Manoj Pandya
This paper classifies wetland of Nal Sarovar by using LISS-III remote sensing data. Taking the Nal Sarovar as study area, LISS-III data of 2013 is used as data source and various classification processes like k-means, ISODATA, Min-Max classifier etc. are utilized. Two types of supervised classification techniques are more efficient and frequently used. These methods are 1) maximum likelihood classification and 2) parallelopiped classification. The paper describes the utilization of accuracy assessment using kappa coefficients. Read More...
|
Civil Engineering |
India |
1736-1742 |
444 |
Writing Driver for the Low Cost Power Management IC
-Rahul A. Pipaliya ; Arjav A.Bavarva; Shankar Patel
In this paper, the topic attempts to clarify that in existing system from Texas Instrument product having AM3359 processor connected with I2C to highly integrated PMIC TPS65950 having cost of $4.4/1ku.This devices provides the sufficient voltages to the various modules like Wi-Fi 802.11 needs 3.3V and 1.8V,NAND flash needs 3.3V,DDR3 needs 1.5V,2.5inch HDD needs +5V,USB needs 5V.It has also fuel gauge IC called bq27510 which continuously monitors the power of battery and state the charging/Discharging in percentage. The main agenda of this topic is to replace this PMIC with PIC microcontroller having the same function and cost of $2.8(1-4 piece).So the overall cost can be reduced by $4.4-$2.8=$1.6.For this new device the new driver will have been written on Linux platform. For this new low cost product driver called power, regulator, I2C,IRQ have been written and tested on new hardware. Read More...
|
ADVANCE EMBEDDED SYSTEM (LINUX DEVICE DRIVER) |
India |
1743-1747 |
445 |
A Survey of Digital image watermarking in Spatial domain using spread spectrum
-Bhargav Vihol ; Mrs.mousami jabade
Recent day, widely used of sharing information through internet. Therefore some issue occur for data .like, privacy, security .Data inform of image, video, text or speech. These issues are resolve by watermarking techniques. Previously steganography used for secret communication. But today watermarking is used for content protection, copyright and authentication of content. In this paper we present a detailed survey of exiting and newly proposed digital watermarking techniques in spatial domain using spread spectrum .here we limit the survey to image only. Read More...
|
Vlsi and embedded system design |
India |
1748-1752 |
446 |
Minutiae Point Extraction and Data Creation Methodology
-Ishdeep Singla ; Yadav Gupta
In biometrics fingerprint is the widely and oldest technology used as identification. Points are extracted from the fingerprints. It is known that everyone has unique fingerprint, but no mathematical proof has been presented which can present as. It’s hard to match some fingerprint patterns with whole world’s patterns. In this paper a mathematical proof on the basis of adjacent minutiae points distance calculation has been presented. This calculation shows that every fingerprint is unique. Further by using extracted minutiae a database has been designed. Read More...
|
Information Technology |
India |
1753-1756 |
447 |
A Review on Analysis and Segmentation of MR Images
-Mandeep Kaur ; Ishdeep Singla
Automated brain tumor detection from MRI images is one of the most challenging task in today’s modern Medical imaging research. Magnetic Resonance Images are used to produce images of soft tissue of human body. It is used to analyze the human organs without the need for surgery. Automatic detection requires brain image segmentation, which is the process of partitioning the image into distinct regions, is one of the most important and challenging aspect of computer aided clinical diagnostic tools. Noises present in the Brain MRI images are multiplicative noises and reductions of these noises are difficult task. The minute anatomical details should not be destroyed by the process of noise removal from clinical point of view. These makes accurate segmentation of brain images a challenge. However, accurate segmentation of the MRI images is very important and crucial for the exact diagnosis by computer aided clinical tools. A large variety of algorithms for segmentation of MRI images had been developed. In this paper, we present a review of the methods used in brain MRI image segmentation. The review covers imaging modalities, magnetic resonance imaging and methods for noise reduction and segmentation approaches. The paper concludes with a discussion on the upcoming trend of advanced researches in brain image segmentation. Read More...
|
Computer Science and Engineering |
India |
1757-1761 |
448 |
Optimization of Software testing techniques
-Renuka Kaur ; Ishdeep Singla
This paper describes the Software testing, why to test software, goals for software testing. Further it describes the software testing techniques. Finally it describes about different software testing techniques. One of the major problems within software testing area is how to get a suitable set of cases to test a software system[5].
Black box techniques: Equivalent partitioned, Boundary value .White box techniques: Basic reviews.
Read More...
|
Computer Science and Engineering |
India |
1762-1765 |
449 |
Behavioral Mismatch of Component Adaptation in Component-Based Software Engineering
-Poonam Kumari ; Ishdeep Singla
The main goal of Component-Based Software Engineering is Reuse of existing software components. Adaptation is a crucial problem in the component-based software engineering. Components that assembled or reused sometimes cannot perfectly fit one another because of the incompatibility issues between them. Behavioral mismatches are one of the adaptation problems. This paper focus on detect the behavior mismatches and how to create adapter to overcome incompatibility problem. The model based approach and Symbolic Transition Systems that used in representing component interface are used to detect the mismatches and overcome them. Read More...
|
Computer Science and Engineering |
India |
1766-1768 |
450 |
Image Restoration using BBO and ACO
-Prabhdeep Kaur ; Ishdeep Singla
Digital image processing plays a vital role in the analysis and interpretation of remotely sensed data. Image restorations techniques help in improving the visibility of any portion or feature of the image suppress sing the information in other portions or features. Image restoration improves the perceptibility of objects in the scene by restoration the brightness difference between objects and their backgrounds. Image restoration is typically performed as a contrast stretch followed by a tonal enhancement, although these could both be performed in one step. Applications of the Ant Colony Optimization (ACO) to solve image processing problem with a reference to a new automatic restoration technique based on real-coded particle ant colony is proposed in this paper. The restoration process is a non-linear optimization problem with several constraints. The objective of the proposed ACO is to maximize an objective fitness criterion in order to enhance the contrast and detail in an image by adapting the parameters of a novel extension to a local enhancement technique. In this paper enhancement occurs on the basis for the development of a new field: biogeography-based optimization (BBO). We discuss natural biogeography and its mathematics, and then discuss how it can be used to solve optimization problems. We see that BBO has features in common with other biology-based optimization methods, such as GAs and particle swarm optimization (PSO). This makes BBO applicable to many of the same types of problems that GAs and PSO are used for, namely, high- restoration problems with multiple local optima. Read More...
|
Computer Science and Engineering |
India |
1769-1773 |