No. |
Title and Author |
Area |
Country |
Page |
451 |
An Overview of Routing Protocol
-Sukhdeep Kaur ; Lokesh Pawar; Rohit Bhullar
A mobile Ad-Hoc network is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. It is an system in which mobile hosts are connected by wireless links. The Ad-hoc On-Demand Distance Vector (AODV) routing protocol is designed for use in ad-hoc mobile networks. AODV is a reactive protocol: the routes are created only when they are needed. It uses traditional routing tables, one entry per destination, and sequence numbers to determine whether routing information is up- to-date and to prevent routing loops. Read More...
|
Computer Science and Engineering |
India |
1774-1777 |
452 |
Enhanced Watermarking Using Entropy for Digital Images based on Histogram
-Rashpinder Kaur ; Jaspreet Singh (A.P.)
In this paper, we propose a reversible watermarking technique where an original image can be extracted from the watermarked image. This technique makes use of a classification process for identifying parts of the image that can be watermarked with the most suited reversible modulation. This classification is based on a reference image derived from the image itself. In this paper we also propose a universal entropy masking model for watermarking embedding algorithm to keep the balance between watermarks’ imperceptibility and its robustness. For this proposed work we use Image Processing Toolbox under the Matlab software. Read More...
|
Computer Science and Engineering |
India |
1778-1780 |
453 |
MOBILE PROJECTOR APPLICATIONS
-M. MOUNIKA
Mobile projectors are similar to handheld projectors which have the technology to project images in a handheld device. These projectors may be employed in mobile phones, personal numerical supporters associate degreed conjointly in digital cameras that have economical storage capability needed for presentation however has very little house to accommodate an in-built computer screen.
The main components needed to change a projector in an exceedingly phone includes A battery, the physical science, the optical device or light-emitting diode lightweight sources, the combiner optic and in some exceptional cases we would need scanning mirrors conjointly. The method for displaying the image or video includes numerous steps. The primary step is that the electronic system converts the image into associate degree signal. Then those electronic signals initiative optical device or light-emitting diode lightweight sources with in contrast to colours and powers down numerous methods. The various lightweight methods are combined into one path by employing a combiner optic. It defines a palette of colours.
And then in the final step, the glasses copy the image pixel and then the image can be projected. Some of the other optical systems do not apply the technology "mirrors" and they are measured to withstand more difficult conditions. The whole glass system is packed together into single actual tiny chip. The hand held projector has an important ability to display clear and sharp image, even if the characteristics of the viewing surface is not proper.
Read More...
|
Computer Science Engineering |
India |
1781-1783 |
454 |
Study of Maximum Power Point Tracking (MPPT) techniques.
-Preet M Shah ; Ashish Shah
The need for renewable energy sources is on the rise because of the acute energy crisis in the world today. India plans to produce 20 Gigawatts Solar power by the year 2020, whereas we have only realized less than half a Gigawatt of our potential as of March 2010. Solar energy is a vital untapped resource in a tropical country like ours. The main hindrance for the penetration and reach of solar PV systems is their low efficiency and high capital cost. In this paper, we examine a schematic to extract maximum obtainable solar power from a PV module and use the energy for a DC application. This Paper investigates in detail the concept of Maximum Power Point Tracking (MPPT) which significantly increases the efficiency of the solar photovoltaic system. The Perturb and Observe (P&O), and Incremental Conductance (IncCond) algorithms used for Maximum Power Point Tracking (MPPT), are perhaps the two most popular methods in use. The latter method is typically claimed as the Preferred algorithm, but this is not well justified. The reason for the differences between the two closely related hill climbing methods is shown. Read More...
|
MPPT,MPP,PVarraywithmppt |
India |
1784-1787 |
455 |
A SURVEY PAPER ON CFD ANALYSIS OF CENTRIUGAL PUMP IMPELLER
-Ashish J. Patel ; Bhaumik B. Patel
This paper deals with the design and analysis of centrifugal pump. Pump is a device mainly used for transporting liquid from lower level to higher level. In pumps the mechanical energy is converted into hydraulic energy. The two main components of centrifugal pump are impeller and casing therefore, they must be carefully designed for better performance of pump. In the present work the conventional design of pump is carried out using empirical equations and then the model of closed impeller was generated using SOLIDWORKS and the same model was analyzed in ANSYS (Workbench) Fluid Flow (CFX). The analysis is done of existing impeller along with modified impeller by changing its inlet and outlet vane angles and number of blades. The main objective of this work is to design the pump, model the impeller and obtain maximum efficiency then the existing impeller by selecting the optimum vane angles and number of blades. Read More...
|
Mechanical Engineering |
India |
1788-1791 |
456 |
smart control of microgrid having renewable sources by fuzzy controller
-Pandya Astha Yogeshbhai ; R.R.Kapadia; S.N.Shivani
A new concept in power generation is a micro grid. Isolated micro grid system is a small scale independent power system having renewable energy sources- solar and wind power sources and backup by controllable sources- diesel generator, and fuel cell. The objective of this research is to develop a novel control scheme that can compensate for power and frequency deviation in micro grid. Micro grid consist of renewable sources whose output is not constant. Similarly load on the system is also not constant. Due to these variation power and frequency deviation occurs. For the solution of this situation in this research proposes a scheme called “Smart Control of parameter of micro grid having renewable sources.†The model of this proposed scheme is making out in the MATLAB/Simulink Software (R2012a). In this PID controller is used to control the input parameter of controllable sources according to variation in generation and load and mitigate the problem of power and frequency droop. Participating in Smart Control of Sources. These GRC and P-f droop make the system non linear and we have proposed a Ziegler Nicholas based and Artificial Intelligence based optimization to tune important parameters simultaneously in micro grid. The comparison of Ziegler Nicholas method to tune the PID controller and in the same system Fuzzy controller is use in place of PID. The proposed method improves dynamic and steady state response of the micro grid and maintains the system frequency at desired level. Read More...
|
electrical engineering |
India |
1792-1796 |
457 |
Selection of Actuators For Automated Manual Transmission (AMT)
-M. S. Kumbhar ; Prof. Dr. D. R Panchagade
Automated Manual Transmission as the name suggests is a manual transmission with clutch and gear actuation done with help of actuators, either electromechanical or hydraulic. The whole AMT system has a control strategy to decide the actuation of actuators. Actuators are the only parts which are responsible to carry out required actuation physically as per command from control strategy. Therefore proper selection of actuator based on cost, control and service life are important. The objective of this paper is to finalize the required specifications and selection of suitable type of actuators. The selected actuators will be used to develop a low cost AMT system and which forms the main aim of the project work. Read More...
|
Mechanical Engineering |
India |
1797-1800 |
458 |
Design Proposals for Low Cost Automated Manual Transmission (AMT)
-M. S. Kumbhar ; Dr. D. R Panchagade
Automated Manual Transmission (AMT) has been the best competitive solution to address the problem of increasing fuel prices and to meet the emission norms. AMT as the name suggests is a manual transmission with clutch and gear actuation done with help of actuators. The basic AMT systems consists of three electro-mechanical linear actuators, one for clutch and two for gear shift and select actuations which are controlled by Transmission control unit (TCU). The main focus of this paper is to present the various low cost deign proposal made for AMT. Read More...
|
Mechanical Engineering |
India |
1801-1804 |
459 |
Parametric Optimization during WEDM Machining of AISI D3 using Response Surface Methodology
-Nilesh K Patel ; Sandip Patel; Yuvraj Raol
Wire electrical discharge machining (WEDM) is a specialised thermal machining process capable of accurately machining parts with varying hardness or complex shapes, which have sharp edges that are very difficult to be machined by the main stream machining processes. This paper studied the effect of various process parameters like: Current, Pulse on time, Pulse off time and Wire tension on responses like MRR and SR. Central composite design (CCD) is used for experimentation and Response surface methodology is applied for developed second ordered mathematical model. The adequacy of the above the proposed models have been tested through the analysis of variance (ANOVA). Read More...
|
Mechanical Engineering |
India |
1805-1809 |
460 |
Review of Detection of Skin Cancer Using Image Processing
-Rajbeer ; Ishdeep
This paper presents the introduction to skin cancer and many different techniques to develop a texture analysis and classification module to improve the decision strategy and overall accuracy of the system. Asymmetry, Border Irregularity, Colour variation, Diameter is the major symptoms which we will use in our processing algorithm. By applying multi-level Wavelet Transformation to the input image and then choosing a group of sub-bands to be restored for best defect detection, the procedure for Skin cancer detection and analysis was developed. Read More...
|
Skin Cancer, Cancer Techniques, Melanoma, Image processing |
India |
1810-1813 |
461 |
Extending MapReduce with Bag-Of-Task for Scheduling Cloud Jobs
-Prashant jani
MapReduce is a powerful platform for large-scale data processing. MapReduce provides an easy parallel programming interface in a distributed computing environment. Bag-of-Tasks (BoTs) are parallel applications with no inter-task communication. Different approaches are studied to reduce the execution time and maximize the CPU utilization for cloud jobs. According to the studies, this can be happened MapReduce with BOT. Moreover, there are large numbers of jobs and if they are not scheduled well then complexity of execution will be occur. So, by applying scheduling techniques like MapReduce and BOT on cloud jobs this can be avoided. In Mapreducer’s reducer phase cloud jobs are going to executes serial so it takes too much execution time and minimum CPU utilization but after applying BOT on that phase jobs are going to execute parallel so execution time will reduced and CPU utilization will be maximized. From this approach, execution time may be reduced for cloud jobs and CPU utilization may be maximized. Read More...
|
Computer Science and Engineering |
India |
1814-1817 |
462 |
Experimental Investigation of Co2 Laser Cutting Parameters of AISI 304
-Rajesh Chaudhari ; Yuvraj Raol; P. J. Panchal; M. D. Patel
Laser beam machining (LBM) is one of the most widely used thermal energy based non-contact type advance machining process which can be applied for almost whole range of materials. Laser beam is focussed for melting and vaporizing the unwanted material from the parent material. It is suitable for geometrically complex profile cutting and making miniature holes in sheet metal. Present study attempts to model and optimize the Surface Roughness using R.S.M. Approach. Input process parameters for this study are power intensity, cutting speed , pulse frequency and gas pressure. In this research Central Composite Design (CCD) is used for experimentation design. The adequacies of the above proposed model have been tested through the analysis of variance (ANOVA). Read More...
|
Mechanical Engineering |
India |
1818-1821 |
463 |
Advance License Plate Recognition for Indian Vehicles
-Sanketkumar Raval ; Viral Borisagar
India faces major problems in traffic control due to increasing number of vehicles day by day. Few years ago India didn`t defined any fixed standardization for number plate so that it faced major security problems in traffic control. License Plate Recognition (LPR) systems can also be used at highways, motorways, toll tax collections, secured military area, vehicle checking, vehicle parking etc. The proposed work can be used for automatic toll tax collection centre, vehicle parking and vehicle checking at check post. The earlier methods used plate color information which can detect only single color number plates or use specific color search algorithm which is computationally expensive or use artificial neural network which involves complex mathematics. Many vehicles use multiple lines in license plate. Read More...
|
Computer Engineering |
India |
1822-1825 |
464 |
3-D Discrete Wavelet Transform VLSI Architecture for Image Processing
-Akshayraj Zala ; Ankur Changela
In this paper, we propose an improved version of lifting based 3D Discrete Wavelet Transform (DWT) VLSI architecture which uses bi-orthogonal 9/7 ï¬lter processing. This is implemented in FPGA by using VHDL codes. The lifting based DWT architecture has the advantage of lower computational complexities transforming signals with extension and regular data flow. This is suitable for VLSI implementation. It uses a cascade combination of three 1-D wavelet transform along with a set of in-chip memory buffers between the stages. These units are simulated, synthesized and optimized by Xilinx 12.1 and MATLAB 7.9 tools. Read More...
|
Electronics & Communication |
India |
1826-1831 |
465 |
Spatial temporal change analyses of forest cover before and after Re-Habilitation of Villages of Kuno Wildlife Sanctuary, Madhya Pradesh using NDVI and Digital Classification
-Kush Kushwah ; Bidyalakshmi Phurailatpam; R.J. Rao
In this study, an attempt have been made to analyses the changes of forest cover of Kuno Wildlife Sanctuary using temporal satellites images of Landsat TM of 05th May 1990 and IRS LISS III P6 of 02nd March 2008. Normalized Difference Vegetation Index (NDVI) and digital image classification were used to generate the landuse/landcover of the sanctuary along with extensive ground truthing in 2008. SOI toposheets and other related information was used as an aid in feature extraction for the period of 1990. The NDVI values were derived and interpreted using ground filed surveys. Image differencing method was used to analyze the change detection of the landcover classes. The landuse/landcover were classify into 9 classes as Mixed Forest, Shallow water, Grassland, Village/ Forest camp area, Barren land, Dense forest, River , Open scrub and forest fire. The derived NDVI values varies from -0.27 to +0.62 in 1990 and -0.433 to +0.096 in 2008 respectively. The varied NDVI values indicates that vegetation cover was evenly distributed and reflected in the period 1990 while in 2008 there were highest reflectance of bare soil. However, it was observed that from May 1990 to March 2008, dense forest and mixed forest area increased up to about 28.83% and 7.94% in the abandon village areas and barren land. Grassland has also shown some improvement (3.16%) over the periods. The overall change detection is that the village areas and barren land before rehabilitation of the villagers were converted to high density grassland and mixed forest after rehabilitation which indicates a positive sign of management of the sanctuary. Read More...
|
Environmental Engineering |
India |
1832-1836 |
466 |
classification of fingerprint,iris and facial sensors
-Gursimarpreet Kaur ; Dr. Sheetal Verma; Dr. Chander Kant Verma
Biometrics is the science and technology of recognizing individuals based on physiological, behavioral or morphological characteristics. This includes fingerprint, face, gait, iris, hand geometry, signature etc. By using biometric techniques it is possible to establish one’s identity. Biometric system has four main modules i.e. sensor module, feature extraction module, matching module and decision module. Sensor module is the first module so it is very important to have accurate acquisition of data. In this paper classification of fingerprint, iris and facial sensors are discussed. There are some parameters (Area, resolution, SN ratio, motion blur etc.) of these sensors which is also included. Sensors also encounter some challenges (interoperability, noisy data, spoof attacks etc). Finally list of most deployed sensors in market are given along with parameters. Read More...
|
computer science and engineering |
India |
1837-1844 |
467 |
Experimental Evaluation Of Machining Surface & Tool Wear In Thermally Enhanced Machining Of En 31 Steel
-ASHISHKUMAR S. SHAH ; BHARAT N. GELOT
Materials with resistance to wear are frequently utilized in industry and these materials are notoriously difficult to machine. One of the methods of softening the work piece is hot machining. The temperature rise at the shear zone reduces the yield strength and work hardening of the work piece, which make the plastic deformation of hard-to-machine materials easier during machining. Hot machining prevents cold working hardening by heating the piece above the recrystallization temperature and this reduces the resistance to cutting and consequently favours the machining. Hot Machining can be used to decrease tool wear, power consumed and increase surface finish.
In this study, an experimental investigation had been carried out for hot-machining operation of EN 31steel using a carbide cutting tool. The heating of the work-piece was carried out by burning a mixture of liquid petroleum gas and oxygen. The surface finish is influenced by work-piece temperature, cutting speed, feed and depth of cut. The influence of surface temperature, cutting speed, feed rate, and depth of cut on the surface finish was investigated.
Read More...
|
Mechanical engineering |
India |
1845-1848 |
468 |
Laboratory Studies on Reclaimed Asphalt Pavement materials using different Bituminous Binders
-VIJAY B G ; PRAVEEN KUMAR P
The wastes as a replacement to aggregates have been evaluated by testing their laboratory performances as compared to neat dense bituminous mixes. The present study reports the laboratory investigation carried out on Dense Bituminous Macadam-Grade II(DBM-II) RAP mixes with RAP content of 35% with VG-10,VG-30 and CRMB-55 as binders. Marshall mix properties namely stability, flow, bulk density, air voids, voids filled with bitumen, voids in minerals aggregates was evaluated for both neat and recycle dense bituminous mixes as per MORTH( 4th revision). Read More...
|
Civil engineering |
India |
1849-1852 |
469 |
Design & Development of Multiple Output Resonant Converter Using Planar Transformer
-Harshana Chabhadiya
In general, a Quasi-Resonant Converter (QRC) shows lower EMI and higher power conversion efficiency compared to the conventional hard switched converter. This paper is design & development resonant converter using planar transformer with high switching frequency. The converter switching frequency needs to be increased to reduce passive component size and hence miniaturize electronic hardware. This can only be implemented with (a) soft-switching of power devices (b) Reduction in noise and EMI problems, & (c) Reduced heat dissipation of power components. Resonant converters fulfill all these requirements for realization of a high switching frequency converter. This resonant converter is required to operate from a low input bus such as 26V to 42V, to maintain primary and secondary isolation, to provide multiple outputs, and to sustain high efficiency operation. Read More...
|
Electrical Engineering |
India |
1853-1859 |
470 |
VANET Routing Protocol-Movement Aware Routing Protocol based on Probability
-Shreya Patel ; Parimal Patel
Vehicular Ad Hoc Network (VANET) is a sub class of mobile ad hoc networks. The performance of communication depends on how better the routing takes place in the network. Routing of data depends on the routing protocols being used in network. Position-based routing protocols are considered best for high dynamic network like VANET. In this paper using two position based routing protocol proposed new routing protocol and measure it’s performance with the no. of nodes, speed of nodes with measured packet delivery ratio. Read More...
|
Computer SCience Enineering |
India |
1860-1861 |
471 |
Routing Protocol in VANET
-Shreya Patel ; Parimal Patel
Vehicular Ad Hoc Network (VANET) is a sub class of mobile ad hoc networks. VANET provides wireless communication among vehicles and vehicle to road side equipments. The communication between vehicles is used for safety, comfort and for entertainment as well. The performance of communication depends on how better the routing takes place in the network. Routing of data depends on the routing protocols being used in network. Position-based routing protocols are considered best for high dynamic network like VANET. In this paper I am going to compare the position-based routing protocols which work even in high traffic density very accurately. Read More...
|
Computer Engineering |
India |
1862-1864 |
472 |
Adaptive traffic control and enforcing secure routing in VANET
-Ashish Ponkiya ; Vaseem Ghada
In recent year vehicular ad hoc network (VANET) is studies extensively by researchers. As VANET is so much vulnerable to malicious activity due to its dynamic nature of topology so primary goal of the Vehicular ad Hoc network (VANET) is to provide real-time safety related messages to motorists to enhance road safety and prevents from accidents. In this paper we present some background of research work that is carried out then several threats that encounter to safety of VANET. We present scenario which is accident free and control traffic at junction by scheduling the traffic light then isolate the effect of malicious vehicle to reduce the effect of it and analyse the result. For secure vehicle to vehicle (V2V) communication we adapt the message authentication mechanism by using the hash value and encryption technique. Read More...
|
Computer Sceince and Engineering |
India |
1865-1869 |
473 |
Big Data Analysis: Analysis of log files using Map Reduce
-Himanshu Rathod ; Tarulata Chauhan
Big data is now a days a growing name, big data includes structured, semi structured as well as unstructured data. In this condition the storage and analysis of the data becomes a serious issue. Apache Hadoop is a growing name in storing maintaining as well as analysing the bid unstructured data. Apache Hadoop is an open source software to store, process and analyse the data. MapReduce is an efficient method used by the Hadoop to analyse the data. It is based on two functions Map functions and Reduce Functions. Both of which can be developed by developer according to their needs in any language supported by Hadoop. Log files are largely growing in amount and thus converting into big data. We propose a method to analyze the log files using the Hadoop MapReduce method. Read More...
|
Computer Engineering |
India |
1870-1872 |
474 |
Home Automation System Using ZigBee and Arduino board as a Gateway
-shayar rathod ; gaurav r joshi; shayar rathod
Today’s homes have as many wires as the number of devices to control. Home automation using ZigBee and Arduino as a gateway does away with the need for separate wires and even remotes. The HAS-ZA is a wireless home automation system that can be implemented in existing home environments, without any changes in the infrastructure. Home Automation lets the user control the home appliances from his or her smart-phone or laptop. The assigned actions can happen depending on time or other sensor readings such as light, temperature or sound from any connected device in the Home Automation network. With the help of Arduino, currently working as gateway, we can control, command, operate and observe the end devices. Here we are considering end devices like fan, bulb, TV, Music System, doors, windows etc. with the single gateway, the system can control entire home irrespective of number of rooms or boundaries where each room will be connected with single receiver. Read More...
|
electronics and communication |
India |
1873-1875 |
475 |
MINE PERSONNEL VITAL SIGNS MONITORING TERMINAL BASED ON WIRELESS NETWORK (WSN)
-M.P.Harinath
For domestic mine poor working conditions and market demand for mine personnel monitoring of characteristic parameters information, the paper presents a WSN-based mine personnel vital signs monitoring terminal which used to collect body temperature, pulse and other physical characteristic parameters. The entire monitoring system is composed of miner’s characteristic parameters monitoring terminal and monitoring center computer. Miner’s characteristic parameters monitoring terminal is developed based on embedded core processor ARM7 and embedded uClinux operating system platform, which uses WSN wireless network to send miners characteristic parameters data to the monitoring center computer. Monitoring center computer can be used to view miner’s physical characteristic parameters data, and providesan important support for the protection of the lives of mines personnel safety and accident rescue. Read More...
|
Computer Science Engineering |
India |
1876-1878 |
476 |
Review Of Multi-Agent Systems, Models and Applications
-K.Vanitha ; D.Venkata Subramanian
This paper discusses about multi-agent systems and its characteristics. This paper also provides a review of different applications and components involving multi-agent system. A multi-agent system (MAS) is a loosely coupled network of software agents that interact to solve problems that are beyond the individual capacities or knowledge of each problem solver. They simplify problem-solving by dividing the necessary knowledge into subunits-to which an independent intelligent agent is associated-and by coordinating the agents' activity. Read More...
|
computer science engineering |
India |
1879-1881 |
477 |
A WIRELESS METHODOLOGY OF HEART ATTACK DETECTION
-R.DILIP KUMAR ; Dr. R.NEDUNCHELIAN
The radio carpal combined discern alongside coronary wreck Detection is instrumentation that's utilized daily to point cardiopathy, to notice coronary wreck and to imply emergency facilitate. It had been projected specially to assist patients alongside cardiopathy. This includes 3 open sub units. They’re Circuit, Scrutiny formula, and Bluetooth Communication. The main one is to go down the radio carpal combined of the patient to arrests the atypical heart beat waves from the victim and additionally the alternate strategies span component locale in below the stick. This undertaking is established on the prior undertaking “Wireless coronary wreck Detector alongside GPS†of Plummet 2004. Read More...
|
computer science and engineering |
India |
1882-1886 |
478 |
REVIEW ON PHARMA AND BIO SCIENCES
-R.K.Divya
The brain and backbone structure the central systemanervosum (CNS), where all very important functions of the body area unit controlled. once tumors arise within the central nervous system, they're particularly problematic as a result of someone's thought processes and movements is affected. These tumors also can be tough to treat as a result of the tissues close a neoplasm could|whichwill|that will} be laid low with surgery or radiation may play a significant
role in functioning. There area unit 2 broad varieties of cancers occurring inside this method. Primary tumors originate within the central systemanervosum, whereas secondary tumors migrate from cancers placed elsewhere within the body, like breast cancers. Secondary, or pathological process, brain tumors, area unit a lot of common than primary brain cancers.
Read More...
|
computer science |
India |
1887-1891 |
479 |
Experimental Investigation of heat recovery from engine exhaust gas used in electrolux refrigeration system
-Devasi J. Jotava ; D. J. Parmar
Efficiency of diesel engine is about 35-40 % remaining energy go waste. Maximum energy wastes in exhaust. In diesel engine 30-32% energy go waste in exhaust. So it is important to recover energy from exhaust. Approximately 15% of all the electricity produced in the whole world is employed for refrigeration and air conditioning system. During recent years research aimed at the development of technologies that can offer reductions in energy consumption, peak electrical demand and energy costs without lowering the desired level of comfort conditions has intensified. By reason that absorption refrigeration technologies have the advantage that the peaks of requirements with the availability of the waste heat. A 15 kW internal combustion engine was analyzed experimentally to determine whether it was capable of driving the experimental refrigeration system via its exhaust heat. This required a study of heat distribution of the diesel engine under various load conditions. As far as the integrated system is concerned, the experiments were focused on the heat distribution of the diesel engine and effect on the performance of the absorption refrigeration system. At full load condition, performance of refrigeration system is higher because of higher exhaust gas temperature. If more heat recovered from the exhaust gas of the IC engine then more heat transferred to the generator and hence this caused an increase on the cooling capacity of the experimental refrigeration system. This is due to the fact that, in the refrigeration system, the cooling capacity is directly proportional to the heat input to the generator. Read More...
|
Mechanical Engineering |
India |
1892-1894 |
480 |
REVIEW ON DETECTION AND REMOVAL OF NOISES IN IRIS RECOGNITION SYSTEM
-A.mounica
Iris segmentation is an essential module in iris recognition as a result of it defines the effective region used for feature extraction, and so is directly related to the popularity accuracy. Eyelids, eyelashes and shadows square Iris segmentation is a vital module in iris measure 3 major challenges for effective iris segmentation. discuss varied novel strategies to localize every of them. In initial technique, a unique coarse-line to fine parabola eyelid fitting theme is developed for accurate and quick algebra localization. A smart prediction model is established to work out associate appropriate threshold for lash and shadow detection. In second technique includes 2 components mainly. within the initial half, eight eyelid. Models square measure conferred and also the second half is iris enhancement .In third technique, a replacement noise removing approach supported the fusion of edge and region info. the full procedure includes three steps: 1) rough localization and normalization, 2) edge info extraction based section congruency, and 3) the infusion of edge and region info and fourth technique discuses a novel lash removal technique for preprocessing of human iris pictures in a very human iris recognition system is presented. Read More...
|
computer science and engineering |
India |
1895-1898 |
481 |
A Novel Method for Efficient Software Size Estimation for Expert User Programming
-Arpit Dhakad ; Prof Rajeev G Vishwakarma
In this paper, we have presented an overview of existing size and effort estimates for software. All these estimates are described more or less on their own. Size & effort estimation is a very popular task. In this paper, we have also explained the fundamentals of size & effort estimation. We describe today’s approaches for size & effort estimation. From the broad variety of size & effort estimation models that have been developed we will compare the most important ones. The software development came in to existence around 60 years ago. Right from the beginning to till date the software engineering is continuously evolving the new techniques for developing quick, cheap and high quality software. Everything revolves around cost, schedule and quality. One such evolving field of software development is estimation models for software size and effort. Software size estimation is one of the most important input for software cost and effort estimation. Therefore improving the accuracy of software size estimation ultimately results in improving the accuracy of the software effort and cost estimates. This estimates are used in staffing, scheduling, planning, budgeting etc. But when we compute these estimates, only high level project requirements are available to us. Using this high level information to produce accurate software size estimates is a really challenging task.Project is always behind schedule, over budget, and of poor quality. So necessary steps are required to estimate size, effort, and cost accurately. Quality is a real challenge for most of the complex software. The important attributes of the software quality are accuracy, performance, security, availability, reliably etc. So there is a need of new matrices for efficiently estimating size. Read More...
|
Software Engineering |
India |
1899-1901 |
482 |
AN EFFICIENT CONSTRUCTION OF ONLINE TESTABLE CIRCUITS USING REVERSIBLE LOGIC GATE
-B.sree saranya
Testable fault tolerant system style has become important for several safety vital applications. On the opposite hand, reversible logic is gaining interest within the recent late to its less heat dissipating characteristics. Any Boolean algebra perform is enforced mistreatment reversible gates. This paper proposes a way to convert any reversible gate to a testable gate that's additionally reversible. The resultant reversible testable gate will discover on-line any single bit errors that embrace Single Stuck Faults and Single Event Upsets S.Karp et.al . The planned technique is illustrated mistreatment Associate in Nursing example that converts a reversible decoder circuit to an internet testable reversible decoder circuit. Read More...
|
computer engineering |
India |
1902-1905 |
483 |
Hacking : Virtues and values
-Akhilesh kumar
This paper consists of the introduction of hacking and its characteristics, including the overall aspects of it regarding the types of attacks, security goals and tools and other security measures. The paper also deals with the recent trends in the network security domain which is nowadays in a great demand. Read More...
|
Information Technology |
India |
1906-1910 |
484 |
A CLUSTERED HYBRID AUTHENTICATION ALGORITHM FOR MULTICAST ADHOC NETWORKS NEW
-R.Bharathi
In recent years Wireless Ad-Hoc Networks (WAHN) are encouraging attention from the analysis and engineering community Digital battleground , plus pursuit, air borne safety, state of affairs awareness, and border protection square measure samples of a growing list of WAHN applications(1) In most WAHN setups, nodes square measure forced in aboard energy and, in their computation and communication capabilities. additionally, several of the WAHN applications could use an outsized set of nodes with a dynamically dynamical topology. These characteristics create the planning of WAHN considerably difficult as compared to modern networks. additionally, the good flexibility of WAHN comes at the worth of associate augmented vulnerability to security attacks[2]. The planned system examines impact of the clump strategy and routing schemes on the performance of tam-o'-shanter. Securing multicast of information streams over a multi hop wireless adhoc networks through clump methods. A dynamic multicast cluster management protocol that aims at finding issues that square measure specific to Adhoc networks. Read More...
|
Computer Science and Engineering |
India |
1911-1913 |
485 |
Image Retargeting with Visual Attention Video Compression Using Saliency
-Jamila Fathima. J. ; Devaraj. P.; Pooja. C.
In this paper we propose a method to compress video on image retargeting with visual attension based on using saliency maps. This method allows saliency to increase in high quality parts of the frame, and allows saliency to reduce in non-ROI (Region of Interest) parts. To retargeting the image first extract the saliency maps from the frame, then ROI part of an image assigned as higher pixels count which is salient map image and lower pixels are non-salient image region. We compare our method from existing system H.264/AVC rate distortion optimization (RDO) by introducing a saliency distortion term in the distortion metric to propose method JPEG 2000 and H.264/AVC-10 and verify that, at the cost of visual quality in non-salient image regions, this method achieves a major improvement of the visual quality of salient image regions. Read More...
|
Computer Engineering |
India |
1914-1916 |
486 |
NETWORK SECURITY ON DIGITAL SIGNATURES STUDENT
-a.keerthana
Our objective is to supply the tools for certifying the origin of the file wherever it come back from. once transferring necessary documents it\'s usually necessary to certify in an exceedingly reliable manner United Nations agency is truly the sender of a given document. One approach for certifying the origin of documents and files is by victimization the digital signature. The digital linguistic communication could be a mechanism for certifying the origin and therefore the integrity of transmitted data. within the method of digitally linguistic communication, extra data known as digital signature is additional to the given document, calculated victimization the contents of the document and a few non-public key. At a later stage, this data is wont to check the origin of the signed document. Read More...
|
computer science and engineering |
India |
1917-1918 |
487 |
Web Engineering
-Prof. Sharnil Pandya ; Shrey Bhat; Rohan Sapre
World Wide Web is now an omnipresent entity and the web has influenced the process of engineering. We’ll elaborate this topic by covering topics such as the security issues and the semantics involved in this complex process. The web is a very volatile place and this may lead to outside interference resulting in lack of integrity of our data, hence it is important to maintain the integrity. This paper also includes the operations and maintenance jobs that can assist us take the next step in the engineering process. Read More...
|
Software Engineering |
India |
1919-1921 |
488 |
Security Threats In Cloud Computing Surroundings
-R.Deepan
Cloud computing is a model for enabling service user's ubiquitous, convenient and on-demand network access to a shared pool of configurable computing resources. The security for Cloud Computing is emerging area for study and this paper provide security topic in terms of cloud computing based on analysis of Cloud Security treats and Technical Components of Cloud Computing Read More...
|
Computer Science Engineering |
India |
1922-1925 |
489 |
Effective use of Partially Purified alpha-amylase Produced by Brevibacillus Borstelensis R1 in Detergent and Textile Industry
-Dr.Kopparthi Suribabu ; Dr.T.Lalitha Govardhan; Prof. K.P.J Hemalatha
The main objective is to test the efficiency of partially purified alpha-amylase produced by Brevibacillus borostelensis R1 in automation dishwashing, laundry and to test the capabilities of partially purified alpha-amylase as desizing agent in textile industries. Submerged fermentation was used in alpha-amylase production. In textile industry, the alpha-amylase acted as a better desizing agent on sari, towel and navaar samples than caustic soda. Alpha-amylase together with the detergent proved to be more efficient to degrade the residues of starchy foods. The alpha-amylase was found to be useful in automation dishwashing and laundry industries. Read More...
|
Textile Engineering Food Engineering |
India |
1926-1928 |