No. |
Title and Author |
Area |
Country |
Page |
1 |
Enhancement of Power Quality by using series and shunt compensator in distribution systems
-P.ANITHA RANI ; R.SIVAKUMAR
This paper presents the design of Unified Power Quality Conditioner which is the integration of series and shunt active power filters. The main purpose of UPQC is to mitigate power quality issues like voltage imbalance, current harmonics etc... For controlling the UPQC fuzzy logic controller is used which also enhances the fast response of the UPQC. The UPQC used in the distribution system is simulated using MATLAB software and obtained results shows that UPQC is the promising solution which deals with both current and voltage imperfections and also THD is measured. Read More...
|
Electrical Engineering |
India |
1-4 |
2 |
Enabling Location Privacy and Resisting Colluding Attacks in Location Based Services for Mobile Applications
-Priyanka Prasad B.N. ; Kusuma S.
Location Based Services (LBS) are becoming more conventional now-a-days. Apart from benefits from these LBS, there are many privacy threats.These applications cannot rely independently on the users’ devices to discover and transmit location information because users have an incentive to cheat. Instead, such applications require their users to prove their locations. Unfortunately, today’s mobile users lack a mechanism to prove their current or past locations. This paper presents Location Privacy - the ability to control the access of location information related to an individual. Location proofs are handed out by the wireless infrastructure (e.g., a Wi-Fi access point or a cell tower) to mobile devices. The relatively short range of the wireless radios ensures that these devices are in physical proximity to the wireless transmitter. As a result, these devices are capable of proving their current or past locations to mobile applications. In order to defend against colluding attacks, we also present betweenness ranking-based approach for outlier detection. Read More...
|
Computer Networking |
India |
5-7 |
3 |
Thermal performance of two phase closed thermosyphon using nanofluid.
-Niyati Parate ; Prof. H. S. Farkade
A two-phase closed thermosyphon (TPCT) is an enclosed, passive device for heat transmission. It consists of an evacuated close tube filled with a certain amount of working fluid. Fluids with suspended nanoparticles (particles smaller than 100 nm) are called nanofluids that they have a great potential in heat transfer enhancement. In this paper, the thermal performance of a two-phase closed thermosyphon filled with Al2O3nanoparticlesusing water as the base fluid. The experiment was performed in order to measure the temperature distribution and compare the heat transfer rate of the thermosyphon heat pipe with nanofluid and with distilledwater. Nanofluids were prepared in 1% volumetric concentrations. Different filling ratios and heat loads (100 W, 200 W, 300 W, 400 W, 500 W and 600 W) were applied to the evaporator section. Results show that the addition of 1% (by volume) Al2O3of nanoparticles in water presented improved thermal performance compared with the operation with distilled water. Read More...
|
Mechanical Engg. |
India |
8-11 |
4 |
Optimization of Process Parameters for improving performance in electrical discharge machining
-Viral B. Prajapati ; H.G. Rajput; Jitendra J. Thakkar; Sachin P. Patel
The correct selection of manufacturing condition is one of the most important aspects to take into consideration in the majority of manufacturing processes and, particularly, in processes related to Electrical Discharge Machining (EDM). It is a capable of machining geometrically complex or hard material components. From the point of view of industrial applications, SS 410 is a very important material and that’s why for the purpose of experimentation SS 410 with copper electrode and EDM oil as dielectric fluid has been used. In this present work various input parameters are selected such as discharge current, pulse on time and pulse off time. The experiment was done using PRESS-MACH EDM machine. Three level approach of full factorial design of experiment was applied to design the experimental and the data was analyzed by using analysis of variance (ANOVA). It is found that discharge current and pulse on time was the most significant factor affecting the SR and discharge current was the most significant factor affecting the MRR. Genetic algorithm is used for finding out the optimal condition for surface roughness and material removal rate for EDM. Read More...
|
Mechanical Engineering |
India |
12-16 |
5 |
Energy Efficiency and Better Throughput in MANET using Improved AOMDV
-Nisarg A Patel ; Manojkumar B Patel; Ankit K Patel
In Mobile Ad hoc Network (MANET) all the nodes are mobile in nature having limited battery capacity that is called energy. Because of the dynamic behavior of network link are not maintained for long time. All nodes in network are energy dependent and efficient energy utilization is one of the important issues in MANET. The location based DREAM (Distance routing Effect Algorithm for Mobility) protocol are maintained the location information of each node with respect to sender and receiver. Our Work is towards a new location based energy efficient scheme with better throughput AOMDV protocol. In this scheme energy dependent nodes are do routing with AOMDV protocol by using the concept of location based protocol DREAM. Nodes in network are not intimated about their energy status, for that remove the suddenly link breakage. If the nodes in network are know about the energy status and also about the status of location of receiver that reduces the energy consumption with better throughput. The Final Result gives better energy utilization and improved the throughput in network with better packet delivery ratio and end to end delay. Simulation did by using ns-2 simulator for efficient use of energy with better throughput. The performance measured on the basis of performance parameter like Routing Protocol, Simulation time, Traffic type (TCP & UDP), Packet size, Node movement at maximum Speed, Transmission range, Transmission Energy, Receiving Energy, Idle Energy Consumption, Sleep Energy Consumption, Normal Routing Load and Packet Delivery Ratio. Read More...
|
computer engineering |
India |
17-22 |
6 |
Development of ITSM BMC Log File Analyzer
-Suma Patil ; Anala.M.R
Every organization consists of servers for processing huge amount of data. These servers are built with proprietary technologies, so the only way to debug any application issues is to go through the log files generated and find out which workflow fired/not fired. Problem with this approach is that these log files grow very quickly depending on user activity and type of logging. Many times these log files grow to 200-300 Mbytes within 4-5 minutes. Also, since these are server side logs, they contain workflows executed for all users and not just the user who is having issues. To physically go through such huge log files is very painful and consumes lot of time as well. In the process productivity of developer also gets affected.
To resolve this we propose an application that can parse through these log files and trace the execution of workflows for given user and present the same in a graphical & intuitive interface. This would greatly reduce time & effort spent by developers in troubleshooting application issues.
Read More...
|
Computer Science Engineering |
India |
23-25 |
7 |
spoof detection:application to face recognition
-aarti sharma ; surender dahiya
User authentication is an important step to protect information, and face biometrics plays an important role to recognize a person. Face biometrics is natural, easy to use, and universally acceptable. Recent work has publicized that face biometrics can be easily spoofed using cheap low-tech equipment. This paper introduces novel and appealing techniques to detect face spoofing using the motion, texture analysis, liveness detection. The key idea of the approach is to learn and detect the structure facial textures that characterize real faces but not fake ones. Read More...
|
biometric |
India |
26-29 |
8 |
A REVIEW ON DESIGNING OF IMPLANTABLE 3D DENTAL ANTENNA
-Sapna sadyan
This paper presents the designing of compact high gain implantable dental antenna with a large bandwidth. The 3D folded antenna is based on a combination of Archimedean spirals & a Hilbert-based 3D folded fractal structure. Due to its compactness the antenna can be implanted in the human body easily & is used to communicate with external devices. In this paper we design such an antenna for dental applications. Read More...
|
Electronics and communication engineering |
India |
30-31 |
9 |
Line Interactive UPS: An Advantage Over Conventional UPS System
-RAVI CHANDARANA ; Ravi Chandarana; Bharti B. Parmar
At the stage of growing power demand; it is required to have a system that can provide reliable and good quality power. Power System suffers from many disturbances out of which some may cause power cut-off due to which reliability of the system may affected and other may not cause power cut-off but affect operation of those loads which are sensitive to power quality. Line interactive UPS can take care of both situation. In this paper overview of UPS and detail discussion of Line Interactive UPS is covered. Read More...
|
Electrical Engineering |
India |
32-35 |
10 |
Cloud Computing - Health Applications & Security
-B.NAGARAJU
Cloud computing is based on service-level agreements that are established between the service providers and consumers. Cloud Computing opens up many new possibilities for application developers. Cloud Computing moves databases to be data centre where the management of the data and services may not be fully trustworthy and it poses many security challenges which have not been well understood. Read More...
|
computer science and engineering |
India |
36-37 |
11 |
An Elegant Context Perceptive Page Rank Algorithm for Information Retrieval
-Varun Singh ; Tarun Dhar Diwan; Rohit Miri
The World Wide Web contains the large amount of information sources and these are increasing tremendously. When the user searching the web for information retrieval, user may fetch irrelevant and redundant data causing a waste in user time and accessing time of the search engine. So narrowing down this problem by taking user interest and need from their behavior into account, have become increasingly important. Web structure mining plays an effective role in this approach. Some page ranking algorithms PageRank , Weighted PageRank are commonly used in web structure mining. The original PageRank algorithm search-query results independent of any particular search query. To yield more accurate search results for a particular topic, we have proposed a new algorithm, Elegant Context Perceptive Page Rank Algorithm on web structure mining that will show how the relevant pages of a given topic is better determined, as compared to the existing PageRank, Topic sensitive PageRank and Weighted PageRank algorithms. Read More...
|
Computer Science and Engineering |
India |
38-41 |
12 |
RELATION BETWEEN SEED CHARACTERSTICS AND SEED QUALITY IN BHAT (BLACK SEEDED SOYBEAN) COLLECTED FROM NORTHERN HILLS
-ANUPAM BARH ; PUSHPENDRA ; MEENAKSHI JOSHI ; KAMENDRA SINGH; N. K SINGH
The 50 genotypes of black soybean and brown seeded soybean called as Bhat was analyzed for the protein content and oil content. The studies were conducted with respect to growth habit and seed color and size. In general, black seeds were more in protein and less in oil content in comparison to yellow colored seeds. In present studies it was investigated that whether the growth habit of the black soybean is been related to nutritional superiority in terms of oil and protein percentage. In this study the range of protein percentage was found to be 23 to 43. Accessions MOB-29 having 43% proteins in seed. The correlation studies between protein content, oil content and 100 seed weight was done and it was found to negatively non- significant. The different groups were made according to protein content and oil and studied the relation with growth habit and coat color. In this study we observed evident role of farmer in selection of collected germplasm in genetic enhancement. Read More...
|
AGRICULTURAL SCIENCE |
India |
42-44 |
13 |
CFD SIMULATION OF COMPACT TYPE MINI CHANNEL HEAT EXCHAGER BY USING OF WATER
-Pan Parthivkumar ; N.S.Patel
A heat exchanger is a device that is used to transfer thermal energy (enthalpy) between two or more fluids, between a solid surface and a fluid, or between solid particulates and a fluid, at different temperatures and in thermal contact. In the conventional heat exchangers, pipes are larger in size which makes heat exchanger bulky. But in some typical applications such as closed loop gas turbine heat exchangers, cryogenic applications, heat exchangers used in PWR power plants, nuclear submarines, etc., size and weight are critical design constraints on the heat exchanger. Also for high pressure applications tubes are subjected to high bending stresses. To overcome these difficulties, compact heat exchangers can be employed. Mini channels heat exchanger is a type of compact heat exchanger in which mini channels are machined on metal plates and then such plates are bonded together. Such an arrangement provides high strength so that it can be used for high pressure applications. It has been observed that in mini channels, convective heat transfer coefficient is more than the tubes used in conventional heat exchangers. Hence, the length for same heat transfer is greatly reduced which results in reduced overall size and weight of the heat exchanger. Electronic device are in heavy demand for computer processor applications and generate large amount of heat. These high power device can be cooled off very effectively by either liquid or gas coolant flowing through micro or mini channels. Continuous research work is ongoing for developing high speed processor which generate high amount of heat. Cooling of such particular systems requires high amount of mass flow rate and compactness is also required. In present work, a mini channel heat exchanger is designed with assuming inlet and outlet of hot temperature, inlet of cold water temperature and also the mass flow rates of cold and hot water. This compact heat exchanger can be used for cooling purpose of electronics device like silicon chip which would be used for microprocessor. In order to cool down silicon chip, it is kept in place of hot fluid plate. Cooling of silicon chip is required to prevent from damage and subsequently failure. The heat exchanger is designed for obtaining 10°C of hot fluid. Read More...
|
Mechanical Engineering |
India |
45-49 |
14 |
Review Paper on Experimental Investigation on Different Injection Pressure and Injector Holes Number in Stationary 4-Stroke Single Cylinder Diesel Engine Performance Using Bio Diesel Oil-Diesel Blends
-RAVI D GUJARATI ; Vinod M Makwana; Utsav M Dholakiya
The consumption of diesel is 4-5 times higher than petrol in India. Due to the shortage of petroleum products and its increasing cost, efforts are on to develop alternative fuels especially, to the diesel oil for full or partial replacement. Use of bio diesel in the diesel engine without modification that time performance of the engine is decrease because biodiesel viscosity and density effect the atomization so overall performance decrease. There are various factors that influence the performance of engine such as compression ratio, atomization of fuel, fuel injection pressure, and quality of fuel etc. Fuel injection pressure and nozzle holes number play an important role in better atomization of injected fuel allows for a more complete burn and helps to reduce pollution. In present work a single cylinder 5HP diesel engine is used to investigate the performance characteristics of bio diesel oil with diesel blends. We will jointly work on different injection pressure and injector nozzle holes number for improve the performance the engine. Read More...
|
AUTOMOBILE ENGINEERING(MECHANICAL) |
India |
50-52 |
15 |
HTPI: Hadoop Text Processing Interface
-Disha Kangar ; Dr. Kanwal Garg
Text mining is a practice which is regarded as the supporting pillars of Information Retreival. This paper is in simple terms dedicated to text mining and bear a prime focus on mining academic papers. An architecture is proposed by the authors is presented in the paper, which they have named HTPI. This framework is built upon Java eclipse using Apache Hadoop.
The problem under consideration for the paper is the reference metamorphosis of the references mentioned in the references section of any scientific paper based upon the similarity score(between the referenced paper and the paper whose reference list is being re-ordered) retrieved. Various notions have been used in the paper like stemming, skipping and similarity calculation using Jaccard Coefficient.
Read More...
|
Computer Engineering |
India |
53-55 |
16 |
A Comparative Analysis of DCT, DWT & Hybrid (DCT-DWT) Transform Techniques of Image Compression
-Alok Kumar Singh
Image compression is process to remove the redundant information from the image so that only essential information can be stored to reduce the storage size, transmission bandwidth and transmission time. The essential information is extracted by various transforms techniques such that it can be reconstructed without losing quality and information of the image. In this paper comparative analysis of image compression is done by three transform method, which are Discrete Cosine Transform (DCT),Discrete Wavelet Transform(DWT) & Hybrid (DCT+DWT) Transform. Matlab programs were written for each of the above method and concluded based on the results obtained that hybrid DWT-DCT algorithm performs much better than the standalone JPEG-based DCT, DWT algorithms in terms of peak signal to noise ratio (PSNR), as well as visual perception at higher compression ratio. Read More...
|
Electronics and Communication Engineering |
India |
56-60 |
17 |
A STRATEGIC PROGRAM FOR OVERCOMING STRESS THROUGH TIME MANAGEMENT IN WORK PLACES
-Mr. Deepak Kumar ; Dr. H Ramakrishna; Ms. Sneha.c
Stress is a state in which individual are forced with the need to make difficult or undesirable changes, in order to adapt to undesirable changes in order to adapt to undesirable events and situations. Stress may lead to negative emotions or motivating to do the best. In this study, it is attempted to consider simultaneously the major cause to stress is due to lack of time management so an effective strategic time management program is being applied to overcome stress. This study deals majorly with the techniques to be applied in the day to day’s activities of an individual in the work place to manage the stress. The cause of stress is due to unusual, inflexible working schedules, lack of time management skills and effective stress management strategies would result in reducing the stress, which results in improvement in the productivity. Read More...
|
INDUSTRIAL ENGINEERING AND MANAGEMENT |
India |
61-66 |
18 |
Performance Analysis for Node Auto Addressing in Mobile Ad Hoc Networks
-Mr.S. Mohanalingam ; Mr.D.Bright Anand M.Tech., (Ph.D).; Mrs.S,Priya., M.Tech.,
The key challenge in ad hoc networks is the Address assignment, due to the lack of infrastructure. A distributed and self-managed mechanism, to avoid address collisions in a dynamic network with fading channels, joining/leaving of nodes, and frequent partitions, require in an autonomous addressing protocols. A bloom filter is a simple, space-efficient, randomized data structure for concisely representing a static data set, in order to support approximate membership queries. It has great potential for distributed applications where systems need to share information about what resources they have. The space efficiency is achieved at the cost of a small probability of false positive in membership queries. However, for many applications the space savings and short locating time consistently outweigh this drawback. This paper introduces Dynamic Bloom Filters (DBF) to support concise representation and approximate membership queries of dynamic sets, and study the false positive probability and union algebra operations. It proves that DBF can control the false positive probability at a low level by adjusting the number of standard bloom filters used according to the actual size of current dynamic set. The space complexity is also acceptable if the actual size of dynamic set does not deviate too much from the predefined threshold. Thus this paper propose and analyze a dynamic bloom filter based addressing that configures mobile ad hoc nodes based on a distributed address database stored in filters that reduces the control load and makes the proposal robust to packet losses and network partitions. And also it evaluates the performance of the protocol, considering joining nodes, partition merging events, and network initialization. Simulation results show that the Dynamic Bloom Filter resolves all the address collisions and also reduces the control traffic when compared to previously proposed protocols. Read More...
|
Computer Science Engineering |
India |
67-71 |
19 |
Performance Analysis of Remote Monitoring and Mobile Object Tracking in Wireless Sensor Network
-Mr.S.Punithavel ; Mrs. M.Jothi., M.E; Mrs.S.Priya., M.Tech., Assistant Professor
Target Tracking is an important problem in sensor networks, where it dictates how accurate a targets position can be measured. In response to the recent surge of interest in mobile sensor applications, this paper studies the target tracking problem in a mobile sensor network (shortly called as MSN), where it is believed that mobility can be exploited to improve the tracking resolution. This problem becomes particularly challenging given the mobility of both sensors and targets, in which the trajectories of sensors and targets need to be captured. We derive the inherent relationship between the tracking resolution and a set of crucial system parameters including sensor density, sensing range, sensor and target mobility. We investigate the correlations and sensitivity from a set of system parameters and we derive the minimum number of mobile sensors that are required to maintain the resolution for target tracking in an MSN. The simulation results demonstrate that the tracking performance can be improved by an order of magnitude with the same number of sensors when compared with that of the static sensor environment. Read More...
|
Computer Science Engineering |
India |
72-75 |
20 |
History Generalized Pattern Taxonomy Model for Frequent Itemset Mining
-Jibin Philip
Frequent itemset mining is a widely exploratory technique that focuses on discovering recurrent correlations among data. The steadfast evolution of markets and business environments prompts the need of data mining algorithms to discover significant correlation changes in order to reactively suit product and service provision to customer needs. Change mining, in the context of frequent itemsets, focuses on detecting and reporting significant changes in the set of mined itemsets from one time period to another. The discovery of frequent generalized itemsets, i.e., itemsets that 1) frequently occur in the source data, and 2)
provide a high-level abstraction of the mined knowledge, issues new challenges in the analysis of itemsets that become rare, and thus are no longer extracted, from a certain point. This paper proposes a novel kind of dynamic pattern, namely the HIstory GENeralized Pattern (HIGEN), that represents the evolution of an itemset in consecutive time periods, by reporting the information about its frequent generalizations characterized by minimal redundancy (i.e., minimum level of abstraction) in case it becomes infrequent in a certain time period. To address HIGEN mining, it proposes HIGEN MINER, an algorithm that focuses on avoiding itemset mining followed by postprocessing by exploiting a support-driven itemset generalization approach.
Read More...
|
Computer Science |
India |
76-78 |
21 |
Different Outlier Detection Algorithms in Data Mining: A Review
-Amandeep kaur ; Kamaljit Kaur
Outlier is defined as an observation that deviates too much from other observations. The identification of outliers can lead to the discovery of useful and meaningful knowledge. Outlier detection has been extensively studied in the past decades. However, most existing research focuses on the algorithm based on special background, compared with outlier detection approach is still rare. Most sophisticated methods in data mining address this problem to some extent, but not fully, and can be improved by addressing the problem more directly. The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. This paper mainly discusses and compares approach of different outlier detection from data mining perspective, which can be grouped into statistical-based approach, distance-based approach, density-based approach, Information theoretic-based approach. Read More...
|
Computer Engineering |
India |
79-84 |
22 |
A NEW ALGORITHM:Efficient cost algorithms for reducing high toll transactions
-VINAY SINGH ; Dr.S.Gavaskar
Mining Cost Efficient item-sets from a transactional database refers to the discovery of transaction sets with Cost Efficient characteristics improving all profits. Although a number of important algorithms have been proposed in recent years, they incur the problem of producing a large number of candidate item-sets for Cost Efficient item-sets. Such a large number of candidate item-sets degrade the mining performance in terms of execution time and space requirement. The condition may become worse when the database contains lots of long transactions or long Cost Efficient item-sets. In this paper, we propose new algorithm, for mining Cost Efficient item-sets with a set of effective strategies for pruning candidate item-sets. The information of Cost Efficient item-sets is maintained in a tree-based data structure such that candidate item-sets can be generated efficiently with only two scans of database. Read More...
|
CSE |
India |
85-89 |
23 |
CLUSTERING UNCERTAIN DATA BASED ON FUZZY C-MEANS CLUSTERING
-SOBIN MATHEW
Data clusteringis the process of dividing data elements into classes or clusters so that items in the same class are as similar as possible, and items in different classes are as dissimilar as possible. Depending on the nature of the data and the purpose for which clustering is being used, different measures of similarity may be used to place items into classes, where the similarity measure controls how the clusters are formed.In many applications, data contains inherent uncertainty. A number of factors contribute to the uncertainty such as the random nature of the physical data generation and collection process and measurement error. As an example, consider the problem of clustering mobile devices continuously according to the periodic updates of their locations. One application of the clustering is the selection of a device as the leader for each cluster.Clustering on uncertain data, one of the essential tasks in mining uncertain data, posts significant challenges on both modeling similarity between uncertain objects and developing efficient computational methods. Fuzzy c-means (FCM) is a method of clustering which allows one piece of data to belong to two or more clusters. This method developed by is frequently used in pattern recognition.
FCM provides more value for validity index.Using FCM, more accurate clustering can be performed.
Read More...
|
Computer Science |
India |
90-93 |
24 |
A Review Of Parameter Optimization Of Electro Discharge Machine By Using Taguchi Method
-KAPIL BANKER ; Ujjval Prajapati; Jaimin Prajapati; Paras Modi
Electrical discharge machining (EDM) is one of the non-traditional machining processes, based on thermo electric energy between the work piece and an electrode. In this process, the material removal is occurred electro thermally by a series of successive discrete discharges between electrode and the work piece. The optimization of the parameters of the EDM machining has been carried out by using the taguchi’s method for design of experiments (DOE). In this research we have used taguchi’s method for design of experiments with three input parameters and their three levels using L9 orthogonal array. We have done 9 experiments with the tool material copper and work piece material AISI 304. The dielectric used is kerosene diluted with water. The objective of the analysis is to optimize the process parameters of EDM with the help of taguchi method and using Minitab software in terms of MMR. Read More...
|
MECHANICAL ENGINEERING |
India |
94-96 |
25 |
An Intelligent way of searching crime scenes on a video surveillance system
-Mr.B.Naresh Kumar ; Mr.I.Selvamani
With the increasing demands of visual surveillance systems, vehicle and people identification at a distance have gained more attention for the researchers recently. Extraction of information from images and image sequences are very important for the analysis according to the application. We present an image processing software suite, based on the Mat lab environment, specifically designed to be used as a forensic tool by law enforcement laboratories in the analysis of crime scene videos and images. Here the normal and abnormal actions of a human in any of the under surveillance place is determined and its edges been traced out with various image segmentation techniques. From the preprocessed image database feature vectors are extracted using two methods namely receptive field method and features from Gabor Filter. Features extracted from the database is used as an input of the classifier, which is a feed forward neural network (shortly called FFNN) on a reduced subspace learned by an approach simpler than principal component analysis (shortly called PCA). Once the neural network has been trained, the database will be classified into two categories: normal faces and suspicious faces. Thus suspicious frames are extracted which in turn make ease the process of crime identification. Read More...
|
Computer Science Engineering |
India |
97-101 |
26 |
Novel Method for Watermarking Outsources Dataset by Using Usability Constraint
-Mr.G.Bhuvanendran ; Mr.G.Karpagakannan
The large datasets are being mined to extract hidden knowledge and patterns that assist decision makers in making effective, efficient, and timely decisions in an ever increasing competitive world. This type of “knowledge discovery driven†data mining activity is not possible without sharing the “datasets†between their owners and data mining experts as a consequence, protecting. Usually, an owner needs to manually define “Usability limitations†for each type of dataset to preserve the contained knowledge. The major contribution of this paper is a novel formal model that facilitates a data owner to define usability limitations to preserve the knowledge contained in the dataset in an automated fashion. The model aims at preserving “classification potential†of each feature and other major characteristics of datasets that play an important role during the mining process of data; as a result, learning statistics and decision-making rules also remain intact. We have implemented our model and integrated it with a new watermark embedding algorithm to prove that the inserted watermark not only preserves the knowledge contained in a dataset but also significantly enhances watermark security compared with existing techniques. We have tested our model on more than twenty five different data mining datasets to show its efficacy, effectiveness, and the ability to adapt and simplify. Read More...
|
Computer Science Engineering |
India |
102-105 |
27 |
Comparative Study of THD in Two-level Inverter and Three-Level Inverter Fed AC Drives
-Samir B. Gharde ; Prof. Mrs. M. Nimbalkar
During the operation of AC motors theMultilevel voltage source inverters are prefer over conventional two level inverter as it offers several advantages, such as better output voltage with reduces total harmonic distortion (THD). The main objective of this paper is to compare the total harmonic distortion with current and voltage waveform of Induction motor to two-level and three level diode clamped inverter. The sinusoidal pulse width modulation technique (SPWM) is use for the control of both two-level and three level diode clamped inverter. Read More...
|
Electrical Engineering (IDC) |
India |
106-108 |
28 |
Review of Heart Disease Prediction using Data Mining Classifications
-Kamal Kant ; Dr. Kanwal Garg
In the research data mining techniques will helpful to handle this technique of predictive model. Research will show the most effective parameter of the heart disease prediction and will get the scenario for least predictive value and most predictive value in whole data mining technique. Initially need to identify the exact state of the user entering parameter which can be frequent item although random value of dataset in data modeling .This research has a prototype Heart Disease Prediction using data mining techniques, namely Naïve Bayes which in artificial Neural Network concept. Results show that each technique has its unique strength in identify the objectives of the defined mining goal and expert system .Researchers are using some medical exponent attributes such as age, sex, blood pressure and blood sugar , glucose and some related factors can predict the likelihood of patients getting a heart disease with its exact probability. Basically this technique is expended on the defected and non-defected parameter which works as result class. Read More...
|
Computer Science Engineering |
India |
109-111 |
29 |
The Effect of Supercharging on the Performance and Exhaust gas Emission of Diesel engine Fueled of Pyrolysis oil of waste Tyre and Diesel blend
-Damor Mukeshkumar Narayanbhai ; Yuvrajsinh Raol; Tushar patel; Gorav Rathod
In the present investigation The effect of supercharging on performance and exhaust gas emission of diesel engine fueled pyrolysis oil and diesel blend. oil taken is tyre pyrolysis oil which was obtained by the waste automobile tyres.in initial stage the test were conducted on Four stroke single cylinder water cooled diesel engine by using diesel at different engine load and at constant engine speed base line data was generated. Further the experimental were carried out on the same engine with same operation parameter at normal atmospheric pressure and different supercharging pressure 1.2bar and 1.5bar.
It was observed that the increasing supercharging pressure, the performance of the engine is gradually improving. Performance parameter like Specific fuel consumption is gradually Reduction with comparison Un-supercharging. Thermal efficiency is gradually increasing and Mechanical efficiency is also gradually increasing. Emission parameter CO, CO2 and HC emission are decreased significantly with supercharging.
Read More...
|
Mechanical Engineering |
India |
112-115 |
30 |
Green synthesis of molybdenum trioxide nanoparticles using syzygium aromaticum flower buds extract
-Abhimanyu Kanneganti ; K. Anil Kumar; V. Vivek
Molybdenum trioxide (MoO3) nanoparticles were synthesized in an eco-friendly and facile manner using syzygium aromaticum flower buds extract. The nanoparticles have undergone necessary characterizations like XRD, TEM, FTIR spectroscopy and UV spectroscopy, to confirm the obtained product, to study the size and morphology, functional groups and absorption spectra respectively. Read More...
|
Material science |
India |
116-117 |
31 |
An estimation of solidification time by varying pouring temperature in investment casting process.
-yogesh a. joshi ; harshad patel
Solidification is a very crucial factor for any casting process. Generally directional solidification will help to achieve a good quality casting product. It has been observed that casting defects like porosity, misrun, slag, etc can be minimize by providing directional solidification. Different rate of pouring temperature will also affect the solidification rate of casting and so quality of casting. Read More...
|
Mechanical engineering |
India |
118-120 |
32 |
An Experimental Study of Petrol Engine Using Compressed Biogas as a Fuel
-Vaghmashi Jayesh D. ; Mr.D.R. Shah; Mr.D.C. Gosai
Man in his lifetime, uses energy in one form or the other. In fact whatever happens in nature, results, out of the conversion of energy in one form or the other? The blowing of the wind, the formation of the clouds and the flow of water are a few examples that stand testimony to this fact. Of late, erratic and perfunctory usage of energy has resulted in an energy crisis, and there is a need to develop methods of optimal utilization, which will not only ease the crisis but also preserve the environment. This project attempts to show how man has been utilizing energy and to explore prospects of optimizing the same. Researches show that the world has already had its enough shares of its energy resources. Fossil fuels pollute the environment. Nuclear energy requires careful handling of both raw as well as waste material. The focus now is shifting more and more towards the renewable sources of energy, which are essentially, nonpolluting. The main sources of renewable energy in India are biomass, biogas, solar, wind and hydro power. Biogas is an attractive source of energy for rural areas. It can be produced from cow dung and other animal waste and also from plant matter such as leaves and water hyacinth – all of which are renewable and available in the countryside. Also called ‘‘gobar gas’’ Read More...
|
Mechanical engineering |
India |
121-124 |
33 |
Design stress analysis of metallic and non metallic spur gear
-Mehbub Vohra ; Prof. Kevin vyas
Gears are the very useful components in mechanical power transmission system and industrial rotating machinery. A spur gear generally subjected to two types of stresses like bending stresses and contact stresses which are causes teeth failure during meshing with another tooth. Gears are generally made from metallic materials but recently advanced polymers materials were developed which have sufficient strength and properties similar to the metallic materials so it can easily replace the metallic gears if some care will be taken. Nylon, polycarbonate, acetals and delrin are the structure polymers materials are used for gears in printing and robotics mechanism with good functionality but polymers gears are not used in heavy loading type application. Specially polymers gives extra benefits compared to metallic gears like less noise-vibration, low requirement of maintenance-lubrication, low cost and easy manufacturing. Static finite element analysis requires performing the design optimization process on both materials. This paper presents the design optimization methodology step by step for comparative analysis of metallic and polymer gears using static finite element analysis. Read More...
|
Spur gear design material analysis |
India |
125-128 |
34 |
Data Security in Cloud using RSA
-Ripal Patel ; Vishva Tanna; Dhaval Jha
The security of cloud computing has always been an important aspect of quality of service from cloud service providers. However, cloud computing poses many new security challenges which have not been well investigated .The prevalent problem associated with cloud computing is data privacy, security, anonymity and reliability etc. But the most important between them is security and how cloud provider assures it. The proposed work plan is to eliminate the concerns regarding data privacy using encryption algorithms to enhance the security in cloud as per different perspective of cloud customers. This paper focuses on issues relating to the cloud data storage methods and security in virtual environment. We propose a method for providing data storage and security in cloud using public key cryptosystem RSA. Further, describes the security services includes key generation, encryption and decryption in virtual environment Read More...
|
Information and Technology |
India |
129-131 |
35 |
Digital Signage Using Wireless Network
-Dharmisht dalsaniya ; jaydeep raiyani
this document gives Basic instructions for Digital signage system using Wi-Fi. This paper gives basic introduction how to operate with Digital Display wirelessly. In recent days we have digital signage system which basically needs to change their contents using pen drive or using internet but this paper gives introduction How to play with digital signage system wirelessly and enjoy good advertisement. So for that we try to find some solution regarding this research topic Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
132-136 |
36 |
Remotely Controlling of the Parameters Using LabVIEW and W5300 via Ethernet Interface
-Kaushal Patel ; Pramila Gautam; Kirit Patel
this application will be used to control various parameters such as Gain, Filter Frequency etc. in Electronics and Data Acquisition System. We will be using Ethernet Interface for remotely controlling and LabVIEW software for user interface. The TCP protocol is used for the data communication, which is one of the important features in DAQ systems. The prototype application has been designed using the WIZ830MJ Ethernet controller module which consists of the W5300 SoC chip, which is interfaced with FPGA. The Xilinx’s ISE is used to write a VHDL code in FPGA. The FPGA is programmed in such manner using VHDL to set the registers of W5300 to implement protocol in it and data communication for the electronics and data acquisition board. The prototype application has been implemented and tested in the lab. The paper will describe about the hardware and the software for the prototype application. Read More...
|
Electronics & communication Engg. |
India |
137-139 |
37 |
Building software based intelligent transport system; A storage networks analogy
-Aravind C V ; Dr. N K Cauvery
Access to Real time information on the services provided by a transport operator or different transport operators is the primary requirement of all the users of the transport system. This helps the passengers to attain zero waiting time and also plan their journey well in advance. This paper describes how to build a computer system, conceived as an intelligent system for public transport management. The goal of this system is to help users in planning their trip from a source location to a destination point. When building such a system we can note that its architecture is very similar to that of a storage network where the data migration takes place between a source storage system and a target storage system. Hence we can take this analogy to build an efficient intelligent transport system. Read More...
|
Computer Science |
India |
140-143 |
38 |
The solar based Wireless Electric Vehicle Charging (WEVC) and Transmitting Extra power to Electricity Mains
-Kiran singh.R ; Gopala K.R; Basavaraj Gunadal; Gautham hegde
The solar based Wireless Electric Vehicle Charging (WEVC) and Transmitting Extra power to Electricity Mains has several advantages over conventional energy transmission using wires and connectors, such as flexibility, convenience, safety, reliability and all-weather operation, etc. The development of this system will certainly promote the popularization and industrialization of EVs, and also an individual can earn by transmitting extra power to electricity mains. In this project we will be implementing a system for charging electric vehicles wirelessly by using the solar power. In order to design and implement we divide our project into two parts, in the first section we are trying to optimize the existing solar power system by transmitting extra power to electricity mains. In the second section we are designing the wireless power transmission system based on inductively coupled power transmission technology using the optimized solar power as input. Read More...
|
Power electronics |
India |
144-149 |
39 |
DETECTION AND REPRESENTATION OF THREATS AND ATTACKS ON PORTAL
-VidyaShree H R ; Asha
Managed Security Service is the analysis, and interpretation of log data. There is a need for organization investigators in locating internal and external threats/attacks. There is a requirement of software that should reduce the tedious efforts of organization examiners, especially when searching for dangerous attacks which may be a threat to the company. A method is proposed here that uses visualization techniques to represent attack statistics, such as attack location, attack date, when it was solved date, attackers etc. The user interface to this software displays graphical representation of log file about attacks. By viewing attack information graphically, the developed software will reduce the examiner’s analysis time and greatly increase the probability of locating attack evidence. The graphical representation of log files rather than traditional text will greatly aid the organizations by reducing the time to identify suspicious attacks and increases the probability of locating the criminal evidence. The purpose of this project is to correlate event data and represent these in a consistent context with the help of a graphical user interface.
The main objective is log extraction, statistics generation and graphical representation. This works by reading the log files generated by the firewalls and storing it to the repositories. Later database is then used to create a statistics page, GIF charts, attackers-map etc.
Read More...
|
Computer Science and Engineering |
India |
150-153 |
40 |
DEVELOPMENT OF LOG FILES ANALYSING TOOL FOR BMC REMEDY AR SYSTEM
-Lavanya G S ; Pushpa H G
Log files contain large amount of data which is used while debugging an application. Analyzing these software log files helps during testing and troubleshooting. A log file analyzer for BMC Remedy Action Request System (AR System) is presented in this paper. Log files grow very quickly depending on user activity and type of logging. Many times these log files grow to 200-300 Mbytes within 4-5 minutes. To physically go through such huge log files is very painful and consumes lot of time as well. To resolve this, application that can parse through these log files and trace the execution of workflows for given user and present the same in a graphical & intuitive interface is presented. Read More...
|
Computer Science and Engineering |
India |
154-157 |
41 |
Knowledge and Rule Based Learning Engine to Analyse the Logs for Troubleshooting
-Prashant Achari ; Susanta Adhikary; Mungara Jitendranath; Jayashree Madugundu
Technical support for software or hardware is always a challenge, both from the complexity and investment standpoint. Today the dependency on computers, networked systems and managing applications are becoming more dominant and only log files are available to trace the applications. Log file analysis process is heavily involved, in software, hardware as well as in network related domains. It serves for various purposes such as verifying the uniformity of the software functionality to the provided software specification, software performance check and troubleshooting the issues. Application log files or the logs generated by other monitoring tools are subjected to analysis for extracting information that can be vital in an investigation. These tasks demand competency to a great deal and are labor intensive when performed manually. There is no technique available to record expert knowledge and this stands as an obstacle to automate the analysis tasks. Hence there is a need for correlating information extracted from different locations in the same log file or multiple log files further adds to this complexity. This paper describes a practical approach for analysis of the logs using supervised learning to predict and to recommend steps for troubleshooting the issue. The overall solution proposed here is to automate the analysis of logs and provide recommendations for faster response to reported problems. The log analyser self-learns the new issue and provides necessary recommendations. Read More...
|
Computer Science |
India |
158-161 |
42 |
Automation of IT Service Management using Information Integrated techniques and machine learning of various processes in IT Service Management
-Archana.S.Huddar ; Deepmala.N
Automation of IT Service Management using Information Integrated techniques and machine learning of various processes in IT Service Management is used by Engineers to report IT issues in enterprise systems. ITSM knowledge management, which provides detailed design for function layers as data collection, information integration, knowledge processing and knowledge presentation, and is fully immersed with knowledge lifecycle management. ITIL is the most widely used IT service management framework. Domain experts are important clues to search for relevant documents in digital library information system. Most of these service requests are resolved by level-1 persons (service desk attendants) by providing information/quick-fix solutions to customers.
For each service request, level- 1 personnel identify important keywords and see if the incoming request is similar to any historic incident. Otherwise, an incident ticket is created and, with other related information, forwarded to incident's subject matter expert (SME) i.e. level-2 or level-3. Incident management process is used for managing the life cycle of all incidents. An organization spends lots of resources to keep its IT resources incident free and, therefore, timely resolution of incoming incident is required to attain that objective. Currently, the incident management process is largely manual, error prone and time consuming. In this paper, we use information integration techniques and machine learning to automate various processes in the incident management workflow.
Read More...
|
Computer Science and Engineering |
India |
162-166 |
43 |
An Efficient Load Balance Routing for Wireless Sensor Network
-Ms.K.Karthika ; Ms.D.Vetrithangam
Redundancy Management of heterogeneous wireless sensor networks, utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes. The concept of redundancy management is to exploit the tradeoff between energy consumption vs. the gain in reliability, timeliness, and security to maximize the system useful lifetime. Formulate an optimization problem for dynamically determining the best redundancy level to apply multipath routing for intrusion tolerance. A voting-based distributed intrusion detection algorithm is applied to detect and evict malicious nodes. Develop a novel probability model to analyze the best redundancy level in terms of path redundancy and source redundancy, as well as the best intrusion detection settings in terms of the number of voter sand the intrusion invocation interval under which the lifetime of network is maximized. The coverage time for a clustered wireless sensor network by optimal balancing of power consumption among cluster heads. Clustering significantly reduces the energy consumption of individual sensors, but it also increases the communication burden on CHs. Two mechanisms are proposed for achieving balanced power consumption in the stochastic case: a routing-aware optimal cluster planning and a clustering-aware optimal random relay. A sleeping node mechanism is used in order to gain maximum energy. Read More...
|
Computer Science Engineering |
India |
167-171 |
44 |
Advanced Encryption Standard and Hash Authentication in Service-Oriented VANETs
-S.Chandrapandian ; Mrs.R.Adaline Suji; Mr.M.Srinivasan
Inter vehicular communication lies at the core of a number of industry and academic research initiatives that aim at enhancing the safety and efficiency of transportation systems. Vehicular ad hoc networks (VANETs) enable vehicles to communicate with each other and with roadside units (RSUs). Service oriented vehicular networks are special types of VANETs that support diverse infrastructure-based commercial services, including Internet access, real-time traffic management, video streaming, and content distribution. Many forms of attacks against service-oriented VANETs that attempt to threaten their security have emerged. The success of data acquisition and delivery systems depends on their ability to defend against the different types of security and privacy attacks that exist in service-oriented VANETs. This paper introduces a system that takes advantage of the RSUs that are connected to the Internet and that provide various types of information to VANET users. We provide a suite of novel security and privacy mechanisms in our proposed system and evaluate its performance using the ns2 software. We show, by comparing its results to those of another system, its feasibility and efficiency. Read More...
|
Computer Science and Engineering |
India |
172-176 |
45 |
SYNCHRONIZATION OF ONE PPS SIGNAL ON LINUX ENVIRONMENT
-Joshi Ronak Narendrakumar
As in present scenario, GPS is a very popular device among users for tracking and navigation purpose. This tracking and navigation procedure is based on many GPS receivers. Mostly all GPS receivers provides one PPS (Pulse per second) signal which is most required for synchronizing procedures. In many GPS receivers 1 PPS signal can be generated using spacial dedicated commands which is given to receiver and according to that command, 1 pps signal can be generated at the dedicated pin of the receiver. This paper is focused on the Generation of one PPS signal in the Linux environment. In the Linux operating system the same one pps signal is generated using specific daemon program based on Network Time Protocol and gpsd. Read More...
|
Electronics & Communication Engineering |
India |
177-179 |
46 |
A HIGH SPEED BINARY SINGLE PRECISION FLOATING POINT MULTIPLIER USING DADDA ALGORITHM AND PARALLEL PREFIX ADDER
-Mr. Shailesh Kumar ; Prof. Padmapriya Patil
Floating Point Arithmetic is extensively used in the field of Digital signal processing, Medical imaging, motion capture, audio application including broadcast and musical instruments .Many of these applications need to solve linear systems that use fair amount of matrix multiplication. The multiplier conforms to the IEEE 754 standard for single precision. The IEEE standard for Binary Floating point Arithmetic (IEEE 754)is most widely used standard for Floating point computation and is followed by many CPU and FPU implementation. An algorithm called Dadda algorithm is introduced here for reducing the partial product of multiplier unit single precision format. In this thesis to improve speed of multiplication of mantissa is done by using Dadda algorithm replacing carry save multiplier. The sub-module have been written in Verilog HDL and then synthesized simulated using Xilinx ISE 12.4. To find overall more speed of multiplication of two 32 bit Floating point numbers the exponents of two 32 bit Floating point numbers is calculated as Ea +Eb -127.Here exponent addition takes place by using kogge stone adder instead of Ripple carry adder which is used earlier. Earlier speed was 526 MHZ but the use of Dadda algorithm in mantissa multiplication and kogge stone adder in the exponent calculation increases the speed and reduces the delay time. So the kogge stone adder is faster adder and reduces delay. The Floating point multiplier is developed to handle overflow and underflow cases. Read More...
|
ELECTRONICS ENGINEERING |
India |
180-184 |
47 |
Design Of Lead Screw Mechanism For Vertical Door Wrapping Machine
-Gohil Mehul Valjibhai ; Prof. Jignesh Patel
Now days to stay in competitive environment every industry should be cost effective and should provide quality product with in time. To achieve higher productivity and quality products at low cost, industry should go towards semi-automation or automation. Operations that are repeating in nature should be automated. In steel doors manufacturing industries packaging of doors is on of the operation that is mostly done manually. Manual operation requires more manpower, more time, higher cost, and low quality at a time more fatigue at apart of worker, hence lower productivity. So packaging operation of doors should perform using semi-automatic or automatic wrapping machine. In vertical wrapping machine consist of rotating base which holds the door and vertical lead screw mechanism which holds the stretch film roll and moves up and down for wrapping. In this research design and modelling using Creo parametric-2 of vertical lead screw mechanism is done and analysis of stresses and deformation is also done using ANSYS 13.0 software. Read More...
|
Mechanical Engineering |
India |
185-188 |
48 |
EDV-HOP: NODE LOCALIZATION ALGORITHM FOR WIRELESS SENSOR NETWORKS.
-PREET KANWAL ; Dr. SIDDARAJU
Localization is an essential issue in Wireless Sensor Networks(WSNs). Localization algorithms can be categorized as centralized or distributed algorithms. DV-HOP(distance-vector hop) is an example of Distributed algorithm, which provides an effective result when number of nodes is extremely large. We propose a simple technique for improving the performance of DV-HOP algorithm based on shortest path distance estimates, even when number of sensor nodes deployed is small called EDV-HOP(enhanced distance vector hop). The Localization error and Position Efficiency using EDV-HOP is low as compared to DV-HOP, hence depicting an improvement in accuracy of estimated positions of unknown nodes. Read More...
|
COMPUTER SCIENCE & ENGINEERING |
India |
189-192 |
49 |
Optimization of weld bead geometry in metal active gas welding process using Taguchi method
-panchasara bharatkumar vinodbhai ; pawaan panchal; yuvraj raol
Gas Metal Arc Welding is a process in which the source of heat is an arc format between consumable metal electrode and the work piece with an externally supplied gaseous shield of gas either inert such as argon, helium and Carbon dioxide etc. In this study attempts to optimize the Metal active gas Welding (MAG) process parameters (Gas flow rate, Power, Wire feed rate.) on responses (like: Bead Geometry, Means Bead width and Bead Height) using Taguchi techniques. The MS C20 material was chosen For the study. L16 orthogonal array is selected for experimentation and Regression analysis will used for modelling the responses. The most significant parameter for Bead Width and Bead Height is Power. In case of Bead Width and Bead Height the Power % Contribution is 89.71% and 70.49% respectively. Read More...
|
mechanical engineering |
India |
193-195 |
50 |
Derivation of Operating Point for Reactive Power Pricing
-Komal D. Fulwani ; Komal D. Fulwani; Alpesh S. Adesara; Ravi R. Chanadarana
Many electrical power utilities, worldwide, have been forced to change their way of operation and business, from vertical integrated to unbundled open market structured. The main aim of the restructuring is to bring some form of deregulation or re-regulation in certain part of electricity business sector in order to allow competition in wholesale and retail level. In addition, it is expected to provide choice and social benefit to customers. In any interconnected system, if the change in reactive power at any single bus is happened it affects all the other buses connected to that bus. So if the point has been found at which the reactive power is changed, the right allocation of the price can be done. Read More...
|
Electrical Engineering |
India |
196-198 |