No. |
Title and Author |
Area |
Country |
Page |
101 |
Configurable Design and Simulation of Synchronous Retry Buffer for PCI-Express 3.0 Data Link Layer
-Tejas A. Bavarva
PCI-Express is a high performance, general purpose I/O interconnect communication protocol. This paper presents the detailed implementation of configurable, exclusive and synchronous retry buffer used in PCI-Express data link layer transmitter with control logic that manages write and read operations, generates status flags and provides optional handshake signals for interfacing with user logic. It is often used to control the flow of packets between transmitter and receiver. It also represents various flags like fifo_full, fifo_empty, fifo_ae, fifo_af, fifo_hf and err. In this way, data integrity between transmitter and receiver is maintained. RTL coding of retry buffer has been written in Verilog language and it is simulated and verified in Modelsim PE student edition tool. At the end of the design, Linting and Synthesis have been done with the help of Xilinx Vivado tool and analyzed timing, power and utility report. Read More...
|
M.E. VLSI & EMBEDDED system design (Electronics & communication Engineering) |
India |
413-416 |
102 |
Investigation on DDOS attacks over MANET
-MONIKA AGGARWAL ; MONIKA AGGARWAL ; PANKAJ KAPOOR
In recent years, the rapid proliferation of wireless networks, usage of wireless devices and deployment of many mobile computing devices and applications has changed the shape of network security. One field which needs more security is the mobile ad hoc network (MANET). The term “ad hoc†means self-organized nodes that do not have a central entity to govern them. Network security plays a crucial role in this MANET and the traditional way of protecting the networks through firewalls and encryption software is no longer effective and sufficient. Denial of service attacks include deliberately dropping packets instead of forwarding them, as well as actively interfering in the communication of neighbouring nodes. A malicious node could attempt to flood the network with its own unicast data packets, potentially using many different destination addresses. In this paper, we analyze the performance of OLSR routing protocol under two different DDOS attacks namely fake hello link flooding and low rate TCP target attack over MANET. we also evaluate the effect of RED-a defense mechanism, against low rate TCP target attack. Read More...
|
computer science |
India |
417-422 |
103 |
Two-level Prediction Model using k-means clustering for Web Browsers Usage
-nisha yadav
Due to the popularity of World Wide Web, many organizations have changed the way of doing business, which supplements the quick development of E-commerce directly and makes the development of web usage mining expertise crucial. Predicting of user’s visiting behavior is an important technology of E- commerce application. The prediction results can be used for personalization, building proper websites, improving marketing strategy, promotion, product supply, getting marketing information, predicting market trends, and increasing the competitive strength of organizations etc. Markov model has been used for studying and understanding stochastic processes, and well suited for modeling and predicting a user’s browsing behavior on a web at category level. Bayesian theorem can be used to infer users’ browsing behaviors at webpage level. In this paper, we use the k-means clustering to cluster users’ browsing behaviors. The prediction results by Two Levels of Prediction Model framework work well in general cases. However, Two Levels of Prediction Model suffer from the differences in user’s behavior. The experiments will show that our model has higher hit ratio for prediction. Read More...
|
computer science and engineering |
India |
423-426 |
104 |
Prediction of User Queries Dynamically in Intelligent Query Answering Systems to Improve Relevance and Accuracy Using Recommendation Agents
-Jayashree M.G ; Rajkumar R
Recommendation agents (RAs) are software agents that elicit the interests or preferences of individual consumers for products, either explicitly or implicitly and make recommendations accordingly. Recommendation Agents have the potential to support and improve the quality of the decisions consumers make when searching for and selecting products online. In this paper, a model of recommendation agents is proposed which query over distributed knowledge bases with heterogeneity for our web-based intelligent query answering systems. Ontologies which are the key technology used to describe the semantics of information exchange are also introduced. These Ontologies provide a shared and common understanding of a domain that can be communicated across people and application systems and thus help knowledge sharing and reuse. This model improves the relevance of the query results. Read More...
|
Computer networking & Engineering |
India |
427-429 |
105 |
Digital Watermarking Techniques using DCT and Correlation based Schemes applied on Video Frames
-Deepak Kumar ; NeelKamal
Research in information hiding has grown explosively. However, many questions still exist concerning the potential of the technology and its role in establishing and upholding intellectual property rights in the digital age. This work, provides an overview of information hiding, outlining its main disciplines (covert channels, steganography [1], digital watermarking, and anonymity), and some applications current driving interest. The focus is on the current status of and prospects for digital watermarking [2], devoting special attention to a taxonomy based on insertion domain, applicability, and types of existing algorithms. In this paper, a method is presented, to apply existing watermarking embedding and recovering techniques applied on extracted video frames, to cater the digital watermarking needs of the world by concentrating on embedding the watermarks in the R-G-B planes of colour images. For intellectual property right protection of multimedia images, the colour image is watermarked three times by embedding the same watermark in each plane of multimedia image. Multimedia images are divided into R-G-B colour planes and watermarks are inserted into the individual colour planes. One or more watermarks can be inserted into one or more of the colour planes. The authentication process consists of retrieving the watermarks from all the three colour planes and a final watermark is constructed from the intersection of all the retrieved watermarks. The proposed work has been implemented in both spatial domain and transform domain. For spatial domain, threshold-based correlation watermarking scheme is used whereas, for transform domain DCT based watermarking is done. Read More...
|
Video Watermarking |
India |
430-434 |
106 |
GStreamer Based VMS
-Karan Gandhi ; S.Anand Kumar; prof. Vijay patel
VMS (Video Management System) is a system which manages access and controls the IP cameras. VMS software running on a Windows or Unix/Linux server, supplies the basis for video monitoring via GUI.
In General people have VMS on their desktops so they have to stick in front of desktop but here we are introducing a system which runs on Android based phones and tablets and even on web browsers so people don’t have to stick with their desktops they can walk over the premises (where Wi-Fi is necessary) and see the streaming of any IP camera in their android based phone or tablet so you are under surveillance every time even if the controller of VMS is not on their spot. Even ifthey can stream the particular IP camera on the web browser they just need to run the HTML from the server and give the IP of camera on edit text field in browser.Here in this Paper we have introduced “GStreamer Based VMSâ€, the design is based on GStreamer which is a multimedia framework. The System we have developed is compatible with Windows & Linux desktop (It’s a desktop based VMS made with Java), Android phones & Tablets and All the browsers which has enabled Java plugin (It’s a Java Applet).
Read More...
|
Software Engineering |
India |
435-440 |
107 |
"Built In Quality"- New Trend in Automobile Industry For Quality Improvement.
-Anil Avinash Shinde ; DR. B.E.Narkhede
“Quality is what the customer perceives to be acceptable to achieve his/her enthusiasmâ€. For every successful organisation Quality is the most important aspect and any non conformance cannot be tolerated in its product. As automobile industry is one of industrial sector which totally depends on the quality.More quality provided by industry more customer satisfaction and ultimately higher profit earning. To achieve customer satisfaction and increase profit ratio now a days some automobile industry develop their own quality techniques in which one technique is “Built in Quality†used by one of the leading automobile manufacturing industry. This paper highlights the basic methodology and requirements of BIQ (Buil in Quality). Read More...
|
Production Engineering |
India |
441-445 |
108 |
Design and Analysis of Multi-Secured Signatures of a Single Sign- on Mechanism for Distributed System
-sumangala patil ; Niharika
Single Sign–on is a new authentication mechanism for user to use multiple services provided by service provider in distributed computer network. It is a one type of application in that allows users to log in once and access to multiple independent applications without being asked to log in again at every application. It enables a legal user with a single credential to be authenticated by multiple service providers in distributed computer networks. In this paper, however, it is shown that most existing SSO schemes have not been formally proved to satisfy credential privacy and soundness of credential based authentication. To overcome this drawback an efficient verifiable encryption of RSA signatures has been proposed. Read More...
|
Computer Networking and Enginering |
India |
446-448 |
109 |
Design of PID Controller Using Modified Relay base Ziegler Nichols Method
-Patel Harsh Bharatbhai
This Paper concerned with the designing a low cost PID temperature controller. Because of their simplicity, robustness and successful practical application, PID controllers are the most popular and widely-used controllers in industry. Many PID design methods have been proposed, each has its advantages and limitations. However finding appropriate parameters for the PID controller is still not easy task. The objective is to achieving an important design compromise, acceptable stability, linearity and medium fastness of response. In this paper, Atmega128 has been used as a brain to the prototype. PID controller has been selected as a controller because it has faster response than the conventional on-off controller. The experimental result reveals that the PID controller can be implemented into the low cost prototype and able to control the temperature according to standard regulation. Read More...
|
Electronics and Communication Engineering |
India |
449-452 |
110 |
FRECCA based Sentence Level Text Clustering
-Nikita Gangshetty ; Prof, Mr. Manoj Kumar H
Sentence clustering plays an important role in many text processing activities. In comparison with hard clustering methods, in which a pattern belongs to a single cluster, fuzzy clustering algorithms allow patterns to belong to all clusters with differing degrees of membership. This is important in domains such as sentence clustering, since a sentence is likely to be related to more than one theme or topic present within a document or set of documents. For example, consider web mining, where the specific objective might be to discover some novel information from a set of documents initially retrieved in response to some query. By clustering the sentences of those documents intuitively can expect at least one of the clusters to be closely related to the concepts described by the query terms. However, because most sentence similarity measures do not represent sentences in a common metric space, conventional fuzzy clustering approaches based on prototypes or mixtures of Gaussians are generally not applicable to sentence clustering. It is a novel fuzzy clustering algorithm that operates on relational input data; i.e., data in the form of a square matrix of pair wise similarities between data objects. The algorithm uses a graph representation of the data, and operates in an Expectation-Maximization framework in which the graph centrality of an object in the graph is interpreted as likelihood. Results of applying the algorithm to sentence clustering tasks demonstrate that the algorithm is capable of identifying overlapping clusters of semantically related sentences, and that it is therefore of potential use in a variety of text mining tasks. It also includes results of applying the algorithm to benchmark data sets in several other domains. Read More...
|
Data Mining |
India |
453-456 |
111 |
Performance and Emission Analysis of Two Stroke Four Spark Plug Single Cylinder SI Engine with Gasoline Fuel
-HARDIK A. PATEL ; J. J. GOSWAMI
Two stroke spark ignition engines have high exhaust emissions and low brake thermal efficiency due to incomplete combustion, which occur during idling and at part load operating conditions. An effort is been made to improve the engine parameters i.e. specific fuel consumption and Thermal Efficiency of the engine and reduction in exhaust emission. This is achieved three basic methods, designing the combustion chamber to achieve an efficient combustion, optimizing operating parameters, i.e. equivalence ratio, spark timing etc. to reduce pollutant emissions and Using after treatment devices in the exhaust system (catalytic converters etc.) Many researchers had found the effect of dual and triple spark plug on engine performance & exhaust emission. This study is aim to find the effect of four spark plug on performance and exhaust emission of two stroke single cylinder spark ignition engine with gasoline fuel. Various performance & exhaust emissions test were carried out on engine with load using four spark plugs. It indicates that brake thermal, indicated thermal, mechanical efficiency increase as compared to using single spark plug. Also it shows significant reduction in HC and CO emission which indicates increase in combustion efficiency. Read More...
|
Automobile |
India |
457-459 |
112 |
One Cycle Controlled Single Phase Ac to Dc Bidirectional Converter
-Parmar Hasmukh R.
A one cycle controlled single phase four switch standard bridge boost rectifier is proposed here. One cycle control (OCC) technique is a nonlinear control technique which has fast transient response, excellent power source perturbation rejection ,robust performance. The OCC technique is universal and suitable for the control of PWM converter and Resonant based converter for either voltage or current control. The control structure neither require the service of PLL nor the sector information of utility voltage. This makes control scheme robust and simple. The proposed control approach is simple and reliable as it composed of an integrator with reset , along with a few linear and logic component. This controller employ constant frequency modulation , which is desirable for Industrial Application. Detail simulation study is carried out to verify the efficacy of the proposed scheme. Read More...
|
Electrical Engineering |
India |
460-465 |
113 |
Survey of Cast Shadow Detection Methods
-BILEESH P BABU ; SHOBHA G
Illumination conditions cause problems for many computer vision algorithms. Shadows in an image may lead to failure of segmentation, tracking, or recognition algorithms. Cast shadows always move with their corresponding objects such that background subtraction cannot separate them accurately. This might lead to object merging, object shape distortion, and object losses. Shadows should be identified and removed in order to provide a correct description of the objects. In this paper, different methods used to detect cast shadows are discussed. Read More...
|
Computer Science and Engineering |
India |
466-470 |
114 |
Design and analysis of ball mill for paint industries
-Patel Mayur Hasmukhbhai ; Vishal A. Pandya
The work present in this paper focuseson the ball mill used in paint industries for optimizing the parameter like i) Selecting optimum thickness of mill, ii) selecting optimum diameter of gear shaft. iii) Selecting optimum diameter of idle shaft. By optimizing above parameter we can reducing running cost of ball mill. Optimizing is done by Modeling and Analysis of parts of ball mill by using ‘Finite Element Method’. Read More...
|
mechanical engineering |
India |
471-476 |
115 |
REDUPLICATION IN VIRTUALIZATION OF IMAGES IN CLOUD
-K. Hari Hara Kumar
Information de duplication is a specific information pressure strategy for dispensing with double duplicates of rehashing information. This system is utilized to enhance stockpiling usage and to open-source cloud successfully diminish the plate space for putting away multi-gigabyte virtual machine (VM) pictures. Lived is one of the lived duplication document frameworks which empowers deduplication stockpiling of VM pictures in anopen-source cloud.cloud registering has developed as a standout amongst the most persuasive innovations in the IT business and is quickly changing the way IT assets are overseen and utilized.livedfs has a few different characteristics, including spatial region, prefetching of metadata, Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud Read More...
|
computer science and engineering |
India |
477-482 |
116 |
Recognizing Occluded 3d Face Using Block Matching Algorithm and PCA
-Riddhi Patel ; Shruti B. Yagnik
With improvement in sensor technology 3d face recognition has become an imminent technology due to its non co-operative nature. Many researches in 3d face recognition have been dealing with the problem of pose variation, expression, aging and occlusion. We show that under utmost occlusion due to hair, hands, scarves, hates, glass typical 3d face recognition system exhibit poor performance. This paper presents restoration strategy for effective 3d face recognition. In this paper we propose two algorithms for occlusion detection and face recognition. First the occluded face region is detected by matching blocks with the original face. The non occluded regions are then used to restore the missing information. BMA used to restore occluded face. Then apply PCA for recognition. The experimental results show the higher computational efficiency and robustness to occlusion. Read More...
|
Computer Engineering |
India |
483-486 |
117 |
Green Computing: Optimization of Data Centers for Resource Allocation by Server Virtualization
-Anil Kumar K ; Manoj Kmar H
Cloud computing allows scale up and down server resource usage based on the application needs. Cloud resources come from resource multiplexing through virtualization technology. In this paper, a system is introduced that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing. A virtual machine is created by virtualizing the physical machine and it is used as a server with its own set of resources. The skewness algorithm is used to generate a alarm to indicate that the virtual machine reached its higher threshold level. When an alarm is generated a required resources can be added to the virtual machine without any downtime. Read More...
|
Computer Networking Engineering |
India |
487-489 |
118 |
Analysis of Junction based Routing algorithm for VANETs
-JHALA DUSHYANTSINH HARSHADSINH ; Neha Sisodiya
In this research paper the focus will be on the JunctionÂbased Multipath Source Routing. It is a geographic routing protocol, in the sense that it exploits the location of the nodes and also of the street junctions, known via digital street maps. The main idea is that it maintains concurrently two paths from the source to the destination as a series of junctions the packets should pass through, and not as a series of nodesÂrelays. JMSR injects the routing information inside each packet, according to the source routing paradigm, so that every node on the path is aware of the route the packets should follow. In this paper the ananlysis of this algorithm is done, merits and demerits of the algorithm are derived. Read More...
|
Computer Engineering |
India |
490-492 |
119 |
honeypot- tacking hackers
-vaibhav kumar gupta
For every consumer and business that is on the Internet, viruses, worms and crackers are a few security threats. There are the obvious tools that aid information security professionals against these problems such as anti-virus software, firewalls and intrusion detection systems, but these systems can only react to or prevent attacks-they cannot give us information about the attacker, the tools used or even the methods employed. Given all of these security questions, honeypots are a novel approach to network security and security research alike.
A honeypot is used in the area of computer and Internet security. It is a resource, which is intended to be attacked and compromised to gain more information about the attacker and the used tools. It can also be deployed to attract and divert an attacker from their real targets. Compared to an intrusion detection system, honeypots have the big advantage that they do not generate false alerts as each observed traffic is suspicious, because no productive components are running on the system. This fact enables the system to log every byte that flows through the network to and from the honeypot, and to correlate this data with other sources to draw a picture of an attack and the attacker. This paper will first give an introduction to honeypots-the types and uses. We will then look at the nuts and bolts of honeypots and how to put them together. Finally we shall conclude by looking at what the future holds for the honeypots and honey nets.
Read More...
|
network security |
India |
493-496 |
120 |
An Improved TCP Westwood Congestion Avoidance Algorithm to Increase Throughput
-Vivekkumar Majithiya ; Prof Priyang Bhatt
TCP is a transport layer protocol which provides reliable and connection oriented transmission. The main problem of TCP is in wireless networks. In wired network, packet loss is mostly due to network congestion, while in wireless network the packet loss may be due to network congestion or may be due to mobility of nodes. TCP starts its back off procedure when it detects packet loss, if the packet loss is due to node movement then the back off procedure will be unnecessary and it will create delay in the network. There are many TCP variants available. TCP Westwood (TCPW) is a sender-side-only modification to TCP New Reno that is intended to better handle large bandwidth-delay product paths (large pipes), with potential packet loss due to transmission or other errors (leaky pipes), and with dynamic load (dynamic pipes). In this paper a better mechanism for congestion avoidance is suggested for TCP Westwood to increase throughput. Read More...
|
Computer Network |
India |
497-500 |
121 |
Application of AFEC in Speed Regulation of Motor using PWM Switching
-Sumit R. Patel
The research work is carried with the aim of developing an efficient closed loop speed regulation of Motor using PWM switching. SPWM technique has been used for providing triggering pulse to the AFEC and Inverter both in which IGBT is used as switch. It is very accurate method as it is concern with the modulation of the amplitude and frequency. Frequency modulation provides regulated control for varying the speed of the motor while amplitude modulation provides variable amplitude of output voltage and current. By changing Modulation index (ma) amplitude of the output voltage and current can be controlled. PWM is one of the best methods for the controlling the output voltage especially SPWM because it make it possible to control frequency and magnitude both in Induction motor. It is also used for the reduction of the harmonics from the system. The controlling or regulating the motor includes turn ON – desired speed for operation – turn OFF. AFEC has advantage of drawing balanced supply even in the unbalance supply form Utility. Using Matlab simulink this operation will be shown with the details like THD analysis, output voltage, output current, triggering signals for switching. Total circuitry controlling will also be developed in the Matlab. Applications of AFEC will be developed in Matlab simulink and the required triggering signals from PWM generator. The use of AFEC will enhance the speed regulation method for Induction motor. The comparative results of open loop and closed loop will conclude as the use of AFEC will make the controlling method more reliable and effective as the closed loop feedback goes through PI controller. Read More...
|
Electrical Engineering, Power Systems / Power Electronics |
India |
501-509 |
122 |
Application Of Brain-Computer Interfaces For Human Life
-D. Shobana
Advances in neuroscience and brain imaging technologies have began to offer United States of America withthe power to interface directly with the human brain. This ability is formed potential through the employmentof sensors which will monitor a number of the physical processes that occur at intervals the brain that correspond with bound varieties of thought. Researchers have used these technologies to create brain-computer interfaces (BCIs), communication systems that don't depend upon the brain’s traditional output pathways of peripheral nerves and muscles. In these systems, users expressly manipulate their brain activity rather than exploitationmotor movements to supply signals which will be wont to management computers or communication devices. Human-Computer Interaction (HCI) researchers explore potentialities that enable computers to use as severalsensory channels as potential. to boot, researchers have began to think about implicit varieties of input, that is, input that's not expressly performed to direct a laptop to try and do one thing. Researchers arrange to inferdata regarding user state and intent by perceptive their physiology, behaviour, or the surroundings during which they operate. exploitation this data, systems will dynamically adapt themselves so as to support the userwithin the task at hand. BCIs are currently mature enough that HCI researchers should add them to their tool beltonce planning novel input techniques. Read More...
|
Computer Science |
India |
510-516 |
123 |
Utilizing Kaizen System Methodology to Increase Productivity of Shell Fabrication
-Ajit B. Mavale ; P.M.Ravanan; Sushant S. Takekar; Krishna R. Dachawar; Sunil M. Raut
The improvement in the productivity is a very challenging task. To improve productivity, it is important that the full involvement of the personnel. The productivity is simply defined as the ratio of rate of output to the unit rate of input. Productivity depends on factors such as process, quality, labour & production. To increase or improve the productivity we must improve the factors affecting it. In this paper, the productivity is improved by solving the problem related to process. In this problem is understood through the Kaizen technique. In that the all personnel are involved to solve the problem related to processes in the shell fabrication shop (SFS) & reached to the proper solution which is elaborated in this paper. This project utilizes Kaizen Methodology to determine the probable cause and the solution for the productivity issue in the fabrication shop. The technique involves removal of the Non-Value Added Activities in order to bring about a reduction in setup time. This leads to reduced redundancy of activities in process. Read More...
|
Mechanical Engineering |
India |
517-519 |
124 |
RAINFALL-RUNOFF MODELING USING ARTIFICIAL NEURAL NETWORKS : A CASE STUDY OF KHODIYAR CATCHMENT AREA
-MAHESH B. SHRIVASTAV ; Prof. Haresh m. Gandhi; Prof. Kashyap B. Gohil; Prof. Nirav D. Acharya; Mr. Jignesh A. Joshi
An Artificial Neural Network (ANN) methodology has been employed to develop Rainfall-Runoff Model as a function of rainfall, temperature, evaporation losses, infiltration losses and humidity for the Khodiyar catchment located in Amreli district, Gujarat, India,. The investigation of sensitivity of the modeling accuracy to the content and length of training data has been carried out. The comparison of ANN rainfall-runoff model was done favorably by obtaining results using existing techniques including statistical regression model. The ANN model provides a more systematic approach, reduces the length of calibration data, and shortens the time spent in calibration of the models, at the same time, it represents an improvement upon the prediction accuracy and flexibility of current methods. Read More...
|
CIVIL ENGINEERING |
India |
520-525 |
125 |
Low Power Pipelined RISC Processor :A Review
-PRIYANKA TRIVEDI ; RAJAN PRASAD TRIPATHI
Reduced Instruction Set Computing or RISC is design strategy predicated on the CPU design strategy. Pipelining is the concept of overlapping of multiple Instructions during execution time. Pipeline is work on the task function it can splits one task into multiple subtasks. This paper is a fixated on pipelining concepts and the low power techniques which are required for the RISC CORE Processor .low power techniques avail to reduce power and heat dissipation and lengthen the battery life. Read More...
|
Electronics Engineering |
India |
526-528 |
126 |
Effect of welding parameters on Burn-Off Length For Friction Welding Of Inconel 718 And SS 304 For Production Of Bimetal Poppet Exhaust Valve
-Prashant Rashmikant Pandya ; Amol Bagesar; Jignesh Patel
Friction welded joints are formed in the solid state by the heat generated by friction. As the technological advancements take place on daily bases the advancements in automobiles are not out of the race. Any form of boosting for engine power leads to increased temperatures and pressures in the combustion chamber, and much higher exhaust gas temperatures. The exhaust valve, which already has much higher temperatures to deal with than the inlet valve in a naturally aspirated engine, will see its temperature increase still further. So bi-metal valves made of Inconel 718 and SS 304 are under development. Exhaust valves are required to be very precise. They are produced by friction welding. The objective of the following study is to study the effects of the parameters on the on the burn-off of friction welded In conel 718 and SS 304 for production of Bi-metal Poppet Exhaust Valve. The study here discuses the use of Design of Experiments by Taguchi Method. Here Orthogonal Array of L25 is used. Using multiple linear Regression and ANOVA effects on the burn-off of welding by Welding Parameters (Rotational Speed, Friction Pressure and Time) are analyzed using MINITAB 17. Read More...
|
Mechanical Engineering |
India |
529-533 |
127 |
Survey: An effective method to handle data with DHT and balancing the load over P2P network
-G.BHAVADHARINI ; M.NARAYANAN
Peer to peer systems is a class of decentralized and distributed system. The participating node in the peer to peer systems acts as a both client and server whenever it is needed for another peer system. Whenever the storage is done on a system it is shared among all peers and also whenever the retrieval is done it is also shared among all peers. This makes an advantage of reliability, robustness and scalability. To avoid a situation of getting heavier loads than other peers the peer to peer systems must be provided with the loads to the all participating peers. This covers sending and receiving message that is the communication cost and computational power for requesting process. When the messages an forwarded from one peer to another peers they are exposed to a routing loads for queries during the information lookup and they only traverse them. And the traffic loads usually consist of both communication and computational power. The loads balancing in the peer to peer system are mainly based upon DHTs. The DHT are generally made to be well balanced under a flow of request and the request must be uniform. For example the objects having equal popularity that is the similar amount of request should be sent to all nodes Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
534-538 |
128 |
Design of Optimized BMU for QPSK Modulation scheme for Wi-MAX
-Venugopal Patankar ; Dr. SARIKA TALE
Digital communication systems usually represent an increase in complexity over the equivalent analog system. Digital communication has become the most preferred option because of the increased scale of integration, sophistication and reliability of digital electronics for signal processing. In the proposed system the discrete data are EX-OR'ed with randomizer and Convolutionally encoded to transmit data securely. The data is rearranged in Block Interleaver and it is modulated by QPSK (Quadrature Phase Shift Keying) for increasing the signal strength by adding carrier signal and transmitted over to a AWGN (Additive White Gaussian Noise) channel. In the receiver side the received signal is demodulated using QPSK. The scrambled bits are rearranged by Block De-Interleaver and these bits are decoded by Viterbi Decoder. The extra bits decoded by Viterbi Decoder is removed by de-Randomizer which results in original discrete source data. The viterbi decoder increases the channel capacity by adding redundant bits to original bits, it performs Euclidean Distance approach to calculate the distance between the neighbouring signal points, so it performs complex operations. Efficient and secure data transmissions helps to achieve minimum computation. Read More...
|
Digital Electronics and Communication Systems Engineering |
India |
539-543 |
129 |
DYNAMIC TRAFFIC CONGESTION CONTROL SCHEME IN MANET WITH COOPERATIVE COMMUNICATION
-VEERLPATI RAJU
Cooperative communication has received tremendous interest for wireless networks. Most existing works on cooperative communications square measure centered on link-level physical layer problems. Consequently, the impacts of cooperative communications on network-level higher layer problems, like topology management, routing and network capability, square measure mostly neglected. during this article, It proposes a Capacity-Optimized Cooperative (COCO) topology management theme to enhance the network capability in MANETs by together considering each higher layer network capability and physical layer cooperative communications. Through simulations, It shows that physical layer cooperative communications have important impacts on the network capability, and also the topology management theme will well improve the network capability in MANETs with cooperative communications. It is implementing to improve the performance of the topology network so it has using the traffic aware method of the network topology. In this implementation It can improve the network performance on their resources on the method. Read More...
|
Eletronics and Communication Engineering |
India |
544-547 |
130 |
Experimental Study of Pulsed Current Gas Tungsten Arc Welding & Development of Parameters For Fillet Welding of DP28W Tubes using Slope Equation Function
-Amey Deshmukh ; Prof. M. R. Nagare
In this experimental work tests were conducted on the fillet weldments of DP28W using GTAW with pulsed current on Tubes. The aim of this experimental work is to aid development of parameters for Pulsed Current GTAW using slope equations, see the effect of pulsed current on the characteristics of weldments, and to compare the heat input between pulsed and non-pulsed GTAW. The experimental results pertaining to different welding parameters for the above material using pulsed current and non-pulsed GTAW are discussed. Read More...
|
Production Engineering |
India |
548-550 |
131 |
Low Voltage Ride through Capability Improvement of Fixed-Speed Induction Generator: A Review
-S.H. Senghani ; Prof. D.P. Pipalava
Environmental and political impact for a sustainable development have encouraged the growth of electrical generation from renewable energies. A pressing demand for more electric power coupled with depleting natural resources has led to an increased need for energy production from renewable energy sources such as wind and solar. The latest technological advancements in wind energy conversion and an increased support from governmental and private institutions have led to increased wind power generation in recent years. Wind power is the fastest growing renewable source of electrical energy Wind power generation of electricity is seen as one of the most practical options and with better relation cost-benefit inside the energetic matrix now a days. This study provides the results of a study conducted to assess the “Low Voltage Ride through Capability improvement of Fixed-speed induction generator using STATCOM†in a power system. Read More...
|
Distributed Generation |
India |
551-555 |
132 |
Cross Platform Cross Browser VMS Plugin
-Meet Patel ; Karan Gandhi; Sudhir Bhaduaria; Prof. Vijay Patel
A Plug-in is a piece of software that manages internet content that browser is not designed to process. These usually include patented formats for video, audio, online games, presentations, and more. In this competitive era of technology people want to work from any device like Smartphone, tablet, desktop and laptop with different operating systems. So need of cross platform technology is high. This paper gives an idea of how a plug-in works, its life cycle. Once plug-in gets loaded into memory how to display video/image to any browser window (Cross Browser). Read More...
|
Software Enginnering |
India |
556-559 |
133 |
Data Management Challenges in Cloud Computing Infrastructures
-venkata subba reddy
The challenge of building consistent, available, and scalable data management systems capable of serving petabytes of data for millions of users has confronted the data management research community as well as large internet enterprises. Current proposed solutions to scalable data management, driven primarily by prevalent application requirements, limit consistent access to only the granularity of single objects, rows, or keys, thereby trading off consistency for high scalability and availability. But the growing popularity of “cloud computingâ€, the resulting shift of a large number of internet applications to the cloud, and the quest towards providing data management services in the cloud, has opened up the challenge for designing data management systems that provide consistency guarantees at a granularity larger than single rows and keys. In this paper, we analyze the design choices that allowed modern scalable data management systems to achieve orders of magnitude higher levels of scalability compared to traditional databases. With this understanding, we highlight some design principles for systems providing scalable and consistent data management as a service in the cloud. Read More...
|
computer science engineering |
India |
560-565 |
134 |
E- Teaching of Analytical Chemistry : Tools and Technology with special reference to Atomic Absorption Spectroscopy (AAS)
-AMIT KUMAR ; DHARMESH KUMAR SHRIWASTAV; DEEPAK KUMAR; NEHA
Teaching is a process by which an instructor uses different methods to make understand a subject to a person who do not know about it and make him/her learn it. In this scenario of dot com age, the electronic mode of delivering knowledge and making it understood according to mechanism of learning using various multimedia tools, Information and communication technology is e-teaching.
Empowering this by using various forms of electronic media, information and Communication technology is called technology enhanced learning. The purpose of introducing “e-teaching of analytical chemistry: - Tools And Technology†has been undertaken with a view to put forward a new approach to classify the techniques covering the whole span of analytical chemistry with special reference to Atomic Absorption Spectroscopy (AAS). This includes all conventional and non-conventional techniques.
This methodology finds its scope in imparting education and connectivity for integrating our knowledge with the advancement in the field of chemistry. We have tried our level best to suggest the modified way of teaching by using interactive multimedia tools like power point presentations, Corel draw, 3D-images and figures etc. Thus the present paper incorporates e-teaching of analytical chemistry, discuss strategy of selection mode of compilation of e-database and explain the span of analytical chemistry and focus on the topic of the study i.e.; Atomic absorption spectroscopy (AAS).
Read More...
|
Chemistry |
India |
566-567 |
135 |
Static Analysis of Helical Compression Spring used in Vibration Absorber with Nonlinear Parameters
-AMIT ASHOK HINGANE ; Prof.Dr. S.H.SAWANT
In this paper static analysis of helical compression spring is carried out theoretically, numerically and experimentally in order to find out effect of geometric nonlinearities. For Numerical analysis ANSYS software is used. Experimental set up is developed in order to find out load-displacement characteristics of spring. Load- displacement characteristics are studied in order to find out nonlinearities present in spring. Nonlinear model to describe nonlinearities in spring is developed. Read More...
|
Mechanical Engineering |
India |
568-570 |
136 |
Significant of Signal Integrity in High Speed Board Design
-Kamal B. Parmar ; Paresh R. Valand
Digital designs are partial without transmission lines. It has no usually suffered by issues related with transmission line effects. At lower Frequencies the signals remain within data description and the output data same as input data. But as system speeds increase, the higher frequency impact on the system output means that not only the digital properties, but also the analog effects within the system are not ignorable. These problems are likely to come to the forefront with increasing data rates for both I/O interfaces and memory interfaces. Transmission line effects can have a considerable effect on the data being sent. At low speeds, the frequency response has little influence on the signal, unless the transmission medium is particularly long. However, as speed increases, high-frequency effects take over and even the shortest lines can suffer from problems such as ringing, crosstalk, reflections, and ground bounce, seriously hampering the response of the signal. How you can overcome these issues that described in this manuscript for good design techniques and simple layout guidelines. Read More...
|
Electronics & Communication Engineering |
India |
571-573 |
137 |
A SURVEY ON SIDE VIEW BASED FACE RECOGNITION
-ASHUTOSH CHANDRA BHENSLE ; ROHIT RAJA
Face recognition using Side-view is a difficult problem with numerous applications. In real-life scenarios where the environment is uncontrolled, dealing with pose variations up to side-view positions are a significant task for face recognition. In this paper, we talk about the use of side view face recognition systems used in safety applications. Our objective is to recognize persons. Here, we compare available databases suitable for this task, and re-examine current methods for face recognition. Read More...
|
COMPUTER SCIENCE ENGINEERING |
India |
574-577 |
138 |
Reusable Verification Environment :Case Study SPI
-Ripalkumar Patel ; Kavankumar Pandya
This project paper introduce with uniform verification environment using system Verilog as well as gives appropriate direction about reusability of verification environment’s components. This project paper divides with five sections. First section contains overview of SPI interface protocol. Second section is about physical interface for SPI protocol. Third section leads towards verification environment using system Verilog and over view about verification components. Fourth section is about Master VIP using reusability of environment’s components of SPI protocol with simulation results and coverage report using VCS. Fifth section is about Slave VIP using reusability of environment’s components of SPI protocol with simulation results and coverage report using VCS. Read More...
|
VLSI Verification Technology |
India |
578-581 |
139 |
Image Encryption and Decryption Using VHDL
-Kushal Patel ; Prof.Sneha shah
Presently on a daily basis sharing the information in image form over web is becoming a significant issue due to security problems. Thus lots of techniques are needed to protect the shared information in academic degree unsecured channel. The present work target cryptography to secure the image data whereas causing inside the network. Encryption has come up as a solution, and plays a very necessary role in image data security. This security mechanism uses MAES algorithm to scramble information into unclear text which can be exclusively being decrypted by party those possesses the associated key. Read More...
|
Electronics & Communication Engineering |
India |
582-584 |
140 |
Privacy Preserving Mining of Transaction Databases
-Sunil R ; Dr. N P kavya
In this paper, A company (data owner) lacking in expertise or computational resources can outsource its mining needs to a third party service provider (server) taking the advantage of cloud computing. However, a business can have many suppliers and/or customers and may have a set of transactions associated with each one and also the items in the outsourced database and the patterns of items that can be mined from the database are considered as the private property of the corporation (data owner). To protect the corporate privacy, the data owner transforms its data and ships it to the server. The server sends extracted patterns to the owner in response to the mining queries. The owner recovers the true patterns from the extracted patterns received. Here the problem of outsourcing the association rule mining task within a corporate privacy-preserving framework is studied. Proposed model based on background knowledge of Fast Encryption Algorithm (FEAL) Cryptosystem an encryption/decryption strategy for providing security and hence enabling privacy-preserving of outsourced mining task, and protection against the privacy violation attack. Read More...
|
Computer Science and Engineering |
India |
585-590 |
141 |
Automatic Multiple Channel Serial I/O Interfacing Using FPGA Kit
-Krupa Patel ; Sneha Shah
The Digital input and output interface could be a important part for a machine needed to be interacted with its setting. Even though a main processing unit (MPU) utilized within the machine has its own Digital input output channel, for some cases, the machine should use plenty of input output channel than those the MPU can offer. To avoid this downside, a process board interfaced on to the MPU via serial communication is intended. If the MPU connect with multiple process boards directly, it's going to waste sometime to process of communication data. The inessential measure of the MPU and likelihood to have many boards connected, a serial interface unit supported FPGA is developed to help the MPU to talk with process boards. The FPGA unit automatically browses serial signals from each process boards and save understood data to share registers for MPU to scan. The FPGA unit put together impromptu reads registers written by MPU and send registers values to process boards automatically. Read More...
|
Electronices & Communication Engineering |
India |
591-594 |
142 |
Assessing Groundwater Vulnerability to Seawater Intrusion in Morbi-Maliya Using GALDIT Method
-Savariya Prayag R. ; Bhatt Neelkanth J.
This study presents the application of the GALDIT method, for the mapping of ground water vulnerability to sea water intrusion in the Morbi- Maliya region of the saurashtra coast line. Chachadi andLlobo-ferreira initially in 2001 had developed the GALDIT method. Later in 2005, they had modified the method which is specific for coastal aquifers. The GALDIT index is based on four intrinsic hydrogeological parameters, one spatial parameter and one boundary parameter. The parameters of GALDIT index are: Ground water Occurrence (aquifer type), aquifer hydraulic conductivity, depth of ground water level above the sea level, distance from the shore, impact of existing status of sea water intrusion in the area, and thickness of the aquifer. Each GALDIT parameter has been evaluated with respect to the other to determine the relative importance of each factor. GALDIT index is calculated after deciding the Weightage, range and rate of each factor. GALDIT index is used for study of the Ground water Vulnerability to sea water intrusion. Results shows that Maliya taluka is more prone to sea water intrusion as compare to Morbi taluka. Read More...
|
Civil Engineering |
India |
595-599 |
143 |
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTION
-Srujan kumar
In reversible data hiding techniques, the value of the data are modified using some rules and the original data can be restored after the extraction of hidden data on the receiver side. The optimal rule value modification under a payload distortion is done by using iterative algorithm .it calculates the estimated embedded image-original image .Here estimated errors are modified according to the optimal value transfer. The images are divided into the subsets. A receiver was successfully able to extract the secret data and recover the original content in the subsets in the inverse order hence the good payload distortion can be achieved. Read More...
|
computer science |
India |
600-602 |
144 |
Mining Big Data: Status and Outlook to the Future
-Joice .K.Manuel
Big Data is another term used to recognize the datasets that because of their huge size and multifaceted nature, we cannot oversee them with our current strategies or data mining delicate ware instruments. Big Data mining is the competence of concentrating valuable data from these expansive datasets or streams of data, that because of its volume, variability, and speed, it was not conceivable before to do it. The Big Data test is turning into a standout amongst the most energizing open doors for the one years from now. We show in this issue, an expansive outline of the point, its present status, contention, and gauge to what's to come. We present four articles, composed by in researchers in the held, coating the most fascinating and state-of-the-workmanship subjects on Big Data mining. Read More...
|
Computer Science Engineering |
India |
603-606 |
145 |
Implementation of Value Analysis Technique For Cost Reduction-Quality Preservation
-Pratap T. Shahane ; Madhukar R. Nagare
In today’s highly competitive marketplace, working better, smarter and delivering quality based products on time at more effective cost is crucial for all types of industries. This intensifies and enforces all the manufacturing industries to produce better quality products with least possible cost. Production of best Quality product with least possible cost can be possible by reducing the production of non-value adding attributes. A case study was carried out in one of the manufacturing industry. It has major applications in sheet metal working. During study, few non-value adding elements were observed and causes behind that were found out by using Value Analysis technique, cause & effect diagram and Pareto analysis. The limitations of this study are maintaining product within functional and aesthetic perfection, customer satisfaction, etc. It is concluded from the study that the part quality is lying within customer requirements, manufacturing processes and at lowest production cost with minimum wastage production. Read More...
|
Mechanical Engineering |
India |
607-610 |
146 |
Modelling of Fine Blanking Process
-Sunil Bhanudas Mate
During the past decade, one clear trend has been observed in the production of metal components. That is every industry work hard to minimize the time required to launch the new product in the market and reduce the cost of operation to maximize profit. As blanking process is the most widely used separation technique in the world but the analysis of blanking process is not done up to that instinct. And also in present day product should be dimensionally so accurate produced by blanking processes, hence it is necessary to study the factors or parameter which are directly or indirectly affect the dimensional tolerance of the blanking product. Metal blanking is a widely used process in high volume production of sheet metal components but after blanking, burr formation at edges of the product is observed and it is not match with the close dimensional tolerance and hence it is need to do the debarring process which is increasing the cost of production and time require for production. Fine blanking is process which helps us to minimize the burr size and like conventional blanking process there are so many parameter which influence the burr height of the product so our main objective of this is to develop a model to predict optimum value of such parameter which influence the burr height of product in fine blanking process and developed the model. The model investigates the effect of potential parameters influencing the blanking process and their interactions. This helped in choosing the process leading parameters for two identical products manufactured from two different materials blanked with a reasonable quality on the same mold. Read More...
|
Production Engineering |
India |
611-616 |
147 |
Optimization of Roll over Protection Structure
-Syed Khaisar Sardar ; Kiran Narkar; Prof. Dr. D. R Panchagade
Vehicle accidents are of major cause to lead severe injuries and probability of occurrence of death when injury rate is severe. A rollover is a type of vehicle accident in which a vehicle tips over onto its side or roof due to the high centre of gravity and working on slopes and uneven terrain. The most common cause of a rollover is loss of balance when speed of the vehicle is too fast. All vehicles are susceptible to rollovers to various extents. After a rollover, the vehicle may lie on its side or roof, and block the doors complicating the escape for the passengers. Earthmovers are equipped with protective structure which even under rollover, provide safe zone (no intrusion by the structure) for operators. Such Rollover Protective Structures (ROPS) are expected to meet minimum performance criteria to ensure occupant safety. ROPS is likely to collapse towards the occupants and cause severe head injuries as the space left for survival reduces drastically. This Paper depicts the importance of the Finite Element Analysis performed on newly designed SD190 FULL ROPS as per ISO 3471. It also handles the Optimization study performed on few of the load carrying parts in the Structure. Read More...
|
Mechanical Engineering |
India |
617-621 |
148 |
design and parametric study of microstrip antenna for uwb applications
-jaya kaushik ; arun kumar
Since the beginning of the human civilization mankind is trying to communicate with the others. It’s the communication process i.e. the sharing of feelings, emotions and information has made us the greatest creation of God on this green earth. It all started with hand gestures, then sounds. Communication. in wireless communication we mainly exploit the Electromagnetic Spectrum. Earlier systems were narrowband long range systems but in order to extend the use of available spectrum we are now using UWB (ultra-wide band) short range systems which require low power and these are built using in expensive digital components. A microstrip antenna is a narrowband, wide-beam antenna fabricated by etching the antenna element pattern in metal trace bonded to an insulating dielectric substrate, such as a printed circuit board. Microstrip antenna is used for implementing UWB systems as it shows good broadband characteristics. We propose a Slotted MSA (Microstrip Antenna) for UWB (Ultra-Wide Band) applications. The aforementioned antenna is designed using IE3D SOFTWARE. This design consists of a rectangular patch U-shape antenna, two slots have been used which are at the ground. The technique used for feeding is the aperture feeding technique.FR4 substrate has been used because of its lost cost and good reproductivity. The proposed Antennas were successfully designed, simulated and measured showing broadband features, stable radiation patterns and consistent gain. Measured results and graphs show validity of our suggested design. Read More...
|
electronics and communication |
India |
622-624 |
149 |
Testing Wordpress using Selenium Tool
-neha gaur
When we say test case it brings up the picture of a script/program/algorithm that tests a system for its excellence. In software companies the test cases are mostly written in natural language. These are mostly rules that a Quality analyst follows while testing a given scenario. Since we have to test the whole system again and again for its quality and perfection. Therefore we need automation testing more than the manual testing clearly to save our time and efforts. We usually define a technique to create automation test. The input for the technique is the steps written in any language and the output is the results after program calls without any interference of human. This paper includes an introduction of testing, testing types and automation test of wordpress using selenium automation test tool. Read More...
|
information technology |
India |
625-628 |
150 |
Matrix based Elliptic Curve Cryptography Protocol(MECCP)
-Jagannathan M ; Devaraju B M
ECC has gained a lot of focus over a past ten years in literature simply because of its performance. The reason behind this is that ECC when compared with RSA and some other cryptographic algorithm it provides equal security for a smaller key bit size so with this it has less work in processing part. this project, we present a novel mapping of text message into multiple points on Elliptic Curve by using addition table. Then, we describe a new method for encryption and decryption based on matrices. Further, this project also attempts to utilize the properties of invertible matrices in encryption and decryption process with more flexible and efficient. The proposed method enhances the security of ECC with multi fold encryption. Read More...
|
computer science and engineerinng |
India |
629-631 |