No. |
Title and Author |
Area |
Country |
Page |
151 |
Test case prioritization for regression testing using Ant colony optimization
-Mr. Mehul patel
Regression testing is a crucial and often costly software maintenance activity. In order to regain confidence in correctness of the system whenever modifications are made, we retest the software using existing test suite. But regression test suites are often too large to re-execute in the given time and cost constraints and thus, it becomes essential to prioritize the tests in order to cover maximum faults in minimum time. In this paper, ant colony optimization is used, which is a new way to solve time constraint prioritization problem. This paper presents the regression test prioritization technique to reorder test suites in time constraint environment along with an algorithm that implements the technique. We performed an experiment to evaluate the effectiveness of the proposed algorithm and compared it with other techniques using APFD metrics. Read More...
|
computer engineering |
India |
632-636 |
152 |
Pedestrian Speed-Flow Relationship for Mehsana City
-Jinal Thakkar ; Rajat Mishra
The proper estimation of pedestrian speed-flow-density relationships is of vital importance, because such Relationships play an important role in developing useful tools for analyzing and improving pedestrian facilities in Terms of efficiency and safety. Data collected at Mehsana city at five different routes are analyzed to study the influencing factors and their effect on pedestrian walking speed. The results are compared in five routes of Mehsana city with respect to age and gender of pedestrians, cell phone usage, baggage and accompaniment. Further analysis was conducted on the mean walking speed of pedestrians with regard to several factors. Gender, age, and the group size were found to significantly influence the pedestrian mean walking speed. Read More...
|
Traffic and Transportation Engineering |
India |
637-639 |
153 |
A SURVEY OF COLORECTAL CANCER DETECTION USING VARIOUS SEGMENTATION TECHNIQUES IN IMAGE PROCESSING
-SHANTHA LAKSHMI G ; B. Mohamed Faize Basha; M. Mohamed Surputheen
Colorectal cancer is cancer that starts in the colon or the rectum inside the large intestine. Detecting and screening of colorectal cancers are done by a Computed Tomography (CT) colonography. Digital images of colon polyps are analyzed to detect the colon cancer at an early stage. The goal of segmentation approach is to segment the cancer region accurately. In this paper, various segmentation techniques of colorectal cancer detection are discussed. Several methods and algorithms are used to capture the thin boundary of the cancer images. The segmented candidates are typically characterized by features describing like the polyp shape and its internal intensity distribution. The aim of each paper is to attain greater accuracy and to produce good segmentation results of colonic polyps. Read More...
|
COMPUTER SCIENCE (IMAGE PROCESSING) |
India |
640-642 |
154 |
Single Window Customs Clearing Management System
-Chandini G
Customs Clearing Management System (CCMS) plays a prominent role in international trading operations. It is responsible for the collection of import taxes, the enforcement of prohibitions and restrictions as well as the collection of statistics. It examines the Single Window concept and its development is in practice over the last 5 years and provides an analysis of its development over time. In order to improve the customs clearance procedures, the paper analyses the main anomalies and bottlenecks related to import and export of goods. The paper puts forward two considerations to the existing system. Firstly, it adds consideration to port location or inspector group. Second, the introduction of a new application form named Onsite Inspection Request form for particular category of goods. Read More...
|
Computer Science |
India |
643-645 |
155 |
Optimization Of Condenser Using Nanofluid
-Bhavik Dhamecha ; Jiten J. Makadia
according to thermodynamics, the efficiency of surface condenser is based on mass flow rate of cooling water. To reduce the mass flow rate of cooling water in surface condenser, some of the nanofluids are insert with them and measure various parameters like inlet & outlet temperature, mass flow rate water with mixed nanofluid, a particular mass flow rate will be decided and from that volume concentration. From this mass flow rate and volume concentration of nanofluid, the optimized condenser design will be start. Read More...
|
Mechanical Engineering |
India |
646-650 |
156 |
Heat Pipe Based Heat Exchanger: A Review
-Dnyaneshwar G. Chavhan ; Pramod R. Pachghare
Heat pipes are two-phase heat transfer devices with high effective thermal conductivity. Due to the high heat transport capacity, heat exchanger with heat pipes has become much smaller than traditional heat exchangers in handling high heat fluxes. With the working fluid in a heat pipe, heat can be absorbed on the evaporator region and transported to the condenser region where the vapor condenses releasing the heat to the cooling media. Heat pipe technology has found increasing applications in enhancing the thermal performance of heat exchangers in heating the vehicle compartment in cold countries, to recover heat from exhaust air in mini- dryer, in thermal radiator, in waste heat recovery from waste water. Read More...
|
Mechanical Engineering |
India |
651-654 |
157 |
Improvement in Ocean Thermal Energy Conversion using Solar Boosting Techniques
-Gitansh Sharma ; Abhijeet Narwal
Ocean Thermal Energy Conversion (OTEC) is a method to generate power using the heat trapped by the ocean water due to incident solar irradiations. It utilizes the small temperature difference that exists between the warm surface water and cold deep water of the ocean. This paper describes the Solar and Wave boosting techniques that can be employed in OTEC plant to increase thermal efficiency and work output of an OTEC plant. Using the solar boosters, the OTEC cycle efficiency increases to 13%. And using the wave boosters the pump work is obtained by harnessing the energy of the wave motion of water. Read More...
|
Mechanical Engineering |
India |
655-657 |
158 |
Biodiesel: An Alternative Fuel for I.C. Engines
-Abhijeet Narwal ; Gitansh Sharma
With the advancement in technology and increasing industrialization of world there has been an increase in energy demand. This energy requirement is primarily met by petroleum based fuels, which being non-renewable in nature necessitates finding alternative fuels which are renewable. Biodiesel is one of the alternatives which are renewable. Biodiesel is a biofuel, produced from biomass. These include biodiesels, biogas, bio-alcohols, and etc. This paper reviews the characteristics, production methods, methods of purification, and effects of biodiesels on diesel engines and current statuses of biodiesels. The paper also discusses biodegradability, lubricating properties, stability, economic feasibility, and emissions of biodiesels as engine fuel. Read More...
|
Mechanical Engineering |
India |
658-664 |
159 |
A Content Based Image Retrieval System Study Using Fuzzy Approach
-Manju Bala ; Pankaj Kapoor
This paper aims to study and analyze the Content Based Image Retrieval System using fuzzy approach. The problem involves entering an image as a query into a software application MATLAB that is designed to employ CBIR techniques in extracting properties of image and matching them. This is done to retrieve images from the database that are visually similar to the query image. The query image features under consideration were color, shape and fuzzy rule sets. Using matching and comparison algorithms the color, shape and fuzzy rule sets extracting feature of one image are compared and matched to the corresponding feature of another image. This comparison is performed using color histogram, shape with Euclidian distance metrics and fuzzy rule sets, these metrics are performed one after another, so as to retrieve database images that are similar to query image. Read More...
|
Computer Science Engineering |
India |
665-667 |
160 |
TRAFFICE SIGNAL DESIGN AND CO-ORDINATION BETWEEN TWO INTERSECTIONS OF DHANSURA-SHAMLAJI ROAD-A CASE STUDY OF MODASA CITY
-Manojkumar R Chaudhary ; H K Dave; V M Patel
There are two objectives for this research. One is to develop an effective procedure to optimize intersection signal timing by minimizing total delay for both vehicles and pedestrians. The second objective is to establish guidance for pedestrian crossing phase selection and the length of WALK phase when scramble crossing is used. An optimization procedure for signal plans on intersections is developed. The object of this report is to give traffic engineers or technicians in the cities of the emerging world a brief introduction to traffic signals, together with some practical guidelines on how to use them to obtain good and safe results. The lack of traffic signal conspicuity is often cited as a contributing factor by drivers who are involved in accidents at intersections. As such, increasing the conspicuity of traffic signals should lead to improved safety performance. This paper describes a project to determine the road safety effectiveness associated with improved signal design and better co-ordination between two intersections. A time-series evaluation was completed to investigate the effectiveness of the improvements to the traffic signal on road safety performance. Anecdotal information concerning the effectiveness of the improved traffic signals were also collected and evaluated. Read More...
|
Civil engineering |
India |
668-671 |
161 |
REVIEW OF HEAT TRANSFER ENHANCEMENT USING DIFFERENTS TYPES OF INSERTS AND THEIR ORIENTATIONS USING PASSIVE TECHNIQUES
-Sitender Dahiya ; Sunil Dhingra
Heat transfer enhancement techniques are used to increase rate of heat transfer. Many industries are utilizing thermal systems wherein overheating can damage the system components and lead to failure of the system . The excessive heat so generated must be dissipated to surroundings to avoid such problems for smooth functioning of system. In order to overcome this problem, thermal systems with effective emitters such as ribs, fins, baffle etc. are desirable. This review paper based on different types of baffles and their different orientation or arrangements. According to recent studies these are known to be economic heat transfer augmentation tools. Read More...
|
Mechanical Engineering |
India |
672-674 |
162 |
concurrent engineering
-Mr.Prathamesh Deelip Kankekar ; prof. D.V.Pendam; Mr.rajvardhan S. Repe; Mr. Ajit B. Mavale
Concurrent engineering has also been identified by business organization as a simultaneous engineering, life cycle engineering, parallel engineering, integrated product and process development. Concurrent engineering practices have considerably matured over the last decade. However many companies still face enormous challenges while implementing and managing practices of C.E. This is due to the increased complexity of engineering products process on one hand and lack of concurrent engineering tools on the other hand. So in this paper important tools of concurrent engineering are discussed. Also in this paper main focus is given on how to implement concurrent engineering in industry with its major benefits and obstacles. Read More...
|
Mechanical Engineering |
India |
675-678 |
163 |
Heat Transfer Enhancement in a Channel Flow with Built-in Equilateral Triangular Prism in Zig-Zag Arrangement
-Manoj Kumar ; Asst. Prof. Sunil Dhingra; Sumit Kumar
In this research work, heat transfer and fluid flow characteristics in a channel in the presence of triangular prism have been numerically investigated in the laminar and turbulent flow regime. The computations are performed for Reynolds number varying from 50 to 500 for laminar, 5000 to 20000 for turbulent and blockage ratio (BR) of 0.25, where blockage ratio is the ratio of prism base to the channel height. The Navier Stokes equation and the energy equation are solved by using Fluent [14.0]. The unstructured triangular mesh is used for the computational domain. The objective of this study is to investigate the effect of the spacing between the channel wall and triangular prism on heat transfer and fluid characteristics. The results shows that in the presence of triangular prism in zig-zag arrangement, the average Nusselt number is 10.72 % more as compared to presence of a single triangular prism. It is further observed that the heat transfer increases with the increase in Reynolds number (Re).The enhancement is due to the formation of vortices which travels long way in the downstream direction. However the heat transfer enhancement is associated with greater pressure drop. Read More...
|
Mechanical Engineering |
India |
679-683 |
164 |
Comparative analysis of BBBC and GSA algorithms for automated test data generation Using symbolic execution method
-Gurbaksh Singh ; R.P. Garg
In recent years various heuristic optimization methods have been developed. in this paper compares two new meta-heuristic techniques namely Gravitational Search Algorithm (GSA) and Big-Bang Big-Crunch (BBBC) algorithms for automatic test case generation using path testing criterion in symbolic execution environment. We have experimented on two real world and benchmarked programs Triangle Classifier (TC) and Line-Rectangle Classifier (LRC) showing the applicability of these techniques in genuine testing environment. Result show that both algorithms perform well in comparison to random testing but fail to generate test cases where input domain size is large. Read More...
|
Computer Science & Engineering |
India |
684-687 |
165 |
Performance and Emission Test of Alumina Coated Four Stroke Single Cylinder SI Engine Using LPG as Fuel
-Mr. Hitesh Buhecha ; Prof. I. H. Bhoraniya; Prof. D. J. Patel
This Experiment presents concept of thermal barrier ceramic coating in Internal Combustion Engines. This experiment was aimed to study effect on performance and emissions results of LPG fuelled Engine with Alumina coating. In this experiment Performance and Emission test is done with coating & without coating for Four stroke single cylinder spark ignition Engine parts. Coating is done on Piston crown & Valve bottom surface circular area.. Test is done for Load v/s Brake power, brakes thermal Efficiency, Specific fuel consumption & also for Emission results. Result is Brake Power is slightly decreases & fuel consumption reduces, Thermal Efficiency increases & Emission result is also improved. So Overall performance and emission results are improved. Read More...
|
Mechanical Engineering |
India |
688-691 |
166 |
CFD Analysis of Pressure Relief Valve
-Kishan J Patel
Diaphragm valve is a shut off valve, which is used for open/close application. One of the variant of diaphragm valve is a weir type diaphragm valve, in which a dam like structure called weir is placed in the middle of the valve. When diaphragm is stretched up to weir, the flow stops. However, even in open condition, the weir obstructs the flow. That is why if design is not proper, drastic pressure drop can occur. This make designers to use CFD analysis to find values of various flow parameters and simulate flow in weir type diaphragm valve which helps to improvise flow characteristics of the valve. Generalised procedure to perform CFD analysis of a weir type diaphragm valve is discussed in this paper. Read More...
|
Mechanical Engineering |
India |
692-694 |
167 |
server failures enabled javaspaces service
-P.SHYAM PRASAD
JavaSpaces service is a Distributed Shared Memory (DSM) implementation. It has been introduced by Sun Microsystems as a service of the Jini system. Currently, JavaSpaces support client side fault tolerance. It enables both transaction and mobile coordination mechanisms for such purpose. The application failures could be detected and recovered. However, server side failures may occur during the application runtime. Therefore, it is important to supply JavaSpaces with a mechanism that handles such type of failures dynamically. On the other hand, An example of a system that supports both server and client fault tolerance over DSM is TRIPS system. TRIPS protocols are suitable to be integrated in JavaSpaces to supply it with server fault tolerance capabilities. In this study, a server Failures Enabled Javaspaces Service (FTJS) is introduced. FTJS is based on the dynamic failure detection and recovery mechanisms implemented by TRIPS. However, FTJS is able to handle both client and server side failures. The analysis, design and implementation issues of FTJS are introduced. Read More...
|
computer science engineering |
India |
695-698 |
168 |
Conditioning monitoring of transformer using Sweep frequency response for winding deformation
-Mr. Ronak Hiteshkumar Vaishnav ; Mr. Akshay A. Pandya
Monitoring the health of power transformer is important for the reliability of electrical power supply. Sweep Frequency Response Analysis is a powerful tool for analysing transformer health and mechanical integrity is used to check the eventual change in the internal geometry of the active parts of the transformer, displacements or deformations. The main causes of such as the presence of external short-circuit. These faults may result in complete rupture of insulation which will result in complete damage of the winding. A benchmark winding is considered which has already been validated for experimental studies. The winding is modelled using finite element method (FEM) based software and parameters such as capacitance and inductance are calculated for 10 section healthy helical coil, by these parameter values, SFRA plots are obtained which are a set of reference for deformation analysis. The winding is modelled as radially and axially deformed coils using FEM software. The deformation is carried at five consecutive sections; purpose of doing so to find the location of deformation corresponding to a similar deformation in an actual transformer. The advantage of the FEM modelling is, we can deform the sections as desired unlike in an actual case and obtain the fingerprint graphs from the modified parameter values. The SFRA plots are obtained for the deformations at five sections for axial and radial deformations. A comparison is carried between the SFRA plots for deformed cases with reference set & deviations observed are in resonant frequencies & peak current magnitude. So the type and location of deformation can be found corresponding to a similar deformation in an actual power transformer. Read More...
|
Electrical Engineering |
India |
699-706 |
169 |
Enhanced Hybrid Scheduling Algorithm for Small Wireless Ad Hoc Networks
-GANARAJA.M ; Prof. G.S.MAMATHA
The study of ad hoc wireless networks are relatively new field gaining more popularity for various new applications. Mac protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems and also there are challenges of achieving high throughput, low jitter, low delay and good quality of service (QoS) along with the collision free transmission. This work involves an enhancement to the design of contention vector based scheduling algorithm for wireless networks. It can detect and punish non-cooperating nodes at the MAC layer. This work also involves implementation of the proposed algorithm using core java and analysis of its performance. Read More...
|
Computer networks |
India |
707-709 |
170 |
Review of Flexure Bearing
-Rohit S. Magar ; Prof. Dr. Suhas Deshmukh; Asso. Prof. A. P. Kulkarni; Asst. A. R. Deshpande
Conventional type of bearing having disadvantage of backlash, higher friction and wear, in order to overcome this limitations new concept was developed i.e. linear bearing. Linear Bearing are nothing but deformable bodies having spiral cut. They offers various advantages over conventional bearing. Now a day’s technology of linear compressor uses linear motor which has very less friction. Piston motor, motor shaft is vertically supported by linear bearing. Present paper focuses on study of such linear bearing named as flexure bearing. FEA tool is used for analysis and design of bearing. Read More...
|
Mechanical Engineering |
India |
710-712 |
171 |
IRIS DETECTION BASED PERSON'S IDENTIFICATION
-JIMMY PATEL ; BHAGIRATHI DODIYA; JIGAR MODH
This paper presented an iris recognition system in order to verify both the uniqueness of the human iris and also its performance as a biometric identification. A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. The iris recognition system consists of an automatic segmentation system that is based on the Hough transform, and is able to localize the circular iris and pupil region, occluding eyelids and eyelashes, and reflections. The extracted iris region is then further goes for quad tree decomposition method for another segmentation of iris. After that the segmented iris further goes for the matching in the database. The database contains the features that are need to be stored and then the extracted features are compared with these already stored features and then the identification of a person is done. Read More...
|
ELECTRONICS & COMMUNICATION ENGINEERING |
India |
713-715 |
172 |
Performance Analysis and Comparison of Self-Calibrating Dynamic Comparator and Advanced Double-Tail CMOS Dynamic Comparators
-Nitin Goyal ; Jasbir kaur
This advanced double-tail dynamic comparator has two extra inverters which are inserted in the conventional double-tail dynamic comparator by which gain of the overall circuit is improved. The additional regenerative part of this helps in increasing the driving current at the output stage of the comparator. These circuits are designed using 180nm Technology and CMOS at a power supply of 1.8V and it performs better in the sensitivity to delay and also the offset voltage is reduced in this circuit as compare to the preamplifier stage based comparator, the area and power consumption used by this circuit is almost comparable. Read More...
|
Electronics Engineering |
India |
716-719 |
173 |
Wireless Integrated Network Sensors: Towards Low Cost and Robust Self-Organizing Security Networks
-P. Adarsh
A very necessary advantage of continued advances in CMOS IC technology is that the ability to construct a large kind of small electrical-mechanical systems (MEMS) as well as sensors and RF parts. These building blocks alter the fabrication of complete systems in a very low value module, that embody sensing, signal process, and wireless communications. Together with innovative and focussed network style techniques which will modify easy preparation and sustained low power operation, the tiny size and price will be sanctionative for a really sizable amount of enforcement and security applications, including remote intelligence operation and security zones starting from persons to borders. We tend to define however the appliance will be exploited within the network style to alter sustained low-power operation. Above all, intensive information science at nodes, class-conscious higher cognitive process, and energy preserving routing and topology management strategies are employed within the networks below development. Read More...
|
Computer Science Engineering |
India |
720-726 |
174 |
MOBILE PHONE CLONING
-Sanu Kumar
Every one of us have perused news of the cloning of sheep or steers with delighted investment. In any case how would you feel on the off chance that some individual `cloned' your cell telephone? Engineering is at last a making a mockery of its dull side. Alongside the multiplication of innovative developments, this period additionally denote the conception of the new-age IT crooks in an enormous manner, with the most recent engineering duplicity being cell telephone cloning. In spite of the fact that correspondence channels are outfitted with security calculations, yet cloners escape with the assistance of clauses in frameworks. So when one gets gigantic charges, the chances are that the telephone is continuously cloned. Wireless cloning is a system wherein security information from one cell is moved into an alternate telephone. The other wireless turns into the definite imitation of the first PDA like a clone. Subsequently, while calls could be produced from both telephones, just the first is charged. Despite the fact that correspondence channels are furnished with security calculations, yet cloners escape with the assistance of tricks in frameworks. So when one gets tremendous charges, the chances are that the telephone is constantly cloned. This paper depicts about the PDA cloning with execution in GSM and CDMA engineering telephones. It gives an understanding into the security system in CDMA and GSM telephones alongside the tricks in the frameworks and examines on the diverse methods for keeping this cloning. Besides, the future risk of this duplicity is, no doubt explained. Read More...
|
computer science and engineering |
India |
727-729 |
175 |
Revenue Management in Cloud Computing Using Genetic Algorithms
-Rajinder Kumar ; Dr. Pardeep Kumar Mittal
Revenue maximizing (while providing their services and products using limited capacity) and establishment of long-term business relations with their customers is the primary target of a cloud service provider. Customer behaviour is dynamic and unpredictable in cloud computing industry. The way, how requests are accepted in a dynamic environment, can influence the demand behaviour of price sensitive customers. A Cloud service provider has to make decision on how to utilize his scarce resources in order to maximize his profit. For this he has to evaluate the incoming requests for capacity control in cloud revenue management. The paper introduces a system which tries to maximize the profit of the cloud service provider by optimizing the system by using genetic algorithm. Whenever customer made a request, the request is analyzed by the system, and then according to the prefix criteria it is decided that the request should be accepted or not. Read More...
|
Computer Science and Engineering |
India |
730-732 |
176 |
A Comparative Study of Different types of Models in Software Development Life Cycle
-Tarun sharma ; jagpreet singh; sandeepak bhandari
Software engineering approach is used to develop software. It defines the application of engineering to design, development and maintenance of software. It deal with the software management processes that examine the area of software development through the development models, which are known as software development life cycle. It represents four of the development models namely, waterfall model, v-shaped model, prototyping model and spiral model. These models have some advantages and disadvantages as well. Therefore, main objectives of this research is to represents different models of software development and make a comparison between and focuses on security activities involve in developing secure software’s. Read More...
|
computer science |
India |
733-736 |
177 |
FRACTURE ANALYSIS OF PRESSURE VESSEL COMPONENT - ARC SHAPED TENSION SPECIMEN
-PATEL DURGESH HITESHBHAI ; Viral P Parekh; Dhaval R Joshi
There are many components of machines, process plants and household goods that fail through over loading improper utilities. Tradition failure criteria cannot adequately explain many structural failures that occur at stress level consider lower than the ultimate strength of the material. Some of failures occur due to deficiency of construction, but many due to material deficiencies in the form of pre-existing flaws that initiated cracks and thus caused fracture. However, no material in reality is flawless and all materials or material produced by fabrication processes contain flaws which constitutes the modes of failure initiation. Essentially, if the crack reach the certain size and is subjected to highly strained region, which are regarded as potential cause of failure. Here it is need to understand the characteristics of crack and its developments. Stress Intensity Factor (K) is used in fracture mechanics to more accurately predict the stress intensity near the tip of a crack caused by a remote load or residual stresses. The testing of material SA 516 Gr 70 and IS 2062 will be carried out with different thickness viz. 12, 16, 18 and 20 mm and critical stress intensity factor of Arc Shaped Tension (AT) specimens were performed which were having crack to width ratio 0.5 as suggested by ASTM E-399. Read More...
|
Mechanical Engineering |
India |
737-740 |
178 |
Improvement of LEACH Routing Protocol in Wireless Sensor Networks
-Gaurav Patel ; Prof. Nirav M. Raja
Wireless Sensor Networks consist of small, low-power, low-energy nodes used for monitoring environmental parameters such as temperature, humidity and motion. The sensor nodes run on batteries that are not recharged during the network’s lifetime. Therefore, increasing WSN lifetime is a significant problem. In this article, We propose an improvement on the LEACH routing protocol to decrease energy consumption and increase network lifetime. Modified LEACH selects the cluster head node not only by considering residual energy of the node greater than the average residual energy level of nodes in network, but also on the basis of the distance between the candidate sensor node to the BS as a key parameter. The results of simulation show our proposed algorithm outperforms Basic LEACH protocol in terms of throughput and network lifetime. Read More...
|
Information Technology |
India |
741-744 |
179 |
Bluejacking Technology
-Srimathy.R ; Mr.Fahad Iqbal
Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e. for blue dating or blue chat) to another Bluetooth enabled device via the OBEX protocol. Bluetooth has a very limited range; usually around 10 meters on mobile phones, but laptops can reach up to 100 meters with powerful transmitters. Bluejacking allows phone users to send business cards anonymously using Bluetooth wireless technology. Bluejacking does not involve the removal or alteration of any data from the device. Bluejackers often look for the receiving phone to ping or the user to react. In order to carry out a bluejacking, the sending and receiving devices must be within 10 meters of one another. Phone owners who receive bluejack messages should refuse to add the contacts to their address book. Devices that are set in non-discoverable mode are not susceptible to bluejacking.
Mobile phones have been adopted as an everyday technology, and they are ubiquitous in social situations as user carry them around as they move through different physical locations throughout the day. As a communicative device, the mobile phone has been gradually taken up in ways that move beyond merely providing a channel for mediated conversation. One such appropriation is bluejacking, the practice of sending short, unsolicited messages via vCard functionality to other Bluetooth-enabled phones. To choose the recipients of bluejacks, senders complete a scan using their mobile phones to search for the available Bluetooth-enabled devices in the immediate area. A bluejacker picks one of the available devices, composes a message within a body of the phone’s contact interface, sends the message to the recipient, and remains in the vicinity to observe any reactions expressed by the recipient.
Read More...
|
Computer Science Engineering |
India |
745-750 |
180 |
Network Load-Aware Content Distribution in Overlay Networks
-G Suresh
Massive content distribution on overlay networks stresses both the server and the network resources because of the large volumes of data, relatively high bandwidth requirement, and many concurrent clients. While the server limitation can be circumvented by replicating the data at more nodes, the network limitation is far less easy to cope with, due to the difficulty in determining the cause and location of congestion and in provisioning extra resources. In this paper, we present novel schemes for massive content distribution, that assign the clients to appropriate servers, so that the network load is reduced and also well balanced, and the network resource consumption is low. Our schemes allow scaling to very large system because the algorithms are very efficient and do not require network measurement, or topology or routing information. The core problems are formulated as partitioning the clients into disjoint subsets according to the degree of interference criterion, which reflects network resource usage and the interference among the concurrent connections. We prove that these problems are NP complete, and present heuristic algorithms for them. Through simulation, we show that the algorithms are simple yet effective in achieving the design goals. Read More...
|
Computer Science and Engineering |
India |
751-755 |
181 |
Active Sharing and Management in Automatic Vehicle Monitoring
-Chithira Cyriac ; Rijo Sebastian; Athul Anand T.M
Vehicle Sharing is a mechanism of owning an automobile for limited period of time. The process enables the clients with vehicles of less usage to enable others without such an attractive vehicle to use it for allowed or required time. The scheme is simple: drop ones car in any permitted parking areas provided at various regions of the city, where customers can then avail their favorite transportation via cell phone call. The analysis of travel distance per day and collision detection analysis are performed. The idea was experimentally implemented and the desired result was obtained successfully. Read More...
|
Electronics and Communication Engineering |
India |
756-757 |
182 |
A Heuristic Based Approach for Hiding Sensitive Data to Achieve Privacy
-GAJENDRA PRASAD K C ; SATHISH KUMAR S
Hiding sensitive data to ensure confidentiality and privacy of the information has been a long term goal in the field of database security, so it is very important for the organizations to ensure that before disclosing data to the public access sensitive data must be hidden. In this paper, we are implementing a algorithm called MDSRRC (modified decrease support of RHS item of Rule Cluster) to hide the sensitive patterns ,which is the advanced version of Decrease support algorithm, which could applied over multiple itemsets whereas decreased support algorithm cannot be applied over multiple itemsets. Read More...
|
Computer science |
India |
758-760 |
183 |
A Review Paper on Leach Based Protocol in WSN
-Noopur verma ; Dr.Puneet Goswami
Wireless sensor network have become an active area for researchers now a days. A sensor node carry small amount of resources in terms of processor, battery power, memory and communication range, but when a great number of sensor nodes work together they are able to complete a good volume of task. It is just because of Wireless Sensor Network we are able to interact with physical world directly. Compared with the traditional wireless networks, wireless sensor networks have energy constraints, low-data-rate of high redundant and data flow of high-to-one, and so on. Energy effectiveness is the key performance indicators of wireless sensor networks. Based on the analysis of energy management strategy in the wireless sensor networks, the main factors affecting energy consumption are: perceptual data, data processing and radio communications, the radio communication is the main part of energy consumption. In this paper, we present a recent survey of hierarchical routing protocols which are based on LEACH protocol Read More...
|
Computer science engineering |
India |
761-763 |
184 |
A GENETIC ALGORITHM FOR VLSI
-K. Akhilanandreddy
The classical floor designing techniques use block packing to attenuate chip space, by creating use of algorithms like B-TREE illustration, simulated tempering. To urge AN best resolution it's imperative to settle on AN economical, price effective algorithmic rule. This paper presents a genetic algorithmic rule to supply an answer to the ground designing technique. It incorporates slicing tree construction method for the position and space improvement of circuit modules. It uses a probabilistic choice approach among its biological process cycle. Genetic algorithmic rule produces best or nearly best solutions to the ground designing method by exploitation techniques impressed by natural evolution, like inheritance, mutation, selection, and crossover. Read More...
|
Computer Science Engineering |
India |
764-766 |
185 |
Authentication of Surveillance Video using Video Fingerprinting
-Varahi J Sirigeri ; Leena Giri G
Installation of video cameras in public facilities for surveillance has becomes more and more popular. The camera data are being used by multiple authorities. There are cases where surveillance video must be transmitted in the clear, which is without encryption. To ensure trust of the received video, it must be authenticated. Video authentication has gained more and more attention in recent years. In this paper, we propose a novel authentication scheme which can distinguish malicious attacks. While lossless video is straightforward to authenticate by cryptographic means, lossy video is more difficult to authenticate. We describe a method that combines an efficiently computed video fingerprint with public key cryptography to enable lossy video authentication. Read More...
|
Computer Science and engineering |
India |
767-770 |
186 |
patient database management
-B.Anusha
Computer-aided bedside patient monitoring is applied in areas where real-time vital function analysis takes place. Modern bedside monitoring requires not only the networking of bedside monitors with a central monitor but also other standard communication interfaces .In this paper, a novel approach to patient monitoring is introduced. A patient monitoring system was developed and implemented based on an existing industry standard communication network, using standard hardware components and software technologies. The open architecture system design offers scalability, standard interfaces, and flexible signal interpretation possibilities. Read More...
|
p2p networks |
India |
771-774 |
187 |
FPGA Implementation of Simple 8-bit Signal Processor
-Dharam Shah ; Arpeet Kapadia; Mohin Bhavsar; Manoj Patel; Eagle Tarapara
Digital Signal Processor, or DSP, is a device used for processing signals digitally. A DSP is very similar to a microprocessor. In fact, it is regarded by many as a special microprocessor created particularly to process signals. The fundamental difference between a DSP and a microprocessor is what their built -in processing capabilities were designed for. Digital Signal Processor is used in Digital sound and image processing, Digital communications, Consumer electronics, Medical electronics Industrial and automation electronics. Signal processing encompasses a large variety of actions performed on signals like filtering, encoding/decoding, amplification, compression/decompression, modulation, pattern matching, mathematical / logical operations, level detection and much more. In this paper, We have made 8-bit signal processor on Spartan3 XC3S400 FPGA. It has Data bus (8-bit), Address bus (8-bit),8 bit ALU (8-bit adder/ subtractor, 8-bit logic blocks),Register file (8 registers R0-R7 each of 8-bits),Program Counter (8-bit), Instructions register (16-bit), Program memory (256x16 ROM),Data memory (256x8 RAM),MAC Unit (8x8 multiply accumulate),FIR filters (4th order Tap filters with rectangular window),Shifter (left/ right shift of maximum 8-bit shift),one input port & one output port. Read More...
|
Elecronics & Communication Engineering |
India |
775-778 |
188 |
IMAGE REGISTRATION ON FPGA PLATFORMS
-T.ELAKKIYA
Picture selection may be a computationally focused procurement inside the remedial imaging space that places stringent needs on execution and memory organization capability. This paper makes frameworks for mapping the picture selection orders on the configurable gear underneath time of time execution requests. Developing the arrangement of homogenized parameterized dataflow, that gives a profitable formal model of style and examination of supplies and workstation code for marker methodology procurements, we have a tendency to make novel procedures for identifying with and examining the fittings style house when mapping picture enlistment computations on the configurable gear. Our systems end in Associate in nursing calm framework for business off execution and configurable supplies stake use maintained the commitments of a given order. Maintained inclinations that we've got chose when applying these methods, we have a tendency to conjointly favoring a completely extraordinary development displaying that allows quickly-reconfigurable picture selection. This organized blueprint can tune its data taking care of structure adaptively maintained appropriate parts of the information pictures. Critical words Dataflow HPDF Image enrollment Reconfigurable architectures Read More...
|
computer science and engineering |
India |
779-781 |
189 |
Sinusoidal Current Control Strategy for Shunt Active Filter for Mitigation of Harmonics from Non Linear Loads
-P J Kunvarani ; Y R KORIYA
In recent decade the availability of power is replaced by quality of power for the optimal operation of the instruments which are to be used. Day by day uses of non linear loads like arc furnaces power electronics based drive are widely used in most industries which produces the harmonics in the system and to eliminate this harmonics SAPF (shunt active power filter) is used. This paper presents the two control strategies for this shunt active filter based on p-q theory are constant instantaneous power control strategy and sinusoidal current control strategy. MATLAB SIMULINK® model is developed for these two strategies is represented here with FFT analysis which clearly shows the performance of this SAPF to improve harmonics. Read More...
|
Electrical Engineering |
India |
782-785 |
190 |
CBIR for CT Brain Images using SVM
-Rinkeshkumar patel ; Shankar Parmar
Content Based Image Retrieval (CBIR) is emerging as important research in area of revolutionary internet and digital technology. The focus of this paper is on efficient retrieval of similar images in a particular brain images using supporting vector machine (SVM). Instead of traditional low level features like color texture and shape which are uses in most of CBIR system Current approaches replace reshaped Image intensity as a feature to guide SVM system and applied to brain CT images. Original image is reshape to predefined size to limit the size of feature vector. Single matrix is generated as a database and class is assign to this matrix rows to train the SVM. This system helps radiologist to assist for evidence based practice or image based reasoning in his daily practice. Experimental results shows that the propose method is adequate and condescending to some other existing method Read More...
|
Computer science |
India |
786-791 |
191 |
Dielectric Resonator Antenna with Wideband Performance in WiMAX/WLAN Bands
-Neha ; Sunil Kumar
The design and optimization of E-shaped Dielectric Resonator Antennas (DRA) working in WiMAX and WLAN bands is presented in this paper. The E-shaped dielectric resonator antenna has been designed with Rogers RO3010 dielectric material (dielectric constant = 10.2). The operating frequency range of the antenna is 3 GHz to 5.845 GHz. The input impedance plot along with the radiation patterns and E-plot at 3.795 GHz, and 5.51 GHz is also presented. The proposed antenna is having a peak realized gain of 5.7 dB at 5 GHz. Read More...
|
Electronics & Communication |
India |
792-794 |
192 |
LOW PROFILE PLANAR INVERTED-F ANTENNA FOR MOBILE DEVICES COVERING LTE/WLAN APPLICATIONS
-Garima Bedi Arora ; Haneet Arora
A Planar Inverted-F Antenna for LTE2300 (2.3-2.4 GHz), WLAN (2.4-2.484 GHz), and LTE2500 (2.5-2.69 GHz) bands has been presented in this paper. The proposed structure has a dimension of 18 x 13 mm2 over the ground plane of size 100 x 50 mm2 which can easily be implanted in the small space available within the mobile device. The proposed structure is having an impedance bandwidth ranging from 2.16 GHz to 2.726 GHz covering all the desired frequency bands. The antenna has a resonating frequency at 2.395 GHz. For getting the impedance bandwidth we are taking -8 dB as the reference return loss. The input impedance plot of the proposed antenna along with the radiation pattern of the antenna at 2.4 GHz and 2.55 GHz are presented. The peak realized gain of the proposed antenna varies from 4.17 dB to 4.84 dB in the desired operating band. Read More...
|
Electronics & Communication |
India |
795-797 |
193 |
SLOT LOADED PLANAR INVERTED-F ANTENNA FOR LTE/WLAN APPLICATIONS
-Garima Bedi Arora ; Haneet Arora
A Planar Inverted-F Antenna for LTE2300 (2.3-2.4 GHz), WLAN (2.4-2.484 GHz), and LTE2500 (2.5-2.69 GHz) bands has been presented in this paper. The proposed structure has a dimension of 18 x 13 mm2 over the ground plane of size 100 x 50 mm2 which can easily be implanted in the small space available within the mobile device. The proposed structure is having an impedance bandwidth ranging from 2.16 GHz to 2.726 GHz covering all the desired frequency bands. The antenna has a resonating frequency at 2.395 GHz. For getting the impedance bandwidth we are taking -8 dB as the reference return loss. The VSWR, input impedance plot along with parametric study of some key parameters is presented. The radiation pattern and current density plots of the antenna at 2.4 GHz and 2.55 GHz are also presented. The peak realized gain of the proposed antenna varies from 4.17 dB to 4.84 dB in the desired operating band. Read More...
|
Electronics & Communication |
India |
798-802 |
194 |
Design and Enhancement of Bandwidth and Performance of Rate-1/2 Puncturing Based Turbo Convolution Codes using Simulink
-Jitendra Prakash Shreemukh ; Prof. (Dr.) B.S. Rai
It has been observed that particular rate-1/2 turbo code can achieve a lower error floor than that of their rate-1/3 parent codes. Nevertheless, good puncturing patterns can only be identified by means of an exhaustive search, whilst convergence towards low bit error probabilities can be problematic when the systematic output of a rate-1/2 turbo code is heavily punctured. In this paper, we present and study a family of rate-1/2 turbo code. We evaluate their bit error rate performance and we show that they always yield a lower error floor than that of their rate-1/3 parent codes. Furthermore, we compare analytic results to simulations and we demonstrate that their performance converges towards the error floor region, owning to the QPSK modulation technique as compared to the un-modulated one. Consequently, we propose punctured modulated turbo code as a means of improving the bandwidth efficiency and simultaneously lowering its error floor. The investigations are carried out for transmission on additive white Gaussian noise channels. For our simulation size of interleaver selected is 1024*1024 and keeping the number of iteration between 5to8. Simulations are conducted on MATLAB at maximum SNR range of 7 dB. In addition we also simulate the performance of punctured turbo codes with increasing the number of iteration and its effect on the performance is analyzed. Read More...
|
Electronics And Communication Engineering |
India |
803-806 |
195 |
Complex Power Flow and Loss Calculation for Transmission System
-Patel Nilam H. ; Ashvin G.Patel; Jay Thakar
This proposed method to allocate the power flow and loss for deregulated systems. This method is developed based on the basic circuit theories, equivalent current injection and equivalent impedance. In this method four step are used for tracing the voltage, current, power flows and losses contributed by each generator sequentially .In this method can be calculated real and reactive power on each transmission lines and their sources and Destinations. This method can also obtain the loss allocation of each line, which is produced by each generator. This test results show that the method satisfy the power balance equation, the power flow and basic circuit theories. Read More...
|
Electrical Engineering |
India |
807-811 |
196 |
Low Power SOC Design Techniques
-Patel Pratik Vishnubhai ; Patel Deval Rajnikant; Bhavesh Soni
Power is a primary consideration in many segments of today’s electronics business. The thriving market for wireless/mobile devices such as cell phones, laptop and net book, and home entertainment electronics such as set-top boxes, digital cameras and broadband modems, is driving the need for low-power and energy-efficient system-on-chip designs. Power reduction has become a vital design goal for sophisticated design applications. Power consumption in chips, especially for technology at 90nm or below, must be lowered in order to reduce the packaging, reliability, manufacturing and operational costs of these devices. In addition, energy consumption as well as the amount of power loss over time must be managed to extend the use time of battery-powered applications. So in this paper different techniques are discussed for designing of low power SoC. Read More...
|
VLSI |
India |
812-815 |
197 |
Synchronous Control for Two Motor System
-Vismay Chauhan ; Prof. V P Patel
Multi-motor systems has vast application industrial environment. Applications can be found in offset printing, paper machines, textiles industries and robotics also. Multi-motor techniques are required where synchronization speed during acceleration, deceleration and changes in load requires speed and angle synchronization between at least two axes. Several synchronization techniques have been developed in order to fulfill those necessities. Here the Cross Coupling Technique is briefly described. Read More...
|
Instrumentation & Control engineering ,Electrical engineering |
India |
816-820 |
198 |
Numerical Investigation of Heat Transfer Enhancement by Plain and Curved Winglet Type Vertex Generators
-Russi ; Sunil Dhingra
Numerical simulations were carried out to investigate the performance of plane and curved rectangular winglet type vortex generators (VGs). Effects of shape of the VGs on heat transfer enhancement were evaluated using dimensionless numbers - j/j0, f/f0 and h =(j/j0)/(f/f0). The results showed that curved winglet type VGs have better heat transfer enhancement than plain winglet type in both laminar and turbulent flow regions. The flow resistance is also lower in case of curved winglet type than corresponding plane winglet VGs. The best results for heat transfer enhancement is obtained at high Reynolds number values (Re > 10000) by using VGs. The processes in solving the simulation consist of modeling and meshing the basic geometry of rectangular channel with VGs using the package ANSYS ICEM CFD 14.0.Then the boundary condition will be set according to the experimental data available from the literature. Finally result has been examined in CFD-Post. This work presents a numerically study on the mean Nusselt number, friction factor and heat enhancement characteristics in a rectangular channel having a pair of winglet type VGs under uniform heat flux of 416.67 W/m2. The results indicate the advantages of using curved winglet VGs for heat transfer enhancement. Read More...
|
Mechancal engineering (Thermal engineering) |
India |
821-826 |
199 |
Design, Analysis & Performance Investigation of H2O/LiBr VAR type Car AC System
-Mr. Dipak M. Patel ; Prof. C.M.Patel
The environmental rules and regulations have forced the refrigeration-based industries to direct the research trend in search of alternative refigerants and alternative technologies. Absorption technology appers to be a promising alternative to vapour-compression system as it uses zero ozone depletion potential fluids and zero global warming potential fluids. Vapour absorption refrigeration techniques through use of waste heat from I.C engine can contribute to the solution of the world's energy problem because; refrigeration machinery absorbs a small but significant part of the primary energy. There are two source of waste heat energy in I.C engine one is radiator and second is exhaust gases. Our aim, to describe and check the feasibility of I.C engine waste heat operated vapour absorption refrigeration system in the range of 70 to 95°C with the help of H2O/LiBr working fluid pair to fulfill the three objectives of research: ENERGY, ECOLOGY and ECONOMY. Read More...
|
Mechanical Engineering |
India |
827-832 |
200 |
Clustering for Self-Deployed Cloud Applications
-Jobin Babu ; Varun Sharma; Anil Saroliya
There are certain methods to create auto-scaling applications to make applications according to the load in cloud computing. Disaster recovery is one of the usages of this environment. For an example, during the event of disaster, applications may have the freedom to move from one environment to another one. Applications which are continuous in nature such as continuous integration tests require environments that support their running context. These applications are treated as individual applications for development. Clustering in the cloud computing can help in developing the applications as self-deployed applications. This paper describes the possibility of this type of phenomenon and helps us to discuss it through a fundamental structure. Read More...
|
Computer Science Engineering |
India |
833-834 |