No. |
Title and Author |
Area |
Country |
Page |
51 |
Marker detection using SURF Algorithm for Feature Detection in Augmented Reality
-Prof. Prabha S. Nair ; Prof (Dr.) Manoj Wadhwa; Vinay Kumar Singh ; Ahmad Ali
Augmented Reality is a new computer technology that combines virtual computer generated 3D graphics with realistic environments in natural visual perception. Augmented reality is a technology which allows 2D and 3D computer graphics to be accurately aligned or registered with scenes of the real-world in real-time. The occlusions usually cause a disappearance of the 3D model. Such behavior has substantial negative impact on the application usability. In this article we present a hybrid marker detection approach. With this approach, markers are detected using the well-known SURF method. This method is able to recognize complex natural objects and deal with partial occlusions. Further, we overcome the problem of distinguishing similar markers by using the Golay error correction code patterns. The described approach represents a robust method that is able to identify even significantly occluded Markers, differentiate similar markers, and it works in a constant time regardless of the amount of used markers. Read More...
|
Computer Science and engg. |
India |
199-202 |
52 |
A method for solving the class imbalance Problem in Classification Techniques
-IMRAN ALAM ; MANOHAR KUMAR KUSHWAHA; VINAY KUMAR SINGH
Class imbalance learning refers to learning from imbalanced data sets, in which some classes of examples (minority) are highly under-represented comparing to other classes (majority). The Very skewed class distribution degrades the learning ability of many traditional machine learning methods, especially in the recognition of examples from the minority classes, which are often deemed to be more important and interesting. Although quite a few ensemble learning approaches have been proposed to handle the problem, no in-depth research exists to explain why and when they can be helpful. We investigate mathematical links between single-class performance and ensemble diversity. One method to tackle this problem consists to resample the original training set, either by over-sampling the minority class and/or under-sampling the majority class. we propose two ensemble models (using a modular neural network and the nearest neighbor rule) trained on datasets under-sampled with genetic algorithms. Experiments with real datasets demonstrate the effectiveness of the methodology here proposed. Read More...
|
Computing Science and Engineering |
India |
203-206 |
53 |
Structural and thermal analysis and optimization of IC engine piston using 3-D FEM
-Abdul Jabbar ; Dr. P.K Nagrajan; Mohammad Mamoon Khan; Abhishek Sharma
We know that automotive engine parts are made of different material, to make a part of automobile like "piston" we must chosen the material which is most suitable for manufacturing this parts, so we have to consider about structural condition of piston and physical and chemical property of material. This is the main part of the engine. Its purpose is to transfer force from expanding gas in the cylinder to the crank shaft via connecting rod. In this study structural analysis of the piston has been carried out on the two different materials.A three dimensional Finite Element Model is built in the CAE software CREO2.0 parametric and the analysis is to be done in ANSYS-15.0. Material used Al alloy 2014A and 6106T6.The main objective is to investigate and analyze the stress distribution and deformation of the piston at the real engine condition during combustion process. The material used Aluminium alloy. Read More...
|
Automobile Engineering |
India |
207-212 |
54 |
Investigation of Process Parameters on Improvement of MRR and Surface Roughness on Abrasive Water Jet Machine for Inconel 600
-Kadia Kamleshkumar Parshottambhai ; Prof. A.H.Makwana
Abrasive water jet machining (AWJM) belongs to mechanical group of non-conventional processes in which mechanical energy of water and abrasive phases are used to achieve material removal or machining. The basic methodology is that the water is pumped at a sufficiently high pressure, 200-400 MPa ( 2000-4000 bar) using intensifier technology and material removal taking place by impact erosion of high pressure , high velocity of water and entrained high velocity of grit abrasives on a work piece. The objective of experimental investigation is to conduct research of machining parameters impact on MRR and Surface roughness of Inconel 600 material. In this research paper, Taghuchi method is used to find optimum parameters for abrasive water jet machining (AWJM). The process parameters selected in this experiment are water pressure, abrasive flow rate, jet traverse speed and standoff distance. There is L9 orthogonal array used and for each combination we have conducted three experiments and with the help of signal to noise ratio we find out the optimum results for AWJM. It was confirmed that determined optimum combination of AWJM process parameters satisfy the real need for machining of Inconel 600 in actual practice. Read More...
|
Mechanical Engineering |
India |
213-216 |
55 |
Implementation of Reliability Centered Maintenance (RCM) and Design out for Reliability (DOFR) Approaches to Milk Powder Drying Unit of Dairy Plant - A Case Study
-RASHMIKA MAKWANA ; PROF NILESH PANCHOLI
This paper presents a structured approach to RCM and DOFR, and discusses the various steps in the approach for critical components in a dairy plant as a continuous. The homogenizer, Air heating system, drying chamber and vibrofludiser are most critical equipments in drying unit of milk powder plant in dairy industry. The proper combination of RCM and DOFR method provides a framework for utilizing operating experience in a more systematic way. The requirements for reliability parameters and data are therefore highlighted. The effort is made to fill gap between existing maintenance and new plan, together with some future challenges. After the application of RCM and DOFR process to critical components of the milk powder drying unit, there is a considerable improvement of 12-15% in uptime. Moreover, there is also considerable savings on setup loss, equipment failure time etc. Finally at the end the paper suggestions for maintenance of homogenizer, air heater, drying chamber and vibrofludiser are indicated to ensure trouble free operation and maximum service life, which may ultimately improve uptime and productivity. Read More...
|
Mechanical Engineering |
India |
217-221 |
56 |
Design and Optimization of Idler for belt conveyor
-Hitesh J Soni ; Prof. Ronak R Patel
The work present in this paper focuses on the reduction of cost of idler as belt conveyor consist of many idler and reducing running cost of conveyor system by optimizing by. i) Selecting optimum diameter of shell, ii) selecting optimum diameter of shaft. iii) Thickness of shell. iv) Distance between two bearings. Modeling and Analysis of parts of idler is done by using ‘Finite Element Method’. Read More...
|
Mechanical Engineering |
India |
222-227 |
57 |
Registration Based on Scene Recognition and Natural Features Tracking Techniques
-Prof. Prabha S. Nair ; Prof (Dr.) Manoj Wadhwa; Vinay Kumar Singh; ahmad ali
This paper focuses on designing a robust and flexible registration method for wide-area augmented reality applications using scene recognition and natural features tracking techniques. Instead of building a global map of the wide-area scene, we propose to partition the whole scene into several sub-maps according to the user’s preference or the requirements of the augmented reality (AR) applications. Random classification trees are used to learn and recognize the reconstructed scenes because they naturally handle multi-class problems, while being both robust and fast. The result is a system that can deal with large scale scene that previous methods cannot cope with. We also propose a hybrid natural features tracking strategy combining both wide and narrow baseline techniques. While providing seamless registration, our system can recover from registration failures and switch between different sub-maps automatically. Experimental results demonstrate the validity of the proposed method for wide-area augmented reality applications. Read More...
|
computer science and engg |
India |
228-231 |
58 |
Designing an Optimal Cafe Delivery Network Using Travelling Salesman Problem
-Dr. S. Bharath ; Dr. G.S.Prakash; Yashodhan Joglekar
The aim of this work is to design a delivery network for Coffee Café’s across the city using the travelling salesman problem so as to arrive at an optimal model. This will reduce the distance travelled by the delivery trucks and the associated costs incurred. Also, the number of trips taken by the delivery trucks should be reduced so as to accommodate emergency deliveries which are very much prevalent in the café chain business.
The considered Coffee Café has two warehouses in the city of Bangalore. The mother warehouse caters to the “regional warehouses†located across the country and the city warehouse caters to café’s across the city. Though both cafes handle same type of material, only the city warehouse caters to the café’s in the city. This effectively means that a café located near the mother warehouse would still be served by the city warehouse. Hence this arrangement is not ideal and leads to unnecessary and extensive transportation costs.
This work brings forward a proposal to break down the distribution model into two different networks with two different servers rather than one. We have made use of the Travelling Salesman Problem to find the optimal routes so that the new model is optimally and technically sound. Further we divided the café’s into two groups per warehouse (high and low demand cafes). The low demand cafes were served once in two weeks compared to the existing system thus reducing the number of trips taken.
Read More...
|
INDUSTRIAL ENGINEERING AND MANAGEMENT |
India |
232-235 |
59 |
Analysis of Dissolved Gas in transformer oil by conventional Techniques and Artificial Intelligence approach-A Review.
-kotadia brijesh ; parmar sandip; shah bhavesh
The Dissolved Gas Analysis has been widely used by utilities throughout the world as the primarily diagnostic tool for transformer maintenance. The gas generated in mineral oil of power transformer can be monitored by all conventional methods, online DGA system and by application of various Artificial Intelligence practices. This sequential hybrid system ANN and FIS can be a good solution for reliable results for predicting faults because one should not depend on a single technology when dealing with real–life applications. This paper compares the conventional system of DGA and various analysis techniques by application of Artificial Intelligence. Read More...
|
Electrical Engineering |
India |
236-241 |
60 |
Comparative Evolution of AODV Routing Protocol based on Link Life Time in MANET
-Pankaj Jain ; R.K.Bairwa; Richa Jain
Mobile Ad Hoc network (MANET) is an infrastructure less multi-hop mobile network which is combination of mobile nodes with wireless receiver and transmitter with bounded energy and storage space. With the development of mobile network and multimedia services, quality of service is become very crucial. In MANET delay, bandwidth, link stability, hop-count are major QoS parameter. Compare to wired network; large amount of packet loss, end-to-end delay and low throughput are the major problems in MANET which may be occur due to dynamic behaviour of mobile nodes, transmission error, link failure, node congestion. More ever QoS of real time application is become very tough. AODV, DSR, DSDV are leading protocols for MANET in recent years. This paper gives a sketch of AODV and various derived protocol along with QoS parameter such delay, bandwidth and link stability, so to analysis their performance. Read More...
|
Computer Science and Engineering |
India |
242-245 |
61 |
Parametric Investigation and Optimization of Co2 Laser Cutting process used for cutting Hardox-500 materials
-Parth Patel ; Prof. H.G.Rana
To improve and optimize the responses of a Laser Beam machining process, the various input machining control parameters are to be set at an optimal value. As such one has to adopt experimental methods, which are cumbersome, time consuming, costly and at times not feasible. During such situations, optimization technique like Taguchi can be used as it provides a cost effective method for solution of such complex problems. Unlike traditional optimization techniques, Taguchi is robust and performs well in optimization problems. Considering these advantages of Taguchi, optimization of Co2 Laser beam machining process is done using this technique. In this research work, the desired responses are kerf width and surface roughness and Perpendicularity of cut are calculated. The process control parameters considered are Gas pressure, Cutting Speed, pulse frequency and power. Read More...
|
Mechanical Engineering |
India |
246-248 |
62 |
Energy Efficient Cluster Head Selection for Data Aggregation in Wireless Sensor Networks
-ARTH SHAILESHBHAI RAVAL ; Akshay Kansara
Wireless sensor network consists of several distributed sensor nodes. It is used for several environmental applications, military applications and health related applications. However, a WSN is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. Battery unit determines the lifespan of the sensor network. Energy consumption is therefore one of the most crucial design issues in WSN. To prolong the lifetime of the sensor nodes, designing efficient routing protocols is critical. Most of the research in energy efficient data gathering in data centric applications of wireless sensor networks is motivated by LEACH (Low Energy Adaptive Clustering Hierarchy) scheme. It allows the rotation of cluster head role among the sensor nodes and tries to distribute the energy consumption over the network. Selection of sensor node for such role rotations greatly affects the energy efficiency of the network. Some of the routing protocol has a drawback that the cluster is not evenly distributed due to its randomized rotation of local cluster head. We have surveyed several existing methods for selecting energy efficient cluster head in wireless sensor networks. We have proposed an energy efficient cluster head selection method in which the cluster head selection and replacement cost is reduced and ultimately the network lifetime is increased. Using our proposed method, network life time is increased compared to existing methods. Read More...
|
computer science & engineering |
India |
249-252 |
63 |
A Technological Survey on Wall Climbing Robot
-SOLANKI ROOPNESH VINODCHANDRA ; H.D. PATEL
Tall buildings and hazardous utilities require regular inspection and maintenance to comply with the ordinance, and to ensure the integrity and safety. The traditional manual inspection and maintenance on tall building normally requires the installation of expensive scaffoldings or gondolas in which human operators need to work in mid-air and life threatening environment. The prospect of climbing robots is popular because they can take the place of humans to carry out hazardous and maintenance job such as cleaning glass surfaces of skyscrapers, fire rescue, and inspection of pipes and wall, cleaning & inspection of high rise buildings, evaluation and diagnosis of a storage tank in nuclear power plants & petrochemical plants, maintenance of ship, aircraft wing inspection with the consideration of operational efficiency, safety and human health. These types of climbing robots are classified in to different groups based on their locomotion and adhesion mechanism. Due to the ability to relieve human beings from these hazardous works, more & more people are interested in developing various service climbing robots in recent years. Read More...
|
mechanical engineering |
India |
253-255 |
64 |
Survey of Data Classification & Prediction Techniques
-Anuj Sharma
In this paper, we present a literature survey of the modern data classification and prediction algorithms. All these algorithms are very important in real world applications like- heart disease prediction, cancer prediction etc. Classification of data is a very popular and computationally expensive task. The fundamentals of data classification are also discussed in brief. Read More...
|
Computer Science and Engineering |
India |
256-257 |
65 |
Security Mechanism to detect Fraud Based On Customer Behavior
-PARVINDER SINGH ; MANDEEP SINGH
With the enhancement in technology e banking like credit Card, Debit Card, Mobile Banking and Internet Banking is the popular medium to transfer the money from one account to another. E Banking is gaining popularity day by day, which increases the online transaction with the increase in online shopping, online bill payment like electricity, Insurance Premium and other charges, online recharges and online reservation of railways, bus etc., cases of fraud associated with it are also increasing and it puts a great burden on the economy, affecting both customers and financial bodies. It not only costs money, but also a great amount of time to restore the harm done. The purpose is to prevent the customer from online transaction by proposing unique and hybrid approach containing Data Mining and Artificial Intelligence based techniques and in order to prevent from fraudulent transactions, PIN, One Time Password mechanisms are used to prevent from online transactions. Read More...
|
Computer Science Engineering |
India |
258-263 |
66 |
Numerical Study of Heat Transfer Characteristics of Turbulent Iso-Thermal Jet Impinging On a Flat Surface
-T.Muneiah ; E.Bhaskar ; Ch.Venkata Rajesh
In this paper four turbulent models and two methods to account for the wall effect on the flow and heat transfer are tested for their predictive capabilities in impinging flows. The models are the k – ε STD, k – ε RNG, k – ω SST and v2f model with integration to the wall. First a description of the models is given and some results for a generic test case are presented to highlight some of the characteristics of the different models.
Next from these models selected the best one which gives the requirement are used to calculate the flow and heat transfer of a single impinging jet. Originally, most turbulent models were developed for attached flows along flat or mildly curved walls. The impinging jet flow has a different characteristic, i.e. a flow that changes direction from a wall-normal one to a wall-parallel one. Therefore the single impinging jet provides a different and challenging test case for the performance of turbulence models. The results indicate good prediction of the flow by second moment closure models. The best results for heat transfer are obtained with the models using integration to the wall. Numerical results are compared with experimental data, for the heat transfer. The results show the good prediction of the Blending Model for the flow and heat transfer.
Read More...
|
Mechanical Engineering |
India |
264-270 |
67 |
A Review of Popular Frequent Item Set Mining Methods
-Nilesh Singh Lodhi
In this paper, we are presenting an overview of existing frequent item set mining algorithms. Nowadays frequent item set mining is a very popular and computationally expensive task. We have also explained the fundamentals of frequent item set mining. We have described today’s approaches for frequent item set mining. From the broad variety of frequent item set mining algorithms that have been developed we will compare the most important ones. We will compare the algorithms and analyze their performance based on both their run time performance. Read More...
|
Computer Science and Engineering |
India |
271-273 |
68 |
A State of The Art in Sequential Pattern Mining
-Sonam Jain ; Dr. Rajeev G. Vishwakarma
Sequential rule mining or sequential pattern mining is used in many areas like, stock market analysis, rain fall analysis, etc. it is a heart favorite topic of research for many people over the years. This paper presents a comprehensive survey of some modern, also popular techniques for the sequential pattern mining. An overview of sequential pattern mining is also available. Read More...
|
Computer Science and Engineering |
India |
274-275 |
69 |
A Literature Review of Modern Multi-Document Summarization Techniques
-Mr. Vijay Sonawane ; Amit Mishra; Dr. Shiv Sahu
The text summarization is the need of the hour. As the information is rapidly growing on the internet. The problem is that when you search for any information the internet provides more information than the required. So there is a need to summarize the result. Also there is a need to maintain the quality of information in the summary. In this paper, we will elaborate the concept of the multi document summarization. We have also given a classification of the text classification. The literature review of the modern multi document summarization technique is also given. The working, the merits and the demerits of each text summarization technique will be discussed. Read More...
|
Information Technology |
India |
276-278 |
70 |
Quantitative analyses and evaluation of various modulation techniques in effect of varying SNR and cyclic prefix over WiMAX environment
-karan tej singh ; mohinder singh; shanu malhotra
Wireless networks are generally less efficient and unpredictable compared to wired networks, which make quality of service (QoS) provisioning a bigger challenge for wireless communications. The evergreen demand for fast delivery of large volumes of data is one of the challenging task for wireless communication technology. WiMAX (Worldwide Interoperability for Microwave Access) is a wireless broadband solution that offers a rich set of features with a lot of flexibility in terms of deployment options and potential service offerings. Its main objective is to provide quality with cost effectiveness. But Delivering QoS is more challenging for mobile broadband than for fixed. The time variability and unpredictability of the channel become more acute, and complication arises from the need to hand over sessions from one cell to another as the user moves across their coverage boundaries. The wireless medium has limited bandwidth, higher packet error rate, and higher packet overheads that altogether limit the capacity of the network to offer guaranteed QoS.in this paper, we provide an overview of the cyclic prefixes (Conventional/ Turbo) and service classes that are the key functions in the MAC common part sub layer. In this thesis work, the effect of varying SNR and channel encoding is examined on to analyze and evaluate the performance of different digital modulation schemes namely BPSK, QPSK and QAM under different coging rates [1/2, 2/3, 3/4]. The impact of SNR [5, 10, 15, 20, 25] and cyclic prefixes [1/4, 1/8, 1/16, 1/32] on the performance of these said OFDMA’s digital modulation schemes under coding rate [1/2, 2/3, ¾] is observed under NS2 simulator. Read More...
|
computer science |
India |
279-285 |
71 |
Advanced Security Surveillance Using Motion Detection
-Vinay M kaveri ; Prof. S. S. Sannakki
Computer vision field is becoming the area for the research these days. Technological improvement made the computers and imaging hardware to find their applications in the field of computer vision. Hence they found applications in the military for targeting, surveillance and biometric etc. Originally, business used video surveillance as both a deterrent to thieves and evidence to help police to apprehend criminals. Objective of our work is to ‘Provide foolproof’ security in the restricted zones like bank, jewelry shops etc. There are many traditional technologies which provide security to restricted zones but these traditional technologies do not take quick action and are not foolproof. To give strong security solutions for restricted zones, this will have smart camera connected to the cell phone by which one can take quick action without wasting time. In our project approaches used for face recognition and face detection are SMQT algorithm, split up Snow classifier and PCA for efficient face recognition. Read More...
|
Image Processing |
India |
286-290 |
72 |
Data Aggregation-An Intervention Approach For Continuous Queries Using Data Aggregators
-Pramod Motilal Bagal ; Mr. Gajendra Singh Chandel
Data aggregation is a common feature and practice where data is searched, gathered and presented in a report-based, summarized format to achieve specific business objectives or processes and/or conduct human analysis. Data aggregator is a determining factor for overall execution of continuous queries that make appropriate decisions which contribute to improved outcomes for struggling learners. The purpose of this study is to assess the information loss associated with data aggregation. Also, this study includes continuously monitoring, querying, analyzing aggregated and disaggregated data that provide results helpful for large number of users with high security, accuracy, efficiency, and scalability. Hence, we are investigates intervention approach for continuous queries using data aggregators. This assessment requires a clear methodology for implementing continuous querying against the quantifying information loss through data aggregators. The conclusion of this study is that usage of data aggregators to simplify continuous query to improve result and analyzing significant amount of information. Read More...
|
Information Technology |
India |
291-294 |
73 |
INVESTIGATE THE PERFORMANCE AND DESIGN PARAMETER FOR HIGH PRESSURE COMPRESSOR FLOW TRACK
-MOHSINALI SULEMANBHAI BATTI ; prof. Vimal k. patel
This article deal with conceptual design the flow path and optimization the efficiency power and losses. In this paper concentrate on high pressure axial compressor and further discuss about the different type of flow path design and also investigate the effect on performance parameter and design parameters. Design parameters of gas turbine plant are used from available references. Investigation is done using Axstream software. The flow path design is most important for designer because some characteristic effect by flow path. This article carried out three type of flow path like that constant hub diameter, constant mean diameter and constant tip diameter further, investigate the different of performance parameter and design parameter of all the flow path. Read More...
|
MECHANICAL ENGINEERING |
India |
295-298 |
74 |
Survey of REAL TIME AND EMBEDDED SYSTEM
-S.Subhashini
Many embedded systems have well utterly totally different vogue constraints than desktop computing applications. No single characterization applies to the numerous spectrum of embedded systems. However, some combination of worth pressure, long life-cycle, amount of your time requirements, responsibleness requirements, and elegance and elegance culture pathology can build it difficult to attain success applying ancient laptop computer style methodologies and tools to embedded applications. Embedded systems in many cases ought to be optimized for life-cycle and business-driven factors rather than for gamma hydroxyl but yrate computing turnout. there is presently little or no tool support for increasing embedded laptop computer vogue to the scope of holistic embedded system vogue. However, knowing the strengths and weaknesses of current approaches can set expectations fittingly, establish risk areas to tool adopters, and suggest ways in which at intervals which tool builders can meet industrial desires amount of your time systems unit laptop computer systems that monitor, respond to, or management associate external surroundings. This surroundings is connected to the computer system through sensors, actuators, and different input-output interfaces. it's aiming to accommodates physical or biological objects of any kind and structure. Sometimes humans unit and area of the connected external world, but an outsized vary of different natural and artificial objects, more as animals, argettable. The pc system ought to meet varied temporal arrangement and different constraints that unit obligatory on that by the amount of your time behavior of the external world to it it's interfaced. Thus comes the name real time. Another name for many of these systems is reactive systems, as a results of their primary purpose is to retort to or react to signals from their surroundings. An amount of your time computer system is additionally an area of a much bigger system at intervals that it's embedded; moderately, such a laptop computer half is known as associate embedded system. Read More...
|
computer science |
India |
305-309 |
75 |
Comparative Analysis of Single Objective & Multi-Objective Cluster-Head Selection in K-means Algorithm for Energy Efficiency in WSN
-Tanvir Sindhu ; Randheer Singh; Surender Singh
Limited energy is a serious issue in sensor networks. Therefore, there is a need to optimize the network architecture for the applications in order to minimize resources consumption. This paper compares the strategies of cluster-head selection in K-means algorithm in wireless sensor network when applied as a routing algorithm. The single-objective cluster-head selection takes account of only inter cluster distance of nodes and cluster head while multi-objective strategy considers cluster head position in cluster and distance between base station and cluster head besides inter cluster distance. The later strategy fails to provide equal distribution of energy among nodes and the results confirm our hypothesis proving single objective function as a better strategy. Read More...
|
Computer Science & Engineering |
India |
310-313 |
76 |
An Introduction to Effective Sequential Pattern Mining
-virendra mishra ; Abhishek raghuvanshi
Sequential rule mining is a favorite topic of research for many researchers. Sequential rule mining has been applied in several domains such as stock market analysis, weather observation and drought management etc. There are many techniques for the sequential rule mining. But still there is a lot of scope for the improvement in terms of efficiency and scalability. This paper presents a review of the some common and popular techniques for mining sequential rules from a data set. Read More...
|
Data Mining |
India |
314-315 |
77 |
Clustering Based Feature Subset Selection for High Dimensional data
- Lalith Prasad K A ; Prakasha S
Feature selection is a term commonly used in data mining to describe the tools and techniques available for reducing inputs to a manageable size for processing and analysis. Feature selection implies not only cardinality reduction, which means imposing an arbitrary or predefined cutoff on the number of attributes that can be considered when building a model, but also the choice of attributes, meaning that either the analyst or the modeling tool actively selects or discards attributes based on their usefulness for analysis. Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a subset of features, the effectiveness is related to the quality of the subset of features. The proposed algorithm works in two steps. In the first step, features are divided into clusters by using graph-theoretic clustering methods. In the second step, the most representative feature that is strongly related to target classes is selected from each cluster to form a subset of features. Features in different clusters are relatively independent; the clustering-based strategy of this algorithm has a high probability of producing a subset of useful and independent features. To ensure the efficiency of this algorithm, we adopt the efficient minimum-spanning tree clustering method. Features in different clusters are relatively independent; the clustering-based strategy of this algorithm has a high probability of producing a subset of useful and independent features. The efficiency and the effectiveness of the algorithm can be evaluated by the runtime efficiency, classification accuracy and the subset of features selected. Extensive experiments are performed on this algorithm by comparing it with known classifiers like tree-based C4.5. The results on the high dimensional image and microarray data, demonstrate that the algorithm not only produces smaller subsets of features but also improves the performance of the C4.5 classifier. Read More...
|
Data mining |
India |
316-319 |
78 |
A Novel Approach to Face Recognition and Expression Analysis using Local Directional Number Pattern
-GLORIA NONGTHOMBAM
Image analysis and understanding has recently received significant attention, especially during the past several years. At least two reasons can be accounted for this trend: the first is the wide range of commercial and law enforcement applications, and the second is the availability of feasible technologies after nearly 30 years of research. In this paper we propose a novel local feature descriptor, called Local Directional Number Pattern (LDN), for face analysis, i.e., face and expression recognition. LDN characterizes both the texture and contrast information of facial components in a compact way, producing a more discriminative code than other available methods. An LDN code is obtained by computing the edge response values in 8 directions at each pixel with the aid of a compass mask. This directional information is then encoded them into a 6 bit binary number using the relative strength of these edge responses. To analyze a face, it is divided into several regions, and the distribution of the LDN features are extracted from them. Then, these features are concatenated into a feature vector, and it is used as a face descriptor. We perform several experiments in which our descriptor showed consistent results under age, illumination, expression, and noise variations. Read More...
|
COMPUTER SCIENCE |
India |
320-323 |
79 |
Design and Implementation of Query Clustering on User Search History for Effective Information Retrieval
-SATTARI AJAY ; HEMA K L
Query clustering is a concept of grouping the related searches based on a predefined set of rules which end up with a most appropriate grouping of the queries. In our day to day life we use search engines like google to search the information, but we end up with the searches which provide an inappropriate results. As the search engine are meant to be user friendly, the overhead of grouping of the queries should be the task of the search engines rather than, distracting the user experience by ending up with unrelated searches for their query. Clustering is the process of organizing the objects in a group which have some common similarities. Query clustering is an unambiguous process which groups the data item sets in a predefined way, where in a query header is given to each of the cluster which determines in which cluster each query should fall in. Read More...
|
Data Mining |
India |
324-326 |
80 |
Towards a Relevant Search of Text, Image and Video Based on Question and Answering
-SANTOSH G ; Prakasha S
Web crawler (also known as a Web spider or Web robot) is a program or automated script which browses the World Wide Web in a methodical and automated manner. Web crawler is the heart of search engine. Whenever user query comes, searching is performed within the database of indexed web page .So it is desired that only the most relevant pages are stored in the database so as to increase the efficiency of search engine. Our approach can enable a multimedia question answering (MMQA) approach as users can find the answers by matching their questions with the pool. Read More...
|
Data Mining |
India |
327-329 |
81 |
Implementation of an Effective Internet Network Traffic Classification using Semi-Supervised Method
-ANILKUMAR BHAJANTRI ; Ms. LEELAVATHI H V
Internet traffic classification is an important tool for network management. It allows operators to better predict future traffic matrices and demands, security personnel to detect anomalous behavior, and researchers to develop more realistic traffic models. We present here a traffic classifier that can achieve a high accuracy across a range of application types without any source or destination host-address or port information. We use a Semi-Supervised method for classification of network traffic. The proposed method classifies network traffic using flow statistics that allows classifiers to be designed from training data consisting of only a few labeled and many unlabeled flows. The approach consists of two steps, clustering and classification. Clustering partitions the training data set into clusters. After making clusters, classification is performed in which labeled data are used for assigning class labels to the clusters. The results showed that the proposed method outperforms to existing method. During more specific comparison we use KDD (Knowledge Discovery in Databases) data set and tested our proposed and existing algorithm, we show the proposed algorithm is better than existing algorithm. The results are represented in Receiver operating characteristics (ROC) graphs.ROC graphs are a very useful tool for visualizing and evaluating classifiers. Read More...
|
Networking |
India |
330-332 |
82 |
ENHANCED ADAPTIVE ACKNOWLEDGEMENT SCHEME FOR MANETs SECURITY
-NISCHITHA AR ; Harish kumar HC
The migration to wireless network from wired network has been a global trend in the past few decades. Security has become an important part in Mobile Adhoc Networks because of their dynamic mobility, scal¬ability and shared resources. MANETs is a collection of mobile nodes and it does not require a fixed infrastruc¬ture. So it acts as a dynamic topology for many applications. MANETs are highly vulnerable for attacks because of their open me¬dium, rapidly changing topology, lack of centralized monitoring. Both Watchdog and TWOACK methods are not sufficient for protect MANETs in the cases of receiver collision, limited transmission power and false misbehavior report. To overcome such attacks the proposed technique is a secure intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed. Read More...
|
COMPUTER SCIENCE |
India |
333-336 |
83 |
Implementing Manufacturing Execution System through Lean Manufacturing Approach
-Mahendra Mukundrao Joshi ; Madhukar R. Nagare
In today’s age, where product witness major changes in shape and size within short time, it becomes necessary for an organization to set control over its manufacturing processes so as to make efficient use of its resources to produce optimum output. While introducing new parts or products in an organization, it becomes essential to bring on all functional departments in that organization to a platform which is product data oriented. Manufacturing Execution System (MES) helps to bring on all functional departments within extended organization to that platform, through real time data collection. It signifies functioning of each department with the help of key performance indicators (KPIs). Manufacturing Execution System through Lean manufacuring approach is focused on creating a perfect process of value creation in product development and operations; along with the supporting processes within organizations. Read More...
|
Mechanical Engineering |
India |
337-340 |
84 |
A Solution of Genetic Algorithm for solving Traveling Salesman Problem
-Sonam khattar ; Puneet Gosawmi
Genetic Algorithm is used to solve an optimization problems and Travelling Salesman Problem (TSP) is an optimization problem. TSP is an NP hard problem in combinational optimization important in operations research and theoretical computer science. The amount of computational time to solve this problem grows exponentially as the number of cities. These problems demand innovative solutions if they are to be solved within a reasonable amount of time. This paper explores the solution of Travelling Salesman Problem using genetic algorithms. The aim of this paper is to review how genetic algorithm applied to these problem and find an efficient solution. Read More...
|
Computer Engineering |
India |
341-343 |
85 |
Vital Role of Cloud computing technology in Indian education system: a study in Special reference for Technical Education
-Nilam choudhary ; Prof.(Dr.) Baldev Singh; Er. Gaurav Bagaria
The strange part of Indian education system is that on the one hand we have college like IIT's, IIM's and many high-quality schools too which are well-recognized for their quality education, Research and highly intelligent faculties but on the other hand we have colleges which are not even nearby IIT's or IIM's. In the year 2011-2012 Indian Government has provided Rs in thousands crore to Ministry of Human Resources development (MHRD) for uplifting the education system in India. even though similar budgets have been allotted by the government earlier in many years to improve the education system but in spite of that one fourth population of the India is still uneducated and in this figure educated means number of peoples who have passed their school, if we check for higher education level then this percent again going to reduced. Reasons we find that there is no centralized system for the government to check the educational institutes. If we talk about technical education of India we found lack distribution of resources like teaching tools, Infrastructures, software’s, teaching stuffs etc. As Cloud Computing technology is the most capable technology that provide solution to all the mentioned deficiency, thus we recommend that with the help of this technology we can overcome these deficiencies and reach our goal of hundred percent literacy rates. And also complete the aim to provide quality education to each and every citizen of India. Cloud computing has the potential to provide computation and storage resources as services. Both the public as well as the private institutions can use the cloud computing to deliver better services with limited resources. Around 45 million people will be in the age group of 18 to 20 years by 2020 in India. To make available quality education for them will be challenging task. So this paper is an analytical study on role of cloud computing in Technical education. Read More...
|
Computer Science Engineering |
India |
344-347 |
86 |
IMPLEMENTATION OF EMOTION DETECTION SYSTEM USING FACIAL EXPRESSIONS
-Jyoti Rani ; Dr. Kanwal Garg
The premise of this paper is to develop a system that detects human emotions through consecutive video frames. Emotions of a person can be detected using facial expressions because the most expressive way a human can show his emotions is through facial expressions. Emotion detection using facial expressions is widely used in various fields like computer science, medicine, and psychology. Automated facial expression recognition is also used in HCI system for better results. Human-computer-interaction can become more natural if computers are able to understand human emotions and their behavior. In this paper a new system for emotion detection using facial expression has been proposed. Input to the system is a sequence of video frames captured using a built-in webcam or external video device. A process of face extraction and cropping is carried out on the video frames captured and then emotions are detected by calculating the Euclidean distance of input image to the train images. The proposed system is implemented in MATLAB version 8.1.0.604 (R2013a). Read More...
|
Computer Science and Engineering |
India |
348-350 |
87 |
Interface for Visually Impaired for Documentation (GANAKA DHRISTI)
-Praveen kumar V ; Ms.Leelavathi H V
Learning through the use of web technology or web based learning has become an important media in the education revolution of the 21st century. The Internet particularly, has become an important tool for learners to acquire information and knowledge that encompasses various elements such as text, graphic, numeric, and animation for their learning process. Learners soon learn that the links in the Internet can lead them to various web pages that can lead them to more information that have a link with one another or to other information that has no link at all with the previous information. The visually impaired learners who actually represent a substantial proportion of the world’s population living in certain parts of the world have no access at all to this tool nor can it be easily taught to them as they are not able to see the links. So in this project a Local Search engine module is implemented where the user can search for keywords and get the corresponding information about searched keyword. This project hopes to highlight the GANAKA DHRISTI system to enable the visually impaired learners experience the world of the Internet, which comprises of five modules: Automatic Speech Recognition (ASR), Text-to-Speech (TTS), Local Search engine, Braille-to -Text module. Read More...
|
Computer network engineering |
India |
348-350 |
88 |
World Wide Web Information Retrieval Using Clustering
-Manjunath Naik ; Sudha V
Crowdsourcing, a distributed process that involves outsourcing tasks to a network of people, is increasingly used by companies for generating solutions to problems of various kinds. In this way, thousands of people contribute a large amount of text data that needs to already be structured during the process of idea generation in order to avoid repetitions and to maximize the solution space. This is a hard information retrieval problem as the texts are very short and have little predefined structure. We present a solution that involves three steps: text data preprocessing, clustering, and visualization. In this contribution, we focus on clustering and visualization by presenting a Support Vector machine approach that is able to learn the principal components of the data while the data set is continuously growing in size. We compare our approach to standard clustering applications and demonstrate its superiority with respect to classification reliability on a real-world example. Read More...
|
data mining |
India |
351-355 |
89 |
An Efficient And Robust Method To Find The Nearest Neighbor Using Spatial Inverted Index
-Savita Konnur
Many applications require finding the nearest objects closest to a specified location that contains a keywords. Nearest neighbor queries that aims to find objects both a spatial predicate and predicate on their associated texts. For example a nearest neighbor query search restaurant that is the closest among many restaurants within a particular area, whose menu contain required food keyword with respect to query. The problems of the nearest neighbor search on spatial data and keyword search on text data have been studied separately. Existing solution to queries is based on IR2-Tree (Information Retrieval R-Tree), but it has a few deficiencies that it requires more time to process the query and fails to give real time answers. To overcome these problems, we present an efficient access method to answer spatial keyword queries. we introduce an indexing structure called spatial inverted index that extends the inverted index. Read More...
|
Data Mining |
India |
356-358 |
90 |
FPGA Implementation of Low Power and High Speed Mixed Multiplier
-Rajesh.K ; Sahithiya.K; Mohanapriya.A; Kannan.S
In this work, a new architecture was proposed to reduce the power dissipation of Multipliers. Low power digital Multiplier is designed based on array multiplier technique mainly used to reduce the switching power dissipation, while this new architecture offers great dynamic power savings mainly in array multipliers, due to their regular interconnection scheme, it misses the reduced area and high speed advantages of tree multipliers. Therefore, mixed style architecture, using a traditional tree based technique, combined with a booth multiplier, is proposed. Implementation of all these multiplier Architectures has been carried out on Spartan3E FPGA. By evaluating the performance of these Multiplier architectures using Xilinx ISE tool suite, it has been found that while the booth multiplier technique offers the minimum dynamic power consumption, the mixed architecture reduces the partial product and high speed operations can be performed when compared to all other architectures. Read More...
|
Electronics and Communication Engineering |
India |
359-363 |
91 |
Improvement in polarization index of transformer by using six sigma methodology
-Krishna R. Dachawar
Transformer is an important electrical device in the power system which is used to step up and step down the voltage & Transfer electrical power according the need of customer. Oil filled Transformers get the insulation and heat transfer properties form the oil. But ironically the same oil causes one of the major defects of the transformer i.e. moisture. The transformer there is always mechanical, thermal or electrical stress generated during its operational period , it causes fault in transformer, the source of fault may lie in design, manufacturing, material used, handling & site , as this is the major pain area for all transformer industries , we introduced a latest quality tool to resolve this repetitive problem with target to reduce it at 0.01 DPU level ,In this paper we used six sigma methodology & approach, this is statistical tool which is based on past data, process parameter , results and analysis of the problem . Read More...
|
Mechanical Engineering |
India |
364-368 |
92 |
HEAT TRANSFER ENHANCEMENT IN TUBE BY INSERTING TWISTED TAPE WITH ALTERNATE AXES
-Akhilesh Nandkumar Joshi ; S. M. Lawankar
This project have been performed to study the influence of twisted tape with alternate axes and simple twisted tapes as turbulator and swirl flow generator. The experiments conducted using twisted tapes of the dimensions 900mm length, width 25.4 mm and thickness 2mm. The twists were made of twist ratio 2.5, 3.0 and 3.5. The Nusselt number obtained in the range of 25-97. The friction factor was found to lie in the range of 0.03-0.5. It is observed that the Nusselt number increases with increase in the Reynolds number and also increases with decrease in the twist ratio. The local convective heat transfer coefficient increases with increase in the mass flow rate and also increase by the use of simple twist and twist with alternate axes, Also as the twist ratio decreases the convective heat transfer coefficient increases. Read More...
|
Mechanical engineering |
India |
369-374 |
93 |
Security Performance Analysis of AODV, OLSR AND TORA
-Ginni Bhasin ; Dr.Puneet Goswami
Wireless networks are gaining attractiveness day by day, as users want wireless connectivity irrespective of their geographic location. A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving random in places that have no infrastructure. For communication in mobiles nodes routing protocols are used like Reactive routing protocol i.e. Ad-Hoc on Demand Distance Vector (AODV), Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Hybrid routing protocol i.e. Temporary Ordered Routing Algorithm (TORA). However due to security vulnerabilities of the routing protocols, MANETS are vulnerable to malicious nodes. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. Read More...
|
Computer Engineering |
India |
375-379 |
94 |
Report Based Secure Payment Scheme for MWNs
-Jyothi N. ; Asha; Nitin K.
Multihop wireless networks implement (MWNs) many useful applications in military and Emergency situations. In civilian applications of MWNs, specifically a selfish node is an economically rational nodes whose objective is to maximize its own welfare. A selfish node will need incentives/credits in order to forward others messages. A Report based payment scheme uses credits to motivate the nodes to co-operate in relaying other’s packet by making co-operation more beneficial then selfishness. In this scheme the nodes submit lightweight payment reports containing charges and rewards of different sessions to the Trusted Party(TP) to update their credit account. The TP verifies the reports and classifies them into fair and cheating reports by checking the consistency of the reports and clears the payment for the nodes that submit fair reports and evict the cheating nodes that submit incorrect reports. Read More...
|
Computer Science and Engineering |
India |
380-383 |
95 |
Applying Public Audit-ability For Securing Cloud Data From Modification Attack
-Vinay Tila Patil ; Prof. Gajendra Singh Chandel
Cloud Computing has been proposed as the next-generation architecture of IT Enterprise. It moves the application software and databases to the integrated large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the existing proof of storage models by manipulating the classic Merkle Hash Tree construction for block tag authentication. To support efficient handling of multiple auditing tasks, we further explore the technique of bilinear aggregate signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure. Read More...
|
Computer Engineering |
India |
384-388 |
96 |
The Best Web Programming Language for a Beginner: A Short Review on Python, Ruby and PHP
-Akshay N. Hegde ; Dr. Ramakanth Kumar P; Dr. Jitendra Nath Mungara
Nowadays it is very heard to say which web programming language is the best. This is because there is no general web programming language that suits for all web based application projects. Each project/application has its own set of custom requirements. So which is the best web programming language for a beginner and for a pro- PHP, Python or Ruby? This document gives a brief idea on benefits, drawbacks, features and feasibility of top web programming languages. The paper not only suggests choices that the programmers have to begin with, but also the set of requirements from the web programming language to develop an efficient web application. Read More...
|
Information Technology |
India |
389-391 |
97 |
Optimum Selection of PSO Parameters for Automated Test Data Generation of Software Programs
-Nirupama Kumari ; Venuka Madan
The proposed research work implemented and fine-tuned meta-heuristic based search algorithms namely PSO algorithm for automatic test case generation using path testing criterion. The three parameters namely size of population (NIND), inertia weight (W), social learning rate (C1), and cognitive learning rate (C2) have been chosen for setting PSO algorithm for test data generation. For input generation, symbolic execution method has been used in which first, target path is selected from Control Flow Graph (CFG) of Software under Test (SUT) and then inputs are generated using search algorithms which can evaluate composite predicate corresponding to the target path true. We have experimented on two real world programs showing the applicability of these techniques in genuine testing environment. The algorithm is implemented using MATLAB programming environment. The performance of the algorithms is measured using average test cases generated per path (ATCPP) and average percentage coverage (APC) metrics. Read More...
|
Software Engineering |
India |
392-397 |
98 |
PSO based Energy Efficient Routing Protocol using equal size clustering approach in Wireless Sensor Network
-Nirmala ; Randheer Singh
This research work examines the competing issues of energy consumption efficiency in wireless sensor networks. For this purpose, we considered a multi-objective Particle Swarm Optimization (PSO) in the selection of Cluster Head (CH) in such a way so that its energy is used uniformly with load balancing among clusters for delayed disintegration of network. LEACH algorithm based random clustering approach has been replaced by PSO clustering. The improved PSO protocol has been compared with random LEACH, Max Energy LEACH and k-means algorithm, and simple PSO which cluster only for space equi-distribution not for the load balancing among clusters., Wireless sensor network (WSN) is simulated using a MATLAB programming and power consumption algorithms take into consideration all aspects of power consumption in the operation of the node. Simulating different algorithm schemes on the same network system, same initial power sources, and routing protocol, an increase of overall system lifetime is demonstrated. The performance of PSO cluster based routing protocol shows improvements in lifetime but Max Energy LEACH perform better in network disintegration criterion Read More...
|
Computer Science Engineering |
India |
398-404 |
99 |
A Study of LEACH and PSO algorithm in Wireless Sensor Networks
-Nirmala ; Shikha
Wireless Sensor Network (WSN) consists of low cost and small sized motes known as sensor nodes. The use of sensor nodes depends upon the need of an application. Various challenges of WSN affect the performance of the network. Limited energy and power are the main issues in WSNs due to this different routing protocol are designed to improve the energy efficiency of the whole network. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the best energy efficient protocol falls under the category of hierarchical routing protocol. This works on the concept of cluster formation. Different algorithms are used for cluster setup. This paper explains the working of LEACH in detail with some advantages and disadvantages. Also highlights some improvement over LEACH and analyze the Particle Swarm Optimization (PSO) algorithm for cluster setup. Read More...
|
Computer Science Engineering |
India |
405-408 |
100 |
HEAT TRANSFER ANALYSIS OF 4-STROKE SI ENGINE CYLINDER HEAD AND BLOCK ASSEMBLY BY CFD APPROACH
-Arvind S. Sorathiya ; Manankumar B. Joshi; Pravin P. Rathod
In this study, the main aim is to improve the cooling performance of 4 stroke SI engine. Generally in practice all the motor cycles engines are available having straight fins design on its body. Now here its new concept of wavy fins design in place of straight fins. Computational fluid dynamic (CFD) analysis is carried out in ANYSI 14.5 workbench for both types’ engines at various velocities within the range 0.01 km/hr to 120 km/hr. A performance analysis is done by comparing heat transfer rate and overall heat transfer co- efficient. It’s concluded that overall heat transfer coefficient of the wavy fins is better than straight fins for all velocities. An average increment in overall heat transfer co efficient is about 4.38 % after 0.01 km/hr velocity. Read More...
|
Mechanical Engineering |
India |
409-412 |