No. |
Title and Author |
Area |
Country |
Page |
1 |
A Relative Study on Security issues in Semantic Web Services
-Subarnarekha Ghosal
Semantic Web is a common framework to share data across several applications and various enterprises. More specifically it is a term for a data web that can be operated by the machines. Semantic Web Services represents the server side of the client server architecture for interactions between two or more machines through World Wide Web. Semantic Web uses Extensible Markup Languages which represents data in a more sophisticated and detailed way which is understandable by the machines. In recent years Semantic Web Services is being used widely. Meanwhile, several security issues regarding the same have popped up. In addition with the emerging technology cloud computing semantic web security has acquired major importance.Thus various solutions to solve this problemhas also been proposed. This paper presents a comparative study of the various security methods that have come up and benefits and drawback of each method. Read More...
|
Computer Science Engineering |
India |
1-5 |
2 |
FPGA implementation of efficient 16-bit parallel prefix Kogge- Stone architecture for convolution application
-GEETHA.B ; Ramachandra.A.C
Adders form important parts of any digital circuits. Adders are much used in all integrated digital circuits because any process involving multiplication and any binary functions use adders in their processes. Adders are not only necessary for addition, but it also needs for other parameter such as subtraction, multiplication and division. In this paper we have proposed both kogge stone adder and carry select adder. The proposed adder is synthesized using Spartan 3s400-tq144. A comparative study of delay of kogge stone adder and carry select adder were analyzed and shown that delay has been reduced in kogge stone adder compared to that of carry select adder. Read More...
|
electronics and communication engineering |
India |
6-10 |
3 |
Area-Efficient VLSI Implementation for Parallel Linear-Phase FIR Digital Filters
-SHANTHA M ; Ramachandra AC
To design an efficient integrated circuit in terms of Area, Power and speed is one of the challenging task in modern VLSI design field. In the past decade numbers of research have been carried out to optimize design based on area, speed and power utilization. In this paper performance analysis of different available adder architectures has been carried out and then we proposed a Heterogeneous architecture, which composed of four different sub adders to design an adder unit in order to demonstrate trade-offs between performance parameters i.e. Area, Power and speed. In proposed approach the symmetric coefficients of FIR filter area taken into consideration to implement parallel (L=3) FIR filter. Read More...
|
Electronics & communication engineering |
India |
11-14 |
4 |
An analysis of Symmetric Cryptography Algorithms
-S.DILIP KUMAR ; Mr. V.RamaKrishnan
The evaluation of networking and wireless networks has come forward to grant communication anywhere at any time. Security of wireless networks is main aspect and encryption algorithms play an important role to provide the security to the wireless networks. This paper provides a fair performance comparison between the various cryptography algorithms on different settings of data packets. Read More...
|
Advanced Networking |
India |
15-17 |
5 |
Facial Recognition using Open CV
-Sneha Arora ; Rajiv Munjal
As we know the internet is advancing so there is growing interest in computer vision.and so face detection is one of the growing and popular area of research in computer science. Therefore we use open cv with open source computer vision library, it uses library function which are used for loading image, creating window,save image and access pixels in a particular domain. Read More...
|
computer science |
India |
18-19 |
6 |
Protection of the Privacy of the Cloud Data through Multiple Clouds
-Amruta Kammar ; Vivekanandreddy; Navaneetha D; Sowmyashree B; Priyanka Tippannavar
The main goal of the “Protection of the privacy of the cloud data through multiple clouds†is to identify and understand the risks associated with the cloud data and propose a distributed architecture to eliminate the risks. In particular, in current cloud architecture a client entrusts a single cloud provider with his data. It gives the provider and outside attackers having unauthorized access to cloud, an opportunity of analyzing client data over a long period to extract sensitive information that causes privacy violation of clients. Hence to overcome this we propose a distributed architecture. The distributed approach to the cloud eliminates the disadvantage of storing all data of a client to the same provider. In this approach the data sent by the client is split into different number of chunks and is distributed among multiple cloud providers. Our system consists of two major components: Cloud data distributor and Cloud providers. The Cloud Data Distributor receives the data in the form of files from many clients, splits each of the files into much number of chunks and distributes these chunks among appropriate cloud providers. Another major component which is Cloud Providers, store these chunks and responds to the chunk requests by providing the chunks. Read More...
|
Cloud computing |
India |
20-23 |
7 |
STUDY AND DEVELOPMENT OF COMPRESSED AIR ENGINE-SINGLE CYLINDER
-SUTHAR UMANG P ; PATEL MANISH D; PATEL KRUNAL V; Prof. Kalpesh Chavda
This paper is reports on the review of compressed air engine for the design and development of single cylinder engine which can be run by the compressed air. Current four strokes single cylinder engine (bikes/moped) can be run on the compressed air with a few modifications that are the main objective of the study. Compressed air filled by electricity using a compressor. The electricity requirement for compressing air has to be considered while computing overall efficiency. Nevertheless the compressed air vehicle will contribute to reducing air pollution and tend to zero pollution level and promoting great environment. Main advantage of this engine is that no hydrocarbon fuel required means no combustion process is take place. Read More...
|
Mechanical Engineering |
India |
24-28 |
8 |
Design and Implementation of a Gesture Recognition Control System for Medical Electronics Applications
-Keerthi S Nair ; Athul Anand T M; R. Dharmalingam ; S. Sellam
Now a day’s electronic systems are extensively used in the medical field and many researches are being conducted in the Medical Electronics fields. The Medical Electronic equipments are usually mended for the assistance during the diagnosis of diseases, for monitoring the medical conditions, for the management of medical database and also for using as the life support equipments. We have diagnostic equipments such as ultrasound, MRI (Magnetic Resonance Imaging) machines, PET (Positron Emission Tomography) x-ray scanners, includes medical imaging machines, used to aid in diagnosis. Then another category of medical instruments is the Therapeutic equipments which includes infusion pumps, medical lasers and LASIK surgical machines. Life support equipment such as, medical ventilators, heart-lung machines, ECMO (Extra Corporeal Membrane Oxygenation), and dialysis machines, is used maintain a patient's bodily function. Medical monitors allow medical staff to measure a patient's medical state. Monitors may measure patient vital signs and other parameters including ECG (Electrocardiograph), EEG (Electroencephalogram), blood pressure, and dissolved gases in the blood. And finally we have medical laboratory equipments to analyze blood, urine and genes. Read More...
|
Medical Electronics |
India |
29-30 |
9 |
RESEARCH ON 4G TECHNOLOGY
-Bollini Lokesh
Information is power, nowhere is this truer than on the battlefield, where the ability to communicate clearly and rapidly pass on information spells the difference between survival and death. The key to empowering the military with tactical broadband voice, video and data is 4G infrastructures technology. This technology adopts Wireless technology on the platform of fixed networks, advanced antennae technologies and more advanced wireless security technologies. Next thing is about the gear for the future warrior the uniform along with the armor, onboard computer which will monitor soldiers' overall physiological and psychological picture of how they are execution in the battle zone and enhanced human performance which weighs 50 pounds from head to toe against 120 pounds of the current day system present. Read More...
|
Computer Science and Engineering |
India |
31-32 |
10 |
Distributed Denial of Service Attacks
-R.Roja
Distributed denial of service (DDoS) attack is a coordinated attack, generally performed on a massive scale on the availability of services of a target system or network resources. Owing to the continuous evolution of new attacks and ever-increasing number of vulnerable hosts on the Internet, many DDoS attack detection or prevention mechanisms have been proposed. In this paper, we present a comprehensive survey of DDoS attacks, revealing methods and tools used in wired networks. The paper also highlights open issues, research challenges and possible solutions in this area. Read More...
|
computer science engineering |
India |
33-37 |
11 |
Wireless Sensor Networks: Issues, Challenges and Survey of Solutions
-Sangeetha B
Wireless ad-hoc sensor networks have recently emerged as a premier research topic. They have great long-term economic potential, ability to transform our lives and pose many new system-building challenges. Sensor networks pose a number of new conceptual and optimization problems such as location, deployment and tracking in that many applications rely on them for needed information.
The past works are scattered across all of the systems layers: from physical layer to data link layer to network and application layer. In this report, we present an overview of wireless sensor networks and issues involved in employing them. We make an attempt to provide a snapshot of solutions proposed in recently published literature for different issues like Medium Access Control, Data Dissemination, Security and Coverage determination.
Read More...
|
Computer Science Engineering |
India |
38-48 |
12 |
A REVIEW ON RED TACTON
-MOUNIKA.T
Technology is making many things easier; I can say that our concept is standing example for that. So far we have seen LAN, MAN , WAN , INTERNET & many more but here is new concept of “RED TACTON †which makes the human body as a communication network by name .... HAN (Human Area Network). NTT lab from Japan is currently testing upward this world-shattering technology .Red Acton is a new Human Area networking technology that uses the exterior of the human body as a safe, high speed network diffusion path. Red Acton uses the minute electric field generated by human body as intermediate for transmitting the data. The chips which will be entrenched in various devices Contain transmitter and receiver built to send and accept data in digital format. In this paper we will thrash out about red Acton, and its functioning. States, and applications of red Acton various fields. And we will compare our red Acton with the other technology for data transmission. And know about HAN Read More...
|
computer science and engineering |
India |
49-52 |
13 |
ADVANCED LOW-COST SECURITY SYSTEM USING GSM COMMUNICATION MODULE
-PRANJAL KATARA ; VIJAY SINGH RAJPUROHIT; Mamidi Siva Jagannadha Sravan
Home security is essential for occupants’ convenience and protection. This paper aims to develop a low-cost means of home security system using temperature, passive infrared and proximity sensors. Data from all these sensors is continually received and processed by arduino Uno board which act as a microcontroller unit. In case of untoward situations, the arduino will trigger an alarm and alert messages will be sent to user’s mobile via GSM. The temperature sensor LM35 is used to prevent fire accidents by detecting the increase in temperature beyond a certain limit. The low-power Passive Infrared (PIR) detectors take advantage of pyro-electricity to detect a human body that is a constant source of infrared radiation while proximity sensor uses Hall Effect principle to detect any intrusion through doors and windows. Thus the system ensures home safety as well as security. Read More...
|
ELECTRONICS & COMMUNICATION |
India |
53-54 |
14 |
An efficient method for handling data with DHT and Load balancing over P2P network
-satheesh b.r
Peer to peer systems is a class of decentralized and distributed system. The participating node in the peer to peer systems acts as a both client and server whenever it is needed for another peer system. Whenever the storage is done on a system it is shared among all peers and also whenever the retrieval is done it is also shared among all peers. This makes an advantage of reliability, robustness and scalability. To avoid a situation of getting heavier loads than other peers the peer to peer systems must be provided with the loads to the all participating peers. This covers sending and receiving message that is the communication cost and computational power for requesting process. When the messages an forwarded from one peer to another peers they are exposed to a routing loads for queries during the information lookup and they only traverse them. And the traffic loads usually consist of both communication and computational power. The loads balancing in the peer to peer system are mainly based upon DHTs. The DHT are generally made to be well balanced under a flow of request and the request must be uniform. For example the objects having equal popularity that is the similar amount of request should be sent to all nodes Read More...
|
computer science and engineering |
India |
55-59 |
15 |
Performance Analysis of Basic Adaptive Filter Algorithms for DSP Processor in LabVIEW
-Shivani Joshi ; Darshit Jadawala
DSP Processor is a very efficient and error-correcting option in today’s mobile communication age. There are many algorithms to optimize the performance of such processor. Here DSP processor is implemented along with adaptive filters for noise cancellation in mobile phones. This is implemented by using LabVIEW. Algorithm used here is NLMS. The performance is further studied and better algorithm has been searched out to improve the performance. Read More...
|
Electronics and Communication Engineering |
India |
60-64 |
16 |
grid computing
-J.BHARGAV ; J.BHARGAV
In the last few years there has been a rapid exponential increase in computer processing power, data storage and communication. But still there are many complex and computation intensive problems, which cannot be solved by supercomputers. These problems can only be met with a vast variety of heterogeneous resources. The increased use and popularity of the Internet and the availability of high-speed networks have gradually changed the way we do computing. These technologies have enabled the cooperative use of a wide variety of geographically distributed resources as a single more powerful computer. This new method of pooling resources for solving large-scale problems is called as grid computing. This paper describes the concepts underlying grid computing. Read More...
|
computer science and engineering |
India |
65-68 |
17 |
text mining of bug repositories
-komal
Text mining of bug repositories is an emerging area of research. Bug repositories are main source of knowledge. Different mining algorithms can be applied on these repositories to extract useful and interesting information. Finding frequently occurring bugs information helps the developers to plan the code to overcome the occurrences of the bugs in future projects. In this paper we propose a method to mine useful information from the bug repositories. Our method considers bug summary extracted from the bug repository on which text mining techniques are applied to find frequently used relevant words from the bug summary. Read More...
|
computer engineering |
India |
69-72 |
18 |
Privacy Control in Smartphones Using Semantically
-A.R.Apoorva
we are going to tell about how client data and confidentiality maintained in mobile devices through semantic analysis. Recent advance in context modeling, tracking and mutual localization has led to the materialization of a new class of smart phone applications that can access and share implanted sensor data. Mobile devices which have OS frameworks like Android mechanisms for vibrant privacy control. We tell how data flow among applications can be achieved through using semantic web driven technology. In this paper we deal with user data isolation control. Read More...
|
computer science and engineering |
India |
73-75 |
19 |
INVESTIGATION ON EFFECT OF HEAT INPUT IN SAW WELDING FOR PRESSURE VESSEL
-MANISH VINUBHAI ROHIT
Submerged arc welding (SAW) is a high quality, high deposition rate welding process commonly used to join plates of higher thickness in load bearing components. This process provide a purer and cleaner high volume weldment that has a relatively a higher material deposition rate compared to the traditional welding methods. The effect of controllable process variables on the heat input and the hardness of weld metal and heat affected zone (HAZ) for bead on joint welding were calculated and analyzed using design of experiment software and Taguchi method technique developed for the SAW of boiler and pressure vessel plates. The main purpose of present work is to investigate and correlated the relationship between various parameters and hardness and tensile strength of single sqear butt joint and predicting weld bead qualities before applying to the actual joining of metal by welding. It is found that the hardness of weld metal and heat affected zone decreased when that is total heat input increased. Read More...
|
MECHANICAL ENGINEERING |
India |
76-80 |
20 |
RAINFALL-RUNOFF MODELING: A FUZZY LOGIC APPROACH
-Dr. T. M. V. Suryanarayana ; Mr. Ratansharan A. Panchal; Dr. F. P. Parekh
Rainfall-Runoff is very complex phenomena and its often required attention for modeling to estimate the runoff. Several methods are available for the rainfall-runoff modeling. The present study undertakes the rainfall-runoff modeling for Hadad rain gauge station of Dharoi sub-basin, Gujarat, India. In this study, the rainfall-runoff modeling has done using Fuzzy logic (FL) technique for the selected station. The dataset collected for the rain gauge stations was divided into different combination of training and testing ratio and the models were developed for Hadad rain gauge station with the selected combinations. Also, in Fuzzy logic, different combinations of rainfall were considered as the inputs to the model, and runoff was considered as the output. Input space partitioning for model structure identification was done by grid partitioning. A hybrid learning algorithm consisting of back-propagation and least-squares estimation was used to train the model for runoff estimation with the triangular membership function. The outputs generated were than compared to the observed outputs with different combinations of training and testing dataset by means of the model evaluation parameters coefficient of correlation (r), coefficient of determination (r2) and discrepancy ratio (D.R) values.. Read More...
|
Water Resources Engineering |
India |
81-83 |
21 |
Design and Analysis of 2:1 Multiplexer Using Low Power Adiabatic Technique and its Application in Nibble Multiplexer
-Priyanka Grover ; Veena Rani
The power consumption and delay optimization has been the main concerns for the VLSI technology. In this paper we have proposed a new adiabatic circuit technique using diode connected transistors. The technique emphasizes on reduction of power by lowering the non-recoverable power consumption in adiabatic circuits. The technique achieves full adiabatic operation by providing separate charging and discharging paths. The PMOS devices provide the charging path while the diode connected NMOS devices provide low resistance discharge path which helps in reduction of power dissipation in the circuit. The paper compares the different logic style 2:1 multiplexes like CPL, EEPL and PFAL with the proposed design (ADDL) in terms of power and delay. The power consumption and delay is reduced up to a sufficient level with the help of new adiabatic logic technique. Nibble multiplexer is also designed using proposed logic. All the simulations have been performed at 90nm technology on Tanner EDA tool version 14.11. Read More...
|
Electronics & Communication |
India |
84-87 |
22 |
Application of Genetic Algorithm for Optimal Reservoir Releases
-Dr. T. M. V. Suryanarayana ; Sumitra Sonaliya
In the present study Genetic Algorithm (GA) has been used to develop a policy for optimizing the release of water for the purpose of irrigation. The study area is Ukai Reservoir project in Gujarat, India. Genetic algorithm technique is an optimization approach based on the mechanics of natural selection, derived from the Darwin’s theory of natural evolution. The fitness function used is to minimize the squared difference between the monthly reservoir release and irrigation demand along with squared deviation in mass balance equation. The months considered in the study are July, August, September and October for the year 2010 and 2011 respectively. The results obtained using GA shows that the downstream demands for the purpose of irrigation are completely satisfied and also considerable amount of water is saved. Read More...
|
Water Resources Engineering |
India |
88-90 |
23 |
Distributed Fault Detection and Correction Using Shortest Path Mechanism in Wireless Sensor Networks
-Ankit Arora ; Sonika Soni
Wireless sensor network is a self-organized network that consists of a large number of low-cost and low-powered sensor devices, called sensor nodes. Recent advances in wireless sensor networks have resulted in a unique capability to remotely sense the environment. These systems are often deployed in remote or hard-to reach areas. Hence, it is critical that such networks operate unattended for long durations. Unlike the cellular networks and ad hoc networks where energy has no limits in base stations or batteries can be replaced as needed, nodes in sensor networks have very limited energy and their batteries cannot usually be recharged or replaced due to hostile environments. Therefore, extending network lifetime through the efficient use of energy has been a key issue in the development of wireless sensor networks. In distributed fault detection (DFD) scheme for wireless sensor networks the status of each sensor node to be either good or faulty is based on the neighboring nodes, but in the DFD algorithm[1],when the sensor fault probability increases the fault detection accuracy decreases and the false alarm rate increases rapidly. In this paper an improved DFD scheme is proposed to detect intermittently faulty sensor nodes and to stringent power budget during fault diagnosis process on sensor nodes in wireless sensor network. Simulation results demonstrates that the improved DFD scheme reduce energy consumption in comparison with previous algorithm. The proposed mechanism is implemented with MATLAB. Read More...
|
Electronics & Communication |
India |
91-95 |
24 |
PRIVACY PRESERVING AGAINST NETWORK INTRUSION DETECTION IN VIRTUAL NETWORK SYSTEM
-SHRUTHI S
Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
96-98 |
25 |
An Effective Congestion Control Scheme in Content-Centric Networking
-sarvesh
Content-Centric Networking (CCN), a typical future Internet architecture focused on content dissemination and re-trieval, brings a paradigm shift in network model by addressing named-data instead of host location. Many fields related to CCN become the research hotspots, such as caching and name-based routing. However, little work has addressed on its transmission protocol in literature. In this paper, we proposed an effective Congestion Control Scheme (CCS) in CCN through combining a router-driven congestion forecast with a requester-driven Interest control protocol. Each router detects the network congestion status and then informs the requester by setting Congestion Information Bits into the returned Data packet passed by. Then the requester dynamically adjusts its Interest sending window according to the received feedback congestion information. Fur-thermore, in our scheme, a Fair Queuing algorithm is used on each router, allowing max-min fair share of the link capacity. A performance evaluation using simulation designed on OMNet++ network simulator showed that the proposed CCS causes fewer packet losses, decreases Data packet delay, treats each flow fairly and maximizes the use of bandwidth. Read More...
|
computer science |
India |
99-102 |
26 |
Feasibilty Study of Adopting Acoustic Emission Testing in Friction Stir Welding Process for effective control of defects
-KUMAR YOGEESH D
This Paper investigates the use of Acoustic Emission Testing as an effective Non destructive Testing Method to control defects in Friction Stir Welding.Friction Stir Welding (FSW) is most advanced, rapid and reliable type of Welding process which produces quality welded joints of similar and dissimilar materials with the help of frictional heat and pressure. This process is best suited for Aerospace industry and other commercial applications due to its capability of welding low melting point materials with low energy consumption and versatility. The process uses non-consumable cylindrical tool to join sheet and plate materials, without melting them. The defects in welding joints play a major role in determining the product quality, weld strength, cost, etc. A cost effective and accurate Non Destructive Testing method is required to monitor process and avoid defects.Acoustic Emission (AE) testing is a powerful method of examining the behavior of materials deforming under stress. Read More...
|
Mechanical Engineering |
India |
103-105 |
27 |
SIMULATION AND ANALYSIS OF ROUTING PROTOCOLS OF MANET-A REVIEW
-SHARANDEEP KAUR ; SHAILESH PATHAK (GUIDE)
In this paper, we describe a simulation and analysis study of Wireless network in routing protocols using MANET. AODV (Ad-Hoc On-Demand Distance Vector Routing ) Self-configuring network of mobile routers connected by wireless links .In Black hole attack on AODV no of nodes a malicious node acts like a Black hole, dropping all data packets passing through it as like matter and energy disappears . At the advanced type of AOMDV protocol are used AOMDV(Ad-Hoc On-Demand Multiple Routing) - a multipath extension to AODV multiple loop-free and link-disjoint paths. AOMDV as better than AODV. The simulation result AOMDV protocols packet data send energy consumption and at a same time so many packet deliveries. These are different parameter are calculate Throughput, PDR (Packet Delivery Ratio), and measured the End to End delay on different network scenarios. Measure the protocols with different packet size and calculate the Energy Consumption. This work will be done with help of the ns-2 simulator. (Network Simulator 2.34) . Read More...
|
ELECTRONICS & COMMUNICATION ENGINEERING |
India |
106-108 |
28 |
Experimental Analysis of Single Cylinder 4-Stroke Diesel Engine for the Performance and Emission Characteristics at Different Inclinations of the Intake Manifold
-Jay V. Shah ; Prof. P.D.Patel
In the present days, most of the countries over the world wide have enforced the strict emission norms in order to reduce emission levels from the engine exhaust to curb the problem of pollution. The main problem in connection with the combustion in C.I. engine is the intimate mixing of fuel injected and air. Air motion in CI engine influences the atomization and distribution of fuel injected in the combustion chamber and also supplies fresh air to the interior portion of the fuel drops and thereby ensures complete combustion. The design and orientation of the Intake Manifold has a major influence on the air flow- field generated within the Diesel Engine Cylinder which in turn directly influence the Performance and Emissions characteristics of the engine. In this present work, the orientation of the Intake Manifold was changed by inclining it at several different angles viz. Normal Intake Manifold, Intake Manifold at 25° inclination, 50° inclination and 75° inclination w.r.t. Normal Intake Manifold Position and then the effects of these different orientations of the Intake Manifold on the Performance and Emission parameters of the Single Cylinder 4-Stroke naturally aspirated Diesel Engine were analyzed and then comparisons of the computed results were made with those of the Normal Intake Manifold. From the experimental research work, it is found that the BSFC reduces, brake thermal efficiency increases and there is an improvement in the exhaust gas emissions as orientation of the Intake Manifold is changed from Normal Manifold Position to 50° inclination w.r.t. Normal Manifold Position. Read More...
|
Mechanical Engineering |
India |
109-113 |
29 |
Investigation and prediction of Braking Performance of disc brake by changing the Brake Rotor profile
-Hiren K. Bagda ; Prof. R J Jani
Braking is a process which converts the kinetic energy of the vehicle into mechanical energy which must be dissipated in the form of heat. During the braking phase, the frictional heat generated at the interface disc-pads can lead to high temperatures. This high temperature rise of the rotor decreases the coefficient of friction between the rotor and pad, Brake fluid vaporization problem arises, component wear will be higher at higher temperature. So to remove the heat from rotor we use vented rotor now days, in vented rotor number of vanes have effect on mass flow rate through vented rotor. For this paper have taken one rotor with simple vane design and second having higher number of vanes with some design change considered after literature review. Read More...
|
Mechanical Engineering |
India |
114-116 |
30 |
NETWORK SECURITY USING CRYPTOGRAPHY
-p.pavankumar
Network security is a hardest subject, In past it is only handled by well-trained exports. People should understand the basics of security in network world. Now we are going to see the what are the common attacks take place security against over network , what is the solution for those attacks, introduction to cryptography, algorithms of cryptography and some features on secure network. Any way we are going to present the best ciphers currently in use. Read More...
|
networking |
India |
117-120 |
31 |
Engine performance and emission analysis by using biodiesel and its blends
-S. B. Patil, A. D. Chendake
Biomass derived from vegetables oils are quite promising alternative fuels for agricultural diesel engines. The performance of vegetable oils can be improved by modifying them through the transestrification process. The fuel properties of biodiesel such as kinematic viscosity, calorific value, flash point, carbon residues and specific gravity were found. Results indicated that B20 has closer performance to diesel and highest brake thermal efficiency was obtained for blend B20 with 31.86 mainly due to its high viscosity compared to diesel. For Jatropha biodiesel and its blended fuels, the exhaust gas temperature increased with increase in power and amount of biodiesel. But, diesel blends showed reasonable efficiency, lower smoke, CO2, CO. Read More...
|
Agriucltural engineering |
India |
121-122 |
32 |
An Proposed Model for Sensitive Rule Hiding
-Kaushal Bhatt ; Ankit Dongre
The corporations and users own and store their large quantities of data in digital form. Data mining tools are developed and used to extract useful information from that database. But problem is arise when the data base having private information called as a sensitive information about users and/or their organizations, there are worries that these data mining tools may inadvertently reveal sensitive information along with the originally intended output. That’s why, we are interested in developing practical approach for privacy preserving data mining. And this research paper provides an efficient model for privacy preserving data mining. Read More...
|
Computer Science Engineering, Information Technology Engineering |
India |
123-124 |
33 |
Improvements in Corpus Quality for Statistical Machine Translation
-Shikha Maheshwari ; Himanshu Sharma
In this paper, we tried to explore what data quality means for parallel corpuses. This work is motivated by our attempts to understand the factors which can affect the quality of corpus for statistical machine translation. Read More...
|
Statistical Machine Translation |
India |
125-127 |
34 |
Cloud Computing-Health Applications and Security
-Jeevan Reddy
Cloud Computing is defined as a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers. It is based on service-level agreements that are established between the service providers and consumers. Cloud Computing opens up many new possibilities for application developers. This paper provides an approach on how to use Cloud computing in healthcare, focusing on the implementation needs and benefits. Cloud Computing moves databases to be data centre where the management of the data and services may not be fully trustworthy and it poses many security challenges which have not been well understood. To ensure the correctness of users’ data in the cloud, this paper also describes about the security criteria and strains. Read More...
|
Computer Science and Engineering |
India |
128-131 |
35 |
Enhanced Performance Evaluation of Cloud Computing Servers
-Srihari Sonti ; M.Narayanan
The Cloud Computing is one of the emerging modern technologies that need to meet the emerging business needs for agility, flexibility, cost reduction and time-to-value. The developments in cloud computing paradigm necessitate faster and efficient performance evaluation of cloud computing servers. The advanced modeling of Cloud servers are not feasible one due to nature of cloud servers and diversity of user requests. This issue necessitates calculating performance of cloud servers and should be capable of handling several millions of requests in few seconds. It is so possible through the specialized computing facility called Virtualization and even with it, very hard to serve plenty of requests continuously or simultaneously without delay or collision. We proposed a new mechanism to overcome these performance problems and to aim for optimize their performance; we can achieve this goal with help of queuing theory. To tackle the problem of optimizing the performance of cloud servers, we model the cloud servers with multitenant architecture as an M/G/m/m + r queuing system with single task arrivals and a task buffer of finite capacity. In this model focusing on input buffer size, number of servers, mean number of request, response and etc as metrics for performance. The proposed algorithm named approximate Analytical model, and is equivalent to the combination of Transformation based Analytical Model & an Approximate Markov Chain Model with supporting calculations works out to bring the optimized performance evaluation of cloud servers. Read More...
|
Coumputer Science engineering |
India |
132-136 |
36 |
Wormhole attack on On Demand routing protocols in mobile ad hoc networks
-Sumet Mehta ; Gaurav Monga
A mobile ad hoc network (MANET) consists of mobile wireless nodes. In MANET nodes are self-motivated topologies can randomly change their geographic locations. Wireless networks are susceptible to many attacks, including an attack known as the wormhole attack. On occurrence of wormhole can cause a significant breakdown in communication across a wireless network. This paper explores and compares the effect of wormhole attacks on the performance of on demand routing protocols in mobile ad hoc network (MANET). The evaluation has been done by studying and comparing end to end delay, packet delivery ratio and throughput for wormhole attack and without wormhole attack. Read More...
|
Electronics & Communication Engg. |
India |
137-140 |
37 |
INVESTIGATIONS IN BRUTE FORCE ATTACK ON GSM BASED ON DES AND AES
-Almas Zahra ; Danish Raza Rizvi
With the increase in the demand of wireless and mobile devices day-by-day, a need for maintaining more secure connection comes up. The more secure a connection is , the better and satisfactory will be its performance. Security is an extremely challenging issue in mobile and wireless systems these days. A number of issues come up in terms of network security and this directly affects throughput and QoS of cellular systems. Among different types of security issues, the most common ones are ensuring the anonymity of parties involved, authenticating the parties to each other and confidentiality of the message. Even wired networks used to have various security issues but the wireless and mobile systems are prone to all these vulnerabilities plus many more risks inherent to wireless and mobile systems. GSM, a cellular system for mobile communication uses some version of A5 algorithm for ensuring security but we observed that DES is secure than A5 algorithm. Further, AES is even found to be far more secure than DES also as it takes more time to attack AES based security system as compared to either A5 or DES based systems. Read More...
|
computer science & engineering |
India |
141-145 |
38 |
STUDY AND RE-DESIGN OF THE LAYOUT USING FACILITY PLANNING TOOLS
-Mr. Deepak Kumar ; Mr. Nidheesh Shetty; Mr. Pramod Rajaram; Mr. Shashank M.S.; Mr. Sukesh K.
XYZ Service Industry aims to provide an everlasting experience and value for money. In order to achieve such a feat, the organization must present to its employees the best working conditions. Facility layout design is one such factor which plays a pivotal role in achieving it. The objective of this paper is to re-design the existing layout of the administrative floor to reduce the flow cost. According to Lean manufacturing, we must first measure a process before making a change to ensure that the change is an improvement. So how does an Industrial Engineer ensure that the new layout is better than the current layout? Initially, the efficiency indices of the present layout were calculated which indicated the need for improvement. To rectify the drawbacks, CRAFT algorithm is applied to improve the indices and obtain a better layout that would increase the operational efficiency. AutoCAD software is used to draw the layout. Also, we wanted to ascertain the importance of Facility Planning if it is done prior to construction of the Hotel. Hence, CORELAP algorithm was applied and we also calculated the flow cost and efficiency indices of the obtained layout. Read More...
|
INDUSTRIAL ENGINEERING AND MANAGEMENT |
India |
146-151 |
39 |
Improvisation on Sixth Sense Technology
-Jinu Hazarika ; Arthik Daniel Das
Here we are going to manage the most recent innovation called the intuition. Here the physical world around us is expanded with the advanced data utilizing a wearable interface. This idea permits a client to interface with the web consistently. Without the utilization of the console, we can features, access, change, move information in the mouse normally. But this concept brought to adjustment of the similar things by utilizing orders rather than motions. The Speech IC is utilized as a database for charges and at first prepared for capacity. It performs the comparing orders by getting to the operation from the cell phone joined with it and movement is anticipated utilizing a projector over any fancied surface and likewise climate figure is carried out utilizing sensors and computing the dampness level . There's much trouble in the expense imperatives. Read More...
|
Information Technology |
India |
152-155 |
40 |
Bandwidth enhancement of single-feed circularly polarized equitriangular microstrip antenna
-Akhilesh Kumar ; Rajan Mishra
This paper presents a novel method of increasing impedance and axial ratio (AR) bandwidth of a single feed circularly polarized tip-truncated equitriangular microstrip Antenna (ETMSA). Tip-truncated ETMSA has been previously introduced in the literature; in this new method by cutting a small equitriangular slot near the modified vertex, the impedance and AR bandwidths are increased more than two times. Read More...
|
Electronics & Communication Engineering |
India |
156-158 |
41 |
Towards Secure And Dependable Storage Services In Cloud Computing
-B.Bharathan
Cloud storage enables users to remotely store their data and relish the on-demand elevated quality cloud requests lacking the burden of innate hardware and multimedia management. Nevertheless the benefits are clear, such a ability is additionally relinquishing users’ physical ownership of their outsourced data, that inevitably poses new protection dangers towards the correctness of the data in cloud. In order to address this new setback and more accomplish a safeguard and dependable cloud storage abiility, we counsel in this paper a flexible distributed storage integrity auditing mechanism, employing the homomorphic token and distributed erasure-coded data. The counseled design permits users to audit the cloud storage alongside very handy contact and computation cost. The auditing consequence not only ensures forceful cloud storage correctness promise, but additionally simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are vibrant in nature, the counseled design more supports safeguard and effectual vibrant procedures on outsourced data, encompassing block modification, deletion, and append. Scutiny displays the counseled scheme is highly effectual and resilient opposing Byzantine wreck, malicious data modification attack, and even server colluding attacks. Read More...
|
Computer Engineering |
India |
159-160 |
42 |
Internet Protocol Security
-N.Shahul hameed meeran ; Dr. D. Venkata Subramanian
IP security (IP sec) is a capability that will be added to either current version of which the internet protocol (IPv4 or IPv6), it means of additional headers. IP sec encompasses three functional areas authentication, confidentiality and key management. Authentication makes use of HMAC message authentication code. Authentication mode will be applied the entire original IP packet (tunnel mode) or the entire packet except for IP header (transport mode). Confidentiality provided by an encryption format known as encapsulating security payload. Both tunnel and transport modes will be accommodated. IPsec defines a number of methods for key management. Read More...
|
Computer Engineering |
India |
161-163 |
43 |
Implementation of CAN BUS in an autonomous All-Terrain Vehicle
-k ganga amareswarnadh
The main purpose of this effort is to design an autonomous all terrain vehicle which uses a CAN bus. The paper describes the operation and advantages of the CAN protocol in automobiles. The ATV used for this design is a Honda Four Trax Rancher AT and a brief explanation of the parts in the ATV is provided. The Renesas RX62N microcontroller is used as a CAN controller which creates a single two wire bus through which electronic control units (ECU) in the automobiles communicate. The working of the CAN protocol on the RX62N has been explained with the help of pseudo code. Read More...
|
electrical communication engineering |
India |
164-167 |
44 |
PICK AND PLACE ROBOT
-Mr. Rajnor D. L. ; Mr. Bhide A.S
The paper presents a smart approach for a real time inspection and selection of objects in continuous flow. Image processing in today’s world grabs massive attentions as it leads to possibilities of broaden application in many fields of high technology. The real challenge is how to improve existing sorting system in the modular processing system which consists of four integrated stations of identification, processing, selection and sorting with a new image processing feature. Existing sorting method uses a set of inductive, capacitive and optical sensors do differentiate object color. This paper presents a mechatronics color sorting system solution with the application of image processing. Image processing procedure senses the objects in an image captured in real-time by a webcam and then identifies color and information out of it. This information is processed by image processing for pick-and-place mechanism.The Project deals with an automated material handling system. It aims in classifying the colored objects by colour, size, which are coming on the conveyor by picking and placing the objects in its respective pre-programmed place. Thereby eliminating the monotonous work done by human, achieving accuracy and speed in the work. The project involve sensors that senses the object’s colour, size and sends the signal to the microcontroller. The microcontroller sends signal to circuit which drives the various motors of the robotic arm to grip the object and place it in the specified location. Based upon the detection, the robotic arm moves to the specified location, releases the object and comes back to the original position. Read More...
|
ELECTRONICS AND TELECOMMUNICATION ENGINEERING |
India |
168-171 |
45 |
IMPROVE THE 5S PERFORMANCE IN AN ASSEMBLY PLANT USING FUZZY LOGIC BASED MODELING
-Smt. Shobha R ; Ms. Arpitha Muthanna; Ms. Asha Lakshmi R; Ms. Neha Deepak Gudi; Ms.Sneha Priya M
Nowadays in this dynamic and technological world, the secret of surviving for any kind of organization is to be competitive and pioneer in its products or services. One of the main ways to succeed is continuous improvement and increasing the quality of product or service. However, there is lack of knowledge in some improving methods and tools like 5S and the challenge is much greater. This 5S system which is a component of lean manufacturing helps organize a workplace efficiently. A 5S audit was designed which enabled each zone head to identify the potential level of quality improvement and at the same time analyze the ability and weakness of each zone in the division. Most measures of 5S are described subjectively by linguistic terms which are characterised by ambiguity and multi-possibility, thus, using the conventional approaches to 5S assessment is not effective whereas fuzzy logic provides a useful tool for dealing with decisions in which the phenomena are imprecise and vague. A 5S assessment model was designed and evaluated, followed by, weighing up the same using fuzzy logics. After determining the 5S level at the 5 zones, the importance indexes of various 5S attributes were found. Various proposals for 5S improvement were suggested based on the experiences of the conduct of the project. These proposals after implementation lead to enhancement of quality and thereby increase in the efficiency of the organisation. Read More...
|
INDUSTRIAL ENGINEERING AND MANAGEMENT |
India |
172-175 |
46 |
SOA AND CLOUD COMPUTING
-N. Govardhan Reddy
Cloud computing and SOA are different concepts, but they are related. SOA is a pattern of architecture whereas cloud computing is an instance of architecture, or an architectural option. SOA is more holistic and strategic, meaning it deals with the complete enterprise including the business drivers, whereas cloud computing is more tactical and is a way of solving a problem. They are linked, and it is difficult to do one without the other if you are looking to solve problems at the enterprise level. Service-oriented architecture, or SOA, is really about fixing existing architectures by addressing most of the major systems as services and abstracting those services into a single domain where they are formed into solutions. Simple in concept—and really nothing new—SOA is our best approach to fixing the broken architectures. With the wide use of standards such as Web Services, SOA is being promoted as the best way to bring architectural agility to your enterprise—that is, if you do SOA correctly. SOA is a valid approach to solve many of the architectural problems that enterprises face today. However, those who implement SOA typically look at SOA as something you buy, not something you do. Thus, many SOA projects are again about purchasing some technology that is sold as “SOA in-a-box,†which turns out to be in-a-box but not SOA, and thus only adds to the problems. Big SOA encompasses the larger strategic objectives of SOA: simultaneously moving all the enterprise IT assets to something much more agile and easy to change. Small SOA is just an instance of a big SOA. Read More...
|
Computer Science Engineering |
India |
176-179 |
47 |
Optimal FOPDT Modeling Of Liquid Level Control System Using Genetic Algorithm
-PATEL TUSHAR M. ; Prof. V.P. PATEL
PID controllers are commonly used in process loops. Most of industrial process loops are controlled by PID controllers due to its easy understanding, simple structure and robustness to the process parameter variations. PID controllers are commonly used in feedback control loops where industries processes are mostly open loop stable or unstable. Most of the PID controller parameters are tuned using trial and error method. Proper selection of feedback construction and controller parameter tuning helps to improve the performance of the close loop system. Poor PID controller parameter tuning can lead to wear and tear associated with excessive manipulating action, poor control response and even poor quality products. In this work, we used Liquid level system which is located in Process Control lab, I.C department at L.D.C.E Ahmadabad. Take real time reading for closing the control valve at different position like 30%, 40%, 50% and 60%.and find out first order plus dead time (FOPDT) model for this different readings. After finding the FOPDT model for this different readings we used Genetic Algorithm (G.A) method to optimize the solution and find out the best value of first order plus dead time (FOPDT) like process gain (K), Process time constant (Tp) and Delay time (td). Read More...
|
INSTRUMENT AND CONTROL |
India |
180-184 |
48 |
Study On Effects Of Triphenyl Phosphate as a potential Additive for Lubricating Oil
-MuralidharaP.L ; Shrisha C Navalagatti; JagannadhaRaoY; Jayarama Naidu C
Lubricating oils play a vital role in our modern automotive, aviation and power generation industries. These oils are formulated by blending a special purpose base oils with suitable additives to enhance the base oil properties suitable for particular application. The main aim of this research is to study the effect of additives on turbine base oil. The main focus of this study is to evaluate the oils obtained from mixture of base oil and additives for its physic-chemical properties. The values so obtained were compared with commercially available turbine oil in market. The values of the properties of additive blended with base oil depends upon the base oil and the concentration of the additive used. Read More...
|
Chemical Engineering |
India |
185-189 |
49 |
A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
-Manikanth Raju
While demands on video traffic above mobile webs have been souring, the wireless link capacity cannot retain up alongside the traffic demand. The gap amid the traffic demand and the link capacity, alongside alongside time-varying link conditions, aftermath in poor ability quality of video streaming above mobile webs such as long buffering period and intermittent disruptions. Leveraging the cloud computing knowledge, we counsel a new mobile video streaming framework, dubbed AMES-Cloud, that has two main parts: AMoV (adaptive mobile video streaming) and ESoV (efficient communal video sharing). AMoV and ESoV craft a confidential agent to furnish video streaming services effectually for every single mobile user. For a given user, AMoV lets her confidential agent adaptively adjust her streaming flow alongside a scalable video coding method established on the feedback of link quality. Likewise, ESoV monitors the communal web contact amid mobile users, and their confidential agents endeavor to prefetch video content in advance. We apply a prototype of the AMES-Cloud framework to clarify its performance. It is shown that the private Read More...
|
computer science engineering |
India |
190-198 |
50 |
Optimum Selection of GA Algorithm's Parameters for Software Test Data Generation
-sonam kamboj ; mohinder singh
The proposed research work implemented and fine-tuned meta-heuristic based search algorithms namely GA algorithm for automatic test case generation using path testing criterion. The three parameters namely size of population, crossover rate and mutation rate have been chosen for setting GA algorithm for test data generation. For input generation, symbolic execution method has been used in which first, target path is selected from Control Flow Graph (CFG) of Software under Test (SUT) and then inputs are generated using search algorithms which can evaluate composite predicate corresponding to the target path true. We have experimented on two real world programs showing the applicability of these techniques in genuine testing environment. The algorithm is implemented using MATLAB programming environment. The performance of the algorithms is measured using average test cases generated per path (ATCPP) and average percentage coverage (APC) metrics. Experimentations found that crossover rate and mutation rates should be 80% and 5% respectively and population size can vary from 20 to 40 for best results. Read More...
|
computer science & engineering |
India |
199-204 |