No. |
Title and Author |
Area |
Country |
Page |
101 |
PRIVACY AND SECURITY CONCERNS IN CLOUD COMPUTING
-sravani reddy
In Cloud Computing environment, when clients or providers want to authenticate themselves to the cloud, they face some problems like the security level of their credential information to be stolen or by illegal using of their decrypted messages by attackers during the communication process. The service providers and clients delegate a third party to monitor and enforce the data center in the infrastructure level of cloud. However, the third party might not be a trusted enough for one of them or for both, so they need to manage their data by them selves. In this paper, I will go over one technique for each issue to solve the privacy problem. Web Service Security model for encrypted and decrypted messages, and Private Virtual Infrastructure model for monitoring the data over cloud. Read More...
|
computer science and engineering |
India |
408-410 |
102 |
“Mobile Wallet†in real world using the J2ME
-Diljeet Singh Chhundawat ; Manish Verma; Nandkishor Patidar; Prabhat Kumar Singh
As mobile phone technologies ramp up in sophistication, an application enjoying increased interest from retailers and marketers alike is the "mobile wallet." Put simply, mobile wallets, also known as "wallet phones," enable users to make "contactless" purchases via their mobile phone. They work similarly to credit cards, but the financial information is stored within your mobile phone for anytime access.
In this paper we provide the design of both SMS and GPRS for mobile transaction for mobile wallet and for available balance inquiry. We have demonstrated how this techniques implements in real world and provide software architecture of the same system. We also focus on technical challenges to managing and implementing dependable transaction, and provide software solution using J2ME.
Read More...
|
Computer Science |
India |
411-415 |
103 |
An Implementation of a Compact 32-Bit Advanced Encryption Standard Design for Embedded Systems
-Ms SOWMYA S ; Mr. Ravi H. Talawar
— The need for security has been increasing day by day. Various algorithms for encryption and decryption have been proposed, but all are having some problem with them. So our objective is to propose high effective AES core hardware architecture for implementing a module to encrypt/decrypt the data that apply to FPGA platforms effectively in the terms of speed, scale size and power consumption.
Recently, much research has been conducted for security of data transactions on embedded platforms. In this we describe a 32-bit architecture developed for Rijndael algorithm to accelerate execution on 32-bits platforms with reduced memory. A very low-cost implementation of around 700 occupied Slices is obtained under 347.515 MHz frequency. Verilog implementation of the proposal of the AES optimized algorithm is presented. A simulation campaign has been carried out, in order to evaluate time performances. We report the results of the AES optimized algorithm only in the case of a key size of 128 bits.
Read More...
|
Electronics Engineering |
India |
416-419 |
104 |
survey on automatic profile change of smart phone
-Nalamothu abhishek
Now a day’s we are finding each and every hand with smart phones. Size of the world is always inversely proportional to the growth of the technology, because if technology increases then the distance between the people decreases .For example :Before invention of electric mail, a mediator is needed to pass the information between the people, but now one click is enough to send information throughout the world. Smart phones change the way we are seeing this world. By using smart phone we can finish every work by “one touchâ€. The heart of the smart phone is the applications present inside that smart phone .Without applications the smart phone is almost useless .For example, one person would not move from house. He can order something to eat by using smart phone applications. He can also buy clothes by using smart phone shopping applications. This kind of service is used delivery system, so he doesn’t need to move from his house. Every smart phone has different profiles. We want different profiles when we are at home, office or any other work places. For this every time we need to change our profile manually which is very boring work and also we need to remember this change. To facing this we need an application which changes profiles of the smart phone automatically. So I decided to make an application which changes profiles of smart phone automatically. My application name is “Automatic profile changeâ€, by using this application the smart phone itself changing the profile by its own. Read More...
|
computer science |
India |
420-423 |
105 |
An MATLAB Implementation of Privacy preserving Speaker Verification and Identification using Gaussian Mixture Models
-Harisha G S ; Reshma M
Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. The proposal presents framework for privacy- preserving speaker verification and speaker identification systems, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user. In a speech-based authentication setting, this privacy constraint protect against an adversary who can break into the system and use the speech models to impersonate legitimate users. In surveillance applications, we require the system to first identify if the speech recording belongs to a suspect while preserving the privacy constraints. This prevents the system from listening in on conversations of innocent individuals. In this project the privacy criteria for the speaker verification and speaker identification problems is formalized and Gaussian mixture model-based protocols is constructed. Read More...
|
Digital Electronics and Communication engineering |
India |
424-427 |
106 |
Design of Intelligent Mobile Vehicle Checking System Based on ARM7
-K SAIRAM
With ARM7 as the core, the new intelligent mobile vehicle checking system integrated a lot of hardware modules such as video capture, GPS posi-tioning and wireless transmission, the design of the system software used the embedded software developing platform based on ADS integrated development environ-ment. By the hardware/software co-design, the new intelligent mobile vehicle checking system implemented the functions of video capturing, intelligent plate distinguishing, GPS positioning and wireless transmit-ssion, met the traffic auditing department’s needs about Mobile Vehicle Checking. Read More...
|
COMPUTER SCIENCE ENGINEERING |
India |
428-430 |
107 |
PIC18LF4620 Based Customizable Wireless Sensor Node to Detect Hazardous Gas Pipeline Leakage
-K PUNITH KUMAR
The paper describes the performance and functional characteristics of PIC18LF4620 based wireless sensor node in monitoring the parameters such as CO2, Oxygen, temperature, humidity and light around the pipeline structure. The system is deployed to monitor any deviations in these parameters with the standard atmospheric values eventually alert the user even to a remote location. The proposed system is a battery operated wireless sensor node which is interfaced with the external sensors to measure the parameters listed above. The distance range between sensor node and coordinator node is also tested. The signal conditioning module associated with detailed calibration procedure for the individual sensor is also described. Zigbee protocol stack is implemented to enable wireless transmission and performance of the same is evaluated. Read More...
|
COMPUTER SCIENCE ENGINEERING |
India |
431-434 |
108 |
GPS RECEIVER IMPLEMENTATION USING SIMULINK
-N.NITHIN CHOWDARY ; C.ABHISHEK; N.SASIKIRAN
The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. GPS (Global Positioning System) is the one of the most pre-dominantly used in most parts of the world In the past, the implementation of a complete GPS receiver was divided into two parts. The first part is implemented on ASIC or FPGA. This part includes the acquisition and tracking phases, where the algorithms of the both are written by the HDL programming language. The second part is the navigation solution part that is implemented on DSP by writing its algorithm by C/C++, FORTRAN, or assembly. This means that we have to deal with three environments to implement a complete GPS receiver. The three environments are the Simulation, FPGA, and DSP environments. Moreover, using a text programming languages in writing such long and complicated algorithms makes the process difficult to debug, modify. Simulink was used in the implementation of such receiver; there by introducing a new look for the technology that can be implemented through a graphical user interface environment. This makes every part in the receiver architecture very clear and easier to understand, follow, modify and debug. This can be considered a step added on the route of an open source GPS receiver. Using the same environment in both the simulation and implementation stages makes the designer’s mind dedicated most of the time in developing and enhancing the algorithm through rapid prototyping and experimentation and less time on the coding. In general, this article can be considered as introducing a new look for designing, simulating, and implementing the typical GPS receiver using a graphical programming language, which is SIMULINK. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
435-437 |
109 |
4G FUTURE TECHNOLOGY
-VASANTHA NARAYANAN
nowhere is this truer than on the battle field, where the ability to communicate clearly and rapidly pass on information gives the difference between survival and death? 4G is the technology that is going to drive a soldier in the field in upcoming. The key to power the military with tactical broad band voice, video and data in 4G communications technology. This technology accept Wireless technology on the platform of fixed networks, advanced antennae technologies is used and More advanced wireless security technologies is used. Next thing is about the gear for the upcoming warrior. Our device provides antennae power of vision, which provides Ground Guidance, Unit Detection, Soldier Status, Target Hand-Off and provides the Soldier Rescue during the battle. The uniform along with the protective covering, onboard computer will monitor warriors' overall physiological and psychological picture like how they are performing in the battle field and enhanced human performance which weighs only 50 pounds from head to toe but now 120 pounds of the system is present. Read More...
|
computer science |
India |
438-441 |
110 |
Perfect Reconstruction Of Quadrature Mirror Filter Bank Using Window Technique
-Charu Garg ; Priyanka Bansal
QMF finds wide range of application such as design of wavelet bases, speech and image compression, trans-multiplexers, antenna systems, digital audio industry, and biomedical signal processing due to advancement in QMF banks. This paper presents the design of perfect reconstruction quadrature mirror filter using window technique. A common approach to construct such filter-banks is to employ a two channel quadrature-mirror filter (QMF) bank with FIR analysis and synthesis filters. However, filters of high degree are required to achieve a steep transition band and a high stop band attenuation, which results in a high computational complexity and a high system delay. The computational complexity in the design of perfect reconstruction (PR) type filter bank is much higher. If QMF bank is free from aliasing distortion, amplitude distortion and phase distortion, it is said to have perfect reconstruction. The design examples illustrate that the proposed algorithm is superior in term of peak reconstruction error, computation time, and number of iterations. The proposed algorithm is simple, easy to implement, and linear in nature. Read More...
|
electronics and communication engineering |
India |
442-444 |
111 |
A Hybrid Approach for Re-current Frequent ItemSet Mining
-Surendra Tiwari ; Prof. Suma B
Recurrent itemsets mining is an important concept in the mining of different hidden patterns and is in demand in many real-life applications. There are many methods to find recurrent itemset based on breath first search (for ex-Apriori) and depth first search (for ex-FP-Tree). Both these have their own disadvantage and advantage. The BFS gave better result in terms of efficiency. The DFS algorithm is good in terms of time taken to generate recurrent itemset. Most of previous and current works on mining recurrent itemsets can only capture the static itemsets they do not take care of the recurrent itemsets that often change.so this limitation motivate to work in this area.In the proposed work, using the concept of pheromones Strategy of Ants, we described and proposed a new method for dynamic recurrent itemsets mining. Read More...
|
Computer Science |
India |
445-446 |
112 |
A NEW CLOUD BASED SUPERVISORY CONTROL AND DATA ACQUISITION IMPLEMENTATION TO ENHANCE THE LEVEL OF SECURITY USING TESTBED
-shaik javeedh
Now days cloud computing is an important and hot topic in arena of information technology and computer system. Several companies and educational institutes have been deployed cloud infrastructures to overcome their problems such as easy data access, software updates with minimal cost, large or unlimited storage, efficient cost factor, backup storage and disaster recovery and several other benefits compare with the traditional network infrastructures. In this research paper; Supervisory Control and Data Acquisition (SCADA) system has been deployed within cloud computing environment, to minimized the cost (that are related with real time infrastructure or SCADA implementation) and take the advantages of cloud computing. The command bytes (data) have been transmitted between SCADA nodes and traffic is monitored and controlled simultaneously at master (main controller) site. During communication, security is a major issue because usually, SCADA system and cloud infrastructure had been deployed without any security consideration. In current testbed implementation, strong security mechanism (using cryptography solution) has been deployed, while exchanging commands within cloud environment (SCADA within cloud environment). Several times attacks included “authentication, integrity, confidentiality and non-repudiation†have been lunched, to evaluate the security solution (proposed security solution) and security during abnormal communication. Read More...
|
computer science engineering |
India |
447-451 |
113 |
servers of cloud computing
-snehith.jp ; sonti srihari
The development of cloud computing services is speeding up the rate in which the organizations outsource theircomputational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology. Read More...
|
computer science and engineering |
India |
452-455 |
114 |
Review of Guidelines, Challenges and Design Frameworks for web publishing.
-K.S.Harikrishna ; Dr.D.VENKATA SUBRAMANIAN
The main objective of this article is to compare the frameworks and review the different frameworks challenges, challenges phased in different framework and analyze the guidelines. It has received recent interest in the research community. that is designed to support the development of dynamic website, web application, web serviesand web resources. The framework aims to alleviate the overhead associated with common activities performed in web development. For example, many frameworks provide libraries for database access, templatingframeworks and session management, and they often promote. Read More...
|
computer science engineering |
India |
456-457 |
115 |
GRID TECHNIQUE FOR VIDEO TRANSMISSION AND STREAMING
-SAILESH TOPPO N ; SAILESH TOPPO N; K.LAKSHMANASWAMY
The below suggested method gives a technique to transit and stream a video . It is comprised of six stages:[1] Segmenting entire video into frames.[2] Each frame is applied a grid so that frames are further segmented into cells .[3]Each cell is analyzed and based on the analysis of information in each cell it is decided whether further gridding is needed or not. [4]The information is evenly and equally packed. [5]Each packet is given an uniform identification number and transmitted. [6]The transmitted packets are sorted and integrated at receivers end based on unique identity given to it. Basis of analysis is pixel ratio, information size and color differences. This technique provides the uniformity among the segments of video. Read More...
|
Computer Science and Engineering |
India |
458-459 |
116 |
Network and Security
-Kotha.Dinesh Babu
Wireless device networks will improve the potency for collection info in underwater environments. within the past, researchers collected information below the ocean by the method of each causing oceanographic equipments into water and sick it at the tip of mission. the total method usually took long-standing thus period services can't be supported. Wireless device networks will find events and transmit the collected information to an information center like a shot. However, current terrestrial routing protocols aren't appropriate within the underwater device networks. Due to distinctive characteristics within the water, the transmission performance and energy of the Routing protocols area unit in efficient. This paper develops associate degree energy-efficient routing protocol in underwater device networks. The protocol is intended to cut back the amount of packets transferring within the network, and additionally decreases the required energy consumption. The protocol has been evaluated mistreatment Network machine a pair of (NS-2). The results show that the amount of reduced packets is tidy. Read More...
|
computer science engineering |
India |
460-462 |
117 |
Spectrum Sensing in Cognitive Radios for Efficient Utilisation of Resources
-Sheetal Bajaj ; Er. Rajni
The last decade has witnessed a growing demand for wireless radio spectrum due to the rapid deployment of new wireless devices and applications. Spectrum is a precious resource and thus underutilization of a large part of allocated spectrum is not acceptable. Cognitive Radio(CR) is proposed as a promising solution for increasing spectrum utilization. We conduct simulations to validate and evaluate our proposed scheme. Read More...
|
Electronics & Communication |
India |
463-466 |
118 |
Performance Analysis of Enhanced Zone Routing Protocol (EZRP) in Mobile Ad Hoc Network
-Hema Rani ; Pooja Nagpal
The path length, energy, efficiency and power consumption has been the main concerns for the wireless technology. In this paper we have proposed a new enhance ZRP technique in which the sensor nodes are divided in different-2 zones. The technique emphasizes on reduction of power by making a direct path for communication. The technique achieves less power consumption due to the zone headers of each zone. The zone header contains the information of each sensor node that is in that zone. The paper compares the different protocols like ZRP & EZRP with the proposed design (improved EZRP) in terms of power, path length, efficiency and energy. The power consumption and energy loss is reduced up to a sufficient level with the help of new enhanced zone routing protocol technique. All the simulations have been performed on MATLAB tool. Read More...
|
Electronics & Communication |
India |
467-470 |
119 |
Secure replication of service accessibility in Mesh networking using dynamic path restoration
-sindhu kasirala
Mesh topology involves the scheme of routes. Memos dispatched on mesh web can seize each of countless probable trails from basis to destination. A web in that every single mechanism links to every single supplementary is shouted maximum mesh. Heterogeneous wireless mesh web will be dominant in the subsequent creation wireless networks. Handover association and trail restoration are one of the mobility association constituent’s manipulation the change of the mobile terminals across alert communication. A fast simulation method established on sampling is industrialized for the scrutiny of trail ability potential in mesh webs alongside the aid of Vibrant trail restoration. This scheme provides the vibrant trail wreck significance sampling (DPFS) to guesstimate the trail availabilities efficiently. In DPFS, the wreck rates of web agents are biased at increased rates till trail wrecks are noted below rerouting. This simulated ideal uses "failure equivalence group"(FEG) to enable the modeling of bidirectional link wrecks, optical amplifier wrecks alongside links, node failures. The main concept utilized for this setback is polling of the continuing paths from basis to destination and coordinate them established on manipulation defeat and bandwidth availability. After the obligation is discovered whichever by node wreck or link wreck the arrangement switches to the subsequent obtainable path. If there is no potential of such trails, a rerouting is initiated. Read More...
|
computerscience |
India |
471-474 |
120 |
Estimation in Software Development Using COCOMO and Functional Point Analysis
-Komal Garg ; Paramjeet Kaur; Shalini Kapoor; Shilpa Narula
Cost estimation is one of the most demanding tasks in project organization. It is to accurately estimate needed resources and required schedules for software improvement projects. The software estimation process include estimating the size of the software product to be created and estimating the effort required, developing beginning project schedules, and at last, estimating overall cost of the project. The ability of the system to find out accurate time and cost of the software is very essential for the success of the system. There are different way and different types of method to estimate cost and time of the software. In this paper I have use the cocomo and functional point analysis to find out the effort. A new estimate may show over budget or under budget for the project. Effort is a function of size and size is calculated in lines of code (LOC) in direct approach or in indirect approach, size is representing as Function Points (FP). In this paper we use both approach with different method. Read More...
|
software engineering |
India |
475-477 |
121 |
Security Issues in a SaaS Service Model
-Ami Ladani
Cloud computing has changed the computation from centralized to virtual centralized. It is one of the fastest growing component of the IT industry. It is a means of increasing the capacity and capabilities of Information Technology without investing in infrastructure and manpower. It encircles Grid Computing, Utility Computing, Distributed Computing and Autonomic Computing. It provides three main service models to the users as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). Each of the services has it’s own security issues. This paper briefly describes the main security issues of a SaaS service model. Read More...
|
Computer Engineering |
India |
478-483 |
122 |
Design and Analysis of Elliptical IIR filter using pipelined MAC Algorithm
-Sunil Kumar Yadav ; Rajesh Mehra
In this paper, we examine the optimal throughput of the Elliptical IIR filter using pipelined MAC optimization techniques, which are relevant for real time application. By formulating filter design as a multi-objective optimization problem and approaching. Different approaches are utilized for implementing of these methods in hardware. In this work FPGA implementation of Elliptical IIR filters is examined and the comparison of these methods is done by analyzing the hardware cost and performance. Read More...
|
VLSI |
India |
484-486 |
123 |
THE EXPERIMENTAL ANALYSIS OF CLOSE LOOP PULSATING HEAT PIPE BY USING R-134a AT 83%,70%AND 50% FR
-Prashant B. Dukare ; Dr. Nilesh Diwakar; Dr.Rajiv Arya
The closed loop Pulsating Heat Pipes (CLPHPs) are emerging new technology for electronics cooling equipments.It simply two-phase passive heat transfer devices that enhances large amount of heat.It transport heat from evaporator to condenser by the principle of evaporation and condensation of a working fluid with minimum drop of temperature.The present work represents transient state experiment conducted on multiturn closed loop PHP. The Evaporator and condenser wall temperatures are measured with the help of thermocouples.Use the capillary tube in the evaporator and condenser sections with inner diameter of 3 mm and outer diameter of 4 mm. The total length of the closed loop pulsating heat pipe is 6M.The evaporator and condenser sections are 150mm and 150 mm respectively. The experiments are conducted in three mode of condition i.e vertical ,inclined and horizontal.The PHP is tested with working fluid R134a for different fill ratios from 50% to 83%.The performance parameters like temperature difference between evaporator and condenser and thermal resistance.The experimental results shows that 50% filling ratio within the tube shows better heat transfer characteristics among 83% FR and 70% FR. The 50% filling ratio in horizontal mode of operation shows lowest thermal resistance and higher heat transfer coefficient. Read More...
|
Mechanical Department |
India |
487-492 |
124 |
An implementation on Towards generalizing classification based speech separation
-SHWETHA D.N ; Reshma.M
Monaural speech separation is a well-recognized challenge. Recent studies utilize supervised classification methods to estimate the ideal binary mask (IBM) to address the problem. In a supervised learning framework, the issue of generalization to conditions different from those in training is very important. This paper presents methods that require only a small training corpus and can generalize to unseen conditions. The system utilizes support vector machines to learn classification cues and then employs a rethresholding technique to estimate the IBM. A distribution fitting method is used to generalize to unseen signal-to-noise ratio conditions and voice activity detection based adaptation is used to generalize to unseen noise conditions. Systematic evaluation and comparison show that the proposed approach produces high quality IBM estimates under unseen conditions. Read More...
|
Electronics and communication Engineering |
India |
493-497 |
125 |
Effective video storing technique using indexing
-k.Ramaswamy ; Dr.D.VENKATA SUBRAMANIAN
Now a days the storage of any data has become an important issue. High defenitions not only consumes space but also a lot if money. when we talk about high data storage ,it is essential to specify the video data as it obviously occupy more storage than any other data.for example a text document When working with video from a video camera, the process is similar to a photography workflow. You can choose to work with cameras that store their video data in a raw format. Read More...
|
computer science engineering |
India |
498-499 |
126 |
Detection Of Clones from UML Diagrams
-Pamilpreet Singh ; Harpreet Kaur
Model Driven Engineering has become standard and important framework in software research field. UML domain models are conceptual models which are used to design and develop software in software development life cycle. Unexpected copy of model elements leads to many problem. Models contain design level similarities and are equally harmful for software maintain -ace as code clones are. So number of clones need to be detected from UML domain models. This paper introduces an approach to detect clones in UML diagrams. UML diagram contains redundant element which increases the complexity and need to be removed. Firstly, UML diagrams are encoded as XML files. Tokens are extracted and matched using programming technique. The approach is based on finding similarities in tokens known as clones.In this , we tried a program to detect clones from UML Class Diagram. Class diagrams are basically converted to XML format and the proposed program is run on that XML file to detect similar classes.Our approach detect only exact matching classes means classes which are 1000% similar to one another in terms of attributes and operations Read More...
|
Computer Engineering |
India |
500-503 |
127 |
Text Detection Using Adjacency Relationship in Connected Components
-Brajesh Kumar
This undertaking, present a new scene text detection algorithm established on two machine discovering classifiers: one permits us to produce candidate word spans and the other filters out non text ones. To be precise, they remove related constituents (CCs) in images by employing the maximally stable external span algorithm. These extracted CCs are partitioned into clusters so that they can produce candidate regions. Train an AdaBoost classifier that determines the adjacency connection and cluster CCs by using their pair wise relations. Then normalize candidate word spans and determine whether every single span encompasses text or not. As the scale, skew, and color of each candidate can be approximated from CCs, develop a text or non text classifier for normalized images. This classifier is based on multilayer perceptions and we can control recall and precision rates alongside a single free parameter. Read More...
|
Computer Science Engineering |
India |
504-506 |
128 |
Unified Extensible Firmware Interface: Security solution for modern computer secure boot
-Krishna Kumar S ; Prof. Shravani G S
— With the use of the Basic Input/Output System (BIOS) for servers extending over three decades, the need for a new firmware interface that is designed for today’s operating systems and hardware architectures is necessary. Unified Extensible Firmware Interface (UEFI) is a firmware interface between an operating system and platform firmware designed to replace Legacy BIOS interface. In general, UEFI has many technical advantages over Legacy BIOS (pre-OS environment, boot and run-time services, CPU independent drivers, expanded boot volume etc.) and also powerful security mechanisms (e.g. secure boot, secure firmware update, etc.). They are aimed to provide platform integrity, be root of trust of security architecture, control all stages of boot process until it pass control to authenticated OS kernel. This paper describes about the architecture and implementation of UEFI, which enhance security in the pre-boot environment. It also discusses about malware attacks like rootkit and bootkit, and outlines UEFI secure boot solution. Read More...
|
Computer Network security |
India |
507-509 |
129 |
IMPROVISATION OF MATERIAL HANDLING ACTIVITIES FOR CONTINUOUS CONVEYOR MIXED MODEL ASSEMBLY LINE
-SAGAR V ; H RAMAKRISHNA; Mr.Rajashekhar.S Bademi
The project work exclusively focuses on improving the material handling activities for the continuous conveyor mixed model assembly line (MMAL).The material handling includes activities ranging from issuing of purchase orders to issue of material at point of use. The forklift movement which is a parameter of high priority is taken into consideration with respect to the mixed model assembly line. The main objective is to reduce the forklift movement and also the transit delay that occurs between point of storage to point of use. The zig zag movement of fork lift within warehouse is a major cause for delay in feeding the items to MMAL. Some purchasing policies with respect to bottleneck items are taken into consideration in order to improve their movement. The usage pattern of materials is not taken into consideration in present storage layout, which results in shifting the items from large distances. The warehouse is used not only for storing items for MMAL but also for storing items needed for individual assembly lines.
This occupies more space in the warehouse. Many of the items which are non-moving, not at all moving (due to change of design) are also stored in warehouse.
The methodology implemented to reduce the fork lift movement is done by replacing the fork lifts by tow-trucks. The Kraljic purchasing portfolio model and also the Porters Five forces model have enabled to reduce the risk of delays associated with bottleneck items(high supplier's risk, low profit impact). So for the firm, one of the goals ie, converting the bottleneck items into leverage items is slowly progressing. The imports storage area which is near to individual assembly line but away from MMAL is redesigned(using Solidworks) for storage of items which exclusively focuses on individual assembly lines and not on MMAL.
After the implementation of proposals the fork lift movement is likely to be reduced and results in savings of distances travelled from 14764 m to 7639 m, and diesel consumption by 49%. Also the working hours of forklift operators in second shift is avoided. The main warehouse is redesigned to focus only for MMAL so that the problem of shortage of items in kits is eliminated. This approach has removed many non-moving items from warehouse and made the kit making process easier by saving time. The Kraljic model has classified the items in four different categories, so that the bottleneck items are highly prioritized and their risk of non-availability in assembly line reduces. The conversion of open area (imports) to mini warehouse has improved the utilization of huge storage area to hundred percent. The surrounding areas around MMAL are fully utilized to 100% which was 55% earlier. So that the items are stored properly and fed on time according to their usage.
Read More...
|
INDUSTRIAL ENGINEERING MANAGEMENT |
India |
510-512 |
130 |
INTRUSION DETECTION USING MFCC , VQA AND LBG ALGORITHM
-CHARU CHHABRA ; ARCHIT KUMAR
An Intrusion Detection system is a system whose main responsibility is to detect suspicious and malicious system activity . The main goal of any Intrusion Detection system is to alert the system administrator with any kind of an intrusion . In order to discriminate between normal and different types of attacks we use classification and clustering based algorithms . Many misuse detection system includes the rule based expert systems . A Speaker Recognition is one of the most useful biometric recognition techniques in this world where insecurity is a major threat. Many organizations like banks, institutions, industries etc are currently using this technology for providing greater security to their vast databases. The Vector Quantization algorithms (VQA) have been used to detect the intrusion and also by reporting with an accurate performance of 96% with minimum possible false alarms. The system extracts a small amount of data from the speaker’s voice signal that can later be used to represent that speaker is an intruder or not . Mel Frequency Cepstrum Coefficients (MFCC) have been used to extract a small amount of data from the speaker’s voice signal that can later be used to represent that speaker. LBG Algorithm is used for vector quantization . Read More...
|
COMPUTER SCIENCE ENGINEERING |
India |
513-517 |
131 |
Green Computing
-P.Harish Kumar
Green computing or green IT , refers to Environmental sustainable computing or IT. The study and practice of designing , manufacturing disposable computers, servers and associated sub - systems such as monitor,printers, storage devices and networking and communication systems efficiently and effectively with minimal or no impact on the environment.Such practices include implementation of energy- efficient central processing unit, servers, peripherals as well as reduced resource consumption and proper disposal of electronic waste. One of the earliest initiatives towards green computing in the United States was the voluntary labeling program known as Energy Star. It is conceived by theEnvironmental Protection Agency (EPA) in 1992 topromote energy efficiency in hardware of all kinds.
The Energy Star label became a common sight especially in laptops and displays. Today’s PCs are so powerful that the vast majority of applications only use a small fraction of the computer’s capacity, it can be simultaneously shared by multiple users. Consumers 90% less energy per user PCs typically consume between 110 to 200 watt light bulb. A class room, computer lab,office with PC’s warms up very quickly.PC-filled work areas always have to be air conditioned. Air conditioners raise electricity cost & require large capital expenditures to buy, install and maintain them. Electronic waste is a large & growing problem throughout the world. On a broader scale, the Kyoto Protocol and The ClimateSavers Computing Initiative (CSCI)-Global efforts to save the environment which require Active participation of governments, organizers and manufactures. The computers and peripherals draw significant amount of energy in sleep and stand by modes. They contribute to harmful CO2 emissions. These days everyone seems to talk about global warming and ways to protect the environment.Unconsciously, all of us are contributing to unwanted CO2 emissions from house through careless use of our electrical devices. According to reports from the German Federal Environment Office, devices consume around 17 billion kilowatts hour (kWh) in a year when They are in stand by mode. DVD players, DVD Recorders or even multifunctional printers continue to draw electricity because of the absence remote of an ‘OFF’ button. If you press the ‘Power Off’ on the remote, these devices go into stand by mode. Windows Vista never shuts down or powers off the PC completely. The default shutdown mode is a deep sleep mode that requires power. Its only when you switch
off the main switch at the back of the computer that power supply unit stops drawing power.
Read More...
|
Computer Science and Engineering |
India |
518-519 |
132 |
Networking application on coding development
-R.Rajalakshmi
Recent advances in web coding have shown great possible for efï¬cient data multicasting in communication networks, in words of both web throughput and web management. In this paper, we address the problem of flow manipulation at end-systems for web coding based multicast flows. We devise optimization established models for network resource allocation, established on that we develop two sets of decentralized controllers at origins and links/nodes for congestion manipulation in wired webs alongside given coding sub graphs and lacking given coding sub graphs, respectively. With random network coding, both sets of controllers can be implemented in a distributed manner, and work at the transport layer to adjust basis rates and at web layer to hold out network coding. i clarify the convergence of the counseled controllers to the wanted equilibrium working points, and furnish numerical examples to complement our hypothetical analysis. The extension to wireline webs is additionally briefly discussed. Read More...
|
Computer science engineering |
India |
520-522 |
133 |
A Practical Incentive System for Multihop Wireless Networks
-M.SUDHAKAR REDDY ; K.VENKAT; B.HARSHAVARDHAN; D.SIDDHANATH
In multi-hop wireless networks (MWNs), the mobile nodes usually act as router store lay other nodes ‘packets to enable new applications and enhance network performance and deployment. However, selï¬sh nodes may not cooperate and make use of the cooperative nodes to relay their packets, which has a negative effect on network fairness, security, and performance. Incentive systems implement micropayment in the network to stimulate the selï¬sh nodes to cooperate. However, micropayment schemes have originally been proposed for Web-based applications; therefore, a practical incentive system should consider the differences between Web-based applications and cooperation stimulation. In this pa- per, ï¬rst, these differences are investigated, and a payment model is developed for the efficient implementation of micropayment in MWNs. Second, based on the developed payment model, an incentive system is proposed to stimulate the nodes’ cooperation in MWNs. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
523-525 |
134 |
chunking algorithim for data deduplication
-sachit ghimire ; D.venkata subramanian
This paper presents an structure and algorithm for a deduplication method which can be expeditiously used for removing similar data between files existing on different machines with high rate and performing it within rapid time. The algorithm anticipate similar parts between source and destination files very fast, and then check the identical parts and transfers only those parts of blocks that proved to be in unique region. The primal aspect is reaching faster high scalability and determining duplicate result is that data are carried as fixed-size block chunks which are distributed by chunk’s to “Index-table†both side boundary values. “Index-table†is a fixed sized table structure; chunk’s boundary byte values are used as their cell row and column numbers. Tested result shows that the given solution minimizes data storage capacity and increases data deduplication performance extensively Read More...
|
computer engineering |
India |
526-529 |
135 |
Ideal Modelling of Data Mining
-Harshil Joshi ; Keval Parikh
The study of data mining has focused primarily on the mining algorithms and their applications, while relies its foundations on established fields, such as logic statistical analysis, machine learning, database. Motivated by the practical needs of specific types of real world data analysis problems, many mining algorithms are designed and studied. They include association rule mining, classification rule mining, exception and peculiarity rule mining, sequence mining, stream mining, text mining, web mining, and others. A review of data mining literature suggests that there does not exist a well-accepted and non-controversial conceptual framework. A lack of conceptual modelling may jeopardize further development of data mining.
Our discussions are unique and differ from existing studies in several perspectives. First, we treat data mining as a field of study and emphasize the study of the nature, the scope, and philosophical foundations of data mining. We stress on the understanding of data mining as a scientific inquiry, in addition to simply empirical investigations. We pay more attention to the effectiveness of data mining methods, rather than only to the efficiency. Second, we view data mining in a wide context of scientific research, in terms of their goals, processes and methods. Third, we search for a unified and general framework, or at least general principles and guidelines, rather than a family of isolated algorithms. The framework aims at finding answers to what and why questions, as well as how questions. Forth, with the help of conceptual modelling, we attempt to move beyond trial and error, or ad hoc, applications of data mining algorithms, which dominate most current applied studies of data mining.
Read More...
|
Computer Engineering |
India |
530-533 |
136 |
An Implementation of Spectrum Sharing Scheme between Cellular Users and Ad-hoc Device to Device users
-Akilesh S ; Ravi H Talawar
In an attempt to utilize spectrum resources more efficiently, protocols sharing licensed spectrum with unlicensed users are receiving increased attention. From the perspective of cellular networks, spectrum underutilization makes spatial reuse a feasible complement to existing standards. Interference management is a major component in designing these schemes as it is critical that licensed users maintain their expected quality of service. A distributed dynamic spectrum protocol is proposed here in which ad-hoc device-to-device users opportunistically access the spectrum actively in use by cellular users. First, channel gain estimates are used to set feasible transmit powers for device-to-device users that keeps the interference they cause within the allowed interference temperature. Then network information is distributed by route discovery packets in a random access manner to help establish either a single-hop or multi-hop route between two device-to-device users. The network information in the discovery packet can decrease the failure rate of the route discovery and reduce the number of necessary transmissions to find a route. Using the found route, it can be shown that two device-to-device users can communicate with a low probability of outage while only minimally affecting the cellular network, and can achieve significant power savings when communicating directly with each other instead of utilizing the cellular base station. Read More...
|
Digital Electronics and Communication engineering |
India |
534-540 |
137 |
CLASSIFICATION OF CANCEROUS TISSUES BASED ON PATTERN RECOGNITION AND FEED FORWARD NEURAL NETWORK
-S.K.HEMAPREETHY
The classification of cancerous tissues are crucial in the case of cancer diagnosis. This project describes the detection and classification of cancerous tissues based on structural and statistical pattern recognition and neural networks. Image classification using neural networks is done by texture feature extraction and then applying the back propagation algorithm. The feed forward neural network is trained using back propagation algorithm which is being employed to classify the cancerous tissues based on its features. Thus our experiment demonstrates that the proposed model leads to higher accuracies and also provides quick results, compared against the pattern recognition technique that uses SVM classifier for quantification. Read More...
|
Image Processing |
India |
541-545 |
138 |
DATA MINING AND WAREHOUSING
-N.MANASA REDDY ; N.MANASA REDDY
Data mining and warehousing together provide a combined environment to store data and recover data in the obligatory form. Data Warehousing and mining lifts the computer record industry to one more high level of achievement. The part two spans have seen an affected increase in the amount of substantial or data being stored in microelectronic setup. This accrual of data has taken place at an instable rate. It has been appraised that the amount of evidence in the world duets every twenty months and the scope and number of folders are increasing even faster. The increase in use of electrical data crowd campaigns such as idea of sale or isolated knowing devices has backed to the bang of surviving data. The equivalence with the extraction practice is defined as follows. Data removal refers to "using a variety of systems to find chunks of info or executive data in forms of data, and taking out these in such a way that they can be put to use in the ranges such as choice provision, guess, estimating and Valuation. The data is often huge, but as it opinions of low price as no shortest custom can be made of it; it is the unseen evidence in the records that is usefulâ€. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
546-549 |
139 |
Grain Cleaning Machine with the Use of the Electrical Energy
-Nikunj K. Patel
This document gives the information about the grain cleaning machine which use the electrical energy instead of the use of the petrol or diesel. The overall cost of the making of this type of the grain cleaning machine is very low compared to the conventional machine and very easy to construct. Read More...
|
Mechanical Engineering |
India |
550-551 |
140 |
IMAGE PROCESSING ON DISTRIBUTED ENVIRONMENT
-MUTHU LAKSHMI .L ; MUTHU LAKSHMI .L
In distributed image process framework consist of analyzing the performance through distributed control. It's additionally includes information association and dynamic data management. During this paper varied distributed environments square measure mentioned and shows however distributed image process algorithms work done by victimization dynamic data for a selected application. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
552-553 |
141 |
Heart Disease Prediction using Naive Bayes Classification in Data Mining
-RUCHIKA RANA ; Jyoti Pruthi
In this research, data mining techniques will helpful to handle the predictive model. Research will show the most effective parameter of the heart disease prediction which gets the scenario for least predictive value and most predictive value from the dataset. Initially need to identify the exact state of the user entering parameter which can be frequent item although random value of dataset in data modeling. Results show that unique strength which identifies the objectives of the defined mining goal and expert system. Some medical exponent attributes such as age, sex, blood pressure and blood sugar, glucose and some related factors can predict the likelihood of patients getting a heart disease with its exact probability. Basically this technique is expended on the defected and non-defected parameter which works as result class.
The System can discover and extract hidden knowledge associated with diseases (heart attack) from a historical heart disease database.
Read More...
|
computer sc |
India |
554-557 |
142 |
An Inquisitive Model for Security Of Web Services
-MONIKA ; k.dheeraj
Web services based on SOAP are developed with a common XML-based protocol. The main objective is to create a decentralized, distributed system for a machine readable document to be passed over any multiple connection protocols. Since SOAP doesn’t provide message security, other ways of securing messages are required. The proposed system suggests models of securities like SOAP, WS-Security, and their related specifications. On the whole in addition to this specification it also describes encoding of binary security tokens, based tokens framework for XML, the process of inclusion of opaque encrypted keys. It also includes extensibility mechanisms that can be used to further describe the characteristics of the tokens that are included with a message. This paper also discusses the advantages and disadvantages of the SOAP protocol, how it compares to various other distributed system protocols such as; CORBA, XML-RPC, and JAVA-RMI, and how SOAP fits into the distributed architecture. Read More...
|
Computer Science Engineering |
India |
558-562 |
143 |
Performance of WSNs under the Effect of Collisions and Interference
-p.yeshwanth kumar ; mani
This paper proposes a methodology for calculating the energy consumed by a Wireless Sensor Network as well as its throughput under the effect of a jamming node modelling interference to account for collisions and retransmissions. Accordingly, the proposed methodology takes into consideration retransmissions and data dropped due to interference and collisions simulta-neously. Simulations are conducted using OPNET to model various scenarios utilizing off-the-shelf wireless communication standards, namely ZigBee, Wi-Fi and Low Power Wi-Fi. A figure of merit is developed to offer more representative results for applications with different requirements. In achieving different requirements for a given application, there is a clear trade-off between energy consumption and throughput. Read More...
|
computer science & engineering |
India |
563-568 |
144 |
Dynamic Channel Allocation Parameters for best use
-Sushant Jhingran ; Sher Jung Khan
In Dynamic Channel allocation, parameters play a vital role. Parameters define that how data transfers without collision. Collision less transmission is a challenge in today world. But with the help of these parameters ,we can transfer data without collision. Transmission rate become fast and faster with change in generations. For instance, security and surveillance systems employ serial to Wi-Fi modules to stream surveillance video from remotely mounted security cameras to wired network systems [1].
When a collision occurs on an Ethernet LAN, the following happens:
A jam signal informs all devices that a collision occurred.The collision invokes a random backoff algorithm.Each device on the Ethernet segment stops transmitting for a short time until their backoff timers expire.
All hosts have equal priority to transmit after the timers have expired.In Dynamic channel allocation that deals with the allocation of channels to cells in a cellular network. Once the channels are allocated, cells may then allow users within the cell to communicate via the available channels.In Dynamic Channel Allocation (DCA) we transmit frames. So that during transmission their may be a collision. A single channel is used for communication. All frames are transmitted through this channel. [6]
Read More...
|
Computer Science |
India |
569-570 |
145 |
Detection of transportation mode using mobile phones
-Jayashree.M
As smartphone advance in practicality and capability, they're more and more getting used as instruments for private observance. Applications area unit being developed that make the most of the sensing capabilities of mobile phones - several have accelerometers, location capabilities, imagers, and microphones - to infer contextual info. My plan is to form Associate in nursing mobile application to observe the transport mode of the vehicle and it's principally employed in the serious vehicles to observe the movement of the vehicle to forestall from accident. To execute this application we'd like a measuring instrument device and GPS device however the most advantage of this idea is, simply a smartphone is enough for this application wherever the each measuring instrument and GPS is on the market on that. The target application for this transportation mode abstract thought involves assessing the hazard exposure Associate in nursing environmental impact of an individual’s travel patterns. Our epitome system consisting of a call tree followed by a first-order Hidden mathematician Model achieves the appliance demand of getting accuracy level larger than ninetieth once testing with our dataset consisting of twenty hours of knowledge collected across six people. Read More...
|
Information technology |
India |
571-573 |
146 |
PARTIAL CORPUS CALLOSAL AGENESIS
-A.sultan
Dandy-Walker malformation is characterised by agenesis or hypoplasia of the cerebellar vermis, cystic dilatation of the fourth ventricle, and enlargement of the posterior fossa. Approximately 70-90% of patients have hydrocephalus. Lissencephaly is characterised by absence (agyria) or incomplete development (pachygyria) of the gyri of the cerebral cortex, causing the brain's surface to appear unusually smooth. Our case demonstrates Dandy Walker malformation with partial corpus callosal agenesis, hydrocephalus and Lissencephaly. Read More...
|
Computer Science and Engineering |
India |
574-575 |
147 |
IMPLEMENTATION OF CHAOTIC ALGORITHM FOR IMAGE TRANSCODING
-PRADEEP K GM ; Dr. RAVIKUMAR M .S
The transcoding refers to a two-step process in which the original data/file is decoded to an intermediate uncompressed format which is then encoded into the target format. Transcoding is the direct digital-to-digital data conversion of one encoding to another. This paper proposes a system of secure image transcoder which mainly focuses on multimedia applications such as web browsing through mobile phones, in order to improve their delivery to client devices with wide range of communication, storage and display capabilities. This system based on CKBA encryption ensures end to end security. The performance of the system has been evaluated for different images. It is verified that the proposed system is having less resource complexity with good performance. Read More...
|
ELECTRONICS & COMMUNICATIONS ENGINEERING |
India |
576-581 |
148 |
Optimization of Governor Cover Leakage Testing Process to Reduce the Rejection Rate at the Customer End
-Rajiv.K.S ; H.Ramakrishna
High Pressure Die Casting is an industrially valuable manufacturing process used in the production of light weight Aluminium alloy components in the automotive industry. The die casting process although highly reproducible suffers from defects that occur due to various process parameters. The leakage testing analysis of defective components is performed after the value addition processes like machining are already done on the die cast component. The inefficiency of the testing process ultimately results in the supply of defective parts to automotive manufacturers. This study aims to improve the leakage testing process efficiency for the Governor Cover part produced by a supplier to OEM in Bangalore, India. The quality control techniques like Ishikawa diagram, 4Ms and Measurement System Analysis (MSA) are employed to achieve an efficient testing process model. The improvements applied result in obtaining a more accurate defect data at the supplier and majorly an overall reduction of rejections at the customer end by 40% in a period of two months. Read More...
|
Industrial Engineering |
India |
582-585 |
149 |
Snake Robotics
-Sathish Kumar
Research on snake-like robots expands the fields of application of robots.Based on control area network(CAN) bus technologies,we control the snake-like robots.They can use to search for survivals in shambles,of earthquake,fire.Its maximal distance of communication is 10 km,while calculating bit rates is up to 1 mbps.monitoring system which is connected to the control system through wireless communication.microcontrollers (MCU) are applied to our robort control system and snake-arm robot is a slender hyper-redudant manipulator.the high number of degrees of freedom allows the arm to “snake†along a path or around an obstacle. the master module consists of a 16-bit MCU,a wireless communication module and a sensor part.The snake robotics is used in various military uses,these are navigate very confined spaces used to search for people trapped in collapsed bulidings. Read More...
|
Robotics |
India |
586-588 |
150 |
Cyborg
-T. Arul Raj
The term Cyborg refers to a “cybernetic organismâ€, which characterizes the combination of a living organism and a machine parts. The Cyborg works as a both inputs from the living sense and from the machine interface,which acts as a enchancment module.the clear difference between the human and the computerized technology in human-cyborgs interaction,which differs from cyborgs acts out of human function. Webriefly summarize this journal how exactly the cyborg is activated and the future aspects and prospects?. In which I should explains here,cyborgs generation of the society and what happens when a man get merged with a computer?.But now let us understand what cyborgs are all about? Read More...
|
Robotics |
India |
589-593 |