No. |
Title and Author |
Area |
Country |
Page |
51 |
Fault Tolerant System for Computational and Service Grid System
-Rakesh Amancha
Computational and Service grid is utilized to resolve large-scale logical request employing grid resources. The main focus is on obligation identification, obligation rectification (fault tolerance) employing checkpoint approaches. In order to accomplish the obligation agreement, checkpoint way can be used. Check pointing is a record of the snapshot of the whole arrangement state in order to restart the request afterward the occurrence of a little failure. A public method for obligation agreement is vibrantly adapting the checkpoint, in that all the wreck data are upheld in the Grid data server, this need distinct server for storage intention in coil the killing period is increased. The main aim of checkpoint way is to minimize the finished killing period in grid system. In this work obligation tolerant arranging is can be attained employing kernel-level checkpoint. The Last wreck period and Mean wreck period checkpoint established algorithm minimize the killing time. In case of resource wreck, the Obligation Index Instituted Rescheduling (FIBR) algorithm is utilized to reschedules the job to a little supplementary obtainable resource. This ensures that the job is given inside minimized killing time. Read More...
|
Networking |
India |
205-208 |
52 |
A Descriptive Study and simple design of SIXTH SENSE TECHNOLOGY
-Divyalakshmi ; D Venkata Subramanian
This paper deals with the latest technology called the sixth sense. It's a wearable interface that augments the physical world around us with the digital information. It's just born concept which allows user to connect with the internet seamlessly. Without use of keyboard, mouse we can see videos access, change, move data simply. But this concept bottle necks lead to modification of the same by using commands instead of gestures. Speech IC is used as a database for commands which will be initially trained for storage. It performs the corresponding commands accessing the operation from the mobile device connected to it and action is projected using a projector over any surface. It's more possibly to be implemented in future because of its cost constraints.Have you ever thought of doing your daily works digitally? What happens if the digital world is merged into the real world? For example, imagine taking a picture with your hands. Or imagine dialing a phone with the palm of your hands. A web cam pinched in a piece of paper becomes an I-pad. Wouldn’t that be interesting? This is made possible by a technique known as ‘Gestural interface’. It is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms interface. Using this technique, a new technology known as the ‘Sixth sense technology’ has been developed. Read More...
|
computer science engineering |
India |
209-212 |
53 |
Evaluation of Experimental Modal Analysis
-Ganesh Suresh Supekar ; Dhananjay Panchagade
Experimental modal analysis has grown steadily in popularity since the advent of the digital FFT spectrum analyser in the early 1970’s. Today, impact testing (or bump testing) has become widespread as a fast and economical means of finding the modes of vibration of a machine or structure. Mechanical resonance is the tendency of a mechanical system to absorb more energy when the frequency of its oscillations matches the system's natural frequency of vibration than it does at other frequencies. It may cause violent swaying motions and even catastrophic failure in improperly constructed structures. When designing objects, engineers must ensure the mechanical resonance frequencies of the component parts do not match driving vibrational frequencies of oscillating parts, a phenomenon known as disaster. Different techniques, experimental and theoretical have been developed to analyse problems related to vibration. But in the present era computational techniques are quite common and are very reliable as far as the vibration analysis is concerned. In this paper, the vibration behaviour of radial flow impeller and Turbine generator foundation are reviewed. Vibration characteristics of the impeller are studied using experimental technique. Also, Vibration behaviour of the turbine generator foundation was verifieds. Read More...
|
Mechanical Engineering |
India |
213-217 |
54 |
SQL Injection
-C.D Surya Nivas
SQL injection is a code injection , used to attack the data-driven applications, in which malicious SQL statements are added into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection should exploit a security vulnerability in an application's software, for instance, when user input is incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and suddenly executed. SQL injection is mainly known as an attack vector for websites but it can be used to attack any type of SQL database. Read More...
|
Computer Engineering |
India |
218-220 |
55 |
Optimal Location of Thyristor Controlled Series Compensator (TCSC) for Loss Minimization in Power System using Optimal Power Flow
-Kalpesh N.Thakkar ; Dr. I. N. Trivedi
Flexible Alternating Current Transmission Systems (FACTS) devices signify a modern technological advance in electrical power systems. FACTS devices offer so many benefits like transient stability improvement, sub-synchronous resonance (SSR) mitigation, damping of power swings, avoiding voltage collapse, enhancing power system reliability, minimize the loss in power system. Though FACTS controllers offer many advantages, their installation cost is very high. Hence the ideal placement and the optimal parameter settings of these devices in the power system are of key issues. In this paper OPF method is proposed to find optimal location and optimal parameter setting considering power loss minimization in power system. The proposed method is carried out on IEEE-30bus power system. Read More...
|
Electrical Engineering |
India |
221-224 |
56 |
Literature Review - on CFD Study of Producer Gas Carburetor
-shirish konde ; Dr. R. B. Yarasu
Because of present and predicted scenario about future of energy ,we can say that there is urgent need to look after the available and new non-conventional energy resources other than traditional. In that list, energy production from producer gas is one of the prominent option. Producer gas i.e. gas produced after burning of biomass or particularly wood. Now a days because number of attempts towards gasification , the gas can be use directly for internal combustion engine. Producer gas derived from biomass gasification, as an important renewable and economical energy source for both heat and electricity generation, is being recognized for its true potential as well as urban industry. CFD i.e Computational Fluid Dynamic study of carburetor gives fluid flow visualisation inside the domain. A specially designed producer gas carburetor is comprehensively analyzed by researchers for its mixing performance and response with a CFD modeling. In this paper, a review has been done on CFD study of carburetor for producer gas engine. Read More...
|
Mechanical Engineering |
India |
225-229 |
57 |
The clustering Algorithm based on partical swarm optimization
-Indu walia ; Er.Mohinder singh
After analyzing the disadvantages of the classical K-means clustering algorithm, this paper combines the core idea of K-means clustering method with PSO algorithm and proposes a new clustering method which is called clustering algorithm based on Particle Swarm Optimization algorithm. It used the global optimization of PSO algorithm to make up the shortage of the clustering method. The algorithm is evaluated on Iris plants database, Results show that the algorithm is more effective and promising. Read More...
|
Computer Science and Engineering |
India |
230-232 |
58 |
H.264 Video Compression Standard -Review
-Akhil Modi ; Jaymin Vaghela; Sunil Kumar Singh
A video encoder is software that enables compression of digital video; the format of the compressed data adheres to a video compression specification. The compression is usually lossy. Historically, video was stored as an analog signal on magnetic tape. Around the time when the compact disc entered the market as a digital-format replacement for analog audio, it became feasible to also begin storing and using video in digital form and a variety of such technologies began to emerge. Audio and video call for customized methods of compression. Engineers and mathematicians have tried a number of solutions for tackling this problem. There is a complex relationship between the video quality, the quantity of the data needed to represent it (also known as the bit rate), the complexity of the encoding and decoding algorithms, robustness to data losses and errors, ease of editing, random access, and end-to-end delay. Read More...
|
Electronic & Communication Engineering |
India |
233-235 |
59 |
Harmonics Elimination in Cascade Multilevel Inverters Using Newton-Raphson and Genetic Algorithm
-Aman Parkash ; S.L. Shimi; S. Chatterji
This paper represents the reduction of harmonics in a cascade H-bridge multilevel inverter using iterative newton-raphson (NR) and genetic algorithm (GA) techniques. The proposed optimization techniques are used to solve the set of non-linear transcendental trigonometrical equations. The controlling pulses are obtained by harmonic elimination pulse width modulation (SHE-PWM) switching method. The set of non-linear transcendental equation is minimized by proposed iterative newton-raphson (NR) and genetic algorithm (GA) techniques, and also have been analysed and compared the harmonics. Read More...
|
Electrical Engineering |
India |
236-239 |
60 |
Design and Implementation of a Family Living Supporting System Based on ZigBee
-mohammad asif
For enhancing the self-caring ability of senior citizen, releasing the pressure of the warding people, a family living supporting system, which is very useful for the paralyzed patients or some people with mobility difficulties, is proposed. It is composed of the wireless transmitting unit, the speech recognition module and the network communication part. A speech recognition processing algorithm is designed to get some command messages from the user. The system not only uses these commands to control some household equipment, but also sends some helping signals via wireless network or Internet. If the family members aren’t prompt to respond to these helping messages, these messages will be transmitted by network communication part to the community service center for assistance immediately. It has some advantages of low-cost, low-power, high-performance, easy-operation and so on. As a result, it could be employed as a terminal of health-care of hospital or home. Read More...
|
computer science engineering |
India |
240-243 |
61 |
Automatic License Plate Detection of Vehicles with Different Contrast Scenario.
-Sharad Mehta ; Dr. Mohd Amjad
This paper proposes an approach for automatic detection of License Plate if Vehicle in variable contrast scenarios without the use of image thresholding and provides results based on this approach. The results of image thresholding are highly affected by environmental conditions such as sunlight; shade, hue conditions on or around license plate area. Mask images are generated using image morphological operations and are combined together to detect possible license plate candidate areas. These possible candidate detected areas are further probed for presence of license plate characters before identifying it as an actual license plate area. For this probing, contour detection is used, which is later used to categorize clusters of characters inside the detected areas. Once a favorable set of conditions like shape, size, aspect ratio, number of characters are met, the area is confirmed to be a license plate. The proposed algorithm has been tested on images acquired under different test conditions and found to be working successfully. Read More...
|
Computer Science |
India |
244-249 |
62 |
Cloud Computing
-D. Gokul Prasaad
The Cloud Computing is one of the emerging modern technologies that need to meet the emerging business needs for agility, flexibility, cost reduction and time-to-value. The developments in cloud computing paradigm necessitate faster and efficient performance evaluation of cloud computing servers. The advanced modeling of Cloud servers are not feasible one due to nature of cloud servers and diversity of user requests.This issue necessitates calculating performance of cloud servers and should be capable of handling several millions of requests in few seconds. It is so possible through the specialized computing facility called Virtualization and even with it, very hard to serve plenty of requests continuously or simultaneously without delay or collision. We proposed a new mechanism to overcome these performance problems and to aim for optimize their performance; we can achieve this goal with help of queuing theory.To tackle the problem of optimizing the performance of cloud servers, we model the cloud servers with multitenant architecture as an M/G/m/m + r queuing system with single task arrivals and a task buffer of finite capacity. In this model focusing on input buffer size, number of servers, mean number of request, responseand etcas metrics for performance. The proposed algorithm named approximate Analytical model, and is equivalent to the combination of Transformation based Analytical Model & an Approximate Markov Chain Model with supporting calculations works out to bring the optimized performance evaluation of cloud servers. Read More...
|
Computer Engineering |
India |
250-254 |
63 |
Study and Analysis of Computer Device in Relation to Human Accessories
-Dipankar Mazumdar ; Prof.S.Prabhakaran ; Christopher Rajkumar
Like a human, the workstation inputs, methods, saves and yields data. Yet the psyche has developed close by divergent configuration standards from those behind the Von Neumann workstation plan that most workstations yet seek after today. A similarity of human and machine servings close by its information preparing recommends forthright differences in: Domination, Input, Output, Storage, Initiation, Self-Processing and frill. Meanings of these differences for machine and human license to recognize and depict the likenesses of workstation embellishments in connection to human servings and perceive new scrutiny open doors and streets of basic scrutiny that will prompt new measurement in the crown of present requests .Thus developing to reproduce and examination another web gathering that will take after the system how human developments are dispensed and capacity. Read More...
|
Information Technology |
India |
255-259 |
64 |
CFD Analysis of Pressure Coefficient for FX66-S196-V1
-Dushyant Kalihari ; Brijesh Patel; Anil Murlidhar Bisen
In this paper FX66-S196-V1 airfoil profile is considered for analysis of wind turbine blade. Geometry of the airfoil is created using GAMBIT 2.4.6. And CFD analysis is carried out using FLUENT 6.3.26 at various angles of attack from 0˚ to 5.5˚. Variations of pressure coefficient are plotted in form of contour for 1 ×105 Reynolds number. Read More...
|
Mechanical Engineering |
India |
260-262 |
65 |
Error proofing mechanism to ensure the correctness of rotary pump timing using a barcoding system.
-Divya c h
Humans are indispensable part of any manufacturing industry. And when human resource is involved chances of human errors cannot be dismissed. Almost all defects are caused by Human errors. Read More...
|
quality maintainance |
India |
263-264 |
66 |
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling Algorithm for Energy Efficiency
-Santoshi P. Biradar ; Prof . Poonam D.Lambhate
In Wireless Sensor Network (WSNs), gather the data by using mobile sinks has become popular. Reduce the number of messages which is used for sink location broadcasting, efficient energy data forwarding, become accustomed to unknown earthly changes are achieved by a protocol which is projected by a SinkTrail. The forecast of mobile sinks’ location are done by using logical coordinate system. When sensor nodes don’t have any data to send, at that time they switch to sleep mode to save the energy and to increase the network lifetime. And due to this reason there is a chance of the involvement of nodes that are in sleeping state between the path sources to the mobile sink which is selected by the SinkTrail protocol. Before become the fully functional and process the information, these sleeping nodes can drop the some information. Due to this reason, it is vital to wake-up the sleeping nodes on the path earlier than the sender can start transferring of sensed data. In this paper, on-demand wake-up scheduling algorithm is projected which is used to activates sleeping node on the path before data delivery. Here, in this work the multi-hop communication in WSN also considers. By incorporating wake-up scheduling algorithm to perk up the dependability and improve the performance of on-demand data forwarding extends the SinkTrail solution in our work. This projected algorithm improves the quality of service of the network by dishonesty of data or reducing the loss due to sleeping nodes. The efficiency and the effectiveness projected solution are proved by the evaluation results. Read More...
|
computer engg |
India |
265-268 |
67 |
Response Spectra and Time History Analysis of Rani Ki Vav(Step well), Patan
-Ashish Padsala ; Rudra Upadhyay
Historical monuments defines rise of humanity over the centuries. Few of them are structural masterpieces yet very less work has been done towards such structures. They have been standing over thousand years but negligible damage has been caused to these structures by natural calamities. This descriptive research study aimed to conduct a seismic analysis of the Rani Ki Vav, Patan. Rani kiVav is well known monument in the world and currently been placed into the world heritage by UNESCO. For this purpose of the study 3D model using Gridlines was constructed in the F.E.M. based software Sap2000. Response Spectrum Analysis and Time History Analysis was carried out and based on the output Response Spectra and Time History Acceleration graphs are developed. Read More...
|
Civil Engineering |
India |
269-271 |
68 |
Design of PIFA to Reduce the Heraclius Effect of Mobile Phone
-Shelly Makhija ; Pooja Nagpal
This paper proposes Planar Inverted-F Antenna with different geometries at PCS band for calculating specific absorption rate(SAR). A PCS band exists from 1.85 to 1.91 GHz. The proposed antennas are configured to suppress the radiation. FR-4 is used as substrate in these designs. Here, the electric-field has been calculated and then specific absorption rate is measured. Read More...
|
Electronics & Communication |
India |
272-274 |
69 |
FEA Analysis of an Electric Wiper Mechanism
-Amit Anil Nimbalkar ; Dr. B.E. Narkhede
In this study, a procedure for FEA analysis of an electric wiper mechanism is developed using flexible multi-body dynamic simulation and dynamic stress analysis. Both rigid and flexible body dynamic models are simulated by using ANSYS software. This was done in two parts- first rigid dynamics analysis was performed and secondly transient structural analysis was performed. Read More...
|
Production Engineering |
India |
275-278 |
70 |
Evaluation of the Salinity Tolerance of some Rice (Oryza Sativa) Genotypes of Kashmir Valley.
-Subzar Ahmad Sheikh ; Mohd Rafiq Wani
The salinity tolerance of four rice genotypes, at germination and early seedling stages was evaluated using six salinity levels of Nacl and Kcl. Data regarding final germination percentage, germination energy percentage, plumule and radical length and seedling dry weight were recorded. Salinity decreased the various parameters studied in different varieties and the degree of inhibition increased with increasing salinity level. At 20 dS m-1 salinity level, germination was completely inhibited for all four genotypes. Using seedling dry matter reduction as the criteria, the genotypes were categorized as tolerant (T), moderately tolerant (MT), moderately susceptible (MS) or susceptible (S). Jhelum showed greater dry matter accumulation and better salt tolerance during germination and early seedling growth compared to other three genotypes. The results suggest that Jhelum can be recommended to be cultivated on the slightly saline soils. Read More...
|
Agricultural science |
India |
284-288 |
71 |
A Review of Wireless Sensor Network Under the Denial Of Service Attack (DoS)
-JATINDER SINGH ; ABHINAV BHANDARI
Wireless Sensor Networks are used widely in numerous fields for countless applications such as pollution check, soil erosion, military applications etc. WSN include sensing + processing + storage + transmission. It has sensor nodes connected wirelessly deployed over an area or a person according to the requirement. It collects the information and sends it to the base station and server for analysis using radio frequency transmission at the real time. DoS attacks are such attacks which prevent the legitimate user from accessing the network or resources. Such attacks include blackhole attack, sinkhole attack, ddos attack etc. Attack can be possible on the sensory nodes, routing path of the data .These attacks could change the data collected or even prevent the data from reaching the destination. This could lead to the incomplete or falsified data at the server which further results in a wrong interpretation of the crucial information regarding the specific area, person or environmental conditions etc. This is a review paper about WSN under the effect of DoS attacks. This paper shall provide a review of the various methods and strategies developed so far to mitigate or completely eliminate the DoS attacks detected in a WSN. Read More...
|
computer engineering |
India |
289-294 |
72 |
REDUCTION IN WARRANTY ISSUE OF LIFTING PLATE BRAKAGE
-Rohith H K ; Dr.S.A.Vasantha kumara
Window regulator is a sub assembly used in a automotive car. The window regulator helps in the smooth movement (up and down) of the glass in a car. The window regulator sub assembly of Tata Indica Vista was found to have a large number of rejection causing the highest PPM (Part Per Million) due to defects in the part, high inventory between the process, unbalanced process line and also due to the under utilization of the resources.The project takes on the objective of reduction of Warranty issue of Tata Indica Vista window regulator sub assembly line. The methodology involves studying of each component of the sub assembly and analyzing the variations occurred in the dimensions of each part of sub assembly. Cause and effect diagram and root cause verification were used as the tools to find the cause for the rejections. The problem was with the part known as Lifting plate, the variations with the dimensions of the Radius in wire rope end crimp of upper cable from metal insert & lifting plate. A Radius was designed for the inspection of the incoming parts from the supplier end. After the Radius was implemented this resulted in the achievement of the objective of reduction of the in-house PPM and Warranty issue. The achievement of the above objective enabled the company to raise its sigma value. Read More...
|
Master of Engineering And Management, Industrial Engineering and Management Department |
India |
295-299 |
73 |
Analysis on routine enhancement in novel routing algorithms for energy effective mobile
-Bisai Priyanka
Energy efficiency is an important concern in wireless mobile ad hoc networks, because the mobile nodes in ad hoc networks communicate without an aid of an infrastructure on limited battery capacity. Here a new routing algorithm called location Based Hybrid Routing (PBHRA) describes effective use of bandwidth and extend the battery life of the mobile nodes. This is done, by reducing the computational time in the proposed algorithm. The mobile nodes in MANETS do not have a centralized management. Hence in PBHRA, the central node for controlling the route determination acts as Master Node which directs and controls the other nodes. The performance evaluation of the algorithm will be carried out with the existing routing algorithm. Read More...
|
p2p networks |
India |
300-303 |
74 |
STUDY ON PROPERTIES OF CONCRETE USING MARBLE DUST AND RISE HUSK ASH
-Jayesh patel ; Prof.M.A.JAMNU
The study on Waste can be used to produce new products or can be used as admixtures so that natural resources are used more efficiently and the environment is protected from waste deposits was studied in this paper. Marble stone industry generates both solid waste and stone slurry. Marble powder is one of the materials which severalty affects the environment and health problems. It is produced from sawing, shaping, and polishing process. Rice Husk Ash which is an Agro-Waste and known to be a Super Pozzoland have been used for mass concrete. the study on experimental work for the concrete using marble dust and rise husk ash of m20 mix design .the use of marble dust and rise husk ash in concrete production as cement replacement. the concrete using different type waste material and perform fresh properties like as workability and hardened properties like as compressive strength , tensile strength and durability test. Read More...
|
Civil Engineering |
India |
304-306 |
75 |
STUDY ON FRESH AND HARDEN PROPERTIES OF CONCRETE USING MARBLE DUST AND RISE HUSK ASH
-Jayesh patel ; M.A.JAMNU
The study on Waste can be used to produce new products or can be used as admixtures so that natural resources are used more efficiently and the environment is protected from waste deposits was studied in this paper. Marble stone industry generates both solid waste and stone slurry. Marble powder is one of the materials which severalty affects the environment and health problems. It is produced from sawing, shaping, and polishing process. Rice Husk Ash which is an Agro-Waste and known to be a Super Pozzoland have been used for mass concrete. the study on experimental work for the concrete using marble dust and rise husk ash of m20 mix design .the use of marble dust and rise husk ash in concrete production as cement replacement. the concrete using different type waste material and perform fresh properties like as workability and hardened properties like as compressive strength , tensile strength and durability test Read More...
|
Civil Engineering |
India |
307-310 |
76 |
smart cards
-Karlapudi Prasanthi
Smart Cards have been increasing in popularity in the last few years. Actually Smart cards are small plastic cards the size of a credit card, but with one difference. Instead of just having embossed lettering and a magnetic strip to contain information, they also have a computer chip. This chip is an Integrated Circuit (IC) that can hold vast amounts of information and provide users with multiple applications. In the coming years more and more Smart Cards will be in use. Smart Cards will replace keys, documents, human actions, cash, and sometimes even palmtops and laptops. The same card will be used as an ID card, drivers license, key to the house and office, access to home entertainment, a wallet, and much more. Read More...
|
Computer Science Engineering |
India |
311-314 |
77 |
Patient monitoring system
-Punuru Sowmya Reddy ; G.Kapilya
Computer-aided bedside patient monitoring is applied in areas where real-time vital function analysis takes place. Modern bedside monitoring requires not only the networking of bedside monitors with a central monitor but also other standard communication interfaces .In this paper, a novel approach to patient monitoring is introduced. A patient monitoring system was developed and implemented based on an existing industry standard communication network, using standard hardware components and software technologies. The open architecture system design offers scalability, standard interfaces, and flexible signal interpretation possibilities. Read More...
|
Coumputer Science and engineering |
India |
315-318 |
78 |
genetic algorithm
-Kanigolla.Anupama
This paper attempts to examine the way as how Genetic Algorithm (GA) can be employed in finding the best solution amongst a given number of possible solutions, the basic principle being extracted from the evolution and adaptation of organisms. The thought of Genetic Algorithm primarily originates from the perception of Charles Darwin who thought that combination of selection and variation is what that makes evolution of organisms perfectly adaptable to the environment. As generations pass, better adaptable organisms are born and the system slowly reaches to a most favorable point. GA makes use of this principle and eventually converges to the best “optimal†solution amongst a set of given solutions. In searching for a solution, a population of candidate is generated, evaluated, selected, and reproduced with modification to produce the candidate population until no further improvement can be made or after certain numbers of generations have generations have evolved, as according to the need of the problem. Read More...
|
computer science engineering |
India |
319-322 |
79 |
Home Security & Control Over Appliances By GSM
-ANURADHA SHARMA ; PRANJAL KATARA; DIPESH MONGA
The aim of this research is to design and implement a cost effective and yet flexible and powerful home security system using the GSM technology. A mobile based home security system is needed for the occupant’s convenience and safety. The system is designed to detect burglary, leaking of harmful gas; smoke caused due to fire and after detecting suspicious activity it sends a alarm message to the owner number. The whole process in controlled by a android cell phone application. The user can activate all the alarm system while going outside thorough the apps. The app. has the feasibility of activating and deactivating the alarm system with the additional control for some home appliance switching. With this system installed a person can travel anywhere in this world within the GSM covered region with the assurance of complete safety of his/her house. Read More...
|
ELECTRONICS & COMMUNICATION |
India |
323-326 |
80 |
Securing wireless adhoc network
-Mahenaz Fatima ; Mohd Sadim
An adhoc network is a network which does on rely on existing infrastructure such as Routers or access point. Access point is helpful in establishing LAN, WAN connection. There are various security issues in designing an adhoc network .in this paper we study different routing algorithms and problem in existing system. There are several wireless Adhoc network security methods like cryptographic algorithm and SPINS in this paper I try to find best suited algorithm for adhoc network keeping in mind security issues. Read More...
|
computer science engineering |
India |
327-328 |
81 |
A study on Relative condition factor of Cyprinid fish, Salmostoma untrahi (Day) from Bhadra Reservoir, Karnataka
-Dr. B.R.Kiran
This paper deals with the relative condition factor of cyprinid fish Salmostoma untrahi in Bhadra reservoir , Karnataka. The fish specimens were collected during the period July 1998 to June 2000 from two study sites - back water of Bhadra reservoir and a downstream stretch of Bhadra river, Karnataka. The total length and weight of both the sexes of fishes were recorded. The mean relative condition factor showed seasonal variation in both sexes. The mean relative condition factor value was found to be highest in June & August for male and January & June for female during first year and highest in March for both the sexes during second year of study. The condition of the fish were coincided with the maturation stage of the fish. Read More...
|
Applied Science |
India |
329-332 |
82 |
PERFORMANCES EVALUATION OF FORCE DRAFT GASIFIRE BASED COOK STOVE
-Ranjit Vasant Powar ; Paris Yadav; Manish Chavan
The article highlighted the performance evaluation of forced draft gasifire based cook stove. The design and development of forced draft cook stove was carried at Dr. UPCAET Jalgaon. The performance of cook stove take place for three different biomasses i.e. Pellet, Tur and Neem. It was found that the volatile matter, fixed carbon contain higher in the Pellet as compare with Tur and Neem. Ash content in Tur is higher as compared with the Pellet. The burning capacity of pellet is less than that of Tur and Neem. The combustion zone rate for pellet, Neem and Tur were found to be 0.100, 0.120, 0.175 m/h respectively. It was observed that hot water condition was more superior to that of cold water condition. The thermal efficiency obtained from the cook stove for pellet 40.33 per cent, Neem 36.47 per cent and Tur 33.43 per cent. The results of controlled cooking test (CCT) shown the specific fuel consumption of a stove were 1, 1.2 1.44 kg/kg for pellet, Neem, and Tur. The total power output of the cook stove for pellet, Neem and Tur were found to be 3, 2 and 1.8 kW respectively. Read More...
|
Renewable Energy Sources (Agricultural Engineering) |
India |
332-335 |
83 |
A Vibrant Optimization for Job Forecast In Cloud
-Seema Gusain ; Rupak Kumar
Cloud computing today is the most popular computing model used for services on demand. In cloud computing internet technologies are used to deliver services which could be scaled massively. Several schedulers determine the allocation of processing resource for jobs of a workflow should be allocated. Scheduling theory for cloud computing is in advance stage, with a lot of awareness and increased popularity. This paper presents a scheduling optimization algorithm and gives an overview of cloud computing environment. Read More...
|
Computer Science and Engineering |
India |
336-338 |
84 |
Performance of Physical Layer of Wireless Local Area Network using MATLAB
-Syed.Mohd.Tariq ; Mohd Sadim
In this paper, performance analysis physical layer wireless local area network. The physical layer is the most important layer in wireless network, high speed data transmission depend only physical layer. Physical layer have different technique for data transmission like DSSS, FHSS, CDMA, OFDM using different modulation technique, physical layer also have large number of IEEE standard for PAN, WLAN, MAN. In this paper, we studied the inherent limitations of wireless local area network, especially in the physical layer IEEE 802.11 standard. In this paper examines the performance of the IEEE 802.11a standard for different combinations of sub-carrier modulation type and code rate and determines the signal-to-noise ratio required to obtain a probability of bit error. On the other hand, the results also show significant coding gain when applying convolutional coding with Viterbi decoding. Read More...
|
Computer Science and Engineering |
India |
339-342 |
85 |
A NOVEL APPROACH ON TAMIL TEXT CLASSIFICATION USING C-FEATURE
-ARUNADEVI K ; SAVEETH . R
Text Classification is one of the central issues in the information systems dealing with text data because of the increasing amount of information stored in a digital form. Text Classification Techniques have been applied on Tamil language to extract meaningful information and knowledge from unstructured Tamil text. Tamil language is a morphologically rich Dravidian language, classifying a Tamil document is different than classifying a English texts. In order to enhance the effectiveness of information extraction, we have compared feature extraction techniques and text classifiers and suggested an efficient C-feature (Compound feature), using C-feature we can create an efficient vocabulary set for Tamil text classification. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
343-345 |
86 |
SECURE AODV ROUTING PROTOCOL FOR MANET
-Hardik N Patel ; Rajvirsinh Vaghela
Mobile Ad Hoc Networks (MANET) are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. The main classes of routing protocols are Proactive, Reactive and Hybrid.[1] A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. In black hole attack, a malicious node sends the route reply message(RREQ) to the source node in order to advertise itself for having the shortest path to the destination node. we propose a new route maintenance algorithm to avoid black hole attacks. We propose this algorithm based on AODV (Ad-hoc On-demand Distance Vector routing protocol). Read More...
|
Computer Engineering |
India |
346-348 |
87 |
OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS
-teja.oleti ; sonti.srihari; jp.snehit; shyam prasad.p
The Cloud Computing is one of the emerging modern technologies that need to meet the emerging business needs for agility, flexibility, cost reduction and time-to-value. The developments in cloud computing paradigm necessitate faster and efficient performance evaluation of cloud computing servers. The advanced modeling of Cloud servers are not feasible one due to nature of cloud servers and diversity of user requests. This issue necessitates calculating performance of cloud servers and should be capable of handling several millions of requests in few seconds. It is so possible through the specialized computing facility called Virtualization and even with it, very hard to serve plenty of requests continuously or simultaneously without delay or collision. We proposed a new mechanism to overcome these performance problems and to aim for optimize their performance; we can achieve this goal with help of queuing theory. To tackle the problem of optimizing the performance of cloud servers, we model the cloud servers with multitenant architecture as an M/G/m/m + r queuing system with single task arrivals and a task buffer of finite capacity. In this model focusing on input buffer size, number of servers, mean number of request, response and etc as metrics for performance. The proposed algorithm named approximate Analytical model, and is equivalent to the combination of Transformation based Analytical Model & an Approximate Markov Chain Model with supporting calculations works out to bring the optimized performance evaluation of cloud servers. Read More...
|
computer science and engineering |
India |
349-353 |
88 |
Security Threats in Cloud Computing
-Husain Sherif H ; Mrs. Sowmiya Malar
Cloud computing is the most useful technology which is meets the day to day improvement in IT Industries. The cost computing is reduced, and it meets the rising flexibility and scalability for computer processes. In past few years, cloud computing has been the fastest growing technology of the IT industry. Many organizations have expressed their concern about security issues that are to be implemented on cloud computing. Most complicated issue in cloud computing is 'Security'. Some enterprises look at cloud computing cagily due to its security risks. Therefore, some issues happen in the cloud storage as all the data is stored in a remote system. This paper summarizes about the reliability, availability, security issues of cloud like RAS issues, and proposes viable and available solutions. Read More...
|
Computer Science Engineering |
India |
354-357 |
89 |
Hardware developments for image processing and it?s applications on Cryptography
-M.Kalyan
The importance of embedded applications on image and video process, communication and cryptography domain has been taking a bigger area in current analysis era. Improvement of pictorial info for betterment of human perception like deblurring, de-noising in many fields like satellite imaging, medical imaging etc square measure revived analysis thrust. Specifically we'd wish to elaborate our expertise on the importance of pc vision jointly of the domains wherever hardware enforced algorithms perform much better than those enforced through package. thus far embedded style engineers have with success enforced their styles by suggests that of Application Specific Integrated Circuits (ASICs) and/or Digital Signal Processors (DSP), but with the advancement of VLSI technology a awfully powerful hardware device particularly the sector Programmable Gate Array (FPGA) combining the key blessings of ASICs and DSPs was developed that have the chance of reprogramming creating them a awfully enticing device for speedy prototyping. Communication of image and video knowledge in multiple FPGA is not any longer far-off from the thrust of secured transmission among them, and so the relevancy of cryptography is so inevitable. This paper shows however the Xilinx hardware development platform yet Mathwork’s Matlab may be wont to develop hardware based mostly pc vision algorithms and its corresponding crypto transmission between multiple FPGA platform from a system level approach, creating it favourable for developing a hardware-software co-design atmosphere. Read More...
|
computer science engineering |
India |
358-360 |
90 |
Implementing a hybrid methodology for the design of an Embedded System
-K.Swathi Tejaswi
This paper described a hybrid methodology that can be deployed in the development of an intelligent critical sensitive system. To obtain this methodology, we interfaced the internationally accepted Structured System Analysis and Design Methodology (SSADM) and the Fuzzy Based Design paradigm. The SSADM was deployed for the systems study and preliminary design while the Fuzzy Based Design Methodology was deployed as the paradigm for an alternative design applied in developing both linear and non-linear systems for embedded control. The resulting methodology was successfully deployed to implement an intelligent traffic control system for a typical ‘+’ in an Eastern Nigerian city. The work demonstrated that embedded systems required a hybrid methodology because in addition to the specialized design paradigm, there would be a need for a detailed study of the systems current operating environments. Read More...
|
computer science engineering |
India |
361-363 |
91 |
Comparison of Bit Error Rate Performance of Orthogonal Frequency Division Multiplexing and Discrete Wavelet Transform based Orthogonal Frequency Division Multiplexing over AWGN Channel
-ankita goyal ; Saurabh gaur
Reliable and high speed communication over AWGN requires a robust modulation scheme, like a Discrete Wavelet Transform (DWT) based modulation technique, hence the quality of data communication over the noisy in-home power line network can be improved. This paper investigates the performance of conventional Orthogonal Frequency Division Multiplexing (OFDM) and Discrete Wavelet Transform-based OFDM (DWT-OFDM) systems in the presence of noise in multipath AWGN as a communication channels. The time and frequency localization properties of the wavelet transform mitigates narrowband and heavy impulsive noise in the power lines which results in performance improvement. Simulation results in terms of PAPR, PSD, and Bit Error Rate (BER) show that DWT-OFDM is more robust against interference and multipath effects compared to DFT-OFDM, and increasing the length of the basis function improves BER and PAPR. Read More...
|
E & C Engineering |
India |
364-367 |
92 |
A Novel Captcha Study based on Image Selection Scheme
-Tapan Chauhan ; Nisha Shah
Captcha is a popular real user detection or autobot/robot rejection technique used in websites for Desktops. Captcha is also in use in some of the mobile websites. Captcha are difficult to read on the smartphone and portable computer screens. Users stuck in zooming in/zooming out while reading and filling the captcha and other required fields. Old aged users feel it more difficult to view and type the catpcha. So, there is a strong need of image based easy captcha-like technique to detect the real users and to avoid the autobot/robot tools, which are used to exploit the website databases. In this research we have proposed a visual/graphical alternate to captcha. In this research, we are proposing the development of a new captcha-like technique which will facilitate the user to enter a graphical captcha instead of text based captcha. Users will see a full image and a chunk from the image (sub-image). User will have to tap on the image area, which matches the chunk (sub-image). Further, the system will crop the image to that particular area in some particular size, which will be then forwarded to the server for the real-user authentication. Server side will match the chunk with the cropped image (which is a user input). If chunk is matched with the cropped image, the user will be marked a real user, otherwise a new captcha-like will be sent to the user for re-authentication. If user will fail for a fixed number of times, the server-side will mark the user as a autobot and will block the user for some time. Read More...
|
Computer Engineering |
India |
368-370 |
93 |
IMAGE REGISTRATION:A SURVEY
-JASDEEP KAUR ; AMANPREET KAUR
In last decades, Image registration is widely in use and there is broad range of applications in field of remote sensing ,computer science, image compression, face recognition and specially in medical field where it is use to integrate information obtained from different sources. Image registration is a vital part of restoration that uses objective criteria and previous information to enhance image. It is a process of aligning two or more images taken from different viewpoints ,at different times and using different sensors .A broad methods are available to perform registration like intensity based ,feature based and many more. This paper shows a review of various techniques of image registration Read More...
|
DIGITAL IMAGE PROCESSING |
India |
371-373 |
94 |
A SURVEY ON MALWARE PROPAGATION, ANALYSIS, AND DETECTION
-k.r.n.damotharan
Recently, a new kind of war has been takes place between the security community and malicious software developers, the security is specialised to use all possible techniques, methods and strategies to stop and remove the threats during the malware developers utilize new types of malwares that is a bypass implemented security features. In this study we closely looked into malware, to understand the definition, types, propagation of malware, and detecting/defending mechanisms in order to contribute to the process of protection and security enhancement. Read More...
|
electricals and electronics engineering |
India |
374-386 |
95 |
Experimental Evaluation of UMTS and Wireless LAN for Inter-Vehicle Communication
-N.SASIKIRAN ; P.MADHURI; N.OOSHMA; N.SOWMYA; N.GOVINDA RAO
The rapid development of mobile communication technologies in recent years allows their application for intervehicle communication (IVC). In this paper, we evaluate the suitability of two wireless technologies for IVC, namely Universal Mobile Telecommunication System (UMTS) and IEEE 802.11 Wireless Local Area Network (WLAN). We analyze the communication properties of these technologies and point out the requirements of applications for IVC. We present a series of practical experiments to evaluate the eligibility of each technology for applications of IVC. To obtain comparable results, we performed measurement based on IP-unicast communication, since the lower layers of the two communication technologies differ drastically. Inter-vehicle communication promises to increase movement and behaviour awareness of vehicles compared to existing technologies like radar. The idea is that every vehicle regularly transmits information such as position, speed and heading in Cooperative Awareness Messages (CAMs) to surrounding vehicles. The periodic CAMs are foreseen to be sent via 5.9 GHz IEEE 802.11p Based on the recorded data of radio coverage, latency and throughput; we draw conclusions on currently feasible and infeasible applications for each technology. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
387-389 |
96 |
Investigation on Performance improvement in new Routing Algorithms for Energy Efficient Mobile Ad hoc Networks
-sharanya.k
Energy efficiency is an important concern in wireless mobile ad hoc networks, because the mobile nodes in ad hoc networks communicate without an aid of an infrastructure on limited battery capacity. Here a new routing algorithm called Position Based Hybrid Routing (PBHRA) describes effective use of bandwidth and extend the battery life of the mobile nodes. This is done, by reducing the computational time in the proposed algorithm. The mobile nodes in MANETS do not have a centralized Administration. Hence in PBHRA, the central node for controlling the route determination acts as Master node which directs and controls the other nodes. The performance evaluation of the algorithm Read More...
|
electricals and electronics engineering |
India |
390-393 |
97 |
A DIFFERENTIAL TIME LAPSE VIDEO TECHNIQUE
-Sanjay K Vyas ; Prof. A R Dave
There are many video capturing systems such as CCTV camera in which time lapse videotechnique is used to record all frames. Therefore it consumes more time and storage capacity.But in Monitoring system, Video recording is required while movement is detected, otherwisevideo recording are notrequired if there is no movement.There are several methods of monitoring workers in a workplace setting. As companies are progressively considering the use of monitoring techniques, it is crucial to realize the potential effects that monitoring can have on the overall business. Read More...
|
Electrical Engineering |
India |
394-396 |
98 |
REVIEW ON BRAIN AND BRAIN CANCER TREATMENT
-B. SASITHA REDDY
The brain and spinal column make up the central nervous system (CNS), where all vital functions of the body are controlled. When tumors arise in the central nervous system, they are especially problematic because a persons thought processes and movements can be affected. These tumors can also be difficult to treat because the tissues surrounding a tumor that may be affected by surgery or radiation may play a vital role in functioning. There are two broad types of cancers occurring within this system. primary tumors originate in the central nervous system, whereas secondary tumors migrate from cancers located elsewhere in the body, such as breast cancers. Secondary, or metastatic, brain tumors, are more common than primary brain cancers. This section focuses on primary stages on brain cancer. Read More...
|
MEDICAL SCIENCE |
India |
397-400 |
99 |
Cloud Computing: The Level of Awareness amongst Small & Medium-sized Enterprises (SMEs) in Developing Economies
-sai chandra
Cloud computing services are being touted as a major enabler for small businesses lately. This new paradigm is seen to offer unique opportunities to small and medium enterprises (SMEs) worldwide and developing economies are no exception. It presents SMEs access to similar technologies available to their larger counterparts and those in the developed world which inherently creates innovativeness, increases competitive advantage and impacts their operations and processes. This paper seeks to determine the level of awareness and familiarity with this emerging computing paradigm. The results of the study indicated that a slight majority of the respondents were familiar with cloud computing on the individual level but the level of awareness amongst the larger SME industry was low to medium. The finding therefore recommends education and sensitization on cloud computing in order to increase awareness and knowledge about this emerging technology and its prospects. This is seen as one sure way of enhancing its uptake in developing and emerging markets Read More...
|
computer science engineering |
India |
401-404 |
100 |
POCKETCOM FOR SPEECH AND HEARING IMPAIRMENT PEOPLE
-RAJASUBRAMANIAN.S ; KARTHIKA.S
Our project aim is to build a handheld device that would help deaf and dumb people to communicate with others in every day spoken language such as English. Deaf and dumb often communicate via sign language, a kind of representation of words through hand and finger positions. But it has got serious limitations because it is not easy to understand by a normal listener on the opposite and to make things worse, not many in the world know sign language at all. Also, it is difficult to represent all the words of a plain language like English into a sign language symbol. Even if there is one, then learning and using them would be tough and cumbersome. In this paper, we will focus on the history of communication technologies that have given better access to the world for those with sensory disabilities. The areas that will be covered are communication technologies that improve or augment hearing and vision, and technologies that support alternatives strategies to communication without hearing and/or vision. Read More...
|
electronics and communication engineering |
India |
405-407 |