No. |
Title and Author |
Area |
Country |
Page |
101 |
A Hybrid Model to Automatically Extract Text From Images
-H.Thaheera MCA., MPhil ; Professor A.Abdul Samathu M.Sc.,M.Phil.,PGDCA.,M.Tech
Text mining also referred to as text data mining, which is equivalent to text analytics, refers to the process of deriving high-quality information from text and such information is typically derived through the devising of patterns and trends through means such as statistical pattern learning. This Text mining usually involves the process of structuring the input text like parsing, along with the addition of some derived language based features and the removal of others thereby deriving patterns within the structured data, and finally evaluation and interpretation of the output. In this paper a hybrid approach to robustly detect and localize texts in natural scene images is proposed. The variations of text like font, size and line orientation. A text region detector is designed to estimate the text existing confidence and scale information in image pyramid, which helps by segmenting the text components using local binarization. To efficiently filter out the non-text components, a conditional random field (CRF) model considering unary component properties and binary contextual component relationships with supervised parameter learning is proposed. Finally the extracted text components are grouped into text lines/words with a learning-based energy minimization tool and stored in an external file. Read More...
|
Computer Science |
India |
458-461 |
102 |
An Analysis of Inverter-Less STATCOM Using AC Chopper
-Sarvesh Kumar ; Dr. S.K.Srivastava
This paper presents an approach of implementing Inverter-Less STATCOM by AC chopper in which AC chopper is placed between the AC line and compensating capacitor for desired VAR control. For this we place C-buck and C-boost cell configurations instead of inverter. Dynamic VAR support is necessary to grid for balancing the faults on the system. The conventional sources of VARs which are capacitor bank and generator are too slow to provide desired impact. STATCOMs have fast response for dynamic control but they are much costly as they consist of large DC/AC inverters and significant high levels of energy storage. Inverter-Less STATCOM provide dynamic control of VAR and there is no need of storage energy. The principle of operation, design and methods of the IL-STATCOM has been discussed in detail with simulation and experimental results to validate the same. Read More...
|
Electrical Engineering |
India |
462-467 |
103 |
A Review on Data Hiding in Steganography
-Harsimranjeet kaur ; Er Gurdeep Kaur
The Internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The importance of reducing a chance of the information being detected during the transmission is being an issue now days. Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. The word Steganography is of Greek origin and means "covered writing" or "concealed writing". Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganography coding inside of a transport layer, such as a document file, image file, program or protocol. There are various number of techniques available for steganography. In our work we have used MD5 and DES for data encryption then MLSB technique will be used for embedding data into the cover image that will turn out to be a stego image that is how we are going to save our data from third party interception. Finally, results are compared in terms of PSNR, MSE with the implementation of Cryptography Technique. Read More...
|
Computer Science & Engineering |
India |
468-474 |
104 |
An Evaluation of Software Testing Tools Effectiveness
-Anil Kumar Chaurasia ; Mohammad Danish; Pravin Kumar Mishra
Automated testing tools helps the Quality Assurance engineer to evaluate the quality of software by testing the software .To evaluate the effeteness of software there is a requirement of good testing tools, which provide the testing requirement as per the project. Although there are so many testing tools available in the market and they differ in approach, quality, usability and other characteristics. Choosing the good testing tool there is a requirement of a way to prioritize them on the basis of characteristics. This paper will propose a set of metrics for measuring the characteristics of the testing tools and help us to examination and choosing the good automated testing tools. Metrics for evaluating automatic software testing tools were previously proposed by James B Michal, B Synder and B J Bossuyt . A new extended model for Black Box Testing which is proposed provides the metrics to calculate the effectiveness of any tool on the basis of functionality and operability. The industry will also be benefited, they can use the metrics to evaluate any tool and make the priority on the basis of analysis they can further make selection of tool for their software to be tested and reduce the testing effort hence effort hence saving time and gaining maximum monetary benefit. Read More...
|
Software Engineering |
India |
475-478 |
105 |
Improvement of Transient Stability with SSSC Controller in a Three-Machine Power System for Three Phase Symmetrical Fault
-Ravi Kant Yadav ; Dr. V. K. Giri
An Improvement of transient stability performance with the help of Static Synchronous Series Compensator (SSSC) controller has been presented in this paper. The SSSC is used to control active and reactive powers as well as damping power system oscillations in transient mode. The results obtained from simulations validate the effectiveness of proposed modeling and tuning approach for power system stability improvement. The simulation results also show that the proposed SSSC controller is effective in the three-phase symmetrical disturbance conditions in the power system.The obtained results justify that the proposed SSSC controller is found to be robust to fault location and change in operating conditions. For the simulation purpose, the model of three-machine power system with SSSC controller has been developed in MATLAB/SIMULINK using Sim Power System (SPS) block set. Read More...
|
Electrical Engineering |
India |
479-483 |
106 |
Collection Development Policy and Selection Criteria for E-Resources: Indian Perspective
-Hitesh Chauhan ; Pinkesh Dave
This paper highlights the features of collection development policy and selection criteria of E-Resources in the changing paradigm where the electronic media and communication technology are gaining momentum in developing countries. The paper also identifies the changes to integrate the issues of collection development and management of electronic resources in the library. The criteria for selection of electronic resources, vital part of any policy of collection development, are also discussed here.Electronic resources was also be identified and evaluated for selection like traditional materials through the consultation of reviews and other services. A review of conditions in India regarding collection development policy and practices was also discussed in this paper. Read More...
|
LIBRARY MANAGEMENT. |
India |
484-487 |
107 |
Modeling and Simulation of SRF and P-Q based Control DSTATCOM
-P.S.Krishna Varma ; B.B.Dash
With the widespread use of harmonic generating devices, the control of harmonic currents to maintain a high level of power quality is becoming increasingly important. An effective way for harmonic suppression is the harmonic compensation by using active power filter. This paper presents a comprehensive survey of DSTATCOM control strategies put forward recently. It is aimed at providing a broad perspective on the status of DSTATCOM control methods to researchers and application engineers dealing with harmonic suppression issues. Many control techniques have been designed, developed, and realized for active filters in recent years. This paper presents different types of Synchronous reference frame methods for real time generation of compensating current for harmonic mitigation and reactive power compensation. All the techniques are analyzed mathematically and simulation results are obtained which are being compared in terms of its compensation performance with different parameters under steady state condition. The three techniques analyzed are the Synchronous Reference Frame Theory (SRF), SRF theory without synchronizing circuit like phase lock loop (PLL) also called instantaneous current component theory and finally modified SRF theory. Simulation results are obtained under sinusoidal balanced voltage source balanced load condition. The comparison and effectiveness of all the methods is based on the theoretical analysis and simulation results obtained with MATLAB employing a three phase three wire DSTATCOM test system. Read More...
|
Electrical Engineering |
India |
488-492 |
108 |
An Efficient and Robust Access Method for Spatial Queries in Mobile Environments
-T.KalaiSelvi ; Dr. G. Ravi
A proxy-based approach to continuous nearest neighbor search query and window queries has been implementing in this paper and get a better result over mobile environment. The proxy creates estimated valid regions for mobile clients by exploiting spatial and temporal locality of spatial queries. For Nearest Neighbor queries, to devise two new algorithms to accelerate Estimated Valid Region growth, leading the proxy to build effective Estimated Valid Regions even when the cache size is small. On the other hand, to propose to represent the Estimated Valid Regions of window queries in the form of vectors, called estimated window vectors, to achieve larger estimated valid regions the above techniques developed for .net application and display for better result, efficient output in spatial search in around nearest location based on spatial queries. Read More...
|
Computer science and Engineering |
India |
493-498 |
109 |
Just-In-Time Implementation in Small and Medium Enterprises
-Yogesh Ahlawat
The new uprising in the manufacturing goods and service sector has created great challenges for the industry. Now-a-days companies are highly quality focused and customer driven. Besides quality, a company has to maintain the cost of the product at a reasonable level. It has to supply products at reliable and reduced delivery time. Customers also demand more product variants that means reduced lot size and high flexibility in operations. Confronting these challenges, companies are forced to find ways to reduce costs improve quality and meet the ever-changing demands of their customers. There is no question that the elimination of waste is an essential factor for survival in today's manufacturing world. Just-in-time production system is one of these initiatives that focus on cost reduction by eliminating non-value added activities. Many manufacturers have come to realize that the traditional mass production concept has to be adapted to the new ideas of JIT manufacturing to continue moving up the ladder in a global, competitive and growing market. Just-in-time represents a philosophy of continual improvement to obtain performance excellence in the operations of an inventory system. This management philosophy is primarily applied in large-scale industries but there is no reason why similar concepts can not be applied in Small and Medium Enterprises (SMEs) as well. This research paper addresses the implementation of Just-in-Time production system in SMEs. The goal of this research is to investigate how JIT can be implemented in SMEs. Finally the conclusions and recommendations are also provided. Read More...
|
Mechanical Engineering |
India |
499-504 |
110 |
A Quantitative Study of Existing Protection and Key for Cloud Computing
-V.Kanagaraj
The development of cloud computing services is speed up the speed during which the organizations farm out their machine services or sell their idle machine resources. Security additionally can be an important several new security queries that are specific to those solutions also might rise, together with those associated with however the services are organized and which sort of service/data is placed within the cloud. The cloud computing paradigm changes the way in which information is managed, especially where personal data processing is concerned. End-users can access cloud services without the need for any expert knowledge of the underlying technology. Adoption of privacy enhancing technologies to support such activities within the cloud can rely upon the existence of uniform ways in which of handling personal information at the international level and on technical standards which may facilitate to demonstrate compliance with legal and regulative frameworks. Read More...
|
information technology |
India |
505-508 |
111 |
Localization & Frame Work on WSN's in the Wild Pursuit of Ranging Quality
-P.Bindhu Madhavi ; Dr.M.Nagendra
Localization is a basic issue of wireless sensor networks. In this paper with reference to the real-world experience from Green Orbs, and from a sensor system existed in forest results localization in the wild, which is very challenging due to various factors. In this paper, Localization with Combined and Differentiated approach is used which explicitly gives the free-range approaches and base-range approaches using received signal indicator. From the results the quality of ranging approaches affects the accuracy of localization. To receive good quality range, Localization with Combined and Differentiated method would be used for virtual localization, filtration, and quality- range. From the evaluations of base range and range free approaches with reference to the real world experience from Green Orbs results current position of localization approaches with accurate performance. Read More...
|
Computer Science and Engineering |
India |
509-512 |
112 |
Web Usage Mining Consideration of General and Customised Access Patterns
-R.Suganya
With the continued growth of e-commerce, Web services, and Web-based information systems, the volumes of clickstream and user data collected by Web-based organizations in their daily operations has reached astronomical proportions. Analysing such data can help these organizations determine the life-time value of clients, design cross-marketing strategies across products and services, evaluate the effectiveness of pro-motional campaigns, optimize the functionality of Web-based applications, provide more personalized content to visitors, and find the most effective logical structure for their Web space. This type of analysis involves the automatic discovery of meaningful patterns and relationships from a large collection of primarily semi-structured data, often stored in Web and applications server access logs, as well as in related operational data sources Read More...
|
web mining |
India |
513-516 |
113 |
Study the Properties of Paver Block by Using Waste Material Like Fly Ash
-Ritesh Mall ; Sharda Shrama; Khalid Raza; Saurabh Dubey
Now a days as the better looking options for the footpaths and pedestrian road laying there is used concrete blocks pavements. In this study we will conclude cement replaced by fly ash and adding gypsum and super plasticizer with various percentages in the construction of concrete block pavements. As we know dumping of fly ash is the biggest issue now days in India in due to fly ash environmental pollution and human hazards increasing day by days. The aim of this research is make economical and environmental friendly paver block, and solves the disposal problem fly ash Read More...
|
civil engineering |
India |
517-520 |
114 |
MIMO OFDM Space Time Coding - Spatial Multiplexing Increasing Performance and Spectral Efficiency in Wireless Systems
-Rahul Porwal ; H.P. Agarwal; R.K.Vyas
OFDM is a multicarrier modulation technique in which a high rate bit stream is split into N parallel bit-streams of lower rate and each of these are modulated using one of N orthogonal sub-carriers. OFDM is robust to multi-paths fading and delay because it has high data transmission capability with high bandwidth efficiency that's why it has recently been applied in wireless communication systems. It is highly sensitive to frequency offset introduced by the wireless channels and causes loss of orthogonality and amplitude reduction of OFDM signal and lead to Inter Carrier Interference (ICI). There are two deleterious effects caused by frequency offset one is the reduction of signal amplitude in the output of the filters matched to each of the carriers and the second is introduction of ICI from the other carriers a main problem in OFDM is its vulnerability to frequency offset errors due to which the orthogonality is destroyed that result in Inter carrier Interference (ICI). ICI causes power leakage among subcarriers thus degrading the system performance. This paper studies ICI cancellation scheme in MIMO-Ofdm which performs better than standard OFDM system. Later we proposed Self cancellation method in MIMO OFDM to enhance the performance of the system by reducing the BER for different values of signal to noise ratio (SNR). Read More...
|
Electronics and Communication Engineering |
India |
521-525 |
115 |
Conquer Vampire Attacks in Wireless Sensor Network
-S.Vedha Nayaki ; Mr.G.Ravi
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing protocols. We find that all examined protocols are susceptible to Vampire attacks, which are devastating, difficult to detect, and are easy to carry out using as few as one malicious insider sending only protocol-compliant messages. In the worst case, a single Vampire can increase network-wide energy usage by a factor of OðNÞ, where N in the number of network nodes. We discuss methods to mitigate these types of attacks, including a new proof-of-concept protocol that provably bounds the damage caused by Vampires during the packet forwarding phase. Read More...
|
computer science |
India |
526-529 |
116 |
Ionospheric Study Using Image Processing of All-Sky Imager
-Rohit Patil ; S. B. Patil; R. N. Ghodpage; P. T. Patil
This paper contains the study of ionosphere which plays the main role in HF transmission. The equatorial ionospheric plasma bubbles that occur at the low-latitude F-region of the ionosphere and the irregularities associated with them are responsible for several interference and sudden disruption of transionospheric radio propagation up to Giga Hertz frequency range, interfering with the communication systems, including the GPS. A CCD-based all-sky imager with 180° field-of-view is used to take photographs of all sky on clear, moonless nights, to study the F-region dynamics through the imaging with optical filter OI 630.0 nm oxygen emission line. Read More...
|
Electronic Engineering |
India |
530-532 |
117 |
Effect of Configuration of building Subjected to Seismic Load and Design of RCC Framed Structure by Staad.pro
-Pawan Pandey ; Pawan Pandey; Dilip Kumar
The behavior of building during Earthquake depends critically on its overall shape, size and geometry. The Seismic performance of building is available and new design methods should account for the building ability to dissipate energy and the effect of the lateral deformation. These aspects involve both plan and structural configuration of building. This paper presents structural and seismic behavior of buildings. The purpose is to outline the criteria loading on structure of building during strong earthquake. Building are the complex system and multiple configuration have to be considered at the moment of designing them. That's why at the planning stage of building, architects and structural Engineers must work together to ensure that the unfavorable features are avoided and good configuration is chosen. The principle objective of this project is to analysis and design a multistoried building [G + 21 (3 dimensional frame)] using STAAD Pro. The design involves load calculations manually and analyzing the whole structure by STAAD Pro. The design methods used in STAAD-Pro analysis are Limit State Design conforming to Indian Standard Code of Practice. We considered a 3-D RCC frame with the dimensions of 4 bays @5m in x-axis and 3 bays @5m in z-axis. The y-axis consisted of G + 21 floors. Read More...
|
Civil Engineering |
India |
533-543 |
118 |
Mixing and Combustion Analysis of a Hydrogen Fueled Scramjet Engine Using Strut with Alternating Wedge Injector
-Surya Kumar ; Sivasakthivel.T; K.M. Pandey
A major problem in supersonic combustion is the short residence time of the fluid inside the combustor due to high flow velocities. Thus techniques for mixing enhancement have to be used to achieve a fast and efficient fuel-air mixing. In this paper, strut with alternating wedge injector is investigated numerically. The combustor and strut dimensions are same as DLR Scramjet model. It consists of a divergent channel with a flame - holding, wedge shaped structure in the middle of the flow field from the base of which hydrogen is injected. Mixing and combustion calculations are performed at Mach 2 for air and Mach 1 for Fuel (hydrogen). The simulation has been carried out by using FLUENT. Standard k-epsilon model has been used for modelling turbulence and single step finite rate chemistry has been used for modelling the H2-Air kinetics. k-epsilon model is based on a finite volume discretization of the continuity, momentum, energy equations. Numerically predicted profiles of static pressure, axial velocity, turbulent kinetic energy and static temperature for both non-reacting as well as reacting flows are compared. Validation is done by comparing numerically predicated profiles with experimental profiles. The results shows that alternating wedge injector is affecting the flow field of combustor considerably, due to this length required for the combustion chamber is reduced and also mixing efficiency and combustion efficiency of the injector calculated. Read More...
|
Mechanical Engineering |
India |
544-552 |
119 |
Performance Model of Object Serialization using GZip Compression Technique with XML and JSON Formatters
-Pooja Manocha ; Rahul Kadian
Object Serialization Methods can be useful for several purposes, including object serialization Minimization which can be used to fall the size of serialized data. We have implemented means by serialization and de-serialization of object that can be done using modern format XML and JSON after adding compression to the object streams. Serialization is the process of converting complex objects into stream of bytes for storage. De-serialization is its reverse process that is unpacking stream of bytes to their original form. It is also known as Pickling, the process of creating a serialized representation of object. Object serialization has been investigated for many years in the context of many different distributed systems. Serialization is a process of converting an object into a stream of data so that it can be easily transmittable over the network or can be continued in a persistent storage location. This storage place can be a physical file, record or set of connections Stream. Read More...
|
Computer Science |
India |
553-559 |
120 |
Preparation and Characterization of Aluminium Doped Titanium Dioxide Nanoparticles by Sol-Gel Method for Solar Cell Applications
-K.M.Prabu ; P.M.Anbarasan
Metal oxide semiconductor nanoparticles play an outstanding role in many applications that are regarded as particularly promising within the broad area of nanotechnology, energy storage, energy conversion and biomedical applications. Among the various semiconductor nanoparticles TiO2 based nanomaterials are various photovoltaic applications. In this present work, we have synthesized Al doped TiO2 nanoparticles by using a sol-gel technique. The prepared samples were investigated optical absorption, functional group, surface morphology and elementary composition of pure TiO2 and Al doped TiO2 nanoparticles by using UV-Visible spectroscopy, FT-IR, Photoluminescence (PL) -studies, FE-SEM and EDS analysis. Read More...
|
Engineering Physics |
India |
560-564 |
121 |
Performance Analysis of 1D and 2D in Optical Code Division Multiple Access
-Vishal Mishra ; R.K. Chuhan
Optical code division multiple access system (OCDMA) achievements the advantages of CDMA and Optical communication. Optical code-division multiple-access is proposed as a natural solution to achieving asynchronous, high-speed connectivity in a local area network environment. Optical CDMA is shown to be competitive with other networking technologies such as WDMA and TDMA, but has the benefit of more flexibility, simpler protocols, and no need for centralized network control. OCDMA encoding/decoding process provides a high level of security which is directly implemented in the physical layer. In OCDMA, type of coding technique plays a major factor that influencing its performance. This paper presents performance analysis of two important OCDMA coding techniques namely - 1-D and 2-D codes. Firstly performance analysis of various 1-D codes namely Walsh Hadamard codes (WHC), Optical orthogonal codes (OOC) and Zero cross correlation (ZCC) has been carried out. Secondly performance analysis of 2-D Wavelength/Time (W/T) codes has been carried out. The performance metrics on which the various codes performance has been measured are: different data formats (NR and RZ), increasing fiber distance, amount of received power, increasing the bit rate and number of simultaneous active user. Simulated results show that among 1-D codes ZCC codes provides the best overall performance over OOC and WHC. 1-D codes provide low bit error rate (BER) but they possess high temporal length. To overcome this, 2-D codes have been used which have higher cardinality than 1-D code. Read More...
|
electronics and communication engineering |
India |
565-568 |
122 |
Spring Loaded Torque Limiter
-Kadam Amit N ; Mr. Aitavade E.N.
The adjustable torque spring ball Torque Limiter is an safety device used in the transmission line to connect the driving and driven elements such that in case of occasional overload the Torque Limiter will slip there by disconnecting the input and output members. This protects the transmission elements from any breakage or damage. For a particular loading conditions the Torque Limiter is preset to set the removed body for slipping at a different overload, it is simply mounted on input member by means of a key.sleeve is adjusted in the appropriate direction, during which the balls will remain pressed against the serrations; thus setting operation is simple, rapid and reliable.The Torque Limiter is there connected to the output member Read More...
|
mechanical engineering |
India |
569-571 |
123 |
Efficient Image Enhancement Using Hybrid Wavelet Technique
-P.Kavitha M.C.A.,M.Phil., ; Professor S.Abdul Saleem M.Sc., PGDCA.,M.C.A.,M.Phil.,B.Ed.,M.Phil(Phy).,
Image enhancement models have been in vogue since digitization but stable techniques for image enhancements have not emerged as inherent problems persist and one of the major problems include multiplicative noise also referred to as speckle noise and blurred models which are central to the study of coherent imaging systems, such as synthetic aperture radar and sonar, and ultrasound and laser imaging. These models introduce two additional layers of difficulties with respect to the standard noise scenario, one is the noise is multiplied by the original image and the other is that the noise is not Gaussian. These features of multiplicative noise models preclude the direct application of most state-of-the-art algorithms, which are designed for solving unconstrained optimization problems where the objective has two terms - a quadratic data term by reflecting the additive and nature of the noise, plus a non-smooth regularize, which may be a total variation or wavelet-based Regularizer /prior). The model proposes to address these difficulties by converting the multiplicative model into a hybrid one to obtain an enhanced noise removed image and optimize the image. Read More...
|
Computer Science |
India |
572-574 |
124 |
A Hierarchical Clustering Analysis View on Genomic Data
-D. Saranya ; D. Saranya; K. Fathima Bibi
Data clustering is a process of putting similar data into groups. Hierarchical clustering builds a cluster hierarchy or, in other words, a tree of clusters, also known as a dendrogram. Every cluster node contains child clusters; sibling clusters partition the points covered by their common parent. Such an approach allows exploring data on different levels of granularity. The importance of efficient access to concise and integrate the gene data to support data analysis anddecision making. The purpose of this paper is to analyze hierarchical clustering in genomic data. Read More...
|
Computer Science |
India |
575-576 |
125 |
Study on Effect of Carbon Steel Fibers and Polypropylene Fibers on Self Compacting Concrete
-Sagar Kamleshkumar Jayntibhai ; Dr.K.B.Parikh
The effect of carbon steel fibers and polypropylene fibers on self compacting concrete was studied in this paper. The self-compacting concrete is a concrete that can be placed and compacted by its own weight. Self-compacting concrete provides several economic and technical benefits and the use of fibers in self compacting concrete extents its possibility. Various researchers were performed the slump flow test, compressive strength test and flexural strength test to study the effect of fibers on fresh and harden properties of self compacting concrete. Read More...
|
CIVIL ENGINEERING |
India |
577-579 |
126 |
Proposal of Conservative Controller And model identification of Temperature Process
-S.Allwin ; S.Allwin; S.Biksha Natesan ; N.Nithya Rani
Nowadays, process and chemical industries are sophisticated by employing closed loop feedback controllers. The predominantly used closed loop controller in industries is PID (Proportional-Integral-Derivative) controller. It has many advantages over the P and PI controller. It has faster response, takes into an account any changes in the process variable and also reduces the steady state error value. Hence the system tries to reach its set point quickly. Here the tuning of PID controller is done by various tuning methods. The major purpose of this paper is, to find out which tuning technique will yield the lowest overshoot percentage and shortest settling time for all situations for the given temperature process. It will give an engineer a good starting point to further adjust the parameters to achieve the desired design criteria. Ziegler-Nichols (Z-N) method is generally used for tuning PID controller. But it has some demerits compared with other tuning methods which yield an overshoot and long settling time. When we use C-C method (Cohen-Con) for tuning of the controller, it reduces the overshoot and settling time. Likewise we are tuning the PID controller with various tuning techniques (Ziegler-Nichols method, Tyreus-Luyben method, Cohen and con method, and Chien-Hrones-Reswick method) for examine the response of each method and finalised the best controller based on its result. Read More...
|
process control |
India |
580-583 |
127 |
Performance analysis of MIMO-OFDM using V-BLAST Detector for High Data Rate SDR
-Mane Snehal Suresh ; Prof Madki M.R; Prof Dixit S.R
The main goal in developing new wireless communication systems are increasing the transmission capacity and improving the spectrum efficiency. Space-time codes and spatial multiplexing codes exploit the richly scattered wireless channel by using multiple transmit and receive antennas in order to improve the reliability of data transfer and greatly increase the data transmission rates without additional radio resource requirements. Significant performance gain is achieved by varying some transmit and receive parameters. Multiple-input multiple-output (MIMO) is an existing technique that can significantly increase throughput of the system by employing multiple antennas at the transmitter and the receiver. Realizing maximum benefit from this technique requires computationally intensive detectors which poses significant challenges to receiver design. Furthermore, a multiple detectors are needed to handle different configurations. . One such receiver is the V-BLAST (Vertical Bell-Laboratories Layered Space-Time) which utilizes a layered architecture and applies successive cancellation by splitting the channel vertically, and at every stage the stream with the highest signal to noise ratio (SNR) is decoded. Read More...
|
Electronics |
India |
584-586 |
128 |
Study & Review of Automotive Seating System
-Mayur Muthe ; N. K. Kamble
Seat is a sub system of automobile or vehicle. It is the main aggregate in a vehicle, which impacts the visibility, comfort, safety for the occupant. There is even more increasing demand towards occupant safety and comfort in complex crash and driving condition besides the pressure from environmental regulations. As a designer, one should know seating system terminologies and parts it holds. Seat system architecture is same but requirement differs with vehicle category. The objective of this paper is to study automotive seat as one product, its subassemblies with purpose & functionality. It speaks about typical automotive seat, seat functions, seat aggregates & its role in an automobile. Read More...
|
Mechanical Engineering, Automotive Product design |
India |
587-590 |
129 |
Resource Optimization and Allocation over Virtualized Cloud System
-Kanika Takkar ; Neha Khatri
Cloud Computing Is A Model For Enabling Ubiquitous, Convenient, On-Demand Network Access To A Shared Pool Of Configurable Computing Resources (E.G., Networks, Servers, Storage, Applications, And Services) That Can Be Rapidly Provisioned And Released With Minimal Management Effort Or Service Provider Interaction. This Paper Reviews Resource Optimization and Allocation Over Virtualized Cloud System. Cloud Computing, The Long-Held Dream Of Computing As A Utility, Has The Potential To Transform A Large Part Of The It Industry, Making Software Even More Attractive As A Service And Shaping The Way It Hardware Is Designed And Purchased[1].In A Virtualized Cloud Computing Environment, Customers May Never Know Exactly Where Their Data Is Stored. In Fact, Data May Be Stored Across Multiple Data Centers In An Effort To Improve Reliability, Increase Performance, And Provide Redundancies. This Geographic Dispersion May Make It More Difficult To Ascertain Legal Jurisdiction If Disputes Arise. Virtual Machine Monitors (Vmms) Like Xen Provide A Mechanism For Mapping Virtual Machines (Vms) To Physical Resources. This Mapping Is Largely Hidden From The Cloud Users. All Implementation Work Is Carried Out In Java Netbeans And Matlab (Matrix Laboratory) Could Be A Problem-Oriented Language And Interactive Surroundings For Numerical Computation, Image, And Programming. Matlab Is De Facto Normal For Analyzing Information, Developing Algorithms, And Making Models And Applications. Read More...
|
Computer Science and Engineering |
India |
591-594 |
130 |
Multiband Microstrip Patch Antenna for Wireless Communication Systems
-Mohit Yadav ; Ravindra Kumar; Rajan Mishra
In communication systems there are various types of microstrip antenna that can be used for many applications. Microstrip antenna designed in this paper finds application in WLAN, WIMAX and ISM band frequency range. The designed antenna resonates at frequencies 3 GHz, 7.6 GHz, 11.4 GHz. The substrate material used in the antenna is RT duroid with a dielectric constant of approximately 2.2. Thickness of substrate is 0.25 mm. HFSS simulation software is used for designing and analysis. After simulation, the antenna performance characteristics are analyzed. Read More...
|
electronics & communication engg. |
India |
595-596 |
131 |
GIS for the Assessment of Potential Groundwater Zone in Thiruvallur Block, Tamilnadu, India
-P.Ramamoorthy ; S.Mahalingam; M.Logeswari
Groundwater plays a major role in the agricultural activities. In Tamilnadu majority of people depend on groundwater for irrigation and domestic use. The demand of water has increased in the last few years and has lead to water scarcity. Remote sensing and GIS techniques is found to be very effective tool for delineate potential groundwater zones. Thiruvallur block of Thiruvallur disrict in Tamil Nadu is taken to assess ground water potential as a case study. This paper describes the ground water scenario of the area assessed by integrating the thematic information on geology, geomorphology, rainfall, soils, lineament etc. Read More...
|
Groundwater |
India |
597-600 |
132 |
A State of the Art Review on Various Malware Detection and Analysis in Web Security
-Aravindharamanan S. ; Rajkumar E. V.
Securing the web is possibly a huge challenge that the modern era of computers have seen. Day by day the threat levels increase thereby making the network vulnerable to attacks. Many innovative strategies are brought into the field of cyber security to protect websites from attacks. But still malware has remained a serious cause of concern to web developers and server administrators. Alleviating this problem completely is a growing area of research. This paper is aimed at reviewing many malware detection systems, analyzing them and also depicts various ways of detecting them. Read More...
|
Engineering Science and Technology |
India |
601-605 |
133 |
Different Methods of Face Hallucination
-Ravneet Kaur
In this paper brief description on various methods of face hallucination problem. Baker and Kanade first exploit the face hallucination. In face hallucination getting high resolution image by taking low-resolution image as an input value. Mostly in face images have different sub-parts (eyes, nose...), curves and smooth areas. By comparing results of previously applied existing methods which one uses patch similarity methods to exploit the face image to extract the missing information in it. Resulting values of previous experiments on patch similarity or holistic constraints not to be cleared the face image from the point of view of face recognition for humans in identification area. Face appearance plays an important in face recognition system. By remembering face appearance recognize easily. Face hallucination improves the face features efficiently by improving its resolution using different methods. In this also studied various techniques which can be used in face hallucination. Read More...
|
Computer Science Engineering |
India |
606-608 |
134 |
Parametric Optimization of Shell and Tube Heat Exchanger by Harmony Search Algorithm
-Ashish .K. Patel ; Krunal Patel
Shell and Tube heat exchanger is one of the most useful heat exchanger among all the other types. Because they provide relatively large ratios of heat transfer area to volume and weight and they can be easily cleaned. It is also use in the power plants, as a feed heater or in some refrigeration system. Different parameters like Baffle angle, mass flow rate, baffle space, pressure drop and number of tubes effect on the performance of heat exchanger. In the present study these parameters are optimized to increase the heat transfer coefficient and also to reduce the operating cost. Read More...
|
Mechanical Engineering |
India |
609-613 |
135 |
Fabrication of Micro -Tool Using Electrochemical Micro-Machining and Study of Process Parameters
-Hari Krishna ; Pradeep Kumar Yadav; Dr. S. C. Jayswal
Recent changes in societies demand have forced us to introduce more and more micro-parts into various types of industrial products for example, the fuel injection nozzle for automobiles, miniaturized medical tools, microprobe used to measure electricity or surface properties of a test piece, integrated micro channels used as medicine delivering systems and various aeronautical requirements. In the present work, an experimental set up has been designed and developed to fabricate micro electrodes and to machine micro holes and slots using the ECMM process and to study the effect of various process parameters on it. The machining of micro holes and slots is done on copper work pieces of 60 μm and 500 μm thickness using ECMM and copper wire of dia. 200 μm as tool. The effect of process parameters such as voltage, electrolyte concentration, pulse duty ratio and feed rate on machined hole diameter have been studied. The hole dia. increases exponentially with voltage and concentration and decreases exponentially with feed rate. The fabrication of straight micro tools is done on the same set up using dipped ECM with copper wire of dia. 1.3 mm and copper sheets of 3 mm thickness and holes of various diameters as cathodes. Same method is used to fabricate step micro tools with copper wire of dia. 2 mm. The effect of process parameters namely voltage, IEG, time, pulse duty ratio and electrolyte concentration on the diameter of the micro tool is studied. The change in diameter of the tool increases linearly with voltage and time while it increases quadratically with pulse duty ratio and electrolyte concentration. The photographs of all the micro tools are taken and measured using USB microscope at 50x and 200x zoom Read More...
|
mechanical engineering |
India |
614-615 |
136 |
Review of IDS in Data Mining
-Jyoti Deshwal ; Savita Gupta
Intrusion Detection is one of the important parts of the security system. The research has been carried out at home and abroad for decades in the regard. Nowadays, the using of intelligent data mining approaches to predict intrusion in local area networks has been increasing rapidly. Today, number of open sources and commercial Intrusion Detection Systems are available to match enterprises requirements but the performance of these Intrusion Detection Systems is still the main concern. Y This paper focuses on an approach for intrusion detection system (IDS) based on data mining techniques. Read More...
|
Computer Engineering |
India |
616-619 |
137 |
Assessment of Peak Flood Discharge in Thampanoor, Thiruvananthapuram, India: A GIS Approach
-Chinnu R V
The peak flood discharge is the maximum volume flow rate passing a particular location during a storm event. It is a primary design variable for the design of stormwater runoff facilities such as pipe systems, storm inlets and culverts, and small open channels. The present study is an attempt to assess the peak flood discharge in Thampanoor , a high flood risk area in Kerala, India using Rational method integrating GIS and Remote sensing. Read More...
|
Civil Engineering |
India |
620-624 |
138 |
Security Challenges in IaaS-based Cloud Computing
-kamal kant jaiswal ; Dr. prof. A.K. Dua
The security of our assets in digital form has been challenging to us day by day. As the threats are constantly evolving, the security have been in continuous change from well explained boundary to an elastic borders. This paper clearly mentions the complicated threats the world of IaaS is facing in the present scenario. It also identifies few of the technologies and concerns on the perpective of the identified users as well as it give future remedies for the security research and development to help enhance the security structure of the present technology. Read More...
|
computer science engineering |
India |
625-626 |
139 |
Comparative Analysis of Speed Control of DC Motor Using PI & Fuzzy Logic Controller
-Satvir Singh ; Shailendra Kumar
The development of technologies affects the demands of industries at the present time. Thus, automatic control has played a vital role in the advancement of engineering and science. In today's industries, control of DC motors is a common practice. Therefore, implementation of DC motor controller is required. There are many types of controller that can be used to implement the elegant and effective output. PI controller and fuzzy logic controllers are widely used such type of controllers. Fuzzy logic and PI controllers are designed to eliminate the need for continuous operator attention thus provides automatic control to the system. Cruise control in a car and a house thermostat are common examples of how controllers are used to automatically adjustsome variable to hold the measurement (or process variable) at the set-point. The purpose of both these techniques is to achieve accurate trajectory control of speed.This project focuses on comparison between PI controller and Fuzzy logic controller for controlling the speed of a dc motor. Read More...
|
ELECTRICAL ENGINEERING |
India |
627-632 |
140 |
Implementation of Cascaded Integrator Comb (CIC) Filter with Compensation Filter for Interpolation and Decimation in Software Defined Radio
-Pathak Amruta Arun ; Prof madki M.R; Prof Dixit S.R
Software radio architecture can support multiple standards running by reconfigurable software programs on the backend digital signal processor (DSP) With the advance in digital signal processing and digital communication techniques, software defined radio (SDR) becomes a reality. For an SDR with multi-protocol and/or multi-band capabilities, sample rate conversion (SRC) is an essential element in the software architecture of the SDR [1]. Different sample rates are even used in a single communication protocol, such as the IEEE 802.11gwireless local area network (WLAN) specification [14],and thus SRC is a must if a single master clock implementation is required. Read More...
|
Electronics |
India |
633-636 |
141 |
Optimizing Automated Triaging using Contextual Information and Feature Extraction
-Shivani Gautam ; Nawagata Nilambari
As software systems are getting larger and complex day by day, software bugs are inevitable. A software crash is one of the most severe manifestations of a defect (bug) in software, and is typically assigned a high priority to be fixed. To facilitate debugging process, many crash reporting systems such as Windows Error Reporting, Apple crash report, and Mozilla crash report have been deployed to automatically collect crash reports from users at the time of crash. Bug reports can also accompany other malfunctions of the software, mostly for the beta or unstable versions of the software. Most often, these bug reports are augmented with user contributed experiences as to what actually faced by him/her. Bugs occur for a variety of reasons, ranging from ill-defined specifications, to carelessness, to a programmers misunderstanding of the problem, technical issues, non-functional qualities, corner cases, etc. Addressing these bugs frequently accounts for the majority of effort spent in the maintenance phase of a software project's life-cycle. This is why, researchers have been trying to enhance the bug-tracking systems to facilitate the bug-fixing process. The person who is in charge of processing the newly reported bugs, checking for duplicates and passing them to appropriate developers to get fixed is called a triager and this process is called triaging. In this paper, an model of automated triaging process is proposed based on contextual information and bug report textual similarity features. In proposed model, the preprocessed bug reports are analyzed for contextual information, to relate them to the non-functional requirements of the software. This extends the feature extraction a step further. The weighted sum of similarity score of all the features, including textual and contextual, is evaluated and used to classify bug reports. Positive and negative sets of existing classification are used to train SVM model. Simulation is done using R simulation package and the results shows a considerable improvement against classification without contextual information. Read More...
|
Infromation Retrieval, Software Engineering |
India |
637-647 |
142 |
Seismic Evaluation of Multi-Storeyed R C Framed Structural System with the Influence of Different Shear Walls and Soft Storeys
-Kalappa M. Sutar ; Vishwanath B. Patil
Masonry infills are normally considered as non-structural elements and their stiffness contributions are generally ignored in practice. But they affect both the structural and non-structural performance of the RC buildings during earthquakes. RC frame building with open first storey is known as soft storey, which performs poorly during strong earthquake shaking. A similar soft storey effect can occur if first and second story used as service story. Hence a combination of two structural system components i.e. Rigid frames and RC shear walls leads to a highly efficient system in which shear wall resist the majority of the lateral loads and the frame supports majority of the gravity loads. To study the effect of masonry infill with different soft storey level, 9 models of Reinforced Concrete framed building were analyzed with two types of shear wall when subjected to earthquake loading. The results of bare frame and other building models have been compared, it is observed that model with swastika and L shape shear wall with core wall are showing efficient performance and hence reducing the effect of soft storey in model3, model4 and model5 Read More...
|
STRUCTURAL ENGINEERING |
India |
648-651 |
143 |
Noise Tube: Measuring and mapping noise pollution with mobile phones
-Praveen Kumar ; Urvi Pritam; Rajneesh Yadav; Dr. Govind Pandey
In this report a new approach for the assessment of noise pollution is investigated involving the general public. The goal of this idea is to turn GPS-equipped mobile phones into noise sensors that enable citizens to measure their personal exposure to noise in their everyday environment. The goal is to investigate how participative and people-centric data collection can be used to create a low-cost, open platform to measure, annotate and localize noise pollution, as it is perceived by the citizens themselves.Thus each user can contribute by sharing their geo-localized measurements and further personal annotation to produce a collective noise map. This report also highlights the advantages of using GPS equipped mobile phones monitoring noise pollution over the process of conventional noise monitoring. Read More...
|
Environmental Engineering |
India |
652-654 |
144 |
Topical Categorization of Credible Microblog Content
-Raghul Vignesh Kumar A ; Imthyaz Sheriff C
Microblogs are often considered to be useful sources of information. Increasing popularity of micro blogging sites like twitter, is making them a viable source of real-time news with a huge potential to replace news sites. Credibility of such microblogs is of concern when they are to be considered as sources of news. This paper details on an approach to examine microblogs like tweets, determine their credibility and categorize them under different news topics. This approach builds upon the previous work done in microblog credibility determination and rating. This paper works with twitter as test data source. The proposed novel approach can be extended to any other microblogs also. Read More...
|
Computer Science and Engineering |
India |
655-658 |
145 |
Multi-Source Feedback System: A Descriptive Study
-Ms. Dipali Jain ; Mr. Maulik Gondhia
In a time when hierarchy is being replaced by teamwork, participative leadership, empowering employees, improving customer service and re-engineering, employers need to look at other alternatives that will support and enhance personnel development. Organizations are asking personnel for more productivity with fewer resources. Layers of management are being reduced causing increased workloads and supervisors are managing larger work groups with larger spans of control. The traditional tops down supervisor-only evaluation systems are no longer practical. Supervisors with increased workloads and a large number of reporting relationships lack the opportunity to observe and provide fair, accurate, credible and motivating performance appraisals. Read More...
|
Human Resource Management |
India |
659-663 |
146 |
Test Case Reduction & Prioritization
-Sonal Gandhi ; Deepali Gupta
Software testing is one of the important processes of software engineering discipline. Software testing process is time consuming and costly, so the size of test suite plays an important role. A test suite is developed for the initial version of the software and reused to test each successive version of the software. Test cases need to be prioritized to execute more important test cases earlier in the regression testing process. Also, test cases should be reduced to the minimum by removing redundant test cases on the basis of some means to deliver requirement coverage, fault coverage, code coverage etc. The proposed technique works by assigning a priority to each test case in a suite of test cases and then executing the test cases in descending priority order. Hereby, we are reducing the time spent in testing by reducing the number of test cases. A methodology has been proposed based on fuzzy clustering. All the implementation has been done using MATLAB. Read More...
|
Computer Science & Engg |
India |
664-666 |
147 |
Software Cost Estimation Model Using Neural Network
-Bhavika Tuli ; Deepali Gupta
Software cost estimation remains an important unsolved practical problem in software engineering. Software cost estimation has failed, in most cases, to accurately predict the actual costs. Different software development projects are going to need different process structures based on the size of the project, the number of people working on development, and the amount of schedule time to complete development. Estimating software development costs with accuracy is very difficult. Part of the desired system could be parameters such as: total system development cost, scheduled delivery date, functionality, and quality. The project manager needs to supervise the software development project so that the desired system is delivered. Read More...
|
Computer Engineering |
India |
667-670 |
148 |
Simulation Study and Comparison of Simplified Single-Phase Multilevel Inverter and CCHB Inverter for Distributed Energy Resources
-Rishabh Soni ; Professor S.S. Thakur; Sudhir Phulambrikar
This paper is a simulation study of single phase multilevel inverter for distributed energy resources (DER).The DER system are small power generation tools which is used in microgride system, in order to reduce the conversion losses and to improve the size and cost of the system. The objective of this paper is to study the simplified single phase five level inverter topology, in this study a high step up converter is used to set up the voltage coming from the various DER's such as fuel cell module and photovoltaic module, this high voltage are acting as input to the inverter. The simplified five level inverter requires less number of switches as compare to conventional cascade H-bridge (CCHB) inverter. There are some strong advantages of this studied multilevel inverter such as improved output waveform ,lower Total Harmonic Distortion(THD) in addition of this two power switches are operated at the line frequency. The circuit has been designed and simulated with 18V input, 180V output as a part of photovoltaic AC module. Read More...
|
Electrical engineering |
India |
675-678 |
149 |
Water Management in Hill Area: An Overview
-Amit singh ; Dr. SriRam; Rajneesh Yadav; Sandeep Sushil Srivastav
Water is very essential for humans, plants, and animals. Water is needed to ensure food security, feed livestock, maintain organic life, and take up industrial production and to conserve the biodiversity and environment. In India primary source of water is south-west and north east monsoon. There are only 9 weeks of rainy season in India, and other months are dry period of India .It is an agricultural base country and its economic development is also associated with agriculture. For agriculture the major limiting factor is water. A growing population and consequent need for increase in food production requiring increasing area of agricultural fields and irrigation are resulting in over use of water. Total 97 % percent of water comes through the hilly region but the hilly region faces a big problem for the water conservation to use it for drinking and irrigation purposes. Hills have terrence and slopes so all the water goes down to the bottom of the hill, by which the people of upper most and middle region of hills cannot utilize this water properly. So in this paper we present some technic and method for conservation of water for drinking and irrigation which is already being used but did not known by everybody. Read More...
|
civil enginerring |
India |
679-683 |
150 |
An Optimized SVM Model for Accurate Duplicate Bug Report Retrieval
-Nawagata Nilambari ; Shivani Gautam; Priyanka Verma
Bug reporting facility is an integral part of software support system and a critical aspect of beta testing. Managing the incoming bug reports for large software projects is a challenging task. Software testers or end users submit bug reports, as and when potential defects are identified in the system. Sometimes two or more bug reports corresponds to the same defect. The analysis of reports to check whether the incoming report is for the same bug for which a master report already exists in the database is one of the most important task in managing the bug reports. This analysis needs to be done very carefully so that a report corresponding to a bug which is already reported is discarded while at the same time, a textually similar report, but corresponding to a different bug is to be attended properly. To address this problem with duplicate bug reports, a person called a triager needs to manually label these bug reports as duplicates, and link them to their "master" reports for subsequent maintenance work. However, for large software systems, this process could be highly time consuming. To address this issue, recently, several techniques have be proposed using various similarity based metrics to detect candidate duplicate bug reports for manual verification. Automating triaging has been proved challenging as two reports of the same bug could be written in various ways. There is still much room for improvement in terms of accuracy of duplicate detection process. In this dissertation, an optimized SVM model is proposed to detect duplicate bug reports more accurately. The proposed techniques are validated on three large software bug repositories from Firefox, Mysql, and Apache. Analytical methods are presented over samples and results are provided which are in excellent agreement with the simulation results. Read More...
|
Computer Engineering |
India |
684-691 |