No. |
Title and Author |
Area |
Country |
Page |
1 |
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
-SARASU.S ; SATHEES KUMAR.B
As the internet usage increases in day to day activities, there is an inherent corresponding increase in usage of communication through it with email being the mainstay or rather in the forefront of modern day communication methodologies for businesses and general persons as well. This has led to get customer attention in the form of unwanted and unsolicited bombarding of the customers mail accounts with advertisements, offers, phishing activities, viruses, worms, trojans, generating hate crimes, making the customer to part with sensitive information like passwords, and other media as well which is known as spam. Spam is mass mailing or flooding of mail account servers with unwanted trash data causing damage some times. Spam filters have been in use from the time such mail flooding happens. Most of the spam filters are manual meaning which the user after identifying a mail in his account blocks the sender and henceforth the system will not allow mails to the inbox from such addresses. However the spammers are resilient and send spam mails from different identities and flood the inboxes. This study focuses on algorithms and data mining techniques used to unearth spam mails. They filter the inbox mails as they arrive at the server depending on certain rules which are already defined known as supervised learning methods. Such technologies are known as knowledge engineering techniques. Here a decision classifier is used to train such mails with varying words to filter and identify the words in the mail as spam. The Decision Tree model is used to analyze the mails and identify spam mails and block them. The number of mails sent, content, subject, type whether reply or forward, language etc. are identified using the decision classifier like Naves Bayes and analyzed accordingly to filter the emails. Read More...
|
Computer Science |
India |
1-4 |
2 |
Modelling and Analysis of CNC Milling Machine Bed with Composite Material
-Venkata Ajay Kumar. G ; V. Venkatesh
Structural materials used in a machine tool have a decisive role in determining the productivity and accuracy of the part manufactured in it. The conventional structural materials used in precision machine tools such as cast iron and steel at high operating speeds develop positional errors due to the vibrations transferred into the structure. Faster cutting speeds can be acquired only by structure which has high stiffness and good damping characteristics. Clearly the life of a machine is inversely proportional to the levels of vibration that the machine is subjected. The further process is carried out to undergo the deformation, natural frequency and displacement using Static analysis, Modal analysis and Harmonic analysis respectively. Since the bed in machine tool plays a critical role in ensuring the precision and accuracy in components. It is one of the most important tool structures which tend to absorb the vibrations resulting from the cutting operation. To analyze the bed for possible material changes that could increase stiffness, reduce weight, improve damping characteristics and isolate natural frequency from the operating range. This was the main motivation behind the idea to go in for a composite model involving High Modulus Carbon Fiber Reinforced Polymer Composite Material (HM CFRP). Though carbon has good strength and stiffness properties but it lacks in damping requirements. On the other hand polymer, though it lacks in strength but it has good damping characteristics and it is used to hold the carbon fibers. This makes it ideal to combine these materials in a proper manner. In this work, a machine bed is selected for the analysis static loads. Then investigation is carried out to reduce the weight of the machine bed without deteriorating its structural rigidity. The 3D CAD model of the bed has been created by using commercial 3D modelling software and analyses were carried out using ANSYS. Read More...
|
Mechanical Engineering |
India |
5-8 |
3 |
Development of Small Hydro Power in India
-Awadhesh Kumar ; Dr. ShriRam
Hydro power is known as the source of renewable energy, which is pollution free, economical and environmentally benign. Small and mini hydro power projects have the potential to provide electrical power in inaccessible and mountainous region where supply of power by grid system is uneconomical and difficult. 19% of the total planet’s electricity is provided by the hydro power plants. Small-scale hydro is in most cases “run-of-riverâ€, with no dam or water storage. Small hydro power is most cost-effective and environmental friendly technology of energy for both the hilly and rural areas of the maximum country of the world. Energy produced by the falling water in hydro power plant can provide a high sustainable, non polluting alternative to fossil fuels, along with other types of renewable sources of energy, such as solar, wind and geothermal energy. Among all the sources of renewable energy, small hydropower is considered as one of the most successful energy. Much of small hydro potential is in the remote, hilly and inaccessible regions of India, where generation from other sources or transmission of power up to long distance would not be feasible. In India, the development of Micro, Mini and Small Hydro Power (SHPs) Projects started in the year 1897. In the hilly areas, there are a large number of rivers and canals which provides a bright future in hydro-power energy. All hydropower falls in category of clean energy, but the small hydro power projects provide more significant contribution as SHPs require minimal rehabilitation, submergence and minimal impact to the environment. Therefore in the SHPs, there are more scope for harnessing sustainable hydro energy. Read More...
|
HILL AREA DEVELOPMENT ENGINEERING |
India |
9-13 |
4 |
Bacillus cereus 10072 Phytase - Detection, Purification, Characterization and Physiological Role
-Utkarsh Jain ; Nidhi Chauhan
Phytase from Bacillus cereus MTCC 10072 was purified about 10.75 fold to apparent homogeneity with a recovery of 34% referred to the phytase activity in the crude extract. The monomeric enzyme displayed molecular weight of 45 KDa and showed maximum activity at temperature 60 ºC and pH 6.5. Iso electric point of the purified enzyme was found to be 5.6. Substrate specificity studies showed it is highly specific to its substrate and maximum relative activity of 128% was obtained with calcium phytate. Activity was unaffected or moderately stimulated by a range of metal ions with only Ca2+ exerting (118%) stimulatory effect. The enzyme is significantly thermo stable at 60 ºC and retains a significantly greater proportion of maximal activity at physiological temperatures. This may render it of industrial interest. Further to check the applicability of the enzyme effect of different doses of crude enzyme (10, 25, 50 and 100 units) in dephosphorylation of animal feed was evaluated. Up to 66 h of incubation, the animal feed was monitored for the released inorganic phosphate content present in the feed. An enzyme dose of 100U and 50U of crude phytase enzyme per flask were found suitable to liberate enough amount of inorganic phosphorus in case of poultry and pig feed respectively. Read More...
|
Biological & Bio system Engineering |
India |
14-19 |
5 |
Back-Bone Assisted HOP Greedy Routing for VANET
-P. Naresh Kumar ; D. Asha; Dr. V. S. K. Reddy
Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc., currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay. Read More...
|
Electronics and Communication Engineering |
India |
20-23 |
6 |
To Study the Effect of Silica Fume on Properties of Macro Polypropylene Blended Fiber Reinforced Concrete
-Neel Shah ; Prof. A. R. Darji
This paper represents the research initialization towards the fresh and hardened properties of macro polypropylene blended fiber reinforced concrete using Silica Fume. In this study polypropylene fiber are used with 0%, 0.15%, 0.30%, 0.60% and 1.0% by weight of cement and Silica Fume with percentage of 0%, 5%, 7.5% and 10% which are replaced with cement for M30 grade concrete. All of the mixes are tasted with the compressive strength test and flexural strength test for 7 days 28 days. Durability test is also carried out for 56 days. The results from all of the tests are to be compared with control concrete mix. Read More...
|
casad |
India |
24-26 |
7 |
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
-Pradeep Halder ; Franklin Edla; Dr. P. Ravinder Reddy
The present study is to determine flow field in the three-dimensional scramjet engine combustor with coupled implicit NS equations, the standard k-ε turbulence model are used and the finite-rate/eddy-dissipation reaction model has to be applied to simulate numerically for the flow field of the hydrogen, diesel and methane fueled scramjet combustor with a planer strut flame holder under two different working conditions, the working condition include the cold flow and engine ignition. ANSYS Fluent software is used to solve the analysis, with hot and cold inlet velocities, the mach number for air and fluids are 2 and 1 respectively, inflow fluids are varied as hydrogen, diesel and methane. Due to combustion the recirculation region behind the wedge becomes larger as compared to mixing case and it acts as a flame holder for the methane (CH4), hydrogen (H2) and diesel (C10H22) diffusion. It is also evident from the simulation studies; the combustion affects the flow field significantly. The leading edge shock reflected off the upper and lower combustor walls facilitates on setting of combustion when it hits the wake in a region where large portions of the injected fuel have been mixed up with the air. The pressure, velocity and temperature distributions along the geometry are estimated and discussed. Read More...
|
Mechanical Engineering |
India |
27-33 |
8 |
Investigations of Drag and Lift Forces Over the Profiles of Car Using CFD
-Edla Franklin ; Pradeep Halder; Dr. P. Ravinder Reddy
Aerodynamic characteristics of racing car are of significant interest in reducing racing accidents due to wind loading and save the fuel consumption. This work outlines the process taken to optimize the geometry of a vehicle. Vertices and edges of car were imported into GAMBIT and a computational domain is created. An unstructured triangular mesh was then applied. The goal is to obtain a better flow around the car model to lower the coefficient of drag force; the work is carried out in a ANSYS CFD FLUENT program towards a converged solution. These practices are helpful to redesign existing vehicles in order to improve handling and increase fuel efficiency. In the present work an attempt has been made by considering three models of car by varying speed of vehicle, the pressure coefficients and drag coefficients are obtained. Read More...
|
Mechanical Engineering |
India |
34-42 |
9 |
Experimental Study on the Mechanical Properties of Concrete Incorporating PET Fibers
-Jinay Pandya ; Prof. B. M. Purohit
The aim of this study is to evaluate the mechanical properties of PET fiber reinforced concrete using alccofine. In this study PET fiber are used with 0%, 0.5%, 1.5% and 3% by weight of cement with Alccofine (GGBS) percentage of 0%, 3%, 6% and 9% which replacing cement for M30 grade concrete. All of the mixes are tasted to find the compressive strength test and flexural strength test for 7 days 28 days. The results from all of the tests are to be compared with control concrete mix. Read More...
|
civil casad |
India |
43-45 |
10 |
A literature review on life cycle analysis of tyre retreading
-Vankar Bharat Ambalal ; Gosai Dipak
This paper describes the literature review of a Life Cycle Analysis (LCA) of Tyre Retreading study. Over the last 20 years there has been an exponential rise in the number of reports in the area of Tyre Retreading. In a recent publication, the authors surveyed the major findings and conclusions on this subject. The present paper is a summary of that publication. It is designed to assist one in quickly becoming acquainted with the significant findings and landmark publications on the many different aspects of Tyre Retreading. Also LCA study covered two different retreading options of used tyres. The review was conducted by three-member review panel. It should be noted that the preliminary administrative tasks took more time than expected. Many questions or comments were answered, which contributed to the improvement of the LCA report concerning methodology, data quality and clarity aspects, and to highlighting some research directions. Read More...
|
I.C and Automobile engineering |
India |
46-50 |
11 |
Snow Avalanche and its Impacts, Prevention and Challenges
-Jitendra kumar ; Dr. ShriRam
Snow avalanche are a significant hazard in mountainous environments around the world. Snow avalanches pose a significant hazard to human populations and infrastructure in mountainous regions. Avalanche forecasting and hazard reduction methods rely heavily on the evaluation of snowpack information collected in the field. Hence understanding the spatial patterns of snowpack instabilities and their environment determinants is crucial. Avalanche impacts in India, include fatilities, and are summarize for public and residential area like ski areas, roads, and resource industries. Avalanche hazard methods, in which zoning, explosive control, forecasting. Problems of current avalanche hazard is solving these problem is identified with resources industries, backcountry recreation and residential areas. Snow avalanches are a significant natural hazard that impact roads, structures and threaten human lives in mountain terrain. Snow avalanche is not only the snow cover over the mountain side but also the later snowfall intensity. In this case study, we quantify the spatial patterns of the thickness and strength of an observed buried surface hoar layer and test for associations with spatial estimates of incoming radiation during the surface hoar formation period. In India, is attempt using terrain and satellite images and terrain characteristics with meteorology information. Contributory factors in retaining the snowfall a change and snow pack characteristics were rank and assign weightage the avalanche initiate based on the event in the region. Spatial distribution of snow accumulation zone, Snow fall area and snow pack stability assessment criteria was developed. Snowfall, temperature and wind are three factors that quickly change avalanche conditions. Read More...
|
Civil Engineering |
India |
51-54 |
12 |
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
-Vishal Pandhare ; Bhoknal Pradnya; Hambir Anuja
The data is stored in the cloud. Storing data should be risky. Cloud provider should be trustful because the data is confidentential. The Group manager keeps the record of group members. The key distribution is done to the group of each department. The Group members can access the stored data from cloud. The encryption-decryption technique is used to store the data. Any cloud user can anonymously share data with others by providing group signature and dynamic broadcast encryption techniques. When new member joined in the group, new granted users can directly decrypt data files uploaded without contacting with data owners. Proposing a new model for Sharing Secure Data in the Cloud for the Multiuser Group. Read More...
|
computer engineering |
India |
55-58 |
13 |
REGION BASED DATA CENTRE RESOURCE ANALYSIS FOR BUSINESSES
-Govinda.K ; Siddharth Singh; J. Mahendiran
To meet up the needs of large-scale multi-tenant data centres and clouds, data center and cloud architectures are continuously forming modifications. These needs are primarily focused around seven dimensions: scalability in computing, storage, and bandwidth, scalability in network services, efficiency in resource utilization, agility in service creation, cost efficiency, service reliability, and security. This article focuses on the first five dimensions as they are related to networking. . Large data centers are handling thousands of servers, exabytes of storage, terabits per second of traffic, and tens of thousands of tenants. Data centres are interconnected across the wide area network via routing and transport technologies to provide a pool of resources, known as the cloud. High-capacity transport intra- and inter-datacentre are being achieved by High-speed optical interfaces and dense wavelength-division multiplexing optical transport. This paper presents data centre resource analysis based on region Read More...
|
Computer Science |
India |
59-64 |
14 |
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
-Kirandeep Kaur ; Gagandeep Kaur
Wireless sensor is a mounting field and energy conservation is always being in the peak challenges. Researchers have gone all the way through architectures and topologies that permit energy proficient operation in wireless sensor network. Clustering being stretchy helps to supplely mould the network according to the needs. Cluster head election and cluster formation is previously investigated by numerous researchers. In this paper, a proposed novel scheme the Fuzzy Abiding Cluster Head Formation Protocol (FACFP) that uses Mamdani’s fuzzy inference system in the process during cluster formation. We demonstrate that using multiple parameters in cluster formation can minimize the usage of energy. We will compare our proposed technique with well-known existing protocols to show that using multi parameter FIS enhances network lifetime and conserves energy utilization. Read More...
|
Electronics and Communication Engineering |
India |
65-68 |
15 |
Performance Analysis and Comparison of Journal Bearing using Ferro Fluid & Magneto-Rheological Fluid by Computation Fluid Dynamics
-Sunil Keswani ; Aum Thacker
Now days the works are focuses on Smart fluid technology which is an emerging field of research and that has lead to the introduction of Ferro fluids, they are smart materials whose rheological properties (viscosity, yield stress, shear modulus etc.) can be readily controlled on appliance of an magnetic field. Recent studies show that there is an increasing interest in designing hydro dynamically lubricated bearings using electro-rheological fluids (ERFs) or magneto rheological fluids (MRFs). Both smart fluids behave like Bingham fluids, and thus the Bingham plastic model is used to describe the grease and the electro-rheological (ER) and magneto-rheological (MR) fluids behavior of the non-Newtonian fluid flow. This work is concerned with the Computational fluid Dynamics of the hydrodynamic journal bearings lubricated with Ferro fluid and comparison of magneto rheological fluid. .. The solution renders the bearing performance characteristics, namely, load carrying capacity, attitude angle, frictional force at the journal surface, friction Coefficient and bearing side leakage. Ferro fluids can solve many difficult sealing, lubricating, detection, heat transfer and damping problems. Design of smart journal-bearing systems is an important issue that opens up the possibility for semi active dynamic control of bearing behavior using smart fluid technology. Read More...
|
Mechanical Engineering |
India |
69-72 |
16 |
Comparative Study of Object Oriented Design and Component Based Software Engineering
-Biyanta Vipul Shah ; Aalisha Sheth; Aayushi Shah
Object Oriented Approach and Component Based Software Engineering are two of the popular software paradigms. In this paper we have shown how these two paradigms differ from each other by conceptual comparison. This paper will cover the property comparisons of these two concepts and will also conclude a better concept in a particular situation. It will also cover the future work possible in this field. Read More...
|
Computer engineering |
India |
73-76 |
17 |
Toroidal Drive System for Vehicle Transmission Control
-Sushant Sopanrao Jadhav ; Prof.Hanamapure N.S.
A continuously variable transmission (CVT) is a transmission which better fuel efficiency, quieter operation, and a lower mass. Current efforts to reduce the vehicles, fuel consumption in order to protect the environment and save fuel have seen a recent resurgence in CVT research, especially in the automotive allow a continuous variation of the output velocity by adjusting its geometrical configuration. This offers several advantages over traditional transmissions such as industry. The torque of the continuously variable transmission system with friction drive mechanism is transmitted by contacting roller with input and output disks. For the higher transmitted torque, it is necessary to apply large load in order to get higher friction force, which in turn generates severe high stress on the contact surfaces of roller and disks. The 'Toroidal' type CVT system has simple component arrays. This work documents a successfully developed experimental model of a 'Toroidal' continuously variable transmission (CVT) by adjusting its geometrical configuration of CVT design and compared the experimental results of speed, torque and power delivered at the output disc with those obtained by a theoretical. Read More...
|
Mechanical Engineering |
India |
77-81 |
18 |
STUDIES OF PHYSICO-CHEMICAL STATUS OF THE SIRPUR TALAB AT INDORE, INDIA
-SMRUTI SOHANI ; DR. SANJEEDA IQBAL; A. Bafna
In India, most of the population is dependent on surface water as the only source of drinking water supply. Water sources available for drinking and other domestic purpose must possess high degree of purity, free from chemical contamination and micro-organism. The fresh water pollution has long been discussed by life scientists. Sirpur Talab, a small Lake located in the outskirts (Dhar Road) of about 6-8 kms away from the city of Indore, India. The Present study was attempted to investigate the Physico-chemical variability of Sirpur talab such as Water Temperature, Transparency, Turbidity, Total Dissolved Solids, pH, Dissolved Oxygen, Total Hardness, Chlorides, Alkalinity, and Sulphate. In the present study water samples were collected in the period and various physico-chemical analyses were performed based on standard methods. The work is carried on the seasonal basis in order to determine the effect of the climatic factors on the water quality; three samples were collected in every season between Januarys to December for two different stations of the pond. By observing the result it can be concluded that the parameters which showed the DO (6.9-12.8mg/l), total hardness (53-98mg/L), calcium (28-44 mg/L), magnesium (20-320 mg/L) etc. The results revealed that most of the water samples were out of limited; according to the WHO standards. This work is intended to determine the overall water quality of the Sirpur talab. Read More...
|
ENVIRONMENTAL SCIENCE |
India |
82-85 |
19 |
A Low Power Row and Column Compression for High-Performance Multiplication on FPGAs using Fast Adder
-Jaswant singh ; Gaurav Shamra
Digital system design in a remarkable and emerging field now days. Users are using digital devices for almost each and everything in daily life like calculator for calculation, Digital cameras for photo shot and video recording, Mobiles for communication, Computer to connect all over the world etc. In fact, increasing demand for manageable digital electronics products for computing and communication, as well as for other applications, has necessitated longer battery life, lower weight, high speed and lower power consumption. However, the two design criteria are often in conflict by improving one particular aspect of the design constrains the other. The demand for high speed processing has been increasing as a result of expanding computer and signal processing applications. In majority of digital signal processing (DSP) applications, multiplication and accumulation are the most critical operations. Read More...
|
Electronics and Communication |
India |
86-89 |
20 |
A Comparative Study of Forward and Reverse Engineering
-Dhaval Jha ; Dhwanish Shah; Bansal Shah; Saloni Shah; Yash Shah
With the software development at its boom compared to 20 years in the past, software developed in the past may or may not have a well-supported documentation during the software evolution. This may increase the specification gap between the document and the legacy code to make further evolutions and updates. Understanding the legacy code of the underlying decisions made during development is the prime motto, which is very well supported by Reverse Engineering. In this paper, we compare the Transformational Forward engineering, where a stepwise abstraction is obtained with the Transformational Reverse Methodology. While the forward transformation process produces overlap of the decisions, performance is affected. Hence, the use of transformational method of Reverse Engineering which is a backwards Forward Engineering process is suitable. Besides the design recognition obtained is a domain knowledge which can be used in future by the forward engineers. Read More...
|
Computer Engineering |
India |
90-92 |
21 |
Effect of Bi Content on Optical Properties of Se-Sb-Bi Chalcogenide Amorphous Thin Films
-Nidhi Jain ; Nidhai Jain; Dr. S.L.Kakani; Dr. K. C. Pancholi
Se90-xSb10Bix (x=0, 2, 4, 6, 8 & 10) chalcogenide glasses were prepared by well-established melt quenching technique. The glassy nature was verified by X-ray diffraction (XRD). Thin films of these samples were deposited on glass substrate using thermal evaporation technique at room temperature. The transmission spectra of thin films have been taken using UV-VIS-NIR spectrophotometer (Varian Cary 500) in the wavelength range 200 nm to 1500 nm. The refractive index and film thickness are calculated by using envelope method proposed by Swanepoel. The results indicate that n increases with the increasing Bi content which is related to the increased polarizability of the larger Bi atomic radius 1.46 Å compared with the Se atomic radius 1.16 Å. The value of absorption coefficient (α) and hence extinction coefficient (k) has been determined from transmission spectra. Optical band gap (Eg) is estimated using Tauc's extrapolation and is found to decrease from 1.46eV to 1.24 eV with the Bi addition. This behavior of optical band gap is interpreted in terms of electronegativity difference of the atoms involved and cohesive energy of the system. The variation of optical band gap with Bi content has been studied. This study is aiming to examine such structures if they are employed as photonic devices such as photo-detectors, LED's and optical switches. Read More...
|
Physics |
India |
93-95 |
22 |
Security and Privacy Enhancing Multicloud Architecture
-Apeksha Mahoorkar ; Prof. Gautam Borkar
In recent years use of Cloud computing in different mode like cloud storage, cloud hosting, cloud servers are increased in industries and other organizations as per requirements. The Security challenges are still among the biggest obstacles when considering the adoption of cloud services. For this a lot of research has been done. With these, security issues, the cloud paradigm comes with a new set of unique features, which open the path toward novel security approaches, techniques, and architectures. Read More...
|
Computer Engineering |
India |
96-100 |
23 |
Brand Recall in of Color Coated Roofing Sheet Market of Bangalore
-Ananthu V. ; Dr. H. Ramakrishna
Brand Recall is the extent to which a brand name is recalled as a member of a brand, product or service class, as distinct from brand recognition. Common market research usage is that pure brand recall requires "unaided recall". Brand awareness is the probability that consumers are familiar about the life and availability of the product. It is the degree to which consumers precisely associate the brand with the specific product. It is measured as ratio of niche market that has former knowledge of brand. Brand awareness includes both brand recognition as well as brand recall. Brand recognition is the ability of consumer to recognize prior knowledge of brand when they are asked questions about that brand or when they are shown that specific brand, i.e., the consumers can clearly differentiate the brand as having being earlier noticed or heard. While brand recall is the potential of customer to recover a brand from his memory when given the product class/category, needs satisfied by that category or buying scenario as a signal. In other words, it refers that consumers should correctly recover brand from the memory when given a clue or he can recall the specific brand when the product category is mentioned. It is generally easier to recognize a brand rather than recall it from the memory Building brand awareness is essential for building brand equity. It includes use of various renowned channels of promotion such as advertising, word of mouth publicity, social media like blogs, sponsorships, launching events, etc. To create brand awareness, it is important to create reliable brand image, slogans and taglines. The brand message to be communicated should also be consistent. Strong brand awareness leads to high sales and high market share. Brand awareness can be regarded as a means through which consumers become acquainted and familiar with a brand and recognize that brand. Read More...
|
Market research and analysis |
India |
101-106 |
24 |
Analytical Study of Steel Fibre Reinforced Rigid Pavements under Static Load
-Md Zoheb ; Amaresh S Patil
Nowadays, the application of steel fibers in concrete has increased gradually as an engineering material. The knowledge is not only necessary to provide safe, efficient and economic design for the present, but it also to serve as a rational basis for extended future applications. In this study, steel fibre reinforced rigid pavements are analyzed for stresses developed due to Static loads & temperature differentials. All the models are generated and analysis is carried out using the ANSYS software. Comparison of curling stresses in SFRC with conventional concrete is carried out. Parametric study for the effect of change in slab length & slab thickness of pavements on curling stresses is also done. Curling stresses due to Linear & Nonlinear temperature distribution in top & bottom layer of SFRC pavement slabs are also calculated. Frictional stresses in SFRC due to uniform temperature differential are almost same as conventional concrete. Analysis results shows, SFRC develops more stresses as compared to conventional concrete & nonlinear temperature distribution develops more stresses than linear temperature distribution. SFRC pavements are analyzed for Single axle static load for varied thickness and subgrade. Results reveal that the loading stresses are higher, when the load is at the edge region. Read More...
|
Civil Engineering |
India |
107-114 |
25 |
Comparison of Several IaaS Cloud Computing Platforms
-Amar Deep Gorai ; Dr. Birendra Goswami
Today, the question is less about whether or not to use Infrastructure as a Services (IaaS), but rather which providers to use. Cloud infrastructure services, known as Infrastructure as a Service (IaaS), are self-service models for accessing, monitoring, and managing remote data center infrastructures, such as compute, storage, networking, and networking services. Instead of having to purchase hardware outright, users can purchase Infrastructure as a Service (IaaS) based on consumption, similar to electricity or other utility billing. Most providers offer the core services of server instances, storage and load balancing. When choosing and evaluating a service, it is important to look at issues around location, resiliency and security as well as the features and cost. In order to evaluate which provider best suits requirements. Read More...
|
cloud computing |
India |
115-120 |
26 |
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
-Govinda.K ; Sen Kurien George
Mobile Cloud Computing (MCC) which consists of mobile and cloud computing, is one of the major breakthrough in industry and it has been improving in the IT industries since 2009. The MCC is still at the beginning stage of improvement or development, it is very important to grasp core knowledge of the technology in order to point us to the next-gen research. MCC has been involved to be a succeeding development for mobile technology. To overcome obstacles related to the performance MCC compiles the cloud computing into the mobile environment and security were observed in mobile computing. These outputs a short account on the background of MCC: starting from mobile computing to cloud computing and then followed with a discussion on recent research work. In this paper proposes mobile cloud computing security using one time password and whatsapp mechanism. Read More...
|
Computer Science |
India |
121-123 |
27 |
Design, Analysis and weight optimization of Crane Hook: A Review
-MAHESH N SOLANKI ; ANTRIKSH BHATT; ANILKUMAR RATHOUR
Crane hook are highly liable component and are always subjected to failure due to accumulation of large amount of stress which can eventually lead to its failure .In this present work, to study the different design parameter & stress pattern of crane hook in its loaded condition for different cross section, the design and drafting of crane hook will be prepared by using ANSYS 14.5. By finite element analysis, the stress which is to be formed in various cross section are compared with design calculation .The stress concentration factors are used in strength and durability evaluation of structure and machine element. In this work and also we observe the parameter that affects the weight reduction. Read More...
|
MECHANICAL ENGINEERING |
India |
124-127 |
28 |
Study of Nickal based Super Alloy
-Kheer Sagar Naik ; Tarun kumar Painkra; Rajendra kumar Nishad; Prakash kumar Sen; Shailendra kumar Bohidar
Super alloys are metallic materials for service at high temperature, so one of their most important properties is high temperature creep resistance. Other crucial material properties are fatigue life, phase stability, as well as oxidation and corrosion resistance. A conventional metal may be failed in high temperature machining condition and has poor creep resistance, so materials for working at high temperature and which having also good creep resistance are a critical issue in manufacturing. this paper present a review about the Ni- base super alloys, which working at high temperature and also having a good machining property and having good creep resistance. Read More...
|
Mechanical Engineering |
India |
128-130 |
29 |
Design Modification of Failure Mode Effect Analysis of Vibrating Feeder used in Crushing Industries
-Prashant Salat ; Prof. Amit Anakiya
Vibratin feeder technology is common in material handling applications in numerous industries. This review paper examines a problem with fatigue in the support structure of a specific type of vibrating feeder. It also reviews the theory behind vibrating feeder technology and considerations that engineers who design them need to be aware of. The finite element method is used to replicate a fatigue problem in the support structure and various design configurations are then analyzed to reduce the risk of the conditions that caused the fatigue. The results are reviewed and recommendations are made to improve the design and modify the component dimensional parameters vibrating feeder. Read More...
|
Mechanical Engineering |
India |
131-132 |
30 |
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
-NANCY RANI ; LAVINA
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB. Read More...
|
Computer science & Engineering |
India |
133-137 |
31 |
MODELING, ANALYSIS AND SIMULATION OF POLY-PHASE BOOST CONVERTER
-ABHISHEK KUMAR ; GAJENDRA SINGH RAWAT; RITURAJ SINGH THAKUR
The objective of this paper is to design Poly-phase boost converter which overcomes the problem of high input ripple current and output ripple voltage Digital control is more convenient for such a topology on account of the requirement of synchronization , phase shift operation , current balancing etc. This paper deals on analysis and implementation of four phase boost converter, each is a 35W unit and switched at 100 KHz. The waveforms are observed using MATLAB Simulink. Read More...
|
Electrical Engineering |
India |
138-141 |
32 |
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
-ABHISHEK KUMAR ; GAJENDRA SINGH RAWAT; RITURAJ SINGH THAKUR
The objective of this paper deals on analysis and implementation of single phase and four phase boost converter. The input ripple current and output ripple voltage, steady state capacitor current are observed using MATLAB Simulink. Read More...
|
Electrical Engineering |
India |
142-145 |
33 |
Researchers and Reviews on Active Solar Distillation System
-Hitesh Panchal ; Nikunj Patel; Altafhussain Momin; Prof. Ramesh Mevada
Solar distillation is one of the most promising technologies for supplying potable water. Simply due to its lower productivity, it has limited application. Only, when solar distillation is coupled with any mechanical source, then it increased productivity. Such, the device is called active solar still. The present review paper shows researches done on a solar distillation system for increment in distillate output. Read More...
|
Solar Energy |
India |
146-153 |
34 |
Review of Anorexia Nervosa and Bulimia Nervosa for Mankind
-Dr. Vaishali H panchal
Anorexia Nervosa and Bulimia Nervosa are not called as a disease, but the today mankind is suffering from it. Hence, the present review of studies of literature is an important prerequisite for actual planning and then execution of any research work. The research workers need to acquire up-to-date information on what has been thought and said in a particular area so that they can derive benefit from the work of their predecessors. Read More...
|
Psychology |
India |
154-156 |
35 |
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
-Tushar Prabodhankar ; Gautam Borkar
Sensor networks are deployed in a hostile environment, security becomes extremely important. An efficient Key Management Scheme to provide security in HSN. In HSN, Clusters are formed as shown in below figure. Routing is done in two phases: 1) Intra-cluster routing each L-sensor sends data to its cluster head(H-Sensor) via multi hops of other L-sensors ; 2)Inter-cluster routing –a cluster head aggregates data from multiple L-sensors and then sends the data to the sink via the H-sensor backbone. This Paper focuses on intra cluster routing using MST (minimum spanning tree) algorithm to approximate the least energy consumption case. After constructing SPT(Spanning tree), every L-sensor node sends sensor information to H-sensor(Cluster head) with in a cluster. In this presents a preventive technique to overcome non- differential side channel attack in HSN by enhancing Elliptic Curve Cryptography and it minimizes storage space requirement, communication overhead and energy consumption in HSN. Read More...
|
Computer Engineering |
India |
157-159 |
36 |
IMAGE ENHANCEMENT IN CASE OF UNEVEN ILLUMINATION USING VARIABLE THRESHOLDING METHOD
-Satbir Kaur ; Navpreet Kaur Walia
Uneven illumination always affects the visual quality images which results in poor understanding about the content of the images. There is no accepted universal image enhancement algorithm or specific criteria which can fulfill user needs. The processed image may be very different with the original image in the visual effects, but it also may be similar to the original image [1]. It will be a developing tradition to integrate the advantage of various algorithms to practical application to image enhancements [2]. Zhang et al. [3] presents an adaptive image contrast enhancement method. The proposed method is based on a local gamma correction piloted by histogram analysis. In this paper , to avoid uneven Illuminance image is divided into different segments . It works locally to decrease contrast as if we perform enhancement techniques globally on portions which are already bright then this gives poor results. Enhancement techniques are applied only to those dark portions. We need accurate method that not only enhance the image but also preserve the information. Read More...
|
COMPUTER SCIENCE |
India |
160-164 |
37 |
Investigation of Roller Burnishing Process Parameters on Surface Roughness of Al-Alloy 6351 T6 by Response Surface Methodology
-KUNHAL R PATEL ; Nirav Patel; Kiran Patel
These study deals with investigation and mathematical modelling of roller burnishing process parameters in CNC lathe machine using response surface methodology. Here the work piece material used is Aluminium Alloy 6351 T6 and tool material used is carbide single roller burnishing tool. The input parameters during process are Interference, Tool feed, Burnishing speed and Number of tool passes. The output parameter is surface roughness. Read More...
|
Mechanical Engineering |
India |
165-168 |
38 |
Design and Analysis of Temperature Sensor using CMOS Technology
-Modhya Mehul ; Kumkum Verma; Sanjay Kumar Jaiswal
This paper presents CMOS temperature sensor which is designed using starved voltage controlled ring oscillator at 180 nm CMOS technology. CMOS temperature sensor also consists a voltage level shifter, a counter, and a register that is designed using d flip flop. Temperature sensor occupies smaller silicon area with higher resolution than the conventional temperature sensor. Used VCRO has full range voltage controllability along with a wide tuning range and is most suitable for low-voltage operation due to its full range voltage controllability. Various parameters of circuits are calculated. Result shows that speed and power dissipation of circuit are directly proportional to power supply voltage. By increasing temperature we see that power dissipation of circuit increases while delay decreases. Read More...
|
Electronics and Communication |
India |
169-172 |
39 |
Security Check in Cloud Computing through Third Party Auditor
-Govinda.K ; J.Keerthana; U.Pavithra
In cloud computing, data owners crowd their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, it requires an independent auditing service to check the data integrity in the cloud. Some existing remote integrity checking method scan only serve for static records data. Thus, cannot be used in the auditing service since the data in the cloud can be animatedly updated. Thus, an efficient and secure dynamic auditing protocol is required to convince data owners that the data are correctly stored in the cloud. In this paper, we first design an auditing framework for cloud storage systems for privacy-preserving auditing protocol. Then, we extend our auditing protocol to support the data dynamic operations, which is efficient to secure the random model. Read More...
|
Computer Science |
India |
173-175 |
40 |
Performance Evaluation of Open Source Data Mining Tools
-Syeda Saba Siddiqua ; Mohd Sameer; Ashfaq Ahmed Khan
This is an attempt at evaluation of Open Source Data mining tools. Initially the paper deliberates on what can be and what cannot be the focus of inquiry, for the evaluation. Then it outlines the framework under which the evaluation is to be done. Next it defines the performance criteria to be measured. The tool selection strategy for the study is framed using various online resources and tools selected based on it. A table lists the different set of criteria and the findings of each tool against it. After capturing the findings of the study in a tabular fashion, a framework implementation strategy is made. This details the relative scaling for the evaluation. Based on the scorings, a conclusion remark with some suggestions summarizes the findings of the study. Lastly some assumptions/Limitations are discussed. Read More...
|
Computer Engineering |
India |
176-183 |
41 |
Modified Active Monitoring Load Balancing with Cloud Computing
-Vikas Kumar ; Shiva Prakash
Cloud computing is internet-based computing in which large groups of remote servers are networked to allow the centralized data storage, and online access to computer services or resources. Load Balancing is essential for efficient operations in distributed environments. As Cloud Computing is growing rapidly and clients are demanding more services and better results, load balancing for the Cloud has become a very interesting and important research area. In the absence of proper load balancing strategy/technique the growth of CC will never go as per predictions. The main focus of this paper is to verify the approach that has been proposed in the model paper [3]. An efficient load balancing algorithm has the ability to reduce the data center processing time, overall response time and to cope with the dynamic changes of cloud computing environments. The traditional load balancing Active Monitoring algorithm has been modified to achieve better data center processing time and overall response time. The algorithm presented in this paper efficiently distributes the requests to all the VMs for their execution, considering the CPU utilization of all VMs. Read More...
|
Computer Science & Engineering |
India |
184-189 |
42 |
A REVIEW PAPER ON EXPERIMENTAL AND NUMERICAL INVESTIGATION OF PARAMETRIC STUDY ON GASEOUS FUEL FLOW PARAMETERS: FLAME LENGTH AND DIAMETER
-Tailor Jigar Rameshbhai ; Vikas J. Patel; Kamlesh V. Chaudhari ; Mital G. Patel
Flame is an important parameter for any combustion process which is responsible for either the complete or incomplete combustion process. There are certain factors which influence the flame length and diameter such as fire source diameter or nozzle diameter, equivalence ratio, quality of fuel, heat release rate etc. Investigation of flame length and diameter is more relevance in the rational design of combustion chamber, be it for an internal engine or for a furnace. The flame represents the zone of combustion, its length is a measure of the intensity of combustion and therefore of heat release. So, this paper reviews about the flame behavior on the basis of flame length and diameter. Read More...
|
Mechanical Engineering |
India |
190-193 |
43 |
A Review: Dust Explosion of Bulk Solids
-Harpreet Singh
Dust is a common in process industries that manufacture, store and handle particulate material. More than 70% of dusts processed in industries are combustible. Dust explosion regularly occur in process industries, cause serious damage and live loss. Dust explosion was found in literature since 1785 and the records are available from the 20th century. Lot of experiments were done to control explosions occurring in coal mines and other processing industries, but stills explosions are occurring in different countries due to different dusts, these accidents disclose that there are still some technical problems unsolved. Industrial technology in India is similar to develop countries but information relevant to dust explosion occurring in India is almost negligible because in most accidents that occur in India the broad term explosion is used and recorded while the type of explosion goes unpublicized. It is impossible to eliminate dust explosion but it can be reduced by using different methods. Read More...
|
Mechanical |
India |
194-197 |
44 |
Design and Simulation of Compact Wideband Rectangular Dielectric Resonator Antenna for Satellite Applications
-HARDIK PATEL ; PROF.G.D.MAKWANA
An objective of the paper is to optimize the parameters, and simulation analysis of compact wideband rectangular dielectric resonator antenna (RDRA). In this paper, a compact wideband, rectangular dielectric resonator antenna is presented using relatively low dielectric constant material and using double microstrip patch. The rectangular DRA is fed with a modified stepped microstrip feed to ensure efficient coupling between the RDRA and the feeder. The performance of the proposed antenna has been significantly improved by loading the RDRA with two narrow conducting metallic strips of suitable widths, which results in dual-resonance excitation and leads to a wider operating bandwidth (16.274-18.200 GHz). The frequency characteristics and radiation performance of the proposed antenna are successfully optimized. Design and simulation results are in excellent agreement. Read More...
|
ELECTRONICS&COMMUNICATION ENGINEERING |
India |
198-201 |
45 |
Production and Application of Bio-diesel in Compression Ignition Engine
-Akshay Manoj Shahane ; Agnideep Bhowmick; Ayush Gupta; Abhinav Kalkhanday
The continuous increasing demand for energy and diminishing tendency of petroleum resources has led to the search for alternative renewable and sustainable fuel. Biodiesel seems to be a solution for future and being viewed as a substitute of Diesel. The vegetable oil, fats, grease are source of feedstock for the production of biodiesel. Out of four methods viz. dilution, micro emulsion, thermal cracking and Transesterification, the last one is used to produce biodiesel and reduce viscosity. Biodiesel is more suitable for use as an engine fuel rather than straight vegetable oils for a number of reasons; the more notably is its low viscosity. The aim of the paper at hand is towards the production of biodiesel from vegetable oils viz. Karanja, Jatropha by Transesterification process. Fuels were manufactured by direct blending 5% of biodiesels, namely, Karanja and Jatropha and Rice Bran vegetable oil using Magnetic stirrer. The physical properties of the fuels were also found out. Later, these fuels were run in Compression Ignition engines to test and compare the performance and pollution characteristics of fuels. Read More...
|
Mechanical Engineering |
India |
202-205 |
46 |
SURVEY ON COOPERATIVE FIREWALL ANOMALY DETECTION AND REDUNDANCY MANAGEMENT
-J.SETHURAM ; G.SANKAREESWARI
Network security is essential for protecting the private and public networks such as banking and educational zones. Network can use different kinds of security mechanism. Among this firewall is one of the security mechanisms. The Firewalls are used as a protection barrier among the two different networks. The performance of firewall is mainly based on firewall policies. The firewall policies are used to decide whether the packets can be permitted or to be refused. These rules are crucial for the operation of firewall policies. The firewall policy contains erroneous configurations like rule redundancies, errors and conflicts. Such, conflicts are resolved by various mechanisms based on their errors. The following techniques are used for some error detection and correction process like cross-domain cooperative firewall, firewall compression, firewall decision diagrams, firewall verification tool and anomaly detection tools like FAME(Firewall Anomaly Management Environment),FPA(Firewall Policy Advisor, Fireman etc. Read More...
|
NETWORK SECURITY |
India |
206-208 |
47 |
Design Modification and Analysis of Automobile Wheel Rim using Finite Element Analysis
-Aman Pandya ; Smit Thakkar
Importance of wheel in the automobile is obvious. The vehicle may be towed without the engine but at the same time even that is also not possible without the wheels, the wheels along the tire has to carry the vehicle load, provide cushioning effect and cope with the steering control. Generally wheel spokes are the supports consisting of a radial member of a wheel joining the hub to the rim. Spokes make vehicles look great but at the same time they require attention in maintenance. To perform their functions best, the spokes must be kept under the right amount of tension. If a spoke does break, the wheel generally becomes instantly unbalanced also the hub may break. The purpose of the car wheel rim provides a firm base on which to fit the tire. The motorcycle riders are subjected to extreme vibrations due to the vibrations of its engine, improper structural design of the motorcycle and the bad road conditions. So in this project the attempt has been made to reduce the vibrations of vehicle by providing springs instead of the spokes at the wheel. The springs will work as suspension members at wheels as well as they will provide proper strength that is adequate to proper operation of the wheel. The CAD model of a motor cycle will be made in solid works and later it is analyzed in ANSYS 14.5. The results of suspension of ordinary wheel rim and spring based rim will be compared. Read More...
|
Mechanical Engineering |
India |
209-211 |
48 |
DATA PROVENENCE IN PUBLIC CLOUD
-Govinda.K ; Md Fuzail.C
Cloud computing is the internet based computing it is also known as "pay per use model"; we can pay only for the resources that are in the use. The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy measures are actively being researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from the sheer amount of virtualization and data distribution carried out in current clouds has also revealed an urgent need for research in cloud accountability, as has the shift in focus of customer concerns from server health and utilization to the integrity and safety of end-users' data. In this paper we purpose the method to store data provenance using Amazon S3 and simple DB. Read More...
|
Computer Science |
India |
212-213 |
49 |
Selection criteria and design of a chain used for Lifting Application
-Navin Kumar Bansal ; Navin Kumar Bansal; U.V. SHAH
Lifting chain is designed for use with hoists, cranes, winches, and other material handling equipment. It is also used in rigging slings and for lashing. There are two standard grades for lifting chain: grade 80 lifting chain and grade 100 lifting chain. Grade 80 lifting chain is made from alloyed steel and is specifically designed for overhead lifting applications. This grade of lifting chain has a good strength-to-weight ratio and excellent durability. Grade 100 lifting chain is also made of alloyed steel, but is hardened and tempered for superior durability and fatigue resistance. Most Grade 100 lifting chain is made of Herc-Alloy 800, a heat-treated alloy with very high strength. Although many types of chain fittings are available, Grade 80 fittings should not be used with Grade 100 chain. Selecting lifting chain requires an analysis of performance specifications. Lifting chain size is measured in inches (in.) or millimeters (mm). Common sizes include 7/32 in. (5.5 mm), 9/32 in. (7.0 mm), 5/16 (8.0 mm), 3/8 (10.0 mm), 1/2 in. (13.0 mm), 5/8 in. (16.00 mm), 3/4 in. (20.0 mm), 7/8 in. (26 mm), and 1 1/4 in. (32.0 mm). Nominal dimensions include inside length and inside width. Other important considerations for choosing lifting chain are the approximate number of links per foot (ft.) and the approximate weight (lbs.) per 100 ft. When working with lifting chain, working load limit and rated capacity vary with the angle of use and the number of lifting chain used in a sling. For example, a single 5.5 mm lifting chain may be rated for 2100 lbs. at 90 degrees. A double 5.5 mm lifting chain may be rated for 60, 45, or 30 degree use with working loads of 3600, 3000, and 2100 lbs. respectively. Lifting chain should meet requirements from organizations such as the U.S. Occupational Safety and Health Administration (OSHA), the American Society for Testing Materials (ASTM), and the International Standards Organization (ISO). Working load limits for Grade 80 and Grade 100 lifting chain are based on a 4 to 1 design factor from ISO. By testing all these parameters of chain we can easily select the required dimension of chain link for lifting purpose. Read More...
|
Mechanical Engineering, Design |
India |
214-217 |
50 |
A Review of Low-Energy 1-Bit Full Adder Techniques for Power Deprived Applications
-Pawan Kumar Mishra ; Himani Mittal
In this work a comparison and study of different low power 1-bit full adder techniques at deep submicron technologies is carried out. The study concentrates in the crucial factors which determine the applicability of the design for particular applications. The comparison of different adders has been carried out on the basis of these parameters i.e. delay, power consumption, output swing, PDP etc. The comparison is carried out between designs with low device count. On the basis of comparison a conclusion has been drawn in which the shortcomings of present designs have been discussed with future possibilities of improvement. The designs compared are TGA, SERF and modified SERF. Read More...
|
Electronics & Communication |
India |
218-220 |