No. |
Title and Author |
Area |
Country |
Page |
101 |
Reality based mobility model Analyzed over reactive and proactive routing protocols in natural Disaster areas
-Rashi Saxena ; Rachit Jain; Rashmi Tikar
In MANET a mobility model of the mobile nodes is an important and unique feature that differentiates this network with other wired and wireless networks. Network topology changes dynamically due to high mobility. Therefore to analyze any routing protocol performance in the realistic scenarios mobility models plays an influential role. In our paper the impact of reality based mobility models on reactive routing protocols (AODV, DSR) and proactive routing protocol (DSDV) are analyzed in the natural disaster scenarios. Performance matrices which analyze the performance of routing protocols are end to end delay, Throughput, Packet delivery Ratio. Mobility model scenarios are generated in bonnmotion and get implemented on NS2 network simulator. Our research work recommended to understand better use of routing protocols, reality based mobility models in real world application such as rescue and relief operation, tracking and surveillance operation in disaster areas. Read More...
|
Electronics and Communication Engineering |
India |
453-456 |
102 |
Comparison of Several PaaS Cloud Computing Platforms
-Amar Deep Gorai ; Dr. Birendra Goswami
Today, the question is less about whether or not to use Platform as a Services (PaaS), but rather which providers to use. PaaS is a computing platform that abstracts the infrastructure, OS, and middleware to drive developer productivity. PaaS offerings are "polyglot" and "polyhost". Selection of Platform as a Service provider is an important process because an ideal vendor will be able to continue to partner with company as company grows. There are many components to be consider while selecting PaaS vendor like Scalability, Availability, Manageability, Performance, Security, Accessibility, Billing At a high-level a PaaS helps organizations, specifically by providing a fast and scalable way to host applications in the cloud. Read More...
|
cloud computing |
India |
457-462 |
103 |
EMISSION TEST ON S.I ENGINE USING ALTERNATIVE FUELS AND ETHANOL
-T G ARUL ; M GOKUL; S.SASIDHARAN; S.PARTHASARATHI
The uses of automobiles are increasing day by day and increased Air pollution. Increasing global concern due to air pollution has generated much interest in the environmental friendly alternative fuels. Alternative fuels for IC engines are also becoming important because of diminishing gasoline reserves and increasing air pollution. Also one of method to use tri-fuels (Petrol and Kerosene) with additives of ignition in combustion chamber improves the rate of combustion and reduce the Air pollution. The Air-fuel mixture gets ignited and the flame travel for complete combustion in the chamber. The emission outcomes phenomena are to be analyzed and also efficiency of the engine checked by constructing the load test method. Ethanol is good candidates as alternative fuel. In this study, the effect of ethanol fuel blends and spark plugs ignition are investigated on 2- stroke single cylinder SI engine for analyzing the performance and combustion characteristics. The tests were performed using an electric dynamometer while running the engine and different load conditions. Exhaust gases namely, carbon dioxides (CO2), carbon monoxide (CO2) and unburned hydrocarbons (HC) are measured using multi exhaust gas analyzer. Exhausts emissions of the fuels is founded. Read More...
|
Mechanical Engineering |
India |
463-470 |
104 |
Autonomic Anomaly Detection System in Computer Networks
-Prof. Rahul. P. More ; Aniket V. Bagal; Sangram P. Bajare; Abhilash S. Gaikawd; Sameer S. Joshi
This paper describes how you can protect your system from Intrusion, which is the method of Intrusion Prevention and Intrusion Detection .The underlying premise of our Intrusion detection system is to describe attack as instance of ontology and its first need is to detect attack. In this paper, we propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer networks. The framework holds potential for self-governing: self-labeling, self-updating and self-adapting. Our structure employs the Affinity Propagation (AP) algorithm to learn a subject’s behaviors through dynamical clustering of the streaming data. It automatically labels the data and adapts to normal behavior changes while identifies anomalies. Read More...
|
Computer Engineering |
India |
471-473 |
105 |
WEAR OF IMPACT SOCKET : A REVIEW
-VINAY L JIWTODE ; LAUKIK P RAUT
Wear have been identified as some of the major problem associated with failure of impact sockets. Impact sockets are rotated by impact wrenches. These wrenches are designed to deliver high torque output with minimum exertion by the user. Wear and tear of impact socket takes place because of various reasons. This paper presents an overview of wear failure problem in impact socket and looks at some recent technique of wear prevention and discusses the future development of wear resistant impact socket. Read More...
|
MECHANICAL ENGINEERING |
India |
474-477 |
106 |
Micro-scale Chemistry Laboratory Techniques at Senior Secondary School Level and its Effectiveness
-Dr. Gopal Krishna Thakur
Micro-scale chemistry techniques are proving to be very useful for performing chemistry experiments in school laboratory. These are not just cost effective but also reduce wastage and health hazards. The techniques enable students to perform experiments in an environmentally safe and pollution free atmosphere using small quantities of chemicals without compromising the quality and standard of experiments. A typical micro-scale experiment consumes only, say less than 10% of the required quantity of reagents used in a corresponding traditional chemistry experiment. This paper presents the outcomes of a study that attempted to assess the effectiveness of the experiments in terms of students' understanding of chemistry related concepts and their overall achievement in chemistry subject. The paper discusses the result of the study and accentuates the economy model of micro-scale chemistry experiments and further delineates the educational implications of this technique for all the stake holders of school education. Read More...
|
Science Education |
India |
478-481 |
107 |
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
-HEENA CHAWLA
Wireless sensor network depends on the nodes have limited energy, memory, computational power, range and it is important to increase energy efficiency by saving the battery power so as to extend of the life time of the given wireless sensor network deployment. In wireless sensor network, data is measured by node and same is send to base station at regular interval. Clustering sensor nodes is an effective technique in wireless sensor network. Different protocols are used for energy consumption in which Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is the first hierarchal cluster based routing protocol successfully used in the wireless sensor network. In this paper, various enhancements used in the original leach protocol are studied. Read More...
|
Electronics and Communication Engineering |
India |
482-485 |
108 |
High Speed data transmission in medical body sensor network by reducing the delay-A Survey
-K.MUTHUMARI ; M.MOHAN KUMAR
The technology of sensor, medical body sensor and intelligent information processing is widely used in Body Sensor Networks (BSNs), which are a branch of wireless sensor networks (WSNs). BSNs are playing an increasingly important role in the fields of medical treatment, social welfare and sports are changing the way humans use computers. In this research, proposed an energy-efficient Medium Access Control (MAC) protocol based on IEEE802.16 is specifically designed for Wireless Body Area Network (WBAN) to cognitively work in high interference environment. Proposed system uses the cross-layer optimization algorithm called such as Joint Cross-Layer Width Arbitrary Filter Length Algorithm (JCL) it significantly reduces the hand-off delay, energy-level. Simulation results show that, depending on the interference level, it is able to outperform the efficient medium access control protocol and existing IPv6 over Low power Wireless personal area network (6LoWPAN) in terms of energy utilization, packet delay, and network throughput. Read More...
|
Wireless Body Area Network |
India |
486-490 |
109 |
An study of security issues & challenges in cloud computing
-Mili Patel ; Mili Patel; Rakesh Patel
"Cloud Computing" is a term, which involves virtualization, distributed computing, networking and web-services. It is a way of offering services to users by allowing them to tap into a massive pool of shared computing resources such as servers, storage and network. User can use services by simply plug into the cloud and pay only for what he uses. All these features made a cloud computing very advantageous and demanding. But the data privacy is a key security problem in cloud computing which comprises of data integrity, data confidentiality and user privacy specific concerns. Most of the persons do not prefer cloud to store their data as they are having a fear of losing the privacy of their confidential data. This paper introduces some cloud computing data security problem and its strategy to solve them which also satisfies the user regarding their data security. Read More...
|
Computer Science |
India |
491-496 |
110 |
A Review Paper on Secure authentication and data sharing in cloud storage using key aggregate cryptosystem
-Kavita Neharkar ; Mayuri Pathare; Sonal Khandagale
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data again authentication. We describe new public-key cryptosystems that produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts is possible. Cryptosystem or cryptographic system is any sort of methodology for encoding and accessing that information. In this technique the master key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, one can aggregate any set of secret keys and make them compact as a single key but encompassing the power of all the keys being aggregated. Read More...
|
computer Science enginnering |
India |
497-500 |
111 |
Mass Customization in Real Estate industry
-Mr. VARUNKUMAR JAGDISHBHAI PAREKH ; Dr. JAYESH A SHAH; Mr. HIREN A RATHOD; MR. KAUSHAL A. DESAI
The customization of products and services-characterized by a customer-integrated process for product design, manufacturing, marketing, and support services-now represents an important competitive strategy in business environments. This trend has given birth to a new concept in the operations management field, called mass customization, which refers to the ability to provide individually designed products and services to every customer through high process flexibility and integration. Once we understand the needs of the customers we will be able to synchronize their needs with standardization. The result of this is Mass Customization which will find a fit between the standard products and the customer's needs. In this research hypothesis was formulated that the builders will provide the amenities demanded by customer at no extra cost and the data was collected through mails and personal meetings by formulating questionnaire. The data collected was tested by Reliability test, Z-test and Annova test. Read More...
|
Civil Engineering |
India |
501-504 |
112 |
Numerical and Theoretical Analysis for Investigation of Shear strength of A Joint Established Using Adhesive for Automotive Application
-Mr. Prashant V. Dashwant ; Mr. Yuvraj R. Patil; Mr. Prashant R. Patil
It is becoming increasingly important to accurately predict the behavior of adhesive joints. Adhesive joints are widely used in industries e.g. automobiles, aircrafts, home appliances and so on. They are being used as a closure system in the packaging industry, through the use of adhesives as a system for construction of complex structures such as skyscrapers, airplanes, trains or buses etc. In adhesive bonding, the load is transmitted from one adherend to another adherend smoothly through the adhesive layer in the overlap region i.e. the adhesive serves as medium for load transmission. The research is presented with variants of different adhesive materials proposed for the shear strength investigation of adhesive joint to be used in the automotive industry. The problem is investigated using mathematical analysis as well as analytical methodology with Finite Element Analysis. For meshing of the geometry of the brake shoe assembly hyper mesh software is used. In FEA, the competent software ‘Abacus’ is used for determining the shear stress induced in two different materials of adhesive layer applied to the brake shoe. Different variants with different adhesive materials and geometry of base material are analyzed for concluding the research work. Read More...
|
Mechanical Engineering |
India |
505-507 |
113 |
A Review on Design of a Fixture for Rear Cover
-Satyapal Vaghela ; Abhishek Singh
In fixtures which are used for machining process, minimizing work piece deformation due to clamping and cutting forces is necessary due to which machining accuracy can be maintained. The different methodologies used for clamping operation in different application by various authors are discussed in this paper. Fixtures are required in different industries according to specific application. Rear Cover is important part in agriculture tractor. The fixture set up for Rear Cover is done manually, which leads to machining defects, poor quality, increase in rejection rate, more cycle time and more hectic to operator. So, there is need to develop system which can help in achieve quality, increase productivity, elimination of human error, reduction in cycle time. Read More...
|
Mechanical Engineering |
India |
508-514 |
114 |
Microstrip Planar Array Antenna with DGS
-Ankit Mittal ; Ritu Khullar
Antenna is the most important part of wireless communication. The recent growth in this industry makes the antenna more advanced and reliable. In various fields we need the use of highly characteristics antennas and these characteristics are based upon some parameters like bandwidth, gain, directivity etc. As compared to other antennas microstrip antenna can make possible to achieve the required characteristics for efficient communication because they are easily to fabricate and reduces the cost also. To make the microstrip antenna more advanced it use defected ground structure (DGS). The DGS structures are introduce to improve the performance of planar array antenna in terms of return loss, gain, directivity and voltage standing wave ratio. The goal of this paper is to understand the mathematical terms of antenna and feeding techniques so that it possible to know how to make the Microstrip antenna with DGS as more highly characterized antenna. Read More...
|
Electronics & Communiccation Engineering |
India |
515-519 |
115 |
Study of Compensation of Variable Delay in Communication Link Using Communication Disturbance Observer (CDOB) and Network Disturbance (ND)
-Gaurav Kishore ; Dr. N S Beniwal; Shubhanshu Mishra
With growing technology, number of control system elements is increasing. So, it is not possible to place entire control system at a same place. Therefore, separate control elements connected by a communication link are required, it introduces delay. This delay is either constant or random in nature depending on communication link. This delay destabilizes the overall system and can be compensated using smith predictor. But smith predictor is only applicable to constant delay communication links. In this paper, communication disturbance observer (CDOB) and network disturbance (ND) have been introduced to compensate variable delay in communication link. Read More...
|
Electronics & communication engineering |
India |
520-522 |
116 |
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
-Govinda.K ; Mythili.D; Geetha Priya.S
Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. The strives of environment is dynamic, customizable and reliable with the quality of services. Security issues in the cloud as it is anywhere else. Lots of people share different point of views in cloud computing. Some of the people believe that it is unsafe to use Cloud Computing .Clouds can be classified as public, private or hybrid. This paper handle security issue in cloud using blowfish algorithm. Read More...
|
Computer Science |
India |
523-525 |
117 |
Neural Network Based Voltage and Frequency Controller for standalone Wind Power System
-MAJUMDAR NIKITA V. ; Asst. Prof. VIKASH VERMA
This paper deals with an artificial neural network based control of the voltage and frequency (VF) of autonomous wind power generation using an isolated asynchronous generator (IAG). The proposed controller has bidirectional active and reactive power flow capability along with battery energy storage system by which it controls the system voltage and frequency with variation of consumer loads and speed of wind. The proposed system is modelled and simulated in MATLAB using Simulink .The proposed controller has additional capability of harmonic elimination and load balancing and hence power quality can be improved. Read More...
|
ELECTRICAL ENGINEERING |
India |
526-529 |
118 |
Secure and Improved lifespan Routing Protocol for Wireless Sensor Network
-V Vasanthi ; V Vinu Raja
Wireless Sensor Networks (WSNs) are pertinent in numerous arenas where WSNs may be used for sensing, ciphering, and communication elements that give a administrator the ability to instrument, observe, and retort to events and phenomena in a specific environment. For these requirements of WSNs necessitate high efficient routing protocols design ought to energy efficient as feasible to extend their lifetime, and secure data delivery without any time delay. But sensor devices are resource curbed, positioned in an open and unattended environment, different types of attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of these kinds of networks. An energy-balanced routing method based is designed with change of cluster head for each round of data transmission. This energy efficient algorithm is proposed with verification algorithm which ensures that the secure data transmission is achieved without releasing private sensor readings and without introducing significant overhead on the battery-limited sensors. Additionally different power levels are used to reduce immobile node breakdown in WSN. Read More...
|
Electronics and Communication Engineering |
India |
530-534 |
119 |
Analysis of hydrodynamic fixed pad bearing to reduce vibration by replacing flexural pad in place of fixed pad
-Mohinder Kumar Khare ; Kapil Lakhani
Rotating machineries are always subject to vibrations due to critical speeds, unbalance, and instability. Usually the least expensive modification of a machine to make is the bearing. A wide variety of bearings have been developed to combat some of the different types of vibration problems. This report consist the analysis of 360deg hydrodynamic bearing of Boiler Feed water Pump. The boiler feed water pump is very critical rotatory equipment of Thermal power plant the bearing of this pump must be able to withstand in vibration and other hydraulic forces while still maintaining a high degree of reliability. This report consist analysis and design of 360 hydrodynamic bearing also replacing fixed pad by flexural pad and analysis bearing vibration and compare vibration for the same condition with the help of FEM Method in ANSYS. Read More...
|
Mechanical Engineering |
India |
535-537 |
120 |
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
-SATYAJEETSINH A. RAIJADA ; AMIT DUDHATRA
Connecting rod is very important part of engine. It should be accurately machined with the acceptable tolerance. Also the fluctuations of dimensions in work-piece to work piece should be minimum so that it will be easier to assemble in engine. But it has been observed that the required dimensions for the bolt diameter and smaller end diameter for the connecting rod are not continuously achievable by using the existing fixture. The diameters required of the bolts and the smaller end of the said connecting rod are 10±0.05 mm and 24±0.01 mm respectively The aim of this project is to design and development of a new fixture for machining (Boring) operation using designing software's i.e. Pro E and analysis using ANSYS ,which can eliminate the said problems. And the production rate will also increase up to 15% which is quite objective. So for that, a new hydraulic fixture is designed and observed that dimensional accuracy, increased production rate up to 15% and more output per day with boring operation. Which defines process is satisfactory enough and validates the project. Read More...
|
MECHANICAL ENGINEERING |
India |
538-540 |
121 |
Parametric Analysis on different metals by Abrasive Water jet Machining
-Prof. D.V.Jani
Abrasive water jet machine (AWJM) is a non-conventional machining processes. This is process of removal of materials by impact erosion of high pressure (1500-4000 bars), high velocity of water and entrained high velocity of grit abrasives on a work piece. In recent years, researchers have explored a number of ways to improve the AWJM process performance by analyzing the different factors that affect the quality characteristics. The experimental and theoretical studies show that process performance can be improved considerably by proper selection of machining parameters. Different types of abrasives are used in abrasive water-jet machining like garnet, aluminum oxide, silica sand, silicon carbide etc. Ti-6Al-4V alloy was machined under varying traverse speeds abrasive water jet machining. In Abrasive Water jet cutting, orifice and focusing nozzle diameter undergo continuous change in their dimensions due to erosive nature of high velocity abrasive water jet. This particular phenomenon can affect the efficiency and quality of the process. The aim of work to study the influence of orifice and focusing nozzle diameter variation on the performance of abrasive water jets in cutting 6063-T6 aluminum alloy. The performance was assessed in terms of different parameters such as depth of cut, material removal rate, cutting efficiency. Experimental investigations were conducted to study the effect of using different chemicals on material removal rate (MRR), with varied standoff distances (SOD) and chemical concentration in abrasive water jet machining. The use of such chemicals on the taperness of drilled holes is also studied. Surface roughness (Ra) and kerf taper ratio characteristics of an abrasive water jet machined surfaces of glass/epoxy composite laminate were studied. Taguchi's design of experiments and analysis of variance were used to determine the effect of machining parameters on Ra and TR. Read More...
|
Mechanical Engineering |
India |
541-546 |
122 |
Defending Reactive Jammers in WSN using a Trigger Identification Service.
-Harshad Shelar ; Sainath Patil; Jilani Momin; Kiran Jaybhaye
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. Read More...
|
Computer Engineering |
India |
547-548 |
123 |
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Pattern Generator Implemented On FPGA
-KANDIMALLA PAVAN KUMAR ; S.SOMASHEKAR
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA. Read More...
|
LOW POWER VLSI |
India |
549-551 |
124 |
Study and Review on Various Current Comparators
-VINOD KUMAR ; Ms. HIMANI MITTAL; Mr. SUMIT KHANDELWAL
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption. Read More...
|
Electronics Engineering |
India |
552-554 |
125 |
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USING ETHANOL DIESEL BLEND AT DIFFERENT PRESSURE
-Piyush H. Patel ; Ankit Dandiwala
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel. Read More...
|
Mechanical Engineering |
India |
555-558 |
126 |
Making model of dual axis solar tracking with Maximum Power Point Tracking
-Mitul Ravat ; Mr M.D. Solanki
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both. Read More...
|
Electrical Engineering |
India |
559-562 |
127 |
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
-MAVANI SUNIL I ; Dr. G.R KULAKARNI
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability. Read More...
|
Electrical Engineering |
India |
563-566 |
128 |
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
-Richa Patel ; Akshay Kansara
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques. Read More...
|
Computer sciencs and Engineering |
India |
567-571 |
129 |
A Review: Microwave Energy for materials processing
-Akshay Pathania ; Dheeraj Gupta
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries. Read More...
|
Mechanical Engineering |
India |
572-578 |
130 |
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT ANALYSIS
-SAVAN THACKER ; ANTRIKSH BHATT
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design. Read More...
|
MECHANICAL ENGINEERING |
India |
579-582 |
131 |
Various techniques of data hiding in image
-Mr. Abbas F Tukiwala ; Mr. Sheshang D. Degadwala
Data Hiding in Image is an art to hide the very existence of embedded data in image so as not to arouse an eavesdropper's suspicion. For hiding secret data in digital images, large varieties of steganography techniques are available, some are more complex than others, and all of them have their respective pros and cons. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing data hiding techniques in digital image. It covers and integrates research work without going in to much detail. Read More...
|
Computer engineering |
India |
583-587 |
132 |
Finite Element Analysis and Optimization of Mixer Blade of Sand Preparation Machine
-Alok J Tandel
Finite element analysis has been widely used for analyzing the component and optimizing component size and shape. In this research paper we will analyses the mixer blade under static structural analysis by using ansys and will study the stress and deformation induced in the component. After, analysis of stress and deformation we will optimize the weight of the blade using different thickness of the plate and check the stress and deformation induced. Read More...
|
CAD/CAM |
India |
588-591 |
133 |
INTELLIGENT TRANSPORTATION SYSTEM ANALYSIS FOR SHADOW MAIMED TRAFFIC SURVEILLANCE VISIONARY
-G.Sumathi ; S.R.Sri Vidhya
Video surveillance is the hot research topic under Intelligent Transport System which is useful to trace a particular missing vehicle, to detect the cause of an accident and also to find out shortest path between major places. In such areas object detection and shadow elimination is the challenging task. Shadow elimination allows enhancing the picture quality and also helps in the process of object detection via edge detection. Object detection in the field of computer vision stands to be a crucial and critical task for object and scene recognition, employment of object recognition is vast in field of surveillance and artificial intelligence. This paper proposes an Inner-Outer Outline Profile (IOOPL) algorithm to detect the three levels of object boundaries to enhance the satellite imagery segmentation with the help of shadow elevations. This method can be adapted to an experimental model of traffic surveillance video monitoring. In Intelligent Transportation System (ITS) it is very important to recognize the type of a detected object in order to track reliably and estimate traffic parameters correctly .This work addresses the major difficulty faced in the vehicle image segmentation due to the misconception of assuming object shadows as part of object itself. The proposed methodology will be utilized for vehicle detection and segmentation by eliminating its shadow counterpart. Additionally, a method for log generation to retrieve vehicle’s travelling details, is also to be proposed as a future work by classifying the vehicles using the machine learning technique, Artificial Neural Network, which is to be trained by a high- performance machine learning algorithm called Delta Learning Algorithm. Read More...
|
Computer Science Engineering |
India |
592-595 |
134 |
Enhance Performance of Link State aware Geographic Opportunistic routing protocol for VANETs
-Krima Patel ; Vidhu Singhal
Vehicular Adhoc Networks (VANETs) are self-organized wireless networks, which are infrastructure less. VANET has a high dynamic environment so efficient data delivery in a network is a challenging issue. Opportunistic routing protocol improves the reliability of routing by using broadcast mechanism. Link State aware Geographic Opportunistic routing protocol (LSGO) [1] is a combination of link state information and geographic location of vehicles. The main purpose of LSGO is to improve the data transmission by select the nodes as forwarder and give them priority according to priority scheduling algorithm. When the node receive the same packets two or more time then the redundancy occur and also arise overhead problem. The aim of this paper is to enhance the performance of LSGO routing protocol by reducing the overhead problem. Read More...
|
Computer Engineering |
India |
596-599 |
135 |
A Survey On Various Methods In VANET Based On Security And Privacy-Preserving Navigation System
-GOWTHAM I ; PRABHU K; Dr.L.M.NITHYA
Vehicular ad hoc network (VANETs) is a promising and challenging approach to improve the traffic management and traffic safety with wireless vehicle-to-roadside and vehicle-to-vehicle communications. An efficient navigation scheme is employed based on the online road information gathered by VANETs to direct the drivers to corresponding destinations in a real-time and distributed manner. Major advantage of using real-time road situation is to estimate a better route and the information source that is appropriately authenticated simultaneously. In order to guard the privacy of the drivers, the destination and the driver who provides the query are assured to be unlinkable to any party. This idea can be attained by enhancing the anonymous credential. In this paper, various methods related to security and privacy related methods are surveyed for providing security for VANET. Each surveyed method briefly discusses the security and privacy related issues and solutions in VANET. At last, comparative measures of each method are presented which provides the significance and limitations for VANET Based Secure and Privacy-Preserving Navigation system. Read More...
|
Information Technology |
India |
600-603 |
136 |
A Survey on Big Data Storage in Cloud
-Praywin Ebenezer.S ; Thirunavukarasu.T
In today's computing and digital world, generation and accessing of data information has been rapidly increased in several organization. Millions of people are generating huge amount of data for their need of organizations which is often referred as big data. Big Data is considered as a promising for increasing segment of IT industry and business applications includes namely health care, banking etc. Since the extent and volume of big data is large, the fixed amount of storage is not suitable for storing such dynamic generation of data. Earlier versions of technology used major storage devices such as solid-state devices, optical devices, magnetic tapes and magnetic disks. However these storage devices don't supports for dynamic data generation from various organizations. Therefore, recent technology uses cloud based storage and storage networking therewith improved data storage and mining techniques are needed to be incorporated and advanced for preserving this increased volume of data. This paper surveys various storage techniques used for storing large volume of generated data. This survey comprehensively analyses and classifies the several attributes of big data which generally includes characteristics, nature, rapid growth and volume. At last possible research directions for big data systems in near future are outlined. Read More...
|
Information Technology |
India |
604-607 |
137 |
Flow analysis of two way Gravity Diverter Valve for discharge of granular material from one point to another in chute and free fall application
-Niravkumar Jashbhai Patel
Diverter valve is used to divert the flow of material with multi-diversion ports. This two-way gravity diverter valve diverts the free fall material with the help of flapping system. The work has been carried out for the CFD analysis of Gravity Diverter Valve using at the discharge of powder material, which is free fall from silo. How the flow is changed with the flap position, actuating with the pneumatic cylinder is examined. Read More...
|
CAD/CAM |
India |
608-610 |
138 |
evaluation of web personalization
-Ritu Beniwal ; vandana tanwar
Today the modern phase of the internet is the personalize phase where the user is able to view everything that matches his/her interest and needs. Nowadays, Web users are relying totally on the internet in relation to all the problems they have in their daily life. If someone want to find a job he/she will look on the internet , similarly if someone wants to buy some product/item the best preferred platform will be the internet so due to large numbers of users on the internet and also due to the large amount of data on the internet people starts preferring those platforms where they can find what they need in as minimum time as possible. The only way to make the web intelligent is through personalization. Web Personalization has been introduced more than a decade ago and many researchers have contributed to make this strategy as efficient as possible and also as convenient for the user as possible. Web personalization research has a combination of many other areas that are linked with it and includes AI, Machine Learning, Data Mining and natural language processing. This report describes the whole era of web personalization with a description of all the processes that have made this technique more popular and wide spread. This report has also thrown light on the importance of this strategy and also on the benefits and limitations of the methods of this strategy. Read More...
|
networking |
India |
611-614 |
139 |
A LITERATURE REVIEW ON FLAME BEHAVIOR AND EMISSION CHARACTERISTICS OF BIODIESEL BLENDED DIESEL FUELS
-Nilesh N. Patel ; Mital G. Patel; Digvijay B Kulshrestha
Fuel is an important parameter for the combustion and it depends on the behavior of flame. By using diesel and biodiesel blends as a fuel, study about the flame behavior and emission characteristics obtained. The results indicates that when use of the biodiesel as a fuel blend with the diesel fuel the ignition for biodiesel occurs earlier compare to diesel, the early phase of biodiesel combustion proceeds quicker compare to diesel. The flame lift off length (FLOL) for biodiesel is slightly longer compared to diesel. The sizes of particles generated from the combustion of biodiesel are smaller. Reduction in CO and HC emissions by use of biodiesel but there is increase in NOx emissions. There is less smoke produce by biodiesel blends. Read More...
|
Mechanical Engineering |
India |
615-619 |
140 |
AN IMPROVED RANDOM FOREST ALGORITHM FOR A CLASS IMBALANCE CLASSIFICATION FOR MEDICAL DIAGNOSTIC
-BHEDI RITABEN SHANKARBHAI
This paper proposes an improved random forest algorithm for classifying diabetic data. This algorithm is particularly designed for analyzing very high dimensional data with multiple classes whose well-known representative data. A novel feature early classification of classes for subspace sampling and tree selection method are developed and synergistically served for making random forest framework well suited to categorize diabetic data. With the new feature early classification of classes for subspace sampling and tree selection method, we can effectively reduce subspace size and improve classification performance without increasing error bound and parallel implementation of improved random forest algorithm. We apply the proposed method on diabetic data sets with 8 characteristics. The results have demonstrated that this improved random forests outperformed the original Random Forest methods in terms of classification performance. Read More...
|
DATAMINING |
India |
620-622 |
141 |
Design and Optimization of Pressure Swing Adsorption Separation Process of MNP-10 LN2 Plant
-SNEHAL PATEL ; BHAUTIK PABANI; J. M. PATEL
Nitrogen is produced mainly from its most abundant source, the air, using three processes: membrane, pressure swing adsorption (PSA) and cryogenic distillation. By considering the operating conditions, flow rate and purity of Nitrogen, the most economic technology for separation of Nitrogen from the air can be chosen. Of course for some values of purity and flow rate, more than one technology can be selected. In these ranges, other parameters such as economic value of by-products phase of delivered product fluid (liquid or gaseous) and the product applications should be taken into account. Onsite nitrogen generators, such as pressure swing adsorption (PSA) or membrane systems, can be more cost effective than traditional cryogenic distillation or stored liquid nitrogen, particularly if an extremely high purity (e.g., 99.9999%) is not required. The theory accurately portrays the overall design of the pressure swing adsorption (PSA) process of MNP-10 LN2 plant and prediction of breakthrough curve to find out the mass transfer zone (MTZ) length. Read More...
|
CRYOGENICS ENGINEERING |
India |
623-626 |
142 |
Analysis of Summer Heating Load for Conference-Hall of NIT Raipur
-Amit Dubey
This paper represents analytical approach of calculation of cooling load and air-conditioner required for the conference hall of National Institute of Technology (NIT) Raipur. The city Raipur (Latitude: 20.92ï‚°ï€ N, Longitude: 82.00ï‚°ï€ E) is the capital of state Chhattisgarh of India. The climatic condition of Raipur comes under composite zone of climate classification of India, where the summer is quite hot and temperature ranges 42ÌŠC-45ÌŠC in the month of May. The total heat load of conference hall and the required number of air conditioner of 1.5 ton capacity has been calculated by considering conduction heat gain, ventilation heat gain, solar heat gain and internal gain. For the taken dimensions and structural properties of the conference hall the cooling load of the hall is 42.5 kw and the required number of air conditioner is 8. Read More...
|
Mechanical Engineering |
India |
627-629 |
143 |
Multimodal Biometric System Fusion Using Fingerprint and Iris
-Fenil Thakkar ; Ms. Ompriya Kale
Single biometric systems have a too much of problems like noisy data, non-universality, spoof attacks and higher acceptance and rejection rate. These limitations can be solved by using multimodal biometric systems. Multimodal Biometric systems fuse two or more physical traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy. This paper surveys that multimodal biometric systems using fusion of fingerprint and iris recognition gives better FAR and FRR. Different Fusion level techniques are mentioned with their advantage and disadvantages. Read More...
|
Computer Engineering |
India |
630-632 |
144 |
A Novel Image Selection Based Captcha Scheme
-Tapan Chauhan ; Nisha Shah
Captcha is a popular real user detection or technical autobot / robot used on websites for Desktops rejection. Captcha is also being used in some mobile websites. Captcha difficult to read on your smartphone and laptop screens. Users trapped zoom in / zoom out to read and fill out the captcha and other required fields. User's old elderly are more difficult to see and enter the Captcha. Therefore, there is a strong need for imaging techniques based image code as easy to detect the actual users and to prevent tools autobot / robot, which are used to exploit the website databases. In this research have proposed a alternative / visual graph for captcha. In this research, we are proposing the development of a new technique captcha as facilitating the user to enter a code graphic image instead of captcha text based. Users will see a complete picture and a piece of the image (sub-image) the. User will have to tap the image area, which coincides with the piece (sub-image). In addition, the system will crop the image of that particular area of a particular size, which will then be sent to the server for authentication real user. Server side corresponds to the piece with the cropped image (which is a user input). If chunk corresponds to the cropped image, the user will be marked a real user, otherwise a new code similar image will be sent to the user for re-authentication. Read More...
|
Computer Engineering |
India |
633-636 |
145 |
enhancement of energy in data aggregation using homomorphic technique in wireless sensor network
-patel Deviyani N. ; parimal patel
In the wireless sensor network data aggregation is used for solve the energy constrain Problem of sensor node. The main aim of this paper is reduce the energy consumption and provide the Security from the malicious node in the WSN. In the proposed scheme we will use data aggregation and Homomorphic technique with paillier cryptosystem using this technique there is no need to encryption operation at the aggregator node so that privacy is provided and also energy consumption is decrease. Read More...
|
computer science and engineering |
India |
637-369 |
146 |
Energy Efficient Heterogenious Routing Protocol For Wireless Sensor Network
-Rani Devi ; Kamal Chhabra
The interconnection of nodes forming a network called wireless sensor network (WSN). The difference between the WSN and traditional wireless networks is that sensors are extremely sensitive to energy consumption. Energy saving is the crucial issue in designing the wireless sensor networks. The application domain of WSNs varies from environmental monitoring, to health care applications, military operation, transportation, security applications, weather forecasting, real time tracking, and fire detection and so on. By considering its application areas WSN can be argued as a traditional wired or wireless network. But in reality, these networks are comprised of battery operated tiny nodes with limitations in their computation capabilities, memory, bandwidth, and hardware resulting in resource constrained WSN. In this paper we work on a Heterogenious Routing technique to achieve energy efficiency. Read More...
|
Computer science & Engineering |
India |
640-643 |
147 |
AUTOMATIC SPECTRAL ANALYSIS FOR SPEECH TO TEXT CONVERSION WITH EMBEDDED EXECUTION
-P.Yasotha ; N.Rajasekaran; M.Nathiya
Speech signal important role in the Digital signal processing. In this paper speech sample observed with MFCC for the improvement of speech feature representation of the HMM based training approach. MFCC is used to extract the voice features from the voice sample and also HMM is used to the recognize the speaker based on the extracted features. I order to recognize the speaker first train the extracted feature by using HMM parameters and then compared to the original voice signal. If it is matched the voice signals to produce the text by using MATLAB Software. The Simulation results show an improvement of speech recognition with respect to computational time, learning precision for a speech recognition system. Here MATLAB output is interface to the Microcontroller by using UART and display through the LCD module. Read More...
|
Electronics Engineering |
India |
644-646 |
148 |
A Review Paper on Performance Enhancement of a Centrifugal Pump
-Jaydeepkumar g chaudhari ; A.S. Dandiwala; A.V. Doshi
The study of paper concerns with the research work done by the various researchers in the field of optimization and analysis of centrifugal pump performance using CFD tool. The use of CFD-tools to analyses the flow field in turbo machines and to predict performance parameters has gained enormous popularity in recent years. Pump is a turbo machines in which mechanical energy is transformed into the hydraulic energy. Various components of centrifugal pump must be designed carefully for the better performance of the centrifugal pump. Read More...
|
Mechanical Engineering |
India |
647-649 |
149 |
Power Quality Improvement of Grid Interconnected 3-phase 4-wire Distribution System
-M. UDAY KUMAR ; R.Srinivas Rao
This paper presents a grid interfacing inverter that compensates power quality problems and it can also interface renewable energy sources with the electric grid. The grid interfacing inverter can effectively be utilized to perform following functions: 1) transfer of active power harvested from the renewable resources; 2) load reactive power demand support; 3) current harmonic compensation at PCC; and 4) current unbalance and neutral current compensation in case of 3-phase 4-wire system. The ability of fuzzy logic to handle rough and unpredictable real world data made it suitable for a wide variety of applications, especially, when the models or processes are too complex to be analyzed by classical methods. In this paper fuzzy logic controller is used for controlling the DC capacitor voltage. Simulations using MATLAB / SIMULINK are carried out to verify the performance of the proposed controller. The results show that the proposed controller has fast dynamic response, high accuracy of tracking the DC-voltage reference, and strong robustness to load parameters variation. Read More...
|
Electrical Engineering |
India |
650-654 |
150 |
A Survey Paper on Mobile IP
-Minal Suthar ; Anjuman Ranavadiya; Shreya Patel
The mobile computing has been grown very fast in last few years. The need for devices like palmtops, handhelds and cellular phones is rapidly increasing. These devices have become necessity in today's lifestyle. Mobile IP is used to facilitate mobility of such devices without breaking connection from network. In this paper, Mobile IP approaches, Mobile IP terminology, need for Mobile IP, how Mobile IP works applications and several issues of Mobile IP are reviewed. Read More...
|
Computer Engineering |
India |
655-658 |