No. |
Title and Author |
Area |
Country |
Page |
201 |
How to tune your's engine
-Sanchit Saxena
This paper describes the use of some engine tuning products that will helps to increase the power and performance of your engine. In India there is no vast scope in modification, the Indian car maker company built a car, according to Indian standard and costumer demand. India is a country where 80% people want a car having features like high fuel efficiency, economy price range and most importantantly the car should suit for Indian roads. If automaker company wants to hit their car they need these specification, some famous cars that are perfectly made for Indian streets like Maruti Suzuki (800, waganR, Alto etc), Hyundai( Santro, i10 etc), these cars are best on Indian roads. But 20% people are luxury lover, they want high performance engine, tuning equipment's etc, with the help of these features, the cars can have higher power and BHP as compared to original manufactured car. Let's take a look on it, I will help in choosing the best performance upgrades so that your car is a ten-second car, not a ten-minute car. Particularly in this paper a discussion about the air filter, their usability and their working is focused. The discussion emphasis on paper air filter, foam filter, cotton air filter, and some high performance air filter kits like Round straight, cone filter, oval straight, oval tapered. Then a view about the nitrous system is given that help to increase the speed of your car, there are mainly 4 type of nitrous system: Dry type nitrous kits, Direct port nitrous kits, Diesel nitrous system.
In our country the nitrous system is banned, so the installation price of this system is very costly. Read More...
|
Automobile engineering |
India |
874-876 |
202 |
A Review on Web Mining
-Sushma Gupta ; Rakesh Patel; Chanda Patel
Nowadays, the Web has become one of the most widespread platforms for information change and retrieval. As it becomes easier to publish documents, as the number of users, and thus publishers, increases and as the number of documents grows, searching for information is turning into a cumbersome and time-consuming operation. The Web mining research relates to several research communities such as Database, Information Retrieval and Artificial Intelligence. Web mining - i.e. the application of data mining techniques to extract knowledge from Web content, structure, and usage is the collection of technologies to fulfill this potential. Web mining is the application of data mining techniques to extract knowledge from Web data, where at least one of structure (hyperlink) or usage (Web log) data is used in the mining process (with or without other types of Web data). Read More...
|
IT |
India |
877-880 |
203 |
A Review on Blue Brain "The future Artificial Brain"
-Vivek Yadav ; Rakesh Patel; Priya Bag
Human brain is the most valuable creation of God. Understanding the human brain is one of the greatest challenges facing 21st century science. The man is intelligent because of the brain. "Blue brain" is the name of the world's first virtual brain which means, a machine that can function as human brain. The Blue Brain Project is the first made comprehensive attempt to reverse-engineer the brain of mammalian, so that through detailed simulations the function of brain can be understood. IBM's Blue Gene supercomputer allows a quantum leap in the level of detail at which the brain can be modeled. The main aim is to upload human brain into machine. After the death of the body, the virtual brain will act as the man. In this paper, we present the complete research work on concepts of Blue Brain and its requirements. Read More...
|
IT |
India |
881-885 |
204 |
LOAD BALANCING IN CLOUD COMPUTING
-Priya Bag ; Rakesh Patel; Vivek yadav
Load balancing is one of the interesting and prominent research topics in cloud computing, which has gained a large attention recently. Load balancing is the process of distributing the load among various nodes of a distributed system to improve both resource utilization and job response time while also avoiding a situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work. Load balancers are used for assigning load to different virtual machines in such a way that none of the nodes gets loaded heavily or lightly. The load balancing needs to be done properly because failure in any one of the node can lead to unavailability of data. In this paper we have discussed many different load balancing techniques used to solve the issue in cloud computing environment. In this paper, an overall review of the current load balancing algorithms in the Cloud Computing environment is presented. Read More...
|
IT |
India |
886-891 |
205 |
Survey on Botnet
-Soni Darshana Madhusudan ; Jignesh Vaniya
Now days internet users are increased drastically, with those malicious activities through internet have also been increased. One of the most commonly occurring and serious attack is botnet. Botnet is group of compromised computers and they are controlled remotely by the botmaster. And further more hackers also have started using fluxing techniques to evade the detection. It is impossible to detect and stop them completely. Here in this paper we discuss botnet in detail with its characteristics and some of its attacks and detection techniques. Read More...
|
Computer Enginnering |
India |
894-897 |
206 |
STUDY AND IMPORTENCE OF 3D PASSWORD
-Chanda Patel ; Rakesh Patel; Sushma Gupta
Existing systems of authentication are plagued by many weaknesses. Commonly, textual passwords are used to secure data or user accounts. However these can be cracked by the application of various brute-force algorithms as the maximum password length is fixed and there are a finite number of possibilities which exist. The 3D password authentication scheme is based on a combination of multiple sets of factors. A 3D virtual environment is presented to the user where he navigates and interacts with a multitude of objects which are present. The order in which actions and interactions are performed with respect to the objects constitutes the user's 3D password. Read More...
|
IT |
India |
898-902 |
207 |
A Review on Congestion Control in A Wireless Network using Fuzzy Logic
-Abhishak Sawhney ; Payal Mahajan; Ritu Bhatia
In wireless networks, we have multifaceted characteristics to be considered and diverse resources are used for controlling the congestion. Nodes making use of Internet are wirelessly associated to each other to interconnect. An important subject rising in mobile networks is the selection of the ideal path between any two nodes. Fuzzy logic is a logical field studies evaluating the accuracy of the results based on the approximation of the components involved, make decisions based on many factors relative accuracy based on experimental or mathematical proof. In this review paper, some basic parameters are considered which are necessary for the congestion control in wireless networks. These are: Transmission energy, queue size, distance from receiver, transmission rate, cost assigned. On evaluating these parameters using fuzzy logic, a preferred output for congestion control can be determined. Read More...
|
COMMUNICATION ENGG |
India |
903-905 |
208 |
A Survey of Automated Biometric Authentication Techniques
-Keerti Arse
Biometric identification refers to the automatic identification of a person by analyzing their physiological or behavioral characteristics. Since many physiological and behavioral characteristics are unique to an individual, biometrics provides a more dependable system of authentication than ID cards, keys, passwords, or other standard systems. A wide range of organizations are using automated person authentication systems to improve customer fulfillment, operating efficiency as well as to secure difficult resources. Now a day an increasing number of countries including India have decided to adopt biometric systems for national security and identity evil prevention, which makes biometrics an important component in security-related applications such as logical and physical access control, forensic investigation, IT sector, identity crooked protection, and terrorist prevention. Various biometric authentication techniques are available for identifying an individual by measuring fingerprint, hand, face, signature, voice or a combination of these traits. New biometric algorithms and technologies are proposed and implemented every year. This paper aims to give a brief overview of the field of biometrics and summarize various biometric identification techniques including its strengths and week. Read More...
|
Computer Science Engineering |
India |
906-908 |