No. |
Title and Author |
Area |
Country |
Page |
351 |
Simulation of Boost Converter Topology for PV system with Perturb and Observe MPPT Algorithm
-Patel Umang Shantilal ; A.D.Joshi
In this paper utilization of boost converter for control of photovoltaic (PV) power using maximum power point tracking control technique is presented. First photovoltaic (PV) module is analyzed using MATLAB software. The mail aim the boost converter is to be used along with a maximum power point (MPPT) mechanism. The MPPT is responsible for extracting maximum possible power from the photovoltaic (PV) and feed it to the load via the boost converter which steps up the voltage to required magnitude. The main aim will be track maximum power point of the photovoltaic (PV) module so that the maximum possible power can be extracted from the photovoltaic. The algorithms and boost converter are modeled using MATLAB software. Read More...
|
Electrical Engineering |
India |
1339-1342 |
352 |
A Review on Selective Laser Sintering Process on CL50WS Material
-Chetankumar Manubhai Patel ; Mr.Sandip B. Patel; Mr. Mit K. Shah
This paper describes a variety of fundamental research of Selective Laser Sintering Process on CL50WS (Hot Work Steel) Material which the authors have recently performed. Rapid Prototyping (RP) can be defined as a group of techniques which is used to quickly fabricate a scale model of a part or assembly using three-dimensional computer aided design (CAD) data. The Selective Laser Sintering (SLS) is a one of the rapid prototyping (RP) technology by which physical objects are created directly from CAD model using layer by layer deposition of extruded from material. The quality of SLS produced parts is significantly affected by various parameters used in the process. SLS produces higher strength and surface finish metal parts. In this present work two important process parameters of the SLS process such as layer thickness, Orientation. Influence of each parameter on responses such as change in Tensile Strength and Surface roughness of the build part are essentially studied. The effect of process parameters on responses are studied by Taguchi Method. Then optimization of process parameters is made by ANOVA analysis. Read More...
|
Mechanical Engineering (Production) |
India |
1343-1346 |
353 |
A Survey on Malicious Code Detection for Android using Instruction Signatures
-Bhavesh Vallabhbhai Patadiya ; Prof. Ashil Patel
as android operating system growing rapidly and one of the most popular platform, because of its vulnerable security system architecture, Android has been the most targeted platform for malware attacks. In this paper, we have explored various malware detection techniques. After understanding various research paper described below; we found that with using instruction based scheme for malware detection we can efficiently detect malicious apps. However, Existing system can be enhanced by providing additional permission based filtering scheme. The findings of the review have been well documented in this paper. Read More...
|
Computer Science and Engineering |
India |
1347-1351 |
354 |
Fingerprint Recognition Based on Fractal Dimension
-Nisha Chandrakar ; Swati Agrawal; Amit Kumar Biswas
The fingerprint recognition is widely used for solving the crimes and considered as a legitimate proof of evidence in control law all over the world. It is also used for personnel identification for a long time. In the recent years, more civilian and commercial applications are use fingerprint based identification system because of its availability in inexpensive and compact solid state scanners and also its superior and proving matching performance in many biometric technologies. Matching is one of the most popular biometric technique; minutia matching based methods are widely used for fingerprint recognition and can be classified ridge ending and ridge bifurcation. Fingerprint matching is used to identify fingerprints by analyzing finger complexity based on estimating their feature. This paper proposed a method to recognize the fingerprint images by using fractal dimension. Fractal dimension is used to measure the image complexity and irregularity of the images to match the self-similarity by image segmentation and shape recognition. Read More...
|
ELECTRONICS ENGINEERING |
India |
1352-1355 |
355 |
Effect of Least Concentration of Hydrogen Peroxide (H2o2) Against Airborne Fungi
-M. Anitha ; J. Hemapriya; S. R. Swathy; G. B. Pavithra
Airborne indoor fungi were assessed during the winter season using open plate technique, SDA were used for isolation of fungi. The air samples were collected during December -February from different locations in the hospital. Air samples were taken in three months period during pre and post cleaning of the hospital wards. In all of the tested places a significant increase of mould spores was observed in pre cleaning but in post cleaning with 0.3% Hydrogen peroxide, there was no fungal growth and majority of the plates were sterile. Six genera of fungi, mainly members of the genus Aspergillus spp, Mucor spp, Rhizopus spp, Fusarium spp, Penicillium spp and Candida spp were isolated. Aspergillus spp showed highest growth numbers. This study could make a contribution not only using the least concentration of disinfectant in the hospital personnel but also in detection of preventive measure to be taken against hospital infections. Read More...
|
ENVIRONMENTAL STUDIES |
India |
1356-1359 |
356 |
Domestic Wastewater Treatment by Using Rotary Biofilm Reactor
-Mangesh L. Gulhane ; Gauri P. Torane
the effect of uncertainty in the system parameters on the reliability of domestic waste biofilm reactor analyzed. It is used to demonstrate the ability to handle biological wastewater rotary biofilm reactor. It is a beneficial microorganism plays an important role in wastewater treatment. Experimental model was developed representing the binding growth system. Rotary biofilm reactor is a technique that uses the adhesion and growth arrest system using the advantages of both systems. Suspended growth systems outside the unit show the inner unit attached growth system are shown. This was operated at different rotational speeds to optimize performance. Optimal performance showed the efficiency of the water to the 73%, 78% and 91% of the TS of the BOD of COD. Read More...
|
Civil Engineering (Environmental Engineering) |
India |
1360-1362 |
357 |
An Overview on Classification Algorithms in Data Mining
-V.Rengaraj ; D.Elavarasi
Data classification is the method of organizing data into categories for its most valuable and efficient use. A well planned data classification system makes vital data easy to find and retrieve. It is used for classifying data into different classes according to some constrains. A Major classification technique includes decision trees and neural networks. This paper aimed to do the analysis of several data mining classification techniques and inclusive survey of different classification algorithms and their features and limitations. Read More...
|
Computer Science |
India |
1363-1366 |
358 |
A New Inference Method For Camera's Ego-Motion And People's Paths Surrounded By A Single Logical Framework Using Hog Descriptor
-S. Jacinth Beulah ; N. Umamaheswari; P. Jenifer; J. Doulas
In the recent world, person tracking is very important for many applications such as surveillance, identification of personals etc. To improve the odds of finding people, this system combines multiple different detection and tracking methods. Combine the advantages of both detection and tracking in a single framework. This tracking framework applies to the task of tracking numerous people from a affecting camera. In person detection, the cascade object detector uses the Viola-Jones algorithm to detect people's faces, noses, eyes, mouth, or upper body and so on. After these detection steps are over, then it will track multiple people using a adaptive tracking algorithm based on different detectors. Here HOG algorithm is used to increase the detection rate and also improves the efficiency of tracking by increasing the detection rate. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
1367-1372 |
359 |
Parametric Optimization of NOx emissions Using Taguchi Method for C.I Engine fuel with Plastic Pyrolysis Oil
-Patel Chintankumar Mahendrabhai ; Prof. Pragna R. Patel; Prof. Tushar M. Patel; Prof. Gaurav P. Rathod
Fossil fuel shortage and severe environmental problems have attracted great attention on the exploitation of clean renewable energies. Researchers are continuously finding best alternative solution, which gives the best performance and fuel characteristics. The objective of the study is to optimize the parameters such as plastic pyrolysis oil diesel blend %, injection pressure and applied load of the single cylinder diesel engine through the Taguchi method. This paper investigated the emission characteristics of various blends of plastic pyrolysis oil with diesel on a Single cylinder four stroke diesel engine, and the other effect of parameters injection pressure and load are taken as variable for optimization. Plastic pyrolysis oil can be blended and used in many different concentrations, including P0D100 (pure biodiesel), P10D90 (10% plastic pyrolysis oil, 90% diesel), P20D80 (20% plastic pyrolysis oil, 80% diesel) and P30D70 (30% plastic pyrolysis oil, 70% petroleum diesel). As the experiment required simultaneously optimization of three parameter with four levels, taguchi method of optimization is used in this experiment. The results of taguchi experiment identifies that that Injection pressure 200 bar, blend P30D70 and engine load 1 kg are optimum parameter setting for lowest NOx emission. Engine performance is mostly influenced by engine load and is least influenced by injection pressure. Read More...
|
Mechanical Engineering |
India |
1373-1376 |
360 |
Design Review on Self Cleaning Basket Strainer (Formula Based)
-Siddharth Gavali ; Prof. Sandip Shinde; Deepak Gothwal; Abhijit Dhumal; Anand Gang
The demand of continuous uninterrupted flow from the pipelines with debris removal is done efficiently by self-cleaning basket strainer. Clean water or other fluid is basic requirement of an individual. Now a days in thermal power plants, for condensing of steam sewage water is be supplied. This makes us think of designing self-cleaning basket strainer. Read More...
|
Mechanical Engineering |
India |
1377-1380 |
361 |
A Study on Hadoop HDFS and Mapreduce
-M.Sona ; C.Vinola; M.Asia Sahaya Christina; N.L.Anto Arokia Mary
Big data analysis is emerging as computational archetype. We are in the era of Big Data which is defined as a distinct collection of complicated and huge sets of data. The Data originates from Social Medias, Sensors, Digital Cameras, GPS signals and more that leads to compose big data. Big data is difficult to gather, progress, store, explore and analyze using conventional methods; it requires massively parallel software running on multiple numbers of servers. One of the tools to exploit Big Data is Hadoop which is a non-relational data store to handle variety of data. Hadoop Distributed File System and MapReduce are the main components of Hadoop. Read More...
|
Computer Science and Engineering |
India |
1381-1383 |
362 |
Review on Real Time Video Streaming Using Wi-Fi on Android Phone
-Archana Patel ; Archana Patel
Wireless technology is very much popular, number of users of wireless network it is continuously growing. Wireless communication system has many advantages, not only the mobility of the devices within the environment. But wireless video display on mobile platform like android is facing difficulties as collecting data from a wireless camera as well as transmitting it to server to store the video. Transmission of the data to server is necessary because of the limited memory space on smart phone. Video data of wireless camera have a huge size in few minutes of recording. Read More...
|
electronic and communication |
India |
1384-1387 |
363 |
Review on Design and Analysis of Portable Rolling and Bending Machine
-Pooja Kailas Borkar ; Pankaj Meshram
In this paper we are discussing about the difference in roll pressure distribution was assumed linear. Using this model rolling parameters such rolling force, torque and the developed curvature were easily calculated. Bending moment can be applied in suitable direction. In addition, employing a bending moment at entry of the roll gap in a symmetrical rolling process causes pressure difference on the rolls and warping at the outlet, as happens in an asymmetrical rolling process. In Portable bending machine is device which gives the less efforts of man and gives the required work properly of the construction and other metal fabricated areas. The base of this machine is mounted on the large C-clamp; This C-clamp is attaches to workbench surfaces up to 2" thick; a rubber base pad protects the mounting surface. The orientation of the jaws is adjusted by a single clamping bar mechanism to provide quick repositioning of the work. Instrument makers will find many uses for this versatile vice. This machine work smoothly and gives proper dimension of the required jobs. A beam deforms and stresses develop inside it when a transverse load is applied on it. In the quasistatic case, the amount of bending deflection and the stresses that develop are assumed not to change over time. Its one end having metal bending device & another end having Bench vice which is rotating about its Axis and hold work piece at any angle? The base plate is rotating of an angle 360 about its central Axis. This machine is used for heavy duty metals which are used in construction areas and multiple operations are performing on it. It is light in weight and portable attach to any work table in Industries, Workshop and Construction areas. Read More...
|
MECHANICAL ENGINEERING |
India |
1388-1391 |
364 |
Automatic Patient Care System Using ARM Processor
-K.Abirami ; S.Abinaya; B.Sinduja; V.G.Vedhapriya; Dr.N.Suthanthira Vanitha
In advanced world the innovative medical advancements plays vital role to provide the solution for many biological problems. In most of the hospitals the patient monitoring system is done in manual process. Generally, it required the time consuming process to maintain the database. In case of anesthesia, measurement of bio-medical parameters such as heart rate, glucose level, and body temperature is very important to monitor at normal and abnormal cases. Either doctor or nurse must always be there to monitor present condition of the patient. Conventional method patient care systems are not reliable. On the other hand most of the automated systems are only concentrating on monitoring systems. The proposed system provides a solution by developing a real time module to monitor and maintain the patient database effectively. This system provides the individual login for doctor and nurse. Bio sensors send patient status to UTLP kit through wireless network to monitor continuously. This is achieved by means of Unified Technology Learning Platform (UTLP) which is connected with Wide Area Network (WAN). Thus the patient care system can be made automatic and patient condition can be monitored from anywhere in the hospital. Buzzer indication will be given during abnormal condition. This will reduce time consumption, manual work, risk factor, and other inconveniences exist in the conventional systems. Read More...
|
Bio-Medical Engineering |
India |
1392-1396 |
365 |
A Comparison of Back Propagation and Improved Linear Sinusoidal Tracer Algorithms for DSTATCOM
-M. Usharani ; A. Divya; M. Ilayaraja
Distribution Static Compensator (DSTATCOM) is implemented for the compensation of reactive power and unbalance caused by the various loads in distribution system. Back Propagation and ILST are the two types of control algorithm used for the extraction of reference source current. The neural network and fuzzy logic are used to design the alternative control schemes for switching the shunt active power filter. These schemes are simulated under MATLAB environment using SIMULINK. Simulation and experimental results demonstrate the performance of these control algorithms of DSTATCOM. Read More...
|
Electrical Engineering |
India |
1397-1400 |
366 |
Electronic Ticketing System for Public Transport Using NFC Technology
-Prof. Rashmi Chawla ; Pravin Dorugade; Dilip Donthula; Sanjay Dangar; Sachin Chaudhari
In this project the main aim is to introduce a new ticketing system for the BUS system. This system will make use of the Near Field Communication technology along with the mobile phone (Android and GPRS Enabled) to carry out the ticketing transactions. The NFC Ticketing application combines latest-generation technologies such as Near Filed Communication (NFC). The Near Filed Communication (NFC) is used in such service which integrates mobile tickets and mobile payments. By using this technology, travel card readers cannot distinguish the mobile phone from travel card. Mobile phone works as a travel card even when battery is depleted. Read More...
|
Information Technology |
India |
1401-1402 |
367 |
An Overview of Software Tools in Data Mining Systems
-R. Dharmarajan ; T.Buvitha
Data mining is a rapidly growing field, whose development is driven by strong research interests as well as urgent practical, social, and economical needs. The growth and relevance of data mining algorithms involves the use of powerful software tools. As the number of available tools prolongs to grow, the option of the most suitable tool becomes increasingly difficult. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. This paper attempts to give overview of data mining tools and its congregation. Read More...
|
Computer Science |
India |
1403-1405 |
368 |
OFDM Transceiver Implementation on FPGA
-Birangal Umesh Magandas ; Askhedkar A.R.
This paper describes the review work on Orthogonal Frequency Division Multiplexing (OFDM) Transceiver Design and Implementation on FPGA hardware. Orthogonal Frequency Division Multiplexing (OFDM) is a spectrally more effective multi-carrier modulation technique which divides the allotted spectrum into many sub-carriers which are orthogonal to one another and due to which the interference is reduced to the more extent. Implementation on FPGA adds the more flexibility to the system. The no of advancements in OFDM have been proposed in the recent years to reduce the complexity and power consumption of the transceiver and to increase the total throughput while maintaining the performance [6]. Read More...
|
electronics and telecommunication |
India |
1406-1408 |
369 |
Bayes and Tree Classifiers for File Classification
-Dr. S.Vijayarani ; J,Ilamathi
This research work primarily focuses on classifying the files which are stored in the computer system based on their extension (.pdf, .jpg, .docx, .txt, and .png). The aim of this work is to analyze the performance of two different classification algorithms. Two types of classification algorithms used and tested in this work are Naïve Bayes Updatable for Bayes modeling and REP tree (Reduced Error Pruning Tree) classification algorithm for Tree modeling. From the experimental results, it is observed that the REP tree classifier performance is better than the Naïve Bayes Updatable classifier. The performance factors used are classification accuracy and error rate. This work is carried out in WEKA data mining tool. Read More...
|
Computer Science |
India |
1409-1412 |
370 |
Approach For Data Mining Based Network Intrusion Prevention And Detection
-Aquib Shaikh ; Talha Ansari; Zaki Ansari; Farida Attar
In Today’s world of internet, there is a great need of some security measure to protect yourself from unwanted viruses or threats. There are a number of security systems available in the market such as anti-virus and firewall. These security systems provide protection from different viruses and harmful file extensions. In this paper, we propose a method to prevent and detect intrusions in network by monitoring the incoming packets. We will use data mining technique to make our system more predictable. This will include a File set that will store all the information regarding the packets such as the header information, its IP address. Once the packet arrives in the buffer it will be filtered by its port and protocol. Once this is done the attack handling and detection will be performed. We also include the local system security. Read More...
|
Information Technology Engineering |
India |
1413-1415 |
371 |
System Design using a Mashup Approach
-Nachiket S Palsodkar ; Aahi R Awasthee; Pranav S Tiwari; Shweta Barshe
Now a days System's has the potential for achieving success and growth for organizations in the nowadays environment of extensive competition and rapid technological development. The main objective of this System is to build and maintain customer relationships by encompassing the sales, marketing, and customer service activities. Nowadays it is no longer considered a business trend, but an industry standard that is required to secure and maintain competitive advantage. In this Project the Analytical processes will be used for the analysis which comprises of the data about an Enterprises Customers and is presented in a better and quicker way so that the dealing can be made faster and quicker. It can be considered as a form of Online Analytical Processing and also uses data mining. The System can also fetch the Front-End and Back-end according to the Requirments. Read More...
|
Computer Engineering |
India |
1416-1417 |
372 |
Crank and Lever Reciprocating Mechanism
-Abhijeet Sandesh Tare ; Avadhut L. Patil; Hardik B. Shah; KAMRAN SHAIKH; Prof. Ravi Verma
This paper deals with the analysis of crank and slotted mechanism that converts rotary motion into reciprocating motion at different rate for its working stroke and return stroke. A CAD model of synthesized link lengths has been prepared to simulate the mechanism and to specify the accurate path of the mechanism which would provide the actual position of the slider against the crank rotation. Software package will be helpful for manufacturing industries to get accurate performance in minimum manufacturing cost. Software also provides the optimized scheme of tolerance for desired permissible variation in output. In this mechanism we are using spraying pump as an application. With help of spraying pump we can wash any car. It reduces human effort. As we know spraying pump can be used in various industries. We can also use it for spraying water to the flower. The mechanism is fully made of mild steel. The quick return mechanism is broadly used in manufacturing industries, like slotted link shaper machine, such type of machine sustain varying load during the manufacturing the job. We have studied static and dynamic force behaviour of the entire mechanism of particular machine. Our project is concerning to the study of kinematic motion with the help of the Whitworth quick return mechanism. The objective of the project is to investigate the performance of a Crank and lever reciprocating mechanism and to verify that the motion does have a quick return stroke and a slow forward stoke with additionally attaching spraying pump. Additionally the increase in efficiency of the system mechanism is also determined. Read More...
|
Mechanical Engineering |
India |
1418-1419 |
373 |
Online Shopping With Real Time GPS Tracking
-Shaikh Abdul Hafeez ; Jain Rakesh; Shri Nidhi Gindi
As the popularity and increases trend of online shopping the fast delivery methods and security is concern. We proposed GPS based technique which track the actual location of the product on Google maps (i.e. on server side).The system include drone for on-time delivery purpose and GPS/GPRS module to location acquisition and transmission. We have to transfer actual location of the product to server in real-time. We have to show actual positioning of the product while it transferring from product warehouse for security purpose. When online shopping is started fraud and security is concern so that we have to provide Location Based Service method for tracking the actual position of product. Read More...
|
Information Technology |
India |
1420-1422 |
374 |
Software Effort Estimation Techniques in the IT Sectors-A Review
-M.Senthil kumar ; Dr.B.Chidambara rajan
Software Effort Estimation is an important area of research in software engineering. Various effort estimation models (COCOMO, SLIM, SEER, etc.) have been developed in the past which follows mathematical model for estimation. Out of all these techniques, mathematical model is widely used under which three common techniques are used. These three techniques include use case method, function point method and a derivative of function point method called cosmic function point. Each method has its own implementation methodology, which will be explores all these methods and demonstrates the pros and cons of these methods in the real time software effort estimation. Finally a comparison between all these methods is made .The values of this work is in helping better understand how software engineers make decisions between the models, when they start estimation. This work also enables project managers to elicit software project features based on the models to the client in crystal clear manner. Read More...
|
Computer Science &Engineering |
India |
1423-1427 |
375 |
A Survey on Sequential Data Mining: Exploring the Redundant Patterns from Sequences to Minimize the Overall Patterns.
-Tamboli Suraj. ; Prof. Prabhudev Irabashetti
Especially in genomics and proteomics discovering patterns from sequence data has plays an most important role in many aspects of science and society. Multiple strings as input sequence data and substrings as patterns. In the real world, their will be a large set of patterns would discovered many of them are repeated, thus degrading the output quality. For sequential data mining different method and techniques are implemented. These papers make study on different types of sequential data mining techniques (CISP mining technique). Sequence synthesis and recognition of patterns for multiple sequences was proposed by various algorithm such as A-close algorithm, Associaation Rules, MineTCFI, CFI2TCFI Algorithms, Biomolucer sequence i.e DNA and RNA sequence, GSP and Apriori All algorithm, Prefix span algorithm. To efficiently discover these patterns in very large sequence data, two efficient algorithms have been developed through innovative use of suffix tree. Discovery of delta closed patterns (DDCP) and Discovery of non-induced patterns (DNIP) are better as compare to existing algorithm and methods for sequential data mining of data patterns. Read More...
|
Computer Engg |
India |
1428-1432 |
376 |
Optimization of Hardening Process in Furnace through Taguchi Method
-ASHWIN TIDKE ; ASHWIN TIDKE; DHIRAJ JAISWAL; ANUP JUNANKAR; DHRUV DESAI
Heat treatment is the process of control heating and cooling of material to achieve certain mechanical property such as hardness strength, and reduction of residual stresses. Many heat treating processes require the precise control temperature over the heating cycle the research methodology based on the experimental work and the theoretical development of heat treatment furnace the new model take into account the real time furnace parameters determined from the experimental data account for the furnace detoriation and some of complex gradient and heating pattern that exist the furnace that is difficult model. Investigation carried out to study increasing hardness mechanical property of mild steel. Sample examined after heating at a certain respective temperature and soaked for respective time and respective behavior on sampled investigated. Using Rockwell hardness method of hardness testing. Results show that hardness of cast iron improved by heat treatment for particular application & optimization of hardness using taguchi method done in this article. Read More...
|
MECHANICAL ENGINEERING |
India |
1433-1435 |
377 |
Simulation of CDMA Technology
-Rucha Dubbewar ; Gaurav Kambli; Rakesh Vodnala; Roshan Kelaskar
This paper studies CDMA simulation technology. CDMA spread spectrum signaling techniques have gained increasing importance over the past few years. Long used in military systems such as GPS, they are finding increased usage in the cellular communication market. CDMA uses revolutionary techniques to provide a superior cellular service to its subscribers making it the choice data transmission technique to dominate the data transmission market in the near future. Read More...
|
information technology |
India |
1436-1439 |
378 |
Recovery of Kinetic Energy in Small Vehicles : A Review
-Patil Sushilkumar Bapaso ; Takale Mahesh Kishor; Patil Pavan Devgonda
In order to increase efficiency of small vehicles like bicycles, mopeds kinetic energy recovery is essential. By using kinetic energy recovery devices like flywheels one can recover this kinetic energy. As in conventional designs of such a small vehicles there is no provision of flywheel or any other kinetic energy recovery system, large part of this kinetic energy is remained unrecovered. Hence there is a possibility to increase efficiency of these vehicles by using flywheels. The aim of this paper is to provide a review on literature present, on application of kinetic energy recovery in small vehicles and possibilities of its implementation. Read More...
|
Mechanical Engineering |
India |
1440-1441 |
379 |
Performance Comparison of Link Layer Protocol Using IEEE 802.11 in Network Simulator-2
-Anurag Pendharkar ; Saurabh Prabhu; S.V.Prashant; Siddhant Sapte
the project entitled “Performance comparison of link layer protocol in IEEE 802.11†is a performance enhancement mechanism. The main objective of this mechanism is to improve the overall efficiency and data packet delivery in wireless LANs. IEEE 802.11 Wireless Local Area Network Medium Access Control layer provides a fair access protocol to the shared wireless medium based on Carrier Sense Multiple Access with Collision Avoidance. It is a contention based mechanism to access the medium. IEEE 802.11 physical layers support multiple transmission rates. The transmission rate should be chosen in an adaptive manner since the wireless channel condition. If the stations refer to access point with a low data rate, data packets may be delivered slower than high data rate stations. This will reduce the usage of bandwidth and system performance in the wireless environment. A mechanism was proposed to assign the back off time slot dynamically. We have evaluated the mechanism by using network simulator version2. Read More...
|
ELECTRONICS AND TELECOMMUNICATION ENGINEERING |
India |
1442-1444 |
380 |
Study of Testing of Security Model for an Object Oriented Design (SMOOD)
-Sonali Kadam ; Shashank Joshi
Software security involves internal weakness and external attacks. The external threat often breaks a software system by exploiting its internal weakness or vulnerabilities. As a result, they can affect the violation and breakdown of security. Security architecture must be designed to cater the needs of product security goals and sensitive information. To keep the sensitive information confidential, special attention need be given at designing phase. An object oriented approach naturally lends itself to an early assessment and evaluation. To check the security of design author has proposed SMOOD model which is based on the relationship between design properties such as encapsulation, inheritance, complexity, abstraction, cohesion, coupling and polymorphism with security attributes like confidentiality, integrity, and availability (CIA). In this paper, the proposed model is validating using empirical validation reported by Fenton. We have used five open source projects with multiple versions to test the SMOOD model and discussed the results. Read More...
|
Computer Engineering |
India |
1445-1447 |
381 |
Home Appliances Control Using Speech
-Waikar Sadaf Aarif ; Ms.Sabale Sonali Ajinath; Ms.Kinikar Parvin I
This paper present the overall design of "Home Appliances Control Using Speech" with low cost.This system is designed to assist and provide support in order to fulfill the need of elderly and disabled persons. It was design to solve a appliances control problem in home, company, auditorium, halls etc. The actual process home appliances control using speech use to control all electrical and electronic appliances.“Speech recognition “is technology in which human speech is recognized by machine such as computer, using speech recognition one can operate a computer.For this project, the system is called speech operated system for home appliances.It is used to read the speech of user from a microphone which is connected to the computer wired or wireless, analyze the speech characteristics and then transduced it into machine understandable format. In our project electrical and electronic appliances will automatically ON and OFF through speech and keypad. In our project we use visual basic software for speech recognition .It consist of a words ‘one’ or ‘two’, the project according to this will sense the commands and control respective appliance .Also keypad is use for as an optional. The “Home Appliances Control Using Speech†concept in the system improves the standard living at home. The system intended to control electrical appliance and devices in house with relatively low cost design, user-friendly interface and ease of installation. Read More...
|
ELECTRONICS AND TELECOMMUNICATION |
India |
1448-1451 |
382 |
Design and Fabrication of Organic Fertilizer and Pesticidses Sprayers
-Kamlesh Kishor Rangari ; Swapnil B. Bandane; Pravin Jaybhaye; Dr. S.K. Choudhary; Ass. Prof. R.D. Dethe
Day by day population of I India is increasing and in order to meet the food requirement of growing population mechanization of harvesting process is important rather than the extensive use of harmful chemicals for better yields because intake of these chemicals for longer duration may cause mutation of DNA and That may cause to cancer and many disease . So the use of organic fertilizer and pesticides with ;the mechanization process may helpful in better yields of crops , small scale farmers are aiming for lest investment in form of back pack type sprayers but it may cause mainly back pain and regular operation of hand lever which cause fatigue so to avoid all these demerit . I have propose sprayer of fertilizer and pesticides which can simply be pulled by hand or with the help of bullock . This paper suggests a model of manually operated multi nozzle pesticides sprayer. This will perform spraying at maximum rate in minimum time and optimum utilization of organic pesticides and evenly distributing it. In another tank there is tank of organic fertilizer and two knob arrangement for flow of liquid fertilizer which flows with the gravity force . Constant flow, valve can be applied at nozzle to have control of flow for fertilizer. Read More...
|
Mechanical Engineering |
India |
1452-1454 |
383 |
JAVA CLONE FINDER: COST EFFICIENT SYNTAX TREE BASED CODE CLONE DETECTION IN JAVA.
-SHAIKH FAROOQUE AHMED ; Shaikh Farooque Ahmed; Sawatantra Chauhan; Prashant Upadhyay; Mohammed Ahmed
Software development life cycle does not end with the development of software. The maintenance of software follows the development of software. Usually a large amount of money is spent on the maintenance purpose which needs to be reduced. A software system might contain a lot of duplicate fragments of code which might mean duplicate bugs. Also, duplicate code fragments might make software design sloppy. Thus there is a need to reduce or eliminate the code clones for reducing the maintenance cost. This paper proposes JAVA CLONE FINDER, which is a software capable of detecting code clones in the source code .It works by creating abstract syntax tree of the source code. It does this by fetching the syntax tree from eclipse compiler and then it displays the common syntax tree via some appropriate GUI. JAVA CLONE FINDER is a easy to use and a cost efficient solution for software maintenance activities. Read More...
|
COMPUTER ENGINEERING |
India |
1455-1457 |
384 |
A Review on Laser Marking Process for Different Materials
-Milin Pandya ; N.A.Modi; P.S.Chaudhari
this paper describes a variety of fundamental research of laser marking of different materials which the authors have recently performed. Product laser marking is one of the most common industrial applications of lasers. The laser marking systems using different lasers and optical delivery systems may be used to mark an almost endless list of materials including metals, plastics, ceramics, glass, woodland leather as well as painted surfaces and photographic emulsions. In this review the research and progress in laser marking of different materials are critically reviewed from different perspectives. Basically many types of industrial lasers like, carbon dioxide (CO2) laser and neodymium-doped yttrium aluminium garnet (Nd: YAG) laser, fiber laser, semiconductor laser which are used for laser marking process. Some important laser processing parameters and their effects on MRR and surface roughness are discussed. This paper deals with the review of papers by authors. Read More...
|
Mechanical Engineering |
India |
1458-1462 |
385 |
Automatic Toll Collection Systems using WSN (RFID)
-Aadesh Kamble ; Mr. Ashok Bade; Mr. Vijay Shinde; Mr. Vijay Hambir
Wireless Sensor Networks gaining market in this era has revolutionized the world by making the world faster and more robust. Using this fact, Automated Systems using WSN are developed for the transportation to make it easy and fast, by using Radio Frequency Identification for cars we can make the journey unstoppable on the highways. Cars stop in queues on highways to pay the toll tax, instead we can use Active RFID and WSN to make the toll process automated and easy. Read More...
|
Computer Engineering |
India |
1463-1466 |
386 |
cARDIAC CYCLE PHASE DETECTION USING AN ARTIFICAL NEURAL NETWORK
-Sangameswaran N ; Meenakshidevi P
this paper proposes a new hybrid approach to estimate the cardiac cycle phases in 2-D echo-cardiographic images as a first step in cardiac volume estimation. The cardiac cycle phase identification has done by making out the anatomical information of the heart with the dataset of both the normal and infant cardiac images of the heart. These dataset here helps in extracting the information about the given image and also differentiates them under the two categories either the heart left ventricle is in the diastolic state or systole state. For identifying this state the mitral valve position of the heart is considered. In the first step, the noise in the image was removed using the median filter and wavelet transforms for the canny edge detection as the second step. In third step, feature extraction, mean and the standard deviation value for the dataset images were calculated. To classify the two states of the heart, the feed forward back propagation neural network was used in the fourth scenario. By training the neural network, the images of the heart were classified into diastole and systole and could be measured in both the manner and compared. Read More...
|
computer science and engineering |
India |
1467-1472 |
387 |
Multi-party Access Control: A Secure Web Application
-Sushama Manyar ; Darshana Marwadi; Ketan Rikame; Nikita Sangle; Prof.D.M.Dalgade
our project is web based application, deals with the multi-users communicating with each other. Online social networks (OSN) like Facebook, twitter, etc have different and interesting features. These all OSNs also provide security options to the users. We are providing in our project, security options to the users and bringing in new concept of slambook into picture. Slambook concept will not only make communication among users easier, but also create an interactive environment. Read More...
|
Information Technology |
India |
1473-1475 |
388 |
A REVIEW PAPER ON THEORETICAL & EXPERIMENTAL INVESTIGATIONS OF A DEDICATED PRODUCER GAS ENGINE TECHNOLOGY
-PATEL ROHAN R ; Dr. Rajesh C Iyer; Hiren Mahida; Nirmalkumar
The world is facing severe problems of energy crisis and environmental problem. This situation makes people to focus their attention on sustainable energy resources for their survival. Biomass is recognized to be the major potential source for energy production. There are ranges of biomass utilization technologies that produce useful energy from biomass. Partial combustion of biomass in the gasifier generates producer gas that can be used for heating purposes and as supplementary or sole fuel in internal combustion engines. Gasification is one of the promising technologies to convert biomass to gaseous fuels for distributed power generation. In this study the performance of the gasifier–engine system is analyzed by running the engine for various producer gas– air flow ratios and at different load conditions. Read More...
|
MECHANICAL ENGINEERING |
India |
1476-1480 |
389 |
Robust Video Copy Detection System
-Saleem Sayyed ; Arshad Shaikh; Farooque Shaikh; Kavita Bhangale
The video copy detection system based on content fingerprinting, is used for video indexing and copyright applications. This system consists of two algorithms: a fingerprint extraction algorithm succeeded by a fast approximate search algorithm. The first algorithm extracts compact content-based signatures from the images captured from the query video. Each such image signifies a short sector of the input video and contains temporal as well as spatial information about the video sector. These images are denoted by temporally informative representative images. To find whether a query video (or a part of it) is copied from a video in a system database, fingerprints of all the existing videos in the system database are extracted and kept in advance. The search algorithm searches the retrieved fingerprints to find matches for the fingerprints of the input video. The proposed approximate and quick search algorithm facilitates the online application of the system to a large video database of tens of millions of fingerprints, so that a match (if it exists) is found in a few seconds. Read More...
|
Electronics And Telecommunication Engineering |
India |
1481-1485 |
390 |
honeypot based tool using ann
-Pathare Pratiksha Balu ; Kakulte Manisha ; Jadhav Prajakta; Gawande Darshana
A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large numbers of systems, but also to be able to react quickly to different events. Before deploying a honeypot tool it is advisable to have a clear idea of what the honeypot should and should not do. There should be clear understanding of the operating systems to be used and services (like a web server, ftp server etc) a honeypot will run. The risks involved should be taken into consideration and methods to tackle or reduce these risks should be understood. This honeypot tool is developed by using ANN. This Honeypot tool has greater efficiency. Honeypot tool are a computer specifically designed to help learn the motives, skills and techniques of the hacker community and also describes in depth the concepts of honeypots and their contribution to the field of network security. Read More...
|
Computer Engineering |
India |
1486-1487 |
391 |
A survey on gallstones and its treatment methods
-K.Suganya ; A.Rethinavelsubramanian
Gallstones represent one of the commonest surgical problems in the developed world Symptoms arise due to stones in the gallbladder, in the bile duct, or both. Obesity and weight loss have been associated with gallstone disease. The most common complications of gallstone disease are acute cholecystitis, acute pancreatitis, ascending cholangitis, and gangrenous gallbladder. Gallstone ileus refers to small bowel obstruction resulting from the impaction of one or more gallstones after they have migrated through a cholecystoenteric fistula. Read More...
|
Medical science |
India |
1488-1491 |
392 |
An NON NFC Ticketing Syatem With new approach Of an Read Write Mode.
-Ms.Amruta Avinash Mhatre ; Mrs.kanchan K.Doke
A key application of Near Field Communication (NFC) can be found in the field of Electronic Fare Management in this project we are implement a ticketing system for local trains using the concept of (Non NFC) Non near field communication .It can radically changes existing system of isolated interoperable fare management .In this paper a scenario for the integration of an electronic ticketing system into an existing public transport system based on Non NFC is introduced, Electronic Fare management system consists of sophisticated structure and processes. Therefore at current stage of development only selected subset of features is essential for prototypical implementation is presented in this paper. Read More...
|
computer Engineering |
India |
1492-1495 |
393 |
Web data extraction and alignment tools: A survey
-Pranali Nikam ; Vidhya Ghogare; Yogita Gote; Jyothi Rapalli
Data extraction from the web pages is the process of analyzing and retrieving relevant data out of the data sources (usually unstructured or poorly structure) in a specific pattern for further processing, involves addition of metadata and data integration details for further process in the data workflow. This survey describes overview of the different web data extraction and data alignment techniques. Extraction techniques are DeLa, DEPTA, ViPER, and ViNT. Data alignment techniques are Pairwise QRR alignment, Holistic alignment, Nested structure processing. Query Result pages are generated by using Web database based on Users Query. The data from these query result pages should be automatically extracted which is very important for many applications, such as data integration, which are needed to cooperate with multiple web databases. New method is proposed for data extraction t that combines both tag and value similarity. It automatically extracts data from query result pages by ï¬rst identifying and segmenting the query result records (QRRs) in the query result pages and then aligning the segmented QRRs into a table. In which the data values from the same attribute are put into the same column. Data region identification method identify the noncontiguous QRRs that have the same parents according to their tag similarities. Speciï¬cally, we propose new techniques to handle the case when the QRRs are not contiguous, which may be due to presence of auxiliary information, such as a comment, recommendation or advertisement, and for handling any nested structure that may exist in the QRRs. Read More...
|
Information Technology (Web Mining) |
India |
1496-1501 |
394 |
Cost Effective data displaying System Based ON Raspbian Linux
-Chitra Joshi ; YOGESH RAUT
Design and realization of a data displaying system based on embedded Raspbian Linux and Raspberry Pi is proposed. For data acquisition and data storage, multitasking operation system Raspbian Linux is preferred. This system designs the software driver programming. The idea of designing and system framework of its embedded server is demonstrated entirely. System with clear display, stable performance, friendly application procedure interface, easy operation, economical and practical use, has a good market and application prospect. Read More...
|
EMBEDDED SYSTEM |
India |
1502-1505 |
395 |
Performance analysis of smith predictor and proportional-integral-derivative in seromotor speed control
-Orji, Williams Ukaegbu ; Dr. Mbaocha C. Christian; Dr. Damian O. Dike; Dr. Ifeyinwa E. Achumba
The work presented in this research report is centred on performance analysis of Smith Predictor and Proportional-Integral-Derivative controller in servomotor speed control application. A controller designed with improved time-delay compensation and method of tuning has made it possible for speed control specifications to be optimally regulated for reliable performance. Servomotor speed control system has proven to exhibit several problems such as time lags due to analysis, measurement, transportation, computation and communication when using conventional controller. This problem leads to increased system dynamic error, decrease stability margin and affects system stability as evident in engineering and industrial process control. Therefore, this heuristic research focuses on hybridization of two controllers to remove inherent transcendental time delay from systems transfer function. This is a comparative study of two different controllers. From the simulation results, non-hybridised controller has a very large settling time of 16.1seconds with less overshoot when a static load disturbance of -1 was used. The rise and peak times showed that the PID controller was suitable to compensate for time delay (≤2seconds) On the other hand, the dynamics of the hybridised controller with large time delay of 94seconds was designed to match with the process model; this successfully eliminated long dead time from the system model. The Smith Predictor hybrid compensated for all iterations of time delay (2≤τ≥94) seconds with ≤1seconds settling time and more over shoot ≤8seconds. Hence, it is recommended that hybrid predictive controllers be improved to ensure large dead time compensation in servomotor speed control to drive industrial and engineering processes reliably. Read More...
|
Electrical/Control System Engineering |
Nigeria |
1506-1510 |
396 |
REDUCING LAUNCH AND CAPTURE POWER USING SABOTEUR AND MUTANTS METHOD
-Jonisha Stanis.S ; Maria Antony.S
Testing of VLSI circuit aims for high quality screening of the circuits by targeting on performance related faults. Excessive switching in launch and capture operation results in high yield loss. Power management is also a major issue in VLSI design technique. Scan chain reordering method is used to reduce the number of transitions and thus the power consumption gets reduced. Fault injection technique based on the use of hardware description language offer important advantages than other techniques. Saboteurs and mutants methods were important fault injection techniques. By which the number of test pattern generation can be reduced and thus the time for processing was also gets reduced. As this type of technique can be applied during the design phase of the system, which reduces the time-to-market. They provide high controllability and reachability. This technique improves the fault coverage and reduces pattern count. The proposed algorithm is coded in VHDL and simulated using ModelSim and Xilinx ISE 8.1isimulator. The results obtained are compared with the existing version of the technique. Read More...
|
Electronics and Communication Engineering |
India |
1511-1515 |
397 |
A Comprehensive Review of Remote Sensing using GSM Technologies
-Anshul Chauhan ; Ritula Thakur
The purpose of this paper is to give a brief review of the applications of remote sensing and its advantages in various fields .Paper also reviews how GSM network can be used for remote sensing. The development of the new technologies in the field of electronics has brought tremendous changes in the day to day life of every human being. They have entered the fields like industry, medicine, telecommunication and also home automation. This paper introduces the intelligent automation system for various Microcontrollers, Technologies and Applications. The paper also focuses on increasing use of PIC controllers because of there several fascinating features. The advantage of the automated detection and alarm system is that, it offers faster response time and accurate detection during an emergency. The system should provide safe and secure remote monitoring of the environment in laboratories, industries sand it has high reliability and easy to implement a system like this wherever needed. Read More...
|
Electrical Engineering |
India |
1516-1518 |
398 |
Low Cost Automation by Material Handling System for Short Distance Material Transfer
-Rahul S.Mundada ; Devavrat Bhalerao; Omkar Bhalerao; D.N.Korade
The current financial crisis faced all over the world has posed tremendous challenges on the manufacturing organisations. Even at low volumes, and large variety, they have to be competitive with minimum investment. Low-cost automation can play an important role in this situation. Material handling and logistics are expensive operations which comprise of 10% to 80% of product cost and this tends to rise for inexpensive products. It is always advisable to minimize or if possible eliminate operator’s involvement in transferring materials. This work is aimed at developing a simple, compact and robust material handling equipment that would suit almost any short distance material transfer task and create some degree of automation around the existing equipment and tools. Such a system would eliminate the need of power conveyors, chutes or roller conveyors that need operator attention and picking of jobs by hand to transfer it between two stations. The system would be of great use in manufacturing lines having u type or zigzag type layouts where human handling of jobs is presently unavoidable, as use of powered conveyors or gravity conveyors cause interruption in line operations. For design of parts detail design is done and dimensions thus obtained are compared to next highest dimension which are readily available in market. This simplifies the assembly as well as post production servicing work. Read More...
|
Mechanical Engineering |
India |
1519-1522 |
399 |
Pneumatic Pumping System
-Ketan Kumbhar ; Pranav Kulkarni; Nishant Parvadia; Prof. S.S.Shingare
The project basically involves pneumatic pumping process. The main objective is to replace conventional motoring system with pneumatic pumping. The PLC used in the project is . SCADA system has been implemented so as to suit the operator with graphics of the processes being carried out. There are several advantages of automation in an industry or even in a company. Automation helps in saving the labor of the workers and thus it also saves a lot of time for the worker who can be then directed to some other work process. The greatest advantage of using automatic pneumatic pumping system is that it saves time and at the same time it also saves costs. Automation of sugar syrup pumping system (using pneumatic pumping system) is very efficient way to operate pumps in industries where requirement of high production rate with high quality is essential. This results in system which is synchronized to perform sequential operations Read More...
|
Electrical Engineering |
India |
1523-1524 |
400 |
Hadoop Acceleration using Open Flow Technique
-K.Santhosh pradhan ; Parthipan.V
This paper is about of how Hadoop can control its network resources to improve performance using OpenFlow. . OpenFlow is a very popular example of software-defined network technology. Our study will explore the use of OpenFlow to provide better link bandwidth for shuffle traffic and decrease the time which Reducers have to wait to gather data from the Mappers. Hadoop's distributed compute framework which is called as MapReduce, exploits the distributed storage architecture for Hadoop's distributed file system which will deliver a reliable parallel processing services for arbitrary algorithms. The shuffle phase of Hadoop's MapReduce are the computation involves movement of intermediate data from the Mappers to Reducers. Reducers often are delayed due to inadequate bandwidth between them and thereby lower the performance of the cluster. Our experiments shows the decrease of execution time for a Hadoop job and when the shuffle traffic can be used for more of the available bandwidth on a link. Our approach illustrates how high performance of the computing applications can improve performance by controlling their underlying network resources. The work presented in the paper is for a starting point for some experiments being done as part of SC12 SCinet Research Sandbox which will be quantified the performance advantages of different versions of Hadoop that uses OpenFlow to dynamically adjust the network of local and wide area Hadoop clusters. Read More...
|
computer science engineering |
India |
1525-1529 |