No. |
Title and Author |
Area |
Country |
Page |
201 |
Testing and Performance of Parabolic Trough Collector in Indian climate
-Shantanu S Bhale ; Nikhil S. Kelkar; Ankit S. Gujrathi; Pratik N. Khairnar; Sagar V. Jadhav
A parabolic trough collector is a type of solar thermal collector that is straight in one dimension and curved as a parabola in the other two, lined with a polished metal. The energy of sunlight which enters the mirror parallel to its plane of symmetry is focused along the focal line, where object is positioned that is intended to be heated. It consists of a tube, which runs the length of the trough at its focal line. The mirror is oriented so that sunlight which it reflects is concentrated on the tube, which contains a fluid which is heated to a high temperature by the energy of the sunlight. The hot fluid can be used for many purposes. Read More...
|
Mechanical Engineering |
India |
900-902 |
202 |
Fabrication and Performance Analysis of Downdraft Biomass Gasifier Using Sugarcane Industry Waste
-S. S. Waghmare ; R. V. Kalbandhe; S. S. Deshmukh; Tanvir Arfin
The process by which biomass can be converted to a producer gas by supplying less oxygen than actually required for complete combustion of the fuel is known as gasification. It is a thermo-chemical process and it is performed by a device known as gasifier. For executing the gasification experiments nowadays single throated gasifier uses sugarcane industry waste. In the present study we get to know that sugarcane briquettes are manufactured from residue of sugarcane which is used as a biomass material for the gasification process. Briquettes are formed by extruding the sugar which is extracted from the residue of sugarcane (bagasse) dried in the sun. Equivalence ratio, producer gas composition, calorific value of the producer gas, gas production rate and cold gas efficiency are certain grounds for estimating the performance of the biomass gasifier. The experiential results are compared with those reported in the literature. Read More...
|
Mechanical Engineering |
India |
903-907 |
203 |
Mitigation Strategies to Greenhouse Gas Emission Control: A Database for Emission Factors
-Tanvir Arfin ; Md.O. Aquatar; S.S.Waghmare
With the advancement of Industrial Revolution, the anthropogenic activities have brought about increase in the quantities of greenhouse gases (GHGs) into the atmosphere leading to various climatic changes. The climate change is mainly caused by production of GHG emissions in the atmosphere. As the major population of the world seems to agree with the concept of ‘human development’ including the ‘environment’ factor, the various attempts for sustainability is not found to be interesting or beneficial. Therefore, the main motto of the world is to improve the standard of living by attaining suitable measures. However, most of the population on earth still do not get ‘bare minimum’ for development; the humanity faces the challenge of the “Climate Changeâ€. Various efforts need to address climate change through mitigation of GHG emissions and building of adaptive capacities to deal with the severe impacts of climate change. Read More...
|
Environment Engineering |
India |
908-917 |
204 |
An Improved Energy Efficiency Algorithm in Wireless Sensor Network Using Query Optimization
-M.Sivakumar ; K.Senthil Prasad
Wireless Sensor Networks (WSN) is an essential guide foe anyone interested in wireless communications for sensor networks, home networking, environment monitoring, target tracking, and surveillance. In wireless sensor network sensor nodes have very limited supply of energy, and also should be available in function for extremely long time (e.g. a couple of years) without being recharged. So consider the energy resource of sensor node and the life time of the sensors, to optimize the query plan, based on user specified accuracy for wireless sensor network. This proposed method aims at optimization of periodical query, with careful consideration of accuracy, along with energy consumption in data communication. User may specify a value/time accuracy constraint, according to which an optimized query plan can be created to minimize the energy consumption. The main objective is to propose an energy efficient algorithm to reduce data transmission and to increase the life time of wireless sensor network. Read More...
|
Computer Science and Engineering |
India |
918-920 |
205 |
Rotary RFID Parking Management Solution Controlled By Microcontroller
-Pradeep Rajput ; Dr. Namit Gupta
This paper led emphasis over the automatic parking system. The reason behind this research work is to eradicate the traffic problem arise during the rush hours in day time. Implementation of intelligent parking also helpful in security purpose this research paper is based on RFID based technology along with IR communication. The main governing body is microcontroller. RFID means radio frequency identification, this technology has been used for since last two decades, reason behind this technology is quite straight as it is capable of providing new services and convenience in retail environment. This technology is very reliable as well as very user friendly. This also ease the security purpose, this also reduced time consumption of user. This research involved following components (a) IR based communication, (b) RFID Module, (c) Microcontroller ATmega328. Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
921-924 |
206 |
A Review on Parametric Optimization in Wire Electric Discharge Machining
-Hardik A. Patel ; Prof. B C Khatri; Md. Najibullah; S. P. Patel
Wire-electro discharge machining (WEDM) has become an important non-traditional machining process, as it provides an effective solution for producing components made of difficult-to-machine materials like titanium, zirconium, etc., and intricate shapes, which are not possible by conventional machining methods. Due to large number of process parameters and responses lots of researchers have attempted to model this process. This paper reviews the research trends in WEDM on relation between different process parameters, include pulse on time, pulse off time, servo voltage, peak current, dielectric flow rate, wire speed, wire tension on different process responses include material removal rate (MRR), surface roughness (Ra), sparking gap (Kerf width), wire lag (LAG) and wire wear ration (WWR) and surface integrity factors. Optimization of process parameters is necessary to reduce cost and time of manufacturing. Various optimization and relation finding methods are shown here which are frequently used by researchers. Few conclusions based on existing literature have been extracted from existing literature on optimization of WEDM process parameters. Read More...
|
Mechanical Engineering |
India |
925-929 |
207 |
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
-Parul Anand ; Chanpreet Kaur Toor
Network on chip is an interconnection between several processing elements and routers. There are several possibilities for the occurrence of faults within the network. These faults degrade the performance of the network. In order to increase the performance several fault tolerant methods has been used. They involve themselves in rerouting and hence take longer paths. To make the path shorter, the router architecture has to be modified. For this efficient routers are needed to take place communication between these devices. This project, proposes a priority based solution for a bufferless network-on-chip, including an on-line fault-diagnosis mechanism to detect both transient and permanent faults, a hybrid automatic repeat request and forward error correction link-level error control scheme to handle transient faults. Read More...
|
VLSI |
India |
930-931 |
208 |
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Routing in MANET
-Shanthini.S
The Auction game based Adaptive Position Update strategy for geographic routing, which dynamically adjusts the frequency of position updates based on the mobility dynamics of the nodes and the forwarding patterns in the network. Adaptive position update is based on three simple principles: first principle is nodes whose movements are harder to predict update their positions more frequently (and vice versa), then the second principle is nodes closer to forwarding paths update their positions more frequently (and vice versa) and last principle is Forwarding nodes are selected based on distance and residual energy with bidding among the neighbors. Several experimental analyses, which is validated by NS2 simulations of a well-known geographic routing protocol, Greedy Perimeter Stateless Routing Protocol (GPSR), shows that game based Adaptive Position Update strategy for geographic routing can significantly improve the packet delivery ratio and improve the routing performance in terms of throughput in comparison with periodic beaconing and other recently proposed updating schemes. Finally give a better result in throughput and packet delivery ration by incurring a relatively smaller delay in delivering the packets. As the no. of nodes increases, this results in better packet delivery ratio of around 98%. The tradeoff between packet delivery ratio and Routing Over Head is slightly increased, The benefits of our work further confirmed by undertaking evaluations in realistic network scenarios, which account for localization error, realistic radio propagation, and sparse network. Read More...
|
Information Technology |
India |
932-936 |
209 |
A Literature Survey on Comparative Analysis of RZ and NRZ Line Encoding over 40 Gbps Fiber Optic System
-Manoj kumar Gautam ; Parikshit Tiwari
Modern world is the world of internet which requires more capacity and more bandwidth to modernize the world. Hence we move towards optical communication. When we talk about optical communication then chromatic dispersion is biggest obstacle for high speed optical channel. Chromatic dispersion can be reduced either by compensation technique [1, 2] or either by electronic dispersion compensation. In this paper, we make comparative analysis in RZ and NRZ line encoding over 40 Gbps system. Two different modulation formats including non-return-to-zero (NRZ), return-to-zero (RZ) is compared on the basis of Bit error rate and quality factor. The 40 Gbps signal is transmitted over 200 km in single mode fiber. Read More...
|
Electronics & Communication Engineering |
India |
937-939 |
210 |
Big Data Mining, Techniques, Handling Technologies and Some Related Issues: A Review
-Gajendra Kumar ; Prashant Richhariya
The Size of the data is increasing day by day with the using of social site. Big Data is a concept to manage and mine the large set of data. Today the concept of Big Data is widely used to mine the insight data of organization as well outside data. There are many techniques and technologies used in Big Data mining to extract the useful information from the distributed system. It is more powerful to extract the information compare with traditional data mining techniques. One of the most known technologies is Hadoop, used in Big Data mining. It takes many advantages over the traditional data mining technique but it has some issues like visualization technique, privacy etc. Read More...
|
Computer Science and Engineering |
India |
940-943 |
211 |
Comparison of Shunt Facts Devices for the Improvement of Transient Stability of Two Machine Power System Using MATLAB Modelling
-Arti Devi Patel
This paper presents, the performance of STATCOM placed at midpoint of the two machine power system and compared with the performance of SVC. The comparison of various results found for the different type of faults (single line, double line & three phase fault) occur in long transmission line, and their removal by using shunt FACTS devices is analysed. Computer simulation results under a severe disturbance condition (three phase fault) for different fault clearing times, and different line lengths are analyzed. Both controllers are implemented using MATLAB/SIMULINK. Simulation results shows that the STATCOM with conventional PI controller installed with two machine three bus systems provides better damping oscillation characteristics in rotor angle as compared to two machine power system installed with SVC. The transient stability of two machine system installed with STATCOM has been improved considerably and post settling time of the system after facing disturbance is also improved. Read More...
|
Electrical Engineering |
India |
944-948 |
212 |
Intelligent Agricultural System with Weather Monitoring
-Tamilarasu.R ; Vinith.P
The embedded technology is now in its prime and wealth of knowledge available is mind blowing. Embedded project has new opportunities for the peasants and benefits them in various aspects. The system has been proposed to monitor the Weather and Control the Humidity of Agricultural Land. This Project Main objective is to control the Water Pump Motor whenever Soil Moisture Decreases below average level using Microcontroller. This Project also Monitor the Rain Possibilities and environmental Temperature. And a detail of weather condition has send to authorized Mobile number. Index Terms Solar Panel, Sensors, Cell phone, Microcontroller, GSM modem. Read More...
|
Computer Science and Engineering |
India |
949-951 |
213 |
Surveying, Planning and Scheduling For A Hill Road Work at Kalrayan Hills by Adopting ISS Method
-Vijaya Sundravel.K ; Saravanarajan N; Amirthagadeshwaran G; Sureshkumar M P; Vijaya Srinivasan K
To date, few construction methods have helped the project managers make a decision on the near-optimum distributions of men, material, Space and tools according to their job objectives and job limitations. This thesis presents an intelligent scheduling system (ISS) that can assist the project managers to find the near-optimum agenda plan according to their job objectives and job limitations. Intelligent scheduling system (ISS) uses model techniques to share out resources and allocate dissimilar levels of priorities to different tricks in each model cycle to find the near-optimum solution. ISS considers and combines most of the important construction factors (agenda of task, expenses, manpower, breathing space, utensils and material) at the same time in a incorporated environment, which makes the resulting agenda that will be nearer to optimum. Moreover, ISS allows for what-if analysis of probable scenarios, and schedule adjustments based on unexpected conditions (modified orders, delayed material delivery, etc.). As a final point, two model applications and one real-world construction job are utilized to illustrate and evaluate the success of ISS with two commonly used software packages, Primavera Project Planner and Microsoft Project. Read More...
|
Civil Engineering |
India |
952-955 |
214 |
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
-Babre Tanmay A. ; Gagare Sital J.; Sherkar Snehal R.; Bhangare Rohan S.
In today’s world a huge amount of data is loaded on the cloud storage. The protection of such type of data is main concern. It is somewhat difficult to protect such data against corruption, checking the integrity of data and also representation of failure data. Together with this it is also critical to implement fault tolerance among such type of data against corruptions. The private auditing for regenerating codes which is nothing but the existing system, developed to address such types of problems. The private auditing for regenerating codes can generate codes for such corrupted and incomplete data, but for this, data owners always have to stay online for checking completeness as well as integrity of data. In this paper, we are introducing the public auditing technique for regenerating code, based on cloud storage. The proxy is the main component in public auditing to regenerate failed authenticators in the absence of owner of the data. A public verifiable authenticator is also designed, which is generated by a several keys and can be regenerate using partial keys. We are also using pseudorandom function to preserve data privacy by randomizing the encode coefficient. Thus our technique can successfully regenerate the failed authenticators without data owner. Experiment implementation also indicates that our scheme is highly efficient and can be used to regenerate code in cloud based storage. Read More...
|
Computer Engineering |
India |
956-957 |
215 |
Cloud based Anti-Theft Application for Android Devices: A Literature Review
-Ajit S. Rathod ; Choudhary Sagar S.; Mundhe Vishal B.; Prof. Dighe Mohit
In this system we have proposed to implement the technique to improve antitheft for android based mobile phones by using various services like MMS over the SMS. Today’s most popular android operating system is contains many scenarios that already been proposed that are related to anti-theft also many applications are available onto play store but these application are not so useful to find the thief e.g. GPS tracking for the devices like smart phones, tablets and phablets. We can use new technology likes Multimedia Messaging Service (MMS), which enhances the present scenario. This scenario is totally dependent on the hardware of your smart phone device that is camera (front or rear) also support for multimedia messages. First, we just need to install this software then, it work’s in the background, stores the current SIM number in a variable and keeps continuously checking for SIM change, whenever SIM gets changed from device, it will takes snapshots, record a video in the background with the use of camera of device and also records surrounding audio i.e., without taking user permission and then it will send an MMS to an alternate mobile number and an email id, which was provided during installation for authorized user’s registration. The most benefit of this application is very easy to configure and keeps running in the background without interrupting the user. To some extent it helps the authorized user to identify and find the thief. Read More...
|
Computer Engineering |
India |
958-959 |
216 |
A survey paper on Pollution Free Smart Cities using Smart Monitoring System by Employing WSN on Vehicles
-Pavan Renuse ; Rohin Thomas; Niraj Waval; Abhishek Wakodkar; Anjali Bhosle
The world we live in had evolved into a world where almost every family has at least one vehicle in their possession to be safe we could assume that each family has on average two vehicles. Now due to the increase in the number of vehicles in the road there is that much of an increase in the pollutant levels being increased onto the environment. The major sources of air pollution are CO, NOx and HC and these are a major degradation factor to the environment. To tackle this problem this paper talks about a monitoring system which is placed on the automobile to measure the pollutant levels emerging from the vehicle. On top of that some safety features have been added as well for the driver and all of the people traveling in the vehicle in the form of an alcohol sensor and a seat belt sensor. How this works is that the sensors are placed on the vehicle and can be connected through the users android device. The android device through a WiFi connection is connected to the server, the server is connected to a database and that database has the administrator PC to view and monitor the data. The safety feature is the addition of the alcohol sensor which is connected to the ignition of the vehicle and how it works is that if the driver has any alcohol and it is detected by the sensor then automobile will not start, hence adding an additional safety measure to the vehicle on top of pollution monitoring. This project works on an IoT environment and there is a lot of scope with smart devices in the future. Read More...
|
Computer Engineering |
India |
960-962 |
217 |
Control of Industrial Pneumatic & Hydraulic Systems using Serial Communication Technology & Matlab
-Priyam Parikh ; Priyam Parikh; Naman Modi; Rakesh Prajapati
it has been observed that machines have become more intelligent, especially in manufacturing industries and power plants. Day by day use of hydraulic & pneumatic systems has been increasing rapidly. Some industries have only pneumatic systems for various operations. Instead of other rotary actuators industries are using pneumatic and hydraulic actuators to get better accuracy and smooth operations. Simultaneously engineers are focusing on computer control also. To construct a pneumatic system with a higher control features, the one and only option is computer control. It means that engineer would be able to control the whole system with the help of on board computer attached with the unit. To build such a system serial control techniques to control pneumatic & hydraulic systems have been shown in this paper. This system has been designed using Arduino Microcontroller (ATMEGA 168, 8 bit ATMEL), Matlab software, Arduino software, GUI (graphical user interface) toolbox, pneumatic components and some electromechanical switches. Verification of the pneumatic circuit can be done using Automsim premium software. Read More...
|
Mechanical Engineering |
India |
963-966 |
218 |
Analysis on Student Admission Enquiry System
-Ameya Joshi ; Manjusha Singh
Data mining referred to extracting the hidden predictive information from huge amount of data set. Recently, there are number of private institution are came into existence and they put their efforts to get fruitful admissions. In this paper, the techniques of data mining are used to analyze the mind setup of student after matriculate. One of the best tools of data mining is known as WEKA (Waikato Environment Knowledge Analysis), is used to formulate the process of analysis. Read More...
|
Computer Science and Engineering |
India |
967-969 |
219 |
A Survey on Service Request Scheduling in Cloud Based Architecture
-Vinita Tiwari ; Shikha Agrawal
Cloud computing has become quite popular now-a-days. It facilitates the users to store and process their data which is stored in 3rd party data centers. Today in IT sector everything is run and managed on the cloud environment. As the number of users is increasing day by day, faster and efficient processing of large volume of data and resources is desired at all levels. So the management of resources attains prime importance. While using cloud computing various issues are encountered like load balancing, traffic while computation etc. Job scheduling is one of the solution of these problems which reduces the waiting time and maximizes the quality of services. In job scheduling “priority†is an important factor. In this paper, we will be discussing various scheduling algorithms and a review on dynamic priority scheduling algorithm. Read More...
|
Computer Science and Engineering |
India |
970-972 |
220 |
A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using Topological Approach
-Patil Nilesh Anandrao ; Arun M
According to the relevance towards the state priorities the economy of Maharashtra state is dominated by agricultural as well as industrial sector. Sugar factories play an important role in economy of Maharashtra state. About 60 percent processes in these factories are based on roller chain conveyors. Apart from that, other industries also use these chains frequently for process atomization. However, failure of these chains is perennial problem in these industries which causes huge losses to these industries along with its dependents and in turn economic growth of the state. Material uncertainty plays an important role on formation of elastic and plastic stresses. Breakage of chain is also affected due to faulty manufacturing such as wall thickness of link, breaking area of links, bending movement of pin, inner width of chain and shape of the link and uncertainty in heat treatment. Roller conveyor chains are the critical component in sugar mills, paper mill, food processing, fertilizer industry, pharmaceutical industry, cement industry, foundry industry, heat treatment units, coal mines etc. From the previous studies, it can be noted that, even though several patents are filed on roller chains and conveyors, most of the patents are based on metallurgical investigation, improvement of efficiency and performance of chain. Hardly few patents are there on improving life of the chain and minimization of its failure. From the chain failure case studies it can be noted that the root cause of failure was faulty material processing, heat treatment and improper material selection. Read More...
|
Mechanical Engineering |
India |
973-976 |
221 |
A review on Development of novel algorithm by combining Wavelet based Enhanced Canny edge Detection and Adaptive Filtering Method for Human Emotion Recognition
-Aphasana S. Mulla ; Kiran P. Paradeshi
The conventional Canny edge recognition calculation issensitive to commotion, along these lines, it's anything but difficult to lose powerless edge information when sifting through the clamor, and its settled parameters show poor versatility. In light of these issues, this paper proposed an enhanced calculation in view of Canny algorithm. This calculation presented the idea of gravitational field intensity to supplant picture inclination, and acquired the gravitational field force administrator. Two versatile threshold selection systems in view of the mean of picture gradient magnitude and standard deviation were advanced for two sorts of run of the mill pictures (one has less edge data, and the other has rich edge data) individually. The improved Canny calculation is straightforward and simple to figure it out. Experimental results demonstrate that the calculation can protect more valuable edge information and more vigorous to clamor. Read More...
|
Electronics Engineering |
India |
977-978 |
222 |
Determining Security and Efficiency of PHR Using Different Algorithms with Attribute Based Encryption in Cloud Computing.
-Shrikant Kacharu Markad ; Prof.Rahul B.Mapari
A PHR is nothing but the personal health record related to the patient and patient itself is responsible for maintaining his own personal health record. A Personal Health Record service allows a patient to create, manage, and control his personal health data from one place through the web, in this patient is the PHR owner and he has full rights towords his PHR such as storing ,retrieving ,deleting ,sharing ,provide read write access to the selected users. now here is our intension is to provide security to the PHR and also determining the efficiency of different algorithms in terms of execution speed , performance and most important storage requirements. In the previous work on this topic demonstrates that we required a huge cost for maintaining specialized data centers so instead of creating data centers we are outsourced our PHR data after encryption process. In this framework we have to consider two domains first is private domain and later is public domain. Private domain consist of the people who are very close to the patient such as friend ,family members ,caregiver etc.depending on the relation with the patient ,PHR owner decides the sharing policy . another domain is the public domain which consist of the people from different category such as doctor, insurance company, medical store etc. when PHR owner outsourcing his own PHR file at that time owner of that PHR decides to whom it is shared with. For this operation we are providing separate unique ID’s to each and every category that are included in the framework. Another important flaws of existing work is single trusted agent,with
this number of problems created ,as there are number of PHR owner and PHR users and when PHR is shared at that time user demand for secret key so as there are number of users so bottleneck is generated to the single trusted agent and we avoid this by using AA( Attribute Authority) by dividing the key distribution task to more than one attribute authority. Before outsourcing PHR on cloud first we have to make encryption process by using fine grained attribute based encryption . In this framework we are also providing different facilities to the PHR Owner such as Break Glass ,user revocation etc. for scalability and flexibility.
Read More...
|
Computer Science and Engineering |
India |
979-983 |
223 |
Survey on Division and Replication of Data in Cloud for Optimal Performance and Security
-Snehal Shivaji Khot ; Ujwala H. Wanaskar
Outsourcing information to an outsider authoritative control, as is done in distributed computing, offers ascend to security concerns. The information trade off may happen because of assaults by different clients and hubs inside of the cloud. Hence, high efforts to establish safety are required to secure information inside of the cloud. On the other hand, the utilized security procedure should likewise consider the advancement of the information recovery time. In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that all in all methodologies the security and execution issues. In the DROPS procedure, we partition a record into sections, and reproduce the divided information over the cloud hubs. Each of the hubs stores just a itary part of a specific information record that guarantees that even in the event of a fruitful assault, no important data is uncovered to the assailant. Additionally, the hubs putting away the sections are isolated with certain separation by method for diagram T-shading to restrict an assailant of speculating the areas of the sections. Moreover, the DROPS procedure does not depend on the customary cryptographic procedures for the information security; in this way alleviating the arrangement of computationally costly approaches. We demonstrate that the likelihood to find and bargain the greater part of the hubs putting away the sections of a solitary record is to a great degree low. We likewise analyze the execution of the DROPS system with ten different plans. The more elevated amount of security with slight execution overhead was watched. Read More...
|
Computer Engineering |
India |
984-987 |
224 |
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
-Madhuri Shinde ; Dipali Sutar; Jasraj Mundada; Prof. Shalaka Deore
Technology has elevated to grab an important position in humans life, the best example is smartphones. They offer access to network as well as online banking transactions, where simplification of human labour affects security and user authentication, and passwords are first line of defense, it’s crucial to pick a strong password. Online banking applications currently use alphanumerical usernames and passwords for authentication, which are exposed to eves dropping, attacks, and shoulder surfing. Users often choose either easy to remember passwords, which can be easily guessed or difficult ones, which tend to be forgotten. The paper revolves around the views, limitation of current system and offers a dynamic biometrics, as it can be easily integrated into the existing computer security systems with minimal alteration and user intervention. The main objective is to secure using cued click point (CCP), which is one click based graphical password scheme for sequence of images and measuring, assessing humans typing rhythm, it’s based upon the human tendency to memorize graphical passwords more comfortably. Read More...
|
Computer Engineering |
India |
988-991 |
225 |
Development of Balloon Forming Machine and its Control Using PLC
-Avadhi Aghera ; Himanshu Desai
Balloon forming is the fundamental processes by which the stents are manufactured that are utilized for angioplasty to cure critical heart diseases. Careful selection of various parameters such as pressure, temperature, along with the time duration, etc. affects the balloon quality and plays vital role in effectiveness of critical care of the patient. The proposed system converts the microprocessor controlled balloon forming unit to GUI based computer controlled balloon forming unit. Keeping most of the important variables of the balloon forming process same, and hence utilizing the same transducers, some new sensors are also introduced to avail more information on the operator station. The proposed system is comparatively not only more user-friendly and accurate, it also results into easy to expand and modify type simple but reliable as well as cost-effective solution. Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
992-995 |
226 |
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
-Saurabh Anil Mishra ; Prof. R.D. Thakre; Dr. A.R. Sahu
The intent of this paper is to study the various forces and stress acting on a rotor shaft of a standard rotavator which is subjected to transient loading. The standard models of rotavator, having a progressive cutting sequence was considered for the study and analysis. The study was extended to various available models having different cutting blade arrangement. The study was carried on different papers and identifies the various forces acting on a Rotor shaft of a rotavator. The positions of the torque and forces applied are varied according to the model considered. The response was obtained by considering the angle of twist and equivalent stress on the rotor shaft. This paper presented a methodology for conducting transient analysis of rotor shaft of a rotavator, Read More...
|
Mechanical Engineering |
India |
996-998 |
227 |
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Replication
-T.Cowsalya ; N.Gomathi; R.Arunkumar
Big data is a popular term used to define the exponential evolution and availability of data, includes both structured and unstructured data. The volatile progression of demands on big data processing imposes heavy burden on computation, communication and storage in geographically distributed data centers. Hence it is necessary to minimize the cost of big data processing, which also includes fault tolerance cost. Big Data processing involves two types of faults: node failure and data loss. Both the faults can be recovered using heartbeat messages. Here heartbeat messages acts as an acknowledgement messages between two servers. This paper depicts about the study of node failure and recovery, data replication and heartbeat messages. Read More...
|
Computer Engineering |
India |
999-1001 |
228 |
Investigation of Effect of Process Parameters on Maximum Temperature during Friction Stir Welding Of Aluminium Alloy
-Mohd Anees Siddiqui ; S.A.H. Jafri; Dr. K.M. Moeed; S.Alam
In case of friction stir welding, the maximum temperature along the weld line within appropriate range at tool workpiece interface is responsible for quality of welded joint. Through this paper, an attempt is made to establish a relationship between the input process parameters and the maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075. The design of pre-experimental simulation has been performed in accordance with full factorial technique. The simulation of friction stir welding has been performed by varying input parameters, tool rotational speed and welding speed. The analysis of variance (ANOVA) is used to investigate the effect of input parameters on maximum temperature during friction stir welding. A correlation was established between input parameters and maximum temperature by multiple regression lines. This study indicates that the tool rotational speed is the main input parameter that has high statistical influence on maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075. Read More...
|
Mechanical Engineering |
India |
1002-1005 |
229 |
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
-Mr. T.Stalin ; Dr.M.Thirucheran
The matrix game theory gives a mathematical background for dealing with competitive or antagonistic situations arise in many parts of real life. Matrix games have been extensively studied and successfully applied to many fields such as economics, business, management and e-commerce as well as advertising. This paper deals with two-person matrix games whose elements of pay-off matrix are fuzzy numbers. Then the corresponding matrix game has been converted into crisp game using defuzzification techniques. The value of the matrix game for each player is obtained by solving corresponding crisp game problems using the existing method. Finally, to illustrate the proposed methodology, a practical and realistic numerical example has been applied for different defuzzification methods and the obtained results have been compared Read More...
|
MATHEMATICS |
India |
1006-1010 |
230 |
Study of Clustering of Data Base in Education Sector Using Data Mining
-Umamaheswari.R ; S.Saravana Mahesan; Meenakshi.P
Data mining is a technology used in different disciplines to search for significant relationships among variables in n number of data sets. Data mining is frequently used in all types’ areas as well as applications. In this paper the application of data mining is attached with the field of education. The relationship between student’s university entrance examination results and their success was studied using cluster analysis and k-means algorithm techniques. Read More...
|
Computer Science and Engineering |
India |
1011-1012 |
231 |
Diagnosing lungs cancer Using Neural Networks
-R. Anto Rose ; K.V. Leelambika; M. Gowthami
Artificial Neural Networks is the new technology. It is the branch of Artificial Intelligence and also it is an accepted new technology. Now a days Neural Networks Plays a Vital role in Medicine, Particularly in some fields such as cardiology, oncology etc. And also it has many applications in many areas like Science and Technology, Education, Business, Business and Manufacturing, etc. Neural Networks is most useful for making the decision more Effective. In this Paper, by the use of Neural Networks how the severe disease Lungs Cancer has been diagnosed more effectively. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. The Neural Networks has been successfully applied in Carcinogenesis. The main aim of this research is by the use of Neural Networks the Carcinogenesis can be diagnosed more cost-effective, easy to use techniques and methods. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. Sputum Cytology is used to detect the Lungs Cancer in Early stages. Read More...
|
Computer Engineering |
India |
1013-1015 |
232 |
Product Quality Analysis based on online Reviews
-Pooja Iyer ; Kaveri Awhale ; Kalpesh Ghodekar; Gopal Deshmukh
Customers satisfaction is the most important criteria before buying any product. Technology today has grown to such an extent that every smallest possible query is found on internet. An individual can express his reviews towards a product through Internet. This allows others to have a brief idea about the product before buying one for them. In this paper, we take into account all the challenges and limitations encountered while reading the online reviews and time being consumed in understanding quality of the product from the reviews. We include several methods and algorithms that help the consumer to understand the Quality of the product in better way. Read More...
|
Computer Engineering |
India |
1016-1017 |
233 |
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust as a Fine Aggregate in Cement Mortar
-Shivkumar Srigiri ; Tanveer Asif Zerdi; Sridhar P Gadwal; Shrishail Mane; Shruti Kobhal
In this experimental work ninety nine cubes has been prepared having dimension 70.7x70.7x70.7 mm are cast as per IS:4031 (2000). In this experimental investigation cement mortar mix 1:3 by volume were selected for 0%, 20%, 40%, 60%, 80% and 100% partially replacement of natural sand (NS) by Granulated blast furnace slag (GBFS) and quarry dust (QD) [3 cubes on each parameter respectively] for W/C ratio of 0.55 respectively. All the cubes were tested under compressive testing machine. To compare the average compressive strength of natural sand (NS) with granulated blast furnace slag (GBFS) and quarry dust (QD). Read More...
|
Civil Engineering |
India |
1018-1023 |
234 |
A Defect Prediction Model for Software Product based on ANFIS
-Deepak Kumar Verma ; Prof. H. S. Shukla
Artificial intelligence techniques are day by day getting involvement in all the classification and prediction based process like environmental monitoring, stock exchange conditions, biomedical diagnosis, software engineering etc. However still there are yet to be simplify the challenges of selecting training criteria for design of artificial intelligence models used for prediction of results. This work focus on the defect prediction mechanism development using software metric data of KC1.We have taken subtractive clustering approach for generation of fuzzy inference system (FIS).The FIS rules are generated at different radius of influence of input attribute vectors and the developed rules are further modified by ANFIS technique to obtain the prediction of number of defects in software project using fuzzy logic system. Read More...
|
Software Engineering |
India |
1024-1028 |
235 |
A Survey on Sentiment Analysis and Opinion Mining
-Pooja C. Sangvikar
In Today’s world, the social media has given web users a place for expressing and sharing their thoughts and opinions on different topics or events. For this purpose, the opinion mining has gained the importance. Sentiment classification and Opinion Mining is the study of people’s opinion, emotions, attitude towards the product, services, etc. Sentiment Analysis and Opinion Mining are the two interchangeable terms. There are various approaches and techniques exist for Sentiment Analysis like Naïve Bayes, Decision Trees, Support Vector Machines, Random Forests, Maximum Entropy, etc. Opinion mining is a useful and beneficial way to scientific surveys, political polls, market research and business intelligence, etc. This paper presents a literature review of various techniques used for opinion mining and sentiment analysis. Read More...
|
Information Technology |
India |
1029-1031 |
236 |
Keystroke Dynamics Authentication with Project Management System
-Abhijeet R. Patait ; Kirti K. Chandratre; Gaurav V. Kamlaskar; Vikas S. Thorat
Generally user authentication is done using username and password that is called as login process. This login process is not more secure because, however a login session is still unprotected to impersonator when the user leaves his computer without logging off. Keystroke dynamics methods can be made useful to verify a user by extracting some typing features then, after the authentication process has successfully ended. From the last decade several studies proposed the use of keystroke dynamics as a behavioral biometric tool to verify users. We propose a new method, for representing the keystroke patterns by joining similar pairs of consecutive keystrokes. The above proposed method is used to consider clustering the di-graphs which are based on their temporal features. In this project, authentication system is provide to project management system that make more Secure management system without acknowledging unauthorized user. The Project Management System addresses the management of software projects. It provides the framework for organizing and managing resources in such a way that these resources deliver all the work required to complete a software project within defined scope, time and cost constraints. The system applies only to the management of software projects and is a tool that facilitates decision making. Read More...
|
Computer Engineering |
India |
1032-1034 |
237 |
Filter unwanted messages from walls and blocking nonlegitimate user in osn
-Harde Pradeep Suresh ; Tamhane Ajinkya V.; Kharat Mohini K.; Gaikwad Rupali B.
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks. Read More...
|
Computer Engineering |
India |
1035-1036 |
238 |
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
-Sandeep Boora ; Sandeep Kumar
Turning metal removal is the removal of metal outside diameter of a rotating cylindrical workpiece. As it is used to reduce the diameter. of the work piece generally to a specified dimension and to produce a smooth finish on the metal. Often, the work piece is turned so that the sections have different diameters. As is the machining operation that produces cylindrical. In its basic form, it can be defined as an outer surface machining: Based on the findings of the Pilot study, actual experimentation work will be designed and input machining parameters and their values finalized. The results are expected to show that the response variables (output parameters) strongly influenced by the control factors (input parameters). So, the results which are obtained after experimentation analyzed and modeled for their application in manufacturing industry It is concluded that for MRR be maximum factor Cutting speed has to be at high level 3, Feed has to be at high level & D.O.C has to be at high level. Read More...
|
Mechanical Engineering |
India |
1037-1040 |
239 |
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Techniques
-Jaya Misra ; Rakesh Mandal
In this modern era, Orthogonal Frequency Division Multiplexing (OFDM) has been proved to be an explicit promising technique for wired and wireless systems because of its several advantages like high spectral efficiency, robustness against frequency selective fading, relatively simple receiver implementation etc. Besides having a number of advantages OFDM suffers from few disadvantages like high Peak to Average Power Ratio (PAPR), Intercarrier Interference (ICI), Intersymbol Interference (ISI) etc. These detrimental effects, if not compensated properly and timely, can result in system performance degradation. This paper mainly concentrates on reduction of PAPR.A comparisons have been made between various precoding techniques against conventional OFDM. Read More...
|
Electronics & Communication Engineering |
India |
1041-1043 |
240 |
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
-Sriram sampath ; P.Bhargghavi; M.Anusha; R.Jamuna; S.Ramachandran
Pressure is an important physical parameter to be controlled in process boiler, heat exchanger, nuclear reactor and steam carrying pipeline. In the article the issue has been face in boiler operation due to pressure is handled. In boiler, the problem is due to maximum and minimum range of pressure. Due to the issues there is a chance to causes the hazop. To avoid such the problem the high and low pressure in boiler has to control. In the paper such the problem has sorted out by implementing ON-OFF control. Here the proposed control action for pressure control is implemented with the help of LabVIEW (Laboratory Virtual Instrument Engineering Workbench) software and NI ELVIS hardware. In the idea the boiler’s low range and high is monitored and controlled valve desirably. And also the high range and low range of pressure in the boiler is signified to plant operator by alarm signal. Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
1044-1048 |
241 |
Prevention and Detection of Man in the Middle Attack on AODV Protocol
-Kotad Surbhi Vinodkumar
In this paper it is discuss about AODV protocol and security attacks and man in the middle attack in detail. AODV Protocol is use to find route and very important protocol for communication in wireless network. So AODV protocol should be Secured and it is a big challenge. There are various attacks that occur on it. Here in this paper it discussed about the detection and preventions of man-in-the-middle attack in detail. Read More...
|
Computer Engineering |
India |
1049-1050 |
242 |
Multi-Operational Unmanned Flying Object (UFO)
-Padole Nilkhil Mangesh ; Bhagyawant Jayesh Hanumant; Patil Sanjay Arjun; B.B. Bansode
As the military operations concerned surveillance, law enforcement and search and rescue operations are very critical. In past aircraft and helicopter were used for this types of operations. However recently unmanned flying objects (UFOs) are becoming more popular and an excellent resource for surveillance missions. This project is to create an UFO that is light weight, inexpensive and easy to manufacture. The drone is designed as quad copter that includes two cameras and a detector with a wireless transmission system that provide live feed from cameras and detector to ground stations. It will be used in the applications areas like military applications, weather monitoring and many other detection based applications. The idea will be implemented through simulation and testing. Read More...
|
Electronics & Communication Engineering |
India |
1051-1054 |
243 |
Performance and Emission characteristics of a Single Cylinder Four Stroke Diesel Engine with Water-Diesel Emulsions
-Mr. Sangamesh Bhure ; Mr. Manjunath Pattar
The current trends in CI engine are to use Water-diesel emulsion as alternative fuel. It can be employed directly to the existing CI Engine system with no additional modifications. This system helps in reduction of NOx as well as PM, which in turn improve the combustion efficiency of the engine. However there are still investigations have to be done. The current work mainly concentrated on diesel engine run on water-diesel emulsions and its effect on engine performance and emissions were studied. The various loads were applied on a constant speed diesel engine run on water-diesel emulsions of varying ratios of 0.2:1, 0.3:1. 0.4:1 and 0.5:1. Emission and performance characteristics were measured and were compared with base diesel operation. The emissions like NOx and smoke density were found to decrease greatly and brake thermal efficiency was found to increase at high loads. Smoke level was 4.2 BSU and 3 BSU for base diesel and water diesel emulsion of 0.4. The ignition delay was found to increase with water diesel emulsions. This also increased the maximum rate of pressure rise and peak pressure. The engine was found to run rough with water-diesel emulsions. The optimal water-diesel ratio was found to be 0.4:1 by weight. HC and CO emissions were found to increase with water diesel emulsions. Read More...
|
Automotive Engineering |
India |
1055-1056 |
244 |
Parallel Universe: A Way to Travel in Time
-Ekta Bajaj ; Manish Kumar
From the past centuries understanding our universe is brainstorming task, many scientists explained their ways and derived the laws of physics for understanding our universe but till now these laws are modifying. In modern times, a new theory suggests that apart from our universe there are another universes that are separated from our universe which can be identical to our universe. In this paper we are going to explain the facts behind our universe and our identical parallel universe, using a portal to travel in time with some modified concepts. Read More...
|
PHYSICS |
India |
1057-1060 |
245 |
Maintaining Data Confidentiality in Association Rule Mining in Distributed Environment
-Mr.Abhishek P. Bangar ; Mr.Deokate G.S.
The data in real world applications is distributed at multiple locations, and the owner of the databases may be different people. Thus to perform mining task, the data needs to be kept at central location which causes threat to the privacy of corporate data. Hence the key challenge is to applying mining on distributed source data with preserving privacy of corporate data. The system addresses the problem of incrementally mining frequent itemsets in dynamic environment. The assumption made here is that, after initial mining the source undergoes into small changes in each time. The privacy of data should not be threatened by an adversary i.e. the miner and target database owner should not be able to recover original data from transformed data. Read More...
|
Computer Engineering |
India |
1061-1063 |
246 |
Human Resource Recruitment using Fuzzy Decision Making Method
-M.Nisha ; E.J.Thomson Fredrik
Traditional way of recruiting personnel was through a group decision making problem under multiple criteria containing subjectivity, imprecision and vagueness. In order to keep up with increasing competition of globalization and fast technological improvements and changes, Human resource field needs the best fit employee for a job vacancy. This paper proposes a Fuzzy Decision Making (FDM) method for recruitment process of Human Resource management, which is based on the Fuzzy set theory. Different criteria of human resource recruitment process will be given fuzzy linguistic terms such as absolutely low, extremely low, very low, low, medium, high, very high, extremely high, absolutely high depends upon the importance given by the Human Resource manager. Fuzzy Scaled Weight (FSW) will be calculated for all the criteria. Cumulative Fuzzy Value (CFV) is calculated for all the applicants from Fuzzy Scaled Weight values. Interview Fuzzy Value (IFV) is given by the human resource manager for all the applicants attending interviews. Final Fuzzy Value (FFV) will be calculated aggregating both Cumulative Fuzzy Value and Interview Fuzzy Value. Finally, all the applicant records are arranged in the order of FFV values. Then, Human resource manager can select the applicants easily from the arranged list. Fuzzy Decision Making method system is developed to illustrate the above FDM method for the Human Resource recruitment process. Read More...
|
Computer Science and Engineering |
India |
1064-1068 |
247 |
A Review on Robust Digital Watermarking based on different Methods and its Applications
-Smriti Sikarwar ; Shilky Shrivastava
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. Read More...
|
Computer Engineering |
India |
1069-1073 |
248 |
Smart Fire Detection System using Image Processing
-Hardik Ramesh Kawa ; Akshay Yuvraj Khartade; Swapnil Suresh Sonawane; Swati Shivaji Madole
Fire is greatest genuine interruption which prompts monetary and natural misfortunes. The determination of flame edges is the procedure of a distinguishing limit between the range where thermo-chemical response and those without. It is an ancestor to picture based fire observing, when fire discovery, fire assessment, and the determination of fire and fire parameters. A few conventional edge-discovery techniques have been tried to discover fire edges, yet the outcomes accomplished has baffling. Some examination works identified with fire and fire edge recognition were accounted for distinctive applications; then again, the systems don't underscore the progression and clarity of the fire and fire edges. In this manner, to conquer these issues, applicant fire locales are initially recognized utilizing a foundation model and shading model of flame. The proposed framework was effectively connected to different errands in true situations and successfully recognized fire from flame hued objects. Exploratory results will show that the proposed strategy beats different routines in both of flame target upgrade and foundation point of interest. Read More...
|
Computer Engineering |
India |
1074-1077 |
249 |
Design & Analysis of Composite Propeller Shaft
-Hucche Rohan Dilip ; Dr. S. Y. Gajjal; Prof.V.K.Kulloli
A Propeller Shaft is the connection between the transmission and the rear axle of the vehicles. The function of propeller shaft is to transmit the power from engine to the rear wheel in case of front engine drive vehicle. High quality steel (Steel SM45) is most commonly used material. The steel drive shaft consists of three universal joints, a center supporting bearing and a bracket, which increase the total weight of a system. The Power transmission can be improved through reducing its weight. According to previous researches many have done the various experiments to reduce the weight by changing the ply thickness, fiber orientation angle, number of plies but until now no one has studied the effect on the properties of the composite formed by changing volume fraction of carbon fiber & epoxy resin. The focus of this work will be to investigate either replacing steel structure of propeller shaft by composite structure such as carbon fiber & epoxy resin to minimize the cost and weight, also to check the suitability of composite structures by experimental method and software testing. Read More...
|
Mechanical Engineering |
India |
1078-1081 |
250 |
Design of Hybrid Power Plant for Smart City
-Prashant Pandurang Hirgal ; Sudhir Kawade; Liyakat Sayyad; Pravin Keskar; Rinesh Patel
Energy crisis are of special attention now-a-days. In this project presents a new system configuration of the front-end rectifier stage for a hybrid Hydro/wind/photovoltaic energy system. This system allows the three sources to supply the load separately or simultaneously depending on the availability of the energy sources. In household power generation wind and solar are the general hybrid energy options, which are used. But the overhead water tank is one of the neglected energy generation sources which are available in normal household and commercial places. In today’s world each and every source of energy has to be utilized. Therefore we are trying to use the stored energy in overhead water tank for power generation. Solar and Wind energy will contribute major part of power generation. Generated power will be stored in the battery which sources power to inverter and inverter to load. It gives us multiple sources of energy and also helps us to recover some amount of energy which is stored in overhead water tank. Read More...
|
Electronics & Communication Engineering |
India |
1082-1084 |