No. |
Title and Author |
Area |
Country |
Page |
1 |
Comparative Study on Reconstruction of Shredded Documents Based on Various Image Processing Techniques
-Mukund Gohil ; Shefali Srivastava; Viraj Dabhi; Kruti J. Dangarwala
The shredded document reconstruction is a standout amongst the most widely utilized techniques for semi computerized or mechanized recovery of detailed records from tore up documents. Reconstructing the shredded files manually is similar to resolve a jigsaw puzzle however because of uneven edges, shapes and measurement this assignment turns into very boring and intricate. It’s a helpful job for forensic investigation science, historical artefact reconstructions. A generalized architecture for the shredded document reconstruction is proposed on this paper. On this paper we have now talked concerning the routines to reconstruct the ripped documents using various algorithms with their advantages and disadvantages. Read More...
|
Computer Science and Engineering |
India |
1-5 |
2 |
Review on Salt Spray Humidifier
-Akshay Bhaguji Adhav ; Achyut Sudhakar Akolkar; Nitin Anil Gulaskar; Akshay Sunildatta Kulkarni; Prashant Sarjerao Munfan
In today’s world, corrosion is the most important factor in the automobile sector. Many different methods have been developed to stop such corrosion. These methods differ in their theoretical basis and performance under the change in the various environment conditions. In this paper we review the fabrication of salt spray humidifier. We study here about the salt spray corrosion test, problems, future scope, methodology and objectives of salt spray humidifier etc. in this paper. Thermal corrosion Cycling is an innovative and cost effective process of enhancing the mechanical properties of many materials commonly used in commercial and industrial technologies. By using the salt spray humidifier, we can determine the corrosion rate of the materials or time taken to corrode the various materials. This can be used at various places such as sea water to check the corrosion resistance of the materials which are used them in sea water or in the ocean. Read More...
|
Mechanical Engineering |
India |
6-8 |
3 |
A Review Study on Experimental Investigation on Improving Performance Of I.C. Engine by Varying Advance Piston Coating Materials
-Chudasama Mahesh Masaribhai ; Prof. Y. D. Vora; Prof Rajendra J. Jani
The consumption of hydrocarbon deposits at a faster rate in the present world the engine manufacturer as well as automobile industry is generating an essential demand for increase in efficiency of internal combustion engine. Advance technology demand for modifications of diesel engine more efficient with respect to fuel economy, power output, and reduce emissions. Engine life depends mainly on the part of the engine, service life increased by considering the part which dominates its major role in the working condition of the engine. higher temperatures demand for enhanced temperature resistant materials to be used. The use of Advance coating material in the automotive industry has been found to yield a significant effect on the efficiency of engines. An experimental investigation is carried out on a partially insulated single cylinder Diesel engine to study the performance and emission characteristics. The Piston Crown is coated with a ceramic material consisting of Zirconium dioxide (ZrO2) with 8% by weight of Yttrium Oxide (Y2O3) by plasma spray method. It was also found that heat lost to coolant is reduced and there is increase in energy of exhaust gases for Low heat rejection (LHR) engine when compared with the conventional single cylinder diesel engine. Read More...
|
Mechanical Engineering |
India |
9-12 |
4 |
Search Engine Big Data Management and Computing
-Ragavan N ; AthiNarayanan
Web Search Engine System includes wide range of in-memory data management of both data storage systems as well as Dynamic data processing techniques. Growing main memory capacity has fueled the development of in-memory big data management and processing. By eliminating disk I/O bottleneck, it is now possible to support interactive data analytics. Data gathered from crawling resources are spilt into Text and Numeric data and link need to be provided based on Offset Indexing. Frequent access data need to be loaded into Main memory using cache technologies such as web-cache in Apache or IIS. Bulk data are stored in In-memory databases such as REDIS. Big Numeric data can be stored in Flat File Binary Format such that they can be loaded into RAM in a single read operation. As run time disc access in flat file binary files are faster than conventional files, big data are stored in terms of Binary format which reduces the storage space up to 35% than other file formats. Some issues such as fault-tolerance and consistency are also more challenging to handle in in-memory environment. A Comprehensive presentation of important technology and factors to achieve efficient in-memory data management and processing in Web Search Engine are also considered. Read More...
|
Information Technology |
India |
13-17 |
5 |
Credit Risk Evaluation System on Big Data using Neurorule
-Rajiv Ranjan
The phrase credit analysis is used to depict any process for evaluating the credit feature of the counterparty. Before offering credit, a bank or other loaner acquires information about the party asking a loan. In the case of a bank offering credit, this might involve the party's annual earnings, existing loans, whether they lease or own a home, etc. Based upon the credit score, the loaning body will decide whether or not to offer credit. The difficulty of credit-risk evaluation is a very questioning and important monetary analysis problem. In recent times, researchers have found that neural networks carry out very well for this intricate and unorganized problem when compared to more established statistical approaches. A major fault associated with the use of neural networks for conclusion making is their lack of clarification capability. While they can achieve a high anticipating accuracy rate, the reasoning behind how they reach their decisions is not easily available. In this paper, the results from analyzing real life credit-risk evaluation data set using neural network rule extraction methods are presented. The dataset chosen is Statlog German credit data set which is readily available for public use at the Statlog repository. Hadoop MapReduce has been used and is a software framework for easily writing applications which handle huge amounts of data in terms of multiterabyte datasets in parallel on large bundles i.e. many thousands of nodes of asset hardware in a dependable, fault-tolerant manner have been used. It has been carried out using Eclipse. This is the reason MapReduce programming is used to work with big data. In addition, Partitioning Around Medoids Clustering algorithm (PAM algorithm) is implemented using map-reduce programming in what way, the medoids are the standards of the neural network to examine credit risk which cluster the customers into the clusters pertaining to the different neurorules. Thus, this paper is aimed to show the derivation of rules from educated neural networks and representing these rules and using it to train large data sets in order to support a reasonable and valuable way for building credit-risk evaluation expert systems. Read More...
|
Computer Science and Engineering |
India |
18-24 |
6 |
Factors Contributing to Successful Public Private Partnership Projects for Highway Projects in Indian Context
-Shakil S. Malek ; Dr. P. V. Akalkotkar
With the increasing interest in PPP there is a need to investigate the factors contributing to successful delivery of PPP projects. An empirical questionnaire survey was conducted in Gujarat (India). The survey respondents were asked to rate eighteen factors which contribute to delivering successful PPP projects. The findings from this survey were compared with the results achieved by Esther Cheung in a similar survey conducted in the Hong Kong and Australia. These top five success factors were therefore found to be important for contributing to successful PPP projects irrespective of geographical locations. Read More...
|
Civil Engineering |
India |
25-29 |
7 |
First Notification of Loss (FNOL) Machine Learning Process Used for Telematics
-Sanjay Phatige ; Sreenivasa T.N.
Machine Learning (ML) is a subfield of computer science that evolved from the study of pattern recognition and computational learning theory in Artificial Intelligence (AI). Machine learning explores the study and construction of algorithms that can learn from and make predictions on data. Such algorithms operate by building a model from example inputs in order to make data-driven predictions or decisions, rather than following strictly static program instructions. [1]. When a vehicle (car) comes across an accident, telematics device associated with it will send the accident information (crash or the impact data) to a system. This alert notification (FNOL – Fist Notification of Loss alert) will be send to the recipients. Later this data is stored for analysis, reporting and for claiming the insurance. As data from an accident is understood, reconstruction tools will revolutionize fault allocation, with early intervention transforming FNOL activity and situation control; delivering cost reductions throughout the process. This will help the telematics industries to claim the insurance for their vehicle (which is met with an accident)[2]. FNOL ML API (Application Programming Interface) will identify if FNOL message which is received from the device is a genuine accident message and its value is greater than or equal to configured threshold. If so, it will send an email about that incident (impact) to all the email recipients configured in the system with the accident information[2]. In the present investigation, an attempt was made to analyze FNOL ML process. Computer program (code) was written to develop the Machine Learning capability. This is to understand and predict the accident data which is very useful for telematics industry to process the motor insurance claims. The FNOL ML will receive the accident data from the device (fitted to the vehicle), do the calculation for machine learning process and finally send the mail to the respective mail distribution list informing about the accident and the accident data. Read More...
|
Computer Applications |
India |
30-34 |
8 |
A Review on Bus Driver Scheduling And Optimization
-Ms. Dhruti N. Radadiya ; Asst. Prof. Milan P. Pandya
Efficiency of any transportation system pivot on many parameters such as accessibility, reliability, comfort, frequency, safety etc. Vehicle scheduling and bus driver scheduling are also significant parameters which affects the quality of public transport system. For any public transport system to be successful optimization of all this parameters are required to gain maximum benefits to the operators as well as commuters at minimum cost. Following work focuses specifically on bus driver scheduling keeping in mind the labour agreement rules and the research on the optimization of bus driver scheduling using genetic algorithm, tabu search algorithm along with other heuristics has been reviewed. Read More...
|
Civil Engineering |
India |
35-38 |
9 |
Survey Paper on Designing of FIR Filter using Genetic Algorithm
-Surabhi Chaturvedi ; Mr. Navneet Sahu
filtering is the fundamental aspect of digital signal processing.it involves manipulation of signal by passing or blocking certain part of signal. Digital filters are used in numerous application of control systems. this paper presents efficient design algorithm for FIR filter using genetic algorithm.this algorithm provides the flexibility in control of parameters such as population size,number of generations,crossover probability and so on. Read More...
|
Electronics & Communication Engineering |
India |
39-41 |
10 |
Smart Vehicle Control System based on ARM 7 and RTOS
-Snehal A Shitole ; Dr Prof.Y.S.Angal
This paper utilizes LPC2148 of ARM 7 as the core controller in the smart vehicle to accomplish an ongoing operation framework (OS) RTOS. This controller acts as the control framework to work the whole vehicle. The constant RTOS upgrades the execution of control and disentangles the configuration and administration of programming. What's more, this framework utilizes voice-driven standard, enhancing the human communication in the middle of machines and administrators. The use of high-exactness of ultrasonic sensors on snag evasion robot gives a surety to security. Furthermore, the utilization of LCD as the machine interface encourages the troubleshooting and control of robot. Read More...
|
Electronics & Communication Engineering |
India |
42-44 |
11 |
A Survey on Hard Computing Techniques based on Classification Problem
-Ankita Mishra ; Abha Choubey; Bed Prakash
In this survey paper we survey about various techniques related to Hard computing techniques useful for improve efficiency and time complexity to solve complexity occur in classification techniques in data mining. In this survey we analyzed that multiple hard computing techniques provide different feature such as K-medoid, FCM, PAM, CLARA, CLARANS, BIRCH, CURE, ROCK and CHAELEON etc. In above mentioned techniques very useful and reliable techniques that to be introducing in this survey paper is K-means. K-means techniques based on hard computing and k number of cluster partitions concept. We also analysis of UCI library dataset that purely based on classification i.e. Iris, Wine, PimaIndians, Shuttle, Magic etc. Read More...
|
Computer Science and Engineering |
India |
45-47 |
12 |
Wall Painting Mechanism
-Kolgiri.S.G ; Aivale Bharat Narayan; Gadhave Shekhar Walchand; Lambate Suraj Ganpat; Mane Sambhaji Balu
This project is developed for the user control a Spray Painting Mechanism through Computer. The main module in this project is Personnel computer, Computer Interface, Controlling circuit, Mechanism and painting device. The user can control all the operations of the Mechanism using computer. When the user presses a specific button of the computer, a digital signal is generated and sent through a particular pin of the parallel port. This signal is thus used to drive a corresponding relay in the external electronic circuit. The relay is used as a switch to operate the particular motor in the device. By this way the user can control any of the operations of the device. Read More...
|
Mechanical Engineering |
India |
48-50 |
13 |
Simulation of Fluid Flow Behaviour during Co2 Sequestration using Comsol Multiphysics In Coal Bed
-Manasi Manjari Mohanty ; Bhatu Kumar Pal
Coal beds are an extremely complicated porous medium with characteristics of heterogeneity, dual porosity and stress sensitivity. In the past decades great achievements have been made to the simulation models of pressure depletion coal bed methane (CBM) recovery process and CO2 sequestration and enhanced coal bed methane (ECBM) recovery process. Due to the assumptions and over simplifications analytical models have limitations or problems in application. In this work, an effort has been made to study the behaviour of fluids i.e. CO2 and methane inside of coal and the analysis has been carried out to study their velocity and pressure variations using COMSOL Multiphysics. Coal contains both cleat and porous structure. Cleats are the natural fractures in coal and pores are the important factors for migration of fluid inside coal. Two separate models are developed to understand the fluid flow behaviour in both cleat and porous structure of coal. Read More...
|
Engineering Sciences |
India |
51-54 |
14 |
Utilization of Glass Powder in Concrete Production
-Ravi Bhushan Dwivedi ; Deepak Garg
Glass industry is a very big industry and its generated waste are not widely used. There are many product of glass from which waste is generated like glass bottles, glass sheets, glassware etc. Many scholar and scientist is working on utilization of glass in concrete as fiber, fine aggregate replacement, coarse aggregate replacement, cement replacement etc. In this article, study of glass powder has been done. Particles of glass powder which passes from 90 micron IS sieve is partially replaced by cement and particle of glass powder which retained on 90 micron IS sieve and passes from 4.75 mm IS sieve is partially replace d by fine aggregate in concrete. All mix is prepared, green concrete is checked for its workability and hardened concrete checked for compressive strength. Read More...
|
Civil Engineering |
India |
55-56 |
15 |
Evolution of Properties of Fly Ash Bricks with Glass powder
-Colonel Ravindra poras ; Shishir Gupta
Fly ash is produced in expansive measures, particularly by warm power plants. An incredible bunch of request has been directed out for proficient usage of fly ash in the structure business. Utilization of fly ash in assembling block is one such thing which is being contemplated by numerous examination researchers and specialists. In this article various properties of fly ash bricks are investigated and studied, like water absorption and compressive strength. Lime- Fly ash bricks are casted with pressed technique and with 40-60 lime – fly ash ratio and in this proportion glass powder is added by total weight, upto 30% at an interval of 10%. Read More...
|
Civil Engineering |
India |
57-58 |
16 |
lifetime and throughput optimization in wireless body area network
-Chinkee Kalra ; Vikas Chauhan
Wireless body area network has now become a very efficient monitoring tool for patient’s health parameters. Many approaches depending on routing, energy management, and data processing protocols have been designed for WBANs. Routing protocols in WBANs might differ from WSN depending on the application and network architecture. Research is going in this area to optimize the network parameters to meet specific applications of the WBAN. Due to recent technological developments, the availability of small and low-cost sensors has become practicable. In this paper a wireless sensor network protocol is implemented for body area network and then lifetime and throughput parameters are studied for optimization of the network. Read More...
|
Electronics & Communication Engineering |
India |
59-60 |
17 |
Power Quality Improvement in Distribution System Using D-Statcom
-Yadav Hardik Dilipkumar ; DUBEY YOGESH; KEVAL PATEL; PARIXIT SHARMA
This thesis aims to about the performance of D-STATCOM, to mitigate voltage sag hence Improve the power quality of the power system. Various loads like Starting of induction motor, Transient fault& Arc furnace will create Voltage sag in the power system, by using D-STATCOM, connected at the point of common Coupling we can provide the compensation &mitigate the sag. A power quality problem is an occurrence manifested as a nonstandard voltage, current or frequency that results in a failure or malfunction of the equipment at user-end, Utility distribution networks, sensitive industrial loads & critical commercial operations suffer from various types of outage & service interruption, which can cost significant financial losses. Due to advancement in power electronic technology, usage of Converter, Inverter, SMPS, UPS is increased exponentially, which are nonlinear loads &increased Harmonics distortion in system. Read More...
|
Electrical Engineering |
India |
61-68 |
18 |
A Survey on Searchable Encryption Schemes
-Akash A. Khandagale ; Nitin Gadave; Abhijit Dhok; Suvarna Sabale
Exponential growth of web users throughout the world raises the difficulty of knowledge storage within the business. As the answer to the present cloud system plays a significant role. Because of lack of internal security at the cloud service supplier finish, cloud data storage is essentially betting on the cryptologic techniques. Though ancient searchable encoding schemes enable users to firmly search over encrypted knowledge through keywords mistreatment Boolean values. Thus there's a far urge is arises to check these systems that truly performs searching techniques and to search out their weakness. Many searching techniques square measure existed supported similarity, keyword matching, formal logic and plenty of a lot of ideas as mentioned during this paper. However most of them square measure concentrating on taking as many as a lot of documents for the given question. These techniques are literally will increase the time complexness of the searching techniques albeit they supply correct results. Read More...
|
Computer Engineering |
India |
69-74 |
19 |
A Review Paper of improvement in security of images using Genetic Technique
-Shekharan Deep Bindra ; Navneet Bawa
In the world of digital communication data is the heart of worldwide economy and computer networks. In this review paper the two techniques are combined to form a hybrid technique. Cryptography and steganography are two essential branches of information security. The purpose of both these is same but both are different. It is possible to combine the techniques by encrypting message using cryptography and then hiding the encrypted message using steganography. The main goal(s) of this research is To do communication in a secure manner and also to avoid drawing suspicion to the transmission of hidden data and To create a strong steganographic technique that can achieve high security & embedding capacity while maintaining image quality & imperceptibility. Read More...
|
Computer Science and Engineering |
India |
75-78 |
20 |
Significance of Eco-tourism as a Tool for Natural Resource Management in Kurseong Hill Area under Darjeeling District
-Dr. Rwitabrata Mallick ; Dr. Pranabes Sanyal; Prof. Anandadeb Mukhopadhyay
Eco-tourism is a form of tourism that appeals to our ecological and social consciousness. Kurseong, located in Darjeeling district at the northern part of West Bengal has optimum climatic ambience and some special attractions for the eco-tourists. Kurseong means “the land of white orchidâ€. Kurseong is a perfect place for people who want to derive the pleasure of being in an alpine surrounding without worrying about higher altitudes and bone-chilling cold weather. The serenity and beauty of Kurseong has attracted and inspired famous personalities in different times. Kurseong has tremendous natural resources, like water resources, agricultural resources, soil resources, mineral resources, forest resources and wild life resources. These resources are depleting in recent times and proper care should be taken immediately to preserve these natural resources and whatever resources utilisationtion is done, should be conducted sustainably. The only way to keep this beautiful hill station environmentally sound is to devise proper natural resource management along with eco-friendly tourism that can be achieved through several scientific approaches, proper management methodologies and proper communications among different departments concerned within the Kurseong hill area. Proper resource management programme will finally help to achieve sustainable eco development of this place. Read More...
|
Natural Sciences |
India |
79-82 |
21 |
30kW Cross linear solar concentration pilot project at RGPV Bhopal
-Sandeep Patidar ; Anurag Gour; Dr. Mukesh Pandey
A New revolutionary system for producing unconventional energy in near future is Cross Linear (CL) system has been newly researched and manipulated by Indo-Japan team. The contemporary facts available with respect to conventional sources of energy, it become mandatory for taking some game changing steps in the field of renewable energy sector specially in solar energy. The energy crisis is always a big problem that the world’s is facing today. Governments and concerned authority are working to make the use of renewable resources a precedence. As far as in renewable energy is concerned, solar is a dynamic field to approach CSP technology. Now this is the time to configure the CSP system by stabilizing some new technique. The CL-CSP project is one of game changing step in solar energy production. This paper is the analysis of how CL system can get rid of the end loss and increase the optical efficiency compared to Trough and LFR (Linear Fresnel Reflector system) and solar tower. This analysis is to solve the problems in the concentration systems and the lower concentration efficiency of Trough and LFR in the winter season; including a higher temperature around 550-600 °C can be obtained with the CL system. Read More...
|
Renewable Energy |
India |
83-88 |
22 |
Electro-Encephalogram Signal Acquisition, Analysis and Alert System for Epilepsy
-Arun Kumar V ; Niranjan K R
Aim of this project is to develop rescue system for the person suffering from epilepsy neurological disorder by measuring the EEG of the person. The Electro-encephalogram(EEG) is the brain signal containing valuable information of normal or epileptic state of the brain. During the event of epilepsy, the neurological activity of the brain is higher thereby increasing the surface potential. These potentials are measured continuously and analyzed with abnormal EEG of epilepsy by having the threshold value of the potential. An alarming message is sent to doctor or patient’s relative using GSM(Global system for Mobile Communication) when the person is found abnormal. The location of the patient is determined using GPS(Global Positioning System) for the rescue operation. Read More...
|
biomedical signal processing and instrumentation |
India |
89-91 |
23 |
Highly Efficient Micropropagation of Grand Naine Banana
-Ratnesh Kumar Singh ; Dr. Prashant Kumar Mishra
Efficient technique of micropropagation of the Grand Naine banana for the mass propagation has been developed. The explants were selected from the superior high yielding mother plants which were tested for viruses & Genetic fidelity. The sword suckers were selected as explants, trimmed properly to appropriate size, washed in detergent water followed by dipped in 70 % alcohol for 1 minute & after finally sterilized with 25 % Sodium hypochlorite for 15 to 20 minutes followed by distilled water wash for 4 to 5 times and finally treated with 0.1 % mercuric chloride for 5 to 7 minutes ,followed by distilled water wash, after proper sterilization the culture were inoculated in establishment medium with combination MS basal medium+ BAP, 2mg/l + Citric acid,40 mg/l + Sucrose, 20g/l + Agar, 5 gm/l. After successful establishment, the culture were transferred to Multiplication, medium with various trails of which trail code T8 (MS basal medium+ 4.5 mg/l BAP+ 0.45 mg/l IAA) was found the most appropriate for the efficient multiplication of cultures . For thin & week shoots elongation medium was tried with different combinations, out of them Trail code S2 was found the most appropriates for shoot elongation & healthy shoots in four week time. Well elongated shoot were directly rooted in rooting medium. For rooting, the trial code R2, MS basal medium ½ strength+ 1.5 mg/l IAA+ 0.3% activated charcoal, was found the best one. Finally the well rooted plants were taken for acclimatization. Initially plants were kept in high humidity of 90 % for primary hardening & then transferred to shade net house for the secondary hardening with different trails of potting mix out of them, the trail code H2 ( Cocopeat+Sand+vermicopost) in the the ratio of 2:1:1 ,was found the most suitable. The plants well developed in 2.5 months for field plantations. Read More...
|
Department of Botany |
India |
92-95 |
24 |
Soil Friability Its Effect on Soil Aggregate Stability
-P Anand ; Dr.Guruprasad Hugar; Md.Khaja Moniuddin; S B Jagdish
In many parts of the world the shrink-swell characteristics of fine-grained material is of considerable importance and of potential economic significance. Expansive soils cause significant damage to structures and roadways by cyclically shrinking and swelling within the active zone, which is defined as the depth in a soil to which periodic changes of moisture occurs. The term ‘soil friability’ has been defined as the tendency of a mass of unconfined soil in bulk to crumble and break down under applied stress into smaller fragments, aggregates and individual soil particles. There is a general concern that low soil organic carbon (SOC) contents may deteriorate soil physical properties. This study has been conducted to illustrate the effect of SOC on soils shrinkage limit (Ws) and friability index (FI) upon four of the arid soils namely black cotton, red, marshy and mountainous soils obtained from organic farms of the study area. Wastes like humus, pressmud, bagasseash and flyash were used as a source of SOC to amend with the soils. SOC inputs were made volumetrically up to 70% in the increments of 10% of the soil columns; there was also a control column without any external addition of SOC. The relation between SOC, shrinkage limits and friability index was analyzed by series of experiments carried in triplicate in three different phases based on the mode of application of SOC. Natural soil was amended with humus, bagasseash, flyash, pressmud to the percentage of 0 to 40 for first phase, 0 to 70 for second phase and laying of amended materials on the natural soil for the third phase. Which are test for 0, 7, 14, 21 and 28 days respectively. The friability index (FI) was tested for black cotton soil whose value increases from 0.20% to 6.32% at 40% pressmud amended with a natural soil where by the values increase from 1.59% to 16.81% at 40% pressmud for the red soil and also the values increase from 0.73%to 13.77% at 70% pressmud amended with natural soil. Read More...
|
Civil Engineering |
India |
96-107 |
25 |
Android Based Application for Tracking of Nearest Hospital and Emergency Healthcare System
-Pankaj Prasad Raje ; Pankaj Raje; Alpesh Nandola; Dhiraj Bhujbal; Avadhut Batwal
It has been noticed that there is remarkable of Electronic Health Record in Healthcare Management System, because people have experienced injury or sudden health conditions however, because of inconvenient transport or traffic controls, some of the injured peoples could not reach hospitals promptly, eventually dying. To reduce the time required for people to reach emergency care services and avert the above tragedies, an “Emergency Medical System†has developed. Emergency Medical System (EMS) is a comprehensive approach to emergency medical treatment in some medical emergency. It also describes a mobile system that allows electronic healthcare data storage, update and retrieval using Cloud Computing. This is an application in which the user would have to just press single click. Soon the device will send an emergency notification to a nearest hospital, the exact current position. When the doctor or family receives the notification, they can immediately take measures to rescue the user. It can also organize the health record of the user. The user can take online medical to send their physical situation and then get prescription from doctor who will send the prescription on the user's phone. This paper elaborates the enhanced Android based Tracking for Emergency Medical System (EMS) on cloud. Read More...
|
Computer Engineering |
India |
108-111 |
26 |
Machine Health Monitoring and Control System using LabVIEW
-Pritee V. Nikam ; K. Sujatha
Automation is the need of today’s world. In this paper we are going to propose a real time monitoring and control system to improve and maintain health of machines in huge industries. As health monitoring of machine is very important to increase performance and quality of products with reducing maintenance cost. Entire plant can be monitor on single HMI. This system is intelligently designed to control and gives error and security alarm indications. It can improve performance and provides flexibility. This system provides simple and low cost solution with graphical representation. With the advances of electronics and software technologies monitoring and control systems are widely used and popular in industries. LabVIEW provides easy solution for this system. Various sensors inputs are connected to microcontroller board and using MODBUS in rtu mode data get transfer to LabVIEW installed on pc which can be connected to HMI. This system consists of master slave configuration. Read More...
|
Electronics & Communication Engineering |
India |
112-114 |
27 |
Massive Open Online Courses: Challenges and Opportunities for Education in India
-Agughasi Victor Ikechukwu ; Thampan, A V
In the era of technology and globalization, there has been increased access to higher education especially in developed countries and it is expected that as the number of opportunities increases, the tendency for new uncertainties and challenges also increases. In recent years, a simple Google search on MOOCs will return several thousands of links owing to the fact that the concept of online learning has expanded to include a growing number of Massive Online Open Courses (MOOCs). MOOCs, a recent trend in distance learning has swept across Europe and America like an avalanche coupled to the fact that all prestigious universities and reputed institutes across the world are actively involved. Since its inception, there have been web portal (such as edX, Udacity etc) that offer courses for free or with little fee. These courses follow formats that have open ended time schedules and ones that are available for a span of a regular semester. The marvel of this type of instruction is that the course instructors could be tenured professors from prestigious institutions or student turned teachers. This research examines the rise of MOOCs with a review of its history and characteristics. We will describe a MOOC project service attempted by one of the authors and the related observations regarding challenges that are India specific. The paper will examine how MOOCs can enhance accessibility, student engagement, and experiences for lifelong learning. It will also look at how usage of specific technologies, can empower educators and students: we will specifically use examples from Physics education. The authors will also suggest how some applications when embedded into a regular face to face course can increase effectiveness of instructions and how cloud services can enable instructors to reach out to students beyond regular class to increase effectiveness of instructions. Challenges for learners and institutions are examined: for individual instruction, student performance assessment, and long-term administration, and oversight of these types of courses. Findings and suggestions especially in the area of SPOCs (Small Private Online Courses) will also be discussed and recommended where necessary. We will also attempt to showcase a pilot project related to computer intensive educational material in the field of Physics and Computer Science. Read More...
|
Computer Science |
India |
115-119 |
28 |
Review on Design and Development of Advanced Chulha
-Mohite Rahul Nanasaheb ; Suryawanshi Abhijit Vijaykumar; Alai Bhushan Sanjay; Mane Shantanu Sanjiv; Munfan Prashant Sarjerao
Now days, the world is upgrading with innovative techniques which provide the ease for performing required task to get complete. For each kind of work, energy is essential & the consumption of energy is most considerable fact which plays an important role for any equipment. On the basis of this we are trying to develop an appliance which will utilize the heat energy at its maximum extent than the conventional methods. This appliance will be more utilizable where the energy recourses like coal & farm wastage are used. By designing it in the proper manner, we can reduce the pollutant particles at maximum level & can make it environment & user friendly. Read More...
|
DOMESTIC PURPOSE ENGINEERING/ TODAY'S NEED |
India |
120-123 |
29 |
Spectral Efficiency Performance of MIMO with Orthogonal Space Time Block Code Using FEC and Various Modulation Techniques
-Pratik Jain
The WiMAX (Worldwide Interoperability for Microwaves Access) is a broadband wireless data communication technology based around the IEEE 802.16 standard providing high-speed data communication over a wide area along with cost effective access. MIMO-OFDM technology is a combination of multiple-input multiple-output (MIMO) wireless technology with orthogonal frequency division multiplexing (OFDM) that has been recognized as one of the most promising techniques to support high data rate and high performance in different channel conditions. Alamouti’s space time block coding scheme for MIMO system has drawn much attention in wireless technologies just because of its decoding simplicity. Read More...
|
Electronics & Communication Engineering |
India |
124-126 |
30 |
Design, Analysis & Optimization of Pivot of Rocker Arm
-Ambare Amol Dattatraya ; Dr.Sanjay B. Zope; Prof. Amol R. Patil
Rocker arms are part of the valve-actuating mechanism. Over the years rocker arms have been optimized in its design and material for better performance. Durability, toughness, high dimension stability, wear resistance, strength and cost of materials as well as economic factors are the reasons for optimization of rocker arm. Various types of rocker arm used in vehicles and different materials used for making rocker arm are studied in this paper. Failure of rocker arm is a measure concern as it is one of the important components of push rod IC engines. Present work finds the various stresses under extreme load condition. For this we are modeling the arm using design software and the stressed regions are found out using Ansys software. Rocker arm is the important component of engine assembly in this paper we consider rocker arm and through the literature finite element analysis(FEA)in ANSYS is done for five different material viz. Aluminum alloy, chromium molybdenum, grey cast iron, HSS, structural steel. The result of ANSYS shows that structural steel is the best material for rocker arm. The result of software is validated experimentally by tensile test on UTM, brinell test on hardness tester and microstructural analysis. Read More...
|
Mechanical Engineering |
India |
127-131 |
31 |
BER Performance of MIMO with Orthogonal Space Time Block Code Using FEC and Various Modulation Techniques
-Pratik Jain
The WiMAX (Worldwide Interoperability for Microwaves Access) is a broadband wireless data communication technology based around the IEEE 802.16 standard providing high-speed data communication over a wide area along with cost effective access. MIMO-OFDM technology is a combination of multiple-input multiple-output (MIMO) wireless technology with orthogonal frequency division multiplexing (OFDM) that has been recognized as one of the most promising techniques to support high data rate and high performance in different channel conditions. Alamouti’s space time block coding scheme for MIMO system has drawn much attention in wireless technologies just because of its decoding simplicity. Read More...
|
Electronics & Communication Engineering |
India |
132-134 |
32 |
Virtual Exercise Using Kinect Sensor
-Hitesh Sanjay Shukla ; Hitesh Shukla; Dinesh Cholake; Sagar Mutha
Proposed system presents the event of a virtual trainer to be used by physiotherapists and patients in exercise based mostly physical therapy programs. System permits a expert to tailor exercise necessities to the specific wants and challenges of individual patients. Patients will choose completely different programs and follow a lecturer avatar to perform recorded exercises supported their wants. The Microsoft Kinect should be implementing as a way to trace user’s body movements. This allows immersive and natural interaction between the user and virtual tuition world. most significantly, the recorded skeletal joint information facilitates quantitative chemical analysis and feedback of patient’s body movements. Preliminary study shows the potential of using Kinect as a coffee price resolution for virtual physical therapy coaching reception or clinic settings. Most patients requiring neuro rehabilitation continue coaching reception while not direction of their therapists. They need troubles like loss of motivation, routine problem, and lack of a guide to execute a task. System proposes to support these patients with Associate in Nursing application that follows the Magic Mirror paradigm, employing a Natural computer programme and Microsoft Kinect. Read More...
|
Computer Engineering |
India |
135-137 |
33 |
RFID Based Traffic Sign Recognition
-Pratiksha Ghadge ; Pritam Kanase; Tejaswi pawar; Prof. R. A. Kharade
It is well known that the road signs play’s a vital role in road safety its ignorance results in accidents .This Paper proposes an Idea for road safety by using a RFID based traffic sign recognition system. By using it we can prevent the road risk up to a great extend. Read More...
|
Electronics & Communication Engineering |
India |
138-141 |
34 |
Study on various GDI techniques for low power, high speed Full adder design
-Haseeb Pasha ; Sangeeta Mangesh
This paper is an outcome of a survey on different full adders design methodologies using gate diffusion input technique. Gate diffusion input is a technique of low power digital combination design. This technique as compared to other currently used logic design styles, allows less power consumption and reduced propagation delay for low power design of combinational digital circuits with minimum number of transistor. A comparison is also made on the basis of power, delay and area to find out the best possible design technique. This paper presents a detail performance of GDI Based 1-bit Full Adder Circuit for Low Power Applications. Different techniques like GDI, PTL-GDI and GDI-MUX for the designing of full adder is reviewed. Read More...
|
VLSI |
India |
142-145 |
35 |
SmartDigger: A Two-stage Crawler for Efficiently Harvesting Deep-Web
-Vishal S Sancheti ; Asmita G Sarawade; Laxmi M Waghmare; Sanket D Rachcha; Prof. Pallavi Shejwal
As deep web grows at a very fast pace, there has been amplified interest in techniques that help proficiently locate deep-web interfaces. However, due to the large volume of web possessions and the dynamic nature of deep web, achieving wide coverage and high efficiency is a challenging matter. We propose a two-stage framework, namely SmartCrawler, for efficient harvesting unfathomable web interfaces. In the first stage, SmartCrawler performs site-based searching for heart pages with the help of search engines, avoiding visiting a huge amount of pages. To achieve more accurate results for a focused crawl, SmartCrawler position websites to prioritize highly pertinent ones for a given topic. In the second stage, SmartCrawler achieves fast in-site penetrating by excavating most relevant links with an adaptive link-ranking. To eliminate bias on visiting some highly relevant links in secreted web directories, we design a link tree data structure to achieve wider coverage for a website. Our investigational results on a set of delegate domains show the agility and accuracy of our proposed crawler framework, which proficiently retrieves deep-web interfaces from large-scale sites and achieves higher harvest rates than other crawlers results. Read More...
|
Computer Engineering |
India |
146-148 |
36 |
A Survey on Subgraph Matching Algorithm for Graph Database
-Maninder Kaur Rajput ; Dr. Prof. Snehal Kamalapur
Subgraph matching is a technique to retrieve subgraphs which are isomorphic to query graph. A graph S (VS, ES) is subgraph of graph G (VG, EG) if VS ⊆ VG and ES ⊆ EG. Subgraph matching is a process to fetch all subgraphs S (VS, ES) from graph G (VG, EG) which are structurally isomorphic to input graph I(VI, EI) using subgraph matching algorithm. Subgraph matching is a NP-hard. In real-world graphs such as semantic web, social networks, protein interaction and biological networks, subgraph matching will retrieve subgraphs which are isomorphic to query graph from data graph. Many subgraph matching algorithms have proposed in recent years, these algorithms aims to find desired results in less time for real datasets using information like join orders, pruning techniques and vertex neighbour information. Subgraph matching algorithms can be classified into two clases: exact and approximate matching algorithms. These two approaches are being described in survey. Read More...
|
Computer Engineering |
India |
149-152 |
37 |
Design of Steering System in Race Cars
-PUSHPAK ; GAURAV BIHANI; NIDHI NAIR; APARNA PATIL; Vivek V. Diware
Formula one cars deals with high speed and moderate down force. Under this dynamic condition, car needs to maintain maximum traction to use maximum torque generated at output of engine. This is achieved by appropriate design of steering system. The design begins with study of basic parameters, calculations giving required values, followed by analysis of various conditions. Then a prototype is made to find out flaws and feasibility, proceeded by material selection, analysis, manufacturing, design validation, final assembly, and testing. The design is then validated by measuring performance in terms of turning radius, turning angle and steering effort .Selection and design of steering system gives ease in manoeuvrability and best cornering ability and desired turning radius which leads to winning the race. Read More...
|
Mechanical Engineering |
India |
153-154 |
38 |
The study of effects of quarry dust on the strength of non-traffic paver block
-Aruna Yadav ; Sanjay Saraswat
Quarry dust is generated as a waste during the process of cutting and crushing. Crushing industry produces large amount of quarry dust which causes environmental problems. To reduce disposal and pollution problems the innovative use of quarry dust in concrete by replacing fine aggregate with this material is another alternative of the traditional concrete. The aim of this research is to replace sand by quarry dust accordingly in range of 0%, 10%, 20%, 30%, 40%, 50%, 60%, 70% for M30 grade concrete. This research is concerned with the experimental investigations on workability and strengths of concrete and optimum percentage of partial replacement of sand via 0%, 10%, 20%, 30%, 40%, 50%, 60%, 70% of quarry dust. Ultimately it was observed that the strength increases on replacing sand in concrete due to filler effect of quarry dust. Read More...
|
Civil Engineering |
India |
155-157 |
39 |
Intrusion Detection System Using Genetic Algorithm : A Survey
-Vaibhavi M Pandya ; Assi. Prof. Gargi Chauhan
Today, It is very important to provide a high level security to protect highly sensitive and private information. Intrusion Detection System is an essential technology in Network Security. Nowadays researchers have interested on intrusion detection system using Data mining techniques as an artful skill. So my aim is to use IDS system and improve the performance of the IDS. IDS is a software or hardware device that deals with attacks by collecting information from a variety of system and network sources, then analyzing symptoms of security problems. The main focus of Intrusion detection and prevention systems (IDPS) is to identify the possible incidents, logging information about them and in report attempts. But sometimes IDS is not able to detect some new attacks and vulnerabilities. The main aim of this paper is to provide the knowledge of the IDS and also gives the survey of genetic algorithm for IDS. So this paper provides basic knowledge of IDS system as well as how to use genetic algorithm for IDS and improve the future research. Read More...
|
Information Technology |
India |
158-164 |
40 |
An Efficient Secured System for Identifying Malicious Network Activity Using Scalable Honeypot
-Rahul Patil ; Ajinkya Virkud; Swapnil Miniyar; Ajay Sagar
Now a day’s in this world there are many malicious activities performed on internet or network. To prevent these IDS is used but in some cases it fails to capture intrusion. So we are using honeypot to prevent the malicious activity after IDS. Honeypot is system which is used capture the intrusion activity on network. Many organizations exert the honeypot to know the bound of attack on their network. In this paper, we are going to deploy several honeypot to grab the malicious activity. It can be easily exerted in many organizations without specialized hardware and cost effective. Read More...
|
Computer Engineering |
India |
165-166 |
41 |
Biological Treatment of Wastewater for Institutions Using Activated Sludge Process
-D.Sathiyasree Dhanasekaran ; R.Aswini Rajendiran
The wastewater generated from the canteen, mess, college hostel in were collected and analyzed. In the present study, an attempt has been made to evaluate the treatability of wastewaters using lab-scale activated sludge reactor under extended aeration. Studies on the efficiency of the activated sludge reactor were carried out by varying the solids retention time of 8,12 and 16days with various hydraulic retention time of 15,20,25 and 30h with an organic loading rate varying from 0.116 to 0.209 kg BOD/ m3/day. The study revealed that the wastewater is amenable for treatment using ASP, with treatment efficiency as high as 91% and the bio-kinetics arrived at showed, better stability of the system and enhanced microbial activities at longer HRT and SRT. Also the design values suggest that the extended aeration system is the appropriate activated sludge treatment method for wastewater treatment. Read More...
|
Civil Engineering |
India |
167-169 |
42 |
A Survey Paper on Video Steganography
-Ankita Patel ; Ajay Barot
In today’s world security become a major issue, so it is very important to hide the data in such a way that attacker cannot access it. Data is mostly in form of text, image, audio and video. So steganography is a best scheme for hiding the data from attacker. Steganography is a one type of algorithm that can be applied on text, image, audio and video file and the secret data generally in form of text, image, audio and video. The method of hiding secret information in video file is called video steganography. In this paper a review on different video steganography technique are discussed. Different spatial domain, frequency domain techniques of video steganography have been presented in this paper. Read More...
|
Computer Engineering |
India |
170-173 |
43 |
Intrusion Detection System for Mobile Ad-hoc Networks: A Survey
-Nupur Shah
Today it is very important to provide a high level security to protect highly sensitive and private information. Intrusion Detection System is an essential technology in Network Security. Nowadays researchers have interested on intrusion detection system using Data mining techniques as an artful skill. So my aim is to use IDS system and improve the performance of the IDS. IDS is a software or hardware device that deals with attacks by collecting information from a variety of system and network sources, then analyzing symptoms of security problems. The main focus of Intrusion detection and prevention systems (IDPS) is to identify the possible incidents, logging information about them and in report attempts. But sometimes IDS is not able to detect some new attacks and vulnerabilities. The main aim of this report is to provide the knowledge of the IDS and also gives the survey of specification-based IDS in wireless ad-hoc network. So this report provides basic knowledge of IDS system as well as how to use MANET protocol for IDS and improve the performance of IDS and future research. Read More...
|
Information Technology |
India |
174-178 |
44 |
Experimental Investigation of Welder Modification at PLTCM
-Vijay Kumar B H ; Jagannath Reddy
The CRM II complex with a capacity of 2.3 MTPA of cold rolled products in the width range of 800 to 1870 mm and in the thickness range of 0.3 to 2.6 mm. cold rolled products can be offered in the various qualities like deep drawing, extra deep drawing quality and high strength steels. Firstly, PL-TCM line, a mix of Pickling line and Tandem Cold Mill does pickling and moving utilizing Hydrochloric corrosive and TCM separately. The PL-TCM having limit of 2.3 MTPA is supplied by SMS-Siemag, Germany while the computerization is finished by TMEICUSA. It is watched that in the investigation of existing procedure strip breakage was happening too extensive from that breakage curl will be squandered and time taken for procedure is more which impact the creation of loop. So to lessen this impact and issues we need to study to examination the booking rules, emulsion oil parameter and welder alteration. What's more, henceforth the venture work focused on study to expand generation by setting an objective to deliver roughly 300 tons/hour which is all the more then 260 tons/hour prior. The methodologies are used to solve the present problem and to reach the objectives of the problems. Studying the production process of PLTCM , Note down the facts in the process. Recorded data is examined. Find the root causes of the problem. Improving the new process / develop the new method for the problem. Evaluate the modified process. Implement the new method. The essential goal of the venture is to build the creation and distinguish the causes and tackle the breakage at welder area to propose new strategy that is welder change to lessen the postponement and misuse of material. To concentrate on the procedure included in the PLTCM. To discover the main driver for breakage of curl at welder segment. To examination of planning principles inside of the accessibility of crude material given by HR stock. To change the welder supplies. To investigation the emulsion oil parameters, causes, move to be made and Reduce the creation cost and time by diminishing the breakage of loop and enhancing the nature of the item. Read More...
|
Mechanical Engineering |
India |
179-182 |
45 |
A Review on Reconfigurable PLC Development, Synthesis & Implementation for Industrial Application
-Paramveer Prabhakar Teli ; P. C.Bhaskar
Although PLCs are widely used in industrial applications, their performance does not always meet the requirements of today’s complex industrial applications. With FPGA technology, it is easier to implement PLC control programs into FPGAs for higher performance in terms of speed and accuracy. Implementation of PLC on FPGA leads to miniaturization of space required to install control circuitry on machine. Reconfigurable nature of FPGA allows designer to change, modify or add a PLC control program as many times as required. PLCs based on FPGA technology can fulfill the requirements of today’s industrial applications. Read More...
|
VLSI |
India |
183-184 |
46 |
A Review on Reconfigurable Multisoft core architecture on FPGA
-Pooja Hanmant Mane
To achieve the high performance of multimedia applications, multiple processing units are required which are integrated into embedded systems. soft core processors and field programmable gate arrays (FPGAs) are a cheap and fast option to develop and test such systems. There are many platforms on which architecture is implemented, but still performance of the system is not that much of efficient. Reconfigurable platform is one of the best platforms for designing the new system. Read More...
|
Electronics Engineering |
India |
185-186 |
47 |
Comparative Network Intrusion Detection technique DPI-AD for Regular Expression Detection in wireless Ad-hoc network.
-Girish M. Wandhare ; Prof. S. N. Gujar; Dr. V. M. Thakare
DPI-AD is a deep packet inspection technique for regular expression detection in wireless network. This technique design in the base of LaFA technique, which is use to detect regular expression of attacks on wireless network. DPI-AD used DDOS attack filter for detection of DOS attack. Regular expression detection module used to detect regular expression pattern for various attacks. LaFA uses pattern matching in simple detection and complex detection module which require more time for detection of attack pattern for regular expression attacks. The detection technique in LaFA detect cross site scripting (XSS) attack, where the SQL injection attack cannot be blocked. The DPI-AD recovers all its limitations and additionally it gives better detection results. For the testing purpose of this techniques Sql injection attack, XSS attack and DOS attack tests are done on DPI-AD. Other Regular expression techniques also discuss with compare to DPI-AD. Read More...
|
Information Technology |
India |
187-194 |
48 |
A Review on Skirt to Dished end Joint of Pressure Vessel
-Gaurang A Parmar ; Mau Badi; Prof.M.M.Makwana
In pressure vessel at the junction of skirt to head (Dished end) are subjected to a combination of thermal stress and structural stress. Due to excessive temperature gradient at junction in hot operating cases can cause unpredicted high thermal stresses and high pressure cause high structural stresses which makes design of vessel critical. Then fracture of the vessel may occur as a result of cyclic operation. So motive of this paper is to reviewing different research paper on skirt to head joint and finding different causes and parameter of crack generation. Read More...
|
Mechanical Engineering |
India |
195-198 |
49 |
Enhancing the Efficiency of the Website by Mining Web Server Log Files
-Jigar H. Jobanputra ; Banshi D. Soni
Web mining - is the application of data mining techniques to discover patterns from the World Wide Web. Web mining can be divided into three different types – Web usage mining, Web content mining and Web structure mining. Web usage mining is the technique that mines the web log. Usage data captures the identity or origin of Web users along with their browsing behavior at a Web site. The web log can be examined by either the client side or server side. In order to gain better efficiency, we can use server web log. It contains many useful information such as name of user, IP Address, number of bytes transferred timestamp, URL etc, so it is very useful in analysis of user behavior and from that it is also useful in the effective maintenance of website. A web server log file is the pool of huge data about client’s behavior. In order to increase the efficiency of a website, the website owner should study the user’s interest. This can be traced using Web Log Expert or other web mining tools. Web Log Expert is the tool that creates the quick report based on server log file of any website. In this paper we have studied the web log file of a jewellery website and extracted useful patterns of the user interest. Read More...
|
Computer Science |
India |
199-202 |
50 |
A Review on Common Encryption Techniques to Brute Force Shielded Technique: Honey Encryption
-Taunk Mayur G ; Laxmi Saraswat
In today’s era of information technology beginning from social network to most complex and secure transactions are going on the internet, when the internet technology begun it was accompanied by data threats and security breaches, then came the cryptography algorithms which were good enough to protect the treats and breaches, as the time elapsed we are in a era where straightforward mathematical cryptography techniques are not enough to secure our transactions/data on network, a new tricky technology is needed. This paper presents the straightforward algorithms and the attacks which they are vulnerable to and a review of a tricky cryptography algorithm Honey Encryption. Read More...
|
Computer Engineering |
India |
203-204 |