No. |
Title and Author |
Area |
Country |
Page |
201 |
Vernacular architecture in cold and dry climate: ladakh-a case study
-Ar. Abhimanyu Sharma ; Ar. Snehal Sharma
In the age of globalization and industrialization, the world is proceeding with the new techniques in all the fields. Cultural heritage is the gift of physical artifacts and insubstantial attributes of a group or society that are inherited from past generations, sustained in the present and bestowed for the benefit of future generations. The paper present on the Vernacular Architecture of Ladakh, which people are forgetting in today’s time and adapting the modern techniques of construction, which is not blending with the local architecture of Ladakh in terms of aesthetics and climate. Moreover, the existing old structures needs to be restored and maintained to retain the sanctity of Vernacular Architecture of Ladakh. All effort is done for grading of heritage buildings for effective protection and conservation of heritage monuments. Read More...
|
Architecture & Planning |
India |
767-769 |
202 |
Air Quality and health impacts: A Review
-Nidhi Dwivedi ; MJA Siddiqui
Rapid urbanization has resulted in increasing air pollution emissions due to transportation, energy production and industrial activity, all concentrated in densely populated areas. There has also been emerging evidence of PM-related cardiovascular health effects and growing knowledge regarding interconnected general pathophysiological pathways that link PM exposure with cardiopulmonary morbidity and mortality. Air quality indices are used for local and regional air quality management in many metro cities of the world. Several concepts and indicators exist to measure and rank urban areas in terms of their socio-economic infrastructural and environment related parameters.). The direct and indirect adverse effects caused by atmospheric pollution on the environment and human health necessitate the measurement and reporting of air quality on local, regional and global scales.in developed countries the measuring and monitoring of air quality is done on priority basis whereas in developing countries less emphasis is placed on environmental issues, because resources are mostly utilized for economic growth. This review focuses on the effects of air pollutant on human health. There has also been emerging evidence of PM-related cardiovascular health effects. Read More...
|
Environment Engineering |
India |
770-772 |
203 |
A New Approach for Generation of Test Program for Detection of Hardware Fault in VLIW Processor
-Mani S ; Nikil Satish
Very long instruction word processors are increasingly employed in a large range of embedded signal processing which is provide high performances with reduced clock rate and power consumption. Software-based self-test (SBST) methods are consolidated and effective solution to detect faults in the processors both at the end of the production phase or operational life. In this report we present a new method for automatic generation of efficient test programs specifically oriented to VLIW processors. The proposed method based on generic SBST algorithms automatically generates effective test programs. It is able to reach the detect fault, while minimizing the test duration and test code size. The method consists of four types of methods and can deal with different VLIW processor models. The main goal of the project is to show that in the case of VLIW processors, it is automatically generate an effective test program able to detect fault with minimal test time and required resources. Read More...
|
VLSI |
India |
773-777 |
204 |
CFD Simulation of Heat Transfer in (STHE) Shell and Tube Heat Exchanger
-Rahul Singh ; Divyank Dubey; Harishchandra Thakur
Computational Fluid Dynamic (CFD) is a useful tool in solving and analyzing problems which involve fluid flows, while shell and tube heat exchanger is the most common type of heat exchanger and widely used in oil refinery and Auto mobile industries and other large chemical processes because it suit for high pressure and temperature application. The processes in solving the simulation consist of modeling and meshing the basic geometry of shell and tube heat exchanger using the CFD package ANSYS 14.5 meshing. Then, the boundary condition will be set before been simulate in Fluent 14.5 based on the experimental parameters. Parameter that had been used were constant mass flow rate of cold water and varies with mass flow rate at 0.0177 kg/s, 0.0089kg/s of hot water. Thus, this research presents the simulation of heat transfer in (STHE) shell and tube heat exchanger model and validates the heat transfer in Shell and Tube Heat Exchanger using baffles or without baffles making the flow counter and parallel. The CFD model is validated by comparison to the experimental results within less error. Read More...
|
THERMAL ENGINEERING |
India |
778-782 |
205 |
Foot Step Power Generation Using Piezoelectric Material
-Arati Laxman Salunkhe ; Mathane Nitashree Vinayak; Gaikwad Sayali Shashikant; Yadav Priyanka Dinkar
Power generation and its use is one of the issues. Now-a-days numbers of power sources are present non-renewable & renewable, but still we can’t overcome our power needs. Among these human population is one of the resources. In this project we are doing generation of power by walking or running. Power can be generated by walking on the stairs. The generated power will be stored and then we can use it for domestic purpose. This system can be installed at homes, schools, colleges, where the people move around the clock. When people walk on the steps or that of platform, power is generated by using weight of person. The control mechanism carries piezoelectric sensor, this mechanical energy applied on the crystal into electrical energy. When there is some vibrations, stress or straining force exert by foot on flat platform. It can be used for charging devices e.g. laptop, mobile, etc. The generated power is first applied to booster and output from piezoelectric is increased and given to the battery through unidirectional current controller and ac ripple neutralizer. Output from battery is used for various applications using inverter to convert DC into AC. In this paper we are discussing about applications and generations of electricity in the area of power harvesting. Read More...
|
Electronics & Communication Engineering |
India |
783-786 |
206 |
Arm Based Temperature Monitoring and Control of Dairy Plant Using LABVIEW
-P.Gopalakirshnan ; B.Sasikumar
In diary product industries monitoring and control of temperature and adding of fat content are major processes which need maximum attention. This project proposes monitoring of temperature and control by using ARM processor. This proposed methodology is designed and implemented using embedded system which monitors and controls the temperature when it varies above or below the predefined values by operating the valve automatically and conveys messages to the appropriate personalities through GSM. The fat content to be added to produce required category of milk is done manually which increases processing time. That can be reduced by making the system automation using sensors which indirectly increases the productivity by reducing processing time and gives better accuracy. The waste milk is stored in a separate tank for required number of days in order to settle the added fat content at the bottom of the tank. Then the waste milk is disposed based on the viscous level which is sensed by the viscosity sensor. The viscous level is monitored and message is conveyed to the appropriate personalities through GSM when it reaches the required level and the waste milk will be disposed. Proposed system provides an efficient solution for automating the milk processes which is being done manually now using ARM processor. Read More...
|
embedded system technologies |
India |
787-790 |
207 |
CFD Analysis of Shell and Tube Heat Exchanger
-Rahul Singh ; Divyank Dubey; Harishchandra Thakur
A heat exchangers of water is proposed with simplified model for the study of thermal analysis of shell-and-tubes. Shell and Tube heat exchangers are having special significance in boilers, Power plants, condensers, turbines. This research work focus on computational fluid dynamics analysis of shell and tube heat exchanger. In this research work we have shown how the heat transmission rate change by changing the flow of water it will be counter flow or parallel flow with varying its molding design. The 3D modeling of the shell and tube heat exchanger is designed in INVENTER PROFESSIONAL and its analysis is done in ANSYS-FLUENT 14.5 and 15. We make the design better by providing the fin of circular shape with baffles and without baffles making the flow counter and parallel. During the 400mm segment of the shell we provide 84 fins and 4 baffles with 7 tubes which make the heat exchanger performance better than ordinary shell and tube Heat exchanger. The Results Shows that the Maximum heat transmission take place in the circular fin with baffle having the counter flow of the water, which provide more time for the flow of water for heat transmission in a wavy form and large surface area for the heat dissipation for the cooling of water. Read More...
|
THERMAL ENGINEERING |
India |
791-796 |
208 |
Velocity Analysis of EGTs: Lever Analogy Method
-Ch. Vinay Kumar Reddy ; Dr. I. Rajasri
In an automobile or any other such system transmission unit is used to transfer power from engine crankshaft to the drive wheel through reduction unit and differential. Epicyclic Gear Trains (EGTs) are used to achieve the desired speed ratios or reduction ratios with compact arrangement. For all generated non-isomorphic EGTs of given number of links and Degree of Freedom (DOF), kinematic analysis is done to compare their gear ratios, power or torque distribution. In this paper Lever Analogy method is used to analyse the velocity of EGTs. Read More...
|
Mechanical Engineering |
India |
797-799 |
209 |
Optimization of Hypo Sludge Ash in Design Mix Concrete
-Apurv Pradip Kadu ; Asst Prof. V. K. Gajghate
The waste produced by paper mill industries is being dumped at greater extent now-a-days, so the use of this waste for the beneficial causes could help to minimize the risk of degradation of environment. This paper deals with the waste produced from the paper mill industry in terms of Hypo Sludge Ash (HSA) as a replacement to cement. This Hypo Sludge Ash is used as a replacement to cement in varying proportions such as 0%,5%,10%,15%,20% and very convincing results were obtained. M-25 grade concrete is used and accordingly mix design is prepared. Two tests are performed for testing the efficiency of concrete. Concrete cubes of size 150*150*150mm is prepared for calculation of compressive test using compression testing machine (CTM), with curing at 7,14, 28 days and concrete beams of size 100*100*500 mm is prepared for Flexural testing using Flexural Testing Machine (FTM) for curing at 28 days. It was found that compressive strength and flexural strength increased at 5%, 10% replacement of cement with Hypo Sludge Ash. Read More...
|
Structural Engineering |
India |
800-803 |
210 |
File Security using Decoy Passwords
-Tushar Girish Joshi ; Dinesh Dattaram Dhokale; Sudam Haridas Wanve
In this paper, we've projected honey words (decoy passwords) to observe attacks against hashed password databases. For every user account, the legitimate password is hold on with many honey words so as to sense impersonation. If honey words are chosen properly, a cyber-attacker who steals a ï¬le of hashed passwords cannot be certain if it's the real password or a honey word for any account. Moreover, getting into with a honey word to login can trigger an alarm notifying the administrator a couple of password ï¬le breach. At the expense of increasing the storage demand by twenty times, the authors introduce a straightforward and effective answer to the detection of password ï¬le revealing events [5]. During this study, we tend to scrutinize the honey word system and present some remarks to focus on attainable weak points. Also, we advise another approach that selects the honey words from existing user passwords within the system so as to supply realistic honey words a perfectly flat honey word generation technique and also to cut back storage price of the honey word scheme. This Honey words idea was originally projected by 2 mortal Juels and Rivest to discover attacks against hashed password databases. Read More...
|
Information Technology |
India |
804-807 |
211 |
A Review on Soil Solarization: Non-Chemical Method for Controlling Weeds & Soil Born Disease
-P.M.Chauhan ; I.U. Dhruj
Soil Solarization is the method of heating soil by covering it with thin (25-100 micron) transparent polyethylene sheet during hottest period of the year for at least 4-6 weeks to reduce soil born pathogens, pests and control weed population. In this paper literature relevant to the usefulness of the process and proper procedure for conducting the process has been reviewed. The review includes broad topics principles of soil solarization, factors effecting soil temperature, effect of soil solarization on weed & plant diseases control and crop growth & yield. It has been reported that soil solarization also helps in process like seed germination, seedling emergence, root development, nutrient uptake and the microbial activity. It is non-chemical method hence non-hazardous to the users and does not involve substances toxic to the consumer, to the host plant or to the other organism. Read More...
|
Agricultural Engineering |
India |
808-811 |
212 |
The Domestic Solid Waste Management System With Particular Focus On Dangamvura 3 High Density Suburb, City Of Mutare, Manicaland Province
-Eric S.M.S. Makura ; Gerald Chikandiwa; Elizabeth Chikwiri
This study was concerned with determining the effectiveness of domestic solid waste management system of Dangamvura 3 High Density Suburb, City of Mutare. Research participants were randomly selected. The study used the Mixed Methods Methodological Approach, and adopted the Case Study Research Design. Data was collected through the use of questionnaires, observations, and guided interviews, and documentary analysis. The study found that domestic solid waste management system was inefficient and ineffective, and above all grossly inadequate. Consequently, they were environmental-health risks, such as dysentery and malaria. The study found that the inefficiency of the management system was largely due to financial and human resources. Read More...
|
Education |
Zimbabwe |
812-814 |
213 |
Dc Motor Using a PID Controller in LABVIEW with ARDUINO
-G.Vijayalakshmi ; M.S.Nandhini; R.Diviya; L.Sangeetha
PID is widely common for a feedback used in a control system process. It is also used for an industries & techniques. This application is mainly used to determine the speed Control of a Dc motor. It can be lead to instability of a closed loop control system. Mainly, our paper how DC motor can be controlled by using a PID controller in LABVIEW. A Motor, will be interface with LABIEW software using an arduino Uno board kit. It will be mostly plays a role in data acquisition board. Actually, Speed of a Dc motor will be set by created a graphic user interface for PID controller in LABVIEW Software. Here, the software it will be turn pass this speed to dc motor using a PWM pins on the arduino board. Tachometer is a sensor which measure the speed of revolutions. From a tachometer the output is sent back of a PID controller using arduino Uno board kit. Suppose, the speed will not be same mean the controller will be try to minimize the error and bring a motor to set point value Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
815-818 |
214 |
A Literature Review on Supply Chain Management Enablers in Manufacturing Organization
-Parmar Vishal ; Prof H.G.Shah
Aim of this study is to provide importance of information sharing enablers of supply chain management in manufacturing organization through systematic literature review of past ten years. Information sharing is important vision of co-ordination among all supply chain partners in manufacturing organization. Information sharing can reduce lead time, bull whip effect, and unnecessary production and improve performance of organization. Information sharing is power in manufacturing organization, supply chain efficiency is important in growing competitive environment among supply chain partners in manufacturing organization Read More...
|
advance manufacturing system |
India |
819-828 |
215 |
Modern Development of Smart Antennas: A Study and Suggested Remedies
-S.Kannadhasan ; Dr.A.C.Shagar; M.Deviha
This paper presents the design and development of antennas for various applications with suitable frequencies. With the development of many different wireless communication standards to design the antenna is an important role of communications. A suitable antenna design technique is as an important role in recent world for the wireless applications such as Global Positioning System (GPS), Worldwide Interoperability for Microwave Access (WIMAX) and Wireless Area Network Standards (WLAN). The antenna should have low profile, light weight and easy to fabricate for broadband characteristics. Also, it should have very good performance in impedance bandwidth, radiation efficiency, gain, return loss and electromagnetic interference. Read More...
|
Electronics & Communication Engineering |
India |
829-831 |
216 |
Analysis of Capacity Optimization Using Relaying & Jamming in wanet
-Muthamil Sudar.K ; Arulprakash. P; Aanandha Nachiar. K
A wireless ad hoc network (WANET) is a type of wireless network in which some nodes are self-organized in a wireless local area network. The problem of secure cooperative communication is still critical. The main aim of this paper is to exploit physical layer security to provide secure cooperative communication for wireless ad hoc networks (WANETs) where involve multiple source-destination pairs and malicious eavesdroppers. Multiple relay nodes can be assigned between source-destination pairs to achieve physical layer security. A node evaluates the neighbouring nodes in order to reduce the untrusted routes by using relay assignment scan. Thus, it could reduce the damage away from the insider threats in a WANET. By this way, we proposed model provide secure cooperative communication for WANETs via cooperative relaying and jamming. Read More...
|
Computer Science and Engineering |
India |
832-835 |
217 |
Android Multi-User Pattern Lock Based Authentication System
-Shubham Shetye ; Lucky Rathod; Aquib Sayed; Sahil Rathi
This electronic document gives the overview of Advanced Pattern Based Authentication System. This is an android application which have pattern based authentication with advantage of overlapping the pattern points 5 times each at a time. So, this is how the security of the mobile phone is maintained. Read More...
|
Computer Engineering |
India |
836-838 |
218 |
Comparison of Chemical Composition of Essential Oils from Aerial Parts of Mentha Pipreta L. Using Hydrodistillation, Microwave-Assisted Hydrodistillation and Solvent Free Microwave Extraction
-Deepak Gupta ; Hemant Tandon; Shalini Gupta
In this present work, chemical composition of essential oils of Mentha pipreta L. cultivated grown in region Ait district Jalaun of Uttar Pradesh province (in north india) were resolute by capillary gas chromatography (GC), gas chromatography and mass spectrometry (GC/MS). contented and composition of the Mentha pipreta L. obtained by hydrodistillation (HD), microwave assisted hydrodistillation (MAHD) and solvent free microwave extraction (SFME) were compared. The major components in three methods were the same but the relative amounts of the individual components have wide-ranging. The major components were found in HD, MAHD and SFME, α –Pinene (1.4%,1.5%,1.4%), β-Pinene (2.3%,2.5%,2.4%%), 1, 8 Cineole (7.2%,8.2%,7.1%), Menthyl acetate (6.54%,6.8%,6.25%), Menthol (39%,32%,30%), Germacrene D (1.2%,1.4%,1.1%) and α- Humulene (4.6 %, 4.7%, 4.6 %) respectively. This is the first report evaluatethe chemical composition and comparison of three methods for the extraction (essential oil) compounds of this species. Read More...
|
Environment Engineering |
India |
839-841 |
219 |
Heat Pipe Technology: A Laptop Heat Pipe System
-Prerna S. Borkar ; Piyush M. Sirsat; Sonam V. Sontakke; Pranil V. Sawalakhe; V. S. Shende
Solar energy is a very large, inexhaustible source of energy. The power from the sun intercepted but the earth is tremendously larger than the present consumption rate on the earth of all commercial energy sources.This solar water heater can be used in the region where the salt content in the water is more. scale formation in collector tubes in conventional solar water heater which would reduce its efficiency. To overcome this drawback of conventional water heater we have put heat pipe as a heat collector and heat transfer medium to water .As we not need hot water continuously for 24 hrs. . In remaining time system has to perform some other function.so we have integrated the water heating with distillation unit so that we can get hot water as well as distilled water. Read More...
|
Mechanical Engineering |
India |
842-844 |
220 |
Power Factor Compensation
-Avesh Mishra ; Umair Khan; Uzair Khan; Faisal Kazi
The rapid development of industrial technology and the related machines now days requires a great deal of electricity, that in result causes a lot of electric energy consumption that results in increase in their electricity bills. This paper is designed to make a project that will reduce the power loss in industries by power factor compensation through a number of shunt capacitors. Read More...
|
Computer Science and Engineering |
India |
845-849 |
221 |
A Review of Different Delay Locked Loop Based Clock Generators
-Anupama ; Dr. Soni Changlani; Ayoush Johari
In this paper we present a review of different Delay Locked Loop (DLL) based clock generator circuits. The paper briefly discusses concept of DLL and different key parameters which determine the performance of these delay locking circuits. DLL finds vast applications in communication systems and digital logic circuits. Here we have confined our study to clock generation application only. Basic idea and comparison of some of the clock generation circuits and their comparison has been carried out to find out the factors where improvement is required. Read More...
|
Electronics & Communication Engineering |
India |
850-852 |
222 |
Design and Fabrication of Jigs and Fixtures for Drilling Operation
-Midhun.R ; Vignesh.A
Mass production aims at high productivity to reduce unit cost, and interchange ability to facilitate easy assembly. This necessitates production devices to increase the rate of manufacture and inspection devices to speed up inspection procedure. Jigs are provided with tool guiding element such as drill bushes. These direct the tool to the correct position on the work piece. Jigs are rarely clamped on the machine table. Fixtures hold the work piece securely in the correct position with respect to the machine/cutter during operation. Fixtures are often clamped on the machine table. The use of “JIGS AND FIXTURES†can avoid all geometrical errors which will occur in tool and work piece. Our aim of the project is to overcome the difficulties of drilling and to reduce the time with good accuracy. Read More...
|
Mechanical Engineering |
India |
853-855 |
223 |
Determining the shortest path for Travelling Salesman Problem using Nearest Neighbor Algorithm
-Ajaz Ahmed Khan ; Mrs. Himani Agrawal
The Travelling Salesman Problem is a traditional algorithm used to find the shortest or least path.This problem is mostly utilized in computer science to deliver packets from source to destination as there are lots of routes present in a network. This number of routes can cause congestion, delay or data loss, so utilizing Travelling Salesman Problem to find the shortest path from sender to receiver is an efficient way to transmit data with less congestion and also in less time. It is generally used to find the optimum solution for a complex network. The Travelling Salesman Problem can be solved using meta-heuristic approaches such as Ant colony optimization or genetic algorithm, however the easiest approach to solve the Travelling Salesman Problem is Nearest Neighbor Algorithm. The optimum solution of Travelling Salesman will save time and travelling expenses of a salesman. In Travelling Salesman problem, the main aim is to visit each city in a network once following the shortest path and return to the starting position. Read More...
|
WIRELESS SENSOR NETWORKS |
India |
856-859 |
224 |
Design of High Performance 4:2 Compressor Based Multiplier
-Mrunal Mahakale ; Ratnaprabha Jasutkar
Design of High Performance 4:2 Compressor Based Multiplier is proposed, In new technology of VLSI and communication, there is a vast demand of designing high processing speed and low area. Using multiplier unit design the integral part of processor can be form, Due to this high speed multiplier architectures become the need of the day. In this project, introduces compressor based multiplier architecture based on 4:2 compressor design. In addition to that by using Vedic mathematics high speed multiplication operation and low area design can be achieve. By minimizing the number of half adders used in a multiplier will reduces the complexity of the system. Read More...
|
Electronics & Communication Engineering |
India |
860-863 |
225 |
Intelligent Mobile Charger
-Sajan Xavier ; Vidya.N; Viswini.A; V.Sharanya Rajan; Vidhya Udayakumar
The Coin Based Wireless Solar Mobile charger with Embedded MPPT is a high efficient solar energy charger providing a unique service to the rural public where grid power is not available for partial or full daytime and a source of revenue for site providers. The source for charging is obtained from solar energy or direct power grid as per the availability. Maximum power point tracker battery charger is proposed here for extracting maximum power from a photovoltaic panel to charge the battery. In this project we use the concept of Resonant inductive coupling based Wireless power transfer or wireless energy transmission which is the transmission of electrical power from a power source to a consuming device without using solid wires or conductors. In wireless power transfer, a transmitter device connected to a Solar Energy source or Mains power line and, transmits power by electromagnetic fields across an intervening space to one or more mobile devices, where it is converted back to electric power and utilized for charging the mobile. This project is very useful to people who are all using mobile phone without charging condition in public places so that they can insert a coin to charge their mobile devices. Read More...
|
Electronics & Communication Engineering |
India |
864-867 |
226 |
A Zigbee Based Robot for Rescuing Child in a Borewell (ZRRCB)
-Nithin Joe ; Surya K Narayanan; Sandhya C; Sreepriya P V; Thushara c
The water level is decreasing day by day so more people put ever increasing demands on limited supplies. To come up with the needs, bore wells are constructed, but these are usually left uncovered. Children often fall in bore well which is uncovered and gets trapped. Since the rescuing process is risky as well as difficult, it causes the child life in danger. A small delay in the rescue can cost the child life. To lift the child out the narrow confines of the bore wells is also not very easy. Robot for bore well rescue offers a solution to these kinds of situations. The robot is controlled by visual basic which is incorporated in a PC which acts as a prime component of our prototype. The robot consists of motors for movement, net arrangement as a supporting platform and a RF camera for image capturing. From the obtained information regarding the surroundings the robot reaches the child and places the net hand on the child thereby provides a safe platform. By making sure that the child is in safe position the robot lifts up and rescues the child. Read More...
|
robot |
India |
868-872 |
227 |
Performance and Experimental Analysis of Bladeless Turbine
-Sahu Rohit Ramesh ; Pawar Rupesh Nagorao ; Prajapati Sushil Kripashankar; Rathod Rajkumar; Golaeet Bhushan Gajanan
The primary objective is to perform an experimental analysis of bladeless turbine. It is an unconventional turbine that uses fluid/air properties such as boundary layer and adhesion of fluid on series of smooth discs keyed to a shaft. Resistance to fluid/air flow between the disc plates results in energy transfer to the shaft. This turbine can be used for small scale industry to develop power with high efficiency than conventional one. Thus an analysis of the performance and efficiency of bladeless turbine is to be carried out. Read More...
|
Mechanical Engineering |
India |
873-875 |
228 |
Design Optimization of Air Dam for Lift Reduction of a Car
-Sanat M. Gameti ; Hiren P. Patel; Musa Jacob Khatri; P. D. Patel
Aerodynamic force plays an important role in vehicle performance and its stability when vehicle reach at higher speed. Now a day the maximum speed of car has been increase above 180km/hour but at this speed the car has been greatly influenced by drag and lift forces. So the researches are mainly focused in reduction of co-efficient of drag and lift in car model at higher speed. Even though the various techniques are found by researches for improving vehicle performance and its stability still, we need for further improvement. So, implementing “AIR-DAM’ or “FRONT SPOILER†as an aerodynamic add on device at front portion of the vehicle. The various shape of AIR-DAM is analysis to obtain the efficient one to reduce the aerodynamic lift forces. MIRA car reference fast back model is use to analyses to AIR-DAM. Read More...
|
Automotive Engineering |
India |
876-878 |
229 |
An Energy Efficient Techniques for Offloading Data to Cloud Using Smartphone
-Abhilash V Wadate ; Sapna C Gadge; Shilpa Rokade; Aditya Khairnar
The advance technique of task offloading from Smartphone’s to the cloud is a promising strategy to increase their battery life and to enhance the computing capability of Smartphone’s. Cloud-computing enables network access configurable computing resources such as servers, storage and applications to a shared pool. However, for devices, task offloading introduces a communication cost on-demand only. These shared resources can be rapidly provisioned to the consumers, on the basis of paying for whatever consumer use only. Therefore, consideration of the communication cost is important for the task offloading effectiveness. To make task offloading beneficial, one of the challenges is the energy consumed in communication activities for estimating of task offloading. Accurate energy estimation models will enable these devices for making the right decisions as to whether or not for performing task offloading, based on the energy cost to communication activities. Simply put, if the offloading process consumes less energy than processing the task on the device, then the task is offloaded to cloud. To design an energy-aware offloading technique, the proposed scheme introduces energy models of the WLAN, Ad-hoc connection and Hotspot interfaces of Smartphone’s. These models make Smartphone’s capable of accurately estimating the energy cost of task offloading. This scheme validates the models for conducting an extensive set of experiments on some Smartphone’s from different vendors. The experimental results show that proposed estimation models accurately estimate the energy required to offload tasks. Read More...
|
Computer Engineering |
India |
879-882 |
230 |
Solar Tricycle with Solar Tracking System
-Nitin Suresh Verma ; Harishchandra Yadav; Manoj Saroj; Pravin Yadav; Prof. Zaid Ansari
Solar plays a very vital role in our day to day life. In this paper it is discussed that how solar power is utilized for delivering power to the tricycle, which will reduce the effort of the humans. The discussion covers the design, assembly and performance calculation. This paper comprises all the calculation and information of the main components. This Tricycle is well designed and can be shown as good replacement for indigenous model used by disabled person. Read More...
|
Mechanical Engineering |
India |
883-884 |
231 |
A Review on Image Processing Based On Modified Backpropagation Algorithm of Artificial Neural Network
-Samadhan Jogdand
The traditional Edge detection algorithms such as canny edge detection requires so much calculation which makes it more time consuming. hence it is not suitable for industrial applications like damage detection because each product should be analyzed in a fraction of second so that the production rate of the industry should not affected. Hence there can be use of Artificial Neural Network for edge detection, because though it requires lot of time for training, it is very fast at simulation i.e. at application time which fulfills industry requirement for such application. This paper represents some studies done for development of such application. Read More...
|
Electronics Engineering |
India |
885-887 |
232 |
Pulse Mill Study Report
-Sanjeev Singh Chauhan ; Motilal Ahirwar
The role of small scale industries is significant in the overall growth of the economy of our country. The role of small scale industries has been emphasized, from time to time, keeping in view the overall plan objectives of economic growth coupled with social justice. The small- scale sector has a distinct advantages of low investment with high potential for employment generation. In order to create substantial employment opportunities, the industrial policy laid stress on effective promotion and development of cottage and small- scale industries in the country. The project work encompasses all the facets of any small- scale plant development. The main objective of the entrepreneurial development schemes is to motivate and assist prospective and potential entrepreneurs to set up small scale units of their own and thereby become self –employed and continue to contribute significantly to production and employment in the country. Read More...
|
|
India |
888-891 |
233 |
Introduction To Neural Network Based Approach For Optical Character Recognition
-Minal Hedalkar ; Tanmayee Bhosale; Priya Singh; Anuradha Chakrawarti
The Artificial Neural Network (ANN) is an information processing paradigm. The important element of this paradigm is the novel structure of the information processing system. These days, handwritten character recognition is a difficult problem due to the great variations of writing styles, different size of the characters, etc. OCR is a technology that enables you to convert different types of documents. For e.g. scanned paper documents, PDF files or images captured by a digital camera into editable and searchable data. The whole process of recognition includes segmentation of characters into line, word and characters. While the other part include recognition through feed forward neural network. Basically, for an offline handwritten alphabetical character recognition system using multi-layer feed forward neural network, a method of feature extraction along with the data to train the artificial neural network is used. Read More...
|
Computer Engineering |
India |
892-894 |
234 |
Data Confidentiality in Wireless Sensor Networks
-Sukanya Pujar ; Bharathi R
Wireless sensor networks sometime collect sensitive data required such as in military applications. Such deployed sensor node may require security aspects as data confidentiality. Some of proposed secure protocols i.e. DiDrip responsible for updating configuration parameters in sensor nodes. To provide data confidentiality in such protocol encryption of sensitive data is needed. The proposed method encrypts the sensitive captured data of sensor nodes using various encryption procedures (bit XOR operation, bits shuffling, and secret key based encryption) and then sends it. Read More...
|
Computer Science and Engineering |
India |
895-896 |
235 |
A Survey of Android Inspector for Analysis of Android Applications
-Nilam Prabhakar Sarode ; Prof. R. A. Agrawal
Android operating system is a widely used in Smartphones are the future of modern communication. To being existing of various sources for downloading applications has also to provide to universal fund to users falling prey to spiteful applications. A big obstacle in blocking the entry of spiteful applications into the Android market place is the state of being scarce of effective mechanisms to establish malicious applications. This paper presents AndroInspector, an organization for including all analysis of an Android applications using both Static and dynamic analysis techniques. Andro-inspector derives mine and analyses decisive description of Android applications via static analysis and next classifies the application using machine learning techniques. Dynamic analysis includes computerized execution of Android Applications to establish a situate of pre-defined malevolent routine performed by applications at run-time. Read More...
|
Computer Science and Engineering |
India |
897-899 |
236 |
A Review of "Wireless Charging Technology" for Smart Hand-Held Devices
-Kiran Prakash Jaiswal ; Kiran Prakash Jaiswal; Prof. R. A. Agrawal; Prof. D. D. Patil
The gadget of electronic devices has revolutionized the communication methodology in the middle of people. However, each moveable battery-powered electronic product comes with its have charger and therefore, results in a rising electronic waste issue. The convention of these portable electronic devices is rising; the demands for longer battery existence are also increasing. These batteries need to be replaced frequently [4]. This wireless battery charger is predictable to reduce all the disturb with today’s battery technology. Wireless charging is the method of transmitting electrical energy through an air gap to electronic device such as mobile and other electronic devices. This paper refers the analysis of standard that is Qi (chee) and Alliance for Wireless Power (A4WP) [3]. Read More...
|
Computer Science and Engineering |
India |
900-902 |
237 |
A Novel Based Implementation of DTH Service for CATV Applications
-M.Balamurugan ; Mariyappan.M; Sathish.M; Parthiban.T
Video-on-Demand includes much wider services and opportunities. Today’s technology allows telecommunication network operators to offer such services as home shopping, games, and movies on demand. Asynchronous Transfer Mode systems allow the switching of any reasonable bit rate to a single or multiple customers among a large number of connected customers. The Existing PPV services offer channel packages to the subscribers. In this system there is an agreement between the user and the subscriber. Each channel package cost will be charged after a particular period of time. The existing system offers only channel packages to the viewer as per the PPV agreement. As this offers no flexibility to the user this system can be modified to offer full flexibility. We propose a system in which the total no of hours each channel is viewed is counted for a particular period of time, say a month. In this system the user is going to pay for a channel according to the duration he viewed the channel. An embedded system is outlined for implementing the scheme and part of it has been designed using verilog & verified by simulation. Read More...
|
Computer Applications |
India |
903-907 |
238 |
Review Paper on Heat Transfer in Different Type of Notch & Unnotched Fin
-Balendra singh ; Satish Singh
Generally, the notch and un-notched Fin in a plate-fin heat exchanger provides a greater heat transfer coefficient than plain plate-fin, but it also leads to an increase in flow friction. A new parameter, called relative entropy generation distribution factor, is proposed to evaluate the thermodynamic advantages of notch and un-notch fins. This parameter presents a ratio of relative changes of entropy generation. The relative effects of the geometrical parameters are discussed. The results show that there exist the optimum values at a certain flow condition, which obviously maximize the degree of the heat transfer enhancement of notch and un-notch fins Read More...
|
Mechanical Engineering |
India |
908-910 |
239 |
Remote Monitoring System of ECG and Body Temperature Signals
-Umedsingh Dodiya ; Nitesh Pawar; Suraj Gupta; Sanjay Gupta
The project presents a remote monitoring system for electrocardiographic and temperature signals and ECG with GSM modem interface capability. Our aim is to provide a solution for monitoring babies, disable or elderly people’s body temperature and initiate immediate alarm in case of hazardous cases. Heart disease is increasingly affecting human lifestyle, rehabilitation and practical devices are being carried out and created in order to reduce the disability from heart diseases. Read More...
|
Computer Engineering |
India |
911-912 |
240 |
Centripetal Air Flow Cooler- A Review
-Mohammed Ausaf Naseem ; Syed Danish Ali; Tahoor Hassan Khan; Syed Mohiuddin
The centripetal air flow cooler maintains a better cooling effect and proper hygiene. The better cooling effect is obtained by using the centripetal and axial flow fan. The important components such as cylindrical cage, honey comb, and both the fans enable us to obtain higher cooling effect. generally the normal air cooler provides a medium cooling effect by consuming more power hence in order to minimize such problem we introduced the centripetal air flow cooler .the concept behind making this cooler is to draw the air from the surrounding in the centripetal manner and then converting the air in axial manner for better and effective cooling. The use of horizontal cylindrical cage eliminates the pump and the honey comb eliminates the use of excelsior (wood wool). This enables us to carry more water as compared to excelsior. Read More...
|
Mechanical Engineering |
India |
913-917 |
241 |
Performance Enhancement of TCP's Westwood Implementation with Improved Flow for Wired and Wireless Scenarios
-Ms Kaushika Patel
Performance of Transmission Control Protocol (TCP) was analysed in presence of random drops and congestion. the analysis proved TCP WestwoodNR (TCP-WNR) was best to utilise the available bandwidth. TCP WestwoodNR protocol controls the window using end-to-end bandwidth estimation. This Bandwidth Estimation continuously estimates bandwidth at the TCP sender based on the packet rate of the connection by monitoring the ACK reception rate. The estimated connection rate is then used to compute congestion window and slow start threshold settings after a packet loss occurred. Resetting the window to match available bandwidth makes TCP-WNR more robust to Random loss as well as in Congestion. The conventional TCP over reacts to losses and leading to unnecessary window reduction. Experimental studies of TCP-WNR show significant improvements in throughput performance over Reno and SACK, particularly in wired networks. The traditional TCP has many drawbacks like unable to distinguish the losses and very much conservative to the initial start. In case of Time Out also it is very much conservative; the filter implementation was modified from conventional TCP-WNR. So the performance was improved based on this and the modified TCP-WNR was compared to original TCP-WNR. The results show the performance comparison of the two protocols. Read More...
|
Computer Science and Engineering |
India |
918-925 |
242 |
A Novel Approach for Clustering Categorical Time Series Using Dissimilarity Based Measure
-Richa Kuriakose ; Linda Sara Mathew
A dissimilarity-based measure is considered to develop a framework for clustering categorical time series. By assessing both closeness of raw categorical values and proximity between dynamic behavior it measures the dissimilarity between two categorical time series. For the latter, the temporal correlation for categorical-valued sequences is computed using a particular index[1]. The dissimilarity measure is then used to perform clustering by considering a modified version of the k-modes algorithm specifically designed to provide with a better characterization of the clusters. Most of the clustering algorithms handling data with categorical attributes focus on the “static†nature of the problem. More specifically, the similarity search between two data objects is based on exact matches between attributes, without regarding proximity between temporal behaviors. This is equivalent to ignore the order of occurrence. Nevertheless, in many real applications the clustering task is precisely aimed to identify groups of data objects showing similar behavior over time. A typical example is the problem motivating the present work, namely identifying web-user profiles according to the browsing behavior on a particular web site. Model-based clustering assumes the dynamic structure of all data can be represented by Markov chain models. Distance-based clustering is a more intuitive approach which relies on the choice of a suitable measure of dissimilarity between data objects[2],[3]. Read More...
|
Computer Science and Engineering |
India |
926-929 |
243 |
Unsupervised Outlier Detection in Categorical Dataset
-Varalakshmi P ; Linda Sara Mathew
Outlier detection for categorical data sets is an important problem. It is difficult to define a similarity measure for categorical data. A formal definition of outliers and an optimization model of outlier detection, through a new concept of holoentropy that takes both entropy and total correlation are taken into consideration. Based on this model, define a function for the outlier factor of an object which is solely determined by the object itself and can be updated efficiently. The unsupervised outlier detection approach detects outliers in an unlabeled data set under the assumption that the majority of the objects in the data set are normal. Two 1-parameter outlier detection methods, named ITB-SP (Information Theory Based Single Pass) and ITB SS(Information Theory Based Step by Step), which require no user-defined parameters for deciding whether an object is an outlier is used. Algorithm implements weighted attributes and holoentropy that considers both the data distribution and attribute correlation to measure the similarity of outlier candidates in data sets. An upper bound for the number of outliers and an anomaly set of candidate set are used which allows reducing the search cost. Read More...
|
Computer Science and Engineering |
India |
930-933 |
244 |
Scleral Vascular Pattern Based Human Identification
-HIMA S ; NEETHU SUBASH
Identification of an individual in security field is one of the greatest threats for today's world. Biometric is a good key to solve such problem. Out of the different existing biometric recognition systems available - namely face, finger, and retina and so on, sclera recognition system gives out better performance. The sclera is the opaque and white outer layer of the eye. The blood vessel patterns present in the sclera region are stable over lifetime and unique person by person, thus making it appropriate for human identification. Existing iris recognition needs to be performed in the near-infrared (NIR) spectrum which requires additional near-infrared illuminators and it is intrusive in nature. In existing sclera recognition systems matching speed is slow, which could impact its application for real-time applications. To improve the matching efficiency, proposed a new Y-shape descriptor based sclera vein recognition method using a two-stage approach for registration and matching. Read More...
|
Computer Science and Engineering |
India |
934-937 |
245 |
Design of Exoskeleton
-Piyush Diwakar Laldas ; Omkar Ajay Yadav; Saurabh Save; Ketan Ramesh Gudekar; Shakir Anwar Hussain
to design an efficient and capable lower extremity exoskeleton with help of Theo Jansen’s strand beast mechanism. These types of exoskeletons are mainly used for rehabilitation purpose of patients who have temporarily lost their limb motor skills, which is used in physiotherapy with the help of these devices they again attain their ability to walk. One of the aspects of physiotherapy is repetitive movement of the affected limbs, thus an exoskeleton helps in this .The present exoskeletons available for lower extremities run with the help of hydraulics, pneumatics, hydro-pneumatics and complex circuitry. The exoskeleton which we have made its efficiency lies in its simplicity. It would hopefully reduce the cost drastically and would be commercially viable to common man. Read More...
|
Mechanical Engineering |
India |
938-939 |
246 |
Leaning of Anomaly Detection in Network Traffic using Fuzzy Approach
-Krunal Khurana ; Prof.(Dr.) Priti S. Sajja
Anomaly detection in network traffic is essential to identify security incidents and to monitor network services. Typically the Anomaly detection used in a variety of applications such as fraud detection for online banking transaction, intrusion detection for cyber-security, fault detection in safety of critical systems, and military surveillance for enemy activities. The most existing intrusion detection systems deploy signature-based method or data mining-based method which completely rely on fix set of rules and policies for anomaly detection. In this paper we present new behavior-based anomaly detection that is capable of detecting previously unseen network attacks and threats. The main idea for this new evaluation is to reach close to the already existing approach and to provide more advantages in terms of computational complexity. Read More...
|
Computer Science |
India |
940-943 |
247 |
Mask Detection
-Shreyas Naik ; Ashu Sanghavi; Harshal Kane; Samiksha Rahatwal
In all most all crime scenarios, the faces of the attackers or the culprits are hidden so as to hide their identities. This makes the job of the crime fighters and protectors i.e. police to get information about the real culprit difficult. For instance air flight cases where in the attackers bypass the immigration, wearing latex mask to keep their identity from being revealed. In such situations, the solution is to be able to detect the mask so that police are able to catch hold of the criminals as soon as possible.
Therefore we would like to introduce a new type of camera, ‘The Mask Detection camera’, which would provide the user with an idea of the face which lies beneath latex mask i.e. if a person is disguised. The basis of this project is the temperature. This open source device will be developed to detect people wearing mask - this technology will be providing direct solution to this growing problem.
Read More...
|
Computer Engineering |
India |
944-946 |
248 |
Shadow Detection and Removal from Images using FHDI Method
-Sarita Chouhan ; Abhishek Misal
Removal of shadow from any of the single image is a very difficult task .to produce a high quality of shadow free image which is indistinguishable from a true shadow free scene is even more difficult. Shadow in any image are affected by many things like lighting conditions, unwanted behavior of any shadowed surfaces, and occluding object etc. shadows regions may also in a post-acquisition in image processing, transforming, e.g. contrast enhancement. The purpose of this method is to remove the shadow of any of the image if the light source is including to the image the shadows are created through the backward direction of the object in this paper the purpose is to detected the shadow and removal any of the object in this paper also providing a compressive serving of any of the images and also the second is to present our framework to removal of the shadows. And also solving the problem of the shadow to use by the detection method. Read More...
|
Electronics & Communication Engineering |
India |
947-950 |
249 |
Theoretical Evaluation of Ultrasonic Velocity and Percentage Deviation for Binary Liquid System of Tetralin and N-Hexadecane at Different Temperatures
-Kumud Dwivedi ; Dr. Vimla Vyas; Prof. Indra Prasad Tripathi
Different empirical and semi-empirical relations to calculate ultrasonic velocity namely Nomoto’s relation, Van Deal’s and Vangeel relation, Junjie’s relation, Impedance dependence relation and Rao’s specific velocity relation have been applied on binary liquid system of Tetralin and n-Hexadecane (C10H12 + C16H34 ) at ( 293.15 , 303.15 , 313.15 , 323.15 , 333.15 and 343.15 ) K . The relative merits of afore – mentioned theories and relations compared to experimental values of velocity have been discussed in terms of percentage deviations. Chi – square test for goodness of the fit is applied to understand the relative applicability of these theories to the present system. The results are discussed in terms of intermolecular interactions between the component molecules of binary liquid system. Read More...
|
chemistry |
India |
951-955 |
250 |
Significance of Wavelet Transform in the Analysis of Non-Stationary Signals
-Dr. Radhey Shyam Pal
In this paper, the significance of wavelet transform in the processing of non-stationary signals has been highlighted. It covers the main definitions and properties of wavelet and wavelet transform and focuses on signal processing applications. For non-stationary signal, Wavelet transform provides simultaneous localization in time and frequency domain. Read More...
|
MATHEMATICS |
India |
956-957 |