No. |
Title and Author |
Area |
Country |
Page |
51 |
Flex Based Glove System for Dumb People
-Bhagyashree Nagarkar ; Amruta Sankhe; Monica Akhade; Prof.A.R.Kadu
Nowadays everyone has freedom to talk, but just imagine how dumb people can’t even communicate with their dearones through speech to normal person. They face major problem while communicating with normal person using sign language or hand motion to communicate. As this language is very difficult to understand to normal person. So in this paper we use a flex based glove system using Indian sign language where the dumb people can communicate with help of this system. Here in this system the glove helps to translate the sign language into speech. Read More...
|
Electronics & Communication Engineering |
India |
205-206 |
52 |
Seismic Analysis of 10 Storey Building For Fixed and Flexible Base with and Without Bracing
-Chaitrali Amasiddha Jamadar ; Akshaya G. Ghalimath ; Chaitrali Amasiddha Jamadar
Structural failures during earthquakes in the past demonstrated the importance of soil-structure interaction (SSI) effects and its consideration to avoid failure and ensure safety. Various influential parameters have identified and the effect of the same on change in different parameters has to be studied. The present study focuses on seismic analysis of 10 storey building for different parameters of bare and infill frame with fixed and flexible base for different soil conditions like very soft, soft, medium, sandy and hard strata also the effect of bracing. Read More...
|
Civil Engineering |
India |
207-209 |
53 |
Heat Transfer Augmentation Technique for Combined Coiled Insert and Dimple Tube: A Review
-Ghodake Ganesh Ramchandra ; Dr. Rahulkumar S. Hingole
Heat transfer enhancement techniques are used to augment heat transfer rate. Heat transfer enhancement techniques are most commonly used in areas such as radiators for space vehicles, thermal power plants, automobiles, refrigeration and air-conditioning equipment’s ,coolant (oil) cooling systems, , heating and cooling in evaporators, process industries, industrial heat recovery equipment’s, power sectors, electronic cooling aerospace, etc. These techniques broadly classified into three categories viz. passive techniques, active techniques, a combination of passive and active techniques i.e. called compound techniques. Passive techniques, where inserts are incorporated in the flow passage to enhance rate of heat transfer, are very advantageous as well as effective as compared with active techniques, because the insert manufacturing process is simple and these techniques can be easily employed in an existing heat exchanger. In design of compact heat exchangers, passive techniques of heat transfer augmentation can play an important role if a proper passive insert configuration can be selected according to the heat exchanger working condition (both flow and heat transfer conditions). In the past decade, various types of studies have been reported on the passive techniques of heat transfer augmentation. The present paper is a review on progress with the passive augmentation techniques in the recent past and will be useful to designers implementing passive augmentation techniques in heat exchange. The heat either may be used to add or reject from the system. There are many types of heat losses observed in these processes researchers are working hard to minimize these losses and enhance the heat transfer rate in either directions. This paper made an attempt to review the some of the passive techniques and revel the possibilities of the combined approach of this technique. Read More...
|
Mechanical Engineering |
India |
210-214 |
54 |
Nitinol chassis: Accidentals Car Chassis Free Charge Repair.
-Vimal Shingala
Automobile in industry is rapidly going. During the last decade human factors is drawing more attention the automobile body manufacturing and maintenance of new industrial products especially in automobile industry. Very good quality is becoming a critical criterion for the success of many products. This time-equivalence method is one way to determine the appropriate automobiles severity. Super elastic nitinol is now a common and well-known engineering material in the automobile industry. While the greater flexibility or the alloy drives many of the applications. There are actually a large number of lesser-known advantages of nitinol in automobile device. This paper mainly focuses of automobile chassis made by nitinol materials. Today’s biggest problems of accident in damage vehicles body (bonnet, car door, roof of car etc.) repairing cost is very large. So, its good solution of nitinol body easily repairs with minimum charge. Read More...
|
Automotive Engineering |
India |
215-218 |
55 |
Routing Protocols for Mobile Ad Hoc Networks: A Review
-Vimal Chhaya
A wireless ad-hoc network is a multihop wireless network which is collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network. Each of the nodes has a wireless interface and communicate with each other over either radio or infrared. Multi-path routing represents an effective and efficient routing method for wireless mobile ad hoc networks and the resource redundancy and diversity in the underlying network to provide benefits. Recently, many multipath routing protocols have been defined for the networks and their performance can be analyzed. Here in this paper We present an overview of few of these, reactive and proactive protocols. Read More...
|
Computer Applications |
India |
219-222 |
56 |
IDS with Honey Bee Server for Secure Communication in Cloud Computing: A Literature Survey Effort
-Prof. Uday Patkar ; Sayali Rasakar; Vasudha Kamble; Sayli Naik; Sarala Patil
Cloud Technology facilitates sharing of platform software service and information. Cloud Computing which is been developed on grid has various methods for intrusion detection, though they lack standard features required in system. Security is Major concern as cloud consists of vital and highly private information of user cloud computing availability is major issue. Intruders indent to log in and steal information from servers. In such conditions only genuine request are to be forwarded to server whereas the intruders need to be tracked, honey bee server facilitates this. Read More...
|
Computer Engineering |
India |
223-226 |
57 |
Removal of Chemical Oxygen Demand from Textile Industrial Wastewater by Anaerobic Digestion
-Ameer Uzma ; Prof. Dr. Shahshikant R. Mise
This work focuses on monitoring the COD removal by anaerobic digestion of liquid textile wastewater under controlled conditions. A laboratory scale models of anaerobic digester of 8L capacity, with gas collecting bottles were setup to treat textile industry wastewater. The performance of the reactor in removing COD, Total Solids and Alkalinity were studied, with reference to different organic loading rates of 0.01, 0.02, 0.03 kg COD/m3.d. The highest yield of alkalinity, percentage COD removal and total solid is 1123.28mg/L, 62.49% and 89.28% respectively. Read More...
|
Environment Engineering |
India |
227-229 |
58 |
Feasibility Study on Lightweight Aggregates in Concrete - A Review
-N.Sellakkannu ; C.Tamilarasan
Now a day there are so many construction materials for concreting and various types of concretes are available in the development of construction materials and in field. Of these Lightweight concretes are widely preferred as this uses the waste materials as by products for the aggregates. Lightweight aggregate can be made out of materials that are considered waste and pollutants of environment and are largely available for recycling. Consequently, the usage of lightweight aggregate concretes solves few problems and few among them are, these uses the waste materials as aggregates, prevents natural resource from further depletion and these are mostly cost efficient. The below report discussed the properties and its importance of on various aspects of Lightweight concrete materials. Read More...
|
Structural Engineering |
India |
230-234 |
59 |
Rural Area Three Phase Load Schedule Management Using Arm7 Industrial Appliances
-Rekha Bankar ; Pooja Rathi; Pranjali Korade
In this competitory world wherever economical and effective production takes place, industries mistreatment three section offer cannot afford a failure of even one section. Failures of any phases create appliances susceptible to erratic functioning and should even result in failure of that appliance. Our project goal is to make a system which will support one among the section provides with the assistance of existing section offer. the event of this project are going to be achieved by mistreatment Arm7 controller that is being programmed 3 section triggering generator. This controller is then including opto isolator to next driver electronic equipment connected power electrical converter mistreatment MOSFET. Aim of our project is automation mistreatment ARM7 controller .For 3 section failing shield on protect to the load with bar automatic section choice once one among the section from 3 section missing in sequence of RYB section choose or are going to be select gift section of anybody then gift section think about as single section with neutral and our next ARM7 instrument panel generate six triggering pulses with isolation and power circuit convert from single section 230V AC to DC 350V via electrical converter circuit convert three section and drive the load or induction motor .There is no want for wirer or failure section at intervals fraction second motor it's in running. Read More...
|
Electronics & Communication Engineering |
India |
235-237 |
60 |
Plant Growth Monitoring and Control
-N.Mrujool Kansara ; G.Lavanya; RM.Nachammai; R.Gopalakrishnan
Technology is advancing at a very fast pace, so it is mandatory to use it in every field to have the desired and proper output. The field discussed here is agriculture. Here, a Firebird V robot has employed. After sowing the seeds, the growth of seed begins. Thus, the robot is used for monitoring whether the plant/crop has grown to the correct height or not. For this purpose, an infrared sensor is used. These sensors keep monitoring the height of the plants.The height for each kind of plants is mentioned in the program. If the plant has reached its proper height, then the plant/crop is ready for harvesting and if the height of the plant/crop is improper, it is undisturbed until it is mature. Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
238-240 |
61 |
Study & Analysis of Threshold Perception using an Agent Environment
-Vishwanath Y ; Dr. M V Vijayakumar
Perception is a significant component of any general intelligent system. The perception process of recognition, identification and inferring involves both attentive and pre-attentive. Threshold perception becomes important that needs to be evaluated to decide whether the received sensory data has to be processed using bottom-up or top-down approach. In this paper using simulation test-bed and a BDI agent an attempt is made to evaluate the performance of agent with threshold perception and without threshold perception. The analysis shows that performance of agent with threshold perception is acceptable than the agent without threshold perception. Read More...
|
Computer Science and Engineering |
India |
241-244 |
62 |
Li-Fi Technology - A New Life in the Wireless Communication
-Navya Prakash ; Priyanka V; Agughasi Victor Ikechukwu
This paper details about the Li-Fi technology by the literature survey of various journals and documents that are based the technology. It explains the technology in brief. The importance of the technology and it’s working are explained. Read More...
|
Computer Science and Engineering |
India |
244-246 |
63 |
Column Tracer Experiment on Removal of Arsenic by Adsorption using Activated Carbon Derived from Ziziphus Mauritiana
-Mohammad Yaseen Farrukh ; Prof. Dr. Shahshikant R. Mise
The present study deals with removal of colour from wastewater of silk filature using a low cost activated carbon prepared from Ziziphus Mauritiana shell powder of size 150µ. The chemically activated carbon is prepared with Impregnation Ratio of 0.75 A series of column tracer experiments have been performed with colour on the physically and chemically activated carbons for obtaining the breakthrough and retardation co-efficients. The values of Coefficient of Freundlich Isotherm (KF), Distribution coefficient (KdF), Coefficient of Freundlich Isotherm (1/n) and Retardation coefficients (R) are 1, 0.997, 0.993 and 1.549 for CaCl2 activated carbon are 1,0.992,0.982 and 1.542 and for MgCl2 activated carbon are1,0.999, 0.998 and 1.552 respectively. Adsorption capacity for physically and chemically activated carbons are 0.326mg/g, 0.579 mg/g and 0.627 mg/g respectively. Read More...
|
Environment Engineering |
India |
247-250 |
64 |
Column Studies on Removal of Colour from Silk Filature Composite Wastewater by Using Activated Carbon Derived from Ziziphus Mauritiana
-Kavyashree A.K ; Prof. Dr. Shahshikant R. Mise
The present study deals with removal of colour from wastewater of silk filature using a low cost activated carbon prepared from Ziziphus Mauritiana shell powder of size 150µ. The chemically activated carbon is prepared with Impregnation Ratio of 0.75 A series of column tracer experiments have been performed with colour on the physically and chemically activated carbons for obtaining the breakthrough and retardation co-efficients. The values of Coefficient of Freundlich Isotherm (KF), Distribution coefficient (KdF), Coefficient of Freundlich Isotherm (1/n) and Retardation coefficients (R) are 1, 0.997, 0.993 and 1.549 for CaCl2 activated carbon are 1,0.992,0.982 and 1.542 and for MgCl2 activated carbon are1,0.999, 0.998 and 1.552 respectively. Adsorption capacity for physically and chemically activated carbons are 0.326mg/g, 0.579 mg/g and 0.627 mg/g respectively. Read More...
|
Environment Engineering |
India |
251-253 |
65 |
Appraisal of PSO Algorithm over Genetic Algorithm in WSN Using NS2
-Vishwaraj ; Tathappa Rachannanavr
A Wireless Sensor Networks is a group of spatially distributed and dedicated autonomous sensors with a communication infrastructure for monitoring and recording environmental conditions and or Genetic Algorithm the collected data as central location. The nodes in WSNs (Wireless Sensor Networks) are very prone to failures due to energy depletion, defective hardware and environmental conditions and breakdown in the onboard electronics. Loosing network connectivity has an adverse effect on the applications and hinders the coordination among some nodes. Thus fault tolerance is one of major issue in WSNs. This paper mainly focuses on the parameter comparison indeed the advantages of PSO (Practical Swarm Optimization) Algorithm over GA (Genetic Algorithm) in the WSNs using network simulator version 2. This paper considers the energy efficiency and some other parameters of the nodes and compares the algorithm for the same. Read More...
|
Electronics & Communication Engineering |
India |
254-257 |
66 |
A Location Determination Technique for Network Aided Positioning System Using Received Signal Strength Indicator
-C. Sangeetha ; Ishita Raj; Abhinav Tiwari; Mohit Shukla
With the advancement in the mobile technology, mobile phone becoming an omnipresent computing device. This paper presents the fingerprinting location determination technique using received signal strength indicator (complex function of distance) for GSM phones and discusses the cell sense system. To test this system, we implemented it on mobile OS. Comparative study of accuracy enhancement using cell sense technique of two different sites with RSSI based GSM localization technique. We also analyzed the effect of changes in system parameters of accuracy and the effect on system using cell sense and finger print densities. Read More...
|
Electronics Engineering |
India |
258-260 |
67 |
Combinational Adaptive LMS Algorithms For Speech Enhancement- A Review
-Prachi Sanjay Gosavi ; P.C.Bhaskar
Speech enhancement is required for many applications in which clean speech signal is important for further processing. In this paper review has been taken for speech enhancement algorithms. When using LMS algorithm for speech enhancement, there is problem of performance. So Combinational approach will provide an interesting way to enhance adaptive filter performance. Read More...
|
Electronics Engineering |
India |
261-263 |
68 |
Land Resource Management towards Sustainable Development in Kurseong Sub-division
-Dr. Rwitabrata Mallick
Kurseong is a perfect place for people who want to derive the pleasure of being in an alpine surrounding without worrying about higher altitudes and bone chilling cold weather. Kurseong has tremendous natural resources especially land resources. Proper resource management programme will help to achieve sustainable eco-development of Kurseong sub-division. Read More...
|
Natural Sciences |
India |
264-266 |
69 |
Stress Analysis of High Speed Single Helical Gear by Changing Design Parameter Using FEA Approach
-Parth J. Bhatt ; Pranav B. Bhatt
Gears are one of the most critical components in mechanical power transmission systems. In this project high speed helical gear used in planner machine will be analyzed. 3D models of high speed helical gear will be generated by modeling software and simulation will done by finite element software package. The bending stress of the gear tooth are considering to be one of the main contributors for the failure of the gear in gear set. Stresses found out is root bending stress and contact stress. This project investigates finite element model for monitoring the stresses induced in tooth flank, tooth fillet during meshing of gear. Load is applied on the tip of the tooth and bending stresses are occur on the root of the tooth. Analytically it can be validated by using Lewis and AGMA bending equation. Study will be conducted by varying face width to find stress. Read More...
|
Mechanical Engineering |
India |
267-268 |
70 |
Some Issues for Construction and Maintenance of Roads in Afghanistan
-Faiz Mohammad Spinwal ; Dr. PK Agarwal; Sandeep Choudhary
Poor construction and maintenance of afghan roads is key component of poverty in Afghanistan, Government to focus on need to develop some cost effective schemes for development of road in Afghanistan. In Afghanistan, there are about 40,000 villages located in different terrain conditions (e.g. plain, hilly and mountainous regions, deserts, etc.). The climate conditions also vary from place to place to an extent. Social, economic and educational developments of these villages greatly depend on accessibility. A large number of villages located rural area , Afghanistan are isolated from all-weather roads hence required a great care and huge investment while construction and maintenance. so there is an urgent need to construct and maintain the Afghan roads in an optimal manner. The employment opportunities and necessities like, health, education, and social welfare cannot reach rural masses without a systematic and coordinated road network. Now, the realization has set in for the development of rural areas, development of a proper road network and connectivity of rural areas must be a priority. However, there are various issues like choice of appropriate type of pavement, economical construction of pavements depending upon traffic and sub grade soil requirements, quality assurance during construction and timely and effective maintenance during operation period of Afghan road, it should be taken under consideration. Thus, there is an urgent need to develop innovative strategies for construction and maintenance of roads network in Afghanistan. Road network provides the arterial network to facilitate trade, transport, social integration and economic development. It facilitates specialization, extension of markets and exploitation of economies of scale. It is used for the smooth conveyance of both people and goods. The main objective of this study is to identify the issues in construction and maintenance of roads in Afghanistan. The roads have thus to be managed within the available limited resources, in an optimal manner, by developing innovative strategies. It is observed that condition of pavement are not being evaluated by various Afghan road agencies and maintenance is being carried out without evaluating conditions of existing pavement scientifically. Therefore, an attempt will be made in this study to identify issues in maintenance of pavement in a simple and cost effective manner so that timely and effective maintenance can be carried out. Thus, it is expected that this study will be useful for construction and maintenance of road network in Afghanistan. Read More...
|
Civil Engineering |
India |
269-271 |
71 |
A Review on the Journey to OUTERNET
-Aditya ; Aarushi Khera
"Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers." Most of the people around the globe are not only familiar with Internet, but Internet has become one of the vital elements of survival for them. From school projects to work place, or connecting with loved ones to scheduling a day, everyone has become dependent on internet. The impact of internet is so deep and well-rooted that we have forgot to live without internet. In such a scenario, there are parts of the Globe that doesn’t receive internet facility, or even if they do, the access is limited due to weak signals or governmental restrictions. And the places, where accessible internet is provided, the facility charges a good amount of money. Since, no problem exists without a solution, we got ‘Outernet’. This research paper aims to clear the term Outernet, how it can rectify the problems, and how it works. Read More...
|
Computer Science |
India |
273-276 |
72 |
Harmonic Reduction and Unity Power Factor by Using PWM Controlling In Dc Motor Load
-Sandhya Soni
The paper shows the modeling, simulation and analysis of an AC-DC converter based single phase PWM rectifier fed dc separately excited motor. It provide a suitable controlling for a pulse width modulation rectifier which reduce ripple from the DC output side, reduced harmonics as well as shape the input current . The main objective of a PWM rectifier is to regulate the DC output voltage and also a sinusoidal input current and power factor should be unity. This is implemented by MOSFET switches connected in anti-parallel mode across the rectifier diodes. The output voltage is controlled by switching these MOSFET and higher order ripples at the output can be easily eliminated by using filters. Lower order harmonics are throwing off using PWM technique. The PWM generates gating pulse and give the output rectifier. The output of this PWM is the gating pulses to be applied to the input single phase rectifier. By this PWM control method, we have tried to diminish the input current harmonic distortion and bring the input current and voltage in same phase as well as make it sinusoidal. This paper presents the state in the field of single phase rectifiers with reduced input harmonics and improved power factor. The simulation results of the presented techniques have been demonstrated and concluded for various load resistance. Read More...
|
Electrical Engineering |
India |
277-280 |
73 |
Multivariate Analysis for Underground Mine Worker's Accident Investigations
-Mithilesh Kumar Singh ; Dr. Utpal K. Dey ; Sankha Sarkhel
This paper significantly contributes to address the problem of occupational injury prevention and control strategies through the investigation and application of epidemiological methods to underground mines. The epidemiological methods developed in this work will assist the safety management to identify significant risk factors and the risk groups which can provide a basis to develop prevention strategies including training. The findings of the multivariate statistical analyses indicate that both the personal and impersonal factors affect the occurrence of an injury. In this study although 12 risk factors were suspected, the epidemiological analysis suggested that only 5 factors are statistically significant. These are age, perception of working condition, emotional stability, job stress and safety performance. The structural equation modeling results revealed that personality (emotional stability and impulsiveness), maturity (age and experience), and job characteristic (perception of working condition, safety environment, and management and supervision) were significant predictors of occupational injury. The analyses indicated that the variables describing personality and job characteristic had also indirect and negative effect on occupational injury via job stress, job satisfaction, job involvement and safety performance. Specifically, the management should pay due attention towards the problems of working environment and safety of the workers. Moreover, workers should be trained to develop the positive psychological traits to maintain the balance between rigidity and flexibility which is helpful in injury prevention. Workers with negative traits like emotionally instable and older workers should be employed in less hazardous job. The occupational injury research community cannot effectively evaluate and implement prevention strategies on its own; neither can industries, nor employers, nor workers at risk. They all have to do it together in partnership. Read More...
|
Mining Engineering |
India |
281-286 |
74 |
Achieve Confidentiality and Authentication for Cloud Computing Using Hybrid Approach
-Nikita Mehta ; Khushboo Pawar
The security requirements for cloud computing providers begins with the same techniques and tools as for traditional data centers, which includes the application of a strong network security perimeter. Cloud computing servers use the same operating systems, enterprise and web applications as localized virtual machines and physical servers. Therefore, an attacker can remotely exploit vulnerabilities in these systems and applications. For security we apply blowfish algorithm on cloud store data. We also Modified blowfish algorithm and compare proposed algorithm with existing algorithm with different parameters like time and encryption time, decryption time, uploading and downloading time. Read More...
|
Information Technology |
India |
287-290 |
75 |
My Online Railway Pass System
-Medha Kulkarni ; Vrushali Ugaonkar; Bhakti Ghursale; Madhuri Khandare; Sneha Yadav
Local train is the lifeline of people in Mumbai, People have to wait in queue for ticket so they prefer to take pass which will reduce the wastage of time and this pass can be used monthly, quarterly or yearly as per their requirements .But for issuing pass they have to wait in a queue for a long time. Which is very time consuming process and students are no exceptions. Education without train travelling is a rarely seen case. Students has given a facility by central and western railway, Mumbai, giving them concession in train pass if they use the local train services for going to their educational institutes .Colleges in Mumbai, provide students the railway train concession forms, issued by the Central and Western Railway, Mumbai, to avail the concession facility. Students have to wait for hours in a queue to get this form. The concerned college authority has a cumbersome task of filling the student details manually on the form. After analyzing all the problems and requirements of the hour, the need for automation was strongly felt. E- Railway Concession Form System is an application that has automated the manual process which has many flaws the perfection of data that this system provides to the institute and the government cannot be achieved with the manual proceedings. It aims at making the process efficient, quick and easy-going. Read More...
|
Information Technology |
India |
292-294 |
76 |
Detecting Content Based Image Spam in E-mail
-Khushali Panasala ; Dr. Priyanka Sharma
In modern Technology, E-mail is becoming one of the fastest communication because it is very cheap and easy to send, one of the measure concern in email is security there is lots of fraud happening through spam emails. There are various techniques to detect image based spam emails such as image spam filtering tool which is able to detect image spams but they have some limitation. In this paper we proposed a method which can detect an image based spam. In this method we describe into two parts first we receive an image based spam mail from receiver side then extract characters from those images using OCR (optical character recognition) techniques, the characters are compared with the database of words suspected to be used by spammers and secondly the remaining parts of the images that can compare into the proposed database. The important of this paper is we can detect pure images. Read More...
|
Computer Engineering |
India |
295-297 |
77 |
Algorithm for Position Specific Approximate Pattern matching to determine Transcription Factor Binding Sites
-Anu Sebastian ; Joby George
There are many approximate pattern matching algorithms proposed in the literature. They mainly focus on solving the k mismatch problem which ï¬nd all occurrences of a short pattern in a long text string with at most k mismatches. But these mismatches can be anywhere in the pattern. In many cases it is essential to find the approximate pattern varying only in specified locations. Finding Transcription Factor Binding Site along the DNA is an application of such type of fuzzy pattern matching. Transcription factors (TFs) are proteins that bind to the DNA molecule to control the expression of their target genes. TFs have a DNA-binding domain that recognizes a short specific DNA sequence called transcription factor binding site (TFBS) and bind to DNA. Every transcription factor is able to bind not only to a single DNA sequence but to a variety of DNA sequences that share a core structure. Binding motif for a TF is an approximate pattern in which variation can occur at specific positions in the pattern. The paper proposes an approximate pattern matching algorithm that allows position specific variation in the pattern. The algorithm can be used to locate the potential Transcription Factor Binding Sites along the DNA Read More...
|
Computer Science and Engineering |
India |
298-300 |
78 |
Survey on image segmentation methods from blood microscopic images for detecting leukemia
-Nimi T P ; Divya T V
Leukemia is a group of cancers that usually begins in the marrow and results in high numbers of abnormal white blood cells. The bone marrow produces the cellular elements of the blood, including platelets, red blood cells and white blood cells. The differences between these groups lie on the texture, color, size and morphology of nucleus and cytoplasm. These white blood cells are not fully developed and are called blasts or leukemia cells. Image processing technique involved five basic components which are image acquisition, image pre-processing, image segmentation, feature extraction and classification. The most critical step in image processing is the segmentation of the image. In this paper we can review some of the image segmentation methods. Read More...
|
Computer Science and Engineering |
India |
301-303 |
79 |
A Novel Technique to Encrypt the Digital Image Based On Hybrid DCT And DWT And Bilateral Smoothing
-Richa Gupta ; Amandeep Kaur
In image Steganography the information is hidden exclusively in images. Steganography is the art and science of secret communication. It is the practice of encoding/embedding secret information in a manner such that the existence of the information is invisible. Steganalysis is the breaking of Steganography and is the science of detecting hidden information. The main objective of steganalysis is to break Steganography and the detection of stego image. Almost all steganalysis algorithms depend on Steganography algorithms introducing statistical differences between cover and stego image. Similar techniques can also realize large-capacity embedding for Steganography. Candidate transforms include discrete cosine Transform (DCT), discrete wavelet transform (DWT), and discrete Fourier transform (DFT). By being embedded in the transform domain, the hidden data resides in more robust areas, spread across the entire image, and provides better resistance against signal processing. The Work is carried out with the objectives to find out the best image Steganography method among the Discrete Cosine Transform, Discrete Wavelet Transform, Hybrid Transform and Novel Transform method with application of bilateral smoothing for denoising purpose on the basis of its factors like Peak Signal to Noise Ratio, Mean Square Error, Normalized Absolute Error and Correlation .The primary objective of my current work is to increase PSNR and decrease MSE and NAE of the image. Read More...
|
Computer Science and Engineering |
India |
304-307 |
80 |
Removal of Heavy Metal in The Godavari River Basin using Corncob Adsorbent
-Hanit Kumar Thapak ; Maharshi Garg; Mohammed Aqeel; Govardhan Reddy
In the present case on Godavari River, a few metals were found in Godavari River at time of Idols Immersion& industrial Effluents. These heavy metals are not only danger for human being but also small species present in River. An inexpensive and effective adsorbent was developed from waste corncob for the dynamic uptake of heavy metal. There are various types of adsorbent such as tea waste, rick husk, sawdust etc but activated corncob shows very good as compare to other adsorbents. The results show clear concentration of water on passing corncob adsorbents. Read More...
|
Chemical Engineering |
India |
308-310 |
81 |
CFD Analysis of Convergent-Divergent Nozzle using Standard K-Ε Model
-Praveen Kumar Kasare ; Arun Kasare; Veerendra Patle
Having its specific flow characteristics, a convergent divergent nozzles find its applications in various field such as aerospace technology, chemical and power plant also. Thus it is required to know flow phenomenon associated with convergent divergent nozzles to utilise their capabilities to their fullest. In this paper 2-d axial symmetric flow analysis for compressible flow through a convergent - divergent nozzle is carried out with the help of Computational Fluid Dynamics tools (Gambit 2.4.0.0 and Fluent 14.5 for modelling and analysis respectively). The problem is solved by standard K- epsilon turbulent model. The contours and vectors are drawn for pressure, velocity, temperature and mach number to ascertain out the design condition for convergent - divergent nozzles. Read More...
|
Mechanical Engineering |
India |
311-314 |
82 |
Stegnographic Method for Biometric Authentication
-K.Naga Sowjanya ; K.Kannamma
In wireless communications sensitive data is frequently changed, requiring remote authentication. Remote authentication involves the submission of encrypted data, along with visual and audio cues (facial images/videos, human voice etc.). Nonetheless, malicious program and different attacks will cause serious issues, particularly in cases of remote examinations or interviewing. This paper proposes a sturdy authentication mechanism supported semantic segmentation, chaotic cryptography and knowledge concealment. Assuming that user X needs to be remotely documented, initially X’s video object (VO) is mechanically segmental, employing a head and-body detector. Next, one amongst X’s biometric signals is encrypted by a chaotic cipher. Subsequently the encrypted signal is inserted to the most vital riffle coefficients of the VO, victimization its Qualified Significant riffle Trees (QSWTs). QSWTs give invisibility and vital resistance against loss transmission and compression, conditions that area unit typical in wireless networks. Finally, the Inverse distinct riffle rework (IDWT) is applied to supply the stego-object (SO). Experimental results, regarding: (a) security deserves of the planned cryptography theme, (b) strength to steganalytic attacks, to numerous transmission losses and JPEG compression ratios and (c) information measure potency measures indicate the promising performance of the planned biometrics-based authentication theme. Read More...
|
Computer Science and Engineering |
India |
315-320 |
83 |
Climbing and Hoisting Devices for Multi-Storey Building Construction
-Nishant R Shimpi ; D J Tidke
Hoisting devices are a special category of devices used for working on tall buildings and in hazardous locations where it is difficult for human beings to operate. Rope climbing devices have been developed for various functions and wide ranging tasks for construction and material handling in not too tall buildings. The ease of operating rope climbing devices is high as compared to complicated and heavy hoisting systems normally used for tall buildings. Besides, such devices do not cost much. In this paper, the focus is on developing a low cost and reliable vertical climbing that is simple in operation and is useful for construction of buildings of about 5-6 stories. The drive is a simple roller squeeze mechanism based on sugarcane juicer machine concept. The device can be relocated quickly at desired location at the construction site, as opposed to fixed location type systems, and shall be able to carry tools and construction equipment up to 100kg weight using ropes of different diameters Read More...
|
review |
India |
321-324 |
84 |
Web Interaction Content Filtering And Security
-Ketan Ramesh Dhakate ; Rahul Ankush Junghare; Utkarsha Jagdish Doiphode
We are all aware of internet and its popularity in this modern world.But many websites are very harmful for our internet community (i.ePornographic sites) and they are spreading like virus in internet. Thispaperpresents a new framework on web Interaction Content Filtering and Security. Due to this Content-Based Web filtering has become an important tool to detect this kind of sites and to filter this kind of inappropriate information on the web. There are two types of techniques: - text filtering techniques and image filtering techniques. For web-security, IPv6 having good features from security perspective, but the improvement in technology brings new challenges for web content filtering. Read More...
|
Computer Science and Engineering |
India |
324-329 |
85 |
A study on State Awareness toward Resiliency in Cyber Physical System
-Lokesh M R ; Meghana S; Mohamed Nafeel K.P; Jayashree B S; Sarang Sakethathil.
state awareness is the process of detecting anomaly of the system function. This activity most important in diverse environment like cyber-physical systems were the system charactertics are diverse, distributed, federated, time-critical. This paper is a study of state awareness branch and identifying method classification and comparing related approach, disadvantages with biological inspired Artificial immune system approach like Deterministic Dendritic Cell Algorithm. Such approach is applicable to validate state awareness towards resiliency development in cyber-physical applications. Read More...
|
Computer Science and Engineering |
India |
330-332 |
86 |
Tuning of PI Controller using Integral Performance Criteria for FOPTD System
-Miss.Varsha Jagannath Gaikwad ; Amruta S.Jondhale; Pradip S.Bhosale
large amount of the chemical processes having with significant noise in the measured variables can be controlled by using the proportional-integral i.e PI controllers. It is always important to determine the optimum control parameters of these PI controllers depending on the different objectives. This paper present the tuning of the PI controller for set point change of first order plus time delay i.e FOPTD system with the different performance criteria such as integral of absolute of the error (IAE), integral of the squared of the error (ISE), integral of the time absolute of the error (ITAE). Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
333-334 |
87 |
Android Application on Location Based Profile Manager
-Hiresh Joshi ; Naitik Kachhadia; Vishal Harsora; Prateek Kakirde
Mobile has become a vital communication tool which is becoming trendy in today’s globe. This technology has laid a foundation to overcome the traditional desktop based approach of obtaining information. This project has been developed for Android driven Smartphone’s. Global Positioning Systems (GPS) is a most important and effective technology used for locating a device position or tacking someone accurately. Methodologies for tracking can be done through GPS receiver which is in-built in most of mobile equipment. We have used GPS as the approach idea for location tracking of the user. “Location Based Profile manager†is an android application that can perform various tasks according to your location specified in the application. According to the detected location profile settings are applied on the phone. Read More...
|
Computer Engineering |
India |
335-339 |
88 |
Effect and Analysis of Electrically Driven Centrifugal Compressor in Single Cylinder Direct Ignition System
-Praveen Kumar K ; Naveen Kumar; Nallamurugan M; Manikandan K; A.Elango
An engine may not produce the same power output when it is operated at different locations and altitudes. This is due to variation in ambient conditions. Supercharging and turbo charging are used to overcome this problem. The performance of an internal combustion engine (IC Engine) is depending on more parameters like compression ratio, mass flow rate, calorific value, area, stroke length etc. In turbo charging technique, the suction pressure is slightly increased, through engine power output. Based on this technique, an electrically driven centrifugal compressor is fitted in inlet manifold, show that the suction pressure is increased. The engine performance with and without this centrifugal compressor will be studied and results were plotted according to that. Read More...
|
Mechanical Engineering |
India |
340-343 |
89 |
HoloLens - The Technology Beyond Imagination
-Rajendra Singh ; Priyank Singh
Microsoft HoloLens is a smart-glasses headset which is actually a wireless Windows 10 computer. It has state of the art sensors, a high-tech stereoscopic 3D optical head-set display, and authentic sound to allow augmented reality applications and Holograms a natural UI that the user will interact using eye gaze, voice input, and hand gestures. Read More...
|
Computer Engineering |
India |
344-346 |
90 |
Comparative Studies of Different Theories for Vibration Analysis of FGM Plate by Using Higher Order Shear Deformation Theory
-Rahul Kumar ; Jeeoot Singh; Manoj Kumar
Using a meshless radial basis function (RBF) method, functionally graded material is analyzed in this paper based on higher order shear deformation theory. Vibration response of functionally graded material plate (FGM) is presented using four different transverse shear functions. Hamilton's principle is used for Governing equation of the plate. Numerical results related to vibration of FGM plates are presented in the tables and graphs. Different theories taken here are compared based on the effect of grading index and span to thickness ratio. Read More...
|
Mechanical Engineering |
India |
347-350 |
91 |
Issues And Challenges With IoT Revolution
-Kiran R. Bidua ; Dr. Chhaya N. Patel
IoT is basically used to connect the various things i.e., RFID, computers, health watches, mobile phones, sensors and other devices by using internet to share the data information between various devices globally. The information is gathered by collecting the information among things and then distributing the same to the intended source with the help of internet. IoT is the emerging technology due to the requirement of information in medical, agriculture, engineering and other fields. There are various application of IoT including smart agriculture, smart health, smart waste management, smart city, smart safety, etc. Thus, the demand of IoT usage is high but there are various issues and challenges which are coming in the way of IoT further revolution. We had discussed them along with some remedies which should to taken to overcome from the issues and challenges of IoT revolution. Read More...
|
Computer Science and Engineering |
India |
351-354 |
92 |
An Autonomous Polyhouse Robot for Plant Health Indication and Detection of Plant Disease Using Image Processing
-Yeole Kajol Mukund ; Wable Aparna; Bhongal Manisha Babasaheb; Bedke Amruta Acchutrao
Agriculture is very labor intensive field and is only the field where the robots are not included. Since, many industries are trying to reduce this human labor by making robots and machines. A vision-based row guidance method is used to guide a robot platform which is designed self-operating to drive through the row crops in a field according to the design concept of open architecture. Then, the offset and heading angle of the robot platform are discovered in real time to guide the platform on the root of recognition of a crop row using machine vision. And the control scheme of the platform is suggested to carry out row guidance. Here we are designing a autonomous intelligent poly house robot which shows the plant health by observing the color of their leaves and based on the height of the plant. The robot also notes the surrounding environmental conditions of the plant like temperature, moisture and humidity so that the robot will decide about health of plant and will display it on the LCD. The robot also has watering mechanism it will provide water to the plants according to their requirement by observing soil moisture and humidity. It also detects the plant disease and provides the necessary pesticide according to the type of disease. Read More...
|
Electronics & Communication Engineering |
India |
355-358 |
93 |
Groundwater Quality For Irrigation (Yadgir City), Karnataka , India.
-Moulali ; Prof. Dr. Shashikanth R. Mise
The present work is aimed at assessing the groundwater quality characteristics of Yadgir City. The ground water samples of all the 31 wards were collected and analyzed for Sodium Adsorption Ratio (S.A.R). From the results it is obtained that the maximum S.A.R. value is 0.527 (ward no.7) which is having a sodium value of 2.97 mg/L, calcium value of 146.78mg/L and magnesium value of 472.86 mg/L. The results suggested that the water is suitable for irrigation purpose. Read More...
|
Environment Engineering |
India |
359-360 |
94 |
Day of the Week Effect in Indian Automobile Sector With Reference To BSE Auto Index
-J.Sudarvel ; Dr. R. Velmurugan
The study investigates the existence of the day of the week effect in India’s Automobile sector. The study utilises the Daily return data of the Bombay Stock Exchange’s Auto Index for the period ranging from April 2004 to March 2015 for analysis. The collected secondary data are analysed by applying Descriptive statistics and Ordinary Least Square (OLS). The outcomes of the study confirm the existence of seasonality in stock returns in India and prevalence of the day of the week effect in Automobile sector. The outcomes of the study confirm that the stock market for the Indian automobile sector is inefficient. Hence, investors can time their share investments to improve returns. Read More...
|
Management |
India |
361-364 |
95 |
Numerical Simulation and Analysis of A Cost Effective Digital Fibre Optic Link
-Pavithra R ; Durga Devi R; Krishna Kumar V
Simulation study of a cost effective digital fiber optic link comprising of an 850nm VCSEL diode source, a multimode fiber and a PIN photodetector based receiver is reported in this paper. The-characteristics of the VCSEL source are evaluated under DC and Transient conditions. The link performance is evaluated at 1Gb/s, at different link lengths and operating temperatures. For 20 degree celsius ambient temperature, the link output is efficiently detectable upto a length of 600 m. For a fiber length of 600 m, the optical power is observed to be appreciable till a temperature of 40 degree celsius. Read More...
|
Electronics & Communication Engineering |
India |
365-369 |
96 |
Review on Enhancement of Convective heat transfer using Nanofluids and Insert
-Manish A. Tathe ; V. M. Kriplani; P. V. Walke
Experimental Investigation of characteristics of heat transfer using nanofluids which shows that when nanoparticles are mixed in a common fluid in particular volume concentration which gives them the ability of heat transfer. These investigations which being conducted various researchers world widely for industrial, commercial, and residential applications gives benefits may less energy costs also less environmental impact. Experimental studies have been done with various nanoparticles Al2O3, CuO, Fe2O3, TiO2 etc, with base fluids water, ethylene glycol, oil mixtures of ethylene glycol and water. Read More...
|
Heat Power Engineering |
India |
370-373 |
97 |
Contour Free Level Set Method
-Kunalkumar Manjibhai Muchhadia ; Bhagwat Kakde; Manish Trivedi
The level set method which is a numerical technique for tracking interfaces and shapes. Sometimes image is affected by noise and so on. So a level set method (LSM) was used to segment the images, which can decrease the inflection of the noise and reduce the computation time. But the problem lies in its re-initialization task. Hence the proposed level set method with diffusion is implemented with two step splitting method (TSSM) is derived which is free of re-initialization process. Also the level set method could not perform well for the images highly affected by noise and high dimensional images by optimizing the computation time and number of iterations to get the exact contour. Read More...
|
VLSI |
India |
374-376 |
98 |
Intelligent Translate System for Visually Challenged People
-Rajavenkatesan.T ; M.Karthigaa; P.Ranjith; C.Arunkumar; M.Gowtham
Disability of visual text reading has a huge impact on the quality of life for visually disabled people. Although there have been several devices designed for helping visually disabled to see objects using an alternating sense such as sound and touch, the development of text reading device is still at an early stage. Blind people face a numerous of challenges when they try to interact with the real world environment. Because so much information is to be encoded visually. This paper presents a system that helps them to do their activities on their own with the help of image processing technique and Raspberry Pi kit. Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
377-379 |
99 |
Real World Document Clustering Using Modified Balanced Iterative Reducing and Clustering using Hierarchies
-Sunita N. Chaudhari ; Prof. Praveen Kumar Gautam
clustering is “the process of organizing objects into groups whose members are similar in some wayâ€. A cluster is therefore a collection of objects which are coherent internally, but clearly dissimilar to the objects belonging to other clusters.Document clustering is used in many fields such as data mining and information retrieval.to compare the clustering results of K-Mean approach ,agglomerative approach , partitioned approach for each of the criterion functionsusing real-world documents, and to establish theright clustering algorithm to produce high quality clustering ofreal-world document. The goal of a document clustering method is to reduce intra-cluster distances between documents, while exploiting inter-cluster distances (using an appropriate distance measure between documents). A distance measure (or, dually, similarity measure) thus lies at the heart of document clustering. The large variety of documents makes it almost unfeasible to create a general algorithm which can work best in case of all kinds of datasets. Read More...
|
Computer Engineering |
India |
380-383 |
100 |
Challenges in Accident Collision and Prevention in Cyber-Road Traffic Control System
-Lokesh. M. R ; Manish Kumar Nagar; Jyothi Lakshmi; Dilsha S Unni; Lavanya S Nair
On a daily basis the number of automobiles have increased rapidly due to advances in automobile production and increased rate of population. As a result of which there is increased accident count. The next step is to improve communication among vehicles by connecting the vehicles and giving intelligence to them to communicate with other vehicles and also to interact with people. Cyber Physical Systems (CPS) are a natural consequence of an increasingly connected physical world. Cyber-Road Traffic control System can play a major role in reducing risks, high accidents rate, traffic congestion, carbon emissions, air pollution and on the other hand increasing safety and reliability, travel speeds, traffic flow and satisfied travelers for all modes. Our approach is to find a method by which vehicles can interact with each other, estimate the distances between each other and to alert the driver in case of any unfavorable conditions. Read More...
|
Computer Science and Engineering |
India |
384-386 |