No. |
Title and Author |
Area |
Country |
Page |
301 |
Ns-2 based Emulator for Multicast Services Over WIMAX
-Mayank.D.Singh ; Fahad Khan; Rajavikram Reddy.E
Due to lack of availability of WiMax network, video transmission on WiMax can’t be achieved in real-time. In this paper we have presented a ns-2 based emulator to evaluate the quality of multicast video service transmission over WiMax (i.e. a wireless network). The result of different types of modulation schemes and the cyclic prefix, on the throughput and video quality were seen and the performance of the proposed emulator was enhanced comparatively . The results about the emulator's performance are of great help when real-time services are taken into account. The main reason of this paper is to lay guidelines required to develop an efficient real-time multicast streaming video testbed on wireless networks, it also helps us in exploring the potentialities of a tool such as ns-2 Read More...
|
Electronics & Telecommunication Engineering |
India |
1203-1206 |
302 |
Single Phase to Three Phase PWM Converter with Induction Motor
-Sheetal N Patel
There are many applications in industry which require different voltage level and frequency. The power electronics converter which converts fixed ac voltage in to pulsating dc voltage known as rectifier. The power electronics converter which gives DC power to AC power at required output voltage and frequency level is known as inverter. Three are mainly Voltage source inverter and current source Inverter is used for DC to AC power conversion. .Here single phase to three phase PWM converter simulation are done in PSIM software. Simulation of single phase to three phase PWM converter with ten switches, seven switches, and six switches are done Read More...
|
electrical engineering |
India |
1207-1213 |
303 |
Design and Comparative Study of Biogas Production from a Floating Dome Biogas Plant Using Organic Wastes
-Abu Thomas ; Raja Jaya Singh
Biogas technology provides an alternative source of energy mainly from organic wastes. Using local resources like cattle waste, kitchen waste and other organic wastes, energy and manure are derived. It is produced when bacteria degrade organic matter in the absence of air. Here an attempt to design and test the performance of plastic made portable floating type biogas plant of volume capacity 0.5 m³ for outdoor climatic conditions. In this work, cow dung, vegetable wastes, food waste, agriculture waste such organic wastes were using for biogas production of 50 kg slurry capacity in batch system. In my work the temperature have to measure; in addition, the constituent of biogas, pH, volume and rate of biogas production were analysing at different level of temperature observation on daily basis. Physical and chemical analysis of biogas and slurry have also been carrying out along with the comparison of other fuel sources like LPG, Kerosene. Read More...
|
THERMAL ENGINEERING |
India |
1214-1217 |
304 |
Implementation of Ranked Search over Encrypted Cloud Data with Supporting Synonyms
-Santhosh H ; V.K.Annapurna
“Implementation of ranked search over encrypted cloud data with supporting synonyms†has been developed to provide a stable and efficient search services in the cloud data storage. The cloud service provider will charge the cost for the services they provide to the user so consumers want to find the most relevant product, information or data, which is highly desirable in the “pay-as-you use†cloud computing paradigm. The searchable schemes over encryption data support only exact or fuzzy keyword search. That is, there is no tolerance of synonym substitution and/or syntactic variation. And the searchable schemes support only single keyword search. To meet the challenge of effective search system over secured data , the new search schema is described which is efficient and flexible searchable scheme that supports both multi-keyword ranked search and synonym based search i.e Semantics-based multi-keyword ranked search technology over encrypted cloud data which supports synonym queries is proposed. The search results can be achieved when authorized cloud customers input the synonyms of the predefined keywords, not the exact or fuzzy matching keywords. Possible synonym substitution and/or her lack of exact knowledge about the data to the data user. Ranked search over encrypted cloud data with supporting synonym will protect the data in the cloud and retrieve the required document or page that contain search key efficiently and quickly which is very important in the pay-per-use type of cloud model, so it saves time and money. If the user doesn’t have knowledge of data in particular, he can also obtain the search result because search results can be obtained for synonym of input keywords. Read More...
|
Software Engineering |
India |
1218-1220 |
305 |
New Information Security Concept
-Diljeet Singh Chundawat ; Prabhat Kumar Singh
The last few years, we have seen many new and powerful steganography techniques reported in the literature. Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while serving security against detection by unauthorized parties. Many different carrier file format can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. In this study intends to offer a state of the art overview of the hiding information technique using image file as a cover carrier to illustrate the possibility of using the image for hiding secure information for business and personal use. Read More...
|
Computer Science and Engineering |
India |
1221-1226 |
306 |
A Review on the Methods of Finding Activations in the Brain for Auditory Input Using FMRI Data
-Kaavinna Nainesh Thakkar ; Bhavin Mehta
The aim of this paper is to find a good approach from the available methods in finding activated areas in the brain corresponding to auditory stimulation given to the patients making use of SPM (Statistical parameter mapping) software. For this purpose the fMRI data is pre-processed by realigning the images, co-registering it, segmenting and normalising those images into a standard space. It is followed by data analysis using various models for estimation and specification. Inferences are drawn based on its results Read More...
|
Biomedical Engineering |
India |
1225-1227 |
307 |
Clustering Of Big Data Using a Novel Method in K-Means and K-Medoids Clustering Algorithms
-Subhashree K ; P.S.Prakash
Large amounts of structured and unstructured data are being collected from various sources for several years. These huge amounts of data called Big Data which are difficult to handle by a single machine require the work to be distributed across large number of computers. Hadoop is a distributed framework which uses MapReduce programming model to process the data in a distributed manner. Clustering analysis is one of the most important research areas in the field of data mining. Clustering is the most commonly used data processing algorithms. Clustering is a division of data into different groups. Data are grouped in such a way that data of the same group are similar and the data in other groups are dissimilar. Clustering aims in minimizing intra-class similarity and in maximizing interclass dissimilarity. k-Means is the popular clustering algorithm because of its simplicity. Nowadays, as the volume of data increases, researchers started to use MapReduce which is a parallel processing framework to get high performance. But, MapReduce is unsuitable for iterated algorithms owing to repeated times of restarting jobs, big data reading and shuffling. To overcome this problem, a novel processing model in MapReduce called optimized k-means clustering method which uses the methods of probability sampling and clustering, merging using two algorithms called weight based merge clustering and distribution based merge clustering is introduced to eliminate the iteration dependence and obtain high performance. Also the algorithms are compared with the k-medoids clustering algorithms Read More...
|
computer science |
India |
1227-1230 |
308 |
Enhanced Knn Query Processing Algorithm Using Autonomous Clustering in Mobile Ad Hoc Network
-Albin.s ; Jencey Anand. M
Location-based service is a typical application for mobile ad hoc networks. In an LBS, it is common for a node to issue k nearest neighbor (knn) queries, which search the information on the k nearest neighbors (knns) from the specified location (querypoint). In these methods, the query-issuing node first forwards a kNN query using geo-routing to the nearest node from the point specified by the query (query point). Then, the nearest node from the query point forwards the query to other nodes close to the query point, and each node receiving the query replies with the information on itself. In this process, there are two different approaches: the Explosion (EXP) method and the Spiral (SPI) method. In the EXPmethod, the nearest node from the query point floods the query to nodes within a specific circular region, and each node receiving the query replies with information on itself. In the SPI method, the nearest node from the query point forwards the query to other nodes in a spiral manner, and the node that collects a satisfactory kNN result transmits the result to the query-issuing node. In this project, we propose enhanced KNN query processing method for reducing traffic and maintaining high energy efficiency in mobile ad hoc networks. Enhance the current KNN query algorithm by using Autonomous clustering and Hierarchal Routing Algorithm. The cluster consists of one cluster head (CH), one or more gateways (GW), and cluster members. When a node in a cluster queries with a node in its neighboring cluster, packets are forwarded through only the GWs. Cluster head works to manage the cluster. Gateway works to get the information of a neighboring cluster. The entire network is divided into multiple clusters. The cluster size is managed by the number of nodes in the cluster (Upper bound and Lower bound). Read More...
|
Electronics & Communication Engineering |
India |
1231-1235 |
309 |
Bandwidth Extension Technique with Low Power Consumption for Low Noise Amplifier
-Falgun J. Patel
There are many technique for bandwidth extension but most of them have high power loss during operation. Band width extension in cost of high power consumption. So requirement of low power consumption bandwidth extension technique. T-coil technique is best technique for band width extension technique with lower power consumption. Read More...
|
Electronics and communication Engineering |
India |
1236-1237 |
310 |
Image Retrieval from Video Using Color Based Image Retrieval Algorithm
-T. Durai Murugan ; K. Balasubramannian
The proposed technique concurrently provided very good segmentations of the video into objects as image. Furthermore, capability of the proposed method to take into account several object-of-interest was also tested on the following experiments concerning video portioning, object detection, object motion tracking and cropping image as object image retrieval tasks, and concerning multi view of image retrieval .This project concurrently solves image retrieval problems. The proposed method provides three main benefits with respect to traditional retrieval approaches: Color based Image retrieval may be useful in many applications (e.g. video editing). It improves the retrieval process by enforcing the matches to fulfill a set of geometric constraints. The model used to represent the matching process allows us to consider more than one image region being matched in a reference image. Read More...
|
Computer Science and Engineering |
India |
1238-1242 |
311 |
Wireless Communication between Personal Computer & Micro-Controller
-Anuj Sharma ; Ayush Sharma; Manendra Singh; Ashish Gupta; Er. Nitin Agarwal
When people have a good connectivity at their disposal, with tremendous power of mobile computing to supplement the same, we can think of connecting their home appliances to the personal computer or a laptop". With this, people would be able to turn on and off, and to some extent, control the appliances at their home even from a distant place. One of the very basic examples of an utility of this is switching on the air conditioner in the room just some time before reaching home, so that the room is sufficiently cool by then. The usefulness of a long range remote control to home appliances has no limits. A trivial setup facilitating such a thing would be to connect the home appliances, to a microcontroller receiver antenna that receives the controls from the user, the means of sending the transmitted signals to the appliances may be via a circuit or through a wireless media like Infra-Red or the RF, We have had Infra-Red Remote Controls, which work over very short distances, and Radio Wave Remote Controls, which work over larger distances. However, something fundamentally common with all these controls is that the transmitter and receiver should both use some kind of wireless waves. The project is an implementation to the idea of the wireless communication between a PC and a microcontroller. The project deals with displaying this possible wireless communication by transferring message from PC to the LCD through wireless media. Read More...
|
Electronics & communication engineering. |
India |
1238-1233 |
312 |
Using 3D Animation Software for Controlling Robotic Arm
-Aniket Pawar ; Anil Thorat; Pankkaj Chaskar; Jitesh Patil; Nilima Nikam
a robotic arm is a mechanical adaptation of human arm with similar functional capability, but with set pre-defined task and instruction it can perform its task with more precision and accuracy. But programming a robotic arm still requires a specific skill set in programming plus following a complex mathematical regime. Hence the user of this robotic arm needs to be a professional trained for this purpose. In this paper we have proposed a designed of a system which enables software with GUI (Graphical User Input) to control functions of Robotic Arm or guide it. The aim of this idea is to remove the complex mathematical regime and provide the user with a simple user friendly interface, which will enable even regular day to day users to use this robotic arm to perform their tasks. All the internal mathematical complexities will be abstracted from the user. The GUI provided to the user would communicate with the software embedded on the robotic arm, enabling control through the GUI. The Robotic Arm uses inverse kinematics for its movement. Read More...
|
Electrical Engineering, Computer Engineering |
India |
1243-1245 |
313 |
Reconfigurable Architecture of CSDA-Based DCT with High Accuracy ECAT
-Kannan P ; T.Puviyarasi
The main objective of the project is to develop a demonstrative model for reconfigurable architecture of common sharing distributed arithmetic-based DCT with high accuracy error-compensated adder tree. DCT compresses the image using common sharing distributed arithmetic in ROM based device. In common sharing distributed arithmetic compression, the rate of throughput is low. In this project, the rate of throughput will be increased by using similarity oriented logic simplification adder tree in place of common sharing distributed arithmetic. By using similarity oriented logic simplification, power Consumption, area will be reduced efficiently, which it is reduce propagation delay and number of transistors required is reduced and increasing throughput rate in ROM based device. The advantage of similarity oriented logic simplification adder logic is that it can be implemented using very less number of adders, hence very less power dissipation. This result shows the increased rate of throughput at the range of 1GB/sec. The similarity oriented logic simplification adder tree core supporting digital cinema or ultrahigh resolution format. Using simulation in Xilinx13.2 software, the rate of similarity oriented logic simplification is inferred in order to access the incremental of throughput. Read More...
|
Applied Electronics |
India |
1246-1248 |
314 |
A Review on - Recent Web Pre-Fetching and Caching Technique
-Varun Kumar ; Nidhi Seth
Due to the fast development of internet services and a huge amount of network traffic web caching and prefetching are the most popular techniques that play a key role in improving the Web performance by keeping web url that are likely to be visited in the near future closer to the client. Web caching technique work integrated or independently with the web prefetching. The Web caching and prefetching techniques are complement each other since the web caching exploits the temporal locality for predicting revisiting requested url, while the web prefetching utilizes the spatial locality for predicting next related web object of the requested Web url. This paper survey principles and some existing web caching and prefetching approaches. The intelligent and conventional web caching techniques are investigated and discussed. Furthermore, Web prefetching techniques are summarized and classified with comparison limitations of these approaches. This paper also discusses some studies that take into consideration impact of integrating both web caching and web prefetching jointly. This paper explain about the various prefetching and caching techniques, how these technique predict the web object to be pre-fetched and what are the issues challenges involved when these techniques are applied. Read More...
|
Computer Science & Engineering |
India |
1249-1253 |
315 |
Implementing of Trusted Platform Module through Out Bound Devices
-Akshatha C S ; Dr. K. Raghuveer
A Trusted Platform Module (TPM) is a secure crypto-processor that can generate and store secured information such as keys and passwords. TPMcontains a uniqueidentity and provides a range of security functions. This paper outlines a client-server system utilizing a TPM-enabled computer using out bound devices (Pendrive or memory card). The system allows for data confidentiality, plausible deniability, and hiding of traces that incriminating data was present on the client. The server willattest the client before allowing it to submit / receiveincriminating data, and encrypted incriminating data can only bedecrypted 1) by the encrypting client, and 2) if and only if theencrypting client’s platform configuration matches that duringencryption. The client’s state can always be established viameasurement results, and they cannot be tampered to fakeattestation. Read More...
|
Computer Network Engineering |
India |
1254-1255 |
316 |
Fuzzy logic controller for wind energy conversion system
-Nagarani.B ; Nagarani.B; Raja.A
In this paper, Fuzzy Logic Control scheme for Wind Energy Conversion System with Squirrel cage Induction Generator is proposed. A controller is designed to maintain constant voltage and frequency under wind speed and electrical load variations. The controller consists of a series connected Pulse Width Modulated (PWM) Voltage Source Inverter (VSI) with a battery bank. The battery bank included in the dc side of the VSI can absorb and inject active power thus increasing the efficiency and availability of the system. Fuzzy Logic controller is applied for active power and reactive power control. In this paper, the controller performance is demonstrated under various electrical and mechanical variations. Read More...
|
Electrical Engineering |
India |
1256-1261 |
317 |
PLC Based Automated Oil Filling System for Engine Hydro-Mounts
-Purvendra Sarode ; A.S.Patil; P.A.Salunke; V.P.Kuralkar
Oil Filling System For Engine Hydro-Mounts is completed automatically by the pneumatic and servomotors. Its pneumatic system was designed, its working principle was analyzed, and the PLC control system was designed according to the control requirements to the pneumatic system. The Schneider PLC of Modicon LMC058 was selected and a programming software was used to program the system control process. Using PLC control pneumatic system, can be very easy to meet process requirements, improve greatly the system stability, reliability, automation level. Read More...
|
Electrical Engineering |
India |
1262-1263 |
318 |
Designing Robust and Efficient System for VoIP using Client-Server Network
-Prashant N. Kubde ; Prof. N. A. Chavhan
VoIP is a rising Information and Communication proficiency that succors speech communication over the Internet. VoIP is flattering prevalent due to their expediency and cost effective service. QoS and Secrecy are imperative strains in VoIP. Regrettably, supreme VoIP network doesn’t afford these imperative strains. In Preceding determination numerous techniques are used to decipher these glitches. But, until these disputes has not been utterly deciphered. Here, numerous techniques and the novel phenomenon have been discussed to address VoIP glitches for real time system. To decipher above disputes in VoIP proposed a novel phenomenon i.e. permutation of Stream Control Transmission Protocol (SCTP), Advanced Encryption Standard (AES) and Secure Hash Algorithm (SHA) for Client-Server model. Here, AES and SHA are used to afford secrecy. As well as SCTP transmission algorithm would be intended to raise the QoS for VoIP. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
1264-1267 |
319 |
Testing Aspect Oriented Programs-Approaches and Their Effectiveness
-Arshad Ali ; Thirunavukkarasu K.
Software testing is one of the major source of expense in software projects and a well-defined testing process is a critical part in the development of high quality Aspect Oriented software in a cost effective manner. Aspect Oriented programming (AOP) aims to increase modularity by allowing the separation of concerns. This programming paradigm although enhances the modularity, cannot provide correctness itself. By the passage of time usage and acceptance of AOP is increasing thus correctness of Aspect Oriented Software is challenging the testing process in unexpected manner. Although various testing approaches have been proposed to tackle the issues and challenges when testing aspect oriented programs, there is still the problem of selecting the best one that can effectively be applied to AOP. In this paper we are identifying the main issues and challenges in testing Aspect Oriented Programs and proposing testing criteria to improve the quality of testing in AOP. Read More...
|
SOFTWARE TESTING |
India |
1268-1270 |
320 |
A Survey on Moving Object Recognition and Tracking Systems
-Ms. Rupali Narayan Wadekar ; Dr. M. S. Nagmode
In computer vision, detecting motion and tracking of an object is catching more interest of researchers. Real time object tracking is becoming a challenging ingredient in analysis of video imagery which is important in efficient and robust object tracking. Most video processing applications require object tracking as it is the base operation for real-time implementations such as surveillance, monitoring and video compression. Also, object recognition and tracking are the key operations in most of the security systems. In various security related systems like military applications where very tight security is necessary, intrusion detection is very important. Intrusion detection is a task of detecting inappropriate or anomalous activity. Intrusion detection is a process of monitoring and analyzing the events to detect signs of security problems. Intrusion detection is the most essential part of the security infrastructure. Intrusion detection system must reliably detect malicious activities. In order to have a good security or surveillance system, moving object recognition and tracking should be efficient. This paper reviews various attempts made to have better surveillance and security systems. Read More...
|
Electronics and Telecommunication Engineering |
India |
1271-1275 |
321 |
Geo-Notifier : Location-Based Android Application
-Asha Rawat ; Vrushali P. Gaikwad; Rucha J. Patil; Ashwini S. Pawar; Sunita U. Muneshwar
Geo-Notifier is revolving around the concept of geo-fencing and it is based on smart mobility. It focuses on both, service to the end users and business partners. Location based Services offer many advantages to the mobile users to retrieve the information about their current location and process that data to get more useful information near to their location with the help of GPS in phones and through Web Services using GPRS. This is an android based application which has 5 modules; the first module of this application will provide location based offers in the current location. The second module is about location tracking. The third module provides the user with notification whenever a friend enters the default limit, this requires dual-permission. Fourth module will provide SMS service. The Fifth module is the emergency module, which provides you and your family with a one-click automated emergency communication system. Read More...
|
Computer Engineering |
India |
1276-1279 |
322 |
Enhancing the Energy Efficiency of Leach Protocol in Wireless Sensor Network
-Sasikala. S.D ; Mrs. M.Dhurgadevi
A Wireless Sensor Network is the collection of large number of sensor nodes, which are economically feasible and measure the ambient condition in the environment surrounding them. The difference between ordinary wireless networks and WSNs is that sensors are sensitive to energy utilization. Energy saving is the essential issue in designing the wireless sensor networks. In this paper the protocol called Kmedoids-LEACH protocol (K-LEACH) for clustered WSN is aimed to prolonging the lifetime of sensor networks by balancing the energy consumption of the nodes. The protocol uses the Kmedoids clustering algorithm for uniform clustering. Euclidean distance and Maximum Residual Energy (MRE) is used to select the Cluster Head (CH).This protocol is used to enhance the lifetime of the network. To address the problem of how to control the failure of Cluster Head (CH) in network, the proposed work carries Vice Cluster Head (VCH) selection algorithm to allow the node that will become a VCH of the cluster in case of CH dies. By doing this, cluster nodes data will always reach base station in an efficient way and no need to elect a new CH at each time if the CH dies. This will extend the overall network life time. Read More...
|
Computer Science |
India |
1280-1285 |
323 |
Designing of FIFO for the High Speed Memory Access
-S.Janani ; Dr.S.Muthukrishnan; S.Saravana Kumar
High speed is one of the most required feature for the up to date electronic systems designed for its high performance and handy applications. First-In First-Out memories (FIFOs) have advanced from objectively simple logic functions to high-speed buffers combine large blocks of Static Random Access Memory. FIFOs are often used to sensibly pass data from one clock control to another asynchronous clock control. Using a FIFO to pass data from one clock domain to another clock domain needs multi- asynchronous clock design techniques. This impression will detail one method that is used to design, synthesize and analyse a safe FIFO connecting different clock domains using Memory counter that are synchronized into a different clock domain before testing for "FIFO full" or "FIFO empty" conditions and Address Calculator that are used to read/write data in user preferred address. The demonstratively evaluated, synthesized counter and address calculator can be included in FIFO. Read More...
|
Electronics and communication Engineering |
India |
1286-1290 |
324 |
OEE Improvement on a Bottleneck Process
-Sujit Sahebrao Kadam ; Nikhil Patil; Deepak Ghanwat; Santosh Katkade
The manufacturing industry has undergone a massive change in last few decades. Consumers are now focusing on reduction in cost with improved quality. There are various management methods that are adopted by mass production industries to ensure the desired quality with minimizing the cost, waste and time. Lean Manufacturing is one of the most popular management techniques adopted by popular industries to compete in this fast growing industry. The aim of this paper is to see how improvement in OEE can be brought by implementing the methods of lean manufacturing to an automobile components manufacturing company. Through this study, the increase in productivity and Overall Equipment Effectiveness (OEE) in an automobile components manufacturing industry is discussed. Read More...
|
Mechanical Engineering |
India |
1291-1293 |
325 |
Security and Energy Efficiency using WirelessHART Standard Sensor Networks
-Chindrella Priyadharshini T ; Swarnalatha M; Durgadevi P; Prem Anand J
Security and energy efficiency in Wireless Sensor Network (WSN) is the most questing issue now-a-days because of various attacks on mobile nodes. Even though many algorithms have emerged to bring out security and energy efficiency, there are certain vulnerabilities like selfish nodes that try to save energy by not forwarding the packets and sleep deprivation attacks where an intruder overloads the target node with multiple requests which drains the energy of that node. Since a low energy node is more prone to security attacks, the throughput and hence the overall performance of the system will be lowered. WirelessHART is an emerging secure and reliable communication standard that aims in maximizing the utilization of wireless communication. This paper provides a summary of the energy efficiency and security measures provided by WirelessHART standard for effective wireless communication. Read More...
|
Networks |
India |
1294-1299 |
326 |
Present Security Issues and Challenges in Cloud Computing
-Sunil Yadav ; Prashant Kumar
Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure. Cloud computing has received a lot of popularity in the last few years and market observers believe it to be the future, but not if security problems persist. Now, not only businesses but regular Internet users are also using cloud computing services such as, Drop box, Google Docs and more to enter their files whenever and wherever they want. The complexity of cloud computing create many issues related to security as well as all aspects of Cloud computing. This paper describes about the distinct security issues and security attacks in cloud computing. Read More...
|
cloud computing |
India |
1300-1302 |
327 |
Upgrade Wired PLC to Wireless PLC
-Rahul Agrawal ; Yogesh Bagul; Ganesh Kale; Mrs.V.V.Kale
— While working on awired process the cabling is more laborious task. Very much cost associated with hard wiring instrumentation process. Cabling takes time for installation and if there is need to add extra inputs and outputs to process then it is very tedious task. These processes can be controlled using wireless PLC but it is very costly.This paperpresent revolutionary idea which not only overcome all this problems but also adds some benefits to system. Before solving the problems of cabling it is essential to understand the use of wires in process automation.Wires are used to transmit the electrical signals from field to control room. In this system wiresare replaced with wireless radio modules to transmit the data from field to PLC and viceversa. For this two radio modules are used, one is at field and another is at controller side. Field area radio modules take data from sensors and actuators and transmit wirelessly to the PLC. Radio module interfaced to PLC collects this data and changes the status of PLC inputs. PLC process this data and generates the output according to program feed in it. This data again transmit back to field radio module which actuate the actuators in field area. Read More...
|
instrumentation and control |
India |
1303-1305 |
328 |
ATM Authentication System using Fingerprint Biometrics
-Amit H. Mane ; Pradip C. Jadhav; Sachin U. Bade; Sameer P. Maner; Omkar P. Maske
Now-a-days, in the self-service banking system has got extensive popularization with the characteristic offering high-quality 24 hours service for customer. Using the ATM (Automated Teller Machine) which provides customers with the convenient banknote trading is very common. In the existing system it is designed by using ATM card and PIN, however this system is not safe to use because anybody can access the system if they have the card and pin number and may miss use it. Many incidents like shoulder surfing and card skimming have been occurring now –a-days, which is the main disadvantage of the existing system. To overcome this shortcomings of piracy in money transactions the idea of using fingerprint of customer as a password in place of traditional pin number is used. Biometric fingerprint recognition systems are easy to access and they provide high security to the customers [1]. The main objective of this system is to develop an embedded system, which is used for ATM security applications [1]. Read More...
|
computer science and engineering |
India |
1306-1308 |
329 |
Content Based Image Retrieval System using Boundary Based Shape Descriptors
-Sherine Glory J ; Aarthi.K; Swarnalatha.M
As the number of digital images around the world gets increased, there is a growing interest in finding images from the large collections. From the large number of images, it is very important for users to retrieve required images via an efficient and effective mechanism. To achieve accurate retrieval results, Content-Based Image Retrieval (CBIR) has become an important research area in recent years. Shape is one of the primary and important low level image features in CBIR used to describe image content. Searching of images using shape features has attracted more attention. In this paper we proposed several boundary based shape features such as area, perimeter, compactness, shape signatures, Fourier descriptors etc. and the study of those features in image retrieval. We have applied the proposed method on a collection of images chosen from MPEG-7 database which is a standard shape database. The image retrieval performance is measured by precision and recall. The proposed Boundary Based shape features and benchmarking database produced the performance metrics of about 70% to 90%. Read More...
|
Image Processing |
India |
1309-1312 |
330 |
Parametric Study of Grout Mix Design using Admixture with Cement Fly Ash Proportion 1:2
-Pratik D Patel ; Prof. M.G.Vanza
An experimental investigation of grout is to be carried out with fly ash as a replacement of sand. In this study cement fly ash proportion used as 1:2. The experiments are conducted with and without different dosage of admixture & using different methods of curing. Grout mix is designed with five water/solid ratio. In this parametric study workability, stability of fresh grout is to be measured and compressive strength is measured for 7 days and 28 days. After performing tests it is observed that in water/solid ratio 0.4, with addition of 1 % super plasticizer the strength is found to be optimum with workable grout under type III curing condition. Read More...
|
civil engineering |
India |
1313-1317 |
331 |
Design and Implementation of VOIP Traffic in Wide Area Networks and Transmission of Packets using Filters
-Chidambara Bharathi.A ; S.Franson Varun Richo; J.Doulas
Due to the large overhead of protocol operation, the handling way of voice traffic is extremely inefficient in WLANs. To improve the efficiency with voice a simple mechanism [1] called VoIP is used. Solid state digital systems were sometimes stated to as Electronic Private Automatic Branch Exchange. This is complex in house-telephony switching systems. To overcome these VoIP mechanism is used. In this paper VoIP mechanism is used in wide area networks. It reduces the overhead operation and time contention and improves the system performance by sending and receiving packets by using filters. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. Our extensive measurements are using VoIP mechanisms in wireless networks. The core type of telecommunication permits an industry to effectively carry out its day-to-day function regardless of location. As wireless becomes more available, voice over internet protocol is a significant evolving facility due to its low cost. Read More...
|
COMPUTER NETWORKS |
India |
1318-1320 |
332 |
Design, Analysis and Fabrication of Driving Wheel to Be used in Disc Conveyor Underground Unit
-Ashwamegh Patil ; Dr. Achal Shahare
Driving wheel design considerations generally taken for drive unit made for disc conveyor in multiple applications. To run the conveyor this driving sprocket type concept is taken and which forms standardized wheel with proper selection to overcome on the rotary driving application .This will be only for specific use in disc conveyor only not compatible with other types of conveyors. Driving wheel arrangement is designed and validate with applying its all boundary conditions. Comparison is to be done with all possible geometric structure while designing the wheel which can be effective in costing and manufacturability also. Driving wheel validation will be carried out with working stress and deflection occurs while rotating and pulling the conveyor. Read More...
|
Mechanical Engineering |
India |
1321-1324 |
333 |
Network Intrusion Detection using DREAM Protocol
-Geethanjali.P ; Suganthi.V
A mobile ad hoc network (MANET) consists of a collection of location based routing protocols which helps to detect attacks made by the intruders. In this paper an routing protocol called, DREAM is implemented for intrusion detection system. The scenario for flooding attack is generated and performance metrics were calculated. Read More...
|
Computer Science |
India |
1334-1337 |
334 |
UWB and Reconfigurable Antennas for Cognitive Radio Application using MEMS Technology
-Vijayakumari.D ; Dhivya.k; Magesh kumar.S
A survey on ultrawide band and reconfigurable microstrip patch antennas for cognitive radio application is discussed in this paper. Cognitive radio is an intelligent wireless communication system that is aware of its surrounding environment(i.e., outside world), and uses the methodology of understanding-by-building to learn from the environment and adapt its internal states to statistical variations in the incoming RF stimuli by making corresponding changes in certain operating parameters (e.g. transmit-power, carrier-frequency, and modulation strategy) in real-time. For the realization of a CR system, wideband and narrow band antennas are required. A UWB antenna is considered for the wide band operation and they are those systems which cover a large spectrum in the range of 3.1GHz to 10.6GHz and are used for sensing vacant slots in the spectrum. Reconfigurable antennas usually frequencies reconfigurable are considered as narrow band antenna which is used for transmission of data through the vacant slots sensed by the wide band antenna. MEMS technology provides efficient path to achieve ultra wide band antenna coverage and can be used in faster wireless communication applications. Read More...
|
Electronics and communication |
India |
1338-1341 |
335 |
PMSM Speed Regulation System using Non-Linear Control Theory
-D.Shalini Sindhuja ; P.Senthilkumar
This paper investigates the speed regulation problem of permanent magnet synchronous motor servo system based on terminal sliding mode control method. By giving a non-singular terminal sliding mode manifold, a novel terminal sliding mode controller is designed for the speed loop. The controller can make the states not only reach the manifold in finite time, but also merge to the equilibrium point in finite time. so, the controller would make the motor speed reach the reference value, obtaining a faster convergence and a better tracking precision. In the same way, considering the large chattering phenomenon caused by high switching gains, composite terminal sliding mode control method based on disturbance observer is proposed inorder to minimize chattering. Through disturbance estimation for feed-forward compensation, the terminal sliding mode controller may take a smaller value for the switching gain without sacrificing disturbance rejection performance. Read More...
|
power electronics |
India |
1342-1346 |
336 |
Wavelet Packet Tree Based Image Transmission Over MIMO Channel
-Dhivya.K ; D.Vijayakumari; Muralikannan.K
The theory of compressed sensing indicates if a signal is sparse or compressible in a certain transform domain, the transformed higher-dimensional signal can be projected onto a lower dimensional space by a measurement matrix, which is uncorrelated with the transform basis, and then the signal can be accurately reconstructed by solving the convex optimization problem in accordance with a small amount of measured values. The algorithm proposed in this paper combines compressed sensing theory with wavelet packet analysis, which first decomposes the original image with the wavelet packet to make it sparse, and then retains the low frequency coefficients in line with the optimal basis of the wavelet packet, meanwhile, makes random measurements of all the high frequency coefficients according to the compressed sensing theory, and last restores them with the global projection for sparse reconstruction (GPSR) method, and does the inverse transform of the wavelet packet to reconstruct the original image, to achieve the image compression. The simulation results demonstrate this algorithm of simpleness and high efficiency, with the better reconstructed image quality, is superior to the other two image compression algorithms JPEG and JPEG 2000. Read More...
|
Electronics and communication |
India |
1347-1350 |
337 |
A Data Security for Cloud Computing using Third Party Auditor
-R.Anjali ; S.Sivachandiran
Cloud computing is environment which enables convenient, efficient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.This paper primarily aims to Highlight the major security issues existing in current cloud computing environments... Cloud is kind of centralized database where many organizations/clients store their data, retrieve data and possibly modify data. Cloud is a model where user is provided services by CSP (Cloud Service Provider) on pay per use base. Mean here Client has to pay for what he is using or being served. Data stored and retrieved in such a way may not be fully trustworthy so here concept of TPA (Third Party Auditor) is used. TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for the same. Here TPA can not only see the data but he can access data or can modify also so there should be some security mechanism against this. Read More...
|
cloud computing |
India |
1351-1355 |
338 |
A Design of High Performance Asynchronous Delta Sigma Modulator with High Applicability
-Pavan Bhagat ; Swapnili Karmore
Asynchronous Delta Sigma Modulator (ADSM) is playing a very crucial role in most of communicating devices and data convertor and thus requires the special attention in designing. The performance of most of the device having DSM as a primary component is characterized by the performance of the DSM circuitry. This paper presents the architecture ADSM that consumes very low power of 12.5 nW with the unity gain frequency of 48 MHz. Bandwidth of this circuit is found to be 4 MHz. A true high performance design is presented in this paper that met high performance criteria. Read More...
|
electronics engineering |
India |
1356-1360 |
339 |
Comparative Analysis of a Two Area Load Frequency Control for an Inter Connected Power System using PI & PID Controllers
-Chenuthala Vinod Kumar ; Narendra Kumar Yegireddy; Balasa Prasad; D.Venkata Vasu; B.Venkatesh
The main objective of this paper is to maintain the constant frequency in two area interconnected power system by using controllers like P,PI & PID, and the performance of the PID controller has been compared with PI controllers under different loading conditions . It is shown from the graphs at Area1 & Area2 the Performance of PID controller is better than PI Controller. Existing Power system is dynamic one and it is interconnected with Multi areas.The main objective of a power system utility is to maintain continuous supply of power with an acceptable quality to all the consumers in the system, due to the dynamic changes in the load the frequency also changes and tie line power also changes. In order to maintain the power system frequency stable we introduce some controllers at the generating station. The above mentioned objective in carried successfully by using PI & PID controllers. This process can also be done in multi area power system. Initially we started with simple two area power system. Read More...
|
ELECTRICAL ENGINEERING |
India |
1361-1363 |
340 |
Lung Cancer Detection using Image Processing
-Ansari Mohd. Bilal ; Prof. Amar Pawde; Ansari Noman Ahmed; Shaikh Shah Alam; Arbaz Paloba
Lung cancer is considered to be the main cause of cancer death worldwide. There is significant evidence indicating that the early detection of lung cancer will decrease the mortality rate. This research deals with the early detection of cancer-affected region of the lung by image processing technique. MRI images are used for the detection of lung cancer. Magnetic Resonance Imaging (MRI) has become a widely used method of high quality medical imaging, especially in lung imaging. MRI provides an unparalleled view inside the human body. The work carried out involves processing of MRI images that are affected by cancer for detection and providing medicines for cure. The image processing techniques such as image enhancement, image segmentation, image filtering, morphological structuring elements and feature extraction are used. These features are normalized in the range -1 to 1 and given as an input to the artificial neural network for detection. Artiï¬cial neural networks are biologically inspired classiï¬cation algorithms that consist of an input layer, one or more hidden layers and an output layer. Feed forward back propogation algorithm is used for detection. Read More...
|
ELECTRONICS ENGINEERING |
India |
1364-1366 |
341 |
Tsunami Detection & Alert System using Wireless Sensor Network System
-Nitin Bhardwaj ; Deepak Kurwade; Prashant Mane
There have been very large no deaths and injuries due to tsunamis caused so far till date. People in surrounding region of tsunami centers are at very high risk of loosing their lives. While rare, high-impact tsunamis have the potential to cause widespread destruction. Displacement and damage to infrastructure are also important contributors to the human, social, and economic effects of tsunamis .Hence some smart system is necessary to detect tsunamis in advance and alert people in the near by region about it. This may help people to get to on large surface ground or higher at multistory building. Eventually large no of lives could be saved. So we are using smart wireless sensor network to detect tsunamis and then this information is wirelessly transmitted to control room and there onwards people whose entries have been registered into database of computer would be given alert by sending messages by means of GSM module used at control room. Read More...
|
Electronics & Telecommunication |
India |
1367-1369 |
342 |
Experimental Analysis of Heat Transfer by Natural Convection from Triangular Notched Fin Array
-Sachin Ramesh Pawar ; Ravindra B. Yarasu
The purpose of this analysis is to find out the effect of making triangular notch at central base of fin on natural convection heat transfer. In case of horizontal fin arrays (L/H~5) [1], it is observed that the air entering from both the ends gets heated as it moves towards the centre of the fin channel, as well as it rises due to decrease in density. So, a stagnant zone is created at the central bottom portion of fin array channel and hence it does not contribute much in heat dissipation [1]. In this experimental investigation, material from this stagnant portion is removed in the shape of triangular notch from the central bottom portion of fin and added on top side to modify its geometry for analysis. The fin weight remains same. Three types of fin arrays have been analysed that are fin array with 0%, 20% and 40% notch. The results are compared that heat transfer coefficient, Nusselt no. and effect of notch. In this analysis heat input is varied from 50W to 200W in the interval of 50W analysis is done till steady state conditions. Decrease in heat transfer coefficient is observed for 20% and 40% notch fin than fin without notch. Read More...
|
MECHANICAL Engineering |
India |
1370-1374 |
343 |
Development of Regenerative Braking System for Conventional Vehicle
-Nilkumar R. Vadariya ; Prof. Vijay F. Pipalia; Rajkumar B. Vekariya; Sagar J. Kasundra; Sandip S. Chauhan
Generally, in most of the cars, conventional friction brakes are used to stop or control the speed of cars while it is in motion. During the running condition, the car having lots of kinetic energy, when the brake is applied, this kinetic energy is losses by heat energy due to the friction between the brake shoe and brake plate. Thus this extra power loss reduces the overall efficiency of the vehicle. This type of heat losses of energy can be limit by use of regenerative braking system known as RBS. Generally, the main objective of regenerative braking system is to recover as much as possible torque while brakes are being applied. The kinetic energy of vehicle can be stored in another form of energy. In regenerative braking system, energy can be converted by means of generator, dynamometer, alternator, pump, compressor or flywheel or in other storage devices.Now a day the regenerative braking system is applied to many hybrid vehicles. But due to the complexity of design it can be applied to limited cars only. In this case, by using alternator or dynamo, the kinetic energy of the wheel, can be converted into the electric energy which is wasted while applying brakes. Read More...
|
mechanical engineering |
India |
1375-1379 |
344 |
Direct Torque Control of PMSM using Artificial Neural Networks
-Mohit J. Chavda ; Jimit K.Shukla
In this paper, we an artificial intelligence technique is used that replaces switching table, torque and flux estimator in classical DTC (Direct Torque Control).The technique used is Artificial Neural Network(ANN).The motor used here is permanent magnet synchronous motor. Direct Torque Control (DTC) is one of the most used techniques to control these motors. In this work an intelligent approach is used for the realization of the DTC for a PMSM by means of Artificial Neural Networks (RN). Read More...
|
ELECTRICAL ENGG. |
India |
1380-1383 |
345 |
Effective Data Leakage Detection on Cloud
-Narhari B. Rajput ; Prof. Pratibha V. Waje; Rishikesh S. Satralkar; Jitendra P. Wagh
Researchers have proposed several mechanisms to secure data from unauthorized use but there is very less work in the field of detecting and managing an authorized or trustworthy agent that has caused a data leak to some third party advertently or unknowingly on internet. In this paper, we implement methods aimed at improving the odds of detecting such leakages when a distributer’s sensitive data has been leaked by trustworthy agents and also to possibly identify the agent(s) that leaked the data on online system (cloud). We also implement some data allocation strategies that can improving the identification of leakages and can also be used to assess the likelihood of a leak at a particular agent assuming the fact that the data was not simply guessed by the third party where the leaked data set has been found. We propose new system on cloud for finding the leakages, We also propose new allocation strategies that work on the basis of Non-waiting model agent do not need to wait for other agents’ allocation and it is different from already proposed model that makes an agent wait for others. These methods do not depends on the alterations of the distributed data, but certain focus on minimizing the overlapping of the allocated data items to various agents, thus facilitating an exact decision of the guilty agent in a particular data leakage scenario. Read More...
|
Information Technology |
India |
1384-1389 |
346 |
English to Hindi Translation System using Quantum Neural Network Based Parts of Speech Tagger
-Ajay S. Nikam ; Mohammad Rizwan ; Deepak Patil; Modassir Haider ; Madhusudan M. Oza
Professionals consider that language is not a barrier in communication. If one person can communicate with other person by using pictures, body language or translating it into language that is understandable by other person. Some time person cannot understand other person language that time they can used machine translation system. Present machine translation system are translate the sentence is based on its knowledge. Sometimes translated sentence is in present system does not make sense completely or cannot be understood by other. We show that use of Quantum Neural Network numerical code to improve the performance of Machine Translation System for translating English to Hindi sentence. Also we translate English sentence to Hindi sentence by using part of speech tagger can translate many English sentence using small database. Proposed system is based on the concept of Machine translation and self learning using pattern recognition. This process is based on the Quantum Neural Network (QNN). Read More...
|
Computer Engineering |
India |
1390-1392 |
347 |
Facial Feature Detection
-Akash Dhande ; Pankaj Vishwakarma; Priyanka Hajare
Image feature detection is a fundamental issue in many intermediate level vision problems such as stereo, motion correspondence, image registration and object recognition. In this paper, we are going to present an approach to feature detection. We provide extensive experimental results to demonstrate its potential applications to several image analysis problems. Automatic recognition of people is a challenging problem which has received much attention during the recent years due to its many applications in different fields such as law enforcement, security applications or video indexing. Face recognition is a very challenging problem and up to date, there is no technique that provides a robust solution to all situations and different applications that face recognition may encounter. Read More...
|
computer science and engineering |
India |
1393-1397 |
348 |
Human Voice Authentication System using Hidden Marcov Model
-Ashwini Samak ; Aboli More; Tejasvi Yadav; Kishori Bichakar
Speaker authentication is the process of automatically identifying before who is talking on the base of person information included in speech waves. Many principles are used in the area of voice recognition. This paper provides a method of storing the voiceprints of individuals uniquely, based on the Hidden Markov Model. HMM has been used in the speech recognition area for a long period of time, but this project explores a way of using HMM for voice authentication which is different from speech recognition. This voiceprint will then be used for voice authentication, using text independent speaker recognition methods in which the system does not have belief in on special wording being talked, but one and only on the voice of the speaker. This paper also provides details about certain misconceptions with regard to voice authentication that exist in the society. This paper explains more about the user training phase detailing how the voice print of an individual is stored in the system by extracting certain properties of the waveform using HMM. Read More...
|
Computer Science Engineering |
India |
1398-1400 |
349 |
Microcontroller Based Efficient Ration Distribution System
-Kadam Manisha M ; Miss. Smita R. Jagdale; Miss Arati A. Lawand; Miss. Shraddha J. Chavan
The system proposed in this paper aims at automation in public distribution system. The government of India provide fixed amount of ration monthly for needy or poor people, but due to increased corruption in the market sector these all products dose not reach these people. Due to manual work lots of corruption is occurred. There is need to replace the manual work by some specific high tech – technologies and to involve governments for controlling transaction. In this paper we propose to replace traditional ration card by smart card. This requires use of microcontroller with communication net-work and RFID card in which all the details of user are pro-vided. Communication network such as GSM module is used to connect the system which is at PDS shop to the government database. So that Government should have control over all transaction in PDS stores. The Proposed PDS system will stop the corruption and illegal activities. Read More...
|
ELECTRONICS AND TELECOMMUNICATION ENGINEERING |
India |
1401-1404 |
350 |
Review on Characteristics of Swiss Roll Microcombustor
-Prof. Sagar B. Mane-Deshmukh ; Parag A. Marathe; Nitin G. Shelke; Saurabh S. Phadtare; -
A review of micro-combustion and micro-power generation with a special account of swiss roll configuration combustor is presented here. The basic concept of micro-combustion is put forth and its characteristics and scaling issues are discussed. Flame quenching is identified as the most important issue to deal with on the first hand with regard to micro-combustion. Then some strategies are discussed to overcome it. The heat recirculation concept is pursued further in this context and it leads to the study of the swiss roll configuration combustor. Thermal design of such a combustor is discussed. And the factors that affect the heat transfer characteristics are discussed. Read More...
|
Mechanical Engineering |
India |
1405-1409 |