No. |
Title and Author |
Area |
Country |
Page |
601 |
Welding Characteristics of 304, 306, and 316 Stainless Steel: A Technical Review
-N.Navaneethakrishnan ; V.N.Loganathan
In this paper stainless steel welding review is carried out. Stainless steels are materials with increasing use in industries, because they have good corrosion resistance and mechanical properties. However, these materials require rigorous welding and inspection procedures. Inspection can be done by ultrasonic treatments. They can be readily used in low temperature area like cryogenic applications Read More...
|
MECHANICAL ENGINEERING |
India |
2438-2440 |
602 |
Data Management in Cloud Computing
-Sheeba.Y ; Mr.D.Jayakumar
To some, cloud computing seems to be little more than a marketing umbrella, encompassing topics such as distributed computing, grid computing, utility computing, and software-as-a-service, that have already received significant research focus and commercial implementation. Nonetheless, there exist an increasing number of large companies that are offering cloud computing infrastructure products and services that do not entirely resemble the visions of these individual component topics. In this paper, the limitations and opportunities of deploying data management issues on the emerging cloud computing platforms are discussed. It is speculated that large scale data analysis tasks, decision support systems, and application specific data marts are more likely to take advantage of cloud computing platforms than operational, transactional database systems. A list of features that a DBMS designed for large scale data analysis tasks running on cloud computing platforms should contain is presented. Some currently available open source and commercial database options that can be used to perform such analysis tasks are discussed, and it is concluded that none of these options, as presently architected, match the requisite features. The need for a new DBMS, designed specifically for cloud computing environments is also discussed in this paper. Read More...
|
Computer Applications |
India |
2441-2446 |
603 |
Addressing Security Concerns in BYOD through Sandboxing
-Abhishek Mishra ; Dhara Vyas; Bhishm Narula; Dr Radha Shankarmani
A new trend of implementing Bring Your Own Device (BYOD) as an IT policy is being adopted by companies worldwide. It permits employees to bring their own portable devices like tablets, smartphones, etc to workplace and use them to access confidential corporate information while being both inside and outside their place of work. BYOD clearly raises serious security concerns since the device in question is not under the control of the enterprise and is vulnerable to a wide range of security threats. One of the major concerns in implementing a BYOD policy is data security and privacy. By allowing employees to access privileged corporate information on their personal devices, pertinent corporate data may be compromised. In this article, we address this problem and propose a solution that enhances the security in the BYOD scenario without compromising the usability and flexibility of the system. We suggest a sandbox which takes care of common connection, encryption and other security credentials for BYOD applications and helps monitor application usage on device for administrators. Read More...
|
Information Technology |
India |
2447-2450 |
604 |
Factor Affecting Waste Generation in Construction Industry
-Vishalkumar R.Gajera ; Vyom B. Pathak; Rushabh A. Shah
The management of construction waste is important today. The scarcity in the availability of aggregate for the production of concrete is one of the important problems facing by the construction industry. Appropriate use of the construction waste is a solution to the fast degradation of virgin raw materials in the construction industry. This paper aims to various factors which affects the construction project of the south Gujarat region of India. Read More...
|
Civil Engineering |
India |
2451-2452 |
605 |
Analysis and Minimization of Blow Holes Using DMAIC Approach
-Vikas ; Pardeep Kumar; Bhupinder Singh
The present work deals with minimization of sand casting defects in a foundry industry. DMAIC approach is justified when root cause of defect is not traceable. At present, global and competitive environment, foundary industries need to perform efficiently with minimum number of rejection in their manufacturing products. For better improvement in the casting quality, first of all finding the root causes of occurrence of defects blow hole in the casting process and taking necessary step to reduces defects and hence rejection in casting. Six sigma is more than a quantitative statistical measure of processes; it embraces every aspect of work, using a disciplined, fact based approach of problem-solving. Many time defects occur due to variation in the process parameter which are very difficult to detect. In the present work the metal casting process is analysis and minimised by using DMAIC (Define, Measure, Analysis, Improve, and Control) approach. Through a case study in a medium scale faundary, the present work formulate a comprehensive strategy of six sigma in indianfoundary. This study has significantly increase the efficiency of foundry industry and reduce scrap and waste in sand casting process which improve the production efficiency.A number of experiments are carried out to validate the results which indicate that the cost of experimentation will be less, in comparison to the gain or profit of the company. The results achieved shows that the rejection due to blow hole defects has been reduced from 5.83% to 2.04% which saved the cost of Rs 23828/- monthly (for continuous four months), in a turnover of 60 lakhs. Read More...
|
Mechanical Engineering |
India |
2453-2458 |
606 |
Development of Stress-Strain Curves for the Conventional Cement Concrete Containing Aluminum Metalized Post Consumer Plastic Waste
-Disham B Pransuriya ; Ankur Bhogayata
The paper reviews the development of stress-strain curves for the conventional cement concrete containing metalized postconsumer plastic waste and the important findings from the experimental works of various researchers. To careful study of various research papers on the topic it was felt by the authors to integrate all the important results for streamlining the potential of this area of research. The paper summarizes conclusions of experiments conducted for the properties like strength, workability and durability. It was observed the improvement in strength, workability and durability properties of the conventional concrete due to the adding of plastic waste and replacement by fine aggregate in different proportions. From the review of past research works it could be concluded that utilizing the plastic waste a great potential towards the development of environment friendly and sustainable conventional concretes. Read More...
|
Civil Engineering |
India |
2459-2460 |
607 |
Simulation and Analysis of Flow through Sudden Expansion
-Shaikh Majid ; Khan Jubeen; Ansari Musharraf; Khan Khalid; Syed Ashfaq
This project is based on ticketing and identification of the passenger in the public transport. In the big city like Mumbai, Kolkata we have a severe malfunction of public transport and various security problems. Firstly, there is a lot of confusion between the passengers regarding fares which lead to corruption, Secondly due to mismanagement of public transport the passengers faces the problem of traffic, thirdly we have severe security problems in public transport due anti-social elements. This project suggest a user friendly automated ticketing system which will automatically deduct the passenger’s fare according to the distance travelled as well as detect the passenger’s identification. This could be only possible by use of NFC e-tickets. This project basically deals with the verification and ticketing of the passengers sitting in the bus. Read More...
|
Mechanical Engineering |
India |
2461-2469 |
608 |
A Review on Different Techniques of Video Tampering Detection
-Sagar Solanky ; Prof. Hardik Patel
Video tempering , also known as video forgery, is a technique for generating fake videos by altering, manipulating, combining or creating new video contents. The recent development of video editing techniques enables us to create realistic synthesized videos .With the availability of different video editing tools ,technologies and softwares various types of videos are created from different perspectives As video editing tools are getting very complicated, modified videos are hard to detect. While using this advance tools for video falsifying it is very difficult to detect the forged or the manipulated videos.It is very important to detect the video forgery in some cases like low related cases .so, here we are Analysing the different techniues for the video tempering detection. Read More...
|
image processing |
India |
2470-2472 |
609 |
Action Recognition by Converting Normal Video into Silhouette Video
-Divya Rajan N T ; Blessingh T S; Sreeja Mole S S
Nowadays action recognition has many applications such as robotics, human computer interface etc. This project proposes a method for action recognition that uses a number of correlated poses. Here normal video is converting to silhouette video and then each silhouette video is converting to a set of images frames for feature extraction. The silhouettes are used as input features for the BoCP ( Bag of Correlated Poses) model. BoCP are using for encoding the local features of action. After the descriptor extraction C-means clustering algorithm is using to generating the codebook. Clustering is the process of dividing the dataset into subsets, so that the data in each subset shares some common values according to some defined distance measure. To reduce the high dimensionality of computed feature Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are using. Experimental results prove the viability of the complementary properties of two descriptors and the proposed approach outperforms the state of the art methods on the IXMAS action recognition dataset. Read More...
|
Electronics and Communication |
India |
2473-2473 |
610 |
Bio-Ethanol from Ligno-Cellulosic Biomass: An Alternative Transportation Fuel
-Ankit Patel ; Dr. N.J. Mistry
The fossil fuel-based economy is facing several problems and challenges, such as increasing emissions of CO2, decreasing reserves and increasing energy prices. In this background green biotechnology presents a promising approach to convert most of the solid agricultural wastes particularly lingo-cellulosic materials into liquid bio based energy-fuels. This paper presents study on successful production of Bio-ethanol from Sugarcane bagasse with Dilute Acid Concentration (1-5)% and time duration of (10-30)min. for. The results showed maximum yield of Bio-ethanol at Dilute Acid Concentration of 5% and at time duration of 20 min. Read More...
|
CIVIL ENGINEERING |
India |
2474-2475 |
611 |
Efficiency and Area Reduction for a PRNG Frame Work Based on Well Method
-D. Jerina Ezhilarasi ; P. Anand Selva Kumar
WELL method mainly describes that the 7.1 fold faster technique is inbuilt to increase the efficiency and reduce the area. The proposed architecture also implemented on targeting different device for the comparison of other types of PRNG. Interleaver sequence technique is used. A large number of research is made on PRNG compared with the MT algorithm specified for less than 423 MHz of frequency range. Now a days the recent communication technique is made for the WELL method along with the PRNG to achieve the high frequency range than the 423MHz. A resource – efficient hardware architecture for WELL with a throughput of one sample per cycle. The Well Equidistributed Long-period Linear (WELL) algorithm is proven to have better characteristics than the Mersenne Twister (MT), one of the most widely used long-period pseudo-random number generators (PRNGs). In this paper, we propose a hardware architecture for efficient implementation of WELL. Our design achieves a throughput of 1 sample-per-cycle and runs as fast as 423MHz on a Xilinx XC6VLX240T FPGA Furthermore, we design a software/hardware framework that is capable of dividing the WELL stream into an arbitrary number of independent parallel sub-streams. With support from software, this framework can obtain speedup roughly proportional to the number of parallel cores. We also apply our framework to a Monte-Carlo simulation for estimating p. Experimental results verify the correctness of our framework as well as the better characteristics of the WELL algorithm. Read More...
|
vlsi design |
India |
2476-2482 |
612 |
Analysis of Flat Slab and Waffle Slab in Multistorey Buildings using ETABS
-Anurag Sharma ; Claudia Jeya Pushpa.D
In multistoried buildings flat slab and waffle slab are generally engaged when column spacing is more. Flat slabs and waffle slabs are used in buildings in requirement of more working space like commercial buildings, workshops, assembly buildings, etc. The main disadvantage of structures with flat slab and waffle slab are there lack of withstanding seismic loads. Special features like shear walls are used to help the building to resist the lateral loads caused due to high winds and seismic loads. In this paper, an attempt has been made to investigate the seismic effect on multi storey building of G+9, G+14 and G+19 floors with waffle slab and flat slab using the software ETABS 2013. The seismic evolution is performed by response spectrum analysis as per IS 1893 (2002). It is observed that waffle slabs are advisable for structure with a height less than 40m, whereas for structures of height above 40m it is advisable to go with flat slab. Read More...
|
structural engineering |
India |
2483-2488 |
613 |
User Authentication Protocol for Multi-Server Architecture Based on ECC
-Ravindrakumar Deshmukh ; Vishal Chaugule; Shreyas Deshpande
We have reached an era where desired web services are available over the networks by click of a button. In such a scenario, remote user authentication plays the most important role in identifying the legitimate users of a web service on the Internet. Researchers have proposed a number of password based authentication schemes which rely on single server for authentication. But, with tremendous advancements in technology, it is possible to engage multiple servers in authenticating their clients in order to achieve better security. In this paper, we propose an efficient password based authentication protocol for multiserver architecture. The protocol provides mutual authentication using user system and is based on Elliptic Curve Cryptography, therefore offers best security at a low cost. In 2011, Sood et al. proposed a multi-server architecture protocol using user systems. In this paper, we improve Sood et al. scheme by increasing its security and reducing the computation cost. The protocol is based on the concept of dynamic identity that uses a nonce based system and has no time synchronization problem. Read More...
|
Computer Engineering |
India |
2489-2491 |
614 |
Detaining the Subjective Relevant Events based on user’s Likelihood by an Exotic Approach
-R.Sridevi ; V.Aruna
Data Mining is the process of examining the different types of data and summarizing it to the useful information. The Opinion mining is the process of natural language processing, analysis, computational identification and extraction of subjective relevant information. Social media is an emerging trend for communication between people worldwide and it has attracted millions of users. A typical characteristic of such sites is that they allow anyone to post or like anything they like on any subject. Here the user’s feedback and satisfaction is playing a vital role. In some cases the user may not give the feedback or reviews which they have viewed or downloaded directly. Instead of that the user is just searching the available things based on their interest. So there is no possibility for capturing the domain interest behavior of the user explicitly. This paper proposes to detain the subjective relevant events based on user likehood by using the exotic approach. The user likehood is analyzed and the domain is extracted. The Experimental results determine the viability for detaining the subjective relevant events. Read More...
|
Computer Science And Engineering |
India |
2492-2496 |
615 |
Micro strip Patch Antenna Array of Triangular Patch for Wi-MAX Application
-Sanjeev Singh Ratnakar ; D.C. Dhubkarya
This paper describes a microstrip patch antenna array of triangular patch .This Antenna array achieves high gain 8.8dBi at frequency 2.68 GHz. This antenna utilized dielectric substrate which has dielectric constant 4.4 and thickness 1.6mm. Proposed antenna show percentages bandwidth 6.8 and it offer gain 8.8dBi, directivity 11.5dBi and antenna efficiency 58% at resonant frequency 2.68 GHz. So this microstrip patch antenna array of triangular patch shows applications for Wi-MAX. Read More...
|
Electrical engineering |
India |
2497-2498 |
616 |
High Performance Indirect Current Control Scheme for BLDC Motor Using Four Quadrant Converters
-G.Anita Merlin ; K.Sripriadarsini
In the recent trends of railway traction, Four Quadrant Converters are mainly used. To describe the four quadrant using DC output to inverter control brushless dc (BLDC) motor drive for various applications. Brushless DC motor drives are becoming more popular in industrial& traction applications. In addition to Indirect current control (ICC) is also an alternative in high power, low switching frequency applications. For effective operation of the developed system, a novel indirect current controlled pulse width modulation scheme is designed and implemented to produce the desired static and dynamic speed–torque characteristics. This project demonstrates the BLDC motor is modeled as star connected with isolated neutral and the voltages supplied are line-line but current commutation is controlled by solid state switches. The commutation instant is determined by the rotor position. The BLDC motor drive system along with the control system for speed and current has been present using MATLAB. Read More...
|
ECE |
India |
2499-2502 |
617 |
à¤à¤¾Rती - An Attempt to Cross Lingual Search
-Asha Bharambe ; Hitesh Narang; Naveen Pahuja; Sneha Jaisinghani; Sundeep Nawani
In this paper we describe à¤à¤¾Rती, a cross-lingual search application which would be used to crawl the data on the web in the assumed Indian National language viz. Hindi. This work is done with the intent of helping people to get access to the world of internet who doesn’t know English language. à¤à¤¾Rती will accept the input in Hindi language, determines the part of speech tags of each word from the sentence, sends the input to Google Translate Server which translates the input in to English language except all nouns which if translated will change the meaning of search query using its Translate API , as Google Translate API is one of the best translator among all other available translators, then it searches for the translated text by using Google search Engine and crawls the data on the web using JSOUP technology, the crawled results will be in English and will be translated back in Hindi by the Google Translate Server using its Translate API and will be displayed accordingly. Read More...
|
Computer Engineering |
India |
2503-2506 |
618 |
Hukum Mere Aaka - A Speech to Command Converter
-Prof. Charusheela Nehete ; Ram Mulchandani; Nikita Rajpal; Priyanka Talreja; Kanchan Tikya
Our project Hukum Mere Aaka provides the user with the choice of input with the help of the voice commands rather than using the keyboard and a mouse. Our software provides the user to operate the computer in a hands-free mode for executing the commands. This has enabled us to significantly reduce the waiting time to implement the important functions of a computer and this increases the efficiency as well. Speech to command, is the next step towards automation of computers. This enables the user, to carry out the functions in a quicker manner. Our software detects the command which is given by the user and acts accordingly to complete that function. This opens up a unique opportunity of equality for all individuals who want to use the computer irrespective of their age or literacy or background. We believe, speech to voice command is the future of next-generation computing to make computing easily accessible for all.We have built in voice commands for a number of functions which can be implemented with the help of a couple of words of voice input by the user. The software is programmed to detect these voice inputs. The software covers the voice commands to open website or open important software of Windows like Microsoft paint etc.Features include:
ï€ Opening different application on desktop through voice.
ï€ Performing different functions in a text Editor such as open, save etc.
ï€ Reading out text written in editor.
Read More...
|
Computer Engineering |
India |
2507-2508 |
619 |
Handover Strategies in Cellular System
-Anas Nagani ; Nadeem Chachia; Shahrukh Ansari; Amol Sankpal
Mobility is the most important feature of a wireless cellular communication system. This continuous service is achieved by Handoff (or Handover) from one cell to another cell. Handoff (also called Handover) is the mechanism that transfers an ongoing call from one cell to another cell as a user moves through the coverage area of a wireless cellular system. The main objective of handover is to maintain the ongoing calls. Many times it is initiated by crossing a cell boundary or by deterioration in quality of the signal in the current channel. Handovers are used to prevent an ongoing call to be disconnected. If handovers are not used then whenever a user leaves the area of a particular cell then its ongoing call is immediately disconnected. The handover process requires a number of parameters e.g. which handover scheme we are using, how many channels are free for call. In the handover process the QoS should be kept up to the standard. Handoff schemes which are poorly designed tend to generate very heavy signaling traffic and, therefore, there is a dramatic decrease in the quality of service (Qos). The reason for the critical handoffs in cellular communication systems is that in neighboring cells always a disjoint subset of frequency bands is used, so negotiations must take place between the current serving base station (BS), the mobile station (MS) and the next potential BS. Read More...
|
Mobile Communication |
India |
2513-2517 |
620 |
Overview on Kanban Methodology and Its Implementation
-Rajat B. Wakode ; Laukik P. Raut; Pravin Talmale
Kanban methodology is very significant philosophy which plays an important role in many production units. In this paper Kanban methodology has been reviewed and has been implemented on ‘Swing Lever Assembly’ of the Bajaj Steels Pvt. Ltd Nagpur. The Kanban system involves the selection of two important parameters i.e. the lot size and the numbers of Kanban used in the process. The main objective of Kanban system is to maximize the productivity of a unit and this is done by reducing the idle time of the process. Kanban system is a very cost efficient process if applied in proper manner. Read More...
|
Mechanical Engineering |
India |
2518-2521 |
621 |
Design and Fabrication of Hybride Two Wheeler
-Shubham Panjabrao Jalamkar ; Ashish Kawale; Prashant Bhujade; Nikhil Sahare; Aamir Sayed
A ‘hybrid electric two wheeler' is a vehicle which relies not only on batteries but also on an internal combustion engine which drives a generator to provide the electricity and may also drive a wheel. It has great advantages over the previously used gasoline engine that drives the power from gasoline only. It also is a major source of air pollution. The objective is to design and fabricate a two wheeler hybrid electric vehicle powered by both battery and gasoline. The combination of both the power makes the vehicle dynamic in nature. It provides its owner with advantages in fuel economy and environmental impact over conventional automobiles. Hybrid electric vehicles combine an electric motor, battery and power system with an internal combustion engine to achieve better fuel economy and reduce toxic emissions. In HEV, the battery alone provides power for low-speed driving conditions where internal combustion engines are least efficient. In accelerating, long highways, or hill climbing the electric motor provides additional power to assist the engine. This allows a smaller, more efficient engine to be used. Besides it also utilizes the concept of regenerative braking for optimized utilization of energy. Read More...
|
Mechanical Engineering |
India |
2522-2525 |
622 |
Design and Fabrication of Shaft Driven Bicycle
-Ashish S. Gawande ; Avinash E. Gedam; Anuj A. Khond; Aniket G. Pipre; Nitesh C. Bajait
The normal bicycle is the one of the medium of the travelling. Generally we all are aware of the bicycle and most of us have utilized it. A shaft driven bicycle is a bicycle that uses a shaft drive instead of a chain which contain two set of bevel gear at both the ends to make a new kind of transmission system for bicycle for getting high reliability system, and more safe system. Recently due to advancement in internal gear technology, makes the use of bevel gears for most efficient performance and transmit motion through 90 degrees angle. It replaces the traditional methods. Read More...
|
Mechanical engineering |
India |
2526-2529 |
623 |
Power Harvesting Through Regenerative Energy Sources
-R.ARVIND ; N.L.DIVYA; CHINNI SUDHEER; PAVITHRA
In today’s scenario, there is more and more interest being taken to produce current in alternate forms rather than getting directly and environment friendly technologies may be incorporated. One of the best methodologies to generate electricity by using human walking. When humans walk, they produce a lot of energy which is of no use. This kinetic mechanical energy derived from human walking can be used to generate energy to run home appliances like charging a mobilephone. This system involves designing a charging system which is powered via a piezoelectric and that is capable of charging more than one batteries at the same time. In this proposed system, The surface under the foot path collect energy from the vibrations, The piezoelectric charging panels channel energy batteries which can be used further. Our system measures the power level produced and monitors it frequently. Here alternative sources like noise can also be added to boost up the voltage ,and that voltage also can be saved in the battery for further use .This method can be employed in lots of day today places like railway station, shopping complex where lots of people crowd together ,This method has only investment and very reliable too. Read More...
|
Electronics ENGINEERING |
India |
2530-2532 |
624 |
GENERATION OF POWER IN HIGHWAYS BY COMBINATION OF SOLAR AND VERTICAL AXIS WIND TURBINE
-Pavithra T ; Arun R; Karthika S
In the present economic world, there is a demand for electrical energy. This demand makes us to seek new energy sources. The most important application field to meet the demand is renewable energy resources. Wind and solar energy are popular resources owing to abundant, ease of availability and convertibility to the electric energy. This work covers realization of a hybrid renewable energy system for a domestic application, which runs under a microcontroller to utilize the solar and wind power. While combining vertical axis windmill and solar panel, the initial power required for the wind turbine will be obtained from solar panel and no external power is required. The whole apparatus setup is placed in between the highways on the divider. When any vehicle passes on the highway, the vertical windmill will start to rotate and produce electrical power that is stored in the battery. It is a renewable energy source that has virtually no environmental problems and takes less space than conventional power plants. There is a great demand for usage of electricity in remote areas. By implementing this project, the shortages can be overcomed and it become a reliable source of energy. Read More...
|
Electrical Engineering(Renewable energy) |
India |
2533-2536 |