No. |
Title and Author |
Area |
Country |
Page |
201 |
Analysis of Power Tracing Methods and Comparison of Transmission Pricing Methods of Deregulated Power System
-Chaudhary Raju Bhemabhai ; Dharmistha Makwana; Hemant N. Raval
In this present era, a fair transmission pricing scheme is an important issue due to increased deregulation and restructuring of power sector. In this view, issue of tracing the flow of electricity has been gain importance as its solution helps in evaluating a fair and transparent tariff. A power tracing method would make it possible to charge the generators and consumers on the basis of actual transmission used. The several approaches for transmission cost allocation in a centralized pool based electricity market environment that includes composite embedded/marginal transmission pricing mechanisms. Eight transmission pricing schemes and three tracing methods are being evaluated and applied on Garver’s 6-bussystem and on IEEE 24-bus reliability test system to illustrate the different results derived among the pricing schemes for each tracing method or among tracing methods for each pricing scheme. Read More...
|
ELECTRICAL ENGINEERING |
India |
828-834 |
202 |
A Survey Paper on Information Hiding on Webpages
-Chaitali Patel ; Nimisha Patel
The growth of internet has increased the demand for techniques that can ensure information security on web page. Cryptography, Steganography and Watermarking are three basic methods which will help us to secure data from unauthorized access. Steganography is one of the good techniques to hide message from unauthorized audience. It is used to hide a secret message inside various kinds of files like Audio, Video, Images, and even text document. The benefits of the steganography techniques over the cryptography are that no one except sender and intended user can see the existence of message. This survey paper concentrates on the steganography techniques that used web document hides the data. In this paper, We survey different steganography techniques that can be applied on web pages to hide the data. Read More...
|
Computer Engineeering |
India |
835-838 |
203 |
Non Dimensional Design of Centrifugal Compressor for Small Scale
-Samkit Shah ; Prof.Nilesh R.Sheth; Prof.Samip P.Shah
This paper investigates the development of a preliminary design method for centrifugal compressors. The analysis and design of Turbo-machines, at any level of sophistication, must ultimately be based on an understanding of the thermodynamics and fluid mechanics processes which take place in the machine. On the simplest level a preliminary design may consist of no more than the application of the basic equations to estimate the magnitude of overall design parameters, while on more complex level the design methods will attempt to simulate more closely the actual flow. The present work describes the simplified approach to optimum design of centrifugal compressor stage with the help of fundamental equations, which describe thermodynamics, and aero-fluid dynamic flow process in Turbo-machines. Read More...
|
turbomachinery |
India |
839-843 |
204 |
Evolution of Compressive Strength of Concrete When Cement Is Partially Replaced By Sugarcane Bagasse Ash
-Bhavesh Kumar Singh ; Himanshu Jain
India is a agriculture based country, many crops are grown here like wheat, rice, sugarcane etc. the main problem is to dispose these waste, earlier studies shows that these waste shown some pozzolonic properties. In this project waste of sugarcane i.e. sugarcane bagasse ash is partially replaced by cement upto 25%. Read More...
|
Civil Engineering |
India |
844-845 |
205 |
Survey Paper on Proactive Topology Based Routing Protocol in VANET
-Krunal M.Makwana ; Hitesh C. Patel
VANET (Vehicular adhoc network) research field is growing very fast. It is a special class of MANET which provides communication between vehicles intelligently via vehicle to vehicle communication or vehicle to roadside communication. Some of the promises of VANET are intelligent traffic system, early warning signals for vehicles that could minimize road mishaps and provision of better in-transit communication. As the performance of communication depends on the selection of best route while communication & routing of data is done by routing protocols. A variety of research has been done on routing and several protocols have been proposed with their implementation. This paper discusses proactive topology based routing protocol & their comparison with other routing protocol. Read More...
|
Vehicular adhoc network |
India |
846-849 |
206 |
Chemical Resistance of Fly Ash and Metakaolin Based Ternary Blend Concrete
-Rohit Riteshkumar J. ; Dr. Rajul K. Gajjar
An attempt has been made to study durability properties of fly ash and metakaolin blended concrete, when it is exposed to certain types of chemicals. Metakaolin is a thermally structured, ultra-fine pozzolana, which replaces industrial by-products such as silica fume, fly ash, etc. An experimental investigation has been carried out to evaluate the durability in terms of Chemical Resistance and weight loss of ternary blend concrete with for concrete of M40 grade. In this investigation an attempt is made with chemicals like H2SO4 and Na2SO4. The results show that the percentage of weight loss is reduced and compressive strength is increased in the case of ternary blend of fly ash and metakaolin concrete compared to normal concrete. Also the less percentage weight loss is noticed in the case of Na2SO4 and severe in the case of H2SO4. Read More...
|
CIVIL ENGINEERING (CONCRETE TECHNOLOGY) |
India |
850-853 |
207 |
Designing Secure Web Application using J2EE Security Patterns
-Chavada Sandip K ; Prof. Kalpesh Patel
Today your website is your brand, your business backbone and often your first contact with your customers. If it’s not safe & secure, those critical business relationships can be compromised. A single security breach could be a finished a small business. Security Pattern described a recurring problem that arises in specific context, and it presents a well proven generic solution. During past few years developing secure application using security design pattern is popular area in the field of security. The role of security pattern is fulfilling security requirement and provide well-structured solution for security vulnerabilities. Providing end to end security using j2ee security pattern is differ from traditional infrastructure security design pattern in term of addressing security requirement, mitigating security risks, securing business object and data across logical tires, securing communication and protection the application from unauthorized threats and vulnerabilities. Our approach is to find a j2ee security pattern as a countermeasure to vulnerability. This is the way of providing link between security expertise and software developers to apply security knowledge in software development practice. Security should be considered throughout each stage of software development process to develop secure application [2]. This security engineering approach restricted due to complexity and diffusion of today security knowledge so it is still difficult to integrate security into software development process [9]. In this paper approach for ‘designing secure web application using j2ee security pattern’ is presented which Aim find threat and security requirements of web application and use j2ee security pattern to mitigate vulnerability. So that developer can be specify the threats and vulnerabilities in web application during early stage of development, and then it can be solve using the j2ee security pattern. Read More...
|
Computer Engineering |
India |
854-856 |
208 |
Design and Implementation of Web Information System for Asthma Attacks using Raspberry Pi
-Shweta S Budihal ; Niharika Kumar
As the main target of this paper is to the developing of a flexible system characterized by a low-cost sensing nodes that assures robust and continuous monitoring of air conditions in order to prevent the asthma attacks and other respiratory attacks. At the same time it permits to establish correlations between the air quality parameters, physical parameters and the Appearance of respiratory diseases such as asthma, lung cancer and other respiratory attacks as part of environment medicine approach. The wireless sensor network includes a set of sensing nodes with ability to measure environment parameters like temperature, relative humidity, carbon monoxide among others and to send processed information to a smart coordinator such as the Raspberry Pi which is the new controller which is able load the information on to the web. This paper presents a web information system and a wireless sensor network for indoor or outdoor air quality monitoring with application in asthma trigger factors assessment. Referring to software, a client application that uploads the measured data to a remote air quality server through Internet was designed and implemented. The primary processing is done by the smart coordinator that transmits the processed values of air quality parameters including alarms to a web based information system. Referring the web based information system it assures the human machine interface, the users being capable to receive alerts, and to visualize the data associated with wireless sensor network, and to monitor network status. Alarm will be generated when the temperature, humidity and CO is greater than or equal to the boundary limit set and gives status it’s abnormal. Read More...
|
COMPUTER NETWORKS ENGINEERING |
India |
857-859 |
209 |
Privacy Preservation of Online Tagging End Users by Tag Suppression and Graph Analysis
-Chetana B U ; Ravikumar S G
One of the most popular services provided in the online store is collaborative tagging. It allows the end user to loosely classify the products into categories and the products can be viewed in the categories where they belong to. The tags to the products contain sensitive information such as usernames which is a personal information of the user. Suppressing the sensitive tags might be a useful way to preserve the end user privacy. In the paper, we make contribution to the online shopping mart by providing the efficient method to increase their business by monitoring the interest of the users and contribution towards how a tag suppression technique will enhance the privacy of the user by using a most popular form that is tag suppression. We have also dealt with the keyword search technique which provides web access functionality such as easy discovery of product, by content filtering and discoveries based on the user preferences. Read More...
|
COMPUTER NETWORKS ENGINEERING |
India |
860-862 |
210 |
Enhancing Image Security by Prediction Error Clustering and Random Permutation Methodology
-Mahesha.S ; Nithya.S
In practical scenarios, encryption should be performed before the image compression. If encryption is not performed then there may be the chances of stealing the information. Therefore we have proposed a system where encryption is done prior to the image compression. Here we have considered both the types of compression -Lossless and Lossy compression. Compression is done in the prediction domain where experts find out the prediction error of each pixel then encryption is applied on them by random permutation. Prediction domain provides the high level of security. Most of the existing ETC solutions induce significant penalty on the compression efficiency. In this paper we are proposing a new approach named as “Enhancing image security by prediction error clustering and random permutation.†where compression is applied on the clusters of encrypted image So image received at the receiver end has all the characteristics of original image. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
863-866 |
211 |
A Review of Analytical Analysis for Enhancement of Performance and Efficiency of HAWT
-Hemant Rav Patel ; Dr. V. N. Bartaria
In view of the requirements to access the wind energy efficiently, a model of three bladed horizontal axis wind turbine is to develop and analyse for its aerodynamic efficiency by considering an idealized wind turbine rotor. The model for rotor hub is also developed for structural analysis. This study introduces important concepts and illustrates the general behavior of wind turbine rotors and the airflow around wind turbine rotors. The analysis is also used to determine theoretical performance limits for wind turbines. This study includes increase the efficiency or power coefficient of horizontal axis wind turbine rotor, to carry out performance analysis and power prediction of horizontal axis wind turbine, Comparison of power prediction with an existing turbine, Structural design of wind turbine rotor components like blade and hub, Create an efficient finite element model with enough elements for accurate modelling of minimization the stresses and deflection in rotor and compared with an existing design. Read More...
|
Mechanical Engineering |
India |
867-872 |
212 |
Self Detecting and Verifying Geometric Shapes in an Image Using Minimum Bounding Rectangle
-Mr. Gaurav Tripathi ; Mrs. Jahnavi Bodhankar; Mr. P. Visu
Shape recognition application of computer vision nowadays plays a vital role in understanding of an image. A method was developed for detecting two dimensional geometrical shapes of objects in an image without training database. The images can be real image, a virtual image or hand drawn image. The algorithm recognizes shape type with the help of shape metrics and then recognizes shape by segmenting images into individual objects corresponding to their regions. Read More...
|
Computer Science Engineering |
India |
873-876 |
213 |
An Approach for Subtitles Extraction from Videos and Converting to Text Document
-Rima Pitroda ; Kinjal Shah; Shardul Agravat
With the increment and wide use of practical vision systems and smart phones, text detection in videos has become a critical yet challenging task. In today’s world and advancement in easily available and different featured cameras, text recognition has become a tough work and changes are occurring in this field. Texted content present in the video provides useful information likewise scene understanding, for narration, it adds details to the music playing or video playing. With the expansion of digital libraries therefore there is intense need of a method to retrieving the image using the embedded content in them. The proposed system is to detect text and extract them from the videos containing subtitles. The algorithm proposed here aims to get better subtitle extraction form these texted frames of videos. Our approach is to extract the subtitles from the videos by using edge detection and clustering and stroke width transform. Read More...
|
Computer Engineering |
India |
877-880 |
214 |
Resource Allocation for OFDM Based Cognitive Radio System
-Kartik H Chaudhary ; Bharat D Prajapati
Cognitive Radio (CR) is a novel concept for improving the utilization of the radio spectrum. It is a software controlled radio that senses the unused frequency spectrum at any time from the wide but congested wireless radio spectrum. This promises the efficient use of scarce radio resources. Orthogonal Frequency Division Multiplexing (OFDM) is a reliable transmission scheme for Cognitive Radio Systems which provides flexibility in allocating the radio resources in dynamic environment. It also assures no mutual interference among the CR radio channels which are just adjacent to each other, making it one of the best schemes to be used in CR systems. Allocation of radio resources is a major challenge in cognitive radio systems. In a dynamic environment, many parameters and situations have to be considered which affect the total data rate of the system. A Secondary users (CRUs/SUs) may coexist with the Primary user (PU) either on Conservative basis or on a more aggressive basis which allows secondary transmissions as long as the induced interference to the PU is below acceptable level. In this we have considered Uplink cognitive radio system heaving one PU coexists with M SUs and A Downlink of an Multi User Orthogonal Frequency Division Multiplexing CR system with one base station (BS) serving one PU and K SUs. We focused on the design on the design and analysis of subcarrier and power allocation scheme under imperfect CSI for cognitive OFDM systems. A two – step Algorithm for bit rate is proposed to obtain the (1) subcarrier allocation to secondary users and (2) bits, power allocation on subcarriers. The algorithms attempt to maximize the total throughput of the CR system (secondary users) subject to the total power constraint of the CR system and tolerable interference from and to the licensed band (primary users). Read More...
|
Electronics and Communication |
India |
881-884 |
215 |
Effect of Back Rake Angle on Surface of EN-31 during CNC Turning
-Indrajit M. Solanki ; Sunnykumar H. Bhingaradiya; Dasharath L. Prajapati; Mithilesh N. Suthar
The effect of cutting parameters such as cutting speed, feed rate, depth of cut and back rack angle at three level will be examine on CNC turning of EN-31. The material using titanium nitride (TiN) coated carbidetool. We will measure the surface roughness (Ra) by using full factorial design of experiments method. ANOVA will use to calculate the percentage contribution and significant parameter and also the regression analysis will use estimate the regression co-efficient that minimize the error and predict the surface roughness value. Read More...
|
Mechanical Engineering |
India |
885-889 |
216 |
Design of Digital Pulse Width Modulator with High Resolution and Optimized Power
-Girish
Advantages of digital control in power electronics have led to an increasing use of digital pulse-width modulators (DPWM). However, the clock frequency requirements may exceed the operational limits when the power converter switching frequency is increased, while using classical DPWM architectures. In this paper, we present two designs to increase the resolution of the DPWM signals. First architecture is asynchronous method using NAND and MUX this architecture gives higher switching frequency as well as good resolution. And second proposed architecture is based on the on-chip digital clock manager block. These architectures have been designed, tested, and verified the performance of these architectures. Read More...
|
vlsi |
India |
890-894 |
217 |
Security for Mobile Ad Hoc Network with Trust Management Using HDSR Protocol
-S. Subashini ; P. Muthukumar
MANET plays an important role in dynamic topology and open wireless medium. In now a day’s MANET having many security vulnerabilities, security is very important for all needs particularly in the area of wireless network. Our project will focus on the method to improve packet delivery ratio and throughput and then reduce the end-to-end delay and overhead messages by using HDSR. In our system by using a unified trust management scheme that enhances the security in MANET, the trust value model has two components, trust from direct observation and trust from indirect observation. With direct observation from observer node, the trust value is derived using Bayesian interference and indirect observation from observed node, the trust value is derived using dempster-shafer theory. Read More...
|
wireless networks |
India |
895-897 |
218 |
Voltage Stability Assessment Using Different Indices
-Abhay Kumar ; Viren Pandya
The problem of voltage instability has been increasing day by day because of the increased demand of power. It is important to analyze the power system behavior with respect to voltage stability. This paper shows the performance of the stability indices. The two indices whose analysis are performed in the paper are line stability index and fast voltage stability index. The indices are tested on IEEE 14 bus standard test system. The simulation of the IEEE 14 bus system is implemented using PSAT toolbox. With the help of the above mentioned indices the most critical lines and the weakest buses can be identified. Lines having index value equal to one or close to one are considered as the most critical lines. Read More...
|
POWER SYSTEM |
India |
898-901 |
219 |
Energy Efficient Reliable Path Considering Residual Energy with Hop Count Parameter in MANET
-J. Kavitha ; S. Sankar
The most important issue that must be solved in designing a data transmission algorithm for wireless Ad Hoc networks is how to save Ad Hoc node energy while meeting the needs of applications/users as the Ad Hoc nodes are battery limited. While satisfying the energy saving requirement, it is also necessary to achieve the quality of service. In order to achieve this requirement, Energy-efficient Energy-Aware routing protocol for wireless Ad Hoc networks is proposed that saves the energy by efficiently selecting the energy efficient path in the routing process. When source finds route to destination, it calculates α for each route. The value α is based on largest minimum residual energy of the path and hop count of the path. If a route has higher α, then that path is selected for routing the data. The value of α will be higher, largest of minimum residual energy of the path is higher and the number of hop count is lower. Once the path is selected, data is transferred along the path. In order to increase the energy efficiency further transmission power of the nodes is also adjusted based on the location of their neighbor. If the neighbors of a node are closely located to that node, then transmission range of the node is decreased. Therefore it is enough for the node to have the transmission power to reach the neighbor within that range. As a result transmission power of the node is reduce which subsequently reduces the energy consumption of the node. Read More...
|
wireless networks |
India |
902-905 |
220 |
Parametric Performance Analysis of LLDPE Blown Film for Tensile Strength, Gauge and Yield with Calcium Carbonate Filler
-Patel Poojaben Navinkumar ; Prof. V. A. Patel; Dr. D. M. Patel
The blown film machine is design to manufacture blown film from HDPE, LLDPE, LDPE. Over past few year, much intrest has been placed in to the investigation of increased mechanical properties of blown film via multitude approaches. In this work use LLDPE O19010 base polymer grade and calcium carbonate use as a filler. To evaluate the cross linking effect of ca+2 cation film made from caco3. The production of blown film is carried out in two steps. First thermoplastic pellet are processed in dryer then they transferred in to thin film using a classic film blowing machine. In this study use taguchi method with 3 level of factor which are caco3 %, dryer temperature, motor rpm, inflation pressure, die exit temperature and produce the film from this factor. After this bubble diameter, BUR, gauge, tensile strength, elongation and yield measurement is carried out. Read More...
|
MECHANICAL ENGINEERING |
India |
906-910 |
221 |
Optimizing Idle State Configuration to Improve Power Saving for M2M Communication over LTE Networks
-Mugisha Robert ; Pravin R Patil
M2M communication has gained popularity because of its endless possibilities, and when it is conducted over more advance networks like the 3GPP LTE/LTE-A which deliver higher throughput and can handle more active devices with a cell the possibilities even become greater. LTE networks were mainly designed for H2H communication meaning that we cannot just use M2M communication over it without any changes. M2M devices are usually sensors or actuators meaning that they have a limited power source. LTE networks have a power saving mechanism known as Discontinuous Reception (DRX). M2M devices spend most of their time in the idle state therefore more optimization needs to be carried out in the idle state. In this paper, an analysis of the available power saving mechanisms like reducing the RRC Inactivity timer and extending the DRX paging cycle is carried out. Then a DRX configuration switching mechanism is proposed, implemented and analyzed so as to save battery power but also ensure that delay (latency) is controlled at the same time for delay sensitive traffic. The results show that the switching mechanism actually helps to reduce the delay significantly as well as save power at the same time but if the sole purpose is to save battery power only then reducing the RRC Inactivity timer is the best approach. Read More...
|
Computer Engineering |
India |
911-916 |
222 |
Induction Motor Control Using Direct Torque Control (DTC)
-Prajapati Akashkumar Karshanbhai ; Dr. Saurabh N Pandya; Ghanchi Maqbul Usmanbhai; Shah Priyank Kaniyalal
In the industrial world, variable speed drive has always been great importance for precise and continuous control of speed with highly stable and very good transient performance. Direct Torque Control method for the Induction motor control one of the better control method in which the torque is directly control by changing the stator voltage and that’s why it is known as Direct Torque Control (DTC).The induction motor is supplied by six step voltage source inverter (VSI) by using direct torque control (DTC) technique. The Direct Torque Control (DTC) method for the drive control is become popular due to some of its advantages like it doesn’t required any kind of sensors, good dynamic performance, give better torque and flux control etc. The proposed paper is described the induction motor control with the help of matlab simulation. Read More...
|
Electrical Engineering |
India |
917-920 |
223 |
Effect of Limestone and Wooden Dust as a Filler Material on Fresh and Hardened Properties of Concrete
-Ushama. Z. Laliwala ; Paresh N. Nimodiya
In this project main objective is to study the partial replacement of the Limestone and Wooden Dust with the varying proportion in the concrete and to check the different properties of the concrete by comparing with the normal concrete. The replacement of Fine aggregate (sand) with certain wooden dust in concrete that makes the structure more light in weight mean while we are going to replace the limestone as in place of coarse aggregate in the concrete so make it more compacted with the small aggregates. The Workability, strength and durability test are studied in this project. The most important properties of concrete is the compressive strength. Also, increasing the limestone and the wooden dust incorporation caused decreases in unit weights and compressive strength values of mortars with a parallel increase in water absorption values at all ages. Read More...
|
CIVIL ENGINEERING |
India |
921-924 |
224 |
Performance Modeling of Single Cylinder CI Engine Fuelled With Blend of Diesel and Pyrolysis Using Taguchi Method
-Bhatiya Sankeykumar Ashokbhai ; Bhatiya Sanketkumar Ashokbhai; Dinesh Kumar Koli
An experimental study has been carried out for pyrolysis oil blended with diesel used in single cylinder diesel engine. Pyrolysis oil is obtained from tire waste by pyrolysis process. Pyrolysis process is a thermo- chemical decomposition of organic matter in absence of oxygen. Blending of pyrolysis oil with diesel in maximum possible proportion helps to reduce the consumption of diesel fuel. In this study, the effects of parameters` i.e. load, blend proportion and injection pressure are taken as variable for optimization. As the experiment required simultaneously optimization of three parameters with five levels, taguchi method of optimization is used in this experiment. The results of the taguchi experiment identifies that 5% blend ratio, injection pressure 150 bar and engine load 20kg are optimum parameter setting for highest mechanical efficiency and 10% blend ratio, injection pressure 150 bar and engine load 20kg are optimum parameter setting for highest brake thermal efficiency and 25% blend ratio, injection pressure 230 and engine load 4kg are optimum parameter setting for lowest specific fuel consumption. Engine performance is mostly influenced by engine load and is least influenced by injection pressure for mechanical efficiency and for brake thermal efficiency and for specific fuel consumption engine performance is mostly influenced by injection pressure and is least influenced by engine load. Confirmation experiment was done using optimum combination showed that mechanical efficiency, brake thermal efficiency and specific fuel consumption were found by experiment is closer to the predicated value. Read More...
|
Mechanical Engineering |
India |
925-931 |
225 |
A Review on Performance and Emission Analysis of Emulsified Diesel
-Avesh S Khan ; Kevin Pethani; Krunal Kheraiya
Diesel engines exhausting gaseous emission and particulate matter have long been regarded as one of the major air pollution source and have been a source of serious public concern for a long time. There has been numerous research in the field of reduction of these pollutants since diesel engines came to major use. An alternative fuel for CI engines that can be used with the existing engine setup with no additional engine retrofitting or modifications is emulsified Diesel i.e. Water-in-diesel emulsion. It has benefits of simultaneous reduction of emissions and performance improvement. This review paper addresses the performance and emission of emulsion, and effect of water content on the combustion and emissions of Emulsified Diesel fuel. Thus Emulsified diesel can be recommended for use in place of conventional diesel. Read More...
|
mechanical engineering |
India |
932-935 |
226 |
Network Analysis of Wavelength Division Multiplexing (WDM) Using EDFA
-M. Likhit ; M. Vinay Sagar; Y. S. Manoj; Jabeena A
OptiSystem software is used to design and simulate fibre-optic communications system which are useful for the understanding of each component of the fibre-optic communications system. This experiment will try to portray the working of a simple wavelength division multiplexing concept by using optisystem. It will demonstrate how the usage of EDFA is done in the practical scenario. Network is analyzed considering the Length, Pump power, Gain and Noise figure. Read More...
|
communication |
India |
936-938 |
227 |
An Integrated Approach of SOM Segmentation and Multi-wavelet for Classification of Brain-Stem
-Lalima Sinha ; Sampda Satav Mashey
MRI-based medical image investigation for brain stem studies is ahead attention in topical times due to an amplified need for proficient and objective valuation of large amounts of data. While the original approaches applying mechanized methods for the analysis of brain stem images date back approximately two decades, the modern methods became proficient and coming nearer to routine clinical purpose. Early diagnosis of Parkinson's disease (PD) is of massive significance, since clinical symptoms do not happen until substantial portion of the Substantia Nigra (SN) neurons in the brain stem have been irreparably spoiled. In this paper we have proposed an approach which is integration of Multiwavlet based image preprocessing and SOM based image classification that will significantly increase the accuracy which help to diagnose SN in brain-stem. Read More...
|
COMPUTER TECHNOLOGY AND APPLICATION |
India |
939-942 |
228 |
Use of Crumb Rubber in Concrete
-Ravindra Singh Sapra ; L.N Malviya
Cement is most broadly utilized building material as a part of the world, and in addition the biggest client of normal assets with yearly utilization of 12.6 billion tons. Fundamentally it comprises of totals which are fortified together by concrete and water. The significant piece of cement other than the bond is the total. Total incorporate sand and pounded stone/ Gravel. Utilization of these traditional materials in cement is liable to drain the assets unless there is a suitable substitute. Elastic which is created in substantial amounts as waste does not have helpful transfer till now. Be that as it may, elastic is found to have properties that are needed for suitable substitution of fine aggregate in concrete. Thus we in this venture have planned to study the adequacy of elastic as substitute for fine aggregate and use the piece Crumb rubber in concrete, to minimize a dangerous atmospheric deviation. Total properties viz., particular gravity, water retention, corrosive resistance were to be led to discover the properties solid examples were to be thrown and tried for solid blend with different rate of substitution (5%,10%,15% &20%) and its suitability for substitution are talked about in this venture. Read More...
|
Civil Engineering |
India |
943-944 |
229 |
A Review on Construction Quality Management
-Dharmendra Singh Devra ; Deepak Garg
Today's development industry requires a framework by which nature of development can be resolved. Today the entire world is in effect extremely focused in created nations as well as in creating and immature nations. Indian economy is quick creating economy in entire world. In India, development commercial enterprises are assuming essential part to create India. Presently a-day's in development commercial ventures huge as well as little development organizations are exceptionally aggressive and numerous organizations are making a decent attempt to fulfill their client's necessities as well as where conceivable surpass them. This must be accomplished through expense diminishment, change in Quality, expanded consumer loyalty and a consistent exertion towards world class associations. With the goal organizations should survive and develop later on, it is fundamental that they convey top notch development and administrations. Those that can convey quality are the ones that will flourish in the following forthcoming years. In this venture a study and overview is done on Construction Company of Bhopal to check their nature of construction. 30 real estate companies construction sites is visited and their construction quality is done. Read More...
|
Civil Engineering |
India |
945-956 |
230 |
Use of Tire Rubber in Concrete
-Sanjai Kumar Basu ; Akash Mishra
India is a quickest developing creating district and it has been observed that a huge number of scraps-tries are delivered every year. Tire waste reason ecological and wellbeing issue and transfer of this waste is real issue. The fundamental target of this exploration venture is to utilize reused tire as incomplete substitution of coarse total in cement. Compressive strength of solid is resolved when Natural total is in part supplant by tire elastic upto 10%,15% and 20%. Read More...
|
Civil Engineering |
India |
957-958 |
231 |
Use of Sea Shells as Aggregate in Concrete
-Vijay Kumar ; Deepak Jain
Exertion towards protecting regular coarse aggregate for future era and diminishing sea shell waste beginning from the fisheries business has started studies on plausibility of coordinating this waste in solid generation. This paper shows the outcome on the workability and compressive strength of solid containing different rate of sea shell content as incomplete coarse aggregate substitution. Concrete blends containing 0%, 5%, 10%, 15%, 20%, 25% and 30% sea shell substitution level were thrown before subjected to water curing for 28 days. Workability test and compressive strength test were directed on solid understanding to IS 516 and IS 4926 respectively. Results demonstrate that substitution of proper sea shell content ready to create workable cement with attractive quality. Coordination of 20% sea shell improved the quality of solid making it to be the most astounding when contrasted with whatever other substitution level. Read More...
|
Civil Engineering |
India |
959-961 |
232 |
Study of Coconut Shells in Concrete
-Girish Agrawal ; Jagat Gupta
Concrete is versatile material and its production is increasing day by day. Cost of conventional concrete are very high and availability natural aggregate are decreasing. Now there is a need to find out new material which can replace concrete in gradient. In this study coconut shells is used as aggregate in concrete, M-40 concrete is casted with coconut shells aggregate and then these aggregate is tested for its compressive strength and workability. Read More...
|
Civil Engineering |
India |
962-963 |
233 |
Saw Dust Ash as a Partial Replacement of Cement in Concrete
-Bidyut Mazumdar ; Abhisheak Agrawal
Saw Dust is a by-product of wood dust, when this dust burns it ash are very fine and due its fineness, in this research saw dust ash (SDA) are going to use in as a partial replacement of cement in concrete. Cement in concrete is used for binding, but cement is a costly material and also affect the environment and from last some decades researchers are trying to reduce the uses of cement and find out the new material which can replace cement. In the research article saw dust ash is replace by cement up to 30% at interval of 10% and also it is checked for its compressive strength. Read More...
|
Civil Engineering |
India |
964-965 |
234 |
Fine-Grained Data Updates on Cloud with Authorized Public Auditing
-Sindhu L ; Leelavathi H V
cloud computing is new paradigm that helps cloud user to access services in pay-as-you-go mode. This has helped the organizations to reduce huge capital investments in their own IT infrastructure. Data security is one of the major concerns in cloud computing environment. The cloud user stores his data on cloud storage will no longer have direct control over his data. Existing systems already supports data integrity check without possessions of actual data file. Data Auditing is the process of verification of user data stored on cloud and is done by trusted third party who is called Third Party Auditor (TPA). There are several drawbacks of existing schemes. First, although some of the recent works supports updates on fixed-sized data blocks which are called coarse-grained updates, they fail to support for variable-sized block operations. Second, a necessary authorization is missing between Cloud Service Provider, cloud user and the Third Party Auditor (TPA). The newly proposed scheme will provide support for Fine-grained data updates on dynamic data using RMHT algorithm as well as support for authorization of Third party Auditor. We show that the proposed scheme will provide better result than existing schemes. Read More...
|
Computer Network Engineering |
India |
966-970 |
235 |
Parametric Analysis and Performance Evaluation of Titanium Alloy using Coated & Uncoated Carbide Insert
-Mohit K Pandya ; Dushyant Patel; Ravi Patel; Kiran Patel
In this work, a comparison of surface roughness obtained by PVD, CVD coated carbide inserts and uncoated carbide inserts during dry turning of TI–6Al–4V alloy. Titanium alloys are most fascinated topic so the Machining of titanium alloys as aerospace material that has extremely strength to weight ratio and resistant to corrosion at high-elevated temperature. The turning parameters evaluated are cutting speed (80,100,120 m/min), feed rate (0.05, 0.10, 0.15 mm/rev), depth of cut (0.5, 1.0, 1.5 mm). Experimentation was carried out using Taguchi’s L9 orthogonal array. Surface roughness was measured for each experimentation. When compared to uncoated carbide inserts, the coated carbide inserts demonstrates significantly improved surface roughness and also compared PVD and CVD carbide insert, the PVD carbide inserts demonstrates significantly improved surface roughness. Read More...
|
Mechanical Engineering |
India |
971-976 |
236 |
A Review Paper on Optimization of Process Parameter for CNC lathe on Titanium Alloy with Carbide Insert
-Mohit K Pandya ; Ravi Patel; Kiran Patel; Dushyant Patel
This paper deals with the machining of Ti6Al4V material. This paper discusses an experimental investigation on surface roughness of Ti-6Al-4V using PVD and CVD coated carbide insert and uncoated carbide insert during dry turning on CNC machine. Ti-6Al-4V is widely used in automotive, marine applications, aerospace and jet engine components due to its high strength to weight ratio. The effect of different process parameter like speed, feed and depth of cut is examined for better surface roughness. Analysis of variance was carried out for analysing the contribution of process parameters for the coated and uncoated carbide insert. And comparison of coated and uncoated inserts. Read More...
|
Mechanical |
India |
977-979 |
237 |
Effect of Shunt Compensation on Distance Relay Performance
-Gadhvi Prashantdan P. ; Sagar Andipara; Hirak J. Desai
Comparative study is done for the performance of distance relays for transmission lines compensated by shunt connected flexible ac transmission system (FACTS) devices. The objective of this study is to evaluate the performance distance protection schemes on transmission lines with STATCOM devices applied for midpoint voltage control. The impact of static synchronous compensator (STATCOM) on the transmission line distance protection schemes is studied for different fault types, fault locations and system conditions. The power system elements and the STATCOM with their associated controllers are modeled. Matlab / Simulink is used as a simulation tool for the research. Read More...
|
ELECTRICAL ENGINEERING |
India |
980-982 |
238 |
Off-Line Multi-Font/Size Character Recognition : A Review
-Parkar Jigisha Natwarlal ; Prof. Rahul G. Patel
Character recognition has been one of the most interesting and challenging research areas in the recent years. Many researchers develop scripts based on the different approaches used for the design of character recognition system. This paper provides a survey and classification of various character recognition techniques and describes a technique for converting textual content from a paper document into machine readable form. More precisely Character recognition is process of detecting and recognizing characters from input image and converts it into ASCII or other equivalent machine editable form. There are various approaches used for the design of OCR system, but this paper provide a review of existing works in handwritten and typewritten recognition of characters from image irrespective of their position, size, and various font styles based on the different approaches such as a Template matching, Statistical approach, Structural approach and Neural Network. Read More...
|
Electronics and Communication Engineering |
India |
983-985 |
239 |
Design and Development of Material Feeder in Multistation Application
-Pranali Sureshrao Mankawde ; Prof. Mr. Gangwani
Design methodology and analyzed by some CAE work. Purpose of the work is tool provide solution in the form of product envelope which clears the idea for clay feeder mechanism for two stations simultaneously. Project work gives details to make suitable fitment with vessel that holds crushing and mixing mechanism which is material inlet. Work is in machine tool automation to make feasible solution to feed material with efficient way. Work is carried out with In V shape structure two same screw will get mounted to make distribution of filtered clay on two stations. This machine is made with AISI304 material to make suitable corrosion free components. Also strength and raw materials are selected as per working efficiency and loading forces. Validated results will show the full proof mechanism in the application. Read More...
|
mechanical engineering |
India |
986-989 |
240 |
Heat Transfer Enhancement in Pipe in Pipe Heat Exchanger with Swirling Flow: Review
-Shekhar Shivaji Babar ; Kiran D. Devade
Heat transfer enhancement in heat exchangers finds much industrial importance because it gives an opportunity to reduce heat transfer surface area required for a given application and thus reduce the heat exchanger size and cost. Commonly used heat transfer enhancement methods are Active, Passive & Compound. In most of applications and key areas like power plants, process & chemical industries uses surface enhancement methods which are the type of passive method. Twisted tape inserts, coil wire, dimpled and extended surfaces are the most effective heat transfer enhancement techniques used due to their easy manufacturing & installation at lower cost, but these methods are only effective in laminar regions. Active & compound methods are rarely used because of their complexity & cost. Very few researchers made their contribution for the Active methods which involves the fluid injection in main bulk fluid & tangential injection of the fluid with effective swirl generation. In case of turbulent flow applications we have lot of scope to concentrate on the active techniques like injection and jet impingement. Present work mainly emphasis on the broad review of various heat transfer intensification techniques which involves different means induces swirling flow for heat transfer enhancement. Read More...
|
MECHANICAL ENGINEERING |
India |
990-995 |
241 |
Experimental Study on Durability of Concrete Containing Slag and Foundrysand
-Jay Pandya ; Ankur Bhogayata
the aim of this experimental Study is to evaluate the performance (Durability) of concrete containing supplementary materials such as Foundrysand & slag. Efforts for improving the performance (Durability) of concrete over the past few years suggested that cement replacement materials along with Mineral & chemical admixtures can improve the strength and durability characteristics of concrete. Our main focus on alccofine and foundrysand can be use be utilize to produce highly durable concrete. The alccofine is used in 10% and 15% by replacement of cement and the same time the sand will be replaced with foundrysand in the proportion of 10%,20%,30%,40% and 50% for all experimental work. The durability test like RCPT ,Sulphate Attack tests, ,sorptivity test,rebound hammer test ,UPV test Compressive strength test to be carried out at 7, 28 and 56 days.. Read More...
|
CIVIL ENGINEERING |
India |
996-1000 |
242 |
Basis Path Testing using Genetic Algorithm: A Survey
-Deepak Garg ; Sanjay Tyagi
Software testing is the most significant analytic quality assurance for software products, but it is very expensive and time consuming process. This limitation is overcomed by automatic testing to reduce high cost, to increase reliability and efficiency as compared to manual testing. Basis path testing is a coverage criterion of software testing that can detect almost 65 percent of errors in program under test. In this paper a survey of basis path testing using genetic algorithm (GA) has been presented. Two most important fitness functions (branch distance and approximation level) have also been presented to transform test data generation problem into optimization problem. On the basis of this study, new approaches or improvements in GA can be used to generate test data automatically. Read More...
|
Computer Science and Engineering |
India |
1001-1005 |
243 |
Hierarchical Labeled XML Based Data Processing
-Jasmine Sudharani P. ; Karuppusamy P.
The amount of digital information has increased exponentially over the last few years. So personalized search techniques are essential to retrieve the information which is closer to the user preferences. At the same time the information is being stored in a semi-structured way, to exchange this type of data XML has emerged as a standard for representing the data. XML search allows higher retrieval potency, due to its capacity to retrieve and to show the user specific parts of the documents instead of the full document. In this paper, proposed personalized techniques in the context of XML retrieval process and combined different approaches where personalized may be applied. Read More...
|
Computer Science and Engineering |
India |
1006-1009 |
244 |
Hierarchical Self-Organizing Map (HSOM) Based Segmentation of Brain Tumour from Brain MRI Images
-M. Mahalakshmi
The main objective of this research work is to segment a tumor from a collection of MRI brain images. While extracting the brain tumor, the following steps involved namely, Preprocessing, Clustering, feature extraction and segmentation. The MRI brain images are blurred and contains noise. So, the Median filter is used to remove noise from the MRI images. Then, the brain is clustered into well known regions like White Matter (WM), Gray Matter (GM),Cerebrospinal fluid (CSF) and background by using Fuzzy c-mean and HSOM segmentation which is used to extract the brain tumor from the clustered image and also used to segment the image row by row.The proposed method is evaluated using the elapsed time and accuracy based on SVM classification. Read More...
|
Digital image processing |
India |
1010-1013 |
245 |
Design and Finite Element Analysis of Wing Root Attachment for Two Seater Passenger Aircraft
-Rajesh N ; Puneet U.; Dr. Sanjay
Aircraft is a highly complex flying structure. Generally passenger aircraft undergoes nominal maneuring flights. During the flight, when the maximum lift is generated, wings of the aircraft will undergo stress at the location of the attachment brackets. The attachment is used to carry all type of wing load to this frame. So, the wing root attachments should be high strength enough to carry the load transferred from wing. In the present research work, an attempt has been made for designing the wing root attachment frame for two seated passenger aircraft using four stringers. First we need ensure the static load carrying capability of the wing root attachment bracket. Later, the wing root fittings were designed with different iterations by adding number of stringers with varied calculations. Finally fatigue analysis was conducted to find out the stress acting on the attachment with the life expectancy calculations.By adding the stringers, the fatigue/stress will be less for wing roots and the life expectancy of wing root attachment will also increase (more than 2 folds).The methodology of Finite Element Method (FEM) has been implemented and analyzed in the present work for stress and fatigue. An attempt has been made to estimate life expectancy of the wing root attachment under fatigue analysis.The design was carried out using Catia V5 tool. The analyzing part of this research work is done using the NASTRAN-PATRAN package and the results were reported. Read More...
|
MECHANICAL MACHINE DESIGN ENGINEERING |
India |
1014-1017 |
246 |
Embed the HC2D Barcode Reader in Android Mobile Phone
-Keerthika C ; Sindhu Meenakshi S
Barcodes are capable of storing the information with the help of black and white bars, dots and lines. Based on the data related to the object, the barcodes can create a unique pattern. This barcode data’s are retrieved with the optical readable machine. Basically, barcodes are three different types called as One Dimensional, Two Dimensional, and Three Dimensional. HC2D is a “High Capacity Two Dimensional†barcode can carry the information in two directions that is in vertical and horizontal. In existing system, this barcodes are scanned by using a mobile phone with Android Operating System. But, the accuracy rate is reduced because large amount of data stored in small place. In this technique, by adding the wiener filter in Barcode Recognition Algorithm the recognition rate is improved up to 95%. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
1018-1021 |
247 |
Autonomous Underwater Robot
-Rahul Bandgar ; Tarkeshwar Jare; Amrut Gaikwad; Prof. Minal Deore
In this paper, various tasks are performed by the robot, such as water quality sensing, metal detection, tracking robot's location using GPS and giving live representation of operation which is carried through wireless camera. The transmission and reception of information is done through the Zigbee protocol. To ensure safety of robot, sensors are used for obstacle detection.This concept, if adopted, can prove helpful for finding out underwater metallic shipwrecks, constant monitoring of polluted water and discovering underwater habitats. Read More...
|
ELECTRONICS AND TELECOMMUNICATION ENGINEERING |
India |
1022-1024 |
248 |
A Novel Approach for Separable Image Hiding With In an Image Technique
-V. Rajkumar ; G. Srikali; B. Vamsi Krishna Reddy; Y. Hemanth
Internet is that the hottest communication medium currently a day’s however message communication over the internet is facing some drawback like information security, copyright control, information size capability, authentication etc. There ar numerous research is progressing on the sector like web security, steganography, cryptography. once it's desired to send the confidential/important/secure information over associate degree insecure and bandwidth-constrained channel it's customary to encode likewise as compress the quilt information so implant the confidential/important/secure information into that cowl information. This paper introduces the new manner of originating the prevailing construct i.e. divisible reversible information activity. really the construct of separable reversible information activity technique is predicated on steganography and connected with web security. The chief objectives of this literature is to figure on the construct within which we have a tendency to used text as a hidden information, no plain special domain is employed, attempt to increase the quantity of information that is to be hide, evaluating quality by completely different interpretations. The principal notion of divisible reversible information activity is carries with it 3 key procedures. 1st encode the quilt media second hide the info and third get the info likewise as cowl media as per provisions. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
1025-1027 |
249 |
Decision Support System Using Classifiers for Predicting Student’s Academic Performance
-Kritika Mendiratta ; Mrs. Simple Sharma
The prediction based analysis over a dataset is one of the major data mining processing used by decision support system. In this present work such prediction based analysis is suggested to evaluate the student performance based on their academic background. The work is to classify the students based on the ranking to find out the weak student, average student and the top rank students. In this work comparative analysis will be performed by using different classifiers to perform the analysis on student data. The work will be implemented on management perspective to take necessary action for improving the performance of weak student and to improve the academic results. The work is suggested to be implemented in weka integrated java environment with user friendly features to select the appropriate classifier. Different classifiers are compared on weka on the basic of different parameters like time taken to build the model, correctly classified instances, accuracy, kappa statistic, mean absolute error, mean squared error, relative absolute error, relative squared error, Confusion matrix, TP rate & FP rate. Then the classifier for which the maximum number of instances are correctly and maximum accuracy is achieved is selected for developing decision support system. Read More...
|
computer science |
India |
1028-1030 |
250 |
Experimental Evaluation of Heat Transfer through Different Shape Packed Bed
-Roshan Kharat ; Sagar Darade; Akshay Pagar; Tejas Kute; Prof. Y.R.Ingole
Packed beds, due to their high surface area-to-volume ratio, are widely used in a variety of industries, such as catalytic reactors, absorption towers, packed bed regenerators, high temperature gas-cooled nuclear reactors and heat accumulators, etc. Heat transfer in packed bed gas-solid systems is an important operation in the chemical process industries. It is obvious that an extensive knowledge and thorough understanding of the heat transfer phenomena in the bed is essential for the successful design of such systems.In this experiment the macroscopic hydrodynamic and heat transfer characteristics in some novel structured packed beds (SC and BCC) will be studied, where the packing of ellipsoidal or non-uniform spherical particles will be investigate for the first time with experiments and some important results will be obtained. For present experiments, the interstitial heat transfer coefficient in the packed bed will be determined using an inverse method of transient single-blow technique. The effects of packing form and particle shape will be investigated. Furthermore, it will be revealed that, both the effects of packing form and particle shape are significant to the macroscopic hydrodynamic and heat transfer characteristics in structured packed beds. With proper selection of packing form, such as Simple Cubic packing (SC), Body Cantered Cubic packing (BCC), the pressure drops in the structured packed beds can be greatly reduced and the overall heat transfer performances will be improved. These experimental results would be reliable and useful for the optimum design in industry applications. Read More...
|
MECHANICAL ENGINEERING |
India |
1031-1034 |