No. |
Title and Author |
Area |
Country |
Page |
251 |
A Survey on Various Scheduling Algorithms in Cloud Environment
-Ritu Rani ; Dr. Sanjay Tyagi
Cloud computing involves group of remote servers and software networks that allows online access to computer services or resources and centralized data storage. It enables the users and the consumers to use various applications provided by the cloud provider. The scheduling algorithm is employed for the purpose of mapping the requests of users to the appropriate resources available. One of the most challenging problems in Cloud computing is the scheduling the problem of minimizing the cost of task executions. In this paper, different types of scheduling algorithms have been surveyed and comparison based on various parameters has been made. Read More...
|
Computer science & Engineering |
India |
1035-1037 |
252 |
Thermal Analysis of Pin Fin Using Different Materials and Forms
-Akshay A. Shelar ; Akshay B. Poman; Subodh U. Salunkhe; Pratik M. Phadtare
The purpose of this paper is to study the thermal performance of pin fin. The main aim of this study is to find out the most effective fin from a series of selected fins of different materials and geometries. Trials were conducted for varying Reynolds number and results were found out respectively for each fin. Read More...
|
Mechanical Engineering |
India |
1038-1041 |
253 |
Effect of Piston Geometry on Diesel Engine Performance and Emission Characteristics with Varying Injection Pressure
-Nimesh A. Patel ; Vinaykumar Sharma
Engine performance improvement and exhaust emissions reduction are the two most important issues to develop a more efficient engine with less environmental impact. For diesel engine piston geometry, injection timing and injection pressure are one of the major parameters that affect the engine performance and emissions. These issues can be sought out by geometry modification of piston and variation of pressure. In this study, engine performance improvement and exhaust emissions reduction was carried out with the help of some modification in piston bowl in a single cylinder Direct Injection (DI) diesel engine. The piston bowl geometry was modified to have piston-B (Hemisphere Combustion Chamber With Circular Arc on Periphery of Piston Crown @ 120°) from the standard piston-A(Hemispherical open type Combustion Chamber).The test result shows that Brake Specific Fuel Consumption was decrease by 5.98% and brake thermal efficiency was increase by 1.93% with piston B at 185 bar pressure when compare with the baseline of engine. Due to the expense of increase the exhaust gas temperature (EGT) and oxide of nitrogen (NOX) emission by 4.52% and 4.22% respectively. The exhaust gas emission of hydrocarbon (HC) was decrease by 2.12%and carbon monoxide (CO) was similar to the baseline condition. Read More...
|
MECHANICAL ENGINEERING |
India |
1042-1047 |
254 |
Efficient Content Based Spam Filtering using Bayesian Method
-Himanshu Gupta ; Vasudha Arora
There are two types of emails one in wanted emails from authorised users and other is unsolicited or unwanted emails, these unsolicited emails are called spams. This is a rapidly growing problem in the domain of emails these days. Emails are used by millions of people and send billions of mails daily all over the world. Over the last 1.5 decade it has become a very big problem. Every day a very huge amount of spam emails are received by the users. Due to this the business in not only this industry but also in every domain loses productivity, and it costs billions of dollars. It also strains the IT infrastructure. These emails become very frustrating for the users. So we need an efficient method to filter these mails and its necessity is increasing day by day. In this paper, we represent a method to do the same based on Naïve Bayes Classifier. It works by evaluating the probability of occurrence of a keyword in spam and in legitimate emails and classify by comparing them. Read More...
|
Computer Science and Engineering |
India |
1048-1051 |
255 |
A Comparison of Quality Approaches for Supporting Nurse Scheduling
-B.Satheesh Kumar ; G.Nagalakshmi; Dr.S.Khumaraguru
This paper compares the studies on supporting nurse scheduling. This comparison is based on theoretical quality aspects of nursing schedules. The first concept shows the theoretical quality aspects. The next concept discusses the application of these theoretical quality aspects in practice. This is done by comparing several distinct approaches to developing nurse scheduling support systems. This discussion shows that none of these approaches succeeds in applying all quality aspects. This process ends by describing a new approach to supporting nurse scheduling, which aims to apply all theoretical quality aspects. Read More...
|
Mathematics |
India |
1052-1055 |
256 |
Tag Recommendation System for Photos on Social Websites Based on User Preferences and Geo-Location Preferences
-Priyanka S K ; Kusuma S
Photo tagging is becoming more and more important now-a-days to organize and search large number of photos on social websites. To generate high quality social tags and automatic tag recommendation is the main research topic. In this paper main focus is on the personalized and geo-specific tag recommendation. Consider users and geo-locations have different preferred tags assigned to a photo, a new subspace learning method is proposed to individually discover both the preferences. The goal is learn unified space which is shared by visual domain and textual domain to make visual features and textual features comparable. Visual feature is considered to be lower level representation on semantics than textual feature. Additionally intermediate space is introduced for the visual space and expecting it to have consistent local structure with text space. Unified space is mapped from the textual space and the intermediate space respectively. When an untagged photo with its geo-location is given based on the nearest neighboring search user preferred and geo-location-specific tags are found in the corresponding unified space. Then combine these obtained tags and the visual appearance of the photo to find semantically and visually similar photos, among which the most frequently used tags are suggested to the user and user is allowed to select based on his preference. Read More...
|
Computer Network Engineering |
India |
1056-1059 |
257 |
Implementation of Digital Image Watermarking using Discrete Fractional Fourier Transform
-Patel Mohit B ; Kunal R.Patel
Usage of digital media has witnessed a wonderful growth during the last decades, as a result of their notable benefits in efficient storage, ease of manipulation and transmission. In the last five years the protection of digital information has received significant attention within the digital media community, and a number of techniques that try to address the problem by hiding appropriate information within digital media have been proposed. Image Security persists in many operational contexts till up this day: an encrypted e-mail message between an employee of a defines contractor and the embassy of aggressive power, for example, may have obvious implications. So the study of communications security includes not just encryption but also traffic security, whose essence lies in hiding information. Data information hiding is a multidisciplinary discipline that combines image and signal processing with cryptography, communication theory, coding theory, signal compression, and the theory of visual and audio perception. One of the more interesting sub disciplines of information hiding is steganography. Differently from cryptography that is about protecting the content of messages steganography is about concealing their existence. Several techniques to hide information are presented, terminology and possible related attacks, with specific attention on steganography and copyright schemes. In my major work describes a watermark embedding technique for images using discrete fractional Fourier transform. The idea is that a discrete fractional Fourier transform of the image is computed, the robust watermark and fragile watermark embed in the fractional Fourier transform (FRFT) domain of the image, and the watermark position and the transform order are used as the encryption keys. My proposed results indicate the embedded watermark is perceptually invisible and robust also compare with the discrete Fourier transform based method along with various image processing operations. Read More...
|
IMAGE PROCESSING |
India |
1060-1064 |
258 |
An Authentication Approach for Lossy Surveillance Videos
-HimaBindu U ; Prakasha.S
Nowadays, there is increased use of surveillance cameras for security purpose in public or in other organizations (banks, airports, traffic etc.). The videos that are captured from these cameras need to be secured, as the video content may contain confidential information or any other activities that need to be analyzed. For analyzing the video content, videos are need to be transmitted across the internet for different authorities. But, due to wireless transmissions there would be packet loss or any change in the video content. Different authentication methods are used to authenticate videos, but these techniques sacrifice video distinctiveness. Hence we describe a novel approach for securing these videos, which is called video fingerprint generation and matching technique. Our proposed approach ensures trust for videos that are transmitted via internet. Experimental results have shown concise and accurate video fingerprint generation. Read More...
|
Computer Network Engineering |
India |
1065-1068 |
259 |
Face Detection and Recognition using Surf and Viola-Jones Algorithm
-Jinal R. Thakkar
Face recognition has so many problems like to identify an image robustly of a human face. It also gives databases of some known faces. We use Viola-Jones algorithm for face detection and SURF based approach for face recognition. The principle behind the Viola-Jones algorithm is to scan a sub-window. To rescale the input image to different sizes and then after run the fixed size detector by using these images the standard image processing approach would be. It is time consuming approach because of the calculation of the different size images. On the Contrary by using the standard approach like Viola-Jones detector which is used for rescale instead of the input image and to run the detector many times by using the image – each time with a different size. Both approaches are equally time consuming, but Viola-Jones is a scale invariant detector which requires the same number of calculations of any size. This detector is constructed by using integral image and by using some simple rectangular features of Haar wavelets. This concept represents a scale-invariant and a novel rotation detector and descriptor known as SURF (Speeded-Up Robust Features). SURF is used to perform previously defined schemes with respect to repeatability, robustness and distinctiveness. It is more computing and comparing can be much faster. It is done through on integral images for image convolutions; by making the strengths of the leading existing detectors and descriptors (using a Hessian matrix-based measure for the use of detector, and a descriptor which is distribution-based). It gives result of combination of novel detection and description. This concept shows an overview of the detector and descriptor and then finds out the effects of the most important parameters. This paper uses SURF’s application to two challenging. It achieves such goals like camera calibration which is a special case of image registration and recognition of objects. By this experiment we can say that SURF is very fast and used for image recognition. Read More...
|
Electronics and communication |
India |
1069-1073 |
260 |
Vibration Reduction By Using Magneto Rheological (MR) Damper
-Mr. Chetan Sunil More ; Mr. Vaibhav Ram Sawalkar; Mr. Swapnil Sunil Bhaskar; Mr. Ajinkya R. Chaudhari; Prof. T. B. Patil
In the environment of a moving vehicle, passengers often feel uncomfortable due to the vibration of the vehicle body. To improve the ride comfort effective vibration control of vehicle suspension is very important. A Magneto Rheological damper is a cylinder and piston assembly in which piston moves inside oil filled cylinder with the up and down movement of the wheel. This paper focused on the vibration reduction by using magneto rheological damper, magnetic circuit design and preparation of magneto rheological fluid. It also includes the calculation of magnetic circuit design like as magnetic flux, flux density and proportion of different constituents for preparation of MR fluid. The Magneto Rheological (MR) damper is a type of damper which uses MR fluid as a working fluid which assists us to change damping force. It can be achieved by changing the current flow on its magnetic circuit. MR fluid with the existence of an external magnetic field can provide more resistance to motion than air or oil in a traditional shock absorber. Read More...
|
Mechanical Engineering |
India |
1074-1077 |
261 |
Image Compression and Encryption using Scan Patterns
-Shalin Patel
today image compression and encryption has been a great area of interest since images are being used as one of the most valable information source in many areas like medical, information technology, rocket science application and many more. There are mainly types of image are three namely binary, grayscale and color image. Binary image has only two intensity levels black and white, on other hand grayscale images have 256 intensity levels and at last color images have various color map each of which have 256 intensity levels. Our scope is limited up to only grayscal images. The methodology here we used for image compression and encryption is by using scan pattern which is an algorithm which is capable of doing both and encryption as well as compression of an image simultaneously. It is a method applied on binary images. The methodology is applied on grayscale sample images, by dividing the grayscale image into its corresponding bit planes. Aim of the algorithm here is to find a scan path which is capable to compress an image using least bits required. To compression an image we are using run-length coding. The encryption is done also done by using a scan path which is kept secretly and we can use it to generate key and our key length is 232 bits we is much more capable to encrypt the image and is there is any variation in key it will result in failure to get original image which shows the robustness of the algorithm. Read More...
|
Electronics and communication engineering |
India |
1078-1081 |
262 |
Performance Improvement in Image Inpainting Based On TV Model
-Modi Ritesh K. ; Asst.Prof.Ketan J. Sarvakar
This electronic document is a “live†template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. DO NOT USE SPECIAL CHARACTERS, SYMBOLS, OR MATH IN YOUR TITLE OR ABSTRACT Inpainting is a technique of restoring old photographs, removing occlusion from an image, removing cracks from an image, reconstruction on an image, filling missing area of an image etc. There are lots of image inpainting methods available. All the methods use different concepts and methodology. The images are inpainted such that the user does not know that the image is repaired or restored. Here the concept of weighted-average algorithm is used. Here the damaged area is divided into smaller parts and then diffusion mechanism is used get surrounding of damaged area. Then the concepts like edge detection is used to make the inpainting faster. Then inpainting will done from outside to inside. Read More...
|
COMPUTER ENGINEERING |
India |
1082-1085 |
263 |
Power Quality Improvement of Distribution Network for Non-Linear Loads using Inductive Active Filtering Method
-Chidananda G. Yajaman ; Suresh Reddy D.
This paper proposes the comparison of Active Power Filtering (APF) and Inductive Active Filtering (IAF) which in turns improves the Power Quality for not only the distribution network i.e.; Public Grid but also the Non-Linear Loads i.e.; Power Supply systems. At first, main circuit topology for implementing IAF method which consists of Inductively Filtered Converter Transformer connected with non-linear Load and Fully Tuned Branch which can be controlled through the inverter. Initially the mechanism of the APF is done through the technical features. Based on this the mathematical model is built and equivalent circuit is established with the filtering mechanism for IAF method. Then the designing of the Controller loop of Fully Tuned branch is configured. For the three phase supply system, results are compared for APF and IAF. Hence the harmonics can be reduced. The Power Quality improvement of Distribution Network can be done for three phase diodes controlled by fully tuned branch is Simulated using MATLAB/ Simulink to make the grid current sinusoidal. Read More...
|
Electrical Engineering |
India |
1086-1090 |
264 |
A Novel Wireless Sensor System for Farmers
-Rohit B Patil ; Leelavathi H V
Monitoring of environmental factors is very important factor for the last few decades. Especially, monitoring agricultural environments for various factors such as soil moisture, humidity and temperature along with other factors can be of more significance. Earlier approach to measuring these factors in an agricultural environment meant individuals manually taking measurements and checking them at various times. In this paper remote monitoring systems using wireless protocols used by different researchers for betterment of agricultural yield with best possible technologies is discussed. This is followed by novel introductory model for agricultural monitoring wireless sensor network which is implemented using single board computer. Read More...
|
Computer Networks Engineering |
India |
1091-1094 |
265 |
Brain Image Segmentation by Bounding Box Method
-Sanchita Singh ; Shristi; Anil Verma
The most challenging and emerging field now days is the Medical Image Processing. For safe and appropriate treatment of the tumor, proper diagnosing of the brain tumor is very important. The growth of tumor interrupts the normal brain activity and takes up a significant amount of space within the skull. So detecting the tumor at an early stage is essential. This paper reviews an automated way to detect the brain tumor. Firstly, image preprocessing is done to remove any noise and sharpen the image. Then the bounding box method is used for detecting the tumor. In the end, thresholding is done to segment the tumor portion from the brain image. Read More...
|
BIOMEDICAL IMAGE PROCESSING |
India |
1095-1097 |
266 |
IR Based Wheel Chair
-Karishma Shah ; Kapil Sharma; Vishakha Bhatia
To meet the challenges in today’s world of global computing, fast technologies, and increasingly old age population, the researchers have been trying to switch from traditional modes of navigation to automatically operated modes of navigation. This gives a level of independence in their daily activities inside the house without much effort. The demand for assistive navigation technologies to help elderly and disabled peoples has also risen due to the modern life style and nuclear family. In this project our goal is to design and develop an intelligent wheelchair for severely disabled i.e, multiple sclerosis, quadriplegic patients and old age people based on head gesture control. The Automatic wheelchair developed basically works on the principle of acceleration. According to the head tilt movement of user the accelerometer MMA7361 used in the system gives variation in the voltage across x- axis &y-axis as output. The accelerometer is connected to ATMEGA328 Microcontroller which sends commands according to the head gesture recognition of user. Further µC controls the direction of wheelchair by using H-Bridge Motor driver ICL293D.The Obstacle avoidance ultrasonic sensor attached to the wheelchair in front provides safe navigation and LCD attached on top gives user friendly interface. Read More...
|
BIOMEDICAL |
India |
1098-1101 |
267 |
Design of Small Capacity Automobile Engine to Run on Compressed Air
-Jogi U.Goghari ; Prof. Chetan Vora; Jainil Bhatt
The excess use of gasoline and other major fuels in I.C engines releases unburnt gases in the environment and are counted in the major sources of pollution, compressed air engine can be used for cleaner, pollution free travel. The project is been focused on piston of compressed air engine and to compare it with the conventional I.C engine. In present study the Hero Honda kinetic dx(two stroke petrol) engine is been taken. From this engine reverse engineering is been done to make models of piston CREO 2.0. 100cc petrol engine will convert in pneumatic engine with help of pneumatic equipments. New design geometry is been made for piston, cylinder, cylinder head in CREO for pneumatic engine. Dynamic analysis of piston is been done in ANSYS for both IC engine and for pneumatic engine. Read More...
|
Mechanical Machine Design |
India |
1102-1104 |
268 |
Numerical Study of Low Rise Building in Ansys Fluent
-Ekta N.Soni ; Satyen Ramani
2-D numerical simulation of wind loads on low-rise building has been carried out. Numerical simulation is carried out on TTU building (13.7m x 9.1m in plan with 4.0m eave height flat roof) to check effect of influence of turbulence models used in ANSYS FLUENT software package. Also validation is done with available literature to check the results of ANSYS FLUENT software. The present study has a goal to explain the application of CFD to find wind generated pressure distribution on a particular structure using ANSYS FLUENT 13.0.Numerical simulation on flat roof (TTU building) is carried out to obtain wind loading effects. Results obtained from present study are validated with past data available. The numerical results shows a good agreement with the available data. The computed pressure coefficients have been validated with past numerical results of TTU building model. Read More...
|
CIVIL ENGINEERING |
India |
1105-1109 |
269 |
Experimental Study on Effect of Carbon Steel Fibre on Strength of Concrete
-Rishita A. Gajjar ; Satyen D. Ramani
Fibres are generally used as resistance of cracking and strengthening of concrete. According to various research papers, it has been found that steel fibres give the maximum strength in comparison to other fibres. Fibre reinforced concrete has been successfully used in slab, beam, shotcrete, footing, hydraulic structure, structures in seismic regions and many other applications. The main objective of this research work is to study the effect of carbon steel fibre reinforcement with different percentage of fibre 0 %, 0.5%, 1%, 1.5% and 2% by volume for M-25 grade of concrete with aspect ratio-50. The carbon steel fibre reinforced concrete will be tested for compressive strength, flexural strength and split tensile strength. The percentage increase through utilization of carbon steel fibres will be reported. Read More...
|
Civil Engineering |
India |
1110-1113 |
270 |
Comparative Study of Wind Codes for Pressure Static Equipment
-Vipulkumar Rokad ; Prof. Chetan Vora; Anopsinh Gohil
The Problem considered in this paper is of compatibility of wind code with other wind codes for same specifications and geometric conditions of that installation area for pressure static equipment. These tall equipments built today are self-supported i.e. they are supported at the base only & they are continuously exposed to the flow of wind. This paper presents comparative study of world’s major wind codes and common model shall be prepared to check compatibility for the particular specifications and same geometric conditions of that installation areas. Because design of the equipment effects the safety of equipment, human as well as the cost of equipment. Due to this study, we can design safe and competitive cost equipment. Read More...
|
Mechanical Engineering (Machine Design) |
India |
1114-1116 |
271 |
Experimental Investigation on Mechanical Properties of Basalt Fiber Concrete
-Tushar kaswala ; Satyen D. Ramani
The concrete properties can be enhanced in many ways as per the requirements of it. Mainly, concrete possesses enough compressive resisting capacity but has negligible tensile strength. Moreover, the low resistance to cracking leads concrete to failure by enlarging cracks and due to low ductility the sudden failure occurs, which are not the good signs for concrete. The fibre reinforced concrete is helpful for the enhancement in terms of strength and resulting in the exceptional concrete. This research work focuses on the consideration of the basalt fibre in various percentages in concrete having a specified range for the exploratory concrete work. This research work is done to examine the effect of basalt fibre incorporation with discrete percentages such as 0%, 0.25%, 0.40% and 0.55% by weight of cement for the grade of M-25 concrete. The optimum dosage of basalt fibre concrete is carried out amongst the taken various percentages. The compressive strength test, flexural strength test and split tensile strength test was done for this research work. Read More...
|
Civil Engineering |
India |
1117-1119 |
272 |
Hybrid Converter for Simultaneous DC and AC Systems using Redundant Number of Switches
-Hirak J. Desai ; Gadhvi Prashantdan P.; Anurag Gupta
This work shows the hybrid converter topology of boost converter & Inverter, which can supply simultaneous DC and AC outputs from given DC supply. It is shown that by replacing the control switch of boost converter with H-bridge inverter. A new topology is formed which has similar performance to Z source inverter. The resulting converter requires lesser number of switches to provide simultaneous DC & AC outputs while maintaining reliability due to inherent shoot-through protection. A suitable pulse width modulation based on unipolar sine PWM is employed to control switches. The simulation is carried out using matlab/simulink and the results are compared for a better result. Read More...
|
Power electronics (Electrical Engineering) |
India |
1120-1122 |
273 |
Implementation of Vehicle Accident Detection using ARM
-Rajashri C. Nilgunde ; Prajakta A.More
This system is use to find out the conveyance location when met with an accident utilizing GPS, ADXL sensor to give indication to release air bag and sending message for avail utilizing GSM.. The GSM module explicates mainly about how ADXL sensor is coalesced with the system, vibration sensor is acclimated to achieve concise message accommodation .The shortcoming of traditional systems including low security and small alarming range is defeat, so it should have good appliance prospects. Conveyance tracking system is one of the latest topics in embedded systems industry, where a conveyance can be tracked anywhere in the world. Here ARM LPC1768 communicates with GPS module and GSM modem. This would be placed in a moving conveyance. The ARM LPC1768 will poll GPS module in prefixed intervals and sends the conveyance location information like Latitude & Longitude to central station over GSM network. Whenever any accident occurs, then the ADXL sensor detects the vibration of the conveyance and sends mechanical force to ARM LPC1768. Utilizing GPS, we will get particular location where accident occurs, and then GSM sends message to sanctioned members. Read More...
|
ELECTRONICS & TELECOMMUNICATION |
India |
1123-1125 |
274 |
Smart Antennas Aided Wideband Detection for Spectrum Sensing in Cognitive Radio Network's using 4G HQ Method
-Shivukumar Basavaraj ; Chetana R
In the project a smart antennas assisted wideband spectrum mobile user detection algorithm for cognitive radios is simulated. In this approach, the wideband spectrum sensing issue is transformed into estimating the number of occupied channels based on the Hannan-Quinn (HQ) criterion, and then determining the occupancy status for each channel by the sample power. The power spectrum is computed by finding the eigen values of the HQ criteria and then finding out the L-M eigen values and there corresponding eigen vectors. Then the eigen vectors are used in determining the power spectrum of the signal whose peaks will give information about the spectrum occupied by the mobile user. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
1126-1132 |
275 |
A Web Application of Employee Selection Process Management
-Prasanth ; Dharamvir
The top most successful companies are able to find, the best people in market. They are having well qualified employees and results and increasing their productivity, but they can’t able to find those people who and easy method. If the HR side needs to do different methods in order to find a person with the good and right skills, knowledge and experience to fill vacancy places. This is called Time-Consuming process where we are doing manual process and it is required to coordinate so many peoples in many stages. In Business Process Management and Notation, that offers a new template of the Requirement Selection Process Management to assist the companies in this type of process. When it begins a Personnel Requisition is done, if it is made by HRA (Human Resources Analyst). The person who done the request do not have the authority level, to allow them, for the process will go on to Accept the Request. This includes two various processes, like Jobs Vacancy Advertisement and Selection. The opportunity to improve and responsibilities and redefine roles in an area. The positive effect to achieve it’s necessary to find the correct person to fill it out. It is not an easy process to complete the task, as it needs to create advertising and It gets the attention of the peoples who can contribute the development of not only the areas, but also the company. It is very important not only to create a great advertisement and also to choose the correct medium to publish it. If it is a wrong decision can lead to loss the valuable candidates. At the end of the requirement process and begin at the starting selection process, it is necessary to sort the candidates who are all didn’t meet the job requirements in the order to save their time and resources in the process Management. Read More...
|
Computer Science |
India |
1133-1135 |
276 |
Pose Invariant Recognition using Sift Based Feature Extraction and MRF
-Sushama Kumari R B ; D.Gnanajebadas
Face recognition has now achieved high performance under controlled image conditions. One of the main advantages of face recognition as compared to other biometric identification techniques is that it does not require the cooperation of participants. The important challenges in face recognition are to recognize faces across different poses, expressions and illuminations. In this paper, face recognition is performed by considering the pose variations. In this paper, an efficient method for the reconstruction of frontal views from nonfrontal face images using Markov Random Field is presented. In this approach the input face image is divided in to overlapping patches and a set of local warps are estimated corresponding to each patch inorder to synthesize the patches in frontal view. A set of warps corresponding to each patch is synthesized by aligning it with the images from the database of frontal images. Any face recognition techniques can be used for the recognition of reconstructed frontal face images. Feature Extraction is performed using SIFT algorithm. Scale Invariant Feature Transform is an efficient algorithm for feature extraction since it is independent of scale and orientation variations. The main advantages of the proposed method are that it does not require any manually selected facial landmarks or head pose estimation. Read More...
|
Electronics and Communication |
India |
1136-1138 |
277 |
Threat Detection using Genetic Algorithm
-Anju.A ; H.Adithyan; M.Shankar
A Gene for the network packet is defined through the fitness function and the method to calculate the fitness function is explained. After giving a stress in attacks, an analysis is provided & finally the best policy using a comparator is found. The Network administrator must rely on process for tracking network configuration and system vulnerabilities, which needs lots of experience and will cause errors. Decision support capabilities makes balance between security and availability and show how best to apply security resources. For evolving and testing new rules for intrusion detection the KDD99 training and testing dataset were used. The main aim of the paper is threat detection, time optimization, performance increase in terms of accuracy and policy automation. Read More...
|
Computer Science Engineering |
India |
1139-1141 |
278 |
Bioenergy: Sustainable alternative energy option for energy demand of india
-Sandeep Kumar Patel ; Prof. K.D. Panchal
Rural population of India depends on bio-energy for cooking, space and water heating. Though most of the energy needs in India is harvested from fossil fuels, 70% of the rural population depends on the bio-energy for their domestic usage in the country. About 70% of the Indian population lives in rural area where 75% of the primary energy need is supplied by bio-energy resources. Also, about 22% of the urban households depend on firewood, 22% on kerosene and 44% on LPG for cooking in India. Bio-energy resources are renewable in nature and combustion would not produce poisonous gases and ash with sufficient oxygen supply. A village level study on the present scenario of domestic energy consumption will help to assess the demand and supply of bio-energy in the country. India offers a conducive environment for accelerating the use and internalisation of bioenergy technologies (BETs). Nearly 25% of its primary energy comes from biomass resources, and close to 70% of rural population depend on biomass to meet their daily energy needs. Energy is the primary driver of the world’s economies. Increasing populations and expectations of improved standards of living are accelerating the demand for energy. Theorists have acknowledged the positive or direct relationship between economic growth and greenhouse gas (GHG) emissions. One of the key variables affecting this positive relationship is increased energy demand as a result of economic well-being. India is one of the fastest growing countries in the world, with a GDP growth exceeding 8% consistently for the last two years, and this trend is expected to continue. India’s energy demand is expected to be more than three to four times its current level in another 25 years (Planning Commission, 2005). Present primary energy use in India is dominated by fossil fuels: 40% of primary energy supply and 59% of power generation come from coal (IEA, 2007). The rising energy demand in India is expected to lead to a further increase in the use of fossil fuels. This will not only lead to growing GHG emissions and increased India is traditionally using biogas since long time but there is need to improve the technology, applications and deployment strategies. Bioenergy centralization in urban and decentralization in rural can help government to minimize both the import of fuel derivatives and solid waste processing cost. The aim is to highlight potential of the technology to bring social and economical sustainability to India. In this review, demand of energy sources, drivers for bioenergy use, economical, social and environmental benefits of biogas regularization in India are described with emphasizing biogas as an ideal sustainable energy source with its potential applications. Read More...
|
Energy Engineering |
India |
1142-1147 |
279 |
Survey Paper on VANET-Based Traffic Information Sharing By Different Ways
-Krunal Patel ; Hitesh Patel
In order to improve information propagation efficiency, there are couple of ways there to obtain near about accurate information to maintain the traffic. In low density areas, buses collect as much traffic information as possible from cars in their proximity, and periodically disseminate the collected information to neighboring cars. Another way is Information dissemination in pure Vehicular Ad Hoc NETworks (VANETs) such as ITS-G5 becomes problematic when the network is sparse. There are couple of more ways which can help out to reduce or maintain the traffic problem. Read More...
|
information technology |
India |
1148-1150 |
280 |
Vehicle Health Monitoring and Tracking System using Smartphone and GPS
-Vinayak Thorat ; Bhanudas Shivekar; Sachin Gude; Abhishek Randhave
The system proposed a real low cost design of vehicle diagnostic and tracking unit using Smartphone and GPS. System monitors a vehicle’s performance and traces the location by communicating the obtained data to a mobile device using Bluetooth. Then the results can be viewed by the user to check fuel consumption and other essential vehicle electromechanical parameters. Data can also be sent to the vehicle’s maintenance department which is useful to detect and guess faults in the vehicle. This is done by collecting live readings from the engine control unit (ECU) uses the ADC to convert into digital format. An electronic hardware unit is built to perform the interface between the Atmega32 and a Bluetooth module, which in part communicates with Smartphone. The Smartphone is able to transmit data to a server using cellular internet connection.. Read More...
|
Computer Engineering |
India |
1151-1154 |
281 |
Simulation and Analysis of Uninterruptible Power Supply with Super Capacitor and Battery Combination
-Mudaliyar Sheela Rajvelu ; R. A. Yadav
This report presents a study of reduction in battery stresses by using super capacitor (SC) in a 500 kVA rated uninterrupted power supply (UPS).In this investigation first, Super Capacitor model developed using MATLAB/Simulink is present and validated. Second, the architecture of the designed system that combines the Super Capacitor and Battery are shown. The Super capacitors are used as high power storage device to smooth the peak power applied to the battery during back up time and deliver full power during short grid outage. By charging SCs through battery at suitable rate, all impulse power demand would be satisfied by the SCs. Read More...
|
Electrical Engineering |
India |
1156-1161 |
282 |
Influence of Injection Pressure and Injection Timing on 4 Stroke Single Cylinder Diesel Engine Performance using Blend of Biodiesel
-Gohil Mahipalsinh Jaydevsinh ; Neeraj V Mohite; Dr. Pragnesh K. Brahmbhatt
Biodiesel is most favorable alternative fuels for I.C engine because of its similar quality as of diesel to use in I.C engine. Now a day’s so many problems raised to use biodiesel in I.C engine such as High Nox formation, Low brake thermal efficiency, less combustion characteristics etc. In our Experiment we could minimize this kind of problems by Modified injection systems, like Increases Injection pressure (210 bar), Retard Injection timing (25° Btdc) Through all parameters Experiment were carried on Direct Injection Single cylinder C.I engine using blend of biodiesel (palm seed oil B30). Here diesel as well as Biodiesel blend with modified injection parameters are analyzed and compared with original condition of engine. During Experiment, Minimized NOx formation up to 16% in Diesel and 10% in biodiesel less than the Original condition. While SFC 3.4 % decreased in diesel, 10% increase in biodiesel and also nearest 2 % Improved Brake thermal efficiency than original condition. Both Modification condition CO and CO2 having negligible effected on Emission performance. Read More...
|
MECHANICAL ENGINEERING |
India |
1162-1166 |
283 |
Performance And Comparision of three Different Routing Protocols LEACH ,TEEN And APTEEN in WSNs
-Jigisha Parmar ; Ashishgoud Purushotham; G. Usha Rani; Dharmendra Patel
This paper compares the performance of three different routing protocols LEACH, TEEN and APTEEN in the wireless sensor networks. Classification of protocols based on their mode of functioning as proactive, reactive and hybrid protocols. As the wireless sensor networks are made up of tiny energy hungry sensor nodes, the number and type of sensor nodes and the design protocols for any WSNs is application specific. The sensor data in this application may be light intensity, temperature, pressure, humidity and their variations. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
1167-1170 |
284 |
Design of Compact Circularly Polarized RFID Antenna for Gain Optimization
-Nithiba.P ; Srinivasan.S
Radio Frequency Identification (RFID) systems have been widely used in industries due to its various advantages. The RFID systems demand low cost and low profile antennas. Circularly polarized truncated corner square patch antennas offer a potential solution for many applications. It becomes popular and widely used because of its ease of analysis and fabrication, low cost, light weight, easy to feed and their attractive radiation characteristics. In this project, a single feed patch antenna has been designed for RFID applications by involving parametric study. The size of the proposed antenna is reduced by employing a dielectric substrate with high permittivity. The single feed truncated corner circularly polarized antenna is designed and simulated on Ansys HFSS simulation software at 2 to 5 GHz with a high gain, return loss and also with better bandwidth.
As a vital and integrated part of the radio-frequency identification (RFID) system, RFID antennas have been received much attention over years, and their design is very urgent and significant. In fact, the development of RFID antenna is of theoretical significance and practical value for the RFID system. A circularly polarized corner truncated antenna is very simple in construction when compared to conventional Microstrip fabrication technique.
Read More...
|
information and communication |
India |
1171-1175 |
285 |
Exhaustive Analysis of Multicast Routing Protocols used in Multi Hop Mobile Ad Hoc Networks
-Santhi ; N.Jaisankar
A mobile ad hoc network (MANET) is a self-organizing temporary autonomous network with set of mobile nodes. MANET provides a platform to host many applications which in turn require rapid development and dynamic reconfiguration. For example defense industry, rescue sites, classrooms, and conventions. These applications lend themselves into multicasting. Multicasting can improve the efficiency of wireless links which is a limited resource by sending multiple copies rather than sending multiple unicast. Thus, it greatly reduces the bandwidth consumption. Hence, scalable and reliable multicast routing is a challenging task due to inherent characteristics of MANET. In the recent past years, many researchers have proposed many multicast routing strategies and they differ by its features and recovery mechanisms. This paper aims to provide a comprehensive study onsome of the existing multicast approaches proposed by the research community with respect to reliable, energy-aware, QoS –supported and secured multicasting. Read More...
|
Computer Science and Engineering |
India |
1176-1182 |
286 |
Application of Microprocessors and Microcontrollers
-Shashank Kumar Singh ; Syed Zahir Hasan; Bijoy Kumar Mandal; Abhijit Dey
The portion of the computer that allows it to do more work than a simple computer is the microprocessor. Nowadays, modern microprocessors can perform extremely sophisticated operations in areas such as meteorology, aviation, nuclear physics and engineering, and take up much less space as well as delivering superior performance. Before selecting a particular device for an application, it is important to understand what the different options and features are and what they can mean with regard to developing the application. Microcontrollers and microprocessors are widely used in embedded systems. Though microcontrollers are preferred over microprocessors for embedded systems due to low power consumption. This work presents the general application of microprocessors and microcontrollers. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
1183-1187 |
287 |
Power Factor Correction Converter for Battery Charging Application
-Nirav N. Senghani
A Power factor correction (PFC) converter used to input current track the input voltage so the harmonic of input current is reduced and improved power factor. Non-isolated boost converter is used to improve power factor and regulate the DC link voltage. The series inductor will remove ripple current from next to the rectifier, also Continuous conduction mode (CCM) is obtain with higher values of an inductor. In many industrial PFC applications the major concern of the conventional PFC converter inductor volume and switching losses will affect the efficiency of the converter. In this proposed topology the voltage are boosted and regulate DC link voltage. Hence the CCM mode need to be concern, which is controlled by Closed loop PI (Proposals integral) Controller, i.e. MOSFET and GTO. In this proposal the current is sensed by the Current transformer (CT), and its values taken as reference to the input current. Read More...
|
ELECTRICAL ENGINEERING |
India |
1188-1191 |
288 |
BER Analysis of MIMO-OFDM System under Variation in Cyclic Prefix
-Mehul K. Konkani ; Anand Patel; Vishal Shah
In recent years, the need for high speed data transmission is increased. OFDM is a promising solution for achieving high data rates in mobile environment, due to its resistance to ISI, which is a common problem found in high speed data communication. A multiple input multiple output(MIMO) communication system combine with the orthogonal frequency division multiplexing (OFDM) modulation technique can achieve reliable high data rate transmission over broadband wireless channels. MIMO-OFDM combination is widely used in 4G technologies such as WI-MAX and LTE. Cyclic Prefix is very important aspect in OFDM systems. Interference can be reduced by increasing Cyclic Prefix length. But it can have adverse effect on Bit Error Rate performance. Research can be done on determining optimum length of Cyclic Prefix which can provide optimum solution in terms of BER and interference. Read More...
|
Electronics and Communication Engineering |
India |
1192-1195 |
289 |
Study on Effect of Open Ground Storey on Seismic Performance of High Rise Building
-Bipin M. Vaghasiya ; Dipak K. Jivani
— This study on effect of open ground storey on seismic performance of high-rise building current era residential and commercial building need to provide car parking space at ground level populated cities is a matter of major concern. Hence the trend has been to utilize the ground storey of the building itself for parking. “Open Ground Story†(OGS) buildings are those types of buildings in which the ground storey is free of any infill masonry walls. These types of buildings are very common in India for parking provisions.Open ground storey is a common feature in the modern high-rise buildings constructions in India. Most of region of India goes under high seismic regions. This features of high-rise building inherent vulnerable to collapse of structure. Also Indian cities expanding vertically so, higher demand of parking space required increase In that case open ground storey building become critical point for failure of building. Ground-story column, were either damaged severely or failed completely, thereby damaging the buildings due to sudden reduction in lateral stiffness and mass in the ground storey results in higher under seismic loading.For proper assessment ofthe storey stiffness of buildings with soft storey, different modelswere analyzed using ETABS V_9.6.0 software. Read More...
|
civil engineering |
India |
1196-1198 |
290 |
Human Detection for Video Surveillance System
-Dharmendrakumar Viradiya ; Prof. Amit G. Maru
Detecting human beings more important in a visual surveillance system is crucial for diverseapplication areas including abnormal event detection,person identification, gender classification and fall detection for elderly people. Thefirst step of the detection process is to detect an object which is in motion. Object detection couldbe performed usingoptical flow, background subtraction, and spatio-temporal filteringtechniques. Once detected, a moving object could be classified as a human being usingtexture-based, shape based,or motion-based features.In this paper, we presents a real time Human detection algorithm based on HOG(Histograms of Oriented Gradients) features and SVM (Support Vector Machine) architecture. Motion detection is used to extract moving regions, which can be scanned by sliding windows;detecting moving region can subtract unnecessary sliding windows of static background regionsunder the surveillance conditions, then detection efficiency can be improved. Every slidingwindow is regarded as an individual image region and HOG features are calculated as classifiedeigenvectors. At last, the detected video objects can be categorized into predefined groups ofhumans and other objects by using SVM classifier. After Experiment, the results from videos areprovided with high accuracy of Human Detection. Read More...
|
Computer Engineering |
India |
1199-1202 |
291 |
Analysis and Simulation of Induction Motor Fed by Cascaded Multilevel Inverter
-Rekha N ; K.R. Mohan; T.M.Vasanth Kumar
This paper presents the simulation of three phase seven level inverter fed induction motor drive. The poor quality of voltage and current of a conventional inverter fed induction machine is due to the presence of harmonics and hence there is significant level of energy losses. The seven level inverter is used to reduce the harmonics. The inverters with a large number of steps can generate high quality voltage waveforms. The seven levels can follow a voltage reference with accuracy and with the advantage that the generated voltage can be modulated in amplitude instead of pulse-width modulation[2].The simulation of three phase seven level inverter fed induction motor model is done usingmatlab/simulink.The FFT spectrums for the outputs are analyzed to study the reduction in the harmonics[9]. Read More...
|
Electrical Engineering |
India |
1203-1205 |
292 |
A Technical Review on Deep Cryogenic Treatment on FRP Composite Materials & Experimental Analysis of Its Effect
-Dipen J. Bhadaja ; Prof. P. C. Sheth
FRP composite materials offersvery good mechanical properties. The most valuable properties arecorrosion property, high toughness and strength,strength to density ratio, etc. During its service operation, it has to face many environmental conditions, different temperature etc. The present review based on the performance of FRP composites in different environment, different temperature and what will be its effect that is discussed here in this. Formation of irregularity due to separation or debonding and crack formation due to residual stresses, thermal shocks etc. Read More...
|
Mechanical Engineering |
India |
1206-1212 |
293 |
Multi-Objective Test Case Prioritization Techniques for Regression Testing: A Review
-Anita Saini ; Dr. Sanjay Tyagi
Regression testing is an expensive and important process of validating modification introduced in a system during software maintenance.A number of regression testing techniquesnamely Retest all, Regression test selection, Test case reduction and Test case prioritization have been proposed to improvethe effectiveness of regression testing.The important concern in regression testing is its cost and execution time. The most familiar technique in regression testing is Test case prioritization that is used to deal with this problem.Test case prioritization techniques order the execution of test cases in an organized manner so as to achieve an objective function with greater efficiency. Many prioritization techniques have been proposed in the literature.This paper attempts to review various multi-objective based test case prioritization techniques. Read More...
|
Computer science & Engineering |
India |
1213-1216 |
294 |
Malware Prevention and Detection System in Android Phone
-Sachin M. Kolekar ; Parikshit N. Mahalle
Mobile malware is malicious software institution and it is used to disrupt the mobile operations and the individual functionalities. In the sequel, this paper presents and discusses the implementation of current state of mobile malware in the wild. To check whether the android application is malware or normal application, a machine learning based classification is used. Malware detection techniques such as by permission analysis approach & package malware setup are presented with results & findings. The findings & results are validated by analyzing the performance in terms of time required & is also presented in this paper. Read More...
|
Computer Engineering |
India |
1217-1220 |
295 |
Browser Based ViewShed Analysis
-V. Mouna Sree ; S. Koteeswaran; I. Prabu
To do research and development for generating viewshed analysis on 3D Earth terrain.3D capabilities to be realized directly in a supported web browser without any need for an additional plug-in or extension. A viewshed is an area that is visible from a specific location. A viewshed analysis on 3D Earth terrain will be helpful in understanding and preparing for locate communication towers or to determine the view from a road. In this paper, a study is undertaken to find an approach for viewshed analysis in client-server environment. This paper discusses technologies like WebGL, HTML5, JSP, CesiumJS and Apache Tomcat for achieving 3D viewshed analysis. HTML5 is an open standard format and provides common platform for application to be developed and used on the web. WebGL is an extension of HTML5, which is now widely used for developing web applications requiring 3D visualization. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
1221-1223 |
296 |
A Review Paper on Optimization of Surface Roughness, Material Removal Rate and Cutting Tool Flank Wear in Turning by Employing Taguchi Method
-Yogender Kumar ; Jagdip Chauhan
It is demand of present manufacturing system to change and improve existing technology and develop a product that is economically feasible. In this review paper the critical controllable machining parameters for the CNC lathe machines like speed, feed, depth of cut, tool geometry, cutting environment, tool material, work material etc. which affect desired output like material removal rate, surface roughness, tool wear etc are studied. Optimization of machining parameters and determining which parameters are most significant for required output is need to be ascertained. One of the techniques widely used for optimization of machining parameters is Taguchi and ANOVA approach help to determine which parameters are most significant. The prime aim of this review paper is to study the critical parameters and their effects on various responses in turning process through studying research paper of various researchers. The present study aimed at evaluating the best process environment which could simultaneously satisfy requirements of both quality and as well as productivity with special emphasis on reduction of cutting tool flank wear. Because reduction in flank wear ensures increase in tool life. Read More...
|
Mechanical Engineering |
India |
1224-1229 |
297 |
Impedance Source Buck-Boost Converter for Linear and Non-Linear Load using Matlab Simulation
-Bhargavi S. Pandya ; Prof. G. T. Parmar
This paper presents an impedance-source power converter (abbreviated as Z-source converter) and its control method for implementing dc-to-ac power conversion for both linear and non-linear load. The Z-source inverter utilizing a unique LC network and shoot-through states provides unique features, such as the ability to buck & boost voltage with a single stage structure. The Z-source converter overcomes the conceptual and theoretical barriers and limitations of the traditional voltage-source converter (abbreviated as V-source converter) and current-source converter (abbreviated as I-source converter) and provides a novel power conversion concept. The Z-source concept can be applied to all dc-to-ac, ac-to-dc, ac-to-ac, and dc-to-dc power conversion. To describe the operating principle and control, this paper focuses on an example: A model of z-source inverter fed to linear and non-linear load is built in MATLAB/SIMULINK and its performance is analyzed. Read More...
|
Electrical Engineering |
India |
1230-1234 |
298 |
Productivity Enhancement through Optimization Lead Time by use of Time Study and Lean Tool’s for Assembly of “Atul Gem†Vehicles
-Vipulkumar V. Mori ; Yuvrajsinh B. Kanchava; Pravin A. karetha; Shailendra N. Sharma
This paper focuses on productivity improvement efforts for an assembly of “ATUL GEM†vehicles, the goal of this paper is reduce manufacturing lead time with minimize fatigue of worker by use of time study and lean manufacturing methods. This paper investigated and searched for possible solutions and alternatives aimed at achieving the higher productivity using some methods like a for predict the changes expected to occur in the assembly lines. This paper identified how simple methods can be used to improve the rate of production in vehicle assembly. By making simple changes to the process, it can reduce the time taken for each operation to improve the production rate. Productivity improvement is achieved through analyzing the current method by eliminating un-necessary movements by use of standard operating procedure, reducing cycle time and providing appropriate solutions to various problems during the assembly of components to improve productivity. Read More...
|
Mechanical Engineering |
India |
1235-1242 |
299 |
Dynamic Programming Based Unit Commitment Methodology
-S.Madhusudan ; Dr.C.Nagrajan
In dynamic programming-based power scheduling algorithms, thousands of hourly economic dispatches must be performed to consider every possible unit combination over all the stages of the optimization interval. If the unit commitment problem is constrained to observe a minimum system spinning reserve and an economic dispatch of a combination of units does not comply with this requirement, necessary and sufficient conditions have been established to guarantee that the dispatch of these units will meet the constraint. However, these conditions can only be checked for feasibility after a dispatch is performed. In this paper, we present necessary and sufficient conditions for the feasibility of unit combinations that can be checked off-line. That is, before the start of the unit commitment algorithm, and thus before any economic dispatches are performed, thereby rendering a very efficient unit scheduling algorithm in terms of computer memory and execution time. Moreover, these feasibility conditions are independent of the problem formulation and thus can easily be applied to other unit commitment algorithms. Examples are provided to illustrate the efficiency attainable by the implementation of these conditions. Read More...
|
Electrical Engineering |
India |
1243-1246 |
300 |
Secure Smart Grid for Public Key Infrastructure using Wireless Communication System
-Nandhini. M ; Praveenkumar .B
The Smart Grid is an electrical power infrastructure that makes intelligent decisions about the state of the electrical power system to maintain a stable environment. It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, believe that this will in turn introduce many new security risks. With the smart grid’s backbone communication networks and sub networks, there are possible scenarios when these sub networks can become vulnerable to attacks. Ensuring security in these networks is challenging because most devices are resource constrained. In addition, different protocols that are used in these networks use their own set of security requirements. In this article, the securities Requirements of smart grid communication networks are firstly identified. The public key infrastructure (PKI) is a viable solution; it has some difficulties to satisfy the requirements in availability, privacy preservation, and scalability. To complement the functions of PKI, introduce some novel mechanisms so that those security requirements can be met. In particular, propose a mechanism to efficiently resist Denial-of-Service (DoS) attacks, and some suggestions to the security protocol design for different application categories. Read More...
|
Wireless Communication |
India |
1247-1250 |