No. |
Title and Author |
Area |
Country |
Page |
451 |
MYSALE Server App
-Pruthvi G ; Dharamvir
The My Sale app is an Android App . It can sync with a network server maintained by the User’s hold Company, or with a Virtual server on a hosting Service. The server is used to supervise and download report/information. This Server App is used to Create own company’s management hierarchy. This App is also used to Set Target and Track the Target Hierarchy and Online tracking of each salesman and remote stock allotment & management every day, weekly, monthly coverage , Salesman wise, Customer wise, Product wise. Send information to selected emails Web server access through Mobile/Tablets Customer Complaints & Helpdesk organization. The mySale is planned to work with a web server, although it can also be second-hand without one. All the features of the application run on the consumer side, and the member of staff serving at table is only used to supervise and download information. Read More...
|
MCA |
India |
1818-1819 |
452 |
A CYMDIST Study on Effects of Solar PV Generation at PCC and its Mitigation
-Anirudha Marothiya ; Prathamesh Chittal
The advent of renewable energy, especially in the distributed energy form, have brought many economical benefits to the end user alongside certain key technical challenges to the very utilities they integrate to. The commonest of these issues is the voltage rise at the point of common coupling (PCC) which is being studied in this paper via CYMDIST simulation cases, wherein the presence of a voltage regulator or OLTC device at a predefined node location upstream of the solar PV integration node, helps to recover the voltage profile of the last mile feeder section back within the tolerance range. Cases include, with and without the action of the regulator, all possible modes of operation of solar PV inverter viz. voltage controlled or power factor controlled, although the latter case is experimental only, and not standardized through any grid code amendment till date, at least for India. However all cases clearly demonstrate the well documented voltage variation phenomena due to distribution generation integration. Read More...
|
Electrical Engineering |
India |
1820-1823 |
453 |
Application of Energy Audit for Analysis of Power Consumption in Cable Manufacturing Industry - Case Study
-Brahmbhatt Pritesh M. ; Prof. K.D. Panchal
An energy audit is an inspection, survey and analysis of energy flows in building, processor system with the objective of understanding the energy dynamics of the system under study. Typically an energy audit is conducted to seek opportunities to reduce the amount of energy input into the system without negatively affecting the outputs when the object of study is an occupied building then reducing energy consumption while maintaining or improving human comfort, health and safety are of primary concern. This paper presents a physically based model and formulation for industrial load management. Lighting is an essential service in all the industries. The power consumption by the industrial lighting varies between 2 to 10% of the total power depending on the type of industry. Energy conservation and exploration of new energy avenues are the well accepted solution to fulfil the growing industrial demand in future. Implementation of energy audit can improve the plant efficiency and thereby reducing the energy and exploration of new energy avenues are the well accepted solution to fulfil the growing industrial demand in future. Implementation of energy audit can improve the plant efficiency and thereby reducing the energy wastages. Read More...
|
Mechanical Engineering & Electrical Engineering. |
India |
1824-1827 |
454 |
Investigating the Effect of Motion Blur and Gaussian Noise in Image and Comparative Analysis of Various Filter for Reconstruction of Image
-Gaurav Makwana ; Maya Makwana; Jitendra Managre; Nilesh Patidar; Alka Karketta
The present work investigates the qualitative effects of the Gaussian noise in image called "Gaussian blurâ€. Noise is inherent to the physical process of data acquisition so to analyze the image proper filtering technique is required. To do this segmentation process is helpful but it requires long time to process. To evaluate the filtering process we have analyze various type of filter for quantitative analysis of the effect of Gaussian noise to the original image. Simulation is done on MATLAB and results are shown. Read More...
|
Digital Image Processing |
India |
1828-1830 |
455 |
Analysis of Lossy Image Compression Using CCSDS Standard Algorithm using Various Quantization Factor
-Dhara Nitinkumar Shah ; S.K.Hadia
— Image data compression is process to remove the redundant and irrelevant information from the image so that only essential information can be represented using less number of bits to reduce the storage size, transmission bandwidth and transmission time requirements. With Increase in Resolution of images and size there is continuous need of powerful compression techniques that provide higher compression ratio with higher performance in terms of better Peak signal to Noise Ratio and low Maximum Absolute Error ( MAE) . Consultative Committee for Space Data System (CCSDS) which is consortium of leading space agencies has defined such powerful compression standard called CCSDS “Image Data Compressionâ€. It provides performance comparable to leading compression algorithms like JPEG2000 /SPIHT etc. This image compression standard is based on Discrete Wavelet Transform (DWT), low frequency DWT coefficient (DC-coefficient) quantization & Golomb-Rice coding and bit plane encoding of Higher frequency (AC) coefficients An outcome is produced for encoding performed to the low frequency substance of the DWT translated image because the human visual system is more delicate to the low frequency segment and encoding is carried out just on low frequency contains that gives lossy compression but accomplished high compression ratio. In this paper analyse the image with different quntization factor and shows that how many quntization bits are possible in image of low frequncy co-efficients and image visulization is available after reconstructing of image. Here in different images cheak with different quntization factor and cheak their compression parameter and image visulization. Read More...
|
Image Processing |
India |
1831-1835 |
456 |
The Bit-Error-Rate Performance of Diversity Combining Techniques in Rayleigh Fading Channel
-Prabandh Kumar Mishra ; Ganga Prasad
Diversity combining is a powerful technology for wireless networks. In this paper, types of diversity along with different diversity combining techniques ̶ Selection Combining, Maximal Ratio Combining and Equal Gain Combining are being discussed. An analytical expression for the signal-to-noise ratio (SNR) and bit-error-rate at the output of a three branch selection combining, maximal ratio combining, and equal gain combining is given. The diversity branches are assumed to be Rayleigh fading correlated with the BPSK modulation. Measurements of the signal-to-noise ratio and bit-error-rate after selection combining, maximal ratio combining, and equal gain combining were made in Rayleigh fading channels and compared with the analytical results. Comparisons of the performance of these combining techniques are made in terms of the complexity and improvement in SNR. An analytical result shows that the improvement in the case of equal gain combining is comparable to that of maximal ratio combining. Read More...
|
Communication Engineering |
India |
1836-1839 |
457 |
Design and Development of Drinking Water Generator from Air
-Adarsh Barodia ; Daniel Colaco; Devashish Tiwari; Jitesh Sahni; Rajesh SM
Water is the foundation of life. And even today, all around the world, far too many people spend their entire day searching for it. A person can survive without food for almost 50 days but only one week without water. 85% of the world population lives in the driest half of the planet. Clean, safe drinking water is scarce. Today, nearly 1 billion people in the developing world don't have access to it. The drinking water generator will comprise of the following parts. A double door refrigerator, a liquid pump, coolant, pipes, a filter, taps. The refrigerator will be used to cool the coolant which will flow through pipes and condense the water from air around it. This condensed water will then be filtered for to purify it and make it drinkable. The whole idea of creating this generator is to provide drinking water to households in remote areas where a pipeline system may not be feasible at the moment, besides the fact that electricity can be produced almost anywhere without the need of transmission from one place to another far away. The energy consumption will be as low as the normal running of a refrigerator. The aim of this project is to design and develop a water generator which can economically generate water which is potable especially in humid regions Read More...
|
Industrial Engineering and Management |
India |
1840-1843 |
458 |
A Survey: Robust Digital Watermarking Based on Different Techniques and Its Applications
-Uma Rajput ; Nirupama Tiwari
In this paper, we present a survey of several methods on robust digital image watermarking. Digital image watermarking, it is used as a solution to build the data transferring protected from prohibited interferences. Digital watermark methods are used in a variety of areas such as copyright protection, and vendor identification. In this paper we mainly concern on two methods: spatial domain and frequency domain. Some problems in spatial domain like Low hiding ability of watermark information, low PSNR among cover image and extracted secreted image, so a person can detect such algorithms. We discussed several transforms such as 2DWT, 2DCT,etc, in which the watermark is embedded into transformed constants of image for providing capacity and more robustness against watermarking attacks. It starts with overview, classification, features, framework, techniques, application, challenges, limitations, and performance metric of watermarking and a comparative analysis of some major watermarking techniques. In the survey our prime concern is image only. Read More...
|
Computer Science |
India |
1844-1848 |
459 |
A Comparative Study of Natural Language Interfaces to Databases
-Aanchal Kataria ; Dr. Rajender Nath
One of the most important sources of information, which plays a significant role in day-to-day life, is database. But using database languages like SQL for dealing with database is always a difficult task, which lead to development of natural language interface for databases. Natural language interface is step towards the development of an intelligent interface for making it easier for the novice users to access the database. This paper reviews the various NLIDB techniques referred in the literature and suggests future research. Read More...
|
computer science |
India |
1849-1853 |
460 |
Design and Simulation of Solar Grid Tied Inverter
-Palak H. Patel ; Mihir Parikh
The aim of this project is to convert the solar energy into electrical energy. Cost of this solar energy effective so all people can be used to easily. Solar energy is a source of renewable energy. Today compare to non-renewable sources like coal, gas and nuclear power generators PV power generation is costly but it is also pollution free source to generate electricity. Non-renewable energy source produce more pollution so today this sources does not use generally. Because of initial cost it is not used by all people but some of the people can use solar energy sources. With this goal in mind we selected this project. The Grid Connected Inverter scheme uses a boost converter, H bridge inverter, and passive filter. The two stage topology will be decided on the basis of simulation using the PSIM and MATLAB software. After simulating the simulation of inverter, inverter voltage is synchronized with grid voltage and the results are obtained for different Grid parameter Read More...
|
ELECTRICAL ENGINEERING |
India |
1854-1857 |
461 |
Reactive Power Optimization using Particle Swarm Optimization
-Urvi Patel ; Nilam Panchal
Reactive power plays an important role in supporting the real power transfer with voltage profile improvement and system reliability. It is a critical element for a transmission system operator to minimize the real power losses of system with minimizing the cost associated with it. Optimum scheduling of reactive power reduces the active power losses in the transmission system which is the main objective function of the work. In this paper work, a Particle Swarm Optimization method is used for Reactive Power Optimization problem. Particle Swarm Optimization swarm intelligence based search technique used to solve non-linear, complex power system problems. Reactive power optimization is made by reducing real power losses along with improving voltage profile. Proposed algorithm is implemented on IEEE 30-bus test system for PSO and Newton method using MATPOWER. Read More...
|
Elecrical Engineering |
India |
1858-1861 |
462 |
Payment Ecosystem In India
-Chidambar Desai ; Dr.H Ramakrishna
Man has been using some or the other kind of payment system from a very long time. The payment systems have also changed as the time has passed by. This paper aims to study the existing payment systems in India and find out ways to develop newer payment systems so that the transactions become much more easy, safe and reliable. It attempts to find the positives and negatives of the existing payment systems. It also studies the history of the payment systems and the advancements in the system to the present era. In recent times cashless system of payments is on the rise. This paper attempts to provide an insight on that aspect as well. The paper also discusses the legal aspects of adoption of new payment system in India with the help of the major acts in the Indian constitution. Read More...
|
Departement of industrial engineering and management |
India |
1862-1865 |
463 |
Automatic Weighing & Feeding Machine in Hydraulic Press for Ceraline Production
-Prerna Bhushan ; Sandeshe; Suraj K ; Chaitra V; Radh Halagani
The existing system in BHEL (EPD), the weighing of powder fed into press is done manually which is time consuming and affects production rate. Therefore the need arises for ‘automatic weighing and feeding machine’. Hence, we make use of Load cells in weighing the powder automatically. Project deals with minimization of job personnel, strain taken by them and automating the weighing system thereby enhancing the production rate. Using this automation, we get increased accuracy for the product made. Read More...
|
Industrial Engineering and Management |
India |
1866-1868 |
464 |
Design Optimization of Belleville Spring Washer by using MATLAB Program
-Ganesh S. Pawar ; Deepak D. Gaykar; Sujay J. Wankhede; Yogesh G. Bande; Prof. R.A Chothave
Spring is defined as the elastic body which deforms when loaded and recovers its original shape when load is removed. Different types of springs have application in different fields. Among them Belleville spring known as washer or cup spring is used where there is space constraint and the requirement or application of magnitude of the load is high. In this paper the design optimization of the Belleville spring is carried out to reduce the thickness which indirectly reduces the cost of the manufacturing of the spring. We can optimize the thickness by using excel sheet also but that is difficult and time consuming so we are going to optimize by using matlab program. Read More...
|
Mechanical Engineering |
India |
1869-1873 |
465 |
Evaluation of Optimum Bracing for Transmission Line Tower
-Patel Nikhilkumar S. ; Paresh Nimodiya
In this present study the transmission line towers are mostly used for the supply a power in different way. Generally the effective transmission line towers are mostly used for the construction and the effective towers are generally depend on some basic parameters like its size, shape and bracing systems. The most effective parameter of transmission line tower is its different bracing systems. And the bracing systems are resisting the lateral forces due to wind and also improve the strength of the tower. A 132KV double circuit transmission line towers are modeled with 30m height and 7.0m base width with different bracing patterns like Warren bracing, Portal bracing and Single web bracing. And analyze the transmission line tower with different bracing with including loading conditions like dead load, live load, wind load (IS 802: part-1/sec- 1) for wind load calculation IS802 (part 1/sec1): 1995 using STADD pro. And compare the various results like deflection, weight of tower and check the effective bracing of transmission line tower. Read More...
|
CIVIL(STRUCTURAL ENGINEERING) |
India |
1874-1877 |
466 |
Cloud Controlled Centralized Business Branding Interface & Auto Sync Suit
-Debajit Dey ; Prof Parimala R.
With our application business users can create the blogging contents and publish from one place, even our application supports cross platform. Business houses can plan their marketing strategies and multiple ways but social media and blogs provides a much better low cost marketing means. Application provides advance features to enhance the blogging process for the professionals. Application is a cross-platform, standalone blogging application that makes authoring and publishing your weblogs almost effortless. Any kind of business progress depends on good marketing. However, the success of any business is fully depends on good relation with the target market and the customer. Internet changes the life of a mankind. It makes life easier for all. It also makes marketing easier with help of social media. Our application also helps to write offline posts which can be published later. It also gives the feature of schedule post so user can schedule the post according to the time they want to publish. Software allows publishing, editing, modifying content, spell check, WYSIWYG etc. application supports different types of services eg blogs, twitter, picasa and flickr. . Fast accounts synchronization, content authoring, backups, modifications etc helps to save time. Read More...
|
Master of Computer Application |
India |
1878-1880 |
467 |
Dual Coaxial Slot Antenna for Interstitial Microwave Hyperthermia
-Ashish Kodape ; Vikrant Shingne; Dr. Nisha Sarvade
Microwave Hyperthermia is type of treatment of cancer tumors in which the body tumor is exposed to slightly higher temperature than the body in order to kill the cells or make it sensitive to radiation for certain anti-cancer drugs. To focus the heat into the tumors antennas or applicators are required, here coaxial slot antenna has been discussed for interstitial application in hyperthermia. The model was designed and simulated in CST studio suite and the SAR and temperature distribution of the antenna shows very well matching between theoretical and calculated results. The temperature around the tip is 55-60 degree celcuis which shows that the antenna can be effectively used for heating the tumors deep inside the vicinity. Read More...
|
Electronics Engineering |
India |
1881-1884 |
468 |
Congestion Relieving in Electric Power Network by Rescheduling of Generator using Bacteria Foraging Algorithm
-Hamdani A.Kadar A.Rahim ; Umesh L. Makwana
In a deregulated electricity market, when congestion occurs in a transmission line it violates system security and increase system cost. Transmission lines congestion is one of the technical problems which appear particularly in the deregulated environment. In a deregulated era, one of the important tasks of ISO is congestion free power system. Generator rescheduling is one of the techniques adopted by ISO to mitigate transmission congestion in a deregulated electricity market. Present paper proposed A Bacteria Foraging Algorithm based generator rescheduling for congestion management problem. The BFA is a new metaheuristic approach inspired by intelligent foraging behaviour of optimization is used for generators. The proposed algorithm is applied on IEEE 30 Bus System. Read More...
|
Electrical Engineering |
India |
1885-1887 |
469 |
Performance, Combustion Analysis and Emission Modelling of Diesel Blended with undi Biodiesel in VCR Compression Ignition Engine
-A.V.Jagtap ; Prof. S.V.Channapattana
Biomass derived vegetable oils are quite promising alternative fuels for agricultural diesel engines. Use of vegetable oils in diesel engines leads to slightly inferior performance and higher smoke emissions due to their high viscosity. The performance of vegetable oils can be improved by modifying them through the transesterification process. In the present work, the performance of single cylinder water-cooled diesel engine using blends of diesel blended with undi biodiesel as fuel was evaluated for its performance and exhaust emissions. The fuel properties of biodiesel such as kinematic viscosity, calorific value, flash point, carbon residue and specific gravity were found. Results indicated that H25 has closer performance to diesel and H75 has lower brake thermal efficiency, mainly due to its high viscosity compared to diesel. The brake thermal efficiency for biodiesel and its blends was found to be slightly higher than that of diesel fuel at tested load conditions and there was no difference between the biodiesel and its blended fuels efficiencies. For undi biodiesel and its blended fuels, the exhaust gas temperature increased with increase in power and amount of biodiesel. But, diesel blends showed reasonable efficiency, lower smoke, CO2, CO and HC. Read More...
|
MECHANICAL ENGINEERING |
India |
1888-1891 |
470 |
Experimental Investigation of Natural Convection Heat Transfer from Perforated Heated Vertical Plate
-Nazia Shaikh ; Prof. P.T.Nitnaware
The active heat transfer enhancement techniques have not found commercial interest because of the capital and operating cost of the enhancement devices. The majority of passive techniques employ special surface geometry or fluid additives for enhancement i.e. no direct application of external power. Whenever it is difficult to increase the rate of heat transfer either by increasing heat transfer coefficient or by increasing the temperature difference between the surfaces and surrounding fluid, the fins are commonly used.
A perforation in the plate or fins is the one way that used to improve its effectiveness. Studies have introduced shape modifications by cutting some materials from fins to make cavities, holes, slot, grooves or the channels through the fin body to increase heat transfer areas and or the heat transfer coefficient. This work concentrates on experimental investigation of Natural convection heat transfer from perforated heated vertical plate with varying diameter circular perforations. The results of perforated plates are compared with heat transfer from the plain vertical heated plate.
Read More...
|
MECHANICAL ENGINEERING |
India |
1892-1895 |
471 |
Thermal Performance of Wickless Heat Pipe Solar Collector with Surfactant Added Nanofluid and Solar Tracking
-A.A.Pawar ; Prof.D.B.Shelke
Solar energy is one of the cleaner forms of renewable energy resources. The conventional solar collector is a well-established technology with certain limitations. This has various applications such as water heating, space heating and cooling. However, the thermal efficiency of these collectors is limited by the absorption properties of the working fluid, which is very poor for typical conventional solar evacuated tube collector. Recently usage of nanofluid, which is basically liquid- nanoparticles colloidal dispersion as a working fluid has been found to enhance flat plate TPCT (Two Phase Closed Thermosyphon) solar collector thermal efficiency. The objective of this proposed work is to design and develop the heat pipe flat plate solar collector which uses the circular heat pipes with their working fluid as TiO2-H20 nanofluid in addition with surfactant with provision of solar tracking mechanism. The project also aims to test the performance enhancement of nanofluid filled heat pipe flat plate solar collector compared with conventional flat plate solar collector in forced convection mode. Experimental results will be compared and interpreted accordingly. Read More...
|
MECHANICAL ENGINEERING |
India |
1896-1899 |
472 |
Fault Tolerance in Distributed Mobile Computing-A Review
-Gurpreet Kaur ; Mandeep Kaur
Distributed computing is an independent and heterogeneous system in nature. The system structure and links may changes during the execution of the distributed programs. Each system is only aware about the input of the system. So there is a problem of fault tolerance in distributed system when one of the working node moves. In this paper we have studied about various fault tolerance techniques in distributed system. Read More...
|
Computer Science Engg. |
India |
1900-1902 |
473 |
Integration in CAD software for Design, Automation and Analysis of Bearing Review
-Priyank B. Machhi
Rolling bearings are one of the most important and frequently encountered components in domestic and industrial rotating machineries. Use of CAD software since reduces very much time in whole lifecycle of product. Most of the industries use the different kinds of CAD software according to their need. They were facing so many problems while designing the part also there can be possibility to introduce automation for the particular process. And also helpful to visualize the model before it is produced the parametric nature of any component design makes the effective implementation of the design concept with ease and simplicity using Pro/Engineer.due to the availability of different features directly within the software. CAD software provides ease to prepare model virtually Read More...
|
Mechanical Engineering |
India |
1903-1905 |
474 |
Design and Analysis of Valve less Diffuser Micro Pump
-Nirav P. Shah ; Prof. Chetan Vora
Up to the present, the manufacture of the micro pump generally used MEMS processes to obtain micro scale channels. However, the geometry of the channels, the cost is relatively high due to the characteristics of the most micro fabrication techniques. In this research, we focused on manufacture of valve less pumps in inexpensive approach. The design of the valve less pump consists of four horizontal inlet channels and one vertical outlet channel. The geometry of the channels with minimum width gives great challenges in fabrication and is difficult to be achieved by traditional fabrication techniques. Conventional manufacturing process was used to manufacture the chamber and channels of the pump. SOLID WORKS software was applied to the model and plans the manufacturing sequences. The piezoelectric Actuator was attached to the fabricated valve less pump chamber to test the performance. Four different channel width designs were manufactured successfully and tested at various piezo-triggered frequencies. This research provides a solution to manufacture the Valve less pump geometry inexpensively. Conventional process was proved to be a suitable approach to generate pre-assembled valve less pump structure with channels, and is applicable to other similar applications. Read More...
|
Mechanical Engineering (Machine Design) |
India |
1906-1910 |
475 |
Privacy Preserving Health Monitoring Service using Cloud Computing
-Md Iqbal Hussain H ; Gousia Thahniyath
Mobile health (mHealth) monitoring in cloud, which imposes the prevailing mobile communications and cloud computing technologies to give feedback decision support, has been taken as a radical approach to increasing the quality of healthcare service while decreasing the healthcare price. Miserably, it also contains a severe risk on both users’ privacy and rational property of monitoring service providers, which could avert the vast adoption of mHealth technology. This paper is to confront this important drawback and model a privacy preserving mobile health monitoring system using cloud to secure the privacy of concerned parties and their information. Moreover, the outsourcing decryption technique and a lately proposed key secure proxy re encryption are suitable to shift the computational complication of the concerned parties to the cloud without compromising users’ privacy and service providers’ rational property. At last, our operation analysis and security indicates the efficiency of our proposed design. Read More...
|
Computer Science and Engineering |
India |
1911-1914 |
476 |
Efficient Storage of System Logs using MongoDB for a Business Intelligence System
-Sanket Dige ; Mohseen Mukaddam; Aditya supugade; Satyarth Jha; Aakansha Jain
Software failure has become common in the emerging IT sector on daily basis. Therefore to analyze and recover from these catastrophic failures, the analysis of system logs of that particular machine is paramount. But since this data is huge and unstructured, it becomes difficult for any support team analyzer, who is supposed to troubleshoot the failure problem, to analyze this raw data. The transformation of this raw data into useful information through processing and analysis is done by business intelligence systems. Business intelligence is such a tool which can help organizations refine and manage business information with aim of solving problems and making effective business decisions. But the key to making effective business decisions by such BI tools would be the efficient storage of the raw, unstructured data into a structured, sophisticated database environment. A NoSQL database like MongoDB provides efficient storage of such raw data using dynamic schematic design. It offers much better querying, data storage ability in BSON format as compared to traditional relational databases which means faster access, better consistency in data and can grow horizontally without performance degradation. Read More...
|
Computer Science |
India |
1915-1919 |
477 |
Development of Cloud Based Integrated Energy and Water Monitoring System
-Harisha T C ; Vanishree K
Energy and Water monitoring systems are focused to achieve efficient electricity and water control in smart grid systems. In order to achieve the effective systems, various functions such as measuring mechanisms, control mechanisms, management mechanisms and user interface mechanisms are required. In this project, energy intelligent software is supposed to read the smart meters and provide the overall details of all the electrical specifications and water consumption information. It consists of a Smart meter, Management gateway, Cloud server and User Interface. Our testbed can provide an water and energy measurement function, smart meter control function, an online monitoring function and an online control function. As the results, we show that it is a good fundamental platform to consider effective energy and water control mechanisms in real fields. Read More...
|
Computer Science and Engineering |
India |
1920-1923 |
478 |
Data Mining Techniques used in Spam Detection
-Harpreet Kaur ; Mandeep Kaur
SPAM is an unwanted of electronic message posted blindly to thousands of recipients also known as ‘junk e-mails’. In the recent years spam became as a big problem of Internet and electronic communication. So for overcoming these problems some methods are used. In this paper some techniques for spam filtering are discussed briefly. Read More...
|
DATA MINING (COMPUTER SCIENCE ENGINEERING) |
India |
1924-1927 |
479 |
Identification of Factors in Implementation of Agile Manufacturing
-Gaurav Saini ; Dr. Tilak Raj; Manoj Sharma
Agile manufacturing, as a new manufacturing paradigm, requires a systematic study of its enablers to aid in successful adoption and implementation of the concept and practice. Agile manufacturing is a term applied to an organization that has created the processes, tools, and training to enable it to respond quickly to customer needs and market changes while still controlling costs and quality. But, implementation of agile manufacturing is not an easy task as it is full of lots of hurdles. The main objective of this paper is to identify the critical factors which help in the successful implementation of agile manufacturing in manufacturing organization. Read More...
|
MECHANICAL ENGINEERING |
India |
1928-1932 |
480 |
Image Forgery Attack & Detection using Pixel Matching Algorithm
-Love Chauhan ; Prof. Ravi K Sheth
A new method using DWT & PVD is used to provide the solution for detection of various attack which has been undergone rotation, scaling and translation and to provide accurate results. In today’s world of advanced computer technology, tampering and synthesis of digital images can be easily performed by a novice with number of available sophisticated image processing software available in the market. So, a sturdy, fast and single algorithm to determine forgery has been proposed and simulated. Read More...
|
Electronics & Communication Engineering (Image Processing) |
India |
1933-1938 |
481 |
Thermal Performance of Waste Heat Recovery By Using TPCT Heat Exchanger Charged with Nanofluid
-Akash Shetty ; Nikhil Shedge; Akshay Talekar; Abhishek Sonawane; Prof. Rahul Pise
Hot air plays an import role in modem life. The consumption of hot air represents a significant part of the nation's energy consumption. One way of reducing the energy consumption involved, and hence the cost of that energy, is to reclaim heat from the waste warm air that is discharged to the sewer each day. The potential for economic waste air heat recovery depends on both the quantity available and whether the quality fits the requirement of the heating load. To recover heat from waste air in residential and commercial buildings is hard to achieve in quality because of its low temperature range. Nevertheless, efforts to recycle this waste energy could result insignificant energy savings. The objective of this research was to develop a two phase closed thermosyphon heat exchanger charged with nanofluid for a waste air heat recovery system. The advantage of the system proposed in this work is that it provides useful energy transfer during simultaneous flow of cold supply and warm drain air. While this concept is not new, the design of the TPCT heat exchanger with nanofluid for the present study is significantly different from those used previously. Component experiments were carried out to determine the performance characteristics of a heat pipe heat exchanger charged with nanofluid. By replacing the conventional fluid in heat pipe with CuO/H2O nanofluid (2% volume fraction) of the heat pipe heat exchanger good performance can be obtained. The maximum effectiveness obtained for proposed TPCT CuO/H2O charged nanofluid heat exchanger is 0.2862 (2% volume fraction compared with effectiveness 0.16 obtained with conventional heat pipe working fluid. The influence of mass flow rate and source temperature on effectiveness of TPCTHX exhibits same pattern as that of conventional working fluid. The maximum enhancement in effectiveness obtained is 35%.Thus the nanofluid as working fluid in TPCT enhances the effectiveness of heat exchanger. Read More...
|
Mechanical Engineering |
India |
1939-1943 |
482 |
Optimization of Stationary Plate of Injection Moulding Machine
-Milind Dhamecha ; Bhaumik Patel; Aniruddh Kyada
The goal of structure optimization is to decrease total mass of injection moulding machine while assuring adequate stiffness. A method of structure optimization for machine is proposed in order to reduce mass while assuring adequate stiffness. Stationary plate, movable plate and tie bar are determined as optimal objects by mass analysis. Key geometric parameters of plates which have relatively larger impacts on mass and stiffness are extracted as design variables. In order to research relationship between stiffness, mass and design variables, command batch file is built by CREO and analysis is done in ANSYS. Read More...
|
Mechanical Engineering |
India |
1944-1946 |
483 |
Wind Power Generation Forecasting using Artificial Neural Network
-Beena Yadav ; Dr.Bhavik Suthar
Wind power is a potential alternative to the conventional energy technology. However, the biggest challenge in integrating wind power into the electric grid is its intermittency. One approach to deal with wind intermittency is forecasting future values of wind power production. Here, statistical method based on artificial intelligence technique is presented.24 hours and 48 hours ahead forecasting of wind power is carried out using multi-layer feedforward neural network with back-propagation as learning algorithm. Optimum values of network parameters like number of hidden units in hidden layer, learning rate and momentum factor are used after rigorous experimentation. Mean Absolute Percentage Error for 24 hoursahead and 48 hours ahead is presented. Read More...
|
Electrical Engineering |
India |
1947-1950 |
484 |
Gujarati Character Recognition using Zoning Density and K-NN Algorithm
-Modi Gaurav S ; Chauhan Nandish
In the field of Optical Character Recognition (OCR), zoning is used to extract topological information from patterns. In this paper we propose Zone based features for recognition of the Printed Gujarati Characters. A digital image is divided into 64 zones and pixel density is computed for each zone. This procedure is sequentially repeated for entire zone. Finally 64 features are extracted for classification and recognition. There could be some zone column/row having empty foreground pixels. Hence the feature value of such particular zone column/row in the feature vector is zero. The KNN classifier is used to classify the printed Gujarati Characters. Read More...
|
computer engineering |
India |
1951-1954 |
485 |
A Security Based Unobservable Routing Protocol using USOR in MANETs
-Nitin Chandra SP ; Dr. Prabhudeva S
To provide effective privacy protection in ad hoc networks, there are a number of anonymous routing schemes have been proposed. But these schemes provide significant computation overhead. The existing system introduces USOR, an efficient privacy preserving routing protocol that achieves content unobservability by using anonymous key establishment based on group signature. Here each node having a group signature signing key and an ID-based private key from an offline key server or by a key management scheme. The unobservable routing protocol is then executed in three phases such as anonymous key establishment process, privacy preserving route discovery and unobservable data packet transmission process in order to construct secret session keys as well as finding route to the destination. The USOR scheme protect packet’s content independent of traffic pattern unobservability which can be used with appropriate traffic padding schemes to achieve truly communication unobservability. The proposed system have the intention of developing unobservable routing scheme resistant against sybil attacks, collusion attack and an external attack. It discovers malicious nodes during route discovery process when they mitigate fabricated routing information to attract the source node to send data through malformed packet. Read More...
|
Computer Science and engineering |
India |
1955-1957 |
486 |
Location Based Energy Efficient Routing Protocol using ALERT in MANETs
-Megha K ; Dr. Prabhudeva S
In order to provide anonymity protection Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers. An anonymous communication method in MANETS is divided into three types that is reactive methods, proactive methods and anonymous routing method. The reactive routing method includes hop-by-hop encryption and redundant traffic routing which either generate high cost or cannot provide full anonymity protection to data, sources, destinations, and routes. But Mobile Ad Hoc Networks (MANETs) uses various anonymous routing protocols to provide anonymity protection to data, sources and destination. Hence to offer a very high anonymity protection, Anonymous Location-based Efficient Routing protocol (ALERT) was proposed. Basic idea behind my proposed system is to dynamically partition the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route. And finds the best energy path within the different anonymous routes Experiments and simulation results have proved that proposed system provides route anonymity protection at lower cost compared to existing anonymous routing protocol. Read More...
|
Computer Science and engineering |
India |
1958-1960 |
487 |
A Video Authentication Based on SVM Classification and Scale Invariant Features of Video Frames
-Tushar Lakhani ; Prayag M. Patel
A video authentication is a process of that verify the given digital video is authentic and exactly same as when captured. In current scenario different types of digital and multimedia editing software used to manipulation of video sequence frames and object motion very easily. In this Paper, Local features have good strength and discriminative ability SIFT descriptors are used here for video content description. Content matching using SIFT takes large amount of time and it is computationally expensive for high dimensions and large number of points. SIFT local invariant feature has many applications in different fields such as image retrieval, strong matching ability and machine vision. In this paper analyze the various Low level feature detection methods and main aim at computing image information and detect every image point These difficulties are solved by using dual threshold method which divides videos into segments having homogeneous content and by performing key frame extraction on each of these segments. SIFT features are then extracted from these key frames and SIFT feature sets of two video frames are matched using SVM based method. Experimental results also demonstrate that the proposed method can obtain a better exchange between the effectiveness and the efficiency of video copy detection. Read More...
|
computer science engineering |
India |
1961-1964 |
488 |
Efficient Three Dimensional Node Localization using Genetic Algorithm in Wireless Sensor Network
-Preety Saini ; Rajiv Bansal
— Node localization that to be aware of the position of nodes is an essential part of wireless sensor network. One of the major requirement of localization in WSN is accuracy of location. Most of the work done is in two dimensional network. The aim of this paper is to reduce error in location estimation for3D coordinate system. The proposed 3DL-RAGA in this paper is range based and anchor based algorithm. Initial step of algorithm is optimal placement of anchor nodes by using k-means and then encodes the sensor node in real coding. The fitness function is designed based on distances between anchor and non-anchor nodes. The Uniform crossover and a new three dimensional neighborhood mutation operator are applied. Thethree dimensional (3DL-RAGA) GA based algorithm is first time implemented and simulation result shows that, it show less RMSE value than previous 3D algorithmand algorithm shows faster convergence. Read More...
|
Computer Science And Engineering |
India |
1971-1977 |
489 |
Simulation and Analysis of Parallel Resonant DC Link Inverter
-Piyush V. Shingala ; Alpesh S. Adesara
parallel resonant dc link that provides soft switching and pulse width modulated inverter is presented. The new PRDCL ensures zero crossing of time period. Read More...
|
Electrical Engineering |
India |
1978-1981 |
490 |
Optimizing Efficiency by Problem Reduction in Press Machine
-Chandra Kanth Pareek ; Dr.Vasantha Kumar.S.A
The main objective of the project is to increase the availability of a machine and to reduce the down time of a machine to maximize production capacity i.e. reduce MTTR (Mean Time To Repair) and increase MTBF (Mean Time To Repair).The project is carried out on 21C press machine, Six months data was collected which clearly showed that this machine encountered highest number of breakdowns comparing to other machines in the plant. All the reason for the breakdown has been analyzed and inspected by the method of Fish bone diagram. By this analysis and methods the root causes of the breakdowns were identified. By all these procedures the availability of the machine will increases and also increases the production capacity, minimizes the maintenance cost and reduces the down time. It can be achieved by facilitating and standardizing the repair methodology and also the system can be adapted to other machines also. Read More...
|
Industrial Engineering |
India |
1982-1986 |
491 |
Nonlinear High Gain Observer in Feedback Control System
-Mishra Manish P. ; Patel Ankit A.; Kathiriya Hitesh
In context to feedback control system, the problem of state estimation for a class of nonlinear systems with measurement noise is studied. It is well understood that when implemented in feedback loop, the high gain observers are sensitive to measurement noise but are robust to model uncertainity. A trade-off always exists between fast state reconstruction and attenuation of measurement noise. A nonlinear gain approach can be used to overcome this trade-off between fast state reconstruction and measurement noise attenuation. In presence of measurement noise, the estimation error can be noticeably compromised if the observer gain is chosen too large. To achieve this, a high gain of the observer is used in transient state and lower gain is generated when steady state is reached. The effect of noise on the steady state performance is reduced by reducing the observer gain after achieving satisfactory state estimates. Read More...
|
ELECTRICAL ENGINEERING |
India |
1987-1989 |
492 |
An Investigation on Thrust Force and Circularity of GFRP Sheet by Applying Regression Analysis
-Nirmal Vyas ; Hiren Gajera; Ankit Patel
Drilling is the most commonly applied method for hole making of fiber reinforced materials owing to the need for structure joining. This study, through a new approach present to optimize the thrust force and circularity through design of experiment by using full factorial design. The purpose of this study is to investigate the influence of drilling parameters, such as cutting speed, feed and point angle on thrust force and circularity produced when drilling GFRP composite. In this study, it will regression analysis and ANOVA to analyze and optimize the process parameter of drilling. Read More...
|
MECHANICAL |
India |
1990-1994 |
493 |
Effects of Rice Husk Ash Particulates on the Mechanical and Tribological Properties of the Aluminum Metal Composite Reinforced with Aluminum Oxide
-Vikas Gupta ; Sahil Takhi
Hybrid metal matrix composites are the composites consisting of two reinforcement constituents in a metal or in an alloy to enhance the properties of the base metal or alloy. In the present study rice husk ash and aluminum oxide are the two reinforcements. The base metal or matrix metal is aluminum alloy (Al-Si12). The reinforcements are added in equal quantity. Different composition combination (2, 4, 6, and 8wt. % of aluminum alloy) has been taken of the reinforcements. In this research the effects of the reinforcements on the mechanical (micro hardness, tensile and flexural strength) and tribological properties has been studied. Wear test is performed on the pin-on-disc apparatus. The wear performance of the hybrid metal matrix composites (MMCs) is evaluated at load of 1kgf. Sliding distance is 1000meter and the sliding distance is 1.5m/s. The result shows that increase in the percentage of the reinforcement leads to increase in mechanical properties (tensile strength, flexural strength and micro hardness) and tribological properties. Read More...
|
Mechanical Engineering |
India |
1995-1998 |
494 |
Enhancing the Lifespan and Energy Efficiency of Wireless Sensor Network using Clustering and Routing Protocol
-Suhas D ; Dr.Prabhudeva S
Energy efficiency is one of the major parameters in Wireless Sensor Networks. In this paper we attempt for a solution to balance the energy usage for maximizing the network lifetime, increase the packet delivery ratio and throughput. Our proposed algorithm is based on Energy Density of the clusters in Wireless Sensor Networks. The cluster head is selected using two step method and on-demand routing approach to calculate the balanced energy shortest path from source to sink. This unique approach maintains the balanced energy utilization among all nodes by selecting the different cluster heads dynamically. Our simulation results have compared with one of the plain routing scheme (EBRP) and cluster based routing (TSCHS), which shows the significant improvements in minimizing the delay and energy utilization and maximizing the network lifetime and throughput with respect to these works Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
1999-2001 |
495 |
Facial Emotion Recognition Techniques
-Namita Rathore ; Rohit Miri
Facial expression recognition system has turn into a most emphasizing research area since it plays a most important part in human-computer-interaction. The facial expression recognition system finds foremost application in areas like social interaction and social intelligence like in diverse surveillance systems, defense systems, substantiation or verification of individual like criminals etc... The face can articulate emotion sooner than people verbalize or even understand their posture. Thus there is apparent need of unfailing recognition and identification of facial expressions. In this paper a review of various techniques used in facial expression recognition like PCA (Principal component analysis), LDA (Linear discriminant analysis) etc has been carried out. We have formulated the Face expression recognition technique as different phases and the survey is represented accordingly in tabular form emphasizing on their performance. Read More...
|
COMPUETR SCIENCE AND ENGINEERING |
India |
2002-2006 |
496 |
Saas Based Work Panel with Tools
-Shibajyoti Shil
Application gives you the tools by that all the member can communicate and schedule, assign tasks, develop strategies, and get results. Application is the incredible hosted online workspace and this can be accessible from any PC or Mac that lets we can create and collaborate and share our task and other important work like Share files and collaborate with colleagues, clients or partners wherever they are. Now a day’s everybody have Smartphone by that they can communicate with everyone. So major plan of the project is that communicate with client share holder and the other people related to this project via online meetings and voice or IM (Instant messaging). We can create group by adding member of your network - your colleagues, team members and friends – and then create a customized online space where each of these groups can communicate. And then collaboration and reuse, this Templates allow you to store and reuse Item structures. The network module allows to control the members of your Application network. This application is perfect for online collaboration, project management, sharing files and images, planning and workflow coordination, group discussions & secure screen sharing, online meetings via voice or IM(Instant messaging) Read More...
|
Master of Computer Application |
India |
2007-2010 |
497 |
Assessment of Deposition Rate in MIG Welding of Metal
-Gaurang R. Patel ; Prof. B. D. Patel
Metal inert gas arc welding (MIG) is preferable more its inherent qualities like easy control of variables, high quality, deep penetration, smooth finish. The quality of weld depends on metal deposition rate which in turn depends on the process parameters. In this present work, the effect of Taguchi Methodology approach for experimental investigation of metal inert gas arc welding parameters welding current, welding voltage and wire feed speed on metal deposition rate has been studied. Read More...
|
MECHANICAL (PRODUCTION ENGINEERING) |
India |
2011-2014 |
498 |
Cross Layer Security Scheme for Multimedia Data Transmission
-G.Thiruppathi ; G.S.Rizwana Banu
Wireless multimedia applications are used to transfer multimedia data under wireless network environment. Network operators test the multimedia content, optimize the bandwidth and provide quality of service (QoS) to authorized users. Physical layer information is dynamic in wireless networks. Application layer information is related to wireless multimedia delivery. Joint physical application layer security scheme is used to secure the wireless multimedia data delivery. The proposed joint security architecture can be implemented in a distributed manner by exchanging messages between the authorized transmitters and receivers, thus achieving a satisfying trade-off between the security level and communication overhead. Security and signal processing tasks are managed under the physical layer. The authentication and watermarking strategies are used at the application layer. Cross layer security scheme used streaming based authentication is done in two ways Error Correction Coding (ECC) based methods and graph-based methods. Device authentication scheme is used to verify the devices and its associated multimedia services. Triple DES algorithm is used to secure the multimedia content, control and feedback messages. Read More...
|
Computer Science Engineering |
India |
2015-2018 |
499 |
A Framework for Application of PSO Algorithm for Color Image Segmentation
-Komal Mittal ; Er. Anuradha Panjeta
The goal of segmentation is typically to locate certain objects of interest which may be depicted in the image, segmentation could therefore be seen as a computer vision problem. Several general-purpose algorithms and techniques have been developed for image segmentation. To be useful, these techniques must typically be combined with a domain's specific knowledge in order to effectively solve the domain's segmentation problems. This paper presents a methodology to implement PSO algorithm for image segmentation. Read More...
|
Computer Science & Engineering |
India |
2019-2023 |
500 |
A Study on Changes in Rheological Behaviour of Paving Grade Bitumen using Admixtures
-Vaishali V. Shah ; Hitesh K. Dave; Harpalsinh J. Raol; Dhara D. Kalasareeya
Bitumen ageing is one of the principal factors causing the deterioration of bitumen pavements. It is responsible for deterioration of physical and chemical properties of the bitumen binder. The influence of vehicle traffic on road pavements causes natural aging processes and gradual loss of viscoelastic properties of bitumen binders. In the present study natural organic materials like sugarcane molasses were used in various percentages (0 to 3%) as modifiers in 60/70 grade bitumen. The effect on physical properties in terms of penetration, softening point, weight loss and rheological properties of the bituminous binders in terms of their complex modulus (G*) and G*/Sin δ before and after ageing were measured. Testing was performed at temperatures ranging from 45 °C to 70 °C in increments of 6 °C at a frequency of 10 rad/sec using dynamic shear rheometer (DSR). The results show that after ageing softening point increases and penetration decreases with increasing percentage of modifier. The G*/Sin δ is found to decreases with increase in percentage of modifier after ageing indicating little lesser rutting resistance than neat bitumen but the effect of ageing (hardening) on modified bitumen is less as compared to unmodified bitumen. Hence it improves the service life of pavement. From the point of economical viability, molasses is much cheaper than bitumen. Read More...
|
Transportation Engineering |
India |
2024-2028 |