No. |
Title and Author |
Area |
Country |
Page |
701 |
Mechanism and Elimination of Spatter and Porosity in Gas-Metal Arc Welding of Mg Alloys
-Kailash Chandra Meena ; Shahnwaz Alam
The original objective of this study to make GMAW a versatile process for welding Mg alloys and reduce the Spatter, which can cause 50% or more loss of the filler metal and which has long hindered the use of GMAW for Mg alloys, and Gas porosity, which has hardly been studied in GMAW of Mg alloys. The widely used AZ31 Mg (~ Mg-3Al-1Zn) sheets were welded with its recommended AZ61 Mg (~ Mg-6Al-1Zn) welding wire. Spatter was very severe with conventional Mg GMAW as expected. The mechanism for spatter was established. In order to suppress spatter, the use of CSC-GMAW for welding Mg alloys was explored, which is an advanced GMAW process with controlled short circuiting (CSC).Spatter was eliminated and the reason explained. However, with either process severe gas porosity was encountered, much worse than that in Al GMAW. The porosity-formation mechanism was established. Porosity was eliminated either by cleaning the welding wire with sandpaper before welding or baking the welding wire before welding. Recommendations for preventing gas porosity in Mg GMAW based on the present study were made to both the manufacturers and users of Mg welding wires. Read More...
|
Mechanical Engg |
India |
2838-2845 |
702 |
Congestion Management in Deregulated Power System using Particle Swarm Optimization
-Hamdani A.Kadar A.Rahim ; Vaseem K. Shaikh; Vedant Sonar; U. L. Makwana
The deregulation of the electricity industry in the word has made the problem of transmission congestion increasingly significant. It aggravates the smooth functioning of competitive markets. Also congestion problems are threatening to system securities. Therefore, investigation of techniques for congestion-free-wheeling of power is of paramount interest and necessary for the sake of system security. In this paper Particle Swarm Optimization technique is used to solve the congestion problem from the system. Here in this paper standard IEEE-30 System is used. Read More...
|
Electrical Engineering |
India |
2846-2849 |
703 |
Smart Greenhouse Automation
-Komal Deshmukh ; Mayuri Patil; Rahul Belsare
Smart Green House Automation is a complete system to monitor and control the environment parameters inside a greenhouse. It is necessary to design a control system to monitor various parameters like Temperature, Humidity, Soil moisture, Light Intensity. Here controlling process takes place effectively by both manual and automatic manner. This software uses an Android mobile phone for monitoring as well as controlling green house, connected to a central server which is connected to a microcontroller via serial communication. Microcontroller communicates with the variety of sensor modules. Read More...
|
COMPUTER ENGINEERING |
India |
2854-2858 |
704 |
Maximum Power Extraction from Wind Turbine using Optimum Generator Speed Calculation
-Safiullah Faqirzay ; H. D. Patel; Ghanchi Maqbul Usman Bhai
The aim of this research is to extract maximum power with fixed point calculation, the developed method of maximum power extraction is based on optimal speed calculation of the generator. Here we are going to use PMSG (Permanent magnet synchronous generator) as WTG (Wind Turbine Generator), three phase bridge rectifier for converting ac to dc and boost converter for converting unregulated dc to regulated dc voltage. This control scheme become possible with the help of measuring wind speed then calculating the optimal generator speed and that optimal generator speed will be used as a control signal which will be applied to the boost converter to vary the dc side voltage and control the generator speed according to the optimal speed so that the optimal speed of the generator will be tracked properly in which we will get the maximum power from the generator. The prototype of the WTG with the combination of the mentioned equipment is simulated with the help of MatLab/SIMULINK software. Read More...
|
Electrical Engineering Wind Turbine PMSG |
India |
2859-2865 |
705 |
Critical Analysis of Biodynamic Responses for the Human Sitting Posture Subjected to Vertical Excitation
-Vinayak .B. Patil ; Prof.M.R.Phate
In this paper human sitting posture subjected to vertical excitation was critically analyzed subjected to the various condition. The various parameters such as the mass, stiffness and the damping coefficient were calculated from the human anthropometric data and the previous work of the various researchers as mentioned in the literature review. The experimentation was conducted for getting the biodynamic responses from the human body. The effect of change in mass, stiffness and the damping coefficient was calculated and the change in the biodynamic responses was measured for the further analysis. In the present work there are three inputs A, B and C and the three responses such as STHT , DPMI and the APMS. The present paper focused on the Effect of M, K and C on the Various Biodynamic Responses. Human body vibration is a phenomenon affecting millions of workers in the world.Among these are light and heavy equipment operators, m/c tool operators and truck drivers.Many harmful side effects of the vibration can be both physiological and neurological which in many cases lead to permanent injury. High speed vehicles frequently transmit dynamic forces to their occupants. The present work will help to analysis the sitting posture for the various applications. The findings of the present work will help the industry or society to utilised the human in the effective and efficient manner. Read More...
|
MECHANICAL ENGINEERING |
India |
2866-2869 |
706 |
Comparative Study of Thermal Performance of Spiral Tube Solar Water Heater with Straight Tube Solar Water Heater
-Jignesh A. Patel ; Tejendra B. Patel
The sun which is source of all energy the solar energy which is available from sun can be used for many application water heating, air heating and power generation like solar water heater are the system those collect solar energy and transfer the heat to passing water. The present work includes to carry out comparative study for thermal performance of the straight tube solar water heater with the proposed spiral tube solar heater experimental set up; it consists copper tube in shape of spiral shape, flat plate collector, K type thermocouple the change in water temperature for 100 litter per day water capacity. The thermal performance was evaluated extensively throughout the month of May; a maximum temperature difference of 16 Ö¯C between inlet and outlet of the solar water heater. The efficiency of spiral tube solar water heater was calculated. The maximum value during the experimental period was found to be 47.63% which was more than the straight tube solar water heater. Read More...
|
MECHANICAL ENGINEERING |
India |
2870-2875 |
707 |
Development of a Prototype of Desktop CNC Machine
-Vatsal Suthar ; Dhaval B Patel
CNC (computer numerically controlled) mills cut objects out of durable materials and are widely used in modern manufacturing. They enable rapid prototyping in workshops and improve the speed and efficiency of factory lines. Yet most mills are costly and difficult to use, keeping them out of reach for individuals and small businesses. It brings CNC technology to a size and price that will fit in your home or office. Its revolutionary simplicity makes it possible for everyone – whether a novice or trained engineer – to create high-quality finished products.CAD (Computer Aided Design) - Inscape, a vector drawing program specializing in SVG format graphics. Typically, a program such as Free CAD would be used to make a .dxf. CAM (Computer Aided Manufacturing) -Maker CAM, a Flash file which will import SVG graphics and allow one to define operations (such as Profile, Pocket, Follow Path or Drill) to be applied to, or along, or at the center of paths at feeds and speed rates appropriate to the selected material. Read More...
|
Mechanical Engineering |
India |
2876-2878 |
708 |
Privacy Preserving in Shared Data using Third Party Auditing
-Surendra Babu M S ; Satish B Basapur
providing security to data is one of the major challenges in cloud computing. As many users use cloud for storing their private data it is essential to provide privacy and security for it. Many approaches are present to handle these issues but lack in providing confidence in end users as they are unaware of the status of data. Due this reason of many big companies, users are not showing interest in cloud .So to provide transparency third party auditing is done as not only cloud service provider is assuring the security of the data but also third party auditor. This increases the confidence of the end users as well third party auditor informs end user about any data breach if happens which makes end user to have awareness about his data. this paper throws light on how third party auditing is a key factor in increasing the trust of end user, big companies on cloud computing. Read More...
|
COMPUTER SCIENCE |
India |
2879-2880 |
709 |
Improvement of Mechanical Properties in Flexible Pavement by using Nanotechnology
-Dikesh Chauhan ; Prof. Priyank Shah; Jatin Patel; Sohil Patel
In Civil Engineering, vast improvement has been achieved through the production of materials with new purposes or by refining the performance of existing ones. Today Nanotechnology is widely considered as one of the 21st century’s important technologies. In this investigation has been trying to use the Carbon Nanotubes as an additive matter for bitumen, technical characteristics of bitumen and asphalt mixtures as well as to promote. Therefore, in this research, parameters such as bitumen’s permeability degree, ductility and marshal stability, and asphalt specific gravity will be investigated. In our research project we will try to increasing Carbon Nanotubes by 1%, 1.5%, 2%.In this regard we will perform laboratory tests such as Penetration Test, Ductility Test, Softening Point Test, and Marshal Stability Test. The use of these mixtures, in addition to improving asphalt surface properties, we will try to decrease thickness of under layers and cause the decreasing of stone materials consumption as well as economical aspect. Read More...
|
Civil Engineering |
India |
2881-2883 |
710 |
Windows Desktop Application for Financial Reporting & Accounting System
-Yogesh A. Bhandari ; Prof. Primala R
Windows-based accounting system is developed in .NET with C#. This is used for collecting, storing, processing financial & accounting data. This computer-based system is method for tracking accounting activity with combination of information technology resources. This Application’s main purpose is to know financial position of the company & based on financial report decision makers able to take decision. Read More...
|
COMPUTER SCIENCE |
India |
2884-2885 |
711 |
Development and Performance Analysis of PM & Soot Trap Device for Four Stroke Diesel Engine
-Jay T. Patel ; Mazar A. Shaikh; Dr. G. H. Upadhyay; Harshil S. Patel; Jinesh G. Tank
Non-conventional fuels and alternative fuels are not complete to meet the requirement of zero emission. Thus cause increase in level of pollution by exhaust gas like HC, CO, NOx, PM,CO2 etc. These pollutants are harmful to environment as well as on human being. To reduce exhaust pollution Catalytic converter are use in vehicle as retro fit. Catco can control CO,HC,NOx but Not able to oxidize the carbon core, Collecting efficiency is poor & fail to trap particulate matter(PM), carbon soot, Chemical Species Emissions. For reducing and controlling level of exhaust PM and carbon soot Diesel Particulate Filter is use in medium and heavy duty diesel engine. The current study focuses on developing of new PMT (particulate matter trapping) device. After carried out this experiment with the help of PMT device, PM and carbon soot reduces up to 8-13%. Read More...
|
Automobile Engineering |
India |
2886-2889 |
712 |
Security Framework for Software Defined Networking with Openflow
-Vaibhav K Matalia ; Girish Khilari ; Rahul Ekbote
The software defined networking is an emerging three layer architecture which defines control, data and application plane. Control and date plane implement routing and forwarding function, respectively. Application plane include Communication process. There are several firewall application built around controller for detect malicious traffic. At controller side some time traffic congestion is occurs so it hard to detect traffic according to rules. This study focuses on developing a firewall at switch level that protects our internal network. It reduces traffic congestion because malicious traffic is detected at switch level rather than controller side so it will provide more security. Our Implementation uses tree topology with one controller, three switches and four hosts. We have chosen POX controller written in python for the experiment and for creating SDN topology we use Mininet. Read More...
|
NETWORK SECURITY |
India |
2890-2893 |
713 |
Performance Evaluation of GSA and PSO Based Algorithms for Automated Test Data Generation for Software
-Ankur Goel ; Dr. Ashok Kumar
In this Dissertation, we have implemented Meta-heuristic based search algorithms namely PSO and GSA algorithms for automatic test case generation using path testing criterion. For generation of test cases, symbolic execution method has been used in which first, target path is selected from Control Flow Graph (CFG) of Software under Test (SUT) and then inputs are generated using search algorithms which can evaluate composite predicate corresponding to the target path true. We have experimented on two real world programs showing the applicability of these techniques in genuine testing environment. The algorithm is implemented using MATLAB programming environment. The performance of the algorithms is measured using average test cases generated per path (ATCP) and average percentage coverage (APC) metrics. Number of individual or population size doesn’t affect performance much but it should be between 20 and 40 but various parameters have to be tuned inorder to get good results. Read More...
|
Computer Science and Engineering |
India |
2894-2899 |
714 |
Point of Sales Interfaces for Business Process Automation System
-Meghraj ; Mridula Shukla
Point of Sale Interface for business Process automation system is an add on feature for existing business process automation system software. The modules that will be built, will enable the retail out let to bill the customer using barcode technology, manage the incoming and outgoing stock of the show room and also manage the queue by using bursting methodology using barcode/RFID PDA. Some of the other features that will be part of this project will be auto email intimation for the items that have expired but still in show room. These modules will help to manage the retail outlets stocks very effectively. This System will store the information of products and customers. This system will also store all stock details. It also provides security by granting access permission for changing the sensitive data to the admin. This system will generate all kinds of reports as per the user’s requirements. The modules that will be built will enable the retail out let to conduct the audit quickly and accurately. It will allow distributing the work of audit among team members and also allowing them to finish the audit at different location simultaneously. Consolidate the audit data at central database and generate reports. The audit data will work on offline mode. Therefore sync the data before and after audit is must. Once the audited data is back into the central database generate reports. Also generate various reports using stock information. Read More...
|
Computer Engineering |
India |
2900-2901 |
715 |
Intelligent Vehicle with Multitask Management
-Rituraj Prince ; Prof. Mr. C. Sivaprakash; Veeresh.K; Shivasharanappa; Geetha.R
The previous report shows accidents are happening due to driver neglect, drink and drive, suddenly change Driver health conditions are the causes of the road accident. So for overcome these type of causality we purposed a vehicle to monitor the activity of driver and also check the health condition of driver. And reduce the road accidents. Read More...
|
ELECTRONICS AND COMMUNICATION |
India |
2902-2904 |
716 |
Maximum Power Point Tracking in SPV System under Linear and Non-linear Condition using Dynamic PSO Technique
-Manoranjitham ; K. Niraimathy; R.Rajesh
In this paper, Maximum Power Point Tracking is done in a solar photovoltaic system for maximum harvesting of power from the sun so that the solar power generation can be improved. In this paper a Dynamic PSO a variant of PSO is used for maximum power point tracking in solar PV system under linear and non-linear conditions. A comparative analysis on the performance of Dynamic PSO as well as the conventional techniques such as perturbation and observation and particle swarm optimization technique is done for Maximum power point tracking of Solar Photovoltaic System under linear and non-linear condition. The efficiency of the technique is compared and the best technique is applied for maximum power point tracking in a solar PV system under linear and non-linear conditions that prevails in the atmosphere. Linear and non-linear are conditions, in the atmosphere that occurs due to direct sunlight irradiance and diffused irradiance on the earth’s atmosphere that affects the solar PV panel insolation level. Under varying atmospheric conditions the solar PV generation is made more efficient by using the best Maximum Power Point Tracking technique. Read More...
|
Power system engineering |
India |
2905-2909 |
717 |
A Novel Approach in Indexing using FOR
-Amrish Darji ; Risha A Tiwari
Information retrieval and search engine indexes are contains large quantities of text. Information retrieval is concerned with representing, searching, and manipulating large collections of electronic text and other human language data. Web search engines - Google, Bing, and others - are by far the most popular and heavily used IR services, providing access to up-to date technical information. Indexes are the key technology corroborate efficient text search. In this system we are use the various existing techniques & compression approaches for reduce index sizes and improve the performance of query processing that uses compressed indices to find relevant documents for the users' queries. Inverted index data structure is the main method of indexing used to provide efficient query evaluation. Inverted index table which includes keyword, document ID and position list, and the table can saves a lot of storage space. After then, on the basis of the table, it provides a key as dictionary compression with high compression ratio and high decompression rate for the data block. Efficient construction of inverted indexes is essential to provision of search over large collections of text data. Read More...
|
Computer Engineering |
India |
2910-2913 |
718 |
Embedded based Monitoring and Control of Parameters in a DC Motor
-Preethi.R ; Dhivya.N
This paper describes the automation process, most of the industries are shifted towards automation. In order to do the tedious work and to serve the mankind, automation is developed in industries. In this project the automation work is done in DC motor for monitoring and controlling the parameters of DC motor. In the existing system, the work is done with the help of man power, where every time a person wants to monitor the temperature of the DC motor. If the temperature increases in the coil of DC motor, the machine gets stopped. To avoid this, the cooling fan is turned ON manually. In the proposed system, monitoring and controlling the DC motor was done automatically by using the ARM controller. Read More...
|
Electrical Engineering |
India |
2914-2916 |
719 |
Loss Allocation in Radial Distribution System with Distributed Geration
-Shaik Imran ; P.Suneethi
Due to the liberalization of the electricity market and the introduction of distributed generation (DG), the importance of distribution loss allocation (LA) has incremented. This paper presents developing method for distribution power LA in radial systems. The proposed method, which based on the results of power flow and considers active and reactive power flows of lines for Loss Allocation (LA) is composed of three steps. In the first step, starting from the source nodes, the puissance loss allocated to all nodes is calculated and then the power loss allocated to the loads connected to each node is obtain. In the next step, the total power loss is allocated to the nodes in order to calculate the power loss allocated to the DGs predicated on the results of this step. In contrast to the precursor step, in this step, allocating power losses to the nodes commences from sink nodes, which are the nodes whose load is more than their generation. In the final step, normalization is executed. The application of the proposed method is illustrated on two distribution feeders, and the results are compared with Genetic Algorithm Loss Allocation method. Read More...
|
ELECTRICAL ENGINEERING |
India |
2917-2922 |
720 |
Proficient Secrecy Roaming Conserving Security in Wireless Mobile Networks
-T.K.Raajeshwari ; N.Gugha Priya
Increasing number of mobile users is being allowed to use wireless mobile network services where the roaming service provides the constant services to a network without breaking the connection. Ensuring security in roaming service is a great challenge. In the absence of home server the inter-domain security should be established which makes it feasible for mobile users to move into the foreign domains. An authentication mechanism is required between the mobile users and the foreign server which supports the highly secured communication in wireless networks. In addition maintaining the privacy of the mobile user is an important requirement such as the information about behavior of the user who needs the roaming service. The participations of home attendants have engrossed significant interest to its stimulus on the communication proficiency. Formal protocols incur high communication and computation cost. The proposed protocol that has a novel three-round architecture which uses a pseudo-identity based signcryption scheme to perform efficient revocation with short revocation list and the authentication efficiency is higher than that of existing protocols. To provide the better computation efficiency and lightweight storage efficiency this scheme does not require the highest computational cost on the roaming user. A detailed analysis and overhead evaluation on a number of performance metrics such as computation cost and time is given to validate the performance of proposed protocols. Read More...
|
COMPUTER SCIENCE AND ENGINEERING |
India |
2923-2926 |
721 |
Occurrence of Class Characteristics on Hypothenar Area of Palm Prints in Western Population of Uttar Pradesh
-Amit Chauhan
Emphasis of palm prints has a very special implication in identification of suspects; because of its uniqueness, perpetuality and individuality similar like fingerprints which remains uninterrupted since birth to death. Palmprints is known as an emerging influential mean for personal identification with higher confidence and has been used as a non-erring identity for the exclusion of suspects. For this study, the lateral palm prints of the Western population of Uttar Pradesh were studied to get information about the occurrence of class characteristics in the hypothenar area of palm prints. Read More...
|
Applied Science |
India |
2927-2928 |
722 |
A Survey of Opportunistic Routing Protocol in Wireless Ad Hoc Network
-Velmurugan.S ; A.Priethamje Vidhya
Opportunistic routing (OR) is a recent routing technique for wireless sensor and ad hoc multi-hop networks. OR is a combination of routing protocol and medium access control for a wireless sensor and ad hoc network. Based on the highest priority its works. Transmitted that packet with is closest to the destination. There are no acknowledging packets, and no collisions with them. It broadcasts each packet, choosing a receiver to forward only after learning the set of nodes which actually received the packet but it cannot totally avoid duplications (repeating), it can avoid it in a certain degrees. Read More...
|
Electronics and Communication Engineering |
India |
2929-2932 |
723 |
Comparative Study of Emulsion Based Half Warm Mix and Cold Mix for Construction of SDBC and DBM
-Yash Pandey ; Dr. Sangita; Shri M.P. Singh; Abhishek Yadav; Dr. Vandana Tare
There is increase in pollution due to increase in the use of vehicles which leads for upgrading of roads to withstand more load. CMA is a technology which does not impart more pollution as compared to traditional HMA but it wears less load. Using new technology known as Emulsion based Half Warm Mix Asphalt not only increase load bearing capacity of roads but is also cost effective and environmental friendly. In this paper study of HWMA with comparison to CMA is done for SDBC and DBM layer of flexible pavement and is found to be effective over use of CMA. Read More...
|
Civil Engineering |
India |
2933-2935 |
724 |
Priority based Scheduling and Reliable Content Delivery in VANET
-Maru Jalay Saurin
Vehicular Ad-Hoc Network (VANET) is a subclass of Mobile Ad-Hoc Network (MANET). It communicates in two approaches Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I). By communicating with other vehicles and with Road Side Units (RSUs) VANET provides many lifesaving and commercial services. There are no fix infrastructures in VANET. Both Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) take place with the help of On Board Unit (OBU) which is residing on the vehicle. Scheduling is a very important issue in VANET as messages are to be delivered to the recipient vehicle properly and accurately. It is important to send emergency, lifesaving and messages with critical information before general entertainment and commercial messages. It is also critical that any message which is sent to the vehicle is received by it in the time period for which the vehicle will be in range of the RSU.The objective of our work is to enhance the delivery of a message from RSU to vehicle. To achieve this we will develop a priority based scheduling protocol which will send the message from the RSU to the vehicle in the required time bound by broadcasting periodic messages which results into reduction in network traffic and without affecting the service ratio and without compromising reliability. Read More...
|
COMPUTER ENGINEERING |
India |
2936-2940 |
725 |
A Collaborative Approach for Web Personalized Recommendation System
-Nirav M. Khetra ; Shruti B. Yagnik
Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy and big-error in predictions. A distinct feature of typicality-based CF is that it finds ‘neighbors’ of users based on user typicality degrees in user groups (instead of the co-rated items of users, or common users of items, as in traditional CF). To the best of our knowledge, there has been no prior work on investigating CF recommendation by combining object typicality. Further, it can obtain more accurate predictions with less number of big-error predictions. Read More...
|
Computer Engineering |
India |
2941-2943 |
726 |
Improving AODV Protocol through Cross Layer Design in MANET
-Nidhishkumar P. Modi ; Krunal J. Panchal
Mobile Ad hoc Networks (MANETs) are temporary formed, infrastructure-less networks. Performance metricsdegrades due to the unstable channel conditions, network connectivity, mobility and resource limitations. To improve different performance metrics, different cross-layering techniques are used where different layers from protocol stack communications with each other via exchange of information. AODV is a well reactive ad hoc routing protocol. In our work, we will focus a modified version of AODV routing protocol, based on route discovery by utilizing Physical Layer information instead of the minimum hop count approach of the default distance vector algorithm. our research will also elaborates how the proposed model uses the received SINR to find its route. We will focus on parameters like response time, traffic throughput, packet loss, link stability, delay, optimal usage of battery resource to increase overall lifetime of a network. Read More...
|
Computer Engineering |
India |
2944-2947 |
727 |
Homomorphic based Secure Content Distribution In VANET
-Jigar R Amin ; Krunal J Panchal
Vehicular Ad-Hoc Network(VANET) commonly known as an Ad-Hoc on wheels, is a subclass of Mobile Ad-Hoc Network(MANET). Absence of fix infrastructure makes this network more dynamic and suitable for vehicular nodes. Vehicular communication is enabled by Ob-Board Unit (OBU) installed on each and every node. Security is a primary issue of life critical information flow in the network. Security can be achieved by making the data packet more complex to understand using conventional as well as new approaches of cryptography. By providing flexible security mechanism we can improve performance of the system in terms of end to end delay. Read More...
|
Computer engineering |
India |
2948-2952 |
728 |
Speech Augmentation using online Algorithms
-Bi Bi Ameena
Speech Augmentation aims to improve speech quality by using various techniques and algorithms . Minimising the intervening noise in a speech signal is a challenging task for many years. Compared to traditional unsupervised speech enhancement methods, e.g., Wiener filtering supervised approaches, such as algorithms based on hidden Markov models (HMM), lead to higher-quality enhanced speech signals. However, the main practical difficulty of these approaches is that for each noise type a model is required to be trained a priori. In this paper, we investigate a new class of supervised speech de noising algorithms using nonnegative matrix factorization (NMF). We propose a novel speech enhancement method that is based on a Bayesian formulation of NMF BNMF). To circumvent the mismatch problem between the training and testing stages, we propose two solutions. Firstly, HMM is used in combination with BNMF (BNMF-HMM) to derive a minimum mean square error (MMSE) estimator or the speech signal with no information about the underlying noise type. Secondly,a scheme is suggested to learn the required noise BNMF model online, which is then used to develop an unsupervised speech enhancement system.Extensive experiments are carried out to investigate the performance of the proposed methods under different conditions. Read More...
|
SPEECH PROCESSING |
India |
2953-2957 |
729 |
Direct Digital Synthesizer used in MRI Application
-Amey Satish Renge ; Rajesh Harsh; Tapas Bhuiya
In this paper DDS system is used to generate a radio frequency signal for MRI application. The MRI machine contains a magnetic field of 1.5T.For these MRI machine there is compulsions of generating of 63.87MHZ radio frequency signal. AD9914 is a DDS chip used for generating this radio frequency signal.ADUC7026 microcontroller controls the operation of DDS chip. The programmed code is written in Keil. For generating RF frequency signal this DDS chip is a suitable method. Read More...
|
Electronics Engineering |
India |
2958-2960 |
730 |
A Software Cost Estimation using Function Point Method
-Ashutosh Tiwari ; Er. A.K.Shukla
Numerous organizations around the globe have designed commercial as well as educational apps for online, the best known example of any hypermedia process. But acquiring good Net applications is actually expensive, mostly with regard to time and degree of difficulty for the authors. Our study tries to be able to predict the time and effort needed for the development of web pages of a certain category, here we have now restricted each of ourselves on the domain associated with news sites. Our document is suggesting a fairly easy method pertaining to efforts estimation of internet based projects. Software Cost Estimation (SCE) is often a process associated with predicting the actual efforts as well as cost with regard to money, schedule as well as staff for virtually any software process, Software price estimation is an old arts come with the beginning of computer industry in 1940s and contains been developed many times until forming function items by Albrecht with 1979.Previous scientific tests comparing the actual prediction exactness of hard work models developed using over the internet and single-company information sets are inconclusive. This Thesis as a result replicates some sort of previous study by analyzing how successful estimate work for net projects that participates in an individual company. The hard work estimates utilized in our analysis was obtained through effort estimation technique, namely Web case-Point Computation. Read More...
|
Computer Science Engineering (Software Engineering) |
India |
2961-2963 |
731 |
Designing a Low Power MAC Protocol for Wireless Sensor Network in NS2
-Neel G. Patel ; Ketan Goswami
In recent years, Wireless Sensor Networks (WSN) have attracted the researchers due to its wide applications. The advancements in WSN have enabled a wide range of environmental monitoring and object tracking system.WSN consists of small low cost sensor nodes and their transmission range, storage capabilities and energy resources are limited. This paper examines Particle Swarm Optimization algorithm (PSO) based routing in which we have taken energy efficiency as the main criteria for performing routing and deriving optimized path for data forwarding and processing to the base node. A sensor network is deployed over a region and the main task of such a network is to gather information from the node and transmit it to the base station for further processing. Therefore if the transmission range is long, then the energy dissipated will be more and if the range is short then energy will be saved. The PSO generates a path of routing by taking energy as fitness value to judge different path and to choose the best optimized path which consumes less energy as compared to other routing paths. The simulations are carried out in ns2 and are compared with the results of Genetic Algorithm (GA) showing that the results of PSO are better than the GA. [4] Read More...
|
Electronics and Communication Engineering |
India |
2964-2968 |
732 |
Object Removal by using Exemplar based Image Inpainting and Discrete Wavelet Transform
-Mohit Arunrao Adgokar ; Nikhil Chourasia; Nitin Jagtap
A new method for removing object, uses exemplar based image inpainting and discrete wavelet transforms, is proposed. Wavelet has been used as an image analysis tool because of its multi resolution and data separation features. The first image is projected onto the wavelet domain and scaling coefficients are revalued by using an exemplar based technique while doing this other wavelet sub band are simultaneously filled by exemplar patches using priority map of scaling coefficient. Inpainting is done at each level of wavelet transform. The inverse discrete wavelet transform is carried out of inpainted image up to finer resolution. All inpainted images are fused by averaging operator. This method gives better result compare to other methods, sharper and continuous edges are restored. Read More...
|
Electronic Engineering |
India |
2969-2971 |
733 |
Hosted Flexible Point & Click Designer with Google Analytics & Gateways
-Tapan Kumar Dakuya ; Sweta Kankumbkar
With our software users can edit, create and publish all kinds of contents of web including contact forms, surveys, customer testimonials, static pages, newsletters and others. Handy menu-builder makes the shopfront navigation clear and convenient to user’s web store visitors. Our software is the most appropriate cart solution for creating an ecommerce website of any size: from virtual shopping mart to a small web store. A readymade shopfront, support for many shipping and payment option, inventory control, unlimited products, promotional tools, and other ecommerce software. This ecommerce software gives user control over user’s products, fully customizable options to inventory tools and product rules. Make user’s products available wherever user’s customers are, including eBay and Facebook. Easily build an online store with point-and-click design tools, customizable CSS/HTML and themes. With coupon codes, discount, social media integration, an abandoned cart saver and an automatically customer lists generator, Application gives more marketing tools. Our search engine optimization (SEO) gives user higher search rankings which means more free traffic to user’s store. Our application helps in managing Website, Secure shopping cart, Domain name, Product catalog Email accounts, Marketing tools, Reporting, Payment gateway, and optimization. Read More...
|
computer engineering |
India |
2972-2974 |
734 |
Designing of RF Pulse Sequences for Magnetic Resonance Imaging System
-Bhaskar Narhari Dohare ; Rajesh Harsh; Dharmesh Verma
Magnetic Resonance Imaging (MRI) is a non invasive medical test which is used by radiologists to diagnose and treat medical conditions. Comprehensive images of the body part/tissue are produced using 1.5 Tesla strong magnetic field and radio frequency pulses. Magnetic Resonance Imaging is based on the principle of changing the magnetization property of the hydrogen atoms in human body by using RF fields. These RF fields are generated using a set of pulses called as pulse sequence. Design of these pulse sequences depend on the imaging application required. In this paper the design method of producing these pulse sequences is explained in detail. Pulse sequence is a sequence of temporal waveforms consisting of RF pulses, gradient (magnetic fields) waveforms and data acquisition intervals. Some of the commonly used pulse sequences are: Spin Echo (SE) sequence, Inversion Recovery (IR) sequence, Gradient Echo (GRE) sequence etc. Using these SE, IR, GRE pulse sequences we get different images like T1 weighted, T2 weighted, proton density (PD) weighted image. These images depend on Repetition Time (TR), Echo Time (TE) and Proton Density (PD) (1). The signal received from hydrogen proton is recorded and then K space is filled. By taking the Inverse Fourier Transform of K space data the image is reconstructed. Read More...
|
Electronics Engineering |
India |
2975-2977 |
735 |
Social Media Analysis using R
-Sikha Moni Deka ; Prof. Sweta Kankumbkar
The ability to utilize knowledge} and data from social media sources has become associate additional and additional valuable artefact for informing business, marketing, and different entrepreneurial decisions. The tools and resources accessible to access and analyze such information sources have begun to grow at a speedy rate, but many of these solutions have either too broad or restricted scan in achieving specific goals. A popular and general strategy simply aggregates, organizes, and counts the amount of “mentions†of a nominal topic or subject inside the information. the employment of sentiment analysis has in addition become a daily approach, whereby the “feeling†some specific topic is inferred from a corpus of social media text. Whereas these solutions have self-addressed variety of the supply issues in accessing, method and aggregating the social media information, the analytical aspects area unit restricted. The R computer code provides the power to transfer Twitter connected knowledge, and to be able to plot and analyse it. one among the additional helpful downloadable packages is twitteR. This package permits users to extract info on followers, those following, posts, hash tags, etc. It may be integrated with alternative packages to permit for knowledge image and analysis Read More...
|
IT |
India |
2978-2981 |
736 |
Heat Transfer Characteristics using Inserts in Tubes: A Review
-Meenakshi Sharma ; Syed Sharin
Heat transfer is a discipline of thermal engineering that concerns the generation, use, conversion, and exchange of thermal energy and heat between physical systems. Heat transfer augmentation techniques refer to different methods used to increase rate of heat transfer without affecting much the overall performance of the system. Experiments were carried out for plain tube with/without wavy twisted tape insert at constant wall heat flux and different mass flow rates. The objective of this Project work is to analyses the heat transfer coefficient by using conical inserts and helical inserts with different arrangement in tubes. Heat transfer augmentation techniques are commonly used in areas such as process industries, heating and cooling in evaporators, thermal power plants, air-conditioning equipment, refrigerators, radiators for space vehicles, automobiles, etc. this paper contains literature survey which provides enhancement techniques in heat transfer using inserts. Read More...
|
Mechanical Engineering |
India |
2982-2985 |
737 |
Design Modification of Components of Head Assembly of Syrup Filling Machine- A Review
-Thaker Hardkumar ; P.M.Agrawal; Dr.P.M George
This paper reviews Literature survey is carried out to find the methodology and various researches have been done so far in the topic. Here due to interference problem in head assembly of syrup filling machine. hence the rework is must to perform on the particular component that increases the total cost and manufacturing time. Generally interferences and clearances type design requirements are control by design tolerances and also on manufacturing process tolerances .hence tolerance play very important role in design of product. In which little investment gives significant manufacturing cost savings. the currently available tolerance allocation tools and identifies their shortcomings which are then used to create a better tool suitable for industrial applications. The objective is to examine the optimal tolerance allocation by considering both tolerance cost and quality loss so that the total assembly cost is minimized. Read More...
|
Mechanical Engineering |
India |
2986-2989 |
738 |
Advanced Vehicle Tracking System with Display Unit
-Indhumathi R ; Murugesan K.S
In mobile communication system, GSM and GPS plays a major role. Global Positioning System (GPS) is used for implementing vehicle position tracking and Global System for Mobile Communication (GSM) is used for transmitting information about the vehicle’s position between user and the vehicle. The vehicle tracking system consists of two modules namely: vehicle unit and receiver unit. The vehicle unit consists of GPS receiver to receive the vehicle position from GPS satellite and also provides LCD to display the information. A receiver unit receives information about vehicle’s position and also transmits messages to the vehicle unit. Here mobile phone acts as a receiver unit. These modules are implemented using code vision AVR compiler. This provides higher efficiency compared to other existing techniques. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
2990-2993 |
739 |
Analysis of Lossy Image Compression using CCSDS Standard Algorithm using Various Quantization Factor
-Dhara Nitinkumar Shah ; S.K.Hadia
Image data compression is process to remove the redundant and irrelevant information from the image so that only essential information can be represented using less number of bits to reduce the storage size, transmission bandwidth and transmission time requirements. With Increase in Resolution of images and size there is continuous need of powerful compression techniques that provide higher compression ratio with higher performance in terms of better Peak signal to Noise Ratio and low Maximum Absolute Error ( MAE) . Consultative Committee for Space Data System (CCSDS) which is consortium of leading space agencies has defined such powerful compression standard called CCSDS “Image Data Compressionâ€. It provides performance comparable to leading compression algorithms like JPEG2000 /SPIHT etc. This image compression standard is based on Discrete Wavelet Transform (DWT), low frequency DWT coefficient (DC-coefficient) quantization & Golomb-Rice coding and bit plane encoding of Higher frequency (AC) coefficients An outcome is produced for encoding performed to the low frequency substance of the DWT translated image because the human visual system is more delicate to the low frequency segment and encoding is carried out just on low frequency contains that gives lossy compression but accomplished high compression ratio. In this paper analyse the image with different quntization factor and shows that how many quntization bits are possible in image of low frequncy co-efficients and image visulization is available after reconstructing of image. Here in different images cheak with different quntization factor and cheak their compression parameter and image visulization. Read More...
|
Image Processing |
India |
2994-2998 |
740 |
Design of 90W CCM Multi Output Flyback Converter
-Thejaswini ; Sudhakar Rao P.; Venugopal B
This paper describes design of Multi output flyback converter operating in continuous conduction mode (CCM). The proposed converter generates five outputs with a single input source. This paper covers operation of flyback converter with wide input range of (16 V- 29 V). Converter along with power circuit, control circuit, input filter and snubber circuit is discussed in this paper. The power circuit is energized from a dc input voltage and flyback converter with switching element MOSFET is switched ON and OFF using PWM controller UC28025 with switching frequency of 100 kHz. Simulation is carried out using ORCAD and testing results are tabulated in this paper. Read More...
|
Electrical Engineering |
India |
2999-3002 |
741 |
Image Classification by Spatial Pooling of Surf
-Kalpana.S ; Sivanandham.N
Today, there are many multimedia applications based on image understanding and processing, such as image retrieval, image classification, scene understanding, and so on. In image classification tasks, one of the most successful algorithms is the Bag-of-Features(BOF) model. Although the BOF model has many advantages, such as simplicity, generality, and scalability, it still suffers from several drawbacks, including the limited semantic description of local descriptors, lack of robust structures upon single visual words, and missing of efficient spatial weighting. To address these problems, the traditional BOF model is expanded on three aspects. First, a new scheme for combining texture and edge-based local features together at the descriptor extraction level. Next, to build geometric visual phrases to model spatial context upon complementary features for midlevel image representation. Finally, based on a smoothed edge map, a simple and effective spatial weighting scheme is performed to count occurrences of gradient orientation in localized portions of an image. Then test the framework by comparing the image with Fused Descriptors, which has the combination of SIFT, Edge-SIFT and Histogram of Oriented Gradient (HOG) descriptors for image classification and retrieval. Read More...
|
information and communication |
India |
3003-3010 |
742 |
Content Based Image Retrieval: Extract Color and Texture Features Separately
-Divya Modi ; Rahul G. Patel
Content-based image retrieval technique is an active research issue that had been famous from 1990s.With dramatic rise in usage of image data demands accurate results with lower computational time. In this paper CBIR extracts the color and texture features separately. By using HSV (Hue, Saturation, and Value) color space, first quantifying the color space in non-equal intervals, and constructing one dimension feature vector. Representing the color feature with histogram and similarity measures between query images. Texture feature is extracted by using wavelet transform technique. Euclidean distance classifier has been used for the similarity/distance measures. Read More...
|
Image Processing |
India |
3011-3014 |
743 |
Improvement of Operational Efficiency by Eliminating Non Value Added Activities using Lean Techniques
-Namitha Parthasarathi ; Mayur Kumtakar; Lavanya B; Jyothi E; Radha Halagani
Many enterprises in India have deployed lean production in consideration of its great success in other countries, but many of them failed to realize their original targets because they began to deploy lean production from tool level and haven’t understood the actual value stream of their business, which is essential for an enterprise to implement lean production and keep improving. The purpose of this study is to follow the value stream, walk the flow and determine the value adding and non-value adding process. This will help eliminate roots of wastes, rearrange overall value stream better increase the competitive ability and organizational efficiency. Read More...
|
Industrial Engineering and Management |
India |
3015-3017 |
744 |
Improving the Floor Design of Lock Gate at New Port Bhavnagar
-Rajesh K. Devmurari ; Prof. H M Gandhi; Prof. P S Ramanuj; Prof. M K Chudasama; Prof. Nirav Accharya
Bhavnagar port is located about 10 km away from the city. It is located on the creek, about on creek about 3 km inside the sea. To say in brief, a basin of about 100000 sqmt is dug out and a channel is connecting the basin and sea. The tide difference at Bhavnagar port is maximum i.e about 10 m. The structure was designed in pre independence era and was completed in sixties’. The core bore data were collected in 1930. The water from the sea side enters in the basin by creek connecting it. During the high tide, water is basin is filled with sea water. As there is wide difference in the tide water returns back into the sea, also the water coming from sea side brings with it silt which deposited in the basin. To avoid the problem of siltation and to maintain the water levelinside the basin water flowing back into the sea was required to be held. To make this possible a lockgate was proposed on the creek so that by closing the gate water can be held inside the basin for the required time. To stop the siltation and seepage a flaking dam and sheet pile was inserted inside below the sill beam of the lock gate respectively. ( Fig I ) Read More...
|
Civil Engineering |
India |
3018-3019 |
745 |
Prevention Technique to Mitigate DDoS attack in Cloud Computing Environment
-Mamtesh
Cloud computing is an emerging trend in the field of IT providing scalable and flexible services to the end users on demand. Among the numerous attacks that can target the cloud environment, DoS or DDoS attacks can cause a major breach in security. This paper discusses the various DDoS attacks and prevention techniques of these attacks. DDoS attack became a major threat for cloud environment. Significant problem of DDoS attacks is that they are difficult to detect. The effects of various attacks can shut the organization off from network. It prevents the users from using cloud infrastructure services and this kind of attack can be made through legitimate or illegitimate cloud computing users. Read More...
|
Computer Science and Enginering |
India |
3020-3023 |
746 |
Product Prototype Creator and Presenter
-Mujahid Pasha I.P ; J.C.Achutha
Our application is very useful for designers and developers so that complex applications can be designed with ease; our application gives inbuilt components so that prototype can be created before we can code the actual application. Complex behavior can be mixed together. Application provides a working canvas where with the help grouped components the user can design the prototypes. User can easily rearrange the components on the canvas. Application provides drag and drop option, alignment option, resize editing etc. user can arrange the pages. Different icon and image management also give the user more powerful option to design. Duplication can be avoided with master, pages can be linked also. Application helps to design interface and modification more easily. Simulation can created for different pages, any interaction and combination can be set. Application provides different types of export and sharing options also. Application helps in extend the library; even custom component can be designed for later use. Read More...
|
COMPUTER SCIENCE |
India |
3024-3026 |
747 |
Research Paper on Design Modification and Analysis of Automobile Wheel Rim using Finite Element Analysis
-Aman Pandya ; Smit Thakkar; Antriksh V Bhatt; Amit Anakia
Importance of wheel in the automobile is obvious. The vehicle may be towed without the engine but at the same time even that is also not possible without the wheels, the wheels along the tire has to carry the vehicle load, provide cushioning effect and cope with the steering control. Generally wheel spokes are the supports consisting of a radial member of a wheel joining the hub to the rim. Spokes make vehicles look great but at the same time they require attention in maintenance. To perform their functions best, the spokes must be kept under the right amount of tension. If a spoke does break, the wheel generally becomes instantly unbalanced also the hub may break. The purpose of the car wheel rim provides a firm base on which to fit the tire. The motorcycle riders are subjected to extreme vibrations due to the vibrations of its engine, improper structural design of the motorcycle and the bad road conditions. So in this project the attempt has been made to reduce the vibrations of vehicle by providing springs instead of the spokes at the wheel. The springs will work as suspension members at wheels as well as they will provide proper strength that is adequate to proper operation of the wheel. The CAD model of a motor cycle will be made in solidworks and later it is analyzed in ANSYS 14.5. The results of suspension of ordinary wheel rim and spring based rim will be compared. Read More...
|
Mechanical Engineering |
India |
3027-3030 |
748 |
Automatic Medical Disease Treatment System using Data Mining
-Prashanth M.C ; Mridula Shukla
In our project the system is identifying consistent information in the medical field places as building blocks of a healthcare system that is updated with all the latest discoveries. Using tools such as NLP, ML techniques. This research, mainly focus on the type of diseases and treatment information by entering the symptoms and the relation present between these two entities. The main objective of this research is to categorize name of the disease with the symptoms specified and extract it from the database and get the relation that exists between the Disease-Treatment and classify the information into whether it is curable, preventable and any side effect to the user. Read More...
|
Computer Engineering |
India |
3031-3032 |
749 |
Modernization in Agriculture using GSM and XBEE Technology
-Divya S V ; Meghashree A C
In the present agricultural scenario creating the balance between the increasing population and decreasing food availability is the biggest challenge, so the traditional agricultural methods has to be replaced by the modern agricultural methods to eliminate manual mistakes in supply of fertilizers and over watering. The goal is to provide long term sustainable solution for automation of agriculture with real time intelligence provided by the Irrigation Data centre(IDC). The IDC is a data base with access to the real time information related to agriculture. This paper describes the automated irrigation system to make effective utilization of water resources and fertilizers by monitoring crop growth with the implementation of Sensor Node(SN) consisting of soil moisture sensor, IR transceiver, humidity and temperature sensor in the field. The signals from the sensors are coordinated by the processor of the XBee and transmitted to irrigation control centre(ICC) through XBee wireless radio communication module. The optimized usage of water for an agriculture crops has been achieved in the ICC successfully. Read More...
|
Electronics and communication |
India |
3033-3037 |
750 |
Green House Monitoring and Automation using Wireless Sensor Network
-Keerthi B C ; Mr. C. N. Chinnaswamy ; Dr. T.H.Sreenivas
Wireless sensor network (WSN) has a wide range of applications. WSN plays major role ad gains attention in recent years. Using WSNs it is able to monitor the environment where the human reach is not possible. WSNs are also gaining importance in agriculture area by controlling the climatic conditions of plant growth in green house. The paper explains about the design and implementation of WSNs for greenhouse to measure and control the climatic conditions of the plant growing environment. The developed system measures and controls the climatic parameters (temperature, humidity of air, sun light and soil moisture) and helps to improve the production in green house. Several numbers of sensors and actuators are installed and they are connected in the green house. Using Global System for Mobile communication (GSM) technology the climatic condition measurement information is sent to farmers mobile through Short Message Service (SMS). The system measures the climatic conditions using the sensors and the variations of the climate is controlled and monitored by using actuators. The proposed system is easy to implement and also cost effective. Read More...
|
Computer Network Engineering |
India |
3038-3041 |