No. |
Title and Author |
Area |
Country |
Page |
801 |
Boost Derived Hybrid Converter for Simultaneous AC and DC Loads
-B.Vinodhini ; S.Subalakshmi
This paper proposes a family of hybrid converter topologies which can supply simultaneous dc and ac loads from a single dc input. These topologies are realized by replacing the controlled switch of single-switch boost converters with a voltage-source-inverter bridge network. The resulting hybrid converters require lesser number of switches to provide dc and ac outputs with an increased reliability. Such multioutput converters with better power processing density and reliability can be well suited for systems with simultaneous dc and ac loads, e.g., nanogrid in residential applications. The proposed converter, studied in this paper, is called boost-derived hybrid converter (BDHC) as it is obtained from the conventional boost topology. A suitable pulse width modulation (PWM) control strategy, based upon SVPWM, is described. The dsPIC30f4011 controller was used to implement this hybrid converter topology. Read More...
|
power electronics and drives |
India |
3233-3236 |
802 |
Low Area & Power Decimal Addition with Improved Speed using LING Adder Architecture
-T.Sindhu ; P.Brindha
Adder plays a major role in electronics, not only in computers but also in many types of digital systems in which the numeric data are processed. In several applications like monetary and business computation requires decimal arithmetic operator to directly process decimal data for accurate computations and hence adder must perform decimal addition. Faster decimal addition can be performed with an embedded world-wide binary adder, leading to considerable hardware sharing with binary input unit. Carry-select technique for the decimal adders can be improved by computing pairs of corrective carry out bits for all decimal positions in parallel. This was performed by the quaternary parallel prefix network and the selection is based on corresponding positional carry-in bits. Carry select sum and Carry select correction block with reduced area than the previous structures is used in this fused binary/decimal adder. Area improvement will reduce the cost and power consumption of the system. Ling adder structure is used in the prefix network for speed improvement. Read More...
|
Electronics and communication |
India |
3237-3240 |
803 |
Software Project Planner and Controller
-Vinutha S K ; Nandini B M
The software industry has always been challenged to deliver quality products to the market at cheaper price, faster pace and better quality year after year. One recent trend to address this challenge has been to build products using agile methodologies. Implementation of agile methodologies require the teams to have the right tools, processes and metrics to measure the success of the processes. The software components of this project are an agile project tracking tool, a process transformation tool and a reporting tool. Project tracking tool will be monitoring the objectives in the various projects and helping company to achieve the target of on time delivery. The process transformation tool will be designed and developed to transform the high level Companywide metrics into team level metrics which will be helping us to follow the process and its measures for a quality end product. This tool will manage to ease the access to various portals & tools and collect required metrics which are project related by gathering those necessary metrics and aggregating them via this tool. The reporting tool will be a breakthrough to track the effort of the employees. Employees can view where and when they have given their efforts in a simpler way using this reporting tool rather than wasting time to count it every week. The tool will also be helpful to the managers to track the effort count and to know which individual is working on which phase of any project. Read More...
|
COMPUTER NETWORK ENGINEERING |
India |
3241-3243 |
804 |
Tamper Resistance Issues in Security Data Mining
-Nawaz Aslam ; Mukundkumar Jha; Deepak Kushwaha; Amarjeet Singh Yumnam
Security in data mining, manifestation of countermeasure is the utilization of vast scale data or information analytics to alterably detect a small number of adversaries which are gradually changing. It includes data or information and outcomes related safeguards; and is pertinent over many different domains such as financially, protection, and health. With reference towards security in data mining, there are particular and general issues, however the key discussion and contribution of the paper is tamper resistance. Tamper resistance addresses most sorts of adversaries and changes it to more difficult for an unknown to control or dodge security information mining; and comprises of frequent data or information, specially detection algorithms, and security and confidentiality saving outcomes. In this way, organizations involving security information mining can made better accomplish accuracy for associations, protection for people in the information and confidentiality between associations or organisations which shares the results. Read More...
|
COMPUTER SCIENCE |
India |
3244-3247 |
805 |
Automotive Inter ECU Communication
-Reshimabai ; H.D. Phaneendra
Automobiles are no longer just mechanical devices. Today’s automobiles contain a number of different electronic components networked together that as a whole are responsible for monitoring and controlling the state of the vehicle. Each component, from the Anti-Lock Brake module to the Instrument Cluster to the Telemetric module, can communicate with neighboring components. Vehicle contains many ECU’s which controls actuators and sensors in the vehicle. Communication between ECU’s is a main factor which decides performance of the system. Read More...
|
Automotive Engineering |
India |
3248-3249 |
806 |
Assessment of Ground Water Hazard Vulnerability of Jamnagar Area, Gujarat, India, using DRASTIC Method and GIS Techniques
-Shah Hemangi N. ; Prof.Neha M Joshipura; Dr. Indra Prakash; Prof.Vijay Chitariya
Jamnagar district is a coastal district of Gujarat. Groundwater hazards identified in the area are inherent salinity of rocks, sea water ingression and chemical pollution of groundwater. Four talukas namely Lalpur, khambhaliya, Bhanvad and kalyanpur of the Jamnagar district have been selected for the ground water vulnerability study using Remote Sensing and GIS techniques. DRASTIC method that is Depth to water table, Net recharge, Aquifer media, Soil media, Topography, Impact of Vadose zone and Hydraulic conductivity (DRASTIC) have been considered and evaluated for assessing ground water hazard vulnerable zones of the study area. Various thematic maps have been prepared and integrated with the geohydrological data in the DRASTIC model for the development of Ground water vulnerability Index Map in GIS environment. Based on Drastic Index, study area has been divided into three ground water vulnerability zones that is Low (<100), Medium (100-140) and High (>140). It indicate that 85.31% area is highly vulnerable, 11.25% medium and 3% low. These classes represent the relative potential of contamination of ground water within the study area. Ground water vulnerability map will help the planner in decision making for the prevention of contamination and development of systematic groundwater management plan. Read More...
|
Civil Engineering |
India |
3250-3255 |
807 |
Design and Simulation of Optimized Color Interpolation Processor for Image and Video Application
-Rashmi Betina ; Naveen Kumar G. N
In this project, the design of an optimized structural based interpolation processor is proposed. This proposed system provides the block level design in MATLAB Simulink® workspace. This block level design reduces the complexity of design. The Verilog code is generated using the Xilinx system generator automatically based on the design in the MATLAB Simulink® workspace which reduces the human errors. The architecture of the proposed system is highly efficient. The chip area and the power consumption of the design are highly optimized in the proposed system. The number of gate counts and the design utilities are highly reduced. Read More...
|
Electronics and communication Engineering |
India |
3256-3260 |
808 |
VLSI Implementation of 64 Bit PCS Generator using Non Linear Feedback Shift Register in Communication Systems
-Sujatha ; Shailee.S
Spread Spectrum is wireless communication in which the baseband data is spread over the entire available bandwidth. In the project, data spread is done by Pseudo Chaotic Sequences (PCS). Spread Spectrum is mainly used to overcome the interference problems associated with data transfer systems and to deliver a heightened secure transmission of data. In the project, we specify the design and implementation of Direct Sequence Spread Spectrum (DSSS) system with PCS generator. The prototype is generation of 64-bit Chaotic sequences and implementing DSSS system with generated sequences. The length of spreading sequences is extended and the auto correlation and cross correlation properties are verified for the generated sequences. The low cross correlation value reveals that performance of DSSS system with Chaotic sequences is comparatively better than conventional PN sequences. Read More...
|
Electronics and Communication Engineering |
India |
3261-3266 |
809 |
Feature Extraction from Mammograms of Breast Cancer using Automatic Thresholding
-Hiral Pokar ; Prof. Poorvi H. Patel
Breast cancer detection is still complex and challenging problem. Diagnosis of cancer tissues in mammograms is a time consuming task even for highly skilled radiologists as it contains low signal to noise ratio and a complicated structured background. Therefore, in digital mammogram there is still a need to enhance imaging, where enhancement in medical imaging is the use of computers to make image clearer. Studies show that relying on pure naked-eye observation of experts to detect such diseases can be prohibitively slow and inaccurate in some cases. Providing automatic, fast, and accurate image-processing-and artificial Intelligence-based solutions for that task can be of great realistic significance. This paper discusses about different techniques used to scans the whole mammogram and performs filtering, segmentation, features extraction. Read More...
|
Image Processing |
India |
3267-3271 |
810 |
CFD Investigation of Heat Transfer Enhancement in Flat Plate Solar Collector using Various Cross Sectional Inserts
-A.V.T.Shubhash ; S.Karthick; S.Poornakumar; R.Vasanthakumar; Dr. P.Navaneethakrishnan
The performance of solar water heater can be improved to perform a certain heat transfer duty by heat transfer enhancement techniques. In general, these techniques can be divided into two groups: active and passive techniques. The active techniques require external forces, e.g. electric field, acoustic or surface vibration, etc. The passive techniques require fluid additives or special surface geometries. Curved tapes have been used as one of the passive heat transfer enhancement techniques and are the most widely used techniques in several heat transfer applications. The main categories of heat transfer augmentation involves insetting curved tapes, helically coiled tapes, spirally coiled rods, other coiled tubes and also using fins are studied and analyzed to determine the optimum technique for a solar water heater by improving the convective heat transfer between the circular pipe and water medium. Simulations were carried out using commercial CFD software ANSYS FLUENT 14.0. Read More...
|
Mechanical Engineering |
India |
3272-3275 |
811 |
Dispersion Compensation in Optical Fiber Communication using Fiber Bragg Gratings
-Ankit Tyagi ; Aditya Prakash Kulshrestha; Dr.Amit Kumar Garg
Chromatic dispersion is a critical factor that limits the quality of transmitted optical signal in high speed fiber optic communication systems. Chromatic dispersion occurs due to the propagation delay spread of different spectral components of the transmitted signal. This leads to the pulse broadening of transmitted signal. In order to operate the fiber optic communication system with a sufficiently low bit error rate and to minimize the performance degradation caused by pulse distortion and broadening, dispersion compensation is needed. The purpose of this article is to compensate the chromatic dispersion using Fiber Bragg grating. Simulation results will be obtained using OPTSIM software version 5.4. Effect of chromatic dispersion in an optical fiber link was analyzed. Simulation using Fiber Bragg grating by varying its grating period and linear chirp coefficient was obtained. Read More...
|
optical communication engineering |
India |
3276-3278 |
812 |
Ultra Wide Band (UWB) Radio over Fiber (ROF) using Directly Modulated VCSELS
-Aditya Prakash Kulshreshtha ; Ankit Tyagi; Dr.Amit Kumar Garg
The UWB radio over optical fiber technology (UWB RoF) is a novel technology for the transmission of UWB signals by using an optical carrier propagating through an optical fiber. In this approach, the UWB RF signal itself is superimposed on the optical CW carrier. This strategy makes the conversion process transparent to the UWB's modulation method, and also transparency feature allows avoiding the high costs of additional electronic components required for synchronization and other processes. RoF has an ability to carry the signal several ten of kilometres but this transmission is limited by several optical impairment. In this paper , comparison between the Q-factor of transmitted signal before passing the filter and after passing the filter has been focused. Read More...
|
optical communication engineering |
India |
3279-3280 |
813 |
Malware Detection Framework and Evidence Collection in Wireless Mobile Network Devices
-C.N.Mani ; S.Hemalatha
Contact arrangements that prop both voice and data services have come to be omnipresent and indispensable in people’s daily lives. Calculating settings on cellphones, exceptionally smartphones, are becoming extra open and general-purpose, therefore they additionally come to be appealing targets of malware. Cellphone malware not merely reasons privacy leakage, supplementary prices, and depletion of battery domination, but additionally generates malicious traffic and drains down mobile web and ability capacity. exceptional behaviors of requests and the working users on input and output constrained mechanisms, and leverages a Hidden Markov Ideal (HMM) to discover request and user behaviours from two main aspects: procedure state transitions and user operational patterns. The counseled framework realizes a Host-based Malware Detection Arrangement that unceasingly monitors assorted features and events obtained from the mobile mechanism and next applies Contraption Discovering anomaly detectors to categorize the amassed data as normal (benign) or atypical (malicious). Read More...
|
Network security |
India |
3281-3283 |
814 |
Review on Latent Fingerprint Recognition Technique
-Yogiraj Bhale ; Somesh Dewangan
Fingerprints are the oldest and most extensively used form of biometric recognition. A fingerprint is that the pattern of ridges and valleys on the surface of the tip. The uniqueness of a fingerprint is solely determined by the native ridge characteristics and their relationships. The most vital ridge characteristics, known as trivia, are ridge ending and ridge bifurcation. The performance of a fingerprint recognition system is possessed with the collection of fingerprint pictures. This poses a tangle for the fingerprint image as the image quality is usually low. As a result, fingerprint structures like trivialities and ridges might not be clearly visible to the human eye of a fingerprint examiner, nor to the machine eye of automatic matching systems. This paper deals with the problem of choice of associate optimum rule for fingerprint matching so as to style a system that matches needed specifications in performance and accuracy. This paper provides varieties of fingerprint recognition techniques like Spectral Image Validation and Verification (SIVV), Fuzzy Neuro-genetic approach, cascaded scheme, alignment-based elastic matching algorithm which increases the recognition rate and reduce the processing time. Read More...
|
Computer Science & Engineering |
India |
3284-3289 |
815 |
Secure File Level Deduplication for Cloud Data Storage using Content Hash Keying
-Tatikonda Sairam ; Ra.K.Saravanan Guru; S.Vijay Kumar
Data Deduplication is the keynote technique used in the cloud storage. It is used to avoid the repetition of data and to save the wastage of bandwidth and storage space across the cloud environment. At the time of performing Deduplication, Security is the major concern. Hence we are implementing the CHSK (Content Hash Keying Technique) to provide the confidentiality of data at deduplication. This is the best method to provide security for the successful deduplication. This is known as Hybrid Architecture as this is summation of the both private and public cloud. Private cloud is used to provide the privilege keys and public cloud is used to generate the file token to the user. This is absolutely different from the existing traditional systems. Hence we are providing OWD (Owner of Data) protocol for Authorized Deduplication. Read More...
|
CLOUD COMPUTING IN COMPUTER SCIENCE ENGINEERING |
India |
3290-3294 |
816 |
Digital Image Watermarking Resilient to Local Desynchronization Attacks
-Mahesh R. Shimpi ; Dr. S. V. Gumaste
New opportunities have been explored in social, business, entertainment and scientific fields due to the development of high speed computer networks and that of, internet in particular. Absurdly, the cause for the development is apprehensive because of the use of digital formatted data. Digital media has several advantages over analog media such as easy editing high fidelity copying and high quality. Software products which hide information within digital audio, images and video files have been introduced to address these growing concerns. Digital watermarking is one of the data hiding techniques. The watermarking is the process of embedding a signal in to other signal robustly and invisibly at the same time, the embedded signal is called watermark and the other signal is called cover or host signal. In this paper we are presents a brief overview of digital image watermarking techniques in time and transform domain, advantages of transform (frequency) domain over time domain techniques and proposed a watermarking algorithm in transform domain by using the discrete wavelet transform. Read More...
|
Computer Engineering |
India |
3295-3299 |
817 |
SPSR: A Lightweight Secure Proactive Source Routing Protocol for Mobile Ad-Hoc Networks
-Lavanya.R ; Dr.M.A.Goutham
Opportunistic forwarding, by which data is randomly relayed to a neighbor based on local network information, is a fault tolerant distributed algorithm particularly useful for challenged ad-hoc and sensor networks. Opportunistic data forwarding has drawn much attention in the research community of multi-hop wireless networking and more researches are conducted for stationary wireless networks. The reason why opportunistic data forwarding is not utilized in Mobile ad-hoc networks is lack of an efficient lightweight secure proactive source routing (SPSR) scheme with strong source routing capability. A lightweight secure proactive source routing (SPSR) protocol is proposed where SPSR protocol has much smaller overhead, less end to end delay and energy consumption and increase in throughput and packet delivery ratio (PDR). The SPSR protocol is compared with the traditional OLSR protocol for the performance analysis. The tests using computer simulation are conducted in Network simulator version-2 (NS-2) and the appropriate graph is shown. Read More...
|
Electronics and communication Engineering |
India |
3300-3303 |
818 |
Efï¬cient Interleaver Design for MIMO-OFDM based Communication Systems on FPGA
-Shridevi Kenganal ; Dr.M.A.Goutham
A memory-efï¬cient and faster interleaver implementation technique for MIMO-OFDM communication systems on FPGA. The IEEE 802.16 standard is used as a reference for simulation, implementation, and analysis. The main aim is to design interleaver for various modulation schemes like BPSK,QPSK,16QAM,64 QAM. The interleaver plays a important role in improving performance of EFC codes.The interleaver design is divided in to two parts as address generator and interleaver memory.The finite state machine baesd interleaver shows the better performance like maximum frequency and FPGA resources utilization as compared previous FPGA techniques. Interleaver is implemented using xilinix ISE and simulation results are presented The hardware model is implemented on FPGA kit spratan 3. Read More...
|
Electronics and communication |
India |
3304-3306 |
819 |
Estimation of Momentum for Moving Object using Image Morphology
-Supriya Bagoji ; Prof. R.R.Maggavi
The main aim of the paper is to count the number of moving vehicles and to estimate the speed of each moving vehicle in a traffic video. In recent years moving vehicle detection, tracking, counting number of vehicles and speed estimation of each moving vehicle has become very important to monitor and control the increasing traffic congestion. Increasing traffic causes traffic jam , this can be controlled by counting the number of vehicles in a particular area and allowing limited number of vehicles at a time in that area. By estimating speed of each moving vehicle, the number of accidents can be reduced by detecting the vehicle moving with high speed. Background subtraction and frame differencing algorithms are used to detect and track the moving vehicles. Further estimating the displacement of vehicle from one frame to next frame in a video sequence and the time taken in accordance with the frame rate, the speed of each moving vehicle in the video can be calculated and the number of moving vehicles is counted. Read More...
|
Electronics and Communication Engineering |
India |
3307-3309 |
820 |
Advanced Amalgamation Technique for Congestion Control in WSN with Improved Efficiency
-Manohar Chavan ; Prof. Tushar Bedke
As applications in Wireless Sensor Networks (WSNs) are evolving, congestion control remains an open and, in several cases, a critical problem. A lot of research has been performed on this issue and two general approaches seem to be the most prominent for its solution: traffic control and resource control. Each of these two methods present specific advantages and disadvantages under different scenarios. In this paper we present HRTC, Efficient HRTC the basic design of HRTC is based on the fact that the conditions in WSNs are possible to change then and there. It is possible for a densely deployed network to initially exist, but after some time this to transform into a network full of routing holes or disconnected parts either due to network issues, like heavy traffic. In either case, the target of this work is to find a solution that maximizes the efficiency of the network in terms of throughput and lifetime, using effectively the available network resources. The application this congestion control methods is to reduce the congestion completely. Hence, we propose a hybrid algorithm that aims to exhibit only the positive advantage of both individual methods. In this algorithm, when a node faces congestion, it attempts to inform the source node from which it receives packets with the lowest data rate, to suppress its data rate. To achieve this, it transmits a BPM to the source. We choose to limit the transmission of the source node with the lowest data rate because we prefer to keep serving the nodes with higher data rate(s) in order to affect throughput the least. When BPM receives the source node it lower its data rate. In this paper there are three algorithms called traffic control (TC), resource control (RC) and advanced hybrid technique. These three parameters/ algorithms are used to control congestion in a wireless sensor networks. Read More...
|
Electronics and Communication Engineering |
India |
3310-3313 |
821 |
Broadcasting in Multihop Cognitive Radio Ad Hoc Networks using NCPR under Blind Information
-M.Sivaranjani ; S.Hemalatha
In wireless ad hoc networks broadcasting is a fundamental operation where control information is usually propagated as broadcasts for the realization of most networking protocols. In traditional ad hoc networks, since the spectrum availability is uniform, broadcasts are delivered via a common channel which can be heard by all users in a network. However, in cognitive radio (CR) ad hoc networks, unlicensed users may observe spectrum availability, which is unknown to other unlicensed user before the control information was broadcast. Thus it is extremely challenging that broadcasts can be successfully conducted without knowing the spectrum availability information in advance. In this paper, the performance of a neighbour coverage based broadcast protocol is proposed using different QoS metrics such as packet delivery ratio, end -to-end delay, packet loss probability and network control overhead. Read More...
|
wireless networks |
India |
3314-3317 |
822 |
Recognition of Indian Currency Denomination for Visually Impaired People
-Amoolya M S ; Harish M S
Currency denomination recognition is one of the basic tasks in our day to day transactions. However, it is difficult for blind people to identify the currency. Therefore automated recognition of currency denomination system would be of great significance to relieve their agony. In this paper a robust framework for Indian currency note recognition which would effectively recognize the various Indian currency denominations (10, 20, 50, 100, 500, 1000) thus benefiting the visually impaired and also counterfeit detection of currency. Here firstly preprocess the image of currency notes acquired by a digital camera and then extract and analyze three unique features of each denomination while considering complexities caused by degradation of color and dimension of notes due to wear and tear and handling. Based on these unique and discriminating features, classify and recognize of these currency notes can be done. The experimentation results showed good classification results and the success-rate of the counterfeit detection with properly captured image is 100%. An audio feedback is given for every test case scenarios. Read More...
|
ELECTRONICS AND COMMUNICATION ENGINEERING |
India |
3318-3320 |
823 |
Comparison between Simple Patch, Slotted Patch, Slotted Patch with DGS
-Balvinder Kumar ; Vikas; Charanjeet Singh
In today life everybody wants highest profit at low cost. In the same way Antenna design having low cost and small size to be need. The slots are used here helps to increase the BW of an Antenna. The Antenna has multiband frequency operation. The comparison between simple rectangle patch, slotted patch and slotted patch with DGS are discussed on the bases of their return loss, VSWR, axial ratio, radiation pattern which are simulated on HFSS v13. The co-axial feed is used in all design. The RT/Duroid 5870 material with dielectric constant 2.33 is used for substrate. Read More...
|
antenna |
India |
3321-3325 |
824 |
Speaker Identification Based on Voice Samples using MFCC and GMM
-Avinash Kumar ; Ankit Raj; Avantika Shee; Kundan Kumar; Nagarathna R
Speaker Identification is the task of claiming a speaker’s identity based on the characteristics contained in the voice signal. The identification is done by dividing the task in two phases named Feature Extraction and Feature Identification. Various methods are available for extraction of a voice signal such as Mel Frequency Cepstral Coefficients (MFCCs), Linear Frequency Cepstral Coefficients (LFCCs), Linear Predictive Cepstral Coefficients (LPCC), Perceptual Linear Prediction Cepstral Coefficients (PLPCCs) etc. Similarly, modern methods available for identification include Vector Quantization (VQ), Hidden Markov Model (HMM), Gaussian Mixture Models (GMM) etc.In this paper, based on our survey on the grounds of noise reduction, computational time, accuracy and efficiency, we propose that an MFCC-GMM model is best suited for identifying a speaker. Read More...
|
Electronics and Telecommunication Engineering |
India |
3326-3328 |
825 |
A High Step-Up Interleaved DC-DC Boost Converter with Voltage Multiplier Module for Photovoltaic System
-P.Kavi Priya ; G. Jayabaskaran; A.Nandhini
A high step up converter, which is suitable for producing DC output renewable energy system, is proposed in this paper. A conventional interleaved boost converter obtains high step up gain without operating at extreme duty ratio through a voltage multiplier module composed of switched capacitors and coupled inductors. In addition leakage energy is recycled to output terminal, due to lossless passive clamp performance. Hence, large voltage spikes across the main switches are alleviated, and the efficiency is improved. Even the low voltage stress makes the low voltage rated MOSFETs be adopted for reductions of conduction losses and cost. Finally, the simulation circuit with 24V input voltage 600V output voltage and hardware is designed with 12V input voltage is operated to verify its performance. The highest efficiency is 97.5%. Read More...
|
electrical engineering |
India |
3329-3332 |
826 |
Basic Services for Society
-Shivasagar Biradar ; Sateesh Ambsange; Malathi.P
The Smart Society Concept is Innovate business concept owned by S2A Smart Society Pvt Ltd. The Smart Society is unison of Social networking – for society, family & friends. Society management and E-commerce platform. It helps the society member to buy the daily necessary product through the site. This concept beautifully covers need and communication among society member, family and friends as old Indian traditions missing in current isolated society living. The smart society Platform is developed using Current Web technology. The Solution includes heavy data analytics and algorithms to make ease of use and host on cloud space. Read More...
|
MCA |
India |
3333-3335 |
827 |
Cloud Content Management with Process Bench Marking
-Noor Zohara ; Mrs. Kiran Srivastava
Our application is used to setup store for different organisation. Organisation can design and manage all stores. With our application we can build themes, select products, to start business security and payment can be done.
Our application is flexible to design and manage the stores. Platform can be used for planning ,mechanising etc.
Platforms can be branded as organization wants.
1) Analytics
2) Theme management
3) Content management
4) Payment gateway can be added
5) Secure socket layer certificate
6) Search engine optimization
7) Unlimited Product can be management
8) CSV support
Read More...
|
Computer Applications |
India |
3336-3338 |
828 |
Implementation and Prevention of DOS Attack in Malicious Environment on AODV Routing Protocol
-Varsha G. Tank ; Prof. Dhaval Patel
The Mobile Ad-hoc Network (MANET) is a concept base on wireless medium and straightforward to establish and having dynamic topology. The mobile Ad-hoc networks are exposed to various networks attacks because MANET operational environment is open and dynamic or live. MANET uses the Routing protocols for data transfer. Malicious node is the one type of mobile node but its work is completely different compared to normal Mobile nodes. Malicious nodes have capability to change or remove Routing Information. Now a day’s attackers are trying to effect servers and networks with DOS (Denial of Service)attack. We have shown a implementation of DOS attack process and it prevention process in AODV routing environment. Malicious or selfish node carries attacks on the networks so it directly effects to the routing Performance. We have measured throughput, end to end delay and packet Delivery ratio. Read More...
|
Computer Engineering |
India |
3339-3343 |
829 |
Increasing the Compression Ratio using Speech Coding Techniques in Audio Steganography
-Sapna Sharma
In the day to day life, everyone is dependent upon transfer of communication, where data security is not ensured. There is different techniques available for secure transmission of data, but all techniques do not provide secure and leakage proof communication over the network. Therefore, steganography solves this purpose. Steganography allows hiding data in a great way, through which strong communication may occur. Audio steganography actually hides the secret message behind an audio cover file using various techniques to provide secure and safe transmission of message without the reach of hackers. In this paper, most powerful speech analysis technique is used called Linear Predictive Coding (LPC), which encodes speech signal at very low bit rate and provides great estimation of various speech parameters. This paper gives the knowledge about previous methods of audio steganography and how proposed algorithm gives better results and shows how LPC method is better than LSB method. Read More...
|
Electronics and communication engineering |
India |
3344-3347 |
830 |
An Automated Way of Baking Process for Moisture Sensitive Components
-Ramamoorthy A ; Jagadeeshraja M; Manivannan L; Raja K
The objective of my project is to the new technology termed as “baking process†to remove the moisture content available in the particular electronics devices which is used in Rea time industrial application. In Industries there are certain policies are maintained for semiconductor devices, which referred as “Shelf life†of the material. Once it crossed its lifetime, some process need to done to extend this. Depends on the moisture sensitive characteristics baking is employed mainly to shelf life extension. The Baking is the process of removing of moisture content from particular semiconductor device in order to effective usage in the production line. In my propose method the moisture content is measured by corresponding moisture sensor. If it is normal level the processor goes to the normal state, If it is reaches the abnormal level (presence of moisture) the processor baked the product. Temperature and humidity sensors are effectively monitor and provide the signal to the processor. The UTLP kit provide the information about the status of the product. Read More...
|
Electrical Engineering |
India |
3348-3350 |
831 |
Implementation of High Speed Single Precision Floating Point Multiplier
-Reshmashree M S ; Meenakshi L Rathod
This paper presents design of a high speed multiplier for IEEE754 single precision floating point numbers. In all microprocessors, industrial area and applications involving arithmetic operation, it is required that the operations are carried out at a faster rate. Thus, to increase the speed of the multiplication operation, Dadda algorithm is used. The basic modules are designed using Verilog language and implemented using Xilinx 12.4 ISE software and the same is simulated using isim simulator. The Dadda multiplier is designed using Carry lookahead adder and the results are verified to achieve higher speed criteria. Read More...
|
ELECTRONICS ENGINEERING |
India |
3351-3352 |
832 |
Enhancing Network Survivability using AODV Routing Protocol in Multi Hop Wireless Ad Hoc Network
-Deepak Kumar Meena ; Rajnesh Singh
A Multi hop Wireless Ad-hoc Network is a self-configuring network collected of mobile nodes with mesh and tree topology. Now a days Energy efficiency is a big problem of Multi hop Wireless Ad-hoc Network as the mobile nodes depends on the battery power for their functionality and battery if soon used without being optimized for best use then it might be possible that we are not getting the best output in terms of network survivability. This paper presents the energy conservation technique using the enhanced AODV energy efficient routing protocols in multi hop wireless networks to maximizing the life time of networks which is given a name SSEEA. This SSEEA protocol use energy optimal routes to reduce the energy consumption of nodes. Read More...
|
Computer scinece and engineering |
India |
3353-3356 |
833 |
Improving the Robustness and Efficiency of Audio Steganography using Spread Spectrum Technique
-Sapna Sharma
A very efficient technique is required for audio steganography because this kind of steganography involves sound samples means the sound signal with its varying frequency signals. There are various techniques available for hiding secret information on an audio file but it is mandatory that audio host file should not be detected by any one because of its large size. So, an efficient technique is requires to design such kind of algorithm. Therefore, Spread Spectrum technique is used in this paper which will provide better results than other available methods and also provide high robustness and efficiency than other techniques. Also a comparison table will be there which will allow choosing an implementation technique on the basis of main parameters of steganography. Read More...
|
Electronics and communication. engineering |
India |
3357-3360 |
834 |
Simulative Analysis of Turbo Codes with Block Interleaver using Different Modulation Schemes on Rayleigh Channel
-Moina Arora ; Satbir Singh
Turbo codes can be achieved by parallel concatenation of two or more codes. These codes have been the subject of intense research as they are producing results very close to the theoretical limits set by Shannon. These are forward error correction (FEC) codes developed within Shannon limits. These codes have been successfully implemented in 3G mobile systems and satellite communication systems as well as other applications where designer seek to achieve reliable information transfer over bandwidth or latency constrained communication link in the presence of noise that can cause errors in the transmitted information. In this paper work is outlined using recursive convolutional encoder with fixed constraint length and block interleaver with different modulation schemes such a BPSK,QPSK,QAM to modulate the data and then this data is transferred using Rayleigh channel with additive white Gaussian noise and viterbi iterative decoding algorithm is used at decoding process. The focus of the work in this paper is based on the performance of turbo codes in terms of bit error rate (BER) vs Eb/N0. Then comparison of these techniques is done. This whole system is simulated using MATLAB. Read More...
|
electronic and communication engineering |
India |
3361-3365 |
835 |
Design and Simulation of DPWM for Cascaded Multilevel Voltage Source Inverter
-Rashmi A ; Meghashree A C
Multilevel inverter has a lot of application in the power electronic field, the main application is that the inverter converts a DC to AC, with a lower harmonic distortion, The paper explains the methodology that is the seven level cascaded H-bridge are used to get a lower harmonic distortion in the output Ac voltage with smoother wave by using lower switching frequency, these H-bridge contain less no. of switches so the complexity of the circuit is less. these will be design by using MATALB SIMULIX. Read More...
|
Power Electronics |
India |
3366-3368 |
836 |
Advance Corporate Scheduling Suit with Payment & SMS Gateway Support
-Ravi Kumar G S ; Dharamvir
Application sophisticated yet easy-to-use online scheduling software will raise your revenues by turning website visitors into confirmed appointments. This apparatus is for arrangement planning and client relationship administration, and additionally for specialist, course, and undertaking booking. As opposed to purchasing, introducing and looking after arrangements, organizations can change to our internet booking arrangements. For little organizations that mean colossal expense investment funds in HR generally expected to keep up complex programming establishments. Read More...
|
COMPUTER ENGINEERING |
India |
3369-3371 |
837 |
Modeling and Analysis of Car Wheel Rim by using Peek Material
-S.Karthick ; A.V.T.Shubhash; M.Amarnath; Dr. P.Kulandaivelu
The automobile industry is exploring polymeric material in order to obtain reduction of weight without significant decrease in vehicle quality and reliability. This reduction of weight of a vehicle directly impacts its fuel consumption. In this project, analysis of the Car wheel rim is carried out for weight reduction. The wheel rim is modeled by using standard parameters in Creo Parametric 2.0 software and analyzed to see the variations of deformation and stresses of the rim for different material such as Aluminum Alloy, PEEK (Polyether ether ketone), PEEK with 30% Glass fiber, PEEK-90 HMF 20, PEEK-90 HMF 40 by using the ANSYS 14.0 software. Read More...
|
Mechanical Engineering |
India |
3372-3374 |
838 |
Experimental Investigation on Hot Weather Concrete using Cera Plast
-Siva Prakash C ; Sharmiladevi S; Velmurugan S; Boobala Krishnan K V
Concrete is widely used in structural engineering with its high compressive strength, low cost and abundant raw material. But common concrete has some shortcomings, for example, low tensile and flexural strength, poor toughness, high brittleness, and so on that restrict its application. To overcome these deficiencies, additional materials are added to improve the performance of concrete.
The main purpose of this experimental investigation is to study the behaviour of Hot Weather Concrete (HWC). In this investigation HWC was manufactured by usual ingredients such as cement, fine aggregate, coarse aggregate, water and mineral admixtures such as Fly ash at replacement level of 5 % by weight of cement and manufacture sand is 50 % replaced by fine aggregate. The amount of CERA PLAST Super Plasticizer is added in the concrete is in the range of 0.25 %, 0.5 % and 1.0 % by volume of concrete. The water cement ratio adopted is 0.45. Specimens such as cubes, cylinders and prisms were cast and tested for above mixes viz. The mechanical properties of concrete such as compressive strength, split tensile strength and flexural strength of concrete is tested at 7, 14 and 28 curing days.
Read More...
|
CIVIL ENGINEERING |
India |
3375-3380 |
839 |
Improvement of Low Voltage Ride through Capability of DFIG based Wind Energy System
-Trupti D.Pingle
Among the different renewable, wind energy system is the most exploited due to its free availability and technological developments. With the increasing penetration of wind energy into power system, the grid codes are become effective which mean wind energy system must insure the uninterrupted operation with voltage control and reactive power compensation improving low voltage ride through capability(LVRT). The doubly fed induction generator (DFIG) based wind energy system is very sensitive to voltage variation and less ability to resist drop in grid voltage. To enhance the LVRT capability of DFIG, one of the series connected Flexible A.C. Transmission Systems (FACTS) device Static Synchronous Compensator (STATCOM) is proposed here. The STATCOM connected between the wind energy system and point of common coupling compensate accurately. When there is voltage difference between normal voltage and fault condition, difference will be generated by inverter modulation thus improving its LVRT. The simulation for 2MW wind energy system is carried out on Matlab/Simulink environment and results are verified. Read More...
|
Electrical Engineering |
India |
3381-3385 |
840 |
Effective Identification for DOA Aggressions by Multivariate Correlation Analysis
-A.Saravanan ; S.Hemalatha; B. Vishnu prasath
Denial- of- Service (DoA) attacks are a critical threat to the Internet. It is very laborious to trace back the attackers for the reason that of memory less feature of the web routing mechanism. In this result, there's no effective and economical technique to handle this issue. In this project, traces back of the attackers are efficiently identified and also to protect the data from the attackers using Multivariate Correlation Analysis (MCA) by estimate accurate network traffic characterization. MCA based DoA threat detection system employs the principle of anomaly-based detection in attack recognition. This makes our resolution capable of detective work glorious and unknown DoA attacks effectively by learning the patterns of legitimate network traffic merely. In Proposed, we use a peculiar trace reverse method for DoA attacks that is based on MCA between normal and DoA attack traffic, which is basically differs from commonly used packet marking techniques. This technique is employed to spot the attackers with efficiency and supports an oversized quantifiability. Furthermore, a triangle-areabased technique is used to enhance and to speed up the process of MCA. This technique is applied to bang the attackers in an exceedingly wide sSection of network that was a lot of economical and shield the info from the attackers. Read More...
|
Network security |
India |
3386-3388 |
841 |
Efficient Healthcare Data Transmission using Zolar Protocol in Wimax Network
-Kavitha.M ; Suguna.M
In this project, hybrid protocol is constructed for transmitting the emergency healthcare data from moving ambulance and mobile pedestrian, sending patent’s physiological data to the hospital is considered in this project. The healthcare data is transmitted using Worldwide Interoperability for Microwave axis (WiMAX) network. Network topology changes frequently due to mobility of the entities involved and routing becomes challenging. To transmit the healthcare data more efficiently hybrid ZOLAR (zone optimize link state location aided routing) protocol is constructed. ZOLAR protocol is constructed by combining the best features of different routing protocols such as ZRP (Zone routing protocol), OLSR(Optimized link state routing) and LAR( Location aided routing) protocols. The performance of ZOLAR protocol is compared with AODV(Ad hoc On-demand Distance Vector routing), ZRP (Zone routing protocol), OLSR(Optimized link state routing) and LAR( Location aided routing) protocols with respect to the performance metrics like Throughput(it is the rate of successful transmission of packets over a network per unit time), Packet delivery Ratio(it is the ration of number of packets delivered to number of packets transmitted over a network) , Average end to end delay(Delay is the time taken to transmit a packet from source to destination over a network) and average jitter(Jitter is the change in time between arriving of packets, it is due to timing drift, route change, network congestion). This performance comparison shows the hybrid ZOLAR protocol transmits medical data more efficiently than ZRP, OLSR, LAR and AODV. Read More...
|
Electronics and communication |
India |
3389-3392 |
842 |
Survey of Social Compute Cloud & Social Networks
-Priyanka Shivaji Gawali ; Prof. Arti Mohanpurkar
Social networks are very popular for sharing photos, videos, or messages. In the future, they will not only be used for the exchange of data, but also of services. Social network platforms have rapidly changed the way that people communicate and interact. They have enabled the establishment of, and participation in, digital communities as well as the representation, documentation and exploration of social relationships. We believe that as ‘apps’ become more sophisticated, it will become easier for users to share their own services, resources and data via social networks. However, as users may have complex preference structures concerning with whom they do or do not wish to share their resources, we investigate, via simulation, how resources can be effectively allocated within a social community offering resources on a best effort basis. In the assessment of social resource allocation, we consider welfare, allocation fairness, and algorithmic runtime. The key findings of this work illustrate how social networks can be leveraged in the construction of cloud computing infrastructures and how resources can be allocated in the presence of user sharing preferences. Read More...
|
Computer Engineering |
India |
3393-3395 |
843 |
Thermal Performance of a Wall Heat Collection Prototype with Al2O3+BN/H2O Nanofluid
-Vivek S Pandey ; Dhananjay P Kumbhar; Nitin A Khedkar
In this experimental study, we have attempted to combine the curtain wall structures, building construction practices, heat transfer mechanisms, and a natural circulation loop designed to develop an innovative, wall-integrated solar heater using Al2O3 + Boron nitride/water (BN/H2O) nanofluid on the concept of an “energy-harvesting†façade. A nanofluid is a dilute suspension of nanometer-size particles and fibers dispersed in a liquid. As a result, when compared to the base fluid, changes in physical properties of such mixtures occur, e.g., viscosity, density, and thermal conductivity of all the physical properties of nanofluids, the thermal conductivity is the most complex and for many applications the most important one. Interestingly, experimental findings have been controversial and theories do not fully explain the mechanisms of elevated thermal conductivity. In this paper, experimental and theoretical studies are reviewed for collector efficiency using nanofluid thermal conductivity and convection heat transfer enhancement. This work accomplished by performing an experimental investigation using two different types working fluid, water and Al2O3 + BN/ water nanofluid with 2%, 4%, 6% of volume fraction of nanopowder by varying the flow rates of the fluid. For this combination of working fluid the efficiency of system is found, 41.64%, 48.79%, and 55.82% respectively. The flow rates are 25LPH, 50LPH, 75LPH and 100 LPH. The highest values of efficiency are found at 100 LPH. Read More...
|
Mechanical Engineering |
India |
3396-3401 |
844 |
Condenser Vacuum Improvement and Related Parametric Analysis: A Case Study on a 120mw Thermal Power Plant
-Zubin DSouza ; Dr. Badarinath C; Mr. Chetan
In the present global scenario, a huge emphasis is laid on efficiency and emissions and with respect to a thermal power plant the condenser is one important auxiliary equipment whose vacuum is one of the critical parameters which is often overlooked and has a vast impact on the plant performance even with a seemingly inconsiderable deviation from the optimum value. The demands placed on utility generating units are very significant and therefore at the Tata Power thermal power plant the purpose of this study was to identify all the factors which affect the condenser performance. With reference to the ideal Carnot heat engine, a lower sink temperature provides for a better work output and therefore the cooling tower performance also plays an integral role and is thus also included in the ambit of this study. The improvements were precisely quantified which occurred after the scheduled maintenance outage. The result of this study provides for methods to achieve better performance and sustainability through certain operational methods and retrofitting, while simultaneously meeting all the demands imposed. Read More...
|
Mechanical Engineering |
India |
3402-3406 |
845 |
Image Identification using F-Test
-Deepak Kushwaha ; Mukundkumar Jha; Nawaz Aslam; Amarjeet Singh Yumnam
In this paper a new rectification method is proposed. The method is simple and efficient and can deal with all possible types of images. By applying the f-test hypothesis on image we can easily rectify whether the image is real, animated or spherical. The whole rectification process is carried out directly in the images. Here what we do is we choose the block base feature extraction approach. Instead of considering each and every pixel we take few sample of pixel within a block and try to get the mean value so instead of choosing local minima approach we are choosing global minima approach which gives us approximate equal value of minima but not the exact value. Today there many algorithms for image rectification which yields accurate result but increases the algorithm complexity but complexity matters in a real time image processing algorithm. Here we do some real time basic application that reduces the complexity of algorithm and if we are doing the offline process then there will be no need to worry about the complexity of algorithm. Read More...
|
COMPUTER SCIENCE |
India |
3407-3410 |
846 |
Fly Ash from Thermal Power Plants- Waste Management and Overview
-Rakesh Bhoi
Energy requirements for the developing countries in particular are met from coal -based thermal power plants. The disposal of the increasing amounts of solid waste from coal -fired thermal power plants is becoming a serious concern to the environmentalists. Coal ash, 80% of which is very fine in nature and is thus known as fly ash is collected by electrostatic precipitators in stacks. In India, nearly 90 mt of fly ash is generated per annum at present and is largely responsible for environ-mental pollution. In developed countries like Germany, 80% of the fly ash generated is being utilized, whereas in India only 3% is being consumed. This article attempts to highlight the manage-ment of fly ash to make use of this solid waste, in order to save our environment. Read More...
|
MECHANICAL ENGG. |
India |
3411-3413 |
847 |
An Enhanced Mobile Based Agriculture Information System for the Farmers
-G.Jayanthi ; S. Sivachandiran; D. Jayakumar ; A. Preethi; P.Banupriya
Agriculture Continues To Be The Most Important Sector Of The Indian Economy And Agriculture Is A More Or Less A Compulsion For Livelihood Of Millions Of Farmers. Land And Water Resources Have Almost Reached Their Limits, Price Of Commodities Are Fluctuating Almost Every Day, Profits Are Negligible For Most Of The Marginal And Small Farmers And Most Of All Getting Information Is Cumbersome. In Present Day Agriculture, Soft Resources Like Knowledge And Skills Are As Important As Hard Resources Like Inputs, And Sometimes More Important. But Estimates Indicate That 60 Per Cent Of Farmers Do Not Access Any Source Of Information For Advanced Agricultural Technologies Resulting In Huge Adoption Gap. The Main Aim Of This Paper Is To Reach Farmers For Their Awareness, Usage And Perception In E-Agriculture That Is Sms Based Alert Message Through Simple Mobile Phone User. If The Former Want To Register The Crop Details (Like Seed Sowing In Their Own Land). They Receive The Alert Message At Before Every Stage Of The Sowing Crop Is Grown. Read More...
|
Agriculture |
India |
3414-3418 |
848 |
Low Power Reduction Technique in VLSI
-Sima Baidya ; Arindam Chakraborty
Power and performance have become the predominant concern for chip designers in deep submicron technology due to the continuous scale down of the device for satisfying the Moore’s law which state that the number of transistor per chip will be double in every eighteen month. When the channel length shrinks, the absolute value of threshold voltage become smaller due to the reduced controllability of the gate over the channel depletion region by increasing charge sharing from source/drain which results in the increase in sub threshold leakage current exponentially, so the static power dissipation increased. In the deep submicron technology CMOS power dissipation plays a vital rule. Various comprehensive studies on leakage power minimization technique have been studied in this paper focusing on circuit performance parameter. Read More...
|
Electronics and communication engineering |
India |
3419-3422 |
849 |
Before and After Study of an Over Bridge ? A Case Study of IIM-A Intersection
-Parthkumar k. Patel ; Arvind M. Jain
Ahmedabad is the seventh largest metropolitan and fifth largest city in India. Ahmedabad is known as financial hub of Gujarat. Many people arrive here in search of job or to settle, which increase congestion in the city. There are numerous places in Ahmedabad which are suffering from the congestion problem. Among them IIM-A cross road (Andhjan Mandal cross road) is the study area of the present research work, at which over bridge is constructed in order to reduce traffic congestion. As user benefit is prior concern in any transport project, project should fulfill its requirement. To check present ground condition, evaluation is carrying out. This paper tries to evaluate over bridge performance and impact on traffic condition. Read More...
|
Civil Engineering |
India |
3423-3427 |
850 |
Design and Development of Prefilled Syringe Filling & Stopping Machine
-Nimesh M Patel ; Dhaval P Patel
The current practices in the industry of Prefilled syringes employs a manual transfer of filled Syringes from filling unit to syringe and therefore is a cumbersome practice, time consuming, and due to the involvement of the human element is a unhygienic practice. These limitations have serious repercussions on the use of the medicine and in delivering the right amount of dosage of medicine to the patient. It is to be noted that right amount of the medicine to the patient is a very important aspect as it effects the patient’s life. Therefore there is an important need to automate the process of the syringe filling and sealing as well transfer from filling unit to the syringe unit wherein multiple syringe can be simultaneously be filled and packaged into a clean and hygienic medical device. This Dissertation brings about the details of the Design and development of prefilled syringe filling and stoppering Machine then automate the process of filling by using a programmable logic controlled. This works also highlight the development of 3D Computer Aided Model and stress analysis of few components included in the PFS system. Read More...
|
Mechanical Engineering |
India |
3428-3430 |