No. |
Title and Author |
Area |
Country |
Page |
301 |
Mobile Cloud Computing Computation: Future of Online Services
-Yogesh Dumbare ; Prof.Sandip Kahate
In Future of Internet Services Mobile Cloud Computing plays an important role and it focuses on maximizing the effectiveness of the shared resources and to process local data globally. As the cloud provides many services there are more technical challenges while accessing the cloud services such as data availability, security, reliability, and integrity and energy efficiency. Offloading of computationally intensive application parts from the mobile platform into a remote cloud infrastructure or nearby idle computers addresses this problem. The main aim of our proposed system is to achieve security, reliability and minimize the computation overhead. In this system we are using the Cryptography algorithms for security and to minimize the computation overhead we are using task distribution scheme which help the cloud to increase security, performance and to minimize the memory and computation overhead. Read More...
|
Computer Engineering |
India |
1303-1305 |
302 |
Keyword Recognition by Improving Recurrent Neural Network using Character Model
-Geetanjali Bhagwani ; Ompriya Kale
Keyword spotting refers to the process of retrieving all instances of a given keyword from these documents. In the present paper, a keyword spotting method for handwritten documents is obtained using different various systems for offline handwriting recognition. A new technique is used for robust keyword spotting that uses bidirectional Long Short-Term Memory (BLSTM) recurrent neural nets and CTC Token Passing Algorithm to incorporate contextual information in documents. The document analysis is done by demonstrating tri-gram character model to significantly improve the spotting performance on IAM offline database. Read More...
|
Computer Engineering |
India |
1306-1309 |
303 |
Effect of Various Curing Methods, Water Quality and Coarse Aggregate Type on the Strength Parameter of Concrete
-Abhishek Prasad ; Dr. Abhay Sharma
Above all the properties of concrete compressive strength is the most important and impacting causing property on the quality and service of concrete , which makes the research on this parameter too required .Here the variation of the compressive strength of concrete on some specific parameters have been justified by an experimental work. First parameter is curing method comprising of Traditional curing method (fully immersed in water) and accelerated curing methods( warm water method) according to the Indian standard code is 9013:1978 Accompanied by second parameter of different classes of water that is taking two samples of water , one from sewage treated water with natural processes and other from institute portable tap water
And with the respective third parameter of coarse aggregate partial and fully replacement by different coarse aggregate which is crushed quartzite having enhanced crushing properties mainly used as a blast in railways. On these three concluded parameters a comparative study has been done by an experimental work in this research . For moulding and casting of concrete IS 516:1959 has been used and for accelerated curing method as per is 9013:1978 only one method is used that is accelerated curing by warm water method and for this method curing tank is constructed from a material of suitable strength that will resist the effect of corrosion and such a high temperature for a long period. The internal dimensions of the tank has been adequate to accommodate the required number and size of the test specimen such that test specimen easily removed . For determining the setting time of concrete penetration test will be done as per IS: 8142-1976 and for testing the workability of concrete , Slump cone test has been done by slump test apparatus as per IS: 7320-1974. Design mix has been done as per IS:10262-2009 by performing number of test of cement , aggregates and admixture . different trial mixes has been performed for perfect W/C ratio and propositions for concrete. The experiment comprises of numbers of cubes which have been casted by a mould of dimension 150 mm X 150 mm X 150 mm as per IS 516:1959 and hence as per IS:456-2000 for each test sample minimum 3 cubes to be cast , So the experiment is categorized in specific classes and required number of cubes has been prepared and then allow for monitoring compressive strength at 7, 14, 21 and 28 days for each parameter test samples. The test result has been compared to follow up the correlation curve between the result from compressive strength test on specimen cured by normal curing method and accelerated curing method for tap water and sewage treated water with partial and fully replaced coarse aggregate by crushed quartzite stone
Read More...
|
Civil Engineering |
India |
1310-1311 |
304 |
Digital Mouse using Sixth Sense Technology
-Dipti Nawale
This paper presents a new solution for human-computer interaction that utilizes hand gestures for intuitive operation without any devices restraining the hand freedom. The proposed system is able to completely replace a mouse as a pointing device. Moreover, it extends mouse capabilities by a set of hand gestures. The system is a gesture-based interface, and a simple webcam is sufficient for proper operation. The article reveals concepts and algorithms used for construction of the system. Conventionally keyboard or mouse is being used as mode of input. But here the proposing gestures formed by various color markers as mode of input. So without need of any physical hardware in hand we can interact with machine with the help of just color markers placed on fingers. Read More...
|
Electronics engineering |
India |
1312-1315 |
305 |
Information Technology and Government
-Sankpal Yogesh Ananda ; Sankpal Milan Raghunath; Prof. Anil Chhangani
Information technology probably impacts governments more than corporations and private individuals. For the most part, corporations propel and advance technology. Consumers then jump on the bandwagon embracing new and wonderful gizmos and ideas. Governments, on the other hand, usually lag behind and are forced to catch up. And even if they do not want to be involved, they must, because current trends and business practices demand that they conform. But this leaves governments vulnerable in many ways and thus, it can be said that generally speaking, information technology has a negative impact on governments. Establish basic security practices and policies for employees, such as requiring strong passwords, and establish appropriate Internet use guidelines that detail penalties for violating company cyber security policies. Establish rules of behaviour describing how to handle and protect customer information and other vital data. Read More...
|
Master of computer application |
India |
1316-1319 |
306 |
Reducing Speckle Noise in Medical Ultrasound Image using Diffusion Filter Algorithm
-Vadar Santok M. ; Chetan Chauhan
The quality of medical ultrasound is generally limited due to a number of factors, which originate from physical phenomena underlying the image acquisition. As a result, in the past few decades considerable efforts in the field of ultrasound imaging have been made for improving the image quality to make ultrasound imaging better for the perception of radiologists and more suitable for processing by autonomous machines for segmentation and registration. The major problem of ultrasound imaging technique is inheritance of Speckle noise. Speckle noise tends to reduce the image contrast and blur image details, thereby decreasing the quality and reliability of medical ultrasound. Many denoising methods such as Lee filter, Kuan filter and Frost filter have been developed so far for despeckling of ultrasound images but sometimes important diagnostic details are lost while denoising because of over smoothing. Diffusion filters are able to reduce noise but it requires large number of convergence .Wavelet based filters rarely cause over smoothing but they fail to perform well near edges. The proposed algorithm remove speckle noise without resulting into over smoothing and perform well near edges. Here In this thesis work, the proposed Algorithms designed to reduce speckle noise by the combination of PDE based Speckle Reducing Anisotropic Diffusion filter and wavelet based Threshold Shrink technique. Than The proposed algoritham is compared with spatial domain filters. Read More...
|
computer engineering |
India |
1320-1324 |
307 |
Finite Element Analysis of Soil Bearing Capacity using Plaxis
-Vilas ; Md. Khaja Moniuddin
The bearing capacity of the foundation is a primary concern in the field of foundation engineering. The load at which the shear failure of the soil occurs is called the ultimate bearing capacity of the foundation. In this project a numerical model is developed using PLAXIS. Finite element analysis is carried out using Mohr-coulomb failure criteria to represent two dimensional soil model. Foundation is modelled as square footing and load increment is applied till the soil model fails. Ultimate bearing capacity is identified as that minimum pressure on footing at which the foundation soil experiences shear failure. The stress distribution in soil and displacement experienced at different locations are obtained. In plaxis effective stress is considered as a ultimate bearing capacity. The preliminary investigation of black cotton soil was collected from crossroad which is six km away from Bhalki taluk, shows that it belongs to inorganic clays of high plasticity (CH) according to unified soil classification system(USCS).The ultimate bearing capacity for varying D/B ratio was computed by Terzaghi’s equation by knowing the preliminary values of black cotton soil and loading frame which was successfully compared with Plaxis software. Read More...
|
Civil Engineering(Geo-Technical engineering) |
India |
1325-1328 |
308 |
Decentralized Nature of Data Storage Access Control in Cloud using Anonymous Authentication
-Runali Kumbhare ; Prof. Chitra Wasnik
Cloud computing is one of the emerging technologies in information and communication world. With the advent of cloud computing, data owners are motivated to outsource their complex data from local sites to commercial public cloud for great flexibility and high economic savings. Hence, for such reasons the data that is stored in cloud systems must be encrypted. We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. Here we hide the identity of user who accesses the data from cloud systems. Access control is one of the important added features which enable only valid users to decrypt the data and access it depending upon the access privileges given to the valid user. Access control and authentication is decentralized and robust as compared to earlier schemas which are centralized in nature. The communication, computation and storage overheads are comparable to centralized approaches. Read More...
|
Computer Engineering |
India |
1329-1332 |
309 |
Hybrid Framework for Detecting Malicious Apps in Android
-Aniruddh Bhilvare ; Prof. Trupti Manik
Mobile malware has been growing in scale and complexity due to popularity of smartphones worldwide. Android is one of the most popular mobile operating system, which makes it more suitable to target with malware apps. There are schemes are provided for static malware analysis based on permission based analysis or dynamic malware analysis based on system calls. Despite current detection measures in place, more robust solution for malware detection is required. We have here described a hybrid study for the detection of malicious applications. In our study, we have suggested combination of static and dynamic malware analysis techniques to detect Android malware applications. Permission based filtering techniques can be effective to uncover well-known malwares. Then we can apply dynamic analysis scheme to identify certain behaviors of obfuscated malwares. In our scheme, we are monitoring dynamic behavior of application to uncover their malicious behavior along with static analysis consisting of reverse engineering of Apps. By combining both static and dynamic behavior, we can device a powerful framework to detect malicious apps on Android platform. Read More...
|
Android Security |
India |
1333-1336 |
310 |
Smart Touch Device Assistant For Visually Impaired
-Mohammed Mufeez A Thakur ; Prof. R.R.Maggavi
Visually impaired people report numerous difficulties with accessing printed text using existing technology, including problems with alignment, focus, accuracy, mobility and efficiency. We present a device that assists the visually impaired with effectively and efficiently reading paper-printed text. We introduce a novel, local-sequential manner for scanning text which enables reading single lines, blocks of text or skimming the text for important sections while providing real-time auditory and tactile feedback. The design is motivated by preliminary studies with visually impaired people, and it is small-scale and mobile, which enables a more manageable operation with little setup. Read More...
|
Electronics and Communication Engineering |
India |
1337-1341 |
311 |
High Speed Multiplier Based On Ancient Indian Vedic Mathematics
-Vipul J. Kiyada ; Punit A. Lathiya
Multiplier is one of the key hardware component in high performance system such as Finite Impulse Response (FIR) filters and Digital Signal Processor (DSP). Multiplier consumes large chip area, long latency and consume considerable amount of power. Hence better multiplier architectures can increase the efficiency of the system. Multiplier based on Vedic mathematics is one such promising solution. For the multiplication, Urdhva Tiryagbhyam sutra and Nikhilam sutra is used from Vedic mathematics. The paper shows the design implementation and comparison of these multiplier using Verilog Hardware Description Language (HDL). The multiplier based on Urdhva Tiryagbhyam sutra reduces the execution time by maximum 58% and minimum 9% but Multiplier based on Nikhilam sutra reduces the execution time by minimum 13% compared to array multiplier and increases 87% compared to Wallace tree multiplier. Read More...
|
Electronics Engineering(VLSI) |
India |
1342-1344 |
312 |
Criminal Pattern Identification using Genetic Algorithm
-Vibhuti H. Jani
Data mining is the process of identifying interesting patterns in data. These patterns must be meaningful in that they lead to some advantage. These patterns allow us to make prediction on new data. Clustering is a technique that group data items into classes with similar characteristics to maximize or minimize interclass similarity. For example, in the same way or differently to identify the suspects who carried out the crimes associated with gangs are different between the groups. Classification is a technique that finds common properties among different crime entities and organizes them into predefined classes. Many learning techniques can be quite complicated and typically are expressed as a set of rules or decision trees have learned that the structural descriptions. This paper presents detailed study on clustering techniques and its role on crime identification. Large and often genetic algorithms to solve complex computational problems using a variety of disciplines have given rise to many new applications. They variety of difficult practical problems in the field of powerful, high-quality solution has been found. This paper presents algorithm for crime identification. Read More...
|
Computer Engineering |
India |
1345-1348 |
313 |
A Study of Waiting time of Multiple Server Queuing Model in a Children Hospital
-Nilesh Sheth ; Dr. Prashant Makwana
Waiting lines of queue are experienced in our daily activities. Waiting in lines or queues causes inconvenience to customers (patients) and economically loss to firms and organization (hospitals). Customers (patients) wait for minutes, hours to receive medical services- waiting before or during being served. Queuing theory is a mathematical approach to the study of waiting in lines/queues. This paper presents the result of a study that evaluates how to decrease a waiting period before served from the point of view of patients in children hospital Rajkot. How many servers (doctors) added by the hospital management so patients have not to wait in queue and get service immediately. We also suggest that Numbers of servers (doctors) added into the hospital are also cost effective from the hospital management side. We use WINQSB software to measure the performance of queue system analyst for multiple server models. Read More...
|
MATHEMATICS |
India |
1349-1351 |
314 |
Energy Balanced Routing for Data Collection in Wireless Sensor Networks
-Akshata C.Kadadavar ; Sandhya Bevoor
Wireless Sensor Network (WSN), is a system composed of large number of micro sensors. In most of its applications, data are typically gathered by the sensor nodes and reported to the data collection point called the sink or the Base Station (BS). The sensor nodes have limited battery power and battery replacement is not easy for these networks, with thousands of physically embedded nodes. Hence efficient use of battery is very important to maximize the lifetime of the network. And this is achieved by a tree based energy balanced routing protocol, which builds a routing tree using a process where for each round the BS assigns a root node and broadcasts this selection to all sensor nodes in the network. Subsequently each node selects its parent by considering only itself and its neighbour’s information. Thus making it a dynamic process. The comparison with the existing protocol is also performed to show the improvements. Read More...
|
Electronics and Communication Engineering |
India |
1352-1355 |
315 |
Enhancing the Performance of Multipath Ring Routing Protocol with Heterogeneous System in Wireless Sensor Network
-Dhwani Barot ; Ishan Raajani
Multipath ring routing in wireless sensor network (WSN) is used to provide reliability and minimize the congestion in a network. Multipath routing provides different alternative paths, so it is better to use multipath than single path.It provides variety of benefits like fault tolerance, increased bandwidth, and security. Here we are going to use ring topology with multipath routing protocol. we use Castalia simulator which is developed in omnet++. Omnet++ is an object oriented module.It is base platform for various wired and wireless sensor network. Simulator is conducted which shows the result of static and mobile node implementation of multipath ring routing protocol. Here we are going to use clustering approach to improve the performance of multipath ring routing protocol. Read More...
|
Computer Engineering |
India |
1356-1359 |
316 |
Modified K-Means based Data Stream Clustering Algorithm with Cluster Estimation Method
-Brinda Gondaliya ; Prof. Rekha Talaviya
Data stream are generated from many sources. This Data streams are needed to be transformed into significant information to take more effective decisions. Clustering is the best way for analyzing data streams. The material on clustering is very large.Many clustering algorithms are available for data stream which uses k-means algorithm as a base. Clustream algorithm is one of the examples of it. Main drawback of such k-means based data stream clustering algorithm (Clustream) is that user has to give no. of cluster (k) in advance. Many times it happens that user does not know detail about the data and gives value of k randomly. In this type of case we will not get satisfactory result. i.e. we can’t get proper quality of clusters. To tackle the above mentioned problem, we have proposed the framework. According to it, we will use another algorithm to find appropriate no. of clusters in advance. Here we used Bisecting k-means algorithm to find no. of clusters for data stream. So we have combined the clustream algorithm with bisecting approach for finding best quality clusters without interference of user to fix value of no. of cluster at user side. Read More...
|
Computer Engineering |
India |
1360-1362 |
317 |
Analysis of A Passive Suspension System and PID Controlled Full Car Active Suspension System
-Rushabh Dugad ; Sanya Baheti; Saurabh Mali
In this paper, a passive suspension system and the active suspension control of a vehicle model that has seven degrees of freedom using a PID controller is studied. Here, for analysis a linear 7-DOF i.e. full car model is used for the analysis. Firstly the mathematical modeling is done and the simulations are carried out in MATLAB/Simulink environment. The model is simulated for various road inputs like step and ramp inputs. At the end of the study it is observed that PID controller gives the better ride comfort. Read More...
|
Mechanical Engineering |
India |
1363-1367 |
318 |
Design and Performance Analysis of One Ended Evacuated Tubes at Different Air Flow Rates
-Nitin Panwar
This paper presents designing and performance analysis of a solar air collector with one ended evacuated tube collector at different air flow rates. The experimental set up consist of 15 evacuated tubes, inside each evacuated tube aluminium tubes are inserted for better performance of solar air collector. Experiments were performed at different air flow rates with the help of blower with regulator and to enhance the outlet temperature and thermal efficiency, reflector has been used. It has been found that the setup operated nearly two times more efficient at higher air flow rate with reflector than with low air flow rate. Read More...
|
Mechanical Engineering |
India |
1368-1372 |
319 |
Tokenization as a Service over Cloud
-Riya Banerjee ; Rashmi Sharma; Deepak Sharma; Rekha Jadhav; Sonali Sonawane
All organizations have some kind of sensitive data. This data can be personally identifiable information (PII), account details, credit card numbers, Electronic Health Records (EHR) etc. Organizations mostly choose to store their data on cloud as cloud provides many benefits like less cost and ease of data access. Protecting sensitive data can be difficult as well as expensive. Banking and financial services, healthcare, retail and government entities must follow strict guidelines when handling sensitive data in cloud that include PCI DSS, ITAR, FERPA, HIPAA and HITECH. Tokenization solution replaces sensitive data with unique identification strings to make it harder to steal sensitive data and also meets the guidelines given by PCI DSS, HIPAA and HITECH. In this paper we have shown how cloud based tokenization service provides a way to secure sensitive data at a lower cost and a higher capacity. Read More...
|
Information Technology Engineering |
India |
1373-1377 |
320 |
A Seismic Analysis of RC High Rise Structural Building with Multiple Soft Storey at Various Levels using ETABS
-Syed Mohammad Zakir Ali ; Amaresha; S. M. Taher Ali
Tall building construction and developments have been rapidly increasing worldwide Development of metro cities in India there is increasing demand in High Rise Building and the effect of masonry infill panel on the response of RC frame subjected to seismic action is widely used. In this study the effect of masonry wall on high rise building is studied, as it is essential to consider the effect of masonry infill for the seismic evaluation of moment resistant reinforced concrete frame. Linear analysis on high rise structure with different arrangement is carried out and for analysis G+9 framed building is modelled. Soft stories are subjected to larger lateral loads during earthquakes and under lateral loading. This lateral force cannot be well distributed along the height of the structure. This situation causes the lateral forces to concentrate on the storey having larger displacement. The lateral force distribution along the height of a building is directly related to mass and stiffness of each storey. Read More...
|
Structural Engineering |
India |
1378-1381 |
321 |
Burundian's Balance of Trade in Deficit: Introduction of A New Industrial Plant of Stevia as Positive Impact
-Nizigiyimana Desire
The Burundian’s balance of trade is always in deficit. The exportation level is always lower by its importation. This is the one major indicator can evaluate the life quality of population in particular and the economic level of the country in general. In commerce, the balance of trade is used to express the difference between the value of exports from, and imports into the country. The balance of trade can be favourable when the value of the exports exceeded that of the imports, and be unfavourable when the value of the imports exceeded that of the exports. In case of Burundi, introducing the new industrial cultivation "STEVIA" will increase the surplus of the production in order to change the situation and its balance of trade as positive. This paper contributes to the evaluation relating to the Burundian’s balance of trade from 2010 to 2015 and analyses the impact of Stevia on its balance after introduction. Read More...
|
ECONOMIC DEVELOPMENT |
India |
1382-1385 |
322 |
Boosting of Content Based Image Retrieval System
-Meenakshi ; Ruby Panwar; Amit Kumar
We present an approach for image retrieval using a very large number of highly selective features. Our approach is predicated on the assumption that each image is generated by a sparse set of visual “causes†and that images which are visually similar share causes. We propose a mechanism for computing a very large number of highly selective features which capture some aspects of this causal structure. At query time a user selects a few test images, and a technique known as “boosting†is used to learn a classification function in this feature space. By construction, the boosting procedure learns a simple classifier which only relies on 15 of the features. As a result a very large database of images can be scanned rapidly. Finally we will describe a set of experiments performed using our retrieval system on a Caltech database. Read More...
|
Computer science & Engg. |
India |
1386-1389 |
323 |
Bio Sensors-Classification, Applications, New Trends and Technical Challenges
-Sheena Agarwal
Since biosensors offer considerably higher performance in terms of selectivity and sensitivity than most of the other available diagnostic tools, they have become one of the most essential analytical tools in the present scenario. Due to their rapid growth and development, the importance of biological and biochemical processes in fields like medicine, biology and biotechnology have gained momentum much more than expected. Owing to their applications in diverse areas like the food industry, agricultural industry and environmental screening, there is a serious need to understand and resolve the existing technological challenges and explore new trends in the field of biosensors. Read More...
|
ELECTRONICS AND COMMUNICATION (INDUSTRIAL INSTRUMENTATION)ENGINEERING |
India |
1390-1392 |
324 |
Study on Effect of Infill Walls in Multistorey Irregular R.C. Framed Structure with Shear Wall
-Hrushikesh ; Lokesh
This paper is concerned with study of effect of infill walls on regular and irregular R.C framed structure with shear wall. The objective of the project work is to carry out Equivalent static analysis and Time History analysis of vertically irregular R.C. building frames. IS 456 : 2000 and IS 1893 : 2002 codes are used. Comparison of results of all the models for different soil types and different earthquake zones are done. Structure is analysed using sap 2000 software. Model analysis is carried for three types of soil, for all four models in each type of soil and results for periods and frequency are obtained. Time – History analysis is done for all the models and results are obtained and compared. Graphs are obtained for displacement along X and Y direction. Comparison of shear force results of four models in each of four earthquake zones shows that infill walls increases shear forces at base for all earthquake zones. Storey displacement comparision shows that infill wall decreases the displacement of structure in all earthquake zones. Read More...
|
Structural Engineering |
India |
1393-1395 |
325 |
Surfing the Web without an Internet Connection
-Anish S. Chikodi ; Jyoti R. Singh
This research paper is all about offline browser and application. When we did a survey of the term, we came across two such browsers existing. These browsers work on same technique, browsing websites through SMS. We have proposed a new technique, taking into consideration the drawback of browsing websites through SMS. Our technique uses radio frequencies to access particular websites. We propose to embed our technique into the currently existing offline browsers. We are currently finding a way to implement our ideas in a better manner, and to make this technique more efficient. Our motto is to make at least basic necessary websites available to everyone. Read More...
|
MCA |
India |
1396-1399 |
326 |
Enhancing Security using Android Permission Model
-Mayura Devani ; Jogendra Gouda; Harsh Goswami; Tejas Bhatt
More and more people rely on smart phones to manage their personal data. Smartphone's are today the repositories of our secrets (photos, email), of our money (online e-commerce) and of our identities (social networks accounts). Therefore mobile applications have the responsibility of handling such sensitive and personal information in a proper, secure way. For the protection of user data from third party applications, it is common for Smartphone’s Operating Systems to use permission model control the Permissions granted to third party applications. The user receives a dialog with the list of permissions requested by the application before installation. Once the application is installed, the user gives chance to third Party application developer to attack. Nowadays attackers are developing such a malicious application. To protect against such attacks, different solutions are being given. We studied and detection of attacks focused on behavior-based approach. It is difficult for general users to permissions which are potentially harmful and those which are not. We are proposing a scheme to the user, so that he/she can give access to the requested permissions, or can deny and finish the installation. This System can be used for multipurpose, like Remap Hardware Buttons, Manage App Permissions, Enable Side-by-Side Multitasking, Add Options to the Power Menu, Disable the Unsafe Volume. Read More...
|
Android Security |
India |
1400-1408 |
327 |
Detection of Sinkhole Attack based on Analysis of Routing Behavior in an AODV Routing Environment
-Aditya Kumar ; Aakanksha S. Choubey
Wireless Sensor Networks (WSN’s) one of them most prevalent technology emerging in various fields. It consist of a multiple/variable number of sensor and autonomous mobile nodes. Due to low-cost, energy efficiency, easy implementation WSN’s technology becomes popular therefore chances of attack on wireless network also increases. Sinkhole attack one of the most devastating security thread in the wireless sensor networks that disrupt the working of routing protocol. In this attack, a sinknode (attacker node) propagates the forge routing message to its neighbour that it exist in the shortest path to send the packet to the destination. Once a sinknode get a access on network data it may perform either selective forwarding, alter packet or drop packet. There are already various work have been done to detect the sinkhole attack such as based on redundancy mechanism, Hop-Count monitoring, a novel detection mechanism etc. In this paper we proposed a technique to detect a sinkhole based on the analysis of routing behaviour. This technique elevates the performance in terms of detection rate which is proved by simulation. Read More...
|
Computer Science and Engineering |
India |
1409-1412 |
328 |
Learning to Rank Search Result for Time Sensitive Queries
-Shivangi Shah ; Jasmin Jha
In recent years, semantic search for relevant documents on web has been an important topic of research. The World Wide Web consists of millions of interconnected web pages that provide information to the users. The WWW is expanding and growing in size and the complexity of the web pages. That’s why it is necessary to retrieve the best or the web pages that are more relevant in terms of information for the query entered by the users. Time is an important dimension of relevance for a large number of searches, such as over blogs and news archives. The search is generally carried out based on the similarity of the documents being searched for. , and then “boosts†the scores of the most recent documents, to privilege recent documents over older ones. Unfortunately, topic similarity alone is not always sufficient for document ranking. Earlier work was based on improving retrieval for “recency†queries that target recent documents. Retrieval of temporal queries can be improved by considering the time dimension implicitly or explicitly. Read More...
|
Computer Engineering |
India |
1413-1416 |
329 |
Dynamic Query Form Generation for Mining Highly Optimized Transactional Databases
-Pooja M.Suthar ; Jasmin Jha
Modern scientific databases and web databases maintain large and heterogeneous data. DQF is a novel database query form interface, which is able to dynamically generate query forms. The objective of DQF is to allow a normal user with less or no knowledge of querying language to generate dynamic query forms as per their requirements. The enhancement of a query form is an iterative process and is guided by the user. User selects require query form components to add in desired query form and a query form could be dynamically refined till the user satisfies with the query results. A probabilistic model is developed for implementing a query form in DQF. Our experimental evaluation demonstrate the efficiency and customisability of the system. Result shows that the dynamic approach often leads to higher success rate and simpler query forms compared with a static approach. Read More...
|
Computer Engineering |
India |
1417-1422 |
330 |
Modified Non-Local Means De-Noising with Patch and Edge Patch based Dictionaries
-Rachita Shrivastava
Image denoising is a fundamental yet challenging problem that has been studied for decades. Dictionary is built only once with high resolution images belonging to different scenes. Since the dictionary is well organized in terms of indexing its entries, it is used to search similar patches very quickly for efficient NLM denoising.Our approach is very different in the sense, we build a single dictionary as a pre-processing step with a large number of arbitrary but high quality, textured images belonging to different object classes in contrast with building a dictionary for each noisy test image separately. We prefer to do this to avoid the time required to build the dictionary each time for separate test images.Principle Component Analysis (PCA) is a standard tool in modern data analysis because it is simple method for extracting relevant information from complex data matrix using eigen-values and eigenvectors. The multi-scale principal component generalizes the usual PCA of a multivariate signal seen as a matrix by performing simultaneously a PCA on the matrices of details of different levels. In multi scale Principal Component Analysis (MSPCA) de-correlate the variables by extracting a linear relationship and wavelet analysis. For dictionary building purpose smooth patches has been find using PCA. Then clustering is done for the similar patches. Then id is allocated for each cluster to get the dictionary. Read More...
|
Computer Science |
India |
1423-1427 |
331 |
LSB Based Steganography using Genetic Algorithm Cross-Over Concept Along with Visual Cryptography for Secured Data Hiding in Image for Wireless Network Application
-Roshni Rathour ; Mrs. Preeti Tuli
Steganography is method of data hiding behind multimedia file such as text, image, audio and video. For enhancing the security of data hiding and transmission over network, this paper proposed system which uses genetic algorithm cross-over concept along with Visual Cryptography. The Secret image is converted into two shares by using any visual secret sharing scheme then these shares are hidden in LSB of cover image. Genetic Algorithm is used to shuffle pixel location of image so that detection of secret information become complex. Pixel locations are shuffled using cross-over algorithm. Visual cryptography is kind of encryption technique which divide secret image into multiple shares to ensure improved security and reliability. Read More...
|
Computer Science engineering |
India |
1428-1431 |
332 |
A Survey: Data Mining Techniques for Detecting Suspicious Criminal Activities on Emails
-Hitesh Mahanand ; Deepak Kumar Xaxa
Data mining technique is the extraction of imperceivable information from large databases, and is a most powerful new emerging technology with great potential to envision future patterns and behaviors, permitting system to generate proactive, knowledge-driven decisions. A standout amongst the most prevalent data mining systems is Classification. Classification is a data mining approach that consigns things in a gathering to target classifications or classes. The primary goal of classification is to accurately and precisely predict the target class for each one case in the data. Since Criminal Activities conducted via the internet are traditional crimes that are committed through the use of an electronic communication device, so the Classification techniques may be applied to identify the Suspicious Criminal Activities. The main objective of this survey is to view, analyze and study the different Classification techniques. Read More...
|
Computer Science & Engineering |
India |
1432-1437 |
333 |
Fault Tolerant Distributed MapReduce Engine
-Pragya Singh ; Trupti Manik
Hadoop is open source implementation engine to handle single point of failure problems occurred in Hadoop job management (Master node), Distributed Map Reduce Engine for Hadoop exists to handles the drawback of failure of master node. System proposed about a standby master node which is synchronized with active master node and receiving incremental updates from active master node. Dominant issue in existing system is that if after completion of synchronization, active master fails immediately then standby node will not know until next synchronization due to which task updates will be lost on active master and standby node will also wait for next synchronization cycle due which switching latency will increase. In this paper, we propose scheme in which standby master node keeps sending Heartbeat message to Active master node in order to detect failure. When active master node stops responding to that message, standby master node comes to know that master node has failed. Then, switching will takes place from active master to standby node and standby node will start acting as active node. We have also analysed the effect of faster synchronization cycle between active and standby node. Read More...
|
Information Technology |
India |
1438-1440 |
334 |
A Review on Image Stegnography with Its Technique
-Suchi Goyal ; Manoj Ramaiya; Nirupama Tiwari
In the last few years communication technology has been improved, which increase the need of secure data communication. For this, several scientists have applied much of their time and also efforts in an attempt to the purpose of finding appropriate ways for information hiding. Hiding Capacity plays a vital role in efficient covert communication. This is achieved by Steganography. Steganography is the science of hiding information that involves all the techniques used to exchange the secret message with low distortion of the cover medium. It can be described as the unseen communication study of that generally deals with the ways of the hiding existence of the communicated information. The hidden message may be text, image, audio, video, etc. Steganography which overcome each other’s weaknesses and create challenging for the intruders to attack or steal important data is being suggested. This paper also defines the basic ideas of the steganography. In this paper, we survey on different steganography methods for data encrypting. Steganography is a method that permits the one to hide the information within an image while adding few noticeable modifications. and also The LSB (least significant bit) based method is a popular kind of steganographic algorithms in the spatial domain. The advantage of the LSB is its simplicity to embed the bits of the message directly into the LSB plane of cover-image and many applications use this method. In this paper we try to give an overview of different LSB methods and there advancements. Read More...
|
Computer Science |
India |
1441-1446 |
335 |
Energy Efficiency Communication Protocol for Wireless Sensor Networks
-Raghavendra K ; Mr. S. Sathyanarayana
Wireless sensor network (WSN) have been identified as one of the most important technology for 21st century. But the energy consumption is the major problem for the implementation of wireless sensor network now days. This paper presents the design and implementation of an energy aware sensor node, which helps to solve above mentioned problem about WSN. An energy efficient strategy, which aims at reducing energy consumption from both the sensor node level as well as network level in WSN, is proposed. For energy efficient Communication, distance between transmitter and receiver is estimated and then required lowest transmission power needed to transmit the measurement data is calculated and determined. After that actual communication takes place. Between two consecutive measurements sensor nodes are set to sleep mode for energy saving purpose under normal operating conditions. It is observed that energy consumption within whole network under different network configurations giving better results. It can give best results by choosing most efficient from one of them is also useful. Read More...
|
Computer Science and Engineering |
India |
1447-1450 |
336 |
Performance Study of a Journal Bearing with Structured Artificial Roughness using CFD as a Tool
-Amit Kumar Sawarni ; Morrish kumar
Performance of a Journal bearing depends on two aspects. First one is the improvement of inherent properties of lubricant by rigorous research. Second one is the improvement of bearing performance by doing some research on the design aspects of bearing surface. Improvement of bearing performance does mean that its load carrying capacity will be increased and at the same time the frictional loss due to the shearing phenomenon between bearing surface and the lubricant layer should be decreased. It has been proved that if artificial roughness can be created on the bearing surface perfectly it can increase the performance of a journal bearing. Now it is the matter of research that which shape, dimensions, position and orientation will increase the performance of a given journal bearing most.In the present work an attempt has been made to study the influence of a specific type of artificial roughness on the performance of a journal bearing. Read More...
|
Mechanical engineering |
India |
1451-1457 |
337 |
Properties and Environmental Assessment of Rice Husk
-Ravi Kumar ; Shailendra Kumar Rai; Maneesh Singh; Devesh Kumar
For many years, we have consumed fossil fuels with no worries about possible shortages, but, now, those same oil fields are running dry, while use of coal as a source of energy is also facing criticisms due to its contribution on environmental pollution. In view of this situation, there has been a growing impetus looking for alternative sources of energy for the future. Biomass based second generation biofuels could partly assist to resolve some of these issues, especially from the feedstock point of view for energy production applying various conversion methods to improve the combustion efficiency. The advantages of using biomass are obvious as this material, is generally left to rot or burnt in an no controlled manner, producing CO2 as well as smoke A large portion of the fossil fuels is imported thus causing concern for energy security. In addition, utilization of fossil fuels is associated with emissions of CO2, SO2 and NOX leading to environmental impacts. To approach the reduction of these problems, alternative (renewable) energy sources are proposed. Rice husk is a potential source of energy for an agricultural country with high rice production. Rice mills can use the rice husk generated by them as a fuel to produce energy. However, the environmental profile of the energy production must be assessed to ensure reduced environmental damage. Read More...
|
Mechanical Engineering (Energy Technology and Management) |
India |
1458-1460 |
338 |
Study on the Response of Steel Moment Resisting Frame with Vertical Setback Subjected to Lateral Loads
-Raghavendra. D B ; Kashinath Patil
In the present works “ A study on response of steel moment resisting frame (SMRF) with vertical set back subjected to lateral loads†I consider steel moment resisting frame of 15, 10, 5 storied regular 3-D framed of 3 models and 15, 10, 5 storied setback building of 9 models that is 3 of 15, 10, 5 storey are symmetrically in elevation configuration thought its height And 3of 15 storey are setback at 12th, (8th and 12th),(4th,8th ,12th and 15th)storey level and 3 of 10 storey are setback at 7th,(5th and 8th ),(3rd,3rd ,6thand 9th)storey level and 3 of 5 storey are setback at 4th,(3rd and 4th ),(2nd,3rd,4thand 5th)storey level. it is focused to study their response or structural behavior under Equivalent static Analysis and Dynamic analyses in this Time History Analyses with various soil types and various seismic zones of India as per Is-1893-2000 . In the analyses we concluded that the steel moment resisting regular frame models of 15, 10, 5 stories regular and irregular base models. storey displacement or lateral displacement, storey drift, and base shear of regular steel moment resisting frame models are compared to the irregular vertically setback steel moment resisting frames based on graphs which are plotted from tabulated values after analyses. For the modeling analyses ETABS Ver 2013 software is used. The peck value of acceleration and lateral displacement is determined by Time History Analysis for all regular and irregular vertically set back steel moment resisting frames base models. Read More...
|
Structural Engineering |
India |
1461-1466 |
339 |
Energy Aware Key Pre-Distribution Scheme for Wireless Sensor Networks
-Jeenyta Desai
Taking the considerations of WSNs application, there is a need of a highly scalable key pre distribution scheme for WSNs. Along with this there needs to be considerations of the limitation of the resources used in WSNs and the key management challenges also. Network scalability, resiliency are the main concerns when designing a key management scheme. Network scalability means, the network should support very large numbers of nodes so that the large network can be deployed. Good secure connectivity and the large network scalability can be implemented using the Unital design theory. Unital is the complete new approach for the WSNs for key management. The basic Unital mappings for the key pre distribution can be used. Along with network scalability there should be good key sharing probability also. Conduction of approximate analysis and simulation and comparison to the existing system can be shown. Also the limitation of storage overheads, Network scalability, Resiliency, network connections are to be considered. Proposed methodology show that the network scalability is enhanced while providing high secure connectivity and other performances also at the same network size. The proposed work reduces the storage overheads also. Read More...
|
Computer Science and Engineering |
India |
1467-1471 |
340 |
Performance based Analysis of RCC Building
-Pansuriya Nilang J. ; Prof. Trak P. Vora
Performance Based Seismic Engineering is the modern approach to earthquake resistant design. It is an attempt to predict the buildings with predictable seismic performance. In one Sense, it is limit-states design extended to cover complex range of issues faced by earthquake Engineers. The analysis will be performed on new as well as existing R.C.C. buildings and the performance of buildings in future earthquake will be obtained. Non Linear static analysis will be performed in existing as well as new buildings in finite element program. It helps in the investigation of the behavior of the structure under different loading conditions, its load deflection behavior and the cracks pattern. In the present study, the non-linear response of RCC frame using finite element program under the loading has been carried out with the intention to investigate the relative importance of several factors in the non-linear analysis of RCC frames. This includes the variation in load displacement graph. Read More...
|
civil engineering |
India |
1472-1476 |
341 |
Seismic Analysis of Reinforced Earth Wall Along With Soil Structure Interaction
-Mehta Siddharth D ; Dr. Siddharth Shah
Retaining structures are susceptible to failure during strong earthquakes and are damaged frequently so it is important to study the reinforced earth wall under the seismic loading. Reinforced earth wall is retaining wall with panel and reinforcement as steel strip, geogrid or geosynthetics. Lot of research is carried for its static stability but very little work has been carried out for its stability in dynamic condition. The effects of soil properties, earthquake motions, and reinforcement layouts are issues of major design concern under earthquake loading. Reinforced earth wall that support dry cohesion less backfills form a major group of the earth retaining structures. These walls fails under the seismic loading and its stability is affected which has led to implementation of Soil Structure Interaction in reinforced soil wall. The proposed work is concerned mainly with the seismic behavior of the reinforced earth wall considering soil structure interaction. The objective is to examine the effect of soil structure interaction in seismic behavior of reinforced earth retaining wall. In these the seismic performance is studied in the finite element program Plaxis. Read More...
|
Civil Engineering |
India |
1477-1481 |
342 |
Experimental Study on Concrete using Silica Fume and Fly Ash
-Prashant ; Dr. Suresh G patil; Ram Panth; Padmaker
Rapid increase in construction activities leads to active shortage of conventional construction materials due to various reasons. Concrete is most widely used construction material. Cement, sand and granite stone are the constituents of the concrete. Researches were searching for cheaper & eco-friendly materials as a cement replacement. Because the manufacture of cement is leading to the pollution in large amounts (CO2 emissions are 0.8-1.3 ton & SO2 emission is also very high). It was found that fly ash, industrial waste & silica fume (SF) can be used as partial substitute for cement and also these materials are produced in large extent as waste materials. Read More...
|
Civil Engineering |
India |
1482-1487 |
343 |
All Digital Fast Locking Pulse Width Control With Programmable Duty Cycle
-Praveen V ; Mallikarjun Gokavi
The aim of all digital fast locking pulse width control circuit is highlighting programmable duty cycle, in this project two delay lines and time to digital convert, in order to get the same accuracy of the first. Now the system can be calculated without look up table, the two stage matrix converter 0f the 0.18-μm CMOS process, The circuit performs well to the input operating frequency ranging for high frequency in MHz, with an input duty cycle of 30% to 70% it achieves programmable output duty cycle range in increments of 6% with 3 bit of data. The use of the D flip flop will reduce Delay line of the circuit. Low jitter noise of the system can be useful in the circuit performance of the system. Duty cycle adjustment is quite helpful in wide variety applications, circuit are quite sensitive to the adverse condition of the atmosphere so to overcome this problem new circuit system has to create the fabrication of the chip with CMOS technology are costly and compact with reducible small chips. The given areas and clock frequency required criteria are calculated with the system. Read More...
|
Digital Communication Engineering |
India |
1488-1493 |
344 |
Parametric Study on BENDABLE Concrete
-Sagar Gadhiya M ; Prof T N Patel; Dr. Dinesh Shah
Bendable Concrete also known as Engineered Cementitious Composites abbreviated as ECC is class of ultra-ductile fiber reinforced cementitious composites, characterized by high ductility and tight crack width control. This material is capable to exhibit considerably enhanced flexibility. An ECC has a strain capacity of more than 3 percent and thus acts more like a ductile metal rather than like a brittle glass. A bendable concrete is reinforced with micromechanically designed polymer fibres. The aim of this study is to investigate the hardened property (i.e. Flexural Test) of ECC by addition of Steel, PVA & Hybrid fibers in different proportion. The result of Flexural strength of various ECC mix with different percentage of fibers are compare with Conventional Concrete design according to Indian Standard. All beams were tested under four-point loading test at different age in UTM, followed by different cross-section of specimen varying from 50-125 mm having 700 mm total length. Read More...
|
Civil Engineering |
India |
1494-1497 |
345 |
A Study on Dynamic Analysis of Steel Structure with Eccentric Bracing Systems
-Praveenkumar Kattimani ; Naveen Kumar Minajagi
The Main Objective of this thesis is to perform an attempt to extract the following results and compare these with the bare moment resisting frame with moment resisting frame with both concentric and eccentric bracing systems, to study their response properly. Six different types of steel moment resisting frames models with two concentric and three eccentric bracings systems are done using ETABS Ver. 2013 finite element software. Analysis is done using both equivalent static and time history dynamic methods as per IS 1893-2002. From the analytical study and based on the results and discussions it concluded that, steel moment resisting frames with eccentric bracings systems are more efficient in minimizing the effect of later sway, story drift and peak displacements and acceleration. Read More...
|
Structural Engineering |
India |
1498-1500 |
346 |
Effect of Pulsed Current’s Parameters on the Mechanical Property of Pure Aluminum (AA 19000)
-Prassan M. Shah ; Prof. Vaishali Patel; Prof. Navnit Patel
The aim of this paper is to investigate the effect of pulsed parameters like pulse duty cycle, frequency, peak current and background current.Here Taguchi method is used to find out the optimum parameter for the highest % elongation and highest UTS .Annova is also used for finding out % contribution of each parameter. Minitab is used for finding out the result of Taguchi Method and Annova. Read More...
|
Mechanical Engineering |
India |
1501-1504 |
347 |
Test Automation Framework on Data Driven Architecture
-Deepthi Urs ; Ms. Vani H Y
The execution environment for the automated test scripts is provided by the test automation framework. Test Automation Framework on data driven Architecture is used where the same functionality should be tested multiple number of times with different sets of input data. Read More...
|
Computer Science and Engineering |
India |
1505-1507 |
348 |
1-Bit Full Subtructor using CMOS Technique & GDI Technique using Tanner EDA Tool
-Rajni Bukkal ; Pardeep Dimri
In this paper an area and power efficient 14T 1-bit Full Subtractor design has been presented by using GDI techniques. The 1-bit Subtractor design consist of 7 NMOS and 7 PMOS. For difference output of 1-bit full Subtractor GDI XOR-XNOR module outputs has been used with GDI 2x1 MUX. A GDI XOR- XNOR module has been used which consume less area at 180 nm as compared with the CMOS modules. To improve delay and power efficiency a cascade implementation of XOR module has been avoided in the used 1-bit GDI Full Subtractor module. Power dissipation and propagation delay are the contradicting factors in the design of VLSI CMOS devices .This paper aims at reducing power and energy dissipation using Gate Diffusion Input (GDI) 1-Bit Full Subtractor circuits and CMOS Circuits comprise of reducing the power supply voltages to investigates the performance parameters i.e. delay, power for the combinational circuit using power reduction techniques and compare them to find out the best one. These techniques can be used further for various applications in the field of VLSI design. A competitive approach is applied to the 1-Bit Full Subtractor circuit emphasizing on the minimum Power-Delay trade-off and minimum Transistor count. The PMOS and NMOS transistors are connected together for strong output level. GDI technique achieves 80% reduction of leakage current and 80% reduction of leakage power in active mode as compared to the conventional CMOS design. SPICE Simulations are performed with 0.18µm CMOS technology. Read More...
|
VLSI DESGIN |
India |
1508-1510 |
349 |
Micro-Controller based Braille Translator For Visually Impaired
-Priyanka Joshi ; Prof. R.R. Maggavi; Prof. A.V. Deshmukh
All over the world, persons who are not able to visualize (blind) have used Braille as the primary means of accessing information. Almost all countries have adapted the system ‘Braille’ as a universal approach that works to get the information for visually impaired. This paper describes the hardware implementation of a text to English Braille translator using Arduino UNO. Till now all Braille translators are FPGA based for its parallel programming, whereas in this paper it will be implemented on Arduino UNO. Arduino UNO is a powerful, cost effective and compact disc which occupy very less space. The translator is based on the translating algorithm, proposed by Paul Blenkhorn [1]. Read More...
|
Electronics & Communication Engineering |
India |
1511-1514 |
350 |
Study, Simulation and Implementation of Coarse and Fine Delay for Satellite Link Enulation
-Janki. H. Patel ; Gautam D. Makwana
Aim of the work is to implement coarse and fine delay to be added in a signal. This will be utilized in development of Channel emulator, Calibration of Phased array element for wideband signals, for an Echo canceller kind of Applications. The Coarse delay will be consisting of integer delay with respect to sampling frequency whereas Fine delay will be consisting of fractional delay with respect to sampling frequency. Various algorithms such as the brute forced Fourier method and using sinc function have been studied for coarse delay. Due to less complexity, sinc function method is used in our project. For fractional delay, various Interpolations based method, Hybrid analog to digital converter, least square integral error method and Lagrange Interpolation based method is studied and simulated. Trade off analysis is carried out for deciding algorithm for fractional delay considering implementation complexity, feasibility to implement on hardware and accuracy in terms of Mean square error and real time implementation. Proposed module will emulate time varying delay for testing satellite link performance and it will be part of satellite link emulator, and Phased array antenna which will correct differential group delay between elements which is consisting of integer and fractional delay. It will also compensate the delay between echo canceller output and the receiver input for echo cancellation. Read More...
|
Electronics and Communication Engineering |
India |
1515-1520 |