No. |
Title and Author |
Area |
Country |
Page |
251 |
The Role of Multiple Intelligence in E-Learning
-Dr. Kunjal Bharatkumar Mankad
E-learning has offered numerous advantages such as flexibility, remote operability, cost effectiveness, simplicity, consistency and many more. The utilization of smart tools and technologies has provided easy and convenient education in an effective way without barrier of time and place. The paper explains the conceptual mechanism of e-learning. The chapter presents role of technological players of e-learning environment which are various instructional and computer technologies. The paper focuses on theory of multiple intelligences which can become inherent part of basic model of e-learning. It provides various activities of e-learning in which different intelligences play important role. In order to achieve e-learning in an effective way, human being requires different types of intelligence in different measurement. The paper has presented detailed discussion on the same. To claim the impact of multiple intelligences on e-learning activities, an example is presented which shows tight integration of multiple intelligence with model of e-learning. Read More...
|
Computer Science and Engineering |
India |
1076-1081 |
252 |
Clone Attacks in Wireless Sensor Networks: A Survey
-Samridhi Madan ; Sandeep Kaushal
Sensor networks are highly distributed networks of small, lightweight wireless nodes, deployed in large numbers to monitor the environment or system by the measurement of physical parameters such as temperature, pressure, or relative humidity. Building sensors have been made possible by the recent advances in micro-electromechanical systems (MEMS) technology. The sensor nodes are similar to that of a computer with a processing unit, limited computational power, limited memory, sensors, a communication device and a power source in form of a battery. In a typical application, a WSN is scattered in a region where it is meant to collect data through its sensor nodes. The applications of sensor networks are endless, limited only by the human imagination. Read More...
|
Electronics and Communication Engineering |
India |
1082-1084 |
253 |
Performance Analysis of AODV with Fuzzy Based Node Traversal Time using Different Scheduling Techniques in MANET
-Bharat Jain ; Dr. Laxmi Shrivastava
Mobile Ad-hoc network (MANET) is a type of wireless network without any fixed infrastructure. MANET includes different nodes which are connected in random manner and are placed dynamically. In this paper the performance of AODV protocol has been analyzed with optimized NODE_TRAVERSAL_TIME using fuzzy logic controller with the help of scheduling techniques. The optimized value of NODE_TRAVERSAL_TIME has been decided by the proposed fuzzy logic controller to be used in conventional AODV protocol using the power of transmission and speed of the nodes. The performance of the network using AODV protocol with this fuzzy based node traversal time has been compared with conventional AODV protocol using different scheduling techniques like SP, RR and SCF in terms of average throughput, average packet delivery ratio and average routing overhead. It has been found from the simulated and manually calculated results that performance of the network using AODV with fuzzy based node traversal time has been improved. The simulation has been done using qualnet 6.1 simulator. Read More...
|
NETWORKING |
India |
1085-1089 |
254 |
Optimization of Process Parameters for Friction Stir Welding on Aa6061-Coconut Ash Particulate Reinforced Metal Matrix Composite using GRA
-Bhavya Nagam
Friction stir welding, a solid state joining technique, is a giant step in the ever constant endeavor of joining technology for materials. The superior qualities of FSW led its usage in joining Aluminum alloys for aerospace, marine, automotive and many other applications of commercial importance. The present work aims at studying the influence of various operating parameters namely speed, feed and tool diameter on the mechanical properties (Tensile strength and wear rate) of the friction stir welded joint on AA6061 alloy. The experiments are devised by deploying Design of Experiments (DOE) technique. Three factors and three levels are considered. L9 orthogonal array is deployed to conduct experiment and to evaluate factor. Multi attribute decision making technique GRA is used to optimize the process .Wear test is performed on the specimens which are filed into circular in shape and of one inch dimension as per the specifications of the wear test machine to obtain the wear rate for a specific time. Read More...
|
Mechanical Engineering |
India |
1090-1097 |
255 |
Analysis of Plates Welded With Stiffeners under Harmonic Loading
-Goutham Chintagunta ; D. Vijay Praveen
In this paper we are going to study the structures of plate with spot welded stiffeners using Ansys(14.5) software under the loading conditions for Harmonic analysis. These structures mainly consists two parts i.e. Upper and lower part which are joint together using spot weld. Spot welding is most preferred and widely used method for joining the metal sheets in automotive and many other industrial assembly operations. The finite element (FE) modelling of plates with spot welded stiffened structures and its Harmonic analysis is research area of this paper. In FEA study, modal analysis method is used to find the natural frequencies of all test structural models. Read More...
|
Mechanical Engineering |
India |
1098-1103 |
256 |
Retrieving Safe Information for Decentralized Fault Tolerant Military Network
-Jeevan J. ; Pushpalatha S.; Vidya Rani H .J; Ramaling Halmandge
Vehicular ad-hoc network are used in variety of application due to its property to adapt to any application requirement. It also has a key advantage than other networks as it provides mobility. It is best suited for applications which are distributed in nature. Mobile node is internet connected device which is in frequent movement hence its attachment to internet changes frequently. Mobile nodes are gaining importance in military application due to this property. Military personals carry the wireless device to communicate with each other and also use to retrieve confidential data by exploiting the external storage nodes. As confidential data is transmitted it must be accessible only for authorized users. This report provides authorization by utilizing (CP-ABE). This technique overcomes the key escrow problem which was found previous approaches. It provides authorization based on attributes. Each military personal is provided a separate key for his region. He can retrieve or send data to his own region and other regions data cannot access by him. Thus provides a reliable transmission of data. Read More...
|
COMPUTER NETWORK ENGINEERING |
India |
1104-1106 |
257 |
Feasibility of Flexible Pavement by use of Plastic
-Mayur Ramesh Pandagre ; Amol Kedar
The utilization of plastic and related materials is expanding exponentially because of huge development in the populace, urbanization and a changed way of life prompts to far reach littering of plastic on the scene. Transfer of waste plastic is a major issue all around because of their non-biodegradability and perilous to human wellbeing, following these is not arranged logically and in this way, make ground and water contamination. In the event that this condemnation of humankind as waste plastic is utilized as a shelter for humankind by utilizing it as added substances as a part of street development, it will end up being a better arrangement over most noticeably bad street conditions. In the present paper systems has been created to utilize plastic waste for development of bituminous streets and adaptable asphalts. As a rule bitumen is utilized as a fastener as a part of street development. Tying properties of this bitumen can be changed by mixing it with waste plastic pieces. It can be utilized for development reason. Waste plastic covered street totals can enhance street quality. This adjusted bitumen blend and totals show better tying property, solidness, thickness and the sky are the limit since they're impervious to water therefore expanding toughness of streets with expanded imperviousness to wear and tear of street. Read More...
|
Civil Engineering |
India |
1107-1110 |
258 |
Efficient Detection of Node Masquerade Attack in WSN Using Centralised Approach
-Amanpreet Kaur ; Dinesh Kumar
Wireless Sensor Networks are consists of number of tiny sensor nodes that are used in monitoring and the tracking systems for the purpose of sensing, communication and computational capabilities. Sensor networks are frequently deployed in an unattended manner, probably exposed to physical attacks and be totally compromised. When a sensor node is captured, it may expose any secret information to attackers. Thus, any security mechanism for sensor networks has to be elastic against node compromise attacks. In this paper we propose a novel technique to detect the node masquerade attack (clone attack) by using rssi values and centralized method. Simulation and performance analysis shows the effectiveness of our solution and also provides a high detection rate. Read More...
|
Computer Science Engineering |
India |
1111-1114 |
259 |
Performance Analysis of Advanced FMIPv6 for Handover Schemes in VANET
-Yogesh ; Sukhvir singh
Vehicular Ad-hoc Network (VANET) is a rising technology. The vehicle in the network uses the wireless medium to interconnect with other vehicles in their radio range. A heterogeneous wireless network (HWN) which is hybrid network of cellular network (having access routers (AR) and Internet Service Providers (ISP) for providing interaction and internet services to the VANET) and VANET. Internet Engineering Task force (IETF) given MIPv4/v6 (Mobile Internet Protocol -version4/6) and FMIPv6 (Fast) as mobility and handover management methods which is standard protocol. An improvement of FMIPv6, a handover management method using concept of tunnelling is simulated in VANET. NS2 is the simulating tool for evaluating performance of advanced FMIPv6 against standard FMIPv6 by seeing the parameters like Tunnelling Performance, Handover Latency, Packet Loss, Signalling Overhead Ratio, Service Disturbance Time, and Network Time. Read More...
|
Computer Science |
India |
1115-1120 |
260 |
The Study on Crack Growth using Extended Finite Element Method
-Bindu.N.Swamy ; Dr. M.N.Hegde
Cracks are small imperfections within a material that are created when it splits apart. These tend to propagate and cause further cracking by creating new surfaces, eventually splitting and causing the material to fail. In the field of Computational fracture mechanics the numerical methods have been employed and regarded as suitable tools to predict the fracture and failure of engineering structures. In the present work Abaqus 6.11 is used for crack analysis which includes crack initiation and propagation resulting in failure and the results are compared with the theoretical values. The Stress Intensity Factor (SIF) which defines the state of stress at the crack tip is used as an important parameter for estimating the life of the cracked structure. The crack growth simulations are presented using two XFEM techniques namely, Virtual crack closure technique (VCCT) and cohesive segments method. Variation of stress intensity factor with different parameters like crack length and crack angle are discussed. Read More...
|
Civil/Structural Engineering |
India |
1121-1125 |
261 |
Design of an Electronic System for Internets of Things (IOT) using Power Line Communication
-Ramveer Singh Rathore ; Rajan Kumar Singh; Nishant Tripathi
This paper,’ Design of an electronic system for Internets Of Things Using Power line communication’ discusses the communication of electronics devices over existing power line system in a building. Power Line Communication (PLC) is a communications method where signals are carried across already existing power lines, rather than through other mediums such as optical fibers or radio waves. PLC has been a very important interdisciplinary topic for power, communications, industrial and automation engineers and researchers since 1980s. The benefits are obvious: valuable additional uses without the need for expensive infrastructure investments. PLC promises to be an enabling home network technology due to its ability to deliver data over existing power lines in homes. The paper aims to thoroughly explore the theoretical and practical aspects of power line communications (PLC) techniques to research and design a working PLC and on/off control system for IOTs. Read More...
|
Electronics and Communication Engineering |
India |
1126-1127 |
262 |
Evaluation of the Strength of Recycled Aggregate Concrete using Artificial Neural Network
-Kavya S P ; Dr. M N Hegde
Recycled Aggregate Concrete (RAC), obtained by replacing Natural Aggregates (NA) with Recycled Aggregates (RA) obtained from different sources is highly complex in nature making it hard to predict the strength and study the performance of RAC. Many researchers have reported alternate statistical or mathematical methods in studying the concrete properties and Artificial Neural Network (ANN) is one such tool. Inspired by the biological neural network, ANN has the ability to learn from past examples, capture highly non-linear relationships and adapt itself to a similar situation effectively. Hence the study aims to determine the 7 day and 28 day compressive strength of RAC with suitable architecture under MATLAB program. In the present investigation 83 sets of data from 10 different published literature sources is used to train, test and validate the network. Here, two separate ANN models were developed for 7 and 28 day strength determination. The major conclusion was that the compressive strength of RAC can be determined with fairly high accuracy using ANN tool avoiding large amount of human effort and time into the experimental work. Read More...
|
Structural Engineering |
India |
1128-1131 |
263 |
Detecting Secure Routing and Malicious Node Detection in DTN Environment
-K.Sangeetha ; Dr. B.Srinivasan
Mobile nodes in military environments like a field of battle or a hostile region area unit there is a possibility to suffer from intermittent network connectivity and frequent partitions. Disruption tolerant network (DTN) technologies are becoming unbeaten solutions that permit wireless devices carried by troopers to converse with one another and access the confidential information or command reliably by exploiting storage device nodes. Some of the most difficult issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. In this proposed work a secure data retrieval scheme using Cluster Zone Partition Scheme for decentralized DTNs background is used where multiple key authorities manage their attributes independently. The proposed method demonstrates how to send the data securely and efficiently and how to manage the confidential data in the disruption tolerant network. Read More...
|
Computer Science |
India |
1132-1135 |
264 |
Evaluation of Microstructure and Mechanical Properties of Dissimilar Aluminum Alloys 6063 And 5083 Joints by FSW
-Goutam Chavan ; Sunil Mangshetty
In this study, aluminum alloy AA6063 and AA5083 plates were joined/welded in butt position by friction stir welding (FSW). The welding process was performed with different process parameters such as tool rotating speed and welding/traverse speed. Then the joints were evaluated by the results from microstructure analysis and mechanical properties such as tensile test and hardness test. The microstructure evolution of the joints was analyzed by optical microscopy on the weld cross sections. Tensile testing is performed on Universal Testing Machine (UTM) and hardness testing is performed on Vickers hardness testing machine. According to the results, the tool rotating speed, welding speed and tool pin profile have major influence on the microstructure and mechanical properties of the FSW joints. Read More...
|
Mechanical Engineering |
India |
1136-1140 |
265 |
Tea Waste as a Low Cost Adsorbent for the Removal of Cu, Fe, Ni Metals
-Priya S. Dhote ; Samir V. Wankhede; Anita Zade; Khushaboo V. Parate
Rapid industrialization has led to increase disposal of heavy metals into the environment. The tremendous increase in use of heavy metals over the past few decades has inevitably resulted in an increased flux of metallic substances in the aquatic environment. There are numerous methods currently employed to remove and recover the metals from our environment and many physico-chemical methods have been proposed for their removal from wastewater. Adsorption is one of the alternatives for such cases and is an effective purification and separation technique used in industry especially in water and wastewater treatments. Cost is an important parameter for comparing the adsorbent materials. Therefore, there is increasing research interest in using alternative low-cost adsorbents. The use of tea waste as the low-cost adsorbents was investigated as a replacement for current costly methods of removing heavy metal ions from aqueous solutions. Experiment results showed that removal of Copper ion by tea waste at optimum condition (60 min. contact time, 0.4g/100mladsorbent dose and 10ppm concentration) is maximum and then for Nickel & Ferrous ion respectively at optimum condition. Read More...
|
Chemical Engineering |
India |
1141-1144 |
266 |
Design and Optimization of Multiband Microstrip Patch Antenna with Defected Ground Structure
-Krishna Kumar Tripathi ; Ashish Garg; Ramayan Pratap Singh
In this paper, we present a fractal shape slot based patch antenna for multiband operations. The fractal shape slot is designed on the rectangular patch and the antenna is fed through a microstrip line. The proposed design and feeding technique allows the antenna to operate at multiple frequencies in the range of 1-8 GHz. The proposed antennas have been modeled, designed and simulated using Computer Simulation Technology (CST) Microwave Studio. It is demonstrated through simulation that the microstrip patch antenna is resonating on frequencies: 2.858 GHz, 3.354 GHz, 4.4981 GHz, 5.583 GHz and 7.335 GHz with return loss of -22.999 dB, -21.0433dB, -11.5568 dB, -12.184 dB and -44.1674 dB respectively. This patch antenna is operating in different. These bands are suitable for WLAN and WiMAX as well as for C Band applications. Parametric study is also included to give an overview for the performance of proposed design. Read More...
|
Electronics Engineering |
India |
1145-1148 |
267 |
Experimental Study and Performance of Spring Back of Metallic Sheet with Various Thicknesses
-Shriganesh Meena ; Prof. A. K. Jain
springback has attempted to be expressed in handbook tables or in springback graphics. But both ways of giving expression to springback. Paper presents new springback graphics for air vee bent sheet metal parts. The developed experimental procedure has two main stages. First, the material identification by means of tensile test has been done. Next, bending tests for several specimens of different thicknesses have been carried out. This paper presents a study of spring-back in the V-bending metal forming process with one clamped end and one free end. Read More...
|
Mechanical Engineering |
India |
1149-1150 |
268 |
Iris Liveness Detection
-Jisha Thampi ; Aswathi B
In recent years, iris recognition is becoming a very active topic in both research and practical applications. However, fake iris is a potential threat; there are potential threats for iris based systems. Iris Liveness Detection presents a classification of genuine and fake iris images based on dense Scale-Invariant Feature Transform (SIFT) and Linear Discriminant Analysis (LDA). Firstly, segmentation of the valid iris texture regions from the original iris images and normalization of the ring-shape iris regions into a unified coordinate system is done. Secondly, dense SIFT descriptors are extracted as the low level features for iris image classification to obtain the common components of texture primitives across different iris images. Then cluster the low level features using k-means and apply LDA for dimensionality reduction which takes advantages of unique dimensionality reduction in features compared to Hierarchical Visual Codebook (HVC). Lastly, Linear Support Vector Machine (SVM) classifier is employed to classify the genuine and fake iris images. Extensive experiments are conducted on a database containing fake and genuine iris images captured by iris devices. Experimental results show that the iris liveness detection can detect fake iris and genuine iris effectively. Read More...
|
Electronics and Communication Engineering |
India |
1151-1153 |
269 |
Hydrodynamic Liquid-Liquid Two-Phase Flow through Horizontal Pipeline
-Samir Wankhede ; Priya Dhote
Flow pattern for water-oil flow in horizontal (inner diameter of 0.6 cm) glass pipe was used. Experiment was based on (1) Study of various flow patterns at different superficial velocity of (water and oil were: 0.28 to 1.467 m/s and 0.24 to1.64 m/s) water-oil immiscible flow using visualization technique. (2) Pressure drop and hold up measurement using manometer. The analysis reveals that homogeneous model suitable for dispersion flow were as bubbly flow pattern is observed batter by drift flux model. In present study stagnant film model and moving film model were used by taking account of velocity of fluid against pressure drop. The stagnant film model was adequate to accurately predict the liquid- liquid slug flow pressure drop having relative error was 3.4 %. Stagnant film model was in good agreement with experimental data with a mean relative error of less than 11%. The purpose of this thesis is to study the behavior of the simultaneous flow of oil and water in horizontal pipes which is common in a diverse range of process industries and particularly in the petroleum industry Read More...
|
Chemical Engineering |
India |
1154-1157 |
270 |
Methodology for Failure Analysis of Car Front Suspension Lower Arm - A Review
-Sushilkumar P.Taksande ; Dr. A.V.Vanalkar
This paper presents the methodology for failure analysis of car front suspension lower arm to study the fatigtue life and to select the suitable materials for the front suspension lower arm.The main objectives of this study to determine critical locations and strain distributions of the component.The paper aims to complete Finite Element Analysis of the front suspension lower arm which consist the stress optimization loadings and analysis for deformation .In this project we first done CAD modeling using PRO-E.In first stage of analysis area of maximum stress was identified. Read More...
|
Mechanical Engineering |
India |
1158-1160 |
271 |
Distance Learning Trends from Researcher Point of View
-Prof. Adarsh Patel ; Prof. Mihir Suthar
This paper aims to help HR Practitioners thinking about the status of research on distance learning. We have done a review of various papers on distance learning and have identified several research areas that are fast emerging. This paper reports those areas. In this paper we also ask question where the research is heading in these particular areas. Read More...
|
Computer Science |
India |
1161-1167 |
272 |
Equivalent Wind Static Load Analysis on Tall Structures
-Shilpa H ; Dr. M N Hegde
Structures are classified into two types rigid and flexible, our part of the study is on tall structures which are more flexible and are susceptible to the vibrations which are caused or induced by wind forces. In the analysis and design of high rise buildings estimation of wind loads and their inter story drifts are the two important things to be considered for the reason that there should be safe living of the inhabitants. Inter storey drift can be controlled through suitable structural system. The present study involves the study of calculation of wind displacements and its inter storey drifts using equivalent static analysis for forty storey building and results are compared with respect to various wind speeds .Also analysis is carried out for static and gust pressure comparision,as well as base shear calculations. Structure is analyzed using fem analysis with wind load calculated by static method as per IS-875partIII 1987 with and without shear walls. Read More...
|
Civil Engineering |
India |
1168-1174 |
273 |
Designing and Performance Analysis of Canonic Signed Digit Filters
-Apurva Gupta
In this paper, design and performance analysis of canonic signed digit (CSD) filters on the aspect of power consumption, area required, hardware complexity and speed of the filters which can be easily implemented in hardware applications especially for wireless communication applications where higher order filters are often required to meet the channel attenuation specifications. The expected results of this study will show reduction in power consumption upto 33% than the binary representation of the filters when implemented using the SIMULINK software which increases the efficiency of the filters. Also, results show reduction in area required to design filters when implemented on the FPGA kit and therefore, hardware complexity will reduced to a great extent. Read More...
|
Electronics & Communication Engineering |
India |
1175-1177 |
274 |
Analysis on AGC of Interconnected Power System using Integral Controller
-Munish Jindal ; Gaurav Gangil
The algorithm to find the optimal location of STATCOM based on particle swarm optimization (PSO) has been developed. The effect of this device on line flows and bus voltage profile has been studied by Newton-Rapshon method placing STATCOM at random location and placing them optimally with optimal ratings dictated by PSO. The effectiveness of developed algorithm has been tested on IEEE 14 bus and IEEE 30 bus systems using MATLAB 7.1.0 software. The results obtained are quite encouraging and will be useful in electrical restructuring. Read More...
|
Power System |
India |
1178-1181 |
275 |
Scheduling of FMS using Intelligent Heuristic Search Algorithm (IHSA)
-Gulab Singh ; Swati Gangwar
Flexible manufacturing system (FMS) is a production system. A flexible manufacturing system (FMS) is an arrangement of machines interconnected by a transport system. The transporter carries work to the machines on pallets or other interface units so that work-machine registration is accurate, rapid and automatic. This article presents a intelligent heuristic search algorithm (IHSA) for solving flow-shop problems with three machines and three jobs. Following its initial development the algorithm has been modified in two different ways in order to reduce backtracking and to improve its performance. The first modification concerns the choice of the largest heuristic functions to use, and the second modification concerns the way in which heuristic estimates at nodes on the search path are determined as the search progresses. Experimental evidence of the improved performance of the algorithm as a result of each of these modifications is presented. Read More...
|
mechanical engineering |
India |
1182-1185 |
276 |
Securing Data in Cloud through Data Sharing and Deduplication
-Maregowda R ; Mahesh N
Cloud computing provides a set of resources and services offered through the Internet. Cloud service providers are delivering the service from data centers located throughout the world and providing virtual resources via internet. This services can be divided into 3 categories: IaaS, PaaS and SaaS. User’s information is stored in the cloud globally. In cloud information storage framework, users store their information in the cloud and won’t really have the information locally. Client's information is typically prepared remotely in obscure machines that clients don't possess or operate. In this paper influence the JAR programmable capacities to make a dynamic and traveling item, and to guarantee that any access to clients' information will trigger confirmation and generate the JAR locally. To make stronger client's control, likewise give appropriated reviewing components. In addition to this a privacy protection technique by name is proposed. This paper also introduces a structure for distributed accountability and reviewing, which is utilized to secure client's information and also tracking the actual usage of information in the cloud. Specifically in this paper, a logging mechanism is accommodated to provide the client's information with access policies, and guarantees that any access to their information will trigger confirmation, by this system data owner may know his/her information is taken care of according to his access policies. Information deduplication is one of important data compression strategies for eliminating with duplicates copies in the cloud storage to decrease the amount of storage space. To ensure the confidentiality of sensitive information while supporting deduplication, the convergent encryption strategy has been proposed to encrypt the information before outsourcing. To better information security, this paper addresses the issues of approved information deduplication. Read More...
|
Computer science and engineering |
India |
1186-1189 |
277 |
Effectiveness of Planned Teaching Programme on Knowledge of Nurses Regarding Care of Acute Head Injury Patients
-Mrs. Nutan Makasare ; Mr. Prakash Makasare
Head injury is the leading cause of long term disability among children and young adults and the number of people surviving it with impairment has increased significantly in recent years. This has led to a call for nurses’ skill in trauma and rehabilitation, especially in acute phase. This study was undertaken to assess the effect of planned teaching programme on knowledge of nurses regarding care of acute head injury patients. Objectives: To assess the pre test and post test knowledge score of nurses in providing care to patients with acute head injury, to determine the effectiveness of planned teaching programme in providing care to patients with acute head injury and to find the association between pre test knowledge score with selected sociodemographic variables of nurses. Research methodology: A pre-experimental one group pre-test and post-test research design was selected for the study and non probability convenient sampling technique was used to select 60 staff nurses. A structured knowledge questionnaire was used to evaluate the knowledge level on acute care of head injury patients before and after the Planned Teaching Programme. The collected data were analyzed with chi-square and t test. Findings: The result showed the significant difference suggesting that the Planned Teaching Programme was effective in increasing the knowledge of the staff nurses (t = 20.94). There was highly significant (P<0.01) association between the knowledge of the nurses regarding care of acute head injury patients and selected sociodemographic variables like professional qualification, total clinical experience and area of work. Conclusion: The study concluded that developed Planned Teaching Programme (PTP) was effective in improving the knowledge of nurses regarding care of acute head injury patients. Read More...
|
Medical Surgical Nursing |
India |
1190-1194 |
278 |
Parametric Optimization of PMEDM Process using Graphite Powder Mixed Dielectric
-Avinash Singh ; Swati Gangwar
In this research paper, an experimental study was performed to study the effect of graphite powder- mixed mineral oil EDM (PMEDM) on Material Removal Rate (MRR) and Tool Wear Rate (TWR). Current, duty cycle, pulse on time and concentration of graphite powder have been selected as input parameters. Central composite rotatable design of experiments has been used to conduct the experiments. Comparison graphs were drawn to confirm the effect of input variables on the output parameters. Optimization procedure has been performed using Response Surface Methodology to select the best possible combination of input parameters which maximize MRR and minimize TWR. Read More...
|
Mechanical Engineering |
India |
1195-1198 |
279 |
Integrated Approach for Supplier Selection using AHP and MACBETH Method
-Vikram Singh ; Nitesh Asthana
This paper presents the integrated approach using AHP and MACBETH method to develop a decision making model to select the best supplier. Now a day, in an extremely competitive environment. Supplier selection plays a vital role in the success of any manufacturing or production organization. Selection of suitable supplier is a multi-criterion problem having both quantitative and qualitative criteria. In this paper, we develop a methodology which helps in ranking of supplier. In this study I have consider most important criteria which is quality, service, delay time and cost .in this study weights calculation for each criterion is based on analytic hierarchy process(AHP) and after that these weights are used in measuring attractiveness by a categorical-based evaluation technique (Macbeth) method for ranking. Read More...
|
Mechanical Engineering |
India |
1199-1204 |
280 |
Applications of Information Technology in Human Resource Management: A Study of Indian Organizations
-Chakravarthy V. ; Dr. R.Siva Rama Prasad
Organizations are facing many challenges in present scenario like globalization and technological advances and the need to restructure human resource management. The present paper begins by stating the necessity of introducing information technology (IT) in the field of human resource management (HRM). Information technology plays a key role in human resource management. IT transforms the architecture of organizations, business processes and is increasingly integrated into human resource management. This paper also presents different applications of IT in the field of HRM. Further, a survey was conducted among 317 organizations in India. The results indicated that some applications of IT are independent of type of organizations while some are dependent. Read More...
|
Human Resource Management and Technology |
India |
1205-1208 |
281 |
Analytical Analysis on Reinforced Concrete Beam Strengthened by FRP Laminate using ANSYS
-Shweta S.Shetty ; Prof. Kiran M. Malipatil
In this paper analytical analysis has been carried out on Reinforced Concrete beam strengthen by Glass Fiber Reinforced Polymer (GFRP) laminate using ANSYS software. Effect of width of the beam and thickness of Fiber Reinforced Polymer FRP laminate are the parameters used to study the behavior of the beam. Four full span 3D beam specimens were modeled. One among these models is Reinforced Concrete beam and other three are RCC beams with FRP laminate. Load versus deflection and variation of stress intensity has been studied in this paper. Read More...
|
Structural Engineering |
India |
1209-1212 |
282 |
Push over Analysis on Existing Bridge
-Abdul Raheem ; Amaresh S Patil
The aim of the project is to carry out a seismic evaluation case study for an existing RC bridge using nonlinear static (pushover) analysis and study the loads and load combination. An existing reinforced cement concrete T-beam bridge was evaluated using inelastic analysis procedures namely modal pushover procedure (MPA). MPA was performed in both the transverse and longitudinal directions of the bridge structure independently. The capacity curves that represent the response of the bridge in transverse and longitudinal directions for the particular modes of the vibration are generated using MPA. In present study a 20 span RC T Beam Bridge situated at SH-10 in Karnataka is taken as case study. The bridge is modeled in SAP 2000 software by defining FEMA 356 Auto hinges and conducted Nonlinear Static (Pushover) Analysis using ATC 40 Capacity Spectrum Method. Read More...
|
Structural Engineering |
India |
1213-1217 |
283 |
Analytical Calculations for the Hydraulic Ram Pump using Average Head Losses
-Piyush B. Shende ; Dr. S. K. Choudhary; A.P.Ninawe
This paper presents the analytical calculations for the hydraulic ram pump using the average head losses. The study specifies that head losses includes while doing the sample calculations affects on the output results of the ram. These are based on a systematic study of hydraulic ram pump and testing of on hydraulic ramp pump model. For which we consider literatures reviews & some of them are used for the analytical calculations. Read More...
|
Mechanical Engineering |
India |
1218-1219 |
284 |
Comparison of Moment Resisting, Concentrically Braced & Eccentrically Braced Steel Frames
-Shahnawaz Ansari ; Prof. Juned Raheem
Moment resisting frames, concentrically Braced frames & eccentrically braced frames are three most common seismic force resisting systems used in framed structure. These frames are comparatively effective as lateral force resisting system which is developed to resist seismic actions in a conventional manner. Appropriately detailed and designed seismic lateral force resisting frames behave in a ductile manner by the means of shear or flexural. This ductile yielding gives wide, excellent energy dissipation, balanced hysteresis loops, which is necessary for major lateral forces. This report shows the assessment of the behaviour of Moment resisting frames, concentrically braced frames & eccentrically braced frames and also describes their seismic response to different seismic conditions & parameters so that optimum weight of structure between these three for same seismic conditions can be determined. Read More...
|
Structural Engineering |
India |
1220-1222 |
285 |
Stress Smoothing Along Polygonal Boundaries
-Premanand Shenoy ; K S Babunarayan ; Katta Venkataramana
Finite Element Analysis applied to Solid Mechanics problems, leads to uniform Stresses to be throughout the element. This results in disparities at the intersection of elements along the edges and at nodes connecting a number of elements. Hence a smoothing technique is required to arrive at an appropriate stress value which could be obtained from those values in the vicinity, within certain accepted levels of accuracy. Moving Least Square Method with Moving Polynomial formulation has been conceptualized here to smoothen the stress values along the boundary of an area of influence of a node connecting a number of elements in a typical 2D elastic problem. Its utility to find the stresses at Gauss points along the boundary is illustrated and its applicability in interpolation is studied. Read More...
|
Structural Engineering |
India |
1223-1227 |
286 |
Parametric Optimization for Tensile Strength and Hardness of Mig Welded Joint of Dissimilar Metals using Taguchi Technique
-Gagandeep Singh ; Dr. S. K Jarial
Metal Inert Gas Welding (MIG) process is an important welding operation for joining ferrous and non-ferrous metals. The MIG input welding parameters are the most important factors affecting the quality of Welding. This paper presents the effect of welding parameters like welding voltage, gas flow rate and root gap on tensile strength and hardness of dissimilar metals during welding. A plan of experiments based on Taguchi technique has been plan the experiment, acquire the data and to optimize the welding parameters as well as the process. Design of experiments using orthogonal array is employed to develop the weldments. The input variables considered here include welding voltage, gas flow rate and root gap. A total number of 9 experiments runs were conducted using an L9 orthogonal array, and the ideal combination of controllable factor levels was determined for the tensile and hardness to calculate the signal-to-noise ratio. After collecting the data signal-to-noise (S/N) ratios were conducted and used in order to obtain optimum levels for every input parameter. Subsequently, using analysis of variance (ANOVA) the significant coefficients of each input parameter on tensile strength and Hardness were determined and validated. Read More...
|
Mechanical Engineering |
India |
1228-1233 |
287 |
Energy Efficient Routing In manet
-Rakhi Vasake ; Prof. S B Takale; Dr. S D Lokhande
This paper introduces the concept of Cluster based Ad-Hoc On Demand Distance Vector Routing protocol (CAODV) in Mobile Ad-hoc Networks (MANET). Energy perseverance is the main parameter to be considered in MANET. In our proposed work, attempt is made to achieve energy efficiency by clustering and hybrid routing. The MANET is first divided into clusters and then cluster head is elected such that its energy level and signal strength is maintained above some pre-defined threshold value. The head selection and its maintenance is done using the Signal and Energy Efficient Clustering (SEEC) algorithm. Once head is selected, routing is carried out such that inter cluster routing is done using reactive protocol, whereas intra cluster communication takes place using proactive protocol. Considerable energy efficiency can be achieved using clustering and hybrid routing. Read More...
|
electronics and telecommunication engineering |
India |
1234-1238 |
288 |
Text and Texture Extraction for Various Images using Combinational Methods
-Kusum Jonwal ; Jyoti Mahodia
Text data contains useful information for automatic explanation, indexing, and structuring of images. The typical low-level features that are extracted in images and video include measures of color, texture, or shape. Extraction of this information involves detection, localization, tracking, extraction, enhancement, and recognition of the text from a given image. The objective of this paper is to compare three basic approaches of text and texture extraction in natural images namely; edge-based , connected-component based and text based method . The edge based and connected component based method shows how to extract text from an image whereas the text extraction method shows how to extract texture information from an image here creating a GLCM, and then extracting statistical measures from this matrix. Further, the image entropy and energies are also computed in order to correlate the skin symptoms to the skin texture images. Read More...
|
ELECTRONICS AND INSTRUMENTATION ENGINEERING |
India |
1239-1242 |
289 |
A Survey on Digital Image Compression Techniques
-Jyoti Ghangas ; Ritu Sharma
In this paper basic of image compression and various image compression techniques are explained. It also highlights the advantages of various image compression techniques. In this paper two image compression techniques: lossy compression and lossless compression are highlighted. Image compression is the process to reduce the amount of data that is required to store a digital image. An image can be compressed in various ways depending upon the application of image. In this paper, we present a comprehensive survey on various digital image compression techniques. Read More...
|
Electronics And Comm. Engg. |
India |
1243-1245 |
290 |
An Approach to Maintain and Ensure the Consistency of Data in Multi Cloud Storage
-Udaya Theja. V ; Rajshekhar Ghogge; Sangamesh
The protection of data stored on infrastructure provided by third party organization has been an important role for the service providers to store the data and provide security .Not only providing security is a role of the provider but also recovering from the attack i.e. Recovering from the errors occurred to the data which is a critical part for the provider Method to recover from the errors is done through regenerating the code. The data encryption and decryption of data in order to avoid attacks and minimize the repair traffic is done in the user side only. The integrity of data is maintained through generating the MAC for each part of the code. The MAC is verified when the remote user requires the data. The verification of the MAC will play an important role remotely during a failure recovery. There will be a guaranty the data will be available to the user at all time. In this project the data is encrypted and it passed on to the trustee the trustee will divide the data into equal parts and generate the MAC for each part of the data. Then different parts of data are stored in different set of cloud servers which will be later downloaded by the user, example like in RAID level 6. If there is any attack like modifying the data or deleting a file from cloud server the data will be regenerated from the remaining cloud and single whole file of data is generated by the trustee and it will be available to the user based on the secret key provided by the user. Read More...
|
COMPUTER NETWORK ENGINEERING |
India |
1246-1250 |
291 |
Resource Sharable Social Compute Cloud via Social Networks
-Vikas Laxman Ghorade ; Satish B Basapur; Surendrababu M S
Communication and interaction between people is today rapidly changed by social network platforms. Establishment and participation in digital communities is enabled by social networks and also representing, documenting and exploring the social relationships. Users can share their own services, resources and data easily by apps. A social compute cloud is presented in this report to substantiate above mentioned things. A social compute cloud means where the cloud infrastructure is provisioned through “friend†relationships. Resource owner offer virtualized containers on their smart devices or personal computers to their social network in a social compute cloud. In simulation it can be seen how users may or may not wish to share their resources based on their complex preferences and also observed that how effectively users can share their resources within the social community. This report demonstrates how a social compute cloud infrastructures can be constructed using social networks and also how resources are shared between users. Read More...
|
COMPUTER NETWORK ENGINEERING |
India |
1251-1254 |
292 |
An Optimized Method for Securing Data Stored In Cloud using Decentralized Access Control Mechanism
-Sunil Kumar. B.K ; Dr. Shylaja B S
A new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user’s identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage overheads are comparable to centralized approaches. Read More...
|
COMPUTER NETWORK ENGINEERING |
India |
1255-1257 |
293 |
Modelling of Photovoltaic Module Including Nonlinearities
-Rahul Nehra ; Prof. Loveleen Kaur
With ever increasing use of renewable energy the photovoltaics are getting popular by leaps and bounds. But the unpredictable and fluctuating nature of photovoltaic power requires a careful design and analysis. A five parameter single diode model of PV modules has been implemented using Matlab script as well as Simulink As the parameters of module vary with different operating conditions, their effect on maximum power point is considered separately. Read More...
|
Electrical Engineering |
India |
1258-1262 |
294 |
Artifacts and Antiforensic Noise Removal in JPEG Compression
-Bismitha N ; Anup Chandrahasan
The JPEG stands for “Joint Photographic Expert Group†and, as its name suggests, was specifically developed for storing photographic images. The compression is usually lossy process. The original image can’t be restored completely from the compressed object. There are a lot of works held to regain original image without any loss. The aim of this work is to improve the quality of the image by adding anti-forensic noise removal technique to the artifacts removed image. The dither algorithm is used to remove anti-forensic noise. In this paper, each block from 8x8 blocks divided into m patches. Every column in dictionary is taken as an atom. So the obtained matrix is given to next section and form DC transform matrix. The de-quantized result is scanned to minimize total variation and the obtained image will be in artifacts removed manner. Eventually, to improve the quality of the image dither algorithm is used. The different images are used to demonstrate the improved quality of the image and also measured the PSNR and SSIM. Read More...
|
Electronics and communication |
India |
1263-1267 |
295 |
Investigation the Impact of Municipal Solid Waste on Sub Surface Environment
-Pradeep T. Kumawat ; U. P. Naik
The purpose of this work is to study the impact of Municipal Solid Waste on sub surface environment. Municipal solid waste landfill represents significant threat to ground water and sub-surface soil. The leachate percolating through soil up to ground water table through voids between sub soils and significantly contaminates it. To study and analyze the possible impact of leachate percolation on soil properties and ground water quality. Soil samples and Ground water samples are collected from various areas of nashik landfill sites, where large concentrations of municipal solid waste are dumped. The physical parameters of these collected samples such as, specific gravity, Maximum dry density (MDD), Optimum moisture content (OMC), Permeability and Consistency limits for soil sample and pH, Total dissolve solid (TDS), Hardness, Total solid (TS), and Alkalinity for ground water samples are studied. It has been found that most of the parameters of soil and water are affected because of municipal solid waste and leachate. Here based upon experimental values suggested the some preventive measure to minimize the pollution of sub soil and ground water. Read More...
|
Civil Engineering |
India |
1268-1272 |
296 |
IoT Technologies and Strategies to Attain Competitive Benefit
-Dr. Snehalkumar H Mistry
The Internet of Things (IoT) bridges the cyber and the physical worlds. The resulting ’cyber physical systems’ are poised to disrupt many businesses and bring computation seamlessly into our everyday lives. However, today the IoT landscape looks fragmented, with disparate devices, information, and platforms from a range of vendors. This threatens to lock down the realization of value from the IoT. Interoperability holds the key. This paper demonstrates the need for such a platform, and how organizations can use it to offer new services or improve their operations. Read More...
|
Infotmation TEchnology and Maangement |
India |
1273-1277 |
297 |
Speaker Recognition: Feature Extraction using MFCC and Classification using GMM
-Suchitha T R ; Bindu A Thomas
Speech processing is emerged as one of the important application area of digital signal processing. Various fields for research in speech processing are speech recognition, speaker recognition, speech synthesis, speech coding etc. The objective of automatic speaker recognition is to extract, characterize and recognize the information about speaker identity. Feature extraction is the first step for speaker recognition. Many algorithms are suggested/ developed by the researchers for feature extraction and for feature matching. In this work, the Mel Frequency Cepstrum Coefficient (MFCC) feature has been used for designing a text dependent/independent speaker identification system. The individual Gaussian component of Gaussian Mixture Model (GMM) represents vocal tract configurations that are effective for speaker identification. Gaussian Mixture Modeling(GMM) algorithms are used for generating template and feature matching purpose. Read More...
|
Speech Processing |
India |
1278-1283 |
298 |
Linked Allocation of Data with Various Algorithms and Future Applications
-Vinay Ashokbhai Soni
This paper will give you the basic understanding for studying Linked Data structure and its algorithms with future applications in various fields. Read More...
|
Computer Engineering |
India |
1284-1285 |
299 |
Seismic Analysis of RC Building Frames with Different Types of Steel Bracing using Different Steel Section
-Shachindra Kumar Chadhar ; Dr. Abhay Sharma
Steel bracing system is one of the very efficient lateral load resisting system for multistory buildings. Steel bracings are generally used in steel structures to resist lateral forces, this concept is extended to RC buildings. Bracing members are subjected to compression and tension, hence they are provided to take these forces. Steel bracing system increase the stiffness and stability of the RC multistory building and decrease there deformation. Present study based on seismic analysis of RC building frames with different types of steel bracings provided externally and internally in the building using three different steel section for bracing members. For this study, a fifteen storey building assumed to be located at seismic zone IV as per IS: 1893-2002. Four types of bracings (X type, V type, inverted V type and diagonal type) are provided on two different location in the building and for these bracing members, three steel section ISA, ISMC and ISMB are used by considering same cross-sectional area. StaadproV8i computer software is used for structural modeling and analysis work. Results are in terms of following seismic parameters-bending moment, shear force, storey displacement and storey drift, which are compared with bare frame model. Results shows that steel bracings increase the stiffness and stability of the RC building as compared to bare frame model. From which X-type and inverted V type bracing shows better result than other type of bracing system. Location of these bracing members in the structure also effects the behavior of the RC building frame under seismic forces. Read More...
|
Civil Engineering |
India |
1286-1289 |
300 |
Abandoned and Removed Object Detection in a Video- An Overview
-Divya Maheshwari ; Dr. S. R. Gengaje
The proposed work focuses on design and implementation of a general framework for detecting abandoned and removed objects in videos. The major steps in the proposed work involves foreground pixel detection based on suitable background modeling, foreground object formation and detecting abandoned and removed foreground objects based on suitable features. The proposed work will be simulated using MATLAB and Tool Boxes and will be validated using standard videos available on internet. Read More...
|
Electronics Engineering |
India |
1290-1291 |