No. |
Title and Author |
Area |
Country |
Page |
201 |
Comparison of Multiplexer Based Pseudo-Carry Compensation Truncated Multiplier with Standard Multiplier
-Sunil M ; Abhilash K G; Harish B
The conventional multipliers consume more power and area and causes more delay in the system. To overcome these problems, truncated multipliers is applied where it consumes less area, power and delay. But in Truncated multiplier probability of error is more due to truncation of LSP’s, hence compensation circuit need to be added to overcome the probability of error. In this project work Pseudo-carry compensation truncation scheme is implemented where compensation circuit is added to regular truncated multipliers. The proposed PCT multiplier is compared with the conventional multipliers like Braun multipliers, Vedic multipliers, and Booth multiplier and the result is analyzed. The PCT multiplier can be used in the field of Image processing, Digital signal processing Digital communication etc. Read More...
|
Electronics and Communication |
India |
857-860 |
202 |
Velocity Adaptive Handover Scheme for Mobile Wi- max
-Sneha Bhardwaj ; Seema Sabharwal
Mobile WiMAX is a wireless technology that is support by IEEE802.16e for broadband wireless access. In wireless communication system, mobility is the vital feature. Due to mobility, there is the need of handover. Handover occurs when a mobile station (MS) move about from a serving base station (SBS) to another base station (BS). Hard handover is defined as obligatory and the soft handover is not obligatory. There is delay in mobile communication because data transmission should suspend. Due to handover delay, there is severe degradation in system performance when implemented in real-time applications like VoIP. The existing standard considers only the received signal strength that decides when handover occur. Though, there is velocity factor that has an important influence on handover initiation as well and cannot be neglected. To handle these types of issues, this article suggests a velocity-adaptive handover scheme. This scheme adopts dynamic handover threshold according to different velocity that shrink handover delay and boost the network resource utilization. The simulation outcome and performance analysis validate the efficiency of the proposed scheme..The proposed scenario has been implemented using Qualnet network simulator and results shows that the proposed mechanism that reduce handover delay. Read More...
|
Computer Engineering |
India |
861-863 |
203 |
A Review Paper on Theoretical & Experimental Investigations of a Biogas Engine Technology
-Ragadia Sadiq Y ; Dr. Rajesh C Iyer
The gradual reduction of the petroleum reserves and increase of pollutant emissions have demanded the development of alternative and renewable energy sources which can help to reduce the current oil dependency in the field of Internal combustion engine(ICE). Utilization of natural gas in I.C. engine is an option to overcome some problems and various renewable energy sources are also available to overcome this energy crisis and biogas is an option for that and it is obtained from renewable sources. Biogas can be used in internal combustion (IC) engines, because of its better mixing ability with air and clean burning nature. It can be a supplemented to liquefied petroleum gas (LPG) and compressed natural gas (CNG), if it is used in compressed form in cylinders. Lower hydrocarbon (HC), smoke and particulates emission has been reported in diesel engines operating on biogas diesel dual fuel mode. The paper reviews on significance of compression ratio, effect of concentration of methane in biogas engine, significance of ignition voltage and piston crown geometry on performance of biogas engine and its validation by CFD analysis. Read More...
|
Mechanical Engineering |
India |
864-869 |
204 |
An Approach to Cluster Uncertain Data Objects Using Voronoi Diagram and Indexing
-Maahi A. Talreja ; Sheetal Rathi
Recently, the clustering of uncertain data became a hot topic in data mining since more and more applications, such as sensor database, location database, biometric information systems produce vague and imprecise data. Though, there exist lots of approaches to classify the uncertain data by hard classifiers, few of them address the classification of the uncertain data by soft classifiers. In this approach,apply K-Means algorithm to generate the clusters. It is an unsupervised clustering algorithm. It uses simple and easy way to cluster the dataset. This clustering algorithm uses the Expected Distance (ED) to compute the distance between objects and cluster representatives. The expected distance calculations are the performance bottleneck of the algorithms. Also it is an iterative algorithm which generate clusters until the centroids no longer moves. To improve the performance of K-Means, there has been tried an effective technique called Voronoi Diagrams from Computational Geometry. This technique works efficiently but provides erroneous uncertain clustering and takes longer time. To increase time efficiency effective indexing must be integrated in this. To incorporate indexing we introduced a naive indexing technique over these uncertain data objects, so that it reduces the computational cost. Hence, approach of integrating K-Means, Voronoi diagram and indexing applied over uncertain data objects generates imposing outcome when compared with the accessible methods. Therefore proposed approaches can efficiently optimize clustering algorithm, reduce the corresponding searching space and improve the performance on uncertain data clustering. Read More...
|
Computer Engineering |
India |
870-872 |
205 |
Detection and Prevention of Selfish Node Attack in MANET
-Nikunjkumar H. Varnagar ; Amit M. Lathigara
Mobile ad hoc network is self-designing, autonomous, without any centralize node and lacking of the fixed infrastructure network. Mobile nodes are depending on other nodes for transmitting data. Mobile ad hoc network has expected that all nodes are cooperating with each other. Anyhow, some nodes are not cooperating and saving their resources for own use, these nodes are termed as a selfish node. Behaviour of selfishness performance of network reduces. In this paper, define behaviour of selfish node, different techniques are used to identify selfish node attack and prevention of a selfish node attack in MANET. With the help of watchdog technique selfish node attack can detect and using proposed approach prevention of a selfish node attack is possible and network performance improves. Read More...
|
Computer Engineering |
India |
873-876 |
206 |
Optimizing Document Annotation Facilitating using Web Search Index Support
-Sini A J ; Jibin Philip
Now a days, the text files contains relevant amount of information, may be in the structured data or unstructured data .The unstructured text, information searching is very difficult process. Propose an alternative method for the generation of the structured data. Specified documents are contain information of interest and this information is going to be useful for querying the database. Here users are upload the information contain document, information retrieval is very easy. For more information about the data the web links also available. Read More...
|
Computer Science and Engineering |
India |
877-878 |
207 |
A Compact Multiple Patch Slotted MICROSTRIP Patch Antenna for Wi-Max Application
-Utkarsh Pandey ; Rajan Mishra
A new and improved approach for the design of a compact multi-element patch antenna which works in pent band is proposed. Antenna comprises of a main patch with sub patches containing resonating slots. Main patch is fed with a 50Ω microstrip line and proposed antenna operates with multiple operational frequencies covering the bands from 2 GHz to 6 GHz with good impedance matching. Proposed design is verified using simulation software ANSOFT HFSS and tested using the laboratory experimental approach that looks like the simulated output with omnidirectional radiation characteristics. The antenna consists of a main radiator patch, defected ground plane and four slotted sub patches to generate five frequency bands, at 2.55, 3.60, 4.00, 4.85 and 5.60. These frequency bands are respectively 150, 100, 110, 140 and 80 MHz wide. For verification of simulation results, both designs are fabricated and the prototypes are measured. MSA is fabricated with substrate FR4 and overall dimension of 50×50×1.57mm3. Read More...
|
RESEARCH SCHOLAR AT MMMUT, GORAKHPUR UTTAR PRADESH |
India |
879-882 |
208 |
A Review of Different Biometric Technologies
-Nishu Rani ; Rajan Sachdeva
A single form of biometric information cannot fulfil user’s expectations and may suffer from intra and inter class variations, noisy sensor data and continuous spoof attacks. To overcome these problems, multimodal biometric system is used. There are different biometric technologies like face, fingerprint, speech, signature, palm-print, iris, ear, DNA, gait etc. To fuse these technologies, there are different fusion levels. This paper presents different biometric technologies and different fusion levels to fuse the modalities. Read More...
|
Computer Science Engineering |
India |
883-885 |
209 |
Feature Level Fusion for Biometric System: Review
-Rajnish Rani ; Rajan Sachdeva
Person’s identification is important in daily life. So, biometric systems are used for identification. There are different types of biometric system like face, fingerprint, speech, signature, palm-print, iris etc which have different feature points. These feature points are used for person’s identification. This paper presents different feature extraction techniques to extract these feature points and feature reduction techniques to remove the irrelevant feature points with objective of provides better recognition performances. Read More...
|
Computer Science Engineering |
India |
886-888 |
210 |
Analysis of the Compressive Strength of a Brick Formed From Industrial Waste (Red Mud)
-Indu Bala Singh ; S M Ali Jawaid
Red mud materialize as the major waste material during fabrication of alumina from bauxite by the Bayer’s process. It consist of oxides of iron aluminium, silica and titanium, along with some other minor constituents. In the present analysis experimental study was conduct for progress of brick using red mud. Red mud brick of different trial mix were produced at the kiln and test were conducted to find the properties of red mud brick properties found from tests were compare with the properties of ordinary bricks. It is found from the study that a red mud brick shows better performance than ordinary brick. As red mud bricks are eco-friendly & economical they defend the environment also. Compressive strength of red mud bricks are more as compound to ordinary bricks. Clay was Replaced with red mud at 70%, 60% and 50% for obtaining an optimum percentage. Read More...
|
Civil Engineering |
India |
889-893 |
211 |
A Classification via Clustering Approach for Enhancing the Prediction Accuracy of Erythemato-Squamous (Dermatology) Diseases
-J.Priyadharshini
Identification of various erythemato-squamous diseases is a tangible problem in dermatology. Since, they all share the clinical features of erythema and scaling, only with very slight variances. The diseases in this group include seboreic dermatitis, cronic dermatitis, lichen planus, pityriasis rubra pilaris, pityriasis rosea and psoriasis. Generally a biopsy is required for the analysis but unfortunately these diseases share similar histopathological features as well. Another problem in the differential diagnosis is that a disease show the same feature of another disease at the initial stage and can only be characterized at the subsequent stages. Patients are clinically evaluated with 12 features at the beginning stage and then the skin samples are considered for the evaluation of 22 histopathological features. The data of the histopathological features are determined by an analysis of the samples under a microscope. This paper presents a predictive model of dermatological diseases by thoroughly analyzing both the clinical and histopathological features. Read More...
|
Computer Science |
India |
894-898 |
212 |
Interpath Interference Minimized Multipath Routing in Wireless Sensor Networks for Multiple Source and Destinationpairs
-K.Bhagya Laxmi ; J.Samatha
WSN provide high-quality information to be deployed. In which WSN are supported by high-bandwidth backbone networks. Even though bottleneck due to the low-rate radios used and the effect of wireless interferences have been eliminated with the help of Interference minimized multipath routing(I2MR) protocol and congestion control scheme still the problem of inter path set interference between the different source and destination pairs is not resolved. In order to implement this, the source and destination pairs to be suitably spaced out. The RI2MR protocol resolves this problem by selecting one path (which is currently free) out of three zone-disjoint paths between a pair of source and destinations. Read More...
|
Computer Science & Engineering |
India |
899-901 |
213 |
Calibration of Force Transducers
-Dharmendra Kumar Dubey ; Manoj Kumar; Dr. R. L. Yadav
Force transducers are very vital in various engineering applications and have applications in various applications like thrust measurement, weighing scales, cutting force measurement, and material testing machines. Calibration of force transducers is a concern and there is need of discussion of well documented procedure for calibration of force transducers, which will enable the readers to have better understanding of the calibration procedure of force transducers. The paper presents the calibration procedure according to the standard ISO 376-2011, with details of different factors contributing to the uncertainty of measurement of force transducers. Calculations of relative uncertainty due to different factors have been discussed with suitable example. The paper further discusses the comparison of the different relative uncertainty factors in case of analogue and digital force transducers. Read More...
|
Mechanical Engineering |
India |
902-904 |
214 |
Development of Automatic Clamping and Ejection System for Gravity Die Casting
-Kawaljit Singh Randhawa
During the pouring of molten metal into the mould clamping is required as the force on the top cover of the mould try to move up the cover & the clamp already in use are manually operated so there are chances of error during the operation and chances of leakage of molten metal. Read More...
|
Mechanical Engineering |
India |
905-908 |
215 |
Design of a Multiband Meandered Antenna using Defected Ground Structure
-Chandrakesh Kumar ; Rajan Mishra
in this paper, Design of a multiband meander line antenna using defected ground plane is designed for four-band communication system. The proposed antenna has impedance bandwidth of 29.17%(1.4 -2.1 GHz), 18.75%(3.6-4.03 GHz), 12.5%(4.3-4.65 GHz) and 16.6%(5.2-5.8 GHz) at center frequency 1.8 GHz, 3.75 GHz, 4.4 GHz, 5.6 GHz, with gain of 2.83dB, 8.386dB, 3.871dB, and 3.08dB. High gain of 8.386dB is achieved at center frequency 3.75GHz which is applicable for S band radar application and satellite application. The proposed antenna is designed on a single layer substrate FR4_epoxy with defected ground plane. Antenna is designed and simulated using HFSS v 11 software. Read More...
|
Electronics and Communication Engineering |
India |
909-912 |
216 |
Unmasking the Computing Time to Detect Lung Cancer
-M.Saranyakala
Cancer is the most important cause of death for both humans. High accuracy in cancer prediction is important to improve the quality of the treatment and to improve the rate of survivability of patients. Lung cancer is an incurable disease, but there is highly feasibility for the patient to be cured if he or she is correctly diagnosed in early stage of his or her case. Ratification of many death caused by lung cancer in every year report has been adopted in World Health Organization (WHO). The previous method of cancer unmasking can be utilized to heal the disease completely. Thus, analysis is necessary for the techniques that are utilized in the gene classification process. Classification is very important part of data analysis for Lung cancer prediction. In this paper contains filtering the cancer data to classify the mostly infected cell. The Lung Cancer anticipates by distinct Algorithms. The goal here is to determine the aim of patient segments where average survival is significantly higher/ lower than average survival across the entire dataset by using the Artificial Bee Colony (ABC) algorithm; the dimensionality of the dataset is reduced in order to reduce the computation complexity a model for early detection and correct diagnosis of the disease which will help the doctor in saving the life of the patient. Here analogize the Genetic Algorithm, Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithm. In the three algorithms is comparing a prediction time. In this research process, the detection of lung cancer which is predicting time consumes. Read More...
|
Computer Science |
India |
913-917 |
217 |
Moisture Removing & Increasing Efficiency in Ball Mill
-Kawaljit Singh Randhawa
Ball mill is used to crush partials into powder form. Calcined bauxite can be manufactured with the help of ball mill by grinding the raw bauxite and converting it to required fined grade. Calcined bauxite is used to make refractory bricks, abrasives and for steel polishing. Here I have discussed some issues with the ball mill grinding process like moisture content, its drawbacks on efficiency and how to remove this moisture content from the process and how to increase the efficiency of ball mill. Read More...
|
Mechanical Engineering |
India |
918-922 |
218 |
Balancing the Workloads for Trusted and Secured Transactions on Cloud
-Rekha.T
On cloud servers the distributed transactional Database systems are deployed, here certified credentials are used to justify the entities of cooperate to form authorization proofs. Credential Inconsistency results in unsafe transaction. To achieve the trusted and safe transaction in cloud load balancing plays major role, for this it uses some parameters called as workloads like performance, precision and accuracy. This project proposes the consistency credential and several levels of authorization policies which includes the conditions to make sure of trusted transaction. ACID property is used, since the c2onsistency is a part of ACID property, which is mainly provides the reasonable availability. Resources are protected via Policies. Policies are the one describes the set of conditions which gives the permission to the user about which resources to be used. This project proposes the 2PC-Two Phase Commit Protocols are the updated version of the basic Two Phase Commit Protocols to make sure of safe transaction. This project analyzes the approaches with analytical and simulation method and this results helps to take decision by the users to choose which one to use. Read More...
|
Computer Science and Engineering |
India |
923-926 |
219 |
Review Article on Technology and Development of Monitoring & Early Warning System and Indian Tsunami Early Warning System
-Karthikeyan.R ; Gowtham.M; T.Sudhakaran; Vignesh.J
Disasters, through history disasters have destroyed lives and livelihoods, killing people and damaging homes and businesses. Disasters in the past 35 years have taken an estimated 2.5 million lives and cost more than US$1.5 billion, mainly in developing countries. Efforts to reduce disaster risk have therefore focused, in part, on developing early warning systems to provide timely and effective information that enables people and communities to respond when a disaster hits. Most of the countries allocate the budget and developing the technology for warning system. Poor countries collaborate with some other countries and developing the early warning systems. In India, after tsunami gives the attention for the natural hazards and their prevention. Indian tsunami early warning system monitoring the tsunami and other seismic activities. Read More...
|
Environmental Science |
India |
927-929 |
220 |
Design of Collision Avoidance System based on Ultrasonic Sensor
-Shirish Srivastava ; Rishi Kumar Kanaujia; S.K Singh
In this paper our goal is to propose a cost effective prototype collision avoidance system based on ultrasonic sensor. The purpose of the automatic collision avoidance system is to keep drivers better informed with the environment surrounding them. Primarily Ultrasonic sensors, Microcontroller, Buzzer, LCD, Motors and a set of LEDS are used to implement the design.[4] With further advancement of technology we will be able to make a cost effective system which can be used by a common man also in his/her vehicle to keep him/her better informed about the road and traffic scenario. Read More...
|
Electronics Engineering |
India |
930-933 |
221 |
Basic Review of DTN Routing Protocol Approaches
-Ekta Chauhan
A DTN is a network of smaller networks. It is an overlay on top of special-purpose networks, including the Internet. DTNs support interoperability of other networks by accommodating long disruptions and delays between and within those networks, and by translating between the communication protocols of those networks. In providing these functions, DTNs accommodate the mobility and limited power of evolving wireless communication devices. DTNs were originally developed for interplanetary use, where the speed of light can seem slow and delay-tolerance is the highest need. However, Delay tolerant networks may have extreme most diverse applications in the Earth, where disruption-tolerance is the highest need. Delay tolerant networks Routing has thus stimulated since it must handle partitioning of the network, long delays, and also dynamic topology in such networks. In current years, social-based methods, which attempt to the exploit social performances of the Delay tolerant network nodes to make a suitable routing decision, have drawn tremendous interests in the Delay tolerant networks routing design. In this paper define about routing protocol classification, existing network information etc. Read More...
|
Computer Science and Engineering |
India |
934-940 |
222 |
Study of Lateral Load Resisting Systems of an Irregular Building Located At High Seismic Zone for All Soil Types
-Shruti.A.G ; Prof.Shivraj.S.Mangalgi
Presence of re-entrant corners is one such irregularity which adversely affects the seismic behaviour of the buildings.re-entrant corners due to plan asymmetry causes stress concentration due to sudden changes in stiffness and torsion in the building. The present work focuses on study of SMRF building with irregular plan and strengthening the re-entrant corners at inner and outer notch with shear wall and bracings for different soil conditions. The building was modelled and analysed using Equivalent static method, response spectrum method and pushover analysis for seismic parameters like base shear, storey drift, lateral displacement. It was observed that SMRF with shear wall and bracings were more effective in seismic resistant of a structure when compared to SMRF. Comparing all the three frames, SMRF with shear all was more effective in all soil types. Extreme increase in base shear, lateral drift and displacements was observed in models with soft soil. Comparing all the three seismic analysis pushover analysis is more accurate since it consists of non-linearity behaviour of the material. Read More...
|
Structural Engineering |
India |
941-946 |
223 |
PID controller for DC-DC Converter using Ziegler Nicholas Method
-Shalini Jain ; Dr. N. S. Beniwal
This paper deals with the Ziegler Nicholas method which is one of the routine to reduce the non-linearities in the response of a DC-DC converter. A controller is used along with the converter to reduce the deviation of the observed output from the desired set value. The two main parameters that have been used here to assess the performance of the converter as well as the controller is the settling and rise time of the output. These values need to be minimized to achieve a higher efficiency, improved phase margin and loop bandwidth. In this paper, a PID type of controller is described using the Ziegler Nicholas (ZN) method for tuning which improves the dynamic response of the DC-DC Buck type of converter under load and input variations. It is found through the simulation results that the proposed method is having a rise time of 1.3ms, settling time of 2.5ms and overshoot of 0.0096%. The variations in the response on account of the input and load variations are also minimal in the discussed method which could be neglected. Read More...
|
Control System |
India |
947-949 |
224 |
Human Effects of Enhanced Multi-Party Secured Access Control for On-Line Social Networks
-S.Sakthipriya ; Dr. V.Thiagarasu
On-line Social Networks (OSNs) consists of Facebook, Google+ and Twitter area unit inherently designed to enable people to share personal and public information and build social connections with friends, co-workers, colleagues, family and even with strangers. These area unit several unprecedented growths with in the application of OSNs all over the world. These OSNs provideing digital social interactions and knowledge sharing, however conjointly raise a variety of security and privacy issues. While OSNs allow users to restrict access to shared information, they currently do not provide any mechanism to enforce privacy concerns over data associated with multiple users. This survey is used to design a mechanism using proven clustering techniques that assists users in grouping their friends for traditional group-based policy management approaches. The survey reviews the analysis of various algorithms for measuring agreement between clusters and user-defined relationship groups. The privacy management model that leverages user’s memory and opinion of their friends (called example friends) to set policies for other similar friends area units analyzed. The approaches to qualify the protection of shared information related to multiple users in OSNs area unit mentioned. Read More...
|
Data Mining |
India |
950-953 |
225 |
A Review on Sink Hole Attack in WSN
-Kamal Kant Tripathi ; Rajesh Singh
A WSN (wireless sensor network) is included of a huge amount of sensors that collaboratively monitor numerous atmospheres. The sensors all together provide global views of the environments that offer more information than those local views provided by independently operating sensors. There are numerous potential applications of WSNs in various areas such as residence, industry, military and many others. As wireless sensor networks keep on to attract more attention, fresh concepts for applications are keep on being established, numerous of which include consistent attention of a known surveillance area. These networks are achievement significance in numerous applications like detecting pressure, temperature etc. but these structures are constrained through limited memory, energy recourses and computational. WSNs (Wireless sensor networks) involve numerous small wireless sensor nodes which are accomplished of the sensing data and sending it to the base stations. Wireless sensor networks face resource constraints containing limits on the memory capacity, communication, power and computational power. Also, since they are frequently organized in the hostile atmospheres and left unattended, they are vulnerable to numerous attacks such as sinkhole attacks. Sinkhole attacks happen when a compromised node attracts network traffic by the advertising fake routing updates. This paper first defines the tasks in the detecting sinkhole attacks in Wireless sensor networks. This is followed by studying approaches to the detect and neutralize sinkholes. This paper study on sink hole attack for wireless sensor networks (WSNs). And also attentions the numerous attacks related with wireless sensor network. Read More...
|
Computer Science |
India |
954-958 |
226 |
Enhancement In Reduction of PAPR using ASM based SFBC Technique in OFDM Systems
-P.Sai Kiran Kumar ; M.Nanda Kumar
In this paper, we recommend Alternative-Signal Scheme for PAPR reduction in OFDM Systems with Space Frequency Block Coding (SFBC). The key idea of the proposed scheme is keeping the advantage of the SFBC structure to generate some multi-sequences via combining the OFDM signals at different transmit antennas. The OFDM is used to mitigate the problem of inter symbol interference (ISI) and provides good protection against co-channel interference and noise. One of the major drawbacks of in OFDM systems is that the transmitted signal exhibits a high PAPR when the input sequences are correlated. The space frequency block coding based Alternative-Signal schemes have been used to reduce peak to average power ratio (PAPR) orthogonal frequency division multiplexing (OFDM) system with space frequency block coding (SFBC). The Alternative-Signal scheme reduces the computational complexity and when Alternative-Signal scheme is used with quadrature amplitude modulation (QAM). Theoretical analysis and simulation results validate that the proposed scheme has the ability to provide large PAPR reduction, low bit error rate and low computational complexity without side information in SFBC MIMO-OFDM systems. Read More...
|
Electronics and Communication Engineering |
India |
959-965 |
227 |
Numerical Simulation of 3D Subsonic External Flow in the Stalled Region
-Swethakumari S ; M.Shivashankar
Predicting the aerodynamic forces on the airfoil in the stalled region accurately using Computational Fluid Dynamics method is a critical task due to the strong vortex dynamics involved. Research publications (Ref.01 David Hartwanger et.al and Ref.2 Frank Bertagnolio et.al) explain the need of advanced turbulence models for accurately predicting the flows in the stalled region. Other research publications have elaborated the disadvantages of 2 D CFD simulations with reference to accuracy of the analysis results in the stalled region compared with the experimental data. (Ref. 3 H.Gao et.al and Ref. 04 S.Sarada, M.Shiva Shankar and Rudresh).These literatures reiterated the need of 3D CFD simulations to accurately capture the lift and drag coefficients in the stalled region. The objective of this work is to conduct 3D Incompressible, steady state ,Viscous Navier-Stokes simulations for NACA 64618 subsonic airfoil using ANSYS FLUENT Computational Fluid Dynamics Software. Analysis will be conducted for three different important turbulence models namely K-epsilon turbulence model with standard wall functions, Spalart allmaras turbulence model and K-omega shear stress turbulence model .Each of the turbulence model mentioned will employ different technique in modelling the boundary layer. This study will analyze all the merits and demerits of these three turbulence model with respect to accuracy of the CFD analysis solution, stability of the solution focusing mainly in the stalled region. CFD simulations will be carried out at free stream Reynolds number of 3 million and CFD analysis results will be compared with wind tunnel test data. Read More...
|
Thermal Power Engineering |
India |
966-969 |
228 |
A Survey Paper on Image Enhancement based on Various Techniques
-Jayant Bhatnagar ; Rajesh Singh
Image enhancement is one of the basic topics in pictures of high quality such as digital cameras. Since image clearness is most simply affected by applying weather, lighting, or equipment that has been used to the image capture. The basic purpose of the image enhancement is to bring out feature that is unseen in an image or to growth contrast in a low contrast image. It offers multitude of the selections for growing the images visual quality. That’s why it is used in a vast number of applications with important tasks such as noise reduction, degradations, blurring etc. This paper has dedicated to the various image enhancement methods. Image enhancement has created to be one of the greatest important vision applications because it has the capability to enhance the image’s visibility. It enhances the perceivability of the poor pictures. Distinctive procedures have been suggested so far for growing the digital image quality. To enhance picture quality image enhancement can specially progress and also limit certain data obtainable in the input picture. It is a type of the visualization system which decreases picture commotion, kill antiquities, and keep up the educational parts. In this paper, we present a summary of image enhancement processing methods in the spatial domain and also in the frequency domain. More specifically, the approaches of the classifications processing based on the representative methods of the Image enhancement. Thus the contribution of this paper is to categorize and review images enhancement processing methods, attempt an evaluation of shortcomings and common needs in this field, then the active research and in last we will point out promising directions of research for image enhancement for future research. And also different image enhancement techniques are analyzed and their upsides and downsides are highlighted in the paper. Read More...
|
Computer Science |
India |
970-975 |
229 |
Public Auditing for Shared Data with Efficient user Revocation on ABE
-P. Tamil ; T.P. Senthil Kumar
Attribute based encryption (ABE) theme, attributes are centered for vital role. Attribute based encryption has been pictured as a promising cryptologic primitive for realizing secure and versatile access management. Attributes area unit to be segregate to get a public key for encrypting knowledge associate degreed are used as an access policy to regulate user access. With the recent adoption and diffusion of the info sharing paradigm in distributed systems like on-line social networks or cloud computing, there are increasing demands and issues for distributed knowledge security. The performance and security analyses indicate that the projected theme is economical to firmly manage information the data distributed within the data sharing system. One of the foremost difficult problems in information sharing systems is that the social control of access policies and also the support of policies updates. Ciphertext Policy Attribute Based Encryption (CP-ABE) is turning into a promising cryptanalytic resolution to the present issue. It permits knowledge homeowners to outline their own access policies over user attributes and enforce the policies on the info to be distributed. The performance and security analyses indicate that the projected theme is economical to firmly manage the data distributed within the data sharing system. Read More...
|
Computer Science |
India |
976-980 |
230 |
A Study on Mechanical and Tribological Properties of Al6063 MMC Reinforced With Nano SIC, Fly Ash and Red Mud
-Md Sadiq Ali
The present study deals with the behaviour of aluminium alloy based composites, reinforced with nano size silicon carbide, fly ash and red mud. The nano-particles can improve the base material in terms of wear resistance, damping properties and mechanical strength. To achieve this objective stir casting technique has been adopted and then studying its mechanical and tribological properties such as tensile strength, impact strength and wear behavior of produced test specimen. The main aim involved in the present work is focused on study of mechanical and tribological properties of Al6063 alloy composite having varying weight percentages of 3% - 2% - 2% of nano sized Silicon Carbide, Fly ash and Red mud. The result indicated that the developed method is quite successful and there is an increase in the value of tensile strength, hardness with increase in weight percentage of SiC. Metal matrix composites reinforced by nano-particles are very promising materials, suitable for a large number of applications. Read More...
|
Mechanical Engineering |
India |
981-984 |
231 |
Cache Based Secure Hybrid Routing Protocol in Manet
-Amroj Kaur Gill ; Dr. Rajneesh Talwar
Routing in Mobile Ad-hoc Networks is a widely researched area in the recent years. Many researchers have proposed various techniques for efficient route the data from source to destination and compared their approach with the already existing approaches. In this paper, a novel technique for hybrid routing is proposed which includes the properties of both proactive and reactive approaches and each node in the network stores the most frequent routes in its cache memory, so that it can be accessed within no time. The proposed approach is tested on both with attack and without attack scenarios and results of the same can be compared. In future the approach must be implemented for large network density and can be compared with other hybrid routing protocols. Read More...
|
Electronics and Communication Engineering |
India |
985-988 |
232 |
Three Dimensional MHD Couette Flow in the Presence of Suction or Injection with Radiation Effect and Heat Source
-Mamta Goyal ; Namrata Naraniya
This research is concerned with MHD three dimensional couette flow of a viscous incompressible electrically conducting fluid with radiation effect on temperature distribution in the presence of heat source. The lower stationary porous plate is subjected to a periodic injection velocity and the upper porous plate in uniform motion to a constant suction velocity. A magnetic field of uniform strength applied normal to the plane of the plates. Neglecting the induced magnetic field, an approximate solution for the flow field is obtained and discussed with the help of graphs. Read More...
|
Fluid dynamics |
India |
989-992 |
233 |
Speech Recognition System Design For Isolated words using LPC with ANN
-Sheetal Chaudhari
This research work focuses on review of techniques related to speech recognition system and come up with a design for such systems. The focus would be on understanding and evaluating various concepts and then analyzing performance of speech to text conversion specifically for isolated words. The aim of this work is to analyze the performance of SRS using Artificial Neural Network and Linear Predictive coding of speech. The experiment was carried in various external environment to capture variety of speech samples for specific words and then assess the system performance and accuracy. This work is carried out in MATLAB using speech processing toolbox. Read More...
|
Electronics & Communication Engineering |
India |
993-996 |
234 |
Experimental Investigation of Performance Characteristics for CI Engine using Waste Plastic Oil and Ethanol
-Ashish Y Pund ; Prof. B.N. Kale; Prof. Rahul D.Gorle; Prof. G.D. Gosavi
An experimental investigation of performance characteristics on CI engine using different blends of waste plastic oil and ethanol was carried out. In present work the engine fueled with blends likewise D-100,E-10 D-90 , E-20 D-80, E-30 D-70, E-40 D-60 AND WPO-10 D-90, WPO-20 D-80, WPO-30 D-70 , WPO-40 D-60 are experimentally measured and analyzed and compare with that of diesel fuel. The power, efficiencies, specific fuel consumption were calculated and experimental results are represented graphically. The best fuels for internal combustion engine are recommended. Read More...
|
Mechanical Engineering |
India |
997-1001 |
235 |
A Study on the Influence of Elevation Stiffness Irregularities on the Seismic Performance of RC Framed Buildings
-Vishwanath Charantimath ; Sujay Deshpande
The history of earthquakes in which numerous reinforced concrete structures were seriously damaged, has indicated the need for gauging the seismic adequacy of buildings. In particular, the seismic rehabilitation of older concrete structures in high seismicity areas is a matter of growing concern, since the structures which are vulnerable to damage must be identified and an acceptable level of safety must be established. To make such an assessment, simplified linear-elastic methods are not adequate. Thus, the structural engineering community has developed a new generation of design and seismic procedures that incorporate performance based design of structures. This is different from simplified linear elastic methods and involves non-linear techniques.†The advancement of performance based design and rehabilitation of structures in high seismic zones reveal that the static non-linear analysis also known as “pushover analysis is the most appropriate method of analysis used to gauge the severity of the damages caused to the buildings. There are two special codes called “ATC-40†and “FEMA-273†which inhibit all the modelling and design procedures and judging criteria of the performances of buildings. Incremental lateral loading is applied to the frame and pushover analysis is carried out using a suitable analysis and design software package such as ETABS. A graph is plotted involving the pushover curves which indicate the capacity of the frame and the seismic demand curves depending on the magnitude of shaking. This graph suggests the seismic performance of a system and its adequacy against the design earthquake.†Later an attempt has been made to understand the seismic behaviour of structures having irregularities in the distribution of structural stiffness in both plan and elevation using pushover analysis. Formation of the plastic hinges and their transformation from elastic level to various seismic performance levels such as immediate occupancy (IO) level, life safety (LS) level, collapse prevention (CP) level and finally collapse (C) level under incremental lateral loading is investigated. For the purpose of carrying out pushover analysis, ETABS v.13, finite element software has been used. ETABS performs the initial design depending on the earthquake zone and formulates the results. Read More...
|
Civil Structural Engineering |
India |
1002-1007 |
236 |
A Novel Approach for Underwater Sensor Network in 3D Environment which is decentralized and Distributed in Nature
-Ekta Chauhan
In our earth 75% covered by water that could be river and ocean also. The underwater sensor network is enabling technology and become more and more popular for monitoring the oceans vast area. Underwater sensor Networks consist of a variable numerous sensors that are deployed to perform monitoring tasks over a given area. UWSNs are meaningfully various from terrestrial sensor networks because of specific characteristics of the high error probability, low bandwidth, high latency, limited energy and node float mobility. These features bring various challenges to the network protocol design of the Underwater Wireless Sensor Networks. Numerous routing protocols have been developed in the current years for these networks. The UWSNs provide continuous monitoring for various applications like ocean sampling network, pollution monitoring, submarine detection, disaster prevention, etc. In this paper, we discuss the internal architecture of underwater sensor; we discussed the literature of underwater sensor network. Underwater sensor nodes will discover applications in the oceanographic tactical surveillance, information collection, monitoring pollution, disaster prevention, offshore exploration and assisted navigation applications. Read More...
|
Computer Science and Engineering |
India |
1008-1014 |
237 |
Implementation Prototype of Image Processing based Multi-Touch Interaction with Gesture Recognition
-Ms. Deepali Shrikhande ; Mr. Ajitkumar Khachane
Gesture recognition is a area in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. Gestures can emerge from any bodily motion or state but commonly originate from the face or hand. Recent focuses in the field include emotion recognition from the face and hand gesture recognition. Thus building a link between machines and humans than primitive text user interfaces or even GUI's (graphical user interfaces), which still restrict the majority of input to keyboard and mouse. This project aims at the completion of a human-machine interface that tries to make interaction more effective and natural using multi-touch with gesture recognition and object recognition. The focus is on camera based multi-touch methods, as these provide a new dimension to multi-touch with its ability to recognize objects. The main purpose of table is to accompanying gesture recognition system, and to create an open and modest multi touch solution, with the purpose of taking multi-touch out to the crowd. By doing this, more people will be able to use the benefits of a more natural interaction with computers. Read More...
|
Information Technology |
India |
1015-1017 |
238 |
Self-Proclaiming Generator for Automobiles Along With Solar Tracker
-Chetan K ; Arjun Kumar RL; Harsha Y; Prasanna Kumar KY
This project uses the rotational motion of the shaft of engine’s cooling fan of an automotive vehicle to generate electricity, which charges the battery. The vehicle uses minimum external fuel to ignite, once it’s done, the cooling fan connected to the en-gine runs at very high rpm. Here the fan of the engine is extended with a low weight shaft which is insulated by a magnet which can produce sufficient magnetic flux. Without disturbing the torque .Which is run through a coil with decent number of windings. This project also operates a solar panel to con-stantly face sun at 90 degrees to produce maxi-mum voltage. It can move the solar panel from east to west as well as from south to north also to correct for the durational movement of the Sun in the sky. The set of light sensors give the input to the Stepper motors and operates it. Read More...
|
Renewable Energy |
India |
1018-1020 |
239 |
Study of Some Physico-Chemical Parameters of Groundwater in Adjoining Area of Tropical River, Ami (India)
-Ayush Kumar Rai ; Dr. Govind Pandey
Due to various industrial activities, paper mill activities, Sugar mill effluents, and Municipal waste water and urbanization of cities and markets, the tropical river Ami has been polluted so much. It used to clean in ancient time but now it has polluted. So, this polluted River Ami also affects the groundwater in nearby area. For watching this problem groundwater qualities were analysis from nine sampling stations namely, Shania, Rudhauli, Khalilabad, Magher, Adilapar, Jarlahi, Kauriram, Sohgaura and Malav. These studies were taken from January to June month. And the analysis results were viewed. From station two samples were collected, the first one sample from Indian mark-II hand-pump and second one from India mark-II hand- pumps. The various physical, chemical and biological parameters were analyzed. Then the result was compared to IS: 10500-2012. And it was also seen that the effect groundwater quality in adjoining area of Ami River on groundwater quality in adjoining area of Rapti River. Read More...
|
Civil Engineering |
India |
1021-1026 |
240 |
A Study on Groundwater Quality in Adjoining Area of Ami River in U.P
-Ayush Kumar Rai ; Dr. Govind Pandey
Ami River is a tributary of Rapti River on its right bank, which receives industrial effluents at several locations in a major stretch starting from Rudhauli to at Sohgaura (Gorakhpur) into Rapti River. With this in view, this point is attempted in this work. For this study, ground water samples collected from nine sampling stations namely , Sohanara, Rudhauli, Khalilabad, Magher, Adilapar, Jarlahi, Kauriram, Sohgaura (after meet to Rapti River) and Malav (Rapti River before meeting Ami River), for a duration of six months namely, January, February, March, April, May, June were analyzed and the results were viewed. From each sampling station two samples were collected, the first one sample from India mark-II hand pump which recognized by government and second one from Shallow depth hand-pumps which well-known by local residential person of that place. The parameters were, pH, Turbidity, Total dissolved solid, Dissolved oxygen, Chloride, Alkalinity, Acidity, Hardness and MPN. Read More...
|
Civil Engineering |
India |
1027-1031 |
241 |
Intelligent Traffic Management Service using Datarate Control Mechanism
-Surendra A ; Asha N
Router is an important component of the network. Routers are placed where two or more network connects. Routers receive and send data using ports. This paper proposes a traffic management service at routers. The routers are deployed with datarate control mechanism to handle the network traffic. In other traffic control protocols, in order to compute the data sending speed, it is required to estimate necessary network parameters and compute amount of memory consumed. In our approach, router reads the datarate from the network interface thus by avoiding the computational overhead and resource consumption problems. Router receives file from sender node, it convert received file into packets based on the fixed length. Router sends processed packets to receiver node and checks whether it has reached maximum bandwidth. Router stops sending packets once maximum bandwidth is reached and waits until previous sent packets are delivered to receiver node. Router repeats this process for remaining packets available in the queue. Receiver re-assembles the received packets into a single file. Read More...
|
Computer Engineering |
India |
1032-1033 |
242 |
Fatigue Analysis of Hydraulic Pump Gear by Varying Gear Parameters
-Srikanth Porandla ; L Sasi Rekha
Gears are considered as the most critical components in the role of mechanical transmission systems. The spur gear pair used in gear pump is considered in this for analysis by varying gear parameters such as number of teeth, addendum and dedendum etc. by considering two sets of spur gear pair. Initially static analysis is carried out for the model to validate and for checking of boundary conditions. once the stress variation is obtained then fatigue inputs are given to fatigue analysis and fatigue life, damage and factor of safety are determined. The reason for performing this research was to study the behaviour of gears due to cyclic loads by changing of gear parameters. Read More...
|
Mechanical Engineering |
India |
1034-1036 |
243 |
Assessment of Groundwater Quality in Adjoining Areas of Ramgarh Tal at Gorakhpur City
-Abhishek Kumar Bharati ; Dr. Govind Pandey
Among all the water bodies, the most important source of drinking water and other domestic use is Ground water in India. The water supply bodies’ i.e. municipal corporation Jal Nigam or Nagar Nigam are mainly depends on the ground water resources. Hence it is very much important to assess the groundwater quality not only for its present use but also a potential source of water for future consumption. A total number of 28 samples were tested for the various physico-chemical parameters like pH, total dissolved solids, acidity, alkalinity, chloride, hardness and fecal coliform. In the term of pH, maximum pH was found 8.5 and minimum 7.0. In the term of TDS, maximum TDS 659 and minimum 171 was observed. In term of hardness maximum hardness 578 mg/l and minimum 80mg/l was observed. Acidity, Alkalinity and chloride was found maximum 96mg/l, 395mg/l, 108mg/l respectively and minimum 25mg/l, 100mg/l, 20mg/l respectively. In case of faecal coliform the maximum was observed 920 MPN/100ml and minimum 13 MPN/100ml. Read More...
|
Environmental Engineering |
India |
1037-1039 |
244 |
Assessment of Water Quality in Ramgarh Tal at Gorakhpur, U.P
-Abhishek Kumar Bharati ; Dr. Govind Pandey
For the proper conservation and management of a lake it is very important that the water quality of the Lake is monitored and assessed on a regular basis. Water quality monitoring and analysis of the Ramgarh Tal was carried out for various physico-chemical, and bacteriological parameters i.e. pH, total dissolved solids, turbidity, acidity, alkalinity, total hardness, chloride, DO, BOD, COD, faecal coliform, during January-2015 to June-2015. These parameters have been determined by collecting 48 water samples from the different sampling stations of the lake during the six months that is 8 samples have been collected per month from eight sampling stations which reveal the monthly variation in water quality in the lake. There is variation for pH (7-11), TDS (240-347mg/l), Turbidity (9-22), Alkalinity (166-325mg/l), Total Hardness (126-256mg/l), Chloride (64-176mg/l), DO (1.0-14.8mg/l), BOD (5.1-9mg/l), COD (35.7-164mg/l), Fecal Coliform (220-2400). Read More...
|
Envirtonmental Engineering |
India |
1040-1043 |
245 |
Comparing Features and Recommending Products Online
-Akshay R. Giri ; Dr. K. N. Honwadkar
Now a day, it’s popular to buy a product online and online product shopping is a new trade in E-Commerce domain. Recommender systems (RS) is an essential part of the data and the e-commerce system. RS are actually created for helping purchaser, users or customer in that particular domain. Shopping websites use purchase history based, user review base recommendation technology. Every user try to buy products based on its feature configuration so our system is such very important and helpful recommendation technology which is completely depends on features of product. The customers can choose their preferred products and buy many products online from the Online shopping website or portal. Online shopping websites combine Business-to-Consumers, Business-to-business as well as Consumers-to-Consumers services with each other. Because of the customized, high feature and cost capability products the universality of the software is increases. Proposed system mainly work in two part 1) Initially our system recommend similar product using similarity algorithm and 2) Use FP growth algorithm for recommending other related products. Both work very well for our selected domain. For input feature profile we use dataset of product feature matrix and initial transaction matrix. Read More...
|
Computer Engineering |
India |
1044-1047 |
246 |
Maximizing Machine and System Utilization in FMS Environment using Petri-Net
-Ajay Kumar Maurya ; Dr. S. C. Jayswal; Sunil Kumar Yadav; Manvendra Pratap Mall
A Flexible Manufacturing System (FMS) consists of a computer-controlled, integrated configuration of machines with automated material handling systems. Problems related to flexible manufacturing technology are relatively complex compared to traditional manufacturing systems in which lead times are longer, inventory levels are higher, and utilization rates are lower. In order to take full advantage of the flexibility of the system, operation assignment, planning and scheduling should be done in a collective way. This works proposes the development of simulation models for studying the behavior of complex FMS and finding a stage for which FMS system have maximum utilization. The models are formulated and taken a case studies. The machine efficiency is considered less than 100%. The time of part movements among machines is not zero. Read More...
|
Mechanical Engineering |
India |
1048-1051 |
247 |
Comparative Study on RC Frame, Flat Slab Frame, Flat Plate Frame and Prestressed Slab Frame in Seismic Region
-Dr. R. B. Khadiranaikar ; Someshwar C Haibathpure
Multistorey commercial buildings are primarily responsible for demand of business activities and city centre as possible, therefore, putting intense pressure on the available land space. Hence, it is necessary to analyze the different types of multistorey building frame such as RC building frame, Flat plate building frame, Flat slab building frame and prestressed slab building frame. The above building models are analyzed by response spectrum method using SAP 2000 software by considering zone IV and medium type soil. The parametric study was carried out by considering time period, base shear, top displacement and storey acceleration. From the analysis, it is found that the time period and top displacement are more in flat plate building, compared to other models. The base shear is reduced in flat plate building compared to other models. The storey acceleration is maximum in normal RC frame building and minimum in flat plate building compared to other model. Read More...
|
Civil Engineering |
India |
1052-1055 |
248 |
Benefits of Implementing Lean Principles to Real Manufacturing Environment
-A.Balasuadhakar ; D. Rajenthirakumar; A. Aravinthkumar; S. Sivagurunathan
The main purpose of this technical manuscripts to present the benefits of using lean manufacturing tools and principles on dynamic manufacturing environment. Lean manufacturing uses less of everything compared to mass production - half the human effort in the factory, half the manufacturing space, half the investment in tools, and half the engineering hours to develop a new product [1]. It has now become a production method for many manufacturers to pursue. It is a “system for the absolute elimination of waste†[2], where “waste†is defined as everything that increases cost without the creation of value for the final customer [3]. With implementing lean principles through realized project in real manufacturing environment, activities that do not add value to the customer which are presented in seven types of waste eliminated and lean flow which is more effective and economically way of manufacturing goods gained. During this work lean manufacturing to the process of pump production implemented and the following gained: Working stations now provide improved material and information flow, Productivity is increased by 8%, lead time is reduced by 25%, Inventory between working stations is completely eliminated. Kaizen, redesign of layout, setup time reduction and line balancing are the lean tools utilised in this work. Consequently Value Stream Mapping (VSM) is used as a tool to map the present and the future state process. Read More...
|
Mechanical Engineering |
India |
1056-1060 |
249 |
Behaviour of Multi-Storied R.C.C. Frame Structure with Variance in Geometry of Structure
-Mithilesh Dattatray Kapse ; Prof. Rakesh R. Shinde
Any structure needs to be withstanding for two issues, strength and stability. Structure requires a support system that has sufficient strength to bear loads and stability to transmit it safely to the ground. The paper shows the analysis carried out to study the behaviour of multi-storied building subjected to lateral loads like earthquake and wind loads by considering the change in terrain conditions. The previous investigations concluded that, the in-filled wall and the shear wall are able to resist maximum part of lateral load on multi-storied building. The scope of present work is to study behaviour of multi storied building of different frame structural system for twelve types of models. The equivalent static analysis has been carried out by using E-TABS software. The models where examined for parameters like lateral displacement, story shear, time period, overturning moment, stiffness, and modal oscillation. The behaviour of building components will examined in this experimental work by analysing it. In this experimental case we are going to assume the different levels of footing maintaining the depth of footing and height of building same at each level. Based on the results analysis, the best building frame is suggested for such terrain conditions. Read More...
|
Civil Engineering |
India |
1061-1066 |
250 |
Weighted Features Extraction Based on Signature Verification using ANN
-Nikita S. Wani ; S. P. Patil
Signature Validation is one of the most important and interesting issue in the form of authentication and security level. The aim of this paper that has been focused here is signature verification in the type of original signature and forged signature. Artificial Neural Network algorithm along with feature extraction via horizontal and vertical splitting of signature image. Generally, algorithm is use to verify the signature type. The proposed scheme is based on the technique that applies pre-processing on the signature, feature point extraction and neural network training and finally verifies the authenticity of the signature. The objective of the proposed scheme is to reduce two vital parameters False Acceptance Rate (FAR) and False Rejection Rate (FRR), Accuracy. That means results are expressed in terms of FAR and FRR and subsequently comparative analysis has been made with existing techniques. The Proposed technique will give more efficient result than most of the existing techniques. Read More...
|
Electronics and Telecommunication Engineering |
India |
1067-1070 |