No. |
Title and Author |
Area |
Country |
Page |
251 |
Experimental Study on Horizontal Rectangular Fin Arrays under Natural Convection
-Deepak G. N. ; K.S. Shashishekar; S. George Milton
The operation of electronic devices results in generation of heat. Increase in operating temperature causes overheating problems and leads to failure of the component. The heat generated within the system must be dissipated to the surroundings. This is done by heat sink. In the present work electrical heater is placed in between two halves of heat sink with rectangular fins so that heat generated can be distributed equally. Heat transfer coefficient values are calculated from the measured data. Experiments have been conducted to determine the heat transfer coefficients under natural convection by placing fins in horizontal orientation in open air. From the experimental results it could be seen that, heat transfer coefficient h increases with heat input and also with temperature difference. Read More...
|
Mechanical Engineering |
India |
1071-1073 |
252 |
Design of Block Level Edge Detector using Spatial Filter
-Nayina Ramapur ; Sujata Pujari; Dr. T. C. Thanuja
The image processing plays a significant role in many applications such as medical and defense applications. Consequently, there is more demand for the research in computer vision and image processing field. Canny Edge detection algorithm is the standard for many years. But still there are some limitations like more computation time and the area utilization. As the existing algorithm requires the storage for the overlapping block generated from the non-overlapping block, the area utilization is more and also accessing delay increases. Design of block level edge detector using spatial mask filter is proposed to overcome these effects. In this proposed design the edge detection is applied at the block level. The creation of overlapping block from the non- overlapping is performed with help of shifting operation. Thus the area and delay can be reduced by performing the shifting operation which generates the overlapping blocks from the non-overlapping block without any storage requirement. Read More...
|
Image Processing |
India |
1074-1079 |
253 |
Design and Implementation of High Throughput and High Speed Hypercut Packet Classification
-Ashwini Ashok Chougala ; Dr. T.C.Thanuja; Usha S
Packet classification is the critical task in networking and it is used by network processor present in router to classify the packets according to the header field values. Packet classification is the process of matching packet header values to the rule header values. The packet is processed according to the matched rule. The contribution of this paper is “ Pipelined packet classification†architecture using hyper cut algorithm. This architecture is based on building the decision tree. The pipelined architecture for packet classification reduces the critical delay and gives high throughput of 3.98 Gbps. Read More...
|
Electrical Engineering |
India |
1080-1085 |
254 |
Customer Preferences of Different Sports Wear and Equipment Manufacturing Companies/Brands
-Miss Ayesha S Patel
This Research Paper studies the present market scenario of different sportswear and equipment manufacturing companies like Nike, Reebok, Puma and Adidas. The research paper also describe the major trends and focusing on marketing strategies used by these firms to achieve the Market share and position into the mind sets of the consumer or final user. The research paper also considering the primary as well as secondary data Analysis. Read More...
|
Management |
India |
1086-1089 |
255 |
Experimental Study of Mechanical Properties of Glass and Carbon Fibers
-Pratik Gayakwad ; Prof. A. C. Mattikalli
This article shows the investigation details of the glass fiber and carbon fiber it mainly deals moderate strength. the properties of these composites are tested by conducting experiments on tensile and compression on universal testing machine and impact on izod impact machine. Lightweight, excellent corrosion characteristics and rapid installation capabilities created tremendous opportunities for these composite panels in automobile industries. Read More...
|
Mechanical Engineering |
India |
1090-1093 |
256 |
A Novel Approach for Behavior Based Charge Card Fraud Detection using Support Vector Machines
-D.Manjula ; J.Thilagavathi
Online payments are provided with extreme safety, even though, it is not unrestricted from faults. Decline in virtual extortions is the essential for the current day. One of the primary e-transactions that face these threats are the credit/debit cards. This method habits bundling and outlier discovery for discovery the illicit communications. Primarily, the communications are clustered translation to the attribute measured as obligatory for the finding process. Then each gathering is useful with the outlier discovery method for the discovery of data that departs from the existing data flow. This data has the highest possibility of being the fake data. The next procedure uses SVM, a binary classifier for healthier location. Then these methods are disposed to grips high level of fabricated positives. To decline these lying positives, multi-clustering is used. Hence, this suggest the manipulator with an in effect, mutual outlier finding appliance that reduces faults and offers more precise results for the user. Read More...
|
Computer Science |
India |
1094-1098 |
257 |
Right-Protected Data Publishing With Provable Distance-Based Mining: A Survey
-S. Mythili ; Dr. V. Thiagarasu
Data exchange and data publishing are becoming an essential part of business and academic practices and data owners need to maintain the principal rights over the concern datasets that they share. This survey reviews the right-protection mechanism that can provide detectable evidence for the legal ownership of a shared dataset, without compromising its usability under wide range of machine learning, mining and search operations. The watermarking preservation algorithms protect important properties of the dataset which are essential for mining operations and so guarantee both right protection and utility preservation. It proves fundamental lower and upper bounds on the distance between objects. In particular, it establishes a restricted isometric property, i.e., tight bounds on the expansion of original distances. The review of various methods is discussed to assess the quality and reliability of right-protection mechanisms. From the survey it is observed that the right-protection mechanism based on watermarking technique has good efficiency and better capability for upgrading the best approach and helps to overcome the problems by analyzing and focusing the components of watermarking preservation algorithms. This analysis used to design fast algorithms for NN (Nearest Neighbors)-preserving watermarking that drastically prunes the vast search space. Then the performances of various existing watermarking algorithms are discussed and also the limitations of object distance validation are discussed. Read More...
|
Data Mining |
India |
1099-1103 |
258 |
Genetic Programming Approach for The Modelling of Aspirin Extended Release Tablets
-Sumedh Junghare ; Usha Chouhan
The objective of this work is to use genetic programming approach for the modelling of aspirin extended release tablets with Eudragit® RS PO as matrix substance. Genetic Programming involves several computer programs evolving towards the optimum solution and is an automated task. This property can be used to optimize and predict the dissolution of extended release Aspirin tablets. Eudragit® RS PO is the matrix substance in these tablets. The results show that there is no difference between experimental values and predicted values. This work illustrates potential of Genetic Programming to achieve a desired in vitro dissolution profile. Read More...
|
Applied Science |
India |
1104-1107 |
259 |
A Survey on Landmark Recognition Techniques
-Dipti Jaiswal ; Toran Verma; Rekhansh Rao
While it is probable to investigate the World Wide Web (WWW) for images, there is still no best way of searching the image. Hence recognizing and modeling landmarks at world-scale is a valuable and crucial task. First of all, the looks of any given landmark vary from one observation to successive. In addition to variations as a result of entirely diverse aspects, association in illuminated amendment, external litter, and dynamic geometry of the imaging devices are alternative factors affecting the variability of the ascertained landmarks. Finally, it is generally troublesome to create use of correct 3D information in landmark recognition applications. For those reasons, it is unacceptable to use several of the object recognition techniques. Hence it is vital to investigate the various techniques of landmark recognition so that we can find out the bottlenecks and how further improvement can be possible. In this paper, we perform a survey on various landmark recognition techniques and try to build a world-scale landmark identification engine. Read More...
|
Computer Science & Engineering |
India |
1108-1111 |
260 |
Cooling Load Estimation using CLF/CLTD/SCL Method: A Review
-Anurag Tiwari ; Dr. P.K.Jhinge
This paper presents the CLF/CLTD method that indicates scope and potential of evaporative cooling systems for replacement of high power consuming air conditioners, partially or completely for maintaining thermal comfort in various climatic locations without compromising the indoor air quantity .This paper applied the method to the Jabalpur city characterized by different climatic conditions over entire month of the years. The calculation procedure of this article examine the possibility of space conditioning the interiors of a Assembly Hall building in Jabalpur Engineering Collage , Jabalpur using evaporative cooling in the summer month of April ,May ,June .The calculation procedure for cooling loads due to solar radiation transmitted through fenestration was used with a new factor ,the solar cooling load (SCL) which is more accurate and easier to use . Read More...
|
Mechanical Engineering |
India |
1112-1115 |
261 |
Mobility Aware Secure Routing in MANET
-Nilam S. Parmar ; Manjusha Deshmukh
In Mobile Ad-hoc Networks if forwarding nodes have high mobility, there are more chances to make local topology inaccuracy. If the node involved in the forwarding path moves frequently then there is the situation of link failure which leads to packet loss. Hence it is required to select the nodes with low mobility which means selection of node as forwarder based on its mobility. Mobility based forwarding node selection scheme improves the routing performance. Source node predicts the distance of each neighbor from itself at particular time (t) using the current location of neighbor and speed of the neighbor. After certain time (t+T) it predicts the distance again using the current location of neighbor. In both situations if the node comes under neighbor status then it is highly stable neighbor. To apply this routing scheme, distance between destination and highly stable neighbors are calculated. The neighbor which is having the minimum distance is selected as forwarder.
If there is tie between the nodes then the node which is having high willingness value become forwarder node. This willingness value can be calculated using power, coverage and reliability of the node. The higher values there are more chances to become forwarder node. The message confidentiality and integrity has also being implemented using RSA asymmetric key encryption algorithm. The node authentication is also implemented using Aggregate Signature algorithm. The simulation result shows how it can reduce broadcasting redundancy and improves the packet delivery ratio. Read More...
|
Computer Engineering |
India |
1116-1119 |
262 |
Dynamic Simulation of Piston Motion to Predict the Piston Slap for Single Cylinder Four Stroke Engines
-Pavan Kumar H ; Prashanth N
In recent years environmental norms have been made mandatory for new design or design optimizations of any combustion based engines and prime movers. The greater demand for quieter engines and hence the technology proved to be the answer for these pollution regulations. Piston slap is still an important mechanical excitation source and noise generator in IC engine. To understand the complete and complex dynamics of piston, connecting rod and crank shaft, a three dimensional modeling and dynamic simulation approach is required. In the present work the study of piston-slap due to mechanical impact with a three-dimensional finite element model is carried out. The results are taken to predict the behaviour of the piston inside the combustion chamber and to predict the piston lateral motion which causes the piston-slap. The particulars utilized in this study of piston belongs to four stroke single cylinder Bajaj pulsur 150 cc bike engine. The geometrical modeling of the piston is done using CATIA V-5 modeling tool, finite element software (ANSYS) is used to implement physics and carryout simulations. The stress and displacement results are viewed and analyzed. These values are interpreted to predict piston-tilt due to the secondary motion of the piston and the piston-slap when piston reciprocates between TDC and BDC. Read More...
|
Mechanical Engineering |
India |
1120-1125 |
263 |
A High Speed Full Adder Circuit using 3 Transistor XOR Gates for Arithmetic Operations of VLSI System
-Richa Baranwal ; Vimal Kumar Mishra; Dr.R.K. Chauhan
The necessities to obtain better speed, this paper list to a change in parameter of full adder circuit that has been proposed by using 3T XOR gate combining CMOS with pass transistor logic. The design that has been given shows a significant improvement in propagation delay constrain. The proposed adder gives better propagation delay in comparison with the previously existing reference design. The 50nm technology has been used to investigate the performance of 8T full adder circuit and the complete design is simulated with the help of LTSPICE. Read More...
|
Electronics & Communication Engineering |
India |
1126-1128 |
264 |
Effect of Medium to High Grade of Concrete and Depth on Moment-Curvature Relationship for Reinforced Concrete Beams section
-Tejaswini V. Jadhav ; V.D.Gundakalle
This paper deals with the development of computer program to calculate the moment-curvature relationship of the reinforced concrete rectangular beam. The moment-curvature relationship helps in understanding the strength characteristics and ductility properties of the beam. The moment-curvature relation at the hinge is required in the nonlinear analysis. The characteristics of the beams under flexure can be detected by the moment-curvature relationship. The influence of some material and geometric parameters like the grade of concrete and depth of the beam section respectively in singly and doubly reinforced beam are examined and discussed. Read More...
|
Structural Engineering |
India |
1129-1133 |
265 |
Exploiting Genetic algorithm towards CPU Scheduling
-Monika Mangla ; Rakhi Akhare; Smita Ambarkar
Scheduling has become a problem of keen interest as a result of its widespread application in all areas. Effective scheduling approaches results in maximum utilization of resources. As scheduling in problem of interest to various researchers, various novel techniques are being proposed by various researchers to use the resources in an efficient and effective manner. Various heuristic have also been combined with different techniques to solve scheduling problems. Here, in this paper, we discuss how genetic algorithm can be used to solve CPU scheduling problems in an innovative manner. The same technique can be used for scheduling any resource. To attempt the problem of CPU scheduling, we use efficient encoding, and design appropriate crossover and mutation operators. Each individual is an encoded version of a proposed solution. The proposed approach consists of the individuals evaluation, their selection, which will contribute to the next generation using recombination of the parents by means of crossover, mutation and other operators. Read More...
|
Computer science and engineering |
India |
1134-1137 |
266 |
Optimal Placement of Renewable Distributed Generators in Radial Distribution System using PSO
-Sivasai Jonnadula ; M.S.Giridhar
This paper presents a Renewable distribution generation (DG) allocation strategy to boost node voltage and power loss of 69-bus radial distribution systems exploitation particle swarm improvement (PSO). the target is to reduce active power losses whereas keep the voltage profiles within the network among such that limit. The correlation between load and renewable resources has been nulliï¬ed by dividing the study amount into many phases and treating every segment severally. To handle the uncertainties related to load and renewable resources, probabilistic techniques are used. 2 operation methods, specifically “turning off turbine generator†and “clipping turbine generator outputâ€, have additionally been adopted to limit the alternative energy dispatch to a speciï¬ed fraction of system load for system stability thought. to cut back the search area and thereby to reduce the process burden, a sensitivity analysis technique has been utilized which provides a collection of locations appropriate for weight unit placement. The solutions lead to signiï¬cant loss reduction and voltage proï¬le improvement. Read More...
|
Power System Engineering |
India |
1138-1144 |
267 |
Design of a Self-Test Unit for Microprocessor in On-Line Scenario using Verilog
-Swathi G Gudadawar ; Rohit B Malagi; Dr. Meghana Kulkarni
As the technology grows day by day, testing of an embedded microprocessor in a SoC environment is becoming more complex. The design is explicitly focused on achieving testing speed and less area of the test program in a SoC. In this paper, a proposed technique which presents an innovative solution to the SoC testing. Here, architecture for the embedded microprocessor testing has been designed by using Verilog language. The proposed architecture restricts the processor to execute a test sequence during the normal operation in an online scenario, to save the execution time. Instead, it is connected to the system bus like a normal memory core to perform the test operation. The design saves execution time and uses less area for its testing unit. Nowadays, the Software-based Self-Test (SBST) and Built-in Self-Test (BIST) techniques are very popular in testing Microprocessors to reduce the testing challenges. But, SBST technique is the most preferable one in the on-line scenario. The Proposed architecture which combines BIST and SBST principle gives the perfect system to reduce the testing time in on-line scenario. The benefits of using this architecture is that it doesn’t require a memory of the system to store the data, which tries to maintain IP of the processor core and saves the execution time. The proposed solution is designed and simulated using Xilinx 13.1. Read More...
|
Electronics Engineering |
India |
1145-1150 |
268 |
BOD Removal by Adsorption Approach
-H. Ajith Hebbar ; K.S. Jayantha
Biochemical Oxygen Demand is an important factor that is to be dealt carefully in wastewater treatment. Biochemical oxygen demand (BOD) is the amount of dissolved oxygen needed by aerobic biological organisms in a body of water to break down organic material present in a given water sample at certain temperature over a specific time period. Commonly, in treatment plants BOD is removed in various units like trickling filter, activated sludge unit, rotating biological contactors etc. The principle in these methods is to ensure break down of organic materials by micro organisms. In this experiment, a batch flow study was made to monitor removal of BOD by passing restaurant effluent through a pipe column containing grains (less than 10mm) of laterite. BOD reduction in the various samples was monitored for different flow rates and column heights. Fairly good reduction of BOD was observed, to a maximum extent of 91.3%. The reduction in the BOD was due adsorption of organic materials to lateritic grains. This can be viewed as a good pre treatment measure to reduce BOD before actually taking wastewater to treatment plant. Read More...
|
Environmental Engineering |
India |
1151-1152 |
269 |
IBEENISH: Improved Balanced Energy Efficient Network Integrated Super Heterogeneous Protocol for Wireless Sensor Networks
-Bhaghia ; Jaspal Singh
For the Energy efficiency purpose BEENISH Protocol is used. The WSN network has the various nodes is used for transmit and receive the data or packets. For this transmission, these nodes used the maximum energy. When the extreme energy is used during transfer of information ,the duration of network will be decreased and also decreased constancy time of network. Many protocols are used for this issue .The BEENISH is an energy efficiency protocol which is used for rise network lifetime and for rescue energy of the nodes. Proposed code of the BEENISH protocol is implemented on the mat lab. Read More...
|
Electronics and Communication Engineering |
India |
1153-1157 |
270 |
Static and Dynamic Performance Characteristics of Plain Journal Bearing Lubricated with Couple Stess Fluid
-Deepali Kangude
A bearing is a machine element which has relative motion with another moving element known as journal. Due to the relative motion between the contacting surfaces friction and wear are present between contacting surfaces. In order to reduce the wear and friction, a layer of lubricants is used. Lubricants show strong influence on the performance of bearing. In order to improve the desired characteristics of bearing additives are added to the lubricant. In this paper various static and dynamic performance characteristics of plain journal bearing lubricated with couple stress fluid is studied. Read More...
|
Mechanical Engineering |
India |
1158-1160 |
271 |
Automatic Ration Dispensary System using Han
-Mahesh.C ; Mr. Shrinivas Mayya D
Every Indian family is issued a Ration Card by Government of India and the families are entitled to receive subsidized food grains against the card. Quantity of different grains like rice, wheat are fixed for every month for the families depending upon their income. However many families do not claim their quota of ration and yet few families manages to acquire card of other families. This has led to anarchy and black marketing of the subsidized product. As a solution to aforementioned problem this paper proposes a transparent and highly scalable Ration Distribution (Food Distribution) system with biometric authentication with face and fingerprint Biometric for Ration Card Holder. Every time ration is collected by the family is logged into the smart card. The data logging system is connected with cloud to maintain a centralized inventory across the nation. Biometric data of one member of the family is also logged in the card. Every time before ration collection, the authorized person needs to go through the verification phase. Therefore not only false and dummy card ration collection is avoided but at the same time a proper log of quantity par product acquired by the card holder is also tracked. This architecture replaces the conventional paper ration book with RFID based smart card. Read More...
|
Mechanical Engineering |
India |
1161-1165 |
272 |
Continuous Join between Dynamic Query and Graph Stream
-Ms. Vaishali Gundu Powar ; Mr. Pradeep C. Bhaskar
Graph is widely used in various real applications such as social network modeling and chemical compound analysis. In many applications, graphs are often evolving along the time in a stream fashion instead of remaining static. These evolving graphs can be modeled as graph stream. The available work is proposed on static subgraph search. We proposed method to continuously join query stream and graph stream. Nodes neighborhood information is used as filtering feature to minimize candidates for join. Nearest Neighbor Trees are generated using neighborhood information. To minimize execution cost nearest neighbor trees are converted to numerical vectors. Proposed algorithms use Dominant vector and skyline join methods for stream join. Here we present comparative analysis on these two methods. Read More...
|
Computer Science and Engineering |
India |
1166-1169 |
273 |
Emission Measurement and Testing of Multi Cylinder C.I. Engine Operated by Intercooled Turbocharger
-Akshay V. Karande ; Dr. R.R. Arakerimath
We know Turbocharger as boosting device which increases volumetric efficiency. Here is this work turbocharger is modified with Wastegate valve. Wastegate operated and Intercooler equipped turbocharger are used to enhance the performance and reduce emission. This study is mainly concerned on the effect of bypassing the exhaust which is going to turbine. Three types of Wastegate opening are selected that is 20, 50, and 80% opening. Now emissions at both outlets that is Wastegate and turbine outlet are measured. It is found that waste gate outlet has lesser emission of CO2 and HC.The use of a Wastegate operated turbocharger on this test engine has clearly increased its performance compared to its stock naturally aspirated form. As exhaust is bypassed from main exhaust line with different Wastegate opening selected. Intercooler is mainly functioned for increase in volumetric efficiency by cooling the intake charge so that more air to engine and which results finally at higher engine output. As a result we found increase in volumetric efficiency up to 7%. Read More...
|
Mechanical Engineering |
India |
1170-1174 |
274 |
Techniques of Data Mining
-Mrs. Swati Namdev
In this paper, the concept of data mining was summarized and its impact towards its methodologies was illustrated. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. The data mining based on Neural Network and Genetic Algorithm is researched in detail and the key technology and ways to achieve the data mining on Neural Network and Genetic Algorithm. This paper also conducts a formal analysis of the area of rule extraction from ANN and GA. Read More...
|
Computer Science |
India |
1175-1178 |
275 |
Finite Element Analysis of Engine Mounting System using ANSYS
-Tapas Sharma
Engine is an important part of the of the vehicle, it is heart of the vehicle. it is important to in keep in right position in vehicle ,so that it cannot cause trouble to passenger and driver comfort. The main problem by engine is the generation of vibration effect by it , which caused noise and vibration problem to passenger and driver . For this engine mounting system is used to reduced this problem . Engine mounting system pass through several refinement in order to optimized it to better design .. one such refinement is done in this work ,by changing the cross section of supporting rod of engine mounting bracket and done finite element analysis on this design on the three metal hot rolled steel , aluminum ,magnesium . the reason for taking three metal for analysis , is to reduce the weight of design ,which result in reduced in the cost of making and, the lesser load applied to transmission system of vehicle Read More...
|
Mechanical Engineering |
India |
1179-1186 |
276 |
A Novel Approach to Design and Implement the High Efficiency Multiplier
-Neha Jassi ; Arti Goel
This paper describes the single precision floating point multiplier. Floating-point numbers are widely adopted in many applications due to their dynamic representation capabilities. Floating point numbers represents real numbers in binary format. This paper presents a high speed binary floating point multiplier based on dadda algorithm with brent kung adder. To consume less area addition is done using brent kung adder replacing ripple carry adder. The design achieves frequency of 775.705 MHz with 862 slice area compared to existing floating point multipliers. The floating point multiplier is developed to handle the underflow and overflow cases. The multiplier is implemented using Verilog HDL and it is targeted for Xilinx Virtex-5 FPGA and design is simulated using Modelsim. Read More...
|
ece branch |
India |
1187-1190 |
277 |
Survey on Service Broker Algorithm for Data Center Selection in Cloud Computing
-Santosh Yadav ; U.C. Jaiswal
Load Balancing, in cloud computing is very big issue. Proper load balancing algorithm helps in achieving user satisfaction and good resource utilization. Data Center Selection Algorithms are used to assign data center for user base. User base is collection of user requests. There were overheads in earlier Data Center Selection algorithms. Some improvements are implemented in new service broker algorithms. In this survey we focus on the shortcomings of algorithms and improvements performed and future scope in this field. Read More...
|
Computer Science |
India |
1191-1193 |
278 |
A Miniaturized Polygonal Shape Patch Antenna with Triangular Mini-Fractals for Wideband Information Measure in Wireless Local Area Network Application
-Miss. Geeta B.Kalkhambkar ; Prof. B. B. Tigdi; Dr. V. R. Udupi; Prof. P. S. Chindhi
This paper presents a miniaturized hexagonal fractal antenna. The mini triangular fractals of self-duplicating structures are inserted for the bandwidth improvement. The antenna is designed for Wireless Local Area Network (WLAN) application at 2.4 GHz. The antenna middle dimensions are: length is 28 mm and the breadth is 40 mm. The substrate used is FR4 with the height of 1.56 mm. The design is simulated and optimized with a ZELAND IE3D package. There is bandwidth enhancement of 700 MHz at -16db return loss .We also obtained moderately high gain of 4.0 dB. Several iterations are carried out to achieve better performance. Read More...
|
Electronics and Communication |
India |
1194-1199 |
279 |
A SPT based Liquefaction Analysis of Ramgarh Taal in Gorakhpur City
-Nitish Kumar Chaudhary ; Dr. S. M. Ali Jawaid; Ms. Sana Zafar
Soil liquefaction has been a major cause of damage to soil structure, lifelines and building foundation. Liquefaction is one of the major types for ground failure. Liquefaction is a soil behavior phenomenon in which a saturated soil losses their strength and stiffness due to high excess pore-water pressure generated by during strong earthquake ground shaking. The devastating damage of liquefaction induced ground failures in the Alaska 1964 and Niigata 1964 earthquakes serve as a clear reminder of such events. Liquefaction is one of the main effects during an earthquake that is responsible to structural failure and damage to roads, pipelines and infrastructures. Liquefaction is one of the ground failures in potential earth science hazard. Zoning for liquefaction, therefore, has been an important goal for seismic hazard mitigation. Ramgarh Taal is situated to the southeast of Gorakhpur in Uttar Pradesh. It is a natural lake. Since Gorakhpur falls in the seismic zone IV so there is need for the assessment of liquefaction potential. So the study area is “Ramgarh Taal†to recognize the conditions that exist in a soil deposit before an earthquake in order to identify liquefaction. The main aim of this work is to analyse the liquefaction potential of “Ramgarh Taal†in Gorakhpur city using SPT data collected from the various sites of project by simplified procedure of Idriss & Boulanger. Determination of liquefaction potential due to earthquake is complex geotechnical problem. Many factors including soil parameters and seismic characteristics influence this phenomenon. To assess the liquefaction potential in an area, it is important to examine the geotechnical characteristics like grain size distribution, percentage of silt, water table, water table depth and SPT ‘N’ value. Here liquefaction potential analysis is done to determine the factor of safety at different depth. The liquefaction is severe in the “Ramgarh Taal†due to the presence of silt and poorly graded sand. So the assessment of liquefaction helps us to select a suitable ground improvement technique and foundation system for future correction in the region. This study helps us to mitigate the disastrous effect of liquefaction. Read More...
|
Civil Engineering |
India |
1200-1206 |
280 |
Analysis of Software Change Impact Through Class Diagram
-Himanshu Srivastava ; Dharmendra Kumar; Anurag Kumar Pandey; Anubhava Srivastava; Sonia Lamba
During the entire software lifecycle requirement changes are occurred, these regular and uncontrolled require-ment change will lead to a wastage of time and effort. Impact analysis is then defined as the process of identifying the potential consequences (side effects) of a change, and estimating what needs to be modified to accomplish a change. Without proper analysis of changes which are implemented to software, they may often cause unexpected ripple effects. There are various approaches to analyze the change on existing system. Model driven approach is one of them. Impact Analysis is performed on Unified Modeling Language (UML) diagrams e.g. class diagram, use case diagram, sequence diagram. Software Change Impact Analysis needs to be computed at every change request for software systems, as developers will need fast access to the impact information for several critical software engineering tasks such as risk analysis, effort estimation, and regression testing. This paper introduces Class diagram based Approach to Analyze Software Change Impact. Proposal of this paper is a UML model based approach strictly to use Class diagram for impact analysis that can be applied before any implementation of the change, thus allowing for early decision making and change planning. Read More...
|
Software Engineering |
India |
1207-1211 |
281 |
Quality Score Estimation of an Image for Human Consumption for Human Consumption with Partial Information
-Abhipray P. Paturkar ; Mangesh Patil
Algorithms which have been created for predicting the perceived quality of a image defines the field of objective visual quality assessment (QA). Recent image quality assessment (IQA) methods achieve excellent correlation with human visual perception of quality of image. Basically, it is a challenge to produce better results. One promising method is to rate image quality estimation by visual importance. To this result, we describe three strategies- Full Reference IQA (FR), No Reference IQA (NR), Reduced Reference IQA (NR). In comparison with some basic studies we find that all these schemes can enhance the comparisons with subjective judgment significantly. There is an important factor in IQA which is depends on the information change. Many metrics have been used to estimate the difference between distorted and reference image. There are various families present, which depend on change in information, varies from full reference to no reference. Here we will have brief look on FR, NR, and RR QA metrics. Read More...
|
Image Processing |
India |
1212-1214 |
282 |
Illustration of Routing Protocols for Mobile Ad Hoc Network
-Anupriya Rastogi
A mobile ad hoc network is a collection of mobile nodes that communicate with each other, generally not having any infrastructure. It uses traditional TCP/IP structure to provide end to end communication between the nodes. Nodes are temporally connected to each other; a network does not have any central control station. All the nodes act as routers and participate in path discovery and maintenance to the other nodes in the network. This allow user to create their PAN. The network topology keeps on changing as per requirement of the user, because of this changing scenario, network management, routing update and other tasks cannot be performed easily. Hence there are lots of challenges which shall remain unfulfilled. Various types of routing protocol have been introduced to accomplish requirements of ad hoc network, in this paper different types of routing protocols & their routing strategies have been discussed. Read More...
|
Electronics and Communication |
India |
1215-1219 |
283 |
A Novel Approach to Detect Foreground in Video Sequences Based on Mixture of Gaussians
-Navneet S. Ghedia ; Prof. Dr. C.H. Vithalani; Prof. Dr. Kiran Parmar
Our aim is to develop a robust visual monitoring system that passively detects moving objects in a specified space and identify the activities of those objects. In the paper, we focus on foreground detection. Mixture of Gaussian is a very well know and friendly approach for background modelling to detect moving objects. Our method improves Gaussian mixture model by continuously updating the mixture parameters. It gives faster update and a smoother object mask. The Gaussian mixture model approach consists of different Gaussian distributions, mean, standard deviation, weight. So, focus is to develop a robust visual monitoring system which can work successfully against illumination variations, clutter background, slow moving objects, sawing trees and objects being introduced or removed from the frame. Read More...
|
Electronics & Communication Engineering |
India |
1220-1224 |
284 |
Designing of a Capacitive Coupled Triangular Microstrip Patch Antenna using Superstrate
-Akanksha Chaddha
Microstrip antennas are presented and simulated by many researchers which give us a clear view about the basic characteristics of MSA and leads toward designing different patch shapes to enhance the performance of MSA for different applications. In this paper a Traingular microstrip patch antenna is considered to be capacitive coupled and designed using HFSS simulation software and the results regarding antenna performance is obtained by simulation. As a matter of course, The simulation of the designed antenna structure shows the effectiveness of the antenna in terms of bandwidth, gain, directivity. The result analysis shows that the designed antenna structure is suitable for two different frequency bands i.e. 0.56 THz and 0.58 THz. with a bandwidth of 1.17% which makes this antenna structure suitable for two different types of applications. Read More...
|
Electronics & Communication Engineering |
India |
1225-1227 |
285 |
Survey on Basic Concept of Big Data
-S.Manasa ; Y.Rama Mohan
Big Data, a new technology is a collection of large amount of data sets which include medical data, business data, weather data, organizations data, etc.,. The size of the data will ranges from dozens of terabytes to many petabytes. Because of the presence of such a huge amount of data it becomes tough to handle by traditional data processing applications such as relational data base management systems, desktop statistics and visualization packages. So a massive parallel processing software technique that will run on hundreds and thousands of servers are required. The challenges are listed as storing, retrieving, sharing, searching, transfer, analysis, capture, and visualizing. There are many techniques that are existing to handle and process all these data sets in which some are hadoop, map reduce, hive, pig, zookeeper, Hbase and so on. Read More...
|
Computer Engineering |
India |
1228-1230 |
286 |
Design and Optimization of the Landing Gear for an Airbus A320
-Chetan Khanapur ; Abhijith Vaidya S
Landing and take-off from the surface of the ground is of paramount importance for any aircraft, there is very less room for error. As there is risk of valuable property and life, thus a general aviation aircraft is facilitated by the landing gear mechanism. The design of the landing gear is one of the most necessary and nonnegotiable aspects in terms of aircraft design. Hence main landing gear is considered in the present study. This current paper involves the design of the landing gear for subsonic (>1235 kmph) transport aircraft whose take-off mass is approx. 73.5 tones. Read More...
|
Mechanical Engineering |
India |
1231-1234 |
287 |
Experimental and Analysis of Butt Weld on Weld Pool Geometry of Aluminium Alloy Plate using Finite Element Method: A Review
-Sushil Kumar Maurya ; Prof.A.K.Jain
Gas Tungsten Arc Welding Process is leading in the development in arc welding process which uses a non-consumable Tungsten electrode to produce the weld that increasing higher productivity and good quality [1]. The present investigation highlights Experimental and Analysis of Butt Weld on Weld Pool Geometry of Aluminium Alloy Plate Using Finite Element Method. The welding parameters like welding current, shielding gas flow rate and welding speed play a major role in deciding the joint properties. Welding parameters influence in the mechanical properties. The mechanical properties of welded materials are measured in terms of tensile strength and Brinell hardness using Design of experiment concept; experiments were carried out to predict tensile strength and Brinell hardness of the welded joint. After that temperature distribution and distribution of the stresses in the welded aluminium alloy plate during the welding operation are investigate by finite element method using ANSYS software. In fact, welding of aluminium is one of the biggest challenges to the practicing engineers. At present trend in fabrication industry, it is necessary to have welding because of high reliability, easiness in operation and good surface finishing. This concept can be effectively utilized in the manufacturing of ship building, Pressure vessels, aerospace and transportation equipment such as building of railroad cars, vehicle bodies and missile components. Read More...
|
Mechanical Engineering |
India |
1235-1239 |
288 |
A Rectangular Microstrip Antenna Designed for ultra Band Application using Superstrate
-Tripti Basedia ; Devyanshu Rao
In this paper, the bandwidth enhancement of Microstrip patch antenna is done by making a direct contact between patch and feed line. The design antenna obtained good results such as Return Loss of -18dB and -21.5dB, at two frequencies with the solution frequency of 10 GHz. The VSWR of 1 and 1.1 is obtained at the two resonant frequencies. This paper is effectively designed to work in X Band. The broadband characteristics of antenna are shown in simulated application results of design microstrip patch antenna. The designed structure and performance of antenna is simulated using High Frequency Structure Simulator (HFSS) simulation software. The antenna is fed by 50Ωmicrostrip line feed. The concept of Superstrate is introduced to make the work more efficacious and highly useful in latest industry trends. Read More...
|
Electronics & Communication Engineering |
India |
1240-1242 |
289 |
Securing Privacy in Profile-based Personalized Web Search
-Manali Wadnerkar ; Dr. D.R. Ingle
Although personalized search has been proposed for many years and many personalization strategies have been investigated, it is still unclear whether personalization is consistently effective on different queries for different users, and under different search contexts. In this paper, we study this problem and provide some preliminary conclusions. We present a large-scale evaluation framework for personalized search based on query logs. Also, we reveal that personalized search has significant improvement over common web search on some queries but it has little effect on other queries (e.g., queries with small click entropy). It even harms search accuracy under some situations. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user-specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. Read More...
|
Computer Engineering |
India |
1243-1246 |
290 |
Design and Implementation of Network Intrusion Detection System using FPGA
-Rashmi M Kambalimath ; Gayatri Patil; Mahesh B Neelagar
Today’s network security is more important factor, which mainly depends on Network Intrusion Detection System (NIDS). NIDS system detects the erroneous data in the network. The FPGA is the most relevant appealing technology which has ability to punctually update the supported rules and detects the new emerging attacks in network. The issue is how to scale FPGA based NIDS implementation to ever faster network links. The important factor is to balance traffic over multiple hardware blocks. Each hardware block implements the whole rule set. The NIDS system can be implemented in software based technology as well. The hardware blocks of NIDS system uses CAM which results in achieving high speed up to 277.635MHz. The hardware implementation is carried out using Verilog HDL language on SPARTAN-6 FPGA kit. Read More...
|
COMPUTER NETWORK |
India |
1247-1251 |
291 |
Robust NN based classifiers for Handwritten Recognition of Alpha Numerals
-Vineet R Kumar ; Dr. Arzoo Dahiya
Developing intelligent machines for recognizing a character is certainly not an easy task simply because a character could be printed in many possible methods. Also you will find so imperfections that are many variation of handwriting such as for example alignment, noise and angles, which will make handwritten character recognition tough to implement with a device. All these imperfections of handwritten characters may not be removed easily. This means that a single process or single machine just isn't capable of performing the method that is entire. You can accomplish it by a few processes that return some result that is desirable. This paper is about the related work for Handwritten Numeral Recognition and its Approaches. Read More...
|
Computer Science And Engineering |
India |
1252-1260 |
292 |
Acoustic Source Localization by using Time Difference of Arrival Estimation
-Ajay Verma ; Ms. Ritu
Acoustic Source localization is the technique which is used to locate the sound source in a given environment. The sound source can be located with the help of sound signal recorded by the microphone. There is one original signal that comes straight to the microphone and other signals are reflections of the original signal reflected from the walls of the room. In this paper, we proposed a method of locating the sound source using the microphone array. We locate the sound source by calculating the time difference using time difference of arrival method. We process this time difference by using subband and broadband approach. The results of this paper show that we can find the position of sound source by calculating the angle towards the sound source with an accuracy of about 60-70%. Read More...
|
Electronics and Communication Engineering |
India |
1261-1264 |
293 |
Design and Fatigue Analysis of a Spherical Pressure Vessel as Per ASME Codes and Validation with FEA Results
-Vinod Kumar.C.N ; Manu.S.S
Pressure vessels are containers to store a fluid of any form under pressure. Pressure inside the vessel might either be positive or negative. Since the pressure vessels are usually associated with high pressures and temperature, design of these vessels is of utmost importance as human life and property are at risk. Because of such high stakes industries follow a standard code for the design and fabrication of such pressure vessels. The aim of this work is to carry out a detailed design & Fatigue analysis of a Spherical Pressure vessel. The Project deals with the design, analysis and fatigue life evaluation of a Spherical Pressure Vessel as per ASME standards. In this case a spherical pressure vessel was considered since it is a more stable structure in comparison to other shapes. The pressure vessel is being designed as per ASME codes & standards to legalize the design. Geometrical and finite element model of Pressure vessel is created using CAD CAE tools. The obtained FEM results are compared with ASME standards and a good agreement between them is obtained. Fatigue life evaluation of the pressure vessel is done with ANSYS fatigue tool for 30 years, on an average of 10 cycles per day. Two shell materials have been considered for analysis, carbon steel and a stainless steel. Comparisons are drawn between the two materials and a better material is suggested. Read More...
|
Mechanical Engineering (Pressure Vessel Technology) |
India |
1265-1268 |
294 |
(Ï„_i,Ï„_j) -bÄ- Closed Sets In Bitopological Spaces
-R. Subasree ; Dr. M. Maria singam
In this paper we introduced the concept of 〖(τ〗_i,Ï„_j)-bÄ â€“closed sets by using Ï„_i-Ä â€“ open set and Ï„_j-b–closure operator in bitopological space. Properties of these sets are investigated and we introduce two new bitopological spaces (i,j) -TbÄ â€“space and (i,j) –T*bÄ â€“spaces as applications. Further we introduce and study 〖(τ〗_i,Ï„_j)-bÄ–Neighbouhood,〖(τ〗_i,Ï„_j)- σ_K–bÄ–Continuous maps and Pair wise bÄ– irresolute maps. Read More...
|
Engineering Mathematics |
India |
1269-1276 |
295 |
Behavioral Malware Detection in Delay Tolerant Sensor Network
-Maria Theresa Hoover ; Manjunath C R
Delay tolerant sensor networks (DTSNs) are a class of emerging networks that experience frequent and long-duration partitions and are kind of wireless mobile network which may lack continuous network connectivity. Multicast distributes the data to multiple users, a service is required for many DTSNs applications. There exist delay in the network due to link congestion and routing path length to overcome this problem the routing algorithm of minimizing maximum link congestion on grid networks is being used. There can be a possibility of malware occurrence to a node so depending upon the behavior of the node the malware detection is done. The proposed work aims at using threshold based filtering propagation algorithm to detect the malware in the network. Read More...
|
Networking (DTSN) |
India |
1277-1279 |
296 |
Survey on Clustering Approach for Wireless Sensor Networks
-Kanakaraju.R ; Meera. A
Wireless sensor network is emerging field because of its wide applications and least cost. It is a wireless network which subsist a group of small sensor nodes which communicate through radio interface. These sensor nodes are composed of sensing, computation, communication and power as four basic elements. But limited energy, communication capability, storage and bandwidth are the main resource constraints. Our survey is based on various aspects of wireless sensor networks. In this paper we also focused various Architectures of wireless sensor networks, Clustering Approach, and Different versions of LEACH Protocol. Read More...
|
Electronics & Communication Engineering |
India |
1280-1283 |
297 |
Effect of Aggregate Type on the Compressive Strength of Concrete With and Without using Super-Plasticizer
-Abhishek Prasad ; Dr. Abhay Sharma
In construction industry concrete made has its own priority above all constructional materials in the ancient time lime was used as a binder material for construction, but as time elapses concrete took his place as a binder and its wide use makes it important. It has different properties which plays an important role among them compressive strength is the most essential one as more is the strength more will be its capacity to hold live load on it after it hardens. As we know concrete constitute of cement, sand and coarse aggregate and coarse aggregate have the maximum volume of the concrete, so on some aspect its quality may also affect the properties of concrete. Granite gravel and crushed quartzite were used as a coarse aggregate in concrete for M40 mix and design mix was as per IS: 10262-2009 and with both type of coarse aggregate super plasticizer was also used. Hence for specimens of granite gravel with and without admixture and specimen of crushed quartzite with and without admixture suggested crushed quartzite is also appropriate for making concrete by using it as a coarse aggregate without admixture. Read More...
|
Civil Engineering |
India |
1284-1286 |
298 |
AODV+, FSR, M-DART : Analysis of Reliable and Scalable Routing Protocols in MANETs
-Romi ; Rubble Tayal; Shanu Malhotra
As in today’s world wireless become an emerging field for research. Mobile Adhoc Network (MANETs) is the one part of wireless technology. In MANETs, there are Hybrid (AODV+), proactive (FSR, M-DART) routing protocols. This paper provides the performance analysis of these different routing protocols under various network density and traffic using ns-2 simulator. The study of this analysis provides which routing protocol is best suited for network density and offered load. Metrices used for the performance evaluation are packet delivery ratio, end-to-end delay, throughput and routing overhead are considered with respect to pause time and source-destination pairs (SDPs). Read More...
|
Computer Science |
India |
1287-1289 |
299 |
Durability Aspects Study of GGBS and Crusher Sand based High Performance Concrete
-Mr. Prasad S. Barve ; Dr. Lalit S. Thakur; Mrs. Ruchi P. Barve; Mr. Mahesh S. Patel
Concrete made from ordinary Portland cement continues to be used as one of the primary material because of its durability and strength characteristics in service life. But the contrary becomes the case when such concrete is exposed to aggressive environment created by the prevalence of chloride ions that are common in marine/coastal environment characterized by temperature extremes, that is peculiar to India. Same time, present global environmental requirements suggest the civil engineers for reducing the consumption of OPC. Use of mineral admixtures like Blast Furnace Slag, Fly Ash and Silica Fume etc. in concrete may be a suitable solution in such situation. Hot marine and coastal environment with large variations in temperature, constitute an aggressive environment that has been found to be deleterious to the strength and durability characteristics of concrete, thus causing premature deterioration of concrete structures. Research works to reverse this trend go on continuously. This paper presents one of such works which investigates the effect of partial replacement of cement with slag and replacement of normal river sand with crusher dust for concrete preparation. The specimens cured at elevated temperatures were studied for all the durability criteria at the optimized crusher sand percentage. It discusses the resistance of GGBFS blended concrete to Chloride attack, Sulfate attack, Carbonation, Aggregate-Silica reaction and Frost attack with factors influencing its performance. It was found out that partial replacement of cement with slag increases the resistance of concrete to chloride penetration. The durability of HPC specimens was evaluated on the basis of reduction in compressive strength when exposed in Sulfuric acid (pH=5) solution for 28 days. Specimens containing lesser alkali were found to have lower water absorption as compared to normal concrete. Read More...
|
Civil Engineering |
India |
1290-1295 |
300 |
A Survey on Feeding Techniques of Microstrip Patch Antenna
-Vinod Dohre ; R K Prasad
The paper shows how to improve the antenna performance by the analysis of bandwidth enhancement. The sizes and weight of various wireless electronic systems have rapidly reduced due to the development of modern integrated circuit technology. Microstrip patch antennas are increasing in popularity for use in wireless applications due to their low-profile structure, less weight, reasonable cost of production and can be easily integrated with microwave integrated circuits, but it also has some drawbacks. Inferior gain and inadequate bandwidth are the major drawbacks of a patch antenna. Almost all the important wireless applications lie in the band starting from 900 MHz to 5.8 GHz. Read More...
|
Electronics & Communication Engineering |
India |
1296-1298 |