No. |
Title and Author |
Area |
Country |
Page |
151 |
A Survey on Security in Encryption Based Cloud Data Search
-Haritha.M ; C.Thirumalai Selvan; V.Venkatachalam
Cloud computing is the internet based service where the services are provided to the users on remote servers. The advantage of cloud computing is to store and create data on cloud servers. But the cloud storage contains drawback of privacy vulnerabilities and data securities. Hence there is many number of techniques to control these issues. In this paper a survey on several techniques such as order preserving encryption (OPE), privacy preserved index (PPI), searchable encryption (SE), identity based encryption (IBE), multi-keyword ranked search over encryption (MRSE), searchable attribute based encryption (SABE), fuzzy keyword search and privacy preserving semantic search are the techniques we surveyed for security in cloud. Read More...
|
Computer Science |
India |
631-634 |
152 |
Performance Evaluation of Mobile Agents by Applying its Newfound Measures
-Minakshi Sharma ; Sapna Mahar
Agent oriented technology is a strong way of approaching large-scale commercial problems of software industry. This technology has exciting features like social ability, reactivity, autonomy, intelligence, proactivity and mobility. Mobility can be defined by the agent’s ability to migrate autonomously from one environment to other to compute on behalf of user. Mobile agent is an agent that can move in a communication network. These agents must be too smart in order to act efficiently. Network management and network load balancing are its major applications. Mobile agents are cooperative, autonomous and interactive. These complex systems require a lot of analysis for their good performance. Some relevant measures may help in evaluating the performance. The objective of this paper is to assess the performance of mobile agents with a set of proposed measure that may check each aspect of mobile agent’s complexity and its quality. Read More...
|
Software Engineering |
India |
635-637 |
153 |
Super- Efficient Solar Panels with Nantennas
-D.Dilip Kumar ; R.Edwin Manoj; Dr.G.Siva Kumar
People have been using Solar Power to cook, heat, disinfect, from ancient period. The only limit was human ingenuity. And now with the solar panels you can turn solar energy into free electricity. Depending on construction, solar panels can produce electricity from a range of frequencies of light, but usually cannot cover the entire solar range (specifically, ultraviolet, infrared and low or diffused light). Hence much of the incident sunlight energy is wasted by solar panels. At present, solar panels designed to generate electricity are fairly expensive to produce. We are going to present a paper about using nanotennas in solar panels. This paper presents an alternate to the Photovoltaic (PV) approach, using recent advances in nano-technology, and provides a pathway for nantennas that combine broadband energy collection with high efficiency and low cost. These "nanoantennas" could replace the silicon semiconductors in special solar panels, which could harvest more energy from a wider spectrum of sunlight than is currently possible. Read More...
|
Mechanical Engineering |
India |
638-640 |
154 |
A Novel Approach of Conventional Image Compression on Color Images and Transform Based Technique Using Discrete Cosine Transform
-D.Napoleon ; G.Kiruthika; R.Dayana
Image compression is a most popular application of data compression on digital images. This compression is reducing the size in bytes of an image without corrupting the quality of the image. The minimization in file size allows more images to be stored in a given amount of disk or memory space. There are numerous different ways are existing for image compression. This paper concerned with the lossy compression techniques implemented for RGB Images, where data loss cannot affect the image quality and the clarity also will not be decreased with presenting the additional procedure for compressing methods. This compression technique is very popular. DCT Image Compression is very easy one for Greyscale images, while compressing the Colour image it is hard to implement. However, this RGB image compression has been implemented successfully. After compression the file size is reduced more and image quality is nearly the same. This analysis of compression techniques addresses the problem of minimizing the amount of data required to represent a digital image. It is also used for eliminating the redundancy that is avoiding the duplicate data. It also reduces the storage space to load an image. The main objectives of this paper are reducing the image storage space without corrupting the visual quality, Easy maintenance and providing security. The proposed Discrete Cosign Transform techniques efficiently work with RGB image which is compressed up to 90%, 80% 70%, 60%, 40% and 20% and optimum results are obtained. The analysis of obtained results has been carried out with the help of MSE (mean square error) and PSNR (peak signal to noise ratio). This compression method is entirely developed by using only basic MATLAB functions. Read More...
|
Computer Science |
India |
641-645 |
155 |
Gesture Controlled Robotic Hand using Flex Sensor
-Sandeep Kumar Maurya ; Mr. R.K. Prasad
Sensor plays an important role in robotics. Sensors are used to determine the current state of the system. Robotic applications demand sensors with high degrees of repeatability, precision, and reliability. Flex sensor is such a device, which accomplish the above task with great degree of accuracy. The pick and place operation of the robotics hand can be efficiently controlled using micro controller programming. This designed work is an educational based concept as robotic control is an exciting and high challenge research work in recent year. Read More...
|
Electronics & Communication Engineering |
India |
646-648 |
156 |
Utilization of Different Waste in Concrete
-Anoop Chhabra ; Devansh Jain; Nita Rajvaidya
The measure of waste glass has step by step expanded over the late years because of a perpetually developing utilization of glass items. The vast majority of the waste glasses are being dumped into landfill locales. The area filling of waste glasses is undesirable on the grounds that they are not biodegradable, which makes them ecologically less neighborly. There is gigantic potential for utilizing waste glass as a part of the solid development segment. Then again, with characteristic sand stores the world over becoming scarce, there is an intense requirement for an item that matches the properties of regular sand in cement. In the most recent 15 years, it has turned out to be clear that the accessibility of good quality regular sand is diminishing. Ecological concerns are likewise being raised against uncontrolled extraction of normal sand. The contentions are for the most part with respect to securing riverbeds against disintegration and the significance of having normal sand as a channel for ground when waste glasses are reused in making solid items, the creation expense of solid will descend. Waste glass powder can display attributes like that of sand. In these research project properties of concrete is evolved using Fly Ash, Recycled concrete aggregate, Glass Powder and Crumb rubber. This project is divided into two parts i.e. Research Program 1: This Program consists concrete containing Fly Ash, Glass powder and Recycle Aggregate. Here cement is partially replaced by 30% Fly Ash, Coarse Aggregate is partially Replaced by 40% Recycled Concrete aggregate and Glass Powder partially replaced Fine aggregate with varying percentage from 15% to 25% at interval of 5%, and Research Program 2: This Program consists concrete containing Fly Ash, Glass powder and Recycle Aggregate. Here cement is partially replaced by 30% Fly Ash, Coarse Aggregate is partially Replaced by 40% Recycled Concrete aggregate and crumb rubber partially replaced Fine aggregate with varying percentage from 5% to 10% at interval of 2-3%. Read More...
|
Civil Engineering |
India |
649-654 |
157 |
Energy Efficiency and Traffic Optimization through Data Aggregation in Wireless Sensor Networks
-Claudio Barone ; Fabrizio Ciarlo; Sebastiano Testa
In this paper we analyze and compare two algorithms for query based converge cast in WSNs and show that it’s possible to achieve better performances in terms of energy consumption and total number of packet transmitted by means of data aggregation. We also show the impact of data aggregation on the total latency. Read More...
|
Computer Engineering |
Italy |
655-659 |
158 |
Personalized Search With User Privacy Protection
-S.Poornima ; Mr. R. Rangaraj
The quality of search services, personalized web search (PWS) provides better results in internet and has been attracting attention recently. Many researchers tailored for individual user needs in PSW. One of the most critical benefits personalized search is to improve the quality of decisions that consumers make. The major barrier of PWS is to disclosure the private information during the search. To protect user privacy in profile-based PWS, two contradicting effects are considered during the search process. On the one hand attempts are made to improve the search quality with the personalization utility of the user profile by hiding the privacy contents existing in the user profile to place the privacy risk under control. The proposed work is very effective and efficient and does not require iterative user interaction. The work enhances the stability of the search quality by avoiding the unnecessary exposure of the user profile. With this system admin can easily find out the ratings. Admin can cluster the user interest which allows search engines to sell more advertisements because companies understand that they will have a better opportunity to sell based on high percentage matched individuals than medium and low percentage matched individuals. Read More...
|
Computer Engineering |
India |
660-663 |
159 |
Implementation of Embedded PLC for Batch Mixing System by using ARM Controller
-Chetana Narayan Gangurde ; Rupali S. Khule
These As a result of rapid advancement of technology, complicated control tasks are accomplished with a highly automated control system. With current advancements and reconfigurability of manufacturing, programmable logic controllers (PLCs) have become an integral part of nearly all of today’s industrial processes. A Programmable Logic Controller (PLC) is a specialized computer used for the control and operation of manufacturing process and machinery. PLC’s are very important to automate any system. Embedded Systems are hardware and software components working together to perform a specific application. The conceptual design of Embedded PLC combines the advantage of PLC and Embedded system together. Embedded PLC is designed and developed for system automation. This Embedded PLC is ARM based system for processing the IO’s. Embedded PLC makes powerful combination of LabVIEW software with LabVIEW Embedded Module for ARM Microcontroller. The features of the proposed PLC are flexible to design and make it relatively easy to learn programming and cost effective with high speed. The implementation of Embedded PLC is discussed and evaluated. For the testing of Embedded PLC prototype is developed as Batch Mixing System is implemented. Read More...
|
Electronics & Communication Engineering |
India |
664-668 |
160 |
Split Tensile Strength Study of Self-Curing Concrete and Conventional Concrete
-Abhishek Singh Deshmukh ; Dr. Rajiv Chandak
The present study involves the use of super absorbent polymer (SAP) in concrete which helps in self-curing and helps in better hydration. In the present study, the effect of super absorbent polymer (SAP) on split tensile strength by varying the percentage of SAP by weight of cement from 0.2%, 0.3% and 0.4% were studied for both mixes M30 and M20, and it is compare with same grade of concrete which is made by conventional method. It was found that SAP could help in self-curing by giving strength on par with conventional curing. Read More...
|
Civil Engineering |
India |
669-672 |
161 |
A Trigonomatric Approach for Face Recognition System
-Faseeh Ahmad ; Manish Madhava Tripathi; Sonali Yadav
A facial recognition biometric system is a computer based application for automatically identifying and verifying a person from a input image. One of the way is to do this is by comparing extracted facial features from the input image and a facial database image. It is mostly used in security application. This paper shows the readers the fast and efficient algorithm for the face recognition system. In this framework image of person is captured in control environment and store in the database. The authentication of user is also done in the control environment. Read More...
|
Computer Engineering |
India |
673-675 |
162 |
Analysis and Enhancement of parameters over AODV in AOMDV using opnet 14.5
-Manish Kumar Agrawal ; Narendra Agrawal
The network in which no. of mobile nodes can communicate with each other through a radio wave without any specified infrastructure is popularly known as Mobile Ad-hoc Network(MANET).MANET has a number of routing protocols. The popular ones so far are Dynamic Source Routing (DSR), Destination Sequenced Distance Vector (DSDV), Ad-hoc On-demand Distance Vector (AODV), Ad-hoc On-demand Multicast Distance Vector (AOMDV) and Temporally-ordered Routing Algorithm (TORA)routing protocol. Among them the AODV and AOMDV routing protocol meets efficiently with the ad-hoc network specification. For last few years routing protocols of mobile ad-hoc networks (MANETs) were simulated as a function of mobility, number of nodes, and size of the network but not as a function of route maintenance parameters such as Active Route Timeout (ART) and Delete Period Constant (DPC=n) with moving source-destination (node) pairs in network as well. The simulation study of proposed routing protocol is carried out using OPNET 14.5 simulation tool. The simulation results of different ‘ART’ and ‘n’ for the performance metrics net throughput, route discovery time and % of packet drop are analyzed graphically for proposed routing protocols. The default values for AODV are ART =3 and n = 5.Finally this paper presents the Performance matrices evaluation and comparison of AODV and AOMDV routing protocol by varying Active Rote Timeout (ART) and Delete Period Constant (n) at different Source –Destination (node) pair using opnet 14.5. Read More...
|
Computer Engineering |
India |
676-681 |
163 |
RF Survey for Establishing Better Long Term Evolution Network
-Rakesh Patel ; Jyotsna Agrawal; Dr. J. M. Keller; Dr. P. Mor; Dr. P. Dubey
To establishing a new BTS cell site and Tower in LTE Network there is need to find the best suitable place from where the tower will cover maximum area according to the need. For finding out the desired place there is a need of survey and that survey is known as RF Survey. After the RF Survey, tower installation takes place and after installation and optimization the tower is under working condition and serves the services to that desired place according to the need of customers. In this paper I concentrate in RF Survey part, their types, how RF Survey done and techniques. Read More...
|
Electronics & Communication Engineering |
India |
682-683 |
164 |
Management of Reactive Power Using Evolutionary Techniques
-Priyawrat Anshuman ; Dr. L. S. Titare
This paper presents an algorithm for minimizing the generator fuel cost and active power loss based on voltage stability using Genetic algorithm. The generator fuel cost and active power loss are mitigated by the management of reactive power via FACTs (UPFC). The optimal power flow is computed using N-R technique subjected to operational and stability constraints. The developed algorithm has been implemented on the modified IEEE 30-bus system and compared with Particle swarm optimization technique. The obtained results indicate that the Genetic algorithm (GA) provides better optimized solution than Particle swarm optimization technique (PSO). Read More...
|
Electrical Engineering |
India |
684-688 |
165 |
Characterization and Comparison Study of Sisal and Jute Hybrid Composite
-Nandasudhan H ; Dr. Keerthi prasad K.S; Chandan Chawan R
Among the various synthetic materials that have been explored as an alternate to iron and steel for the use in automotive, plastics claim a major share. During the last decade, the study of filled plastic composites has simulated immense interest in meeting the shortage of plastic materials. Plastics find an extensive application as they have less weight, low water absorption, high stiffness and strength. At present, due to uncertain conditions in the shortage and the cost of petroleum, and it’s by products, there is a need to search for its alternate, which is nothing but natural fibers are cheaper, bio-degradable and have no health hazard. Furthermore natural fiber reinforced fibers are seen to have good potential in the future as a substitute. Natural fibers are extracted from various plant parts and classified accordingly. In present investigation natural hybrid composite is developed using Sisal, Jute and E-Glass as reinforcing material and Epoxy as a matrix material. To sustain the environmental condition and water absorption, E-Glass is used. The fabrication is done using hand layup technique. The developed hybrid composite will be subjected to different kind of test to determine mechanical properties. The result shows that the Sisal hybrid composite has good mechanical properties compared to other hybrid composite. Read More...
|
Production Engineering |
India |
689-692 |
166 |
Enhanced Secrecy-Preserving Peer to Peer Multimedia Sharing Based on Recombined Fingerprints
-Rajkumar.D ; Rajkumar.D; RajivKannan.A
Unidentified fingerprint has been recommended as a suitable solution for the authorized sharing of multimedia contents with patent protection whilst preserving the confidentiality of buyers, whose identities are only shown in case of prohibited re-distribution. However, most of the existing unidentified fingerprinting protocols are unrealistic for two main reasons: 1) the use of intricate protracted protocols and/or homomorphism encryption of the substance, and 2) a unicast advance for contribution that does not extent for a massive Number of buyers. This paper stems from a foregoing proposition of recombined fingerprints which overcome a number of of these drawbacks. Yet, the recombined fingerprint approach requires a intricate graph seek for traitor tracing, which needs the involvement of other buyers, and honest proxies in its P2P allocation scenario. This paper focus on removing these disadvantages resulting in an proficient, scalable, privacy-preserving and P2P-based fingerprinting system. Read More...
|
Computer Science |
India |
693-695 |
167 |
FNR algorithm for Wireless Sensor Networks using Particle Swarm Optimization algorithm
-Tathappa Rachannanavar ; Hanumanthappa S N
Wireless Sensor Networks are the wireless networks contain spatially speckled autonomous devices (sensors) to monitor the physical conditions and ecological parameters. Nodes in WSNs (Wireless Sensor Networks) are very prone to failures due to energy depletion, defective hardware and environmental conditions. Fault tolerance is one of major issue in WSNs. This paper proposes a fault node recovery algorithm, which will improve the life time of WSN when nodes shut down. The FNR (fault node recovery) algorithm proposed here is the combination of Grade Diffusion algorithm and Particle Swan Optimization algorithm which will detect and recover the fault node in most efficient way and replace the sensor nodes with more reused routing paths and also increases the number of active nodes. Reduce the rate of data loss with reduced energy consumption. Read More...
|
Electronics & Communication Engineering |
India |
696-700 |
168 |
Optimal Utilization of Grid-Connected PV -Wind-Fuel Cell Hybrid System
-Hitesh B Kapadiya ; Rajesh D. Panchal; Vinod S. Tejwani; Sanjay V. Jagani
Future smart grids are becoming smarter by applying intelligent control techniques. In this paper, a hybrid energy system consisting of wind, photovoltaic and fuel cell designed to supply continuous power to the load. Wind and photovoltaic are the primary power sources of the system to take full advantage of renewable energy around us. The FC is used as a backup and long term storage system. For a stand-alone application, a battery is also used in the system as short term energy storage to supply fast transient and ripple power. In the proposed system, the different energy generating sources are integrated. Dynamic models for the main system components, namely, wind energy conversion system (WECS), PV energy conversion system (PVECS), fuel cell, power electronic interfacing circuits, hydrogen storage tank is developed. Solid Oxide Fuel Cell (SOFC) types of fuel cells has been modeled in this paper & also based on the dynamic component models, a simulation model for the proposed hybrid energy system has been developed using MATLAB Simulink. The overall power management strategy for coordinating the power flows among the different energy sources is presented also in this paper. Read More...
|
Electrical Engineering |
India |
701-709 |
169 |
Elastic Property of Duplex Stainless Steel using Ultrasonic Velocity
-D.C.Bernice Victoria ; Gene George; A.Victor Babu; Kevin Ark Kumar; P. Aruna
Elastic constants of duplex stainless steel and its effect with temperature were determined by measuring ultrasonic velocity. The sample which was heat treated at 11000C plays a dominant role it exhibits a large values of elastic constants. The correlation of ultrasonic velocity with elastic constants reveals that both ultrasonic longitudinal velocity and ultrasonic shear wave velocity are required for material characterization. Read More...
|
Materials Engineering |
India |
710-712 |
170 |
Space Time Block Codes For MIMO systems
-Wamik Majeed ; Seema Singh
Multi Input Multi Output (MIMO) system multiple antennas are put to use at the transmitter section and the receiver section. By a single radio channel, MIMO transmits and receives two or more data streams. Then the system can discharge two or more times the data rate per channel without any additional transmit power or bandwidth. The put together of multiple antennas at the transmitter mixed with the help of advanced algorithms which are based on digital signal processing and the receiver yields expressive advantage in terms of diversity and capacity. spatial multiplexing and Space-time block coding and are MIMO based techniques that provide link quality and high magnitude in the system. SM and STBC can be combined to give a transmission scheme that will give a maximum average data rate over the MIMO channel and minimize the order of diversity for each stream. The basic parameters that describe the quality of wireless link include Speed, Range and Reliability. There is always a trade-off to achieve all three qualities. But an attractive candidate in this regard is MIMO system which can increase all of the above, examine and note the similarities or differences of, to single antenna system. MIMO exploits multipath rather than moderate it. Space Time Block Code (STBC) is a special form of MIMO and originally employed for 2 transmit and 1 receive antenna by Alamouti under flat fading circumstances. Read More...
|
Electronics & Communication Engineering |
India |
713-717 |
171 |
Speed Control of Vector Controlled Induction Motor using Sliding Mode Controller and Zeta Converter
-Sharika Raj C ; Sreepriya R
Induction motors are used as the major workhorse in the industry due to its robustness, high efficiency and maintenance free nature. Owing to the fact that the induction motor models are highly non linear they are very difficult to control compared to DC motors. Also the time varying nature of parameters and variables which can be changed during the operation of the drive system makes the designing of the proper controller difficult. The best suggested solutions to solve these parametric variations and load torque variations would be a Sliding Mode Controller (SMC). But while using SMC in a vector controlled induction motor drive the Power Factor of the system is considerably reduced. A Zeta converter is incorporated in the system which will improve the power factor and thereby reduces the power quality issues. This paper presents the designing and the simulation of a vector controlled induction motor drive using sliding mode controller with zeta converter. The simulation is done using MATLAB/SIMULINK. The proposed control scheme can be implemented in real-time applications since it does not involve high computational cost. Read More...
|
Electrical Engineering |
India |
718-721 |
172 |
Speed Control of Induction Motor Using Model Reference Adaptive System and SVPWM with Zeta Converter
-Treena Paul ; Anna Mathew
This paper presents a new speed and current estimation technique. The sensor-less speed control method used is model reference adaptive system, which is done by using reference quantities (i.e., currents and voltages) in reference model and actual quantities (i.e., currents) in adjustable model. The current estimation is done by using the vector rotator and extracting the information about the phase currents in two phase stationary reference frame by using corresponding synchronous reference frame variables. This proposed speed control and current estimation technique are immune to the variation of stator resistance. The proposed system uses space vector pulse width modulation (SVPWM) in order to obtain switching pulses for inverter with fewer ripples. In-order to improve the power factor and thereby reducing power quality issues zeta converter is used. The proposed system is simulated in MATLAB/Simulink. Read More...
|
Electrical Engineering |
India |
722-725 |
173 |
Strength of Cement Mortar Containing Partial Addition and Replacement of Wood Waste Ash
-G. Subbaramaiah ; Prof.H.Sudarsana Rao; Dr.Vaishali G. Ghorpade
Wood waste ash is generated as a by-product of combustion in wood-fired power plants, paper mills, and other wood burning industries. The present investigation is mainly aimed to use wood waste ash (WA) in cement mortar as partial replacement and addition to cement at different levels. The compressive strength of mortar mixes (1:3 and 1:6) was determined at different curing periods. It is concluded that the increase in the addition of WA decreased the mechanical properties. Whereas the mechanical properties of wood waste ash mortars have increased with 10% of replacement of cement by wood ash. Further increase in replacement level decreased the mechanical properties significantly. It is observed that for both the mortar mix proportions, the compressive strength values have increased with the addition or replacement of WA from 0% to 10%. Beyond 10%, the compressive strength values have decreased. Also, the present research carries out X-ray diffraction analysis (XRD) and scanning electron microscopic analysis (SEM) to examine the microstructural properties of mortar mixes. Read More...
|
Civil Engineering |
India |
726-731 |
174 |
A Reconfigurable Sensor Network for Industrial Monitoring
-K Thejus Deep Prathihastha ; G. Ramanjaneya Reddy
Wireless sensor networks have been employed to collect data about physical phenomena in various applications such as habitat monitoring, and industrial monitoring, and surveillance. As an emerging technology brought about rapid advances in modern wireless telecommunication, it has attracted a lot of attention and is expected to bring benefits to numerous application areas including industrial WSN systems. The device is combined with the newest ARM7 programmable technology and the intelligent sensor specification. Performance of the proposed system is verified and good effects are achieved in practical application of WSN to industrial environment monitoring .We manually measure physical parameters in the industry like temperature, smoke and light detection which is very difficult and inaccurate. A normal person cannot show any interest to measure those physical parameters value. To avoid this difficulty we are going for our proposed system. Here is the proposed system describes the development of a wireless industrial environment measuring temperature, smoke, human detection and light detection. Where the wireless connection is implemented to acquire data from the various sensors, in addition to allow set up difficulty to be as reduced. By using Bluetooth technology we send the sensors data to authorized person. Read More...
|
Electronics & Communication Engineering |
India |
732-734 |
175 |
Feasibility study of use of water as a fuel
-Chintan Sanjay Shroff ; Ms. Neha R. Patel; Mr. Hetal R. Mehta
Hydrogen is the future scope of Energy as the prices of fossil fuels is increases day by day. The main source of hydrogen is water. Hydrogen production will be done by alkaline water electrolyser using direct electricity. An acrylic box of 160 mm × 120 mm × 120 mm is used as reactor body. A set of 5 SS electrodes on anode as well as on cathode of size of 85 mm × 100 mm × 2 mm are connected to power supply and joined to a SS plate by welding it with the other plates. Two Plastic casings of size of 65 mm × 100 mm × 100 mm are used to capture the processed gases generated from anode and cathode. The solution of 27.5% by weight of KOH solution which works as an electrolyte is fed with water from the bottom of the reactor. There are mainly two types of electrolysers were used: A) Two separate chambers with two separator wall and 10 mm gap between them and, B) Two separate chambers with one common separator wall of size of only 8 mm. The generated hydrogen is then fed to the stove by maintaining proper pressure and flow. The oxygen is left to the surrounding. From this process 98.8% pure hydrogen is generated. Read More...
|
Environment Engineering |
India |
735-738 |
176 |
Sisal and Glass Fiber Hybrid Composite - A Comparative Study on Mechanical Properties with and without Cryogenic Treatment
-Chandan Chawan R ; Chandan Chawan R; Dr. G.B.Krishnappa; Dr. Keerthi prasad K.S; Dr. B. Sadashive Gowda
Nowadays, the natural fibers from renewable natural resources offer the potential to act as reinforcing materials for polymer composites, alternative to the use of glass, carbon and other man-made fibers. Among various natural fibers, Sisal and sisal are most widely used natural fibers due to their advantages like easy availability, low density, low production cost and good mechanical properties. Attempts have been made in this project work to study the effect of fiber loading and orientation on the mechanical properties of Sisal and glass fiber reinforced epoxy based hybrid composite with and without cryogenic treatment. Improvement in the mechanical properties of hybrid composite has been observed after cryogenic treatment. Read More...
|
Mechanical Engineering |
India |
739-742 |
177 |
An Efficient Implementation of Montgomery Multiplication
-MANASADEVI R N ; Ravindra P Rajput
To achieve information security in communication systems a method called Cryptography has been used. There are several methods in the cryptography and one among them is RSA algorithm. In this algorithm modular multiplication is used, which is the most critical part to implement either through software or hardware. Therefore, we proposed a1new method 0 for modular 7 multiplication called as Montgomery5multiplication. Simulation results show the reduction in the number of logic gates and improvement in the performance compared to modular multiplication. Read More...
|
Electronics & Communication Engineering |
India |
743-745 |
178 |
A survey on methods of detecting selfish nodes in mobile adhoc networks
-P.Priya ; B.Gopinathan
The aim of this paper is to detect the selfish nodes and improves the network performance in Mobile Ad-hoc network (MANET). MANET is a self-organization network in which the mobile devices are connected by the wireless links. In MANET, nodes can freely move in any direction while communicating with each other. The nodes are participated in packet forwarding should be co-operate with each other. If the nodes does not forward the packets to destination means that will be considered as selfish nodes. There are many techniques are available for detecting selfish nodes. In this paper I have provide the comparative study of different type of methods to increase the selfish node detection and improve the network performance and precision speed and network throughput. Read More...
|
Computer Engineering |
India |
746-748 |
179 |
Study and Analysis of Accident Black Spots on SH-3, Madhugiri-Pavagada Road: A Case Study
-Varun C. Naik ; Varun C. Naik; Gnanamurthy P.B; Dr. B V Kiran Kumar; S Manjunatha
Accident blackspot can be defined as it is a place where road accidents had historically concentrated due to variety of reasons include sharp drops, sudden curve in the straight road, hidden junction on the fast road, poor warning signs and poor visibility of lane markings on the cross road. The statistical analysis of the accident spots is carried out periodically at critical locations which help to take some suitable counter measures to efficiently decrease the rate of accidents. Statistical analysis is one of the mathematical approach for deciding severity level of the black spots from the accident data collected. These analysis reports have been maintained zone wise and have to be updated regularly. Present study is carried out in two phases in which Phase-I deals with collection of primary and secondary input data such as traffic volume count, accident records from police file, road users and local residents feedback etc. required for identifying black spots and to analyze accident severity level. Accident records along SH3 were collected from madhugiri, midigeshi and pavagada jurisdiction, traffic volume count and turning movement counts were carried out at Junctions Hosakere and S.S.K. from the accident records and road users feedback collected at various locations on SH3 six black spots were identified namely a) S.S.K Junction b) Kanive Narasimha Swamy temple c) Rajvanthi d)Bidarekere e) Chinnenahalli f) Hosakere junction. Second phase of this study focuses on carrying out statistical analysis as per accident rates, accident frequency and accident severity method to validate accident severity level at identified six black spot locations. In the present method of statistical analysis black spot identification is validated through three criteria i.e. accident rate, accident frequency and accident severity and the severity level at each black spot location is identified as low severity, medium severity and high severity based on number of criteria achieved at each black spot location. Present study is concluded with reasonable and workable remedial measures recommendation to reduce number of accidents and its severity for the identified black spot locations of SH3 study stretch. Read More...
|
Civil Engineering |
India |
749-751 |
180 |
A Survey On Security And Privacy In Cloud Computing For Big Data Process
-R.Kalaivani ; A.viswanathan
Cloud Computing promises a scalable communications for meting out big data applications. It is web based computing, used to share resources to a computers. The phrase big data has expand hastily in the framework of data mining and business brains. The need of sheltered big data storage service is more enviable than ever to date. We must highlight that big data does not just involve large volumes of data also the stipulation for scalability, to guarantee a response in a conventional elapsed time. This model is cloud computing, and among its main features we has to hassle its flexibility in the use of computing resources and spaces, less management effort, and bendy cost. We edge on those systems for wide analytics based on the Map Reduce scheme, its open-source implementation. In this paper, we first explain the security model of cloud computing, and then analyze the feasibility, threats and security in cloud computing in terms of wide existing methods to control them along with their pros and cons. Read More...
|
Computer Science |
India |
752-754 |
181 |
Analysis of impact & hardness behavior and Comparison Study of Sisal and Jute Hybrid Composite
-Nandasudhan H ; Dr. Keerthi prasad K.S; Chandan Chawan R
Among the various synthetic materials that have been explored as an alternate to iron and steel for the use in automotive, plastics components claim a major share. At present, due to uncertain conditions in the disposal of plastic there is a need to search for its alternate, which is nothing but natural fibers. It is interesting to note that natural fibers such as jute, coir, banana, sisal, etc., are abundantly available in developing countries like India, Srilanka, and some of the African countries. The application of the composite material grown steadily and which occupied the new market. In our daily life, the composite materials are used in different field because of their combinational properties. The main reason for using the composite to reduce the weight of the material and easy. In present investigation natural hybrid composite is developed using Sisal/E-glass (S/G), Jute/E-glass (J/G) and Sisal+Jute/E-Glass (SJ/G) as reinforcing material and Epoxy as a matrix material. To sustain the environmental condition and water absorption, E-Glass is used. The fabrication is done using hand layup technique. The developed hybrid composite will be subjected to different kind of test to determine impact and hardness properties. Read More...
|
Production Engineering |
India |
755-757 |
182 |
A Survey On Bridging Vocabulary Gap In Healthcare With Ontology Support
-J.U.Paruvatha Kumari ; R.Velumani; S.Nithyakalyani
Internet is served as a diagnosis tool to facilitate patient-doctor communication. Online health services are deployed to provide remote medical assistance. Community based health services supports automatic disease inference identification for online health seekers. Question and Answer (QA) sessions are suffered with the vocabulary gap and incomplete information. Deep learning scheme is applied to infer the possible diseases using Question and Answer data values. Global learning component is used to mine the discriminant medical signatures from raw features. In local mining raw features and their signatures are updated into the input layer and hidden layer. This paper presents a survey on medical terminology based ontology for improving the relationship in word and detecting diseases. Read More...
|
Computer Science |
India |
758-762 |
183 |
Assess The Problems Faced By North Indian Workers In South India And The Coping Mechanism
-Dr.Sahbanathul Missiriya ; Ms.Tem Surenla Jamir
Migration from different states to other states in India has now become so rampant. Due to that its impact is felt in every aspect of life. These migrant workers are spread across the width and length of the country. When they come to big cities, they have to face number of problems because of their inexperience in life style, communication, housing and standard of living. Migration is not merely the physical movements of individuals and groups; it involves a lot of strain in their social, economic, cultural and other aspect of life. Hence the investigator felt that there is a need to assess the problems faced by North Indian workers working in south India and the coping mechanism with those problems. The study objectives were to assess the problems faced by north Indian in south India and to associate the problems with selected demographic variables. Descriptive approach was used. The study subjects comprised of 100 construction workers of construction sites at Saveetha University campus were selected by simple random sampling technique. Among the workers 41% were in the age of 31-40 years, 64% were males and 36% were females. Out of 100 mothers, 27% of them faced mild problems, 70% of them had moderate problems and 3% faced severe problems. There was no association between the problems and selected demographic variables like age, sex, education and income. Read More...
|
SCIENCE |
India |
763-765 |
184 |
Clustering analysis in data mining
-Geetha P ; Panneerselvan P
Clustering analysis is a key point used by data processing algorithms in Data Mining. The primary aim of Clustering is to segment the data into more diminutive subsets called clusters, such that the data belonging to the same cluster are similar with some similarity metric. Clustering is imperative idea in data investigation and data mining applications. Over years, K-means has been popular clustering algorithm because of its ease of use and simplicity. This paper presents the introduction to cluster analysis in the field of data mining, where to be the discovery of useful, but non-obvious, information or patterns in large collections of data. Much of this paper is necessarily consumed with providing a general background for cluster analysis, and also discusses a number of clustering techniques that have recently been developed specifically for data mining. Read More...
|
Computer Science |
India |
766-768 |
185 |
A Survey on Power Management in Cloud Data Centers
-D.Thamilarasi ; S.Sivaprakash; M.Umamaheswari; M.Sudarson
Cloud computing is the emerging technology for storing and processing the large amount of data. It is used to access resources owned and operated by a third party provider. Cloud also involves servers and data centers for the users to access hardware and software resources. Power management plays a vital role in data centers because it consumes huge amount of energy. The most power consuming components are processors, RAM, hard disk and various executable components. This paper describes a survey about various techniques in power management for improving efficiency and performance. Read More...
|
Computer Science |
India |
769-770 |
186 |
A Survey on Text Document Clustering Methodologies Based On Similarity Measure
-R.Saranya ; V.Sharmila; P.Balamurugan; R.Latha
Text data mining is research technologies to mine valuable knowledge from massive collections of documents and to improve a system to offer information and to support in decision making. Clustering is an automatic wisdom methodology aimed to combine a set of objects which are similar to each other. Text clustering has turned into a challenging process in recent centuries because of the massive quantity of unstructured data is presented in several formations. In Text document clustering grouping of text documents arises based upon their similarity. There are many rapid and high-excellence document clustering algorithms available which play a main role in efficiently establishing the information. In this paper we are going to discuss various methodology of clustering which is based on the document similarity. Read More...
|
Computer Science |
India |
771-773 |
187 |
A Survey on Topic Modelling in Text Mining
-A.SARANYA ; A.SARANYA; V.VENNILA; S.SUGANYA; G.S.RIZWANA BANU
Text Mining has become an essential research area. Text Mining is the innovation by computer of new, earlier unknown information, by spontaneously extracting information from dissimilar written resources. In this paper, a Survey of TextMining technique for Selective supervised Latent Dirichlet Allocation have been presented. Although ssLDA receives the universal framework of sLDA where many forms of response (such as real and categorical responses) variables can be shown, we focus on the case where the response variable is definite in this paper. In this paper, according to the following two considerations: First, most of other topic models, ssLDA views documents as discrete data which consist of word counts, while documents are treated as directional data in STM. Second, the topics in ssLDA and STM are generated from Dirichlet and vMF distributions, respectively. Due to Dirichlet distributions, ssLDA can set a topic assignment (topic indicator) and adjust the weight for each individual word that STM fails to do. This paper explores existing research highlights and provides various needs of significant research in these topics. Read More...
|
Computer Science |
India |
774-777 |
188 |
Design of 4 Bit Johnson Counter Using Reduced Number of Reversible Logic Gates
-Heranmoy Maity ; Shashank Kumar Singh; Abhijit Dey; Anu Debnath
Over the last few decade reversible logic circuits have attracted considerable attention in improving some fields like nanotechnology, quantum computing, cryptography, optical computing and low power design of circuits due to its low power dissipating characteristic. In this paper we proposed the design of 4-bit Johnson counter with reduced number of reversible gates and derived with constant inputs, garbage output and number of gates to implement it. Read More...
|
Electronics Engineering |
India |
778-779 |
189 |
Modeling the Femtosecond Pulse Interaction with Fused Silica
-Supriya Rai
An explicit model of physics behind laser breakdown of fused silica by femtosecond laser pulses is developed. When the ultra short laser pulse propagates for time interval shorter than time required for heat conduction, diffusion, electron to lattice energy transfer and other relaxation processes, ergo interaction is spatially localized. Multi-photon absorption and tunneling of electrons from valence band to conduction band are the two competing mechanisms for swift production of electron hole pairs, supplemented by Joule heating and avalanche ionization. The rapid rise in free carrier density in the interaction zone subsequently influences refractive index, modifying the phase of the laser and causing frequency shift. This model is best fit for higher frequencies of the order 1017 W/cm2 under the application of WKB and SEWA approximation. Read More...
|
PHYSICS |
India |
780-783 |
190 |
Location Based Task Reminder for Android Phones
-Prof. Salunkhe T.R. ; Thorat Rohini Jabaji; Shinde Pooja Savakar
Todays in the world of an information technology, android covered a huge market. It’s become an important factor for all human being. We all are mobile communicators. If any user using their smartphone, they are almost assured to be using it for communication of some sort. There are most important three things that make a smartphone a great mobile communicator which are text input, great notifications, and compatibility with whatever communications services your friends, family, and colleagues use. Android is a mobile operating system currently developed by Google. Due to the open nature of Android, a number of third-party application marketplaces also exist for Android. Android is designed primarily for touchscreen mobile devices such as smartphones and tablet computers. A smartphone is a mobile phone with an advanced mobile operating system which combines features of a personal computer operating system with other features useful for mobile .Android is an open source platform. In our project we developed one android application Location based task reminder system using android system in smartphone. In this application through GPS and Google Map we are fetching the current location of users in mobile phone. Global Positioning System mainly used to tracking the device specially designed for personal information. And People used this system to show or displayed their current location at very less time. By using Google Maps, each task can be drawn out on the map with all the locations to be visited and assigning the tasks as required. Now user select their task which they want to perform and then allow them to set reminder for that task on that particular location .In such a way user can add multiple task and set reminder for that task at multiple location. This make very effective for the user to complete their task at exact time with an efficient manner. In our application we provide functionality where user will also be able to view contacts, sums and location at a time. Read More...
|
Computer Engineering |
India |
784-786 |
191 |
Improved Design of MOD-8 Synchronous UP/DOWN Counter Using Reversible Gate
-Abhijit Dey ; Shashank Kumar Singh; Heranmoy Maity
The Reversible logic synthesis techniques will definitely be a necessary part of the long-term future of computing due to its low power dissipating characteristic. Reversible logic gates are very much in demand for the future computing technologies as they are known to produce zero power dissipation under ideal conditions. Today, reversible logic circuits have attracted considerable attention in improving some fields like nanotechnology, quantum computing, and low power design of circuits. In this paper we proposed the design of MOD-8 synchronous up/down counter having reduced quantum cost, constant inputs and less number of gates to implement it using existing reversible gates. Read More...
|
Electronics Engineering |
India |
787-790 |
192 |
Solar Operated Low Cost Obstacle Avoidance Robot
-Jitisha Aggrawal
Obstacle avoidance is the back bone of autonomous control as it makes robot able to reach to destination without collision. Robot generates the shortest path from source to destination on the basis of sensorial information of environment. In this paper, solar operated low cost solution for obstacle avoidance in a robot has been simulated and experimentally tested. Design of the robot, algorithm and simulation ensure the direction of robot and LCD display. Simulation in Proteus 7.7 professional software, programming in Keil_uVision4 software and low cost solar operated 12V solar rechargeable battery have been discussed in the present work. Read More...
|
Electronics & Communication Engineering |
India |
791-793 |
193 |
Secure Search over Encrypted Data in Cloud Computing: A Survey
-Sumit Devray ; Awdhesh Kumar
Cloud computing becomes more informative and service oriented technology now in these days. A number of individual and organizations are placed their data on cloud storage. But storage facilities on cloud need a secure environment thus a number of cryptographic approaches are applied on data to keep them safe. Such kind of cryptographic approach preserve data but during information retrieval from such kind of data source becomes less feasible. Thus the presented paper provides a survey on the searchable cryptographic approaches that are efficiently retrieve data from the cryptographic data storage. Additionally a new scheme is also proposed that help to secure data on cloud storage as well as provide an efficient technique to retrieve accurate user data. Read More...
|
Computer Engineering |
India |
794-798 |
194 |
Stress Analysis of Multi Leaf Spring by Using FEM and Experimental Method -A Review
-Mr. S. S. Kale ; Prof. A.V. Gaur
Leaf springs are used in vehicles for suspension purpose in all type of vehicles. Ample amount of work has been done on the analysis of leaf spring. Researcher focused on the analysis of stresses developed in spring by using different FEM tool also several worked on predict fatigue life of leaf spring. After review of available literature on leaf spring it is found that the very few literature is available on analysis of springs used for light commercial vehicle. Also there is scope of experimental analysis of spring by using different methods like photoelasticity and strain gauge. Read More...
|
Mechanical Engineering |
India |
799-801 |
195 |
Effect of Coconut Fiber in workability and Compressive strength of concrete
-Bhupendra Kumar ; Dr. Amit Vishwakarma; Dr. S S Kuswah
This research paper discusses the comparative study between coconut fibre concrete with plain cement concrete of M40 grade. This research paper deals use of the agricultural waste material into concrete, which enhanced the properties of concrete and makes environment eco-friendly. The coconut fibres are added additionally by weight of cement in the proportions of 0, 1, 1.5, 2 2.5, 3%. The diameter and length of coconut fibre is taken 0.4 mm and 40 mm respectively. The results show increment in compressive strength and decrement in workability of concrete by adding coconut fibre into concrete. Read More...
|
Civil Engineering |
India |
802-805 |
196 |
Smart Traveller- Proficient Taxi Business Application
-Ghumare Vaishali S. ; Prof. Aher Priyanka S.; Gandhakte Sonali G.
For efficient taxi business based on GPS has become an important tool, the taxi fleet management system. It can be used providing useful information for taxi drivers to earn more profit by mining the historical GPS trajectories and also for the sake of fleet management. For next cruising location which could be a value added module of the fleet management system, we proposed a taxi recommender system. To provide the similar objective we investigated, three factors considered in different works, which are distance between the current location and the recommended location, for next passengers waiting time, and expected fare for the trip. In addition to these factors, based on drivers experience which is the most likely location we consider one more factor to pick up passengers given the current passenger drop off location. To capture the relation between the passenger get-off location and the next passenger get-on location, a location-to-location graph model, referred to as OFF-ON model, adopted. To estimate the expected fare for a trip started at a recommended location we also adapted an ON-OFF model, to evaluate the proposed system. A simulator simulates cruising behaviour of taxies in the dataset A real world dataset from CRAWDAD is used and one virtual taxi which cruises based on our recommender system. Read More...
|
Computer Engineering |
India |
806-807 |
197 |
Smart Intrusion Detection System (Double-Guard)
-Gorde Ashwini Bajirao ; Pinjarkar Nilesh R.; Manjare Chaitali B.
For enabling communication and the personal information management from anywhere, an inextricable part of daily life is the Internet services and applications. To entertain this increase in application and complexity of data, web services have moved to a multi-tiered design wherein the application front-end logic runs by the web server and to a database or file server the data are outsourced. In this system, we propose an IDS system which is Double Guard, that models the network user sessions behavior across both the back-end database as well as the front-end web server. By monitoring both web and subsequent database requests we are able to ferret out attacks that independent IDS would not be able to identify. Furthermore, in terms of sessions of training and functionality coverage we measure any multitier IDS limitations. With My SQL and lightweight virtualization with the help of an Apache web server we implement Double Guard. In both dynamic and static web applications the real-world traffic then processed and collected over a 15-day of system deployment period. Finally, using Double Guard, we will able to display a wide range of attacks which will give the 100 percent accuracy while for web services which are static, 0 percent false positives maintain by it and for web services which is dynamic, it is 0.6 percent false positives. Read More...
|
Computer Engineering |
India |
808-809 |
198 |
A Survey on Data Aggregation in Wireless Sensor Network
-S.Sivaranjani ; T.Sasi; G.Sivaselvan; V.Senthilkumar
Wireless sensor network contain no of sensor nodes. These networks have a large request in health care monitoring, security disaster management and military, etc. The sensor bumps are very trifling in size and have restricted processing capability and very low battery power. This limit of low battery power makes the sensor network lying to failure. Data collection is a very decisive technique in WSNs. Data collection benefits is the energy depletion by eliminating redundancy. This survey provides a rambling various techniques used for the purpose of data collection and its various energy-efficient uses in WSN. An encounter to data collection is how to vulnerable collected data from disclosing during collection process as well as obtain accurate collected results. In this study we converse about diverse protocols used for protected mutually data in wireless sensor network. Read More...
|
Computer Science |
India |
810-813 |
199 |
To Improve Performance Of Robust Face Recognition Using Dominant Facial Region Extraction And Fractal Model
-Alok Bansal ; Anuradha sharma; Vijay kumar sharma
In this paper discuss about the research of Human Face Detection focuses on the faces under complex background. One aspect of this system is to cutting down false detection and speedup the processing delay. In this paper discuss about proposed technique we try to apply the Subspace Approach to Face Detection using dominant facial region extraction and fractal model. To further improve the performance of the face recognition system also proposes the techniques of statistical based feature matching. In this paper discuss about illustrating the development of "Real-Time Human Face Recognition System". The principal system consists of three major subsystems. There are Image Acquisition System, human face characteristic extraction and finally feature vector matching. For experiment, we adopted colored face image with complex background and simulate on the computer Read More...
|
Computer Engineering |
India |
814-816 |
200 |
Evaluation of Tensile Behaviour of AA6082 Friction Stir Welded Joints
-Er. Naveen Saini ; Er. Sushil Kumar Sharma
Friction stir welding joints are used to join aluminium alloys commonly in present industry. Use of aluminium was increased due to its high tensile strength to weight ratio. This article focuses the evaluation for tensile strength of friction stir welded joints of AA 6082 using full factorial design matrix. Tensile behaviour is an important factor to judge a welded joint in industry. Full factorial is used to get the best combination of parameters for higher tensile strength. Optimized combination of parameters are trying to be found using welding parameters i.e. rotational speed (1000-4000 rpm), travel speed (10-40 mm/min) and tool pin length (4-5mm). Results show that with higher rpm, lower travel speed and higher ping length gives the better results. Read More...
|
Mechanical Engineering |
India |
818-821 |