No. |
Title and Author |
Area |
Country |
Page |
201 |
Speech Recognition Using Hidden Markov Model Algorithm
-Charmi N Solanki ; Mohammed G Vayada
Speech recognition applications are becoming more useful nowadays. With growth in the needs for embedded computing and the demand for emerging embedded platforms, it is required that speech recognition systems are available but speech recognition software being closed source cannot be used easily for implementation of speech recognition based devices. Aim To implement English words speech recognition system using Matlab (GUI). This work is based on Hidden Markov Model, which provides a highly reliable way for recognizing speech. Training data such as words like go up, go right, open, close etc. records in audacity open source; the system will test it with data record and display it in edit text box. Read More...
|
Electronics & Communication Engineering |
India |
782-784 |
202 |
Real time monitoring river gauge
-Savan D. Patel ; Darshan B. Mewada; Pranav V. Patel
The concept of this paper briefs about how the real time monitoring river gauge work and more suitable and benefits of the river gauge as compared to the present river gauge. We are using sensors, Controller etc for getting the data. We develop the software for analysis the data and give alert for the flood prediction ultimate we can save the human and animal life. Read More...
|
Civil Engineering |
India |
785-786 |
203 |
A Review of Laser Welding For Bead Width and Weld Hardness
-Rajbeer Singh ; Sandeep Singh Sangwansan
In today world the need for an optimized technique which can easily join two dissimilar materials in increasing day rapidly. Dissimilar joints are important because of both economic and technical aspects, because a satisfactory service can be provided in cost reduction and performance by these joints. The demand for such joints in industry is huge. So, the study of dissimilar material welding is of a great interest for many of the researchers. The most challenging problem in various scenarios is real-time laser welding process of dissimilar materials. Various robust methods are being implemented time to time which can help in joining multiple materials simultaneously in different environments and conditions. Many efforts are being made for speeding up the process for the system to run faster and integrate into the system so that the process could be optimized for large scale. This paper focused on in depth literature review of the laser welding techniques used today. Read More...
|
Mechanical Engineering |
India |
787-789 |
204 |
Consciousness of Multiparameter Sensor Network
-Jaydip Ravia ; Tushar dave; Ketan M. Solanki
The paper contains the design of a multi-parameter data acquisition system for a Air Quality Monitoring and publish the data over internet through embedded network. Nitrogen oxides are released into the air from motor vehicle exhaust or the burning of coal, oil, diesel fuel, and natural gas, especially from electric power plants. They are also released during industrial processes such as welding, electroplating, engraving, and dynamite blasting. Nitrogen oxides are also produced by cigarette smoking. Air quality monitoring system presents a network for indoor and outdoor air quality monitoring. Each node is installed in a different room and includes tin dioxide sensor arrays connected to an acquisition system. The nodes are hardwired or wirelessly connected to a central monitoring unit. To increase the gas concentration measurement accuracy, the various gas sensor influence quantities like temperature, humidity etc. environment effects are also measured. The data of the different sensors are transmitted using the wireless transmission technique and it is published over the internet. Read More...
|
Electronics & Communication Engineering |
India |
790-791 |
205 |
Implementation OF irrigation Process using embedded PLC
-Purva Authankar
A programmable logic controller (PLC) or programmable controller is a digital computer used for automation of electromechanical processes, such as control of machinery on factory assembly lines, light fixtures or amusement rides. PLCs is basically the delegation of human control function to technical equipment for increasing productivity, increasing quality, reducing cost, increasing safety in working condition. Unlike general purpose computers, the PLC is designed for multiple inputs and output arrangements, extended temperature ranges, immune to electrical noise and resistance to vibration and impact. Programs to control machine operation are typically stored in battery backed- up or non-volatile memory. A PLC is an example of a hard real time system since output results must be produced in response to input conditions within a limited time, otherwise unintended operation will result. The development of the embedded PLC is proposed here with the combination of the LabVIEW software and the ARM Microcontroller. The flexibility of the proposed PLC makes it relatively easy and less costly. The ARM microcontroller is selected to develop embedded PLC because it is widely used across many embedded designs due to its low price, low power consumption, and wide variety of peripherals for many of the major silicon vendors. In addition, the LabVIEW Embedded Module for graphical programming to ARM microcontroller is used with the application of irrigation system for water sprinkling in agriculture field. Read More...
|
Electronics & Communication Engineering |
India |
792-795 |
206 |
Optimization of EN-31 Alloy Steel Metal Removal Rate on Centre Lathe
-Vijayesh Rathi ; Jasvinder Kumar; Gaurav Kochar
The paper presents an experimental study of metal removal rate in turning operation of EN-31 alloy steel with cemented carbide coated tungsten insert tool under different cutting parameters. The cutting parameters namely feed rate, depth of cut and spindle speed were varied to observe the effects on EN-31 alloy steel. The experimental setup includes nine different specimens whose weight was recorded before machining and after machining. Then the depth of cut, feed rate and spindle speed were changed for nine specimens. Then time is noted for each experiment and how much metal is removed during each experiment and in how much time. The main aim of the experiment is to know that at what parameters metal removal rate is maximum. Read More...
|
Mechanical Engineering |
India |
796-798 |
207 |
Detection methods for wormhole attack in WSN
-Dhaval N. Tandel ; Bhavin I. Shah
Wireless communication technique has become an important tool in any application that requires communication between one or more senders and multiple receivers. Security is becoming a major concern for this wireless communication. Wireless sensor networks consist of a large number of small sensor nodes that constantly monitors environmental conditions but due to the partial resources of the nodes and hostile & pervasive environments. so this kind of nature of wireless sensor networks make them very attractive to attacks at all network layers; however, the so-called “wormhole attackâ€. In wormhole an attacker receives packets at one point in the network, “tunnels†them to another point in the network, and then replays them into the network from that point. In this paper, we will study wormhole attack and some of the methods for detecting of wormhole attack. Read More...
|
Computer Engineering |
India |
799-803 |
208 |
A Survey on Gesture Recognition
-Rupali Dafale ; Shivani Kolungade; Shraddha Shrivas; Parag Joshi
Gesture recognition is topic in computer science and is mainly apprehensive on analyzing and interpreting the functionality of human gestures with a use of mathematical algorithm. Gestures include the movement of hand, arm, body, legs or only eyes. Hand gestures are a backbone for expressing once idea when deliver through speech. Hand gesture recognition specially is a modern way of interaction in which human being is able to interact with the machine in a very easy and convenient way without any external device. In this survey paper we will discuss and compare the various methodologies used in hand gesture algorithm. Read More...
|
Computer Engineering |
India |
804-806 |
209 |
Impact Assessment of Solid Waste Management Project under JnNURM in Imphal City, Manipur
-Takhellambam Bijoychandra Singh ; Dr Doreshor Khwairakpam
Solid waste management is very poor in Imphal city. In the last few decades, the Urban Local Body (ULB) has been less attention towards solid waste management. Opportunity of Solid Waste Management (SWM) project under Jawaharlal Nehru Urban Renewal Mission (JnNURM) has interrupted for the improvement of solid waste collection, transportation and processing in Imphal city. In this context, Paper is reviewed the physical and financial status of solid waste management project at post project stage of Imphal city. Investigation was carried out whether project has been benefited or not. The research methodology was adopted the qualitative and quantitative description from secondary and primary data. Field observation is a tool to evaluate the project for SWM in this paperdepth literature review of the laser welding techniques used today. Read More...
|
Architecture & Planning |
India |
807-810 |
210 |
Key-Aggregate Searchable Cipher Technique for Multi Data Sharing Through Cloud System
-Sonawane Ajay S. ; Ghuge Pooja R.; Pawar Suyog S. ; Rayate Manisha H.
Data Sharing is beneï¬cial activity in cloud memory. In this article, we show how to protectively, effectively, and scalable share data with others in cloud database. We explain new public-key cryptography which generate static-size encryption such that efficient allocation of decryption rights for any set of cipher texts is possible. The innovation is that one can cumulative any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being cumulative. In other words, the secret key holder can release a constant-size cumulative key for scalable choices of cipher text set in cloud database, but the other encrypted ï¬les outside the set remain conï¬dential. This compact cumulative key can be conveniently sent to others or be stored in a smart card with very limited secure database. We provide formal security investigation of our schemes in the standard model. We also describe other application of our schemes. In particular, our schemes give the ï¬rst public-key patient-controlled encryption for scalable hierarchy, which was yet to be known. Read More...
|
Computer Engineering |
India |
811-814 |
211 |
Blast Resistant Structures-A Review
-M.P.Sureshkumar ; M.Sivakumar
Due to the rising threat of terrorism, protecting critical civil infrastructure such as embassies, government buildings, and airports against bomb attacks has become a critical issue. Therefore, there is a need for the development of technologies that can protect these structures against blast loads. Categories of available protection technologies currently include exterior steel cladding and the addition of concrete walls, and sprayed-on polymer and metallic foam cladding. Further, extremists are using newer chemicals and technological advancements that have increased blast event magnitudes. Therefore, in addition to strategically important and heritage structures, even important commercial buildings and complexes are required to be designed for an adequate level of blast resistance. On the other hand, blast-resistant design of structures is treated as a specialized area to which, commonly, structural engineers are not exposed comprehensively, and most of the knowledge about blast-resistant design of structures remains limited to military setups. Hence, it is intended herein to present various strategies for blast response mitigation and structural design of such protective structures. This report is meant for discussion of studies on blast resistant structure and blast loading. Read More...
|
Civil Engineering |
India |
815-820 |
212 |
Block Level Deduplication for Cloud Storage
-Renuka Devi S ; Eldo P Elias
Cloud Storage enables to configure and use online storage devices as storage targets. The increasing demand of cloud storage requirement has led to the process of deduplication. The term data deduplication refers to the techniques that store only single copy of redundant data, and provide links to that copy instead of storing other actual copies of this data. This feature enables to reduce cloud storage space usage and uses network bandwidth efficiently. With the help of convergent encryption only it is possible to implement deduplication in the cloud storage, but it introduces new security threats. There comes the need of secure deduplication. Security of the proposed system relies on its architecture which includes a proxy server and a deduplication manager and it preserves the combined advantages of both file level and block level deduplication. The system is implemented with the help of standard storage APIs and the results are analyzed. Read More...
|
Computer Science |
India |
821-823 |
213 |
Principles of parallel algorithm models and their objectives
-Mrs. Mitali Lade ; Mr. Vinayak Shinde
This research activity is mainly aimed at showing principles of parallel algorithm models as algorithm development is a critical component of problem solving using computers. The algorithm models used are tested for the scalability and accuracy of the implemented algorithms. The implemented algorithm models could be used in different applications. The development of microprocessors design has been shifting to multicore architectures. Therefore, it is expected that parallelism will play a significant role in future generation of applications. Read More...
|
Computer Engineering |
India |
824-825 |
214 |
A Survey on Intelligent Traffic Control System (Emergency Vehicle Clearance & Lost Vehicle Detection)
-Valhavankar Shripad Nandakumar ; Bhagat Akshay Ganesh; Vibhute Aniket Sanjay; Prof. Said Shubhangi K.
Now days we are facing the major problem of rapidly increasing the vehicles causes increasing the traffic in various cities. There are also the major problem regarding to vehicles is that the larcenies of vehicles. So for that we are introducing an intelligent traffic control system with the additional modules as detecting the lost vehicle with the help of RFID system and the lane clearance of emergency vehicles. In this system each vehicle is equipped with auniquespecial radio frequency identification (RFID) tag which has a unique identification number. At traffic signal junction there are the RFID readers for identification of vehicles. The task of counting vehicle is done at traffic controller room by the microcontroller with help of IR (Infrared) sensors. It will also collect fine form bank account if any vehicle violates the traffic signal rule. We also find out the surrounding location of the stolen vehicle and give this information to the nearest police station or policeman. So we can easily find out our lost vehicle. The emergency vehicles like ambulance, fire brigades trucks, and police vans have always haste to reach at the destination. When an emergency response vehicle is approaching the junction, it will communicate to the traffic controller in the junction to turn ON the green light. This system gives very efficient way to reduce the congestion on road. Read More...
|
Computer Engineering |
India |
826-829 |
215 |
A Survey on Data Prediction Techniques in Wireless Sensor Networks (WSN)
-R. Srividhya Lakshmi ; A. Bhagyalakshmi
A Wireless Sensor Network (WSN) not only forms the basis of emerging smart technology but also has its own unique challenges. Wireless Sensor Network usually consists of hundreds or thousands of small sensor nodes which operate autonomously in different critical and uncontrolled environments. Since these battery operated sensor nodes are difficult to recharge, achieving energy efficient data transmission in WSN still remains a challenging task. Continuous data transmission among nodes in a WSN is found to be the main reason for earlier discharge of the sensor nodes’ battery power. Data collection and prediction is a crucial and effective operation to achieve longer network lifetime by reducing the frequent communication among nodes. A detailed survey on various data prediction techniques and algorithms is presented in this paper. The data samples collected during the data transmission and the prediction scheme are analyzed and it is proved that data prediction can drastically reduce energy consumption of sensor nodes. Data prediction enables each node to predict its own sensor data and to compare the predicted values with the actually observed data thereby generating a confidence value. To boot our work, we have analyzed various prediction approaches and have proposed a new approach that reduces communication and computational cost without compromising data quality. Read More...
|
Computer Engineering |
India |
830-835 |
216 |
Weight Optimization of Composite Beams by Finite Element Method
-Mr.Sachin M.Shinde ; Mr.C .C. Pawar
This study represents weight optimization of hollow circular, rectangular and airfoil composite beam by using sub problem approximation method in ANSYS. A three dimensional static analysis of large displacement type has been carried out for hollow circular, rectangular and airfoil composite beams. Weight of beam was objective function, material parameter, geometrical, ply thickness, ply angles and load. In order to validate the results, one loop of simulation is benchmarked from results in literature. Ultimately, best set of optimized design variable is proposed to reduce weight under static loading condition. Read More...
|
Mechanical Engineering |
India |
836-840 |
217 |
Implementation of Single Phase Voltage Source Inverter Control Algorithm for Photovoltaic System
-B.Kiruthiga ; Dr.R.Narmatha Banu
This paper presents an implementation of single phase voltage source inverter (VSI) control algorithm for grid connected photovoltaic (PV) system. The maximum power point tracking (MPPT) is capable of extracting maximum power from PV array connected to DC link voltage level. The MPPT algorithm is solved by incremental conductance method (INC). Sinusoidal pulse width modulation (SPWM) uses a simple mapping to generate gate signals for the inverter. A new digital proportional resonant (PR) current control algorithm is used to remain the current injected into the grid sinusoidal and to achieve high dynamic performance with low total harmonic distortion (THD). The validity of the system is verified through MATLAB/ Simulink and results are compared with proportional integral (PI) algorithm for PV system in terms of THD. Read More...
|
Electrical Engineering |
India |
841-845 |
218 |
Energy Saving Application for Android Mobile
-Varsha Rohidas Gawari ; Varsha Rohidas Gawari; Khandebharad Akash Dilip; Talekar Kajal Sanjay; Wabale Prachi Suresh
Now days Smartphone user are increases, they are facing the problem of energy inefficiency related Android application. These problems are labor-intensive and automated diagnosis is highly desirable. There is problem that is lack of decidable criterion that facilitates automated judgment of such energy problems. Our aim is to find the solution for battery drainage problem. After the depth study of android application there observed causes of energy problem that are missing to deactivation of sensors and sensory data is not used effectively. Considering this problem propose an automated approach in android application to diagnosing energy problem. It observes the operation of sensor and wake lock to detect missing deactivation. It also keeps the path of usage of sensory data and transformation using our state-sensitive data utilization metric judges whether they are effectively utilized by the application or not. It generated detailed report with actionable information to assist developers in validating detected energy problem. Read More...
|
Computer Engineering |
India |
846-848 |
219 |
Analysis of various techniques in low noise amplifier design
-F.Ruby Mary ; P.Kannan
Low noise amplifier is a crucial and essential component in RF receiver design. It amplifies the received weak RF signal with minimum noise contribution. Designing Low noise amplifier with CMOS technology is one of the important topics in research fields due to its advantages of low power, low cost and higher integration. Applications of LNA include WLAN, WSN and UWB applications. In this paper a detailed survey is provided for various LNA design techniques. The designed circuit is simulated using Advanced Design System (ADS) software. Read More...
|
Electronics & Communication Engineering |
India |
849-851 |
220 |
Classification of Lung Diseases Using Optimization Techniques
-Tejinder Kaur ; Er. Neelakshi Gupta
The lungs are part of complex apparatus, expanding and relaxing thousands of times each day to bring in oxygen and expel carbon dioxide. Lung disease can results from problems in any part of this system. In this paper, an automated approach for feature selection and classification of the lung diseases using CT images is presented. The lung CT image is engaged as the input. Filters are used to remove unwanted noise and enhance the quality of image. New feature selection technique that is hybridization of genetic and PSO is used to select features after extracting features using MAD technique. Once features have been selected then they are classified using MLP-NN classifier. In this paper optimization techniques such as genetic/Particle Swarm Optimization are used for feature selection process. Read More...
|
Electronics & Communication Engineering |
India |
852-854 |
221 |
Use of Hadoop Framework for Web Based Sentiment Analysis
-Kalambate Akshay Rajendra ; Kalambate Akshay Rajendra; Mane Mayur Ravindra; Rane Zilu Ramkrishna; Gamare Pralhad S.
Current era is of social networking sites, petabytes of data is generated daily on web. Millions of people are posting their likes, dislikes, comments daily on social networking sites. In this system, we are proposing a model that will extract the sentiment from a famous micro blogging site, Twitter, where users post their opinions for everything. Twitter is an online web application which contains lots of data that can be a structured or semi-structured or un-structured data format. We can collect the data from the twitter by using Apache Hadoop(BIG DATA) eco-system using online streaming tool Flume. There are different types of analysis that can be done on the collected data. So here we are taking sentiment analysis, for this we are choose to use Hive and its queries to give the sentiment data based up on the groups that we have defined in the HQL (Hive Query Language).Proposed model uses modified version of Naïve Bayes machine learning algorithm. Our modifications introduce neutral class by eliminating class conditional independence assumption of Naïve Bayes classifier by considering probability intersection between positive and negative classes. Algorithm results are improved by reducing words in tweet to their root form through mechanism of pre-processing before passing them to sentiment analyser. Hence, proposed system classifies tweets as positive, negative or neutral with respect to a query term. This system may prove useful for the enterprises who want to know the feedback about their product brands or the customers who want to improve their productivity and this system may also can be beneficial for election exit polls. Read More...
|
Computer Engineering |
India |
855-857 |
222 |
Improved remote sensing image segmentation using fuzzy logic for dynamic statistical region merging algorithm
-Harmanpreet Kaur ; Er. Jagdeep Singh Aulakh
Remote sensors gather information by measuring the electromagnetic radiation that's reflected, emitted and absorbed by objects in various spectral regions, from gamma-rays to radio waves. To measure this radiation, both active and passive remote sensors are utilized. Image segmentation may be the division of a picture into regions or categories, which correspond to different objects or areas of objects. Image segmentation is a significant tool in image processing and can serve becoming an efficient front end to sophisticated algorithms and thereby simplify subsequent processing. It is the procedure of dividing an image into homogenous and non-overlapping regions, that is a significant step toward higher level image processing such as for instance for example image analysis, pattern recognition and automatic image interpretation. This paper is targeted on remote sensing image segmentation for dynamic statistical region merging algorithm using fuzzy logic. To improve the correctness of the remote sensing images dynamic statistical region merging-automatic scale value is proposed to acquire the automatic scale values. The remote sensing images were employed for experimental purpose. Quantitative analysis was performed on the cornerstone of geometric accuracy, specificity and sensitivity. This method can consistently segment remote sensing images with high efficiency. Read More...
|
Electronics & Communication Engineering |
India |
858-862 |
223 |
Contemporary & Potential E-Banking Channels in India
-Munish Sabharwal ; Dr. Sohan Garg
The research work was conducted with the objective to find the various channels of e-banking in India available as on date and the banking channels and services that can be offered in future on smart devices. This paper is pursued by collecting information through a literature review of the websites, brochures, products and services of related banks and by observation method, examining the banking services offered by various banks. The study suggests the various channels of e-banking available in India currently and also suggests certain Banking Channels and Services that can be offered in future on smart devices. Read More...
|
Computer Science |
India |
866-872 |
224 |
Agricultural Plant Disease Detection and its Treatment using Image Processing
-Jundare Manisha Ashok ; Jundare Pallavi Tanaji; Juundare Pragti Vikas; Prof. C.S. Aryan
Recognizable proof of the plant ailments is the way to keeping the misfortunes in the yield and amount of the agrarian item. The plant's investigations ailments mean the investigations of outwardly detectable examples seen on the plant. Wellbeing observing what's more, ailment location on plant is extremely basic for feasible farming. It is extremely hard to screen the plant illnesses physically. It requires colossal measure of work, expertise in the plant maladies, furthermore require the extreme preparing time. Consequently, picture handling is utilized for the identification of plant ailments. Malady recognition includes the progressions like picture obtaining, picture pre-handling, picture division, highlight extraction and arrangement. This paper talked about the routines utilized for the identification of plant infections utilizing their leaves pictures. This paper additionally talked about some division and highlight extraction calculation utilized as a part of the plant illness discovery. Read More...
|
Computer Engineering |
India |
873-876 |
225 |
Comparative Analysis of Bit error rate and Quality Factor at Different Power levels over fiber optic Link
-NEHA VAISHAMPAYAN
Chromatic dispersion is very serious issue for communication engineers while designing a wave division multiplexing for optical communication. In the present scenario there is a increasing demand of high speed internet which require more capacity and more bandwidth. The effect of chromatic dispersion can be reduced by compensation technique. [1, 2] The chromatic dispersion also has inverse relationship with FWM. In this paper we used post dispersion compensation along with the fiber Bragg grating to reduce the effect of chromatic dispersion. Also we can compare the Bit error rate at different power levels 5 db, 10 db and 20 db while the length of fiber is fixed. After simulation it is proven that bit error rate is a function of input power level. The pulse broadening is a function of length of fiber which has been shown in this work When the BER increases quality factor decreases and overall fiber optic system degraded. In this paper we also prove that the BER is also a function of Length of Fiber. As the fiber length increases BER also increases. The whole simulationn is performed by Optisystem simulation software. Also by examine the eye diagram it is clear that link performance is improved by using dispersion compensation. Read More...
|
Electronics & Communication Engineering |
India |
877-879 |
226 |
Fingerprint Image Reconstruction from Minutiae
-Prof. Seema A. Singh ; Komal V. Samdadiya; Kishor P. Lokhande; Pranali S. Patil; Gauresh R. Suryawanshi
For fingerprint matching the set of minutiae was considered as the minutiae points were most distinctive points to represent fingerprint. First it was believed that minutiae set is not sufficient for reconstruction of fingerprint image. But, in this paper with the help of prior knowledge termed as orientation patch dictionary and continuous phase patch dictionary it is somehow possible to reconstruct fingerprint image from their minutiae representations. The two dictionaries improves the reconstruction of fingerprint. Orientation patch dictionary helps in reconstruction of orientation field, and continuous phase patch dictionary helps in reconstructing ridge patterns. Read More...
|
Computer Engineering |
India |
880-883 |
227 |
Face Recognition with Neural Networks
-R. Sujithra ; Dr. Vasantha Kalyani David
Biometric is an emerging trend of science for identifying a person based on physical and behavioural attributes. Large scale of biometric systems are used both in commercial and government agencies to increase the level of security. Face recognition is the powerful method of recognizing an individual. It is a computer application which compares the facial features with the database image. A unique approach is introduced for recognizing multi pose images with different conditions. The classification is performed by using Back Propagation Algorithm and Radial Basis Algorithm and Adaptive Neuro Fuzzy Inference System. The proposed method is based on extraction and Eigen face method. Experimental results are tested using FERET database and shows that the proposed method is effective for face recognition. The feature extraction using PCA is to reduce the dimensionality and to calculate the feature points. The performance evaluations between the proposed methods are analyzed. The characteristic features calculated using PCA called Eigen faces are obtained from the stored images are combined with the Back Propagation Neural Network, Radial Basis Function Network and Adaptive Neuro Fuzzy Inference System algorithms for recognition of images. For extracting the feature points from the input image, entropy and mean of each image are detected. The experimental results on performance of testing images are compared with Back Propagation, Radial Basis Function Network and Adaptive Neuro Fuzzy Inference System algorithms. Thus Face recognition can be achieved through the architectures and algorithms of artificial neural networks. Read More...
|
Computer Science |
India |
884-887 |
228 |
Camparative Study of TCSC and UPFC Implemented For Congestion Management in Deregulated Power System
-Prof. V.V. Khatavkar ; Madhuree M.Hage; Prof. Anjali Dharme
One of the technical challenges in Power system deregulation is Congestion. In deregulated electricity market congestion in transmission line occurs when there is inadequate amount of transmission capability to simultaneously accommodate all constraints for transmission of a line. Flexible Alternative Current Transmission System (FACTS) devices is a solution to reduce the flows in over loaded lines, resulting in an increased loadability, controlling the power flow in the network, improved stability of the network ,low system loss, and there by reduced cost of production. This paper deals with effect of different types of FACTS devices such as thyristor controlled series capacitor (TCSC) and Unified Power Flow Controller which are deal with particular 300km,3 Phase,400 V, (L-L), 50 Hz. long transmission line prototype system for improvement of the power flow at receiving end and also the voltage at the receiving will be effected by different types of nonlinearity present in power transmission which improved by FACTS devices. From result we will compare different FACTS devices by which we can conclude that UPFC will have maximum capability for power flow improvement. All simulations have been carried out in MATLAB/SIMULINK environment. Read More...
|
Electrical Engineering |
India |
888-890 |
229 |
Automatic Gear Changer in Two Wheeler Using Pic
-Miss. Thorat Arati ; Miss. Tate Pranaya .A; Miss. Desai Shraddha .N; Miss.Ghewari Mrinalini U.
The main objective of this concept is used to apply the gear by using automation system in automobile vehicles. This is the new innovative model mainly used for the vehicles to control the vehicle. Here we are concentrating to design the automatic gear changing mechanism in two wheeler vehicles by using the electronic devices. This is very useful for the gear changing mechanism in automobile vehicles. By using this we can easily control the vehicle and improve the performance of the vehicle also we can avoid the wear and tear of the gear. Read More...
|
Electronics & Communication Engineering |
India |
891-894 |
230 |
A Pipelined Processing Architecture for Delay Optimized Matching of Data Encoded with Hard Systematic ECC
-RENU S. KHOND ; Prof. P. R. Indurkar; Prof. P. R. Lakhe
In many applications of communication network data transfer between nodes is a common but critical operation. Some error bit and noise is added with data when the data is transfer through communication network. Error Correction Codes are used to generate the original data at the receiver side by removing error and noise. Communication performance is improved by enabling the transmitted signal to better withstand the effects of channel disabilities such as noise, interference and fading which occur during transmission as well as during comparison. In short the Error Correction is the detection of errors and reconstruction of the original, error free data. There are errors correcting codes to detect as well as correct errors. One of the main drawback of error correcting code is time of the execution which increase the delay in the communication network. In this paper error correction code is implemented with the pipelining technique to improve the execution time of the communication system. Read More...
|
Electronics & Communication Engineering |
India |
895-897 |
231 |
A Survey on Various Prevention Techniques for Rushing Attack in MANET
-Ankit Patel ; Ankit Patel; Shaishav N. Shah
A Mobile ad hoc network (MANETs) is a group of mobile nodes that communicate with node to node via wireless links with no fixed infrastructure and no centralized administration. In MANETs many routing protocol works as on-demand routing protocol and these on-demand protocols have faster response time and lower overhead. In MANET there are many attacks that affect the routing and one of them is rushing attack. In this paper, we have study various prevention techniques, which are used to prevent the rushing attack. In Rushing attack, a malicious node or an attacker further the speed of routing process. Rushing attacks represent one of such possibilities. In these Rushing attacks, malicious nodes send the Route Request (RREQ) packets, asking for a route, to the destination node quicker than the legitimate nodes do. Read More...
|
Computer Engineering |
India |
898-900 |
232 |
User Specific Location Provenance Proofs And Proxy Generation Framework.
-Joshi Sunil Ramnarayana ; Prof.Singh S.A; Jadhav Pallavi Subhash; Randhavane Sonali Baburao; Khalkar Supriya Somnath
During last few years, use of mobile phones as a official work and many organization using mobile device as a business communication. Location based services allow user to provide physical location provenance proof and privacy protected. Our framework maintains a privacy of data sharing and provides witness proof. It is a significant challenge to generate provenance witness and generate a proxy in one framework.so far propose system fulfill the framework requirement. We produce a novel framework for location specific secure data sharing which will provide user location proofs generation and proxy location. Read More...
|
Computer Engineering |
India |
901-903 |
233 |
Virtual reality of a sample flat using google cardboard
-Shaikh Ibrahim ; R.S.Suryawanshi; Safwan Mulla; Sahil Kazi
In this paper we develop an Application in order to visualize the architecture of flat on development site with the concept of virtual reality. With the help of android phone and Google cardboard we are building a device for developing virtual reality. The effects will be developed in Unity 3D and also using DIVE Software Development Kit. The user of it can only visualize the places or structures those are already built and developed or at development stage. In this paper we will be developing and implementing sensor fusion algorithm for detecting orientations in three dimensions. We will be implementing A* approach for path finding and also Kalman filter is designed to compensate the sensor errors[2]. The app implemented would be suitable on android platform and Google Cardboard will also be used for displaying purpose[1]. Read More...
|
Computer Engineering |
India |
904-906 |
234 |
Discovering the Community Structures in the Evolving Multidimensional Social Networks
-Gomathi .S ; Mrs. R. Vanitha
Online Social network is growing to large extent to share information between the different diversity people around the world. The main objective of the proposed system to identify the community in the multidimensional data such as users , Tags , stories , locations ,employment details ,photos and comments . We propose a data mining technique to detect the frequently interacting users based on the common subjects and grouping them in single community. The main incorporation of the work is to identify a seed-based community in a multi-dimensional network by evaluating the affinity between two items in the same type of entity (same dimension) or different types of entities (different dimensions) from the network. Our idea is to calculate the probabilities of visiting each item in each dimension, and compare their values to generate communities from a set of seed items and explore the feature evolution from the seed item in the same dimension or different dimension. We also propose the friend suggestion system and information suggestions system based on the data relevancy for the items in the different dimensions using seed of the data selection. In order to evaluate a high quality of generated communities by the proposed algorithm, we develop and study a local modularity measure of a community in a multi-dimensional network. Experimental results prove that proposed system outperforms the state of approach in terms of precision and recall. Read More...
|
Computer Science |
India |
907-913 |
235 |
INTEractive voice response system for educational institution
-Pooja Bhavsar ; Pallavi Deshmukh; Pooja Kute
The interactive voice response system (IVRS) is an automated phone system and software that allows an individual to conduct transactions by phone without the assistance of a live worker. The telephone user can access the information from anywhere at any time simply by dialling a specified number and following an on-line instruction when a connection has been established. The user can get the information at anytime from anywhere by dialling the specified mobile number. The AVR system uses computer stored data. The student data is stored in computer. The parent’s mobile number is stored in the computer. Read More...
|
Computer Engineering |
India |
914-915 |
236 |
Avoid duplication in cloud system with improved security and reliability
-Shweta Vilas Jondhale ; Amita Suresh Jadhav ; Priyanka Balasaheb Dhanwate; Madhuri Vinayak Deshmukh; Ass. Prof. R. R. Watane
Data duplication is technique has been widely used in a cloud to reduce storage space and upload bandwidth. This technique is also used for eliminating duplicate copies of data. However, in cloud only one copy of each file is stored even if each file is owned by a huge number of users. The duplication system improves storage utilization but it reducing reliability, according to user. Furthermore, in above challenges the Data duplication is a technique has been widely used in cloud servers that are data storage makes first attempt for formalize notation of distributed reliable duplication system. We propose, new distributed duplication systems are improves security and reliability. In which the multiple cloud servers are distributed in data chunks. In Distributed storage system, the deterministic secret sharing scheme is achieved security requirements of data confidentiality and tag consistency, instead of using tag conversion and message authentication code as in duplication system. Security observations makes clear by reasoning that our de-duplication systems are get in terms of the clear outlines detailed in the made an offer safety good example. As a fact in support of idea of a quality common to a group, we give effect to the made an offer systems and put examples on view that the caused overhead is very limited in true to likeness conditions. Read More...
|
Computer Engineering |
India |
916-918 |
237 |
Design of Vehicle to Vehicle Data Transmission Using Li-Fi Technology
-Dipali V Charahte ; Priyanka V Avhad; Supriya V Mankar; Poonam R wagh; Nivedita S Mankar
Vehicle to vehicle data transmission, we present initial designs and results of a small-scale prototype using light fidelity (Li-Fi) technology, a new technology that was developed in the last few years, which still needs more systematic inquiry on its sustainability for outdoor vehicular networks. Vehicle to vehicle communication is the most
effective solution we have used in order to reduce vehicle's accidents. The propose use of Li-Fi technology comprises mainly light-emitting diode (LED) bulbs as means of connectivity by sending data through light spectrum as an optical wireless medium for signal propagation. In fact, the usage of light emitting diode (LED) eliminates the need of complex wireless networks and protocols. The design system is aim to ensure a highly-reliable communication between a commercial LED-based transaction light and a receiver mount on a vehicle.
Read More...
|
Computer Engineering |
India |
919-922 |
238 |
study and analysis of rural accessibilty: public versus intermediate public transport
-Irugu.Rajesh ; Y.Mahesh; G.Navya; CH.Deepika
Rural areas development is necessary for the developing countries like India. Public transport is the major source for such developments as people living in rural areas are willing to improve their living standards. Now a days public transport facing problem with intermediate-public transport. Transport planner has to care of these problem and necessary precautions to increase a public transport facility which in turn helps to increase the public transport usage by the commuter. Present study focused to increase the public transport accessibility in safe and efficient way. This study helps in financial growth to the public by diverting intermediate public transport to public transport. The study area selected is between Anandapuram to Vishakapatnam, household surveys and onboard survey are carried out to analyze the current nature of accessibility to these zones. Read More...
|
Civil Engineering |
India |
923-926 |
239 |
Context Based Predictor on Lossless Compression for Android Mobile Devices
-Abhishek D. Nalkande ; Pooja N. Apsunde; Yogita V. Mahajan; Shivani S. Patil
In Android devices, Memory management has become a major concern as a result of it has vital impact on system performance and battery life. Additionally it's vital to with efficiency use and manages the interior and external memory house gift within the mobile software. Thus it is essential to create a facility that helps in reducing memory consumption. The projected Classic compression rule compress the RGB color exploitation lossless compression rule with the assistance of prophetical secret writing supported Color quantization for mechanical man Mobile Devices. Supported this it'll scale back the image size whereas achieving the most effective image quality with less knowledge loss. it'll show on output screen MSE, PSNR, and compression magnitude relation and compression time of compressed Image. Read More...
|
Computer Engineering |
India |
927-930 |
240 |
Spatial and temporal variations of surface water quality of Batticaloa Lagoon with the special reference to coastal line in Sri Lanka
-Mr. R. Thivyatharsan ; Miss. S. Dasinaa; Miss. V. Menaha
Batticaloa lagoon is an inland body of water plays a significant role to uplift the standard of living of people, especially fishing community in Batticaloa district. However, lagoon water pollution has become a growing menace to human society and natural ecosystems in recent decades. Hence, it is vital to understand the spatial and temporal variability of pollutants within aquatic systems. Therefore, this study aimed to investigate the spatial and temporal variations of surface water of Batticaloa lagoon. This study was carried out from November, 2013 to June, 2014. Batticaloa lagoon was divided into three divisions based on anthropogenic activities where twenty sampling points were randomly selected from these divisions and water samples were taken monthly. Physico-chemical parameters such as temperature, pH, EC and TDS were measured at sampling points while TSS, TS, DO, BOD, phosphate, nitrate and turbidity were measured at laboratory. Data were analyzed statistically to interpret the results. Results showed that all the quality parameters tested except turbidity exceed the standard levels for aquatic life while DO falls within the acceptable range. There were high range in tested parameters, temperature ranged between 27.2˚C to 32.5˚C, pH 6.4 - 9.2, EC 600µS/cm - 1700μS/cm, TDS 296mg/l - 873mg/l, TSS 13mg/l – 35mg/l, phosphate 0.19mg/l - 0.76mg/l, nitrate 0.97mg/l - 2.60mg/l, DO 4.64mg/l - 7.12mg/l, BOD5 4.13mg/l - 8.66mg/l and turbidity 6.6NTU - 13.9NTU. Phosphate and nitrate levels significantly (p<0.05) varied among the divisions. Further, temperature, pH, EC, TDS, TS, DO and phosphate were high during dry season while TSS, BOD, nitrate and turbidity were high during wet season. The variations of EC, TDS, TS, TSS, BOD and turbidity between wet and dry seasons were also significant. The study concludes that, the Batticaloa lagoon water has been polluted. However, pollution level is not severe. Therefore, measures should be taken to prevent the further pollution of Batticaloa lagoon. Read More...
|
Agricultural Engineering |
Sri Lanka |
931-936 |
241 |
Reactive Power Compensation by using FACTS Devices under Non-Sinusoidal Condition by using MATLAB Simulation
-Sarvesh Avinash Gadre ; Praveen Swaminathan Iyer
Actual generation process requires the working of many components of the power system in tandem to maximize the output. One of the main components to form a major part is the reactive power in the system. It is required to maintain the voltage to deliver the active power through the lines. Loads like motor loads and other loads require reactive power for their operation. To improve the performance of ac power systems, we need to manage this reactive power in an efficient way and this is known as reactive power compensation. Reactive power can be best described as the quantity of “unused†power that is developed by reactive components, such as inductors or capacitors in the AC circuit or system. In a DC circuit, the product of “volt-amps†gives the power consumed in watts by the circuit. However, while this formula is also true for purely resistive AC circuits, the situation is slightly more complex in a AC circuit containing reactive components as this “volt-amps†product can change with frequency. There are two aspects to the problem of reactive power compensation: load compensation and voltage support. Load compensation consists of improvement in power factor, balancing of real power drawn from the supply, better voltage regulation, etc. of large fluctuating loads. Voltage support consists of reduction of voltage fluctuation at a given terminal of the transmission line. Two types of compensation can be used: series and shunt compensation. These quite satisfactorily do the job of absorbing or generating reactive power with a faster time response and come under Flexible AC Transmission Systems (FACTS). Read More...
|
Electrical Engineering |
India |
937-941 |
242 |
Domain Specific Content Based Video Retrieval
-Pooja Prakash Maral ; Sawant Prachi S. ; Tondwalkar Shweta B. ; Sawant Gitanjali N.
The demeanour of digitalization in all over the world and rapid growth of multimedia data had led to introduce a new way of video retrieval. Traditional video retrieval methods fail to meet technical challenges, so effective video retrieval system is urgently needed. This paper focuses onautomated video indexing and video search in large video archive which removes the drawbacks of existing system. The SURF feature descriptor in system employs a stochastic dimensionality reduction method as a result provides a model data for the videos and remove drawbacks of the existing system. Read More...
|
Computer Engineering |
India |
942-944 |
243 |
Personalized Geo-Specific Tag Recommendation for photos on social websites
-Divyarani Mahadev Karande ; Priyanka Deokate ; Kashmira Bhagat ; Anand Bansode
Nowadays social tagging is an important in social websites to provide a good tagging for photos uploaded on the websites to access high quality social tags. Tag recommendation by automatically assigning related tags to photos to find out particular interesting area. In this paper we concentrate on the personalized recommendation work and try to choose user preferred geo-location-specific as well as relevant tags for photos on social website. For users and geo-locations we assume they have various preferred tags assigned to a photo and purpose, a subspace learning method to individually uncover the user preference and geo-location preference. The goal of our work is to combine a visual and textual space into a unified subspace. According to unified subspace, it is mapped from the intermediate subspace and textual subspace respectively. We create formula for above learning problems into united form and present the minimization with its convergence rule. For a given untagged photo with its geo-location to a user we used the nearest neighbor search in the relating unified space. The user preferred and geo-location specified tags. Experiments on big scaled data sets collected from flicker examine the effectiveness of the proposed system. Read More...
|
Computer Engineering |
India |
945-947 |
244 |
Seismic risks of rc structures in india an analytical study
-keshavamurthy c ; B S Suresh Chandra
In the present scenario building with open ground story has become an unavoidable due to the parking demands in most of all cities. Though many works have concluded that open ground storey buildings are vulnerable to earthquakes, still these kinds of buildings are constructed till date across much part of cities falling under lower zones without considering earthquake loadings. In this present study an attempt is made to know the capacity of the column sections (200x450mm and 300x300mm) which are used in the present construction sites of low-raised buildings to sustain the earth quake loads which may occur in future and this study is based on the column P M M capacity and analysis is done based on the equivalent static analysis without considering infill effects. This study is taken to know the risk of earth quake in lower zones and to create awareness about seismic risk which has to be considered for selecting section of columns. Read More...
|
Civil Engineering |
India |
948-952 |