No. |
Title and Author |
Area |
Country |
Page |
51 |
Characterizationof Aluminium-Silicon Carbide Composite Using Stir Casting Technique
-Ajay Anand ; Mr. S. S. Chikkadevegowda
In order to enhance the performance of materials used in applications like transportation, electrical and structural applications, composite materials have been used in recent days. Properties like high specific strength; specific modulus and good wear resistance of composite materials make them to be applied in various fields compared to unreinforced materials. Solid state production, semi solid state and liquid state production route are among the various techniques that are followed to produce composites. The best technique in terms of cost and simplicity in production is the stir casting technique which belongs to liquid state production. The objective of the project is to fabricate Al-SiC composite by using stir casting method and study its mechanical properties. For this purpose aluminium 6061 alloy is casted and its mechanical properties are compared with composite with silicon carbide reinforced in the percentage of 2, 4, 6 and 8% respectively. Read More...
|
Mechanical Engineering |
India |
205-208 |
52 |
DESIGN OF PLUS SHAPE MPA LOADED WITH SRR AND CSRR STRUCTURE
-Ravi Kumar ; Abhishek Saxena; Kaushal Gangwar
In this paper, a plus shape MPA structure is proposed, which is loaded with metamaterial structures (CSRR and SRR) simulated at 57 GHz. It shows the metamaterial property at thickness of 1.57 mm and shows the reduction in return loss with huge enhancement in bandwidth up to 60 GHz. The proposed antenna is simulated in HFSS 13 and compared the result with regular patch antenna. The analysis shows reduction in return loss and enhancement of gain bandwidth which provides a bright future of scope for further analysis in this area. Read More...
|
MICROWAVE ENGINEERING |
India |
209-211 |
53 |
NICE: A System to Detecting A DoS In Virtual Machine
-Kakade Rohini B. ; Jadhav Asmita K.; Bhise Varsha D.; Prof.C.S.Aryan
Cloud computing is getting popular now a days. Use of cloud is increase daily. As in the cloud environment resources such as OS virtual machines, software is shared by billions of users of the cloud. The virtual machines resides on the cloud are more vulnerable to the denial of service attack. If these machines are connected to more achiness then it becomes more dangerous as it harms all cloud networks. In the cloud especially infrastructure as a service the detection of denial of service attack is more challenging task. This is due to cloud users can install vulnerable software on the virtual machines. In this paper we have proposed multiphase vulnerability detection in the cloud environment. We have proposed an open flow network program NICE to detect and mitigate the attacks on the virtual machines. NICE is built on the scenario attack graph based model. We have proposed a novel approach to mitigate the attacks in the cloud environment by selecting different countermeasure depending upon the percentages of vulnerability of the virtual machines. Now a day IDS is used to detect the attack in the network by many organizations. In the proposed system we focus on the distributed denial of service attack in the cloud. Read More...
|
Computer Engineering |
India |
212-215 |
54 |
Use of Helmet camera of field engineer Integrated to SCADA for Remote Supervision and Fault Rectification in Distribution Management System (DMS) ? Smart Grids
-Palagummi Naga Siva Aditya ; Gaurav Patwa
With the growing need for electricity, the utilities are now towards the transformation of their existing delivery assets to a smart grids and distribution management system has become the key enabler towards this transformation. Distribution Management System includes the two main themes that forms the focus areas of utilities – interoperability and reliability, enabling a decreased customer outage duration. The Fault Location, Isolation & Supply Restoration (FLISR) is the major module of the distribution management system. Any technological advancements in the FLISR module ensures improved effectiveness in the distribution management system. Thus, this paper provides the inclusion in FLISR component where in the helmet camera of the field personnel is integrated with the Distribution Management System that helps in operator in faster fault location and isolation. The solution is broadly around having a wireless camera in built /attached to the safety gear that the field staff /engineer uses while working in the field. The camera connects to the router and transmits that particular data to the network destination. This data can then be viewed through DMS_SCADA by a control room operator. Also, based on requirement mobile supervision access is possible and thus enabling the reliability in distribution service. Read More...
|
Electrical Engineering |
India |
216-219 |
55 |
Survey on Object Classification in Image Processing
-T.SIVARANJANI ; G.SINGARAVEL; G.karthick
Object classification important task in image processing. The image processing techniques greatly help to classify object. The goal of object classification is to accurately predict the target. Classification includes image sensor, object preprocessing, object detection, feature extraction from a image and object classification. Feature extraction is useful technique for efficient object classification. This paper presents the survey of various classification techniques with fusion function. The survey presented in this paper can be useful as a quick overview and beginner’s guide for the object classification field. Read More...
|
Computer Science |
India |
220-223 |
56 |
Optimization of Containment Shield Using LS-DYNA
-Lohith M S ; Dr. B.M. Nandeeshaiah; Chandan R
The potential hazard resulting from uncontained turbine engine rotor blade failure has always been the long-term concern of each aero engine manufacturer. Usually, there are many factors involving the engine containment capability which need to be reviewed during engine design such as; case thickness, rotor support structure, blade weight and shape. By using INCONEL 625 alloy which is austenitic nickel-chromium-based superalloy, which is resistant to oxidation and corrosion and this material is well suited for service in extreme environment i.e., subjected to high pressure and kinetic energy. The first structure was a flat plate representing a standard case configuration. The second structure was a flat plate with a convex curve section at the impact point. The curved surface was designed to force the blade to deform plastically, dissipating energy before the full impact of the blade is received by the plate. The curved geometry of the casing was able to tolerate the higher impact velocity before failure. The computation model was developed and study is performed using ANSYS –LS DYNA. The optimization of weight is considered, by optimizing the shape of the casing by plane geometry to the convex curve geometry of casing. Read More...
|
Mechanical Engineering |
India |
223-227 |
57 |
Load analysis and Multi body dynamics analysis of connecting rod in single cylinder 4 stroke Engine
-Santhosh Reddy. A ; Dr. Maruthi B H; Mr. Shivraj J
The main objective of this thesis is performing the detailed load analysis including Multi Body Dynamics(MBD) analysis and to explore the weight reduction opportunities of connecting rod used in Bajaj Pulsar 150c.c engine. This has been carried out by considering the two cases. The first case includes the static load stress analysis to determine various stress and fatigue parameters acting on the connecting rod and Multi body dynamics analysis to find out the behaviour of the connecting rod with its associated parts while in relative motion. The second case includes performing the optimisation by looking at the possible weight reduction opportunities for connecting rod. The geometric modelling of connecting rod is done by using CATIA V R20 and saved in IGES format and imported to ANSYS workbench, using ANSYS 14.5 workbench the connecting rod analysed for various stresses by applying loads and boundary conditions by using different modules of ANSYS workbench 14.5. Finite element analysis of the connecting rod is done by considering Carbon steel material. Von misses stresses, frequencies with respect to modes; total deformation, buckling analysis, MBD analysis etc. are done. Optimization by weight reduction is carried out by providing elliptical cut out at I-section of connecting rod and analysed for various loads. Finally results are obtained for various load conditions and future scope for the project is defined. Read More...
|
Mechanical Engineering |
India |
228-232 |
58 |
FPGA implementation of modified ADPLL for Dual clock Memory design
-Shivprasad.Mallappa.Channangi ; Mr. Vinay Bagali
In This Paper, We Propose A Novel Design Of Adpll Which Should Operate In Synchronous With Dual Clock Memory. The Main Blocks Of Adpll Such As Digital Controlled Oscillators Are Implemented With A New Method In Digital Domain For Better Performance. The Digital Controlled Oscillator Is Designed Using Modified Counters Which Reduce The Delay Compared To Traditional Methods. The Increment Decrement Counter Is Modified From Previous Work And Is Designed Using Mux. 200 Hz Is The Central Frequency And Operational Frequency Range Is 997.0089 Hz To 1008.64 Hz Which Is The Lock Range Of The Design. Further The Adpll Is Designed Using Vhdl Language, Synthesized Using Xilinx Ise 14.5 And Implemented Using Xilinx System Generator For Data Serialization Using Spartan 6 Lx45 Fpga Board. Read More...
|
Electronics & Communication Engineering |
India |
233-236 |
59 |
Survey on Routing Protocols in Wireless Sensor Networks
-Ankur Dongre ; Prof. Sanjay Bansal
Wireless sensor networks are formed by small sensor nodes communicating over wireless links without using a fixed network infrastructure. Sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks have to ensure reliable multi-hop communication under these conditions. The nodes can be densely deployed in close proximity to the phenomenon to be observed. They can be deployed in hostile environments where the nodes may not be physically accessible and are subject to tampering. Nodes can be added to and deleted from the network at any time, resulting in unpredictable changes to the topology of the network. This presents new challenges in the design of routing protocols for sensor networks. In this paper, the constituent building blocks of sensor network routing protocols are identified and analyzed. The routing protocols are broadly classified into three categories: flat, hierarchical and Location aware Routing and further into subcategories based on the centrality of their theme. Several routing algorithms belonging to each category that have been proposed in the literature are explored. Read More...
|
Computer Science |
India |
237-240 |
60 |
Achieve Confidentiality & Authentication for Cloud Data Using Hybrid Approach
-Nikita Mehta ; Khushbu shah
We are proposing to allow the users to audit the cloud storage with very lightweight and ease of communication and computation cost. The auditing which we are going through our research paper result not only ensures strong cloud storage accuracy guarantee, but it also simultaneously achieves fast data error localization, i.e., the identification of hacker information. And securely we are introducing an effective TPA, which is a auditing process which results in bringing in no new vulnerabilities towards user data privacy, and can introduce no additional online burden to user. In this paper, we are going to propose a secure cloud storage system which supports privacy-preserving public auditing. We will further extend our result to enable the TPA to perform audits for various users certainly and efficiently. This shows the proposed scheme is highly efficient and data modification attack, and useful in even server colluding attacks. Read More...
|
Information Technology |
India |
241-244 |
61 |
Experimental Study on The Rigid Pavement With Comparison of Polyester And Coconut Fiber As A Partial Replacement of Cement
-Patri Hanitha ; Mahesh Yamala; Gundu Navya
This project work involves an experimental investigation of the artificial and natural fibers those are polyester and coconut fibers on the mechanical properties of the concrete used in the rigid pavement. In this experimental study involves two types of concrete mixes were prepared individually. Polyester fiber of 0.5% to 2.0% and coconut fiber of 0.5% to 2.5% by weight of cement were added to the mixes. After that a comparative analysis has been carried out for conventional concrete to that of the fiber reinforced in relation to their compressive, split tensile and flexural properties. In this study the observation shows that, the percentile of fiber content increases from 0%, 0.5%, 1%,1.5% for polyester fiber and 0%,0.5%,1.0%,1.5%,2.0% for coconut fiber in concrete mixes. By the experimental work the compressive, split tensile and flexural strengths are proportionally increased both polyester and coconut fiber usage. It is observed that the optimum dosages of polyester fiber is 1.5% and coconut fiber is 2.0% by weight of cement. In this project cost analysis is also determined for conventional concrete and fiber reinforced using experimental test reports. By analyzing the cost it was found that polyester reinforced concrete pavement increases to 49.77% and coconut reinforced concrete pavement decreases to 4.20% when compared to conventional concrete. Read More...
|
Civil Engineering |
India |
245-250 |
62 |
Design and Analysis of Multi Nozzle Jet Spray Condenser using MATLAB
-Anitha L ; Jitendra Jayant
To fulfil the requirements of vacuum in sugar & pharmaceutical industries, condenser plays very important part. So the selection of condenser is very vital, in the present study a Multi-nozzle jet spray condenser (Barometric) has been designed and analysed instead of a single nozzle jet spray condenser. This work has been done for the sugar department of the Armstrong Infrastructure Pvt. Ltd. Single jet spray condenser gives an efficiency of 59% in the sugar factory but after using Multi Nozzle Jet spray condenser an efficiency of 79% has been find. After studying and analysing the data given by sugar division regarding their requirements of condenser design and capacity a thorough study has been done and results show that condenser efficiency and vacuum efficiency comes out to be 78.54% and 98.92% respectively. A correlation between vacuum and time has also been established Pv=0.0681×T1.24. The characteristics curves have also been drawn. Read More...
|
Mechanical Engineering |
India |
251-253 |
63 |
A Nine-Level Converter Topology for Transformer less Grid Connected PV Systems
-Soma Venkata Suresh Kumar ; M.Ashok; Siva Prasad Jinka
In this paper we present a single phase transformer less grid connected PV System having two cascaded full bridge converters which will maintain different voltage levels at the dc-link. With a single DC bus the converter can synthesize up to nine voltage levels as one of the bridge is supplied by a flying capacitor. Due to the increase in the number of levels will reduce the harmonic distortion and interference. To improve the efficiency most of them are switched at grid frequency. A suitable switching strategy is proposed for controlling the voltage across the flying capacitor. Simulation is done and the performance of the system is observed. Read More...
|
Electrical Engineering |
India |
254-257 |
64 |
Factors Affecting on Residual Stresses & Springback in Sheet Metal Bending: A Review
-Sakib Gulab Naikwade ; S.B.Chikalthankar; V.M.Nandedkar
In sheet metal bending, the springback phenomenon leads to undesired effects on the geometry and dimensions of the formed parts. One of the main causes that lead and influence the intensity of this instability phenomenon is the state of residual stresses generated by the bending process in the deformed material. To establish an interaction between springback and distribution of stresses it must be known the law of variation of their parameters, their factors of influence and their causes. The magnitude of residual stresses significantly affect the load carrying capacity and the fatigue strength of the formed member, so residual stresses distribution is essential to be find out. This paper reviews the various parameters affecting on residual stress & spring back such as punch angle, sheet thickness, punch tip radius, punch height, bending force, clearance between punch and die, sheet anisotropy etc. Read More...
|
Mechanical Engineering |
India |
258-262 |
65 |
Multi-Nozzle jet spray condenser design and analysis using MATLAB
-Anitha L ; Jitendra Jayant
A multi-nozzle jet spray condenser has been designed and analyzed to fulfill the requirements of vacuum problem in Sugar & pharmaceutical industries. This design and analysis has been done for Sugar unit of Armstrong Infrastructure Pvt. Ltd. A single jet condenser has been using by this industry which gives an efficiency of around 59%. To overcome this multi-nozzle jet spray condenser has been used which gives around 20% more efficiency compared to single jet. MATLAB software has been used to design the multi-nozzle jet spray condenser and to find out the vacuum generated. Data has been taken from the sugar section of the industry, and analysis has been carried out to find out the suitable condenser capacity design and performance evaluation. Read More...
|
Mechanical Engineering |
India |
263-265 |
66 |
Experimental Study on Strength and Durability Characteristics of Fibre Reinforced Recycled Aggregate Concrete using Artificial Sand
-Md Abrar Ahmed ; Rohan S. Gurav
This research work is done to obtain different properties of fibre reinforced recycled aggregate concrete using artificial sand, and to find the optimum percentage replacement of recycled coarse aggregate in concrete with constant 50% replacement of river sand by artificial sand in addition with 1.5% steel fibres, further to compare the properties of conventional concrete with fibre reinforced recycled aggregate concrete using artificial sand. To carry out this experimental work the specimens were casted using different percentage replacement of recycled coarse aggregate i.e. (0%, 20%, 40%, 60%, 80% and 100%) with constant 50% replacement of river sand by artificial sand in addition with 1.5% steel fibres. And results shows that recycled coarse aggregate can be replaced up to 40% for production of M30 grade concrete with constant 50% replacement of river sand by artificial sand in addition with 1.5% steel fibres, and it is observed that the strength of concrete is reducing with increase in replacement percentage of recycled coarse aggregate with constant 50% replacement of river sand by artificial sand in addition with 1.5% steel fibres, however strength achieved by conventional concrete is less than the strength achieved by concrete which is produced with 100% replacement of recycled coarse aggregate by natural coarse aggregate with constant 50% replacement of river sand by artificial sand in addition with 1.5% steel fibres. By using this we can produced green concrete, sustainable concrete or ecofriendly concrete by using artificial sand as fine aggregate and replacement of natural coarse aggregate by recycled coarse aggregate in a concrete. Read More...
|
Civil Engineering |
India |
266-270 |
67 |
Experimental Study and Analysis of Slip Damping In Multilayer Bolted Cantilever Beam.
-Shaitan Singh ; Prof. A.K.Jain
Bolted joints are often used to fabricate assembled structures in machine tools, automotive and many such industries requiring high damping. Vibration attenuation in these structures can enhance the dynamic stability significantly. A little amount of work has been reported till date on the damping capacity of bolted structures. The present work outlines the basic formulation for the slip damping mechanism in multilayered and bolted structures, vibrating under dynamic conditions. The numerical stability of the method and its applicability to actual working conditions have been investigated in the case of a bolted cantilever beam structure with multiple interfaces. The developed damping model of the structure is found to be fairly in good agreement with experimental data. Read More...
|
Mechanical Engineering |
India |
271-276 |
68 |
Study of Behavior of Concrete When Brick Aggregate is used as Coarse Aggregate in Cement Concrte.
-Swamikkan Paulswamy ; Sooraj Jain
Word recycles means to reproduce any waste product and aggregate is used in concrete to supply force and together it means an aggregate made with waste material which is going to be applied in concrete. Brick aggregate is derived from demolished concrete structures. When any concrete structure is demolished, the parts demolished of concrete structure can used as brick aggregate. In this research project properties of brick aggregate is determined and also brick aggregate is used in concrete of M40 grade, as well. Then a comparative study is also made out of brick aggregate with natural crushed stones. Read More...
|
Civil Engineering |
India |
277-279 |
69 |
Android application for college organization
-Dani Akshay Milind ; Mule Sandhya Kiran; Naik Ritesh Ramesh; Prof. Gunjal S.D.
As the development of technology is increasing rapidly, the use of mobile phones have also been increased in our day to day life. Today’s scenario is that mobiles are very useful in everybody’s day to day life. Mobile phones are being used everywhere, hence for educational institute we propose an application that will eliminate the role of manual notice board which we see in educational institute. As often seen that student avoids reading notice board frequently. Thus we are developing a system that will display all the notice board content on it. This paper focuses on penetration of mobile apps. For security purpose to secure the authentication of user, to maintain integrity we are using the Armstrong number to encrypt the data with cryptography. Read More...
|
Computer Engineering |
India |
280-282 |
70 |
Design of Miniaturized compact multi-band Microstrip Patch Antenna
-Mukesh R Chaurasia ; Shobhit K Patel
The present day Systems are operating in two or more frequency bands, requiring Dual or even triple band operation with narrowband antennas. This requirement is demanding a lot more of research in the field of antenna design. These include GPS, Satellite navigation system, wireless cellular system and LANs. Recent advances in the software defined and reconfigurable radio networks allow the multiple band operation of the systems. One of the specific advantage of the software defined reconfigurable radio network is that the operating frequency can be changed even after the device is manufactured. A multiband Microstrip patch antenna is simulated by meandering the slots to reduce the overall dimensions of the patch and to make the system much more embedded, the performance of the antenna is optimized and analyzed using the Ansoft high frequency structure simulator (HFSS). The antenna is designed to function satisfactorily in the radio band of L, S, C and X, Covering a wide range of radio frequency. Antenna has the six active frequency bands and the Centre frequency of the bands are 1850 MHz, 2910 MHz, 5580 MHz, 6880 MHz, 8340 MHz, 9430 MHz respectively. Out of frequency bands L and S are employed in mobile communication while the C and X band are used in the satellite communication purpose. The proposed antenna provides good return loss S11 and VSWR in the range of 1 < VSWR < 1.5 for all the operating band of frequencies. Read More...
|
Electronics & Communication Engineering |
India |
283-286 |
71 |
Effective Use of Paper Sludge (Hyposludge) in Concrete
-Yogesh Dileep Shermale ; M.B.Varma
Paper making generally produces a large amount of solid waste. Paper fibers can be recycled only a limited number of times before they become too short or weak to make high quality paper. It means that the broken, low- quality paper fibers are separated out to become waste sludge. This paper mill sludge consumes a large percentage of local landfill space for each and every year. To reduce disposal and pollution problems emanating from these industrial wastes, it is most essential to develop profitable building materials from them. Keeping this in view, large quantity of national and international references are studied and based on these the state of art of the research and investigations on the production of low cost concrete by blending various ratios of cement with hypo sludge is presented in this paper. Read More...
|
Structural Engineering |
India |
287-290 |
72 |
Shoulder Surfing Resistant Graphical Password Scheme
-Sonal Ghadge ; Sonal Ghadge ; Poonam Kale; Ketaki Mahagaonkar; Bhagyashri Sonawane
Graphical passwords effectively used in authentication system to prevent unauthorized access to mobile device. The security of these mobile devices are limited by shoulder surfing, it refer to direct observation techniques someone’s shoulder to get information. Graphical password scheme have been developed to obstruct this attack. We represent efficient techniques towards the graphical authentication system. Graphical password scheme simply refer the color. The colors are represented in the circle and circle containing the different sector having the alphabets and number. Graphical password scheme prevent the accidental login and the shoulder surfing. User is entering his information at the time of creating an account, that time user enter his favorite color. When user is login, user can rotate the sector in such a way that the alphabets or digits which is in the password that should be comes in the favorite color and then press the button confirm. Likewise user is entering his whole password, till the length of that password. Finally press the login button and then user is successfully login without shoulder surfing. So that attacker doesn’t get the password whatever is entering in the system. Read More...
|
Computer Engineering |
India |
291-294 |
73 |
A Survey on Machine Learning Approach in Data Mining
-DEEPTHI.M ; T.Poongothai
Machine learning is a branch of computer science which evolves from the pattern recognition and computational learning theory. The task of machine learning is categorized into supervised learning, unsupervised learning and reinforcement learning. In this paper, techniques such as support vector machine to extract the substring and for named entities, OSC-NMF for pattern, PCA to detect cancer disease, decision tree to diagnosis heart disease, margin-based censored regression approach, novel multi-task learning techniques are surveyed. Read More...
|
Information Technology |
India |
295-296 |
74 |
Image Steganography Using Variable-Rate LSB Approach
-Hemshikha Joshi ; Rahul Agarwal
Information and communication technology has grown rapidly and internet is the most popular communication medium nowadays. As the demand of more secure transmission has increased, so different steganography approaches have been proposed. In this paper we also present and evaluate my contribution to design the novel approach for image Steganography and named it as variable-rate approach. In this paper three image steganography methods with variable rate of embedding are proposed. A new algorithm is described for hiding a secret image in the least significant bits of a cover image. This method supports both type of images color and gray scale image. How many LSB hides the secret information is decided by the exclusive-or (XOR) operation of a pixel’s neighbor. Experimental results show that the algorithm generally hides images without significant changes to the cover image, where the results are sensitive to the smoothness of the cover image. Read More...
|
Software Engineering |
India |
297-299 |
75 |
Image Inpainting Via Video Frames
-Mr. Shailendra Umakant Kumane ; Prof. Kanchan Doke
Image inpainting technique is the process to reconstruct or filling-in missing or damage parts of image or video in a way that is undetectable to the casual observer. We have specifically address the problem of de fencing of image from fenced image or video as there are fences or barricades at public places due to various reasons like security, which hindered our capability to capture scene of interest. Our proposed approach consists of three steps; initially we will detect a fence using image matting approach. After detecting the fence we will determine the relative motion of pixel, in our approach we have exploit the fact that region invisible in one frame might be visible in other frame and we have model image to be inpainted or frame as Markov Random Field for efficient repainting. The last step in our approach is inpainting of missing (fence covered) region using primal dual total variation algorithm. In this paper we have provided brief overview of various task and techniques use for image inpainting. Read More...
|
Computer Engineering |
India |
300-303 |
76 |
Methodology for Design and Fabrication of Leather Groove Cutter Machine for Double Roller Ginning Machine - A Review
-Kushal J. Bahadure ; Dr. C.C.Handa
This paper presents the methodology for design and fabrication for leather groove cutter machine for double roller ginning machine to fabricate new machine for ginning industry. The main objectives of the fabrication to reduced grooving time and increase productivity. The paper aims to complete fabrication of leather groove cutting machine for double roller ginning machine which consist the leather roller and grinding cutter .In this project we first done CAD modeling using CATIA .In first stage of fabrication area of maximum stress was identified related to the accuracy. Read More...
|
Mechanical Engineering |
India |
304-306 |
77 |
A survey on current techniques of Real Time Multiple Object Tracking from Video based on Background Subtraction Algorithm
-Neha Goyal ; Pratibha Goyal
In PC vision, the most dynamic exploration points are visual reconnaissance in element scenes, particularly for people & vehicles. Wide range of promising applications incorporating human identification at some distance, controlling access in extraordinary ranges, measurements of group flux and investigating blockage or odd particles and for the utilization of numerous cameras intelligent reconnaissance and so much more. Visual observations in element scenes in the handling system incorporates various taking after stages i.e. characterization of moving item, depiction of the comprehensive particles, identifying the movement, displaying the whole situation, proof of human identification, at the end combining the information from different cameras. There are mixes of 2D & 3D images, therefore recognizing abnormalities and conducting forecast so that substance based recovery of reconnaissance features can be done. There are more things to understand about these like, common dialect portrayal, data combination from various sensors. Read More...
|
Computer Science |
India |
307-311 |
78 |
Chassis Frame Torsional Stiffness Analysis
-R.K. Kawade ; Mohan N
In automotive industry, weight reduction is important and active demand because of payload capacity improvement, fuel efficiency and emission reduction. Reduction of the chassis frame weight represents one of the keys to reaching this goal, but requirements on chassis frame stiffness generally make any weight reduction difficult. The problem of finding the compromise between stiffness and weight of chassis frame is therefore of high importance. In this work, vehicle road load significance of the heavy vehicle ladder type chassis frame torsional stiffness studied, and the two method analysed to obtain chassis frame stiffness using finite element analysis based on the vehicle loading. Obtained stiffness will be closer in case of spring bracket loading which can be used to analyse the vehicles handling behaviour. The method yields insights into analysing chassis frame stiffness which is closer to vehicle actual running condition and highlights critical aspects of chassis frame design. Read More...
|
Automotive Engineering |
India |
312-315 |
79 |
Development and Analysis of High Data Rate Quality based Secured AODV-RC4 and AODV-RSA WSNs
-Zaina Khan ; Shish Ahmad; Shimaila
Determination of the figuring strategy is vital on the grounds that the security concerns are secured by the cryptography. Sensor nodes have exceptionally restricted computational and memory abilities, so all the cryptographic procedures cannot be just applied to the WSNs. To fulfill the above security necessities requirements the current figuring systems are be altered alongside consideration of created novel directing methods. In this work security strategies are found in WSNs that can meet the transmission rate prerequisites of sensor hubs and the assessment are seen by code size, information size, handling time, and steering deferral utilization. In light of the RSA and RC4 figuring cryptographic strategies, we have thought about them as far as information size, number of system hubs and hub dissemination. Read More...
|
Computer Engineering |
India |
316-319 |
80 |
Medical Image De-Noising Using Wavelet Transform
-Jagdeep Kaur ; Ruchika Manchanda
The goal of de-noising method in Wavelet de-noising removes the noise present in the image while preserving the image characteristics regardless of its frequency content. Wavelets preserve visual quality and also maintain the diagnostically significant details of medical images. The purpose of de-noising is to remove the noise while retaining the edges and other detailed features as much as possible. In this paper a wavelet based denoising technique is evaluated by implementing the improved algorithm on medical images with simulated noise. To conclude standard parameters like MSE and PSNR are used for image evaluation. Read More...
|
Electronics & Communication Engineering |
India |
320-322 |
81 |
An Internal Intrusion Approach And Self Protection For Generating Synthetic Log File Using Forensic Techniques
-Inamdar SabaAfrin Ghayasuddin ; Khutan Geeta Nivrutti; Varpe Pallavi Subhash; Prof.S.K.Said
In today’s technology, there are new attacks are emerging everyday due to that the system makes the insecure even the system wrapped with number of security measures. To detect the intrusion, an Intrusion Detection System (IDS) is used. To detect the intrusion and respond in timely manner is its prime function. In other words, IDS function is limited to detection as well as response. The IDS is unable to capture the state of the system when an intrusion is detected. So that, in original form, it fails to preserve the evidences against the attack. New security strategy is very much needed to maintain the completeness and reliability of evidence for later examination. In this research work, there proposed an automated Digital Forensic Technique with Intrusion Detection System. It sends an alert message to capture the state of the system, to administrator followed by invoke the digital forensic tool Once an IDS detects an intrusion. To prove the damage Captured image can used as evidence in the court of law. Read More...
|
Computer Engineering |
India |
323-325 |
82 |
A Heuristic Algorithm for The Traveling-Salesman Problem for a Double Integrator
-Rishi Bajpai
This paper presents an algorithm for a double integrator with bounded velocity and bounded control inputs: given a set of points in Rd, find the fastest tour over the point set. Asymptotic bounds on the time taken to complete such a tour in the worst-case then a stochastic version of the travelling problem for double integrator in R2 and R3 are incorporated in the algorithms subjected to operation and stability constraints. Proposed algorithms performances are within a constant factor from the optimum. Read More...
|
Electronics & Communication Engineering |
India |
326-331 |
83 |
Quad band h-slot microstrip patch antenna
-Aman Singh ; G.S. Tripathi
Microstrip Patch Antennas are widely used in many wireless communication applications. In this paper an H-Slot microstrip antenna has been proposed, analysed and investigated using the Ansoft HFSS. For this purpose a rectangular defected ground plane is used along with a defected patch using transmission line feed. The defected patch includes H-Slot shaped patch while the defected ground plane includes a full parametric study of reconfigured ground. The antenna structure proposed in this paper is mounted on a FR-4 substrate with a dielectric constant of 4.7. Transmission line feeding technique is used to feed the antenna with 50 ohm impedance. The return loss is enhanced by using the antenna resonating at multi-frequencies. Read More...
|
Electronics & Communication Engineering |
India |
332-333 |
84 |
Using Multi Walled Nano-Tube for Preventing the Harmful Gases Exiting to the Atmosphere
-Mohammad shazid
In this paper the main focusing view is how to safe our environment from fossil fuel gases which is non-renewable and affecting the atmosphere. Flue gas is the gas exiting to the atmosphere via a flue, which is a pipe or channel for conveying exhaust gases from a fireplace, oven, furnace, boiler or steam generator. Quite often, the flue gas refers to the combustion exhaust gas produced at power plants. Its composition depends on what is being burned, but it will usually consist of mostly nitrogen derived from the combustion air, carbon dioxide (co2), and contains a valuable percentage of a number of pollutants, such as carbon monoxide, nitrogen oxides, and sulfur oxides. To reducing the fuel gases amount in the atmosphere we using the MWNT (multi walled carbon nano-tube) sheet as a filter at the top of the chimney cause reduced pollutant gas exiting to the atmosphere. It is a nano technology which had remarkable features, also quit innovating structure. Read More...
|
Electrical Engineering |
India |
334-335 |
85 |
Design and Optimization of M-Shaped Microstrip Patch Antenna
-Yogendra Kumar ; G.S.Tripathi
The proposed antenna is fabricated with substrate RT duroid 5880 and overall patch dimension of 62×64mm. In this paper, we design and implementation of 1x1 microstrip patch antenna array of given specifications using HFSS v15 software. The design have a dielectric material with dielectric substrate permittivity of 2.2 and height of 1.6 mm. The microstrip patch antenna is designed for WLAN and Radio Frequency applications, at an operating frequency of 2.32GHz, 4.78GHz and 8.5GHz with microstrip line feed and power dividers. A new and improved approach for the design of the asymmetric M-shaped patch antenna which works in WLAN and RF application is proposed. Antenna includes of a main patch with sub patches having resonating slots. Main patch is fed with a 50Ω microstrip line and proposed antenna operates with multiple operational frequencies covering the bands from 2GHz to 10GHz with good impedance matching. Read More...
|
Electronics & Communication Engineering |
India |
336-338 |
86 |
A Study on Statistical Analysis and Security Evaluation Parameters in Image Encryption
-Dr. Kalyani Mali ; Shouvik Chakraborty; Mousomi Roy
In recent years, a significant improvement in multimedia technologies has been observed and therefore, transmission of these data over the network is very common. The network (mainly internet) is not a secure channel and it has a number of security related problems. To achieve security of multimedia data over an insecure channel, a number of encryption methods have been developed. This paper gives a study on different methodology to evaluate image encryption techniques proposed in the literature. Only the visual inspection is not enough and therefore a number of parameters like, correlation coefficient, NPCR. UACI, information entropy, compression friendliness, PSNR, histogram analysis etc., are used, to judge the quality of encrypted images. Read More...
|
Computer Engineering |
India |
339-343 |
87 |
Development and Analysis of High Data Rate Quality based Secured AODV-RC4 and AODV-RSA WSNs
-Zaina Khan ; Shimaila; Shish Ahmad
Determination of the figuring strategy is vital on the grounds that the security concerns are secured by the cryptography. Sensor nodes have exceptionally restricted computational and memory abilities, so all the cryptographic procedures cannot be just applied to the WSNs. To fulfill the above security necessities requirements the current figuring systems are be altered alongside consideration of created novel directing methods. In this work security strategies are found in WSNs that can meet the transmission rate prerequisites of sensor hubs and the assessment are seen by code size, information size, handling time, and steering deferral utilization. In light of the RSA and RC4 figuring cryptographic strategies, we have thought about them as far as information size, number of system hubs and hub dissemination. Read More...
|
Computer Science |
India |
344-347 |
88 |
Two Factor Authentication using smart phone in internet banking
-Rohit S. Jadhav ; Vinayak K. Gandhi; Rohit S. Jadhav; Chetan C. Mane; Mangesh K. Gosavi
Two factor authentications in internet banking system describes a method of implementing connectionless two factor authentication using mobile phones in the field of Internet Banking. The proposed method guarantees that authenticating to services, such as online banking transactions is done in a very secure manner. The proposed system involves using mobile phones a token for One Time Password generation (OTP). The generated One Time Password is valid for only a short user defined period of time and is generated by specific algorithms like TOTP and verified using Secured Cryptographic Algorithm. Additionally, an SMS-based mechanism and tracking user behavior method is implemented as there is large area of concern in security. In this system implementation we have also focused on the security which is provided to the user during the online banking transactions. Thus the proposed system is also adding the extra layer of security at the point where you enter information online. The service helps to prevent unauthorized access to users account before it happens by confirming your identity by providing additional security messages. Read More...
|
Computer Engineering |
India |
348-351 |
89 |
An Optimized Technique for Digital Forensic Investigation
-ESAN P. PANCHAL ; Dr. B.K. Sharma
Several digital forensic investigation techniques are available in market. Digital forensic investigators use these techniques to solve digital crime. They use different forensic tools and techniques to find suspicious computer. Different digital forensic tools have their limitations. Therefore, Digital forensic investigators have to work with these limitations. Even increased digital data is a biggest challenge for investigators. Thus, traditional digital forensic investigation techniques waste resources to solve digital crime. Thus, there is a need of a technique which saves resources of digital forensic investigator. Read More...
|
Computer Engineering |
India |
352-354 |
90 |
Fatigue Behaviour of Cement Concrete Pavement under Single and Tandem Axle Load Using F.E.M
-Shri S.S GOLIYA ; Dr K.K PATHAK; Dr Y.P JOSHI; Miss TANU CHATURVEDI
Fatigue is the important aspect in the rigid pavement design. Due to applications of the heavy loads fatigue occurs in the pavement in the form of micro cracks. fatigue concepts which is an important parameter in cement concrete pavement and mainly failure occurs due to fatigue failure. Therefore study has been done in order to study the fatigue concepts. In this paper fatigue behaviour of CC pavement has been assessed using finite element method. Stress analysis for single and tandem axles have been carried out. Based on the IRC recommendation, allowable repetitions are calculated. Read More...
|
Civil Engineering |
India |
355-361 |
91 |
Dynamic Analysis of Plan Asymmetric Moment Resisting Frame Considering Soil Structure Interaction
-Patel Krishna Kiranbhai ; Prof. Hemal J. Shah
This paper aims towards the linear dynamic analysis of asymmetric reinforced concrete building considering the effect of soil–structure interaction. Asymmetry in structure can produce a torsional response coupled with translational response during earthquakes. Torsional behavior of structure includes using the design eccentricities. In this paper G+ 8 R.C. moment resisting frame with ‘L’ shape are analyze by Response Spectrum Analysis (with and without considering design eccentricity) and Linear Time History Analysis (with IS code compatible time histories). The analysis and design is carried out as per IS 456:2000, IS 1893(Part-1): 2002 and IS 13920:1993. The supports are modeled as fixed, hinged and effect of SSI is accounted by Winkler’s approach computed in accordance with the soil sub-grade modulus (ð¾ð‘ ) and equivalent spring stiffness according to FEMA-356. Cohesion-less (Ø) soil with medium type is considered. Soil bearing capacity is considered 300kN/m2. Whole analysis is carried out using STAAD.ProV8i SS5. This study reveals that, consideration of design eccentricity and soil structure interaction in seismic analysis has great impact on response of structure. Read More...
|
Structural Engineering |
India |
362-367 |
92 |
Energy efficient scheme based on low energy adaptive clustering hierarchical protocol for wireless sensor network
-Goswami Heena K
Energy is the key concern area in Wireless Sensor Networks due to lack of power source, maximum energy is used in transmission of data. This paper proposes a new routing approach based on hierarchical routing protocol LEACH where clusters are refreshed periodically based on remaining energy and distance. We propose that the network area in Q-LEACH protocol on the basis of dividing whole network into four quadrants and each quadrant performs individually. In LEACH-E protocol, all nodes have same energy and same probability of suitable the cluster head. After the first round, energy level of each node changes and then the amount of residual energy of each node is used to select cluster head nodes. The nodes with highest residual energy are chosen on rest of the nodes. In this protocol, cluster head (CH) selection is based on the highest energy by the base station. Read More...
|
Computer Engineering |
India |
368-372 |
93 |
A Review: Design of Dental Implant Abutment by CAD and FEM Analysis
-Md Maroof Md Nayeem ; Adnan Iqbal Shaikh; Ashfaq Jamkhandikar; Akib Nisar Dakhwe; Salman Jamadar
The purpose of this article is to provide a review of the achievements and advancements in dental technology brought about by computer-aided design and the all-powerful finite element method of analysis. Failures of implant–abutment connections are relatively frequent clinical problems. So there is a need of analysis of dental implant abutment. For that research has been done on the existing design with its limitation. Screw loosening is considered to be a common problem with both screw-retained and cemented implant restorations.1 several complications may arise as a result of loose retaining or abutment screws. Loose screws are more apt to fracture under load, leading to long-term prosthesis complications. This paper focuses on Analysis and techniques used for optimization of Dental Implant. Read More...
|
Mechanical Engineering |
India |
376-378 |
94 |
Influence of Short Glass Fibers on the Mechanical Performance of PA66/PA6 blend Composites for High strength tribo Applications
-Shaik Zabee Ullas ; B Ravindra
the polymer blend of Polyamide66 and Polyamide6 (PA66/PA6) (80wt. %/20wt. %) were selected for the study. These blends were reinforced with 10,20 and 30wt. % of silane treated short glass fibers( SGF) and these composites were prepared by using melt mixing method with the help of twin screw extruder. The mechanical properties such as tensile strength, flexural strength, impact strength were studied in addition to hardness of the blend composites as per ASTM. The results revealed that the addition of SGF into PA66/PA6 blend enhanced the mechanical properties of the polymer blend. Low loading of SGF into the blend experienced deterioration in tensile and flexural strength. But the higher loading of SGF into the blend increased the strength of the composite remarkably. The density of PA66/PA6 blend increased after the SGF addition. The impact strength of the studied composites was appreciable after higher loading of SGF into the blend. The decreasing trend was due to the immiscible nature of PA66 and PA6 phases due to different structural geometry in the polymer chain. However, the effect of higher loading of SGF into the blend on the mechanical behavior is greatly appreciable. Read More...
|
Mechanical Engineering |
India |
379-383 |
95 |
Simulation study of wormhole attack in ns3
-Mohseen Reeyaz Mukaddam ; Sanket Dige; Aditya Supugude; Akash Varude; Vikas Sangle
The ubiquity and ease of operation have made wireless networks extremely popular. The Downfall of such popularity is the increased attacks on Mobile Ad-hoc Networks (MANET). The attack studied in this paper is wormhole attack. The choice of attack was based on the difficulty in identifying and mitigating the attack in real life scenarios. We used AODV protocol for the simulation; the most popular routing protocol used for small-scale networks. Wormhole attack is a potential threat to MANETs; it involves using a two-node system to route packets through a ‘tunnel’ created by the nodes. The attack enables the attacker to manipulate packet traffic, while making it difficult for an Intrusion Detection System (IDS) to detect. Read More...
|
Computer Science |
India |
384-387 |
96 |
Performance Enhancement of Solar Still by Modified Design and Different Techniques: A Review
-PREM SHANKAR ; RAGHVENDRA SHARMA; BHUPENDRA GUPTA
Solar energy is a kind of renewable energy available in abundant quantity on our planet. Portable water availability for mankind is the matter of concern in this era. Purification of water using solar energy is getting popularity day by day. It is method in which one can obtain fresh water from saline as well as polluted water without any running cost. In this paper various methods applied for desalination are reviewed. Various modifications applied in solar still for performance enhancement are discussed in this paper. Read More...
|
Mechanical Engineering |
India |
388-391 |
97 |
Meta Data as a Part of Digital Forensic Investigation
-Premal C. Patel ; Dr. B.K. Sharma
Digital forensic Investigation is a big challenge in current Era. Mostly digital forensic process is associated with their proprietary tools and techniques. All tools collect digital information from system as per their pre-define commands and processes. Finding the evidence from all collected information is a challenge for investigator. This paper describes the role of metadata in digital forensic investigation. The Meta Data can be useful to minimize time and storage in the digital forensic investigation process. Role of Meta Data in investigation is important to identify the suspicious System. Read More...
|
Computer Science |
India |
392-394 |
98 |
A survey on Web based notification management system with android application
-Lalit S. Jadhav ; Lalit S. Jadhav; Sanket S. Jagushte; Tejas R. Mhade; Mangesh K. Gosavi
In recent years the Android Technology with web-services has brought many drastic changes in mobile application development field. The management of accurate and up-to-date information regarding a student’s academic career is difficult and time consuming task for the schools. Now-a-days the information to parents regarding their ward is provided through post cards, SMS or Email, but these techniques are very much hectic time inefficient and lengthy. Hence this application provides a solution through a simple interface for maintenance of student information. This application provides a generalized solution to monitor the various works that are carried out by a school for managing it. It helps parents to get detailed information regarding to their ward such as attendance, fees due, result, progress report, important notices, school’s event details, information about teachers etc. using the android application. It also contains query message option for parents so that parents can interact with the college faculty through this application. It also facilitate parents to gain all the notifications about the activities held in the college. Also SMS based mechanism is implemented to send notifications for those parents who don’t have an android mobile. Each individual parent will be get the details of his/her ward only. Read More...
|
Computer Engineering |
India |
395-397 |
99 |
Analysis of multi storey building with floating column at various locations
-Priyanka Kumari ; Dr. Mrs. N R Dhamge
The infrastructural boom during last decade as resulted in construction of many high rise structures in all mega cities Due to the existence of architect and structural designer have provided floating column in many location in structure. The building become vulnerable to earthquake hazard due to improper way of flow of earthquake force to ground due to discontinuity in the form of floating column brought into structure floating column provided at some location such as balcony result in close loop and redistribution of moment and forces may prove to be beneficial in restricting dimension of beam and column it may also hell in achieving in desire economy. The present paper deals with comparison of axial forces, shear forces, moment, torsion and displacement in selected few columns & beams in the structure with or without floating column in four zones through different graphs the comparison is explain in the paper. Read More...
|
Civil Engineering |
India |
398-401 |
100 |
IDENTIFICATION OF POTENTIAL HABITAT AND THE THREAT FOR WETLAND BIRDS IN VEDANTHANGAL
-Ms.R.Iswariyalakshmi
The Remote Sensing and GIS plays a vital role to investigate wildlife and its habitat. Wetland is the most prominent place for bird habitats and for their breeding, nesting, and rearing young. Also it’s a source for drinking water, feeding, resting, shelter, and social interactions. Vedanthangal wetland acts as a feeding site for many migratory and resident bird species. The rapid encroachment and changes in the wetland surroundings, pose a great threat to the birds that come to the wetland for feeding. It is essential to analyze the level of potentiality to the birds, to find the threats and to study the influences of bird occurrence. Therefore, this study involves to prepare a map showing the potential feeding sites for the wetland birds and also to provide detailed spatial information showing the levels of threat. In the total study area of 158.44 sq.km, it is found that 27.67% of area is potential as feeding site for birds and 10.48% of the area is under threat. Thereby, action plan maps are prepared which could aid in the conservation of wetland for the sustainable feeding site for the birds. This study enhances the innovative ideas to apply for large area extent and for the sustainability of birds. Read More...
|
Civil Engineering |
India |
402-406 |