No. |
Title and Author |
Area |
Country |
Page |
101 |
Agilimation (Agile Automation) - State of Art from Agility to Automation
-Sivananda Reddy Elicherla ; Dr. P E Sreenivasa Reddy; Dr. V Raghunatha Reddy; Sivaprasada Reddy Peddareddigari
In this journal, we are going to provide an insight into the basics around agile test automation which will help team(s) to explore and devise the automation strategy according to their project needs. Also what is important in order to take successful flight from “agility to automation?†Why do we automate testing, the build process, deployment, and other tasks? Agile teams always focus on working software which enables them to release production-ready software as frequently as needed. Achieving this goal requires constant testing. Test automation is a core agile practice and agile projects depend on automation. Good-enough automation frees the team to deliver high-quality code frequently. It provides a framework that lets the team maximize its velocity while maintaining a high standard. More over automation helps to control the Source code, automate the builds, test suites, deployment, and monitoring. Read More...
|
Information Technology |
India |
411-416 |
102 |
Power Factor Improvement for Three phase Induction motor using PSoC 3 (Programmable System on Chip)
-Ms. P. A. Devanpalli ; Prof. S. B. Jamge
This paper describes the power factor improvement of 3-phase induction motor, as improvement of power factor is necessary for industries & to make power factor as close as unity without facing penalty from electrical distributers. Induction motors are the most widely used electrical motors due to their reliability, low cost and robustness. For industrial and mining applications, 3-phase AC induction motors are the prime movers for the vast majority of machines. At no load induction motor has very low power factor. It improves at increasing load from no load to full load. Power factor improvement is achieved by using proper algorithm with sufficient capacitors are switched on in order to compensate the reactive power. The circuit in this design has been implemented and tested in the laboratory. Read More...
|
Electronics Engineering |
India |
417-420 |
103 |
Laser Induced Oxidation of Free Base Mesoporphyrin-Ix Dimethyl Ester Probed by Resonance Raman Technique
-H.H. Thanga ; J. Lalnunthari
Radicals of porphyrins and their metal derivatives serve as transient intermediates in a variety of biological redox processes. As a result there has been great interest in the preparation and characterization of the oxidized/reduced species of porphyrin complexes. The present work reports photochemical generation and resonance Raman characterization of free base mesoporphyrin- IX dimethyl ester (H2MP) ï°-cation radical in benzene under selective laser irradiation at 441.6 nm in the presence of CCl4 as electron acceptor. At low concentration of CCl4 (20% v/v), both one- and two-electron oxidation products, viz (H2MP) •+ radical and (H4MP)+2 diacid can be seen simultaneously from the RR spectrum. Higher concentration of the electron acceptor favours the formation of diacid (H4MP)+2. A reaction mechanism for the photo-oxidation process is proposed. Read More...
|
chemistry |
India |
421-422 |
104 |
Miniaturization and Performance Enhancement of Multiband Microstrip Patch Antenna Using Metamaterial
-Ramagowri L ; Agnes Ramena T; Subhu Lakshmi P
This paper proposes metamaterial based multiband microstrip patch antenna. Here the metamaterial is added on top and double sides of rectangular patch antenna. The proposed antenna is fed through microstrip line. This antenna designing method and feeding technique allow the antenna to operate at multiple frequency bands with the range of 6 GHz to 12GHz (X band). Using metamaterial on rectangular patch improves the antenna performance and reduces the antenna size. The proposed antenna design gives better results than the conventional antenna design. Then the antenna parameters are obtained by Advanced Design System software (ADS). Read More...
|
Electronics & Communication Engineering |
India |
423-427 |
105 |
Investigation of Shell & Tube Heat Exchanger Performance for Plastic Injection Molding Machine By Using RSM
-Sachin Kiritkumar Patel ; A.R.Patel
In present research The shell and tube heat exchanger is widely used in industries as a chillers plant for transfer waste heat from the injection molding machine to the cooling water from improve the effectiveness of the injection molding machine. To increase the heat exchanger capacity of heat exchanger is invite the optimization problem which seeks to identify the best parameter combination of heat exchangers There are various heat exchanger performance parameters like tube diameter, mass flow rate, pitch length, longitudinal pitch, tube material, shell material, types of baffles, baffles angles etc. here to improve its effectiveness, heat exchanger parameters done successfully using response surface method with multiple linear regression method along with cubic model has find significant with square root transformation. RSM has proven to be a major tool in discovering, which parameters and interactions are significant to improve the effectiveness of shell and tube heat exchanger. Read More...
|
Mechanical Engineering |
India |
428-433 |
106 |
Experimental Investigation On Partial Replacement Of Natural Fine Aggregate By Steel Slag And Natural Coarse Aggregate By Waste Limestone Aggregate In Cement Concrete
-Md Zeeshan ; Prof. Rohan S Gurav; Prof. Brij Bhushan S; Prof. Maneeth P D
Cement concrete is a versatile building construction material in civil engineering and it is also one of the world’s most extensively used construction material around the world in almost all construction projects and in many construction applications. Construction activities and projects are increasing around the world which has resulted into the excessive extraction and utilization of naturally available materials like natural river sand, stones and rocks, lime, clay, water etc. Currently the problems faced by the use of cement concrete includes high demand of cement concrete, cost of cement and concrete making materials, pollution, excessive extraction and utilization of natural river sand and stones, water etc. Because the sand is being extensively extracted from the river bed deposits, it is depleting at a faster rate. Hence it is necessary to find an alternative material such as industrial waste slag and waste pieces of stones from the stone quarries in the cement concrete production. This dissertation work deals with the study of partial replacement of natural fine aggregate by steel slag and natural coarse aggregate by waste limestone aggregate in M20 grade of cement concrete. Steel slag is a waste by-product obtained from the iron and steel plants and waste limestone aggregates are the waste broken pieces of limestone obtained from the limestone quarries. In this work, we have made an attempt to study the compressive, split tensile and flexural strength of M20 grade cement concrete by using steel slag and waste limestone aggregate as partial replacement to fine aggregates and coarse aggregates. The compressive strength test is studied for 7 and 28 days of curing period and the split tensile and flexural strength is studied for 28 days of curing period. Read More...
|
Civil Engineering |
India |
434-439 |
107 |
Characterization and Antimicrobial Study of Cobalt Nanoparticles Synthesized FROM MANIHOT ESCULENT(TAPIOCA) by Green Route
-Dr.S.Mary Helen ; Sr.HebziEmalda Rani
In the present study Cobalt nanoparticles (CoNPs) are synthesized by green technique using aqueous tuber extract of Manihot esculent (Tapioca) as a reducing, stabilizing and capping agent. The synthesized CoNPs are characterized by UV-VIS, XRD, and SEM with EDAX. Cobalt nanoparticles were confirmed by UV-Visible studies. The EDAX pattern shows the 3.96% weight percentage of Cobalt present in the synthesized sample and XRD studies shows that the particles are mostly crystalline in nature. Further these biologically synthesized nanoparticles were found to be highly toxic against different multi drug resistant bacteria pathogens. This is the first report on the synthesis of CoNPs from tuber extract of Manihot esculent was used for synthesis of CoNPs and its antimicrobial studies. Read More...
|
Biotechnology |
India |
440-442 |
108 |
Fabrication And Characterization Of Alkali Treated Fiber Reinforced Bio Composites
-Vamshi Pradyumna Kummari ; V.Devender
Recently, immense interest was paid to new technologies dealing with environmental aspect. Upholding of natural resources such as natural fibres, resins, and composites lead the upcoming manufacturing industry to search and scrutinize ecofriendly materials. The use of composites in manufacturing equipment and products is taking a very important space in the industry. In general these materials have unique characteristics when analyzed separately from constituents which are part of them. However it is known that care must been taken in their manufacturing as the use of appropriate process and the composition of each element, in addition to the adherence of fiber, which is a major factor in obtaining the final mechanical strength of the product one should also take into account whether the composites are environmental friendly. For this reason, the paper focus on manufacturing a bio composite fiber, using natural fibres as strand (cotton fibres, flax fibres and raw flax) which is a hybrid form of reinforcement in the soya resin phase to form a composite, seeking to improve the mechanical behaviour among its class of materials. Read More...
|
Mechanical Engineering |
India |
443-446 |
109 |
A Study of Various Information Hiding Techniques and Their Importance
-Sajid Parvez Ansari
The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, many different data hiding techniques have been developed. This paper intends to offer a state of the art overview of the different algorithms used for information hiding. Different information hiding techniques focus on a variety of requirements such as robustness, tamper resistance, imperceptibility, security and Capacity. In this paper, we study about various information hiding techniques and discuss about their importance in order to enhance security of data communication. Information hiding plays a very crucial role today. It provided methods for encrypting the information so that it becomes unreadable for any unintended user. Read More...
|
Electronics & Communication Engineering |
India |
447-450 |
110 |
A Survey on Power Aware Routing Protocol for Wireless Sensor Networks
-M.Raja Priya ; J.Mala
Wireless sensor networks have various applications in both military areas and resident. It recently received great attention from both industry and academic world. In particular, sensor nodes in the sensor network are usually battery-powered and very energy-constrained. So the main challenge of this sensor network is energy efficiency. Sensor networks are deployed in cruel physical environments where it is very difficult to replace the individual nodes or their batteries. Therefore, the maintenance of the consumed energy plays an important role in the design of a new routing protocol in order to increase the durability of the network. Thus energy-saving power aware routing protocol in wireless sensor networks is necessary for growing the network lifetime. In this paper, analysis of different power aware routing algorithms has been added. Read More...
|
Computer Engineering |
India |
451-454 |
111 |
Development of Paparazzi Autopilot System for UAV: A hardware approach
-Anil M Vanjare ; Omkar S N; Chetan Kumar V; Shashi Kumar R; Samuel Gerald
This work presents a comprehensive study of the different autopilot systems for small UAV's (fixed wing & multi rotor). The goal of this work is to provide a brief idea of the commercial available, open source, and research grade autopilot systems for convenient use for researcher purpose and for UAV users. And compared with sensor interfacing compatibility and auto takeoff/landing. The different autopilot systems (flight control board) are introduced first. Secondly, the radio control system, components used, types of PCB and GUI are explained. Programming part are then explained in brief from both the hardware and software testing/ configuration. Read More...
|
Aerospace Engineering |
India |
455-461 |
112 |
A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Hadoop
-Shalin Elizabeth S ; Sarju. S; Anu Kunjumon; Anu Maria Sebastian; Shamily Shaji
Bigdata privacy preservation is one of the most disturbed issues on the current industry. Data privacy issues need to be addressed urgently before data sets are shared on cloud. Data anonymization refers to as hiding complex data for owners of data records. In this paper investigate the problem of big data anonymization for privacy preservation from the perspectives of scalability and time factor etc. At present, the scale of data in many cloud applications increases tremendously in accordance with the big data trend. Here propose a scalable Two Phase Top-Down Specialization (TPTDS) approach to anonymize large-scale data sets using the MapReduce framework on cloud. For the data anonymization-45,222 records of adults information with 15 attribute values was taken as the input big data. With the help of multidimensional anonymization on map reducing framework, here implemented the proposed Two-Phase Top-Down Specialization anonymization algorithm on hadoop will increases the efficiency of the big data processing system. In both phases of the approach, deliberately design multidientional MapReduce jobs to concretely accomplish the specialization computation in a highly scalable way. Data sets are generalized in a top-down manner and the better result was shown in multidmientional MapReduce framework by compairing the onedimentional MapReduce framework anonymization job. The anonymization was performed with specialization operation on the taxonomy tree. The experiment demonstrates that the solutions can significantly improve the scalability and efficiency of big data privacy preservation compared to existing approaches. This work has great applications to both public and private sectors that share information to the society. Read More...
|
Computer Engineering |
India |
462-466 |
113 |
Rebroadcast Routing Technique for Reducing Overhead based on Neighbor Coverage in Mobile Ad Hoc Networks (MANET)
-S Ezhilin Freeda ; T.C.Ezhil Selvan; M.Marimuthu; P.Malathi
Mobile Adhoc Network (MANET) is a self-contributed dynamic network comprising of mobile nodes. MANET faces number of challenges in routing, security and packet transmission. rebroadcast routing techniques for dropping overhead based on neighbor coverage in Mobile Ad-hoc Networks [1]. In MANET, a wireless node can be the source, the target, or a middle node of data transmission. Once a wireless node shows the role of middle node, it functions as a router that can accept and onward data packets to its neighbor nearer to the target node. A probabilistic rebroadcast protocol is based on neighbor coverage to decrease the routing overhead in MANETs. This neighbor coverage understanding includes further coverage ratio and connectivity feature. We projected a new scheme to dynamically analyze the rebroadcast delay, which is used to adjust the forwarding order and more efficiently exploit the neighbor coverage knowledge. Read More...
|
Computer Science |
India |
467-470 |
114 |
Thermal analysis of automobile piston made of aluminium alloy
-N. Gopikrishna ; B. Venkateshwarlu ; Manoj; CH. Sushanth
The power can be generated in the combustion chamber of an automobile. The combustion chamber is the place where the charge burns in. The charge i.e. air and fuel at various proportions depending upon the accelerations made is sent through carburettor which is compressed inside the combustion chamber with to and fro moments of piston within the top and bottom dead centres. After the combustion, the burnt charge exerts a lot of force on the piston. The piston plays various roles in compressing the charge and in transferring the produced power to the crankshaft. During this process, always the piston is in contact with the charge. The burnt charge has temperature about 12000C. The heat flows into the piston. So the piston should have sufficient mechanical strength to with stand the force acting by the explosion and the piston should be thermally stable to with stand the heat flow into the piston. The piston is cooled by providing cooling fins external to the surface of Combustion Chamber. In this paper the thermal analysis of the piston is done by modelling the piston with aluminium alloy. The thermal analysis was analysed using software ANSYS. It is found that, the aluminium alloy piston is having the sufficient thermal stability to with stand the high temperatures. Read More...
|
Mechanical Engineering |
India |
471-475 |
115 |
An Approach to Predict Soil Nutrients and Efficient Irrigation for Agriculture with Spatial Data Mining
-SHAHEBAZ AHMED KHAN ; V.SATYANARAYANA; B. VENUGOPAL
Availability of water plays an important role in agriculture. Any type of crop that has to be grown with fine quality and good output depends on fertility of the soil. There have been some techniques like k-means, SVM etc. and other procedure to test the fertility of the soil of which some are not accurate and some are meant with high cost requirements. Data mining has attracted almost all the fields in the world even agriculture, many applications of data mining techniques are utilized by this sector .In this paper, to extract the soil properties, making soil attributes into consideration data mining methodologies and techniques are applied so that the soil type and characteristics can be known suitable for the crop cultivation. Here, the major concept is to predict the water percentage for irrigation in the soil for agricultural productivities by using spatio temporal data mining methods. Read More...
|
Computer Science |
India |
476-478 |
116 |
Fabrication and Performance Optimization of Parabolic Trough
-Ankur Garg ; Kuldeep Singh
This paper was concerned with an experimental study of parabolic trough collector designed and manufactured. A parabolic trough solar collector uses three reflecting material stainless steel, aluminum foil and mirror glass strips affix on cloth in the shape of a parabolic cylinder to reflect and concentrate sun radiations towards an absorber tube located at the focus line of the parabolic cylinder. The receiver absorbs the incoming radiations and transforms them into thermal energy, the latter being transported and collected by a fluid medium circulating within the absorber tube. To improve performance and reduce costs direct steam generation in the collector has been proposed. The Designing and Fabrication of parabolic trough solar water heater for water heating was executed, the procedure employed includes design, construction and testing stages. The model which is made up of reflector surface, reflector support, absorber pipe and a stand with manual tracking arrangement was fabricated using locally sourced material for rural applications point of view. In this paper the efficiency of parabolic trough collectors is compared on the basis of different reflecting surfaces (current SEGS plants). The model is based on absorber fluid temperature so it can be used to predict the performance of the collector with any working fluid. We determined the performance of PTSC on the basis of different reflecting surfaces. Read More...
|
Mechanical Engineering |
India |
479-482 |
117 |
Frequent Pattern Mining Approaches with Transactional and Impact Matrix Based Probabilistic Model for Privacy Preserved Data Mining
-P.Vijayakumar ; p.vijayakumar
The business organization maintains much information about their customers which has personal details of customers also. Every organization has the responsibility to keep the secret information or personal information of their customer and cannot disclose them to others. Similarly the transactional data sets are the collection of records which contains information about the purchase pattern of their customers. The organizations use the purchase history or transactional log to generate business intelligence which could be used to make business decisions. Read More...
|
Computer Science |
India |
483-486 |
118 |
Mechanisms of Effect of Arjunolic Acid on Cyclosporine A Induced Renal Tubular Cell Apoptosis
-Dr.P.Vasanthi ; Dr.C.S.Parameswari
Apoptosis is an important pathogenic mechanism in renal diseases, during development and injury. Lethally injured cells may die by either necrosis or apoptosis, depending on the severity of the injury. Severe renal ischemia results in acute tubular necrosis, chronic low grade ischemia leads to apoptosis in renal tubular cells. Cyclosporine-induced apoptotic cell death is closely associated with activation of proapoptotic genes and altered regulation of apoptosis-regulating genes. Cyclosporine A (CsA) has considerably modified the graft survival in solid organ and bone marrow transplantation. Renal toxicity is the major adverse effect of chronic CsA administration. Deterioration of renal function and renal histopathology are the basic elements of the diagnosis. In the present study, the lethal pathways activated by cyclosporine A (CsA), a nephrotoxin that induces caspase-dependent apoptosis in tubular epithelium, were explored. The Tubular cell apoptosis is the major contributing factor to the pathogenesis of renal injury. The understanding of the CsA renal effects is not only a research interest, but also clinically important in developing a strategy in the prevention and treatment of the disease. In this contribution, we will discuss this effect and its significance for the mechanism of action of Bax, cytochrome c, caspase-3 in renal tubular cells, an important checkpoint of the apoptotic process. Read More...
|
SCIENCE |
India |
487-491 |
119 |
A Review on Bitcoin With its Pros and Cons
-Mani Butwall ; Pradhumn Soni
Designed to compete with fiat currencies, bitcoin proposes it is a crypto-currency alternative. Bitcoin has enjoyed wider adoption than any previous cryptocurrency, yet its success also attracted the attention of fraudsters who taken advantage of operational insecurity and operational irreversibility. The main aim of this study is to examine the potentially disestablishing effects of emerging digital currencies specially “Bitcoin†a decentralized partially anonymous and largely unregulated particular popular in last few years. The security aspect of the Bitcoin is the major area of research. This currency may be vulnerable during the transactions or it can be also attacked on its online storage pools or exchanges. Read More...
|
Computer Science |
India |
492-494 |
120 |
Fuzzy Logic Based Scheduling of Flexible Manufacturing System
-Manvendra Pratap Mall ; Dr. S. C. jayswal
Flexible manufacturing systems (FMS) are production systems consisting of identical multipurpose numerically controlled machines (workstations), automated material handling system, tools and load and unload stations, inspection stations, storage areas and a hierarchical control system. The latter has the task of coordinating and integrating all the components of the whole system for automatic operations. The basic problem in FMS operations is scheduling of jobs on the different machines. This problem can be solved through various approaches. One of the techniques is fuzzy logic. This technique answers a problem in a probabilistic way by values ranging between 0 and 1.in my problem, I have taken two priority conditions-job priority and route priority and the scheduling has been done accordingly. The results are compared with shortest processing time and more time is consumed using shortest processing time technique. This shows that fuzzy scheduler can be used as one of the powerful tool in FMS scheduling problem. Read More...
|
Manufacturing Engineering |
India |
495-498 |
121 |
Water quality assessment around Rajkot city, Gujarat, India
-Ekhalak Ansari ; Chirag Narigara
The ground water, sewage water and sea water from Rajkot and Saurashtra region has been studied. The various constituents monitored include the physico-chemical characters like color, odor, turbidity, pH, calcium, magnesium, bio-chemical oxygen demand and microbial parameters like MPN were analyzed. Introduction of sewage into the ground water was the main reason for the microbial contamination. The boiling of water is therefore advisable before consumption. The physico-chemical and microbial characters of the sewage water were unworthy. The sewage water recycling is necessary to minimize the water born diseases. Read More...
|
Natural Sciences |
India |
499-500 |
122 |
Optimization of Suspension System to Minimize Tire Dynamic Force
-Kuldeep.K.Jagtap ; Dr.Dhananjay.R.Dolas; M. P. Nagarkar
Suspension system has to perform complexity requirements, which includes road holding and equality, driving pleasure, riding comfort to occupant. Riding pleasure depends on vertical acceleration, with main objective to minimize vertical acceleration. The force transmitted by the deflection of tires to the unsprung mass is known as the Tire-Dynamic Force (TDF). The force should be considered while designing the suspension system. The TDF can cause vehicle instability and increase in the sprung mass acceleration. The objective of this research work is to minimize the TDF by optimum suspension design so that minimum vertical accelerations would be experienced by the passengers. To minimize the vertical acceleration, mathematical model of 2-DOF Quarter car model is considered for passive suspension system. Its equation of motion is formed with correlating objective function. Thus having objective function to, minimum weighted root mean square accelerations as per ISO 2631, viz. formulated for optimization. spring stiffness and damping coefficient are used as variables during optimization. The Genetic Algorithm is implemented as optimization tool with above mentioned objective function. The optimization results obtained were simulated and are compared with classical values. It is observed that the Seat acceleration, using optimized values, is reduced by 8.76% compared to the classical values. From experimental validation main objective function of Tire dynamic force value reduced from 2300 N to 2100 N, it is decreased by 8.69 % and Seat acceleration reduced from 34.9176 m/s2 to 32.0121 m/s2 after replacing the conventional by optimized strut. Thus provides improved ride comfort to occupant/driver. Read More...
|
Mechanical Engineering |
India |
501-504 |
123 |
An Implication of Fatigue Concept on Design of Cement Concrete Pavement and Its Critical Comparison with Other Methods
-Shri S.S GOLIYA ; Dr K.K PATHAK; Dr Y.P JOSHI; Miss TANU CHATURVEDI
Fatigue is the important aspect in the rigid pavement design. Due to applications of the heavy loads fatigue occurs in the pavement in the form of micro cracks. This research “An Implication of Fatigue Concept on Design of Cement Concrete Pavement and Its Critical Comparison with Other Methods†gives the concept of involvement of fatigue concepts which is an important parameter in cement concrete pavement and mainly failure occurs due to fatigue failure. therefore study has been done in order to study the fatigue concepts. IRC method of design shall be compared with Portland Cement Association (PCA), American Association of State Highway and Transportation Officials (AASHTO) and other available methods. The effect of the over loading of the truck on pavement design shall be analyzed .Temperature related stresses in designing the rigid pavement are important parameter. Therefore day & night temperature difference shall be work out. Best design method is being evolved and a significance of fatigue concept is consequence Concrete pavements fail in field due to improper design. Proper method of design shall be proposed to achieve higher life and economy in long run. Early failure of pavement is observed in field due to poor design, which is a great loss to society and big inconvenience to road user. Such situation shall be avoided through proper design of road based on the research work. Read More...
|
Civil Engineering |
India |
505-510 |
124 |
Privacy for Key Exchange and Authentication Process using Grid
-Babar Khalid ; Shoaib Farooqui; Rajesh Nair; Prof. Priyanka Kedar
The twenty first century is occupied with many new devices and modernizations. At first glance, our society may seem to be somewhat progressive. However, looks can be deceiving .In reality we are only at the forefront at what is in store for the near future. With the passing of every day, we may not know it, but our lives are becoming more and more digitized. A completely paperless society is on the horizon. As the digital world guides itself in it will become important for one is protect person’s identity and from them those prowling in the distance. In this paper, we proposed a safe zone for users which provide security to user’s confidential data. In this proposed system we provide secure authentication and security to data transmission over internet. Read More...
|
Computer Engineering |
India |
511-513 |
125 |
A Review on Denial of Service and Gray hole Attack in MANET
-Reena Rajpoot ; Krishna K Joshi (Associate Prof.)
Security is one of a crucial and noteworthy matter while implementing Mobile Ad Hoc Networks. Because of its distinctive character, namely dynamic topology, restricted bandwidth and restricted battery power creates both challenges and opportunities for gaining security requirements namely confidentiality, authenticity, integrity, availability and non-repudiation. A range of attacks affect the working of different layers in ad hoc networks. Denial of Service is a sort of harmful attack exhibiting in numerous forms across different layers of protocol stack. This paper provides a survey on DoS attacks and gray hole attack in MANET. Read More...
|
Computer Engineering |
India |
514-518 |
126 |
Comparative analysis of image compression techniques
-Dixita Mehta ; Richa Mehta
Image Compression is a wide area. Compression of Images increasing because the raw images need large amounts of disk space seems to be a big disadvantage during transmission & storage. Even though there are so many compression technique already present a better technique which is faster, memory efficient and simple surely suit the requirements of the user. The work is to explain use of different compression techniques more suitable for particular data compression algorithm based on compression ratio, Bit per Pixel, Mean Square Error and Peak Signal to Noise Ratio. Using all four parameters image compression works and gives compressed image as an output. Read More...
|
Computer Science |
India |
519-522 |
127 |
Improving Efficiency and Extending Battery Life by Offloading Mobile Computation to Cloud
-A.Josephine Suganya ; Dr.M.Manimekalai; J.Sengottuvelu
Mobile cloud computing is fast taking over the world by storm as the spread of smart phones soar and have become the primary replacement for desktop for many users. Various studies have identified longer battery lifetime as the most desired feature of such systems. Computing resources such as processing, memory, and storage are not physically pres¬ent at the user’s location. But in case of smart phones processing virtually reduces the battery life of the phone and also heats up the device. The cloud heralds a new era of computing where numerous application services are provided which enhances the capability of mobile devices but the major problem faced is the rapid energy depletion in the batteries. The focus is to provide a solution for extending the mobile battery lifetimes. Cloud provides application services through internet. Thus mobile cloud can enhance and extend the capability of mobile systems processing power. A cloud service provider owns and manages these resources, and users access them via the Internet. The primary constraints for mobile computing are limited energy and wireless bandwidth wherein vendors provide computing cycles to do such tasks by the devices applications installed on the cloud platform and thereby reduce computation on mobile devices and thus save battery energy. Thus, cloud computing can save energy for mobile users through computation offloading. By using mobile cloud computing platforms energy savings in mobile devices will be a reality. The study focuses on the process of mobile computation offloading to the cloud thereby extending battery life, reducing memory and cpu usage thus saving valuable resources. Read More...
|
Computer Engineering |
India |
523-525 |
128 |
Low Power Pulse Triggered Flip Flop using Conditional Pulse Enhancement and Signal Feed through Scheme
-Amita ; Sunaina Singroha
A Low Power Pulse Triggered Flip Flop using Conditional Pulse Enhancement and Signal Feed through Scheme is presented in this paper. Proposed flip flop is used two techniques in combined form with three new modifications. Firstly, clock pulse generator is modified with better pulse enhancement scheme. Second, power supply connection is cutoff during discharging operation. And third, no. of transistors are reduced by removing some unnecessary transistors at intermediate and output nodes. So, proposed flip flop has improved performance in term of power, delay and area. Tanner EDA tool is used in the simulation of 90nm process technology at 500MHz clock frequency. Proposed flip flop has the minimum power delay product than conventional flip flops [3], [4]. Read More...
|
Electronics & Communication Engineering |
India |
526-528 |
129 |
Super Sensitive Intruder Alarm
-Gowtham.S ; Santhosh Kumar.T; Sasidharan.S; Muquassir Rahman; Hariharan.R
IR transmitter always emits the IR (Infrared) rays to which have been to be received by IR receiver. When it is in front of IR sensor, the transmitted IR rays are it reflected back to the IR receiver. The output of Operational-Amp is high it IR reflected IR rays. This output of operational amplifier is connected to the RESET pin of 555 timer. Read More...
|
Electrical Engineering |
India |
529-530 |
130 |
Architectural Approach to Mitigate Energy Consumption for Lighting in Central Library of MITS College
-Nitesh Dogne ; Ashish Choudhary
We have entered an era of energy crisis with parallel increase in demands and consumption of same. Facts say that a large part of total energy consumption is credited to operations associated with construction and buildings and most of that is dedicated to the lighting systems. Necessity, demand, and advantage of design of buildings with energy efficiency co-operation, that too right from the planning stage is a major challenge for architects and construction expertise of building industry. This paper is a part of research linked with energy consumption in building and construction sector. The paper deals with architectural design suggestions and parameters to be followed and carried out at different stages of construction of building, in order to mitigate the consumption of energy for lighting of space. To understand the study with a better approach and comparison of contemporary and suggested design strategies a referential case study of library, MITS, Gwalior is used and synthesised as per research. With feasible design changes at brown field stage a comparison is made that how those design changes helped in mitigation of energy consumption. Read More...
|
Architecture & Planning |
India |
531-535 |
131 |
Study of Adaptive contrast enhancement techniques for images by using Retinex
-Gayatri B. Khairnar ; Bijal J. Talati
Recently, still there is image and video systems are of limited use in poor visibility conditions such as in rain, fog, smoke, and dessert. So there is need to enhance such images which may be used for further study or as a input for any application. There are so many techniques for such an image enhancement. Image enhancement techniques can be divided into two broad categories: Spatial domain methods, which operate directly on pixels. Frequency domain methods, which operate on the Fourier transform of an image. The main aim of this paper is to study various methods for image enhancement. Read More...
|
Computer Engineering |
India |
536-539 |
132 |
A New Method for Solving Deterministic Multi-Item Fuzzy Inventory Model with Three Constraints
-A.Faritha Asma ; E.C.Henry Amirtharaj
The aim of this paper is to present a method in which fuzzy multi item inventory model together with the constraints is reduced to crisp inventory using ranking function and then the crisp multi item inventory problem (MIIP) with constraints is solved using NLPP technique. Read More...
|
MATHEMATICS |
India |
540-543 |
133 |
Studies On Citric Acid Fermentation Using Annona Squamosa And Its Peel With Effect Of Alcohols As A Stimulant
-Dr.M. Sashi prabha ; Prof.G. Subba Rangaiah
Citric acid is one of the most important bulk produced organic acids. In the present study more focus is on the economical grounds of citric acid production for which, Annona squamosa and its peel were selected as a substrates Annona squamosa’s peel, which is a waste can be used for the production as a substrate. Aspergillus niger MTCC 281 culture was used as a source of organisms, peels which are dumped indiscriminately after extracting the edible portion and this uncontrolled activity leads to environmental pollution with is the resultant of health hazard to the populace. So, these municipal wastes were considered for the citric acid production. The production of citric acid using fruit peels were compared with the production using the fruits, which are in turn considered as a rich carbohydrate source. The whole productions i.e. fruit yield and fruit peel yield were compared with citric acid yield from Sucrose as a source of substrate. Effects of different alcohols (Methanol, Ethanol and Butanol) were checked on the rate of production at different concentrations. Read More...
|
Biotechnology |
India |
544-547 |
134 |
Power aware reliable routing to support real time traffic in mobile ad-hoc network
-Ms. A.S.Bitala ; Prof. A.S.Gundale
A mobile Ad hoc network (MANET) is a collection of wireless nodes that forms a network without central administration. The nodes in such kind of network serve as routers as well as hosts. The nodes can forward packets on behalf of other nodes and run user applications. The energy consumption of the nodes is a critical factor in the operation of a mobile ad hoc network. The existence of a node with low energy may degrade the performance of the system as the node participate in the route discovery phase, but due to low energy it does not forward the packet or it does not participate in message forwarding phase. Such type of node selection will degrade the system performance, minimizes the packet delivery ratio, and maximizes delay thus increasing energy consumption. So an important objective is to consider Energy Aware design of network protocols for Ad hoc network environment. The proposed scheme is incorporated with the route discovery phase of AODV and by simulation using NS/2 it is observed that the proposed algorithm is better than AODV in terms of packet delivery ratio and network lifetime. Read More...
|
Electronics Engineering |
India |
548-550 |
135 |
Energy Aware Clustering Using PSO and Multi hop Communication in Wireless Sensor Network
-Viralkumar Ishwarlal Patel ; Dhaval Patel
we show an energy-aware clustering for WSN systems utilizing Particle Swarm Optimization (PSO) calculation which is executed at the base station. We characterize another expense capacity, with the goal of all the while minimizing the intra-bunch separate and streamlining the vitality utilization of the system. The execution of convention is contrasted and the surely understood bunch based convention produced for WSNs, LEACH (Low-Energy Adaptive Clustering Hierarchy) and a calculation that allows to set up a multi-bounce correspondence between sensor hubs, which expects to spare energy. Read More...
|
Computer Engineering |
India |
551-555 |
136 |
Optimization of Glazed copper tube Parabolic Trough with Three Different Refrectors
-Ankur Garg ; Kuldeep Singh
Parabolic trough is a concentrating solar collector. It is there since many years, generating electricity in solar power plants. It has just been a bit too expensive to compete with fossil fuels. This paper was concerned with an experimental study of parabolic trough collector designed and manufactured. A parabolic trough solar collector uses three reflecting material stainless steel, aluminum foil and mirror glass strips affix on cloth in the shape of a parabolic cylinder to reflect and concentrate sun radiations towards an absorber tube located at the focus line of the parabolic cylinder. The receiver absorbs the incoming radiations and transforms them into thermal energy, the latter being transported and collected by a fluid medium circulating within the absorber tube. To improve performance and reduce costs direct steam generation in the collector has been proposed. The Designing and Fabrication of parabolic trough solar water heater for water heating was executed, the procedure employed includes design, construction and testing stages. The model which is made up of reflector surface, reflector support, absorber pipe and a stand with manual tracking arrangement was fabricated using locally sourced material for rural applications point of view. In this paper the efficiency of parabolic trough collectors is compared on the basis of different reflecting surfaces (current SEGS plants). The model is based on absorber fluid temperature so it can be used to predict the performance of the collector with any working fluid. We determined the performance of PTSC on the basis of different reflecting surfaces. Read More...
|
Mechanical Engineering |
India |
556-559 |
137 |
Influence of Cable Layout on The Seismic Response Of Cable-Stayed Bridges
-Simon Niyitegeka
During the last few decades, cable-stayed bridges have proven to be first-class structures providing vital transport links. For this reason more researches about these types of bridges are of vital importance since the concerned engineers and relevant academicians need to understand clearly the behavior of these bridges under seismic loading with different cable configurations. In this paper, a 269m span cable-stayed bridge has been studied; the fan and radiating types of cable configuration have been considered as study parameters for the purpose of evaluating the effect of cable configuration in cable-stayed bridges under seismic loading. The earthquake force was considered to act in longitudinal direction and then in the transverse direction of the bridge, the analysis results like axial forces, shear forces, bending moments, torsion moments, deck and tower displacements have been presented and compared for both fan and radiating cable layouts. Read More...
|
Civil Engineering |
India |
560-566 |
138 |
A Survey on Various Form of Data Hiding Techniques
-Suresh.A ; Dr.P.Malathi ; R.N.Devendra Kumar
By the explosive development of internet and the reckless communication techniques in current years the security and the confidentiality of the data has become the prime importance. To guard the data from illegal access and interfering various methods for data hiding like cryptography, hashing, confirmation have been developed and are in practice today. In this paper we will be covering one such data hiding technique called Steganography. Steganography is the process of concealing sensitive data in any media to transfer it securely over the underlying untrustworthy and unsafe communication network. The paper presents a survey case study on various data hiding techniques in steganography that are in practice today. Read More...
|
Computer Engineering |
India |
567-570 |
139 |
Partially Biodegradable Hybridization in Reinforced Polymeric Composites
-Pranathi Janapatla ; V.Devender
Manmade synthetic Natural fiber reinforced and araldite composites are fabricated with synthetic manmade and natural fiber araldite epoxy. Finer Laminates were prepared of natural fiber reinforced araldite resin using a hand lay out process. Later, pressure was applied to the laminates such that the araldite fiber are dispersed in the laminates, melted and flowed out. Resulting in the formation of sheets upon subsequent cooling. The Mechanical Properties of the bio-composites was carried out. Tensile and flexural test as per ASTM standards. By conducting these tests. We determined the tensile strength of the composite laminates. Read More...
|
Mechanical Engineering |
India |
571-574 |
140 |
Study of Jaggery processing plant to improve the themal performance
-Kalyani Haribhau Nikam. ; Balaji D. Nelge; Vishal A. Meshram
Jaggery industry is one of the most important cottage industries in India. Jaggery is prepared mostly by small and marginal farmers. The production process of jaggery involves crushing of cane, boiling and concentration of juice, moulding into the standard shapes and sizes and packaging in suitable packages. The thermal performance of jaggery processing plant will be improved by parameters like design of furnace, drying process of jaggery, freez concentration of sugarcane juice, heat transfer and mass transfer from sugarcane juice for evaporation, moisture content of bagasse. In this review paper focus is on the effect of number of boiling pans used in design of furnace, and several methods used in available literatures are discussed. The improved plant and the conventional plant are compared on the basis of four parameters viz. jaggery production, baggase consumption, emissions and temperature of exhaust. Read More...
|
Mechanical Engineering |
India |
575-577 |
141 |
A Survey Multihop and Geographic Opportunistic Routing Protocol in Wireless Sensor Network
-Jaheer H Patel ; Dr.Godbole B.B
Wireless Sensor Networks (WSN) are networks that consist of sensors which are distributed in an ad hoc manner. These sensors work with each other to sense some physical phenomenon and then the information gathered is processed to get relevant results. Wireless sensor networks consist of protocols and algorithms with self-organizing capabilities. It use broadcast nature to communicate with other sensors & collect information, process it and send it to base station. Opportunistic routing is based on the use of broadcast transmissions to improve the network throughput and increases transmission reliability as compare to traditional routing. This is usually achieved by ordering the forwarding nodes according to some criteria. In opportunistic routing, intermediate nodes take participation to packet forwarding in a localized and consistent manner. This paper gives an overview on different Multihop and Geographic Opportunistic routing protocol which use different metric to efficiently deliver a packet from source to destination which either minimize Energy Consumption, End to End delay and Increases the throughput. Read More...
|
Electronics Engineering |
India |
578-582 |
142 |
Speed Control of Brushless DC Motor Using PLC
-Shaba Anjum ; Vishal Srivastava
Brushless DC motor (BLDCM) is a high performance, low maintenance cost, adequate torque, high speed, high reliability motor and widely used in industries having several advantages over other type of motors. The reason of popularity is due to its simpler speed control with enhanced performance by the use of electronic commutation. The above mentioned characteristics and properties of BLDC motor provide a large research domain in Electrical drives. This paper presents an idea how to automate the speed control of throttle based brushless dc motor with the help of Programmable Logic Controller and monitor its real time behavior using SCADA and microcontrollers. SCADA (supervisory control and data acquisition) is a type of industrial control system (ICS). Industrial control systems are computer controlled systems that monitor and control industrial processes that exist in the physical world. A microcontroller often serves as the “brain†of a mechatronic system. Like a mini, self-contained computer, it can be programmed to interact with both the hardware of the system and the user. Read More...
|
Electrical Engineering |
India |
583-586 |
143 |
A Data Security Application In Cloud Environment Using Cp-Abe Encryption : Phr Systems
-Anu Maria Sebastian ; Deepu Job; Anjali Nair; Shalin Elizabeth
MyPHR machines were created based on the remote virtual machines hosted in the cloud. It takes the support of medical software to feed in the data which makes it more trustworthy. The reuse of valuable legacy software eases the task rebuilding the entire platform from scratch. For each patient a set of attributes are maintained at the database. While their data are stored in the encrypted form in a server. MyPHR Machines have different units which include hospitals, doctors, patients and emergency users. All the users need to register to the corresponding units and the PHR admin grants permission to operate in their environment. The doctors can register via the registered hospitals. Emergency users are allowed access only with explicit delegation by the patient. While registration the information related to each user is stored as attributes in the database. These attributes are taken during the encryption of their respective data based on the policy. Cipher Policy Based ABE encryption method[4] uses the attributes, based on the policy defined and decided by the provider and client. The final encryption is done using Blow Fish algorithm. The encrypted data is stored in servers. The decryption key is generated during the time of encryption. Only the patient could view his data unless he entrusts a trustworthy person to access the shared data in case of emergency. The implemented system mainly focuses on this encryption and decryption of data. Rests of the features of MyPHR Machines are maintained. This work has great applications in the future where the Health centres prefer to use a unified record of heath information regarding a person irrespective of his location. Read More...
|
Computer Engineering |
India |
587-590 |
144 |
Effect of Added Fines on Relative Pressure Drop for Narrow-Sized Silica Sand Slurry Flow
-Dr. Umesh Kumar
In the present paper, the experimental pressure drop data measured for narrow sized silica sand slurry and bi-modal slurry which consists of narrow sized silica sand and fly ash as fine particles in different proportions, keeping the overall efflux concentration constant is used to generate the relative pressure drop characteristics to quantify the change in pressure drop characteristics. The pressure drop measurements are done using a pilot plant test loop over a straight length of 4.0 m in 50 mm NB diameter pipe line under fully developed flow condition. The flow velocities covered are in the range of 1.75 m/s to 4.0 m/s. The lowest velocity chosen is well above the deposition velocity. The pressure drop data collected for narrow-sized silica sand slurry and bi-modal slurry is at average efflux concentrations of 9.8, 20.4 and 33.9% (by weight). Based on relative pressure drop for bi-model slurry, study concludes that increasing the percentage of fine particles mixed in a narrow-sized slurry reduces the pressure drop significantly in the heterogeneous regime of slurry flows which are usually the operating range in prototype slurry pipelines. Read More...
|
Civil Engineering |
India |
591-595 |
145 |
Effect of Fuel Magnetism by Varying Intensity on Performance of Single Cylinder Four Stroke Diesel Engine
-Kushal Chaware ; Dr M.Basavaraj; Prashant walke
The aim of this study is to investigate the effect of the fuel magnetisation on the performance of diesel engine. It has been observed that on magnetisation viscosity of hydrocarbon fuel decreases due to declustering of the Hydrocarbon fuel molecules which results in better atomization of the fuel and efficient combustion of air fuel mixture. This enhances thermal efficiency and improves the fuel economy of I.C engine. The magnetic field applied along the fuel line immediately before fuel injector. The magnetic field of different intensity 1000, 2000, 3000, 4000Gauss is applied with the help of solenoid Electro-magnetic coil and its effect on fuel consumption as well as on exhaust gas emission is studied and compared with performance without application of magnetic field. At different load conditions the experiments are conducted to analyse the fuel consumption, thermal efficiency and exhaust gas analyser is used to measure the exhaust gas emission such a NOX, HC, CO and CO2. Read More...
|
Mechanical Engineering |
India |
596-599 |
146 |
Fingerprint Image Enhancement and Mixing Fingerprints for Protecting Privacy
-Ria Mathews ; Bino Thomas
Biometrics has an important role in privacy protection, when compared to traditional privacy protection methods like tokens, PIN, passwords etc. With the common use of fingerprint techniques in authentication systems, privacy protection of the fingerprint becomes an important issue. Traditional encryption is not sufficient for fingerprint privacy protection. The quality of fingerprints plays pivotal role in fingerprint matching. In order to improve the fingerprint quality, the fingerprint image is enhanced using laplacian pyramidal decomposition which will provide more help for law enforcement. In last few years, significant efforts have been put into developing specific protection techniques for fingerprint. In this paper various methods of biometric template protection of fingerprint by mixing the fingerprints or multi-biometrics has also been surveyed. Read More...
|
Computer Science |
India |
600-604 |
147 |
Review on Design of Agitator to Optimize its Performance
-Pardeshi Rahul Harsing ; Prof. Imran.M.Quraishi
Mixing is very important operation in any process industry. All operations involving liquid phase reactions, homogenization, emulsion, dissolution, extraction, need mixing in one form or other. Mixing of powders, pastes, paints jellies and many other products is needed to be done in many industries for many applications. In this paper, we have mainly focused on different parameters used for design of agitator including design of shaft, impeller blade, coupling, bearings, Hub and Keys. The design of agitator affects on the mixing process as proper design can increase the agitation and uniform distributions of all additives, chemicals, raw material presents in given agitator. The review drives us to design an mistake prone model for agitator which will increase the mixing percentage; ultimately increase the growth of industry to get right place into market with price for product. This review gives the complete information about agitator and parameters to be considered for design to enhance its performance. Read More...
|
Mechanical Engineering |
India |
605-607 |
148 |
College Alumni Portal
-Shaikh Tuba ; Siddiqui Maryam; Shaikh Asiya; Momin Alimuddin; Prof. Lokhande
Alumni portals is providing common platform for every institute. Owing to the need to have all the Alumni (already passed out students) must be connected to the Institute, resulted in sharing their experiences, views, ideas, guidance motivations and strategies. The objective of Alumni portal application is to allow old and new students of the college to have communication. This allows students to know about each other and their current activities. This portal highlights the feature of communication, which will enable the current students to have interaction with the alumni of the college for getting various updates on current industry trends, Internship opportunity, sponsored projects and various referrals opening in the corporate world. This portal will serve the cause of integrating all the stakeholders of Institute such as , Alumni, College students , Faculties to avail the guidance and knowledge sharing on various domains. In this project we proposed the Dynamic Architectural design of the Alumni portal, which enable the two way communication between all stakeholders. Read More...
|
Computer Engineering |
India |
608-611 |
149 |
Clone Detection in Wireless Sensor Networks using RSS and TOA
-Anu Kunjumon ; Arun Madhu; Shalin Elizabeth
In a Wireless Sensor Network, the sensor nodes are vulnerable to capture and compromise. An adversary can easily analyze and capture the private information of a sensor network and are able to deploy a replica of the sensor nodes in the network at locations intelligently decided by the attacker. This is called Clone Attack, which is also called Replication Attack. A cloned node has legitimate information (codes and key materials), so it may participate in network operations in the same way as a non-compromised node. Clone Attack can cause a number of insidious attacks like disrupting communication, subverting, data aggregation, eavesdropping, deny of services on other sensor nodes and on the entire network itself. The whole network may become down or corrupted. So, it is necessary and important to detect and isolate the clone nodes in order to guarantee the security of a wireless sensor network. A new method based on the Received Signal Strength (RSS) value and Time Of Arrival (TOA) is proposed for detecting the clone attacks. RSS value of a node is the power of the received signal at the receiver. The RSS value of a signal is indirectly proportional to the distance between the two nodes. It is calculated based on the physical location of the sensor nodes by considering log normal shadowing. The clone nodes will be deployed at random locations decided by the adversary. It is challenging to find the location of a clone node. In the proposed method Time Of Arrival (TOA) is used to locate the clone nodes. TOA is defined as the time required by a signal to reach its destination. If an attacker node tries to communicate with a legitimate node in the network, the distance between them can be determined by using the TOA of the message. By finding the distance between any two nodes to the attacker, the clone nodes can be easily located. The x and y coordinates of the attackers can be determined. Read More...
|
Computer Engineering |
India |
612-618 |
150 |
Optimization of Process Parameters of Wire-Cut Electric Discharge Machine Using Tungsten Die Tool Steel Using Taguchi Method
-Mr. Harish Kumar Sharma ; Mr. Deepak Gupta
Wire-cut Electric Discharge Machine (WEDM) process is one of the most widely used non-traditional machining processes in current manufacturing. It involves the removal of metal by discharging an electrical current from a pulsating DC power supply across a thin inter-electrode gap between the tool and the work piece. It is most commonly used for machining hard and difficult to machine materials with very close tolerances. This work presents an investigation on effect and optimization of machining parameters for cutting speed, die width. Surface roughness, in wire electric discharge machining. Tungsten die tool steel is used for this research. It is commonly used for hot working dies and tooling such as die casting, extrusion and hot forming of parts. It has been observed that effect of each process parameter for optimization of each performance measure is different. MINITAB 15 software is also used to find the effect of each parameter on response characteristic and to predict the setting of control parameters. Read More...
|
Mechanical Engineering |
India |
619-625 |