No. |
Title and Author |
Area |
Country |
Page |
151 |
A Survey on Content Based Image Retrieval using Low-Level Features Extraction
-Joshi Brinda Nayankumar ; Narendrasinh Limbad
One of the important research areas in Image processing is the retrieval of images. When size of database increases continuously, the applications involving images face new challenges such as storage management, indexing, knowledge management and retrieval presentation. We need an efficient retrieval mechanism to retrieve images from the multimedia database. CBIR- Content-based image retrieval is an image retrieval technique used to retrieve images efficiently by using low level image features like texture, shape and color. This survey paper focuses on different features descriptors for image retrieval and analysis of various retrieval techniques using low level features- color, texture and shape –to improve the performance and accuracy in CBIR system. Read More...
|
Computer Engineering |
India |
626-632 |
152 |
A Survey On Various Watermarking and Cryptography Techniques for Data Hiding in Medical Images
-Mamta I Mangtani ; Narendrasinh Limbad
Water marking scheme is use for secure the data to protect digital content from unauthorized modification. The digital image watermarking technology is an important aspect about multimedia authentication and copyright protection, in order to enhance its reliability and security. Image watermarking scheme can effectively be used in medical image processing to authenticate or investigate the integrity on medical images. Join cryptography and watermarking is efficient method for security. Peak Signal to Noise Ratios and Normalized Correlation are computed to accesses the quality of the watermarked images and extracted the information of images. Read More...
|
Computer Engineering |
India |
633-636 |
153 |
Study and Review on the Analyses of Leaf Spring
-Pulkit Solanki ; Dr. Ajay Kumar Kaviti
We know that the spring plays very essential part of every automobile for suspension point of view. Leaf spring is the main type of suspension system which is used in many light and heavy vehicles. Leaf spring used in many vehicles due to having some main characteristics which are shown below.
1) Uniformly load distribution
2) Lower cost
3) Rough used
4) Easier in Isolation and Tightly attached with working frame
Today every automobile company has been working on increasing the efficiency with reducing the weight without having any load carrying capacity. In this paper we would like to review some previous research work performed on the leaf spring by previous researchers for increasing the working condition and capacity with load reduction. The paper based on material composition, experimental testing and load (Steady, Dynamic) study etc. Read More...
|
Mechanical Engineering |
India |
637-640 |
154 |
Virtual database for e-agent
-Megha Sawlani ; Anita Nagdev; Monica Khubani; Divya Paryani; Dimple Bohra
This proposed paper describes the complete architecture of Virtual Database Technology (VDB)[1] in detail. VDB can be created and managed using Virtual Database Management System (VDBMS). The description of VDBMS components are explained in this paper. This technology can be used further for implementation of distributed database applications as well. The proposed system i.e App which is about comparing different products from different (Four) Websites. Basically the App uses the technology of Virtual Database(VDB). Read More...
|
Computer Engineering |
India |
641-642 |
155 |
Measuring Calorie and Nutrition from Food Image - Survey
-S. Anto Gnana Jeshma ; V.G. Sridevi
A people becomes more interested to watching their weight, eating healthy food, and avoiding the obesity, the system can measure calories and nutrition in every day food intake. The method of food calorie and nutrition measurement systems are used to measure and manage daily food intake for patients and dieticians. The system has built on camera for food image processing and uses nutritional tables. Recently, these are increased in the personal mobile technology usage (i.e. smart phones or tablets). In special calibration technique, our system has the built-in camera of mobile devices and a photo of the before and after eating food can records and it to measures the consumption of calorie and nutrient components. Result of our system is acceptable accuracy and it efficiently improved and it facilitated the current manual calorie measurement techniques. Read More...
|
Electronics & Communication Engineering |
India |
643-645 |
156 |
Trusted Cloud Computing with Secure Aid Agency for a Couple of Clouds Collaboration
-P.NAGENDRA
Successfully preserving log information over extended periods throw honest of it gradual is unbelievably vital to the right functioning of any enterprise. Integrity of the log files that of the work procedure need to be compelled to be ensured the least bit instances. Similarly, as log files regularly contain touchy facts, confidentiality and privateness of log facts are equally important. However, deploying a at ease work infrastructure entails widespread capital expenses that many companies may word overwhelming. Reputation log management to the cloud appears to be a possible worth saving degree. Throughout this paper, we've got got a tendency to decide the demanding situations for a secure cloud-based log management service and propose a framework for doing consistent. Read More...
|
Computer Science |
India |
646-648 |
157 |
An Introduction of Content Based Image Retrieval Process
-Sunil H. Chavda ; Lokesh Gagnani
Image retrieval plays an important role in many areas like fashion, Engineering, Fashion, Medical, advertisement etc. As the process become increasingly powerful and memories become increasingly cheaper, the deployment of large image database for a variety of applications. It has now become realisable. Content Based image retrieval is method of extracting the similar image or matched image from the image database. It has become popular for getting image from the large image database. By using low level features like colour, texture, shape the retrieval become more efficient. There are many research algorithm developed for CBIR. In this paper we have used two retrieval process query by colour and query by texture. Colour features contain colour histogram in RGB colour space and texture features involve the invariant histogram and mean and standard deviation to retrieve the image. It is observed from the experiment that query by texture is more effective than colour for retrieving images. Precision and Recall provides the performance measurement. Read More...
|
Information Technology |
India |
649-652 |
158 |
Flexural Strength of Self Compacting Concrete using Polypropylene Fibers And Fly Ash Without Reinforcement
-K.S.Johnsirani ; Dr.A.Jaganathan
Self-Compacting concrete gets compacted due to its own weight without any external vibration. The trial mix whish satisfies the fresh concrete properties as per EFNARC guidelines and the one which gives maximum compressive strength is used in the work. The proposed experimental program is aimed to evaluate performance of SCC with varying percentage of polypropylene fibers. An attempt has been made to study the fresh and hardened properties of self-compacting concrete with 10% of class F flyash to the weight of cement and super plasticizer. The self-compacting concrete with 0.1% of polypropylene fiber satisfies EFNARC guidelines and showed better results when compared to other trial mixes. Read More...
|
Civil Engineering |
India |
653-658 |
159 |
Privacy Preserving Data Mining - Optimization in K-Anonymity using Machine Learning Approach
-Ankit Patel ; Keyur N. Brahmbhatt; N. B. Prajapati
In now days the information sharing is very important. One organization shares the information of user to another organization for the better survey purpose. But the sensitive data of user will not be disclosed. So for that purpose we have to hide some sensitive data of user for that the data must be encrypted. K-anonymity algorithm is one of the ways to encrypt data so that data cannot be stealing and the information in the data will not modify. But there is some way to attack on the k-anonymity encrypted data. One of the way is background knowledge attack, in this if the attacker knows some basic information about the use then he can get the detail from database. If we can add some more data in the original database and the apply k-anonymity algorithm so that the attacker is get more rows of data and he will confuse so the data should be protected from the attacker. Read More...
|
Computer Engineering |
India |
659-661 |
160 |
Support Vector Machine based Gear Defect Classification using Wavelet Denoised Vibration Signal
-Altaf Ahmed M K ; Manjunatha C; Shivaprasad D
In gearboxes and in all rotating elements in general, gear damage detection is often very critical and can lead to increased safety in aviation and in industry. Therefore the importance for their regular inspection and/or on-line health monitoring is growing and effective diagnostic techniques and methodologies are the objective of research efforts over the last 30 to 40 years. Gearbox is widely used in all industrial applications and hence there are many analytic techniques, which are used to prevent serious damage in a mechanical system. In general, the mechanical components produce abnormal transient signal when a fault condition occurs. These transient signals can be utilized to identify the fault in various conditions. These fault diagnosis techniques are mainly based on sound emission and vibration signals in time and frequency domains, some more advanced studies are continuous wavelet transform and discrete wavelet transform (DWT) can effectively detect weak impulse signals for fault conditions and hence wavelets can be used for the fault diagnosis of gearbox. Read More...
|
Mechanical Engineering |
India |
662-664 |
161 |
Computational Study of Turbulent Flow around a Generic Car Body (Ahmed BODY)
-Rakshith K N ; Mahesh T S
The aerodynamic performances of the Ahmed body is explored statistically using ANSA software for pre-processing and for post processing and solving ANSYS FLUENT software and in the learning the K-Ô‘ (k-epsilon) turbulent model is recycled in demand to decrease at computational price at extraordinary Reynolds number. In the following analysis the four configurations with slant angle of 100, 200, 300 & 400 are measured. The correlation between aerodynamic drag and rear diffuser angle is precised and flow apparatus are evaluated and discoursed. In the explored the completely established turbulent flow in excess of Ahmed body and evaluate the effect of slant angle, four separate cases have been solved for different slant angle and results are compared. The results understand the better lift and drag for a body. Read More...
|
Mechanical Engineering |
India |
665-669 |
162 |
A Review on Combined Effect of HHO Gas and Compression Ratio on the Performance and Emission Characteristics of Spark Ignition Engine
-Budhesh K. Jambukiya ; Krunal Patel; Gaurav Rathod
The reserve of petroleum over the world is limited. It is very important to save petroleum fuels or find some substitutes. The oxygen enriched hydrogen-HHO gas was produced by the process of water electrolysis. Hydroxyl gas was produced by the electrolysis process of different electrolytes (KOH, NaOH, and NaCl) with various electrode designs in a leak proof Plexiglas reactor (hydrogen generator). This review paper presents the concern with the effectiveness of oxygen enriched hydrogen-HHO gas addition on performance and combustion characteristics of a SI engine with variable compression ratio. The effect will be shown on the SI engine of the brake thermal efficiency, un-burn hydrocarbon, NOx emission, carbon dioxide, and carbon monoxide with the use of HHO and a variable compression ratio. Read More...
|
Mechanical Engineering |
India |
670-672 |
163 |
Analysis of Vibration Control Systems using Water Tank as a Liquid Damper in High Rise Buildings
-Ravi Sayabanna Shiranal ; Dr. M. B. Patil
Current trends in construction industry demands taller and lighter structures, which are also more flexible and having quite low damping value. This increases failure possibilities and also problems from serviceability point of view. Now-a-days several techniques are available to minimize the vibration of the structure, out of the several techniques available for vibration control, concept of using TLD is a newer one. In the present work, the structure without and with tuned liquid damper buildings of G+10, G+20, and G+30 storey height structural models are considered. The vulnerability of without and with tuned liquid damper structures under various load conditions are studied and for the analysis seismic region 3 with different soil types are considered. Analysis is carried out for different heights to study the seismic behavior of structure without and with tuned liquid damper building analysis is for different heights to see what changes going to take place if the height of both structural systems varies. Therefore, the characteristics of the seismic behavior of both structural systems suggests the additional measures for guiding the conception and design of these structures in seismic regions and also to improve the performance of these structural systems under seismic loading. Present work provides a good source of information on the parameters lateral displacement, storey drift, base shear, and time period. The analysis is carried out by E-Tabs software. Read More...
|
Structural Engineering |
India |
673-680 |
164 |
Comparative Study of Seismic Analysis between Conventional RC Frame and Flat Slab with Drop
-Muniraju K S ; Subramanya K.G.
The speed growth of population in urban areas and the consequent pressure on limited space considerably influenced tall building constructions in developing countries like India. These tall buildings can be constructed using various structural systems. At present, normally conventional RC Frame buildings are adopted for the construction. These structures are usually adopted to overcome the large moments developing due to the applied loads. On other hand, the flat slab structural systems in which slab is directly rested on columns have been used in many buildings constructed recently due to the advantage of increased clear floor to floor heights to meet the economical, easier form work, shorter construction period and architectural demands. In the present work conventional RC frame and Flat Slab building of G+3, G+7, and G+11 storey structural models are considered. The vulnerability of purely frame and purely flat slab models for seismic load is analyzed considering different soil conditions and seismic zones. An attempt is made to compare the response of conventional RC frame model and flat slab model for earthquake load. The analysis is carried out with both equivalent static method and response spectrum method. Parameters like lateral displacement, time period, storey drift and base shear are computed using analytical software and comparison is made between both structural systems and the results are presented. Read More...
|
Structural Engineering |
India |
681-686 |
165 |
Use of Sugarcane BAGASSE Ash in Cement Concrete Paver Blocks for Medium Traffic
-Arvind Kumar ; Arun Patel
Cement concrete paver blocks is a versatile blocks, Now a days which is used widely for road construction. Cement concrete paver blocks roads are very easy to construct because these blocks are easily placed and easily removed. Sugarcane bagasse ash is by product of sugar industries. Residue which is left after juice taken out from sugarcane is known as sugarcane bagasse, when these sugarcane bagasse are dried and burnt then this residue are known as sugarcane bagasse ash. In this article sugarcane bagasse ash are partially replaced by cement in concrete paver blocks upto 50% with an interval of 10% and its compressive strength and workability is determined. Read More...
|
Civil Engineering |
India |
687-688 |
166 |
Effect of Sisal Fibre in Concrete
-Ashit Sarkar ; L.N. Malviya
Customary cement is solid in pressure and powerless in strain with a specific end goal to conquer the shortcoming steel fortification is being given. Scrutinizes endeavored to acquire the malleable property by presenting engineered filaments, for example, poly propylene, asbestos and so on., and steel strands, yet they are costly. Henceforth they are endeavoring to utilize the common strands, for example, straw, elephant grass, palm leaf, coconut coir and so forth to consolidate rigidity in traditional cement. So that the customary steel fortification on cement can be decreased. In this exploration, sisal is being utilized as a part of cement. In this way, the mechanical properties, for example, compressive quality, split-elasticity, and modulus of burst of M40 evaluation concrete and by changing the measurement of fiber substance from 0.1%, 0.2%, 0.3%, 0.4%, and 0.5%, by volume of bond with ideal length of 35mm got from writing survey, were found. The ideal dose of sisal fiber was observed to be 0.3%. The flexural conduct of fortified solid shafts with 0.3% sisal fiber was contrasted and customary solid properties of M40 evaluation. Read More...
|
Civil Engineering |
India |
689-690 |
167 |
Utilization of E-Waste in High Strength Cement Concrete
-S.S. Singh ; Arun Patel
Electronic waste or e-waste describes discarded electrical or electronic devices. Used electronics which are destined for reuse, resale, salvage, recycling or disposal are also considered as e-waste. Informal processing of electronic waste in developing countries may cause serious health and pollution problems, as these countries have limited regulatory oversight of e-waste processing. Solid waste management is one of the major environmental concerns in our country now a day. The present study covers the use or recycled e-wastes as replacement of coarse aggregates in concrete. The main aim of the study is to investigate the change in mechanical properties of concrete with the addition of e-wastes in concrete. It is found that the use of e-waste aggregates results in the formation of lightweight concrete. In this dissertation coarse aggregate is partially replaced by coarse aggregate upto 25% with regular interval of 5%, along with fly ash partially replacing cement in concrete of grade M50. Read More...
|
Civil Engineering |
India |
691-694 |
168 |
K-Nearest Neighbor Query Processing using Utility Mining
-Alma Mary Margret ; Kishore Sebastian
Mining classification is the process of developing rules to group data tuples together based on certain features. Mining high utility itemsets from a transactional database refers to the process of discovery of items with high utility like profits. A large number of algorithms have been proposed for this problem, but it will generate a large number of itemsets. This will degrade the performance of the system. Inorder to overcome this problem here propose a method of utility mining. To perform the mining process, the system keeps a file called log file which contains the information’s regarding the previous searches of a particular user. This will help to identify the browsing behavior of the user. Here mining is done by classifying the items into promising and unpromising factors. A minimum utility value is assigned in order to classify the items. If the percentage count of a particular item chosen by the user is greater than minimum utility, then that item is considered as promising factor. The items with promising factor will be listed in the list. If the percentage count of a particular item chosen by a user is less than minimum utility, then hat item will be filtered out from the list. User will choose a particular item from the list. Selected item and the current location of the user will be transferred as a query. Both current location and selected item is processed inorder to find the nearest neighbor. Current location is found with the help of HTML5 geolocation technology. Nearest neighbors are found by comparing the longitude and latitude of the users current location with the set of items in the database. The nearest neighbors will be listed and user will chose a neighbor as per his requirement. The selected item will be located in the map. The system will also sow the shortest path, distance and time required to reach from source to destination. If the user selects a particular item then it will be considered as successful request and it will be stored in the log file. This will improve the performance of the system. By using his method more accurate results are obtained. Read More...
|
Computer Science and Engineering |
India |
695-700 |
169 |
Character Recognition of Degraded Document Images Removing Strike
-Liz Maria Mathew ; Suma R
Optical character recognition (OCR) is the mechanical or electronic conversion of images of typewritten or printed text into machine-encoded text. Character recognition becomes difficult if the document images are degraded. So binarization is a technique that is used to remove the degradations. Libraries and archives around the world store large amount of old and historically important documents and manuscripts. But, due to many environmental factors, the poor quality of the materials used in their creation and improper handling cause them to suffer a high degree of degradation of various types. Today, there is a strong move towards digitization of old documents such as manuscripts so that their content can be preserved for future generations. Character recognition from noisy and degraded documents is still a challenging task. While considering historical document analysis, old printed documents have a high occurrence of degraded characters, especially broken characters due to ink fading. The objective of document image analysis is to recognize the text in degraded document images and extract the intended information. Here, a character recognition technique is proposed for the degraded document images. A strike removal method is also implemented to remove the strikes that are drawn over the text in the document images. Also, a contrast enhancement has been done to the adaptive contrast image using three methods which are linear contrast enhancement, piecewise linear stretch and homomorphic filter. The performance analysis is done based on the contrast enhancement that is done to the adaptive contrast image. The character recognition step includes horizontal scanning, vertical scanning and recognition using Discrete Wavelet Transform (DWT). The proposed system recognizes almost all characters of the input image. Read More...
|
Computer Science and Engineering |
India |
701-705 |
170 |
Design and Development of Bi-Directional Agitator using Scotch Yoke Mechanism
-Jadhav Nitin B. ; Ghodke Arvind P.
The conventional Agitators or the impellers of conventional agitator rotates in one direction only. These type agitators are commonly used in process industry for mixing of low viscous fluids. Due to rotation in one direction only it creates particular flow pattern in fluids hence the particles tend to stick to the walls of container. In order to have homogeneous mixing the impeller of Agitator must rotate bi-directionally i.e. during the one cycle this will form turbulent flow pattern leading to creation of irregular flow pattern and resulting into thoroughly mixed fluid mixture. Read More...
|
Mechanical Engineering |
India |
706-708 |
171 |
Analysis for Strength in Different Types of Cement Available in Chhattisgarh
-Akash Sahu ; Dr. Sp Mishra
This work covers the comparison of opc,ppc,psc cements manufactured in Chhattisgarh in different brand name. the properties of each type of cement have been tested in lab and analysed with respect to the physical properties such as consistency, initial and final setting time, specific gravity, fineness and initial and final strength of mortar cube. The aim of the of this paper is to compare the different type of cement produced in the state, to find stability for different type of work. The rate of the strength development in initial and final stage have been analysed so that a field engineer can be understand what type of cement can give the best performance for different type of work. In this paper we are comparing different brands of cement available in Chhattisgarh in terms of their strength development. By comparing their physical and chemical requirements as per IS Code recommendation and performing various laboratory tests like Compressive Strength, Initial and Final Setting Time of Cement, Fineness of Cement, Specific Gravity of Cement and find the strength development in different types of cement available in market. Strength development has been carried out at 3 days, 7 days, 14 days and 28 days of different brands of OPC grade cement. The advantage of performing this experimental work as a paper, we can select the best cement brand available in Chhattisgarh. Read More...
|
Civil Engineering |
India |
709-714 |
172 |
Divide and Conquer Approach to Mine High Utility Itemsets Represented in Tree Data Structure
-Ganesh sawant
The Process of mining high utility of itemsets refers to identification of profitable and important items from set of transactions. Unit transaction consists of transaction id, quantity and name of purchased item. To access transactions, they are stored in tree data structure because tree data structure allows transactions to store in compact and memory efficient way. However for large transaction database loading of whole transaction tree into memory is expensive task. In this paper divide and conquer technique is discussed which avoids loading of large transaction tree into memory and also helps to gets some seasonal profitable items. Read More...
|
Computer Engineering |
India |
715-717 |
173 |
Need of Automation in Investment Casting Industry Due to Major Defects Caused By Manual Operations (Case Study)
-Vanikar Nilesh Pramod ; Dr. Ohol S. S; Rajendra Anjikar
Investment casting process is used worldwide to manufacture as cast precision castings specially for super alloy castings mainly for Aerospace and Automotive Industry. The process of investment castings is very complicated compared to other commonly used casting processes. Very crucial stages in this process are 1) first coat of zircon silica on pattern assembly and 2) Metal pouring in preheated shells. These two stages of the investment casting processes are usually performed manually in small scale Investment casting foundries causing defects which increase the cost of quality and scrap. This increases delivery lead time affecting profit gains. This scenario is typical for small scale investment casting foundries making small yet high production castings. Read More...
|
Mechanical Engineering |
India |
718-721 |
174 |
GUI based Quad Copter System for Real Time Surveillance and Salvage Operation
-S.R.Thilaga ; K.Sivakumar; M.Karthik
The rescue operations during disasters and war periods have been really under a great risk because of the lack of earlier knowledge about the upcoming hazard. Uncertainty, hazards, and limited availability of rescuers all impact the ability to save lives. Now a day in high crowded securable area we are using the Balloon Surveillance system which is not controllable and it cannot be given clear view in particular place. This paper introduces the aspects of disaster areas that make them so challenging. The use of Quad copter system as a risk management tool for human rescuers is introduced. Using Graphical user interface (GUI), the RDP transmits the control signal to the Quad copter. This system monitoring the areas using sensors unit and camera module to record and transmit data to the computer. This video is lively telecast in the securable website through IP TV protocol. The main objective of this Paper is to rescue more & more number of people from the adverse condition. Read More...
|
Electronics Engineering |
India |
722-725 |
175 |
A Review on the Factors Affecting Augmentation of Heat Transfer and Efficiency of DPSAH
-Jay Patel ; Sukritindra Soni
The heat transfer rate of solar air heater can be increased by increasing the heat transfer coefficient on absorber plate. Various artificial geometries have been developed and experimented to determine the effect of geometry roughness on heat transfer rate. Moreover, a DPSAH with artificial geometry is more efficient than a single pass with artificial geometry. A review of such studies is presented in this paper. Read More...
|
Mechanical Engineering |
India |
726-727 |
176 |
Environmental Examination of Solar Energy Application in three major GHG Emitter Countries of the World
-Subrata Sinha ; S. Chattopadhyay
This paper quantifies the pollution generation in the three major industrialized nations (India, China & US) by releasing CO2 & GHG gasses into the atmosphere from the power sector. The consequence of this pollution generation has also been discussed in this paper. It has already been known that Electricity and heat generation together contribute 42% of world CO2 & GHG emission and 22% emission is contributed by the transport sector. India ranked fourth as GHG emitter in the world and emits more than 5% of world’s total CO2 emission. India accounts for 10% of global emission with the trend of rapid increase by 3.4% per year from 2011 to 2035 as per projection of World Energy Outlook, 2013 [2] This paper also examines the possibilities of emission reduction by producing power from renewable energy, an alternative energy sources, mainly from solar energy, to save environment and to reduce our health hazard. Read More...
|
Environment Engineering |
India |
728-733 |
177 |
Two servers Password Authentication with Results
-Nishikant S. Burande ; Prof. Sandip Kahate
There are many ways to use two servers for authentication purpose like symmetric and asymmetric authentication servers. In symmetric authentication server two servers contribute equally to each other for the authentication purpose. In asymmetric two servers one server helps to another server for the authentication purpose. In this paper two symmetric servers for the purpose of authentication. This is first system that providing periodic backup facility. Also it is showed here that how the two server contribute equally in process of password authentication scheme. Client can share files from another client or to the another client. This phenomenon provides security against active attack and passive attack also. Read More...
|
Computer Engineering |
India |
734-736 |
178 |
A Secured Image Steganography Technique using Wavelet Transform
-Abhay Dakhole ; Dr. Sanjay Badjate
Image steganography is applicable in department of defense, department of police, department of detective investigation and medical field. In image steganography, generally secret image is not hidden, instead of that a key is generated and that key is hidden in the cover image. By using that key the secret image can be extracted from the cover image. Wavelet Transform (WT) is used to hide the key. Wavelet Transform is very robust and secure because nobody can realize information which is hidden and hidden data cannot be lost because of noise or any signal processing operations. Experimental results show very good Peak Signal to Noise Ratio (PSNR), MSE and maximum error which is a measure of security. In this technique the secret image is hidden in the middle bit-planes of the integer wavelet coefficients in high frequency sub-bands. Read More...
|
Electronics Engineering |
India |
737-741 |
179 |
Segmentation of Optic Disk and Exudates using Image Processing
-Vakkayil Megha Gopinath
In this paper a method for segmenting optic disk from retinal images is presented. In this work the retinal image is preprocessed and then converted to Hue, Saturation, Intensity image. The optic disk is then extracted using Image processing technique. For a patient with diabetic retinopathy exudates along with optic disc is extracted. The presence of exudates indicates diabetic retinopathy. According to the severity of the extracted exudates, the condition of the patient can be identified as mild, normal or severe. Read More...
|
Electronics & Communication Engineering |
India |
742-745 |
180 |
REACT- Implementing Security in VANET and Increasing Stability using Greedy Forwarding Algorithm
-Athira P
Privacy and security are major issues in vehicular ad hoc networks. Several works have been proposed with the same aim. However, as far as, some researches on VANET protocols have addressed the privacy issues and encryption key establishment. To do so, vehicles need to continuously send safety messages providing the position information to nearby vehicles. This frequent messaging may cause the tracking of vehicles, if it success to eavesdrop the wireless medium. The integrity of the messages exchanged between subscriber and RSUs and the privacy of VANET users who exchange these messages are a major concern. A web-based secure registration process allows a user to register in RSUs. At the registration session, users give all needed information that licenses them to have the advantage of secure connectivity throughout the communication. Moreover, the proposed cryptographic function that allows users and RSUs to provide the required security level of exchanged messages. For obtaining security against privacy hacking and eves dropping, it makes an RSU to make the next encryption key and the next pseudonym to use unique. Routing efficiency is improved using the highly stable greedy forwarding mechanism. Thus, the robustness of the user privacy and secure communication in service oriented vehicular networks and efficient routing is achieved under various communication attacks. Read More...
|
Electronics & Communication Engineering |
India |
746-749 |
181 |
Super Resolution and Denoising of Images via Dictionary Learning
-Shamily Shaji ; Angitha George; Shalin Elizabeth S
Improving the quality of image has always been an issue of image technology. Enhancing the quality of image is a continuous ongoing process. To ensure the quality of image in image processing noise estimation and removal are very important step before analysis or using image. An example-based method for super-resolution and denoising of images is proposed. The objective is to estimate a high-resolution image from a noisy low-resolution image, with the help of a given database of high and low-resolution image patch pairs. This method uses a redundant dictionary learning to reconstruct the HR image. The redundant dictionary is trained by K-SVD algorithm which is an iterative method that alternates between sparse coding of the examples based on the current dictionary, and a process of updating the dictionary atoms to better fit the data. Denoising and super-resolution of images in this paper is performed on each image patch. In this paper K-means Singular Value Decomposition (K-SVD) and Iterative Back Projection methods are proposed for denoising and Super Resolution of images. These algorithms significantly improve the resolution and eliminate the blur and noise associated with low resolution images, when compared with the other existing methods. Read More...
|
Computer Engineering |
India |
750-753 |
182 |
Offline Signature Recognition and Verification using PCA and Neural Network Approach
-Deepti Yadav ; Dr. Chhavi Saxena
A Signature of a person is a unique biometric trait which can be used to validate a human identity. As signatures continue to play a vital role in legal, commercial and financial transactions, strictly secured authentication becomes more and more critical. Offline signatures are treated as the most natural means of authenticating a person’s identity. A signature by an authorized person is treated as the “seal of approval†and remains the most ideal means of authentication. This paper presents a novel approach for offline signature recognition and verification. Offline signature recognition is implemented using Principal component analysis (PCA) technique while for signature verification efficient back propagation artificial neural network is designed and trained using features extracted from Grey Level Difference Method (GLDM) technique. The system was tested against 100 test signature samples, which comprise genuine and forged signatures of ten individuals giving an average accuracy of 94%. Read More...
|
Electronics & Communication Engineering |
India |
754-758 |
183 |
False Muntiae Removel in Recognise Fingerprint using Identification
-Jaswinder Kaur ; Upasna Garg
Fingerprints marks are the most extensively used biometric feature for Human identification and verification in the field of biometrics till today. There are two main types of features that are used for fingerprint identification that are ridge and furrow pattern. The location and orientation of each minutiae is unique which is acquired and used for further references. This paper presents the implementation and defining of a minutiae based approach to identify fingerprints and serves as a review of the different steps involved in the development of minutiae based Automatic Fingerprint Identification System (AFIS). The technique described in this paper is based on a new case of removal of the false minutia extracted from the fingerprint image which is binarized and thinned as a part of pre-processing. Read More...
|
Computer Science |
India |
759-761 |
184 |
Design and Experimental Modeling of Variable Flow Radial Piston Pump
-Harshal Tanaji Kekare ; Prof.S.S.Patil
This paper present variable displacement linkage which use for desired position displacement. Using this particular displacement run a radial piston pump for variable discharge. This variable Discharge is relation with Control angle and Pressure. In hydraulic power systems, variable displacement pumps save power, increase the productivity or control the motion of a load precisely, safely and in an economical manner .The displacement varying mechanism and power to weight ratio of variable displacement piston pump makes them most suitable for control of high power levels. Positive Displacement Pumps are "Constant Flow Machines" Thus objective of research is defined to develop a variable displacement linkage that will enable to vary the stroke of an two cylinder radial piston pump, thereby offering to vary the discharge of the pump using manual control. Also find relation of Discharge, Control angle and pressure. Read More...
|
Mechanical Engineering |
India |
762-764 |
185 |
Root Cause Analysis using Ishikawa Diagram for Reducing Chain Link Rejection
-Mr.R.S.Magdum ; Mr.P.N.Gore
Manufacturing problems are very crucial, need vigilant and immediate attention otherwise it damages to company’s not only profit margins but also reputation. Quality Management includes quality assurance and control. It is an important technique to maintain and continuously improve quality of the product. Out of many techniques used to improve quality, reduce rejection, Ishikawa diagram is very well known and widely used. Ishikawa diagram is very useful to identify the probable causes of error or problem from different perspective. Our research is in chain link manufacturing, the Ishikawa diagram is used to identify various root causes for chain link rejection due to ovality problem. After detailed study of chain link manufacturing process and data gathering for many problems which causes rejections, first problem chosen to ovality problem and scrap of product, because it contributed heavily around 7% to 8% of total production. The root causes identified as outcome of Ishikawa diagrams implies that many causes behind rejections. To reduce the rejection related to chain link, identified causes have to priorities and attended. [1,2]. Read More...
|
Mechanical Engineering |
India |
765-768 |
186 |
Improved Positive and Negative Quantitative Association Rule Mining using SAM
-K. Arulkumar ; Mrs.P.Sundari
Mining and discovering association from huge dataset is one of the common data mining technique, which help to extract interesting knowledge and find dependencies between items in the dataset. Several techniques and algorithms have been proposed to find dependencies between items with positive dependencies and those techniques don’t concentrate on negative dependency calculation. Certain algorithms initiated the findings of negative association rules, even though the techniques are effective, that is only considered the quality in rules. So there is a need of finding both positive and negative quantitative association rules from the dataset. This paper proposes a new technique named as Improved Positive and Negative Quantitative Association Rule Mining using SaM(Split and Merge). It is a new multi-objective based algorithm, which helps to mine a decreased set of positive and negative quantitative association rules rapidly. In addition, this proposal maximizes the following objectives such as improving precision, interestingness, performance and reducing the storage overhead. This also includes the split and merge algorithm for fast data management. in order to obtain set of rules which are interesting, easy to understand, suitable for decision making and provide good coverage of the dataset. The effectiveness of the proposed approach is validated over several real-world datasets. Read More...
|
Computer Science |
India |
769-772 |
187 |
The Survey Paper on Clothing Pattern and Color Recognition for Visually Impaired People
-Honey Mishra
For visually handicapped people a mental support is important in their daily life and participation in a society. The select clothes with complex patterns, colors of clothes is a challenging task for visually impaired people. We have developed a camera-based system that is use to recognizes clothing patterns in four different categories that is (plaid, striped, patternless, and irregular) and identifies different 11 clothing colors. We used the CCNY Clothing Pattern dataset. The system integrates a camera, a microphone, a computer, and a Bluetooth earpiece for audio description of clothing patterns and colors. The output of this system is audio signal. The clothing patterns and colors are described to blind users verbally. This system can be controlled by speech input through microphone. in this survey paper I provide a comparison report among all technique which are provide a clothing pattern and color recognition of cloth for visually impaired people. Read More...
|
Electronics & Communication Engineering |
India |
773-776 |
188 |
A Review on Removal of Cadmium in Waste Water using Various Low-Cost Adsorbents
-Dharani.R ; Sivalingam.A; Thirumarimurugan.M
Cadmium is an extremely toxic heavy metal and it is considered as a carcinogen. It is generally used in manufacturing of batteries and extensively used in cadmium electroplating and paint industries. The limit of cadmium in drinking water is 0.05 mg/l .Many methods are available for cadmium removal in waste water. One of the most effective methods is adsorption. This paper reviews the various types of adsorbents and its efficiency to remove cadmium. Read More...
|
Chemical Engineering |
India |
777-780 |
189 |
Comparative Analysis of Image Defogging with its Techniques and Types
-Dhananjay Singh Kushwah ; Ram Naresh Sharma
Images play an important role in the real world, images are used for describing the changes in the environment and also use of traffic analysis. Images are captured in open environment due to the bed whether or atmosphere images are not a clear. Images acquired in the bad weather, such as the fog and haze, are extremely degraded by scatting of the atmosphere, which creates the image color gray, decreases the contrast and create the object features challenging to recognize. The bad weather not only lead to variant of the visual outcome of the image, but also to the difficulty of the post processing of the image, as well as the inconvenience of entirely types of the tools which rely on the optical imaging, such as satellite remote sensing method, aerial photo method, outdoor monitoring method and object identification method. There are some prior assumptions which need to be considered in removal of the fog. So basically fog removal algorithms work by estimating the depth. There are numerous applications of fog removal such as in the case of navigation and tracking, entertaining industries, and customer electronics. Read More...
|
Computer Science |
India |
781-784 |
190 |
A Proposed Method of Medical Image Fusion using Non-Subsampled Counterlet Transform and Wavelet Transform
-Girnara Nikhilesh N. ; Kacha Aashish H.
Fusion of image is describe combination of two or more source images from different modals or instruments into a more information single images. Fusion of medical image is important role in medical treatment and diagnosis. There are many transform based image fusion methods are NSCT, DWT, Curvelet and Counterlet Transform are define accurate image and high frequency. Improve the science information technology, image fusion are used to process multiple images from different sensors [2]. Image fusion is a process by combining two or more source images from different modals or instruments into a more information single images. This paper defines the combination of Non Sub-sampled Counterlet Transform (NSCT) and Discrete Wavelet Transform (DWT) both are to be sufficient and effective for image fusion. Medical Image Fusion is to derive the information from multimodal medical image data. For medical diagnosis, Computed Tomography (CT) provides the accurate information on denser issue with less distortion. Magnetic Resonance Image (MRI) provides good information on soft tissue with more distortion [3]. Two methods, NSCT and DWT are covers the decomposition of fusion algorithms fusion of medical image of CT and MRI, implementation of fusion rules and fusion image quality form. The image fusion is performance based on the root mean square error (RMSE), Entropy and peak signal to noise ratio (PSNR). Read More...
|
Computer Engineering |
India |
785-787 |
191 |
A Survey on Enhancing Security for Mobile Advertising and Billing Information
-S.Princy Rachel ; A.H.Ragamathunisa Begam
Mobile devices get more involved as media delivery platforms; the worth of advertising on these devices becomes significant. Many systems have been developed to make use of this opportunity. In existing system, the peers among the group will request directly for advertisements to ad-server which leads to lack of privacy in the system. Because of this act of the peers, the other peers among the group can easily access the request of the particular peer which is not a valid process on ad-server. To overcome this, we propose a model to enhance the security process of previous system and to reduce the communication cost. We developed three roles: Service Provider, Content Provider, and Mobile Peers. Service provider provides the advertisement to Ad-Server. Ad-server distributes the advertisements to the Content Provider. Mobile peers (user) install third party application. The peer group formation starts when a peer broadcasts an ad announcement. We used three different algorithms to overcome the problem of existing system, we generate key signature using HMAC algorithm, the data transformation between the peers and the ad-server process is done securely using Base64 algorithm and the energy efficiency in the primary peer is increased using RSA algorithm. We introduce the concept of re-encryption process using the intermediate peer among the group of peers to enhance the security so that the peer’s id is hidden from the ad-server as well as the primary peer to avoid unauthorized process. Read More...
|
Computer Science and Engineering |
India |
788-790 |
192 |
A Comparative Analysis of the Filter Bank Spectrum Sensing methods for Cognitive Radio a Brain Empowered Technology
-Ankita Jain ; Dr. Deepak Nagaria
Cognitive radio, an innovative approach to explore natural assets effectively: radio electromagnetic spectrum. It has emerged as fascinating wireless technology that effectively makes use of under-utilized spectrum to change the future technologies. It is basically an evolution of software defined radio which provides intelligence, learns from the environment and adapts itself keeping two purposes in mind.
- Whenever and wherever required reliable communication is provided.
- Radio spectrum is effectively utilized.
For effective utilization of the spectrum cognitive radio looks for the vacant spectrum or the underutilized spectrum. Hence at every knob of the Cognitive radio, network is bolstered by a spectrum analyser. This paper includes a comparison of filter bank sensing methods, a contrivance in CR systems for spectrum sensing. Wherein, performance evaluation of Filter Bank Spectrum Estimation and period-gram spectrum estimation is been done. FBSE has been analysed to be done without any cost.
Read More...
|
Electronics & Communication Engineering |
India |
791-793 |
193 |
Integrity and Security using Model Web Services
-R.Yuvaraju ; Dr. Chakaravarthi.S
Now a days, We are using “open Applicationsâ€, are (e,g Social Networking ,News and Blogging), these applications are non-confidential. My work involves securing the web services over SOAP, based on the HTTPI. Approach through an experiment and show that provides higher throughput, lower average response time and lower response size than HTTPS based web service security. The end to end security guarantee of HTTPs only allows web content Delivery Networks (CDN). Based on these observations, we have designed a lite protocol for secure web HTTP Integrity. HTTPI relies on HTTPS to share session keys and use them for keyed hashing HTTP page. Read More...
|
Computer Science |
India |
794-796 |
194 |
Utilization of Quarry Fines in Cement Concrete Paver Blocks for Medium Traffic
-Mamohan Raghuvanshi ; Abhay Kumar Jha
Solid unreinforced cement concrete paver blocks is a versatilely used for the construction of roads. This project is part of a study investigating the structural characteristics of cement concrete paver blocks using various combinations of Natural River sand and quarry fines. Here quarry fines will complete replace river sand as fine aggregate in concrete. Samples of concrete cube were made using varying contents of River Sand and quarry dust as fine aggregate. The quantity of River Sand was varied from 0% to 100% against quarry fines at intervals of 20%. The samples were cured for specified periods and tested in the laboratory for compressive strength. Workability tests were earlier carried out to determine the optimum water/cement ratios for three different mixes. M40 mix was designed as per IS specification with water cement ratio 0.40. Read More...
|
Civil Engineering |
India |
797-799 |
195 |
Human Resource Management in Technical Education: Status in India
-Soumyendra Nath Basu ; Soumi Das
India has made remarkable progress in engineering and technical education over the last two decades. In a teaching-learning environment a teacher plays various roles. Ramsey (1999) says, “The role of an effective manager is to create a climate that welcomes, supports, and rewards innovative thinking and problem solvingâ€. A teacher provides students’ motivation and interest for life-long learning and urges them to become autonomous learners. Technical education is widely recognized as an important part of the total education and training system. The real challenge is how to reposition it in response to the global forces driving change in a knowledge based economy. Since Independence, the Technical Education System has grown into a fairly large-sized system, offering opportunities for education and training in a wide variety of trades and disciplines at certificate, diploma, degree, postgraduate degree and doctoral levels in institutions located throughout the country. Read More...
|
Humanities |
India |
800-804 |
196 |
Integrity Verification of Shared Files on Cloud Computing
-Shaikh Shahrukh ; Jadhav Ganesh Arun; Khan Samim; Naikwade Pravin Ramesh
On cloud we can store and share files. In cloud, there is Third Party Auditor (TPA) which performs auditing of shared files. While auditing, it may happen that some data will be visible to TPA, the TPA may misuse it. In this paper, we proposed a system that will assign rights of TPA to the user who shares the file. This will reduce the significance of TPA form the existing system. Read More...
|
Computer Engineering |
India |
805-806 |
197 |
Low Cost Driver Circuit of V/f Drive for Three Phase Induction Motor using Microcontroller
-Hemish R. Choksi ; Payal P. Raval
The primary function of the gate drive circuit is to convert logic level control signals into the appropriate voltage and current for efficient, reliable, switching of the IGBT module. An output driver stage consisting of small power MOSFETs or bipolar transistors convert the logic levels by alternately connecting the IGBT's gate to the appropriate on and off voltages (VON and VOFF, respectively). Most gate drive circuits also isolate the low level logic signals from the dangerous high voltage present in the power circuit. In this paper, V/f control principle is summarized and simple IGBT gate drive circuit with over-current protection is proposed with frequency control module and rectifier bridge module to implement of V/f drive for induction motor. Driver circuit test results are shown. Read More...
|
Electrical Engineering |
India |
807-810 |
198 |
Comparative Analysis of the Popular Websites used for Electronic Filing (E-Filing) of Taxes in India
-Nivedita Roy ; Dr. Renu Verma; Dr. Reena Dadhich
The portals used for providing any e-governance service to the citizens are very crucial. They serve as an interface to provide and use the services. So, these portals need to be carefully designed and developed to meet the requirements of the users. Studies have been done to understand the factors which contribute to the successful adoption of e-governance initiatives. Some of the important constructs identified for this are navigation, design, content and information and responsiveness. In this paper, these constructs have been used to do a comparative analysis of some of the popular websites used for electronic filing (E-Filing) of taxes in India. Read More...
|
Information Technology |
India |
811-816 |
199 |
Inverse Kinematics of Robot Manipulator with 5 Degree of Freedom based on ANFIS toolbox
-Payal Agnihotri ; Dr. V.K Banga; Er. Gurjeet Singh
In this paper, while using capacity of Adaptive Neuro-Fuzzy Inference Method (ANFIS) to master via instruction facts, you possibly can develop prediction of Inverse Kinematics of 5-degree of flexibility (DOF) manipulator in this function. Soon after researching the end result, it can be concluded that the couples capacity of Adaptive Neuro-Fuzzy Inference Method (ANFIS) is very useful because this method comes with a normal figure work with mix of Nerve organs Multilevel and also fluffy reasoning. This Productivity of ANFIS may be concluded by seeing the symptoms plan, continuing plan and also normal possibility plan. This particular existing examine with applying different nonlinear products with the prediction from the Inverse kinematics of 5-degree of freedom robotic manipulator will offer an invaluable way to obtain info with regard to different products. On this document all of us use anfis formula with matlab and discover forwards and also inverse kinematics of all 5 dof robotic arm. Read More...
|
Electronics & Communication Engineering |
India |
817-820 |
200 |
Clustering Mechanism to Mitigate Vampire Attack
-Anjali Nair ; Anu Maria Sebastian; Divya T Sunny
As an emerging platform wireless Adhoc sensor network emerged in the field of remote sensing data assessment, analysis. Today network plays main role in one’s life mainly communication take place through this network so network security is one of the main concern. The security work in this area is mainly focusing over denial of communication at the routing or medium access control level. Network survivability is one of the main concerns. It reduces the battery power of the network hence one cannot send message through that network for the desired time it will be expensive to use new battery. In this paper we are trying to reduce this kind of attack in wireless sensor network by using cluster mechanism. Here we are using MOCA(Multiple over lapping cluster Algorithm)it create new cluster in each desired or valid route. Read More...
|
Computer Science |
India |
821-823 |