No. |
Title and Author |
Area |
Country |
Page |
1 |
Position Control for Two Wheel Mobile Robot
-Naveen Kumar ; Joe Xavier Deepak.J; Vignesh.N; Praveen kumar K; A.Elango
In two-wheel mobile robot various interrupt handling mechanisms such as timer overflow interrupts, timer compare interrupts, serial interrupts for doing specific tasks. In this research, we will have interrupt concept and will implement external hardware interrupts for position estimation of robots using position encoders. Interrupts that flow of the program and cause it to branch to ISR (Interrupt Service Routine). ISR does the task that needs to be done when interrupt occurs. Whenever position encoder moves by one tick it interrupts the microcontroller and ISR does the job of tracking position count. Each interrupt has a vector address assigned to it low in program memory. When the interrupt occurs, the program completes executing its current instruction and branches to the vector location associated with that interrupt. When an interrupt occurs, the return address is stored on the system stack. The RETI Assembly language instruction causes the return address the stack and continue program execution from the point where it was interrupted where position encoders which give position and velocity to the robot in the form of feedback. In this robot control position and velocity in a closed loop .In the position encoder which consists of optical encoder and slotted disc assembly. We get square wave signal where pulse count position and time period indicates velocity when this slotted disc moves in between the optical encoders. Read More...
|
robot |
India |
1-3 |
2 |
A Review on Edge Detection for Pharmaceutical Drugs
-Shilpa ; Arun Bhatia
Edge detection is a necessary tool in image processing, machine vision and computer vision and plays a vital role in the field of feature detection and feature extraction. Edge detection has various applications in image processing such as image automation, remote sensing, criminology, security, medicines, military applications etc. Edge detection has a major role in pharmaceutical industries. In Pharmaceutical industries, drugs i.e. Tablets and Capsules are produced in a large scale every day. These tablets and capsules may not be produced precisely i.e. .they are in damaged form when produced. It could also happen that drugs are missing in a blister. So, Proper inspections of these pharmaceutical drugs are required. So edge detection helps in inspection .This paper presents comparative analysis of various edge detection techniques. Read More...
|
Electronics & Communication Engineering |
India |
4-7 |
3 |
A Survey on Pixel Enhancement Techniques
-Vijendra Kumar Shakya ; Prof. Nishchol Mishra; Dr. Sanjeev Sharma
Conventional images are store an exceptionally constrained element range of shine. The genuine luminance in the brilliant region of such images is regularly lost because of clipping. When clipping changes the colour ratio of a pixel, it also results in colour distortion. In this survey, explore existing algorithms and ways to improve both the luminance and chromaticity of the clipped pixels. A literature of various work in HDR presented. Read More...
|
Computer Science and Engineering |
India |
8-11 |
4 |
Enhancing Exception handling and Security in Object-Oriented by using Aspect-Oriented programming
-Sarita Singh
Exception handling is a mechanism that provides an efficient way to handle errors in software applications. In object-oriented programming handling of exceptions constitute problems of code tangling and repetitive code. A spoofed parent class in place of parent class may be used to manage the exception. If we implement security concern using Object-Oriented Programming we face not only the problem of code scattering and code tangling but also there is a problem of unreliable implementation of security concern. Traditional techniques have lack of modularity to implement concerns like exception handling and security that creates many difficulties in the development and maintenance for the concerns. In order to centralize security and exception handling that increase its modularity and reusability and provide intensified verification and security in accessing of resources, we put forward existing methodology for Aspect-Oriented security and exception handling into an Object-Oriented System. Read More...
|
Software Engineering |
India |
12-14 |
5 |
Effect of Reflector on the Performance of Yagi patch antenna at S band
-Vora Misbah Gulam Hussain ; Prof. A. K. Sisodia
This paper presents the design and simulation of a microstrip Yagi array antenna operating at 2.8GHz, to be used in Doppler RADAR for vehicle speed measurement and material detection. This paper presents a Microstrip Yagi antenna with very good performance at 2.8GHz frequency. The advantage of the antenna is it can achieve a high gain. The front-to-back ratio of the Yagi array is higher.The antenna array has a low profile and provides a high gain and quite large beamwidth so more targets in desired range can be detected. In this paper effect of reflector on yagi antenna is studied. The designed antenna with Coaxial feeding is simulated using Advanced Design System(ADS) tool. Read More...
|
Electronics & Communication Engineering |
India |
15-18 |
6 |
A Review on License Plate Detection and Recognition
-Vivek ; Dr U. L. Bombale
License plate recognition is process of extracting License plate area from image and converting them into human recognizable characters. License Plate Recognition has been widely used for Traffic surveillance, law enforcement, Parking and toll collection System. Automatic License plate recognition (ALPR) is also called as automatic number plate recognition (ANPR). ANPR system is divided into Image acquisition, License Plate extraction and Segmentation, and Character recognition. This paper represents different algorithms proposed by researchers for recognizing license plate from captured image. Read More...
|
Electronics Engineering |
India |
19-20 |
7 |
Design of Compact Evaporative Cooler to Improve Cooling Efficiency and To Evaluate Performance of Different Cooling Pad Material
-Rajat Shekhar ; Dr. M K Chopra; Dr. Rajesh Purohit
The concept of evaporative cooling to provide comfort to human beings in a building is not new and has been used in different parts of a world by using different ways and materials. Vapour compression refrigeration system and Air-conditioning using gases like CFCs and HFCs reduces the utility of evaporative cooling though they have capacity of ozone layer depletion. So many manufacturers have come with different shaped evaporative coolers and different types of pad materials. In this work new evaporative cooler is designed which is semi-circular in shape instead of rectangular shape (normally used now a days) and the comparison between rectangular shaped cooler and new designed semi-circular shaped cooler is made with Khus as a cooling pad material in terms of temperature drop, humidity rise and cooling efficiency. By using Semi-circular shaped utilisation of water increases, more volume of air comes in contact due to stream line pattern, require less cooling pad material and become compact, thus required less space for installation The newly designed evaporative cooler is consists of two tanks which are perfectly insulated to reduce heat transfer from water and is also incorporated with flow control valve to reduce water consumption and effect of dust mites. The result obtained shows that temperature drop in semi-circular shaped cooler is 5.80C as compared to 3.90C in rectangular shaped and also in rectangular shaped cooler humidity rise is more as compared to semi-circular shaped. The cooling efficiency is improved up to 20.43 % with new design. Also the cost of newly designed Semi-circular shaped cooler is less than rectangular shaped cooler.As well as performance of different cooling pad materials like Celdek, Khus, Coconut coir and Bamboo fiber (new material) is analyzed in terms of temperature drop, humidity rise and cooling efficiency by using normal water and chilled water with newly designed semi-circular shape cooler. Also best cooling pad materials in terms of human comfort and finally best cooling pad materials according to climate of Bhopal is analyzed in this work. The result obtained shows that maximum temperature drop takes place for Celdek followed by Khus, Coconut and least temperature drop is obtained for Bamboo fiber for both normal water and chilled water .While minimum rise in humidity is obtained for Bamboo for both normal and chilled water and maximum for Khus in normal water and Celdek in chilled water. But the humidity rise is less for chilled water than normal water. With respect to human comfort Celdek is a best materials followed by Coconut, Bamboo fiber and Khus. As per weather data of Bhopal, the climate of Bhopal in summer is hot and dry so best material recommended for the evaporative cooling in the climate of Bhopal is Celdek. Read More...
|
Mechanical Engineering |
India |
21-27 |
8 |
Planning, Designing and Implementation of IT Networks using Network Infrastructure and Security Measures
-Gagandeep Singh Kahlon ; Sukhwinder Kaur; Dr. R.C Gangwar
This paper gives you a brief idea about how we can design, plan and implement computer networks. The knowledge of this makes you a solid, well-rounded network designer. It trains you in multiple levels and areas regarding the ability to work with routed and switched networks. It includes the decision about which networking device to choose. How to assign IP addresses and what are the various schemes available for the same. What are the various security measures which are there for a network? It includes detailed knowledge about all the devices which we can use for designing a network. It fully develops your networking knowledge and helps you add value to any organization’s network. Read More...
|
Computer Science and Engineering |
India |
24-26 |
9 |
Experimental Investigation of Metal Matrix Composite Using EDM
-S.Bharanikumar ; G.Suresh; P.Sethu Ramalingam; C.Murugan
The aim of this work is to investigate the mechanical behavior and its relation with hardness and surface hardness of the silicon carbide particulate (SiC) reinforced aluminium matrix composite. Aluminium 7075 alloy is chosen as matrix alloy, in which zinc is the main alloying element. Three different additions of Si C were used and the weight fractions were 5%, 10% and 15%. Finally testing for the material is taken out with the necessary features such as chemical composition testing and Vickers hardness measurements. The surface roughness values for the EDM machined surface and casted surface is measured and shown by means of their graphical representation. At the end a metal matrix composite of aluminium 7075 and silicon carbide particulate is found out with their specific improvement in their surface roughness values. Read More...
|
Mechanical Engineering |
India |
27-30 |
10 |
Investigation of Effect of Deformity in Dose Calculation by Treatment Planning System Using Farmer Chamber
-Vindhyavasini Prasad Pandey ; Devi Prasad Pandey; Surendra Prasad Mishra; Sanjay Dixit
Purpose: Accuracy in dose prediction of dose calculation algorithms is very important aspect in external beam radiation therapy. This study investigates the effect of deformity on dose calculations computed by treatment planning system.
Methods: A phantom (30x30x30 cm3) containing rectangular solid water blocks and two 5cm air gaps was used for central axis dose calculations computed by collapsed cone convolution superposition algorithm (CCCS) and Pencil Beam Convolution algorithm (PBC) in Oncentra Dynamic Environment treatment planning system. Phantom is scanned by computed tomography scanner and the image data set is transferred to the planning workstation. Depth dose measurements were taken using a cylindrical ionisation chamber for identical beam parameters and monitor units as in the depth dose computations. The calculated and the measured percent depth dose (PDDs) were then compared. The data presented in this study included 6MV photon beam and field sizes of 3x3 cm2, 5x5 cm2, 10x10 cm2 and 15x15 cm2.
Results: The x ray beams traversed through the different media and interact as per the densities of the inhomogeneous material and deposits dose. The collapsed cone convolution superposition was within ±1.1% in the first water medium. However, upon traversing the first air gap and reentering the water medium, in comparision to the measurement s, the CCCS under predicted the dose , with difference ranged from -1.2% to -3.1% for 3x3 cm2, from -2.4% to -4.1% for 5x5 cm2, from -2.3% to -6.2% for 10x10 cm2 and -1.2% to -6.1% for 15x15 cm2.After the second air gap, the CCS continued to under predict the dose , and the difference ranged from -3.3% to -3.1% for 3x3 cm2, from -2.1% to -5.3% for 5x5 cm2, from -2.1% to -6.4% for 10x10 cm2, and from -1.3% to -5.4% for 15x15 cm2.
Conclusion: The CCCS under predicted the dose in water medium after the photon beam traversed the air gap region.
Read More...
|
Health,Safety and Environment Engineering |
India |
31-34 |
11 |
Cod Removal from Textile Wastewater by Electrocoagulation Using Iron Electrodes
-Neha Sai Nalge ; Prof. Shashikant R.Mise
This work presents removal of COD (Chemical Oxygen Demand) from Textile wastewater by Electrocoagulation (EC) process using Iron as a sacrificial electrode which is currently used for the purification of many types of water and wastewater. The effecting parameters such as applied voltage, electrolysis time and initial pH are studied to achieve higher removal. The performance of EC process is carried out in batch reactor. In this process, samples are taken out from the batch reactor at regular interval of 20 minutes. Results obtained show that the most effective removal efficiency is achieved at 1 A of applied current at 16V. Moreover, the experimental results also show that the COD removal is strongly influenced by the initial pH. EC is found to be very efficient at pH 9. The highest COD removal efficiency of 93.5% occurred at 16V at electrolysis time of 80 minutes with optimum pH 9. In this study, the EC process is proved effective and is capable in removing COD efficiently. Read More...
|
Environment Engineering |
India |
35-37 |
12 |
VHDL Implementation of Interrupt Controller
-AATHIRA.R ; CHITHRA.M; JAMSHITHA.M; J.S.DEVI
This project aims at the implementation of Interrupt Controller using VHDL (Very High Speed Integrated Circuit Hardware Description Language). The Interrupt Controller is an integral part of the computer system. It accepts all the interrupts generated, selects the interrupt with the highest priority and generates the appropriate redirected location. The 8259A is one of the most popular interrupt controllers in use today. The 8259A manages 8interrupts according to the instructions written into its control registers. It is designed to minimize the software and real time overhead in handling multi-level priority interrupts. It has several modes, permitting optimization for a variety of system requirements. In this project, the 8259A is designed to handle 15 vectored interrupts using VHDL.VHDL is chosen as the synthesis methodology for the ASIC (application-specific integrated circuit) design. The key advantage of VHDL, when used for systems design, is that it allows the behaviour of the required system to be described (modelled) and verified (simulated) before synthesis tools translate the design into real hardware (gates and wires). Another benefit is that VHDL allows the description of a concurrent system. VHDL is a dataflow language, unlike procedural computing languages such as BASIC, C, and assembly code, which all run sequentially, one instruction at a time. Through this project, the Interrupt Controller is intended to be designed in VHDL and tested using simulation in Model Sim. Read More...
|
Electronics & Communication Engineering |
India |
38-42 |
13 |
A Review on a Two-Door Frost-Free Refrigerator Subjected To Periodic Door Opening and Evaporator Frosting
-Dhiraj Ramadhin Singh ; Prof. Surendra Agrawal
An evaporator is mainly used in different application like used in food and beverage industry, in the pharmaceutical industry, one of the most important applications of evaporation is in the Air-conditioning system. Refrigerator-freezers energy consumption is greatly affected by room temperature, door opening and thermostat setting position. Two frost free household refrigerator freezers of the same capacity were tested in the laboratory to determine the sensitivity of their energy consumption to various usage conditions. Purpose of this Review paper is to assess some aspects of the design of evaporator and get the maximum heat transfer rate, pressure drop and efficiency Read More...
|
Mechanical Engineering |
India |
43-45 |
14 |
A Survey and Analysis Performance of Generating Key in Cryptography
-Jalpa Rajendrakumar Bariya ; Sneha Gaywala
In Digital world information security is very important, there is must required transmit secure and private information over the network. safety is also serious in broad variety of purpose. So whenever we transfer information between two parties it required cryptography techniques. In this paper we describe some different techniques and Core idea about the public encryption techniques and symmetric techniques that provide the security and how to generate key in different way and provide confidentiality and secure our data. Finally it conclude all types of techniques and compare it. Read More...
|
Computer Engineering |
India |
46-50 |
15 |
Novel Approach to Lane and Path Detection of Unmanned Ground Vehicles
-Rajeev Jha ; Ankush Dubey; Hammad Khan; Soham Mozar
In these growing technology, a lot of research has been going on in the road of vehicles, which also take all the ground vechicles , water vechicles and the vechicles that that are on air. It is usually use in military. Now a days, many universities and research institute are researching in new UGV technology for commercial use such as transportation service. Among this here we are concerned about the path detection. This monitoring and detection system includes lots of sensors. So the main intention over here is to acquire the same result with the use of less number of sensors and hardware. The way needed for the reduction of the road accidents has enhanced it to implement at a very high level. Autonomous vehicles has a very nice market due to there cost. To reduce the costs and facilitate the use of own vehicles to the local person, we have use less of sensors are very less and the cost is maintained as per the need.This is going to to the enhanced the computer version in private vechicles. In this the new concept of lane detection with sensors. We have introduce the new concept of path detection. We have introduce these concepts for the purpose of real time operation. Experimental results, obtained by applying the proposed concepts or methods on varying conditions of illumination, and making the use of real time video feed. A significant detection under varying conditions with a relatively simple hardware is observed. Read More...
|
Computer Engineering |
India |
51-52 |
16 |
A Mixed Approach of Color Image Feature Enhancement
-Lalit ; Lalit; Ankur Gupta
The process of image enhancement to improve image in form of brightness and contrast in different parameters. Many images suffer from poor contrast. Image enhancement improves an image appearence by increasing dominance of some parameters in image. Histogram equalization (HE) is that which is widely used for enhancing image due to its functionality which is simple. And another technique is Brightness preserving Bi-histogram equalization (BBHE) which is widely used for for enhancing brightness of the image. In this paper, hybrid approach by combining both these techniques to get more suitable result than original result is proposed. Read More...
|
Electronics & Communication Engineering |
India |
53-57 |
17 |
AODV Routing Protocol in VANET - A Survey
-Vikram Ghunsar ; Nisha V. Shah
Vehicular Ad hoc Network (VANET) is a new way of communication which includes communication between vehicles moving at high speeds on the roads. Vehicular Ad-hoc Network (VANET) is a most critical class of mobile ad-hoc network (MANET) that enables roadside vehicles to intelligently interact with one another and with outside infrastructure anytime anywhere in the global network. In this paper, a new routing protocol for VANET is presented so the work is like that AODV. Aodv is the basically MANET protocol but it has also best performance in the VANET. Aodv protocol has the RREQ, RERR and RREP request in algoritham so in this paper a basically survey that how aodv algoritham work in the VANET scenario. Read More...
|
Computer Engineering |
India |
57-60 |
18 |
A Protected Self-immolation Strategy in Cloud Computing
-Ayesha N. Shikalgar ; Aishwarya Dhobale; Pranali Talghade; Arti Kumari
With the quick development of versatile cloud services, it becomes extra and additional liable to use cloud services to share knowledge in associate passing friend circle among the cloud computing surroundings, Since it isn't potential to implement full life cycle privacy security, access management becomes a tough task, significantly when we tend to share sensitive data on cloud servers, thus on tackle this drawback, we've got an inclination to propose a key-policy attribute-based secret writing with time-specified attributes (KP-ABTS), a novel secure data self-destructing theme in cloud computing, among the KP-ABTS theme, each cipher text is labeled with a amount whereas personal secrets associated with a time instant, the cipher text can solely be decrypted, if every the time instant is among the allowed amount and so the attributes related to the cipher text satisfy the key’s access structure. The KP-ABTS is in a place to resolve some necessary security problems by supporting user outlined authorization quantity and by providing fine-grained access management throughout the quantity, the sensitive info are aiming to be firmly self-destructed once a user-specified expiration time, the KP-ABTS theme is tried to be secure beneath the choice l-bilinear Diffie-Hellman inversion (l-Expanded BDHI) presumption, comprehensive distinction of the protection properties indicate that the KP-ABTS theme planned by USA satisfies the protection wants and is superior to alternative existing schemes. Read More...
|
Computer Engineering |
India |
61-63 |
19 |
PSO based optimization of a PI controller for a Real time Pressure process
-K.Vijaya shanthi ; P.Aravind; R.Ramya; K.Swathy
Controlling pressure is one of the significant control actions that has been carried out in the industries. The objective of the work is to uphold the pressure in the closed loop at desired set value. The pressurized tank has the features of nonlinearity, sluggishness by tuning conventional PI methods. This paper focus on the development and implementation of an intelligent optimization to obtain an optimum PI controller setting for pressure control process. System identification of the process is done by process reaction curve method and found to be First Order Plus Dead Time (FOPDT) model .At first, a Proportional Integral (PI) controller based on Ziegler Nichols (ZN)-PI setting is designed and the results are compared with particle swarm optimization(PSO) based PI controller settings. The performance comparison of the designed controller settings are analyzed by time domain specification. The simulation results confirm that PSO-PI controller has improved dynamic performance on disturbance rejection. Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
64-67 |
20 |
Markov Decision Process, a Dynamic System for Enhancing the TCP Throughput in CR Network
-Pallavi Krishna Jadhav ; Dr. Swati V. Sankpal
In cognitive radio network TCP Throughput is one of the measure issues to improve the performance of the CR network. However most research work concentrated on performance improvement of TCP has weaknesses as follows:-The underlying parameters are only considered to increase the TCP Through-put, keeping the transport layer parameter unchanged. Hence to solve the above problem markov decision process base Algorithm is used in this paper. Formal decision analysis has been increasingly used to address complex problems in cognitive radio Network. The proposed work provides a study on the construction and evaluation of Markov decision processes (MDPs), which are powerful analytical tools used for sequential decision making under uncertainty. In this proposed work each CRN users autonomously decides modulation type and power to be transmitted in PHY layer, channels which is to be selected in MAC layer to get best TCP Throughput. Simulation result shows that the network can learn the optimal policy to improve the TCP Throughput in cognitive radio network. Read More...
|
Electronics & Communication Engineering |
India |
68-71 |
21 |
Language Identification System for Indian Languages
-Dattesh Birappa Naik ; Pravin Prakash Maske; Jeevan Rajendra Patil
In the area of text classification, identification of the language is a big challenge and an important problem to solve in Natural Language Processing. When it comes to the Indian Languages the complexity increases many fold as there are cases of many languages sharing a single script and a single language written in multiple scripts. It is important to have the knowledge about the language of the text before giving it for further processing. The language identification system will be aimed towards study and research in language detection methods in practice e.g. Naïve Bayes Classifier, Random Forest Classifier, Artificial Neural Network, Support Vector Machine and the recent work happening in this area. This study and research will be used for building a system to identify the language of the input text based on the findings as a feature of classification. The language identification system will be targeted to be developed generically so that it can be adopted for identification of multiple Indian languages based on the training given to it. However, the initial emphasis will be given on the few languages especially those which are written using Devanagari script e.g. Hindi, Marathi, Konkani. Read More...
|
Computer Engineering |
India |
72-74 |
22 |
Educational System in the village bharatinagar - a case study in north 24 parganas, west bengal
-Jaydeep Mandal ; Dr. Abhijit Das
The study was undertaken in the Namasudra Community residing in the Bharatinagar village in Habra-I block of Barasat sub-division of North 24 Parganas district in West Bengal state. The focus of the present paper was: to study the people their place of education that is the context of educational spheres, to study the concept of educational system, levels of education of the study area. To study the organizational structure and role of institutions and their changing aspects, to understand the issues and impacts of development projects on the people in the spheres of education in the area under study. The study possesses two major components In-depth school studies and Investigation ethnography. The data as per requirement of the aims and objectives collected from different sources, like, household’s members, teachers, school, students, parents and other welfare as well as administrative units. The primary as well as contextual data have been collected through: 1. Case studies 2.Intensive Interviews, 3. Participant Observations, along with the Structured Questionnaires. The secondary data have also been used from books, journal, administrative reports, under the purview of anthropological ethnography. The main findings of the study are: Formal Education and knowledge of villagers, Mead-Day-Meal scheme which is the main attraction for pre and primary level students in the village and its present situation. The education as well as knowledge of traditional norms and values has to be incorporated in the formal educational system of the village through campaigning, awareness camps along with the incorporate of the same in the course curricula. Read More...
|
SCIENCE |
India |
75-80 |
23 |
Securely Surveying and Removing Twin Data in Cloud
-Pritam Subhash Gote ; Swapnil Ambi; Dinesh Divekar; Dipak Shinde
As the cloud computing technology develops throughout the last decade, outsourcing information to cloud service for storage becomes a beautiful trend, that edges in frugal efforts on significant information maintenance and management. All the same, since the outsourced cloud storage isn't absolutely trustworthy, it raises security issues on a way to understand information deduplication in cloud while achieving integrity auditing. In this work, we tend to study the matter of integrity auditing and secure deduplication on cloud information. Specifically, aiming at achieving each information integrity and deduplication in cloud, we propose two secure systems, specifically SecCloud and SecCloud+. SecCloud introduces associate degree auditing entity with a maintenance of a MapReduce cloud, That helps purchasers generate information tags before uploading likewise as audit the integrity of knowledge having been keep in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced throughout the file uploading and auditing phases. SecCloud+ is intended motivated by the actual fact that customers invariably wish to write in code their information before uploading, and permits integrity auditing and secure deduplication on encrypted information. Read More...
|
Computer Engineering |
India |
81-84 |
24 |
Iterative Technique for Image Change Detection Using SAR Images in Wsn
-K.Gopalakrishnan ; S.Hariprabha; C.kothainayaki; R.Lavanya; N.Nandhini
Satellite remote sensing imagery has been used to path changes on the Earth surface for applications including, plantation monitoring, and urban database updating. To achieve this, different sensors have been investigated including optical, synthetic aperture radars (SAR) or multi-spectral sensors. Optical sensors provide high resolution images due to the involved wavelengths. Remote sensing images are commonly used to monitor the earth surface evolution, this surveillance can be directed by perceiving changes between images acquired at different times and possibly by different kinds of sensors. A demonstrative case is when an optical image of a given area is available and a new image is acquired in an crisis situation (resulting from a natural disaster for instance) by a radar satellite. In such a case, images with heterogeneous properties have to be equated for change detection. This paper proposes a new approach for similarity measurement between images developed by heterogeneous sensors. The approach exploits the considered sensor physical properties and specially the associated measurement noise models and local joint distributions. These properties are inferred through manifold learning. The resulting similarity measure has been successfully applied to detect changes between many kinds of images, including pairs of optical images and pairs of optical-radar images. In addition, both low resolution and high resolution are taken for speckle noise removal with various thresholds and are taken for similarity measurement and image classification using Enhanced Fuzzy C-mean Clustering (EFCM) algorithm. Read More...
|
Computer Engineering |
India |
85-87 |
25 |
Smart Bin Compactor
-Panday Harshad Rajesh ; Gawande Chetan; Usmani Mukhtar; Shaikh Azeem
To design the efficient bins capable to hold garbage 4 to 5 times its capacity and help avoiding overflow of waste and keep the area clean. In this paper benefits of installing smart bins compactors in the city are performed. The bin we are designing will compress tin cans, plastic bottles, card boxes. Also it is capable to keep animals away from garbage in turn reducing hovoc created by them. Accurate motion of lead screw through tool guidance and adequate compaction force to compress the waste without damaging the bin is essential functioning of the smart bin compactor. The bin is motor operated when the switch is pressed by the people on requirement. Read More...
|
Mechanical Engineering |
India |
88-89 |
26 |
An IIR Notch Filter Implementation on FPGA to Remove Power-line Interference from ECG Signal
-Samseera P P ; Asha Anna Joy; Dr. Mathew K
An Electrocardiogram (ECG) signal may be affected by different types of noises such as Power line interferences, Base line interferences and Electromyogram. For the accurate analysis of ECG signal these types of noises has to be removed. In this paper, we present a method to remove power line interference of 50Hz noise from an ECG signal. ECG signal is taken from MIT-BIH arrhythmia database. An IIR notch filter of cutoff frequency 50Hz is designed in Spartan6 FPGA for the removal of the power line interference noise Read More...
|
Electronics & Communication Engineering |
India |
90-92 |
27 |
Smart Generator Using Remote Monitoring Access
-Sruthi V M ; Sruthi V.M; Manidipa Sarkar; Prof. Shailesh Jadhav
This project focuses on the design and implementation of smart generator using remote monitoring access system. Our project aims at developing a smart generator which has various features that can nullify many day to day issues. The aim of this project is to gather all the information about the temperature rise by using a temperature sensor, vibration detection with the help of a vibration sensor and the level of fuel by using an ultrasonic level indicator. All these three parameters are detected continuously and if they cross the pre-defined limit, then the user gets alert as the buzzer will automatically turn on. Moreover the accurate billing and service reminders are being sent to the respective users with the help of GSM (Global System for Mobile Communication). The owner can continuously monitor the location of the generator using the Global Positioning System (GPS). Clubbing all these features into a generator makes this real time system a smarter one. Hence here, we have integrated web and embedded technology to remotely control the on-site equipment through the network without any barrier of region and time. Making any system smart is a basic need in today’s world. Read More...
|
Electronics and Telecommunication Department |
India |
93-95 |
28 |
Users Global Security through Cloud
-Yash Agrawal ; Aniruddha Khadse; Sapana Wankhade; Gaurav Nikumbha; T.H.Gurav
Research and development in the field of IOT are really boomed up in the modern days. Taking the advantage of this, we are trying to extend the concept of IOT for improving users’ security at any place at any instant. This idea basically works under SMAC (social mobile analytics cloud) to provide security and reliability to users. The fingerprint scanner is placed in a car. Any user who want to use the car need to register their fingerprint with basic information like name, blood group, age, etc. only at first time on the cloud. We placed a number of sensors in the car which get activated when an accident is happens and gives information to the system. The system in the car sends the information to users mobile as well as a number of emergency services like hospital and police through a cloud. If a user didn’t require any kind of help he can notify to a system. As user identification is done through fingerprint scanner specific user information is shared with emergency services which are the main goal of our research. Read More...
|
Computer Engineering |
India |
96-97 |
29 |
Video Inpainting Using Super resolution Based Inpainting
-Bhapkar Shital B ; Jadhav Durga L; Kadam Kalyani B; Sabale Nitin R
Image is playing an important role in our life. An Examplar-based in-painting method is introduced in this paper. Image In-painting fill the missing regions in an image which is perform first on a coarse version of input image. In-painting low resolution images are easier than that of high resolution images which reduce the computational complexity and less sensitive to noise. With different configurations, the low resolution input image is in -painted several times for the purpose of parameter setting & results are finally combined & super resolution algorithm is then used to enhance the quality or recovered details on image. Using different in-painting techniques low resolution image is in-painted & highly in-painted image are formed by combining result using single image super resolution algorithm. Read More...
|
Computer Engineering |
India |
98-101 |
30 |
DSP Based Power Factor Improvement using Single Phase Active Power Filter A review
-A.M. Bansode ; Prof. Dr. Mrs. N.R. Kulkarni
This project presents a technique for single phase power factor correction of non-linear loads employing an active power filter. The current control strategy is the same used in the boost pre-regulator, which is the average current mode technique. The project will focus on the design methodology and the analysis of the control strategy which allows the compensation of harmonics and phase displacement of the input current, for single and multiple non-linear and linear loads. Experimental results of an active filter controlling a 200W to 1KW rectifier with a capacitive filter, an 8OOW AC chopper and a 58OW multiple load, which consists of a rectifier with a capacitive filter and an AC chopper, are presented. In the last years the use of electronic equipment has been increasing rapidly. This equipment draws The current from the AC mains has harmonic components, which leads to low power factor, low efficiency, interference in some instruments and communication equipment by the EMI, overtaxed electrical-distribution systems, overheated transformers and electromagnetic fields. However, passive filters have many disadvantages, such as large size, resonance, and fixed compensation characteristics. Therefore, it does not provide a complete solution. The most usual single phase non-linear load is the frontend rectifier followed by a bulk capacitor, which draws current from the input during its charging. The boost pre-regulator is used to reduce the harmonic contents and improves the power factor. The current control loop consists in the average current mode technique. The boost pre-regulator has some disadvantage because it cannot be used in equipment already in service, and it is applied only to one kind of non-linear load which is the front end rectifier followed by a bulk capacitor. A very interesting solution is the use of a single-phase active power filter, which is connected in parallel with then on-linear loads. The active power filters concept uses in power electronics to produce harmonic components which cancel the harmonic components from the non-linear loads. It can limit harmonics to acceptable levels and can adapt itself in case of harmonic component alteration or even changes in then on-linear loads types. Usually the technique used to control the single-phase active filter senses the non-linear load current and calculates its harmonics. This project will focus on the design and the control strategy for a shunt single-phase active power filter. Read More...
|
Electrical Engineering |
India |
102-105 |
31 |
Design of a Model of Power Generation System Using Kites
-Sharun Mendonca ; Ravikantha Prabhu; John Paul Vas; Rudolf C Dsouza
most people associate wind power only with conventional wind turbines, but research has led to a yet new source of renewable energy, kite power. Kite power has the potential to be more economical than using wind turbines because kites can fly higher than turbines can operate. At higher attitudes, wind speeds and available power are increased. In order to bring this new concept to a higher state of public awareness, a kite power demonstrator was considered ideal. The work here will include a way of adopting two kites to harness power by alternately changing their angle of attack. The kite angle of attack will be changed in such a way that the force in one of the kite will be higher which pull the power line to its side rotating the turbine. Then the angle of attack will be reversed so it gives a churning effect. Reducing friction proved to be a challenging task. Using of bearing V pulleys is of great advantage to reduce friction. Read More...
|
Mechanical Engineering |
India |
106-108 |
32 |
Study on Seismic Behaviour of Gravity Retaining wall
-Kuldeep Sharma ; Dr.S.M.Ali Jawaid
In this paper discuss the calculating factor of safety. The strategy of gravity retaining walls in an earthquake-prone environment is generally constructed upon still analysis using an equal seismic coefficient. This can be a suitable approach, provided that the seismic coefficient is strong-minded from a rational analysis of real dynamic behavior. The report discusses the seismic strategy of gravity walls retaining rough backfill with no hole water. The general features of behavior are exemplified by field skills, outcomes from workroom model tests and from theoretical analyses. Both the conventional technique of design and the Richards-Elms (1969) method, based upon a similarity to a sliding block, are reread. An inadequacy of the sliding block similarity is discoursed, and corrections obtained using a two-block model are presented. Numerous birthplaces of uncertainty are examined in feature. The random nature of ground motions, uncertainty in resistance factors, and prototypical mistakes, including the important effect of deformability in the backfill. All of these results are then joint to improvement a probabilistic course of action for estimate seismically induced displacements of ramparts and an improved version of the Richards-Elms procedure of design. The risk that walls planned by the conventional method might experience unnecessary displacements is analyzed. Creator supplied keywords include: Retaining walls--design and assembly (LC); Richards Elms retaining wall design method (WES). Read More...
|
Civil Engineering |
India |
109-111 |
33 |
Intervention Model used for Telematics
-Sanjay Phatige ; Sreenivasa T.N.
Telematics refers to the use of wireless devices and "black box" technologies to transmit data in real time back to an organization. Typically, it's used in the context of automobiles, whereby installed devices collect and transmit data on vehicle use, maintenance requirements or automotive servicing. Telematics is a general term that refers to any device which merges telecommunications and informatics. Telematics includes anything from GPS systems to navigation systems with software installed for transmitting the vehicle data. [1] To manage the records of insured policy holders, a computer system for telematics solution would like to identify and communicate to policy holders, who consistently speed above the prescribed road speed. Ultimately the insurance company associated with telematics may choose to cancel the policies of continuous speeders. Initially the telematics system will extract data to identify what level of speeding that they wish to target for communication in the case of over speeding drivers in the case of harsh events. Telematics solutions can be built for client dashboard to include the details of over speeding per road speed category (speed limit set). The information can then be used in an intervention model to alert the driver about maintaining the prescribed speed. [2] In the present investigation, an attempt was made to develop an Intervention Model used for telematics industries to determine the over speeding behavior of driver by measuring the vehicle speed. Here a module was developed to extract vehicle data summary to be built, whilst this is a single extract to help telematics system to establish some rules which likely that they want it to populate each day for over speeding events to communicate it to driver for safety measures. Read More...
|
Computer Applications |
India |
112-115 |
34 |
Data Mining Based Network Intrusion Detection and Prevention System
-Amee Gala ; Shaista Hirapure; Darshana Bhadarka
Intrusions in computing environment are a very common undesired malicious activity that is going on since the inception of computing resources. A number of security measures have taken place for the last three decades, but as Technology has grown up, so as the security threats. With the whole world depending on computers, being directly or indirectly, it is a very important issue to prevent the malicious activities and threats that can hamper the computing infrastructures. From a security standpoint, network security should be a high priority when considering a network setup due to the growing threat of hackers trying to infect as many computers as possible .Our concern revolve around the user traffic NIDPS is the process of identifying and responding to malicious activity targeted at computing and networking resources using Data Mining technique to rectify the intruder in network. The user can deploy our approach into the system to assure a secured intrusion free environment. In this paper, we shall discuss the technologies in details, their functionality, their performances and their effectiveness to stop the malicious activity over a computer network. Read More...
|
Information Technology |
India |
119-121 |
35 |
Salary Prediction Using Big Data
-U.Palani ; K.Kavinilavurajan; M.Yasmin
The idea is to help the employers and jobseekers to figure out the market worth of different job positions by building a prediction engine for the salary of any Indian job ad. In this way, we would bring more transparency to this important market .So that Employers would determine more reasonable salary for a position. Also Employees could find more jobs based on their background information by using our recommendation system. "www.payscale.com" is the only website right now providing salary range for various domains. Still it is not accurate We can collect data from the many online job portals. Using web-scrapping method we can collect the data’s from the job portals and store it in the hadoop file system. The Hadoop file system enables you to process the large number of datasets at very quick time. Read More...
|
Computer Science |
India |
122-125 |
36 |
Overpowering Challenges in Agile Software Development: Principles, Future Directions
-Manas kumar Yogi ; Karri. Anupama Reddy; Kalaga. Sree Lekha
this paper presents the inherent challenges faced by practitioners of agile software methodology. The challenges will force the developers to revert back to old mechanisms. So, we also propose methods to overcome their fears about agile strategy to develop a software. We have developed this paper in to categories and in each category we state the obstacle and how to overcome that obstacle. Agile software has been advocated by six sigma companies as being both effective and sufficient. Effective because it produces working, defect free software and sufficient because it meets all short term, long term requirements. Agile software methodology supports individuals and interactions over processes and tools. Documentation is minimal and customer collaboration is given more priority than contract negotiation. Agile software development embraces change rather than saying it's not in the plan. It progresses in response to user feedback. In agile environment the project adapts itself to changes as rapidly as it is possible. Read More...
|
Computer Engineering |
India |
126-127 |
37 |
Secure Hybrid and Pair-Based Password Authentication Scheme
-Raut Manisha Shantaram ; Antre Ashwini P.; Lokhande Dipeeka S.; Musale Pradnya S.
As the increase in the amount of personal information in electronic forms, there is a need for securing this information. Alphanumerical or textual username and password (combination of text or number) is most common method of authentication, but these passwords are vulnerable to different attack like shoulder surfing, dictionary attack, password guessing etc. Later graphical passwords are come into existence, but the drawback of this is, it takes more time for authentication. To overcome these problems, we introduced new authentication scheme which is session password. In this we used a pair –based methods. In pair-based scheme we use textual password for authentication. Read More...
|
Computer Engineering |
India |
128-131 |
38 |
Common Fixed Point of Mappings Using Sequentially Weak Compatible Mapping
-Kamal Kumar ; Rajeev Jha
In this paper, we prove a common fixed point theorem for a pair of weakly compatible mappings using concept of sequentially weak contraction in which sequence of function is uniformly convergent to a continuous function, which generalise the results of Moradi et. al. [9].
Mathematics Subject Classification: (2001) AMS 47H10, 54H25.
Read More...
|
MATHEMATICS |
India |
132-134 |
39 |
A Regenerating Cloud Storage in Privacy Authentication System
-Vaibalan.S ; S.K.Manigandan
Cloud storage enable users to remotely store up their data and enjoy the on-demand high value cloud applications the local hardware and software management. The benefits are plain, such a service is also relinquish users physical possess of their outsourced data, which certainly pose new security risks towards the rightness of the data in cloud The scheme has chops encode text security in the random oracle model presumptuous a variant of the computational Die-Hellman trouble. Our system is based on bilinear map between group Existing remote inspection methods for regenerating-coded data only give personal auditing, require data owners to always wait online and grip auditing, as well as repair, which is from time to time impractical. We suggest a public auditing scheme for the regenerating-code-based cloud storage. allowing for the cloud data are dynamic in nature, the future design advance supports secure and resourceful dynamic operations on out sourced data, as well as lump alteration, deletion, and append Extensive security analysis shows that our scheme is verifiable secure under random oracle mode land trial evaluation indicates that our scheme is highly competent and can be feasibly incorporated into the regenerating code-based cloud storage. Read More...
|
Computer Applications |
India |
135-141 |
40 |
A Survey on Disease Ontology
-Sharmilla. J ; Sumathi. V.P
The sudden development of data and their broad use to solve compound tasks requires more intelligent techniques of knowledge handling. The current research work resulted in a notable number of semantic reference systems enhanced with repositories, vocabularies and ontology. The large use of ontology in the computer science has opened to many wings of knowledge. A lot of work has been done to build ontology for medical field. This paper brings an overview of the ontology that is built in medical fields such as for identifying Diabetes Mellitus, Cervical Cancer, Alzheimer’s disease which could be useful for researchers involved in medical areas and projects that include biology, medicine, health care information technology. The objective of this study is to analyze patients’ history and identify the cause for the disease. Read More...
|
Computer Science and Engineering |
India |
142-144 |
41 |
Evaluating Economic Load Dispatch Problem by Hybrid Particle Swarm Optimization for Three Thermal Generating Units
-Priyanka
The modern power system around the world has grown in complexity of interconnection and power demand. The focus has shifted towards the enhanced performance, increased customer focus, low cost, reliable and clean power. In this changed perspective, scarcity of energy resources, increasing power generation cost, environmental concern necessitates optimal economic dispatch. In reality power stations neither are at equal distances from load nor have similar fuel cost functions. Hence for providing cheaper power, load has to be distributed among the various power stations in a way which results in lowest cost of generation. Practical economic dispatch (ED) problems have highly non-linear objective function with equality and inequality constraints. Conventional methods such as lambda iteration method and gradient method have been applied to solve the Economic Load Dispatch (ELD) problem. However, this techniques don’t give optimal solution because they require incremental fuel cost curves which are piecewise linear and monotonically increasing to find the global optimal solution. Artificial Intelligent (AI) techniques like Particle Swarm Optimization (PSO) method do give optimal solution. PSO is applied to allocate the active power among the generating stations satisfying the system constraints and minimizing the cost of power generated. In present work, GLSPSA is proposed for solving ELD problems. The efficiency and effectiveness of the proposed technique is benchmarked for test case of three generating units. The results of the GLSPSA compared with that of other intelligence algorithms. Read More...
|
Electrical Engineering |
India |
145-149 |
42 |
Working Model of Magneto Hydrodynamics System
-Shubham Chaturvedi ; Rutanshu Desai; Vivek Karmakar
Magneto Hydrodynamics is a technique through which electrically conductive flue gases are passed through a magnetic field and as a result electricity can be generated. The preliminary requirement for working of MHD is electrically conducting fluids. So we replace the conventional flue gases produced by burning of coal by naturally available salty ocean water. To demonstrate this phenomenon, we conduct an experiment in which salt water is stored in a vessel. It is passed through the MHD generator located above with the help of pump as an experimental set up. Practically, ocean wave energy can be utilised to generate the pump power so that ocean salt water can be made to pass through the MHD generator at the requisite velocity needed. The MHD generator is a vertically held cuboid which contains taper on both ends designed using CAD software Creo Parametric 2.0, PTC. Two permanent magnets are arranged just outside the cuboidal generator’s two opposite faces to produce the necessary magnetic field. As salt water passes through the generator, by MHD principles, electricity is generated and extracted with the help of two copper plates assembled mutually perpendicular to flow and the magnetic field inside the generator. The water then flows back to the stored vessel after passing through the generator. In this way, pollution free and easily available ocean water can be utilized to produce energy with negligible maintenance since it has no rotating part. Read More...
|
Mechanical Engineering |
India |
150-152 |
43 |
Design and Analysis Of Molybdenum Disulphide Coated Leaf Spring
-Sethu Ramalingam.P ; Murugan.C; Suresh.G; Bharanikumar.S
The auto mobile industry has shown in interest in the replacement of steel spring with composites for the purpose of high strength to weight ratio. The composite material like fiber glass, fiber, polymers were leads to high production cost and requires design modification. But in existing leaf spring are made by materials like carbon steel (C, Si, Mn etc.) and alloy steels (Cr,V,S,Ph etc.) which has the spring material have problem in deflection and can’t withstand high load. So this paper deals to avoid the above problems by using surface coating on leaf spring and also changing the shape of the spring from hyperbola into parabola which helps to increases the deflection of the spring for high loads. Because of above reliability of the spring also increased with low fabrication cost. Read More...
|
Automotive Engineering |
India |
153-155 |
44 |
Soiling Losses for Different Solar PV technologies in a Rooftop of a Metropolitan City
-Santhosh Thangaraj ; Mythreyi Velury
Soiling is the accumulation of dust on solar panels that causes a decrease in the solar photovoltaic (PV) system’s efficiency. The abstract is to show and quantify the soiling losses in a Solar PV Module which affects the generation efficiency. Installation of Solar Rooftop PV System are gaining momentum and its high time we realize how inefficient our PV system if it is not maintained properly. This abstract gives a quantified data of how much losses happen in PV modules due to soiling studied for a month by comparing the difference in generation between cleaned and uncleaned solar modules in a metropolitan city like Bangalore (The study was conducted on the four different types of module technologies installed in a single rooftop of Infosys MNC Building, Bangalore for a period of one month). Read More...
|
Solar Energy |
India |
156-159 |
45 |
Modelling and simulation of 1 KW solar generation system to grid connected with use SPWM & SVPWM.
-Pranavkumar Patel ; Pranavkumar Patel; Sunil Bhatt
This paper present solar photovoltaic (PV) generation system to gird-connected with low harmonic distortion in the output voltage. Solar generation system utilizes maximum power point tracking is achieved with perturb and absorb (P&O) Method. In three level diode clamped inverter implementation of sinusoidal pulse width modulation (SPWM) as well as Space vector pulse width modulation (SVPWM) techniques for pulse width modulation and generation of gate pulse. In this paper first a model for SPWM is made and simulated using MATLAB/SIMULINK software and its performance is compared with SVPWM. The simulation study reveals that SVPWM voltage more effectively and generates less Total harmonic distortion (%THD) when compared with SPWM. Read More...
|
Electrical Engineering |
India |
160-165 |
46 |
Theft Intimation for Goods and Vehicle
-Ravindra M. Rasure ; Pranoti S. Dhemare; Prof. Shailesh Jadhav
Consolidating the Global Positioning System i.e. GPS and Global System for Mobile Communication i.e. GSM Technology an Embedded wireless system named Theft Detection of Goods and Vehicle Tracking system is propounded. This is a long distance real time vehicle surveillance and security system. In this system load cell is used to fulfil the critical need of continuous weight monitoring of goods in a vehicle and real time tracking of the vehicle. Read More...
|
Electronics and Telecommunication Department |
India |
166-168 |
47 |
A Fusion Approach Of Video Shot Boundary Detection And Video Annotation: A Review
-Dhruvi K Patel
Now a day, large volume of digital videos has become available online to the masses and people are interested in searching videos containing specific information. Video image processing is a technique to handle the video data in an effective and efficient way. It is one of the most popular aspects in the video and image based technologies such as surveillance. Shot change boundary detection is also one of the major research areas in video signal processing. The insufficiency of labeled training data for representing the distribution of the entire dataset is a major obstacle in automatic semantic annotation of large-scale video database. Semi-supervised learning algorithms, which attempt to learn from both labeled and unlabeled data, are promising to solve this problem. In this paper represent a review on video shot boundary detection and video annotation. Read More...
|
Computer Engineering |
India |
169-173 |
48 |
Design of 4 Bit Digital Phase Shifter at 2.85 GHz Using Lumped Network for Beamforming
-Gohil Karan J
This Paper Demonstrates design and simulation of 4-bit digital phase shifter at 2.85 GHz using lumped components for beamforming. The phase shifter is developed using high pass/low pass technique. BAP51-02 PIN diode used to implement Single pole double through switches and Industrial components used as Lumped components. For demonstration purposes, a 45° phase shifter is designed with BAP51-02 PIN diode switches in ADS (Advanced Design System) software. Read More...
|
Electronics & Communication Engineering |
India |
174-178 |
49 |
Design Of High Power Amplifier At 3.4 GHz For Satellite Transponder (IRNSS)
-Patel Neel K
this paper gives a step-by-step of the design, simulation and measurement of a Power Amplifier (PA) operating frequency from 2.5GHz to 4.5GHz. The design of Class a Power amplifier was performed in Agilent ADS and the performance was tested with SZA3044Z BJT. Read More...
|
Electronics & Communication Engineering |
India |
179-182 |
50 |
Design of Low Noise Amplifier at 3.4GHz for Ranging Transponder (IRNSS)
-Patel Mehul D.
This paper describes the design and simulation of a single stage Low Noise Amplifier (LNA) at 3.4 GHz frequency. The single stage amplifier is designed by using MGF4941AL super –low noise InGaAs HEMT. This low noise amplifier (LNA) is design for application of Receiver Ground Station in Ranging Transponder of Indian regional navigation satellite system (IRNSS). The key points are analysis device's stability with Stability factor and the input and output impedance matching with Smith Chart and Tuning. Finally, the performance parameters of LNA were obtained with the simulation of S parameters. The target simulation are gain (S21) with >15dB, noise figure with <2dB, Input and output return loss <-10dB. A single stage LNA has successfully designed with 18.025dB forward gain (S21), 1.750dB noise figure, -11.040dB input return loss (S11), -10.201dB output return loss (S22) by ADS software. Read More...
|
Electronics & Communication Engineering |
India |
183-185 |