No. |
Title and Author |
Area |
Country |
Page |
351 |
Semi-Automatic Bearing Washing Machine
-Vaibhavkumar B Vaghani ; Katrodiya Tushar; Amit Bhati; Sagar Tilala; Ankit Panchal
This paper represents the Semi automatic bearing washing machine in which the water jet spray nozzle used for striking water on the messy bearing. Messy bearing seated on conveyor belt. There are two main phase consider in this machine. In which first portion is use for water jet spray striking on bearing and second one is used to drying the bearing. In the second portion we use the hot air blower for make the bearing dry. Hot air blower fitted at ceiling of second portion of machine .The process of bearing washing is continuous due to constant running of conveyor belt. Read More...
|
Mechanical Engineering |
India |
1278-1279 |
352 |
Automatic Emotion Recognition Techniques
-NADHEERA K.M ; SNEHA RUBY MATHEW
Facial emotions are the powerful, natural and immediate means of nonverbal communication for humans. There are six basic emotions which are anger, disgust, fear, happiness, sadness, and surprise. Automatic emotion recognition is interesting and challenging and has applications in areas like artificial intelligence, computer vision etc. Emotions can be recognized using different modalities like facial expressions, body movements, gestures or speech. To extract facial features from an image geometric feature-based and appearance based methods can be used. For the emotion recognition purpose various machine learning algorithms have been already applied e.g. SVM, decision trees, linear discriminant analysis, Bayesian networks, naive Bayes, neural networks. For the effective emotion recognition for real-life applications a combination of adaptive classifiers can be used. For speech, the prosody-pitch, intensity and duration- carry information related to emotions. This paper presents a review on various automatic emotion recognition techniques which uses one of the modalities like facial expressions, brain activities or speech. Read More...
|
Electronics & Communication Engineering |
India |
1280-1285 |
353 |
RFID Based Automatic Billing Trolley
-Pooja Bhagwat ; Prof.S.S.Shah; Rinku Bhandari; Divya Mhetre
Now days purchasing and shopping at big malls is becoming daily activity in metro cities. We can see a huge rush at malls on holidays and weekends. The rush is even more when there are special offers and discounts. People purchase different items and put them in trolley. After total purchase one need to go to billing counter for payments. At the billing counter cashier prepare the bill using barcode reader which is time consuming process and results in long queues at billing counters. Our aim is to develop a system that can be used in shopping malls to solve the above mentioned challenge. The system will be placed in all the trolleys. It will consist of RFID reader. All the products in the mall will be equipped with RFID tags. When a person puts any products in the trolley, its code will be detected and the price of the product will be stored in memory. As we put the products, the costs will get added to total bill. Thus the billing will be done in the trolley itself. Item name and its costs will be displayed on LCD. Read More...
|
Electronics and Telecommunication Department |
India |
1286-1287 |
354 |
Workload Allocation Scheme for Mobile Social Network
-Meera.V ; Fiverose.P.A; Priyanka; Athulya.O.K
There exists many idle resources in the network which can be used to accomplish huge tasks. In this paper, we focus on those idle computational resources especially in mobile social networks (MSNs). Based on the unique features of MSN, open-crowdsourcing is introduced. In the proposed system, a large work is divided into smaller modules, and is distributed among the nodes. Still the partition of work segment is a critical problem. The lack of global information, leads to unbalanced workload distribution on participating nodes. In this paper, we find that, for a work at different processing stages, one should adopt distinct workload exchanging schemes. Based on this observation, we propose an adaptive workload allocation scheme. This approach improves the system throughput and reduces the completion time of the task. In addition to traditional scheduling parameters, we consider a human’s rejection, contact delay, and social similarity. Read More...
|
Computer Science and Engineering |
India |
1288-1289 |
355 |
Remote Password Operated Load Control Through Android
-CHANDAN BENIWAL ; HEMANT CHAUDHARY; DIWAKAR PATIDAR; HIMANSHU SACHDEVA; AVADHESH KR. SHARMA
Automation of any system or the surroundings of any human being increase comfort, efficiency and ease of living. Automatic systems are often considered as luxurious. There has been a significant advancement in this area of automation. In today’s world, we can find almost all the people stick to their mobile phones all the way through the day. So with the help of this device – a mobile phone, some daily household tasks can be accomplished in a easy and efficient manner. New mobile users are attracted towards Android based phones. Android has become a second name for a mobile. Home Automation System (HAS) is designed to control a number of home appliances like lights, fans, bulbs and other devices using switching relay with the use of mobile phones having Android platform for the automation of an 8 bit Blue-tooth join together with microcontroller. This paper presents the automated approach of controlling the devices in a household in a different manner than the current approach of switch. Blue-tooth is used here for the automation of the system. This system is a step towards the ease of the tasks by controlling different appliances in any household or office which can also benefit elderly people making them self-reliant for some tasks. Read More...
|
Electrical Engineering |
India |
1290-1293 |
356 |
Design and Implementation of Campus Connect
-Abhijeet Ramesh Dhuri ; Kshitij Milind Joshi; Nikhil Nandkumar Gosavi; Sulakshana B Mane
the current way of teaching and learning process involves asking queries and solving those doubts inside the four walls of the classroom. The students who have any questions at that moment can ask the teachers. Other students and the teacher answers them. But there might come a situation when the student has some sort of query or doubt outside the classroom like at home while revising or studying. Few students might even be shy to ask any doubts in the class. Thus, their doubts might remain unsolved. In this project, we are developing an android based application for the students and teachers, where any student can ask any sort of doubt, question or query. Those questions can be answered by the other students as well as the teachers. Thus, our app would serve as a platform for quality education by providing an interactive Interface for the doubt solving and gaining abundant knowledge. This paper discusses the analysis of student and teachers interaction in an online asynchronous discussion forum. Read More...
|
Computer Engineering |
India |
1290-1292 |
357 |
Securing Cloud Data Access Using Attribute Based Encryption (ABE) Scheme
-P.R.Harshani ; G. Hari Priya; M. Kowsalya Devi; R. Sivaramakrishnan
Cloud computing provides flexible, low cost usage of computing resources but there may be a chance of data gets outsourced to some other cloud servers and various privacy concerns emerge from it. For protecting the data's that are stored in cloud servers, we are using ABE scheme (ATTRIBUTE BASED ENCRYPTION SCHEME). Whereas in existing schemes, less importance is given for privilege control and identity privacy. In this paper, data privacy and user identity can be addressed in anony control scheme. Anony control is secured under Decisional Bilinear Diffie Hellman Assumption. To achieve more efficiency we go for user revocation mechanism. Read More...
|
Computer Science and Engineering |
India |
1293-1296 |
358 |
Performance of Copper Slag and Foundry Sand in Concrete
-Rohan Chhajed ; Kalyani Shinkar; Varsha Dhanwade; Kishor Shelke
This state of art review represents the development in the field of utilization of foundry sand and Copper slag in cementations concrete. The paper reviews the utilization of Copper slag and foundry sand as the concrete constituent and the noticeable and important findings from the experimental works of various researchers. After a careful study, authors to integrate all the important results for streamlining the potential of this area of research. Based upon historical development on the individual material either copper slag or foundry sand is found as replacement of fine aggregate. The availability of copper slag and Foundry sand is large and causes lots of disposal problems. Even the use of river sand is banned in many of areas across India because of river depletion, so copper slag and foundry sand may be an effective option as a partial replacement of fine aggregate in concrete. The paper summarizes conclusions of experiments conducted for the properties like Compressive strength. It was observed the results have shown positive changes and improvement in strength of the conventional cementitious concrete due to the addition or replacement of fine sand with used foundry sand in different proportions. The best result obtained in present research for compressive strength of concrete are for 50-60% replacement of fine aggregate. Read More...
|
Civil Engineering |
India |
1297-1299 |
359 |
Wireless Sensor Network Based Greenhouse Monitoring and Control System
-Prof.S.L.Kore ; Bhagyashri Mane; Priyanka Satpute; Shanya Shukla
To obtain the best results from green house system, continuous monitoring and control system is required. This paper proposes a WSN based design to monitor and control the essential greenhouse parameters, such as, temperature (LM 35), humidity (HSY230) and light intensity. Here a main node is connected to the computer to analyse the input in visual basics and then produce the required output. All the parametric data is been sensed by the respective nodes and send to the main node via RF ZIGBEE (CC2520). The main controller ARM7 (LPC2138) will then send the data to the computer. Here the analysed input will get compared to the required output (pre-determined) in visual basics. the necessary changes will be send to the main node which will then transmit the signal to the respective nodes PIC CONTROLLER (16F877A) via ZIGBEE. The nodes will then initiate suitable commands to the specific devices to overcome the drifts in environmental parameters inside greenhouse. Making the system wireless will help in reducing the hardware cos and also increases the area for crop production. Read More...
|
Electronics and Telecommunication Department |
India |
1300-1301 |
360 |
Automated Arm Based OT (Object Transfer) Robot
-LISA C ; PAVITHRA H; PAVITHRA P RAJAN; SHRUTHI S; SMITHA M
Service robots are intelligent and helpful agents. They decrease the workload of human being and indirectly improve human life style. This project proposes an autonomous robotic system for a highly securable and reliable object transfer arrangement in a building. Assume a building with a central office as the object/file sender. An ARM based microcontroller LPC2148 is the microcontroller used here. It controls and co-ordinates all the process in a very effective & fast, real time way by its 32 bit programmed core. The microcontroller is programmed with a path algorithm from central office to each and every room in that building. This robot is provided by a mechanical lock arrangement for the secure transfer of objects. The receiver will be able to get the object when the correct RFID card is shown. A GSM modem is used to inform the sender and receiver before and after transaction. Read More...
|
Electronics & Communication Engineering |
India |
1302-1305 |
361 |
Design Manufacturing & Analysis of Compact Liquid Pump for Component Cooling
-Tanmay R. Vartak ; Premkumar M. Joshi; Hitesh A. Singh; Vaibhav B. Vanmali ; Prof. Madhumita Dutta
Taking into consideration the requirement of efficient and small cooling system in military and aerospace sector to reduce the heat generated to greater extend we need to discuss about pump which is the main component of cooling system. In this project light will be shed on TESLA PUMP which was patented by Nikola Tesla in 1909 but yet it is not used in military and aerospace sector. It uses stack of disks to propel fluid which leads to less cavitation and low power consumption as compare to other pumps of same size. Read More...
|
Mechanical Engineering |
India |
1306-1308 |
362 |
Wireless Smart Switch Using Android
-SHIRSATH GOKUL BALASAHEB ; THORAT SANDIP. S; PATIL S. M; CHORAGE P. J
The smart home techonology is increasing day by day with an advanced technology in wireless communication. The user can control appliances easily by his smartphone via bluetooth. The designing of smart switch with low cost becomes essential for smart home automation. This system is designed to assist and to provide support in order to fullfil the needs of elderly and disa-bled in home. This concept of smart home can improve the standard of living at home. This system uses bluetooth technolo-gy to provide for remote access from smart home. This technolo-gy can be used to provide a more safety control on the switches and they can be operated on low voltage. The advantage of this system is low cost, user friendly interface and easy installation. The low voltage switch eliminates the risk of dangerous electrical shock by wet hand. Read More...
|
Electronics & Communication Engineering |
India |
1309-1310 |
363 |
A Review: Design and Analysis of Arm of Reaper and Binder Machin
-Tejaskumar Patel ; Prof. Chetan Vora; Prof. Vipulkumar Rokad
The problem considered in this paper is on reaper and binder machine. It performs cutting and binding simultaneously. During operation in the field, we faced the problem of arm for binder which transmits the motion from the base mechanism to the fingers which collect the grass. We will carried out analysis for failure of arm and modify the design. Read More...
|
m.tech in machine design |
India |
1311-1313 |
364 |
Sea Oil Separator with Disc and Belt Skimmer
-Dipak Panditrao Dhonde ; Gadhe Pruthviraj Jalindar; Padol Kiran Balasaheb; Pawar Chetan Tusahiram; Dipak Panditrao Dhonde
Investigation of a novel parameter that considerably enhances the performance of disk and Belt oil skimmers is introduced. During the operating of crude oil, the transportation of crude oil requires the adoption of safety measures in port terminals. At sea accidents are further serious cause of oil pouring and cause of pollution. By careful optimization of the angle between the plane of the disk and the vertical plane, hence the efficiency of a conventional disk oil skimmer get doubled and this parameter is same as in belt oil skimmer. Therefore, this is particularly significant as it requires only a minimum effort to modify existing disk and belt skimmers. Results revealed in the presence of a minimum immersed area required for the offset angle to be effective. Around 80rpm optimum rotational speed was found, regardless of the design or operating parameters applied. The belt and disk skimmer will allowed the recovery of a high percentage of hydrocarbon in comparison to the traditional oil skimmers. The study of largest disk diameter , belt width and the oil film thickness of 20mm, obtaining the maximum improvement of 204% in oil recovery rate. Read More...
|
Mechanical Engineering |
India |
1314-1316 |
365 |
Air Conditioning system of Automobile using Turbocharger
-Ninad Ramakant Patil ; Vishal S. Kamble; Jignesh S. Mestry; Ashish A. Ramugade; Swapnil R. Mane
Conventional automobile air conditioning system draws power from the engine. The air conditioning system consumes quite a reasonable amount of fuel energy. This paper aims to utilize the kinetic energy of the exhaust gas from automobile engine as a prime mover for Air Conditioning system. This avoids the extraction of power from the engine. Turbocharger works on kinetic energy of exhaust gas. It is used for suction of fresh air from atmosphere to deliver at engine inlet. This function of turbocharger is used for circulation of refrigerant for air conditioning system of automobile. In this paper we have discussed various ways for using kinetic energy of exhaust gas for circulation of refrigerant. One of the way is that, turbocharger can be used itself as AC compressor by principle of centrifugal compression; else a separate AC compressor can be coupled with the turbocharger. This project validates the use of gas turbines as a power input for AC compressor. Third option is to use kinetic energy for generating alternating current which can be used for electric supply for AC compressor; else to get thermoelectric cooling. Also part cooling effect from AC system can be used as intercooler for the compressed air. Thus achieving regeneration system in automobiles itself. This brings out better use of exhaust gas. Thus it proves to be very helpful. Read More...
|
Mechanical Engineering |
India |
1317-1320 |
366 |
Train Collision Avoidance and Reduction of Speed Using RFID and ZIGBEE
-SHRUTHI A N ; S SARASWATHI; R ROOBINI; Prof. S DEEPA ROHINI
Rail network being the second largest in our nation, India and so train collision is one of the major concerns. More than 85 train accidents happened from 1980 to 2011 in India. In last two years itself more than 27 train accidents happened in India. To avoid this, we need reliable train collision avoidance system which is economical. This paper presents the development of a system to avoid train collision and derailment by reduction of speed using RFID (Radio frequency identification) and ZigBee. Track monitoring mechanism uses microcontroller and provides the required features to the system. Read More...
|
Electrical Engineering |
India |
1321-1324 |
367 |
Decentralized Model for Solid Waste Management in Basavanagudi Ward by using GIS Technique
-SNEHA R ; Dr. C.R. Ramakrishnaiah
Solid waste generation is growing at an alarming rate with increase in population and changing lifestyles of people. Unscientific way of waste handling, lack of infrastructure, co-ordination between the municipal authorities in creating awareness among the public leads to waste management problems. An attempt has been made to divert the organic waste to biogas plants and inorganic waste to nearby recycling units generated in Basavanagudi ward by using ARC GIS 10 software. This study works on ‘waste to wealth’ concept. If waste segregation at the source is practiced, then this is the best suited model for zero waste management. Read More...
|
Environment Engineering |
India |
1325-1328 |
368 |
CAAS:Trading Consistency for Availability
-Pratik S.Mahajan ; Shubhangi Sapkal; Dr. R. R. Deshmukh
As more and more charities and libraries move to cloud services, this technology is no longer novel; it's becoming the dominant paradigm in IT. A cloud storage facility is a need of an hour as it facilitates elasticity–so resource allocation can get bigger or smaller depending on a users’ demand, Elasticity enables scalability–so that the cloud can scale up when demand is high and down for less demand (e.g. allows for scale when an application in the cloud adds users, etc.), Resource Pooling, On Demand, Self-Service Provisioning i.e client can request desire service from cloud vendor and 24*7 service i.e high availability at cheapest price .But the key hindrance come when we need high availability;as it needed to create plenty of copies of single file and at different geography .To attain high consistency more money is needed. In this paper, we have presented unique, innovative, efficient and effective consistency as a service (CaaS) model, which consists of a various large capacity data clouds and small audit clouds .Data clouds are used to store clients actual data offered by Cloud vendors like Google, Amazon, Microsoft, etc .and Audit cloud are used to check consistency of cloud is maintained accurately or not. At the last we have applied traditional approach to audit purpose i.e Heuristic Auditing Strategy which uses 2 algorithm viz Local and Global Auditing Strategy. Loosely synchronized clock is needed to audit purpose. Heuristic Auditing Strategy is used to find violations in consistency terms i.e. document is modified or safe. Read More...
|
Computer Science and Engineering |
India |
1329-1332 |
369 |
RFID Based Automated Petrol Pump
-ASRAR AKHALAQ WAVEKAR ; SADDAM ISAK PATHAN; TOSIF NAJIR PATEL
The main aim of the project is to design a system which is capable of automatically deducting the amount of petrol dispensed from user card based on RFID technology. Liquid dispensing systems are quite commonly found in our daily life in different places like offices, Bus stands, Railway stations, Petrol pumps. Here we are going to present modern era petrol dispensing system which is meant to be operated with prepaid card using RFID technology. The project mainly aims in designing a prepaid card for petrol bunk system and also petrol dispensing system using RFID technology. In current days the petrol stations are operated manually. These petrol pumps are time consuming and require more man power. To place petrol stations in distant area is very costly to provide excellent facility to the consumers. All these problems are sorted out by the use of unmanned power pump which requires less time to operate and it is effective and can be installed anywhere. The customer self-going to avail the service has to done the payment by electronic clearing system. Read More...
|
Electronics and Telecommunication Department |
India |
1333-1334 |
370 |
Preparation, Characterization and Performance Analysis of Biodiesel from Linseed Oil
-SELVAN P ; Dr. Selwin Rajadurai; SUDALAIYANDI K
Enhanced use of diesel fuel, the source of diesel is decreasing rapidly. Due to over exploitation of fossil fuels, the environmental pollution has been increasing strenuously. According to the pollution and over exploitation of diesel fuel, have to move on alternative energy resources. That should be environment friendly and less pollutant. In this work we have selected linseed oil biodiesel is a fuel for Direct injection diesel engine instead of diesel fuel. Linseed oil produces high yield of methyl ester than other non-edible oils. And the performance test showed that B25 blend gives similar results of diesel. Read More...
|
Renewable Energy |
India |
1335-1338 |
371 |
Theoretical and Experimental Investigation on Exergy Analysis Of Internal Combustion Engine
-Parimal Prajapati ; Parimal Prajapati
This study presents energy and exergy analysis of a three cylinders four-stroke naturally aspirated spark ignition engine using gasoline fuel. Each test was performed by varying the engine speed between 1100 rpm to 3200 rpm with the interval of 300 rpm at 0.5 Kg load. The load was also varied from 0.5 Kg to 2 Kg with the interval of 0.5 Kg. and at each load the engine speed was varied. Then using the steady state data along with the energy and exergy rate balance equations various performance parameters of the engine were evaluated for each load case. It was found that almost all the performance parameters increased with increasing engine speed. Read More...
|
Mechanical Engineering |
India |
1339-1345 |
372 |
MOBI-Educloud: One Step Forward for Education System
-SAVI MOUNDEKAR ; Prof.S.B.GUJA
in this paper, the concept of mobile cloud computing in regard with the education system is explained. From last several years, Information Technology has changed the human life to another dimension. The major contribution can be given to the introduction of the concept of cloud computing. Basically Cloud computing is an internet based computing service. These services are utilized for working on the immense data stored over the internet. Rather than just storing the data these services can also be used for communication and various other activities. Taking into picture the scenario of the most popular handheld device i.e. the mobile phones, it is considered as the most effective and convenient method of wireless communication. As moving forward with this advance and techno savvy world we can make the best use of mobile and cloud to make great changes in the educational system. Due to the rapid growth of educational institutions all over the world there is a need of developing cloud architecture which can help storing and processing large data produced by these institutions. The solution for storing the educational data into more systematic manner is Mobile Cloud Computing and it can be reached out easily to all kind of people in all regions regardless of any time and place constraint, this can raise the quality of education system to a new level. Read More...
|
Computer Engineering |
India |
1346-1348 |
373 |
Impact of Fine Glass Aggregate on Concrete
-Mandar Kamble ; Bhupesh Wasnik
Glass is generally utilized as a part of our lives through fabricated items, for example, sheet glass, containers, dishes. Glass is a perfect substance for reusing. The utilization of reused glass assists in vitality sparing. The expanding familiarity with glass reusing accelerates examinations on the utilization of waste glass with distinctive structures in different fields. One of its huge commitments is to the development field where the waste glass was reused for solid generation. The use of glass in structural concrete still needs change. Lab tests were led to further investigate the utilization of waste glass as fine aggregates for enhancing properties of concrete such as compressive strength and from the test conducted it is clear that optimum 10% of squashed glass can be added in concrete as substitution of fine aggregate. The study demonstrated that waste glass can adequately be utilized as a fine aggregate substitution without considerable contrast in quality and abatement in material expense of concrete. Read More...
|
Civil Engineering |
India |
1349-1352 |
374 |
Advancement in different Biodiesel blends and its Performance: A Review
-AKSHAY SHELKE ; VIVEK W. KHOND
Most of the energy demand is fulfilled by fossil fuels in the world. Also these fuels are responsible for the rise in the amount of pollutants in the air which includes CO, HC and NOx. Different researches are carried out to obtain an alternate source of fuel which can replace the current fossil fuels. Hydrogen fuel and biodiesel rise as an alternative. Due to limitation of hydrogen fuel, it’s not practically possible till date to be used as fuels in automobiles. Biodiesel is one such alternative which can be used as a fuel and can reduce the pollutants emission to a certain extent. This paper contains the researches which were carried out in the field of biodiesel and its different blends to find out the feasibility of using it to obtain the desire results. Read More...
|
Mechanical Engineering |
India |
1353-1355 |
375 |
Crankshaft Profiling and Gauging System
-Ankit Pramod Bauskar ; Pallavi Gajmal; Amruta Ghube; Prof.G.R.Rahate
A Crankshaft is a mechanical part able to perform a conversion between reciprocating motion and rotational motion. It is located in the engine of a vehicle and converts the force created by the engine's pistons moving up and down into a force that moves the wheels in a circular motion so the car can go forward. Located inside the car's engine, it is connected to all the pistons in the engine and plays an important role in engine efficiency. Crankshafts are usually gauged using 2 methods, manual and automatic. Manual method includes usage of Vernier caliper and gauges. It also includes comparison of dimensional readings of crank with the hand drawn drawings. Thus the method becomes tedious, time consuming, less accurate and involves human interference. The currently used automated method includes gauging using completely automated machines like Coordinate measuring machine (CMM) and Virtual measuring machines(VMM) by virtue of image processing and laser technology which ultimately increases the cost. This project is motivated mainly by the need for inexpensive, more accurate and less complex gauging system. It also aims at providing the entire profile of the crank in the form of graphs, helping in analysis. Thus in this project we will develop a real time embedded and completely automated system for gauging the crankshaft. Read More...
|
Electronics and Telecommunication Department |
India |
1356-1358 |
376 |
Detection of Spoofing attack using Diffie-Hellman and Key Authentication using Elliptical Curve Cryptography
-S.DIVYA ; C.JANANI SRI; R.DHARANI; C.S. MADHUMATHI
A MANET is an infrastructure less network, which consists of number of mobile nodes with wireless network interfaces. In MANET the communication among the nodes will be in such a way that the nodes dynamically establish path among one another. The popularity of these kinds of networks created security challenges as an important issue. The nature and structure of such networks makes it attractive to various types of attackers. This paper focuses on the spoofing attack which takes the largest probability of occurrence in the ad-hoc networks. We have tried to resolve this issue using Diffie -Hellman technique and also the time and power is shown efficiently by implementing Elliptical Cryptography Curve (ECC) method. The protocol used in this paper for resolving the above issues is Dynamic Source Routing (DSR) based routing mechanism. The simulation results are provided which indicates the packet delivery ratio, routing overhead, throughput, energy and delay. Read More...
|
Computer Science and Engineering |
India |
1359-1363 |
377 |
Suspension Operated Air Conditioning System
-Mr. Tajane Sunil Triambak ; Mr. Sonawane Manoj Ganpatrao; Mr Kothule Ganesh Bhausaheb; Mr. Kawade Vikas Balasaheb; Prof. Mr. Salunke Ganesh Bhagwat
Current air conditioning system can reduce the fuel economy of vehicle by about 50 percentages and reduce the fuel economy of today mid-sizeVehicle by more than 20 percentages while increasing NOx by nearly 80 percentage and CO by 70 percentages. This idea comes out as efficiency of vehicle decreases because of compressor. After implementing this idea, the efficiency of vehicle will increase by decreasing compressor specification. The main concept is that the air conditioning effect will get on the basis of suspension system in vehicle. As a team, we designed the suspension operated air conditioning system. This system runs on the suspension of vehicle and will make the refrigerant is compress that store in receiver. We start to the project by first attempting to come up with an original idea to fit the trouble. After implementing this idea, to increase the efficiency of vehicle. Read More...
|
Mechanical Engineering |
India |
1364-1366 |
378 |
A Review on the Application of Nanofluids for Heat Transfer in Automobile Radiator
-Mayur Chaudhari ; Dr. P. V. Walke
Nanofluids are latent heat transfer fluids with superior thermo physical properties and heat transfer performance can be applied in many devices for better performances. Basically the nanofluid is prepared from nano particles of metal ranging from size (1-100nm) mixed with base fluid for heat transfer enhancement. This work explored a review about used of nanofluid for various heat transfer devices. Read More...
|
Mechanical Engineering |
India |
1367-1370 |
379 |
True Density Measurement of Solid Matter by Constant Volume Gas Pycnometer- A Review
-Meghavi Parmar
Gas pycnometry is based on Boyle'slaw, there are three kinds of gas Pycnometer are constant volume, variable volume and comparative volume. Gas Pycnometer are being used to obtain the material true density/volume, apparent density/volume and porosities of the particles, drugs, pigments, and ceramics Measurement.Measuring the volume/density of Irregular shape, Porous and non-porous material. It is also control the temperature for the reference and sample chamber, and pressure transducers, valve is also inside a special chamber with a same temperature distribution. Here, it is said helium Pycnometer because the helium gas used for a pressurized gas because its atoms are too small so that easily passed in all pores of the material and define its porosity from its density. We can measure the density with porosity of any types of solid material and other material with high moisture content. Read More...
|
Materials Engineering |
India |
1371-1373 |
380 |
Comparative Study of SAC-OCDMA, FE-OCDMA and SPC-OCDMA
-Resmi Gopinath ; Nelsa Abraham
This paper discusses a comparative study of three coding techniques in optical CDMA. Likes wireless CDMA in optical CDMA also each user is assigned with a unique signature sequence called code word. MUI is the main reason for system degradation in optical CDMA. The coding can be done on either amplitude called spectral amplitude coding optical CDMA (SAC-OCDMA) or in phase called spectral phase coding optical CDMA (SPC-OCDMA) or in frequency called frequency encoded optical CDMA (FE-OCDMA), comparative study of these coding techniques are carried out here. The effect of MUI ,PIIN and other noises on system performance are different for each coding technique. Read More...
|
Electronics & Communication Engineering |
India |
1374-1378 |
381 |
Dynamic Advertisement using GPS and GSM
-Sagar Hegishte ; Shalaka Kadam; Sushmita Mirajkar; Sonam Mishra; Aparna Kadam
Advertisements have become an integral part of the marketing world and are designed to inform and motivate the customers about the desirable products and thereby helping marketers to reach a precise goal. In order to make these Ads location specific, we have designed this project which would not only make them more relevant but also personalized and targeted to a particular group of audience. This paper deals with Location-based Advertisements (LBA) system with emphasis on their applications in Public Transit Systems (Buses, Trains, Airplanes, etc.).This paper also proposes the design and implementation of a low-cost embedded system using Global Positioning System (GPS) and Global System for Mobile Communication (GSM) technologies which displays these Ads on real-time information display system inside the vehicle. The objective of this review is to design a system which can be easily installed in any transit system and thus making efficient use of the technology. Read More...
|
Electronics and Telecommunication Department |
India |
1379-1381 |
382 |
Close Loop Speed Response of BLDC Motor using PI Controller
-Patel Milankumar Vinodrai ; Chaudhari Poojakumari B
Permanent magnet brushless DC motors (PMBLDC) find wide applications in industries due to their high power density and ease of control. These motors are generally controlled using a three phase power semiconductor bridge. For starting and the providing proper commutation sequence to turn on the power devices in the inverter bridge the rotor position sensors required. Based on the rotor position, the power devices are commutated sequentially every 60 degrees. To achieve desired level of performance the motor requires suitable speed controllers. Brushless dc (BLDC) motor drives are continually gaining popularity in motion control applications. Therefore, it is necessary to have a low cost, but effective BLDC motor speed/torque regulator. They are used in Residential and commercial appliances such as refrigerators and air conditioning systems with conventional motor drive technology. A Brushless DC (BLDC) drives are known for higher efficiency and lower maintenance. This paper presents a “Modelling and performance analysis of PID controlled BLDC motor and different schemes of PWM controlled BLDC motorâ€. This paper presents simple open loop response of speed, torque, stator current, back emf and verified the operation of BLDC motor. Read More...
|
Electrical Engineering |
India |
1382-1386 |
383 |
Biometric Based Secured Electronic Voting Machine
-B.Hema Maheswari ; V. Indhu Mathi; S. Ishvarya; C. Janani
the voting process is been fully manual and paper based. This process can be overwhelming, time-consuming and prone to security breaches and electoral fraud. These systems were still prone to electoral frauds and voters has to make tremendous effort in order to cast their ballots. We propose a technology which is the combination of RFID based voting system which will be used to provide security in order to avoid counterfeit voting. The Proposed machine in this system is faster, efficient, reliable, error free and secured as compared to previous voting system. Its main feature is ease to operate, avoid illegal voting and time consumption and reduce manpower. Read More...
|
Electronics & Communication Engineering |
India |
1387-1389 |
384 |
Intelligent Street Lighting System using Wireless Sensor Network and LED
-Mudathir Abdallah Osman Fagiri ; Amel Farah Mohammed
A gift card is a restricted monetary equivalent or scrip that is issued by retailers or banks to be used as an alternative to a non-monetary gift. Most of the gift cards issued by retailers are in paper form. Some of the e-commerce providers issue electronic gift cards. However, separate gift cards are issued by different retailers. It becomes cumbersome to manage all the gift cards. This paper proposes a solution for easy management of the gift cards with a single point of contact for user. A digital Gift Card Wallet would allow users to buy and save gift cards of multiple retailers. Read More...
|
Electrical Engineering |
Sudan |
1390-1393 |
385 |
An Anonymous Voting System (AVS)
-Rahul Pandita ; Vikas Singh; Vicky Patel
The paper we present is an e-voting system that uses the Homomorphic encryption to ensure anonymity, privacy, and security in the voting. It is able to perform calculations on the encrypted data itself and also encrypting the output of the operation automatically. For this reason, it is being used in applications that include secure multi-party computation, encryption of data, electronic voting, etc. Homomorphic encryption comes under privacy homomorphism. In this paper, we implement the homomorphic encryption mechanism to design an electronic voting system that has the feature or ability to keep separated the privileges among voters, candidates, and announcers. The experimental results show the application ensures anonymity in voting and also prevents cheating during the counting process, this also reduces the overhead of continuous encryption and decryption of the data which is present in the current encryption scenario thereby reducing the time-complexity of the algorithm. The application will use Two-Factor Authentication for validating the authenticity of the users, the application developed can be migrated easily between different DBMS and the application developed will be responsive and will offer rich User Experience while accessing the application on mobile and tablet devices. Read More...
|
Information Technology |
India |
1394-1396 |
386 |
Communication over Internet and GSM using Smart Doorbell
-Pramit Yadav ; Prashant Singh; Akhil Menon; Preeti Godbole
This paper presents the concept of enabling communication between a visitor at the door of a house and its owner in a situation when the owner is not available at home. There are no smart and convenient ways, at present, for the the owner to be notified about the presence of a visitor at his/her door. The world of ‘Internet of Things’ with Raspberry pi at its core allows a fascinating scope to ensure the same. Embedding a standard household doorbell into IOT and GSM network, the system provides a set of features which ensure that no visitor is left unattended or goes unnoticed by the owner of the house in cases when he or she is at work, out of station or just taking a nap on a lazy afternoon. As smarter living is at the core of this project, the system also recognizes and distinguishes the user’s family and friends and therefore does not bother the user with any unrequired notifications. Read More...
|
Computer Engineering |
India |
1397-1400 |
387 |
Improvement in Data Deduplication Technique in Windows Environment Using File Metadata.
-Aditya Mehare ; Sagar Nikum; Ruchi Sable; Ravi Kumar; Vikas Kadam
In computing, data deduplication is a specialized data compression technique for eliminating duplicate copies of repeating data. In this paper we use the data deduplication algorithm, in which unique parts of data, are identified and stored during a process of analysis. As the analysis continues, other parts… are compared to the stored copy and whenever a match occurs, the duplicate parts are replaced with a small reference that points to the stored parts of data. The same byte pattern in some part of complete file may occur thousands of times (the match frequency is dependent on the part (chunk) size), the amount of data that must be stored or transferred can be greatly reduced. Our techniques are provably accurate, yet run with very low memory requirements and avoid overheads associated with maintaining large deduplication tables. To remove the overhead associate with deduplication tables we examine the file metadata before calculating the hash values which are used to detect duplicate chunks in file. Read More...
|
Computer Engineering |
India |
1401-1403 |
388 |
Multicloud Resource Allocation and Deployment with Migration of Virtual Resources for Green Computing
-R.Keerthiga ; Nishalini N; Nithya P; Sathish Saravanan
Virtualization is a technology, it is a way to achieve optimum resource utilization for the hardware to achieve cloud computing. In this paper, we provide a detailed description of the dynamic resource allocation technique in the cloud and the problem of Dynamic Migration of Virtual Machines (DM-VM) is investigated. We implemented a new BGM-BLA (Binary Graph Matching –based Bucket code Learning Algorithm) algorithm for DM-VM problem, this dynamic migration of VM provides a method to distribute physical resource more reasonably without suspending the services. Therefore the energy consumption, load balancing and operation cost is reduced. We also implemented a cache mechanism in order to avoid replicating request to the server using this technique can achieve the Green Computing. Read More...
|
Information Technology |
India |
1404-1408 |
389 |
Ontology based Personalized Mobile Search Engine
-Akshay Chaurasia ; Nair Nikhil; Shubham Dongre
we propose an “Ontology Based Personalized Search Engine†(OBPMSE) that captures the user’s preferences in the form of concept by mining their click-through data. Due to the importance of location information in mobile search, OBPMSE classifies these concepts into context concepts & location concepts. In addition, user’s location (optimized by GPS) is used to supplement the location concepts in OBPMSE. Read More...
|
Computer Engineering |
India |
1409-1413 |
390 |
A Review Paper Based on the Application of CBDA
-Manisha Kumari ; Rashmi Kashyap
In this review paper different types of Filter circuits using current differencing buffered amplifier has been studied. The circuits of the filters have been shown in the figures. CDBA plays an important role in the analog circuit designing. All the simulations have been performed on SPICE tool. Read More...
|
VLSI |
India |
1414-1416 |
391 |
Characterization and Antibacterial Behavior of MgO Nanoparticles Synthesized via Co-Precipitation Method
-S. Dhanapandian ; V. Karthikeyan; C. Manoharan
Nano crystalline oxides are of immense interest to scientists due to their high surface area and enriched surface chemistry. In the present work magnesium oxide MgO nanoparticles were obtained by thermal decomposition of magnesium hydroxide Mg(OH)2 nanoparticles. Nanoscale MgO particles are generated via a co-precipition method using magnesium nitrate hexahyrate and sodium hydroxide as starting materials. Effects of the relative reactant concentration ratios on characteristics of MgO nanoparticles are also investigated. The prepared magnesium oxide nanostructures were characterized by XRD, FTIR, FESEM and FETEM analysis. Antibacterial studies were carried out on gram positive (S.aureus) and gram negative (E.coli) bacteria by Agar diffusion method. Read More...
|
Nanomaterial characterization |
India |
1417-1421 |
392 |
Coherent Multiplexing Technique for Data Transmission without ICI
-S.Ramnivash ; S.Ayyappan
In order to achieve data transmission without InterCarrier Interference (ICI) the Constant Envelop Minimum Shift Keying Orthogonal Frequency Division Multiplexing (CE-MSK-OFDM) technique is proposed in this paper. The amplitude doesn’t vary during modulation in the carrier wave so it maintains Peak to Average Power Ratio(PAPR) and using Minimum Shift Keying can produce Constant Envelop(CE) due to its smooth phase transitions. The conventional Orthogonal Frequency Division Multiplexing (OFDM) system capable of counteracting fiber nonlinearity, excellent resistance to chromatic dispersion and reduce PAPR. Normally, OFDM uses Quadrature Phase Shift Keying (QPSK) modulation technique it decrease PAPR but when there is a abrupt amplitude variations the higher order terms of phase modulated signal, then the data will spread over multiple subcarrier results in inducing a large ICI. In QPSK, the modulated signal cannot be of continuous phase and it provides slow roll off side lobe spectrum which decays asymptotically. The concept proposed here attenuate the downside of Constant Envelop Quadrature Phase Shift Keying Orthogonal Frequency Division Multiplexing (CE-QPSK-OFDM). Read More...
|
Computer Science and Engineering |
India |
1422-1427 |
393 |
Real-time Sentiment Analysis by Extracting and Blocking of Abusing Tweets in Twitter using Predictive Machine Learning Algorithm
-Aarthi BL. ; V. Sharmila; S. Karthik
Twitter is an online social networking service. It enables users to send and read short 140-character messages called "tweets". Social networking is an easiest way to provide communication with people in different places and it has both advantages and disadvantages. Many people feel insecure to use Twitter as it shares all your tweets with third parties. As it is posted in public your privacy is in big jeopardy because of social media and it can affect your dignity and pride of a person. Twitter is one of the commonly used social media between short times it gained a worldwide popularity. More than 350 million of posts are tweeted per day. The major drawback of existing is that in twitter the tweets are publicly visible and the tweets can be visited by anyone via commented. So twitter does not provide privacy and security. The networking issues have become a matter of serious concern. The user feels insecure while using twitter as it shares all the personal information in common with third parties. In our proposed system we use Natural language processing (NLP) to identify malicious feedback ratings. NLP acts as a detecting technique which detects the negative or malicious tweets and also blocks the abused or negative comments by Sentiment Analysis and stopping it from sharing the personal details to the public blog. Read More...
|
Computer Science and Engineering |
India |
1428-1431 |
394 |
Search Wise Application using Cross Platform Technology
-Shantilal Jangid ; Vijay More; Tanmoy Karmokar; Snehal Yadav
Internet has converted a world into a global village. With the popularization of internet, online shopping has become a new and unique trend. Searching products is the most basic use of internet uses. But, Searching products manually is time consuming and not always convenient. The project aims at providing an electronic medium to search products and provide those products to customers via respective vendors. It will enable the user to search for a particular product, service in his/her area and then allow to book it and Make the Payment accordingly. The app provides a platform for any user, who has to search for particular product that is needed day to day life. This shall be accomplished by developing a web app utility that incorporates the leading web technologies of today. Read More...
|
Computer Engineering |
India |
1432-1433 |
395 |
Different Levels of Security in Cloud
-Prachi Kadam ; Shahista Shaikh; Rashmi Linganwar; Komal Mathpati; Prof. Pranali Kosamkar
Cloud computing is mainly used for the security of data. Cloud stores a large number of data securely and very efficiently without the fail of service to the customer. Cloud is used by different organizations in a variety of different service models. But a number of security issues are associated with cloud computing. There are different security issues faced by cloud provider and different customers. This paper gives idea about the different levels of security provided by encryption technology. It gives overview about the cryptographic techniques which can be used to design the secure cloud service provider. Here we have discussed the layers of encryption used in various systems and the algorithms used for their implementation. Read More...
|
Computer Engineering |
India |
1434-1437 |
396 |
RFID Based Automated Toll Collection System
-Kajal Dhainje ; Kalyani shinde; Nikita Maske
Automated toll collection is a system where toll is collected automatically at toll booths. RFID tag is used for the identification. Every vehicle will hold a unique identification number called as RFID tag. This identification number will be assigned by RTO or traffic governing authority. The automated toll collection system will be storing the information regarding the vehicle and the vehicle owner. The information about the amount he has paid will also be stored in the system. Radio frequency is used for the identification of the code. Reader will be placed at the toll booths and whenever the vehicle will pass the toll booth the amount will be deducted automatically from his prepaid account. This is the technology where collection of payments will be possible electronically. The advantage of this system is that it is possible to determine if the vehicle is registered or not, if not then the information will be provided to the authorities of toll payment. The most important advantage of this technology is to reduce the congestion at toll booths especially during the festivals seasons as vehicles need not to be stop and pay the toll. This technology is also about the time saving. This method is also useful to curb the complaints from the vehicle owners regarding the corruption involved manually at toll booths. Read More...
|
Computer Engineering |
India |
1438-1439 |
397 |
Web based One Time Password Authentication Security System using Mobile Application
-Snehal Said ; Leena Patil; Nikita Mahajan
Users have been using text passwords, graphical passwords for authentication on different websites because they are easy and simple to remember. User's nowadays have many accounts on different websites and have to remember all passwords for login purpose. Users therefore choose easy to remember passwords which are not safe and can be easily hacked. Hackers can easily hack by using different malicious program and threats. To make this process of remembering passwords easy, provide security and to protect user's privacy in this paper we are developing one time password authentication scheme of web based security analysis using mobile phone application. It is authentication protocol which involves user's mobile and short message service to prevent reuse attacks, phishing, password stealing and other related attacks. Read More...
|
Computer Engineering |
India |
1440-1441 |
398 |
Comparative Study of Codes for Spectral Amplitude Optical CDMA
-Ankit Parakh ; Nelsa Abraham
Optical communication finds lot of new technology for the processing of signals by using optical fibers. Optical code division multiple access (OCDMA) is a branch of optical communication, which finds application in many communication systems. It has a bright future in communication because of its speed, efficiency, security and unlimited band width. The major advantage of OCDMA is its effective utilization of bandwidth as well as the multiuser communication capabilities. OCDMA requires spectral amplitude coding (SAC) to eliminate multiuser interference and also suppress the effect of phase induce intensity noise (PIIN) with fixed in phase cross-correlation. From past few decades work is going on rapidly for the generation and implementation of new SAC so that the problems of multiuser interference and different type’s attenuation and noises can be eliminated. There are many codes available which has their own reliability and advantages over the other. This paper presents a review on various codes on SAC OCDMA system which can be efficiently used in optical communications. Read More...
|
Electronics & Communication Engineering |
India |
1442-1447 |
399 |
Biomatric Bank Locker System
-Pooja Rajendra Pawar ; Priyanka Mohan Yadav; Shital Baliram Borate
Biometric supported security system can be used at many site like Industries, Offices, and Colleges or even at our home.This project is a combination of “Biometrics technology†and“Embedded system technologyâ€. Fingerprint sensor is themain part of this system. It makes use of Biometric sensorto detect fingerprint. It is also called as Biometric sensor.The principal characteristic or particularity of fingerprint is that it is unique. It gives this project the high level security than other security systems. Person recognition using the Fingerprint identification is used since a long time. Most frequent example is use in the criminal cases. Read More...
|
Electronics and Telecommunication Department |
India |
1448-1449 |
400 |
Face Recognition And Description System using Principal Component Analysis
-Sarang Kulkarni ; Sushant Belsare; Aditya Kulkarni; Shilpa Pimpalkar
Humans have spatial as well as temporal memory. Our visual sensors perceive the data and transmit it over neurons so that we could remember it. Although what we perceive has some memory bound and happen to obliterate over time. We often distinguish a person by his/her features. As our glance projects to human face, we separate people by genders, eyes, expressions, facial muscles etc. A system, thus, can be implemented to recognize people from one another. The image sent to the system is human face and hence driven through series of tests consisting threshold calculation, histogram plotting, error introduction. The proposed system increases the efficiency to get the information of a human face whose record is already available. The image then compared with the one stored in database and hence described upon the suitable match. Such system with an inclination towards higher accuracy may yield great opportunities in the yield of criminal detection, airport security system, face recognition vaults, attendance system. Read More...
|
Computer Engineering |
India |
1450-1451 |