No. |
Title and Author |
Area |
Country |
Page |
151 |
Survey for Daily Collection in Credit Co-Operative Society
-Vinod Barela ; Sayali Kolhe; Chetana Chaure; Avadhut Khollam; Bhushan Borhade
Credit co-operative society not developed well in rural areas as compared to co-operative societies in urban areas. Generally, Moto of credit co-operative society is to encourage members for daily savings. Cash collector i.e. agent daily collects cash from their respective vendors & consumers as well as consumer. Our project focuses on to improves the working of cash collectors & automate the daily collection process of credit co-operative society by introducing android application. This application provides prediction based daily collection facility for agent. Through this application cash collector able to add members, add cash amount, generate PDF of report etc. Application will predict the next member nearby agent from which cash has to be collect. Android application notifies to the agent about missed members on that day or previous days. Daily & monthly reports as per collection automatically generated by android application so at the end of the day cash collector show their report in respective branch. Prediction based daily collection system reduces human efforts helpful for newly joint agents. Read More...
|
Computer Engineering |
India |
616-618 |
152 |
A Survey: Arduino-Based Smart Car
-Bhumit Kanubhai Patel ; Dr. Sharnil Pandya; Satvik Patel
In Today’s world, Technology plays an important role in the field of automobile vehicles in car. Increasing of technology and access to high levels in automotive industry, it is necessary to provide a protection of cars from the theft, accidents, and unauthorized activities. So to avoid the collision avoidance, many researchers are trying to develop automated new technologies which can be applied into the vehicles for the comfort and safety of the humans, but the major concerned is how does the communication between the devices taken place is the major concerned. In this survey papers they have done a genuine attempt to find the solution of the particular issue by proposing a novel system called “Arduino-based Smart Car using Androidâ€. The proposed system aims to design a system where all the interfaces of car are connected in such a way that all the components of the car can be accessed through web interface or mobile interface. They found few methodologies which has been applied within recent years have implemented a obstacle avoidance algorithm which help us to detect the object which is far away from the car. Read More...
|
Computer Science and Engineering |
India |
619-621 |
153 |
Review on Heat Transfer from Fins with Perforations
-Shrikant Arage ; Avinash M. Patil; Rajeev P. Patil; Nikhil S. Mane
Heat transfer enhancement can be achieved from different methods but use of fins is a most economic and easy to implement method. Fins does not require any external power source and is economical and easy to implement in many applications with little affecting the cost, size and weight of heat transfer body. In some application degree of heat transfer enhancement cannot be achieved by simple fins it requires more efficient methods. These problems can be answered by changing orientations of fins, staggering of fins and perforated fins. This work consists of the study of heat transfer enhancement perforated fin array. In this paper, work of different researchers in the field of heat transfer enhancement, extended surfaces, fins and perforated fins is reviewed and presented. Read More...
|
Mechanical Engineering |
India |
622-623 |
154 |
A Review on Motorway Traffic Clogging System
-Kapil Sehgal
As we know the population of metropolitan is growing every day. With increasing country population, amount of vehicles is also rising, and this direct enchases traffic of cities which should be manages as early as possible without any loss people. Traffic causes accidents which directly affect an individual life. In the last 10 years the situation has get worse due to quick growth of automobiles and inadequate highways to accommodate them. This work describes methods of real time area based traffic by means of image processing for intelligent traffic control system. Read More...
|
Computer Applications |
India |
624-627 |
155 |
Study and Comparative Analysis of DS and ARPS
-Sheetal Banchhor ; Dolley Shukla
Motion estimation is basic operational feature in video processing technology and is used in edge detection, gesture detection, motion detection etc which makes it wide area for research. Various techniques perform motion estimation. Simplest and most effective are Block Matching Algorithms (BMAs). BMAs usually work on various search patterns such as square, diamond, hexagon etc. Two of the most widely accepted search patterns are Diamond Search (DS) and Adaptive Rood Pattern Search (ARPS). This paper performs a comparison between DS and ARPS by implementing them on different pixel space of the block of the frame. The test result gives PSNR better in case of ARPS than that of DS showing that ARPS is more efficient than DS. Read More...
|
Electronics and Telecommunication Department |
India |
628-630 |
156 |
Effects of organic and chemical fertilizers on growth of Coriander crop. (Coriandrum sativum L).
-Mangesh Mohan Vedpathak ; B. L. Chavan
The impact of organic and chemical fertilizers applications on growth parameters of Coriander was studied in a field experiment at outdoor nursery of Solapur University, in agricultural farm in district of Solapur. The experiment was laid on randomized block design with five treatments and three replications in plot size 2m x1m. The first treatment (T1) is application of vermicompost @ 1 kg/plot (@ 0.5 kg/sq. m). In second (T2) and third (T3) treatment, a common dose of organic fertilizers such as NADEP and pit compost were used at equal rate @ 1.25 kg/plot (@ 0.625 kg/sq. m). In fourth treatment (T4), straight chemical fertilizers such as urea, single super phosphate and murate of potash were combinaly used in proportion 50:40:30 - N: P2O5: K2O Kg/ha. No any fertilizers added in plot treatment (T5) as it was treated as control. Growth parameters such as plant height, no. of branches/plant, no. of leaves/plant, fresh and dry weight were recorded at 30th and 60th day. The highest average fresh and dry weights of Coriander crop were observed in the crops grown on the unfertilized control treatment (T1) at 30th days. The result show that application of vermicompost increases average fresh and dry weights of Coriander crop after 60th days followed by in order control (no fertilizers), NADEP compost, pit compost and chemical fertilizers respectively. Read More...
|
ENVIRONMENTAL MANAGEMENT |
India |
631-634 |
157 |
Comprehensive Survey on Image Inpainting Techniques
-Krishna C. Patel ; Hinaxi M. Patel
Inpainting is the process of reconstructing the missing or damaged contents inside an image using partly information loss in a plausible way that inpainted image look natural. In today’s life the persons that preserves the old photographs after some times this picture is damaged like scratches on that picture or some text is overlaid in that picture , so inpainting techniques can be used to obtain the resultant image that same as original image In this paper, we focus on the techniques that is multi-resolution technique, structure and texture propagation technique, virtual view synthesis Algorithm, watermarking-based inpainting, exemplar based image inpainting and sparsity based image inpainting. In each case for inpainted image, the goal is to fill the damaged portion of the image in a visually plausible way. Applications of image inpainting range from the removal of an object from a scene to the retouching of damaged painting or photograph Read More...
|
Information Technology |
India |
635-638 |
158 |
Comparative Study on the QR Code Techniques and Variability
-Nidhi Chandel ; Dr. Siddhartha Choube
Nowadays, digitalization is used in every area. In this digitalization one of the processes is QR (Quick Response) code. QR code is widely used in daily life. In QR code has high quality feature such as stored high capacity information in small coded from and embed the secret information .The QR code is used in hide robust message, invisible watermarking, encryption the secret information . QR code is a machine clear encoded frame utilized for information storage as a part of a constrained sum of space in a picture. Sending of QR code pictures from one host to another may bring about malignant assaults and information may lose in the procedure of correspondence. The purpose of this paper is review and analysis on the major technique of QR code. This response code using angle like feature encryption, decryption, cryptography, encode, decode and error detection in many application domain. Read More...
|
Computer Science and Engineering |
India |
639-641 |
159 |
Progressive Collapse Analysis of RC Framed Structures
-Amit Ishwarappa Devar ; Prof. Shivaraj Mangalgi
The term progressive collapse defined as the spread of local damage, from an initiating event, from element to element resulting, eventually, in the collapse of an entire structure or a disproportionately large part of it is known as progressive collapse. The progressive collapse of structures during severe loading caused by earthquakes, blasts, and other effects causes catastrophic loss of life. Such collapse is typically caused by the inability of the structural system to redistribute its loads following the failure of one or more structural members to carry gravity loads. In reinforced concrete (RC) structures, the loss of gravity load carrying capacity in columns has been observed to trigger a chain of collapse events Read More...
|
M.Tech in Structural Engineering |
India |
642-646 |
160 |
An Implementation of Black hole Attack Detection in MANET Using Trusted Proxy Node (TPN) with AODV
-Amit Saraf ; Megha Singh
This Research proposes Trusted Proxy Node (TPN) method which is responsible for the trust calculation. The TPN measures an best possible route for communication by examining the network parameters like delivery ratio, overhead & delays. After this trust value index is calculated and TPN node issues a certificate to every node in its network range. This work is presented to detect black hole nodes for AODV protocol in MANET. To make a contribution in routing the nodes must have two trust index (TI) certificates & can be believe as a suggested node by TPN. The record of this certificate is keep up in Trust Index (TI) Table. This trust index table is shared with the data aggregation server with help of trusted nodes. Improved AODV protocol using C++ is written, to simulate the Black Hole attack. In order to test this method simulation model was developed. The simulation results show the usefulness of our scheme compared with usual scheme. Read More...
|
Computer Science |
India |
647-651 |
161 |
Design of Process Plan for Simultaneous Scheduling of Machines and Agv's Using Non Traditional Optimization Technique
-Somanath B ; Samson Yohannes
Design of process planning and scheduling is defined as any computer program that uses advanced mathematical algorithm for logic to perform optimization and / or simultaneous on finite capacity scheduling and others. This work addresses the problem of simultaneous system of machine and AGV’S (Automated Guided Vehicles) in FMS (Flexible Manufacturing System) so as to minimize make span and mean tardiness. For solving such combinatorial optimization problems non-traditional approach is most effective algorithm that aims to converge and give optimal solution in a shorter time. Therefore in this work a suitable simultaneous scheduling mechanism is design to generate accurate scheduling using simulated annealing (SA) and differential evolution (DE) approach. For this particular problem, coding has developed in C++ and run by IDE tool, which gives optimum solution for the bench mark problem chosen from literature. Read More...
|
m.tech in machine design |
Ethiopia |
652-655 |
162 |
Investigation of Supersonic Retro Propulsion Flow Fields for Central Jets and Peripheral Jets on Re-Entry Bodies
-Mrs. Thripthy Anil A S ; Mrs. Smitha ; Mr. Vishal Kaushik
NASA's Entry, Descent, and Landing (EDL) space technology is introduced new techniques to achieve human exploration of Mars in the coming decades. One of those technologies, termed Supersonic Retropropulsion (SRP), involves initiation of propulsive deceleration at supersonic Mach numbers. The potential benefits afforded by SRP to improve payload mass and landing precision make the technology attractive for future EDL missions. NASA's EDL project spent two years advancing the technological maturity of SRP for Mars exploration. To model the flow field that exists for a vehicle employing SRP, multiple simulation method has been examined. Wind tunnel testing on scale model allows for visualization of the actual flow field structures using schlieren or shadowgraph images. Pressure ports on the body allow for data to be taken to characterize the effects of configuration and thrust level on the aerodynamics of the vehicle. In addition to characterizing the SRP environment, this datasets provide a validation database against with other modeling techniques can be compared. CFD approaches numerically solve the underlying flow equations to generate the solution of the expected flow structure and vehicle aerodynamics. This paper deals with the investigation on the effects of retro propulsion on the blunt body reentry vehicle in an opposing supersonic free stream. The focus is on aerodynamic properties for the application of EDL design and computational simulation development .This paper does not discuss non propulsive supersonic decelerators, detailed aero thermodynamic issues, slender body geometries or exhaust plumes in direction other than the free stream direction. This it also compare the results obtained in central peripheral nozzle locations as well as the computational simulation of supersonic retro propulsion flow fields and limitations of this work. Read More...
|
Aeronautical Engineering |
India |
656-661 |
163 |
Earthing System Designing For AC Substation: An Indian Aspect
-Shaktikant Patel ; Shaktikant Patel; Prof. Anil Kumar Kori
AC substation is the very important part for the whole power system. In substation mostly electrical equipments and devices are live part (carrying full load current) such as circuit breakers, primary of CTs and PTs and transformer etc, thus within substation safety of expensive equipments and human must be needed and required more attention. Actually substation is heart of power system therefore safety of substation is very important like as human heart. In this paper we discussed about earthing system designing and calculate their parameters for AC substation according to Indian soil characteristics, seasonal variations and Indian standard. Major difference between India and others countries for earthing system designing is standard size of M.S. flats are used as earth conductors in India while in others countries calculate the conductor size by standard equation. Read More...
|
HIGH VOLTAGE ENGINEERING(EE) |
India |
662-667 |
164 |
Performance Analysis of Wavelet Thresholding Methods Using DTCWT for Denoising of Vibration Signals
-Shivangi Pawar ; Preety D Swami
This paper presents a robust technique for denoising of vibration signals corrupted by Additive White Gaussian Noise. The proposed method uses Dual Tree Complex Wavelet Transform (DTCWT) and is very efficient due to its shift invariance property and reduced aliasing effect. While using DTCWT, we are comparing Different Threshold selections. The threshold value is selected using Universal, Rigrsure, Heursure and Minimaxi methods and is level adaptive. The best results are obtained by the threshold value selection using ‘Minimaxi’ threshold at low values of noise standard deviation and using ‘Universal’ threshold at higher values of noise standard deviation. Experiments are carried out on simulated vibration signals as well as on real time faulty signal. The comparison of the results of the proposed methods using DTCWT for synthetic signal is done using the signal to noise ratio (SNR). Higher SNR is gained compared to traditional denoising method. For comparison of results of the real time signal, another statistical parameter ‘Kurtosis’ is chosen. Read More...
|
Electronics & Communication Engineering |
India |
668-674 |
165 |
A Survey on Gradual Fade Detection Techniques in Video
-Rakesh Trivedi ; Rutul Patel
In Current scenario of digital communication, need for digital algorithm for processing of video is popularly increasing now a day. Processing of video means handling of several frames each have its own property and information contains requires efficient and reliable algorithm which satisfies speed for processing and computational time. Several algorithms are available for detection of fade effect and each have its own limitation over speed and time for processing. Fade effect is best described as gradual transition from one frame to another which occurs slowly. Transition from one shot to another occurs gradually (Fade) or abruptly (Cut). Processing of frame needs powerful transform methods like DCT, Fourier transform, and Wavelet Transform. This survey on fade detection includes and describes several techniques available for processing. Information on gradual transition especially on fade effect is also described prior to algorithm. Read More...
|
Electronics & Communication Engineering |
India |
675-678 |
166 |
Online Cab Booking System
-Aditya Gupte ; Anuja Gaonkar
This paper showcases the development of an interactive website which functions as a Cab Booking System for customers to effortlessly book cabs for travel, the system is named CityCabs. It is an online portal through which customers can view available cabs, register the cabs, view profile and book cabs. A computer based management system is designed to handle the entire primary Information required to manage the whole data. Separate database is maintained to handle all the details required for the correct statement calculation and generations. This project intends to introduce more user-friendly approach in the various activities such as record updating, maintenance, and searching. Standard Web development languages like HTML, JavaScript and PHP were used for Front-end and Back-end development respectively. PHPMyAdmin software was used to maintain and check integrity of databases created. Read More...
|
Computer Applications |
India |
679-683 |
167 |
Root Cause Analysis for Pavement Failure
-Mr. S. B. Patil ; Mr. N. M. Patil; Mr. A. A. Lole
Understanding the cause for current conditions is extremely important in selecting an appropriate maintenance or rehabilitation technique. Pavement performance evaluation is an important activity in the maintenance and rehabilitation works. It includes evaluation of existing distresses, road roughness, structural adequacy, traffic analysis, material testing and study of drainage condition. Read More...
|
Civil Engineering |
India |
684-686 |
168 |
Biometric Person Identification using Multilingual Speech Processing
-Tushar Kant Sahu ; Vinay Jain
In this paper we explain the multilingual speaker identification system. Speaker identification is conducted on 3 Indian languages Hindi, Marathi and Rajasthani. We create a database of 15 person in each language. In our system we use 3 different sentences and each sentence in 3 languages. We focus on the effect of language mismatch in the speaker identification performance of individual languages and all languages together. Mel Frequency Cepstral Coefficient (MFCC) is used for feature extraction. The standard SVM-based speaker identification is used. The average speaker identification rate is as high as 99%. Read More...
|
Electronics and Telecommunication Department |
India |
687-691 |
169 |
Experimental Investigation of Machining Parameters of CNC Milling on MRR Using Different Lubricants
-Lalit Kumar ; Jitender Panchal
Face milling is a very common method for metal cutting and finishing of machined parts. The input machining parameters being considered in this research is spindle speed, tool feed and type of lubricants. The Stainless steel 202 is used as work piece. The tool used for milling operation is HSS face milling cutter. The Taguchi’s L9 orthogonal array has been used to design the combinations of parameters of experiments. The optimum levels of parameters have been found 1500 rpm spindle speed, 250mm/rev tool feed and using machine oil are optimized parameters to obtained higher MRR. Read More...
|
Mechanical Engineering |
India |
692-697 |
170 |
Limitations in VLC Systems: A Study
-Divya R
Mitigation of nonlinearity is very important factor as it influences the performance of a visible light communication (VLC) system. In this paper several nonlinearities and limitations of VLC systems are analyzed as a review study and detailing about some previous papers to develop a new logic as well as researching for VLC systems and future scopes to make a VLC system reliable. Nonlinearity is discussed and mainly focused in this paper as a main limitation of VLC. This paper discusses about a mitigation technique which is already proposed with micro light emitting diodes (LED) in cooperation with multiple access schemes here mainly CDMA is considered. Nonlinearity limits the performance in terms of bit error rate as well as error vector magnitude. Nonlinearity mitigation methods are proposed earlier but that system designs are not suitable for indoor and industrial applications, because such design required additional circuits, which make the system high cost and complex. This paper can be considered as a literature survey or a case study to analyze VLC and a search for new scopes in VLC. Read More...
|
Electronics & Communication Engineering |
India |
698-702 |
171 |
Experimental Investigation of Machining Parameters of CNC Milling on SR Using Different Lubricants
-Lalit Kumar ; Jitender Panchal
Face milling is a very common method for metal cutting and finishing of machined parts. The input machining parameters being considered in this research is spindle speed, tool feed and type of lubricants. The Stainless steel 202 is used as work piece. The Taguchi’s L9 orthogonal array has been used to design the combinations of parameters of experiments. The optimum levels of parameters have been found 2500 rpm spindle speed, 250 mm/rev tool feed and using machine oil are optimized parameters to obtained lowest SR. Read More...
|
Mechanical Engineering |
India |
703-707 |
172 |
Programming for Manufacturing of Impeller Blades on CNC Machine
-P. Tejaswini ; Y. Sravani; C. Venkata Siva Murali; B. Mohan
Computer Numeric Control (CNC) is the automation of machine tools that are operate precisely programmed commands encoded on a storage medium (computer common module, usually located on the device) as opposed to controlled manually by levers, or mechanically automated by cams alone. Most NC today is computer (or computerize) numerical control (CNC) in which computers play an integral part of the control. In modern CNC systems, end-to-end component design is highly automated using computer-aided design (CAD) and computer-aided manufacturing (CAM) programs. The programs produce a computer file that is interpreted to extract the commands needed to operate a particular machine by use of a post processor, and then loaded into the CNC machines for production. Since any particular component might require the use of a number of different tools drills, saws, etc. Modern machines often combine multiple tools into a single "cell". In other installations, a number of different machines are used with an external controller and human or robotic operators that move the component from machine to machine. In either case, the series of steps needed to produce any part is highly automated and produces a part that closely matches the original CAD design. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
708-712 |
173 |
University Recommendation System for MS
-Mirgane Sneha ; Mirgane Sneha; Jambhale Priya; Bitake Shubhangi; Ivare Priyanka
Recommendation System is a subclass of information filtering system which takes input from students and provides Students with the most suitable output to fulfill his re-quirements. This system is used to present a new college admission system using data mining and machine learning techniques for tackling college admission prediction problems. This System uses content-based filtering and collaborative Filtering to provide aspiring students (Master of Science) with the most appropriate choices of colleges based on different parameters. The system analyses the student academics, merit, background, student records and the college admission criteria. Then it predicts the likelihood of colleges the student may enter. In addition to the high prediction accuracy is an advantage, as the system can predict suitable colleges that match the student's profiles and the suitable track channels through which the students are advised to enter. Read More...
|
Computer Engineering |
India |
713-716 |
174 |
Study of Packing Material used in Control Valve for Fire Fighting Installation
-Subhashis Choudhary ; Pulkit Solanki
It is beyond imagination that any matter supply is being processed without medium like pipeline of different material and nature so to controlling by means of different king of valve to regulate same. Valves are the most common single piece of equipments found in any utility and services although there are many types, shapes and sizes of valves, they all have the same basic parts. This paper will review the common parts of control valve as packing and sealing so as the functions. The traditional control valve selection process includes selecting a valve design based on (1) Pressure (2) Temperature capability (3) Flow characteristics (4) Characteristics of fluid (5) Material compatibility and other factors. One such major factor is packing selection, which has gained significant attention over the years due to stringent environmental and safety concerns. Today every industry is concern and wants the lower maintenance and higher life performance of packing and sealing materials to minimise the loss and, breakdown and failure related. Packing’s and sealing being suitable not only for those applications where the control of fugitive emissions is a requirement, but also for non-environmental applications involving higher temperature and pressure like in petrochemical industries. Read More...
|
Engineering |
India |
717-719 |
175 |
Design and Development of Algorithm for Assessing Reconstructability of Shadow Areas in VHR Images
-Ms.Amruta Ashok Lambe ; Pravin Ghewari
Presence of shadow in VHR images usually affects information present in the shadow. In this paper we have proposed a method for obtaining reconstructability of shadow areas in VHR images. In the proposed method first shadow areas are detected through shadow mask. Shadow and non-shadow area are separated. Histogram of shadow and non-shadow area are applied to eight criteria working at the texture and pixel level. Values obtained by means of criteria are compared with reference values. It will provide objective assessment of reconstructability of shadow area. If shadow area is reconstructable then it is reconstructed by using additive and ycbcr reconstruction technique. Read More...
|
Electronics and Telecommunication Department |
India |
720-723 |
176 |
Impatt Diode- The Future Sourse for Terahertz Application - A Review
-Dillip Kumar Pattanayak ; Dr. Arun Kumar Dash; Mr. S P Khadanga
IMPATT di odes have drawn the attenuation in last few years .Based on previous studies, device performance has been improved from year to year. This paper is focused on GaN IMPATT diode because of the reliable and more matured technology. The progress is based on millimeter –wave application is reviewed. This paper specially emphasized the technique for improvement on output power and efficiency. Read More...
|
PHYSICS |
India |
724-725 |
177 |
Seismic Response of Tall Irregular Buildings Under Influence of Torsion
-Lohith Kumar B C ; Manjunath N K
The present study aims at understanding the importance of codal provisions, which are particularly provided for the analysis of torsionally unbalanced structures. IS 1893-2002 Part 1 Code gives the information about number of parameters which influences the irregularity of the structure. However, in the present study the worst affected irregularity under the influence of torsion are studied, In the present study, seismic analysis has been performed by Equivalent Lateral Force Method (ELF) ie the codal method, for all zones and for all soil types for various irregularities such as diaphragm irregularity, mass irregularity, Non parallel offset irregularity, for 10, 15, 20 storey buildings. The results in form of torsional moment, fundamental time period and base shear results are compared for different irregularities and the analysis is done with Etabs 9.2 software. Read More...
|
Civil Engineering |
Ethiopia |
726-731 |
178 |
An Integrated Approach of K-Medoid and Logistic Regression for Forecasting of Student Performance
-Neelam Peters ; Aakanksha S. Choubey
Students' academic performance is perilous for educational institutions because tactical programs can be prearranged in cultivating or maintaining enactment of the students for the duration of their period of studies in the institutions. The upsurge of student’s dropout rate in higher education is one of the significant problems in most organizations. The unearthing of hidden information from the educational data system by the operative process of data mining technique to investigate factors affecting student waster can lead to a healthier academic planning and administration to moderate students drop out frequency, as well as can apprise cherished information for outcome making of policy makers to mend the quality of higher educational system. In this paper, we consider issues of factors affecting prediction accuracy discussed about different techniques of data mining, machine learning which will predict the student performance index. In this paper we have proposed a prediction model which is integration of machine leaning (Logistic Regression) and k-medoid clustering (Data Mining Technique) algorithm for student performance prediction. Read More...
|
Computer Science and Engineering |
India |
732-737 |
179 |
Effect of Silica Fume on Mechanical and Fresh Properties of High Strength Self Compacting Concrete
-Chandrashekhar D. Wagh ; S. S. Jamkar
This study presents the effect of incorporating silica fume (S.F) on the mechanical and fresh properties of high strength self-compacting concrete (HSSCC) for a constant water/binder ratio of 0.28. Fly Ash replacement was kept constant at 25 %. S.F mixtures with cement replacement of 7.5, 10, 12.5 and 15 % were designed for high strength and slump flow range of 650 mm to 700mm. From the results, it was observed that 12.5 % replacement level was the optimum level in terms of compressive strength. Beyond 12.5 % replacement levels, the strength was decreased but remained higher than the control mixture. Compressive strength of 88Mpa was achieved at 12.5 % replacement for 28 days while 101.21Mpa was obtained at 90 days .Splitting tensile strength values have also followed the same trend. Slump flow, T 500, V funnel and L box tests were carried out in order to investigate the fresh properties. In workability tests S.F concretes showed lower values compared to control. This investigation has shown that the local S.F has the potential to produce high strength self-compacting concretes. Read More...
|
M.E. IN STRUCTURAL ENGINEERING |
India |
738-742 |
180 |
Stability Analysis of Steel Frame Structures: P-Delta Analysis
-Nagaraja S ; Umashankar Patil G H
The Steel structures are gives good performance in High Rise buildings requires Stability and design purposes. This research focused on P-delta analysis to be compare with linear static analysis. In This study, a G+21 storey steel frame structure with 72.6m has been selected to be idealized as multi storey steel building model. This model Is analyzed by using ETABS9.7 software with the consideration of P-delta effect. At the same time the influence of different bracing patterns and different location of X bracings has been investigated. For This reason five types of bracing systems including X, V, single diagonal, Double X, K bracing with unbraced model of same configuration are modeled and analyzed. The frame structure Is analyzed for Wind load as per Is 875 (part 3)-1987. Ofter analysis, the comparitive study Is presented with respective to Maximum storey displacement, story drift and column moments. The present work shows That the ‘X’ bracing in continuous bracing pattern Is proved to be more effective with respect to both static and P-delta analysis. So X bracings are using in different locations This shows That Model-4 Is proved to be more effective for same parameters with respect to Both static and P-delta analysis. Read More...
|
Civil Engineering |
India |
743-746 |
181 |
Design and Development of Sachet Packaging Machine
-Abhijeet G. Darekar
In this paper we have considered a project based on design, development and testing of ‘Sachet Packaging Machine’. Now a day’s automation plays a key role in the packaging industries. As maximum quantity in minimum possible time with the best quality is the key to success the packaging industry is undergoing a phase change, Machines used currently in the industries are widely are mostly automated used instead of packaging with human efforts. The sachet packaging machine in this project is mostly used machine for small size products. This sachet packaging machine is widely used in food industry and cement industry. In the said project we are going to manufacture parts included in the machine. We are also looking forward in providing some modification in the machine to increase the production rate, decrease the weight and replacing complex parts with simple ones. Read More...
|
PRODUCTION ENGINEERING AND SYSTEM TECHNOLOGY |
India |
747-752 |
182 |
Need of Sustainable Energy and Its Dimensions: A Review
-Ankur Malviya ; Dr Shiena Shekhar; Abhijeet Kuthe
The development of the technology is required for the welfare of the society and nation. This paper will gives you the review of work done in the field of modernization in the development of the manufacturing practices. The sustainable manufacturing (SM) practices proofed that this is the way by which we can save lot of unwanted cost, and can minimized the cost of product because of this now SM would be the next replacement in the scenario of latest technologies in production methodology. This tries to discuss various benefits of sustainable manufacturing. There is requirement of parallel concentration of all three major elements i.e., ecology, economics and social implications in SM during production time and product delivery. So this paper gives you the review on its affect over forward supply chain as well as reverse supply chain. Read More...
|
Mechanical Engineering |
India |
753-755 |
183 |
Iris Based Biometric Recognition System using Hamming Distance
-Kameshwar Nishad ; Sandeep B. Patil
In today’s world, a reliable person identification system is required to control the access in secure areas. Conventional methods of recognition by using passwords are not reliable, because they may be forgotten, stolen, disclosable, or transferable. An iris based recognition system provides identification of an individual based on a unique feature or characteristic possessed by that individual. Human iris has large number of features such as arching, ligaments, furrows, ridges, crypts, rings, corona and zigzag collarette. The average diameter of the iris is 12 mm, and the pupil size can vary from 10% to 80% of the iris diameter. Iris recognition is considered as the most reliable and accurate biometric recognition system. This research paper proposed the use of iris based biometric recognition system using HAMMING Distance method as feature matching technique. We take iris image of twelve different people. For determining the iris based recognition system performance the standard database of digitized grayscale eye images were used. Read More...
|
Electronics and Telecommunication Department |
India |
756-758 |
184 |
Potential Intent Classification of Social Text
-Nikita Taware ; Nikita Taware; Shubham Taware; Ratan Gosavi; Pooja Gud
Social media systems facilitate the emergence of subject teams that talk actual world occasions. Their content material reflects a ramiï¬cation of cause ranging from social fascinating (e.g., volunteering to help) to industrial interest (e.g., criticizing product capabilities). Consequently, mining purpose from social records will resource in ï¬ltering social media to help teams, like Associate in Nursing emergency management unit for helpful resource designing. However, powerful reason mining is inherently difficult thanks to ambiguity in interpretation, and scantiness of applicable behaviors in social information. we have a tendency to bestowed a completely unique approach to classify intent of Social-Text employing a hybrid approach that mixes knowledge-guided patterns with grammar features(intent) supported bag of tokens victimization this, we have a tendency to style efï¬cient cooperative data systems that facilitate organizations efï¬ciently ï¬lter content to fulfill their data desires additionally as interact targeted voters. Read More...
|
Computer Engineering |
India |
759-761 |
185 |
Smart Removal of Redundant Data using Progressive Techniques
-Kirti Mane ; Kirti Mane; Manisha More; Vishakha Bansode; Pallavi Gawade
Data are among the most important assets of a company .but due to data changes and sloppy data entry, errors such as duplicate entries might occur, making data clean sing and in particular duplicate detection indispensable. However, the poor size of todays data sets render duplicate detection processes expensive. Online retailers, for e.g., offer hug catalogs comprising a constantly growing set of items from many different suppliers. As independent persons change the product portfolio, duplicate rise. Although there is an obvious need for de-duplication. Progressive duplicate detection identiï¬es most duplicate pairs early in the detection process. Instead of reducing the overall time needed to ï¬nish the entire process, progressive approaches try to reduce the average time after which a duplicate is found early termination, in particular, then yields more complete results on a progressive algorithm than on any traditional approach. Read More...
|
Computer Engineering |
India |
762-763 |
186 |
Predicting Movie Trailer Viewers "Likes/Dislikes"
-Ashwini Mail ; Ashwini Mail; Monali Bhondve; Smita Bhondve; Shital Phunde
Nowadays, several moving picture trailers area unit on the market on social media and severally indicate whether or not they like or dislike those video trailers. it's into new direction, Video Content analysis-the illustration and modeling of affectional video content[1]. the most focus of this work is to extract the options. the supply of methodologies for extracting content wills extent the present scope of video. The effective content is color, shot and motion. Among several of the multimedia system options, single low-level multimedia system options of shot length variance area unit extremely prognosticative of a viewers like/dislike. The user might want to pick out a moving picture not solely supported its solid, director and story content. Feature extraction and machine learning approaches are often used wont to calculate the score range of like and dislike. Color options, motion options and shot options area unit extracted. Here we have a tendency to calculate the score exploitation shot writing variance pattern. This calculated score supports to predict the success of preview before launching. It helps to avoid the loss of administrators. A trailer needs to have interaction viewers for fewer than a pair of minutes and thirty seconds, that is that the most length allowed by the MPAA (Motion image Association of America). So, the trailer aims to inform the story of a movie in engaging fashion. it's price to mention that in comparison these functions, the ratings of like/dislike correlate closely with the viewers written responses to the preview videos. For police investigation the changes in scene some fast scene analysis algorithms area unit used [2]. Read More...
|
Computer Engineering |
India |
764-765 |
187 |
Increasing Intelligence of Viral Marketing in Social Network using Information Diffusion
-Swati Saunkhe ; Swati Saunkhe; Apeksha Chavan; Ram Chaudhar; Umakant Lathor
The rising of mobile social networks opens opportunities for infectious agent selling. However, before absolutely utilizing mobile social networks as a platform for infectious agent selling, several challenges have to be compelled to be addressed. during this paper, we have a tendency to address the matter of distinguishing a little variety of people through whom the knowledge will be subtle to the network as presently as potential, spoken because the diffusion reduction downside. Diffusion reduction beneath the probabilistic diffusion model will be developed as AN uneven k- center downside that is NP-hard, and also the best best-known approximation algorithmic rule for the uneven k-center downside has approximation quantitative relation of log n and time complexness O(n5). Clearly, the performance and also the time complexness of the approximation algorithmic rule don't seem to be satisï¬able in large-scale mobile social networks. To subsume this downside, we have a tendency to propose a community primarily based algorithmic rule and a distributed set-cover algorithmic rule. The performance of the planned algorithms is evaluated by in depth experiments on each artificial networks and a true trace. The results show that the community primarily based algorithmic rule has the simplest performance in both synthetic networks and there altrace compared to existing algorithms, and also the distributed set-cover algorithmic rule out performs the approximation algorithmic rule within the real trace in terms of diffusion time. Read More...
|
Computer Engineering |
India |
766-767 |
188 |
Stock Market Behaviour Prediction using Sentiment Analysis
-Akshata Bahirmal ; Reshma Thorat
Recently, the online has speedily emerged as a good supply of ï¬nancial data starting from news articles to non-public opinions. Data processing and analysis of such ï¬nancial data will aid exchange predictions. We have a tendency to introduce completely unique thanks to derive insights available market behavior supported sentiments of net users. Our Project involves scanning for ï¬nancial message boards and extracting sentiments expressed by individual authors. Sentiment analysis is performed mistreatment machine learning and also the model can establish the patterns of the exchange supported the emotions of the online users. And any these insights may counsel whether or not to shop for, Sell, Hold, Strongly Buy or strongly sell the stocks. Read More...
|
Computer Engineering |
India |
768-769 |
189 |
IPath: Path Inference in Wireless Sensor Network
-Shifali Doshi ; Shifali Doshi; Kiran Ghadage; Manisha Pansare; Dipali Rupnawar
Wireless sensing element networks (WSNs) are getting more and more advanced with the growing network scale and also the dynamic nature of wireless communications. several measure and diagnostic approaches rely upon per-packet routing methods for correct and fine-grained analysis of the advanced network behaviors. during this paper, we tend to propose iPath, a unique path logical thinking approach to reconstructing the per-packet routing methods in dynamic and large-scale networks. The essential plan of iPath is to take advantage of high path similarity to iteratively infer long methods from short ones. iPath starts with associate degree initial notable set of methods and performs path logical thinking iteratively. iPath includes a unique style of a light-weight hash operate for verification of the inferred methods. so as to more improve the logical thinking capability likewise because the execution potency, iPath includes a quick bootstrapping algorithmic program to reconstruct the initial set of methods. we tend to additionally implement iPath and judge its performance exploitation traces from large-scale WSN deployments likewise as in depth simulations. Results show that iPath achieves a lot of higher reconstruction ratios underneath totally different network settings compared to alternative progressive approaches. Read More...
|
Computer Engineering |
India |
770-771 |
190 |
Image Authentication using DSA via Digital Watermark
-Bankar Mohini ; Bankar Mohini; Choulang Sonal; Pawar Sarika; Nimbalkar Trupti
The introduction of 3G wireless communication systems, alongside the invasive distribution of digital pictures and also the growing concern on their originality triggers associate degree aborning want of authenticating pictures received by unreliable channels, like public net and wireless networks. to fulfil this want, a content-based image authentication theme that's appropriate for associate degree insecure network and sturdy to transmission errors is planned. The planned theme exploits the quantifiability of a structural digital signature so as to realize a decent trade-off between security and image transfer for networked image applications. During this theme, multi-scale options are wont to build digital signatures sturdy to image degradations and key dependent constant quantity moving ridge ï¬lters ar utilized to boost the safety against forgery attacks. This theme is additionally ready to distinguish meddling areas within the attacked image. Experimental results show the lustiness and validity of the planned theme. Read More...
|
Computer Engineering |
India |
772-773 |
191 |
A Review on Novel Approach for Text Compression
-Pallavi P. Surwade ; V. B. More
Generally, textual data sets are represented by using different models. But, sometimes it does not capture the text structure, or some models that preserves text structure. Vector space model is also known as the ‘bag of word model’. To represent textual document using vector space model is based on most text mining methods. This model cannot maintain the text structure as it is. Compression distances are the most widely used technique for the purpose of knowledge discovery and mining of data also to improve the performance metric. Compression distance technique is for measuring the similarity between two documents. By applying Distortion technique which is for purpose of destroys the text structure. A distortion technique removes non-relevant words as well as maintains the text structure. Mostly, clustering is based on compression. The NCD i.e. Normalized compression distance technique is works in any application area. By length of compressed data files NCD gets computed. NCD captures the structural similarity between text documents as well as between XML documents. In document retrieval process different documents are stored as different entities. The results show that, by using a compressor that makes the choice of the size of the left-context symbols helps to determine the nature of the data sets. By applying a specific word removal technique clustering accuracy can be improved. This distortion technique consists of removing the most frequent words of the language preserving the previous text structure. Read More...
|
Computer Engineering |
India |
774-777 |
192 |
Internet of Things in Blockchains and Smart Contracts
-Sruthi Maria Abraham
Blockchains allow us to have distributed peer-to-peer network where untrusted members can interact each other without a trusted intermediary in a verifiable manner. In this paper, motivated by recent explosion around blockchain, examines whether they make good fit for IoT sector. Also reviews how this mechanism works and also look into smart contracts-scripts that reside on the blockchain that allow for the automation of multi-step processes. For blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of a marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time-consuming workflows. This paper also point out certain issues that should be considered before the deployment of a blockchain network in an IoT setting: from transactional privacy to the expected value of the digitized assets traded on the network. The blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications. Read More...
|
Electronics & Communication Engineering |
India |
778-781 |
193 |
Techniques for Improving Visual Security
-Aswini Prasad
Visual data security is ensuring that information cannot be seen by unauthorized individuals. This is particularly important when dealing with private or sensitive information, and the threat of a breach has risen enormously with the shift in working practices towards increased mobility, flexibility and shared resources. In the development in recent decades of various efficient image encryption algorithms, such as selective encryption, a great demand has arisen for methods of examining the visual security of encrypted images. Existing solutions usually adopt well-known metrics to measure the quality of encrypted images, but they often show undesired behavior on perceptually encrypted images of low quality. In this paper, we propose a novel visual security index (VSI) based on the human visual system. The proposed VSI evaluates two aspects of the content similarity between plain and encrypted images: the edge similarity extracted via multi-threshold edge detection and the texture similarity measured by means of the co-occurrence matrix. These two components are further integrated to obtain the proposed VSI through adaptive similarity weighting. Extensive experiments were performed on two publicly available image databases. Read More...
|
Electronics & Communication Engineering |
India |
782-785 |
194 |
Spreading Sequence Design for Partially and Fully Connected AF Relay Networks under Multipath Fading
-Sruthi Maria Abraham
Multipath fading degrades the performance of wireless communication system significantly as data rate increases. In-order to combat with multipath fading, orthogonal frequency division multiplexing (OFDM) have been used in existing systems. Another effective method is a code division multiple access (CDMA) scheme. It has used extensively for relay network communication systems. In this paper consists of uplink CDMA relay networks and downlink CDMA relay networks. The uplink CDMA relay networks consist of multiple sources, multiple relays and a single destination. In downlink CDMA relay networks consist of a single source, multiple relays and multiple destinations. The objective of the paper is to propose a unique, simple method of finding optimum non-binary pseudo noise (PN) spreading and de-spreading sequences. This employs maximum signal to interference plus noise ratio (SINR) criterion and channel state information (CSI). Read More...
|
Electronics & Communication Engineering |
India |
786-789 |
195 |
An Overview of Cloud Computing and its Virtualization
-Vineeth MV ; Sojan John
Cloud computing is a rapidly evolving area that offers the potential for federal agencies of all sizes to increase flexibility and efficiency. With cloud computing, services and data are provided by shared computing resources in scalable data centres and are accessible over the Internet. Key advantages are that services are easily available on demand and can rapidly scale both up and down as needed. Current types of cloud service include applications (software as a service); development tools (platform as a service); and virtualized computing resources such as servers (infrastructure as a service). Virtualization may bring several advantages to the design of modern computer systems including better security, higher reliability and availability, reduced costs, better adaptability to workload variations, easier migration of virtual machines among physical machines, and easy coexistence of legacy applications. Read More...
|
Computer Science and Engineering |
India |
790-795 |
196 |
A Survey Paper on Market Basket Scaling Analysis using Map-Reduction Technique
-Ankita Shah ; Ankita D Shah; Mohit Patel; Sachin Jain
Market Basket Analysis is a technique to identify the items that are purchased together. A predictive market basket analysis is used to identify sets of products/services purchased or events that occur generally in sequence. The fundamental approach is to find the associated pairs of items in a store when there are transaction data sets. Consequently, our proposed framework performing "Market Basket Analysis†will help the retailers to settle on better choices all through the whole organization which will help in expanding the benefits and effectiveness of organization. Map/Reduce to upgrade and change over the current successive calculations to parallel programming so that the propose Market Basket Analysis calculation with Map Reduce will give better Future Prediction. Two calculations are proposed: One is to adjust current Apriori-calculation and second is to build a straightforward calculation that sort’s information sets and changes over it to (key, value) sets to fit with Map Reduce. The framework will be implemented on "MATLAB" structure utilizing Scale with clickstream datasets. Read More...
|
Computer Science and Engineering |
India |
796-798 |
197 |
A Survey Paper on Twitter Sentiment Analysis of Current Affairs
-Mahavar Anjali ; Priya Pati; Abhishek Tripathi
Sentiment Analysis is an important type of text analysis that aims to support decision making by extracting & analyzing opinion oriented text. Indentifying positive & negative opinions & measuring how positively & negatively an entity is regarded. sentiment analysis on social media data while the use of machine learning classifier for predicting the sentiment orientation provides a useful tool for users to monitor brand or product sentiment. Document level sentiment analysis is used which consists of Term Frequency (TF) and Inverse Document Frequency (IDF) values as features along with Fuzzy Clustering which results in positive and negative sentiments. As more & more user express their views & opinion on twitter. So twitter becomes valuable sources of people’s opinions. Tweets data can be used to infer people’s opinion for marketing & social studies. Twitter sentiment analysis that can spot the general people’s opinion in regard to social event which are going to be in current on twitter. In this research will take current scenario which are going to be on twitter as an example for sentiment analysis. In these will use the proposed feature extraction model with SVM classifier. Using this can obtain greater accuracy as compared to previous research work. Read More...
|
Computer Science and Engineering |
India |
799-801 |
198 |
Assessment of Procurement Parameters for a Construction Material by using Taguchi Method (DOE)
-Harish Patel ; Dr. Vivek Mishra
In the present scenario all the industry wants to increase the productivity by reducing the unnecessary operation, barriers, losses and environmental pollution can help for winning the trust of customers and have began to pay more attention towards procurement. Implementation of procurement will result in significant improvement in all of these areas, material and help to achieve the goal of the industry. Procurement in the one most factor for saving cost by procure better product in right place for good quality product for right time in right place for continuous work of our organization or company. In procurement decision generally involved making buying decision under condition of scarcity. With the help of data analysis, it becomes easy to make use of economic analysis method such as cost-benefit analysis or cost utility analysis. The ANOVA test analysis for mixture machine, labour, steel and stone gives significant result of three procurement parameters i.e. Cost, Quality, Time are considered in which to draw plot graph and mathematical calculation and the result highly quality by help of Taguchi method in order to optimize the procurement process parameters for reducing the total cost of project. Read More...
|
M.E. (Industrial Engineering and Management) |
India |
802-806 |
199 |
Removing Impulse Noise and Gaussian Noise from Images using Recursive Fuzzy Weighted Median Filter
-Chetan S ; Vanitha R
In digital image processing noise removal or noise filtering is an important criteria. During analog to digital conversion,, compressing of images , transmission of signal, pre-processing images usually affect with impulse noise (spike noise or salt and pepper noise[1]. Linear noise filtering technique does not work well when the noise is non-adaptive in nature. The novel approach proposed in this paper is an adaptive digital signal processing technique that can efficiently remove impulse noise from color image. It is a histogram based adaptive threshold algorithm where a pixel is replaced only if it is identified to be noisy pixel otherwise the original pixel is retained this technique been implemented using noise-exclusive fuzzy switching median filter (RFSMF) algorithm. The proposed technique is a better filtering method when compared to conventional median filters and its modified filters in present era[1]. It is proved that the proposed algorithm is moderately suitable for high noise environment Read More...
|
Computer Science and Engineering |
India |
807-810 |
200 |
A Review on Data Mining Techniques, Importance and Some Related Issues
-Shruti Chandrakar ; Shreya Jain Rajabhoj
Data mining techniques and processes helps the organization to analyze the growth and helps to plan for future. There are many area where the data analyst can apply the specific techniques and algorithm to analyze the data from raw data. Today every organization need to analyze their data. Not only the private organization also a government organization need to analyze their data. The data mining area is not limited only for any business organization there are many others area like medical, weather forecasting and many more where data mining techniques are important. Data mining and analysis is very important part on an organization. But there is also need to focus on security and the privacy while mining the data. Read More...
|
Computer Science and Engineering |
India |
811-813 |