No. |
Title and Author |
Area |
Country |
Page |
201 |
Tasks Scheduling with Multi-Layer Hybrid Energy Efficient Approach in Green Cloud Computing
-Daljinder Singh ; Mandeep Devgan
Cloud computing is an important paradigm in Information Knowledge field. Energy consumption high is one of the major problem of cloud computing system. The main aim of Green Cloud computing is to reduce the energy consumed by physical resources in data-centre and save energy and also increase the performance of the system. There are several scheduling algorithms such as Adaptive Min-Min Scheduling Algorithm, Multilevel Feedback Queue Scheduling Algorithm etc. are utilized in green cloud computing to lower the energy consumption and time. In proposed work, one scheduling algorithm will be implemented which is Multilevel Feedback Queue Scheduling Algorithm. On its basis, energy consumption taking place will be reduced after using improved Adaptive Min-Min Scheduling Algorithm. Evaluate and comparison the performance parameters like energy consumption and energy consumption. Read More...
|
Information Technology |
India |
814-818 |
202 |
Biodiesel - An Alternative Fuels In Internal Combustion Engine
-Shelke Dipak Dnyandeo ; Dr. P. T. Nitnaware; Prof. S. S. Ingle
The rapid growth in industrial development and motorization, the world has extraordinarily raised the demand of the petroleum products. The reservoirs of such a petroleum based fuels are limited in the world. In recent time, the world is facing problems with energy crises due to depletion of conventional energy sources and increase environmental problems. Also, they are exhaustible and cost is rapidly increasing day to day. Hence, it is quit necessary to focus on an alternative fuels which are neither exhaustible nor harmful to environment and can be derived from the material available in the country. Recently biofuels is being considered as one of the most promising alternative fuels in internal combustion engine. Because it have low evaporation losses as well as it is safer for transportation and storage. From the past research’s it concludes that with the use of bio-fuels as a fuel in engines, there is remarkable reduction in harmful emissions as well as one will get the same engine efficiency. Recently consumption of biodiesel as well as their blends with diesel is increases, as it decreases the dependence on imported petroleum; providing a market for the excess production of vegetable oils and animal fats, using renewable and biodegradable fuels, reducing global warming; and reducing substantially the exhaust emissions of carbon monoxide, unburned hydrocarbons, and particulate emissions from diesel engines. However, there are major drawbacks in the use of biofuel blends as NOx tends to be higher. The fuel additives become obligatory tools not only to decrease these disadvantages but also to produce specified products. Additives improve ignition and combustion efficiency, stabilize fuel mixtures, protect the motor from abrasion and wax deposition, and reduce pollutant emissions, among other features. Read More...
|
M.tech in Heat Power Engineer |
India |
819-822 |
203 |
A Survey Paper on Product Review Based on Geo-Graphic Location using SVM Approach in Twitter
-Sujal Shah ; Reshma Lakhani
Many organizations do distinctive sorts of overviews like Product quality study, aggressive items and market study, mark audit study, client benefit review, new item acknowledgment and request study, client trust and steadfastness study and numerous different studies for the organization and item upgrades. These sort of reviews need parcel of spending plan, labor and part of time. The report produced by this procedure won't not be certified. This is tedious, high spending plan included and manual process. Online informal organization (OSNs, for example, Facebook, Google+, and Twitter has changed the present framework in many measurements. Twitter will useful for company to grow their business ideas and launching new products. Read More...
|
Computer Engineering |
India |
823-825 |
204 |
A 7T SRAM Cell Design and Comparison with Low Average Power in Read and Write Cycles
-Abhishek Jain ; Prof. Braj Bihari Soni
The system memories requirement depends greatly on the nature of the applications which run on the system. Memory performance and capacity requirements are small for simple, low cost systems. In contrast, memory throughput can be the most critical requirement in complex, high performance systems. The following general types of memories can be used in systems such as Volatile and non-volatile memories. SRAM can be found in the cache memory of a computer or as a part of the RAM digital to analog converters on video cards. Static RAM is also used for high-speed registers, caches and small memory banks like a frame buffer on a display adapter. Several scientific and industrial subsystems, modern appliances, automotive electronics, electronic toys, mobile phones, synthesizers and digital cameras also use SRAM. It is also highly recommended for use in PCs, peripheral equipment, printers, LCD screens, hard disk buffers etc. Different transistor counts in used in SRAM architecture such as Bipolar junction transistors used in TTL and ECL which is very fast but consumes a lot of power and MOSFET used in CMOS which is used at low power and also very common today. This paper proposed to improve the stability of SRAM cell and also reduces the average power in standby mode. This paper presents a low average power based layout design of 7T SRAM architecture. Read More...
|
VLSI |
India |
826-830 |
205 |
Jatropha Oil an Alternative Natural Fuel for Combustion: A Review
-Adhar Asati ; Sanjay Kumbhare; K. K. Thakur
The increasing industry and motorisation of the globe has LED to an increasing demand of rock oil merchandise. Thus it's necessary to look the choice biofuels like atmosphere friendly. There are numerous varieties of raw materials are used for production of biodiesel like Jatropha, Karanja, Mahua, Undi, Castor, Jojoba, oilseed etc. A non-edible oil seeds and numerous vegetable oils as well as vegetable oil, soybean plant bean oil, oil, colza oil and waste vegetable oils. It will be utilized in internal-combustion engine with no modifications. It’s easy to use perishable, nontoxic and having low emissions. In India, edible vegetable oils are in brief offer and Bharat has to import forty fifth of total needs (600,000 tons) each year, to bridge the gap. Used oil is much not out there, because it is employed until the tip attributable to shortage. In several developed countries vegetable oil in way over their native needs of edible oils. They need to lose these oils and changing these to Biodiesel as fuel is best choice for them for disposal. Read More...
|
THERMAL ENGINEERING |
India |
831-833 |
206 |
Experimental Study on Bitumen Mix using Plastic Waste
-Ms. A. Rajkohila ; Mrs. V. Ganga
Waste material management is one of the powerful concepts in recent year. To overcome the plastic waste by leaps and bond requires reuse of waste materials in road construction. The use of these materials in road making is based on technical, economic, and ecological criteria. Several million metric tons plastic wastes are produced in India every year. If these materials can be suitably utilized in highway road construction, the pollution and disposal problems may be partly reduced. In this paper we used Low Density Polyethylene bags in road construction and study on the various test performed on aggregates, bitumen and bituminous mix. Read More...
|
Civil Engineering |
India |
834-837 |
207 |
Security for Storing Data in Cloud
-Raut Tejas Nandkumar ; Salunke Trupti Arjun; Solanki Vikram Mahendra; Raut Tejas Nandkumar; Salve Kishor Popat
Cloud computing is the new emerging technology which is going to play an important role in future. As the many of the services are provided by cloud such as Saas, Paas and Iaas so any one using this services has to pay for it. In this paper, we focus on cloud data storage security, which is always been an important aspect of quality of service. So while storing the data in cloud there is fear that either it is secure or not this security challenge need to handle. For that, to ensure the user we are going to propose a system that will be more helpful to the user to store the data more securely in cloud. It consist of three entities: data owner, TPA and cloud server. The data owner performs various operations such as splitting the file to blocks, encrypting them, generating a hash value for each, concatenating it and generating a signature on it. And the Data owner can check his data integrity by providing indices of blocks. Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Read More...
|
Computer Engineering |
India |
838-839 |
208 |
Novel Approach for Designing of Low Cost High Sensitive Ultrasonic Proximity Detector for Blind Person using Wireless Techniques
-Tarak Das ; Pratik Das
Proximity Detection is a technique for realizing any obstruction in a given range. The technique involves an injection of an additional pulse to a piezotransmitter for amplification and calibration of reflecting pulse from the obstruction, which is received by piezoreceiver. The technique “Ultra Sonic Proximity Detector (USPD)†is found useful in particularly to design the Blind Stick1, 2, which can makes the life of a blind person more comfortable during walking. Not much has been done in the field to improve the sensitivity of the blind stick. In this article the proximity detector is design in such a way which is high sensitive and having both option for wireless head phone and buzzer. Read More...
|
Bio mechanical & Biomedical Engineering |
India |
840-842 |
209 |
Takagi-Sugeno Type Fault Detection and Isolation Scheme for Pneumatic Process Control Valve Using Adaptive Neuro Fuzzy Inference System
-Prabakaran K ; Suresh Kumar P; Senthilkumar P
As modern process industries become more complex, the importance to detect and identify the faulty operation of pneumatic process control valves is increasing rapidly. The prior detection of faults leads to avoiding the system shutdown, breakdown, raw material damage and etc. The proposed approach for fault diagnosis comprises of two processes such as fault detection and fault isolation. In fault diagnosis, the difference between the system outputs and model outputs called as residuals are used to detect and isolate the faults. But in the control valve it is not an easy process due to inherent nonlinearity. This paper proposes a new integrated diagnostic system for pneumatic control valve fault diagnosis by means of a neuro fuzzy approach. The particular values of five measurable quantities from the valve are depend on the commonly occurring faults such as Incorrect supply pressure, Diaphragm leakage and Actuator vent blockage. The correlations between these parameters from the fault values for each operating condition are recognized by an Adaptive Neuro Fuzzy Inference System (ANFIS). The parameter consideration is done through the committee of Development and Application of Methods for Actuator Diagnosis in Industrial Control Systems (DAMADICS). The simulation results using Matlab prove that Adaptive Neuro Fuzzy Inference System has the ability to detect and identify various magnitudes of the faults and can isolate multiple faults. Read More...
|
ELECTRONICS AND INSTRUMENTATION |
India |
843-847 |
210 |
A New Design of Lead Acid Battery Charging System with Improved Efficiency
-M. Ejas Ahamed ; S. Senthilkumar
This paper represents a new lead acid battery charging system. This system has the possibility in different applications (communications systems, electric vehicles, and low-Earth-orbit spacecraft) in order to minimize charging time using bidirectional dc-dc convert. Evolution of main parameters (battery voltage, current, switching stress and temperature) was recorded. Then, data obtained were processed and analyzed to determine the effects of fast-charging on Lead acid batteries. The simulation results are used to show main characteristics of charging process as a function of charging rate used. In this way, simulation results were taken to the application range of fast-charging in medium/high capacity Lead acid batteries can be reached. The design is verified by MATLAB simulation. Read More...
|
Electrical Engineering |
India |
848-852 |
211 |
Progressive Collapse Analysis of High Rise RC Framed Structure
-Md Ahtesham ; S Mangalgi
In the present study, the demand capacity ratio (DCR) of thirteen storey RC framed symmetrical and unsymmetrical structures are evaluated as per U.S. General Services Administration (GSA) guidelines. The Linear static analysis is carried out using software, ETABS V13 according to IS codes. To study the progressive collapse of a structure, typical columns are removed one at a time, and continued with design and analysis. When columns at different locations in a symmetric and unsymmetrical building was removed among the intersecting beams the shorter span tend to take the extra burden load and DCR values of shorter span beams were more compared to longer span beams. The DCR values obtained show that columns of both symmetric and unsymmetrical structure are safe and beams of both symmetric and unsymmetrical structure to be reinforced additionally. Read More...
|
Structural Engineering |
India |
853-856 |
212 |
Design and Fabrication of Ackerman Steering Mechanism Combining with ABS
-K. Vinoth Kumar ; K. Subha Theja; Kaza Sri Sai Sravan; Kari Naga Nikhil; Kakollu Manoj Kumar
The Ackerman steering mechanism is to avoid the slip of tyres on sideways when following the path around a curve. This mechanism is for all wheels to have their axels arrangement as radii of circles with a common centre point. As the rear wheels are fixed this centre point must be on the line extended from the rear axle. Intersecting the axes of front wheels on this line as well requires that the inside front wheel is turned through a greater angle than the outside wheel. Wheel locking is a predominant phenomenon during panic braking and this will cause vehicle skidding resulting in injuries and road accidents. As the road safety regulations are becoming more stringent, the anti-lock brake system will replace the conventional brake systems in all road vehicles to avoid accidents and to improve vehicle safety. Read More...
|
Mechanical Engineering |
India |
857-864 |
213 |
Cluster Based Intrusion Detection System for Prevant MANET from Attacks
-Shraddha Singh ; Sanjay Singh Chauhan
mobile ad-hoc network is one of the interesting field where lots of work done regarding security. In this paper we study about manet and intrusion detection system, for security we propose a cluster base neighbor sensing approach for detect and prevent attack in mobile ad-hoc network. Read More...
|
Communication Systems |
India |
865-869 |
214 |
A Novel Approach for Load Balancing and Privacy Preservation in Real-Time Wireless Sensor Networks
-Jeena P Abraham ; Lidiya Raju
Wireless sensor networks are collection of small sensing self-powered nodes organized into a supportive network which have certain processing capabilities and the nodes communicate wirelessly. Securing data and proper load balancing is a challenging task in wireless sensor networks. This paper propose a new mechanisms for privacy preservation and load balancing in real-time wireless sensor networks, i.e. DA (Data Aggregation) and MHCM (Multi-hop communication mechanism), which combines data aggregation and multi-hop communication mechanisms. Using this mechanisms a proper load balancing is possible using clusters and it also provide protection against collusion attacks in real- time wireless sensor networks. Read More...
|
Computer Science and Engineering |
India |
870-871 |
215 |
Secure Encryption Mechanism in Multi - Mobile Cloud Computing
-Nisha Mohan P M ; Anju Rachel Oommen
Mobile Cloud Computing is a form where applications and mobile data are downloaded stored and hosted using cloud computing technology. The homomorphic encryption allows making calculations on encrypted data without decrypting it. It does not provide proper security. This paper describes a new technique which provides secure encryption in multi-mobile cloud computing environment, i.e. Multi Mobile Encryption Mechanism (MMEM). Using this mechanism to improve the availability, integrity and confidentiality of information stored in the different cloud providers by using the multi-mobile cloud Read More...
|
Computer Science and Engineering |
India |
872-873 |
216 |
Security for Images in Cloud Computing
-Anju Rachel Oommen ; Nisha Mohan P M
Cloud computing has gained more popularity in the recent time and it provide numerous services. Image transfer is one of the major services it provides other than text. The Rapid growth of electronic media helps in fast exchange of images. The progress in data exchange by electronic system needed more of security and has become a necessity. Challenges in cloud computing include confidentiality, scalability in data centers. In this paper, we define a security measure for images by the use of blowfish encryption algorithm. Read More...
|
Computer Science and Engineering |
India |
874-875 |
217 |
Secure Arrowhead Framework in the Local Cloud
-Lidiya Raju ; Jeena P Abraham
This paper presents a construct that supports security in an arrowhead framework. By providing the means of service oriented architecture, the arrowhead framework supports local cloud functionalities for automation applications. In order to provide secure communications in a local cloud, arrowhead themselves request the service as framework .This framework can have an impact on scalability also. Read More...
|
Computer Science and Engineering |
India |
876-877 |
218 |
Driver Drowsiness Detection: A Review
-Sapna Bhagat ; Dr. V. K Banga
Drowsy driving is really a serious problem leading to a huge number of automobiles crashes each year. The risk of drowsy driving are already understood for many years. Numerous problems make the issues difficult evaluate accurately as well as emerging research declare that the drowsy driving problem is really more common than both equally experts and people have realized so far. So there is certainly need to develop a process that registers fatigue much more accurate, in early systems deriving a highly efficient face area from unique driver face photographs is an essential stage for effective fatigue facial appearance recognition. In this report extensive evaluation on driver drowsiness approach has been presented. Read More...
|
Electronics & Communication Engineering |
India |
878-880 |
219 |
A Machine Learning Model for Temporal Anomaly Detection in Venture Cyber-Security
-Geethumol P. V ; Sithara Sasidharan
Anomaly detection is emerging as an important complement to signature-based methods for venture network defence. In this paper, discuss an persevering structure to describe anomaly detection in large enterprise networks. This structure provides structure in the basis of a regression-based anomaly detection method. This paper describes Markov-Chain model for detecting anomalies in network. Read More...
|
Computer Science and Engineering |
India |
881-882 |
220 |
Efficient Edge Detection Method Based On Soft Computing: A Review
-Navdeep Kaur ; Dr. Vijay Kumar
several edge recognition strategies have now been planned within the past decades. Many are derived from differential strategies such as for example Sobel, Roberts, Laplacian operators, and therefore on. Nevertheless these calculations are quite sensitive to sound, in order to restrain sound before sensing edges. In this report intensive literature review has been presented in numerous edge recognition strategies which give various restrictions that can be overcome in the proposed strategies i.e. hybrid approach. Read More...
|
Electronics & Communication Engineering |
India |
883-885 |
221 |
Simulation of Z-source Inverter using SBC Method
-Kalpinkumar P Desai ; Pushpak B Patel; Ashish N Patel
There are many application in industry and special machines which require different voltage level and frequency. The power electronics device which converts DC power to AC power at required output voltage and frequency level is known as inverter. Three are mainly Voltage source inverter and current source Inverter is used for DC to AC power conversion. There are some conceptual and theoretical barriers and limitations of this topology. Nowadays Impedance source inverter is used which eliminates that problem. Impedance source inverter is emerging as a new breed of power inverter for convert desire level without using boost circuit, so it reduce loss & cost and improve efficiency. Impedance sources Inverter are used especially in Fuel cell application, PV system and Wind Energy Conversion system etc. This have unique feature which provide desire output voltage. It also Work as buck-boost converter. This work proposes a simulation of three phase Impedance source inverter. The Simulation has been carried out with MATLAB/SIMULINK. Read More...
|
M.Tech Power System Engineering |
India |
886-889 |
222 |
Big Data Analytics in Secure Software Development Life Cycle
-Sithara Sasidharan ; Geethumol P V
A central and critical feature of the computer security problem is a software problem. To improve software security is to provide security process in SDLC processes .In each phase of secure software development life cycle, security testing is needed. This paper proposes an integrated security testing frame work SSDLC in Big data analytic approach. In our proposed framework, system can integrate various security testing tools and supports secure activities. Using this frame work can provide quality, stable service and security in big data. Read More...
|
Computer Science and Engineering |
India |
890-892 |
223 |
Genotoxic Effects in Allium Cepa Exposed to Different Water Samples
-Diana Handa ; Vanita Chahal; Neha Taneja
The aim of the study is to study the effects of different Wastewater samples on Allium cepa by using chromosomal aberration test. The onion bulbs were kept in different wastewater sample along with distilled water as control. Waste water induced various types of chromosomal aberrations like Laggard/s, Vagrant/s, Chromatin bridge/s, Chromosomal break/s Stickiness, Delayed anaphase/s, Disturbed division/s and c-mitosis. The aberrations were more pronounced in pond water. No anomalies were seen at control. The test showed clastogenic effect in water samples. Read More...
|
SCIENCE |
India |
893-894 |
224 |
Internet of Things Based Operation of Home Appliances using Embedded System
-Ushabharathi.S.B ; Santhosh.T.K
Internet of Things is a system that uses computers or mobile devices to control basic home operations and operates automatically through the Internet from anywhere in the world. An automated home is called as smart home. It is meant to save the electric power and human energy. In the existing system, the CELP (code excited linear prediction) parameters are used for speech coding in mobile phones to operate the devices. The disadvantage of CELP coder is its processing delay. The processing delay of the CELP coder is higher because the processing is done for each frame of size 32 vectors and each vector is of 5 samples. An embedded system is used in all fields for any applications. In the proposed system, the processor used is PIC microcontroller. Personal Computer is connected to PIC microcontroller. The home appliances are controlled by giving commands in the Personal Computer. Cloud storage is used to secure the system. PROTEUS software verifies the experimental results. Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
895-898 |
225 |
Leader Effectiveness of the Secondary Schools Heads: A Study with Special Reference to Kerala
-Dr. Rafeedali. E
This study was to find out the leader effectiveness among the Heads of Secondary schools in Kerala in terms of their gender, age, experience and type of management of their school. The investigator approached 260 heads of the secondary schools throughout the Kerala to collect information regarding their leader behaviour. The study found that 39 percentages of the total sample exhibit Effective Leader behaviour. 19 percentage of heads shows Problem Leader behavior while 42 percentage reveals Inefficient Leader behavior. It also found that among the Effective Leaders, the percentages of females, age group two and experience group two are significantly higher than their males, age group one and experience group one counterpart. But the percentages of Effective Leaders among aided school heads and government school heads do not differ significantly. The study suggests the need for effective leadership training programme for heads of secondary school in Kerala. Read More...
|
Education |
India |
899-903 |
226 |
A Review of Control Techniques in MPPT for Solar Power System Used to Monitor and Power Management
-Saiyad Asad Ali Naqvi ; Suchi Shukla
the purpose of this review is to study various control techniques used to control solar power generation as to optimize and track maximum power from solar radiations. Now a day researchers are focused on both the aspects that to optimize the power as compared to demand and to track maximum energy from solar radiations. Fuzzy logic controllers (FLC), PID, Artificial Neural Network (ANN), perturb and observe, feedback voltage, incremental conductance, Multiagent –System (MAS) are few techniques. Among these techniques FLC and MPPT are most attracting techniques for solar power system. In this paper the purpose and conditions to use these is reviewed and summered to understand optimization and purpose of using control techniques in non-conventional sources to generate electricity. Read More...
|
Electrical Power System |
India |
906-909 |
227 |
Fabrication Of Automatic Feeding & Cutting Mechanism
-M.Khaja Gulam Hussain ; T.John Babu
Now a days there are many efforts being made for taking away the burden on the humans. For this purpose there are many efforts going on for the Automization of machines. This paper has taken up the fabrication of “Automatic Feeding and Cutting Mechanismâ€. This machine automatically feeds its stock and performs the cutting operation. It involves simple lever mechanisms. Here the power input for the machine is provided by means of a motor. It involves simple mechanisms which transfers the motion from one form to the other. This mechanism is very useful in making holes on metal sheets in industries, by changing the tool. By using this mechanism for stitching of big bags in agriculture. Read More...
|
mechanical engineering |
India |
910-917 |
228 |
A Survey Paper on Big Data and Information Security in It
-Sandeep Kumar Yadav
Big data is a term encircling different types of complicated and large datasets that is hard to process with the conservative data processing systems. With the development of information technology big data application prompts the development of storage, network and computer field. It also brings new security problems. These security challenges caused by Big data has attracted the attention of information security. Big data analysis is now used in almost every phase of our society, communication services, banking and research. Big data utilizes huge quantity of data that may be available in the cloud and it may require data processing distributed across many servers. This paper summarizes the characteristics of big data and information securities in it. We also present the future orientation of information security issues and their feasible countermeasures. Read More...
|
Computer Science and Engineering |
India |
918-920 |
229 |
Web Based Computing Service to Promote Telemedicine Database Management System
-C. Renuga ; Bhuvaneshwari. A
Many web computing classifications are consecutively real time catalogue services where their evidence change continuously and increase incrementally. In this context, web data facilities have a major role and draw significant enhancements in observing and controlling the information straightforwardness and data dissemination. Currently, web telemedicine database services are of central importance to distributed systems. However, the accumulative complexity and the rapid growth of the real world healthcare challenging presentations make it hard to induce the database administrative staff. In this paper, we build a combined web data services that satisfy fast response time for large scale Tele-health database management systems. Our focus will be on database management with submission scenarios in dynamic telemedicine systems to increase care admittances and decrease care difficulties such as distance, travel, and time boundaries. The three-fold approach based on data disintegration, database websites grouping and intellectual data distribution. This approach reduces the quantity of data migrated between websites through applications’ execution; achieves cost effective communications during applications’ processing and improves applications’ response time and throughput. The proposed approach is authenticated internally by measuring the impact of using our calculating services’ techniques on various performance features like transportations cost, response time, and amount. The external validation is accomplished by comparing the performance of this approach towards that of other performances in the literature. The results show that our incorporated approach significantly improves the performance of web database classifications and overtakes its counterparts. Read More...
|
Computer Science |
India |
921-923 |