No. |
Title and Author |
Area |
Country |
Page |
101 |
Identification of Accident Prone Location - A Review
-Khyati B. Pathak ; M. R. Bhatt
Transportation sector is important in Indian economy. Road transport is the only mode which could give maximum service to one and all. Road accident are dark side of transportation. Throughout the world 30,000 persons die and over 10 to 15 million persons are injured every single year in road accidents. The rapid population growth and increasing economic activities are also responsible for highly fatality rate. In this paper so review for identification of accident black spots for two different city and causes of accidents are studied and suggested different remedial measures to reduce number of accidents. Read More...
|
Transportation Engineering |
India |
372-373 |
102 |
Dynamic Analysis of Ladder Chassis Made of Composites with Different Lay-Up Sequence
-Karthick M ; Palanivelrajan A.R; Jaganathan M
The chassis of a heavyweight vehicle aids as a mainstay for supporting the body and its various parts. It contracts with the static and dynamic loads, deprived of excessive deflection or malformation. Weight lessening is now the main concern in automobile industries with growth of new composite materials and various reinforcement structures. In the present work, the proportions of an existing heavyweight vehicle frame of a TATA 1109 EX vehicle is taken for modeling and analysis. The chassis frame is primarily modeled by taking ‘C’ cross section in modeling software and then analyzed using finite element analysis. The dynamic performance is acquired for the Carbon/Epoxy composite material. Several mode shapes and their respective natural frequencies are determined so that the flaws caused by vibrations can be eliminated. Through harmonic analysis of different lay-ups such as, [0/90/45/-45], [90/0/0/90], [0/45/-45/90] and [90/0/45/45] the frequency and amplitude of vibration are determined. Then the results are compared to finalize the best lay-up sequence among them. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
374-378 |
103 |
Importance of IoT for Smart Agriculture
-Pavankumar Naik ; Rajeshwari Gamanagatti; Nagaraj Telkar; Kiran Kotin; Jagadeesh Meti
This review paper deals with IoT that can be used to improve cultivation of food crops, as lots of research work is going on to monitor the effective food crop cycle, since from the start to till harvesting the famers are facing very difficult for better yielding of food crops. Although few initiatives have also been taken by the Indian Government for providing online and mobile messaging services to farmers related to agricultural queries and agro vendor’s information to farmers even such information’s are not enough for farmer so still lot of research work need to be carried out on current agricultural approaches so that continuous sensing and monitoring of crops by convergence of sensors with IoT and making farmers to aware about crops growth, harvest time periodically and in turn making high productivity of crops and also ensuring correct delivery of products to end consumers at right place and right time. Read More...
|
Computer Science and Engineering |
India |
379-381 |
104 |
Dynamic Analysis and Fatigue Life Estimation of Wing Fuselage Attachment Bracket of an Airframe Structure
-N.Bhaskara Rao ; K.Sambasiva Rao
Brackets are connector type elements widely used as structural supports for pin connections in airframe structure. In this project a detailed Finite element analysis of the fuselage attachment under the worst loading condition was carried out. During the part of project a dynamic and fatigue analysis of bracket was carried out using finite element analysis package. Then the 3-D model of bracket built in NX CAD is imported into ANSYS using the parasolid format. From the analysis results mode shapes and frequencies are documented by using FEA software. Harmonic analysis is also carried out to plot the frequency Vs amplitude graphs. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
382-387 |
105 |
Reactive Power Compensation using Shunt Capacitor Banks
-Shradhdha J Patel
In this paper, Reactive power compensation is done using shunt capacitors at distribution side. The degree of utilization of the power depends on the power factor of the loads connected to the network. Most of the loads in the distribution line, being inductive in nature, consume much of the reactive power. As a result, the power factor of the load deteriorates, leading to the limitation of the active power flow in the line. Consequences of low power factor are higher current, increased losses and voltage dip in the line. This necessitates reactive power control for load compensation. This paper aims at developing simulation model of end user network using compensator as shunt capacitor. This model is carried out in MATLAB/ Simulink. [1]. Read More...
|
Electrical Power System |
India |
388-389 |
106 |
Comparison of Classification Algorithms for Predicting Breast Cancer
-Dr. S. Senthil ; Deepa B.G; Ashwarya B
Data mining is the process of extracting knowledge hidden in large volumes of data. Data mining tools predict future trends and behavior for knowledge driven decisions. This paper deals with predicting Breast Cancer using classification algorithms. Breast Cancer has been determined to be the second leading cause of death due to cancer and the most common serious type of cancer in women. The classification algorithms that we have taken for our research are J48, Naïve Bayes, LMT, REP Tree, Decision Table, K star, Simple logistic, Iterative classifier optimizer, IBK and Filtered classifier. Experiments were conducted on Wisconsin Breast Cancer datasets using machine learning tool WEKA with classification algorithms listed above. The metrics for the evaluation of the performance of various classification algorithm are accuracy and time taken for classification. The observation of the results have lead to the conclusion that J48 and Filtered classifier are good when it pertains to classification accuracy, although Filtered classifier consumes less time in comparison to J48. This has in fact opened up a plethora of interesting conclusions. Read More...
|
Computer Science |
India |
390-394 |
107 |
Assessment and Mitigation of Ergonomic Factors in Building Construction
-Mrs.Pallavi Swaroop Joshi ; Prof. Devalkar R. V
Nowadays, the costs of Musculoskeletal Disorders(MSD) are considered as the main proportion of workers compensation related costs in construction industry. Many construction industry sectors have been experiencing chronic problems, such as poor management of workforce, improper working conditions, tools, and working methods. Many researchers have identified these problems as factors that affect construction productivity and overall ergonomic performance of the workers. Keeping in view the necessity of addressing problems as stated, a questionnaire-based survey will be conducted to study the critical issues related to the workers. This research has identified influence ranks of about 30 factors affecting construction ergonomic performance. These factors were classified under the following three primary classifications: a) human/labor related factors; b) tasks-related factors; and c)equipment/tools-related factors based on various age groups and occupations of the construction workers. With the help of RII(Relative Importance Index ranking, critical factors are determined. Then for these critical factors, postural analysis has been done by most effective tool REBA. Industry practitioners and researchers can use the primary outcomes of this study in developing systems to enhance and improve health and safety of the construction workers for effective management of construction labor workforce and to achieve a competitive level of quality and a cost-effective project. The objective of this is to provide an overview of ergonomic exposures in building construction work to assess and understand the level of ergonomics awareness particularly in construction industry and to identify current safety practices associated with the prevention of ergonomic injuries and illnesses in the construction field. Read More...
|
Civil Engineering |
India |
395-401 |
108 |
Pedal Operated Design and Fabrication of Groundnut Sheller and Crusher Machine
-Rahul P Khobragade ; Dr. C. N. Sakhale; Dr. N. P. Mungle
In India, most of land use for agricultural purpose which produces semi-finished product or goods. Groundnut also one of the agricultural semi-finished goods. Groundnut is grown on small scale farmers in developing countries like India. This paper describes about the design and fabrication of various components of groundnut Sheller machine. Hence in this design of various parts are necessary, and design of various parts due to which the design quality of those parts will be improved. Overall, this project involves processes like design, fabrication and assembling of different components etc. By keeping the point in our mind, we think that we should make such a machine, whose production capacity is more & machine gets operated on pedal operated of manual work. The new and small former or business man can start their business by investing less capital. So working on the above points, we design and fabricate a new medium production capacity machine and today we proudly present this machine called groundnut Sheller and crusher machine. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
402-406 |
109 |
SCORM Based Learning Platform
-Karishma Panchbhai ; Shalini Doye; Kalyani Dhanorkar; Neha Sawarkar
Now a day's SCORM standards is taking the market of e-learning. Sharable Content Object Reference Model (SCORM) is a universal standard and is made available for sharing purpose. Sharable Content Object Reference Model is suitable for learner and its main objective to produce course content. It ensure high quality in education as well as in training which is suitable to learner’s need and deliver it with effectiveness. It can deliver learning material to the learner and tracking of learner's action and scores. This paper gives brief information about SCORM and e-learning and it would be beneficial for learner. Read More...
|
Computer Science and Engineering |
India |
407-408 |
110 |
Design of Test Rig for Swirl Measurement in I.C. Engine
-Kumar P. Shaha ; Ankush R. Yadav; Sameer V. Shinagare; Rakesh V. Zirpe; Ganesh Suryawanshi
This paper gives the overall view of the swirl measuring techniques and its importance in the efficient combustion. The measurement techniques comprise of types, industrial development and research analysis. In the field of industrial development paddle wheel anemometer technique is best suitable. Angular momentum transfer is created in this test rig which resembles the actual conditions of the working engine for same valve lift. A common technique for characterizing the swirl within the cylinder has been to use light paddle wheel pivoted on the cylinder centerline with low friction bearings. The rotation rate of the paddle wheel is used for measurement of air swirl since this rotation rate depends on the location of wheel and its design and the details of the swirling flow. This technique has been outdated by the impulse swirl meter. Swirl Assists the engine design team in port design development and optimization of port for new development projects for cleaner and efficient technologies. Read More...
|
Mechanical Engineering |
India |
410-413 |
111 |
Cost Effective and Eco-Sustainable Treatment Options for Wastewater Effluents from Pharmaceutical Companies
-Ravinder
There is the concern about the occurrence of active pharmaceutical ingredients, solvents, intermediate and raw materials that may be present in water and sanitation, including wastewater, growing interest in the pharmaceutical industry. Traditional methods of water treatment, such as activated sludge, are not sufficient for a complete removal of active pharmaceutical ingredients and other ingredients of sewage water. As a result, they often use complementary therapies such as membrane filtration, reverse osmosis and activated carbon along with traditional methods to treat industrial wastewater. Most of the writings were published so far in the municipal wastewater treatment. However, there is a growing body of research that looks at the proliferation of active pharmaceutical ingredients in the industrial wastewater and liquid waste treatment and removal rates. This article examines the treatments including both traditional methods and advanced oxidation processes. The paper concludes that the problem of waste water treatment can not be easily solved and there is the necessity of removal of critical chemicals from waste water of pharmaceutical industry. Read More...
|
Biotechnology |
India |
414-418 |
112 |
A Survey on Feasible Summarization of Dynamic Social Network Data Based on Interestingness Measures
-M. Ambika ; G. V. Jayasri; P. Rinthuja; U. Swetha; P. Vigneshkumar
Summarization of dynamic social networks is that collections of each node that communicate between each group, using this summarization data can be collected together in a shorten form. Interestingness measure is implementing the innovative ideas in the project. Some old systems goal is to summarize networks for interesting dynamic pattern. Dynamic networks including time sensitivity, online interestingness evaluation and summary traceability which is used to capturing the some most interesting nodes. By using diffusion radius and scope, we elucidate interestingness measures for dynamic networks and we suggest OSNet, an online summarization framework for dynamic networks. Coherent algorithms are comprised in OSNet. Read More...
|
Computer Science and Engineering |
India |
419-422 |
113 |
Credit Card Fraud Detection Based on the Transaction by using Ontology Fraud Detection Algorithm
-R. Dharmarajan ; V. Sangeetha
Credit card fraud is rising significantly with the growth of recent technology and the global superhighways of communication. Credit card costs consumers and the financial company billions of dollars annually. The swindler continuously attempts to find new plan and procedure to commit illegal actions. Hence, fraud detection systems have become necessary for banks and financial institution, to reduce their losses. The most common techniques used to make the fraud detection model. Incidentally, detection and prevention of credit card frauds are one of the vital problems in the digital world that need exact transactions analysis. One method for detecting fraud is to check for suspicious changes in user behavior. This paper provides an inventive fraud detection method, build upon ontology and ontology instance similarity. Ontology is broadly used to facilitate knowledge distribution and reuse. Thus, several personality ontologies can be simply used to present user actions. By calculating the similarity of ontology instances, we can decide whether an account is defrauded. This technique short the data model cost and makes the system very adaptive to many applications. Read More...
|
Computer Science |
India |
423-425 |
114 |
Smart E-Voting with Predictive Analysis for Organization
-Prof. Deepali Shrikhande ; Ganesh Pundpal; Bhawna Chaudhari; Ashwini Gadadare
Voting is important considering the present day democratic societies. So it is becoming very essential to make the vote casting technique efficient and user-friendly. The proposed application is carried out to allow every and each member to actively participate in the election process irrespective of the area, and this is carried out through the android app to accept the votes of various valid members using the app and also through web based utility. This will ease the voting technique. Today’s world is all about growing Technology, so in order to match with this growing technology it is important to eliminate the pen paper voting process and switch to new technology. In this, Security is provided using the Email Verification and each individual will be uniquely identified. E-vote casting will make the traditional method very easy and efficient. This system lets each and every member to actively take part in election process. In order to get familiar with the applicants description of candidates in provided. The candidates must choose the applicant to be voted. The detailed information of the casted vote will be displayed in the form of analysis. Predication is also included in the app where the members using the app, will be allowed to post their comments, after doing Sentiment Analysis on the comments posted by members, admin & members can view the predication result given by app. Read More...
|
Information Technology |
India |
426-429 |
115 |
Speed Control of Three Phase Induction Motor Using Digital Signal Controller
-Subhash Reddy ; Dr. M. S. Aspalli
A.C induction motor is the workhorse of industrial and residential motor applications due to its robustness, durability and reliability. Normally induction motors are constant speed motors but various application needs variable speed so speed control of induction motor is a big concern now a days. This paper presents the design and analysis of speed control of three phase induction motor using IGBT as switches in the three phase voltage source inverter with constant V/F method control in closed loop using dsPIC30F4011 controller.dsPIC30F4011 is a 16 bit high performance digital signal controller (DSC). DSC is a single chip embedded controller which has both the features of microcontroller and DSP.A 1HP, 3 Phase, 415 volt, 50Hz, 1405 RPM induction motor is used as load for the inverter. Digital storage oscilloscope is used to record and analyze the waveforms. Read More...
|
POWER ELECTRONICS |
India |
430-433 |
116 |
Effect of Compaction on Concrete filled steel tubes under Axial Compression
-Pawar Praveen
In this experimental investigation total 36 no’s of specimen were casted by varying method of compaction, cross section and different grade of infill concrete. Keeping Area(A), thickness(t) and length as constant. It is difficult for compaction in long steel tube columns with the help of needle vibrators so in this experimental investigation the effect of method of compaction is studied for short columns with and without compaction and the load carrying capacity is compared with codal provisions (Euro Code 4, 1994, American concrete institute, 1999., American institute of steel construction, 1999). Read More...
|
Civil Engineering |
India |
434-436 |
117 |
Nonlinear Static Pushover Analysis of Multistory R.C. Building with or without Shear Wall: A Review
-Sanket Jain ; Dr. Savita Maru
A large number of multi-storey reinforced concrete frame building structures in urban India are constructed with masonry infill for architectural, aesthetic or economic reasons, but they are weak in resting the lateral loads due to wind or earthquake. In recent decades, shear wall structures are the most appropriate structural forms, which have caused the height of concrete buildings to be soared. The dual structural system consisting of special moment resisting frame (SMRF) and concrete shear wall has better seismic performance due to improved lateral stiffness and lateral strength. Seismic loads are occasional forces that may occur during the life time of a building. Building should be able to withstand seismic loads due to minor earthquake without any structural damage and major earthquake without total collapse. The present paper work was made in the interest of studying various research works involved in analysis of multi-storey R.C. Building with or without shear wall with the help of Nonlinear Static Pushover Analysis. Read More...
|
Structural Engineering |
India |
437-444 |
118 |
Chopper Based Speed Control of DC Motor using ATMEGA16 Microcontroller
-Shreekant ; Dr. M. S. Aspalli
The speed control of DC motor for various applications is very important because DC motors have been widely used in many industrial applications such as electric vehicles, steel rolling mills, electric cranes, and robotic manipulators due to precise, wide, simple, and continuous control characteristics. There are various methods of speed control of DC drives – armature voltage control, field flux control and armature resistance control. However, the conventional methods have some demerit because some power is wasted in control resistance. This paper deals with controlling DC motor speed through combination the Chopper circuit and ATMEGA16 microcontroller. In this work, PWM that can be used for speed control of a DC motor is generated using ATMEGA16 microcontroller. DC motor is driven by a driver IC IR2100. The H-bridge MOSFET Chopper is driven by a driver IC IR2100 through PWM signal generated by the microcontroller. This work is a practical one and high feasible according to economic point of view and accuracy and it has been tested on 0.5HP DC motor. Read More...
|
POWER ELECTRONICS |
India |
445-448 |
119 |
Airport Cargo System under Intuitionistic Fuzzy Environment
-Dr. P. Jayagowri ; Dr. T. Nallathambi
Network analysis is a method used to determines the various sequences of activities concerning a project and the project completion time. The aim of this paper is to demonstrate how to work the intuitionistic fuzzy critical path method to find airport’s ground critical operations processes and improve. The method takes in to account the rating methodology of decision makers. Vague parameters in the project network are represented by intuitionistic trapezoidal fuzzy numbers. Intuitionistic fuzzy critical length of the project network is found without defuzzification of the intuitionistic fuzzy activity times. Finally it is expended to execute intuitionistic fuzzy critical path analysis for the
airport`s ground operational system.
Read More...
|
Operation research in engineering |
India |
449-453 |
120 |
Finite Element Analysis of Pressure Vessels Support Frame
-Mayuresh R. Vankhande ; Mayuresh R. Vankhande; Mr.G. N. Sargule; A. P. Shrotri; Prof. Pankaj P. Awate
There are many types of structures all around us. Each structure has a specific purpose or function. Some structures are simple, while others are complex; however there are two basic principles of composing structures. They must be capable of carrying the loads that they are designed for without collapsing. They must support the various parts of the external load in the correct relative position. A structure refers to a system with connected parts used to support a load. Some examples related to civil engineering are buildings, bridges and towers. However, these structures are very complex for analyze and design. At first, we will consider simple examples of structures and parts of structures like beams, trusses, frames etc. The frame discussed in this paper is designed with conventional CAD design practices and then analyzed statically with FEA software. The analysis was carried out to determine the induced stresses and the deflections at various locations on proposed frame. The structure was optimized to reduce weight. In this project the Finite Element Analysis of skid Frame for Rigidity is been carried out. The base frame is analyzed using hyper mesh and ANSYS software. The static loads are applied on the frame and analysis is carried out. The test is carried out to check the conformance of the existing design. The skid base frame is modified for making a stiffer design within the allowable stress limits. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
454-458 |
121 |
Design and Simulation of Pipelined 32 Point FFT using Radix 2 Algorithm
-Rutuja R.Taksande ; Prof. M. N. Thakare; Prof. G. D. Korde
The Fast Fourier Transform (FFT) is one of the important operations in field of digital signal processing. Fast Fourier Transform is an algorithm which computes the Discrete Fourier Transform of an input sequence. This paper gives design of the Fast Fourier Transform (FFT) based on Decimation-In-Time (DIT) domain and Radix-2 algorithm .The input of Fast Fourier transform has been given by using a test bench code and output has been displayed using the waveforms son the Xilinx Design Suite 14.5.i.This Paper also includes design, synthesis and simulation of Vedic 32-bit Floating Point Complex Multiplier and 32 point Pipelined FFT. The coding has been done in VHDL whereas design, synthesis and simulation has been done using XILINX ISE 14.5i tool. The delay obtained for Vedic 32-bit Floating Point Complex Multiplier and 32 point Pipelined FFT is 36.356 ns and 24.801ns respectively .The synthesis and simulation results show that the computation for calculating the 32-point Fast Fourier transform is efficient in terms of speed and power. Read More...
|
Electronics and Telecommunication Department |
India |
459-461 |
122 |
Performance Analysis of Brushless DC (BLDC) Motor Without Controller Using MATLAB/SIMULINK Environment
-Shivangkumar Tusharbhai Patel
The simulink/MATLAB model is designed for analyse the performance of Brushless DC motor. In model there were no controller used for speed control or position control. Brushless DC motors is most popular and widely used motor in applications like aerospace, automotive, appliances, medical, automated industrial equipment as well as instruments. BLDC motors used due to its characteristics like high efficiency, high power density, fast dynamic response, high reliability, less maintenance requirement, low weight and cost. Also BLDC motor used for noiseless operation and available in higher speed ranges. The simulink model given can work for any rating of BLDC motor data. This paper presents the model construction of a brushless DC motor via MATLAB/SIMULINK without any controller. Read More...
|
Electrical Power System |
India |
462-464 |
123 |
An Approach to Securely Transfer a Secret Image Using Secret-Fragment-Visible Mosaic Images and Reversible Color Transformation
-MANJUNATH N WALI ; PRADEEP K G M; S VEERESHKUMAR; K DASHARATH
In current times as several of our daily tasks are associated to internet, the security of information being broadcasted over the internet is a significant problem. Several applications or fields are needed for broadcasting secret image over the internet that may include private and confidential information that is required to be protected from hacker or from unintended users. Many procedures and methods have been proposed to ensure security, out of them most frequently used methods are encryption and data hiding. Hiding the information in digital images has been area of significance in the digital image processing field. This paper presents an approach where mosaic image generation has done by separating the secret digital image into small divisions called as fragments and changing their particular color features into corresponding blocks of the target image. Usage of the Pixel color conversions facilitates to yield the lossless improved image based on the untransformed color space values. Creation of the key plays a significant function to recover the data from the secret image in lossless approach. Finally the same approach can be performed on videos also which helps to reduce the flickering artifact to attain the lossless data recovery in motion related videos. The experimental outcomes demonstrate excellent robust performance against every incidental and accidental attacks also evaluate to the usual algorithms performance valuation has been increased in a considerable way. Read More...
|
Computer Science and Engineering |
India |
465-469 |
124 |
Load Balancing Techniques in Cloud Computing
-Dr. Neenu Juneja ; Krishan Tuli; Sarabjeet Kaur
Cloud Computing is the fast growing concept promising to turn the dream of “computing utilities†into reality. It provides an easy and flexible way to store and retrieve a large amount of data ignoring the hardware requirements. Cloud computing is a developing figuring worldview. Its point is to share information, benefit straightforwardly and estimations over an Internet. In today's opportunity, it is most fascinating and alluring innovation which is putting forth the administrations to its clients on interest over the web. As Cloud figuring stores the information and dispersed assets in the open environment so the measure of information stockpiling increments. In Cloud computing, load adjusting is a key issue. This will expend a considerable measure of expense to keep up burden data since the framework is excessively colossal, making it impossible to convenient scatter load. The Load adjusting is one of the primary difficulties in cloud computing which is required to disperse the dynamic workload over various hubs to guarantee that no single hub is overpowered. This aides in ideal use of assets and thus in upgrading the execution of the framework. Objective of burden adjusting is to minimize the asset utilization. Load balancing is a method which distributes workload across different nodes to ensure that none of the node is either overwhelmed or lacking resources. In this paper, we talked about a portion of the current load adjusting algorithms in cloud computing furthermore their difficulties and challenges. Read More...
|
Computer Applications |
India |
470-474 |
125 |
Image Compression Using Wavelets
-INDRA KUMAR GUPTA ; MR. M. R. ALONEY
Images require substantial storage and transmission resources, thus image compression is advantageous to reduce these requirements. The report covers some background of wavelet analysis, data compression and how wavelets have been and can be used for image compression. An investigation into the process and problems involved with image compression was made and the results of this investigation are discussed. It was discovered that thresholding was had an extremely important influence of compression results so suggested thresholding strategies are given along with further lines of research that could be undertaken. Read More...
|
Computer Science |
India |
475-478 |
126 |
Comparative Static Analysis of R.C.C and Composite Frame
-Dr. S. H. Mahure
Composite construction posses lesser cost, speedy construction, fire resistance, high durability and superior seismic performance characteristics than RC structures. In this study an attempt has been made to analyze, compare seismic performance of six storey (G+5) RCC and Composite Institutional building situated in seismic zone IV. Equivalent static method is preferred for seismic analysis and ETABS is used for modeling, analyzing the structures. Analytical results are compared to achieve the most suitable resisting system and economic structure against the seismic forces. On the basis of analysis and comparison it is proved that steel concrete composite building is better option. Read More...
|
structural engineering |
India |
479-482 |
127 |
Design Aspects and Trends among the Recent Macro Pprocessors as Compared To Function and Subroutines
-Dharmendra Kumar
In this research paper we discuss those macro-processors that do not dependent on (tied to, or integrated with) any particular programming language or piece of software, but can be used with a variety of different languages. These are the general purpose macro-processors. The different factors considered while designing a general purpose macro-processors are: comments, grouping of statements, tokens and syntax used for macro definitions. A common case of preprocessing is the processing, performed on the code before the next step of compilation. In that sense, Lexical level of preprocessors is the lowest level of preprocessors in so far as they only require Lexical analysis. Read More...
|
Computer Engineering |
India |
483-486 |
128 |
Performance Evaluation of AODV, FSR, and ZRP Routing Protocols in Mobile Ad Hoc Networks using Qualnet
-P. Stanley ; Er. Prateek Singh
Mobile Adhoc Networks (MANET) is a collection of wireless mobile nodes that dynamically form a network temporarily without any support of central administration. Mobile means moving and Ad Hoc means temporary without any fixed infrastructure. Mobile Ad-hoc networks are the collection of mobile nodes connected by a wireless link, where each node acts as a router. Ad-hoc networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology thus the need for a robust dynamic routing protocol that can accommodate such an environment. In addition to this, routing protocols face many challenges like short battery backup, limited processing capability. Every node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. Routing is a critical task in MANET where the nodes are mobile. Dynamic and reliable routing protocols are required in the ad-hoc wireless networks, as they have no infrastructure and their network topology changes. There are various protocols for handling the routing problem in the ad-hoc wireless network environment. There are several familiar routing protocols like AODV, FSR, ZRP, etc…which have been proposed for providing communication among all the nodes in the network. In this paper we have analyzed the performance of proactive, reactive and hybrid protocols using AODV, FSR and ZRP based on parameters like Throughput, End-to-End delay, Average jitter ,Total message received etc. by using the Qualnet 6.1 simulator. Read More...
|
Computer Science and Engineering |
India |
487-491 |
129 |
A Survey on Social Media Analytics Tools for Business Intelligence
-K. BhagyaLaxmi ; J. Samatha
Big data is mostly generated from social media websites, sensors, devices, video/audio, networks, log files and web, and much of it is generated in real time and on a very large scale. This Big data can be analyzed to produce useful information for business people. The analytical findings can lead to more effective marketing, new revenue opportunities, better customer service, improved operational efficiency, competitive advantages over rival organizations and other business benefits. Along with opportunities, social media brings risks to companies. Read More...
|
Computer Science |
India |
492-497 |
130 |
A Review Study on Sustainable Construction using Bamboo
-Lokendra Kaushal ; Saurabh Singh; Madan Chandra Maurya
In India the construction industry, uses the most of green clean energy and also produces most of the carbon dioxide (CO2) gas, which is a main greenhouse gas, which is very harmful the to the environment and living beings. To counteract this horrible environmental problem, we have a better alternative option “Bambooâ€, which is economical, eco-friendly, easily available and also have a very good tensile strength, also the production of one ton of steel and concrete emits approximately more than two tonnes and one tonne respectively, of carbon dioxide gas, whereas production of one tonne of bamboo consumes approximately more than one tonne of carbon dioxide gas from the environment. Bamboos are evergreen perennial flowering plants in the subfamily Bambusoideae of the grass. Bamboo is a sustainable, economical, orthotropic, natural, lightweight, non corrosive and easily available material. One of the major disadvantages of bamboo is that it attracts living organism such as fungi and insects. Bamboo is more prone to insects than other trees and grasses because it has a high content of nutrients. In order to overcome this problem, it becomes necessary to treat bamboo properly to protect it from the environment effect. Therefore, in this study, a review of the existing research work on Bamboo Reinforced Concrete with the special importance of the several factors, which are considered as the demerits of bamboo reinforced concrete construction. This research study may serve as the dream of common people to have their own home, come true. Read More...
|
M.Tech in Structural Engineering |
India |
498-501 |
131 |
Women Tracking and Safety System based GPS,GPRS using Android Mobile
-M. Anitha ; M. Umapathy; SI. Gayaathri; M. Vijay
Women in emergency women safety application can be used to find and help. In recent time it’s been identified lots of misbehaving activity in urban and rural part of our country. With some evident statistics citing the occurrence of one rape incident every 20 minutes, that it has reached epic proportions. Since mobility growth is been identified in recent 10 years and with the rapid growth of android user and cheaper internet cost with Smartphone penetration started 5 years ago we can provide a simple medium to create safety awareness among the working and professional women of young and teen age. This application can show you exact location of the women in help to her relatives, guardian and friends along with the specific location, women safety application system offers the added protection of where you can go and help it being track by relatives on different time interval and different location. In the addition to the family, parents can easily track and monitor her daughter. Primarily track the nearest location of women and add history of alert messages .Lots of families and professionals are waking up to the many benefits that women safety applications. Read More...
|
Computer Science and Engineering |
India |
502-503 |
132 |
Penetration Testing: Rolling Kali
-Jyoti Pathak ; Afzl Ayyub; Satyendra Mohan Srivastava
Recent news are full with some or the other kind of incidents in happening in the world with a common quote “Hackerâ€. A hacker is basically a person with IT expertise who gains access to someone else’s system without their permission. It is seen that a hacker attacks any computer system of any individual or a company either to bring it down or to leak confidential information. Hackers do these illegally for mainly two purposes. Firstly for the sake of money, or secondly to release information being censored from the public. These call themselves HACKTIVISTS who raise issues of social and political reforms. Then there are some people known as ETHICAL HACKERS. These are certified personnel who are authorized to legally attack any target to check for consequences in case of a real attack and suggest precautions and preventives measures. The various works processed by the Ethical Hackers comes under Penetration Testing. Kali Linux can be called the most advanced open source toolkit for Penetration Testing. It is a compilation of more than 600 tools applied to different fields of Online as well as Offline hacks. Read More...
|
Computer Science and Information Technology |
India |
504-507 |
133 |
A Simulation for Forest Fire Detection using Lab View with Wireless Sensor Networks Based Myrio
-D. Velmurugan ; P. Elango; R. Kamalakkannan; M. Mohandass; S.Prakash
Forest Resources are mainly important because they stabilize climate, regulation of hydrological cycle, and provides plants and animals for living Space to thousands of life. On the other hand, forest resources are deployed due to forest fires. Forest fire is a disaster which happened natural or manmade sources creating fire which destroys a forested area. Affected areas its leads to Deforestation, great danger to people who live in forests as well as wildlife animals. Forest accidents take place all over the world. Major wild fires accidents happen every few years in the forests of the United States and Indonesia, and in the bush in Australia and India. In India April – May 2016 major wild fires happened at Uttarakhand and Himachal Pradesh. Totally 4,048 hectares (10,000 acres) are burned and its affects vegetation, wildlife habitat, soil, water, and air and in turn how these impact humans especially in population centres. Due to this reason environmental Protection and conservation is increased Attention in now a days. In this Paper presents an optimal fire detection using lab view with MYRIO are proposed. The proposed system it contains solar Panel, lab view, Global Positioning System (GPS), GIS (Graphical Information System) and flame sensors are used. Fire affected areas information fetched from GPS and it can Be Transferred to MYRIO Protocol. MYRIO Protocol receives the particular latitude and Attitude, Longitude information from GPS and to be transmitted from lab view Monitoring Section and information Passage through nearest Forest head office Centres. Lab view is mainly used to obtain the cumulative report of annual & monthly forest fire affected areas by each state and district. Read More...
|
Electronics Engineering |
India |
508-511 |
134 |
Study and Experimental Analysis of Engine Mounting Bracket of Light Commercial Vehicle
-Bankar Ganesh ; Bankar Ganesh
In this work an effort was made to analyze the engine mounting bracket for light commercial vehicle. Design includes the modeling of the engine mounting brackets by taking into account all packaging constraints. Analysis includes Static Analysis of engine mounting bracket. The main purpose of this study is to examine the natural frequency of by analytically and through developing the model and self-excitation frequency of engine bracket. An attempt was made to check whether the natural frequency of engine mounting bracket is less than self-excitation frequency of engine bracket. Hence this work is carried by using ERW-1, ERW-2, aluminum and magnesium alloys for the engine mount bracket. The results are analyzed for stresses and deformations. Read More...
|
M.E in Production Enginerring |
India |
512-517 |
135 |
Survey of Routing Algorithms for Power Consumption in Ad-Hoc Networks
-Srividhya. R
In mobile Ad-hoc network (MANET), a node communicates directly with the cluster head within the wireless range and indirectly with the nodes inside the cluster. In order to efficiently communicate with the nodes and to save excess power in the network routing algorithm is used. The primary goal of such a network is to save excess network in the nodes by making the nodes inactive while not in use and also establish an efficient path for safe and secure message transfer. This article surveys different routing mechanisms proposed for MANETs. Read More...
|
WIRELESS SENSOR NETWORKS |
India |
518-520 |
136 |
Performance Evaluation and Design of Low Voltage Low Power Lector Inverter Based Two Fold Comparator
-Surendra Kumar ; Vimal Agarwal
Another blueprint of comparator which is essential bit of ADC is proposed. In this paper new arrangement of twofold tail comparator with bleeding edge arrangement of regenerative inverter is available. Proposed inverter gives less power disseminating less delay than customary inverter. New proposed arrange gives 25% reduction in power diminishment and 75% decreasing in kickback noise which is most fundamental parameter of comparator. The new layout is reproduced in TSMC180nm in Tanner gadget which are measured to choose control scrambling, speed and kickback commotion. These are differentiated and past frameworks. Read More...
|
Electronics & Communication Engineering |
India |
521-523 |
137 |
Experimental Vibration Analysis of Equivalent Spring Mass System to Find Out Time Period of Oscillation and Validate With Theoretical Method
-S. S. Sutar ; A. V. Sutar; P. A. Naik; M. R. Rawal
Natural frequency of vibrating system is mainly depends on equivalent stiffness of spring and equivalent mass of vibrating body. In this paper, measurement of time period has been done theoretically and experimentally. Experimental set up is used to study un-damped vibrations of vibrating system. Theoretical and experimental results are compared with each other. Graphical and analytical values shows that experimental and theoretical time period values are nearly equal to each other. Certain parameters like attached mass to cantilever beam and location of mass attached to cantilever beam has been changed and results are again compared theoretically and experimentally. Read More...
|
Mechanical Engineering |
India |
524-526 |
138 |
A Review on Recent Malicious Data Injection Detection Techniques
-Surendra Kumar ; Prof. Gurudev Sawarkar
Wireless Sensor Networks are utilized to screen the ecological parameters, for speedy reaction of occasion identification. It is utilized to foresee the incident of up and coming occasions, for example, fire alert framework, interruption location, heart assault identification frameworks, military applications and so forth. In any case, more often than not sensors are trade off by outside elements, which emerges a major issue of security in such systems. Such Compromised sensors can report the false readings, which deliver the wrong and more often than not hazardous reactions. So there is a need of framework that can suitably recognize the malicious data injected by unapproved elements at sensor hubs. It is fundamental since it is extremely hard to recognize such malicious data infusion assaults on sensor hub, in the event that it is happen at numerous sensor hubs all the while in system. This paper makes overview of some current methodologies or procedures that are utilized for malicious data injected hubs in WSN. Additionally look at these methodologies in light of different parameters, for example, procedure utilized, their favorable circumstances and constraints. Toward the end we propose some examination bearings which will be utilized for further review in same field. Read More...
|
Computer Science and Engineering |
India |
527-531 |
139 |
Stress Analysis of High Pressure Compressor Rotor Blade of Gas Turbine Engine
-MELVIN PREETHAM SAMSON
The compressor is a device that pressurizes a working fluid/gas/steam, which flow from the inlet and leaves the gas with higher temperature and pressure to the outlet. Load imposed upon the components of compressors results in compressor blade stresses, which vary considerably over the operational envelope of the compressor edge of the blade stresses, which is important in evaluating the operational limits of the compressor speed and total pressure combination. Stress analysis of high pressure compressor rotor blade of an experimental gas turbine engine will be carried out. The analyses will be performed for different combinations of speed, mass flow rate and pressure gradient across the stage. Reduced order stress model will be developed and verify for an arbitrary loading condition. The above activities include 3D solid model generation (UG), Finite element meshing (HYPERMESH) of rotor blade and static stress simulations using ANSYS software. Using the simulation results a mathematical model (Reduced Order Stress Function) will be developed. Read More...
|
m.tech in machine design |
India |
532-534 |
140 |
Top-K Query Processing in MANETS on Malicious Node Identification
-D. Porselvi ; B. Gopinathan
In flexible imprompt frameworks (MANETs), it is capable to recuperate data things using top-k inquiry. In any case, exact outcomes may not be acquired in circumstances when malevolent hubs are accessible. In this paper, we expect that malignant nodes attempt to supplant key data things with trivial ones (we call these data substitution assaults), and propose methods for top-k request get ready and pernicious node recognizable proof considering node assembling in MANETs. In the wake of recognizing attacks, the question issuing hub tries to perceive the malignant hubs through message exchanges with various hubs. It is suitable for a hub to share information about the distinguished harmful hubs with different hubs. . We lead proliferation tests by using a framework test framework, QualNet5.2, to watch that our procedure finishes high exactness of the question result and recognizes malicious hubs. Read More...
|
Computer Science and Engineering |
India |
535-537 |
141 |
Automatic Pneumatic Stamping and Counting Machine
-Azhar Hussain ; Rakshak Choudhary; Sushil Khatri
The pneumatic system has gained a large amount of importance in last few decades. This importance is due to its accuracy and cost. It can be operated easily with semi-skilled operator’s .This convenience in operating the pneumatic system has made us to design and fabricate this unit which is operated by pneumatics as our project. The project is further elaborated to the function of pneumatics with their behavior in several aspects. This machine has an advantage of working even at low pressures, that is even pressure of 6 bars is enough for the operation. The pressurized air passing through the cylinder, forces the piston out whose power through linkages is transmitted to the work piece. The work piece thus got it for the required dimensions and the impression is made on it. The stamping machine uses a mechanism of quick retrieval done by acting of pressurized air inside of it. The operation of the compressed air is done by using a solenoid valves. This project also elaborates about the other applications just by changing its arm. Read More...
|
mechanical engineering |
India |
538-541 |
142 |
Comparative Study of Mechanical Properties of Hybrid Composites Prepared using Glass Fiber, Sugarcane Bagasse and Human Hair
-Janmajay Singh Rajput ; Prabhash Jain; Subha Jayaraman; Jeetendra Mishra
The main aim of this research work is to prepare hybrid composites and to compare them on the basis of mechanical properties namely Tensile, flexural, and Impact. For preparation of composites, hand lay-up method is used. Unsaturated polyester (UP) resin is principal binding material (50wt %) while Cobalt naphthenate is used as an accelerator (0.5wt %) and Methyl ethyl ketone peroxide (MEKP) is used as a hardener (1wt %). 400 gsm chopped strand mat of E- glass fiber is primary reinforcement material while sugarcane bagasse and human hair fiber waste are used as additive fiber in glass fiber reinforced plastic (GFRP) for preparing hybrid composite. An exothermic reaction occurs in which energy released is more than the energy supplied, this extra energy in the form of heat is due to formation of new bonds by cross-linking. Post curing, prepared composites are evaluated on various platforms viz. tensile test, flexural test and Impact test. Read More...
|
Material Science and Technology |
India |
542-545 |
143 |
Finding Semantic Similarity Classification through Social Media Networks
-S. Preethi ; Mrs. G. Sangeetha
The social media network is becoming more advanced and their information is growing faster and easier. Now we can see about how the social media is related by text, images, audio, and videos. The computer vision grows the classifications among pinterest, neural networks, and smartphones. Through this images are quickly shared to users by two ways, they are 1) finding the images of event in a semiautomatic. 2) Classify the type of event and image. The main important context based image retrieval is, it is used to retrieve the image easily and upload it in such a way that it provides time reduction to user also the images are measured and compared through semantic similarities. The social media is present to increase the information by storing the database and receiving the images, videos by one by one to each user and time reduced by user. Read More...
|
Computer Science and Engineering |
India |
546-548 |
144 |
Smart Bin using GSM Modem
-Mabel Regina Luis ; Diksha Sanjiv Lotlikar; Chrislin Lourdes Fernandes; Maria Samantha Cardoso
The waste segregation system will sort the waste into its different components. This segregated waste is then collected in a smart bin equipped with GSM technology to indicate via SMS the status of each bin. The bins are built on a microcontroller based platform Arduino ATmega 2560 which is interfaced with GSM module. The ultrasonic sensor is used for distance measurement. The threshold distance is the difference in height at which the sensor is placed and the level of garbage in the bins. Whenever the difference between the sensor and the waste falls below the threshold value the GSM module is activated to send an alert signal to the concerned personal through an SMS. As soon as an SMS alert is received the concerned authority can place orders to the workers for emptying the bins before they overflow. Read More...
|
Electronics and Telecommunication Department |
India |
549-552 |
145 |
Information of Tanks of Kalaburagi Taluk using GIS
-Sangeeta Saiman ; Prof. Saraswati Reddy
Tanks are very important water bodies serving as a reservoir for many ground water arteries. Tank revival/restoration is a much discussed about subject in the recent years. The present study of Kalaburgi taluk is in Karnataka state. The entire area of kalaburgi taluk is 173936.51 ha and area of tanks is 2672 ha, which comes within six SOI toposheet of numbers 56C/15, 56C/14, 56C/16, 56/12, 56C/11, 56G2 and 56G3 (scale 1:50000). An attempt has been made in this study to know the physical information, classification and maintenance of 24 tanks in Kalaburgi taluk, using software Arc GIS Ver 10.1.This tank information system is further helpful to know the tank capacity, harvesting structures and improvement techniques. Read More...
|
Environment Engineering |
India |
553-555 |
146 |
E-Banking Phishing Website Detection using Associative Classification
-Omkar Sadwilkar ; Pratik Rao; Bhumesh Ranjane; Omkar Sadwilkar; Aditya Phatkare
Phishing is a new type of network attack where the attacker creates a replica of an existing web page to fool users in to submitting personal, financial, or password data to what they think is their service provider’s website. The concept is an end-host based anti-phishing algorithm, called the Link Guard, by utilizing the generic characteristics of the hyperlinks in phishing attacks. The link Guard algorithm is the concept for finding the phishing emails sent by the phisher to grasp the information of the end user. Link Guard is based on the careful analysis of the characteristics of phishing hyperlinks. Each end user is implemented with Link Guard algorithm. After doing so the end user recognizes the phishing emails and can avoid responding to such mails. Since Link Guard is characteristics based it can detect and prevent not only known phishing attacks but also unknown ones. The project uses the PHP as Front-End and WAMP Server as Back-End. Read More...
|
Computer Engineering |
India |
556-558 |
147 |
Study of Various Parameters and Its Effects on Deep Drawing Process - A Review
-Prem Kumar Soni ; Dr. Vandana Somkuwar
Defects like cracks and wrinkling of deep drawing occur very often in conventional cylindrical deep drawing process because of the lower forming ability of aluminum alloy sheet at room temperature. This paper is highlighting recent research work and results in deep drawing. Different authors have used different approach for their result. With the help of this paper different parameters that are responsible for deep drawing and their effects are shown. After going through different authors, a need is developed for future usage of deep drawing process. In order to avoid the costly, tedious and difficult experiments instead of the experimental set-up, simulation is preferred. In this work, finite element simulation is shown to understand its potential. Thus, simulation process is shown. Using alloy steel at different die angles and their performance are shown. This review paper has given the attention to gather recent development and research work in the area of deep drawing. The result of simulation will be beneficial to the tool designer and the manufacturing industries doing work in this field. Read More...
|
ADVANCE PRODUCTION SYSTEM |
India |
559-563 |
148 |
Report on Failure Analysis of Universal Joint of a Transmission Drive Shaft
-Mr. S. K. Dhage ; Prof. Hredeya Mishra; Prof. P. G. Tathe
A universal joint is a positive, mechanical connection between rotating shafts, which are usually not parallel, but intersecting. They are used to transmit motion, power, or both. The simplest and most common type is called the Yoke joint, Cardan joint or Hooke joint. It consists of two yokes, one on each shaft, connected by a cross-shaped intermediate member called the spider. The angle between the two shafts is called the operating angle. It Is generally, but not necessarily, constant during operation. Failed Yoke joint is the most common vehicles driveline problem. In this study, failure analysis of a universal joint yoke of an automobile power transmission would be carried out. For the determination of stress conditions at the failed section, stress analyses can also carried out by the finite element method. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
564-566 |
149 |
Profit Optimization of CDCC Bank, as LPP
-Dharani R ; Priyadharsini S; Yoga Priya P; Karthikeyan C
In this paper the Optimal Profit of Coimbatore District Central Co-operative Bank in basis of agri loans such as Kisan Credit Card loan, Kisan Credit Card Jewel loan, Produce Pledge loan, investment loan of at least 200 societies for the period from April 2015 to March 2016 is investigated by using Revised Simplex Method and Sensitivity Analysis. Also this work analyzes the representation of the problem of profit optimization of bank as Linear Programming Problem. Finally, the problem of profit optimization is resolved by Sensitivity Analysis. The problem of profit optimization of Bank modeled as a Linear Programming Problem (LPP). The subsequent LPP then solved by the Revised Simplex Method(RSM). The paper revealed that the Optimal Profit of Bank in the areas of loans of at least 200 societies for the period of 1 year from April 2015 to March 2016 was 358,48.37 (in lakhs). Therefore, for the bank to achieve the Optimal Profit of 358,48.37 (in lakhs), Kisan Credit Card x_1was allocated an amount of 143,39.35 (in lakhs); Kisan Credit Card JL x_2 an amount of 0.00; Produce Pledge Loan x_3an amount of 215,09.02; Investment Credit Loan 0.00. It was also observed that if CDCC Bank does not allocate any amount to Kisan Credit Card and Investment Credit loan, the bank can still achieve the Optimal Profit of 10916.55. Read More...
|
operation research |
India |
567-570 |
150 |
Green House Automation with Climatic Control using Arduino
-Mr. Bijo Raju ; Prof. Kimberly Morais; Mr. Miranda Braz Jaston; Ms. Alisha Ashok Mhamal
Crop production is the major requirement of any country. In today’s world due to change in climatic conditions and unusual changes in the atmosphere at any instant, the crop production is going down day by day. Also the crop production has become very labor intensive as lot of things has to be taken care of like proper amount of water, sunlight, fertilizers, etc. In this paper we aim to propose a frame work to increase the crop production even in changing climatic condition. Also the proposed system is less labor intensive as it monitors the parameters inside the green house without much labor and controls these various parameters using sensors and motors thus proving a feedback to changing conditions inside greenhouse. This system makes use of improved system of opening roof top rather than the conventional exhaust fans. Read More...
|
Electronics and Telecommunication Department |
India |
571-574 |