No. |
Title and Author |
Area |
Country |
Page |
51 |
Immune ATM Transaction
-Shravan L ; Vinoth D; Vishal KTD; Gayathri M
There are many types of attacks in an ATM like shoulder surfing attack, relay and replay attack. There is no proper solution to all these attacks. We introduce a transaction methodology that is immune to all types of attacks. Read More...
|
Information Technology |
India |
169-171 |
52 |
STRESS ANALYSIS OF BULK LEVER USING FEA ANALYSIS
-SALUNKE MAHESH ASHOK ; ABHAY GAUR
Bulk lever is the main component of Dobby power loom. It is the most heavily stressed part of Dobby power loom. During its operation various stresses are acting on Bulk lever. For analysis purpose virtual model of Bulk lever is prepared by picking data from existing model of bulk lever made of ASTM A 48 C.I. This paper investigates the stresses acting on Bulk lever at different loading condition. Static structural analysis using ANSYS was conducted on Bulk lever made up of ASTM A 48 C.I. and suggested material of AISI 4340 Alloy steel. The purpose of this study is to show the performance of Bulk lever under different loading condition. For FEA analysis bulk lever is prepared using ANSYS and this model of Bulk lever in ANSYS where stress analysis is done by FEM. Finite Element Analysis (FEA) has been performed on both Notch 1 and Notch 2. Read More...
|
Mechanical Engineering |
India |
172-175 |
53 |
Wireless Mobile Charger
-Kailly Krishna ; Jitesh Kumar; Kaushal Goswami; Komal Sharma
Wireless charging is a technology in which power is transmitted through an air gap to an electrical device for the purpose of energy replenishment. This technology will lead to advancement in wireless energy transfer. This article first presents an audit and fundamentals of wireless charging. We then provide the review of standards, that is, Qi and the tie for Wireless Power, and highlight their communication protocols. it entertains the concept of wireless charger network that aquiesce chargers to be connected to facilitate information collection and control. We exhibit the application of the wireless charger network in user-charger commission, which clearly shows the progress in terms of reduced costs for users to establish the best chargers to replenish energy for their mobile devices. Read More...
|
Electrical Engineering |
India |
176-178 |
54 |
Smart Home Renewable Energy Management System Controller
-Prof. Ravindra S. Mohite ; Sourabh Nikam; Chetan Jadhav; Pankaj Teli; Nitin More
One of the major attribute of the smart grid is to integrate renewable and storage energy resources at the consumption premises. This project presents the design, implementation and testing of a Smart Home Renewable Energy Management System Controller that integrates Renewable Energy and grid energy resources to a smart home. The proposed project provides and manages a smart home energy requirement by installing renewable energy, scheduling and arranging the power flow during availability of electrical power generated from renewable energy sources. In addition to that, a one-way communication protocol is developed to enable the home owner to better optimize the energy flow and the consumption efficiency. A prototype for the proposed project was designed, implemented and tested using a controlled load bank to simulate a scaled random real house consumption behavior. Read More...
|
Electrical Engineering |
India |
179-181 |
55 |
Optimization of Injection Timing in CI Engine Using Blends of Straight Vegetable Oil
-Kuladeep Kumar Pandey
The present experiment is done to optimize engine performance using straight vegetable oil by varying its injection timing. We take jatropha curcas oil as potential fuel for the compression ignition (CI) engines because the cetane number of jatropha oil is quite high and comparable with diesel fuel. Jatropha curcas oil has high viscosity but is lower than other vegetable oils. The viscosity of jatropha oil is reduced by blending it with diesel in different proportions. The blends of varying proportions of jatropha oil and diesel were prepared, analyzed and compared with diesel fuel by running a four stroke CI engine. Also the effect of injection timing is studied and applied in the test. Fuel injection timing was advanced by 3 ͦ means injection occurred 24 ͦ before top dead centre (BTDC) as the designed for 27 ͦ before TDC targeting diesel as prime fuel. The purpose of advancing injection timing was to match the cetane number of oil blends with diesel. As we know cetane number is inverse function of ignition delay. For better combustion properties the ignition delay must be low as much as possible. Read More...
|
Mechanical Engineering |
India |
182-185 |
56 |
Intelligent Social Contact Management System
-Prof. R. A. Badgujar ; Namrata Shekokare; Mohini Nimbalkar; Shraddha Divekar
Memory of human being is usually poor and many times fails. Sometimes, it generally causes difficult situations. In our day-to-day life, we face diverse forms of memory lapse, such as forgetting a contact id, name of a person, name of a city etc. These memory failures do invite many types of problems in our life and work. Hence, it becomes a basic and challenging problem to find the effective and efficient way to help the human memory. As the number of relations people increases, it is difficult for people to maintain their social contacts with merely memory. To help people for better and well management of their social contacts, a powerful social contact management Application named Intelligent Social Contact Manager (ISCM) is introduced. It supports a simple but efficient contact retrieval interface and auto-collection of rich contact data. In this paper we used one gram approach using fuzzy logic. Gram has been widely used for making a approximate string search, we use gram for the matching purpose. Particularly, we utilize the contact name recall as a part of the scholastic group as the target application to showcase our proposed technique. Read More...
|
Computer Engineering |
India |
186-189 |
57 |
Content based mechanism for social network using MAchine learning
-Prof.Megha Jadhav ; Priyanka Ghule ; Akshata Thorat; Snehal Dabhade
Online social network(OSN) plays a fundamental role in today’s life. Users can share and upload large amount of information which is related to them. So major issue is to provide security for posting unwanted posts. OSN provides the provision to control undesired messages to be posted on the user’s wall. User can avoid undesired posts to be shown. We are proposing a system which has direct control over the messages posted on user wall that system is known as Filtered Wall(FW). FW allows users to apply set of ï¬ltering rules to control the posts. And the flexibility of the system in terms of filtering criteria is improved through the Blacklists and Whitelist. Concept of Whitelist is also used in this paper to provide more security. Machine Learning Text Categorization technique is used to classify short text messages. In this paper we use Naive Bayesian algorithm for text classification techniques. Read More...
|
Computer Engineering |
India |
190-193 |
58 |
Digital Image Watermarking Based on LSB for RGB Image
-Poornima A.V ; Jesily Mol A; Saranya U
Due to the popularity of Social Networking applications and websites, the use of images as well as multimedia has been increased drastically. These file contents are transformed through open networks. The main challenges in open networks are lack of authentication, authorization and confidentiality. In order to preserve authentication, one of the popular mechanism is the use of copyright. By embedding copyright protection, we can ensure that the entities that take part in communication are authenticated. Our aim is to implement an efficient mechanism for copyright protection. In this paper, we use LBR algorithm to generate watermarked image. For enhancing Security, Secrecy Sharing Using parameters and Random Numbers are used in both client side. Read More...
|
Computer Science and Engineering |
India |
194-196 |
59 |
healthcare analytics using hadoop
-Sayali Ekbote ; Priyanka Bhalerao; Sayali Ekbote; kalyani Jainak; Nikita Vaidya
In today’s modern world, healthcare also needs to be modernized. It means that the healthcare data should be properly analyzed so that we can categorize it into groups of Gender, Disease, City, Symptoms and treatment. The gigantic size of analytics will need large computation which can be done with the help of distributed processing HADOOP. The frameworks use will provide multipurpose beneficial outputs which includes getting the healthcare data analysis into various forms. BIGDATA is used to predict epidemics, cure disease, improves quality of life and avoid preventable deaths. With the increasing population of the world, and everyone living longer, models of treatment delivery are rapidly changing and many of the decision behind those changes are being driven by data. The drive now is to understand as much as a patient as possible, as early in their life as possible, hopefully picking up warning signs of serious illness at early enough stage that treatment is far simpler and less expensive than if it had not been spotted until later. The proposed system will group together the disease and their symptoms data and analyze it to provide cumulative information. After the analysis, algorithm could be applied to the resultant and grouping can be made to show a clear picture of the analysis. The groups made by the system would be symptoms wise, age wise, gender wise, season wise, disease wise etc. As the system will display the data group wise, it would be helpful to get a clear idea about the disease and their rate of spreading, so that appropriate treatment could be given at proper time. Read More...
|
Computer Engineering |
India |
197-201 |
60 |
Analysis and Optimization of Clamping Jaws & Pins for SPM by using FEA
-Amar Mahipati Bhosale ; A. V. Gaur
The Aim of Paper Is Analysis and Optimization of Clamping Jaws & Pins for Spm by Using Fea & Validate Same by Testing at Concern Industry. Paper Also Involves Geometrical and Finite Element Modeling of Existing Design. Geometrical Model Was Done by Using Solidworks. Read More...
|
Industrial Automation Engineering |
India |
202-204 |
61 |
Data Integrity Proof (DIP) in cloud storage
-Pratik Bhujbal ; Anupam Pahnale; Parve Gorakh; Prof. Mohit Dighe
Nowadays, Data is rising over internet in terabytes and Exabyte. So, there is a need of storing these data which has been fulfilled by cloud computing. Though the service of cloud appear to be efficient and cost effective. Yet there are some challenges which are faced in cloud computing such as Data security and Authentication. In cloud Storage the data of Owner is stored in cloud where the cloud servers are remotely located the owner of the data does not have any direct control over the data. If the data over cloud is modified by the cloud, Third Party Auditor (TPA) or any other person there is no precision such that the owner of the data gets the information about the modification of the data. TPA is a Third Party Auditor who has Experience in checking the integrity of data. TPA verifies the files stored over the cloud if they are modified or not. Our scheme provides the solution to this problem such that if there is any modification in the data the owner will get information about the change in the data. Our scheme only provides the information about the change in data it does not keep data intact or secure from modification over cloud. Read More...
|
Computer Engineering |
India |
205-207 |
62 |
Gleam city surat
-Gandhi Pooja Maheshkumar ; Prof.Henita R. Rana; Dhimmar Amiben Nareshbhai; Patel Yuti Sameer; Lakhara Sangitaben Rameshchandra
The Gleam City Surat is very much useful Android based application. For Gleam city Surat we make two applications Web Application as well as Android Application. In Web Application, We can provide static information like places in Surat and give the link of Android Application. This application can guide any user for the information such as hospitals, restaurants, historical places, banks, colleges, schools, government offices etc. It can also provide the timetable related information for Bus station, Railway station and air-flights. The user can also get information about approximate fare between source and destination. This application also facilitates the alert message of intermediate station between source and destination. This application shows the most searched places quickly. The user can share their current location at different social networking sites. The user can write their reviews about places where he/she visited. The user can register their own business in this application and then this business related information can be places by the administrator in this application. The user can inform or complain about any issue through this application by uploading the location related information and photo of that place. Any company can advertise about job vacancies in this application through registration and approval by administrator. If user need any help related to different persons having profession like carpenter, mechanics, plumber, electrician etc. then it is possible through this application as per their location. So overall information related to the Surat city can be obtained easily and quickly through this application. Read More...
|
Computer Science and Engineering |
India |
208-212 |
63 |
Comparative study on RCC and Steel-Concrete Composite Building using Linear Static Analysis
-Nileshkumar V Ganwani ; Dr. S.S. Jamkar
Steel-Concrete composite constructions are nowadays very popular owing to their advantages over conventional Concrete and Steel constructions. Concrete structures are bulky and impart more seismic weight and less deflection whereas Steel structures instruct more deflections and ductility to the structure, which is beneficial in resisting earthquake forces. Composite Construction combines the better properties of both steel and concrete along with lesser cost, speedy construction, fire protection etc. Hence the aim of the paper is to compare seismic performance of a 3D (G+5) story RCC and Steel-Concrete Composite building frame situated in earthquake zone IV. All frames are designed for same gravity loadings. Beam and column sections are made of either RCC & Steel-concrete composite sections. Equivalent static method is used for seismic analysis. ETAB2015 software is used and results are compared. Comparative study concludes that the composite frames are best suited among concrete constructions in terms of materials and weight with better seismic behavior. Read More...
|
Structural Engineering |
India |
213-216 |
64 |
Electric Self Balancing Uni-Cycle
-Alesh Mahajan ; Prayag Wankhade; Akash Patil; Pooja Jadhav; Prof H.N.Patil
This paper deals with the design and construction of a low cost electric vehicle aimed to demonstrate the possible alternative to the present personal electric transportation in India. The increasing rate of urbanization and increase in use of motor vehicles is the principal cause of energy invasion, greenhouse gas emissions and environmental downturn. As a unique and eye catching transportation device, Uni-Cycle may offer several problem minimizing solutions over the current environment decay issue. Uni-Cycle is aimed to feature the self-balancing mechanism similar to that of the ‘Seg Way’ but with single wheel. This self-balancing works on the principle of inverted pendulum. The computation of the sensor values is done in real time system. The traditional PID control implemented combines the result form sensor to the DC motor speed controller. The power source of Uni-Cycle is a lithium polymer battery, capable of working in short distance area. Bike riding gestures are used as the human input to the transporter. Leaning of the rider in forward or backward direction decides the direction of motion of the device. Read More...
|
Electronics and Telecommunication Department |
India |
217-219 |
65 |
Study of Enhancements in GPSR Routing Protocol
-Tanisha Narang ; Vipin Gupta
Vehicular Ad Hoc Network(VANET) is a form of network in which communication between two vehicles takes place. For communication to take place there is a need of routing protocol. There are different types of protocols in VANET on the bases of different design mechanism. Greedy Perimeter Stateless Routing Protocol is a protocol which is based on the geographic location of the moving vehicle. In this paper, firstly we have discussed about the GPSR protocol, then advancements in the GPSR protocol have been discussed that are: Route optimization in GPSR, GPSR-MV and Enhanced GPSR. The different advancement and limitations have been studied. Read More...
|
Electronics & Communication Engineering |
India |
220-222 |
66 |
Machining Time Reduction of Cylinder Holding Plate Using U Drill
-P. Rajeshkumar ; V. Saravanakumar; C. Saravana Vel; V. Vikas Pratab
Machining optimization has an inevitable role in contemporary operation of CNC and non-conventional machining process. The objective of this project is the reduction of time of machining of the cylinder holding plate. The cylinder holding plate is used in the earth movers for holding the hydraulic cylinders. The holding plate is used to make the movements of the buckets in the front of the earth movers. The cylinder holding plate is made by the help of VMC machines. This can be done with the help of mild steel plate. The profile of the cylinder holding plate is cut from the mild steel plate. Then the machining process is done with the help of drilling tool and milling cutters. The first process of the machining is drilling with a diameter of 22mm. There are 8 drill of 22 mm is used in the machining process of the cylinder holding plate. To make the drill of 22mm diameter need to put a drill using a 3 drill bits. The first drill bit is through hole drill, after that the pilot drill is used to make the drill more bigger than the previous drill, and then using the drill bit of 22mm. This time taken for making the drill of 22 mm in premachining process is 10min and in the post machining process is 30 min. The total time taken for making a 8 drills of ø22mm is 40 min. To reduce the machining time of drilling we using the tool called U drill of 22 mm. This tool will reduce the time of machining of drilling up to 50%. By changing the tool we reduce the 50% of time of machining. Read More...
|
Mechanical Engineering |
India |
223-224 |
67 |
Design and Fabrication of Wireless Pipe Inspecting Smart Robot
-Prof.Mankar N.A. ; Mr. Shaikh Md Kamran; Mr. Aakif Anjum Shaikh; Mr.Mo Abdullah Anis Ahmad; Mr. Patel Arbaj Younnus
This work is described the robot design and fabrication for the application of inspecting different size and shape pipes internally. The pipe inspection robot is specially planned to design and fabricate for reduce human effort in pipe inspecting work which is very complicated by manually and different methods. It consists of six arms out of which on four arms, motor will be fitted. A single motor will be fitted on each suspension arm. All the wheels are mounted on a suspension to accommodate for changing tube diameter and curves in the pipe. A motor is powered by battery (source) which is operated by remote control. A wireless camera will be fitted on robot for inspection of pipe through which we can easily detect the problem such as cracks; obstruction inside the pipeline for the trouble shoots the problem. Read More...
|
Mechanical Engineering |
India |
225-227 |
68 |
Generating better initial Centroids over Hadoop for K-Means Clustering
-Vineesh Cutting ; Prateek Singh
Clustering is one of the traditional data mining technique used for grouping of various kinds of data to perform better analyses. K-Means being most desirable Algorithm for clustering. With the advancement in Technology, the data at many domains is generated at higher rates reaching size greater than Petabyte. Harnessing Hadoop and K-Means resulted in faster processing of large data set. However, random initial centroids have to be provided in traditional K-Means algorithm. The Convergence to be reach highly depends on the set of initial centroids. This paper represents an efficient and simplified technique for generating set of better initial centroids as an input to K-Means Clustering over Hadoop. The experimental result shows better performance in clustering compared to random initial centroids. Read More...
|
Computer Science and Engineering |
India |
228-231 |
69 |
Being in Evidence System
-Gurleen Khalsa ; Yash Bolinjkar; Vidhi Popat ; Saurav Hegde
In recent time, there has been high level of impression skilled in each personal and public sectors on usual ,The ghost employee syndrome that has become a threat to all or any tiers of employers, government issues over the degree of worker absence in their company and also the problem to manage student attending throughout lectures. Fingerprints area unit a variety of identity verification system that is exclusive and cannot modification in one’s entire period. This paper presents the attending management system that uses fingerprint technology in an exceedingly university atmosphere. It consists of 1 or over one processes namely; enrollment and authentication. throughout enrollment, it captures the fingerprint of the user and its distinctive options area unit extracted and hold on in an exceedingly information together with the identity of the user as a example for the topic. Attendance management is managing attending. attending management has sometimes been approached mistreatment time clocks and timesheets, however attending system goes on the far side everything to supply a operating atmosphere that maximizes and offers motivation to worker attending. Attendance management is one in every of the foremost a part of today’s human resource systems; it takes organization towards higher human resource systems, follow and excellence, therefore regular attending and promptness area unit expected from all staff and candidates in an exceedingly work setting. unacceptable attending is generally caused by unscheduled absences and timing cause a stoppage in work, affects productivity, and creates additional issues once workloads area unit shifted to different staff. Moreover, in several institutes, and tutorial organizations, attending is one in every of the foremost vital criteria that is employed for varied functions. These functions embody assessment of scholars,record keeping, and promotes best and provides consistency at school. In most of the developing countries, a minimum share of attending at school is needed in most establishments and this policy has not been used due to the various challenges come upon gift technique of taking attending presents. This ancient technique involves taking student attending in books or mistreatment sheets. This technique is employed for fraud or the attending sheet may be lost or purloined. Taking of attending is time overwhelming and it's tough to {examine|to visualize} the quantity of scholars that have the smallest amount share and so eligible for exam. Thus, it's abundant required for a system that might take away all of those bother spots. Read More...
|
Computer Engineering |
India |
232-234 |
70 |
Chaff Cutter
-Ajinkya Kamble ; Chinmay Bandiwadekar; Zuber Shaikh; Vivek Garala
In recent past a human powered processing machine has been developed for fodder cutting. Machine consists of a human powered flywheel or a bicycle drive with speed variation mechanism. Hence, the effort for the process was extensive and unsafe. To overcome these obstacles we have designed a new cutting mechanism which is safer and effort reducing with minimum power consumption. Read More...
|
Mechanical Engineering |
India |
235-237 |
71 |
A Single Stage Three Port Converter for PV Pump Applications
-S.Rajeshwari ; R.Nighil; B.Vignesh; M.Vignesh; N.Vignesh kumar
In this paper a new design of Single Stage Three Port Converter is proposed which is used for pv pump applications. The single stage three port converter has two converters namely boost and buck with buck-boost converter. The boost converter boosts the voltage level above the reference voltage and feeds the load. If supply from the PV panel is blocked, then an alternative source which has rating less than PV panel is connected to the load via converter. The buck with buck-boost converter boosts the less potential from battery and feeds the load. The same circuit is analysed mathematically and simulated in MATLAB simulink. The results were correlated with the hardware results. Read More...
|
Electrical Engineering |
India |
238-241 |
72 |
A Hybrid Approach to Registration Problem in Image Processing
-Manas kumar Yogi ; Uma Darapu
In this paper we present techniques for image registration with different kinds of heuristics. Our main objective is image registration should be efficient from available factors inherent in the images which help us in registration process. We present three objectives to be met along the way for image registration. Read More...
|
Computer Science and Engineering |
India |
242-243 |
73 |
An Android Based Application on Ayurvedic Health Care System
-Sushant Ingawale ; Sushant Ingawale; Akash Shinde; Vishal Parkar
The rapid growth of android applications is creating a great impact on our lives. Every android application gives specific benefits and usefulness related to that application. Ayurvedic medicine (also called Ayurveda) is one of the world’s oldest medical systems and is indigenous to India where it is widely practiced. It originated in India more than 3,000 years ago and remains one of the country’s traditional health care systems. “This ancient art of healing asserts that the science, philosophy and spirituality are all necessary aspects of healthy living.†Ayurvedic medicine is a system of traditional Hindu medicine native to the Indian subcontinent. Contemporary practices derived from ayurvedic traditions are a type of alternative medicine. The aim of this “Ayurvedic Health Care System†android application is to provide beneficial information, cures and remedies about health related problems, symptoms and diseases. Read More...
|
Computer Engineering |
India |
244-246 |
74 |
ClassMate - The Academic Assistant
-Subhashchandra Sadashiv Joshi ; Abhay Bhalchandra Gawade; Vishal V. Parkar
We, through this ClassMate- The Academic Assistant, are presenting a multifunctional platform for colleges to perform many of their functions with Android smartphones. The purpose is to ease some of the academic activities with use of this application. The main actors in academic environment, such as students, faculties, head of the departments, principal, and rector, are the users of the application and the functions provided are faculty feedback evaluation, attendance management, notice board, academic stuff dissemination, timetable, a classroom for academic discussions and hostel complaints. We are confident that the functionality provided by the application will speed up the work and will reduce paperwork. Read More...
|
Computer Engineering |
India |
247-249 |
75 |
Power Generation using Different Sources
-Joshi Riddhi Kishorbhai ; Kansagara Gargi B.; Kyada komal M.; Tushar B dave
some of the places like industries and hospital power are very important source. Power cut makes many problems in some industries. Our project is regarding this kind of problem. There are many different source of power like solar, wind main and battery. If any of the sources is damaged then control is automatically transfer to another source to remove the problem of power cut. Read More...
|
Electronics & Communication Engineering |
India |
250-252 |
76 |
SimulatIon of Impulse Voltage Generator with Capacitive load of Bushing in Matlab/Simulink
-ASHVINI KUMAR ; DR. RANJANA SINGH
In this paper an equivalent circuit model of impulse voltage generator with capacitive load of bushing is analyzed by simulation method. The effect on the R1, R2 that is front and tail resistance respectively with variation in ratio C1/C2 by using different stages of equivalent circuit model of impulse voltage generator has been analyzed for a standard impulse wave (1.2/50µs). The ratio C1/C2 decreases with the increase in number of stages in equivalent circuit model of impulse voltage generator for the same capacitive load of bushing. Read More...
|
Electrical Engineering |
India |
253-255 |
77 |
Micro-Propulsion Systems and its Applications
-Ajo George
The advancement in technologies of spacecrafts such as artificial satellites of various scaled sizes has required the need for appropriate propulsion systems. The use of Propulsion systems for accurate and precise control of the thrust output, requires the use of Micro-propulsion systems. Applications such as altitude control and deep space maneuverability require low thrust and minimum impulse bit performance. Micro-Propulsion systems give, milli or micro Newton thrust accuracies. They can be used for the correction of offsetting torques, which can affect satellites orbiting lower altitudes caused due to aerodynamic drag present in the outer atmosphere. They also play a vital role in offsetting the disturbances caused by solar pressure on large inflatable spacecrafts. In the following paper, we will mainly discuss the applications of Micro-Propulsion systems in Micro and Nano-spacecrafts giving emphasis to MEMS and hybrid technologies. Due to their constrained size and stringent propulsion requirements new technologies such as MEMS devices and hybrid technologies will be used for these precision thrust requirements. With the advancement in Micromachining we are able to create precise microstructures such as Micro- valves and Micro-tubings which will be used in the Micro-thruster systems. Micro ion engines and vaporizing liquid micro thrusters are few of the systems which will be discussed which use MEMS technology in their thrusters. The use of MEMS increases the performance and decreases the size of the thrusters. Hybrid technologies seek to improve the performance of the various existing technologies by modifying and integrating them with more sustainable sources. This allows us to try previously unexplored designs of thrusters. Propulsion systems such as Vacuum arc ion thrusters and field emission electric propulsion are more efficient than most other conventional propulsion systems, which allows it to be used in a wide range of applications. Finally we will also be addressing the cost effectiveness and economic viability of the use of such systems in present and future space exploration missions. Read More...
|
Aerospace Engineering |
India |
256-260 |
78 |
Monitoring Linux System for Root Attack against Secure Shell
-Ashwini Kanase ; Pooja Jadhav; Sonal Nikam
Cyber-attacks are becoming a common thing these days. Out of many popular techniques that hackers use, account hijacking is more prevalent. Highly secure Linux Servers are not an exception to these. Especially when it comes to hijacking the root account. “Weak password policies†is one of the common issues in all organizations. It gives hackers a chance to guess or perform a brute force method to crack the passwords. We are giving solution to effectively monitor root attacks on RedHat Linux servers. Our proposed system constantly monitors 22 port for any break-ins. This solution also automates the task of blocking the attack immediately and reporting such an attack to system administrators and higher responsible authorities in the organization through emails. The attack related data is stored in an open source relational database. Read More...
|
Information Technology |
India |
261-262 |
79 |
Web Usage Recommendation System using KNN Classification
-Kuyate Pritali ; Kuyate Pritali Dnyaneshwar; Mekhe Sujata Sanjay; Jondhale Poonam Dilip; Aher Pushpa Supadu
Abstract— In today’s world the large problem of many online websites is the presentation of multiple choices to the user at time. So, its very difficult task for user to find desired product or information on the site. Web mining and recommendation system is based on the current users brhaviour and his/her search pattern on the newly developed Really Simple Syndication (RSS) reader website, which provide relevant information to users according to their needs and interest. The k-NN classifier is very simple to understand and implement than other machine learning algorithms. The k-NN classification method is useful in online and real time to identify the users serach pattern, matching it to a particular user group and recommend a smart option that meet the need of specific user at particular time. For this purpose current users previous logs are extracted, cleansed , formatted and grouped into meaningful session to develop data mart. Read More...
|
Computer Engineering |
India |
263-265 |
80 |
ATM Based Healthcare Monitoring System
-Rashin Nazer ; Snobin Antony; Sreerag Pushpan; Visruth PS; Prasanth M
With rapid aging and economic growth, people are now more interested in their long-term health, fitness and wellness. ATM based remote health care monitoring system allows an individual to check the medical parameters such as Blood glucose level, Blood pressure, Heart beat, Body temperature, Height, Weight regularly without the need of visiting hospitals. The measurements are done using appropriate sensors that are all incorporated in an ATM center. An individual can check the medical parameters after swiping the smart card of the person in the smart card reader. After the check, the money for the particular test is transferred from the smart card. Then the health conditions are displayed on LCD display and the obtained bio signal from each sensory unit is transmitted to the person's mobile phone via GSM. The patient can carry the health smart card with him/her anywhere and anytime and present it to the doctor at the time of consultation. The proposed method of remote health care monitoring system may help to reduce the cost of the healthcare. Access to accurate health data quickly is one of the main functions of this system. Thus consumers can maintain their own health and wellness. Care givers can more quickly react to the medical emergencies of elders. It is a noninvasive approach and will provide real time monitoring. Read More...
|
Electronics & Communication Engineering |
India |
266-269 |
81 |
Approximate Mode of Wallace Tree Multiplier using Adiabatic Logic on Fin-FET for Video-Encoding
-TENKAYALA.RAMYA ; INDHUJA GANGA.P; SUBASHINI.P; SUBASHREE.V; I.MANJU
Approximate computing has been gaining momentum over the past few years with progressive research particularly in applications exercising signal processing techniques. Human imperceptibility could be taken advantage of by some image and video compression standards such as JPEG and MPEG which have tolerance to computing imprecisions that yields an algorithm possessing power efficiency. With hardware approximations that are often statistically fixed, the prevailing architectures are not very efficient in adapting to different inputs, like in the case of MPEG coder whose output quality varies significantly for different input videos due to their fixed approximation hardware configurations. This paper faces the above mentioned issue by proposing a reconfigurable approximate architecture for MPEG encoders. This is achieved by designing arithmetic unit using Adiabatic Vedic alias low power high speed technique that with a FinFET device. Further, low area overhead helps in solving the issues prevalent in conventional design, like power variant, and speed up-gradation, area consumption. Low power and high speed CLA have to be designed using adiabatic Vedic gates (EEAL), followed by the Arithmetic unit (Multiplier) which must be implemented using the Proposed Adiabatic Vedic CLA. The overall architecture has sufficient energy, power consumption reduced delay architecture and saves area which enhances its utility value. Read More...
|
Electronics & Communication Engineering |
India |
270-274 |
82 |
Smart Greenhouse System
-Sagar Babulal Gujar ; Mayur yeole; Nilesh chaudhari; Prof Ganesh Bhadane
Monitoring and controlling greenhouse environment play an significant role in greenhouse management. To monitor the greenhouse environment parameters effectively, it is necessary to design a controlling system. Green House Monitoring and Controlling is a complete system designed to monitor and control the humidity temperature, water level and lights inside a greenhouse using an Android mobile phone, connected using WI-FI to a central server which connects via serial communication to a ARM 7 processor and sensors. In greenhouse controlling process takes place effectively by both manual mode and automatic mode. By using android mobile and PC in our system we can use ARM7 processor and communication between processor and appliances and pc(server) is serial communication using RS232.It will check real time greenhouse environmental condition and send signal to the appliances of greenhouse through wi-fi. we can also control the activities through PC and it acts as server.There are 4 kinds of activity that are performed such as humidity level ,temperature level, turn on and off the motor, lights, water level designed in the system The main objective is to design a simple and easy system to install ARM 7 processor -based circuit to monitor and record the values of temperature, humidity, and water level of the natural environment that are continuously updated to greenhouse farmer and achieve maximum plant growth and productivity. Read More...
|
Electronics and Telecommunication Department |
India |
275-277 |
83 |
E-Monitoring System for City Clean
-OMKAR AMARE ; Dilipkumar Yadav; Prathamesh Pingale; Premkumar Lakkampelli ; Sonali Pakhmode
Pollution is the introduction of contaminants into an environment that causes instability, disorder, harm or discomfort to the ecosystem i.e., physical system or living organisms. With the increase of population of a country, proper management of cumulative of Municipal Solid Waste (MSW) becomes more acute for maintaining green environment. In conventional approach a number of trucks collect the MSW and then transport and transfer these MSW in a pre-specified location, but all the above jobs are not properly monitored. It is very important to monitor the trucks and record the information related to the collecting time and area from a central location to ensure the job well done. The aim of this paper is to mainly concentrate on eradicating this issue and then reduce it. This project exploits the tremendous power of Zigbee technology and presents the development of an electronic monitoring (e-monitoring) system to overcome the above problem in the conventional approach. The proposed e-monitoring system is an embedded system that consists of Zigbee technology interfaced with 8051 micro-controller and a web based computerized software. Municipal authority can monitor the Solid Waste collecting status through the system and can generate different reports to improve the performance of their service. Read More...
|
Information Technology |
India |
278-282 |
84 |
Patent Analysis using Text Mining
-Sanuja Amritkar ; Gayatri Mahanor; Aishwarya Thube; Prajakta Shirsath
Patent documents contain important research results. A patent for an invention is the grant of a property right to the inventor. Patents are granted for new, useful and non-obvious inventions for a period of 20 years from the filing date of a patent application, and provide the right to exclude others from exploiting the invention during that period. The manual process of file a patent is very time consuming. It takes one to two years for getting a patent. Therefore we introducing a web application which takes a patent file as a input and analyze that patent file and gives the output as patent is granted if it is unique otherwise it shows that patent is not granted. For this application special text-mining techniques are used to help extracting the desired information in short time. Text mining also referred to as text data mining, it is a process of deriving high quality information from the text. Text analysis involves information retrieval, lexical analysis to study pattern recognition and information extraction. This application will give the result in few minutes; this is the advantage of this application. also patent map will be generated and The White Spot Analysis is based on a this patent map: building a problem solution matrix of patent data within a defined technology field, gaps so called White Spots can be identified . The approach presented in this paper utilizes a text mining based method in order to support the extraction of problems and solutions from patent file. Read More...
|
Computer Engineering |
India |
283-285 |
85 |
Internet of Thing in Warehouse Inventory Automation
-Komal Ghugri ; Manjusha Tewar; Pooja Nikam; Mangal Patange
Nowadays, internet became one of the most important factors in our life. Our project Internet of things in warehouse inventory automation using sensored network will provide the inventory details online. Warehouse Inventory Automation can have great benefits for Inventory Management and even for helping people to save time and effort of work. Administrator can check the complete details of inventory from anywhere and can fulfill requirement of inventory. The main purpose of this technology is to reduce the load of inventory manager. Current system is totally dependent on human. There are chances of errors and delay by human. That's why we are using the Internet of thing by using sensored area network. IOT technology can provide very cheaper, easier and quick respondent details of inventory without any human intervention. This system will surely help to save the time of administrator Read More...
|
Information Technology |
India |
286-287 |
86 |
Privacy-preserving cipher text multisharing
-Tejasvi Gangurde ; Roshani Patil; Amit Pilaniya; Pratiksha Pardeshi
Privacy become important issue to protect data against unauthorized person. The need of providing privacy to not only data but also the information of delegators. So to make more privacy to data we are making use of new technique that is proxy re-encryption which include conditional sharing. In Proxy re-encryption, a semi-trusted proxy can transform a cipher text to more secure cipher text that the receiver can decrypt the data by the key provided to them. However, the proxy cannot access the plaintext. Privacy to the data in such a way that including data and the information related to delegators is stored only on the server nowhere else it is available. Cipher policy attribute based encryption is a more efficient and flexible as the encrypted can control the access structure when encrypting a message. Meanwhile, a user can obtain secret keys from multiple authorities without releasing is global identifier and attributes to them. Read More...
|
Computer Engineering |
India |
288-289 |
87 |
Transient Cryptographic Secrets with Multiple Rounds and Automatic Detection Using Dynamic Analysis
-Sruthy P ; Amrutha C U; Shafna Mohamed Sharafuddin; Shruthi B
Malware is a term used to a wide variety of forms of hostile or intrusive software including computer viruses, Trojan horses, worms, ransom ware, spyware, adware and other malicious programs. It can take the form of executable codes, scripts, active contents and other software. Nowadays malwares try to hide themselves from being analyzed by using several cryptographic operations. Cryptography is an art of combining mathematics, security, and engineering. It is very hard to implement effectively even though it is the core technique for protecting systems. Effective malware analysis and defense always have been a tedious task because of the use of cryptographic algorithms and cryptographic secrets inside the malware binary. Thus a framework is developed called “Cipher X-ray†which is binary analysis framework that is used to recover the cryptographic secrets. The mechanism is based upon avalanche effect in cryptography that can able to pinpoint exactly where the data modification is happened and extended to analyze the encryption of files than documents. Intermediate node analyzing is also included in order to improve the accuracy checking. The same work can be carried out when different types of files having encrypted or encrypted multiple times with another conditions. Read More...
|
Computer Science and Engineering |
India |
290-292 |
88 |
Simulation of Buck Converter Using Simulink with PI Controller
-T.Rama Rajeswari ; R.Manivannan; C.Subramanian
In this paper proposes on DC to DC buck converter of high efficiency by soft switching technique. The DC- DC converter plays an important role in power conversion. Like computer power supplies, switching mode regulators are used in these applications. The Control action of buck converter involves maintaining a constant output voltage in the presence of change in load and supply voltage conditions. The PI controller behaves very effectively and has maintained constant output voltage subject to the input voltage and load variations. In this paper design and simulation using MATLAB/SIMULINK of buck converter output voltage using PI controller is presented. Read More...
|
Electrical Engineering |
India |
293-295 |
89 |
Searching, Indexing And Sentimental Analysis On Big Data
-Mohinee Jadhao ; Snehal Bailmare; Karishma Gaikwad
As the data grows, there is impact on the time taken for searching the data, as well as to create new indexes along with the size of repository. In order to improve the performance of search while scaling the data we need to increase the size of hardware, which include higher processing power and higher memory size. However it is not cost effective. So we are opt in using the optimized approach for Big data. The optimization of the technology stack which include Apache hadoop and Apache Solr helps to maintain the data with reasonable performance. The optimization is most important while scaling the instance of Big data with Hadoop and Solr. Searching and indexing using Solr can be done in reasonable amount of time. Without indexing we need to search the whole document which take more time. The purpose of storing the index is to optimize the speed and performance. Searching and indexing is done on the data using Apache Solr and sentimental analysis is done based on the reviews of the customer. Read More...
|
Computer Science and Engineering |
India |
296-297 |
90 |
Digital Paper Evaluation and Analysis with Barcode Integration
-Prathamesh Dilip Sukale ; Sayali Shashikant Kapdule; Shreyas Rajendra Sawant; Prof. Vinayak Nandkishor Malavade
Digitalized paper Evaluation system which overcomes the drawbacks of manual evaluation system as well as existing digitalized paper evaluation system. The aim is to automate the entire process of examination assessment by enabling correction on PC using both online or offline mode. Security is enhanced by applying cryptographic techniques thereby avoiding the leakage of confidential data of answer sheets and prevents the manipulation of critical data involved in the process. Also the other manual processes related to the paper evaluation such as exam form submission, apply for rechecking, apply for KT form are also done quickly as we use digitalized approach This system not just evaluate the student, it analyze students all previous data and give the career recommendations. Read More...
|
Computer Engineering |
India |
298-300 |
91 |
Estimation and Detection of Landslide
-Tejaswini Balasaheb Dhumal ; Neha Shashikant Lohar; Priya Bharat Kapase
Nowadays due to global warming and natural calamities there is widely increased in natural disaster. Disasters are unpredictable and cause loss of life and property. This problem can be solving by using new technology which consist of use of sensors. This sensor can be used for prediction of occurrences of landslides taking place in different landslide prone areas. The system made for estimation and detection of landslide consist of GSM, Sensors and PIC microcontroller and estimation is done using MATLAB 2015 software. GSM is used for alerting people before calamities occur. This paper gives a solution for saving humans life. Read More...
|
Electronics and Telecommunication Department |
India |
301-302 |
92 |
A Survey on Medical Data Classification
-Sowkarthikaa K ; Sumathi V.P
Data mining techniques are used on medical data for discovering patterns that are used in diagnosis and decision making. Data mining techniques such as clustering, classification are widely used in healthcare domain. Extensive amounts of knowledge and data stored in medical databases require the development of specialized tools for storing, accessing, analysis, and effectiveness usage of stored knowledge and data. Vagueness, uncertainty, incompleteness, and noises can be detected, reduced by various combinations of techniques. The main goal in this paper is to provide a method for improving the classification of medical data set which will allow us to generate a new representation based on concepts. In this medical data set varieties of classification are complicated. Reducing the number of dimensions and to improve the quality of data. Read More...
|
Computer Science and Engineering |
India |
303-307 |
93 |
Identification of Load Fault and Scheduling of Smarthome Appliances Based on Demand Response
-P.Vijayshalini ; Pavithra.R; Kalpana.S; Kasthuri.K; Ashok.S
HEMS utilize renewable energy effectively by visualizing load equipment information in the home such as water heater, storage battery, electrical vechicle (EV), and controlling it properly. In this paper a new approach of identifying the load fault with facilitation of house hold appliances connected to current transformer and scheduling of smart home appliances under hourly pricing and peak power limiting based on demand response (DR). This paper also presents automatic billing section. The simulation results are obtained from the data gathered from real appliances using software MATLAB simulink. Read More...
|
Electrical Engineering |
India |
308-310 |
94 |
Geometric Distortion and Correction Methods for Finding Key points:A Survey
-Devangi B . Thakkar ; Dr. Amit V. Patel; Prof. Mayur Patel
In remote sensing data for georeferencing refers to the process of assigning to image data from some map coordinate. Geometrical distortion is an error on an image between actual image acquisition (sensor) coordinate data and ideal image coordinate data. Geometric correction includes correcting for geometric distortion due to some variation and collecting Ground control point on that image. This review paper include preprocessing of satellite image using sift algorithm for further application such as change detection, image acquisition, image registration, etc. Read More...
|
Computer Engineering |
India |
311-314 |
95 |
Review on Digital Giftcard Wallet
-Akshay Mule ; Purva Mahatme; Roshan Singh Thakur
Giftcard wallet provides a web platform to buy, sell, exchange and redeem gifting cards. We are focusing on the primary market and also on creating a secondary market space for unused gift cards. The end goal is to provide retailer partners with visibility that which giftcards are unused, and offer them tools to help engage the online customers. Giftcard wallet will offer target customer access to more families and youth-oriented gift card retailer such as Flipkart, Amazon etc. Read More...
|
Computer Science and Engineering |
India |
315-316 |
96 |
Design and Development of Arduino based Gesture Controlled Robotic Arm
-Bhagavati Shivaji Suryavanshi ; Prof.Dr.S.R.Patil
In today's reality, in all segments, the majority of the work is finished by robots or automated arm having diverse number of level of opportunities (DOF's) according to the prerequisite. This paper manages the Design and Implementation of a "Configuration and Development of Arduino Based Gesture Controlled Robotic Arm." The framework outline is separated into 3 sections specifically: Accelerometer Part, Robotic Arm and Platform. It is fundamentally an Accelerometer based framework which controls a Robotic Arm remotely utilizing a, little and minimal effort, 3-hub (DOF's) accelerometer through remote module. The Robotic Arm is mounted over a mobile stage which is likewise controlled remotely by another accelerometer. One accelerometer is mounted/appended on the human hand, catching its conduct (signals and stances) and in this way the mechanical arm moves in like manner and the other accelerometer is mounted on any of the leg of the client/administrator, catching its motions and stances and in this way the stage moves as needs be. Basically, the mechanical arm and stage is synchronized with the signals and stances of the hand and leg of the client/administrator, separately. The distinctive movements performed by automated arm are: PICK and PLACE/DROP, RAISING and LOWERING the articles. Likewise, the movements performed by the stage are: FORWARD, BACKWARD, RIGHT and LEFT. Read More...
|
Electronics and Telecommunication Department |
India |
317-318 |
97 |
New Security Primitive Using CAPTCHA as Graphical Password against Spyware
-Pallavi S. Sonar ; Pooja H. Nerkar; Rutuja S. Aher; Rashmila S. Pagare; Prof. Sagar S. Rajebhosale
Today's world is based on security primitive. A key area of security is authentication, it the determination of whether a user have the access to the system or not. In the past era many of the authentication method can be introduced, but the most common and convenient method for the authentication is traditional alphanumeric password. For security reason the development of graphical passwords as an alternative. They overcome the drawback of traditional password but remains vulnerable to spyware attack.It propose a graphical password scheme by using CAPTCHA (Completely Automated Public Turing tests to tell Computers and Humans Apart). Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge. Password collection by spyware is increased. Read More...
|
Information Technology |
India |
319-324 |
98 |
A Conception of Feature Selection Algorithms in Data Mining
-V. Rengaraj ; S. Firdhouse
Data mining is a form of knowledge discovery essential for solving problems in a specific domain. As the world grows in complexity, overwhelming us with the data it generates, data mining becomes the only hope for elucidating the patterns that underlie it. The manual process of data analysis becomes tedious as size of data grows and the number of dimensions increases, so the process of data analysis needs to be computerized. Feature selection plays an important role in the data mining process. It is very essential to deal with the excessive number of features, which can become a computational burden on the learning algorithms as well as various feature extraction techniques. It is also necessary, even when computational resources are not scarce, since it improves the accuracy of the machine learning tasks. This paper made a review on various existing feature selection techniques. Read More...
|
Computer Science |
India |
325-327 |
99 |
An Analysis of Ewing's Sarcoma Detection Using Image Processing Techniques
-Ms.P.Geetha ; Dr. V. Selvi
A Ewing's sarcomas is a kind of cancer disease which develops from soft tissues like bone, fat, muscle, nerves, fibrous tissues, blood vessels and deep skin tissues. This paper presents the overall information about the Ewing's Sarcoma and overview of image processing techniques. Ewing's Sarcoma is a terrific form of cancer which affects the adjoining body areas such as bones and other supporting soft tissue of the body. It is a very rare cancer. About 1% among adult and 15% among the children is affected in this Ewing's sarcoma. For detection mainly biopsy, CT scan or MRI is done and to pursue the treatment surgery, chemotherapy, radiation is given which may increase the survival rate of the patients. The image processing techniques are applied broadly in medical images for refining prior detection and treatment stages in Ewing's Sarcoma cancer. This paper presents an analysis of ewing's sarcoma and literature survey on detection of ewing's sarcoma by previous researchers. Read More...
|
Computer Science |
India |
328-331 |
100 |
A Review on Optimization of Process Parameters for Tool Wear and Surface Roughness Using Coated Carbide Inserts
-Mr.A.K.Patil ; Amar Kalgonda Patil; Prof.Dr. A.N.Chapgaon
Abstract— In manufacturing and machining operation of different components for automotive manufacturing industry the challenge of mass production firm is focused mainly on the achievement of high quality in terms of work piece dimensional accuracy, surface finish, high production rate, less wear on the cutting tools, economy of machining in terms of cost saving and increase the performance of the product with reduced environmental impact. To achieve this, it is necessary to executing of continuous process improvement efforts in the operations. As the part of a continual improvement process, the essential part is switching to coated grades of carbide tools from regular carbide grades for machining operations of hardened steel. The purpose of this paper is to define tool wear mechanism and tool life, selection of proper tool coating and work piece material combination for research work. Read More...
|
Mechanical Engineering |
India |
332-335 |