No. |
Title and Author |
Area |
Country |
Page |
451 |
Enhancing Health Monitoring Environment with Mobile Technology
-Rupali Sharma ; N.A
With the advancement in wireless sensor networks and extensive unfold usage of smart phones, mobile healthcare offers enhanced health monitoring environment. In this paper we propose the mobile healthcare system that can be used in emergency situation. In this anticipated project, smart phones are used to assemble and process the healthcare information of patient’s situated in far reachable areas. To facilitate highly reliable healthcare information of patient accompanied by the endowment of privacy preserving during the communication in Mobile Healthcare emergency, an effectual patient-centric privacy access control is introduced in this framework. This privacy control is a new privacy preserving product based on computation technique, that offers users to choose who can contribute in the adaptable computing to assist in the processing of individual’s health information. Hence, with this security analysis, our proposed mobile healthcare emergency framework could effectually accomplish patient-centric privacy management. Read More...
|
Computer Applications |
India |
1722-1725 |
452 |
Smart System for Next Generation Automobile Technology
-Raj Trivedi ; Bhavesh Jaiswal
In a country like India where the population has crossed 125 billion. And with that the usage of vehicles and traffic has increased. Due to the increase in the traffic, the instances of accident are rising tremendously. Now for detecting the accidents a system was introduced in many cars by the automobile companies, but this facility was given in the cars with the higher price band, which is not affordable by all people. A new plan has been implemented in this report where this system will work globally with help of the IoT through an amazon web services. Sensors like Ultrasonic sensor and RFID will sense the different aspects and send it to the Raspberry Pi and the data will be stored locally in the memory card on the Raspberry Pi. The Ultrasonic sensor is used to determine the approximate distance from the vehicle to any obstacle like tree road divider, other vehicle or anything that can cause accident. If accident is detected then GSM module send the exact location with Latitude and longitude of the Car with help of the GPS module to the number which we had defined and also to the emergency Service for accident like 108. The data, which was sensed and recorded by the sensors, are sent to the Amazon cloud where this data will stored, visible and analysed globally from anywhere in the world. Finally, the data will be displayed to the user on a web page. With this type of prototype implemented in cars with lower price the facility of accident, detection will be available to many people who were first not able to purchase the costly cars. Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
1726-1730 |
453 |
Leveraging Internet of Things to Revolutionize Homes for Smart Cities
-Vatsal Bhavsar ; Ujjval Dave
In recent years the life style of people has been improved a lot. Now a day's there is lots of talk about smart cities but to really leave in smart city our homes should be smart also. The aim of this research work is to build such a system where we not only monitor and control home from local Wi-Fi network but we should able to do this from any corner of the world. This can be implemented by Internet of Things where things talk to things and according to conditions appropriate actions can be implemented without human interaction. In this work for security of the home premises we have added Passive Infrared (PIR) motion sensor, on detection of movement system captures the image and stores that image directly to webserver. To automate lighting control in the home, LDR base circuit is placed which controls the lighting in the house or office building according to the weather lighting condition. Temperature in this smart home is also maintained by constant monitoring of temperature. The other main benefit of all this system is that the server side of the smart home is implemented using dynamic IP which saves annual expenditure on the static IP for the server. Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
1731-1735 |
454 |
A Review on Securing a Private Network using Honeypot
-Shikha Malakar
Technology is being advanced day by day, more and more people are using internet all over the world. It is becoming a part of everyone’s life. However, how many people are concerned about security? As technology is growing rapidly, newer attacks are appearing. The problem of security becomes even more critical in academic environment. The main aim of this research is to identify how Honeypot can be used in an academic environment to make it secure. Honeypot is a well-designed tool that is used to identify hackers. By using Honeypot, it is possible to monitor the activities started and running on the system by hacker. In other words, Honeypot is a trap machine which looks like a real machine and can be used to find out threats of a system. It is great way to improve security by getting the information from a victim system using forensic tool. Read More...
|
Computer Science and Engineering |
India |
1736-1738 |
455 |
Experimental Investigation of Precast Horizontal Wall Panel Connection using Reinforcement by Push Off Test
-Ashok Kumar M ; J S Princes Thangam; V Govindharajan
The precast concrete shear wall system is very important for construction due to economic advantages in the speed of construction. The connections between panels are extremely important since they affect both the speed of the erection and the overall integrity of the structure. This project deals with the experimental study of shear transfer in precast concrete wall panels using dowel action and shear friction concept. The horizontal connection of the wall panels is considered in this project. This project is completely done referring to Indian Standard Codes. This paper describes the analytical and experimental behavior of precast wall panel with the horizontal connection. Dimension of the panel is 500mm x 400mm x 100mm and M35 grade of concrete has to be used. The primary purpose of this project is to derive an equation relating the transfer of loads through shear friction action to dowel action, to obtain a connection to resist both gravity loads and lateral shear and to validate the wall panel connection using dowel bar by conducting push off test. The dowel bar is provided with a diameter of 12 mm is used to connect the two panels. The development length (Ld) of the bar is provided with varying in size as 300 mm, 400 mm, 600mm and the behavior of the connection is studied. Analytical study will be done using ABAQUS 6.12 software. Read More...
|
Structural Engineering |
India |
1739-1743 |
456 |
Implementation of Blood Warmer Before Transfusion Process using Microcontroller At89s52
-Ankush Patil ; Sayali Shirurkar; Abhishek Sinha; Supriya Patil
This paper focuses on an instrument Blood Warmer which is used in Biomedical field to warm the blood before transfusion. The instrument warms human packed blood from 4oC to 37oC that is to a temperature that is safe for infusion. Usually blood is stored at 4oC in cold storage. If we transfuse cold or high temperature blood into the human body then it would cause to high fever to patient which may cause death to the patient. To avoid such conditions we use blood warmer. While warming the blood, blood components should not be warm by putting blood bag on to warm water, in micro-oven or we cannot use the radiation type of heating because it will damage the blood components. Read More...
|
Biomedical Engineering |
India |
1744-1746 |
457 |
Classical Number Theory based Vs Chaos based Cryptography for Wireless Sensor Networks: A Research Perspective
-Shantala Devi Patil ; Vijayakumar B P
Wireless Sensor Networks (WSN) have fascinated the whole world with their capability to connect to the inhabitable regions. Their applicability to almost every possible area makes it more interesting. Needless to say, that there are certain shortcomings of these tiny devices (sensors) in terms of their memory, processing and battery and hence classical network practices are inapplicable to these networks. Security is a major concern in WSN as they are deployed in hostile regions. Classical security techniques based on number theory are not suitable to energy constrained WSN. This paper aims to discuss the advantages and drawback of introducing the chaotic and fractal based security schemes to WSN. Application of security techniques based on Chaos and Fractals is first of its kind in the field of WSN and expected to revolutionize the field of Sensor Networks. Read More...
|
Computer Science and Information Technology |
India |
1747-1749 |
458 |
Estimation of Body Fat via Levenberg - Marquardt Algorithm
-R.R. Prianka ; R.Saranya; M.R.Bibin; Mr.R.Senthilnathan
|
Computer Science and Engineering |
India |
1750-1752 |
459 |
Performance Evaluation of Beaconing Schemes in GPSR for VANETs
-Poojan Verma ; Er Maninder Singh
In VANETs or Vehicular ad hoc Networks, vehicles represent the nodes, which communicate wirelessly. Every node sends the beacons (data packets) to update its position using GPSR protocol. The packets are forwarded through the best-effort delivery technique called Geographic Forwarding. In this paper, APU or Adaptive Positioning Routing has been used to evaluate the distance-based and speed based beaconing schemes on the basis of variation in number of nodes and in transmission range using NS-2 simulator. Read More...
|
Electronics & Communication Engineering |
India |
1753-1756 |
460 |
Emerging Trends of Ant Colony Optimization in Project Scheduling
-Samir Thakkar
Ant Colony Optimization technique as a swarm intelligence technique is based on stigmergy behavior of natural insects. ACO and its variants provided a futuristic and prominent result in the areas of optimization problems. The Paper discusses the Ant Colony Optimization problem. Paper describes ACO metaheuristics as a general framework for finding optimal solution. The paper discusses project scheduling measures and suggests the need of ACO in the other comprehensive areas related to project scheduling. It predicts and concludes with the remarks that ant colony optimization and its metaheuristics can be useful in more comprehensive project management tasks. Read More...
|
Engineering Management |
India |
1757-1759 |
461 |
Improving the efficiency and security of AES algorithm using parallel computation and symbol pattern generation technique
-NAGMA ANJUM ; BHUPESH DEWANGAN
Information security is an important on internet. There are different kinds of information which are business related, academic or user related private data. Illegal access of the information can lead to big losses, so it is important that proper measures should be taken for securing information on internet. Cryptography is a method of storing and sending facts in a particular form so that only those for whom it is intended can read and process it. The word is most often linked with scrambling plain text (ordinary text, sometimes referred to as clear text) into cipher text and then back again to plain text (known as decryption). The most important factors in information security are Security, integrity, non-repudiation, confidentiality, and authentication services. In now days the security of data attracts much attention, especially when these data are stored in memory or send through the communication networks. Many different data encryption methods have been proposed to keep the security of the data. In this paper we propose an improved AES (Advanced Encryption Algorithm) by using the concepts of parallel computation and the quality of encrypted data is further improved by using symbolic pattern generation techniques. The proposed concept is both fast and more secure for encryption, information transmission and decryption. Read More...
|
Computer Science and Engineering |
India |
1760-1762 |
462 |
Thermal Analysis of Fin with varying Geometry of Different Materials.
-SAURABH PATHAK ; Om Parkash; Ravikant
The heat dissipation from surface is always been a hot topic of all time considering fins. Experimenting with various geometry in order to enhance the heat dissipation is been a constant research interest. In almost every field, increasing the heat dissipation capacity of the fins has been great challenge for all engineers. With the evolution of various shapes and sizes with different materials has helped our researchers and manufactures a lot. In this paper we have taken 3 different shapes such as circular, square, tapper which are modeled and analyzed in SOLID WORKS 2015 .The objective of this paper is to observe and analyses the heat dissipation of different material with respect to different geometry (circular, square, tapper).A comparison is shown between two different materials Alloy Steel and Aluminum alloy 1060. Read More...
|
Mechanical Engineering |
India |
1763-1765 |
463 |
Case study of storm water drainage system of vadodara CITY
-Nishant Dabhekar ; Hemant Patil; Ratansharan Panchal
This paper presents novel design of storm water drainage system for Kamla Nagar Area of Vadodara city. The present design is based on rainfall data. Past 20 years rainfall data has been taken for study. The system has been designed considering in total of 84% of impervious area. Different methods have been used for runoff estimation. Here, rational method has been used for estimation of storm water runoff. The outfalls of system are directed to Kamla Nagar pond. Read More...
|
Civil Engineering |
India |
1766-1767 |
464 |
Domestic Wastewater Treatment by Low-Cost Natural Adsorbents
-Islamuddin ; Imran Ahmad; Nusrat Ali; Neha Mumtaz
Water is one of the most important elements involved in the creation and development of healthy life. As demand for water increased whiles the water resources is limited, there is a growing awareness to treat the domestic waste water and make more efficient use of the domestic waste water. The conventional methods for treating waste water are expensive. Consequently, the search for contrarily but effective, efficient and economic methods has been on the increase in recent times. Thus, the use of biomaterials, such as agricultural waste as adsorbents for organic and metal ions is being exploited due to their availability and low cost. Filtration technology is the simplest and low cost treatment technology based on the principle of attached growth process. Multimedia Filters represent a significant improvement over single media filters. A multimedia filter model was developed by G.I. sheet for treatment of domestic wastewater. Different packing media are used such as Activated carbon, sugarcane bagasse, Rice husk, Sand and Grass mulch. The waste water samples were physio-chemcially characterized before and after treatment according to standard procedure using these adsorbents. The results obtained from the various pollution indicators show an appreciable improvement on the quality of the water. The pH value changed from 7.9 to 7.1, the colour changed from soapy and cloudy to colourless, Turbidity was reduced from 163.7 to 28.3NTU while the biochemical oxygen demand BOD was reduced from 117mg/l to 69.3mg/l and chemical oxygen demand COD was reduced from 232mg/l to 115.7mg/l. This paper intense to provide an overall vision of multimedia filter technology an alternative and conventional method for treating waste water. Treated water use for Irrigation, toilet flushing, car washing, gardening, firefighting, etc. Read More...
|
Environment Engineering |
India |
1768-1771 |
465 |
Advanced Eco-Friendly Grass Cutter
-Sulthan Mohyuddin ; Nazeya Khanam F; Vidyashree H V; Digesh K D; Vivek T K
A normal grass cutter moving with IC engine will run based on the energy from petrol. The major drawbacks of this technology are high running cost; create noise pollution and air pollution. Also, an IC engine requires periodic maintenance such as changing the engine oil, mechanical maintenance. It is an innovative technology of cutting grass without any pollution, electric solar grass cutter are environmentally friendly. Nowadays, the labor charge is increased day by day. This technology can help the people who are living in rural areas. This project is mainly proposal for reduce the manpower and usage of electricity. The system control is done by the Schmitt trigger circuit. The grass cutter and vehicle motors are interfaced to a Schmitt trigger circuit that controls the working of all the motors. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
1772-1775 |
466 |
Analysis of 8 x 10 GB/s WDM System using Hybrid Amplifier + FBG in Presence of Fiber Non Linearities
-Ramanpreet Kaur ; Er. Harjit Singh; Dr. Anu Sheetal
This paper introduces the non linear optical effect known as four wave mixing (FWM). In wavelength division multiplexing (WDM) systems four wave mixing can strongly affect the transmission performance on an optical link. As a result it is important to investigate the impact of FWM on the design and performance of WDM optical communication systems. The main objective of this paper is to analyze the FWM power for different Raman gain length in presence as well as in absence of FBG by designing and simulating a model in Optisystem 7. In this paper, we have simulated the FWM design for eight waves. Read More...
|
Electronics & Communication Engineering |
India |
1776-1779 |
467 |
Sap Hana is Truly a Game Changer
-Swapnil Vishwas Ayare
The SAP HANA Database is the core part of the SAP HANA Appliance which is developed to support the analytical processes and transactional workload. This paper discusses basic characteristics of the SAP HANA, how it will overcome the problem of Data Explosion & emphasizing the distinctive features from other traditional relational database management systems. From the technology perspective, the SAP HANA database consists of many data engines that supporting both row and column oriented tables, to OLTP & OLAP data load we can use the same system. This paper outline the specific support provided by the SAP HANA database of multiple technologies & domain specific languages with a built-in set of natively implemented business libraries and functions. Read More...
|
Information Technology |
India |
1780-1783 |
468 |
Retrofitting of Machine by Design and Implementation of Self Locking of Worm Gear for Vertical Axis
-NAVNATH MACHHINDRA SANGALE ; Dr. MAHESHWAR D. JAYBHAYE
Replacement of the high value machine tool or special purpose machine tool is not financially feasible and the machine has a large work envelope with high quality and substantial machine components. Slide way grinding machine manufactured by Waldrich Coburg Company in 1994, is a very expensive machine with high precision of work. It’s having a problem of vertical axis falling down by 10-15 mm due to gravitational force at the time of working. The problem is resolved by retrofitting of the worm gear pair by applying theory of self-locking; which is dependent on lead angle of worm gear and coefficient of friction between material of worm shaft and gear. After retrofitting, it’s working very precisely and results obtained are tremendously good. Now vertical axis is working with a very high reliability & accuracy and it doesn’t fall down in any condition. Read More...
|
Mechanical Engineering |
India |
1784-1786 |
469 |
Risk Score for Mobile Application
-Harsha Ankalgi ; Prakash Aghav; Ganesh Gunjal; Harshad Bhosale
Now days because the use of humanoid mobile devices square measure increasing speedily day by day, immense range of mobile apps square measure returning into the market. These apps raise the user access to numerous forms of permissions, and additionally several of those perform a similar task. The user comes in danger with presence of some malicious app as a result of access of permission it'll get, as humanoid provides a stand –alone defence reaction with regard to malicious apps. Wherever it warns the user concerning the permissions the app needs, trusting that the user can create correct call, which needs the user to own the technical information and time, that isn't user friendly for every user. Additionally classification of those apps is helpful in understanding the user preferences and might encourage the intelligent personalised services. However to effectively classify the app may be a nontrivial task as restricted discourse data is out there.To address these 2 problems Associate in Android Security approach is planned wherever the apps are classified 1st victimization the enriched discourse data from net program, then with the discourse options from the context-rich device logs of mobile users and conniving the danger score for the app so as to get a user friendly metric for the user to use once selecting the app. This can facilitate android apps to induce effective classification of the mobile apps and shield the user’s mobile devices from malicious apps. Read More...
|
Computer Engineering |
India |
1787-1789 |
470 |
Research Paper on A Secured Cost-Effective Multi-Cloud Storage in Cloud Computing
-Priya Pokale ; Prof Rucha Dixit; Surendra Tipre; Niketan Tote; Deepika Deshmukh
Now a days industries and business move towards the pay per use services also knows as the cloud computing. Cloud is very popular and useful because of pervasive nature of it. But security issues of customer outsourced data become the main overhead. We can observe that single cloud service provider is not sufficient to provide prominent security to the customer outsourced data. In this paper we address the security issue of customers outsourced. We provide the more privacy and availability to customer data by dividing customer data into the no of data pieces and distribute them to the available service providers and successful retrieval of data takes the participation of threshold no of service provider. In this paper we presents a secured cost-effective multi-cloud storage in cloud computing. Our model provides better security as well as availability of data with cost effective service. Read More...
|
Computer Engineering |
India |
1790-1792 |
471 |
Review Leukemia Detection and Types Using Digital Image Processing
-Jeenu Garg ; Ms. Daljit Kaur; Mr. Sachin Majithia
Leukemia is a very varied cancer of the hematopoietic system. Since its main reason consists of genomic defects in the hematopoietic stem and predecessor cells and given the high difficulty of the hematopoietic system, it may seem an imperative task to investigate the transcriptomic correspondences and differences between leukemia subtypes and hematopoietic cells. Haematopoiesis is considered by a rapid, continuous turnover of cells. Blood cancer is a form of cancer which amounts the blood, bone marrow, or lymphatic system. It is diagnosed with a blood test in which specific types of blood cells are counted by haematologist. We considered only acute myelogenous leukemia, which is one of the blood cancer type which categories under acute leukemia and it mostly comes among adults. Need for automatic diagnosis of leukemia rises when doctors identify cancers under a microscope which has complete manual work and it’s not good for the patient. Read More...
|
Computer Science and Information Technology |
India |
1793-1795 |
472 |
Information Authentication Testing Using Message Digest Algorithm
-Ekta P.Brahmbhatt ; Prof.Hetal G.Bhatt
This paper proposes hash algorithms for the images A hash function is any function that can be used to map data of arbitrary size to data of fixed size. Hashes are used to secure the data and message integrity, password validity, and are the basis of many other cryptographic systems. Hashes are unique and it is one way function. It cannot be reversed. We use a SHA-512 algorithm and also try to reduce the brute force attack with the help of 2D logistic map method.SHA-512 is the most secure algorithm. Chaotic system has high sensitivities to its initial values, high sensitivities to its parameter(s), the mixing property and the ergodicity. Simulation results are shown. Read More...
|
Electronics & Communication Engineering |
India |
1796-1798 |
473 |
Design and Evaluation of High Speed Parallel Multiplier Using Low Power Data Compressors
-J.BERYL JANCY ; Miss. A.Benila
A Parallel multiplier using approximate compressors are proposed in this paper. The two new approximate 4-2 compressors are proposes that the simplified compressors have better power consumption than the optimized 4-2 compressor existing designs. These approximate compressors are then used in the restoration module of a Parallel multiplier. Four different schemes for utilizing the proposed approximate compressors are proposed and analyzed for a Parallel multiplier. Read More...
|
VLSI Design and Embedded System |
India |
1799-1803 |
474 |
Precision Farming Based on IOT
-Tilak Chauhan ; Ashish Goyal; Ashish Kumar Sharma; Abha Sharma
In the recent times Wireless Sensor Networks (WSNs) [1] are used in making of decision making systems in which there is a need of good practical observation. Agriculture is one of the fields in which there is a huge need for decision making systems. Currently in the field of agriculture due to improper knowledge of the field conditions and without proper knowledge of prerequisites for a particular crop, farmers are not able to able to convert their hard work into better yields and profits [2]. And with the inefficient monitoring it leads to poor yields and loss of cost. Currently there is no particular solution to this problem other than some systems which have certain disadvantages like high cost, manual and onsite control, complex interface, hardware oriented, user and environment demanding, unpredictable quality and quantity etc. This paper proposes a system called Georletos (Farmer Helper), an advance monitoring system which is very easy to use and help in enhancing crop yield and productivity of field along with the awareness of farmers about the various parameters for a particular crop. The Georletos system makes use of WSNs along with the concept of Internet of Things (IoT) [3] which makes it possible for the farmer to get information about the field and crop conditions at any time and at any place. It provides an advantage of internet use which makes it possible to get the field and crop information at any place and give the farmers a comparison between standard data and on field data so that farmers can take an efficient decision which can improve the field productivity. The paper provides description about precision farming based on IoT approach which provides quality services to farmers. Read More...
|
Electronics & Communication Engineering |
India |
1804-1810 |
475 |
Spam Email Classification & Blocking
-Prof.K.S.Warke ; Salunkhe Nilam R.; Kamble Pallavi S.; Kulkarni Sweta V.; Nage Pooja V.
Spam emails are the emails receiver does not wish to receive; it is also called unsolicited bulk email. Emails are used daily by number of user to communicate around the world. Today large volumes of spam emails are causing serious problem for Internet user and Internet service. Such as it degrades user search experience, it assists propagation of virus in network, it increases load on network traffic. It also wastes user time, and energy for legitimate emails among the spam. It is time consuming and laborious to remove spam email by hand if there are too many spam. Read More...
|
Computer Engineering |
India |
1811-1815 |
476 |
Object Detection On an Android Mobile Phone Which Gives Voice Description
-Kiran D. Yesugade ; Shradha C. Andure; Deepali T. Garde; Soniya S. Mane; Nikita S. Mohite
Keeping in mind the challenges faced by the visually impaired people we had come with an Android application. In this paper we present an Android application dedicated to the aid of visually impaired or blind users. The main aim of this application is to reduce object detection procedure and give more useful and reliable function in single application. The software modules are designed for Android operating system. The goal of this project is creating virtual guide application which provides services like Object detection, Scene detection, Motion detection in which result generated will be in voice format with the help of speech synthesizer enable in smart phones. Read More...
|
Computer Engineering |
India |
1816-1818 |
477 |
Estimation and Development of Saturation Flow Model for Heterogeneous Traffic Condition at Urban Intersection
-Sanket Himmatbhai Davara ; Prof. M. R. Bhatt
Intersections are one of the most critical elements that affect the performance of urban road network. For safe and efficient movement of large volumes of traffic on city road network, majority of the intersection are usually signalized. Saturation flows, lost times and Passenger Car Units (PCU) are the significant parameters in the planning, design and control of signalized intersection. Several factors which are significant influence on saturation flow such as roadway parameters, traffic condition, operating parameters. This thesis discusses a saturation flow study conducted in various intersections of Rajkot city. The Saturation flow rate is calculated based on the observed green time. This thesis presents the results of the study on analysis of saturation flow rate conducted at intersection with heterogeneous traffic condition in Rajkot, and developed model for the saturation flow considering width of approach, traffic compositions, right turn movement and approach speed criteria. A formula was recommended for use in estimating an appropriate saturation flow value for a specific lane on an approach to an intersection. Many researchers have developed models for saturation flow. The developed Models of saturation flow give the correct value of saturation flow. These developed models are calibrated & validated with field observed data. Read More...
|
Transportation Engineering |
India |
1819-1825 |
478 |
Secure Cryptographic System Using Face Biometrics
-Shital Venkatrao Bhalke ; Dr S A Angadi
Face biometric approach can be applied for a wide variety of problems for individual identification and verification. This leads to identification of persons based on their physiological and behavioral traits. Users cannot easily remember complex and long cryptographic keys, in this approach users need not remember the keys, and the keys cannot be easily stolen or cracked by attackers as they are lacking sufficient knowledge of biometric features. In this paper we propose powerful method based on face biometrics. The main objective is to increase the security in communication of information on internet, as with increase in use of internet information security is becoming more and more important. This proposed system uses graph representation based on face feature extraction and its further use in secret key generation for implementing the DES algorithm. This proposed system uses face image as an input from the publically available database and locates total 13 landmark points on image and construct fully connected graph considering landmark points as nodes, 64-bit sub key is generated using Eigen vector of adjacency matrix as seed from graph. Encryption of the information is performed using 64-bit key same method is employed for decryption using DES algorithm. Read More...
|
Computer Science and Engineering |
India |
1826-1831 |
479 |
Raspberry Pi Based Parameters Monitoring System for Green House
-Rohan Meghasham Ghare ; Nikhil Deepak Nimbalkar
light intensity based most of the devices can be controlled. Most of the time to differentiate between day and night time, measuring light form sun light is essential. Where, light measurement and analysis is an important step in ensuring efficiency and safety. Plant growth in farming is purely dependent on the light intensity falling on the top of canopy. This paper introduces real time remote Light intensity monitoring system using Raspberry Pi which enables the user to track the lighting system in green house remotely for improving plant growth. The main feature of this system is instantaneous light intensity monitoring and data storage in the database on the cloud for future use in any internet enabled device. This facilitates experts to take right decisions at right time to obtain desired results in plant growth. Read More...
|
Electronics Engineering |
India |
1832-1834 |
480 |
Data Mining Technique to Predict Annual Yield for Major Crops
-Rahul Bandu Ombale ; Rahul Ombale; Rajshekhar Borate; Sagar Ahire; Manoj Dhawade
The complexity of predicting the best crops is highly due to unavailability of proper knowledge discovery in crop knowledge base which affects the quality of prediction. However, Clustering is an important step in mining useful information. There are multiple clustering methods such as partition, hierarchical, model based grid-based. Constrained-based which make this task complicated due to problems related to optimization and noise. In this paper k-means clustering algorithm issued in solving the partition problem which led to select for performance evaluation and linear regression algorithm in order to get good quality of clusters for crop prediction. This project aimed to apply new data mining techniques on dataset to establish meaningful relationships can be found. Read More...
|
Computer Engineering |
India |
1835-1837 |
481 |
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
-Meghana B. Shetty ; Krishnamoorthy K
The threat of cyber-attacks systems, such as web servers, databases servers and cloud computing, the most common and aggressive media, DoS can cause a serious impact on the computer systems. DoS attack detection system for a specific network traffic used by the geometric relationship between feature extraction network traffic in the characterization of MCA. The system detects DoS attacks, using anomaly recognition principle MCA. The solution can effectively detect known and unknown DoS attack, study legal network traffic patterns. The purpose of the triangular space technology is to improve and accelerate the MCA process. Effectiveness of the proposed tracking system is the use of KDD Cup 99 dataset and affects both non-standard, standard measures data of the proposed tracking system. Read More...
|
other |
India |
1838-1841 |
482 |
A Study On Expertise In Teaching Communicative English Language
-Kavita Deric
In this paper I am presenting a review study of expertise in teaching communicative English language. Teaching of Communicative English rose to importance in the beginning of 80’s as a result of many different developments in both Europe and the United States took place. Primarily, demand for English language learning increased in Europe. The eagerness of learning English Language put immense anxiety on English teachers to change their methods of teaching. As per earlier grammatical methods it is assumed that the learners were tried hard to improve their expertise in English language and were study hard for years before expecting to use the language in real life. However, these assumptions were challenged by learners who were busy with their jobs who were less academically able. Teachers realized that a more immediate payoff approach was must to motivate these learners. The development of communicative English language teaching was also aided by new academic ideas. Read More...
|
Applied Science |
India |
1842-1844 |
483 |
Study of Microstrip Patch Antenna for WiMAX and WLAN
-Arya Vishal Shukla ; Atul Ojha; Ajay Jaiswal; Amit Singh; Utkarsh Pandey
The investigation of microstrip patch antenna has gained awesome ground as of late. At the point when microstrip patch antenna is contrasted and ordinary receiving wires, the microstrip patch antenna have more focal points and better prospects. They are lighter in weight, low volume, minimal effort, littler in measurement and simplicity of creation and congruity. Also the microstrip patch reception apparatuses can give double and roundabout polarizations, double recurrence operation, recurrence nimbleness, bolster line adaptability, shaft examining and Omni directional designing. In this paper we talk about the micro strip patch antenna and its distinctive sorts of setups and parameters. Read More...
|
Electronics & Communication Engineering |
India |
1845-1847 |
484 |
Cloud Resource Management Using Load Balancing Algorithm in Cloud Computing Environment
-Bhammar Bhikhu
Recently, cloud computing is becoming increasingly popular in terms of internet technology .and provide client with wide range of Scalable, distributed, virtualized hardware and software resource. Based on client request that request execution there are challenges of load balancing in cloud computing. Nowadays applications ranging from simple web site to large scale e-commerce applications are being deployed to cloud infrastructure. As applications, especially data-intensive applications, often need to communicate with related data frequently, the overall application performance would be affected by network input and output performance significantly. So proper scheduling of virtualized resource required for providing efficient service. That can be done by efficient load balancing algorithm. In this work we present some modification of algorithm that provides batter solution in terms of response time. Read More...
|
Computer Engineering |
India |
1848-1850 |
485 |
Review On Seismic Design and Assessment of High Rise Structures Using Various International Codes
-Asmita Ravindra Wagh ; Prof. P. J. Salunke; Prof. Trupti N. Narkhede
This study focuses on comparison of International standards. An Illustrative study of Seismic design and assessment of a High-Rise Structure using different International Codes is performed. The objective of this study is to investigate the differences caused by the use of different codes in the analysis of a High-Rise building. The parameters such as displacement, base shear, storey drift, time period, axial and shear forces, bending moments are studied to figure out the variations that occur while using different codes. An interest develops to carry out the seismic design of a high rise building using various codes to understand which codal provisions give effective designs to perform good during an earthquake crisis. This paper is intended to compare the design of High rise structure with different International codes. In R.C. buildings, frames are considered as main structural elements, which resist shear, moment and torsion effectively. These frames are subjected to variety of loads, where lateral loads are always predominant. The study of papers published so far helps in understanding the major contributing factors that lead to poor performance of Structures during an earthquake, so as to achieve their adequate safe behaviour under future earthquakes. A comparative analysis can be figured out in terms of Base shear, Displacement, Axial loads, Moments and Displacement. Read More...
|
Structural Engineering |
India |
1851-1855 |
486 |
Concrete Using Red-Mud and Iron-Ore Slickens
-Apurva Srivastava ; Dr. Y.P. Joshi; Sachin Nagayach
Basic Factor Is Keeping Environment Away From Pollution As Much As Possible, Which Is Directly Connected To Humans. Sustainable Development Plays An Important Role In Present Scenario Of Construction. But Before Doing Any Kind Of Development The Factor Like Environmental Consciousness And Protection Of Natural Resources Must Be Kept In Mind. For That In This Study We Have Utilized Waste Materials Which Help Us To Get Greener & Cleaner Environment. In This Study We Have Focused On the Strength Aspects of Concrete for that We Are Replacing Ordinary Portland Cement By Red Mud And In The Same Mix Fine Aggregate Are Replaced By Iron Ore Slickens. Opc In The Red Mud Is Replaced By Red Mud At 1%,2%,3%,4% And For Each Red Mud Replacement Level 10%,20%,30%,40%Of Send Is Replaced By Iron Ore Slickens. Read More...
|
Civil Engineering |
India |
1856-1858 |
487 |
Analytical Analysis for Receiver and Its Processing for A 30 Kw Cl-CSP System at RGPV Bhopal
-Mr. Rohit Singh ; Mr. Rohit Singh; Dr. MUKESH PANDEY; Mr. Anurag Gour
A solar project named cross-linear concentrated solar plant for heating and refrigeration system has been designed and implemented behind the boy’s hostel building at UIT RGPV Bhopal. The CL-CSP system is formed by sixty heliostats, rectangular collectors is mounted on a base pillar structure with vertical axis, allowing solar tracking in the Sun azimuthally plane, with the aim of maximizing radiation over the tilted surface of rectangular board that have mirror facets over it . The receiver structure has combination of both line focusing and point focusing principle. These sixty heliostat’s control and instrumentation has been done so that mirror board could fully concentrate on four receiver line placed above the heliostats. The main aim of this paper work is to make a performance analysis of CL-CSP receiver system by using air as a heat transfer fluid and capture a high range of temperature approximate 600C air temperature. Read More...
|
Renewable Energy |
India |
1859-1864 |
488 |
Augmented Reality Based Virtual Tour Guide
-Anithakshi ; Nirmala Y Bariker
The project is about Augmented Reality via location-based visualization and enactment on the Smartphone expedients. That is relatively because Smartphone comes overflowing with in-built sensors have full-fledged and become standard over past few years. This will be discovering the collaborating and interaction Location Based Services that Augmented Reality sanctions on Android devices. The use of mobile applications and improvement in mobile technology such as compass, GPS and accelerometer sensors are able to detect and determine the locality and direction of the device, location-based applications with AR views are possible. Augmented Reality combines the physical world with virtual, the combination of information in the user's environs in real time, the user interface techniques of demonstrating rich, natural information data of the real world. The Augmented Reality application which archetypally takes the image of the cohesive camera, setting location as a representation of the real world and project objects on topmost of this image to create the AR view. The research was commenced by discovering and revising non-fiction related area and current Augmented Reality application available on Android devices. There are huge numbers of Augmented Reality applications open and quick enlargement of Android smartphone devices has delivered an developed platform for the application of mobile Augmented Reality technologies. Evolving application will help the investigator explore the area while going from side to side about this technology. The aim is to cultivate a blend of location-based information and AR features by combination of both visual, map-based and non-map based features like live projection of a nearby ground-breaking on camera screening on mobile devices, developing free and open source software enlargement tools. Read More...
|
Computer Network Engineering |
India |
1865-1868 |
489 |
Processing & Characterization of Al Alloy by Equal Channel Angular Pressing
-Vivek H. Barot ; Vishal Mehta; Kandarp Changela
It is an innovative process capable of producing relatively uniform intensive plastic deformation in a variety of material systems, without causing substantial change in geometric shape or cross section. Multiple extrusions of billets by ECAE permit severe plastic deformation in bulk materials. Equal Channel Angular Pressing (ECAP) is one of the most applicable Sever Plastic Deformation (SPD) processes which leads to strength and ductility improvement through the grain refining and development of a suitable texture. In this article Al alloy samples were severely deformed by equal channel angular pressing (ECAP) up to two passes at room temperature. The effects of severe plastic deformation on the microstructure, mechanical properties of the Al alloy were investigated. Read More...
|
Mechanical Engineering |
India |
1869-1872 |
490 |
A Study Of Predictive Analyses In Health Care Sector Using Classification Techniques
-K. Merlin Jeba ; Dr.V.Srividhya; M.Bhuvaneswari
Analyzing of medical data content in the medical field is a major issue for the medical researcher. Medical researcher need to solve this problem with these vast data. Conversely, there is a need for analyzing a hidden relationship in those vast data. Analyzing these relationship Data mining plays a vital role for analyzing the medical data content in medical fields. Many techniques were implemented for this issue to analyzing the outcomes, they were some issues were occurred. This study paper provide a various classification techniques to analyze the problems and how it will helpful for the medical researchers by using the decision tree, Naive Bayesian and Artificial neural network (ANN) for accurately provide the best outcome to the researchers. Read More...
|
Computer Science |
India |
1873-1876 |
491 |
Investigation On Computational Fluid Dynamics (CFD) Simulation for Wind Effects On Tall Tapered Buildings
-M. Kannan ; K.Saravanan
The modern day structures are very tall, slender and flexible due to the use of high strength materials for construction. Although these flexible structures satisfy the strength criteria safely, it is sensitive to wind-induced excitations causing discomfort to the building and its occupants. The mitigation of across-wind responses is a major factor in design of tall buildings. Hence aerodynamic modification of the building shape becomes important to diminishing the wind-induced excitation. In the present study tall building with tapered cross section shape is considered. Numerical simulations using Computational Fluid Dynamics (CFD) techniques are carried out to study the effect of wind components on the tall tapered building. The modelling and meshing is done using ICEM software and the model analysis and solving is done using ANSYS FLUENT 15 software. Various Reynolds Averaged Navier Stokes (RANS) based turbulence models like Renormalization Group (RNG) k-É› model and Realizable k-É› model are used in finding the force co-efficient. The effectiveness of these models is evaluated by comparing it with the experimental results taken form literatures. Read More...
|
Structural Engineering |
India |
1877-1879 |
492 |
Study of Temperature Profile and its Effect on Surface Roughness of Expanded Polystyrene Foam during Hot Wire Slicing
-Sandeep Dasgupta ; Ranjeet Bhagchandani; Prof K P Karunakaran; Dr S A Mastud
Expanded Polystyrene (EPS) or Plastic foam, commonly known as thermocol is used mainly for packaging and insulation purposes. Another important usage is pattern making for lost foam casting. Our focus in this paper will be restricted to the latter purpose. Hot tool is used for making various intricate shape easily and in lesser time. Moreover, the hot tool cutting process involves minimum cutting force compared to mechanical cutting. In this process nichrome wire is used as cutting tool which is heated by passing electricity through it. Nichrome wire diameter, feed rate and supply voltage are taken as input variable in the experiment whereas surface roughness as output variable. This paper explores into the plastic foam cutting process with a number of experimental cutting trials (more than 100), at different values of input variable and finding the effect of input variables on surface roughness. The objectives of the paper are to establish a mathematical model for steady state hot wire temperature and verify the same with experiment and to find out optimum input variables at which surface roughness is minimum. Surface roughness was measured using contact type profilometer. Read More...
|
Mechanical Engineering |
India |
1880-1884 |
493 |
Analytical Approach for Tracking Control System and its Instrumentation of a 30 KW CL-CSP System at RGPV Bhopal
-Mr. Sandeep patidar ; Dr. Mukesh Pandey; Mr. Anurag Gour
A solar-powered cross-linear concentrated solar plant for heating and refrigeration system has been designed and implemented behind the boy’s hostel building at UIT RGPV Bhopal. The CL-CSP system is formed by sixty heliostats, rectangular collectors is mounted on a base pillar structure with vertical axis, allowing solar tracking in the Sun azimuthally plane, with the aim of maximizing radiation over the tilted surface of rectangular board that have mirror facets over it . These sixty heliostat’s control and instrumentation has been done so that mirror board could fully concentrate on four receiver line placed above the heliostats. This work describes the control system implemented to achieve accurate solar tracking phenomena. The criteria are to design and implant the control system is to maximize radiation over the tilted surface and thereby at the receiver, and to obtain a reliable and durable structure. Read More...
|
Renewable Energy |
India |
1885-1891 |
494 |
Drowsiness Detection for Cars using Eye Blink Pattern and It's Prevention System
-Sanjay Ambekar ; Sanjay Ambekar; Mangesh Neet; V.S Jahagirdar
Drivers driving long distances without any break are at a high risk of becoming drowsy. Driver fatigue is one of the significant reasons for a large number of vehicle accidents. Driver inattention is due to fatigue which causes traffic accidents. Monitoring a driver to detect inattention is a complex problem that involves physiological and behavioral elements [5]. Different approaches have been made, and among them IR sensor based approach to detect drowsiness has the potential of monitoring the person without interfering with his driving. In this paper we have developed a system that monitors the alertness of drivers in which drivers are prevented from falling asleep at the wheel. This paper presents a real-time method for drowsy driving detection system in which IR sensor mounted on spectacle to detect blink rate which is used for detection of drowsiness. The output of IR sensor is given to Controller of transmitter which decides drowsiness of driver. Signal is transmitted given by the transmitter to receiver. At the receiver which acts as alerting system alerts the driver when fatigue or drowsy state detected. The alerting system consists of musical buzzer, a vibrator mounted on spectacle, LCD display and flashing LED. The algorithm used is very accurate and with high performance. This system will help to decrease the amount of crashes due to fatigued drivers. Read More...
|
Electronics Design and Technology |
India |
1892-1894 |
495 |
GSM Based Vehicle Locking and Tracking System
-Prof. Ulhas V. Patil ; Ghatul Parikshit A.; Raut Krushna B.; Jagtap Shivaji A.
As of late there is expansion in degree of burglary of vehicle. A vehicle bolting and following framework utilizing GSM is the one of answer for take care of this issue. This framework depends on GSM innovation. This framework is utilized to keep the burglary control of vehicle. Chip are regularly alluded to as broadly useful processors as the just acknowledge the inputs, process it and give the yield. Conversely, a microcontroller acknowledges the information as inputs as well as controls it, interfaces the information with different gadgets, controls the information and consequently at long last gives the outcome. As everybody in this focused world likes to make the things simple and easy to handle. In this anticipate we manage the security of the vehicle. At whatever point the GSM modem gets the message from the specific portable then the auto motor gets stopped.so utilizing GSM innovation the vehicle bolting and following framework gets to be straightforward and conceivable. Read More...
|
Electronics and Telecommunication Department |
India |
1895-1896 |
496 |
Bladeless Wind Power Generation
-Prof. Harshith K ; Blayan Santhosh Fernandes; Shreerama P R; Thilak Raj
Bladeless Wind Power Generation uses a radically new approach to capturing wind energy. The device captures the energy of vorticity, an aerodynamic effect that has plagued structural engineers and architects for ages (vortex shedding effect). As the wind bypasses a fixed structure, it’s flow changes and generates a cyclical pattern of vortices. Once these forces are strong enough, the fixed structure starts oscillating. Instead of avoiding these aerodynamic instabilities our design maximizes the resulting oscillation and captures that energy. Naturally, the design of such device is completely different from a traditional turbine. Instead of the usual tower, nacelle and blades, the device has a fixed mast, a power generator and a hollow, lightweight and semi-rigid fiberglass cylinder on top. This puts the technology at the very low range of capital intensity for such projects, it also makes it highly competitive not only against generations of alternative or renewable energy, but even compared to conventional technologies. Read More...
|
ELECTRICAL AND MECHANICAL ENGINEERING |
India |
1897-1901 |
497 |
Neural Network Classifier Based Method for Leaves Disease Detection with Image Processing Technique
-Dhawale Sariputra Kishanrao ; Shirolkar A.A
The conventional technique for leaf disease detection involves of calling an expert person who can identify the diseases based on his understanding and that costs too much for an ordinary farmer in an emerging country such as India as stated above. Hence an alternative is mandatory for a country like India where a low cost but technology dependent system is required. To fulfill this, purpose a system is proposed which can identify the diseases on the plants with the help of technology. It will take input image from user which is to be processed. It will preprocess the image and then the green pixels from the image is removed which are nothing but the healthy part of the leaf. The GUI development of this project is done in Matlab. These methods result is shown in GUI. In the future work other part is segmented and the useful segments are selected for further analysis which consist of feature extraction and the statistical analysis of those features. After this the final information about disease of that plant is displayed. The classifier used in this proposed system is Neural Network classifier hence once trained such classifier can provide results in better manner compared to the conventional systems. Read More...
|
Electronics Engineering |
India |
1902-1906 |
498 |
Keystroke Dynamics Authentication with Project Management System
-Gaurav Kamlaskar ; Abhijeet Patait; Kirti Chandratre; Vikas Thorat
By and large client confirmation is done utilizing username and watchword that is called as login procedure. This login procedure is not more secure in light of the fact that, however a login session is still unprotected to impersonator when the client leaves his PC without logging off. Keystroke flow techniques can be made valuable to confirm a client by removing some writing includes then, after the confirmation procedure has effectively finished. From the most recent decade a few studies proposed the utilization of keystroke progression as a behavioural biometric instrument to confirm clients. We propose another strategy, for speaking to the keystroke designs by joining comparable sets of continuous keystrokes. The above proposed technique is utilized to consider grouping the di-charts which depend on their fleeting elements. In this anticipate, verification framework is give to venture administration framework that make more Secure administration framework without recognizing unapproved client. The Project Management System addresses the administration of programming activities. It gives the system to arranging and overseeing assets in a manner that these assets convey all the work required to finish a product venture inside characterized degree, time and cost limitations. The framework applies just to the administration of programming activities and is an apparatus that encourages basic leadership. Read More...
|
Computer Engineering |
India |
1907-1910 |
499 |
A Secure Image Steganography Technique using DCT, Jsteg and Bayesian Classification
-Rajesh Samata ; Nilesh Parghi
Security of data is challenging issue and transmitting the secured data. Data is hidden is one of the techniques to the hide of the data in a secured way called Stegnography. In this paper we proposed secret image is hidden behind the cover image using Discrete Cosine Transform (DCT) and JSteg algorithm. In this algorithm all of the DCT coefficients are manipulated sequentially to hide secret image. Read More...
|
Computer Engineering |
India |
1911-1914 |
500 |
Protection of VMware Virtual Machines using Microsoft Azure Site Recovery
-Vasudha N ; Ramakrishna KT
With the rapid growth of cloud computing paradigm, disaster recovery using cloud resources has become an attractive approach. Data Protection is on the priority in every IT industry in case of disaster, which was not proved efficient with previous methods of backup and replication. Azure Site Recovery (ASR) brings a very apt implementation helpful during the recovery of Disaster. In this paper, we explain the implementation of Azure Site Recovery in Enhanced mode. The approach is suited for protection of on-premises Virtual machines. It gives a solution on how LOB can be maintained, without any downtime with 99.9% surety. Read More...
|
Computer Science and Information Technology |
India |
1915-1918 |