No. |
Title and Author |
Area |
Country |
Page |
501 |
Comparison of CFD Analysis of Heat Transfer Augmentation & Surface Heat Transfer Co-efficient of I. C. Engine Fins at Different wind Velocities with Experimental Investigation
-Swati Saini ; Kagdi Dhruvin Nileshkumar
Designing an I C Engine has a great emphasis on Heat Dissipation. The more heat dissipation causes more efficiency of the engine. Insufficient dissipation of heat causes high thermal stresses, which is responsible for lesser efficiency of an I C Engine, too. Modern vehicles could have such technological research due to better cooling systems of an engine. The conventional radiators were made of networks of round brass or copper tubes through which water was kept flawing. But in air cooled system, the main focus is on design of fin of cylinder head to get heat dissipated. I C Engine fins provide more surface area to the heat generated to get it dissipated in lesser time. Furthermore, fins allow the wind to flow over them and to het the heat away from the engine along with the flow of air. But, such cooling systems are not yet effective as the water cooled systems. So, more emphasis is given in this work to study the previous updated cooling systems which includes, changing the block of cylinder for various fin geometry and climate conditions. In this research work focus is given to compare the heat transfer co – efficient at different velocities analysed in CFD with Experimental investigated data. Read More...
|
Mechanical Engineering |
India |
1919-1929 |
502 |
Data Partitioning and Machine Learning Techniques for Lake Level Forecasting: A Survey
-Manali Shukla ; Megha Seth
Lakes are lively system those are insightful to confined climate and to land-use amendment in the neighboring site. Several lakes obtain their water primarily from rainfall, some are conquered by drainage overspill, and several others are illicit by land water systems. As time grows, the areal amount and profundity of water in lakes are indication of effect in climatic factors some of them are rainfall, emission, temperature, and airstream speed. Fluctuations of lake level diverge with the water equilibrium of the lake and their catchment, and might be, in assured cases, reflect changes in shallow groundwater resources. Prevalent surface fresh water system on the globe. The seasonal, monthly and yearly surface water level of the lakes alters in retort to an assortment of factors. In this paper we have discussed some bottleneck of k-means clustering technique and discussed prediction model for lake level forecasting. Read More...
|
Computer Science and Engineering |
India |
1930-1934 |
503 |
DCT- SLM Technique for Peak-To-Average Power Ratio Reduction in OFCDM System
-Chaitali Aher ; Prof. P.R.Lakhe; Mr. S .S. Kemekar
DCT-SLM technique has been introduced with orthogonal frequency coded division multiplexing (OFCDM) for reduction of peak to average power ratio. OFCDM is a promising multicarrier technique used in wireless transmission with high data rate and high bandwidth efficiency but it also has some issues like frequency-offset and PAPR (peak-to-average power ratio). High peak-to-average power ratio (PAPR) of the transmitted signal originates from the superposition of many independent subcarriers. In this paper, a DCT based selective mapping technique is proposed to reduce the PAPR of the transmitted signal. This method combines Discrete Cosine Transform (DCT) with Selective Level Mapping (SLM). Simulation result shows that System using DCT SLM technique is having better reduction performance than the original OFCDM system. PAPR reduction results in reduction of ICI and ISI drastically. Read More...
|
Electronics & Communication Engineering |
India |
1935-1939 |
504 |
Flexural Behaviour of Reinforced Concrete Beams with Ferro cement Lost Forms
-B.Chandralekha ; M.Surendar
The Flexural behavior of reinforced concrete beams with Ferrocement lost forms was experimentally investigated. The test includes six Ferrocement beams and two control beams of M30 grade is used to compare the strength with ferrocement beams. The purpose of study is to observe the performance of the tested beams, modes of failures and so on. Mid span deflection, crack width, crack propagation and crack spacing were measured during the course of test. The Flexural strength properties of these Ferrocement beams are evaluated and compared under the four point Static and Cyclic loading systems. The results shows that the Ferrocement beam can obviously increase the load bearing capacity when compare to the control beam. This performance shows that the Ferrocement lost forms is efficient method in corrosion resistance, weather proofing and esthetic characteristics. Read More...
|
Civil Engineering |
India |
1940-1942 |
505 |
Flexural Behaviour of Reinforced Concrete Beams with Different Mineral Admixtures as Cement Replacements
-PRASANTHI P ; PRABHA G; NEELAMEGAM M
Pozzolonas are supplementary cementitious materials (SCMs) which are finely ground solid materials that are naturally occurring, manufactured or man-made wastes that can be replaced for a portion of cement in the production process of concrete. In this paper, 5 different concrete mixes of M30 grade are prepared using silica fume, rice husk ash, copper slag and metakaolin which are industrial by-products that are to be used as mineral admixtures as a partial replacement of cement and a control mix. In this thesis, an attempt has been made to determine the flexural strength. The flexural strength properties of the reinforced beams are evaluated and compared under the four point static loading system to that of M30 grade reference mix specimens. The results show that when these mineral admixtures are replaced for cement increases the mechanical properties of the concrete as a result of increased load bearing capacity. Read More...
|
Structural Engineering |
India |
1943-1946 |
506 |
Pump Dry Run Prevention System
-Kshitij Pandey ; Gupta Deepak Dinesh; Monil H. Shah; Prateek Sharma
The dry running of centrifugal pump is an ever growing problem in today's life; it is not only a problem that is faced in rural areas but also in urban areas as well. The pipelines which discharge water, most of the time do not discharge the water continuously thus having large volume of air pockets in them which causes the centrifugal pump to dry run. This dry running causes severe thermal rise which may cause failure of parts, leading to high maintenance of centrifugal pump. In order to avoid this, a device was made which runs on a piston cylinder arrangement and works on the principle of detecting pressure difference in the cylinder. Read More...
|
DESIGN |
India |
1947-1951 |
507 |
Review of Rushing Attack in Manets
-Swapandeep Kaur Chahal ; Dinesh Kumar
Mobile Ad Hoc Network is a collection of multihop wireless mobile node that communicates with each other without centralized control. Each node in MANETs act as both router as well as host. Security is the most challengeable task in MANETs. MANET is vulnerable to various kinds of network attacks such as black hole attack, grey hole attack, worm hole attack, rushing attack, Sybil, flooding attack, link spoofing, packet dropping attack, location disclosure etc. On-demand routing protocols in ad hoc networks were not originally designed to deal with security threats ,so as to malicious users have been searching ways to attack networks. Rushing attacks represent one of such possibilities. In these attacks, malicious nodes forward the Route Request (RREQ) packets, asking for a route, to the destination node faster than the legitimate nodes do. This is possible because the legitimate nodes only forward the first received RREQ packet for a given route discovery. Moreover, the attackers can tamper with either the medium access control or routing protocols to get quicker processing. As a result, the path through the malicious nodes is chosen, which renders throughput degradation. Read More...
|
Computer Science and Engineering |
India |
1952-1954 |
508 |
Pushover Analysis and Capacity Design for Hollow Pre Engineered Building for Sub Station
-GOKUL RAM K V ; J S PRINCES THANGAM; K MARIMUTHU; S NARAYANAN
Pre-Engineered Building (PEB) concept originated during 1960’s in United States. They are a pre-determined assembly of structural members, uses tapered built up sections for frames and cold formed sections for purlins and girts, which gives a huge reduction in the tonnage of steel, therefore, resulting in a lighter and more economical construction. This project is focused on the Pushover analysis and Capacity design of a Pre-engineered steel Substation building using Hollow section for frames and Secondary members, with provision for supporting a crane of 6 Ton and 12.5 Ton capacity. This project is completely done referring to Indian Standard Codes. The project comprises of a Substation building of size 48 m span x 61 m length x 14 m eave height. Roof slope angle of 6° and metal sheeting on roof and walls is taken for the project work. I section and Hollow Rectangular Section (HRS) is used for main frame members and Z sections for roof purlins and wall girts. The building is analysed and designed by considering various loads such as Dead load, live load, wind load, seismic load and crane load as per IS 875 : 1957, IS 1893 : 2002 and the other guidelines for the crane loads. Analysis is done using STAAD-Pro software. Pushover Analysis is done using SAP 2000 V17 software. A comparative study is made between Tapered I section PEB and Hollow section PEB and Hollow section PEB is found to provide better results than Tapered I section PEB without compromising on its structural adequacy. Read More...
|
Structural Engineering |
India |
1955-1959 |
509 |
New Separation Axioms of Some Weakly-R0 Type Spaces
-V V S Ramachandram ; B Sankara Rao
In this paper we introduced and studied some new separation axioms of Weakly-R0 type spaces. We also discussed relationships among these separation properties with counter examples wherever necessary. Read More...
|
MATHEMATICS |
India |
1960-1962 |
510 |
Study of Video Streaming in WiMax using Real Time Routing Protocols
-Neeta Moolani ; Minakshi Halder
WiMax (IEEE 802.16) belongs to family of wireless communication for broadband wireless access (BWA) network with advancement in technology. People uses wireless network instead of wire line. Real time applications such as online video playing, video downloading, watching movie and listening songs etc. video streaming is one of the main problem in real time applications because data are sent from pre-coded files which transmit in a part this problem is known as NP-Complete. Routing protocols play an important role in communication between nodes. Hence some real time routing protocols are used such as PUMA, RTSP, RTP have been considering in this paper. A comparative analysis of this routing protocol has been presented in this paper for supporting video streaming applications. Read More...
|
Electronics & Communication Engineering |
India |
1963-1967 |
511 |
Graphics Based Authentication for Secured Database Using Edge-LSB Technology
-Vishal N. Sharma ; Prasad R. Ogale; Aditya R. Shewale; Akshay B. Tanpure; Mrs.Aasha Pawar
At present, there many security mechanism available for the data security purpose. One of them is most commonly used characters, numbers, special symbols etc and password for the authentication purpose. If the password is difficult to guess then it is also difficult to remember. To overcome this method new strategy is developed as picture as password which is also referred to as graphical authentication. This security aspect can be conquered with the help of the security aspects like cryptography, steganography and Edge-LSB Technology. Currently, the security paradigm is moving from one layer security to two layer security paradigm. Where first layer is cryptography and second layer is steganography, which hides the data. So, we provide the new technique to hide the data in the images with help of Edge LSB algorithm. Edge-LSB hides the data in the edge pixel of the image which prevents hacking of the data. Read More...
|
Computer Engineering |
India |
1968-1970 |
512 |
A Review on Live Migration Impact on Virtual Datacenter Performance
-POOJA D. WALUNJ ; Prof. S.K.Sonkar
Cloud computing is the recent technology in computer environment which is provides service such as infrastructure, platform and application on the demand of user. Infrastructure resources virtualization is the mainstay of cloud computing to getting on demand services, scalability and resource pooling as the main characteristics of cloud computing. One of the main features of the live migration is datacenters virtualization. In the virtual machines hosts load balance, power saving, failure recoveries as well as dynamic resource allocation are all dependent on having live migration. The important factor of live migrations is to predict impact on the performance of the datacenter and their need to take the migration decision at the optimum times. In VMware environment there is impact of live migration on the datacenter resources network and power consumption. The overhead modeling can be used to estimate the live migration impact on the datacenter resources utilization given the VM’s and characteristics of the network. Based on the estimation the network administrator can be alerted with the approximation overhead to confirm the live migration request or to postpone it to another optimum time for minimal interruption where application is running. Read More...
|
Computer Science and Engineering |
India |
1971-1973 |
513 |
Experimental Validation for Heat Transfer Enhancement by Using Square Cut Circular Ring Insert
-Nikhil Purushottam Talwekar ; Dr.P.A.Deshmukh; Sayali Bhandurge
An experimental investigation is carried for heat transfer enhancement with the help of Square cut circular ring insert for heat exchanger application. Experimental investigation is for measuring tube side heat transfer co-efficient, friction factor, thermal performance factor of air for turbulent flow in a circular tube fitted with square cut circular ring insert. An experimental setup consist of Blower, flow control valve to maintain measured quantity of flow, Orifice meter is used for flow measurement, Pressure drop is measure along test section and orifice meter with 2 U-tube manometer. A stainless steel tube of (SS304) material having 34mm of inner diameter & 38mm outer diameter & 1000mm test length is used. A mild steel of 0.5mm thickness square cut circular ring insert with 3 different cut area & 3 different pitch inserted into the smooth tube. The square cut circular ring have: (1). 8.5mm depth & 10mm width. (40% area remove) (2).6.5mm depth & 10mm width(30% area remove) (3).3.5mm depth & 10mm width (16% area remove) In each case (1). 6 insert with distance between insert is16cm. (2) 5 insert with distance between insert is 20cm. (3). 4 insert with distance between insert is 27cm.A uniform heat flux condition is created by Band type nichrome wire heater (9 heater 70w each at length of 100mm each) around the test section & asbestos insulation of 3mm thickness over the band type heater. Outer surface temperature of tube is measured at 8 different points of test section by K-type thermocouple. 2 Thermocouple is used for calculating heat loss to surrounding. Another 2 thermocouple is used for measuring the bulk temp (inlet & outlet temperature of air). The Reynolds number is varied in the range of 4000 to 16000 with constant heat flux supplied by heater is 1.25 kw/m2 for smooth tube & tube with insert. Nusselt number obtained from smooth is compared with Dittus- Boelter correlation & errors are found to be in the range of ±7.0758 % .Friction factor is compared with Blasius corelation.Experimental setup is validate with the help of Dittus-Boelter equation and Blasius co-relation. At comparable Reynolds number, Nusselt number in the tube with square cut circular ring insert is enhanced by 2.3 to 2.9 times at cost of increase of friction factor by compared to smooth tube & also at cost of increase of pressure drop as compared to that of smooth tube. Thermal performance factor are found to be higher than unity up to 14000 Reynolds number and also heat transfer enhancement is increases with increased of Reynolds number. Read More...
|
Heat Power Engineering |
India |
1974-1980 |
514 |
Identification of Prominent Trickery for Mobile Applications
-G.DIVYA ; C.VINOTH; R.SRINIVASAN
Positioning extortion in the versatile App business suggests false or dubious activities which have an inspiration driving, thumping up the Apps in the popularity list. Certainly, it ends up being more ceaseless for App planners to use shady means, for instance, growing their Apps' business or posting fraud App assessments, to present situating distortion. While the noteworthiness of abstaining from ranking misrepresentation has been by and large seen, there is obliged appreciation and examination here. This paper gives an all-encompassing point of view of situating distortion and proposes a Ranking misrepresentation distinguishing proof system for portable Apps. Specifically, it is proposed to decisively discover the Mining to stance coercion the dynamic periods, to be particular driving sessions, of compact Apps. Such driving sessions can be used for distinguishing the area irregularity as opposed to an overall variation from the norm of App rankings. Additionally, three sorts of verification s are investigated, i.e., situating based affirmations, demonstrating in order to rate based confirmations and review based evidences, Apps' situating, rating and review rehearses through real hypotheses tests. Additionally, a streamlining based aggregation procedure is investigated to consolidate each one of the affirmations for deception revelation. Finally, appraisal of the proposed system is finished with certifiable App data accumulated from the App Store for a long time period. In the examinations, this paper acknowledges the ampleness of the proposed structure, and shows the recognizable proof's flexibility estimation furthermore some consistency of situating distortion works out. Read More...
|
Computer Science and Information Technology |
India |
1981-1983 |
515 |
A Review on Security Issues In Cloud Computing
-Sonam ; Kamal Kumar Ranga
Cloud computing is an innovative Information System (IS) architecture, a way to increase the capability without investing in new technology. It extends Information Technology’s (IT) existing capabilities. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. Cloud computing security is one of the main challenges in cloud computing. An organization can decide to adopt cloud only on based on benefits to risk ratio. This paper is focused on the security issues of cloud computing. Before analyzing the security issues, the definition of cloud computing and brief discussion to under cloud computing is presented. Read More...
|
Computer Science and Engineering |
India |
1984-1988 |
516 |
Energy Efficient Scheduling Techniques for Wireless Sensor Networks
-Ramandeep Kaur ; raman deep kaur; Ruchi Aggarwal; Anupam Mittal
This paper describes the concept of packet scheduling in wireless sensor networks. Packet scheduling enhances the performance of wireless sensors for delivery of messages. Packet scheduling techniques in wireless sensor networks for end to end delay accordance to time limit. End to end delay depends on length of data and it describes the Quality of service in wireless sensor networks. Packet scheduling is based on decision making for selecting which packet is to be sent and drop. Dropping of packet depends on priority of packets. Packet scheduling is needed to improve the performance of network bandwidth, delivery time, and network lifetime and energy consumption. In this paper describes the various packet scheduling algorithms. Read More...
|
Computer Science and Engineering |
India |
1989-1992 |
517 |
A Survey on Connected Target Coverage Algorithms in WSN
-Sapinder Kaur ; Anupam Mittal ; Ruchi Aggarwal
A Wireless Sensor Network is collection of small sensor nodes which are interconnected by Wireless Communication Channels. Coverage and network connectivity is critical issue in wireless sensor network. Many authors have been proposed connected target coverage algorithms to reduce energy consumption and increase network life time. This paper provides review of energy efficiency connectivity target coverage algorithms used in wireless sensor network. Read More...
|
Computer Science and Engineering |
India |
1993-1996 |
518 |
A Review On Different Approaches of Selective Image Encryption for Compressed and Uncompressed Images
-Anshu Devangan ; Omprakash Dewangan
Due to rich growth of multimedia application it becomes essential to secure and compress the multimedia data. Digital distribution network is a medium used to transfer the multimedia data. It is obvious to provide security against these multimedia data for unauthorized access or use. This is achieved by applying encryption. The encryption is a mathematical process which converts an original message into unintelligible message. There are a lot of encryption rules which can be applied to secure the simplest form of multimedia data (text data) and not suitable for images and videos having large files size. Selective encryption is a modern technique to lessen the computational requirements for large amount of multimedia data in distribution networks with diverse client device capabilities. In this paper, we have studied about principle and working of Selective Image Encryption. Read More...
|
Computer Science and Engineering |
India |
1997-2000 |
519 |
Review on Detection and Prevention of Black Hole and Gray Hole Attack in MANETs
-Ravinder Kaur Gill ; Simardeep Kaur
A Mobile Ad hoc network is wireless network composed of different nodes communicate with each other through multiple hops without having to create a fixed infrastructure. Mobile ad-hoc networks are more vulnerable to attacks due to the lack of trusted centralized authority, dynamic topology, resource limitation and multi-hop scenario. Black hole attack also known as selfish node attack which is dangerous active attack on the mobile Ad hoc Networks (manets). A Black hole is a malevolent node that proclaims to have shortest optimal path to desired destination node, which is fake shortest path and the packets received by the black hole node are dropped without having it to forward to destination node. In this paper various techniques regarding detection and prevention of black hole attack has been discussed. Read More...
|
Computer Science and Engineering |
India |
2001-2004 |
520 |
Image Forgery Detection
-Omkar Tadge ; Neeraj Chindhade; Akanksha Borse
With a specific end goal to isolate the duplicating source district from the sticking target region, the picture ought to be sectioned into little fixes, each of which is semantically autonomous to the others. This employment is best done by an expert with much ordeal of computerized crime scene investigation. In our execution, in any case, we only consider the programmed approach additionally actualize the master interfering method work. In this anticipate, we propose a plan to identify the duplicate move imitation in a picture, principally by extracting the key focuses for correlation. The main difference to the customary techniques is that the proposed plan first segments the test picture into semantically free fixes preceding key point extraction. As an outcome, the duplicate move locales can be identified by matching between these patches. The coordinating procedure comprises of two stages. In the main stage, we locate the suspicious sets of patches that may contain duplicate move imitation districts, and we generally gauge an affine transform matrix. In the second stage, an Expectation-Maximization-based algorithm is intended to refine the evaluated grid and to affirm the existence of duplicate move fraud. Exploratory results demonstrate the good performance of the proposed plan by means of contrasting it and the state-of-the-workmanship plans on people in general databases. Read More...
|
Computer Engineering |
India |
2005-2007 |
521 |
Design of Rotary Intersection As an Alternative to Four Arm Signalized Intersection of Urban Area
-Parth Pande ; Parth Pande; Srinath Karli
This paper evaluates issues connected with vehicular movement moving through various urban road systems. As a consequence of the constant increment of activity in focal urban regions, movement lines and defers are knowledgeable about the region of crossing points. Fast incremental improvement, increase in urban range and development in vehicular movement has come about into issues of clog, contamination and over usage of accessible limit coming about into increase in travel time and diminishment of limit because of expanding clashes made by expanded stream of activity. Subsequently, need of this study is feel to perform similar investigation of the stream under circumstance where the clashing circumstance can be minimized. Study reveals that such minimization of conflicts and segregation of traffic is possible by proper channelization. Present signalized intersection is evaluated by traffic analysis and suitable design parameters of rotary intersection are developed to give safer, high capacity and more reliable movement at intersection. Read More...
|
Civil Engineering |
India |
2008-2011 |
522 |
Practical Applications of Sixth Sense Technology in Supermarkets - Possibilities & Challenges
-Rajal Kundhadia ; Surabhi Bobade; Pooja Raundale
When we come across any new object we try to analyze it using our ability of the five senses and try to interact with that object. But to get the in-depth information of that object, we should also access other sources of information like the internet or ask the relevant person for information. This can be a time consuming process. Instead, we can make use of the SIXTH SENSE TECHNOLOGY, to immediately trace out complete information about the object as soon as we see it. In this paper, we tried to design some practical applications of the sixth sense technology for smart super markets. We have also presented the background work for sixth sense technology along with its different applications. Read More...
|
Master of Computer Application |
India |
2012-2015 |
523 |
Cyber Crime - A Threat to Modern Society
-Meenu Singh ; Garima Singh; Prof. Vivek Anand
The world has undergone a major change now a day in the manner in which it is conducted and with the change in nature the risk of crime or fraud has also undergone a change. The facilities of computer technology which makes life so easy and fast come with certain drawbacks. This powerful and user-friendly computer makes more and more people to use them and rely on them as part of their normal way of life. Therefore, in the current study understanding of cyber crime and their impacts over various areas like economic, business, teenager etc. with the future trends of cyber crimes are explained. Read More...
|
Master of Computer Application |
India |
2016-2017 |
524 |
Flexural Behaviour of Sifcon Fibres in Reinforced Concrete Beams
-Varun Kumar M ; M Surendar
SIFCON is a relatively new material and can be considered as special type of fiber reinforced concrete. A SIFCON is a new method to increase the strength of concrete. It is incorporated by using some amount of steel fiber in mould to form very dense network of fiber. A network is then infiltrated with cement based slurry or mortar. In this study, the flexural properties of sifcon members are evaluated and they are compared with conventional concrete of grade M30. This paper deals with the study of sifcon placed at various depth levels such as 15mm, 20mm, 25mm, in a reinforced concrete beam. The beams were tested for static and cyclic loading. The deflections and strain readings are recorded. Read More...
|
Structural Engineering |
India |
2018-2020 |
525 |
Analytical Design for Heliostats System and Review of Its Working for A 30 Kw CL-CSP System at RGPV Bhopal
-Mr. Ravi Kumar Tiwari ; Mr. Ravi Kumar Tiwari; Dr. Mukesh Pandey; Mr. Anurag Gour
A solar technology is proving to be a clean source of energy. For making it more effective, there is a need for innovation in this sector. An innovative, cross-linear concentrated solar plant for heating and refrigeration system has been designed and implemented behind the boy’s hostel building at UIT RGPV Bhopal. The CL-CSP system is formed by sixty heliostats, rectangular collectors is mounted on a base pillar structure with vertical axis, allowing solar tracking in the Sun azimuthally plane, with the aim of maximizing radiation over the tilted surface of rectangular board that have mirror facets over it . These sixty heliostat’s control and instrumentation has been done so that mirror board could fully concentrate on four receiver line placed above the heliostats. The aim of this paper work is to design a low cost, low Weight and much superior heliostats and its foundation that could make system efficient and also fulfilled the range of temperature for our CL-CSP system at RGTU Bhopal. Read More...
|
Renewable Energy |
India |
2021-2027 |
526 |
Digest Authentication Method for Privacy Preserving In Anonymized Dataset
-Vineetha Varghese ; Santhamani
Data disclosure is more advantageous in an organization for achieving the privacy and security. The data can be micro data contain information about person, a business, or an organization. Statistics from security firms, research institutions and government organizations show that the number of data-leak instances has grown rapidly in recent years. Among various data-leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and to provide alerts for organizations. A common approach is to screen content in storage and transmission for exposed sensitive information in such a case a detection operation usually requires to be conducted in secrecy which becomes challenging to satisfy in practice, as detection servers may be compromised or outsourced. In this paper, we present a privacy preserving data-leak detection (DLD) solution to solve the issue where a special set of sensitive data digests is used in detection. The advantage of our method is that it enables the data owner to safely delegate the detection operation to a semi-honest provider without revealing the sensitive data to the provider. The proposed system is developed to provide the security for Personal Health Records. The data is anonymized and maintained by the administrator and the records are secured from the providers by hiding the sensitive data. Using our techniques, an Internet service provider (ISP) can perform detection on its customers’ traffic securely and provide data-leak detection as an add-on service for its customers. In another scenario, individuals can mark their own sensitive data and ask the administrator of their local network to detect data leaks for them. Read More...
|
Computer Science and Engineering |
India |
2028-2031 |
527 |
Virtualisation of Server Management based on Cloud Computing
-Anjani Nandan ; Geetha V
VMware server virtualization conveys a critical rate of profitableness for those organizations that grasp it. Organizations are profiting from virtualization capacities including: simplicity of administration, adjusted utilization of equipment assets, enhanced security, dependability and productive clear arrangements. Also, the VMware® vCenter Server™ gives a unified stage to dealing with your VMware vSphere® things, empowering clients to computerize and convey a virtual foundation with certainty, The Nytro vCenter module extends the current vSphere web customer interface to unite access to the Nytro streak vivifying specialist‟s cards. Graphical User Interface (GUI) pictures and a single tick controller synopsis point of view (as the default window) give essential controller data, for example, controller properties, drive and virtual drive properties and prosperity data. Exhibited status finds in like way solidify crucial traits of the controller, for case, the controller warm I/O status, and usable purpose of restriction, true blue section size, firmware structure and BIOS variety. An unfaltering perspective demonstrates the order of authority of the Nytro cards, limit, virtual drives, drive gathers that make up the virtual drives, RAID levels, the read/structure and the I/O arrangement on every individual virtual drive. The physical perspective shows a rundown of open physical drives, drive prosperity, limit, life left premonition and temperature examining. Read More...
|
Computer Science and Engineering |
India |
2032-2034 |
528 |
Characterization Technique of Nanofibers
-Latika Susheel Chaudhary ; Prerana Ravindra Ghatmale; Dr. S. S.Chavan; Dr. R. N. Patil
Nanofibers because of its unique properties it is used in various field and application. There are many different methods to produce these nanofibers, out of all them Electrospinning is the most promising technique to produce continuous nanofibers. It becomes an essential part to analyze the diameter, thickness as well as strength of these nanofiber to understand the different mechanical, chemical, optical properties of these as-spun nanofiber. This paper concentrates on explaining some of the main technique used to analyze and characterize the nanofibers along with the reported example. Read More...
|
Nanomaterial characterization |
India |
2035-2041 |
529 |
Adoption to Cloud Computing : Security Threats and Challenges
-Darshan B. Patel
In this Emerging era of computing technology, cloud computing defines an efficient and flexible way to abstract computing and use on the remote third party infrastructure. This becomes efficient for companies to begin from small resources and gradually increase the resources as the service demand rises. But there are many challenges in adopting cloud computing. One of the main issue is the security aspect related to the data and penetration in the cloud by impersonating a legitimate user, thus affecting the cloud data and services. This Paper is to provide a better understanding of the challenges in security while adopting cloud computing technology and identify the approaches and solutions which has been proposed by cloud service industry. Read More...
|
Computer Science and Engineering |
India |
2042-2046 |
530 |
Energy & Exergy Analysis of Turbines of Thermal Power Plant
-Manoj Kumar Attri ; Dhairya Naryan; Vikas Gangwar; Rahul Singh
Exergy is that the tool, that indicates however suggests that the system departs from equilibrium state. Most of the power plants are designed by the energetic performance criteria supported first law of natural science entirely. The real useful energy loss cannot be even by the first law of natural science, because it cannot differentiate between the quality and quantity of energy. The present study deals with the energy analysis of the power plants. The increasing demand of power has made the power plants of scientific interest, but most of the power plants ar designed by the energetic performance criteria supported first law of natural science entirely. The real useful energy loss cannot be even by the hand law of natural science, because it cannot differentiate between the quality and quantity of energy. Energy analysis presents only quantities results whereas exergy analysis presents qualitative results relating to actual energy consumption. Also presents major losses of out there energy at combustor, superheater, economiser and air-pre heater section. In this article also shown energy efficiency and energy losses comparison charts. This Associate in Nursingalysis provides an completely different prepare to guarantee superior performance of an influence plant. Read More...
|
THERMAL ENGINEERING |
India |
2047-2052 |
531 |
Advanced E-Payment System
-Rudrappa Gujanatti ; Mahesh Mane; Gururaj Patil; Mohan Madiwalar; Jyoti Shet
Nowadays, a lot of customers choose online shopping to buy the products because of its convenient nature. All type of products is available right at the tip of finger of the Consumer with no need to go to shopping centers. Consumer can get any product they want delivered directly to their doorstep just with few keystrokes and clicks. But if this is to happen then the payment processing system should be more reliable. Sometimes consumer may fail to do online payment or E-payment due to having insufficient balance in his/her bank account. So In order to make the online payment processing system more efficient for the consumer we have come up with an idea as explained in this paper further in which we use multiple cards at the same time to pay the total amount and complete payment process successfully. Read More...
|
Electronics & Communication Engineering |
India |
2053-2056 |
532 |
Design of Binary and BCD Adders Using Reversible-Logic Gates
-Vinayak Havannavar ; Mr. P.M. Kadi
Reversible logic is emerging as one, low cost substitution for the existing methods with respect to its speed, less power consumption and area. Adder design is a very fundamental and important part of any processor and optimal design of such adders gives efficient output in the form of better working processors. We are proposing a better Binary and BCD adders. The designs of these adders are cored to optimize total cost, delay in processing and area occupied. A modification we are proposing in BCD adder stages to remove the redundant part present in the circuit allowing the design to work more efficiently. We would explore the utilization of negative control lines for detection in overflow logic of BCD adder which significantly cuts off total cost, time delay and counts of individual gates, outcome of such utilization is high speed BCD adder with optimum area. This results in vast possibilities in the field of reversible computing. Read More...
|
other |
India |
2057-2060 |
533 |
An Attempt to Improve Aluminum Properties with Carbon Nanotubes
-V. N. Dudhate ; M.S. Harne
Aluminum cannot be used in its pure form due to its lack of strength. The improvement in aluminum properties or base material with addition of some reinforcement material like Carbon Nanotubes. In this if this two material are get homogenous mixture then properties of composite get improved. In current paper an attempt was made to composite by powder metallurgy route. There is improvement in Microhardess of composite material. Read More...
|
Nanomaterial characterization |
India |
2061-2062 |
534 |
Storm Water Conservation by Charcoal Membrane Filtration Technology
-Anal Shah ; Surpal Solanki; Solanki Jigar; Parmar Purvesh; J. H. Khatri
In today's world, water is primary need of every people. This water is found from the rain. Average annual rainfall in India is 1.2m and by which 1700m3 per capita availability of water. By conserving only 50% of this rainfall water and providing up to half day water necessary of people of the city/village, Who are not able to get water--by conserving this water--they can get water and use this water for their daily use, agriculture purpose etc. More rainfall water will collect by change in drainage system and lead it to storage area of storm water plant and then clean it. Read More...
|
Civil Engineering |
India |
2063-2065 |
535 |
Information Retrieval from A Large Database using Query Co-Processing on a Graphics Processing Unit
-Tushar Prabodhankar ; Shivam Singh
Now a day for the retrieving the data from large number of databases is complicated with respect to the time and other measures since we are introduced to new technology such as Big Data where the capacity of storing the information is much higher as compared to other databases. So the retrieval of a particular information is much more complex and time consuming with the help of the traditional processors. The idea behind query processing for the informational retrieval from the huge databases using a Graphics Processing Unit that works on CPU and GPU for in-memory query co-processing. As per the recent research shown they can accelerate more operations with respect to a database, the GPU is capable of performing the tasks with respect to the databases with the help of the derived algorithm such as Sort, Min_Max Join, and CSSTree etc. Thus we propose to implement information retrieval from a large database using query processing on graphics processing unit. Read More...
|
Information Technology |
United States |
2066-2068 |
536 |
Chess Clock Automization
-Mahesh Adaki
A game clock consists of two adjacent clocks and buttons to stop one clock while starting the other, such that the two component clocks never run simultaneously. Game clocks are used in two-player games where the players move in turn. The purpose is to keep track of the total time each player takes for his or her own moves, and ensure that neither player overly delays the game. The Existing International Chess game consists of manual timers, in which a player has to operate the timer manually. That is there are two manual timers operated by an each player. This leads to time consuming and an effort making game. If a particular player has low reflexes he finds difficult to operate a manual timers. Thus to overcome all these inabilities an Intelligent Chess Clock has been introduced. This Clock is an application oriented clock in which it not only tries to overcome the players deformity but also tries to make a system an automotive one. This is the major reason for introducing this system but rather than this we can indulge different other things. For an example to be explained we could mention ten different international modes. Read More...
|
Electronics & Communication Engineering |
India |
2069-2070 |
537 |
Atmospheric Air To Water Converter
-Jyotsana Bhardwaj ; Harshit Gupta; Kanika Sauguny; Shreya Sinha
An Atmospheric Air to Water Converter is a device that extracts water from humid ambient air. The water so obtained is purified through several filtration processes including reverse osmosis, infrared filters and alkaline water ionizer. The output is drinking water from atmospheric air. An atmospheric air to water converter works on the principle of air conditioner. When air is cooled below its dew point water vapor present in the air is condensed thus pressurizing the air. Cooling and desiccants are the two techniques involved in the entire process. The machine is designed to provide clean drinking water to those areas which are facing water scarcity problems or where the water transportation is impossible to obtain. The extraction of water from atmospheric air reduces this problem by making a device that will run via bicycle-gear arrangement or stand-alone renewable source of energy i.e. either solar or wind. Read More...
|
Electrical Engineering |
India |
2071-2073 |
538 |
Design of Intelligent Mobile Vehicle Checking System
-Swaroop Jain A M
ARM7 is used as the main processor, this intelligent mobile vehicle checking system integrates many hardware and software modules like image capturing, number plate recognition of the vehicle, GPS, GSM. The system software design uses the embedded software platform as keil. Making use of hardware/software co-design, this system implements the functions of image capturing, wireless transmission, GPS positioning, this system helps in traffic auditing department’s needs Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
2074-2076 |
539 |
Heart Disease Forcasting Using Datamining Method
-Dipika D. Prajapati ; Premal J. Patel
Data mining is used to find the unseen pattern in large volume of data that helps to manage organization efficiently. Main objective of data mining is lowering the cost of product life cycle during research and development. Hence data mining methods are used in different medical system to predict different disease. Main objective of the proposed research is to predict heart disease of patient correctly based on information of patient. In this study, for the classification of heart diseases dataset we use Euclidian distance to find relation between different attributes of database. The healthcare industry collects large amounts of healthcare information which cannot be mined to find unknown information for efficient evaluation. Discovery of buried patterns frequently goes unexploited. This study Identifies gaps in the research on heart disease diagnosis and treatment and proposes a model to systematically close those gaps to discover if applying data mining techniques to heart disease treatment data can provide as reliable performance as that achieved in diagnosing heart disease. Scope of the proposed work is it can be used in medical website, can be used to detect fraud claims for the heart disease. Read More...
|
Computer Engineering |
India |
2077-2080 |
540 |
Hybrid Two Wheel Drive Motorcycle with Range Extender
-Aniket Badgujaar ; Sumit Surve; Yadnesh Keny; Gaurang Kadam
A hybrid two wheel drive motorcycle with range extender is a vehicle which relies not only on batteries but also on an internal combustion engine which drives a alternator to provide the electricity and engine is only used to drive the alternator. Hybrid electric vehicles combine an electric motor, battery and power system and with an internal combustion engine to achieve charging capacity for battery due to which better fuel economy and reduce toxic emissions. In HEVTWD, the battery alone provides power for low-speed driving conditions where internal combustion engines are used for charging the battery. In accelerating, long highways, or hill climbing the electric motor provide enough power. This allows a smaller, more efficient engine to be used. Thus the vehicle is best suited for the growing urban areas with high traffic. Read More...
|
AUTOMOBILE ENGINEERING |
India |
2081-2082 |
541 |
Energy & Exergy Analysis of Pumps & Condensor of Thermal Power Plant
-Manoj Kumar Attri ; Dhairya Naryan; Rahul Singh; Vikas Gangwar; Dr. Bikas Prasad
Exergy is that the tool, that indicates however suggests that the system departs from equilibrium state. Most of the power plants are designed by the energetic performance criteria supported 1st law of scientific discipline entirely. The real useful energy loss cannot be even by the primary law of scientific discipline, because it will not differentiate between the standard and amount of energy. The present study deals with the energy analysis of the ability plants. The increasing demand of power has made the power plants of scientific interest, but most of the power plants ar designed by the energetic performance criteria supported 1st law of scientific discipline entirely. The real useful energy loss cannot be even by the hand law of scientific discipline, because it will not differentiate between the standard and amount of energy. Energy analysis presents only quantities results whereas exergy analysis presents qualitative results relating to actual energy consumption. Also presents major losses of out there energy at combustor, superheater, economiser and air-pre heater section. In this article also shown energy potency and energy losses comparison charts. This Associate in Nursingalysis provides associate fully totally different prepare to guarantee superior performance of an influence plant. Read More...
|
THERMAL ENGINEERING |
India |
2083-2087 |
542 |
Azure Cross Database Query and Comparison with LINQ
-Sanjay Phatige ; T. N. Sreenivasa
The cross database query in Azure SQL database helps significant improvements to elastic database queries. The elastic database query feature enables the user to run a Transact-SQL (T-SQL) query that spans multiple databases in Azure SQL Database. It allows the user to perform cross database queries to access remote tables, and to connect Microsoft and third party tools (Excel, PowerBI, Tableau, etc.) to query across data tiers with multiple databases. Using this feature, user can scale out queries to large data tiers in SQL Database and visualize the results in business intelligence (BI) reports [1]. The acronym LINQ is for Language Integrated Query. Microsoft’s query language is fully integrated and offers easy data access from in-memory objects, databases, XML documents and many more. It is through a set of extensions, LINQ ably integrate queries in C# and Visual Basic. LINQ allows writing queries even without the knowledge of query languages like SQL, XML etc. LINQ queries can be written for diverse data types [2]. In the present investigation, an attempt was made to (1) To enhance the performance of database queries arising from multiple data sources. (2) To analyze cross database queries in Azure using the elastic query techniques (3) Results of Azure Cross database queries were compared with LINQ with respect to performance considerations while dealing with multiple databases. Read More...
|
Computer Applications |
India |
2088-2090 |
543 |
Application of Hybrid RSM-NSGA-II for The Prediction of Pareto Optimal Solutions of Waste Cooking Sunflower Biodiesel Based Engine
-Sunil Dhingra
The biodiesel mix with diesel in certain amount is used to run the compression ignition engines. The biodiesel from waste oils are now common to run the diesel engines. The optimum combination of engine input parameters is the aim of present work. Hence hybrid RSM-NSGA-II technique is to be applied in order to predict pareto optimal solutions of asingle cylinder VCR test rig. It is observed from the confirmatory experiments that error between the actual and theoretical values lie within 5% which shows the authenticity of the predicted optimal solutions. Read More...
|
Mechanical Engineering |
India |
2091-2093 |
544 |
Ethanolysis of Mahua (Madhuca Indica) Oil Through Trans-Esterification Process
-Sunil Dhingra
Non-edible oils are best used for the production of biodiesel in India to run the compression ignition engines. The current work deals with mahua oil for the production of biodiesel. The quality of the produced biodiesel is also checked by measuring of physical and chemical properties. It has been found that various properties of mahua biodiesel are in desired range of ASTM standards of biodiesel. Read More...
|
Mechanical Engineering |
India |
2094-2095 |
545 |
Utilization of Polanga Oil for Biodiesel Production and Analysis of Physio-Chemical Properties
-Sunil Dhingra
The present work deals with the utilization of polanga oil for the production of biodiesel through trans-esterification. The physio-chemical properties are also predicted from the standard measuring instruments. It has been observed that all the properties of polanga biodiesel lie within the desirable range of ASTM standards. Read More...
|
Mechanical Engineering |
India |
2096-2097 |
546 |
Study of PEH Configurations & Circuitary and Techniques for Improving PEH Efficiency
-Ashwani Kumar ; Deepak Chhabra
The term "energy harvesting" refers to the generation of energy from sources such as ambient temperature, vibration or air flow. Converting the available energy from the environment allows a self-sufficient energy supply for small electric loads such as sensors or radio transmitters. Kinetic energy can be converted into electrical energy by means of the piezoelectric effect: Piezo elements convert the kinetic energy from vibrations or shocks into electrical energy. Using suitable electronics, this effect can be used for creating a self-sufficient energy supply system. This is of particular interest whenever a power supply via cable is not possible and the use of batteries and the associated maintenance expenditure are not desired. On that point are numerous agents on which amount of energy that can be gleaned from a vibrating system depends. The condition of the piezo - patch, position of the piezo - patch, magnitude of applied load, type of material used, model configuration, circuitry used etc. are some important elements that must be considered during energy harvesting. In this paper, we have reviewed the vibrational energy harvesting from different model configurations and also we have brushed up some papers in order to examine the various techniques through which efficiency of a piezoelectric energy harvester can be bettered. Read More...
|
Mechanical Engineering |
India |
2098-2102 |
547 |
Comparative Study of J48, ADTree, REPTree and BFTree Data Mining Algorithms through Colon Tumour Dataset
-Abhaya Kumar Samal ; Subhendu Kumar Pani; Jitendra Pramanik
The Weka workbench is a designed set of state-of-the-art machine learning techniques and data pre-processing tools. The primary way of relating with these methods is by calling up them from the command line. However, suitable interactive graphical user interfaces are provided for data exploration, for setting up large-scale test on distributed computing platforms. Classification is a significant data mining technique with major applications. It classifies data of different kinds. Decision Trees are a mixture of tree predictors such that every tree depends on the values of a random vector sampled independently and with the same distribution for all trees in the forest. This paper has been carried out to make a performance evaluation of J48, ADTree, REPTree and BFTree classification algorithm. For processing Weka API were used. The data set from the UCI Machine learning Repository is used in this experiment. Read More...
|
Computer Science and Engineering |
India |
2103-2105 |
548 |
A System for Efficient Retrieval of the Images from Large Datasets using Ripplet Transform and Edge Histogram Detector
-Mukunda D. Waghmare ; Manoj Yadav; Kailash Patidar
Content-Based Image Retrieval (CBIR) is image retrieval approach which allows the user to extract an image from a large database depending upon a user specific query. An efficient and effective image retrieval performance is achieved by choosing the best transform and classification techniques. Currently available transform techniques such as Fourier Transform, Cosine Transform, and Wavelet Transform suffer from discontinuities such as edges in images. To overcome this problem, a technique called Ripplet Transform (RT) has been implemented along with the neural network based classifier called multilayered perceptron (MLP) for finding an effective retrieval of image. Classification using multilayered perceptron (MLP) with the Manhattan Distance measure showed varying experimental results for dimensions of Images. The performance of various Transform is compared to find the of particular wavelet function for image retrieval. In proposed system, training and testing is provided on Wang image database. The results of retrieval of images are expressed in terms of Peak Signal to Noise Ratio (PSNR) values compared with various other proposed schemes to show the superiority of our proposed system. Classification using multilayered perceptron (MLP) with the Manhattan Distance measure showed varying experimental results for different sets of Images. Read More...
|
Computer Science and Engineering |
India |
2106-2109 |
549 |
Survey on Appling Ontology Knowledge Map Reduce Hadoop in Big data Frame work
-R.Sarath Kumar ; V.Ravindra Krishna Chandar
In this problem of aligning ontology’s and database schemas across different knowledge bases and databases is fundamental to knowledge management problems, including the problem of integrating the disparate knowledge sources that form the hadoop. Domain based research articles published is a laborious task which is usually done manually. Because of the enormous amount of journal articles published in various domains, mapping technique is the need of the hour. In this article, a fast ontology based approach map reduces Frame work system research articles to their domains using cloud on Big data. The goal of this paper is to present a number of order to offer research on more informed choices when they deciding upon a Map Reduce hadoop in Big data framework to Improve their performance evaluation. Read More...
|
Computer Science and Engineering |
India |
2110-2114 |
550 |
New Product Development approach for design and FEA analysis of Skid Plates - A Case study
-Jayaraju S H ; Dr. N.S. Narahari
Vehicle safety is an important factor during design and development of any automobile. There are several components which make an automobile and each component has its own functionality and importance. In the same way there are many accessories which are required to be used along with the vehicle. One such accessory is skid plate which is very much essential for off-road vehicles. In this paper, a NPD approach is used to develop a skid plate for safeguarding the propeller shaft. To design and develop skid plate, a survey has been carried out to know the necessity of skid plate. From concept generation and selection, 2 feasible concepts were selected for FEA and static structural analysis has been carried out for UDL of 1400lbf and then for various loading conditions. From comparison of results, a feasible concept is recommended for prototyping. Read More...
|
Mechanical Engineering |
India |
2115-2119 |