No. |
Title and Author |
Area |
Country |
Page |
1 |
PWM Based PMDC Motor Control
-Siddharth Panda
The goal of this work is to control the speed of PMDC motor using PWM technique. The speed control of PMDC motor is very essential in application where precision and protection is necessary. PWM is method that may be used as an efficient DC motor speed control. This paper shows that precise and accurate control of small DC motors can be done efficiently without using costly components and complicated circuit. Read More...
|
Electrical Engineering |
India |
1-5 |
2 |
Characterization of Leachate from Municipal Solid Waste (MSW) Landfilling Sites of Kalaburagi City, Karnataka
-Veerannagoud ; Dr. S R Mise
The paper discusses the characteristics of leachate generated from municipal solid waste landfilling sites of Udnoor village, Kalaburagi district (Karnataka). Leachate samples were collected and analysed for various physico-chemical parameters to estimate its pollution potential. This study aims to serve as a reference for the implementation of the most suitable technique for reducing the negative environmental effects of discharge leachate. the landfilling sites of Udnoor village are engineered low lying open dumps. They have bottom liner and leachate collection system. Therefore, it has been found that leachate contains high concentrations of organic and inorganic constituents beyond the permissible limits. While, heavy metals concentration was in trace amount as the waste is domestic in nature. The data presented in this study indicated that the age of the landfill has a significant effect on leachate composition. the biodegradable fraction of organic pollutants in the leachate decreases as an outcome of the anaerobic decomposition occurring in the landfill. Read More...
|
Environment Engineering |
India |
6-9 |
3 |
Analytical Simulation of Flow Distribution in a Waste Heat Boiler Duct using CFD
-Saviour Sampson ; Dr. M. C Navindgi
Vibrations are observed in the ducts when the flow enters through regenerative air duct and gas turbine duct and flows through the diverging part of the boiler ducts. Due to this vibration, the boiler ducts have failed in their operation and had developed cracks on wall and finally damaged the whole system. CFD analysis is a new technique with the help of which we can solve the practical examples in a numerical manner and with the help of which a lot of time, money and materials can be saved. Here in this project CFD analysis can be used to predict the flow behavior inside the ducts by the help of which a prediction can be made so as to optimize the design of the waste heat boiler duct for minimum vibration. After the analysis it is found that CFD has helped in optimizing the model in a way that the introduction of the guiding plates has helped in reducing the disturbance of the flow which in turn will reduce the vibration in the model. Different cases are tried and results and discussion are presented in this report. Totally four cases are tried which consists of a base case without the guide plates and three cases with guide plates are tried. In the second case two guide plates are introduced at the RA duct and results are observed. Two guide plates didn’t gave proper flow and hence in third case 4 guide plates in the RA duct were introduced, this option gave better results in the RA duct but the flow in the RA duct the flow was not yet proper. Finally in the fourth case along with four guide plates in the RA duct, two guide plates in the RA duct was made and results were observed. It was found that the fourth model gave best results compared to all cases and hence is an optimized model. Read More...
|
M-Tech(thermal power engineering) |
India |
10-14 |
4 |
Analysis of Solar PV Inverter based on PIC Microcontroller and Sinusoidal Pulse Width Modulation
-Shamin Pandit ; Maulik Sanghvi
This paper focuses on design and development of a solar PV inverter capable of delivering photovoltaic energy to load in efficient and cost effective manner so that common people can use it. The solar inverter in this paper is considered for a stand-alone solar PV system, for operation of single phase AC load at grid frequency and voltage. Interfacing the solar inverter with AC load involves three major tasks. One is providing regulated output of 230Vrms AC. Second is, it should provide output at 50Hz frequency. Third is, it should have sine wave output. The major challenges to be addressed are, boosting the DC voltage of Solar Module and converting it to regulated AC voltage. So this paper proposes a solution by dividing the whole Inverter system into two major stages: DC-DC Converter and DC-AC Inverter. In the DC-DC Converter stage, Half-Bridge Push-Pull topology is used which implements a high frequency transformer. In the DC-AC inverter stage, full bridge topology is used implementing SPWM switching technique using PIC controller. Based on this design, a hardware prototype of Solar PV Inverter is developed for 100VA. Read More...
|
Electronics & Communication Engineering |
India |
15-21 |
5 |
A Review Paper on Machine Learning Techniques and (Product) Reviews from Social Network Services
-Shreya M Dholaria ; Shreya M Dholaria; Sangani Vivekkumar D; Madhuri Thakar; Daxa V Vekariya
Sentiment analysis is developing area of research to extract the subjective information by applying Natural Language processing and Machine learning techniques. The ï¬eld of opinion mining also called as sentiment analysis. Social media helps in connecting themselves with social networking sites. E-Commerce business is developed rapidly and larger number of products is sold online. Products are now available on the Internet. The challenges area defines extract reviews from large number of reviews, because it is impossible to read all the reviews. Reviews can be given based on features of products. This paper presents the Machine learning techniques which including decision tree, Support vector Machine, naïve Bayes classifier, Maximum Entropy classifier and Evaluation formulas of opinion, Extract Product Rating reviews. Read More...
|
Computer Engineering |
India |
22-26 |
6 |
Design and Analysis of Tractor Trolley Axle
-Sunil Ravindra Patil ; Prof. P. D. Kulkarni
In India, Tractor trolley plays an important role in agriculture and construction field for the transportation. Many small industries are involved in the manufacturing of the Tractor trolley. Due to lack of the advance technologies, this product may not properly design. The tractor trolley is designed as per the requirement or by trial and error method of manufacturing. Many times it may be designed without considering the actual loading condition. There are some rules and regulations for the tractor trolley or trailer. The tractor trolley should be as per the Indian Standard specification IS 8213:2000. Many small industries not follow the Indian Standards Specifications Central Motor Vehicles Act, 1988 and safety standard (SS-15) of Automotive Research Association of India. Many road accidents and breakdown or failures occurs due to poor design of the tractor trolley, In present work analytical and finite element analysis approach is used to design the tractor trolley for safe working condition. Need to consider the stress concentration, weight and cost reduction of existing trolley axle. Both the factors are related to each other. In this project, we will do the design related work in CATIA V5 R24 and the analysis work in the ANSYS 15.0 Software. Static analysis i.e. analytical method required for this to compare the ANSYS results. From the comparison reports we will suggest the best possible solution for the Tractor Trolley. Read More...
|
AUTOMOBILE ENGINEERING |
India |
27-34 |
7 |
File Transfer Protocol Access and Management : A Review and Its Related Services
-Meena Rao
In this paper different aspects of File Transfer Access and Management (FTAM) using ISO 8571 for facilitating interconnection of computer systems. ISO 8571 defines a file service and specifies a file protocol available within the application layer of the Reference Model. It is concerned with identifiable bodies of information, which can be treated as files, and may be stored within open systems or passed between application processes. ISO 8571 basically defines a file service and provides support for file transfer and also gives a framework for file access and management. Here, file transfer access management, its allied services as well as establishment of reliable communication between different systems are discussed. Read More...
|
Electronics & Communication Engineering |
India |
35-36 |
8 |
Effect of Cutting Parameters on Surface Finish, Tool-Chip Interface Temperature and Machining Time in turning of OHNS O1 grade Hardened Tool Steel under Near Dry Machining Condition
-Shaikh Abdul Haseeb ; S.D. Ambekar
The importance of temperature prediction for the machining processes has been well recognized in the machining research due to its effects on tool wear and its constraints on the productivity. It is well observed that particularly the rate of wear is greatly dependent on the tool–chip interface temperature. Most of the heat generated during the machining flows into the tool causing severe thermal stresses on the cutting tool accelerates tool fatigue and failures due to fracture, wear or chipping. Furthermore, if the temperature exceeds the crystal binding limits, the tool rapidly wears due to accelerated loss of bindings between the crystals in the tool material. Heat has critical influence on machining; to some extent, it can increase tool wear and then reduce tool life due to thermal deformation. Near dry machining is the goal of today’s metal cutting industry that tirelessly endeavors to reduce machining costs and impact from chemicals in the environment. In Hard turning, high amount of heat is generated at the tool-chip interface which not only increase the tool wear but also deteriorates the job quality in terms of surface finish. This study deals with turning round bars of 25 mm diameter of Oil Hardening Non-Shrinking Die Steel (OHNS – AISI O1 grade) hardened to 53-57 HRC by TNMG 160404 MT TT5080 insert under Near Dry Machining (NDM) condition. For this purpose MQL set-up was manufactured and machining was carried out at three levels of Cutting Speed (vc), Feed Rate (f), and Depth of cut (ap). To investigate the performance, Surface Roughness (Ra), Tool-chip interface temperature and Machining time (tc) was selected as output responses. Full factorial (3k) DOE was employed and 27 experiments were analyzed by using Response Surface Methodology (RSM) and regression equations were developed. ANOVA was used to find out the significant parameters. Feed rate was found to be the most influential factor in increasing the surface roughness and decreasing machining time, whereas Depth of cut is the most influential factor in increasing the avg tool-chip interface temperature. Read More...
|
mechanical engineering |
India |
37-44 |
9 |
Analysis of Fillet Welded Joint for Supporting Structure in Pipe Industries
-Mr. Mulla Azhar S ; Mr. P.D. Kulkarni
In the recent years, the welded joints becomes an integral part of assemblies used in the industries. In fact in piping industries welded joints are crucial and prone to different types of loadings. Hence, in such applications, most of the failures are due to the failing of the welded joints. Hence, a modern computational approach based on finite element analysis for strength assessment has been used in this dissertation work. Linear finite element analysis has been carried out to determine the peak stresses which is followed by the modal analysis to decide the mode of vibration. The results of FEM analysis have been validated experimentally using strain gauge technique. Read More...
|
Mechanical Engineering |
India |
44-47 |
10 |
A Comparative study on Circuit Recognition Paradigms for Sketched Electrical Circuit
-Dipti Jaiswal ; Rekhansh Rao; Toran Verma
It is a common practice for engineers to spend a considerable amount of time laying down initial concepts using pencil and paper. Typically, it requires additional time to transform the work into electronic media in the form of technical drawings. A sketch recognition program would save engineers much time redrawing these in technical software. In this research we will be recognizing sketched electrical circuit symbols. We want to achieve a trainable electronic sketched circuit recognizer that has fast response time, high accuracy and easy extensibility to new component. We will use PCA based image preprocessing and watershed segmentation method to segment circuit sketch. Read More...
|
Computer Science and Engineering |
India |
48-50 |
11 |
A Survey on Different Efficient Clustering Techniques used in Web Mining
-Mr. Dushyantsinh Rathod ; Dr. Samrat Khanna; Mr. Vijaykumar Gadhavi
Clustering is a process of putting similar data into groups. Clustering can be considered the most important unsupervised learning technique so as every other problem of this kind; it deals with finding a structure in a collection of unlabeled data. This paper reviews six types of clustering techniques- k-Means Clustering, Hierarchical Clustering, DBSCAN clustering, OPTICS, STING. Read More...
|
Computer Engineering |
India |
51-53 |
12 |
An Analysis of Decision Tree Based Two-Step Clustering Using Data Mining Technique
-Ravinder Kaur ; Anshu Sharma; Sarabjit Kaur
The classification of data patterns and distinguishing them into predefined set of classes is known as pattern recognition. A no of various methods for recognizing patterns studied under this paper. In this paper a new technique is proposed by using back propagation neural networks. This technique is enhancement of decision tree based two-step clustering to in order to achieve more accuracy and less elapsed time. Both the techniques such as existing two-step clustering and enhanced two step clustering are implemented on several data sets and results are compared with each other in terms of accuracy and elapsed time. Read More...
|
Computer Science and Engineering |
India |
54-58 |
13 |
Autonomous Electric Bill Generator
-Mayuri Pramod Londhe ; Archana Vasant Kandekar; Shamal Vijay Bhalerao; Nutan Gorakh Kale
Traditional metering method for retrieving the energy data is not convenient and the cost of the data logging systems is high. So we designing and developing Automatic meter reading (AMR) system. AMR system give the information of meter reading, power cut, total load used, power disconnect .This information is being sent and received by concerned energy Provider i.e. MSEB with the help of Global system for mobile communication (GSM) network . Energy provider receives the meter reading within a second without visiting person. AMR minimize the number of traditional visits required by employs of energy Provider Company. This system not only reduces the labor cost but also increase meter reading accuracy and save hugs amount of time. Read More...
|
Computer Engineering |
India |
59-61 |
14 |
Near Mean Cordial - Path Related Graphs
-Dr A. Nellai Murugan ; L. Pandiselvi; S. Navaneethakrishnan
Let G = (V,E) be a simple graph. A Near Mean Cordial Labeling of G is a function f : V(G) -> {1,2,3,...,p-1,p+1} such that for each edge uv the induced map f* defined by f*(uv) ={( 1 if(f(u)+f(v)=0 (mod2)@0 else)-|, and it satisfies the condition |e_f(0)- e_f(1)|<= 1,wheree_f(0) and e_f(1) represent the number of edges labeled with 0 and 1 respectively. A graph is called a Near Mean Cordial Graph if it admits a Near Mean Cordial Labeling. In this paper, It is proved that the graphsP_n, SP (P_n,K_(1,m)) and B_(m,n)are Near Mean Cordial Graphs. AMS Mathematics subject classification 2010: 05C78. Read More...
|
MATHEMATICS |
India |
62-64 |
15 |
A Review on Smart Parking System
-Miss. Komal R. Sonar ; Miss. Madhuri V. Deshmukh; Miss.Gujan K. Chaudhari ; Miss. Yogita R. Somvanshi
Parking in major cities, particularly with traffic, directly efforts the efforts flow and people’s life. In this paper, we found a new smart parking system that is based on intelligent resource allotment, reservation, and pricing. The proposed system solves the current parking problems by giving guaranteed parking reservations with the lowest manageable cost and searching time for drivers and the highest receipts and resource implementation for parking managers. The searching for parking space in most modern cities especially during the rush hours, is difficult for drivers Parking in the major cities, particularly with dense traffic, directly effects the traffic flow and people’s life New fair pricing information are also proposed that can be implemented in practice. Read More...
|
Computer Engineering |
India |
65-69 |
16 |
Analysis of EEG Signal using Wavelet Transform and SVM Classifier
-Chirag ; Sanjeev Kumar Dhull
Electroencephalogram (EEG) signals are used to measure the brain activity. For analyzing the EEG signal various transform methods are used. This paper is devoted to the use of wavelet transform i.e. db1-db4 and SVM classifier is employed for calculating the accuracy. In this paper, we calculate the accuracy of the input signal using wavelet transform, also calculate the features of the signal i.e. energy and entropy. Read More...
|
Electronics & Communication Engineering |
India |
70-73 |
17 |
An Enhanced Hui Miner Algorithm to Retrieve Optimum Number of High Utility Itemsets
-Dr. S. Vijayarani ; C. Sivamathi; N. Suhashini
Utility Mining is a rising research domain in the data mining and it discovers high utility itemsets in the data sets. The utility can be any user defined choice and to assign this utility value is based on the attributes of the dataset. For example in a transaction database it can be a price of purchased item, profit of item or quantity of items purchased. An itemset is known as high utility itemsets if its utility value is greater than minimum utility threshold. Utility mining is used in many applications like inventory control, retail store or super market management and marketing. Most of the existing algorithms generate candidate set to calculate high utility itemsets. Candidate item generation is more difficult and tedious task. In order to avoid this, high utility itemsets can be retrieved without candidate generation. An algorithm named as HUI Miner algorithm retrieves high utility items without candidate generation method. In this work, HUI Miner algorithm is enhanced with a utility function and set of effective pruning strategies. In this work utility threshold is calculated automatically by using utility function. Performance of enhanced HUI Miner algorithm is compared with the existing HUI miner algorithm. Different sizes of datasets are used for experimentation. The average size of the transaction is 10. Results proved that the enhanced algorithm reduces the upper bounds of high utility itemset. Hence it saves time and memory. Read More...
|
Computer Science |
India |
74-78 |
18 |
Design and Construction of Rigid and Flexible Pavements
-S Ashok Kumar ; A S S Vara Prasad; P Srinivas
Transportation contributes to the economical, industrial and social development of any country. There are different modes of transportation among which the mode of Transportation by roads has been popular since ages as it is the only mode which gives maximum service to all the classes of people. A Pavement is considered as a durable surface material laid down on an area intended to sustain vehicular or foot traffic. A pavement is said to be good when it is stable and Non-yielding to allow heavy wheel loads of traffic to move with least possible rolling resistance .in order to provide such a stable and even surface for traffic, a Road way is provided with a suitably designed and constructed pavement surface. In this work, an effort has been made in examining the different layers involved in a typical rigid and flexible pavement and have designed the pavement as per the IRC Specifications. The project includes all the required Field and Laboratory tests. The results regarding CBR values, aggregate properties and all other necessary data have been presented in the work. Read More...
|
Civil Engineering |
India |
79-82 |
19 |
Content Based Image Retrieval System for Medical Diagnosis using Hadoop
-Sandeep Babbur ; Chandrashekhar Mahakulkar; Mangesh Jagtap; Nitin Harale; Prof. Avinash Palave
Heavy usage of internet causes the explosive growth of images. It's impossible to maintain and handle amount of images, pictures, gifs using the conventional technique. New methodologies and techniques are required to handle huge amount of database and which must provide the more promising results to the user. Hence, we are introducing "Content Based Image Retrieval for medical purposes and diagnosis using Hadoop". The main objective of this is to handle a humongous and large amount of data with the principle of fragmentation, Map Reduce, shape, colour etc. Read More...
|
Computer Engineering |
India |
83-85 |
20 |
A Review on: Magnetic Refrigeration - Emerging Technology in the Field of Refrigeration
-Mr. Vatsal S Patel ; Prof. Jay D. Patel; Prof. Bharat K. Khalasi
The objective of this effort is to study the Magnetic Refrigeration which uses solid materials as the refrigerant. These materials demonstrate the unique property known as magneto caloric effect, which means that they increase and decrease in temperature when magnetized /demagnetized. This effect has been observed for many years and was used for cooling near absolute zero. This system uses a magnetic solid material as a refrigerant. Magneto caloric effect is the basis of the magnetic refrigeration. This technology is environmental friendly. Read More...
|
THERMAL ENGINEERING |
India |
86-90 |
21 |
Discerning the Results of Topology Optimization to Realize Mass Reduction for Steering Knuckle Arm
-Pranjal Ramesh Kelkar ; Prof. V. R. Bajaj; Swapnil S. Kulkarni
The work is done to change geometry for the Steering Knuckle Arm in an attempt to reduce the weight of the component. While doing so, the mass is removed from the specific regions of the part which do not contribute to the stresses acting on the component. This is observed in the contour plot for stress over the Finite Element Model. This is further analyzed using Topology Optimization which expedited the areas which are the non-contributing regions through 3D mass densities pertaining to the stress. The modified geometry created which is feasible for manufacturing. The experimentation for the component is done to validate the alternative geometry in terms of its performance relating to its stiffness. The response for stiffness is aimed to be maintained during the transition from the benchmark geometry to the new geometry. The precise geometry addressing the functional need of the component shall be expedited to stay compatible for the manufacturing process. The work is concluded with the recommendation for the new design with a reduced mass of the material. Read More...
|
Mechanical Engineering |
India |
91-94 |
22 |
Generation of Pulse Width Modulated Wave using FPGA
-Kishore Ramesh Badgujar ; Pankaj A. Salunkhe; Tushar M. Patil
Based on field programmable gate array Pulse width modulation (PWM) has been widely used in power electronics for controlling the various types of quantities such as speed, voltage, lightning, etc. Most high power level converters operate at switching frequencies up to 500 kHz; the disadvantage of such a low frequency application implies vibrations and nonlinear functionality of the devices. While operating frequencies in excess of 1 MHz at high power levels can be achieved and gives much more stable operation of the same operating devices. Read More...
|
Electronics and Telecommunication Department |
India |
95-98 |
23 |
A Case Study - Lean Manufacturing Effect in a Material Handling System by using Value Stream Mapping
-Prof. Chirag R. Patel ; Prof. Bhavesh M. Chaudhari; Prof. Jagdish R. Chauhan
Lean manufacturing is “A systematic approach to identifying and eliminating waste through continuous improvementâ€. The concept of lean thinking originated from Toyota production system. Lean manufacturing focuses on efficiency and services at lowest cost as fast as possible. In industry material handling is the most important part of the production department. And in many industries like milk dairies, sugar factories, fertilizer companies where decrease in time and elimination of labor cost in a material handling system is very important. Focus area of this research is elimination of unnecessary cycle time in material handling system by using most effective tool of lean manufacturing which is known as “Value Stream Mappingâ€. Read More...
|
advance manufacturing system |
India |
99-103 |
24 |
Data Mining Approach in Ethnopharmacolgy Based on Cloud Storage
-Anu Mendiz. R ; Dr. Antony Selvadoss Thanamani
Cloud computing means storing and accessing data and program over the internet instead of computer hardware. The Journal of Ethnopharmacology is dedicated to the exchange of information and understandings about people's use of plants and phytochemicals present in it. Medicinal plants have bioactive compounds which are used for curing of various human diseases and also play an important role in healing. Phytochemicals are non-nutritive plant chemicals that have protective or disease preventive properties. They are non-essential nutrients, meaning that they are not required by the human body for sustaining life. It is well-known that plant produce these chemicals to protect themselves but recent research demonstrate that they can also protect humans against diseases. Read More...
|
Computer Science |
India |
104-106 |
25 |
Design of a MPPT Controller Along with a Reconfiguration Technique for a PV System under Partially Shaded Condition
-Gaurishankar Rathore ; R N Patel
A solar power plant is an integration of different electrical and electronic components comprising of power conditioners, measurement devices, power converters, transformers etc. It also includes a storage system of lead-acid batteries, ultra-capacitors etc. Sometimes these systems also have the facility of grid integration. Thus for the proper functioning of the entire power plant requires that all the equipments operate well within their operating limits like voltage, current, power, frequency. To ensure proper operation a well defined maintenance scheduling is required which includes monitoring of the safety limits and taking necessary actions. This paper focuses on the operation and maintenance of a grid connected solar power plant of 100 KW, 240V. A detailed analysis of the installed solar power plant is done on the basis of power generated and connected load in different operating months. Based on these analyses, basic load management method has been proposed for an economical operation. Battery storage system used along with this solar power plant is also studied and different maintenance requirements for its safe operation under different load conditions have also been discussed. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
107-112 |
26 |
Survey of Open Source Operating System for the IoT Devices
-Jalpa Patel
The Internet of Things (IoT) is the network of physical objects devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity that enable these objects to collect and exchange data. IoT is the interconnection of Wireless Sensor Network (WSN) Devices with Internet space. They are generally small and battery-operated with memory of the order of 100 kilobytes. IoT devices are suitable with 8-bit microcontrollers which are far left behind by the present generation Windows/Unix/Mac-based desktops and laptops. This paper presents various types of operating system of IOT devises. Read More...
|
Computer Engineering |
India |
113-114 |
27 |
Structural Strength Analysis and Validation of Steering Yoke Assembly by Optimization
-Kulkarni Sagar ; Prof. V. R. Bajaj; Swapnil S. Kulkarni
The force offered by the driver of an automotive in navigating the vehicle along the road is transmitted through the steering wheel through the steering system up to the front wheels. Manual or hydraulic mode is utilized to turn the wheels. This dissertation work aims to focus on the ‘universal joint’ also called the ‘yoke’ .The component have two halves that pair to effect a flexible axial joint while accommodating misalignment. Forces are transmitted through the ‘spider’ or the ‘web’ within the two halves. This work attempts to evaluate the strength of the joint to avoid failure. Besides, the scope for mass reduction in realizing a lighter component shall also be investigated using the methodology for ‘Topology Optimization’ while engaging `Altair Hyperworks - OptiStruct’ in dealing with problem. Mathematical treatment is offered to understand the extent of forces to be borne by the joint during its operation. A tentative target of about 2% mass reduction is set while pursuing this work. The result determined by the computational methodology shall be validated through physical experimentation.The force offered by the driver of an automotive in navigating the vehicle along the road is transmitted through the steering wheel through the steering system up to the front wheels. Manual or hydraulic mode is utilized to turn the wheels. This dissertation work aims to focus on the ‘universal joint’ also called the ‘yoke’ .The component have two halves that pair to effect a flexible axial joint while accommodating misalignment. Forces are transmitted through the ‘spider’ or the ‘web’ within the two halves. This work attempts to evaluate the strength of the joint to avoid failure. Besides, the scope for mass reduction in realizing a lighter component shall also be investigated using the methodology for ‘Topology Optimization’ while engaging `Altair Hyperworks - OptiStruct’ in dealing with problem. Mathematical treatment is offered to understand the extent of forces to be borne by the joint during its operation. A tentative target of about 2% mass reduction is set while pursuing this work. The result determined by the computational methodology shall be validated through physical experimentation.The force offered by the driver of an automotive in navigating the vehicle along the road is transmitted through the steering wheel through the steering system up to the front wheels. Manual or hydraulic mode is utilized to turn the wheels. This dissertation work aims to focus on the ‘universal joint’ also called the ‘yoke’ .The component have two halves that pair to effect a flexible axial joint while accommodating misalignment. Forces are transmitted through the ‘spider’ or the ‘web’ within the two halves. This work attempts to evaluate the strength of the joint to avoid failure. Besides, the scope for mass reduction in realizing a lighter component shall also be investigated using the methodology for ‘Topology Optimization’ while engaging `Altair Hyperworks - OptiStruct’ in dealing with problem. Mathematical treatment is offered to understand the extent of forces to be borne by the joint during its operation. A tentative target of about 2% mass reduction is set while pursuing this work. The result determined by the computational methodology shall be validated through physical experimentation.The force offered by the driver of an automotive in navigating the vehicle along the road is transmitted through the steering wheel through the steering system up to the front wheels. Manual or hydraulic mode is utilized to turn the wheels. This dissertation work aims to focus on the ‘universal joint’ also called the ‘yoke’ .The component have two halves that pair to effect a flexible axial joint while accommodating misalignment. Forces are transmitted through the ‘spider’ or the ‘web’ within the two halves. This work attempts to evaluate the strength of the joint to avoid failure. Besides, the scope for mass reduction in realizing a lighter component shall also be investigated using the methodology for ‘Topology Optimization’ while engaging `Altair Hyperworks - OptiStruct’ in dealing with problem. Mathematical treatment is offered to understand the extent of forces to be borne by the joint during its operation. A tentative target of about 2% mass reduction is set while pursuing this work. The result determined by the computational methodology shall be validated through physical experimentation.The force offered by the driver of an automotive in navigating the vehicle along the road is transmitted through the steering wheel through the steering system up to the front wheels. Manual or hydraulic mode is utilized to turn the wheels. This dissertation work aims to focus on the ‘universal joint’ also called the ‘yoke’ .The component have two halves that pair to effect a flexible axial joint while accommodating misalignment. Forces are transmitted through the ‘spider’ or the ‘web’ within the two halves. This work attempts to evaluate the strength of the joint to avoid failure. Besides, the scope for mass reduction in realizing a lighter component shall also be investigated using the methodology for ‘Topology Optimization’ while engaging `Altair Hyperworks - OptiStruct’ in dealing with problem. Mathematical treatment is offered to understand the extent of forces to be borne by the joint during its operation. A tentative target of about 2% mass reduction is set while pursuing this work. The result determined by the computational methodology shall be validated through physical experimentation. Read More...
|
Mechanical Engineering |
India |
115-120 |
28 |
Structural Strength Analysis for The Yoke in The Steering System to Determine Scope for Mass Reduction
-Kulkarni Sagar ; Prof. V. R. Bajaj; Swapnil S. Kulkarni
The purpose of a steering system is to control the direction of the vehicle by applying effort to steering wheel. Steering system is one of the most important aggregate is automobile where mass reduction scope are more. In this paper study and review of structural optimization of steering yoke assembly is carried out. it has been found that there are two way of design process that structural optimization can carried out. In early stage of concept generation, optimization should be used to develop a structure, in later stage shape and size optimization should be used to fine tune the structural from optimization and carried out experimental to validate the component. Read More...
|
Mechanical Engineering |
India |
121-123 |
29 |
Experimental Investigation of Drainage Water - A Case Study
-R. Bhavani
As Ananthapuramu is one of the drought prone area, it is suffering with lack of water for various purposes like domestic, agriculture, industries etc. The Drainage from the entire area of habitations of Ananthapuramu town (Andhra Pradesh, India) entering in to ‘Tadakaleru’ till the point of confluence at Singanamala tank has been considered for the present study. In the study area, drainage water is being used for agriculture purpose due to non availability of sufficient water. Samples from thirteen selected locations have been collected for testing. Out of thirteen locations, continuous flow along Nadimivanka has been considered from locations 4 to 13. Flow from locations 1 to 3 is joining between locations 8 and 9. The locations 1 to 8 are existing within the town area where there is a contamination due to habitations. From location 8 upto 13, the drainage is flowing freely without further contamination. The objective of study is to find various parameters like Sodium adsorption ratio (SAR), pH, Boron, Residual Sodium Carbonate (RSC), Turbidity etc., that are present in the drainage water. It has been observed that the values of various parameters are increasing for the samples 1 to 3 and 4 to 8 and are decreasing for the samples 9 to 13. It can be suggested that the crops which can tolerate the obtained ranges of parameters are to be selected. Read More...
|
Civil Engineering |
India |
124-127 |
30 |
A Review Paper on SCANDROID and Its Challenges for Smartphone Devices
-Kiran Prakash Jaiswal
Android Smartphone devices have expanded an approval in current existences. Individuals stay affecting after PC/laptop (Supercomputer) to Smartphone devices. Nowadays Smartphone/ tablets remain essential part of our day-to-day lives later they afford us substantial quantity of facilities. the usage of Smartphone facilities improved expressively since of the connectivity delivered via Smartphone similar WiFi, GPRS, Bluetooth, 3G,4G etc. people are using Smartphone devices comparable computer’s to store specific or trusted data, directing mail, web surfing, social networking, net banking etc. Consequently, Smartphone come to be indispensable attraction of enemies/hackers [2]. Leading enemies are attracted in the expensive private material. In Additional, Smartphone are continuously associated, which sorts them beneficial as bots in hats. Third, Smartphone can show superior Short message to be send (SMS) or SMS that contribute the victim to exorbitant facilities, and therefore straight generate currency for the enemy. It is awake to the Smartphone operating system (OS) to guarantee the safety of the data on the device [3]. an innovative methodology of improved security framework which can be exist cohesive with the remaining Android Security Framework to create Android more protected and to keep track of the files retrieved by one of the susceptible apps downloaded from altered foundations on the web. The suggested improved security framework increases the safety of Android File System by controlling the apps whose performance equals through the malware [4]. improving the wireless power allocation. Read More...
|
Computer Science and Engineering |
India |
128-131 |
31 |
Effect of Partial and Central Opening of Masonry Infill Wall in Multi-Storey Building
-Mohammed Khalid ; Syed Arfath; Shaik Abdulla
In RC frames buildings the masonry infill walls will be better for resisting the lateral forces during seismic forces. The lateral force of the building is reduced by providing the infill walls in RC frames the openings may be in the form of windows, doors etc. which are unavoidable.
For the most part the brick work infill dividers are is considered as non-structural component in basic investigation and just the commitment of its mass is viewed as and it's auxiliary properties like quality and firmness is by and large not considered. Notwithstanding this present infill's have an impressive quality and solidness and they have noteworthy impact on the seismic reaction of the auxiliary frameworks. In office or private building external side focal opening are utilized. In this study seismic analysis has been performed using Equivalent static Method and response spectrum method for different reinforced concrete (RC) frame building models that include bare frame, in filled frame and with central and partial opening. By considering infill’s wall in RC structure, lateral displacement is reduces 60% to 70% as compare in bare frames. Due to opening in the infill’s walls is significantly reduces of lateral displacement of about 60% of central opening in infill’s is increases 10% increase in lateral displacement. In this paper also includes that the time history at different mode shape with bare frames and infill’s frames.
Read More...
|
Civil Engineering |
India |
132-137 |
32 |
Optimization of Process Parameters of Dry Electric Discharge Machining using Taguchi and RSM Design of Experiments
-Chandan Jadhav ; Sultan Inamdar; Gaurang Shah
Taguchi and Response Surface Method of Design of Experiments are utilized to optimize the process parameters of Electric Discharge Machining in order to get improved Material Removal Rate and Surface Finish. This paper explains the use of different Design of Experiments for optimizing input process parameters for any given process. Read More...
|
Industrial Engineering |
India |
138-144 |
33 |
RPA: Scattered Throughput Maximization in Wireless Network
-S. Gokila ; K. Valarmathi; S. Bhuvaneswari
Random Power Allocation in wireless data networks assure signiï¬cant for maximum throughput for power allocation, however, this problem is recognized to be difficult to tackle in carries out. We examine this trouble for maximum throughput for random power allocation in wireless network and with the goal of maximizing the overall network capacity. We propose a random power allocation and scheduling algorithm which provides signiï¬cant capacity more gain for any ï¬nite number of users. This Random Power Allocation scheme, in effective, achieves a form of random spectral reuse, whereby the amount of reuse varies as a function of the essential wireless node. Then the performances are improving the wireless power allocation randomly Read More...
|
Computer Science |
India |
145-148 |
34 |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
-J.Baby ; K.Valarmathi; R.Navamani
The frequent application is invented to work in Large-scale sensor network domains. The data composed from wireless sensor network are used in making decision in serious infrastructures. Data’s are originating from many sources and transmit through intermediate meting out nodes. Those nodes achieve the aggregation on information. Attacker concessions those type of networks by introduce additional nodes in the network or compromising the existing nodes. So achieving the high data trustworthiness is crucial for correct decision-making. While evaluating the trustworthiness of sensor data origin is an important factor. The several challenging requirements for provenance management in sensor networks are low force and low bandwidth consumption, competent storage space and secure transmission. This survey proposes a new lightweight scheme in order to securely transmit provenance with sensor data. The future in-packet Bloom filters techniques used to program provenance with the sensor data. These mechanisms initially perform origin at the base station then perform rebuilding of the data at the base station. In addition to this the ascription scheme functionality used to detect packet drop attacks prepared by malicious data forwarding nodes. These examinations describe the success and efficiency of the Light weight secure provenance scheme in detect packet forgery with packet loss attacks. Read More...
|
Computer Science |
India |
149-152 |
35 |
Detection of Sybil Attacks & Nodes in Vehicular Ad Hoc Networks Based on Road Side Units
-S. Devaki ; K. Valarmathi; A. Vijayasarathi
Through the fast growth of wireless technologies, Privacy of personal place information of a vehicle ad-hoc network (VANET) users is attractive a more and more important issue. Services provided by Location based services to VANETs users can breach by Sybil attacks. by malicious vehicles claim multiple identities at the same time. The avoidance of these attacks, which could arise in otherwise out of the Road Side Units (RSUs) reporting have a challenge to detect, as it should gather a cooperation between the ability to identify the real identity of the malicious vehicle, and avoidance of vehicle users starting being tracked by malicious entity. These papers propose a solution to stop and detect Sybil attacks in VANETs. The classification of attackers is based on two types of authentication techniques. The first uses discovery tags embedded in the vehicle to confirm them to the RSU and obtain short lifetime certificates. The second uses certificates to confirm vehicles to their neighbors. The vehicular network is divided into diverse zones brought under the control of dissimilar guarantee authorities (CAs), forcing a vehicle to change its diploma at what time touching from a zone to another. One important characteristic of the projected solution is that it prevents attackers from tracking the mobility of the vehicles. Avoid false negatives is also addressed using observers in vehicle nodes. A set of duplication scenarios also are performance to evaluate the presentation of the proposed solution. In last, these articles summarize the assessment between our proposed approach prevent the network from various hurtful property. Later we propose improvement in RSU support certificate base detection mechanism. Read More...
|
Computer Science |
India |
153-156 |
36 |
Xml Multidup: A Probabilistic Duplicate Detection Method for Hierarchical Multimedia Data
-K.Priyangaa ; K.Valarmathi
Even though present is a long line of work on identify duplicate in relational data, only a few solutions focus on duplicate detection in more composite hierarchical structures, like XML data. In this article, we there a novel method for XML replacement detection, called XML Dup. XML Dup uses a Bayesian network to decide the probability of two XML elements being duplicate, allowing for not only the information surrounded by the elements, but also the way that information is structured. In addition, to get better the good organization of the network evaluation, a novel pruning policy, capable of major gains over the un optimized version of the algorithm, is presented. Through experiment, we show that our algorithm is able to accomplish high exactitude and remember scores in quite a lot of datasets. XMLDup is also able to do better than another state of the art replacement detection solution, both in terms of competence and of usefulness. Read More...
|
Computer Science |
India |
157-160 |
37 |
Filtering Unwanted Message Using Firewall Technique in Online Social Networks
-M.Bhuvaneshwari ; K.Valarmathi; R.Navamani
Internet develops keen on more popular in the day to day activities of user’s. In current years online social networks (OSN) also increased rapidly. The users know how to communicate and share their views and content through online social networking services. The portion between the users is supposed to be several types of content like image, audio, video etc. The mainly significant draw-back of these Online Social Networking (OSN) armed forces is the lack of isolation for the user’s own classified space. The users can’t have the ability to direct control to prevent the undesired communication post on their individual private walls. Online Social Networks (OSN) becomes an inner part of many people life today. So Online Social Networks (OSN) should be extremely secured to prevent the individual’s privacy. Up to now the Online Social Network (OSN) provides the security events are incomplete. To filter the unwanted messages, in this paper we proposed an enhanced filtering system by using Firewall learning technique based on a content filtering. Read More...
|
Computer Science |
India |
161-164 |
38 |
Privacy Preservation Guidelines based Substance Distribution in Public Clouds
-N.Ramya ; K.Valarmathi
Present approach to privacy preservation guidelines based data hosted in the public cloud are based on substance distribution of the data. Below such approaches, data owners are in accuse of encrypting the data before uploading them on the cloud and encrypting the data at any time user authorization alerts. Data owners thus increase the communication and estimation costs. An approach must be allot the enforcement of privacy preservation guidelines based substance distribution access control to the cloud, so to decrease the network traffic on public cloud, although assuring data confidentiality from the cloud. We propose an approach; the data owner performs a guideline based encryption; whereas the cloud performs guidelines based encryption on top of the owner encrypted data. While aspects of these characteristics have been realized to a certain extent, cloud environment remainder a task in progress. This publication provides an overview of the privacy challenges pertinent to public cloud computing and points out consideration organizations should take when private source information, application, and communications to a public cloud environment. Read More...
|
Computer Science |
India |
165-168 |
39 |
Optimization and Fatigue Analysis of Steering Knuckle
-Atul Yadav ; Abhijeet S Kabule
Light weight, low fuel consumption and high durability are the primary demands for any vehicle. The steering knuckle is a standout amongst the most vital parts of a vehicle. The aim of this research is scale down the mass of an existing steering knuckle component of a local car model, using Creo 2.0, and performing its shape optimization, using Hyperworks as pre and post processor and Nastran as a solver, in order to meet the required strength attributes at the cost of minimum weight. The Investigation has been successful in optimizing the steering knuckle satisfying the required attributes and achieving a weight reduction of 8.81% in comparison with its initial model. Fatigue analysis is performed on the model to investigation the load bearing behavior of steering knuckle under when in operation. Read More...
|
Mechanical Engineering |
India |
169-173 |
40 |
Optimization of Grinding Parameters of Surface Grinding Process for AISI 1018 Mild Steel by using Al2O3 Grinding Tool
-Rajhans R Manwatkar ; Dr. Ramakant Shrivastava
Recently, grinding is most common finishing process used for finishing different materials like Cast Iron, Steels, stainless steels, copper, crass, aluminium and its alloy, tool steel, high speed tool steel, nickel alloys etc. Generally the process used for giving finishing to the materials. Super finishing operation also carried out with the grinding process. AISI 1018 Cold rolled steel referred as low carbon steel or mild steel has good mechanical as well as physical properties. It has a good weldability, machinability, easy to forged, easy to cold rolled, good strength and provides ductility. It is used in many applications such as often employed in high volume screw machine parts, commonly employed in shafts, spindles, pins, rods, sprockets assemblies and wide variety of component parts, cars, domestic goods, constructional steel also employed in wire, plate , tin cans, mild steel flanges, tube fittings, pipe fittings, pipes, tubes, fasteners, sheets, rods, bars etc. It can be finished up to 0.46 µm with standard grinding operation generally used in industries. By optimizing grinding parameters, it is possible to achieve optimum surface roughness. Aluminium Oxide is often used in grinding of mild steels. Every parameters in grinding process should be considered for achieving minimum surface roughness value i.e. cutting speed, feed rate, depth of cut, coolant flow rate, grain size for both tool and work material(course/fine), physical properties of material, grit size for grinding tool, thermal effect etc. But still dominating parameter in grinding is cutting speed of grinding wheel second one is depth of cut. Read More...
|
M.E in Production Enginerring |
India |
174-178 |
41 |
Evaluation of dual MAC for Multihop Adhoc Network
-Amit Kumar
Multihop adhoc wireless networks offer great challenges for protocol designers. Stations in such networks are contrained by factors like low power, limited bandwidth, link errors and collisions. Changes are needed at various levels of the protocol stack, most importantly at the medium access layer (MAC).The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed problems. The MAC with Distributed Coordination Function (DCF)does not scale well in such networks. We introduce Point Coordination Function(PCF)in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of dual MAC. This work discusses architecture and working of the dual MAC. Performance results of the network using MAC are presented, and compared with that of pure DCF operation. Read More...
|
Computer Science and Engineering |
India |
179-183 |
42 |
Linear Buckling Analysis of S-Glass/Epoxy Laminated Composite
-Madhukumar M ; Dr. H. N. Reddappa; Kumar P.L; Dr. P. Mahadevaswamy
The core outline of the present paper is to examine the prevailing technique for buckling Exploration of0 S-glass/Epoxy Laminated Composite Plate with certain assorted cutouts such as square, circular and rectangular with varying specifications using experimental and Finite Element analysis. The consequence of buckling of laminated plate over the right proportion of parts [0/36]s, is concluded over a square plate. These cutouts are sited exactly at the center of the plate and then these plates with assorted cutouts are analyzed for buckling load conditions and then finally demonstrated using FE software ANSYS 12.0 with undertaking the area of the plate as same for all the replicas. Read More...
|
m.tech in machine design |
India |
184-189 |
43 |
A Survey on Search Engine Optimization in Cloud Computing
-R Haripriyanka ; R. Malathi Ravindran
Cloud computing can be defined as a large-scale and distributed computing paradigm which is driven by economies of scale, in which a pool of dynamically-scalable, abstracted, virtualized, managed computing power, platforms, storage, and services are delivered on demand to the customers through the Internet. search engines are programs that search documents for specific keywords and returns a list of the documents where the keywords were found. The term is often used to specifically describe systems like Google, Bing, and Yahoo! search that enable user to search for documents on the World Wide Web. In this chapter we discussed about the search engine optimization, search systems, search engine methods. Read More...
|
Computer Science |
India |
190-192 |
44 |
Survey on DBSCAN Algorithm in Distributed Data Mining using Map Reduce
-Chaitali Patel
Data mining is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining, also called knowledge discovery in databases. Clustering is a grouping of objects into classes such as object in same cluster is similar and objects in different clusters are dissimilar. Clustering can also be used for anomaly detection. In the data mining we use DBSCAN algorithm for clustering method. DBSCAN is one the density based algorithm but most of the time lacking in the performance, run time complexity and not gives proper output in the multi density dataset. To overcome from this problem many algorithms are developed and here present literature survey on those algorithms. This paper also gives the details of different types of DBSCAN Algorithm. Read More...
|
Computer Science and Engineering |
India |
193-194 |
45 |
Educational Data Mining Student Placement Prediction in Education Sector using Classification
-A Priyadharsini ; B Azhagusundari
Data mining is based on collecting knowledge from databases or data warehouses and the information collected that had never been known before, it is valid and operational. In recent years, the biggest challenges that educational institutions are dealing with the explosive growth of educational data and to use this data to improve the quality of managerial decisions. One of the biggest challenges is to improve the quality of the educational processes so as to enhance student’s performance in academic and placement. Thus, it is extremely important decision to set new strategies and plans for a better management of the current processes. Educational data mining model helps to declare student’s future learning outcomes using data sets of outgoing students. Prediction of student’s placement in educational environments is important as well. In this paper, J48 classification algorithm is used to predict the placement for the final year students. Read More...
|
Computer Applications |
India |
195-198 |
46 |
Plastic-Soil Bricks
-Keerti M Nashimath ; Jayesh Patel; Narayan Soragavi; Shantagouda Biradar; Rana Yashwant
There has been a considerable imbalance between the availability of conventional building materials and their demand in the recent past. Laterite quarry is abundantly available and the disposal of waste plastic (PET, PP etc) is a biggest challenge. In this work we are attempting to manufacture the bricks by using waste plastic in the range of 65% to 85% by weight of laterite soil and bitumen in the range of 4% to 12% by weight of soil. The bricks are with negligible water absorption and satisfactory compressive strength in comparison with normal bricks. Read More...
|
Civil Engineering |
India |
199-200 |
47 |
Secure Data Retrieval Using AES Approach for Decentralized Disruption-Tolerant Military Network
-Rajendra Shantaram Tavhare ; Hidayat M. Sayyad; Sandeep R. Khandelwal; Prof. Ganesh S. Kothawale
Military security infers the ability of a country state to protect itself, or dissuade military animosity. On the other hand, military security infers the ability of a country state to uphold its arrangement decisions by utilization of military power. The expression "military security" is viewed as synonymous with "security" in a lot of its utilization. One of the meanings of security given in the Dictionary of Military and Associated Terms, might be viewed as a meaning of "military security". The extent of military security has extended from customary types of contention between country states to fourth-era fighting between a state and non-state on-screen characters. In Military Environment, they are enduring discontinuous system availability. So we are utilizing the DTN (Disruption Tolerant Network) that permits the remote system for military application to convey each other furthermore warriors can get to classified information by using stockpiling hub in front line or antagonistic area to pain shape the middle of the road system availability and accomplish secure information or some summon by dependable to investigate from outer hub. The most difficult thing in this cases are authorization of approved arrangements. Cipher text-approach property based encryption is a dependable cryptographic answer for access control issues. In this paper, by using AES Algorithm for decentralized DTNs we characterize how to secure information and recovery plan where various key powers deal with their properties autonomously and dodge the key escrow, repudiation, Coordination of qualities issued from various powers. Versatility is given by AES to encryption and decryption. We depicted that how safely and proficiency deal with the private information by applying proposed component which is conveyed in the disturbance tolerant military system. Read More...
|
Computer Science and Engineering |
India |
201-203 |
48 |
Communication Range Scheme to Detect and Prevent Black Hole in MANETS
-Manpreet Rupra ; Ruchika Markan
In Mobile ad hoc networks, nodes converse with each other and move vigorously in network, making them vulnerable to numerous kinds of attacks. One attack is the Black hole attack measured to be the most fatal attack since it beads all the packets received by it. In this paper a new technique to detect and prevent the black hole attacks has been proposed and will be simulated in Ns2.35. The proposed scheme will be analysed on the basis of throughput, packet delivery ratio and energy consumption. The proposed scheme is expected to outperform the existing technique. Read More...
|
Computer Science and Engineering |
India |
204-206 |
49 |
Experimental Study of Effect of Shot Peening Parameter on the Performance of Shot Peening Process
-Deepak Bhimrao Magar ; Dr. N. G. Phafat; Mr. Nilesh V. Sawadekar
Fatigue failure is a result of a crack initiation and propagation, in consequence of a cyclical load. In aeronautical components as landing gear the fatigue strength is an important parameter to be considered in manufacturing of it, as well as the corrosion and wear resistance. The major applications of the shot peening are related to improvement and restoration of properties and reliability of machine elements by increasing their surface hardness, tensile strength, surface finish, impact strength, fatigue strength etc. The improvement of properties depends on the intensity of shot peening process. The intensity can be varied by regulating the size of shot, the hardness of shot, the speed at which was fired, the length of time, the distance of nozzle from the surface and the work exposed to the shot. Basically there are so many input and response variables discussed in the previous works but the availability and cost are the important factors considered in this work for the variables. The shot peening was carried out on the EN9 component with the fixed diameter shots and then the changed parameters and properties were discussed with the help of different tools like DoE and optimization were carried out in Response Surface Methodology in MINITAB14, ANOVA and Regression for checking the model for adequacy of the different factors, Response optimizer gave the final optimized combinations of the input variables to get the maximum benefit of responses. From the experimentation it is found that out of three input parameters velocity of peening was observed as most significant factor. The important and primary response parameter arc height gave the significant set of input parameters with their appropriate levels. Read More...
|
Mechanical Engineering |
India |
207-209 |
50 |
Point to Point Processing of Digital Image using Parallel Computing from CUDA to OpenCL
-Swayanshu Shanti Pragnya ; Smruti Prava Das
In this work we will combine a relation which arises between game developing languages invented by NVIDIA i.e. CUDA and OpenCL with grayscale conversion from digital image processing. Uses of gray scale images are slightly less known by the people, so in our paper we will show that the easy processes to convert image into grayscale and the suitable game developing programming language within CUDA and OpenCL. Color image based games are used a lot but according to user requirement people like different flavor all the time, but for that different kind of image conversion should be known. We will make a relation between gaming language with different filters of images. Read More...
|
Computer Science and Engineering |
India |
210-211 |