No. |
Title and Author |
Area |
Country |
Page |
51 |
Performance of OSLR in Manet using OMNETPP
-Baljeet Kaur ; Jaswinder Singh
The user wants the wireless network anywhere. The wireless communication devices are transmitters, receivers and various smart antennas. These smart antennas may be any kind and the number of nodes can be fixed or mobile. The term node is referred to as nodes which can move arbitrarily in any direction. The wireless mobile nodes when collected at an instant are forming a temporary network without use of any re-existing network. The Ad-hoc routing protocols have number of types which are useful during the time of connectivity to form network. Routing protocols for mobile Ad-hoc networks have to face the challenge of changing the network topology by changing the number of mobile nodes. Scalability is an open issue in all routing protocols. In this review paper, there are observations of OLSR protocol regarding the scalability comparison of the Optimized Link State Routing (OLSR) by varying the number of nodes. The simulation is done by using OMNET++ by taking end to end delay, throughput and Packet delivery ratio as performance metrics. Read More...
|
Computer Science and Engineering |
India |
188-192 |
52 |
Analytical Study and Reliability Evaluation of Concrete filled Steel Tubes by FOSM Method using ABAQUS Software
-THOUSIF B. S. ; Khalid Nayaz Khan; Dr. N S Kumar
Concrete filled steel tube column has got many leads associated with the reinforced concrete member. Concrete filled steel tubes are often used for piers, profound foundations, caissons and columns because of its high compressive strength and stiffness. Analytical Study and Reliability analysis of Hollow Steel Tube with concrete filled of different grades under monotonic loading is offered in this study. The nonlinear behavior of the columns is perceived by using finite element software ABAQUS 6.10- The outcomes from non-linear finite element analyses is attained and is substantiated with Euro code Part-4 and Reliability analysis. This study was carried out to examine the effect of numerous parameters such as thickness of tube (3.2mm), Diameter of steel tube (26.90mm, 33.70mm & 42.40mm) Slenderness ratio & Reliability and Also to find Ultimate load carrying ability of hollow and composite column on compressive response under axis loading was assessed. The main parameters are: (1) Slenderness ratio (2) Thickness -steel tube (3) compressive strength of concrete. Properties of above variables mentioned on the behavior of columns are weighed. Catastrophe modes and deformed shape of the columns is also demonstrated. From this study, it is decided that, the advanced finite element model gives nearer perfection and shows the nonlinear behavior well with 5-10% error. Also the nonlinear behavior is inspected initially only steel tube is loaded then on concrete is loaded and when both is loaded and the combination of both steel tube and infill concrete give greater load carrying capacity. The diagnosed results are well authenticated with preceding researchers too. Read More...
|
M.Tech in Structural Engineering |
India |
193-197 |
53 |
Delineation of Ground Water Potential Zones in Various Mandals of East Godavari District using Remote sensing and GIS Techniques
-ARUNA. D ; SRIDHAR. P
Integration of remote sensing and GIS techniques provides an excellent tool for the determination of ground water potential in a region. For this purpose, LANSAT-7 (ETM+) satellite data, survey of India toposheet series of 65K/3, 65K/4, 65K/6, 65K/7, 65K/8-12, 65K/10, 65K/11 on 1:50000 scale are used. Ground water potential is computed for relative assessment of ground water potential zones by integration of all the related data that influence the occurrence and movement of ground water in the region using GIS. Based on the analysis of relief map, the slope map of the study area has been derived. The slope map indicated that the entire study area is a vast stretch of rolling plain. Based on the analysis of Geomorphology maps, it is concluded that the geomorphologic characteristics were classified into Pedi plains, pediments, structural hill, flood plain, shallow pediments and the water body mask. Based on the analysis of Geology maps, it is concluded that the geology of study area is Achaean period. Geologically 59% of the area in the district is underline by hard, compact, crystalline rocks of archean age, consisting of Garnitic-ferruginous-silliminite gneisses called “Khondalites†and a small part by Granite. These rocks occupy the Northern part of the District. With an aerial extent of 6406 sq.km, based on the analysis of soil map, it was concluded that the Soil type ranges from fine loamy, loamy and clayey soils. All required map have been prepared and assigned weights according to their importance in the groundwater potential point of view. Based on the concept model analysis concluded that the identified the GWPZ. The GWPZ classified in to (i) excellent (ii) very good (iii) good (iv) moderate (v) Poor to moderate and (vi) poor to nil potential zones. Read More...
|
gis and remote sensing |
India |
198-202 |
54 |
Overview of Risk Management in Software Project Development
-Varshil Anavadia ; Utkarsh Bharagava; Tanya Sangal; Devyani Jivani; Prof. Ramesh Babu
This paper explores the concept of software development consisting of multiple collaborating units that introduce challenges and risks causing failure in project development even when risk monitoring is controlled. Software project risk management consists of risk identification; analysis and mitigation methods which help project managers either entirely avoid or curb the repercussions of the risks encountered during development of a project. The risks may have been identified on other projects as well as in earlier stages or tasks of the current project. The main objective of the paper is to present an overview of the specifics of risk management and discuss existing risk management systems and further provide the future work to be done. Read More...
|
Software Engineering |
India |
203-207 |
55 |
Design of Horizontal Axis Wind Turbine
-Neel Shankarlal Patel ; Denish C. Patel; Rushabh A. Shah; Nayan K. Desai; Kuldeep H. Nayi
The objective of this study is to design a wind turbine. The design process includes the selection of the wind turbine type and the determination of the blade airfoil, pitch angle distribution along the radius, and chord length distribution along the radius. The pitch angle and chord length distributions are optimized based on conservation of angular momentum and theory of aerodynamic forces on an airfoil. Blade Element Momentum (BEM) theory is first derived then used to conduct a parametric study that will determine if the optimized values of blade pitch and chord length create the most efficient blade geometry. This work includes a discussion of the most important parameters in wind turbine blade design to maximize efficiency. QBlade V0.8, an integration of different versatile software like xfoil, XLR5, 360 extrapolation using Montgomerie and Viterna theory, has been used for simulation. Read More...
|
Mechanical Engineering |
India |
208-211 |
56 |
Application of Bow-Tie Analysis in Risk Management
-Vivek K Sankar ; Dr. Nihal Siddiqui
This article is intended to link BowTie Analysis to Risk Management. Linking of operational risk to Bow-Tie diagrams provides an organization with greater visibility and understanding. Experience show that Bow-Tie is ideal for structured assessment and communication of risks, clearly demonstrates the link between control measures and management system arrangements and can be used to quantitatively assess and demonstrate control of all types of risk. Use of Bow-Tie analysis enables companies to streamline their risk management documentation, as the amount of information which can be included on a single Bow-Tie diagram would require several pages if presented in text or tabular format. Tips for success while using Bow-Tie analysis is to involve people from different levels in development, making sure that control responsibilities don’t finish up at manager level, verifying control measures and tasks. Thus, the method helps to ensure that risks are managed rather than just analyzed. Read More...
|
Health,Safety and Environment Engineering |
United Arab Emirates |
212-214 |
57 |
Conducting Polymer based Antifouling Coating
-Monika D. Maral ; Vishal S. Dhumal; Amar Charkha
Conducting polyaniline polyacrylic acid based paints were synthesized chemically & applied on low carbon steels. The conducting polyaniline polyacrylic acid based powder was characterized by UV-V is absorption spectroscopy, FTIR Spectroscopy, Scanning Electron microscopy and its conductivity was measured by four probe method. Conductivity of polyaniline was found to be maximum at 0.1 ratio of polyacrylic acid to aniline. Peak observed at 620 nm in UV-V is spectroscopy clearly reveals the presence of polyaniline. The O-H and N-H stretching bonds observed in the FTIR spectrum it confirms the presence of polyaniline in synthesized powder. The nano spheres were found to be at Ì´100nm in Scanning Electron Microscope that confirms the presence of polyaniline. The electrolysis test showed that the conducting polyaniline synthesized from 0.001 M Polyacrylic acid and 0.01 M Aniline coated sample generate sulfate ions which inhibit the Fouling. Corrosion rate of conducting polyaniline synthesized from 0.001 M Polyacrylic Acid and 0.01 M Aniline based antifouling paints in 3.5%NaCl is found to be 1.41mpy which is about 3.5 times lower than that of uncoated low carbon steel in same medium. The electrochemical studies reveal protective nature of conducting polyaniline synthesized from 0.001 M Polyacrylic Acid and 0.01 M Aniline based Antifouling coating even after 48 hours of immersion. Conducting Polyaniline synthesized from 0.001 M Polyacrylic Acid and 0.01 M Aniline can be used as antifouling as well as Anti-corrosive in marine applications. Read More...
|
AUTOMOBILE ENGINEERING |
India |
215-220 |
58 |
Current Research Inclination in Data Mining
-Asha Rani M ; Kavana M D
Data mining is the process of extracting important and useful information from large sets of data. The goal of the data mining process is to extract knowledge from an existing data set and transform it into a unique human understandable format for some advance use. Through data mining, we can able to effectively extract data in the form of knowledge discovery which provides useful helping guide for information processing that can be utilized in varieties of applications. It is the most seeking field in recent framework and its importance cannot be ignored at all as effective data analysis outputs to extensive information utilization in almost all the fields and a proper data mining provides the appropriate and effective result. Different types of data mining techniques are augmented for powerful data mining applications that can ranges from Super market data to science, research, medical, media, web, entertainment and a lot of other fields which are implemented through data warehouses and Online Analytical Processing along with different data mining models. In this paper we have focused on data mining works with respect to current research approaches in variety of fields. Read More...
|
Computer Engineering |
India |
221-224 |
59 |
Impact Strength Assessment of Recycle Aggregate Concrete Slabs
-N Mastan Vali ; B. Mahesh Babu
The paper presents the behavior of Recycled Aggregate Concrete (RAC) slabs under impact loading. The natural aggregate was replaced with recycled aggregate in proportion of 25, 50, 75 and 100 percent. The load carrying capacity, deflections were recorded for each slab specimen. The energy absorption for each specimen was also evaluated. For comparison purpose, Natural Aggregate Concrete (NAC) slabs were cast and tested. The results revealed that there is a decrement in load carrying capacity is about 2 – 14% for RAC slabs when compared with NAC slabs. In the experimental work all the slabs were simulated with two edges fixed and other two edges simply supported. Read More...
|
Structural Engineering |
India |
225-228 |
60 |
Design and Analysis of Glass Fiber Reinforced Plastic Composite Rotor Blade
-S. Suresh ; N. Sambasiva Rao
GFRP (Glass Fiber Reinforced Plastic) composite materials are used in many engineering applications because of its high strength to weight ratio. The purpose of this experiment is to investigate mechanical properties of GFRP rotor blades which are used in cooling towers. These blades are manufactured by pressure bag molding process by using suitable mould. Before installation (Delivery), the blade must be tested for mechanical properties. For this testing, GFRP laminate is made by hand layup technique. Epoxy resin is used as matrix in manufacturing of the GFRP laminate. Axial flow fans are large capacity air moving devices suitable for mine ventilations and air heat exchangers. The conventional cast aluminum blades have a complex design with a higher power consumption and lower performance efficiency. The aim of proposed work is to fabricate, design, and analyze the epoxy based glass fiber composite, compare these results with experimental and theoretical values. Read More...
|
m.tech in machine design |
India |
229-232 |
61 |
Relative Study of Scheduling Techniques in Cloud Computing
-Mohil Jain ; Rahul Anand; Akhil Ranjan; Priya G
The relative analysis of scheduling techniques in cloud computing has been an area of interests for many researchers. In this paper, we have studied the implementation of such scheduling techniques in cloud computing. Cloud computing, as the term suggests and is considered as the amount of usage done by the user, and hence the user pays for the services that he has used. It provides access to its network and services on the basis of its demand and usefulness. The cloud computing model requires an appropriate and in depth technique for doing various jobs that are been provided to the system in a cost efficient way. It also depends on certain constraints that are been available at that time. To fulfill the same work, it is been performed by a virtual machine scheduler that uses an appropriate scheduling technique. Here we are reviewing the efficient and effective scheduling policies that are necessary to reduce the carrying out cost and also to increment the use of resources. Read More...
|
Computer Science and Engineering |
India |
233-236 |
62 |
Risks and Challenges Involved in a Construction Project
-Vibhu Kumar ; R. K. Sharma; Sonu Gautam
Risks are very common in construction sector. It is also a fact that risk management in construction projects is still very ineffective and the main cause of this situation is the lack of knowledge. Many construction projects fail because project companies assume that all the projects would succeed and they therefore do not identify, analyze, and provide solutions to the risk elements involved in the project. One of the major roles undertaken by a project manager is the management of the risk of a project. However, this duty is complex and inefficient if good risk management has not been done from the beginning of the project. A proper and systematic methodology is required for an effective and efficient risk management approach and, more importantly, knowledge and experience. Project managers are being pressurized to minimize the chance of project failure. This increasing pressure for performance suggests that it is essential for anyone involved in a project to be concerned about the associated risks and how they can be effectively managed. Basically, Performance of a project is analyzed on the criteria of quality, budget and time of completion. This paper aims at enlisting various risks and challenges involved in construction project and various risk management techniques which can be used for the successful completion of project. Read More...
|
Civil Engineering |
India |
237-239 |
63 |
Safety Assessment on Building Construction Site Through Cost Comparison
-Vikram S. Kulkarni
Though construction-industry injury statistics continue to reveal that unacceptable numbers of construction workers are injured and harmed each year, some construction firms have reported having very good safety-performance records. These firms are often referred to as having world-class safety performances because their level of performance is rarely attained. Those with world-class safety records obviously implement effective safety programs and report enviable safety-performance records year after year. There are many different safety programs, techniques, and initiatives that can be implemented to enhance safety performance. Some companies consider many means of enhancing safety performance and select one that is regarded as most promising or cost effective, whereas others implement many safety practices. Though there is a law and legislation in India regarding the safety of workers, but they are not followed properly and there is no any force from government side to implement the laws. That is what the reason, why safety is neglected on construction site in India. The article shows that using PPE on construction site against various probable accidents not only saves life of worker but also saves money and makes the project more economical and safe. The cost comparison shows that in more than 95% of activities the cost of PPE is less than that of accident, ensuring the safety of the worker. Hence it is advisory to use PPE on construction site to make the project safe and economical. Read More...
|
Civil Engineering |
India |
240-244 |
64 |
Organizational Structure of a Construction Company
-Vibhu Kumar ; R. K. Sharma; Sonu Gautam
A construction company’s organizational structure refers to both the arrangement of job roles and the reporting and operational relationships between and within these roles. Different types of roles and responsibilities depending upon type of department, function or area of work are necessary so as to make a most appropriate organizational design. The various work areas can be marketing, purchasing, planning, human resources, surveying, finance, pre-construction tasks and construction operations. Construction work requires a proper order of roles and responsibilities so that managers can reduce risk involved in project, proper management and safety at workplace can be maintained. Proper order is required to clear roles for each individual, which makes it possible for construction jobs to be completed on schedule without compromising the budget or safety of on-site workers. This paper aims at describing organizational structure and the respective job roles so as to execute the required project in scheduled budget and time. Read More...
|
Civil Engineering |
India |
245-248 |
65 |
Experimental Investigation on Self Compacting Concrete by Partial Replacement of Cement with Fly Ash
-Y. Chandrakala ; EV. Raghava Rao; D. Satish
Self-compacting concrete (SCC) has high flow ability and cohesive properties as required. It spread and consolidate readily into place (i.e. due to low viscosity) through and around the narrow space/ congested/ dense reinforcement under self-weight. It fills formwork without external vibration or some time little vibration, without segregation and bleeding. This study presents an experimental investigation on self-compacting concrete (SCC) with cement replacement of a FLY ASH (0%, 10%, 20%, 30% and 40%) were cast to study the effect on compressive strength at 14, 28 & chemical admixtures like super plasticizers (SP). After each mix preparation the specimens are cured in water for 3, 7 & 28 days. The slump, J-Box and L-Box test are carried out on the fresh SCC and in harden concrete compressive strength and split tensile strength values are determined. Attempts have been made to study the properties of such SCCs and to investigate the suitability of FLY ASH to be used as partial replacement materials for CEMENT in SCC. Read More...
|
Civil Engineering |
India |
249-252 |
66 |
Analysis of Routing Protocols for Delay Tolerant Networks (DTN)
-Kavita Kushwah ; Nirupama Tiwari; Nitin Manjhi
The concept of Delay Tolerant networks (DTN) makes the use of store carry and forward mechanism [1] in which first of all, the message to be sent to any node has to be stored or buffered in the form of bundle. Routing provides more priority to the messages destined to the contact node. This paper presents a performance evaluation based on the total size of delivery messages, delivery probability and overhead ratio. Further, the impact of the scenarios on the evaluation result is analyzed. For the simulation, we have used Opportunistic Network Environment (ONE) Simulator. Read More...
|
Computer Engineering |
India |
253-255 |
67 |
A Survey on Reversible Data Hiding using BPCS based Multimedia Steganography Combined with Cryptography
-Deepali Alure ; Prof. Varsha Dange
With the popularity of outsourcing data to the server, it is essential to secure the protection of data and empower the server to effortlessly deal with the data in the meantime. Under such demands, reversible data hiding away in encrypted multimedia (image, audio also, video) draws in more analysts consideration. Existing framework proposes a novel structure for RDH-EI based on reversible image transformation (RIT). In this paper reversible transformation is carried on data and it is encrypted utilizing AES algorithm and again it is hidden into media document utilizing powerful BPCS algorithm. Again this hid media document is encoded utilizing standard AES algorithm. Also, it applies turn around operations at the recipient's side. Generally operations give a productivity and strength to the framework. RIT-based structure permits the user to transform the content of unique image into the content of another objective image with a similar size. The transformed image, which looks like the objective image, is utilized as the encoded image, and is outsourced to the server. In this paper AES algorithm is utilized to encode the mystery data and BPCS stegnography algorithm for hiding the encoded discharge data in multimedia files which can fulfill security and extensive inserting limit issue. The current framework was not worked for audio and video. In this paper usage on audio furthermore, video is continued. The discharge data will be cover up in the audio and video like image and will transfer on the server. Receiver will get the audio and video records from server and get the emit message from it. Which can fulfill distinctive necessities on image quality and extensive inserting limit separately. Read More...
|
Computer Engineering |
India |
256-259 |
68 |
A New Method for Comparative Study of Three Software Testing Techniques
-Shubham Agarwal ; Saumya Agarwal; Vinita Pareek; Richansu Mishra; Shounak Das
Software testing is considered as one of the key phases in the software-development life cycle (SDLC). The main objective of software testing is to detect the faults either through manual testing or with automated testing approach. The most commonly adopted software testing approach in industries is test case based testing (TCBT) which is usually done manually. TCBT is mainly used by the software testers to formalize and guide their testing activities and set theoretical principals for testing. Model based testing (MBT) is widely used automation software testing technique to generate and execute the tests. Black-box testing, on the other hand is a method of software testing that examines the functionality of an application based on the specifications. All the three techniques are showing their prominence in real time with some pros and cons. However, there is no formal comparison available among these three techniques. The main objective of this paper is to find out the difference in test cases in TCBT, MBT and Black-box in terms of providing better test coverage (Statement, Branch and Path), requirement, traceability, cost and time. Read More...
|
Software Engineering |
India |
260-265 |
69 |
Optimization of Process Parameters in Turning using Taguchi Method
-Manish Kunar ; Dr (Mrs) Shiena Shekhar
The aim of this work is to find the effect of tool rake angle experimentally on work piece material on the basis of main cutting force during a turning process of EN 31Steel, MS, Aluminium specimens. and carbide as a tool material. The experiments have been obtained with continuous cutting speed, feed rate and depth of cut with five different tool rake angles (00-160). The influence of the tool rake angle on the main cutting force for EN 31, M.S. specimens the main cutting force has a reducing pattern as the rake angle increases but for the Aluminium specimen the main cutting force increases with increasing the tool rake angle. The experimental results show that main cutting force gets the maximum value at the EN 31 specimen, average value in the MS specimen and the low value at the Aluminium specimen. In this thesis we are also finding optimal control parameters to achieve the minimum Surface roughness. It will investigate the process parameters, cutting speed, feed rate and depth of cut on cutting parameter during turning operation. Mainly surface roughness where investigated employing Taguchi’s design of experiments with different cutting parameters of EN-31 Steel, MS, Aluminium of turning parameters with rake angles of 40 and optimized by S/N ratio. Read More...
|
M.E in Production Enginerring |
India |
266-270 |
70 |
Partial Replacement of Waste Foundry Sand by Fine Aggregate and Waste Ceramic Tiles by Coarse Aggregate in Concrete
-B. Rama Rao ; Ch. Anuradha
Concrete is one of the most vital and common materials used in the construction field. The current area of research in the concrete was introducing waste foundry sand (WFS) and waste ceramic tiles in the ordinary concrete. Waste foundry sand is the byproduct of metal casting industries which causes environmental problems because of its improper disposal. Construction industries requires huge amount of ceramic tiles and other ceramic for architectural appearance, the productions of which are drastically increased, due to this waste is also produce during handling and usage of ceramic tiles. An experimental investigation was carried out on concrete containing waste foundry sand (WFS) in the range of 0%, 10%, 20%, 30%, and 40% and waste ceramic tiles (WCT) in the range of 0%, 10%, 20%, 30%, and 40% by weight for M-25 grade concrete. Concrete was produced, tested and compared with conventional concrete in plastic state as well as in harden state for workability, compressive strength & split tensile strength. These tests were carried out on standard cube, cylinder for 7 and 28 days to determine the properties of concrete. Read More...
|
Civil Engineering |
India |
271-273 |
71 |
A Survey of Attacks on MANET
-Deepa Jain ; Poonam Bhattal; Dr. Sima
During this paper, we have a tendency to discuss security problems and their current solutions within the mobile ad-hoc network. Owe to the powerless way of the portable specially appointed system, there are various security dangers that bother the improvement of it .we have a tendency to initial analyze the most liable to attack within the mobile ad-hoc networks, that have created it a lot of easier to suffer from attacks than the standard wired network that area unit employed in past years. Then we have a tendency to discuss this most attack varieties that exist in mobile ad-hoc network. Finally we have a tendency to survey the present security solutions for the mobile ad-hoc network. Read More...
|
Computer Science |
India |
274-277 |
72 |
Design and Analyze the Impact of Photo Detectors with RZ and NRZ Encoding Scheme 40 Gbps Radio Over Fiber Link
-Deepika Singh ; Swatantra Tiwari
For high capacity transmission such as broadband we require high speed. Therefore a combination of radio frequency with optical fiber is proposed known as radio over fiber. [1, 2] With the advent of this technique the system cost reduces because there is no need to design uplink and downlink. The application of radio over fiber includes cable television, network design, and uplink and downlink design and in satellite base station. In this paper, we design a Radio over fiber communication link with suppressed carrier amplitude modulated RF signal. After modulation signal is transmitted to the optical fiber of 50 km. For simulation Optisystem 13 is used. The results are compared and analyzed with the help of eye pattern generated by the BER analyzer. The input and output optical spectrum is studied with the help of optical analyzer whereas the RF signal is analyzed with the help of RF analyzer. Read More...
|
Electronics & Communication Engineering |
India |
278-280 |
73 |
ICT and Digital Divide : An Indian Perspective
-Dr. Sachin Patil ; Dr. P. N. Razdan
This article discusses initiatives made in India towards digital access to information and the role of several programs in bridging the digital divide. It also include the far reaching policy reforms of the government in agriculture and rural development, giving impetus to reform in the telecom and IT sectors. Findings from these research studies have indicated small positive effects and consequently a need for more in-depth and longitudinal studies into the impact of ICT on learning in the future. Read More...
|
Management |
India |
281-285 |
74 |
A Survey on Efficient Anomaly Detection in Network Data Stream(Outlier)
-Priti G. Manekar
Outlier Mining is an important task of discovering the data records which have an exceptional behavior comparing with other records in the remaining dataset. Outliers do not follow with other data objects in the dataset. There are many effective approaches to detect outliers in numerical data. Most of the earliest work on outlier detection was performed by the statistics community on numeric data. But for categorical dataset there are limited approaches By using memory efficient incremental local outlier (MiLOF) detection algorithm and ROAD (Ranking-based Outlier Analysis and Detection algorithm). Read More...
|
Computer Science and Engineering |
India |
286-288 |
75 |
A Survey on Implementation of Graphical Authentication System for Resisting Shoulder Surfing
-Sonali Bhandurge ; Prof. Arati Dandavate
Authentication based on passwords is utilized to a great extent as a part of utilizations for computer security and protection. In any case, human activities, for example, picking bad passwords and inputting passwords in an uncertain way are viewed as "the weakest link" in the validation chain. As opposed to self-assertive alphanumeric strings, users have a tendency to pick passwords either short or significant for simple remembrance. With web applications and portable applications heaping up, individuals can get to these applications at whatever time and anyplace with different devices. This advancement brings extraordinary comfort additionally expands the likelihood of presenting passwords to shoulder surfing attacks. Attackers can watch straightforwardly or use outer recording devices to gather users' accreditations. To beat this issue, we proposed a novel authentication framework PassMatrix, bsed on graphical passwords to oppose shoulder surfing attacks. With a one-time valid login indicator and circulative horizontal and vertical bars covering the whole extent of pass-images, PassMatrix offers no clue for attackers to make sense of or tight down the password even they lead various camera-based attacks. Read More...
|
Computer Engineering |
India |
289-292 |
76 |
Spatial Query on Objects' Geometric Attributes
-B. Mounika ; P. Mahipal Reddy
We create a new access method known as the spatial inverted index that stretches the traditional inverted index to deal with multidimensional data, and includes calculations that may answer nearest neighbor queries with key phrases instantly. Today, many modern programs demand novel types of queries that goal to locate objects satisfying both a spatial predicate, along with a predicate on their own connected texts. A spatial database manages multidimensional objects, and offers immediate access to individuals objects according to different selection criteria. Our goal would be to let each block of the inverted list be directly a leaf node within the R-tree. This really is as opposed to the choice approach of creating an R-tree that shares nothing using the inverted list, which wastes space by duplicating each reason for the inverted list. For instance, rather than thinking about all of the restaurants, a nearest neighbor query would rather request district that's the nearest among individuals whose menus contain “steak, spaghetti, brandy†all simultaneously. Conventional spatial queries, for example range search and nearest neighbor retrieval, involve only conditions on objects’ geometric qualities. Presently the very best means to fix such queries is dependent on the IR2-tree, which, as proven within this paper, includes a couple of deficiencies that seriously impact its efficiency. As verified by experiments, the suggested techniques outshine the IR2-tree in query response time considerably, frequently with a factor of orders of magnitude. Read More...
|
Computer Engineering |
India |
293-295 |
77 |
A Study of Active and Passive Attacks in MANET
-Sonia Verma ; Jigyasa Sharma; Dr. Sima
MANET (Mobile Ad-Hoc Network) is self-created and self structured by a collection of mobile nodes, interrelated by multiple-hop wireless paths in a strictly peer to peer style. DSR (Dynamic Source Routing) is an on-demand routing protocol for wireless ad hoc networks. Route caches in intermediate mobile node on DSR are used to reduce flood of route requests. But when the size of the network increase, node mobility and local cache of every mobile node cached route quickly become old or inefficient. The other major problem of DSR is that the route maintenance method does not locally repair a broken link and old cache information could also result in inconsistencies during the route finding and rebuilding phase. So to deal this problem, we have proposed an optimized cache coherence handling method for on -demand routing protocol (DSR). Read More...
|
Computer Science |
India |
296-298 |
78 |
Embedded System for Monitoring and Control of Baby Incubator and Warmer with Local and Remote Access Features
-Ms. Nidhi Y. Agresara ; Dr. Divyang D. Vyas; Prof. Bhavesh S. Bhensdadiya
Telecommunication and information technology in healthcare can substantially improve the quality of care delivery system. Use of these technologies can help to change the approach from reactive to proactive healthcare. Further, bounds of distance and cost are reduced to cater more number of people at affordable costs. Incubators and radiant warmers are very common medical equipment used in neonatal hospitals. These are primarily heating devices that are used to keep newborn babies warm and help them to achieve thermoregulation in order to prevent diseases related to hypothermia. In this paper, design of a low-cost system for monitoring and control of incubator and radiant warmer is discussed. Vital parameters like air and body temperature, heart rate and humidity level are continuously measured. On basis of this a servocontrol is implemented to regulate the heat output of the heating element in the machine to maintain a constant temperature. Facility is provided to monitoring and control the machine locally using a touch screen based operators console as well as remotely over internet. A dedicated web server maintains the data in real time and give access to doctor or any authorized medical personal to monitor and control the machine. Facility is also provided to generate alarm both locally in terms audible notification and remotely in terms of a SMS. Completed system has been designed on Arduino Mega platform. Proposed system does not incur substantial rise in the cost compared to cost of existing machines without such facilities and is certainly a cheaper solution compared to such high-end machines available in market. Read More...
|
Electronics & Communication Engineering |
India |
299-304 |
79 |
An Optimization of Process Parameters of Friction Stir Welded Joints AA 6063 Aluminium Alloys by Taguchi OA L9 Method
-Manglinder Singh ; Gurdeep Singh Grewal; Gurlal Singh
Friction stir welding is widely used in joining aluminum alloys in industries, especially, the shipbuilding, aerospace, mass transportation and automotive and other commercial importance. This process is considered as its energy efficiency, environmental friendly and versatility. Friction stir welding was carried out using a vertical milling machine on aluminum 6063 alloy. The tool material and geometry were carefully chosen and prepared using lathe machine. important process parameters that control the quality of the weld and rotation speed (rpm), transverse speed (mm/min), tool depth (mm) and tool tilt angle and these process parameters were optimized to obtain defect free welding joints.it is observed that, during the friction stir welding, extensive deformation takes place at the nugget zone and the evolved microstructure properties of the joint. The aim of present study is to understand the strength, quality of fsw and mechanical properties and micro structural changes of the friction stir welded joint. In this research L9 orthogonal method is used to find out the optimum values of tensile test, Micro Vickers hardness Test and microstructure test. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
305-311 |
80 |
A Survey on Security in Tag based Image Search with De-duplication in Social Re-ranking
-Rahul Ghode ; Prof. Bharati Kale
Social media sharing sites like Flickr permit users to clarify images with free tags, which fundamentally add to the advancement of the web image retrieval and association. Tag-based image pursuit is a vital technique to discover images contributed by social users in such social sites. Notwithstanding, how to make the top positioned result significant and with assorted qualities is challenging. In this paper, we propose a social re-ranking framework for tag-based image retrieval with the thought of image's pertinence and assorted qualities. We go for re-ranking images as indicated by their visual data, semantic data and social clues. The underlying results incorporate images contributed by various social users. Typically every user contributes a few images. In the first place we sort these images by inter-user re-ranking. Users that have higher commitment to the given query rank higher. At that point we successively execute intra-user re-ranking on the positioned user's image set, and just the most significant image from every user's image set is chosen. These chose images form the last recovered results. We assemble an upset file structure for the social image dataset to quicken the looking procedure. Read More...
|
Computer Engineering |
India |
312-315 |
81 |
Design and Analysis of a Dual Axis Solar Tracking System using LABVIEW
-Mohit Sharma ; Chandra Shekhar Gautam
In country like India demand of energy enhance with enhance in population so the exploit of renewable and natural sources of energy like wind energy, tidal energy, solar energy etc is the necessity of time in country. In this paper we present development and experimental study of two axis control of solar tracking system (STS) exploiting Arduino. The application of a portable STS is implemented to increase energy generation of the photovoltaic (PV) panels, results and analysis based on simulation of national Instruments (NI) 2016. Read More...
|
Electronics & Communication Engineering |
India |
316-322 |
82 |
Role of Automatic Fire Alarm Systems and Fire Extinguishers in Designing Urban Buildings
-H. Chinna Saidulu
Catastrophes concerning fire are an inordinate risk to human life and property. Ascribed to the lack of knowledge on fire safety among people, building fire safety at the present has progressively established its significance. Several approaches to avert fire have been undertaken. Fire safety systems such as automatic fire alarms deliver instantaneous automated surveillance and monitoring of the fire accidents, triggering an alarm indicating fire while fire extinguishers put off fire instantaneously. The fire alarm systems detect the signs of fire such as smoke and generate correspondingly a prompt alarm triggering an evacuation immediately and employing fire extinguishers such as water sprinklers or a call to the fire safety personnel, thus aiding in reduction of the damage caused to human lives as well as the buildings. Attributed to rapid urbanization, a myriad number of buildings are on a rise necessitating a large amount of fire safety systems to be devised that regularly check for smoke and an increase in temperature. This paper reviews and emphasises the use of fire safety systems and emergency response systems that must be adopted leading to a safe environment. Read More...
|
Architecture & Planning |
India |
323-327 |
83 |
Traffic Regulation using Stream Data for Smart City
-Dr. R. Sabitha ; Sudharsan S; Soundarya S; Shunmugha Anand S; Sabarish V. R
Traffic is one of the major problem in the current scenario. In order to control traffic, stream data mining can be used. Data mining is applied to gather the details of road where traffic occurs, these information are stored in the database. From the database the patterns are matched and the reason for traffic is identified and the solution is given by suggesting the alternative roads. Complex Event Processing (CEP) is used for continuous processing of dynamic data in order to detect the relevant information and provide support for timely reactions as soon as possible. The main purpose of a CEP engine is to detect the occurrence of event patterns on the incoming streaming data. Read More...
|
Computer Science and Engineering |
India |
328-330 |
84 |
A Study on Segmentation Techniques for MRI
-R. Neela
Image segmentation algorithm plays a role in biomedical imaging applications such as the quantification of tissue volumes diagnosis, localization of pathology study of anatomical structure, treatment planning, partial volume correction of functional imaging data, and computer integrated surgery. Various image segmentation techniques are discussed in this paper. Results of various segmentation techniques are compared. Multi atlas based methods gives best segmentation results. Read More...
|
Computer Applications |
India |
331-333 |
85 |
A Survey on Implementation of Secure ID2S Password-Authenticated Scheme based on Key Exchange Protocols
-Sonam Gupta ; Prof. Arati Dandavate
In two-server password authenticated key exchange (PAKE) protocol, a client parts its password and stores two shares of its password in the two servers, individually, and the two servers then collaborate to verify the client without knowing the password of the client. In the event that one server is exchanged off by a foe, the secret key of the client is required to stay secure. In this paper, we display two compilers that change any two-party PAKE protocol to a two-server PAKE protocol on the premise of the identity based cryptography, called ID2S PAKE protocol. By the compilers, we can build ID2S PAKE protocols which accomplish verifiable verification. For whatever length of time that the fundamental two-party PAKE protocol and identity based encryption or mark plot have provable security without arbitrary prophets, the ID2S PAKE protocols built by the compilers can be turned out to be secure without arbitrary prophets. Compared with the Katz et al's. two-server PAKE protocol with provable security without arbitrary prophets, our ID2S PAKE protocol can spare from 22% to 66% of calculation in every server. Read More...
|
Computer Engineering |
India |
334-337 |
86 |
A Survey on Securely Mining UARSTP with Recommendation System in Document Streams
-Varsha Ohol ; Prof. Arati Dandavate
Textual documents made and appropriated on the Internet are perpetually changing in different structures. The vast majority of existing works are committed to theme demonstrating and the development of individual topics, while consecutive relations of topics in progressive documents distributed by a particular user are overlooked. In this paper, so as to describe and recognize customized and abnormal behaviors of Internet users, we propose Sequential Topic Patterns (STPs) and plan the issue of mining User-mindful Rare Sequential Topic Patterns (URSTPs) in document streams on the Internet. They are uncommon overall yet generally visit for particular users, so can be connected in some real-world situations, for example, real-time observing on abnormal user behaviors. We exhibit a gathering of algorithms to explain this imaginative mining issue through three stages: preprocessing to separate probabilistic topics and distinguish sessions for various users, creating all the STP applicants with (expected) bolster values for every user by example development, and selecting URSTPs by making user-aware rarity analysis on determined STPs. Read More...
|
Computer Engineering |
India |
338-341 |
87 |
A Study on Social Media Applications into Geo-Distributed Multi Clouds
-E. Chinnarasu ; H. Lookman Sithic
Social media applications are dominating the internet. A geo-distributed cloud is model for supporting large-scale social media applications with dynamic contents and demands. The defy lies in storing and relocation of the contents dynamically from different cloud and distributing them. This paper study the Cloud Rank Algorithm (CRA) for lively, optimal scaling media applications in a geo-distributed cloud. Group of geo-distributed cloud services is a trend in cloud computing which, by spanning multiple data centers at different geographical locations, can provide a cloud platform with much larger capacities. Such a geo-distributed cloud is ideal for supporting large-scale social media streaming applications with dynamic contents and demands, owing to its abundant on-demand storage/bandwidth capacities and geographical proximity to different groups of users. By exploiting social influences among users, this paper proposes efficient proactive algorithms for dynamic, optimal scaling of a social media application in a geo-distributed cloud. The QoS of the OSN service is better if more users have their data hosted on clouds of a higher preference. Read More...
|
Computer Science |
India |
342-345 |
88 |
Manufacturing and Characterization of Fiber Reinforced Polymer Composite Propeller Shaft
-K. Vinoth Kumar ; K. Vinoth Kumar; Kaza Sri Sai Sravan; Kari Naga Nikhil; Kakollu Manoj Kumar
The ultimate purpose of the project is to manufacture a composite shaft using lathe machine (conventional method). For this process, we have designed a special lathe attachment over which our fiber will be worn over. We use a E- glass fiber and the solution is a epoxy resin mixed with hardner. Intially the fiber is taken to the required amount and weighed. The equitant amount of epoxy resin is weighed. Then 10% of weight of hardener to epoxy resin is mixed. The lathe attachment consists of a resin bath in which the resin is poured. The fiber is made to dip into the resin bath, so that the fiber is completely covered with resin. On the other end of the attachment , the fiber with resin is taken out and rolled over the mandrel ( stainless steel rod of required dimension ) .The mandrel is imtially wound with butter paper and coated with wax ( For easy removal). As the fiber to the rolled over the mandrel with engage the tool post with lead screw. The required gear attachment for the lead screw speed is set. The Lathe is rotated at the least speed. The required number of windings on the mandrel is given by moving it back and forth. Them the mandrel is removed from the chuck and made to dry. After this process, the mandrel is removed by taking out the butter paper. We get a hallow shaft which is made by compound material i.e. fiber and epoxy resin. The product is of improved strength and is used for the replacement of propeller shafts. This is a conventional way of fabricating a composite shaft with the help of lathe machine. The design of part of it is the special lathe attachment. Read More...
|
Mechanical Engineering |
India |
346-350 |
89 |
Overview of Network Simulators
-N. Aravinthan ; K. Geetha
One of the most challenging tasks in the network research area is the network establishment in a real time scenario. Thus, Network simulation is a modern technology introduced for estimating the behavior of networks on a computer. Network simulators are utilized for evaluating new theories and hypotheses. There are various network simulators developed based on different features like range, nodes, link between nodes, traffic, graphical applications and programming oriented tools. This paper provides a brief explanation about different network simulators and compares them based on their running time and memory usage found in the literature. Read More...
|
Computer Science |
India |
351-354 |
90 |
A Network Lifetime Enhancement with Secure Routing in Wireless Sensor Networks
-Lalitha ; P. Sasikumar
In the wireless sensor network the protocol are desired to be designed with security in mind from scratch. Regarding the limited nature of the network nodes, the protocol design should include the efficient reserve careful method and data route security. In the incidence of stochastic errors such algorithm should produce estimate which are close sense. To identify the collusion and compromised attack based on the iterative filtering algorithm. It should be supposed to be close up to the difference of the Maximum Likelihood Estimator (MLE). Iterative filtering is done followed by bias and variance estimation. However, such assessment should be achieved with no supplying to the algorithm the variances of the sensors, engaged in practice. Proposed iterative filtering algorithm should give the reliable measures in the attendance of non-stochastic errors, such as faults and malicious attacks inside aggregating data; such algorithm should also provide an assessment of the dependability and fidelity of the data received from the sensor nodes to the optimal ones in information theoretic. This algorithm is implemented in the deployed sensor network for against the compromised attacker present in the network that can more vulnerable to the network. Read More...
|
Computer Science and Engineering |
India |
355-358 |
91 |
Reconstruction and Matching of Fingerprint from Minutiae to Image
-Utkarsha Aher ; Sudesh Gupta
FINGERPRINTS are ridge and valley patterns present, on the surface of human fingertips. The set of minutia points is widely used in fingerprint matching and fingerprint representation. To reconstruct the original fingerprint image from which minutiae were extracted, it was believed that the minutiae set do not contain sufficient information. To reconstruct fingerprint images from their minutiae representations, recent studies have shown that it is indeed possible. Improving the template interoperability, and improving fingerprint synthesis, reconstruction techniques demonstrate the need for securing fingerprint templates. The need for securing fingerprint templates, improving the template interoperability, and improving fingerprint synthesis, Reconstruction techniques demonstrate. The matching performances obtained from original fingerprint images and reconstructed fingerprint images there is there is a large gap between the matching performance fingerprint images. To improve the fingerprint reconstruction, the prior knowledge about fingerprint ridge structures is encoded in terms of orientation patch and continuous phase patch dictionaries. While the continuous phase patch dictionary is used to reconstruct the ridge pattern, the orientation patch dictionary issued to reconstruct the orientation field from minutiae. Experimental results on three public domain databases demonstrate that the proposed reconstruction algorithm outperforms the state-of-the-art reconstruction algorithms with respect to type-I attack (matching the reconstructed fingerprint against the same impression from which minutiae set was extracted) and type-II attack (matching the reconstructed fingerprint against a different impression of the same finger). Read More...
|
Electronics & Communication Engineering |
India |
359-362 |
92 |
Optimized Video Traffic Routing
-Kavya S ; Vineeth M. V
Video streaming applications depend cloud storage for operating geo distributed services. So that live video traffic can be relayed between end users at higher throughput. Inter data center wide area network is used for this purpose. Inter data center networks are not only used for relaying live video traffic but also used for storage and email services. Unlike prior work that mainly aims to optimize delay of video traffic routing, this work aims to improve user’s quality of experience and minimize total cost of video distribution. Read More...
|
Computer Science and Engineering |
India |
363-365 |
93 |
Study of Dynamic Source Routing Protocol Using Different Secure Technique In MANET
-Akhilesh Kumar Tripathi
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. When using source routing, each packet to be routed carries in its header the complete, ordered list of nodes through which the packet must pass. The aim of this paper is to provide different way that secures routing in mobile ad hoc network based on Dynamic source routing. Read More...
|
Computer Science and Engineering |
India |
366-369 |
94 |
Soution of Economic Load Dispatch Problem using Jaya Optimization Algorithm
-Sudhir Phulambrikar
Demand in electric energy is increasing day by day. The production cost is also increasing. The biggest task is how to minimize electric energy production cost. Economic load dispatch is one of the solution. Economic load dispatch gives solution, how to schedule generation for required load demand so the fuel cost should be minimum. The economic load dispatch problem is a highly nonlinear constrained optimization problem, constraints are equality and inequality both. In this paper evolutionary methods are applied to find out generation schedule using Bare-Bone Particle swarm optimization, Teaching Learning based and Jaya optimization algorithms are applied to find out solution of economic load dispatch problem and their results are compared. Read More...
|
Electrical Engineering |
India |
370-375 |
95 |
Implementation of Random Number Generator in FPGA
-Ku. Pallavi V. Bhaskar
A pseudo random number generator (PRNG) is also known as a deterministic random bit generator(DRBG). It is an algorithm which generates a sequence of random numbers. This paper presents an implementation of pseudo random number generator. The design is specified in VHDL and is implemented on altera FPGA device. It is based on the Residue Number System (RNS). It gives us the way to design a very fast circuit. This paper presents design and implementation of a pseudo-random number generator which is based on Blum Blum Shub, XOR Shift, Fibonacci series and Galois LFSR methods. We have demonstrate that how the introduction of application specificity in the architecture can deliver huge performance in terms of area and speed. The design is specified in VHDL and is analyzed on altera FPGA parameter. Which has given us higher throughput and also the parameter like area, propagation delay and power requirement. Read More...
|
Electronics and Telecommunication Department |
India |
376-380 |
96 |
Design a Free Space Optical Link for 32x40 Gbps (1 Tbps) System with Dispersion Compensation Mechanism over 5 Km
-Shakti Khare ; Neha Vaishampayan
With the increasing demand of internet, communication engineers move forward to new communication system known as optical communication. With the advent of optical communication we are able to design a high speed internet with a minimum speed of 10Gbps/sec and the maximum speed up to 160Gbps/sec. (1, 2) The challenge is to handle the issue of chromatic dispersion and attenuation. Another important issue to design a WDM system is cabling. To overcome these cable problems we can move forward to free space optics (FSO) which gives high data rates and also low costs and having easy maintenance which gives as an end user solution. The goal of this paper to design a free space optical link for 32×40Gbps (1Tbps) system with dispersion compensation mechanism over 5 km. The analysis is done on the basis of eye pattern obtained after simulation on Optisystem software. In this paper we design a free space link with 32 channels and also controlled chromatic dispersion by introducing pre compensation and fiber Bragg grating. Read More...
|
M.Tech(Digital Electronics) |
India |
381-384 |
97 |
Image Denoising using Vectorial Total Variation Method
-V. Rabila ; G. Bharatha Sreeja
In this paper, Vectorial Total Variation method is considered to denoise the image. VTV method is proposed to minimize the total variation of an image. VTV method is used to reduce the number of iterations to reach the final output. In VTV method Chambolle’s projection algorithm is used. Performance of VTV method is compared using the parameters such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE). The performance of Vectorial Total Variation (VTV) method is analysed with the existing method. Read More...
|
Communication Systems |
India |
385-387 |
98 |
Image Denoising Using Non-Local Means Algorithm
-V. Rabila ; G. Bharatha Sreeja
Various methods are used to remove the noise from the digital images, such as Median filtering, mean filtering, Gaussian filtering anisotropic filtering, Vectorial total Variation (VTV), etc. Many of the algorithms removes the fine detail and structure of the noise along with the noise because assumption are made about frequency content of an image. In this paper, non-local means algorithm is proposed to overcome the drawback of existing methods. Non-Local means algorithm take the value of group of pixels surrounding the target pixel to smooth an image. The performance of non-local means algorithm compared with the existing method. Read More...
|
Communication Systems |
India |
388-390 |
99 |
A Contemplate on Security and Privacy of Electronic Health Records
-S. Dhivya ; G. Kumaresan
Data Security and privacy plays a crucial role when comes to electronic health records as it contains sensitive information. Data Security is referred to as the confidentiality, availability, and integrity of data. It is also referred as, the practices and processes that are in place to ensure data isn't being used or accessed by unauthorized individuals or parties. Data security ensures that the data is protected and reliable and is available when those with authorized access need it .Data Privacy is the appropriate use of data. When it is given to trusted sources, the data should be used according to the stated purposes. This paper presents a review of various security and privacy measures for Electronic Health Records. Read More...
|
Computer Science and Engineering |
India |
391-393 |
100 |
Study of SPIN Relaxation and SPIN Transport of Electrons in Ferromagnetic Material - Review
-Dr. E. N. Ganesh
The review paper describes a new era of devices based on spintronics. Spintronics devices exploit the electron’s spin or magnetic moment to perform their functions. Unlike conventional charge based semiconductor electronic devices, which works on charge injection, transport, and controlled manipulation, spintronics device specifically exploits spin properties. These properties are exploited by adding the spin degree of freedom to conventional charge based electronic devices or using spin alone to yield potential advantage of non-volatility, increased data processing speed, decreased power consumption, and increased integration densities. Read More...
|
Electronics Engineering |
India |
394-398 |