No. |
Title and Author |
Area |
Country |
Page |
201 |
Importance of Traffic Management During Execution of Metro Rail Project in India
-Preyansh Gupta ; Prof. M. R. Apte
Most of the infrastructure projects in India run into trouble due to managerial factors rather than technical problems. The negligence in the overall management strategies not only affects the project time and cost but also to the community and the surrounding environment. Construction of large infrastructure project like Metro Rail Project is of prolonged duration of 10-15 years in an upcoming metro city. We all know that these projects are for social welfare through providing public transport facilities but for such a long tenure of actual execution work on roads, we totally neglect about systematic management strategies not to cause inconvenience to the commuters around. In this research paper we are going to analyze the freeway and arterial road congestion and the out turns of execution work to the surrounding society experiencing actual site conditions. Traffic characteristics and the standards designed will support this research work. Hence as a duty of civil engineer, suggesting some traffic diversion strategies as well as following some other useful norms can help to curtail the current trouble faced. Read More...
|
Civil Engineering |
India |
824-829 |
202 |
Advance Key Management Approach for Security in WSN
-Falguni Saxena ; Prof. Ketan Patel
Wireless Sensor Network has higher count of tiny sensor nodes in network. To perform the operations such as data transfer, communications, token transfer etc. at each node requires energy. With study of various research work for secure communication between Ch to Node and Ch to BS, we founded Certificate-Less Effective Key Management (CLEKM) protocol has better energy effective and secure routing. There are main four keys are discussed, the Cluster Head (CH) which has cluster key for the purpose of forwards message's inside the cluster. Pair-wise key shares the key to every node present in neighbor. The collected information is forwarded securely to base station by making use of individual key. When asymmetric schemes are used, maintenance of keys is easier, but they provide a lesser degree of security when compared to symmetric encryption schemes. In order to cope up with these shortcomings, we propose to use an improved version of the hybrid encryption scheme, which is a combination of Advanced Encryption Standard (AES) and Elliptical Curve Cryptography (ECC) with cross encrypted keys for secure key exchange and node authentication and hybrid encryption for enhanced cipher-text security. Read More...
|
Computer Engineering |
India |
830-834 |
203 |
Multimodal Biometric Image Security using Steganography and Watermarking
-Sonali Kesharwani ; Neelesh Mehra
Data hiding is the key factor in secure communication today, Because of duplication and data manipulation. With the help of data hiding, that we can make our personal and important data will ensure against activities without authentication. Due to the availability of low-cost editing tools, any user can easily copy, modify, and retransmit digital data over the network. It could also cause a social disorder if digital media content, such as confidential government documents, court evidence or other important information, is maliciously manipulated. To effectively support the growth of multimedia communications, it is essential to develop tools that protect and authenticate digital information. Steganography, watermarking and cryptography of such types of methods are used to hide data in secret communications. In this proposed work use a lossless data hiding technique using watermarking and steganography together, so that achieve high security that provides a higher level of security and authentication of data without loss. Combination of watermarking and steganography techniques used to get multiple layers for hiding personal information. With the help of watermarking algorithm we are embedding the user personal information within the image. The embedding and detection method of the watermark technique used the DWT transformation. Watermarked image and secret image hide within the original cover image through steganography. The most Common use of steganography is to hide a file in another file. Discrete Wavelet Transform (DWT) method is used to obtain frequency domain analysis of the image. Read More...
|
Electronics & Communication Engineering |
India |
835-840 |
204 |
Women Safety Using Bluetooth Remote Shutter
-Brijeshkumar Umeshchandra Patel ; Archana M Nayak; Kaushik S Patel; Kevadia Kaushal T.; Mihir A Mishra
The Women Safety application is mainly developed for women Security. Today women are not secure in our country, using emergency alert for women safety in emergency situation women can send direct/alert message with their location to their relatives and family members by pressing Bluetooth Remote button. In this application that ensures the safety of women. It reduces the risk and helps us in need by identifying the location of person who is in danger. Read More...
|
Computer Engineering |
India |
841-843 |
205 |
Construction Material on Mars
-Nilesh Sushant Biswal ; Rushikesh Ravindra Badnakhe; Sanket Ganeshrao Sawarkar
As we tend to all apprehend that our planet earth is in solar system that is at intervals a galaxy referred to as "Milky Way". Our solar system includes sun and its eight planets that are believed to own been developed as result of condensation of gases and Mars seems ruby red from earth as result of presence of iron oxides. Its skinny atmosphere comprise of nitrogen and argon. Mars movement among and seasonal cycles among are likewise almost like those of the planet. Of all the planets in our solar system, mars are possibly apart from earth to harbour liquid water. Radius of mars is 0.53 times of earth .its rotation time is 24.6 hours and revolution period is 687 days. A significant step in space exploration throughout the twenty first century is human settlement on mars. While thinking about human settlement on mars question arises in mind which construction material will be good and economical, Rather than transporting all the construction material from earth to the mars with improbably high price exploitation. So in this paper we have explained various construction materials and have compare their effect on earth and mars and also have tried also tried to explain which of them will show good effect with Martian soil and surface. Thus reviewing all the construction materials we have tried to conclude and explain which material will be good on mars and why it will be so. Read More...
|
Civil Engineering |
India |
844-845 |
206 |
Voice Controlled Home Automation and Vehicle Motion
-Akash Rohila ; Akshay Saxena; Amitesh Singh
In the past few years, technology has grown at a high speed. Human lives have also become much more dependent on electronic devices and appliances. It has thus led to the idea of developing a home automation system. This paper is about home automation system which would use a smartphone with voice command recognition to enable any naïve user to operate all the appliances. The system has three major components: an Atmega 328 microcontroller for connecting the appliances, an ESP8266 wifi module, and a smartphone running the Android application designed for this home automation. The system also supports voice command for naïve users with command sensing by google apk development. It decodes the user’s voice command and extracts the exact meaning of his command. The paper focuses on the features and design of the wifi connected HAS. The whole design comprises of a wifi module (Atmega-328) embedded on the board to which all electrical appliances (Lights, fans) and vehicle are connected to this board using relays. The smartphone interacts with the Atmega 328 via the ESP8266 WIFI Module. The chief goal of the HAS development is to be economical and scalable according to the requirements. Password protection is being used for authentication via the wifi encryption. Read More...
|
Electronics & Communication Engineering |
India |
846-849 |
207 |
A Survey of Clustering Algorithms
-Janani ; R. Tamilselvi
Clustering is a technique of grouping similar data objects in one group and dissimilar data objects in other group. Clustering or data grouping is the key technique of the data mining. It is an unsupervised learning task where one seeks to identify a finite set of categories termed clusters to describe the data. Grouping of data into clusters aims to maximize the intra class similarity and also minimize the inter class similarity. The clustering techniques can be categorized into partitioning methods, hierarchical methods, density-based methods and grid-based methods. This paper aims to provide a brief overview and complexities of various clustering algorithms. Read More...
|
Computer Science |
India |
850-856 |
208 |
Design and Analysis of Centrifugal Pump by using CFD
-R. Dayakar ; U. Sridhar Reddy; N. Sampath
Centrifugal pumps are used to transport fluids by the conversion of rotational kinetic energy to the hydrodynamic energy of the fluid flow. The rotational energy commonly originates from a motor or electric engine. The liquid enters the direct impeller along or close to the pivoting hub and is quickened by the impeller, streaming radically outward into a diffuser or volute chamber (packaging), from where it exits. Basic uses incorporate water, sewage, oil and petrochemical pumping; an outward fan is normally used to actualize a vacuum cleaner. The capacity of the outward pump is a water turbine changing over potential energy of water weight into mechanical rotational energy. The purpose of this paper is to identify /observe and determine the pattern of velocity profile and pressure distribution by using CFD solid works simulation module by using non Newtonian fluids, such as olive oil, and slurry after the 3D design and modeling of the pump is made using solid works 2016 software. Basically, this paper revolves around the idea of investigating the effect and distribution of velocity profile and pressure within a pump by using water and non-Newtonian fluids. Read More...
|
advance manufacturing system |
India |
857-858 |
209 |
A Break Free Path for Ambulance using Speed Breaker
-M. Suresh ; R. Jones Rexiya; T. K. G. Santhosh; R. Vignesh
The most commonly used transportation is roadways. There are many vehicles passing day and night on roads. Since many are using the same way of transport, there is a risk of accidents everywhere. To safeguard the human's life from danger, the ambulance should be provided with a free path. Since the existing speed breaker system is not rotating, we have to slow down the speed of the ambulance near the speed breaker. It will not provide an easy path for the vehicle like the ambulance. It leads to delay in reaching the hospitals. The flat speed breaker system provides the brakeless path for the ambulance. This system consists of RF receiver and transmitter. The receiver receives the signal from the transmitter and makes the motor to rotate 180 degrees so that the flat path is formed for the ambulance and return back to normal position. Thus, the ambulance can reach the hospital very soon. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
859-861 |
210 |
E-Mail Classification Mechanism using Classifier of Data Mining Technique
-Laura S ; Arul Geeta G
Personal and industrial users desire to utilize email as one of the crucial resource of communication. The volume of business-critical emails maintain to grow, the need to computerize the management of emails amplify for numerous reasons, such as spam email categorization, phishing email categorization, and multi-folder classification, in the middle of others. We propose a novel method named as "Semantic Match" which enlarges a learning replica with the carry of WordNet Tool. The proposed Technique is competent of behaviour the extracted Futures resemblance and computation description such as correctness and complication. Here we will be by means of WordNet dictionary folder which affords a semantic dictionary for English. WordNet is a great lexical database of English. And also here we use the classification method of SVM and KNN to classify the E-Mails in an appropriate manner. Read More...
|
Computer Science |
India |
862-866 |
211 |
Investigation of Thermal Performance of Different Flow Channels using Finite Volume Approach
-L Rajeshwar Rao ; S. S. K. Deepak
These work carried out in the field of fluid flow and heat transfer through wavy and corrugated channel. Using computation CFD software namely ANSYS Fluent to solving the governing equation. The corrugated and wavy surface is mainly used in compact heat exchanger where advantage of different surface texture has been undertaken in order to enhance the thermal performance of the system. A CFD simulation have been performed for highly Turbulent flow and influence of surface texture has been visualized. The result clearly shows that the three channel straight, wavy, and corrugated, thermal performance and also shows the comparison between them, the wavy has better thermal performance. Read More...
|
THERMAL ENGINEERING |
India |
867-870 |
212 |
Theory of PI
-Hira K. Vankar
The research, the theory of Pi is not connected with economics activities, but it is a pure science & pure mathematics, which does not gain anything much to the society and does not motivate the economic activities like applied research. This research does not have much important to society in general, but can be useful to astronomy, astrophysics, space calculations, nuclear science, pure geometry and exact measurement of curved area, surfaces & volume with curved surface in physics only. The research, the theory of Pi uses the major tool as algebra, geometry, trigonometry, arithmetic, statistics & calculus with the help of even simple calculator, pc. , Main framed computer & super computer in the form of mathematical formulas and Computer programming. Present value of Pit -3.141592653589793238462643383279502884197169399375105820974944592307816406286209 is not correct at all. It is not the area of circle but it is area of regular polygon having infinite sides. Hence we create vertical line at equi-distance method and with the help of computer program UP09R that is based on our method, we calculate value of Pi that is 3.1416 which we have suggested is the area of circle and is rational & exact most probable number. Read More...
|
MATHEMATICS |
India |
871-874 |
213 |
Chicken Tractor
-R. Karthik Kumar ; M. Divya; M. Janani; V. Sudhakar
The main aim of this project is to develop a natural free ranging rearing system for chicken with automatic feeding and watering system. In the existing system the chickens are grown in a confined area in an artificial manner. We are proposing a movable on field coop, by which chickens are be reared naturally in open field and secured from predators using an enclosure. Pests and weeds in the field are controlled naturally by chickens rather than by using pesticides separately. Also the natural waste from the chickens goes as manure to the agricultural field which eliminates the need of using artificial pesticides and fertilizers to the field. Chicken manure is rich in nitrogen. Nitrogen is vital nutrient need for tree growth. The amount of feed needed for the chicken reduces eventually. The soil is naturally tilted by chickens and manure is directly applied to trees. In addition to this, automatic feeding and watering to the chickens is done without the use of electric power. After two days the chicken tractor is moved on to a new area, by this weed and pest control over entire field can be achieved. Having more number of similar system people can get natural protein rich food and it will increase the income of farmers. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
875-878 |
214 |
A Review on Security Threats from SQL Injection and Cross Script
-Aman Kundu
SQL Injection Attacks are comparatively recent threat to privacy, integrity & accessibility of all online requests & their technical infrastructure, secretarial for practically fourth of internet vulnerabilities. This review paper is fully based on a master thesis, & numerous references in that, we presented this study on anticipation of SQL Injections. Overview of future approaches & accessible way outs, & recommendations on defensive coding techniques for PHP-powered web applications & other situations. Then, analysis of McClure's SQL DOM approach is for safety of SQL Injections in object-oriented applications. Read More...
|
Computer Science and Engineering |
India |
879-881 |
215 |
Analyzing the Performance in Case of SQL Injection Secured and Unsecure Web Application
-Aman Kundu
In existing security system there is authentication at user level user id & password submitted by user is verified at login process end if user id & password exist then user would be able to access system. But some smart user usually uses SQL injection in order to violate security of database using wild character of SQL. They sometime use SQL statement too in order to get login process confused. They pass sub query of SQL in password field instead of password in order to get confirmation. Here we have to develop a secure system for authentication access & apply SQL INJECTION attack to check its security. Read More...
|
Computer Science and Engineering |
India |
882-884 |
216 |
A Study on Controlled Low Strength Material Bricks
-Ravi Kumar BS ; Pavan H D; Patil C B; Manjunatha G H; Nagaraj Matturapnar
Controlled Low Strength Material (CLSM), commonly referred to as flowable fill, has been used for years as a trench backfill, sub base preparation and to increase the SBC of soil by soil treatment. It is a low strength material in order to make bricks the ingredient materials percentage is varied to achieve more strength. Materials used are cement, GGBS, M- sand and Laterite soil with 0.8 w/c ratio. By varying material percentages 16 trial mix proportions were tested. Based on compressive strength test results four mix proportions were selected and bricks were casted. Strength parameters of CLSM bricks were tested. Brick having 20% cement shows high strength and all the bricks of different mixes satisfying IS standards and recommendation. Read More...
|
Civil Engineering |
India |
885-889 |
217 |
A Comparative Experimental Study on Effect of Twisted Tape Insert on Performance of Plane Steel Tube and 550 Corrugated Steel Tube DPHE
-Chetan Prakash Soni
The conversion, utilization and recovery of energy in every industrial, commercial and domestic application involve a heat exchanger process some common example are steam generation and condensation in power and co-generation plants, sensible heating and cooling of viscous media in thermal processing of chemical, pharmaceutical and agricultural products, refrigerant evaporation and condensation in air conditioning and refrigeration gas flow heating in manufacturing and waste heat recovery air and liquid cooling of engine of electrical machine and electronic devices. improved heat exchange of standard practice can significantly improve the thermal efficiency in such application as well as the economically of their design and operation. Double pipe heat exchanger (DPHE) is one of the most simple and application heat exchanger. This kind of heat exchanger is widely used in chemical food oil and gas industries. Double pipe heat exchanger is having a relatively small diameter and it is easy to fabricate as compare to helical tube and many more compact tube of heat exchanger. Commonly method used by the reaches to enhance the heat flow rate is active method, passive method and compound method and present work is based on passive method. In the present work experiment is carried out on plane double pipe heat exchanger and corrugated tube double pipe heat exchanger in which hot water is flowing though inner tube where cold water is flowing though the annulus and hot water to cold water heat exchange is taken in consideration. During the experiment cold water flow rate is kept constant at 45 LPH, where as hot water flow rate varies from 15 LPH to 75 LPH in all two cases........ Read More...
|
THERMAL ENGINEERING |
India |
890-893 |
218 |
Review of Monopole Microstrip Patch Antenna Design for Wireless Application for Handheld and Portable Device
-Minal Changadeo Sonawane
This paper depicts a review work on all about the monopole antenna, with come reconfigurable antenna used for handheld gadgets, such as, cell phone, tablet, portable PCs and so on. The LTE is (long-term evolution) that can give mobile broadband and multimedia services better than the GSM and UMTS systems. With the development of modern wireless communications, there is an increasing demand of compact, low profile, multiband monopole antennas. Recently, Wireless Local Area Networks (WLANs) and Worldwide Interoperability for Microwave Access (Wi-MAX) is extensively being used in commercial, medical and industrial sectors. In this paper comparative analysis of different monopole antennas on the basis of size, gain, bandwidth, VSWR and efficiency for different working bands such as LTE700/2300/2500, Wi-MAX (2.4/2.5/3.4-3.6/5/5.5/GHz) and WLAN (2.4/2.7/4.2/5-6GHz) etc. are presented. As well as we see that different techniques of switching using PIN diode or copper strip In this letter different techniques for improvement of bandwidth, gain, size and impedance of monopole antenna designs are discussed. Read More...
|
Electronics & Communication Engineering |
India |
894-904 |
219 |
The Research on File Encryption Method Based Honey Encryption Technique
-Pranjul Khandelwal
Mostly Users select the common passwords which is easy to guess and remember. Passwords are stored in the database in the form of cryptographic hash function and it's fully protected. There are many password cracking tools available which can easily crack these passwords when the passwords are weak. Weak passwords are not just the problem for hashing but also affect the security in Password-Based Encryption scheme where the message is encrypted through password. In this review paper we have studied Honey Encryption (HE) which is a new encryption scheme that provides flexibility and fix all the fails of AES against brute force attacks by ensuring that messages decrypted with invalid keys produce a valid-looking fake keys. Read More...
|
Computer Science and Engineering |
India |
905-906 |
220 |
A Survey Paper on Wireless Sensor Network
-Hina Tandel ; Prof. Rakesh Shah
Wireless Sensor Network stands as one of the most emerging technologies combining together sensing, computational capability and communication into minute devices proceeding towards whole new world of simplicity. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. There is a necessity of an intermediate software layer between the sensor hardware and the sensor network applications that may be termed as middleware. In wireless sensor network, a collection of small sensor nodes communicates through radio interface. Generally Wireless Sensor Network (WSN) consists of many distributed devices spatially, using sensors to monitor various conditions at various points, including temperature, sound, vibration, pressure, motion or pollutants. WSN acts as a mediator between the real physical world and the virtual world. Read More...
|
Computer Engineering |
India |
907-909 |
221 |
Keylogging-Resistant Visual Authentication Protocols
-Ravikant Jadhav ; Abhijit Gogre; Prof. Priyanka Mane; Devarsh Khedkar; Prabhakar Avhad
The design of secure authentication protocols is reasonably tough, considering that varied types of root kits reside in Personal Computers (PCs) to appear at user's behaviour and to form PCs untrusted devices. Involving human in authentication protocols, whereas promising, is not easy due to their restricted capability of computation and learning. Therefore, wishing on users to spice up security basically degrades the usability. On the alternative hand, quiet assumptions and rigorous security vogue to boost the user experience can end in security breaches which is able to hurt the users’ trust. Throughout this paper, we've got an inclination to demonstrate but careful image vogue can enhance not entirely the protection but together the usability of authentication. To that end, we've got an inclination to propose a pair of visual authentication protocols: one could also be a one-time-password protocol, and additionally the choice could also be a password-based authentication protocol. Through rigorous analysis, we've got an inclination to verify that our protocols unit of measurement proof against many of the tough authentication attacks applicable among the literature. What's additional, exploitation AN intensive case study on a model of our protocols, we've got an inclination to spotlight the potential of our approach for real world deployment: we've got an inclination to be ready to deliver the products a high level of usability whereas satisfying tight security wants. Read More...
|
Computer Engineering |
India |
910-912 |
222 |
Design of Horizontal Hydraulic Press Machine for G.S. Industries MIDC, Kamptee Road, Nagpur
-Sana Khan ; Prof. Khwaja Izhar Ahmad
Hydraulic press is a tool to produce compressive force by means of fluid. It depends upon Pascal’s principle that the pressure throughout an enclosed entity is constant. By means of hydraulic system larger forces can be produced in contrast with mechanical and electrical systems. Such forces can be used for the press work application such as blanking, punching, piercing, coining, trimming etcetera. In horizontal hydraulic press, the force generation, transmission and amplification are achieved using fluid under pressure. The liquid system exhibits the characteristics of a solid and provides a very positive and rigid medium of power transmission and amplification. Horizontal Hydraulic presses provide force through the use of fluid pressure on a piston by means of manual or powered pumping element. In a simple application, a smaller piston transfers fluid under high pressure to a cylinder having a larger piston area, thus amplifying the force. Read More...
|
M.Tech in Machine Design |
India |
913-916 |
223 |
Smart Cities: Solving Urban Problems using Android Application
-Pratik Prakashrao Bhoyar ; Shubham K Jadhav; Tushar H Patil; George L Tribhuwan
The modern world is experiencing a rapid increase in the growth rate of urban areas. Cities need to be more advance than ever to maintain the Quality of Life and the Quality of Services to the citizens. In this project, a three layered implementation model for smart city has been presented. Furthermore, a brief overview of smart city applications that is smart garbage collection, Solid Waste Management (SWM) and road network has been given. The smart city concept is a recent phenomenon that seems to be drawing so much attention from both academia and industry. With a rapid and alarming influx of migrants into urban areas the service delivery, traffic congestion to and from the city, Garbage Collection and Solid Waste Management has become a burning issue for both city managers and management. We are proposing the system which will help us to promote smart city concept. The proposed system is the first system in which user is also included. This system consists of User, Administrator, Contractor and news reporter or media. User will capture the image of issues (Garbage collection, Solid Waste and Issues related to road). After capturing image user will share that image with the Administrator. Administrator will take action on that issue that is tells contractor to resolve the issue. Contractor will send response to Administrator about the work done and that response will be sent to user by administrator. If Administrator doesn't send response in particular day's user will send information of issue to media. The proposed system is useful for promoting smart city concept. Read More...
|
Computer Engineering |
India |
917-918 |
224 |
Emergency Alert For Women Safety With Location Tracking Using Arduino
-Poonam Bedarkar ; Ms. Sayitri Radke ; Ms. Vrushali Raut ; Ms. Nidhi Larokar
According to the reports of WHO, NCRB-social-government organization 35%Women all over the world are facing a lot of unethical physical harassment in public places such as railway-bus stands, foot paths etc. In this project we are developing an advanced women security system which provides the safety measure in public places as well as travelling alone through public transports (school buses, company vehicle etc.). This project proposed a new model for the women security in public places which aims to provide the 100% safe environment. Read More...
|
Electronics Engineering |
India |
919-920 |
225 |
A Cyber-Physical System for Environmental Monitoring based on GPS
-Gaddam Nagarjuna ; K. Sridhatr
Different from the traditional embedded gadget or the real-time system, Cyber-Physical System (CPS) integrates computation with physical entities, making it smooth for humans to engage with the world that we stay. With the improvement of CPS, extra gadgets may be incorporated into the internet, specifically in the discipline of Environment Monitoring. Thus, the control and far off manage of gadgets motive issues for CPSs. Towards this end, we broaden a CPS via featuring a scalable, bendy structure in Environment tracking. The environment monitoring machine (EMS) includes 3 layers: bodily sensing layer, data delivery layer, records management layer. Generally, sensors and sensor hub which collects sensor information and transfer them to the upper layer make up of physical sensing layer. And the principle characteristic for records transport layer is to forward sensor records to the specified vacation spot. The ultimate layer is within the cloud, composed of a statistics processor and a understanding base. Data from bodily sensing layer can be analyzed because of the robust computation capacity of cloud computing. Read More...
|
Electronics & Communication Engineering |
India |
921-923 |
226 |
Student Portal with Cloud Compiler
-Rutuja Athawale ; Apurva Bandelwar; Rohini Dharmadhikari; Prof. J. P. Kshirisagar
In Labs of faculties, research laboratory administrator have to be compelled to install every and each software system like java and to take care of PCs. academician additionally conduct sessions and wish to rearrange every language sessions properly. It's terribly time intense and wastage of house for college students and college members. And wish to form arrangements for sessions every and each time. Thus Students sensible Portal helps to scale back the matter of storage and sessions arrangement. In student portal students will choose assignments prepare by school and might execute their codes on portal. Employees Members will schedule sensible and assignments on basis of university schedule. Teacher will share resource associated with assignments thus students will follow it. Student forum helps students to share their issues and sit down with academics and different students. Read More...
|
Computer Engineering |
India |
924-925 |
227 |
A Detailed Review of Data Mining Techniques in Healthcare Management Systems
-S.Nagendira ; S.Punithamary; R.Somasundara Manikandan
In the recent trends of the healthcare industry, data mining techniques play a significant role in prediction and diagnosis of the diseases. Generally, healthcare organizations generate and collect a large volume of data in patient details. So the increment of data volume automatically requires the data to be retrieved when the person needed. Usually, there are large numbers of data mining applications are found in the healthcare industry, such as medical device management systems, the pharmaceutical industry, and Hospital information management systems. The main purpose of the data mining applications in the healthcare industry is to find the useful and hidden knowledge from the database. This paper provides a detailed review of different data mining applications in the healthcare industry and to reduce the complexity of the study of the healthcare data transactions. This paper also gives a detailed comparative analysis of various data mining techniques which are concerned for extracting knowledge from the databases generate in the healthcare industry. Read More...
|
Computer Science and Engineering |
India |
926-928 |
228 |
A Systematic Process and Steps to Analyze Various Applications of PSO and Its Effective Implementation in Industries
-Cedrick B. Machado ; Anirudh Acharya A; Mamatha V; Sujay Pan; M Rajesh
This paper presents the particle swarm optimization (PSO) algorithm for solving the optimal distribution system problem for power loss minimization. The proposed methodology determines control variable settings, such as number of shunts to be switched, for real power loss minimization in the transmission system. The problem is formulated as a nonlinear optimization problem. The PSO is relatively new and powerful intelligent evolution algorithm for solving optimization problems. It is a population based approach. The proposed approach employs the PSO algorithm for the optimal setting of optimal power based on loss minimization (LM) function. The proposed approach has been examined. The obtained results are compared with those using other techniques in a previous work to evaluate the performance. Particles swarm optimization (PSO) has shown to be an efficient, robust and simple optimization algorithm. Most of the PSO studies are empirical, with only a few theoretical analyses that concentrate on understanding particle trajectories. This paper overviews current theoretical studies, and extend these studies to applications in mechatronics systems such as identification control, gains and optimization in design. Experimental results are provided to support the conclusions drawn from the theoretical findings. A new alignment method based on the particle swarm optimization (PSO) technique is presented. The PSO algorithm is used for locating the optimal coupling position with the highest optimal power with three degrees of freedom alignment. This algorithm gives interesting results without a need to go through the complex mathematical modeling of the alignment system. The proposed algorithm is validated considering particle tests considering the alignment of two Single Mode Fibers (SMF) and the alignment of SMF and PCF fibers. Read More...
|
Industrial Engineering |
India |
929-932 |
229 |
Postpaid Electronic Toll Collection System
-Mitesh Agrawal ; Gaurav Thakare; Dhananjay Chandanshive; Sameer Rajkonda
Road transportation plays necessary role within the move, good transportation, varied import and export sectors. But, these days there is a vast rush within the toll plazas so as to pay the toll tax. thus so as to reduce the hold up and to save lots of time conjointly to cut back the economical loss of India upto three hundred large integer rupees per annum, we are able to style the advance toll assortment system that accommodates automation in toll tax payment victimization RFID. The system can build the automation of piece of ground victimization combination of small controller, RFID, Load cell technology. The implantation of automation in piece of ground that could be a step towards rising the watching of vehicles, move in predetermine routes. The aim of our thought is to style a system, that mechanically identifies the approaching vehicles and record vehicles data that includes vehicle number, current time, owner’s information. If the vehicle is permitted, then the system mechanically opens the toll gate and bill of planned amount can mechanically fetch on house owners Web application. This translate to cut back holdup at toll plazas and helps in lower fuel consumption, scale back transportation time. Read More...
|
Computer Engineering |
India |
933-934 |