No. |
Title and Author |
Area |
Country |
Page |
51 |
Early Detection of Breast Cancer using Soft Computing
-Amjad Khan ; Zahid Ahmed Ansari
Breast cancer is the most harmful of all types of cancers that leads to the death of women. The initial screening test for breast cancer is made using Mammography. Masses, Calcification and Architectural distortion are the three major signs notable as causes for cancer recognized using mammogram images. Soft Computing methods provide solutions to biologically inspired problem of medical domain like breast cancer. Neural Networks, Fuzzy Logic and Genetic Algorithms contribute novel algorithms to deal with breast cancer. Breast cancer can be diagnosed using soft computing methods. The effective diagnosis of breast cancer can be achieved by using feature reduction and classification methods. The feature reduction method applied is Principal Component Analysis (PCA) and the classification method includes Support Vector Machines (SVM). The objective of this study is to improve the breast cancer early detection with the application of soft-computing techniques. Read More...
|
Computer Science and Engineering |
India |
181-184 |
52 |
Seismic Response of RC Elevated Water Tank with Different Types of Staging Pattern
-Poonam Ramesh Deshmukh ; Prof. P. S. Lande
Elevated water tanks are one of the main lifeline elements and are considered as the structures of high importance. It has large mass concentrated at the top of slender supporting structure hence extremely vulnerable under lateral forces due to earthquake, their serviceability performance during and after strong earthquakes is a matter of concern. The present work aims at checking the adequacy of water tank for the seismic excitations and to understand the behavior of supporting system which is more effective under an earthquake record for seismic zone IV. Different types of staging patterns with varying heights and cross sections are analyzed by using Non Linear Dynamic Time History analysis using E-tabs 2016 software. study is extended for different staging patterns i.e. Hexagonal and cross bracing, Square and radial bracing for staging height 16m and square column. Read More...
|
Structural Engineering |
India |
185-190 |
53 |
Perspectives of Wastewater Recycling and Reuse in Changing Global Climate: BMP's in Water Technology
-Dr. M. B. Chougule
Water is important to all living things. Now a days changing global climate has given rise to unreliable rainfall. Unpredictable and inadequate rainfall is a challenge to protect our water resources for future generation. We receive water through rainfall. This is very unfortunate that most of the water flows down the rivers and reaches the sea, thus it remains unused. We are a witness to the emptied and dried up rivers, ponds, wells and tube wells. Therefore water crisis is not new for any country. Recycled water is a reliable source of water that must be taken into account in formulating a sustainable water policy. Water reuse is increasingly been integrated in the planning and development of water resources in many countries. This paper focuses on various innovative approaches in wastewater recycling and reuse. Read More...
|
Environmental Engineering |
India |
191-194 |
54 |
Password Security Scheme Based on a Honeywords Generation through Hashiing Key and Salting Process
-Teena Kashyap ; Divya
The concept of authentication has evolved in the recent past from simple password based authentication to face recognition, voice recognition and biometric based authentication and so on. But, even after all these various evolutions, password based authentication remains the most widely used method. So, password protection schemes become very important in such cases. This has been a man area of research ever since the inception of word “Authenticationâ€. The researchers, in recent past, have deployed different techniques based on salting, hashing, quantum cryptography and split key methods. The base research by Binoj Koshy [4] describes a salting based hashing process called Chameleon Salting Hashing where he successfully implemented a password security scheme to prevent various attacks. In this paper, we propose an advanced hashing technique combined with salting to improve the security of passwords even though the intruder gets an access to the database. The hashing technique is based on some simple bit conversion methods making it highly efficient in terms of time consumption. The method involves creation of a blacklist as a result of many hashing processes conducted on the input password. Blacklist also known as honeywords list. Each hashing process is based on a different hashing key. The hashing key defines the sequence of actions defined in the hashing process, that take place on the input password. The base research had a major drawback in that it could not prevent brute force attack and also the salting based hashed technique was complicated and the time complexity was high for this. The proposed methodology has far lesser time complexity because it is based on simple bit operations in a 5 step process. The final results shown both numerically and graphically clearly demonstrate the efficiency of proposed technique against base methodology. Read More...
|
Computer Science and Engineering |
India |
195-199 |
55 |
Implementation of Linked Data using Massive Open Online Courses
-Miss. Vrundan Parode ; P. L. Ramteke
Linked Data involves web to create typed links between different sources of data. Source data may vary in location, size, subject-matter and how congruously it is structured. Links produced from this data create equality and define properties to make data easier to read for machines. Linked Data is relatively unexplored in the domain of education. Linked Up Challenge have surfaced to encourage innovative applications focused on open educational data Massive Open Online Courses or MOOCs are online courses accessible to anyone on the web. Many of institutions have joined in an archive to make education more accessible by synchronizing with MOOC providers such as Coursera and NPTEL Delivering course content through lecture videos as well as readings and problem sets, MOOCs encourage interactivity between professors and students around the world by way of discussion forums and graded assessments. For most information associated with their course catalog. This includes properties such as a courses title, instructor, and syllabus details. Although Coursera's course catalog data is easily accessible as JSON, there is no option to retrieve and use it in a Linked Data format such as the RDF .there is no Linked Data available for MOOCs or for ontology that represent properties unlike to MOOCs In order to incorporate MOOC data into the Linked Data cloud as well as demonstrate the potential of Linked Data when applied to education, we propose to (i) developed or extend an RDF ontology which denotes properties of MOOC .(ii)use ontology that generate Linked Data from different MOOC providers. Read More...
|
Computer Science and Engineering |
India |
200-202 |
56 |
A Survey on Current Video Surveillance Systems
-Sanket Walke ; Ashwin Kulkarni; Omkar Langhe; Shubham Marne; Sandip Mahajan
In today's world, surveillance plays an important role in securing property from various suspicious and intrusion activities. In such surveillance, technology plays an important role by making it easy for humans to gather information from surroundings at one place by using various electronic devices such as cameras, sensors and various monitoring devices. But search surveillance involves human interceptions to manage and control the system and makes the system dependable. Also to monitor and record the activity it is must to capture every frame and instance of movement. In The following implementation we use Surveillance Camera and Multi-sensor Data Fusion for improving detection, tracking and identification which also improves situation assessment and awareness. Also it provides spatial and temporal coverage, shorter response time and reduces communication and computing. Read More...
|
Computer Engineering |
India |
203-206 |
57 |
Inverter Controller Energy Storage System Based Soft Re-Closing of Industrial Power Network
-Najuka A Deogade ; Sagar B. Kudkelwar
Consequential damages, scrap losses, and motor starting in pour currents that cause voltage dips in near load centers, and breaker reclosing transients are avoided through the employment of this methodology. The soft-reclose method is accomplished by supply the plant with a voltage/frequency ramp whereas the network operates in islanded mode, then reclosing the service-entrance breaker once the plant network is matched in part and voltage to the utility grid. Voltage and frequency acceleration of the network are controlled by the electrical converter in line with the characteristics of the connected hundreds. The implemented model is tested with simulation victimization the ability system network that is representative of a plastic/rubber manufactory. The results show a big reduction in current spikes, voltage dips, motor force, speed, power issue fluctuations, and most vital, method period compared to a traditional manual restart method. Read More...
|
Electrical Engineering |
India |
207-210 |
58 |
Implementation of Image Processing System using Big Data in the Cloud Environment
-Amitha Supriya
Cloud computing is one of the emerging techniques to process the big data. Cloud computing is also, known as service on demand. Large set or large volume of data is known as big data. Processing big data (MRI images and DICOM images) normally takes more time. Hard tasks such as handling big data can be solved by using the concepts of hadoop. Enhancing the hadoop concept will help the user to process the large set of images. The Hadoop Distributed File System (HDFS) and MapReduce are the two default main functions which is used to enhance hadoop. HDFS is a hadoop file storing system, which is used for storing and retrieving the data. MapReduce is the combination of two functions namely map and reduce. Map is the process of splitting the inputs and reduce is the process of integrating the output of map’s input. Recently, medical experts experienced problems like machine failure and fault tolerance while processing the result for the scanned data. A unique optimized time scheduling algorithm, called Dynamic Handover Reduce Function (DHRF) algorithm is introduced in the reduce function. Enhancement of hadoop and cloud and introduction of DHRF helps to overcome the processing risks, to get optimized result with less waiting time and reduction in error percentage of the output image. Read More...
|
Computer Engineering |
India |
211-217 |
59 |
Secure and Efficient Based Terrific Trusted Transmission in Mobile Ad-Hoc Networks
-K Noel Binny ; G Vijaya
Mobile ad-hoc networks (MANETs) assume that mobile nodes voluntary cooperate in order to work properly Thus, the overall network performance could be seriously affected. Many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems... In this, we used RKP (Random Key Pre-distribution). We propose a key pre-distribution scheme that relies on probabilistic key sharing among nodes within the sensor network. Key pre-distribution is the method of distribution of keys onto nodes before deployment. Therefore, the nodes build up the network using their secret keys after deployment, that is, when they reach their target position. Secret keys are generated, placed in sensor nodes and each sensor node searches the area in its communication range to find another node to communicate. Read More...
|
Computer Science |
India |
218-226 |
60 |
Automatic Sensing and Alerting System of Speed Bumps in Speeding Motor Vehicles
-Rohith M N ; Santhosh Babu K C
A new flexibly reconfigurable hardware architecture for speeding Motor vehicles performance and scope are discussed. This paper presents the major impediments in automatically sensing and alerting of speed bumps or any obstructer lay on the highway roads. It provides an additional level of driver assistance, leading to improved safety for passengers and vehicles. By alerting about the presence of road bumps would reduce risks in situations of driving distraction, fatigue, poor sight and weather conditions. In this paper we try to develop an ASA system to provide the prior to accident information to the vehicle control unit so that it enables the vehicle to prevent the happening of accident. During the vehicle movements the system will continuously record the vehicle's moving. An Automatic speed control unit is also been incorporated in the vehicle such that speed control is maintained in case of rash driving. The new vehicle performance has been continuously improved and the study results relating to the safety of car driving have also been continuously reported and demonstrated. Read More...
|
AUTOMATION ENGINEERING |
India |
227-230 |
61 |
A Survey on Multi-Objective Decision Making on Vague Sets
-Rupali Rajput ; Vivek Jain
This paper provides report of a survey on the vague sets and also multi-objective decision making. As a further fuzzy set theory generalization, the vague set theory can overcome the fuzzy set shortcomings through defining the membership from two different sides of both FALSE and TRUE, rather than only through a value of a single membership. MCDM approach has evolved to accommodate numerous application types. Methods dozens have been developed, with even small variations in the existing approach causing the creation of research of new branches. The MCDM analysis approach performed in this paper provides a clear guide for how MCDM methods should be used in specific situations. Read More...
|
M.Tech Computer Science |
India |
231-235 |
62 |
Least Mean Fourth based Algorithm for Single-Stage Three-Phase Grid Integrated Solar Photovoltaic System
-N. Narasimhulu ; B. S. Kishore Kumar ; K. Swathi; Dr. R. Ramachandra
The objective of this paper is to develop model of least mean square fourth (LMF) based algorithm for single stage three phase grid connected photovoltaic (PV) system. The proposed LMF based control algorithm has been implemented for the harmonics extraction from the sinusoids. It is viewed as better from existing ordinary calculations (SRFT, IRPT and so on.) in ways that it includes straightforward calculation, simple to actualize as it influences utilization of basic mathematical blocks for computation though SRFT and IRPT to include complex squares, more steady, sets aside less opportunity to settle and is turned out to be more dependable. The reproductions were performed in the earth of MATLAB/SIMULINK. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
236-239 |
63 |
Public Transportation System using IoT
-Aniket Mahato ; Parmeshwar P. Raut; Atul Nagane; Ajinkya M. Kuwar; Prof. Vaishali D. Shinde
Public transport bus services area unit usually supported a daily operation of transit buses on a route line of work at united bus stops in line with a broadcast transport timetable. Thus peoples anticipate the bus on bus-stop as they're unaware regarding timings of buses that end up in time wastage. Another is conductor essential to conduct fare assortment & rider might face money issues. Like these, there area unit several issues faced by the present system. To beat these all we have a leaning to return up with a replacement system victimization humanoid application which is able to cut back waiting time for passengers in addition as several different issues. The biggest challenge in the current ticketing system is queue. In this growing world we have to stand in the queue for purchasing tickets. Tickets can vary i.e., movie tickets, bus tickets, railway tickets, etc. The technology is growing quickly, therefore this should be modified. Passenger are enter in bus and exist from bus while their location or destination occurs. If bus is crash or delay the bus to reach their destination for some reasons like traffic congestion, breakdown or other reason for delay bus. Update passenger's current count and current location. Read More...
|
Computer Engineering |
India |
240-242 |
64 |
Experimental Study on Paper Sludge as Cement Replacement in Cement Concrete
-Digpal Singh Raghuwanshi ; Rajesh Joshi
Waste paper sludge is waste product of paper industry, during manufacturing of paper white mud comes out during the process is called paper sludge or hypo sludge or brine sludge. This project is based on the viability of use of waste paper sludge, an industrial waste comes out during manufacturing of paper as partial replacement of cement in cement concrete. Concrete is widely used building material which is used all over the world. Cement which is used as a binding material in concrete contain silica, this cement release poisonous gages during hydration of cement and pollute environment. Although cement is also a costly material, using waste material as partial replacement of cement can save environment and also make concrete economical. Particular this study is based on utilization of paper sludge as partial replacement of cement in concrete, M30 and M40 concrete is manufactured which contains paper sludge 5% to 40% at interval of 5%. Concrete which contains waste paper is tested for compressive strength, flexural strength and split tensile strength, also slump cone test to check workability. Read More...
|
Civil Engineering |
India |
243-248 |
65 |
Performance Prediction of Embedded System at Source Level
-Gaurav Deshmukh ; Mahesh Bhakare; Mayur Ghare; Akshay Wakle; Prof. Pooja Thakre
Developers need performance prediction tools that are capable of providing information on the future performance of the embedded system. This paper describes a performance analyser tool developed to predict the performance. We have implement to simpler, realistic and implementable analytical models based on the sound principles of Performance Engineering and Regression Techniques. System design is for reducing the turnaround time of software development. Also reducing the turnaround time after the modification of the source code due to changes in problem specification. Predicting the performance of application software at source code level using comprehensive method that combines analytical modeling and statistical approach. We take samples from EEMBC and SMV benchmarks and gather the static attributes from the source code of those samples as our learning set. We then apply multiple linear regression technique enhanced with statistical tool SPSS23 to predict the performance of these functions. Read More...
|
Computer Applications |
India |
249-251 |
66 |
Framework Analysis of Fatal Accidents and Reductions of Fatality Rate by using Data Mining Technique
-Ganesh Pawar ; Akshay Pradhan; Shailesh Kad; Bhagyesh Galphade; Bharati Kudale
This project work has designed and enforced a Framework Analysis of Fatal Accidents and Reductions of death rate by mistreatment data processing Technique for Bharat which is able to alter traffic police offices and different road safety stakeholders to induce summarized on-line traffic accident data at numerous levels simply and quickly. System necessities are strictly collected from the federal police commission central traffic accident analysis department and by consulting connected literatures and software package product that area unit employed in different countries. The planning and implementation of the system is finished in accordance to the known practical and non-practical necessities. The system has completely different scheme to satisfy its core functionalities. Associate degree administration scheme authenticates directors and traffic cops to login to the system and executes their outlined task. The accident registration sub system permits the traffic lawman to enter and submit road traffic accident details employing an easy to use wizard primarily based interface. A report and question scheme allows any interested users of the system to look at some predefined reports and notice specific accident records. Furthermore the system is enforced with Amharic language interface for maximizing its usability associate degreed it can even displays an accident location on Google map. Read More...
|
Computer Engineering |
India |
252-255 |
67 |
Drilling on Glass Fibre Reinforced (GFRP) Filled Epoxy Composite Materials: An Experimental Study
-Jaysing Bharat Mule ; Dr. Narve N. G.; Prof. Vyankatesh Mundhe
Fiber reinforced polymer composites have gained substantial attention as engineering structural materials in automotive, marine and aircraft industry as well as in civil engineering applications. This is due to their outstanding mechanical properties, impact resistance, high durability and flexibility in design capabilities and light weight. However, the delamination and the unstable crack growths are inherent problems associated with these fabric reinforced composites. Damage of composite structures through delamination are unstable crack growth perhaps the most important aspects of mechanical behavior which limit the wide applications of these materials. Machining of composite materials is difficult to carry out due to the anisotropic and non-homogeneous structure of composites and to the high abrasiveness of their reinforcing constituents. This typically results in damage being introduced into the work piece and very rapid wear development in the cutting tool. Conventional machining processes such as turning, drilling or milling can be adapted to composite materials, provided proper tool design and operating conditions are maintained. The present work also describes the machining (drilling) of GFRP composites with the help of Step drill of three sets, with three different speeds. Further work has been carried out by immersion of GFRP composites in sea water for 8 hrs, 16 hrs and 24 hrs duration and performed drilling operation. Results revealed that 8-4 mm step drill showed better machining characteristic than the other two 12-8 mm and 10-6 mm step drills. The ZnS Filled GFRP composites had better performance than TiO2 filled GFRP Composites. Read More...
|
Mechanical Engineering |
India |
256-260 |
68 |
Effect of Cyber Crime on Economical Development
-Dr.Vidhi Khanduja ; Dr. Roshini Rawal
Internet has become household commodity in India and almost every information and data is running online. Due to this cyber crime has been rapidly increasing its footfall on Indian economy. There are various kind of cyber crimes, creating impact and threat to the economy of a nation and even disturbing peace and the security. This research paper emphasis on how cyber crime is having hazardous effect on Indian economy as it move towards the new investment, digitalization and demonetization. It is increasing the risk factor. Therefore there is need for a holistic approach to combat these crimes and try to find remedies for it. So that we can drag our Indian economy towards developing economy, not the underdeveloped economy and its effects could be more profound. And we can witness the new horizon of cyber crime free Indian economy. Read More...
|
Computer Engineering |
India |
261-264 |
69 |
A Comparative Study of Different Text Mining Algorithms
-Avi Patel ; Divya Patel; Poojan Patel; Bhavesh Oza
In this paper, we will discuss some of the research we have find till and what we have concluded from that survey. We try to compare and combine four text mining algorithms we have explored. We will work on Text Classification (Message or Comment Spamming detection). Text mining is the process of extraction of high quality of information from text. It involves the structuring of input text, deriving patterns within it and finally interpretation of the output. Read More...
|
Computer Science |
India |
265-268 |
70 |
Effect of Pitch on Thermal Performance of Solar Water Heater
-Patel Neelkumar Kantilal
Energy is essential for living and vital for development of all. The global economy thrives on energy. Affordable energy directly contributes to increase productivity, reducing poverty and improving betterment of life. Global population is increasing day by day, which, in a way is leading to the utilization of natural resources and fossil fuels. The solar energy, wind energy and bio mass are three major sources and out of these three energy sources solar energy is the easiest source to extract useful energy because the wind energy can be useful particularly in coastal area where there is high wind velocity and energy extraction bio mass needs either chemical conversion or thermo chemical conversion process. The objective of present work is to carry out comparative study for thermal performance of the helical solar heater of various coil pitch by using Digital Thermometer at appropriate location of both experimental set up; using thermocouple the change in water temperature for 20 litre water will be carried out simultaneously in case of two set up will be fabricated. Read More...
|
THERMAL ENGINEERING |
India |
269-274 |
71 |
Solar Humidifier
-Patel Ronit Kamleshbhai
The solar humidification–dehumidification method (HDH) is a thermal water desalination method. It is based on evaporation of sea water or brackish water and consecutive condensation of the generated humid air, mostly at ambient pressure. This process mimics the natural water cycle, but over a much shorter time frame. The simplest configuration is implemented in the solar still, evaporating the sea water inside a glass covered box and condensing the water vapour on the lower side of the glass cover. More sophisticated designs separate the solar heat gain section from the evaporation-condensation chamber. An optimized design comprises separated evaporation and condensation sections. A significant part of the heat consumed for evaporation can be regained during condensation. An example for such an optimized thermal desalination cycle is the multiple-effect humidification (MEH) method of desalination. Read More...
|
THERMAL ENGINEERING |
India |
275-278 |
72 |
Effect of Angle of Inclination on Thermal Performance of Solar Cooker
-Patel Shivang Kantilal
Energy is an important source for all sectors of any country's economy. It is a major input for socioeconomic development and poverty eradication. The standard of living of any country is mostly dependent on per capita energy consumption. Due to rapid deterioration in the supply of fossil fuels, the solar energy can be the most appropriate option compared to other alternative energy resources. In rural areas almost 75% of the energy is used for cooking purpose. The solar cookers have a relevant place in the present fuel consumption pattern. But the position of the sun varies continuously throughout the daytime which affects the absorption rate. An advance design is to be proposed for the maximum utilization of solar radiation concentrated over solar cooker. In the proposed trapezoidal solar cooker the shape will be such that the solar radiation incident upon the surface gets concentrated towards the Centre of the cooker. From above description the objective of present work is to study the effect of angle of inclination on the thermal performance of trapezoidal of solar cooker. Read More...
|
THERMAL ENGINEERING |
India |
279-282 |
73 |
Detection of Packet Dropping Attacks for Privacy Preservation in Wireless Ad-hoc Networks
-Supriya ; Arun Kumar.H
There are usually two types of packet dropping attacks observed in the network. Link error and malicious packet dropping are the sources for packet losses in multi-hop wireless ad hoc network. In this paper, while observing a number of packet losses in the network, one should concentrate on how the packets are lost in a network, whether the packets dropped are caused by link errors only or by the combinational effect of link errors and malicious dropping. Here, particularly certain cases are displayed where it’s one of nodes in the network, whereby malicious nodes exploit their knowledge of the routing context to drop a small amount of packets that are critical to the network performance. Because the packet dropping rate in this case is similar to the channel error rate, conventional algorithms that are based on detecting the packet loss rate cannot achieve satisfactory detection accuracy. For the enhancement of the detection accuracy, a scheme to attain the interrelationships between lost packets is proposed. Furthermore, to ensure truthful calculation of these correlations, development of a Homomorphic Linear Authenticator (HLA) based public auditing architecture that allows the detector to validate the truthfulness of the packet drop information reported by nodes. This establishment is privacy preserving, collaboration proof, and incurs low communication and limited storage. Read More...
|
Computer Engineering |
India |
283-285 |
74 |
Survey on IoT based Smart Waste Management System
-Pratiksha P Malokar ; Akshada S Bhagat; Aishwarya M Sindagi
Cities around the world square measure on the run to end up smarter. form of those have seen an opportunity on deploying devoted municipal access networks to assist each form of city management and maintenance services requiring Associate in Nursing data affiliation. We’ve got an inclination to demonstrate but internet of things (IoT) integration with statistics get entry to networks, Geographic data systems (GIS), combinatorial improvement, and digital engineering can contribute to spice up cities management systems. we've got an inclination to gift a waste assortment answer supported providing intelligence to trashcans, by manner of exploitation an IoT image embedded with sensors, which can study, collect, and transmit trash volume data over the online. This records placed into a spatiotemporal context and processed by graph thought improvement algorithms may even be used to dynamically and efï¬ciently manage waste series techniques. Read More...
|
Internet of things (IoT) |
India |
286-288 |
75 |
Survey on Accident Detection System and Alert
-Trupti Waghmare ; Wakode Amrapali; Patil Diksha; Pawar Disha; Mr. S. Nalawade
In extremely inhabited countries like Asian country, every 3.7 minutes a death swoops in. a number one explanation for the world burden of public health and fatalities is road accidents. The loss of human life attributable to accident is to be avoided. Traffic jam and current are major facts that cause delay to car, as most of the countries follow planned sequence of traffic lights. Typically the accidents also are not detected in time that conjointly in several cases results in loss of life. The thought here is to produce an intelligent stoplight System, which might facilitate the car reach the destination in minimum doable time by providing an adequate route of passage. In conjunction with this a controller is to be work on vehicles, which might facilitate in totally automatic detection of the prevalence of accident and find the vehicle similarly. Read More...
|
Computer Engineering |
India |
289-291 |
76 |
Survey on Semantics-based Online Malware Detection
-Yash Karwa ; Pratiksha Rokade; Suraj Netke; Nikhil Bajad; Prof. Madhuri Hingane
Recently, malware has more and more become an essential threat to embedded systems, whereas standard software package solutions like antivirus and patches haven't been so triple-crown in defensive the ever-evolving and advanced malicious programs. During this work, we tend to propose a hardware-enhanced design, GuardOL, to perform on-line malware detection. GuardOL could be a combined approach exploitation processor and FPGA. Our approach aims to capture the malicious behavior (i.e., high-level semantics) of malware. to the present finish, we tend to ï¬rst propose the frequency-centric model for feature construction using system call patterns of renowned malware and benign samples. We then develop a machine learning approach (using multilayer perceptron) in FPGA to train classiï¬er exploitation these options. At runtime, the trained classiï¬er is employed to classify the unknown samples as malware or benign, with early prediction. The experimental results show that our answer can do high classiï¬cation accuracy, quick detection, low power consumption and flexibility for simple practicality upgrade to adapt to new malware samples. One in every of the most benefits of our style is that the support of early prediction detecting 46th of malware at intervals ï¬rst 30 minutes of their execution, while 97 of the samples at 100% of their execution, with < 3% false positives. Read More...
|
Computer Engineering |
India |
292-294 |
77 |
Effect of Various Coil Shapes on Vortex Flow Cooling
-Bhandari Jinitkumar Bansilal
With increase in the temperature due to global warming cold air is necessary for human being. Air conditioning system for air cooling is always better option but there is high level of power consumption and to overcome such difficulty vortex flow cooling is the better option. In vortex flow due to geometry more the turbulence in the flow and which dissipates more amount of heat and to enhance the rate of heat transfer cooling water will be circulated and this is nothing but aim of present work. Read More...
|
THERMAL ENGINEERING |
India |
295-298 |
78 |
Design and Analysis of Pressure Vessel (For Steam Cooking Vessel)
-Sagar Santu Shete ; Prof. Hredey Mishra
This technical paper presents design, and analysis of pressure vessel. The application of this pressure vessel is for food processing industry. For steam cooking vessel need to design the pressure vessel of different volumes with different temperature and pressure. Different type of forces is developed on the pressure vessel, so need to design the vessel which has withstood severe forces. Safety is primary consideration in pressure vessel design, due to potential impact for possible accident happed. There have a few main factors to design the safe pressure vessel. The pressure vessel is probability occurs at maximum pressure which is the element or parts that only can sustain that pressure. The main efforts are made for this paper to design the pressure vessel for application by using ASME codes & standards to prove he design. The factor affecting in pressure vessel is its pressure and temperature. So if there is changed in pressure and temperature every pressure vessel will have new design. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
299-301 |
79 |
Packet Hiding Method for Preventing Jamming Attack in Wireless Network
-Priya Bhatt
Wireless network is infrastructure less network. The open nature of the wireless intermediate leaves it open to on purpose interference attacks, typically referred to as jamming. This intentional attacks interference with wireless transmissions can be used as an initiate protection for increasing rejection-of-Service attacks on wireless network system Jamming has been address under an external risk reproduction. However, adversary with internal knowledge of protocol specification and link secrets can initiate low down exertion jamming attacks that are difficult to detect and counter. In this work, we address the problem of careful jamming attack in wireless system. In these attacks, the adversary is active only for a short period time, target communication of high value .We illustrate the compensation of jamming in terms of network performance degradation and opponent effort by the presenting two case study. a discerning attack on TCP and one on routing. We demonstrate that the selective jamming attacks can be launch by the stage real time small package classification of the physical layer. To take the frame off these attacks, we develop three schemes that the put off real time packet arrangement by combine cryptographic primitive with the objective-level attribute. We investigate the security of our methods and estimate their computational and communication visual projection. Read More...
|
Computer Science and Engineering |
India |
302-305 |
80 |
Internet of Things Approach for Face Detection and Recognition using Raspberry PI
-Swati Sahu ; Prof. Vijay Sharma
In this paper, we are presenting a proposed system for Smart Surveillance model in which we are implementing facial monitoring system by embedded face detection and face tracking algorithm and it consists of three steps namely: facial detection, feature extraction and recognition by using Haar classifier and Eigen face approach. The purpose of the project is to make a system, which would detect and take snapshots and videos of the Human motion when detected and upload to an external server. Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
306-310 |
81 |
A Comparative Experimental Studies on Effect of Twisted Tape Insert on Performance of Plane Steel Tube and Plane Copper Tube DPHE
-Dipesh Katre
Work presents the effects of twisted tape inserts of different materials and different twist ratio on the performance of concentric double pipe heat exchanger by using air and water as working medium. The twisted tape inserts when placed in the path of the flow of the fluid, create a high degree of turbulence resulting in an increase in the heat transfer rate of heat exchanger with the twisted-tape inserts is found to be strongly influenced by tape-induced swirl or vortex motion. The conversion utilization and recovery of energy in every industrial commercial and domestic application involve a heat exchanger process some common example are stream generation and condensation in power and co-generation plant ,sensible heating and cooling on viscous media in thermal processing of chemical, and agriculture products refrigerant evaporation and condensation in air conditioning and refrigeration gas flow heating in manufacturing and waste heat recovery air and liquid cooling of engine of electrical machine and electronic device improve heat exchange, over and above the usual of standard practice can significantly improve the thermal efficiency in such application as well as the economically of their design and operation. Double pipe heat exchanger (DPHE) is the simplest application of heat exchanger. This kind of heat exchanger is widely used in chemical, food and oil gas industries. Double pipe heat exchanger is having a relatively small diameter and it is easy to fabrication a compare a helical tube and straight tube and many more compact tube of heat exchanger. Commonly method used to by the reaches to enhance the heat flow rate is active method, passive method and present work is based on passive method. In the present work experiment this carried out on double pipe heat exchanger in which hot water is flowing through in a tube where a cold water is flowing through the annular and hot water to water heat exchanger is taken in consideration. During the experiment cold water flow rate is constant at 45 LPH, where the hot water flow rate on various from 15 LPH to 75 LPH. In this experiments we have used the twisted tap insert with 2.5 inch pitch with copper tube and plain steel tube and plain copper tube without insert in parallel and counter flow arrangement and then comparatively study on their performance. Read More...
|
m.tech thermal engineering |
India |
310-313 |
82 |
A Review Paper Onward Design Analysis & Implementation of 6-Pulse and 12-Pulse Converter using MATLAB/Simulink
-Soni Ashiv Dharmeshkumar ; Jigar J Jain
This paper presents Simulation and displaying of 6-pulse and 12-pulse multi-pulse converter topologies. In this paper multi-pulse converters are created for improving quality of power, to lessen harmonics in AC main and ripple in DC side output. The 6-pulse and 12-pulse rectifier can regularly found in Adjustable speed drives and in HVDC systems. Multi-pulse converter recompenses the impact of harmonics by utilizing phase shifting transformer. Design of 6-pulse, 12-pulse, 18-pulse and 24-pulse converters have been displayed alongside with their Circuit diagram and waveforms. The voltage waveforms have been watched and Total Harmonic Distortion approach has been computed. This path isn’t the same as customary approach in light of the fact that here autotransformer is configured by utilization of a few linear transformers. For high-power applications, a 12-pulse, 18-pulse and 24-pulse setup are helpful to diminish the harmonics, however regardless of everything, it consolidates the (np±1) th (n: integer, p: pulse) harmonics. Read More...
|
Electrical Power System |
India |
311-314 |
83 |
High Gain Single-Stage Rail-to-Rail Ampliï¬er With Nested-Current-Mirror
-B.N.Manju Bhargavi ; A. Srinivas Reddy
A power efficient, high DC gain, gain-bandwidth product (GBW) and slew rate (SR) rail-to-rail output single-stage ampliï¬ers are replacement of their multi-stage amplifier, especially for LCD display applications that are used in large numbers in their column drivers as a buffer. This paper represents Positive Feedback Nested-Current-Mirror Single-Stage Rail-to-Rail Ampliï¬er to achieve high of DC gain, Speciï¬cally, NCM is customizable for different mirror steps, and sub mirror ratios, to balance the performance metrics and capacitive- load (CL) at the output of column driver to get high driving capability under rail-to-rail output swing. Analytical treatments of the Positive feedback NCM technique in terms of performance limits and robustness reveal that the NCM ampliï¬er can surpass the fundamental power-efficiency limit set by the basic differential-pair (DP) ampliï¬er. A prototypes 3-step Positive feedback NCM ampliï¬ers were analyzed with 88 dB DC gain and 0.0028–0.27 MHz GBW over 0.15–15 nF with 86 approx phase margin (PM) with power consumption power 144µW for the load of .15nF. Read More...
|
Electronics & Communication Engineering |
India |
315-319 |
84 |
A Review on Smart Bus Ticketing System using QR-Code
-Geetanjali Kale ; Jayshree Korke; Shehal Kandharkar; Pranali Gaikwad; Shital Kolte
The biggest challenge in the current ticketing system is QUEUE. In this growing world we have to stand in the queue for purchasing tickets. Tickets can vary i.e., movie tickets, bus tickets, railway tickets, etc. The technology is growing quickly, therefore this should be modified. Smart Bus Ticketing Destination Announcement System Using QR-Code is mainly use to buy bus tickets which is most challenging when compared to book the long journey tickets with the existing system. With our system ticket can be booked with just a smart phone application and ticket information is stored in the form of QR code. In future travelling in bus is very easy with our application so that user can travel without more hard work. With the help of application user can search and plan there work flow easily? We are proposing this system for better performance to passengers. Existing system having manual work for ticketing system. That was very time consuming. Because of this system is useful. It is basically developed for passenger convenient. This application reduced passengers waiting time. And successfully reach their destination. Read More...
|
Computer Engineering |
India |
320-322 |
85 |
A Review on Heat Transfer and Fluid Flow Over Wavy Channel or Surface
-Ashish Kumar Agrawal ; Ravindra Mohan
In this article detail review in the area of heat transfer and fluid flow across wavy channel and surface has been presented. The wavy channel and surface have significant application in automotive sector, industries, and many more. The purpose of using wavy channel or surface instead of using straight channel, the wavy channel has more surface area as compared to straight channel due to which mass and momentum during heat transfer increases. Conventionally, during fluid flow turbulent flow is preferred which helps in enhancing the heat transfer rate. Several researches perform numerical-computation simulations and experimentation in order to explore the flow characteristics over wavy surfaces are presented in this paper. Read More...
|
THERMAL ENGINEERING |
India |
323-328 |
86 |
Series FACTS Controller Based Power Transfer Capability Improvement
-Pragati P. Vairagade ; Chandrakala Gowder; D.B.Waghmare
Traditionally, electrical system operators have sent generation to attenuate total production prices, ignoring the pliability of the gear mechanism. Implementation of smart-grid systems may enable operators to co-optimize versatile transmission aboard generation dispatch; the technologies that may modify such co-optimization ar still regulated as a part of the monopoly gear mechanism. One explicit versatile transmission quality is variable electrical phenomenon versatile AC gear mechanism (FACTS). this idea 1) points out the positive spatial relation drawback existing in an exceedingly recent market style proposal with active transmission participation, and 2) proposes a sensitivity based mostly technique to estimate the marginal market price of FACTS changes to beat this positive spatial relation drawback. The marginal worth would counsel economical electrical phenomenon changes to the operator and supply the proper monetary incentives for the FACTS homeowners to control their assets in an exceedingly socially optimum method. The projected model style exploitation MATLAB Simulink 2013 computer code. within which series FACTS controller like SSSC and TCSC style supported variable load or supported market demand behavior for improve the facility transfer capability of power grid. Read More...
|
Electrical Engineering |
India |
329-334 |
87 |
Strength of Translucent Concrete
-B Lokeswar Reddy ; B R Harika; G Shazia Sulthana; B Prathap Reddy; P Sadiq Basha
Since from Roman times concrete is main material for construction and infrastructures but its combinations are differencing day to day, at present situations many types of concretes are funded out by number of researchers. Now I like to give a brief description regarding the TRANSPARENT CONCRETE. It is a combination of fibre-optics and fine concrete. Mainly transparent concrete consists of only fine aggregate. Materials used in transparent concrete are sand, water, cement and optical fibres. Transparent concrete is also known as translucent concrete or light transmitting concrete. Replacement of translucent concrete in construction results in art design. Transparent fibre has a nature of fire resistance. Transparent concrete blocks are suitable for pavements, floors and load-bearing walls. Mainly partition walls, where sunlight is more available. Present our research work carried to find the transparent percentage compared to strength. Read More...
|
Civil Engineering |
India |
335-337 |
88 |
Comparative Study of Dielectric Fluid in Powder Mixed Electro - Discharge Machining
-Mr. Vaibhav V. Phule ; Mr. Laxman P. Khose
Electro discharge machining (EDM) is nontraditional machining process which is used to remove the material by thermal energy of the spark. All electrically conductive materials can be machined. EDM is a capable of machining hard material components or geometrically complex. As there is no direct contact between tool and work piece, no physical cutting forces are present between tool and workpiece. In recent years to enhance process capabilities, powder mixed electric discharge machining (PMEDM) is used as new technique. In PMEDM dielectric fluid is mixed with additive powder. For Experimentation parameters selected are peak current, pulse on time, duty cycle and different dielectric media. Material removal rate, tool wear rate and surface roughness are taken as the output parameter. Read More...
|
M.Tech MECHANICAL ENGG |
India |
338-340 |
89 |
Stress Analysis of Glass/Epoxy Symmetric and Asymmetric Composite Laminated Plate by Using Finite Element Method in MATLAB
-Nirmala H Bhingare ; Swati K Dhamale; Sadhana H Bhingare
The objective of current study is to understand the behaviour of glass/epoxy composite plate under same loading condition by using finite element analysis in MATLAB. For the purpose of finite element analysis eight-nodded isoperimetric element is considered. At each node five degrees of freedom considered that are three displacements and two rotations. The result shows the stresses of glass/epoxy plate under pressure with fiber oriented in hexagonal array. Glass/epoxy composite lamina of different orientation angles like 00, 450, 900 is used for analysis purpose and stress values of all models found under uniform distributed transverse load. Read More...
|
Mechanical Engineering |
India |
341-344 |
90 |
Active Trust: Secure and Trustable Routing in Wireless Sensor Networks
-Suraj Dashrath Ugale ; Saurabh Korde; Prasad Bhogade; Mrs Bhavana Jain
Wireless device networks (WSNs) are more and more being deployed in security-critical applications. As a result of their inherent resource-constrained characteristics, they're liable to completely different security attacks, and a part attack may be a variety of attack that seriously affects information assortment. To tackle that challenge, a lively detection-based security and trust routing theme named trust is planned for WSNs. The foremost vital innovation of trust is that it avoids black holes through the active creation of variety of finding routes to quickly detect and acquire nodal trust and therefore will increase the info route security. Additional significantly, the generation and distribution of detection routes are given within the Active Trust theme, which may totally use to attain the required security and energy effectiveness. Theoretical analysis and results indicate that the performance of the Active Trust theme is best than that of previous studies. Active Trust will considerably improve the info route success chances and skill against part attacks and may optimize network time period. Read More...
|
Computer Engineering |
India |
345-347 |
91 |
Job Satisfaction of Hospitality Employees in Budget Hotels
-Subhasis Maiti
The aim of this paper is to determine the relationship between job satisfaction and human resource factors in the budget hotels. The significant determinants of job satisfaction that have been taken for the present study are Compensation, Working Environment, Career Growth, Empowerment, Training and Development. Data for this study was collected from employees of five budget hotels of Kolkata. The data so collected has been subjected to reliability tests and analyzed using SPSS Ver.16.0. This study will help employers to understand employee needs and plan HR activities more in line with employee requirements in order to increase job satisfaction, efficiency and commitment. Read More...
|
Human Resource management |
India |
348-351 |
92 |
Computational Investigation of Flow Stability of Baffled Pipe- A Comprehensive Report
-Sagar Kumar ; Ravindra Mohan
This paper presents an exclusive review in the field of heat transfer and fluid flow where baffles has been implemented in order to enhance the thermo-hydraulic performance Some of the major factors affecting are well illustrated and discussed. Baffles are the major components which are especially been used for enhancing heat and mass transfer in various thermal application. Mainly, the fully developed flow over a baffled channel, in either laminar or turbulent regime, is much further complex than that over a smooth surface or channel because of the additional parameters to be utilized and the correlated and turbulence flow phenomena to be deduced. Several researches perform numerical-computation simulations and experimentation in order to investigate the thermo-hydraulic characteristics for different baffled configuration is stated in this paper. Read More...
|
THERMAL ENGINEERING |
India |
352-355 |
93 |
Low-Power and Area-Efficient Shift Register Using Pulsed Latches
-Krishna Chikka ; S.Rajitha
The Shift Register is another type of sequential logic circuit that can be used for the storage or the transfer of data in the form of binary numbers. A power-efficient shift register utilizing a new flip-flop with a pulse-triggered structure is presented in this paper. The proposed flip-flop has features of high performance and low power. The key idea was to design in various performance aspects provide a signal feed through from input source to the internal node of the latch, which would facilitate extra driving to shorten the transition time and enhance both power and speed performance. The design was intelligently achieved by employing a simple pass transistor. The proposed design successfully solves the long discharging path problem in conventional explicit type pulse-triggered FF (P-FF) designs and achieves better speed and power performance. Based on post-layout simulation results using CMOS 90-nm technology. The best power-delay-product performance in seven FF designs under comparison. Its maximum power saving against rival designs is up to 38.4%.Compared with the conventional transmission gate-based FF design. Read More...
|
VLSI |
India |
356-360 |
94 |
Survey Paper On Keyword Search In Multi-Dimensional Datasets
-Pratik Ambore ; Rakesh Raut; Sagar Chavan; Gaurav Dhanlobhe; Prof. Bhagyashree Patle
We propose Consider objects that square measure tagged with keywords and square measure embedded terribly very vector space. The presence of keywords in feature space permits for the event of latest tools to question and explore these dimensional datasets. We have a tendency to tend to propose a way, and come through high quality and quickening. In dimensional areas, it's powerful for users to provide vital coordinates, and our work deals with another type of queries where users can exclusively provide keywords as input. Photos square measure painted exploitation color feature vectors, and usually has descriptive text data (e.g., tags or keywords) associated with them. Our system relies on real datasets shows that we are going to show the economical wanting of keywords in dimensional datasets. Read More...
|
Computer Engineering |
India |
361-363 |
95 |
A First Principle Study of Mechanical Strength of Kevlar-29
-Harsha Verma ; Jitendra Chauhan
The first principle study is performed for the analysis of the mechanical strength of Kevlar-29. The structure is optimized by the density functional theory implemented in SIESTA. The bond strength is investigated by the displacement of central nitrogen atom along X, Y and Z directions; respectively. The structural property analysis provides an asymmetric nature of Kevlar-29. Larger bond breaking energy is observed during compression along Z direction and vice versa for elongation. There is strong s-p hybridization in the orbitals and exhibits an insulating nature. The forbidden energy gap is increased while compression and it reduces gradually during elongation. The bonds have higher ionic and lower covalent nature, there is larger covalency for applied strain along Z-axis, hence the strength is little higher along the same axis than along X and Y-axes. Larger stress is required along Z-axis to produce the strain and smaller along Y-axis, therefore; Kevlar-29 is mechanically stronger along its Z-axis and weaker along Y-axis. Read More...
|
M.E in Production Enginerring |
India |
364-367 |
96 |
A Comprehensive Review on Thermodynamic Analysis Waste Heat Utilization by Gas Turbine Based Power Cycles
-Bhola Ram Verma ; Ravindra Mohan
In this paper a comprehensive review has been reported in the field of gas turbine based cycle with their various integration system and analysis. Gas turbines have been used in wide ranging applications since their world’s first use in aviation and power generation in the jet engine powered flight and power generation plant since 1939. The high temperature exhaust gas from gas turbine can be utilized in other cycles i.e. Rankine, Brayton for additional power generation or for heating and cooling purpose (cogeneration/trigeneration). The analysis shows that the resulting maximum efficiency of this GT-combined system can be up to 90% depending upon the operating condition and configuration used. In addition, a comparative performance evaluation of various cycles is presented clearly showing ranges within which a particular arrangement can be beneficial in power generation sector. Read More...
|
THERMAL ENGINEERING |
India |
368-372 |
97 |
Study of Improvement in Efficiency and Effectiveness of Performing Farming Using Internet of Things
-Megha Mudholkar ; Pankaj Mudholkar
The boom in Information Technology (IT) industry is now opening a new way of performing several things like controlling devices, measuring several things e.g. temperature, humidity etc. using a new concept of Internet of Things (IoT). Internet of Things made easy way to control the devices, collect the information from such devices, disseminate such information and transfer this information to analyze the same and to predict or prescribe the solution for the problems might exist. To have a several advances in the field of IT, it provides several solutions to evade the problems might occur in future. Internet of Things made it easy to perform several tasks of collecting data, transforming data and controlling the devices through the use of sensors. There are lots of problems faced in Agricultural Industry in farming. These challenges are basically caused by the drastic growth in population and the climatic change. Internet of Things made it easy to overcome these challenges which help in increasing the produce in the farm. This paper discusses various ways and means to perform smart farming. Read More...
|
Computer Applications |
India |
373-376 |
98 |
Use of Waste Plastic and Human Hair as Composite Material in Cement Concrete Construction
-Prathmesh Prabhakar Nanhe ; Nikhil Pradeep Agrawal; Reshma Kisanrao Kitukale; Nilesh Sushant Biswal; Sanket Ganeshrao Sawarkar
Aim of study is examine the effect on compressive strength of concrete by use of waste plastic and human hair as composite fiber reinforced material. The above plastic waste and human hair are mixed with cement concrete in various proportions (0.1%to 2%) and test specimens were casted (cubes and prisms) the study the behavior of plastic mixed concrete in axial compression. Study of human hair and plastic fiber is taken because of its excellent attributes which are available in low cost as compare to other fiber. At 5% optimum modifier content, the strength of the modified concrete was found to be 1.2 times greater than the plain concrete. By using Plastic waste and human hair as modifier, we can reduce the quantity of cement and sand by their weight, hence decreasing the overall cost of construction. The experimental finding in all tested sample will encourage the future researches in direction of long term of performance to extending thick chip for economical type of fiber use n structural application and reduced the environmental problem. By testing we found that there is an increment in the various properties and strength of concrete by the addition of human hair as fiber reinforcement which makes it suitable for an alternative additive for concrete to enhance its mechanical properties. Read More...
|
Civil Engineering |
India |
377-379 |
99 |
Finite Element Analysis and Optimization of Boom of Backhoe Loader
-Santosh Umakant Bhumkar
In static analysis of the boom of backhoe-loader has to be performed with the finite element method (FEM). The main objective of this study is to reduce the weight of boom of backhoe loader, which will satisfy the stiffness, strength and other requirements. So the optimum configuration and advanced technology have to be incorporated to achieve minimum weight. This is carried out to simulate and strengthen the boom concerning with stress under maximum loading condition and different boundary conditions. The result of the study is to weight of the boom has been decreased by nearly 5%. Read More...
|
Automotive Engineering |
India |
380-388 |
100 |
Extending Internal Memory in Android Phones
-Akshata R. Pardeshi ; Khushboo K. Nalbhimwar ; Apurva V. Mulay; Akshay A. Nawalkar
One of the major issues of android phones is storage space running out. Storage space running out causes the phone to slow down and the user has to uninstall apps so as to download the new ones, as the internal memory becomes full. The limited size of the internal memory puts restrictions on the number of applications that one can install on a mobile device at any given instance of a time. As a solution, this paper has come up with "Expanding internal memory in android phones". To expand the internal memory, it makes use of cloud computing technology. The proposed system uses an android app to store the less frequently used or unused apps on the cloud. The idea behind this proposed system is that the whenever the user feels that this app is not required that frequently or he might need it later on, but he doesn't want to uninstall it he can store that app on the cloud, he can also retrieve that app whenever it is required. The shifting of the less used or the unused apps makes space for the new apps making internal memory available. Read More...
|
Computer Engineering |
India |
389-390 |