No. |
Title and Author |
Area |
Country |
Page |
151 |
An Experimental Study on Self Compaction Concrete by Partial Replacement of Coarse Aggregate with Crumb Rubber
-S Bhanu Prakash ; N Chennakesava; E V Raghava Rao
The discarding of waste tyres is serious concern all over the world as it causes environmental problems. In this project the main aim was to utilize the waste tyre rubber in concrete as a partial replacement instead of coarse aggregate. The use of waste tyre rubber in concrete makes it economical and moreover it becomes environmental friendly. The strength of concrete with partial replacement of waste tyre rubber chips at various percentages had been investigated. Compression and split tensile tests were carried out for three different percentages of rubber chips say, 0%, 4%, 8%% and 12% at 7 days curing period. The tests results indicate that as the percentage of rubber chips increases, lesser will be the strength of the concrete. But in case of 4% replacement of waste tyre rubber chips in concrete it shows the maximum strength compared to the other percentage replacement that is 8% and 12%. The observed strength of control specimens and 4% replacement of waste tyre rubber chips in concrete found to be almost identical. Read More...
|
Structural Engineering |
India |
617-619 |
152 |
Virtual Keypad using IR Technology
-Apu Basak
The People within the modern technology world are busy with tremendous workloads and that they don't have even second to waste. They struggle to cut back their everyday work by using standard computing gadgets like Desktop Computers and Laptops, in addition more advanced devices like mobile devices and PCs. To improve the movability and quality individuals tend to cut back the dimensions of the gadgets. Thus most of the mobile devices and hand-held devices contain really small keypads. A number of the individuals who use such a tool find it tough to see the letters on the keyboard. With a mobile device, a full size physical keyboard isn’t ideal. But alternatives are available in the form of written recognition, speech recognition etc. however all of them lack the accuracy and convenience of a full size keyboard. So this paper presents an innovative virtual keyboard to beat the mentioned issues by using the microcontroller & IR technology, which might be a viable replacement for fold-up keyboards. The keyboard primarily based on the vision based human computer interaction concept, image capturing and image processing technique that contains virtual keys adequate to the dimensions of traditional keys within the normal QWERTY keyboard. Read More...
|
Electrical Engineering |
India |
620-621 |
153 |
Design and Development of Energy Restoring Bicycle
-Ankit Singh Rawat ; Prof. Tushar Pokharkar; Akshay Raut; Saurav Singh; Hemant Shirose
This study was all about harnessing lost energy when the vehicle lost speed without reversing the process in an engine. The simplest way is recover this energy without transforming it to another form. For example the kinetic energy of the vehicle can be stored as kinetic energy, to be used again for acceleration. It does not produce perpetual motion because of entropy, but it decreases the energy lost when the vehicle brakes and reduce speed. Instead of releasing energy as heat through the brakes, it is stored in a rotating flywheel. This study demonstrated Flywheel Kinetic Energy Storage and Regenerative Braking on a bicycle to explore the factors and mechanisms needed to recover energy that is usually lost. A design, a prototype, and a lot of data were gained through this research. Read More...
|
Mechanical Engineering |
India |
622-624 |
154 |
Secure Data Sharing in Cloud Computing Environment using Attribute Based Encryption
-Pooja Vishwakarma
Cloud computing (CC) is a swiftly rising form of computation age. In our study we find that CC is the delivery of computing resources in the form of paid/free services based concepts which are further known as PAY-PER-USE, data processing software and meaningful data over the network It is also increasing the risk of data vulnerability. On one hand, the client or organizations store up their important data in cloud based storage server where safety measures methods used to shelter the data against discloser of privacy or misusing of data. On the other hand in all we know that in public model of cloud computing, since the user’s data is stored anywhere from corner to corner of the globe, so that the client or organizations have no control over the cloud server side. To make sure the faith on data privacy, Attribute-based encryption has been an ideal data encryption implements to unravel the exigent hitch of protected data sharing in cloud computing atmosphere. The united records files in general have the attribute of multiple levels of chains of command. Yet, in this type of file storage configuration of united files has not been investigated in ABE. For this, proficient file based ABE scheme is proposed in cloud computing. Read More...
|
Computer Science and Engineering |
India |
625-628 |
155 |
Waste Heat Recovery from Solar Water Heater
-Purav Hingrajiya ; Manjeet Khare; Ronak Kachhadia; Ravi Kathiriya; Jaimish Goyani
The project idea is based on Waste Heat Recovery from Solar Water Heater where the waste heat is recovered with the help of low air velocity. Alternative energy sources posse's ample amount of energy which is available at free cost. The solar energy is one such energy which can be used for cooking, heating and power generation purpose. The objective of present work is to waste heat recovery from solar water heater using air at low velocity. Read More...
|
Mechanical Engineering |
India |
629-631 |
156 |
Six Stroke Engine
-Rushabh A chilatre ; Shubham N. Gujar; Sachin S. Chavan; Prof. Naresh G. Metange
The most difficult challenges in engine technology to increase engine thermal efficiency. Therefore two more additional strokes are the fifth stroke, which called water injection stroke (second power stroke) while the last stroke is called exhaust stroke is include in engine. In this paper the six stroke engine is described. The rapid vaporization of the water during the fifth stroke is similar to the combustion of the gasoline. The combustion convert chemical energy into usable power, and likewise, the vaporization of water converts waste heat energy into sable power .The automotive industry may soon be revolutionized by a new six - stroke design which adds a second power stroke, resulting in much more efficiency with less amount of pollution Otto cycle engine have very low thermal efficiency due to high amount of energy is lost in exhaust and also cooling of the engine. It is estimated about 35% of fuel is lost in exhaust of engine and 30% in cooling of engine. Out of the remaining 35% of energy of the fuel about 50% of energy gets converted into the work. Two extra additional stroke have to be added for increase the thermal efficiency and from add of the two additional stroke engine. Read More...
|
mechanical engineering |
India |
632-635 |
157 |
Removal of COD from Industrial Effluent by MBBR: A Review
-Vaibhavi G. Patel ; Raju P. Rajput; Saalvee H. Kher; Mayuri R. Prajapati; Anjali S. Nair
The basic principle of the moving bed process is the growth of the biomass on plastic supports that move in the biological reactor via agitation generated by aeration systems (aerobic reactors) or by mechanical system. The moving bed processes come from the current trend in waste water treatment, from the use of systems that offer an increased specific surface in the reactor for the growth of the biomass, achieving significant reductions in the biological reactor volume. Read More...
|
Environmental Engineering |
India |
636-638 |
158 |
Study of Novel Neural - Fuzzy Logic for Abnormal Behavior Detection
-Ashwin Shenoy M
An abnormal behavior detection algorithm for surveillance is used to identify the targets as being in a normal or abnormal movement. This work falls within the framework of the video surveillance research axis. The job is to analyze video streams coming from a network of surveillance cameras, deployed in an area of interest in order to detect abnormal behavior. A study of novel model is designed here for this purpose. The uniqueness of this novel algorithm is the use of foreground detection with Gaussian mixture (FGMM) model before passing the video frames to optical flow model using Lucas-Kanade approach. Information of horizontal and vertical displacements and directions associated with each pixel for object of interest is extracted. These features are then fed to feedforward neural network for classification, to decrease the rate of false positive the output of neural classification further classified by use of fuzzy logic. The study is being planned to conduct on the real time videos and some synthesized videos. The detection of these behaviors will increase the speed of response of the security services in order to perform accurate analysis and detection of events in real time. Read More...
|
Computer Science and Information Technology |
India |
639-642 |
159 |
MPLS Cloud using Multiprotocol Routing and VRF Packet Switching for Banking System
-Aakanksha Tripathi ; Bhumika Leuva
Today hundreds of millions of users are interconnected by communication channels allowing them to communicate and to share information Now with the ever increasing expansion of companies and industries, every company has its branches and sites spread all over the globe. The company needs to have connectivity between its various sites along with features like privacy and security. The use of MPLS VPN [2] network and Multi-VRF enables the service provider to handle multiple sites on one CE router itself. The Internet is a network of networks with a myriad of computer devices, including smartphones, game consoles (handheld/stationary), IP televisions, tablet computers, laptop computers, desktop computers, palmtop computers, etc. With ever increasing number of network devices, the exhaustion of IPv4 address space has become inevitable. Thus, migration from IPv4 to IPv6 (which offers a much larger address space) is necessary. Migration technique to IPv6 network is proposed in this project that overcomes all the limitations available in existing IPv4 network. Read More...
|
M.E Communication Systems |
India |
643-647 |
160 |
Techniques of E-ticket System: A Review
-Najim Sheikh ; Ku.Mayuri Shende; Ku.Rupali Pandit; Ku.Smita Samarth
In many public transports systems, people need to stand in the queue for tickets like Railways, Airports, Bus stops, etc. With the technology growing so rapidly, this must be changed too. E-Ticket is a system for online ticket generation and sales. User can easily book and order the tickets to a cultural or sport event online, pay them online and then print his electronic tickets at home printer and go directly to the event place. In this paper various research for E-ticket system has been discussed. And an efficient E-ticket system using QR code has been proposed. Read More...
|
Computer Science and Engineering |
India |
648-650 |
161 |
Analysis of Improved Path Selection Algorithm using PSO
-Priyanka ; Pooja
In recent years, a broad research has been done in the domain of Mobile Ad-hoc Networks (MANETs). Due to the bounded resources in MANETs, to develop a reliable and efficient routing approach is still a threat or issues. There are distinct aspects appropriate for research like synchronization, power consumption, routing, bandwidth consideration, etc. This paper concentrates on routing approach which is the major challenging concern due to the change in topology of ad-hoc networks. Under a number of network scheme, such as network topology and size, it is difficult to figure out which routing protocol may perform well. In this paper we contribute an outline of broad range of the current routing approaches, with a special focus on their functionality and characteristics. Also based on the routing information and methodologies the comparison is provided, which can be used to make decisions of routing. Performance of all the routing protocols are considered as well. Further this consideration will benefit the researcher to get an outline of the existing protocols and advice which protocols may have better performance with respect to changing network scenario. Read More...
|
Computer Science and Engineering |
India |
651-655 |
162 |
Improving Path Selection Algorithm using PSO
-Priyanka ; Pooja
In recent years, a broad research has been done in the domain of Mobile Ad-hoc Networks (MANETs). Due to the bounded resources in MANETs, to develop a reliable and efficient routing approach is still a threat or issues. There are distinct aspects appropriate for research like synchronization, power consumption, routing, bandwidth consideration, etc. This Paper concentrates on routing approach which is the major challenging concern due to the change in topology of ad-hoc networks. Under a number of network scheme, such as network topology and size, it is difficult to figure out which routing protocol may perform well. Here, we contribute an outline of broad range of the current routing approaches, with a special focus on their functionality and characteristics. Also based on the routing information and methodologies the comparison is provided, which can be used to make decisions of routing. Performance of all the routing protocols are considered as well. Further this consideration will benefit the researcher to get an outline of the existing protocols and advice which protocols may have better performance with respect to changing network scenario. Read More...
|
Computer Science and Engineering |
India |
656-657 |
163 |
Review of Accidents / Incidents in Mechanical Industry
-Firdos Ali ; Ranjeet Kumar
Accident or Incident not only reduces the man-hour but also the production which results in losses. It should be eliminated at any cost so focusing on this point of view to reduce the consequences modern industrialization, engineering controls, administrative controls and many control methods have been created to reduce or eliminate this. Accident reviewing and reporting system is one of them which helps to identify which type of accident or incidents occurs most and also which type of job has the number of accidents or incidents or which is more hazardous or dangerous activity. Reporting of these accidents and maintain the documents of these helps to identify and analysis of accidents to figure out the maximum number of accidents occurred in a year with most focusing area which has highest accident rate. So by reviewing and identify the gaps such type of repetition of accidents can be eliminated or reduces. Read More...
|
M.Tech In Health,Safety and Environment |
India |
658-659 |
164 |
An Android Application for College Bus Tracking and Campus Notifications
-Sankararaman K ; Dhinesh Kumar M; Nagaraj V; Vasuki J
This paper proposes an Android Application for College Bus tracking and Campus Notification. This application consists of eight modules. They are Authentication, Student Profile, Admin panel, Circular sharing, Suggestion Box, Discussion Forum, Result Publishing and Bus tracking. In daily operation of the college, students face many problems such as missing the college bus, unaware of circulars, viewing exam results and much more. The college buses are interrupted by uncertain conditions such as traffic, unexpected delays, etc. In such conditions student doesn’t know the location of the bus and they are confused to take alternate decisions for reaching the college. Due to this problems, students may come late to the classes. Also the absentees may not be aware of the circulars of the day that are circulated in the college and also the student have to take additional effort to read notice board and view circulars. The students are suffering lot to check their result during result publication because of the network traffic caused by the centralized server. Many of the colleges does not have a forum to discuss the subjects with their staffs and co-students. Most of the students do not aware of the suggestion box and they feel hesitated to write complaints to the suggestion box. The above said problems are solved by introducing an android application. Read More...
|
Information Technology |
India |
660-664 |
165 |
Garbage Monitoring using IOT
-Ms. Jayashree D. Umale ; Ms. Divya D. Shinde; Mrs. Dr. K. N. Kasat
In the recent decades, Urbanization has increased tremendously. At the same phase there is an increase in waste production. Waste management has been a crucial issue to be considered. Garbage Monitoring System is built on a microcontroller based platform Arduino Uno board which is interfaced with IOT and Ultrasonic sensor. At regular intervals dustbin will be squashed. Once this Garbage Monitoring System are implemented on a large scale, by replacing our traditional bins present today, waste can be managed efficiently as it avoids unnecessary lumping of wastes on roadside. Foul smell from these rotten wastes that remain untreated for a long time, due to negligence of authorities and carelessness of public may lead to long term problems. Breeding of insects and mosquitoes can create nuisance around promoting unclean environment. This may even cause dreadful diseases. The vision of our project is to make the surrounding clean in a smart way. Read More...
|
Electronics and Telecommunication Department |
India |
665-667 |
166 |
Leaf Disease Detection using Image Processing
-S. S. Renu ; Dr. S. Usha; E. Nigilesh Kumar; M. Sellamuthu
Economy highly depends on agricultural productivity. This is one of the reasons that disease detection in plants plays a major role in agriculture field, as disease in plants are quite natural. If proper care is not taken then it causes serious effects on plants and due to which respective product quality, quantity or productivity is affected. Detection of plant disease through some automatic technique is beneficial as it reduces work of monitoring in big farms of crops, and at very early stage itself it detects the symptoms of diseases i.e. when they appear on plant leaves. In this proposed work, disease is classified and leaf is evaluated whether it is affected by any disease or not by using MATLAB tool. In future, to identify disease affected leaf and for separating the disease based on its features is going to be implemented in real time with the support of an embedded controller that can reduce the physical work of human and it is more advantage in the agriculture. Read More...
|
Image processing |
India |
668-671 |
167 |
Reliable Node based Blackhole Attack Detection Method In MANET using AODV Protocol
-Sonam Rathod ; Sachin Mahajan
A mobile ad hoc network (MANET) is a self-configuring, infrastructure less network. In this mobile nodes dynamically form a temporary network and capable of communicating each other without the use of network infrastructure. Due to the open medium, random topology, distributed environment Ad hoc networks are vulnerable to much type of security attacks. Nodes in the MANET are completely dependent on other nodes so as to complete the communication successfully. To dependent on the other node for data transmission, consider as trust problem. Our aim in this review is to present schemes which are mainly focused on trust based security for MANET. This work proposes a Reliable nodes (RN) which is Responsible for the trust calculation. The RN measures best route for communication. After this Reliability index value is calculated and on that basis the RN node issues a certificate to every node in its network. To participate in data transmission the nodes must have two Reliability index (RI) certificates & can be consider as a trusted node by RN. The directory of this certificate is maintained in RI Table. This RI is shared with the server by this centralized RN. This RN will also monitors the behavior of nodes in a specific range continuously to avoid unwanted action. Read More...
|
Computer Science and Engineering |
India |
672-677 |
168 |
Review Paper on Natural Fiber Reinforced Fly-ash based Geo-Polymer
-Jainesh Chouhan ; Pushpendra Kushwaha
The production of ordinary Portland cement (OPC) is rising with a rate of approximately 3% per year. Due to growing environmental concerns of the cement industry, alternative cement technologies have become an area of increasing interest. It is now believed that new binders are indispensable for enhanced environmental and durability performance. On the other hand, already huge volumes of fly ash are generated around the world, most of the fly ash is not effectively used, and a large part of it is disposed in landfills which lead to the land pollution in various ways (leachate and infertility of soil). As the need for power increases, the volume of fly ash would increase. Both the above issues are to be addressed. Read More...
|
Civil Engineering |
India |
678-684 |
169 |
Underground Thermal Energy Storage for Efficient Heating &Cooling of Building
-Miss. Kanchan H Bhaltilak ; Prof. Swapnil R. Umale
About 30 different underground thermal energy storage projects around the world have been compared with the aim to determine the best practices and the applicability in a French context. The following information has been gathered and analysed:
- Design of the storage
- Sizing of equipments
- Global costs, energy performance and CO2 emissions
Additionally to an inventory of referenced projects, enquiries have been carried out with stakeholders, designers or operators. The results of these enquiries are classified and analyzed by categories:
- Storage types: ATES or BTES
- Production: with or without auxiliary heating
- Building type: residential, office buildings.
- Storage recharge: solar active recharge or use of reversible systems for heating and cooling by analyzing these design and operation data, some trends have been obtained allowing to quickly estimate the design of UTES systems by this empirical approach. Read More...
|
Mechanical Engineering |
India |
685-689 |
170 |
To Study the Effect of Fuel Injector in IC Engine by different Parameters
-Harsh Patel ; Divyang Patel; Jayesh Patel; Ankit Joshi
In today's fast growing world where there are various methods of spraying the fuel into the combustion chamber. As a perspective fuel injector is quiet an important component which needs more detailed study. We had reviewed some experiments held by the inventors on how fuel injector works and how it can be more efficient, by doing experiments on different parameters. Read More...
|
AUTOMOBILE ENGINEERING |
India |
690-692 |
171 |
Review paper on Adaptive Headlight System for Vehicles
-Ashvini Vasant Koli
This paper gives an overview of recent researches on automatic headlight system for vehicles. Number of automobiles have increased rapidly in these days due to advances in automobile production and increased rate of population. As a result of which there is increased accident count. The highest fatal traffic accident rate occurs due to glare of incoming vehicle headlight and improper visibility on curved roads at nighttime. Due to this constrain, a need to understand an alternative technology solution. The aim is to improve visibility for driver and so achieve a significant increase in safety and driving comfort. Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
693-696 |
172 |
Secured and Efficient Strategy of Authenticating PHR over the Network using Attribute Base Encryption
-Miss. Amruta Balasaheb Patil ; Dr. Prof. Archana Lomte
This paper describes the planning and utilization of private Health Records and provides defend to them whereas they're hold on at third party like cloud. To assure the patients' management over access to their own PHRs, it's a promising methodology to cypher the PHRs before outsourcing. Personal Health Record is net based mostly application that permits folks to access and co-ordinate their health info. The patient have management over access to their own PHR. to protect of private health records we tend to use the attribute based mostly secret writing to cypher the info before outsourcing it. Here we tend to target multiple styles of PHR owner state of affairs and division of private health records users into multiple security domains that cut back key management complexness for homeowners and users. A high degree of patient's privacy is secured. Our theme provides personal health record owner full management of his/her knowledge. In depth security and performance analysis shows that the planned theme is extremely economical. Personal health record (PHR) is associate degree rising patient-centric model of health info exchange, that is usually outsourced to be hold on at a 3rd party, like cloud suppliers. However, there are wide privacy issues as personal health info can be exposed to those third party servers and to unauthorized parties. Read More...
|
Computer Engineering |
India |
697-703 |
173 |
Review Paper on Self Cleaning Roads with Road STUD
-Shubham Dighole ; Prof. Om Vaidya; Jahabaj Pathan; Ashutosh Hingmire; Paritosh Dandwate
There are lots of reasons for death of human being. The major cause is due to accidents. Accidents can be of many types like earthquake, tsunami etc. The accidents cause by natural calamities is not in our control. The amount of road accidents is more comparative to other ones. India is country where the death rate due to road accidents is more. In future, lots of highways will be constructing in India. In India temperature changes rapidly which causes cracks to roads leading to failure of road. These problems are solved out by following remedy. By watering the road every day and by spraying air on it, the road can be reuse within few hours. This is easy and quick method of watering of road. Read More...
|
Civil Engineering |
India |
704-705 |
174 |
Image Watermarking using LBP Transform Technique
-Riddhima Prakash ; Faseeh Ahmad
This research work presents a novel approach of fragile watermarking using Local Binary Pattern (LBP). The LBP method has been widely used by researchers for feature extraction and pattern matching tasks especially related to face detection. The usage of LBP for watermarking has been relatively new and not many researches are available towards this approach. LBP method has important role in image authentication and registration and is an integral part of various applications. The local contrast between central pixel value and its neighbourhood pixel values, is evaluated and this spatial relationship is finally described in a binary pattern. Read More...
|
Electronics & Communication Engineering |
India |
706-710 |
175 |
Design and Fabrication of Autonomous Machine for Removal of Stones in Agricultural Field
-K L Senthil Kumar ; N Deepak; V R Naveen Kumar; A Nishanth
Indian agriculture is traditionally rainfed and dryland cultivation. Farming practices are heavily dependent on physical labour and the rising cost of cultivation, acute labour shortage to carry out the farming practices in time, lead many to think alternative practices for improving their farm productivity in a sustainable manner. About 65 per cent of the total cropped area in India is rainfed. About 45 per cent of food grains and 75 – 80 per cent of pulses and oil seed production come from rainfed areas. In dry regions the soil contains a number of small pebbles and stones hindering farming activities such as land preparation and intercultural operations. Though rainfed drylands receive less amount of rainfall, the intensity during the short downpour is very high which leads to top soil runoff resulting in soil erosion and more number of pebbles and stones getting exposed in the field. Over years, productive lands turn barren and uncultivable because of low fertility, reduced water holding capacity and the presence of stones. Huge amount of labour is engaged and its unavailability is the major problem faced by the farmers. In general, women are engaged in the removal of pebbles and stones in dryland farming before the start of the cropping season. Till now there has been no machinery available to remove the stones from a field. While we have machines for sowing, spraying and harvesting till date no device has been developed for this small but importance aspect in farming. This project mainly concerns on fabricating an automatic stone remover in agriculture lands. This machine has been mainly developed for removing the stone present in the agriculture lands. In this machine we are using the wire mesh conveyor, conveyor with cup arrangement and motor. This is the time consuming process and it also neglects the man power. This process is automatically works by the power supply. Read More...
|
Mechanical Engineering |
India |
711-713 |
176 |
Experimental Study on Performance and Emission Characteristics of Diesel Engine using Biodiesel from Karanja Oil - Review Paper
-Dhruma A. Patel ; Sahil J. Parikh; Nirav G. Patel; Vyom A. Vidja; Dhruv J. Vaja
In present review work has been carries out to analyze the performance and emission characteristics of a single cylinder, CI engine fuelled with 100% diesel and Diesel-Biodiesel Blends at an various Load applied at an engine. Experiments will performed for five engine loads i.e. 1, 5 and 9 kg using baseline diesel and karanja biodiesel-diesel blends i.e. K30 and K40 with constant speed of diesel engine. The performance parameters evaluated were Break Power, Break thermal efficiency, break specific energy consumption (BSFC) and the emission parameters measured were Oxides of Nitrogen (NOX), Hydrocarbon(HC), Carbon dioxide(CO2), Carbon monoxide(CO). Read More...
|
AUTOMOBILE ENGINEERING |
India |
714-716 |
177 |
Range and Crafty Advance Introduced to Micro Controller based ECG Measuring Bio-medical Instruments
-Gulfshan ; Wasim Hasan
The paper offered here provides the solution of the problems that arise during the designing of a microcontroller based ECG monitoring instrument. The model covers of instrumentation amplifier and filter circuits etc, which are used for signal conditioning of the pulse input from the patient's body and displays on CRO as the ECG waveform. The paper is cooperative to choose right microcontroller along with the other accessible microcontrollers. It is also useful to understand the decrease of errors in the output using lowest circuitry. Read More...
|
Electrical Engineering |
India |
717-722 |
178 |
Vertical Axis Wind Turbine
-Vikram Panchal ; Macwan Saurabhkumar Rajeshbhai; Dabhi Vaibhavkumar Vijaybhai; Rathod Kirankumar Ashokbhai
As in the current and future of the world new updates are created day to day in every field. It is well known that we depend on the non-renewable resources such as natural gas, fossil fuels, oils which will certainly get exhausted now days. So keeping these things into consideration we a thought of generating power using non-conventional source which is in large quantities available naturally and has zero risk for extinction. Among the various methods for generation of electric power. Wind Energy being renewable resource of energy has got much attention for power generation. Taking into consideration the geographical aspects of our region, the vertical axis wind turbine will be efficient for power generation. The basic reason for using VAWT is that, it does not consider the wind direction and operates at low wind speed. Read More...
|
Mechanical Engineering |
India |
723-725 |
179 |
Design of Earthen Dam
-Prachi Dharmadhikari ; Rohit Gupta
A dam may be defined as an obstruction or a barrier built across a stream or a river. At the back of this barrier, water gets collected, forming a pool of water. The side on which water gets collected is called the upstream side, and the other side of the barrier is called the downstream side. The lake of water which is formed upstream is often called a reservoir, or a dam reservoir, or a storage reservoir. The water collected in this reservoir can be supplied for irrigating farm lands through a system of canal network, or may be supplied for drinking purposes. The lake so formed can be used for recreation uses. The energy of this collected water can be used to turn a mill to grind wheat or to turn the blades of a turbine to generate electrical power. And in times of floods, the dams can serve as protections for the towns and cities farther down the river. Read More...
|
Water Resource Engineering |
India |
726-736 |
180 |
Comparison of Design Results of a Structure between E-Tabs & SAP2000 Soft Ware
-Shaik Nazma ; G. Naga Sulochana
Basic Analysis is a branch which includes in the assurance of conduct of structures with a specific end goal to anticipate the reactions of genuine structures, for example, structures, spans, trusses and so forth. Under the normal stacking and outer condition amid the administration life traverse of structure. In this undertaking we will complete a similar investigation of virtual products. We will dissect and plan the structure on virtual products. At that point we will discover the outcomes in view of Bending Moment, Shear constrain, Base Shear, Axial Force for different areas. We will discover the product giving most conservative areas. We will check which programming is most simple to deal with, gives more secure and conservative structure. ETABS is the Acronym of Extended 3d Analysis of Building Systems, is programming created by Computers and Structures. ETABS is a building programming item that can be utilized to break down and plan multi-story structures utilizing lattice like geometry, different strategies for examination and arrangement systems, thinking about different load mixes. SAP2000 is Structural Analysis Program, is a broadly useful limited component program which plays out the static or dynamic, direct or nonlinear examination of basic systems.SAP2000 is universally useful structural building programming perfect for the investigation and plan of an auxiliary framework. In the present examination, 20 Story's private building is broke down with sections, segments in various Seismic zones as for three soil composes. Relocation, Story shear, Moment, Base minute, Base shear were looked at for changed load mixes. In the present examination a Static Wind investigation is completed by taking Earth Quake blends and results are taken and contrasted and two Software's. A business bundle ETABS and SAP2000 has been used for investigating 20 story's private working for various zones. The outcome has been contrasted utilizing tables and diagram with discover the most enhanced arrangement. Closing comment has been made based on this examination and correlation tables. Read More...
|
Structural Engineering |
India |
737-742 |
181 |
Applications of EEG Signal Acquisition-A Review
-R. Vignesh ; G. Prabhakaran; S. Vignesh; Dr. S. Maheswari
The Electroencephalographic (EEG) signals are those which records the electrical status of the human brain. The signal pattern varies according to the chemical reaction in the human brain. The recorded waveforms reflect the cortical electrical activity. EEG activity is quite small, measured in micro volts (mV). Acquisition of the EEG signal can be used in many research fields. Depending on the frequency of obtained signal it can be classified into four types they are: delta, theta, alpha and beta. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
743-746 |
182 |
A Literature Review- Design and Analysis of Wind Turbine for Street Light
-Darshana Ishwardas Patil ; Prof. M. Shakebuddin
An energy crisis is the major problem in all over world. Almost all the energy requirement is fulfilled by thermal power plants based on coal and diesel leading to pollution in the environment. Preventing these polluting power sources it is necessary to adopt alternate energy resources like solar power, wind power, etc. But out of all these wind energy is preferred as domestic safe-economical energy resource. The proposed work focuses on design and CFD analysis of wind turbine for domestic purpose. In present work, we will be accumulating all the data relevant to wind turbines, domestic wind turbines, its components, basic working principle of wind turbine, types of blades used, etc. According to collected data CAD model of domestic wind turbine will be generated and CFD analysis will be performed. After that results will be discussed and design will be finalized. Read More...
|
M.Tech in Machine Design |
India |
747-748 |
183 |
Review Paper on Design and Development of Manually Operated Wirtz Pump
-Vaidehi Shrotriya ; Gitanjali Chogale; Ankita Talgaonkar; Kiran Kolhe; Prof. Tushar Pokharkar
Nowadays one of the foremost problems is depletion of conventional energy sources i.e. fuel availability, finite sources of petroleum diesel gasoline etc. which are key sources of fuel in today's life. Electricity is also a crucial power source as same as fuel. In rural areas, cut off electricity is main problem. Some villages are situated in such location where it is difficult to supply electricity due to the complex environmental or weather conditions or physical location. In agricultural area, pump is mainly required for the water supply which needs electricity. To overcome those problems, it's necessary to use non-conventional or natural resources for the applications. We need to make modifications in machines (pump) in such a way that it will operate on natural sources. It should not only depend on electricity. Using natural resources will also prevent air pollution produces by using existing pump. In our study we found that, Wirtz pump is effective device to fulfil all above problems. Also is manually operated pump so it does not generate air pollution. And its output is totally depends on its structure, size of wheel and head available. Read More...
|
Agricultural Engineering |
India |
749-750 |
184 |
Wireless SCADA: Review Paper
-Poonam Shivaji Mate ; Santosh P. Agnihotri
people thus playing a major role in everyday life and on the opposite hand, there is a need for quick and safe producing method as well. In today's era, remote and centralized management is the need of control system. Large scale industries with higher monitory health can easily make use of SCADA (Supervisory Control and Data Acquisition) devices available in the market. SCADA is that the word form for "Supervisory Control and Data Acquisition", it is widely used in industry for supervise, control, monitor and data acquisition of industrial processes. Conventional SCADA systems use PC, notebook for supervise and control system. Wireless SCADA using a Java-enabled mobile phone as a client in a sample SCADA application so a to show and supervise the various processes of industry. An actual implementation of the on-line controlling of the processes via mobile phone or transportable device. The wireless communication between the mobile phone and the SCADA server can performed by Global system for mobile (GSM), Bluetooth, Zigbee or Internet etc. Mobile phone based SCADA integration using the wireless transfer scheme will enhance the performance of the industry without causing an increase in the response times of SCADA functions. The operator can visualize and modify the plant parameters using his mobile, while not reaching the location. This may increase the productivity and reduce the maintenance cost of industry. Read More...
|
Electronics and Telecommunication Department |
India |
751-753 |
185 |
Traffic Identification Engine for Real Time Networking
-Thanigavel M ; Jayasree K; Kowsalya S; Priyadharscini S
Traffic classification is an emerging topic in the field of computer science. The Classification and the analysis of the network traffic is useful to avoid the traffic congestion while transferring the data. The classification of traffic refers to categorizing the traffic according to its various application type and also helps in managing the overall performance of a network. The flow of traffic analysis is an essential piece of knowledge for engineering a network. However, with the rapid evolution of the internet applications the effectiveness of the customary methods like port based, payload based. The Machine learning algorithms has achieved high accuracy and best results. The use of Hello Packet for the classification makes easier in analysing the real-time network which adds accuracy to the existing system. The accurate classification is achieved using the hello packet which classifies the network in an effective way and transfers the data through the easier and the shortest path. Read More...
|
Information Technology |
India |
754-757 |
186 |
Design and Analysis of Gear Box Using Computational Fluid Dynamics
-Abhishek Kesskar ; Ashish Bonde; Soham Wavare; Aditya walunj; Utsav Mehta
The main objective of this work is to use the computational fluid dynamics (CFD) technique in analyzing and predicting the performance of a single stage Gear Box. The Gear analyzed is at the following design condition: flow rate of 1 kg/sec; speed of 250rpm and 1000rpm; and gear tooth temperature is150°C. The first stage involves the CAD generation of the Spur Gears in CATIA V5. The second stage deals with the design modeling of Enclosure in design modeler. Third stage, meshing of the Gear Box in mesh-equipped module.In the final stage, various results are calculated and analyzed for factors affecting impeller performance. CATIA V5, ANSYS Design Modeler, ANSYS Mesh and ANSYS CFD (CFX) modules are used for geometric modeling, meshing and solution respectively. Read More...
|
Finite Element Analysis and Computational Fluid Dynamics |
India |
758-761 |
187 |
Smart Ration Card Using Raspberry Pi
-Jadhav Jyoti Anandrao ; Jadhav Ashwini Jalindar; Jagdale Yogeshwari Vitthal; Prof. Taware R. D.
Ration card is important document for every Indian family. Every family is given facility by government to receive food grains against ration card. Quantities of different grain like sugar, rice, wheat are fixed for every month for families depending upon their income. The traditional public distribution system has two drawbacks: - first the shopkeeper who weighted the material can be inaccurate because of his mistake. Second is if the material is not bought at the end of the month shopkeeper will send to others without permission of the government. To overcome this drawback we have proposed in this paper "Automatic Smart Ration Card". RFID & GSM technology is used instead of ration card. The main purpose of this project is to bring transparency between government & customer, and this transparency is provided by webpage. Here ration book is replaced by RFID based smart card. When any transaction is done by customer will receive a message on his mobile through GSM technology. Read More...
|
Electronics and Telecommunication Department |
India |
762-764 |
188 |
A Survey on Reversible Data Hiding In Encrypted Images
-Athira Ramesan ; Syama R
This paper describes a survey on reversible data hiding in encrypted images. Data hiding is a process to embed useful data into a cover media. Data invisibility is its major requirement. Data hiding can be done in audio, video, image, text, and picture. Here use image for data hiding especially digital images. The data may be any text related to the image such as authentication data or author information. At the recipient side it must be able to extract the hidden data and original image. A data hiding technique satisfying this requirement is known as reversible data hiding. Reversible data hiding is a process to reverse the marked media (image) back to the original cover media (image) after the hidden data are extracted. In cloud storage, a content owner can encrypt an image to preserve his/her privacy, and upload the encrypted data onto the cloud. Reversible data hiding in encrypted image, which can recover the original image without any distortion from the marked image after the hidden data extracted. Now a day’s reversible data hiding in encrypted images is in used due to its excellent property which is original cover image can be recovered with no loss after extraction of the embedded data. Also it protects the original data. This paper describes various methods to hide and retrieve back additional messages in an encrypted image. Read More...
|
Electronics & Communication Engineering |
India |
765-767 |
189 |
A Survey on Skin Segmentation Techniques in Multimedia
-Elna Thomas ; Dhanya Narayan
The segmentation of skin regions is a pre requisite step in many computer vision applications dealing with the detection and recognition of humans and their activities. Such systems can be found in the fields of surveillance, human computer interaction and face recognition. In a general situation, skin detectors like Gaussian mixture models or skin probability maps achieve acceptable skin segmentation results. Although, color cues have the advantage to be relatively invariant regarding scale and orientation, the utilization color information is often a challenging task, as in images, the appearance of the skin color is dependent on different factors, like illumination condition, ethnicity, camera characteristics etc. However, the false positive rate increases considerably when the skin tones are in shadow or when skin-like background objects are under similar illumination. This paper presents a survey on various skin segmentation techniques to provide an accurate and better segmentation result. Read More...
|
Electronics & Communication Engineering |
India |
768-770 |
190 |
A Parking System Using Dynamic Resource Allocation Pricing and Spotting the Stolen Vehicle
-Prachi M. Pawar ; Aman Kumar Singh; Aishwarya Bambal; Akshada Kolgiri; Shital Sungare
Parking in major cities, particularly with dense trafï¬c, directly effects the trafï¬c flow and people’s life. Parking is an expensive process in terms of either money or the time and effort spent for the free spot chasing. Current studies reveal that a car is parked for 95 percent of its lifetime and only on the road for the other 5 percent. Cruising for parking is naturally the ï¬rst problem caused by the increase of car owners globally. System also deï¬ne a stolen vehicle detection part through car parking application. Read More...
|
Computer Engineering |
India |
771-773 |
191 |
A Survey on Noise Reduction Techniques Utilizing Inter-Channel Correlation for Digital Images
-Athira N S ; Dr. Rini Jones S B
Images are often received in defective conditions due to imperfections of scanning and transmitting devices. It may create problems for the subsequent process to read and understand such images. It is necessary to detect and remove noises present in the images. Reserving the details of an image and removing the random noise as far as possible is the goal of image denoising approaches. A variety of techniques have been presented in the literature on denoising digital images and each technique has its own assumptions, merits and limitations. The purpose of this paper is to present a survey of the published literature in dealing with denoising methods for digital images utilizing inter-channel correlation. In this paper an overview of various methods is provided. The denoising method's advantages and limitations are also discussed. Read More...
|
Electronics & Communication Engineering |
India |
774-776 |
192 |
Design and Development of Hubless Motorcycle with RLS
-Praful Krishna Mulik ; Prathamesh Nate; Akash Magdum; Dhiraj Shukla
Most automobiles depend on conventionally available fuels for propulsion and with the present rate of consumption, the petroleum reserves would last for less than a century. This fact makes crucial the need to find alternative which can reduce the burden on petroleum reserves. In the present work, an attempt is made to reduce the weight inside the front wheel thereby bringing down the centre of gravity much closer to the ground. In this design, hubless wheel to transmit motion from bearings to the wheel. The motion from the inner gear ring is transmitted to the rim by the bearings. The bearings are held on a bolt whose ends are connected to the stationary plates. When the inner gear ring rotates it makes only the bearings to rotate on the bolts as the stationary plate is attached to the vehicle body. The rotation of bearings makes the rim to rotate and helps the vehicle to move. The proposed 15 inch Mild Steel rim makes the system less bulky and improves the handling. As we can see in the rear portion of a conventional motorcycle has a swing arm and a coil spring. In our design, an attempt is made to integrate the quarter leaf spring with the chassis. This design minimizes the amount of material, production and manufacturing cost of the company as this arrangement does the work of swing arm and of the coil spring by using only component i.e. the quarter leaf spring. Read More...
|
Engineering |
India |
777-779 |
193 |
Design and Fabrication of Hybrid Cycle using Compressed Air
-Parandhaman. B ; E. Indhumathi; M. Nivedha; M. Prema; D. Thamizharasi
An alternative source of energy for vehicles is being aimed by engineers and scientists for centuries to compensate fossil fuels. Our project gives a detailed information of how an hybrid cycle works on an alternative energy source. Here we use compressed air to run the rear wheel of the vehicle using slider crank mechanism via sprocket and chain arrangement. This actually uses compressed air as their source to run the cycle without man power. Read More...
|
mechanical engineering |
India |
780-782 |
194 |
Case Study for Experiment Setup Characteristics of Palm Oil- Diesel Blending use in Diesel Engine - Review Paper
-Nimavat Pappu G. ; Maharshi Soni; Aman Jain; Parth Patel; Ankit Joshi
In present review work has been carries out to analyse the performance and emission characteristics of single cylinder.CI engine fuelled with 100% diesel and Diesel-Biodiesel blends at various load applied at an engine. Experiments will performed for three engine load 1,3,5 kg using baseline diesel and palm biodiesel blends i.e. P10 and P20 with constant speed of diesel engine. The performance parameters evaluated were break power, break specific consumption (BSFC) and emission fuel measured. Read More...
|
AUTOMOBILE ENGINEERING |
India |
783-787 |
195 |
Prevention of Attacks using Dempster-Shafer Theory in Mobile Ad Hoc Network
-Saurabh Garg ; Krishna Kumar Joshi (H.O.D)
MANET has grown to be an undividable and satisfactory element for communication for mobile equipments. Therefore, significance in research of MANET has been growing since last numerous years. But with the enhancement in technology, security has become a very challenging concern in MANET as it is without infrastructure and self-governing or autonomous. Two of the influential forms of such kind of attacks are wormhole attack and black hole attack that effects on the network layer. Trust is very crucial components for communicating with each other securely. In our proposed work, we apply on Dempster-Shafer theory that calculates the trust of each node accurately. The result shows that the method is quite better than the existing one. Read More...
|
Computer Science and Engineering |
India |
788-792 |