No. |
Title and Author |
Area |
Country |
Page |
351 |
Design and Analysis of Structure for 5KW Rooftop Solar Power Plant
-Mahesh Ashok Marathe ; J. M. Sayyed; F. R. Shaikh; A. R. Momin; Tausif
The article presents basic data on a 5 kW (rooftop) solar PV plant need to install on the building of the Faculty of Mechanical Engineering (ME building) in GF’s GCOE Jalgaon and the equipment for the estimation of its performance and energy efficiency depending on the real climate conditions (inverter, communication system, automatic meteorological station, etc.). The aim of the article is to design the Rigid structure or frame having long life & to obtained results in the integration of solar energy generation into a MSEB transmission network in order to increase the use of the solar PV plants for the commercial purposes in Maharashtra. The results of the experimental determination of energy efficiency and other characteristic parameters of the solar PV plant installed on the ME building in GCOE Jalgaon on April 2017 (global solar energy, ambient temperature, wind speed, generated electrical energy, etc.). It was found that the integration of this renewable energy generation into the MSEB transmission network in Jalgaon was considered satisfactory in 2017, Which saves Rs.10000 amount per month of building. The obtained data could be used as guidelines for the application of solar PV plants in other countries with a similar cli-mate. Read More...
|
Mechanical Engineering |
India |
1382-1385 |
352 |
Privacy-Preserving Cooperative Tagging Service Using Parental Control
-Shanmugapriya.D ; Dr.Rajabushanam.C
Collaborative tagging is one in every of the foremost widespread services accessible on-line, and it permits user to loosely classify either on-line or offline resources supported their feedback, expressed within the style of free-text labels (i.e., tags). though tags might not be in and of itself sensitive data, the wide use of cooperative tagging services will increase the danger of cross referencing, thereby seriously compromising user privacy. Here a primary contribution is created towards the event of a privacy-preserving cooperative tagging service, by showing however a selected privacy-enhancing technology, specifically tag suppression, will be wont to shield end-user privacy. Moreover, associate degree analysis is created to see however the approach will have an effect on the effectiveness of a policy-based cooperative tagging system that supports increased net access functionalities, like content filtering and discovery, supported preferences such by finish users. Read More...
|
Computer Science and Engineering |
India |
1386-1388 |
353 |
Efficient SLCA Based Keyword Search On Xml Using Collaborative Topic Regression
-Shanmugapriya.D ; Dr.Rajabushanam.C
Evaluating keyword search queries over gradable XML documents, as against (conceptually) flat markup language documents, introduces several new challenges. This paper initially tend to analyze properties of the SLCA computation and pro-pose improved algorithms to resolve the normal keyword search drawback (with solely AND semantics). The effective index structures and top-k algorithms are achieving a high interactive speed. The effective ranking functions are studied increasingly to spot the top-k relevant answers using LLISTS. This methodology is enforced on real knowledge sets and also take a look at results show that this methodology achieves each high search potency and result quality. The planned keyword searcher-turns the set of smallest trees containing all keywords, wherever a tree is selected as “smallest†if it contains no tree that conjointly contains all keywords. The experimental results shows that XRANK offers each area and performance edges compared with existing approaches. Read More...
|
Computer Science and Engineering |
India |
1389-1391 |
354 |
Investigation of Flexural Behaviour of Cold Formed Steel Built Up 'I' Sections Providing Angle Stiffener at the Web
-Wasim Reza
Cold Formed steel (CFS) is the products made by rolling or pressing steel into semi finished or finished steel at relatively low temperature, commonly known as cold working method of strain hardening method, is dislocation generation within the crystal structure of the material . CFS products are found in all aspects of modern life, in home, shop, office, car body, petrol pump station. For the uses of structural members of greater length, cold rolled sections are used. Cold formed steel sections are most efficiently used with structures of moderate loads and span, in which circumstances these cold formed steel sections can be cheaper than hot rolled steel members. This investigation presents the experimental study of the behaviour of the flexural strength of CFS sections by using ‘Two Point Load’ method. Here two built up I sections were fabricated by using symmetric channel section with the help of bolts provided in the web part of the section. One of the built up I section was provided with angle stiffeners. The moment in the zone between the two point loads were same and that portion is known as pure bending zone. Flexural strength was increased by providing angle stiffener throughout the length of the sections at the spacing of 40 mm between two stiffeners. Read More...
|
Civil Engineering |
India |
1392-1395 |
355 |
Comparative Studies of Conventional Slab and Bubble Deck Slab Based on Stiffness and Economy
-Nagashree B ; Sachin Hokrane; Soumajit Saha
Bubble Deck is a revolutionary method of virtually eliminating concrete from neutral axis of conventional slab, which does not perform any structural function, thereby dramatically reducing structural dead weight by linking air and steel directly. Bubble Deck slab uses hollow spherical or elliptical balls made by recycled plastic. A Bubble Deck slab has a two-dimensional arrangement of voids within the slabs to reduce self-weight.
Key feature of the project is to carry out the design each slab and compare them in terms of which includes stiffness and economy. We will compare these characteristics for better selection of the roof system suitable for proposing for particular project. Through this project we will be able to achieve adequacy on certain parameters like stiffness and economy.
Read More...
|
Civil Engineering |
India |
1396-1398 |
356 |
Recycling of Coconut Shell and Plastic Waste in Concrete by Replacing Coarse Aggregate.
-Sachin Agrawal ; Dr.Shalini Yadav
Electronics waste was the by-product of plastic industries and additionally it's collected from native space and it contains junk TVs, Radio, CDs, Computers, Chips etc. coconut shells could be a by-product of coconut industries. This treatise shows study on the results of an investigation of result of plastic waste and coconut shells as coarse combination replacement in concrete combine. Concrete mixes containing varied contents of the coconut shells and plastic waste were ready and properties material and concrete like fineness modulus, water absorption, relative density, crushing worth, impact worth, abrasion worth, workability, compressive strength and flexural strength were determined. Concrete of M-40 grade is ready containing coconut shells and plastic waste as a partial replacement of coarse combination in concrete. Plastic waste and coarse combination that passes from 20mm sieve were mixed in concrete. One of the best methods for using waste as re-uses material. The cost of cement used in concrete works is on the increase and unaffordable, yet the need for housing and other constructions requiring this material keeps growing with increasing population, thus the need to find alternative binding materials that can be used solely or impartial replacement of cement. Coconut shells, which are an environmental pollutant, are collected and burnt in the open air (uncontrolled combustion) for three hours and that product is incinerated in muffle furnace at 800oC for 6hrs to produce coconut shell ash (CSA), which in turn was used as binding in partial replacement of cement in concrete production. Reduction of cement usage will reduce the production of cement which in turn cut the carbon dioxide emissions. The time has come for the review of progress made in the field of development of binary blended cement concrete and aggregates. Read More...
|
Civil Engineering |
India |
1399-1402 |
357 |
A Beginner's Guide to Git and GitHub
-Megha Mudholkar ; Pankaj Mudholkar
Git and GitHub are the development platforms which help developers to host and review code, manage projects, and build software alongside millions of other developers. Git is the open source distributed version control system that facilitates GitHub activities on your laptop or desktop. Git, GitHub, and GitHub Pages are all very closely related. Git is the workflow to get things done and GitHub and GitHub Pages are places to store the work done. Projects that use Git are stored publicly in GitHub and GitHub Pages, so in a very generalized way, Git is what you do locally on your own computer and GitHub is the place where all this gets stored publicly on a server. This article explains basics of Git and Github along with installation guide and some basic commands. Read More...
|
Computer Applications |
India |
1403-1406 |
358 |
Investigation on Growth and Characteristics of Glycine and Glycine Oxalate Crystals
-M. Sivanantham
We demonstrate the growth of two different crystals such as glycine and glycine oxalate (GOA) by slow evaporation method. We investigated the physical properties of these crystals using different experimental methods. From the single crystal X-ray diffraction, the formation and type of crystalline structures is determined. Thermal stability of the crystals is determined using the thermo gravimetric and differential thermal analyses (TGA/DTA). TGA/DTA measurements showed that thermal stability of glycine crystals is slightly greater than that of GOA crystals. Z-scan technique suggested that GOA crystals are found to be suitable candidate for optical limiting applications. Read More...
|
PHYSICS |
India |
1407-1409 |
359 |
PERFORMANCE CHARACTERISTICS OF JATROPHA BIO FUEL BLENDS WITH KEROSENE USING DOMESTIC KEROSENE STOVE
-NAYANA G ; AHSHAY KAGE; AVINASHA P.S; MADHUSUDANA H.C; MUNIRAJU M
Now a day’s Biodiesel is one of the most popular field and it reached good height in automobile sector [1]. Biodiesel made huge changes in domestic applications. It has huge changes in fuel economy. One of the best option is replacement of kerosene to biodiesel. In India, in cooking stove kerosene is used as fuel. Kerosene causes environmental degradation. Because it contains impurities like sulphur, aromatics and hydro carbons. This paper contain burning pressure stove using jatropha bio diesel without changes in design of kerosene cooking stove [2]. This paper contains comparison of blends of bio fuel with kerosene. B20, B40, B60, B80, B100 and kerosene. This experiment is done on stove without any modification in design. Read More...
|
Mechanical Engineering |
India |
1410-1412 |
360 |
HUMAN ACTION RECOGNITION IN A VIDEO BASED ON SPATIO-TEMPORAL FEATURES
-Sushmitha.V.C ; Rashmi.S.R
Recognizing human actions in complex scenes is a challenging problem due to background clutters, camera motion, occlusions, and illumination variations. There are several realistic scenarios where human action recognition (HAR) highlights its importance for security purpose. Challenges in HAR are Application Domain, Variations in Inter and Intra class, Background and Recording settings, Human variation, Action variation…etc. In this paper spatio temporal interest points (STIP) are located in region that shows a high variation of image intensity in all three direction (x,y,t). Spatio temporal corners are located at spatio corners such that they invert motion in two consecutive frame. To classify the frames in video we are using K-nearest neighbor (KNN) by loading the trained features. Experimental results shows the effectiveness of our model. Read More...
|
Computer Network Engineering |
India |
1413-1416 |
361 |
REVIEW: A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD
-Mohd.Zameer ; Prof. Nitin Choudhary
Cloud computing provide security, insuring for the transformation of data file. Unfortunately, because of the repeatedly changes of the membership, sharing data while providing privacy-preserving is still a challenging issue, mainly for an untrusted cloud due to the collusion attack. Moreover, for occurring schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong presumption and is difficult for practice. In this paper, review on a safe information sharing plan for dynamic members. Our scheme is proposed a type of fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group. Read More...
|
Computer Science |
India |
1416-1417 |
362 |
Review:Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
-Brijendra Singh Jadaun ; Prof. Nitin Choudhary
Searchable encryption is one of fastly growing interest for protecting the data privacy in reliable searchable cloud storage. In this paper, we review the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very helpful in many applications of cloud storage. Searchable encryption shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. Searchable encryption is of elaborating eagerness for ensuring the information protection in secure searchable distributed storage. To refine this security vulnerability, we need to propose a new PEKS framework named dual-server PEKS (DS-PEKS). Read More...
|
Computer Science |
India |
1418-1419 |
363 |
An Approach to find the suitability of Locally Available Brick Kiln waste Surkhi as a Granular Sub Base Material for Indian Roads
-H.SHAKYA ; D.K. VERMA
for the pavements constructed on weak subgrade, Granular Sub-Base (GSB) layer became an important current construction practice of all the national highway projects in India. The recommended stringent specifications for the GSB material and its non-availability due to limited sources is one of the problem in road construction industry. Although in Indian road standards, there is provision for using the locally available materials in GSB layer, but most of these fail to satisfy the recommended specifications. Surkhi is one of the locally available brick kiln waste. This paper summaries the investigation carried out with an objective of developing the GSB mixes using the surkhi as partial replacement of stone dust. The laboratory tests like Grain Size Distribution, Atterberg Limits, Heavy compaction test, Soaked and Un-soaked California Bearing Ratio (CBR) tests were carried out for GSB mixes. Based on the tests results, it is found that Surkhi can be used as an alternative material in partial or full replacement of stone dust in GSB mix. This greatly encourages the utilization of locally available brick kiln waste Surkhi in the construction works of road pavements, this solves the problem of disposal of brick kiln industry waste and bring economy to road construction projects. Read More...
|
Civil Engineering |
India |
1420-1424 |
364 |
Geothermal Energy Systems and Potential: A Review
-Nikhil S Mane ; P. P. Awate; Swati P. Shinde
Geothermal energy sector is greatly ignored energy sector even though it has tremendous potential to fulfill energy need of nation. This is mainly because of unavailability of geothermal energy sites, unavailability of technology and high capital cost. Recent emerging trends can help to improve the condition of geothermal energy sector. This paper indicates recent trends in geothermal energy business and its growth as there is increasing investment is going on in the geothermal energy. As potential of geothermal energy is tremendous, new technology can overcome the technical and financial problems occurred previously in geothermal energy sector. Read More...
|
Mechanical Engineering |
India |
1425-1426 |
365 |
FPGA Implementation Of Area Efficient Finite field Redundant Multipliers
-RAGU B S T ; S.Maragatharaj; N..Vijayanantham
Redundant Basis (RB) multipliers over Galois Field (GF) is a basic operation in modern cryptographic systems. Because of their negligible hardware budget for squaring and modular reduction. An improved recursive decomposition algorithm has been applied for Redundant Basis multiplication to get the high-throughput digit-serial presentation. Over effective forecast of Signal-Flow Graph (SFG) of the planned algorithm, an extremely regular Processor-Space Flow-Graph (PSFG) is obtained. The analysis and synthesis outcomes confirm the efficiency of planned multipliers over the present ones. The synthesis outcomes for Field Programmable Gate Array (FPGA) and Application Specific Integrated Circuit (ASIC) consciousness of the planned designs and present designs are compared. The high-throughput structures are the best among the corresponding designs, for Field Programmable Gate Array and ASIC implementation. Read More...
|
Electronics & Communication Engineering |
India |
1427-1431 |
366 |
Corrugated Metal Roof Cladding Sheets Subjected To Uplift Pressure
-Lokre Parashuram ; Dr. S. RAVIRAJ; Sri. SATISH R
Corrugated metal roof cladding sheets are widely used in the industrial, residential and other buildings. In recent times corrugated metal roof cladding sheets are used in different geometries with different colors and have a wide range of applications in industrial structures. Corrugated steel sheets are frequently used for roofing and siding in buildings because the sheets are strong, lightweight, and easy to erect. In many cases they are used as shear diaphragms to replace conventional bracing and to stabilize entire structures or individual members such as columns and beams. These roofs during windstorms are subjected to intense fluctuating external pressures at windward roof edges. Loads on these areas can be gradually increased when combined with large positive internal pressures resulting from a breached windward wall, giving a large net uplift load, that is, large negative pressure is produced. In the present work design of arc tangent corrugated metal roof cladding sheets is attempted. The sectional properties of corrugated metal roof sheets of standard sizes as specified in IS277:1992 are computed using the method suggested by Blodgett. These standard sheets are subjected to wind loads as per IS 875:1997 (part 3) considering various parameters like height and width ratio of the building, angle of roof, wind zones, etc. Design tables are proposed which give the thickness of the arc corrugated sheets to resist safely the wind pressures due to the various combinations of the above parameters. A study is also made to find the influence of parameters like height to width ratio, width of building, roof angle, and basic wind speeds on the thickness of corrugated sheets. An attempt is also made to perform a linear static analysis of corrugated metal roofing sheets using the finite element software ANSYS 12.0. ‘Quad 8 node 183’ and ‘Brick 20 node 186’ elements are used for the discretization of the corrugated metal roof sheet. Stresses and deformations are computed for various corrugated metal roofing sheets. These values are found to be within the permissible limits. The numerical analysis suggests that the values of thickness given in the design tables are found to be adequate. The proposed design tables helps the designer to readily select a suitable thickness for the corrugated sheets in any wind zone of India. These tables are simple and convenient to use, and covers wide range of parameters encountered during the design. Read More...
|
Civil Engineering |
India |
1432-1438 |
367 |
ADVANCE SMART CART SYSTEM IN SUPER MARKET
-CHETHAN B N ; Dr. C Mallikarjuna; Dr. R Suresh
In this venture we are utilizing Pic microcontroller and this is the heart of our venture the distinctive information and yield gadgets are associated with the controller as indicated by the information flag sustain to the controller the controller will control the yield gadget this is accomplished by programming customized to the small scale controller. RFID labels are utilized as a part of this venture as each RFID labels have an one of a kind number and thus this rationale is utilized to discover the item which client his picked and relying upon the item the prize of the item is shown in the LCD show basically when a client chooses an item and drops in the trolley every trolley is included with a controller and a RFID card per user this card per user examines the extraordinary RFID number present in the RFID labels this number is sent to the controller and this information is additionally prepared in the controller to get the name, prize and the legitimacy of the item. Read More...
|
Industrial Automation Engineering |
India |
1439-1442 |
368 |
Border Security System with Missile Tracking
-Pavan Sundar ; Dr. C Mallikarjuna; Dr. R Suresh
comprehend that the shoudliers are surrendering their lives all through day and night to secure the nation. Regardless of every one of the examinations taken by the military individuals, interlopers may cross the edges and go into our property to hurt the essential properties of the nation and butcher the guiltless open. To manage this issue we have made an endeavor to chart an inserted framework which can see the section of gatecrashers and make the essential move in a brief moment. Utilizing mechanical focusing on, we can utilize this structure to trigger the firearm which wrecks the rockets pushed by the enemies in air. Read More...
|
Industrial Automation Engineering |
India |
1443-1446 |
369 |
CMD: Call, Message, Data Transfer
-Himanshu Ashok Kolhe ; Akshay Deshmukh; Suraj Kapse; Gaurav Dhakane; Prof. Sphurti Deshmukh
Today, we Surrounded by wireless connectivity where everyone prefers to be online without a bundle of wires. Communication through mobile phones comes at a certain expense. The proposed system will reduce this expenses at a certain level and make this communication a cost-free communication. The purpose of this project is to make use of available resources for providing efficient free voice calls, without using service provider. The co-workers of an organization, colleagues or staff members can communicate with each other by using the range of router, but without internet. No burden on institute or organization as infrastructure cost is reduced. This system can prove as the best alternative for existing intercom system. Read More...
|
Computer Engineering |
India |
1447-1450 |
370 |
Design and Fabrication of an Auto Cutter for Rubber Sheet Cutting
-Vrushali Junnare ; Vrushali Dahite; Prasad Kasodekar; Hemant Chavan; Prof.(Dr.) L.K.Toke
The machine we have designed and fabricated is used for cutting the rubber safely by automation. Hence our project namely “Design and Fabrication of an Autocutter for Rubber Sheet Cuttingâ€. This mechanism can be widely applied in almost all tyre industries. The rubber sheet cutting is the main part of all the tyre industries. Normally the cutting is manually hand operated but our project is pneumatically operated. Automation in the modern world is inevitable. Any automatic machine aimed at the economical use of man, material and machine worth the most. In our project a hand operated valve and flow control valve is used for semi-automation. The machine works with the help of pneumatic double acting cylinder. This paper includes cutting the rubber sheet safely without causing damage to the equipment and operator. Read More...
|
Mechanical Engineering |
India |
1451-1452 |
371 |
AUTOMATED ACCIDENT ZONE DETECTOR WITH VEHICLE SPEED CONTROLLER
-CHETHAN KUMAR M ; Dr. C Mallikarjuna; Dr. R Suresh
This wind presents Autonomous speed control of over speeding vehicle utilizing Radio Frequency. The oversee target is to arrange a controller and diminishing the speed of the vehicle, endorsed for vehicle's speed control and to screen the zones, which can keep running on a presented framework. Control can be astoundingly made to fit into a vehicle's dashboard, and data on the vehicle. The proposed framework is made out of two separate units: Zone status transmitter unit and recipient unit. At whatever point the vehicle is inside the transmitter zone, the vehicle speed is controlled by getting the standard, i.e.., each time the vehicle speed is reduced by some cut off and kept reliable until the vehicle moves out of the transmitter zone, and accordingly the vehicle can get empowered free from some other individual. The IR sensor sees the speed of the vehicle and sends the data to Micro controller. Reduced scale controller banters with engines through driver IC to take sensible headings to adjust challenges. Read More...
|
Industrial Automation Engineering |
India |
1453-1456 |
372 |
AUTOMATIC MENU ORDERING SYSTEM USING ZIGBEE AND ARM PROCESSOR
-HARSHADA S. WABALE ; UTTAM B. DESHMUKH; GOURAV B. HONRAO; Prof. CHAVAN M.A.
The main aim in the present field is Automation, reduce Power consumption and also reduce the cost. Automation is necessary to reduce man power. Wireless communication has become an important role in the field of automation. Combination of an embedded system and wireless communication used in designing of various applications ranging from home automation to industrial automation. The aim to substitute the traditional pen and paper method by the automating menu ordering system to save the time consume by traditional menu ordering system. We use ZigBee pro and SQL Server database to develop the automatic ordering system. Due to this system customer can easily order the food from table. Also the serving of food is easier and serves on first come first serve basis. Also manager get all the information of food material available after every order in the kitchen. Read More...
|
Electronics and Telecommunication Department |
India |
1457-1459 |
373 |
Clap Pattern Based Electrical Appliance Control
-Priyanka Ashok Patil ; Prof. Aditi Shukla; Kanchan Ravindra Nanaware; Shital Balaji Salve
In this paper, we present idea to control Electrical Home Appliances like Light, TV, Fan, Bulb etc. using Clap. There are various techniques available to control Electrical Home Appliances such as IR based remote control switch, ON OFF Switch, Using WIFI or Bluetooth Device control. But our method is most cost effective. This project has a big social impact. Our aim is that physically challenged user. We design PIC based circuit to detect clap from other sounds. Read More...
|
Electronics and Telecommunication Department |
India |
1460-1463 |
374 |
MULTILAYERED SECURITY IN USB DRIVES
-Nitin Yadav ; Prashant Sharma
Data security in USB or disks has turned out to be an important research issue in recent years, because of lack of efficient algorithms. As the technology is advancing many high performance computer are available in market, using which intruder can change or take the data from a disk or USB. This system is mainly designed for any person or organisation who wants to secure their data in Today’s World. This system mainly concentrates on two steps: first is to combine more than two algorithms for full disk encryption, second is to ask for encryption key or password when someone tries to decrypt it. The success rate has been tested on 5 sets of data entries of different size approximately, though the throughput of our algorithm is less but it is more secure than others. We have used AES with SHA-1 & integrated the BitLocker module along with these 2 algorithms. All these algorithms together provide sufficient security for any disk. Read More...
|
Computer Science and Engineering |
India |
1464-1466 |
375 |
A Review on Cow Dung Ash as Partial Replacement of Binder in Cement Mortar
-SHUBHAM PATIDAR ; VISHAL PATIDAR; UTSAV JAIN; SHIVAM NEMA; ASHISH NIM
Experimental investigations carried out to study the cow dung ash on the strength of mortar. Cement was partially replaced with six percentages (5%, 10%, 15%, 20%, 25% and 30%) of cow dung ash by weight. Test performed on the mortar mix are compressive strength, workability, initial and final setting time. The compressive strengths of the mortar specimens were determined at 7, 14, 21 and 28 days respectively. The tests were performed on the moulds of size 70.6mmX70.6mmX70.6mm. The test results revealed that addition of CDA to cement paste prolonged the setting time. The compressive strength of the mortar is reduced with the increase in CDA. It has been observed in mortar, 10% replacement of cement by CDA may be used as a partial replacement to cement in mortar. Thus 10% replacement of cement by CDA gives satisfactory result. Read More...
|
Civil Engineering |
India |
1467-1470 |
376 |
Analysis of Various Effects on Tensile Strength and Yield Strength in Friction Stir Welding Due to Different Influencing Factors
-Jyotsna Prajapati ; Dr. P. L. Verma
Friction stir welding is a highly used welding process which combines high strength aluminum alloys, thermoplastic material and other metals also. Weld joints are defined on the basis of their strength that means how efficiently it will perform when high load is applied without any failure or rupture. This paper presents the changes in the tensile strength and yield strength of weld joint, produced due to variations in the input parameters i.e. welding speed, axial force and pin diameter of welding shoulder. There is basic need to get the optimal values of all these influential parameters which can be obtained using proper observation of the relative changes in the behavior of weld joints. Different experimental data is used to obtain relations between all parameters and various effects on mechanical properties are analyzed in detail. Read More...
|
ADVANCE PRODUCTION SYSTEM |
India |
1471-1474 |
377 |
Automatic Text Summarization: The Future Need
-Kavita Jain ; Mr. Manish Dubey
Numerous documents are available on internet and the number of documents is also rising day by day. In such a scenario reading the complete documents related to a topic is quite impossible , if we get the summary of the related one it will be quite useful and speed up the total process. In our paper we review the concept of automatic text summarization, its approaches etc. Read More...
|
Computer Science and Engineering |
India |
1475-1479 |
378 |
ASPECT BASED OPINION MINING: IN CONTEXT OF HINDI ROMAN LANGUAGE USING NLP
-MARIYA ZAFAR ; Masood Ahmad; Dr. Shafeeq Ahmad
The internet revolution has brought about a new way of expressing an opinion. It has become a medium through which people openly express their views on various subjects. These opinions contain useful information which can be utilised in many sectors which require constant customer feedback. Analysis of the opinion and it's classification into different classes is gradually produced as a key factor in decision-making These strategies usually attempt to extract the overall sentiment revealed in a sentence or document, either positive or negative, or somewhere in between. However, a downside of those strategies is that the information is often degraded, particularly in texts wherever a loss of information may occur due to mismatch of grammar in global language. In this paper, we tackle such situation Firstly with the implementation of Autocorrect feature, Secondly by acknowledging those Aspects based words which user writes in their home language. Then we apply our limited datasets to regain such words in its standard form. This method helps us to make our sentiment analysis more efficient. Read More...
|
Computer Science and Engineering |
India |
1480-1483 |
379 |
Enhancing security through Ids in cloud environment
-Kaushalya Nakum
Cloud computing is growing field and rapidly increasing popularity in IT field. Due to a list of advantages of cloud computing, it promises to cut operational and capital costs and provide flexibility to users as per their requirement. However, uncounted advantages of this technology, there is some issues related to security. Security is the more challenges in a cloud because it is open for an attacker and that’s why many organization hesitate to adopt the cloud environment. IDS is the commonly used techniques to detect some suspicious activity. Captured data analyzed and classified to detect the malicious activity in cloud virtualized environment and to increase the detection accuracy and reduce the false alarm using signature and anomaly technique. Read More...
|
Computer Engineering |
India |
1484-1488 |
380 |
Android Application for Shopping Malls with Anti-Theft System
-Omkar Joshi ; Lokesh Bhalerao; Sagar Pujari; Kamlesh Jetha
Nowadays everyone uses mobile phones, as people are uses internet everywhere. Many enterprises uses mobile applications to attract mobile users. In traditional shopping in shopping malls we have to wait in the long queue to make payment. The proposed application can read the barcode(s) of the product(s) & add it to the shopping cart in the application. It provides module to change the quantity of product/s purchased and edit the list. Payment can be according to customer convenience. After adding the products to the list and after doing the shopping the application will generate the QR-code for the purchase. After that the QR-Code can be scanned at billing counter and the bill will be generated. The bill is verified using an arduino kit weighing machine which transfers the total weight of the list items to the application. Then the physical weight will be checked with the applications weight for verification purpose. The proposed application can reduce human efforts and can be used very easily while shopping in malls. Read More...
|
Information Technology |
India |
1489-1492 |
381 |
EFFECT OF MAGNETIC FIELD TREATED WATER ON COMPRESSIVE STRENGTH OF CONCRETE
-AAKASH LAAD ; ARIHANT JAIN; KIRTI CHITRARTH SINGH
This project investigates on compressive strength of unconventional concrete prepared with magnetic field treated water (MFTW). MFTW was prepared by passing water through magnetic field generated using electromagnets. The main objective of this research is to reduce the cement content in concrete. The test are conducted on samples prepared with different magnetic strength of treated water. Results show that the compressive strength of prepared samples with MFTW is higher than those prepared with normal tap water. The significant increase in compressive strength is observed in early days. Read More...
|
Civil Engineering |
India |
1493-1494 |
382 |
Home Automation using Raspberry Pi
-Madhura Chorghe ; Akash Ugale; Ameya Vaity; Prof. Nikita Kulkarni
Living in 21st century, with technologies surrounding people lives has made life very much easier. Home automation using Raspberry pi is one of those technology which is not only easy to use but also available at low cost. It has become a necessity to control home appliances from desired location. Number of devices are available in the market that allow us to monitor our home using a central interface. This technology offers new and exciting opportunities to increase the connectivity of devices within the home for the purpose of home automation. Read More...
|
Computer Science and Information Technology |
India |
1495-1497 |
383 |
Label Recognition with Audio Output For Blind People
-Ruchika Dudhat ; Prof. Jyotsna Nanajkar; Sayali Gaikwad; Bhagyashree Kakde
Visually impaired people face tremendous inconvenience in their routine life. The proposed system aims at making them self-sufficient by providing assistance to read the product labels thus fostering their daily activities. This work deals with an idea of making a portable hand-held device which recognizes the product labels and provides an audio output of the same. Portability of the device is achieved using Raspberry pi which has an inbuilt audio output jack. The camera contributes in capturing the product image which further undergoes text extraction. The extracted text is then processed under the OCR algorithm to recognize the text and then the audio output is generated. Read More...
|
Electronics and Telecommunication Department |
India |
1498-1500 |
384 |
Review of Security Threats in Wireless Sensor Networks
-Harjot Kaur ; Er. Rupinder Kaur; Er. Sangeet Pal Kaur
Wireless sensor nodes are made up of small electronic devices which are capable of sensing, computing and transmitting information from harsh physical environments like a surveillance field. These sensor nodes majorly rely upon batteries for energy, that get depleted at a quicker rate because of the computation and communication operations they have to perform. Wireless Sensor Network (WSN) is a self-configuring type of network in which sensor nodes can join or leave the network when they want. WSN’s are usually installed at unprotected and bitter environments where security is an essential issue. In such unprotected environments WSN’s are open to many active as well as passive attacks. Security of WSN is very important as such types of networks are generally causing alerts which require sudden attention. False alerts generated by the WSN’s may lead to unwanted actions. In this paper various security issues of wireless sensor networks is reviewed and compared in terms of various parameters. Read More...
|
Electronics & Communication Engineering |
India |
1501-1505 |
385 |
Design and Analysis of Motorized Bicycle to Reduce the Human Efforts
-Divyarajsinh Rathod ; Yash Thakkar; Abhay Parmar; Jay Parikh
In the modern era of automobile there are need to be simple construction vehicle which is convenient for workers, suppliers, and people for transportation function and for carrying goods. So, we are trying to constructs motorized bicycle which will help people for transportation with optimum cost and less effort. By using the engine from Luna TFR we are going to assemble it on the rear wheel of bicycle, which will operate by fuel (petrol). Generating power ultimately rotate the pulley mounted on the crankshaft at either side of the engine and pulley is connected with rear wheel of bicycle with the help of belt and idler pulley on it and it will rotate the rear wheel of bicycle. If we can imply this phenomenon in load carrying tricycles it will less the human effort. By use of this we can minimize traffic issues because it is compact in size and low speed bicycle. Read More...
|
AUTOMOBILE ENGINEERING |
India |
1506-1511 |
386 |
Graphical Authentication System to Resist Botnet
-Kirthika S ; Shenbagavalli R
A botnet is a collection of Internet-connected user computers (bots) infected by malicious software. They can be used for many malicious purposes, including to steal user’s personal data and passwords, attack public and private networks. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to botnet attacks. To make user authentication more secure by avoiding alphanumeric string which users tend to choose passwords either short or meaningful for easy memorization. To overcome this problem, we conduct a comprehensive survey of the existing graphical password techniques and proposed a new technique, proposed a novel authentication system called random pixel selection based on graphical password. Thereby, graphical authentication system called Random Pixel Selection can be done as one-time login indicator. The server would generate an image for user from the preselected images. By using Local Directional Number pattern, the features of the image are compared with generated image whether it is the user’s preselected image or depredation. The proposed system achieves better resistance to Botnet attacks while maintaining usability. Read More...
|
Computer Science and Engineering |
India |
1512-1515 |
387 |
Smart Ration Distributions Based on GSM and RFID Technology for the Smart World
-Arpita ; Poornima S. J
Now a day ration card is very important for every home and used for various field such as family members details, to get gas connection, it act as address proof for various purposes etc. All the people having a ration card to buy the various materials (sugar, rice, oil, kerosene, etc) from the ration shops. But the existing system is having two draw backs, first one is weight of the material may be inaccurate due to human mistakes and secondly, if not buy the materials at the end of the month, remaining will be sold to others without any intimation to the government and customers. In this paper, proposed an Automatic Ration Materials Distribution Based on GSM (Global System for Mobile) and RFID (Radio Frequency Identification) technology instead of ration cards. To get the materials in ration shops need to show the RFID tag into the RFID reader, then controller check the customer codes and details of amounts in the card. After verification, these systems show the amount details. Then customer need to enter they required materials by using keyboard, after receiving materials controller send the information to government office and customer through GSM technology. In this system provides the materials automatically without help of humans. Read More...
|
Computer Science and Engineering |
India |
1516-1518 |
388 |
User Choice Based Recommendation on Live Discount using Wi-Fi/Android System
-Akshay Kotian ; Indresh Rawat; Lalit Babar; Chaitanya Amin; Mrs Ekta Sarda
User choice Based Recommendation on Live Discount Using Wi-Fi/Android System present a system that can be used with any current mobile phone system to provide location based information/advertisements to any mobile phone, equipped with Wi-Fi technology. Our project is a website that gives you advertisements based on the user’s current location. The project is very suitable for entertainment plazas, theatres, shopping malls. The entire experience can be made more dynamic and personal using this architecture. A person entering inside the premises can view this data using Wi-Fi. Shopping malls can use this technique to provide information about offers in the respective stores. Read More...
|
Computer Engineering |
India |
1519-1521 |
389 |
IoT based Street Lights for Smart City
-Akshada Mohite ; Rutuja Sonawne; Sayali Arkade; Shraddha Joshi; Vikas Patil
Streetlights are among a city’s strategic assets, providing safe roads, inviting public areas, and enhanced security in homes, businesses, and city centers. However they’re usually very costly to operate, and they use in average 40% of a city’s electricity spending. As the cost of electricity continues to rise and as wasting energy is a growing concern for public and authorities, it’s becoming crucial that municipalities, highway companies and other streetlight owners deploy control systems to dim the lights at the right light level at the right time, to automatically identify lamp and electrical failures and enable real time control. Street Light Monitoring & control is an automated system designed to increase the efficiency and accuracy of an industry by automatically timed controlled switching of street lights. This project describes a new economical solution of street light control systems. The control system consists of a GSM Modem, and control circuitry and the electrical devices. Base server can control the whole city’s street lights by just sending an SMS to GSM network. The main motive behind implementing this project to save energy. Also we can automate daily required electrical switching using this project. Read More...
|
Computer Engineering |
India |
1522-1524 |
390 |
Analysis of High Rise Building for Wind Load
-Saurabh V Kawale ; Prof. S V Joshi
In present scenario high rise structures have technical and economic advantages in areas of high population density, and have become a distinctive feature of housing accommodation in virtually all densely populated areas around the world. In contrast with low-rise and single-family houses accommodate more inhabitants per unit of area of land and decrease the cost of structures. In the recent times, there had been so many catastrophic damages caused by high wind speed especially in the U.S. and in the coastal regions of India which prove that many buildings that are currently in use are not fully wind resistant. This paper we have calculate the wind load using gust factor method by the present IS code [IS: 875 – (Part 3) – 1987] and as per the new code [IS: 875 – (Part 3) – 2015) for zone 3 with terrain category 3 using STAAD PRO Software. Read More...
|
Structural Engineering |
India |
1525-1527 |
391 |
A Review on Grayhole Attack and various Mitigation Techniques in VANET'S
-Komalpreet Kaur ; Er. Rupinder Kaur
Vehicular adhoc networks (VANETs) is an advancing technology with a specific class of MANET. It does not have any fixed framework. Communication among vehicles is between vehicles and roadside units. So security is a powerful area for VANET. For authentication idea, lowers the execution and transmission capacity is high. And possibility of network must be recover when a node sends any required information to other node. The aim of this paper is to give an overview of VANETs with special effects of Gray Hole attack in Adhoc on demand distance vector Routing (AODV) protocol based on VANETs. We have used various execution metricals for Grayhole attack in VANETs. To simulate this attack we obtained simulation results NS-2.35 simulator. NS-2.35 has been used widely. Read More...
|
Electronics & Communication Engineering |
India |
1528-1531 |
392 |
Modelling and Optimizing GTAW of SS303 Weld Parameters using Factorial Approach
-P. Kulantai Samy ; D.Balaji; E.Sathish Kumar ; S.Alexander
Gas Tungsten Arc Welding (GTAW) is a commonly used welding process that produces an arc between a non-consumable electrode and the work to be welded. This experimental study aims at optimizing various Gas Tungsten Arc welding parameters including welding voltage (V), welding current (I), gas flow rate (GFR), nozzle to plate distance (NPD) and Torch angle (Ó¨) by developing a mathematical model for sound weld deposit volume of a SS303 specimen. Factorial design approach has been useful for discovery the relationship between various process parameters, weld deposit volume and the hardness of the welded area. The study revealed that the welding voltage, current and gas flow rate varies directly with weld deposit volume and inverse relationship is found between torch angle and NPD with weld deposit Area. Read More...
|
Manufacturing Engineering |
India |
1532-1539 |
393 |
Risk Management in Indian Construction Industry by Using Interpretive Structural Modeling (ISM)
-Kaushal Ardeshana ; Umang Sheth
Risk is the probability that an unfavorable outcome will occur. Risk management is the process of measuring risk and then developing the strategies to manage the risk. Literature regarding Interpretive Structural Modeling has been reviewed and found that this method has wide area for application in construction also to minimize various types of risks. The purpose of the study is to identify construction execution risk with the help of relationship among them by questionnaire survey and interdependency can be found. Diagraph can be generated from data analysis which provide clear idea about high to low risk activities and it is helpful to minimize the risks easily. Furthermore this method can be applied on various size of project to minimize risk. Read More...
|
M.Tech in Construction Project Management |
India |
1540-1543 |
394 |
Smart Generator Switching and Fuel Monitoring System Based on WSN Technology
-Neelam Tiwari ; Dr. A. K. D. Dwivedi
The rapid progress in the field of wireless communication and embedded systems has made wireless sensor networks (WSN) technology. In WSN based system, whole system is divided in to two units first is communication unit and second is sensor unit. The communication unit consists of mainly one pair of zigbee S2 modules to provide a wireless communication and the sensor unit consists of mainly ATMEGA328P microcontroller, ultrasonic sensor, LCD display and a buzzer. A WSN consists of many cheaper and smaller wireless sensors, which are capable of collecting and processing environmental information, and communicating with neighboring nodes in the wireless medium. In this paper, we propose an architecture for monitoring of fuel level and switching of smart generator using wireless sensor network (WSN) technology. For establishment of WSN technology, ZigBee/IEEE 802.15.4 protocols [1] are used. The proposed model based on WSN technology has many of the advantages such as Low-power consumption, huge network capacity, high reliability, low cost etc. [2]-[7]. Read More...
|
Electronics Design and Technology |
India |
1544-1547 |
395 |
Cross Linked Social Media Networks
-Jyoti Kumari ; Deepak Kr. Sinha; Dipti Sharma; Rajeev Kumar Ranjan; Dr. B S Shylaja
As the penetration of Social Media Networks in today life is increasing, people tends to use different social media platforms to express their knowledge, information and views. Different media platforms provide variety of features to users and people use them according to their requirements. With advancement in SMNs, there is a need to acknowledge different users active on multiple SMNs. Cross platforms identification helps to identify similar users accessing multiple social media platforms. In this paper, we are presenting a system comprising of three different platforms namely AITBoys, AITGirls and AITTeam. This system includes the users from an institute i.e. students and staffs. Users get the multiple options regarding posting (public, private), adding multiple friends, acknowledging different users active on multiple platforms i.e. how many platforms are being used by any particular user etc. This system is also subjected to security measures to check unwanted post, provide safety for data transmission. Read More...
|
Information Technology |
India |
1548-1549 |
396 |
Implementation of Computer Aided Cancer Cell Detection using Capsule Endoscopy Image
-Aswini K ; Shanmuga Sundaram P
Together with various cancers, the colon cancers grow into a leading problem to human. There are many screening methods are used to find cancer cells in colon region. Such methods are sigmoidoscopy, colonoscopy, stool DNA test, etc. In this paper, the endoscopy images are used to examine the colon region whether the cancer cells are present or not. Capsule endoscopy is a recent procedure to capture the images of colon region. These images are segmented using the Aphelion Dev software. Here the threshold segmentation is to be done to get the cancer cell and normal cell images distinctly. Read More...
|
Electronics & Communication Engineering |
India |
1550-1554 |
397 |
Traffic Reduction based on Social Media Data using 5W Model
-A E Deepthy ; V. Gopikrishnan
Crowdsourcing is a technique that helps to create solutions that improve urban environment, human life quality, and city operation systems. Detection about urban emergency events, e.g., fires, storms, traffic jams is of great importance to protect the security of humans. A novel platform for providing geographical information is done by using social media feeds. The content from social media usually includes references to urban emergency events occurring at, or affecting specific locations. The detection of urban emergency events is done using the 5W Model. The spatial and temporal information from the social media are extracted to detect the real time event occurring at a particular location. A Global information system based annotation of the detected urban emergency event is shown. The proposed method is evaluated with prioritizing the events based on the crowd and instant notifications of the events are sent to the concerned people to reduce traffic and time. It also enhances the security of social network by introducing content filtering in user wall using short text classifier and secondary personalized word prediction in chat. The results show the accuracy and efficiency of the proposed method with great importance to protect the security of humans. Read More...
|
Computer Science and Engineering |
India |
1555-1558 |
398 |
Performance Evaluation in Spectral Efficiency in the Broadcast Communication Based DVB RCS2 System Transmission
-Alamuri Bharathi ; Teku Sandhya Kumari
Achieving the improved digital communication systems with the cancellation of Non-Linear Distortion Noise is difficult task. Transmitting the digital video broadcasting through air interface through the interleaved Frequency- division multiple access scheme is possible. The comparative study is need to be done with the consideration of single carrier frequency division multiple access schemes and orthogonal FDMA schemes with the satellite uplink. The High Power Amplifiers should be operated in the K Band and S Band. The multiuser environment has to be developed to demonstrate the performance of synchronous and asynchronous LFDMA, IFDMA and OFDMA. The performance results of the Frequency Division Multiple access should be evaluated. In fact the Iterative Frequency Division Multiple Access is regarded as the outperforming scheme. The Inter Block Interference is causing the most sensitive degradation for asynchronous reception. To achieve the non-linear distortion in the large envelope fluctuations OFDMA is regarded as the best scheme among the other schemes like IFDMA and LFDMA. The proposed paper is focusing on the OFDMA performance and its better advantages in comparison with other schemes. The main aim of the paper is to suggest the best technique to reduce the linear and non-linear distortion in Integrated Terrestrial and Satellite Systems. Read More...
|
Electronics & Communication Engineering |
India |
1559-1562 |
399 |
Design of Wireless Sensor Network Based Smart Generator Switching and Fuel Monitoring System
-Neelam Tiwari ; Ankur Goyal; Dr. A. K. D. Dwivedi
The rapid progress in the field of wireless communication and embedded systems has made wireless sensor networks (WSN) technology. A WSN consists of many cheaper and smaller wireless sensors, which are capable of collecting and processing environmental information, and communicating with neighboring nodes in the wireless medium. In this paper, we propose an architecture for monitoring of fuel level and switching of smart generator using wireless sensor network (WSN) technology. For establishment of WSN technology, ZigBee/IEEE 802.15.4 protocols[1] are used. In the proposed model, whole system is divided in to two units first is communication unit and second is sensor unit. The communication unit consists of mainly one pair of zigbee S2 modules to provide a wireless communication and the sensor unit consists of mainly ATMEGA328P microcontroller, ultrasonic sensor, LCD display and a buzzer. The proposed model based on WSN technology has many of the advantages such as Low-power consumption, Huge network capacity, high reliability, low cost etc. [2]-[7]. Read More...
|
Electronics Design and Technology |
India |
1563-1566 |
400 |
Behaviour of Fly Ash Based Geopolymer Concrete
-G Upendra Rao
It is a well-known fact that cement production depletes significant amount of natural resources and releases large volume of CO2.Cement production is also highly energy intensive after steel and aluminum. On the other hand coal burning power generation plants produce huge quantities of fly ash. Most of the fly ash is considered as waste and dumped in landfills. In order to address the issues mentioned above it essential that order forms binders must be developed to make concrete. The geopolymer technology offers an attractive solution to address the problem. The present work embraces the concept of geopolymer to make fly ash based geopolymer concrete. Read More...
|
Civil Engineering |
India |
1567-1572 |