No. |
Title and Author |
Area |
Country |
Page |
401 |
Green House Implementation using Web Server
-Priyanka Narayan Dhirde ; Prof. Balaramudu. P; Prof. Manoj Kumar
The Proposed system provides a technique and new optimization fashions of greenhouses, which may be effortlessly, included into power hub management systems in the context of clever grids to optimize the operation in their strength structures. In greenhouses, synthetic lighting fixtures, CO2 monitoring, and weather control structures control extensive electricity; as a result, a version of greenhouses appropriate for his or her foremost operation ,in order that it is able to be applied as a supervisory control in current greenhouse manage systems. The goal is to minimize general electricity intake specifically, inside temperature and humidity, CO2 awareness, and lights ranges have to be saved within precise levels. Consequently, this model carries the quit-user preferences to optimally function current manage systems in greenhouses. IoT allows price powerful wireless sensor community system with high effectiveness. It enables give up user real time facts monitoring within a blink of eye. To avoid manual mistakes and high guy electricity price for long time monitoring utility it turns into vital to implement IoT application for green house power automation. Read More...
|
Electronics and Telecommunication Department |
India |
1641-1643 |
402 |
Design and Analysis of Battery Hold-Down
-Divyashree. S ; Soundarya. S; Reshma Joseph; Rajesh S M
Fossil fuels are an incredibly dense form of energy and clearly, they are finite. Due to excessive usage of these resources, they have become scarce and that makes it a necessity to find other alternatives. The automotive industry is slowly moving towards electric powered vehicles. Textron Specialized Vehicles (TSV) are transitioning from gas powered to electric vehicles that cater to their customer requirements. Because the battery plays a vital role, it is essential to examine the mechanical integration of high voltage battery within these vehicles. The most common method that helps the battery to be held rigidly in its position is by using a battery hold-down. Designing improved versions of the battery hold-down would require understanding the range of possible bolt loads acting on it. Specifications of battery (such as weight and dimensions) can help calculate the torque acting on the hold-down and how the stress is spread across the design. Based on these values, alternate hold-downs can be designed that can effectively take higher torque values. And since the battery hold-down must also be cost efficient, it implements value engineering concepts to ensure that the new design is cheaper and performs its intended functions. Read More...
|
DESIGN |
India |
1644-1647 |
403 |
Medical License
-Gunjan Rajesh Desai ; Bhavesh Balasaheb Gunjal
The objective of the project is to develop a personal medical smart card for maintaining and transferring patient health records which would act as medical license for the patient. Each patient will carry a credit-card shaped personal smart card containing his or her medical records. Cards will be funded by the government and provided to patients by registered hospitals. When read, the hospital staff will be able to access the patient’s medical records and could carry out the treatments on patient in case of emergency situations. Hospital staff will be responsible for updating the card with any relevant changes every time the patient visits the respective hospital. The usage of smart cards as the medium of holding patient’s medical record in a central database would prove beneficial for handling the emergency situations like accidents. Individual patients will possess their records in most convenient and secured form. In addition, implementing such a system will effectively begin converting all current paper based medical records into electronic format, serving as a key intermediate step towards transitioning into fully nationalized electronic medical records which can be used during emergencies. Read More...
|
Computer Engineering |
India |
1648-1650 |
404 |
License Scanning Automobile Security System
-Gourav Dey ; Kumar Mangalam; S Swaroop; Suraj M.S; Vinayakumar R
The project entitled License scanning automobile security system is designed for the users to use vehicles with high security using license scanning system. Here in this project we use radio frequency identifiers (RFID) which is connected with the micro controller. The microcontroller kit is also connected with the key section of vehicle is connected with the microcontroller kit. The data of RFID of the license is already stored in the micro controller. When the user keeps the RFID tag in front of the scanner the system reads data on the tag and search for the matching details of RFID, the software in the micro controller recognizes the data and checks it with the existing data stored in the device. If it matches, it sends signal to the microcontroller. The microcontroller receives the signal and sends signal to the relay section through drivers. The relay section is connected to the electric starter of the vehicle. Thus the operation of the vehicle depends upon the data in the RFID. If the software does not recognize it, the starter section will not start. Read More...
|
AUTOMOBILE ENGINEERING |
India |
1651-1659 |
405 |
PSoC based LSB Stenography for the Copyright Protection of Images
-Swati G. Patil ; Mr. A. M. Bongale
In recent years, large number of media files are transferred through internet. So it becomes necessary to protect transferred digital data. Stegnography is the technique of hiding secret image in the cover image. In the proposed system secret image is embedded in the cover image by using the technique of LSB Stegnography. Algorithm is implemented on PSoC. Image data is send to hardware through serial communication it applies two third LSB algorithm and send embedded image to PC for display. Performance of the system is monitored through various parameters such as Bit Error Rate, Peak Signal to Noise Ratio and Mean Square Error. Read More...
|
Electronics & Communication Engineering |
India |
1660-1663 |
406 |
Design of Braking System in Stair Climbing Wheel Chair for Disabled
-B. Elamvazhudi ; K. Saranraj ; G. Saravanan
The main goal of this smart staircase climbing wheelchair project is reduce the cost of powered wheelchair and also locomotion of staircase by using of middle class people. The population of people with increase disabilities has significantly during the previous century. As the data come from the National Health Interview Survey (NHIS), two distinct developments have contributed to the increasing generally predominance of disability.as well as rapid increase that is due to health deficiencies and accidents. More individual persons have problem to use a conventional wheelchair. A current clinical appraisal indicates that 9%-10% of patients who received power wheelchair training found it extremely difficult to use for their activities of daily life style .40% of patients found the maneuvering, directional and steering tasks difficult or impossible. Generally the physically challenged people and paralyzed patients do their daily activities on wheelchairs. The disabled persons are to face an more difficulties, when they have to locomotion of ascend or descend the staircase. For example, to enter or exit erections, that have no slopes, go up and down in erections that have no lifts or pedestrian bridges, in these state of affairs, several helpers are necessary to carry a disabled person and their wheelchair. This leads to a possibility of injury for both the disabled persons and the helpers. This project was aimed to enhance the quality of life provides for the disabled people by supporting the wheelchair to climbing the staircase. To reduce number of helpers to only one person and wheelchair. This system is used to control the locomotion of a manual operated wheelchair by means of joystick control system wheelchair depends on the motor control and drive system, which consists of arduino microcontroller and low speed DC stepper motor. The steel rod is penta shaped and each rod is equally inclined of 72°from each other. At the time of climbing, one wheel that is the idle wheel will be in contact with the ground and the another wheel will be in contact with the stair. The motion takes place only when we pull the wheel chair backwards towards the staircase. The main aim of our project is to provide stability to the person who travels in the wheel chair (i.e., a large support base and maintain the overall centre of gravity as low as possible) the designed stair-climbing system consisted of two 5-spokes wheels and the slot plates. The 5-spokes wheels were used for climbing the stairs. The slot plates were used for sliding the rear wheels of the wheelchair. The 5-spokes wheels were installed at the rear of the wheelchair and were driven by power from an electric motor. When climbing the stair, the rear wheels were slid to the front of the wheelchair. To move on the floor, the rear wheels were slid back to the rear of the wheelchair. From test results, the wheelchair with the stair-climbing system could ascend and descend the stairs with the maximum riser height of 200 mm. The maximum payload was 80 kg. Read More...
|
MECHATRONICS |
India |
1664-1667 |
407 |
Secure Wireless Network Connectivity with Energy Aware Multipath Routing
-A.Lalitha ; P.Sasikumar
wireless sensor networks the sender and receiver should sharing the message with secure and timely manner. Each node communicates through an intermediate node which is moving over the network. The nature of an intermediate or relay node should produce the throughput performance on entire network. We consider transmission of a confidential message from a source to a destination in a decentralized wireless network in the presence of randomly distributed packet droppers. In a WSN, sensor hubs convey sensed information once again to the sink through multihopping. The sensor hubs close to the sink will for the most part expend more battery force than others; therefore, these hubs will rapidly empty out their battery vitality and abbreviate the system lifetime of the WSN. Proposed an Energy-Aware Sink Relocation Method (EASR), which adopts the energy-aware direction- routing method for message relay. Due to the battery resource constraint, it is a critical issue to save energy in wireless sensor networks, particularly in large sensor networks. Possible solution is to deploy multiple sink nodes simultaneously. Propose a protocol called MRMS (Multipath Routing in large scale sensor networks with Multiple Sink nodes) which incorporates multiple sink nodes, a new path cost metric for improving path selection, dynamic cluster maintenance and path switching to improve energy efficiency. MRMS is shown to increase the lifetime of sensor nodes substantially compared to other algorithms based on a series of simulation experiments. Read More...
|
M.E COMPUTER SCIENCE |
India |
1668-1672 |
408 |
Fingerprint Based Biometric Attendance Systems - A Review
-Kale Neeraj Sanjay ; Dr. Prakash H. Patil
Attendance recording and management is very important now-a-days. It is one of the important ethics which is valued by many employers and educational institutions. Even today, many small scale companies and educational institutions are still using the paper based method for recording and maintaining attendance which is prone to manipulation and impersonation. These traditional methods of attendance recording must be replaced by biometric attendance systems. The unique nature of fingerprint makes these systems more secure. This feature of fingerprint matching makes it ideal to be used in applications such as identity management and access control. This paper reviews the problems in attendance systems used presently, its working, study of different systems, advantages and disadvantages of those systems based on important parameters. Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
1673-1676 |
409 |
Design and Development of Mechanism for Waste Segregation
-Rajesh S M ; H. V. Dakshita; Drishya. Kariappa; Sahana. M
The conditions, issues and problems of waste management in the industrialized and developing worlds are different. Though the developed countries generate larger amounts of wastes, they have developed adequate facilities, competent government institutions and bureaucracies to manage their wastes. Developing countries are still in the transition towards better waste management but they currently have insufficient collection and improper disposal of wastes. Clear government policies and competent bureaucracies for management of solid wastes are needed urgently especially in countries where there is rapid population growth through urbanization into peri-urban areas. Services and programs that include proper waste disposal for management of hazardous biological and chemical wastes, minimization and recycling will be needed. Disposal of wastes is commonly done by dumping (on land or into water bodies), incineration or long term storage in a secured facility. All these methods have varying degrees of negative environmental impacts with adverse environmental and health risks if wastes are improperly disposed or stored. Read More...
|
DESIGN |
India |
1677-1679 |
410 |
Web Image based Filtering and Human Composition Matrix based on Skin Detection
-Shubhangi Ashok Adate ; Prof. Shankar Patil
In this paper, we describe various skin detection methods (HCM), image filtering methods and comprehensive comparative study among these methods proposed to detect adult classified images. It is based on concept of pattern recognition techniques. First the images are changed to identify areas with low color intensity by the color model. In the next part of the proposed system specify that the image is filtered using skin detection. The main aim has to segment a person or people within the image. By counting all pixels(red and green channel) with identical skin tone, then we can treat the image with porn content The development of Internet make changes in dramatically falling costs of data storage and improvement in coding technology are generating wide variety of wall papers, images, animation, graphics, sound and video . Now a day’s it is obvious that the computers with internet connection. There are facilities in large amount of adult images for free to access. This kind of media is available for children and making problem for many parents. The searching principal of Internet browser programs to avoid adult classified content should be filtering of images. There are ways available to stop adult classified content images on computers. This process is carried out by blocking unwanted sites or identifying images that show explicit content. Read More...
|
Computer Engineering |
India |
1680-1683 |
411 |
A Novel Comparison of Weighting Method for Stable Gene Selection using Sampling
-Dr. G. Baskar ; Dr. P. Ponmuthuramalingam
Data mining is a system of searching huge amounts of data for patterns. It is a comparatively new perception which is straightly related to computer science. Technically, data mining is the process of discovery associations among dozens of fields in big relational databases. Feature selection has been normally viewed as a problem of searching for an optimal subset of features guided by some evaluation measures. The identification and validation of molecular biomarkers for cancer diagnosis, prognosis, and therapeutic aims is an important problem in cancer genomics. This paper evaluates a comparison of weighting method for boosting the algorithm for finding stable gene selection. Read More...
|
Computer Science and Engineering |
India |
1684-1688 |
412 |
Reduction of Malicious Nodes using RTT and Clustering in Mobile Ad Hoc Network
-Rammurti Gupta ; Akhilesh Bansiya
Mobile Ad-hoc Network (MANET) is a unpredictable network, the nodes are in the variable state. The node can effortlessly enter and exit from the network. It is a group of autonomous systems which is independent of infrastructure and hence it decreases the cost and deployment time. In the existing work, they used fuzzy logic which decides the rules for the trust evaluation of the nodes. Rules should be defined previously which is difficult to manage for the unknown variables. This method is not suitable for the dynamic nature of the network. So we applied better technique which generates the more trustful network. In our proposed work, trust is calculated by sending the Route Request (RREQ) packets to the network then the destination node send Route Reply (RREP) packet. Calculate RTT for distance between the sender and destination nodes. We select the path by taking the shortest RTT and then form clusters. Calculate the energy of each node in cluster and select cluster head of maximum energy. Cluster head forward the data from source to destination. This method removes the chance of malicious node from the network. Read More...
|
M.Tech Computer Science |
India |
1689-1693 |
413 |
Implementation of MPPT Technique Applied to Wind Power Generation System
-Kaushal Kishor Tripathi
The escalation in electrical energy costs associated with fossil and nuclear fuels, and enhanced public awareness of potential environmental impacts of conventional energy systems has created an increased interest in the development and utilization of alternate sources. Wind energy is being increasable recognized as cost effective generation sources in small isolated power systems. Today, more than 32,000 wind turbines systems are installed all over the world. Wind energy systems are being firmly studied because of its benefits as an environment friendly and sustainable source of energy. Due to its erratic nature, power execution concepts are necessary for extraction as much power as possible from the wind energy. Read More...
|
Electrical Engineering |
India |
1694-1696 |
414 |
Statistical Analysis of Delay Factors and Success Factors on Building Construction Project
-Pranit Sathe ; Prof. B. K Bhondhe
Not all the projects finish on time and within given budget. Delays and changes occur during construction that impact the schedule, consequently impacting the project in its completion. Delay in construction projects is defined as late completion of project as compared to the planned schedule. Delays in construction projects are quite expensive; sometimes they may result in severe damages to involved parties. The time and cost for the performance of project are usually important to the employer and contractor. Time overruns always contributed as expensive to all parties. The purpose of this research is to identify critical success and delay factors which can help project parties to reach their intended goals with greater. Totally Twenty Eight delay factors & seven success factors were shortlisted to be made part of the questionnaire survey. According to the case study results, the most contributing factors and categories (those need attention) were discussed, some recommendation were made in order to minimize and control delays in construction projects. Also this project can serve as guide of all construction parties with effective management in construction projects to achieve a competitive level of quality and a time effective project. Statistical Prediction model for estimating actual project duration with delay was implemented on a real case study & tested the accuracy of prediction model. Read More...
|
Civil Engineering |
India |
1697-1699 |
415 |
Design and Development of Mechanism for Harvesting Energy from Gym Equipment
-Harshith R. Reddy ; Karthik Kapur; Raghav Nandakumar; Ravi Kiran V V
The energy crisis in today’s world and the growing impact of electricity production on the environment is a topic of grave importance. There is an urgent need to find alternate ways of producing electricity and finding ways to harvest energy from renewable sources of energy. Many innovative concepts are being worked on currently to achieve this. One such idea is to recover the energy expended by humans while working out in a gym. There are many commercial products that generate electricity from machines like elliptical trainers and gym cycles, etc., but none for the cable and pulley machine. This project aims to create a mechanism to harvest energy from any cable and pulley machine in a gym. The mechanism will be an easy retrofit onto current equipment eliminating the need to purchase a new machine altogether. Read More...
|
DESIGN |
India |
1700-1702 |
416 |
Harnessing Wind Energy via Wind Generated on Moving Train
-Dewan Gulbuddin Hecmatier ; Faizur Rahman; Gaurav; Mayukh Raj; Dewan Gulbuddin Hecmatier
The aim of this work is to generate free electricity for general use, through wind energy which is created due to the motion of trains. This is achieved by using a dynamo with adjustments such that it can support a fan and then using it as a small wind turbine. By creating a closely developed arrangement of many such dynamos mounted on the roofs of each compartment of trains, supported by feeding the outputs of all these dynamos systematically to a central electrical transmission line, we can feed all the energy produced to a battery for further use. Energy resources in our modern fast paced techno world is fast depleting .Hence, a renewable energy source is much required at the moment. Thus researching new and innovative systems in renewable energy sector is an indispensable prerequisite. This project attempts to propose a model for generating clean energy by harnessing the power of wind on moving trains by installing a windmill on the top (roof) of train and then coupling it with a dynamo. The energy generated through the rotation of the blades is stored in a battery. Read More...
|
Energy |
India |
1703-1707 |
417 |
Ammended Analysis of Fins - (Heat Transfer Analysis)
-V. Karthikeyan ; Akhil K Nair; S. Arun Raj; B. Vignesh
In order to increase the less amount heat transfer due to the air contact area, here in this project the arrangement of circular fin can be modified into the circular fins along with the slots in the vertical direction and the heat transfer rate, material for the fin extrusion, and the reduction in the material, the air contact area could be gradually increased will increase the heat transfer rate can be identified and analyzed with the three types of slots & they are semicircle, triangle, rectangle profiles. Read More...
|
THERMAL ENGINEERING |
India |
1708-1716 |
418 |
A Study on Seismic Analysis of Masonry Infilled RC Frames with and without Opening
-Shivraj Tambake ; Dr. Sunil Kumar Tengli
Reinforced concrete frames with masonry infill walls are termed as infilled frames. The provisions of the masonry infill wall increase the strength of the frame. But masonry infill walls are considered as non-structural elements and their bonding interaction is ignored in the design. However during strong lateral loads this infill walls contribute to the response of the structure and may induce a load resistance mechanism different from that predicted for bare frame structure. The objective of the work is to study the seismic performance of the infilled RC frames with and without opening using pushover analysis. The stiffness of the masonry infilled walls is included in the model by converting them into an equivalent diagonal strut (EDS) with references to FEMA-356. The seismic parameter like base shear, storey drift, storey displacement, hinge states are studied for different models and the conclusions are made. The RC frame is designed as per IS 456-2000 and the Static Non Linear Analysis is done using ETABS. Read More...
|
Structural Engineering |
India |
1717-1722 |
419 |
Simulation of Urban Traffic System using Sumo and Optimization of Real Traffic Signal Model using OpenCV Image Sensing Module
-Vinay K. S ; Bharath Inani; Sachin Shejole; Shreyas K; Sushanth Vasista
Traffic flow analysis and modeling are an essential part of various traffic management applications (e.g signal control) and can provide a better insight into the state of traffic. The purpose of this work is to create a traffic simulation using real traffic counts gathered in a city. The subsequent simulation is created and analyzed with SUMO traffic simulation package. Traffic congestion is a condition on transport network that occurs as vehicle use increases, and increased vehicular queing. The most common example is the physical use of roads by vehicles. When traffic demand is great enough, the interaction between vehicles slows the speed of the traffic stream. This results in Congestion. Congestion occurs when the capacity of a road is less compared to the volume of traffic. This leads to negative impacts such as Delays, Wasting time of motorists, Inability to forecast travel time accurately, Higher chances of collision of vehicles. To enable smoother flow of traffic, we are developing simulation optimization algorithms for determining the traffic light signal by sensing vehicle density (congestion). The system performance is estimated via SUMO simulation and by using image sensing module of MATLAB/OPEN-CV Software. We perform numerical experiments to test the density of the traffic flow and also compare these results with previous model. To decrease the traffic congestion and avoid the time being wasted by a green light on an empty road. Read More...
|
Operation research in engineering |
India |
1723-1726 |
420 |
Prediction of Runoff using Matlab
-Prof. Shrivastav Mahesh B. A. Kayesth
The present study aims to utilize an Artificial Neural Network (ANN) for modeling the rainfall runoff relationship of Machhundri catchment area located in Junagadh district, Gujarat, India. An Artificial Neural Network (ANN) methodology was employed to predict monthly runoff as a function of precipitation, temperature, evaporation losses, infiltration losses and humidity. The paper illustrates the applications of the feed forward network for the Runoff prediction with various algorithms and accordingly, different structures of ANNs were used and their efficiencies in terms of the mean squared error ‘MSE’, training and validation determination coefficients ‘R’ to select better predicted Runoff data were examined. The monthly hydrometric and climatic data of Machhundri Watershed in ANN were ranged from 1991 to 2016 and analyzed in order to calibrate the given models. Efficiencies of the Back-Propagation (BP), conjugate gradient (CG) and Levenberg-Marquardt (L-M) training algorithms are compared to improving the computed performances and 72 models were prepared to select a best model having mean square error ‘MSE’ nearer to zero and co-relation factor ‘R’ nearer to unity. The results revealed that the best model is composed of the feed-forward networks, trained by the Levenberg-Marquardt algorithm and considering only one hidden layer. The results extracted from the comparative study indicated that the Artificial Neural Network method is more appropriate and efficient to predict the river runoff than classical regression model. The ANN model provides a more systematic approach, reduces the length of calibration data, and shortens the time spent in calibration of the models. Read More...
|
Water Resource Engineering |
India |
1727-1730 |
421 |
Implementation of Integrated Project Delivery (IPD) using Building Information Modeling (BIM)
-Parag Dnyanoba Shendkar ; S. B. Patil
One of the major challenges that the construction industry facing is how to improve the effectiveness and performance of construction projects which become more dynamic and uncertain. For this reason, more projects are adopting lean principles which focus on collaboration and work flow reliability. Due to the limitations of other project delivery methods such as Design-bid-build including competitive bidding strategy and fixed price contracts, an innovative project delivery, so called integrated project delivery (IPD) has been adopted by project owners. The building information Modeling (BIM) is act as key for successful implementation of IPD. In this paper, the researchers discuss about advantages of IPD and BIM over the current state of project delivery. The research is expected to provide a practical view on the opportunities and challenges in applying IPD to construction projects. Read More...
|
Civil Engineering |
India |
1731-1736 |
422 |
Material Selection Procedure for Disc Brake Rotor
-Pritam Raychand Kanade ; Raj Mankar
An automotive brake disc rotor is a device is use to slowing or stopping the motion of a wheel while it runs at a certain speed. The widely used brake rotor material is cast iron which consumes much fuel due to its high specific gravity. The main purpose of this paper is to develop the material selection technique and choice the finest material for the application of brake disc system emphasizing on the substitution of this cast iron by any other lightweight material. Two methods are introduced for the selection of materials, such as cost per unit property and digital logic methods. Material performance wants were analyzed and different solutions were evaluated among cast iron, aluminum alloy, titanium alloy, ceramics and composites. Mechanical properties including compressive strength, friction coefficient, wear resistance, thermal conductivity and specific gravity as well as cost, were used as the key parameters in the material selection stages. The analysis led to aluminum metal matrix composite as the most suitable material for brake disc system. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
1737-1741 |
423 |
Development of Numerical Model for Cooling System of 10 MeV LINAC using ANSYS Fluent
-Milind Doiphode ; Rajeshwar Sandha; Sanjay Kadam
When electron beam is generated in linear accelerator (LINAC) huge amount of heat is dissipated, which causes distortions and ultimately frequency detuning. Numerical model of cooling system of 10 MeV LINAC is developed in ANSYS Fluent and temperature distribution developed is exported to static structural package. Maximum temperature gradient at equator is 4.4 K while maximum transverse deformation is 10.3 microns. So corresponding frequency shift of LINAC structure is equal to -372.70kHz. Read More...
|
MTech Heat Power Engineering |
India |
1742-1743 |
424 |
Development of PLC Controlled Booster Circuit for Operation of Solenoids of Vacuum and Gas System
-Priya Chourasiyia ; S. K. Agrawal; S. V. Nakhe; Abhishek Verma
The solenoid are used extensively in large number of devises that are used in various industries like refrigeration, air conditioning, automobiles, hydraulics, pneumatics, and many more. Solenoid requires boost supply when they are switched on, in order to achieve sufficient magnetic field so that its moving component state can be changed. The primary objective of this paper is to provide a PLC-controlled booster circuit for turning on solenoid or its excitation with optimum power consumption using a minimum number of components. This objective leads to reduced power loss in solenoid thereby increasing the durability of the solenoid. Read More...
|
Electrical Engineering |
India |
1744-1746 |
425 |
Firebase API for IOS
-Shashank Kumar Singh
The purpose of this study is to introduce Google firebase API and its features for IOS Application. Firebase is an API by Google for storage, remote config, analytics, remote notification and syncing into our IOS, Android and web application. A real-time database is one which stores data and fetch data continuously and update quickly real-time basis. This article will cover how to use firebase as a database backend for our IOS application development and many features like database, analytics, notification, storage, hosting etc. This study includes using many of these features of firebase into our IOS application. Read More...
|
Master of Computer Application |
India |
1747-1749 |
426 |
Experimental Analysis of Automatic Single Plate Clutch Performance using Non Asbestos Material Clutch Linings
-Priyanka B. Chaudhari ; R. Y. Patil
The clutch is part that is used to connect the driver element to the load or driven element at the will of the operator. The clutches are categorized as manual engagement or automated clutches. The automatic clutches form an integral part of the modern automatic transmission system. The conventional clutches use full ace lining for the clutch meaning that the entire face of clutch is lined with friction material and conventionally the friction lining material used is asbestos base. Here in the project non-asbestos liners will be used and the two conditions of liner application will be studies namely the full face lining and the staggered lining. Test will be done by replacing theses linings one by one to evaluate torque Vs speed, power Vs Speed, Efficiency Vs speed and comparative analysis will be done for the same to propose the best operating conditions for each case of liners. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
1750-1754 |
427 |
Agile Vs Traditional Methodology: A Comparative View
-Jyotsna ; Mukul Varshney; Shivani Garg; Abha Kiran Rajpoot
One of the first decisions we face for each of our project implementations at Segue is “Which development methodology should we use?†Most software companies nowadays aim to produce valuable software in short time period with minimal costs, and within unstable, changing environments. Agile Methodologies were thus introduced to meet the new requirements of the software development companies. This paper gives the comparative view of agile development and traditional development. Read More...
|
Computer Science and Engineering |
India |
1755-1756 |
428 |
Development of Strategies to Enhance the Safety at Roundabouts
-Abhishek Singh ; Pradeep Kumar Agrawal; Himanshu Jaiswal; Sandeep Choudhary
The amount of road accidents and fatalities at intersection in worldwide is alarming. A large number of traffic accidents take place at intersections on urban roads in India. These statistical data indicate that intersections are the place of serious safety concern. Roundabout is a type of intersection which is designated for safe and smooth channelization and movements of vehicles in desired direction through a central island. Weaving, Crossing, merging, diverging are some process, which leads to complex movement conditions at roundabouts especially on mix traffic condition in Indian roads. It may be said that roundabout intersections are among the most hazardous locations on Indian roadway system. Hence, objective of this study is to develop some strategies that can be useful to enhance the safety at roundabout. There are a total number of fifteen factors which effects the roundabout safety and among them we present the major three of them in our study. The proposed strategies are illustrated with the help of three roundabouts of the capital city of Bhopal. It may be concluded from the study that the strategies proposed are useful to enhance safety at roundabout. Thus, it is expected that this analysis may be useful for enhancing safety on urban roads in India. Read More...
|
Civil Engineering |
India |
1757-1761 |
429 |
A Moving Object Recognition using Video Analytics
-Ambeshwar Kumar ; Dr. Rajesh T. M
The process of recognizing of moving object is considered as a difficult task in the image processing .Moving Object recognition is an important task of computer vision because it is inclusion of the success of certain applications in computer vision. A number of algorithm and system has been put forward but still a challenging task because of illumination changes, background subtraction & occlusion. Video is captured from the database and then the video is changes to number of frame using mat lab and the frame which is extracted are going to save in a database and the object image which is retrieve from other sources we will match the features of the object from the saved database object using feature extraction technique and algorithm and after getting recognized object. We will do verification and validation of the object using false acceptance rate and false detection rate and by analyzing the value of data we get exact details that the object is recognized. In this process we use several algorithm such as SIFT and SURF and other classifying algorithm to recognize the object. In this project we discuss about the background subtraction, interest point detector, optical flow and temporal differencing to recognize the object. Extensive experiments are carried out in order to show the effectiveness of the proposed approaches. Read More...
|
Computer Science and Engineering |
India |
1762-1765 |
430 |
Functional Properties of Activated Carbon Treated Textile Material
-R. Pragadheeswari ; Dr. K. Sangeetha
Functional textiles are mainly focused and developed for their performance in the particular field. Presently, Activated carbon is used in most of the field and it has the remarkable adsorption and odour control properties at low cost and better efficiency. In this study, Activated carbon is used as a functional material especially for Anti-Microbial and Odour control finishing on textile fabric. Regarding to this function, Activated charcoal is applied in the surface of the fabric by direct application and Micro encapsulation. Finished fabrics are assessed the effectiveness of the anti-microbial property through disc diffusion method which against the microorganisms of staphylococcus aureus, Escherichia coli and Aspergillus niger. The odour measurement are conducted to evaluate the effectiveness of the anti odour property through organoleptic test (in house method). The carbon coated fabric shows the Good functional properties. Read More...
|
Fashion & Textile Technology |
India |
1766-1768 |
431 |
An Improvised on Mining Frequent Item Sets on Large Uncertain Databases
-Prof. Smt. Sushama Anantrao Deshmukh
Data processed in emerging applications, such as site-based services, sensor monitoring systems and data integration, are often inaccurate. In this paper, the important problem of extracting sets of frequent objects from a large uncertain database, interpreted under the possible World Seminar (PWS) is presented. This problem is technically difficult because an uncertain database contains an exponential number of possible worlds. By observing that the mining process can be modeled as a binomial distribution of Poisson, an algorithm has been developed, which makes it possible to discover efficiently and precisely sets of frequent objects in a very uncertain database. The important issue of maintaining the mining result for a scalable database (e.g. by inserting a tuple) can be presented. More precisely, the proposed exploration algorithm can refresh the probabilistic results of the set of frequent objects (PFI). This reduces the need to re-run the entire extraction algorithm on the new, often more expensive and unnecessary database. The proposed algorithm can support progressive extraction and provides accurate results on uncertain database extraction. The in-depth evaluation of the actual data defined to validate the approach is carried out. Read More...
|
Computer Science and Engineering |
India |
1769-1772 |
432 |
Development of PLC based Control System for Copper Vapour Laser System
-Priya Chourasiyia ; S. K. Agrawal; S. V. Nakhe; Abhishek Verma
Copper vapour laser (CVL) is an efficient, high power and high repetition rate pulsed laser, giving output at two wavelengths of the visible region- green (510.6 nm) and yellow (578.2 nm) and being used for many research and industrial activities. Development of copper vapour lasers is taken up at RRCAT, Indore. Laser system consists of several subsystems like pulse generator system, switched mode power supply (SMPS), vacuum and gas system, cooling system etc. Various parameters and signals of these subsystems are to be monitored and controlled. Project includes hardware development for interfacing field signals to PLC, programming of PLC and Human Machine Interface (HMI) for logic implementation and graphical user interface development required for CVL operation. Read More...
|
Electrical Engineering |
India |
1773-1776 |
433 |
Development of Biometric Security System using CBIR
-Pakruddin B ; Asma Bathool ; Javeria Samreen ; Saba Kaleem ; Safura S Rahil
The project focuses on the Content-Based Image Retrieval (CBIR) technique for biometric security systems. The demand for efficient and effective tools for retrieval of images has increased significantly because of the growing of image databases at a faster rate. Content-Based Image Retrieval systems have become very popular for image retrieval of digital images from a very large database by browsing or searching. As the years have passed by, the advances in biometric technology have been gaining importance increasingly due to its reliability and efficiency in real world applications. The previous systems were based on text annotation of images where every image was given a keyword. The current systems are based on three distinct features of an image: colour, texture and shape which can be integrated into biometric security for effective security systems. Read More...
|
Image processing |
India |
1777-1780 |
434 |
Effect of Academic Stress on Dietary Pattern Among Adolescents (16-17 Years)
-Binu Bhatia ; Simran Jeet Kaur; Divya Sanghi
The present study was conducted on effect of academic stress on dietary pattern among adolescents (16-17 years). The total samples selected were 100 adolescents (50 boys & 50 girls) by using purposive sampling technique. Academic stress scale constructed and standardized by R. Balaji Rao and 24hour Dietary Recall method was used to gather data. The data was then analyzed by using chi square and unpaired T Test by Statistics package for social sciences (SPSS) version 21.Results revealed that 52% adolescents experience mild stress with academic score <53 & 48% adolescents experience moderate stress with academic score 54-106. The academic mean score of girls was found to be 58.0 which were higher than boys (53.74). So it can be concluded that academic stress was higher in girls as compared to boys. But statistically non- significant difference was observed between boys and girls at p<0.05. On comparing the dietary intake of boys and girls with recommended dietary allowance, it was found that both boys & girls energy intake was statistically significant (p<0.05).Protein intake was non-significant (p<0.05) and carbohydrate intake of both adolescents was found to be significant (p<0.05). Fat intake of boys was found to be non-significant in comparison to fat intake of girls which was found to be significant (p<00.05). Read More...
|
Home Science |
India |
1781-1784 |
435 |
Home Security System
-Pavan Mahulkar ; Jasmeet Singh; Mrudula Siddheshwar
Now a days people are facing more problems about security in day to day life, nowadays security is the most essential issue in the world; so security of everything gains higher and higher importance in recent years. Here, trying to reproduce the comprehensive literature study related to the various door locks and security systems that are necessary in the places such as home, industries and where possibilities of incursion are increasing day by day. In last few days, the research is going on various security systems like traditional security systems which provides an indication using alarm system. Due to the advancement in techniques, some door lock security systems are based on microcontroller, GSM, GPS, many sensors, software like MATLAB, PROTEUS, biometrics like face recognition, Iris scanner, RFID, Smart Card and password etc. Each system has their own advantages and disadvantages. In systems, SMS technique is used for communications so the system will become cheaper , more reliable and it will take less time to deliver message on authorized person. As security becomes major problem, the security monitoring systems today needs to make use of the latest technology. In some papers, the developers have present door lock security monitoring systems based upon embedded and wifi modules, and sometimes the lock is protected by automatic password detector system hence it was difficult to hack. Also, the enhanced security systems are available based on android platform, wireless techniques and embedded systems. Here a lot of modification takes places in various home security, Home lock system from the last few decades, in next coming years many changes will takes place in this security field. Read More...
|
Electronics and Telecommunication Department |
India |
1785-1786 |
436 |
Area and Power Efficient Wallace Multiplier
-Mamatha V S
Multiplication can be measured as a chain of repeated additions. The number which is to be added is called the multiplicand, the number of times which is added is called the multiplier, and the result being given is known as the product. The necessary operations associated in multiplication consist of generating and adding the partial product. As an outcome, to speed up the whole multiplication technique, these two most important steps must be optimized. (a) Creation of partial products (b) partial product addition using speed adders. The modified Wallace multiplier uses MUX realized from transmission gate for partial product generation and also for addition achieving significant improvement in power and area. Read More...
|
VLSI Design and Embedded System |
India |
1787-1790 |
437 |
An Approach Secret Sharing Algorithm to Provide Security to Multi Cloud Data Storage
-Prajakta Kshirsagar ; Trupti Gurav
Cloud computing is an emerging technology that is at the top in the IT industry. In recent years use of Cloud computing in different mode like cloud storage, cloud hosting, cloud servers are increased in industries and other organization as per requirements. These days rapid use of cloud computing in several IT industries and organizations offers new software at a reasonable cost. Data is used, processed and stored in cloud environment all over the world. With, this there is unlimited benefits but by considering the power, stability and the security of cloud one can’t ignore different threats, security risks to user’s data on cloud storage. So it is not very promising to depend on a single service provider for outsourced data. However, single cloud providers are less popular among customers because of service unavailability and malicious insiders that exists in single cloud. In proposed system we are implementing the concept of multi-cloud storage where rather storing complete file on single cloud system will split the file in different chunks after encrypt and store it on different cloud. It is one of the main hurdle to share sensitive data with cloud storage providers. For securing outsourced data encryption and secret sharing algorithms are the techniques used extensively to secure outsourcing data. Managing CIA (Confidentiality, Integrity, and Availability) is a main issue and due to this issues, users are opting for multi-cloud as these are secured with various techniques and one of these techniques is secret sharing algorithms. The paper applies Shamir’s Secret Sharing Algorithm which will address possible methodologies and solutions to secure outsourcing data in multi clouds. The main focus of this paper will be on data security and provide integrity. Read More...
|
Computer Engineering |
India |
1791-1795 |
438 |
Application of Multiple Criteria Decision Making Mathematical Model for Selecting Best Automobile
-Yogesh Sahu ; Nishant Shukla
This paper illustrates the application of Multiple-Criteria Decision-Making (MCDM) mathematical model to the problem of the selection of a new automobile from the variety of automobiles available in the market. Buying of automobiles, now a days in the marketplace is very hard job to the customers due to day to day changes in numerous technical and operational parameter specifications like style, life span, fuel economy, suspension and cost etc. Therefore, to overcome from this confusion state some selection procedure techniques are required TOPSIS is one the selection procedure technique is adopted for this problem. This paper shows the basic steps involved in the technique TOPSIS (Technique for Ordered Preference by Similarity to Ideal Solution), for choosing the most suitable alternative from among the varied options under consideration. This technique provides a base for decision-making processes where there are limited numbers of choices but each has large number of attributes. In this work, some cars are considered with different attributes and select the best car using TOPSIS technique. Read More...
|
Industrial Engineering |
India |
1796-1801 |
439 |
Negative Effects of Social Media Use on the Mental Health
-Pravin Vitthal Gawas
The intent of this paper is to explore the relationship between social media use and mental health in the young adult population. Current research indicates that there is a connection between increased social media use and deteriorated mental health. Unfortunately, young adults, the most active social media users, have a predominantly high risk for developing mental health issues, making this connection particularly concerning. At present, it is unclear how social media and mental health are connected; therefore this thesis explores the individual and social theories that may give reason for this connection. Theories that are discussed include: the impact of sedentary behaviors on mental health, displaced behavior, and sleep interruption due to blue light exposure, social media’s effects on romantic relationships, and social media’s effects on platonic relationships. Read More...
|
Computer Engineering |
India |
1802-1805 |
440 |
PD to PD Data Transfer without using PC
-Sanika Kamble ; Varsharani kumbhar; Prajakta Borhade; Prof. G. D. Salunke
Now a day’s portability is most important. So to achieve this, we are designing such a system which can carry anywhere. Using this system we can not only transfer the data but also we can see the transfer of the particular file which we want to send by using LCD display. Now a days to transfer a data between two Pen drive we use PC or laptop, but it is not always possible to carry such a large device only for the data transfer. So to overcome this problem we design a system which is more compact. In our project we are transferring the data between two pen drives without using any computers or laptops. Read More...
|
Electronics & Communication Engineering |
India |
1810-1811 |
441 |
Quantum Computers
-Bilal Malik ; Jugal Haswani
Common digital electronic classical computers requires data to be encoded in the bits, of which each is always in one of two defined states of either 1 or 0. Quantum computation uses Quantum Bits, which are in superposition of states, i.e 0 and 1 at the same time. Quantum Computers, which makes use of the superposition and entanglement of physical states, to perform operations on data, can very well outperform their counterparts in solving certain types of problems. The capacity of calculations is increased exponentially compared to the current digital electronic computers and therefore can help in factoring a large number into its primes, which would allow us to break cryptographic codes and so discoveries in various fields including trade, quantum science, trade, medical science , national security etc is possible. Read More...
|
Master of Computer Application |
India |
1812-1814 |
442 |
Scalability Analysis and Improvement of Hadoop over H2Hadoop for BigData Analysis
-Kalyani Patil ; Virendra Dakhode
Cloud Computing provides different services to the users with regard to processing the Bigdata. The services such as S3 (Simple Storage Service) for storing data, EC2 (Elastic Compute Cloud) to build a private Cloud Computing environment and EMR (Elastic MapReduce) for processing the BigData. Generally EMR uses original Hadoop to process BigData. Beacuse Hadoop is a framework that allows distributed processing of large datasets across clusters of computers using simple programming models. Hence cloud computing leverages Hadoop framework to process BigData in parallel. Hadoop has certain limitations which reduces the job efficiency. These limitations are mostly because of data locality in the cluster, jobs and tasks scheduling, and resource allocations in Hadoop. The challenge remains in Cloud Computing MapReduce platforms is efficient resource allocation. Hence there is an improve system, H2Hadoop. An absolute analysis about H2Hadoop architecture and development is to store the metadata of the executed job. Common Job Blocks (CJB) tables is stored in the name node and metadata of the similar jobs are stored in Name node. Name node helps to direct future jobs to specific Data node that carry the required data sets. The CJB table gets updated with the new common features each time a new job reaches this file. The size of this table should be controlled and limited to a specific size to keep the architecture reliable and efficient. We propose the improved system, which is an enhanced Hadoop architecture that reduces the computation cost associated with BigData analysis. Comparing with H2Hadoop, this system reduces CPU time, number of read operations, and another Hadoop factors for a sequences which has common features. Read More...
|
Computer Engineering |
India |
1815-1819 |
443 |
Assessing Quality of University Examination System using SERVQUAL Model: Viewpoints of Technical Undergraduate Students in Rajasthan
-Dr. Irum Alvi ; Mrs. Anamika Sharma
This study was conducted at a Technical University in Rajasthan, India to assess Technical students’ satisfaction of the University Examination using SERVQUAL model. The SERVQUAL instrument was adapted and modified to capture the relevant data. A total of 135 students were employed in the study. Data were analyzed using SPSS (version 23.0) for descriptive statistics. Student satisfaction regarding quality of University Examination was determined by the service quality gap model studying, Tangibles, Reliability, Responsiveness, Assurance, and Empathy dimensions. The result indicated that the there was a negative gap between the Technical students’ expectations and perception of the University Examination Service Quality. Overall services quality mean was (-2.012±.1135). The highest and lowest differences of mean scores between students’ expectations and perceptions were in the reliability (-2.324) and tangibility (-1.698) dimensions respectively. Paired t-test showed the significant statistical differences between students’ expectations and perceptions (Ï < <0.001) in all dimensions of the examination. Negative quality gaps in all three phases of examination, i.e. Pre-examination, Examination and Post-examination, indicated that a methodical approach for quality improvement needs to be developed by the Technical University and calls for management action to improve service delivery in those areas. Read More...
|
Education |
India |
1820-1830 |
444 |
Hybrid System for Anomaly Intrusion Detection using Enhanced K Strange Points Clustering and Naive Bayes Classifier
-Kedar Sawant ; Abhijeet Bhangle; Nishad Dangui; Mario Dias; Valen D souza
An intrusion detection system (IDS) monitors the system activity and tracks abnormal activity patterns thus ensuring system and file integrity. Proposed research is based on the combination of clustering and classification techniques which are used in Hybrid IDS. Clustering is a technique which groups similar data objects into a single cluster. Classification is a technique which predicts a new class for the test object. Proposed IDS works on NSL-KDD dataset. NSL-KDD dataset is a revised version of KDD99 dataset. First, clustering is performed using Enhanced K Strange Points clustering algorithm on NSL KDD consisting of Denial of Service (DoS) attacks. This output is given to the Naive bayes classifier, which classifies the dataset into 6 types of DoS attacks. The results of the proposed system are then compared with existing IDS which uses Kmeans clustering and KNN classifier. The proposed concept aims at improving the detection rates and classification rates of existing Intrusion Detection System (IDS) by using the new approach. It also focuses on reducing the false positive rates compared to the existing system. Read More...
|
Computer Engineering |
India |
1831-1834 |
445 |
Analysis of Blood Cells of Malaria Patients using Artificial Neural Network
-Ms. Sheetal Bhoyar ; Ms. T. Pathan; Ms. Sheetal Bhoyar; Ms. Sapana Dhanvijay; Mr. Amit Landge
The global burden of malaria is enormous and the development of better laboratory diagnostic tools is a key step in malaria control recommended by the WHO. Our objective is to develop an automated tool for the recognition of intracellular malaria parasites in stained blood films. We used digital images of oil immersion views from microscopic slides captured though a capture card. They were preprocessed by segmentation and grayscale conversion to reduce their dimensionality and later fed into a feed forward back propagation neural network (NN) for training it. Then a user interface was developed incorporating this trained NN. In the final product, the tool allows a user to view the slide in a graphical user interface. When the user gives a command to analyze, a still image is captured and sent to the NN for recognition after preprocessing. Preliminary results show that the NN can identify carefully selected test data. Read More...
|
Electronics & Communication Engineering |
India |
1835-1839 |
446 |
A Comparative Study of OpenMP and CUDA parallel architecture using Rodinia Benchmark Suit
-Pakruddin B ; Adeel Ahmed Khan; Mohsin Khan
From the last few decades the microprocessor industry is rapidly shifted to multi-core architectures, much of the research is going on for faster computation in conventional computer systems. Scientific application takes longer time to execute as it contains more mathematical calculation, there is need to parallelise the codes in much efficient way. Many algorithms have been proposed to parallelise the code effectively, but still there are certain limitations that prevent scalable implementations of many well known algorithms. In this research work we have presented a comparative study of CUDA, OpenMP by using two well known scientific applications of Rodinia benchmark suit, a benchmark suite for heterogeneous computing. We are comparing the execution times for serial, OpenMP and CUDA codes of LavaMD and kmeans. We found that CUDA can be utilized effectively to parallelise the application. Read More...
|
Parallel Processing |
India |
1840-1843 |
447 |
Detection of Defects in Solar Panels using Thermal Imaging by PCA and ICA Method
-Farhan Ali Khan ; Sanjay Singh
For good efficiency, fast, reliable and smooth operation of any process we need a failure free operation. It gives a high production and also ensures high return on investments. A failure free operation is of fundamental importance for modern commercial solar power plants to achieve higher power generation efficiency and longer panel life. So a simple and reliable panel evaluation method is required to ensure that. By using thermal infrared imaging, glitches or defects in the solar panels can be easily detected without having to incorporate expensive electrical detection circuitry. In this paper, we propose a solar panel defect detection system based on thermal imaging, which automates the inspection process and mitigates the need for manual panel inspection in a large solar farm. So in this way solar panels can be checked while in operation without disturbing the continuity of operation. So it saves lot of time and cost of detection. Read More...
|
Electrical Engineering |
India |
1844-1846 |
448 |
Speed Control of Induction Motor using SCR Based Cycloconverter for Variable Torque Load Drive Application
-Prasenjit Sontakke ; Surbhi Shrivastava
The cycloconverter is a power electronic device used to convert constant voltage constant frequency AC power to adjustable voltage adjustable frequency AC power without a DC link. Single-phase induction motors are widely used in many applications due to their energy efficient characteristics. Improvements in its performance mean a great saving in electrical energy consumption. A cycloconverter fed variable frequency motor is a typical example of such improvement. In this regard, the paper presents an analysis of the performance and speed control of the split phase induction motor when it is fed with cycloconverter. The various speed of induction motor is obtained by varying the supply frequency by using cycloconverter. The speed control by this method is simple and can be made economical by using different methods to control the operation of cycloconverter which in turn controls the performance of motor. The formula for speed for induction motor is Ns=120f/p. from this formula we can conclude that the speed of the motor can be varied in two ways, one is by changing the number of poles and the other is by changing the frequency. The speed control through the first method is uneconomical and the number of poles can’t be varied under running conditions and the size of the machine also becomes bulky. These problems can be overcome by the second method. In this method the frequency can be varied under running conditions also and there is no change in the size of the motor. In among all the methods this method is simple, reliable and economical. The various speed of induction motor is obtained by varying the supply frequency by using cycloconverter. Read More...
|
Electrical Engineering |
India |
1847-1849 |
449 |
Survey on Big Data and Hadoop
-Linta John ; Smita C Thomas; Anju Marium Abraham
To enhance their performances companies across the world uses data since a long time, to make better decisions. In this paper make a survey on Big data Hadoop. For Big Data implementation Hadoop has emerged as a popular tool. For things like startups and online firms Big data may be new. A major challenge has become how to deal with the data and analysis of this data when big growth. The Apache Hadoop Framework has recently attracted a lot of attention for such data-intensive applications. Apache Hadoop Framework Adopted MapReduce, which is a programming model and for the implementation of processing and generating large data sets. For writing Application E.g. Java Map-Reduce, Streaming MapReduce, Crunch, Pig latin, Hive, Oozie etc Hadoop Provides: Distributed File System, Job scheduling, Resource Management Capabilities, and Java API. A map function and a reduce function will specify by user. Read More...
|
Computer Science and Engineering |
India |
1850-1852 |
450 |
A New Authentication and Key Agreement Protocol for next Generation 3GPP Mobile Networks
-Pooja Thakur ; Ashish Sharma
Authentication is the act of proving the truthfulness of data or entity. But with respect to the protocol, authenticating a connection is the process of authenticating the mobile station with respect to its Network (SN) in mobile telecommunication system. The prime objective of this research paper is to propose an enhancement to UMTS AKA in order to remove the above defined redirection attack and make authentication in 3G networks more secure. The main contribution of this research paper is to define a secure authentication method for communication between Mobile Station (MS) and Home Network (HN) and preventing eavesdropping between MS and the Serving Network (SN). The proposed protocol can minimize number of flows and also it can reduce computational overheads to as much as possible. The simulation results indicate that proposed ELI-AKA protocol can more efficiently provide data security and reliability. Read More...
|
Computer Engineering |
India |
1853-1858 |