No. |
Title and Author |
Area |
Country |
Page |
151 |
Synthesis and Characterization of Maghemite (γ-Fe2O3) Nanoparticles
-Miss. Priyanka Ravsaheb Patil ; Prof. S. T. Patil; Dr. S. B. Sadale
The range of environmental cleaning technologies has been introduced in wastewater treatment which uses iron oxide nanomaterials as Nano sorbents and photo catalysts. Nanostructured iron oxide will be synthesized using cost-effective chemical methods. This Nanostructured iron oxide will be characterized by various characterization techniques viz., X-ray diffraction (XRD), Fourier, Transmission Electron Microscope (TEM) etc. The primary parameters for nanostructures of iron oxide will be optimized. Read More...
|
Chemical Engineering |
India |
591-593 |
152 |
A Comparative Study of Harmonic Distortion in Power System with Variety of Load before and after Compensation
-Virendra Singh Solanki ; Virendra Jain; R. P. Kumawat
Power quality became serious issue for the utilities and clients. Current harmonics are a standout amongst the most usually predictable Power quality issues and are typically determined by the use of shunt active filters and as per International standards concerning electrical power quality (IEEE-519, IEC 61000, EN 50160, among others) Power that electrical equipments and facilities should not introduce harmonic contents larger than specified values. In this paper the system in which shunt active power filter is adopted, this has been generally useed for elimination of harmonic. The simulation results and comparative studies shows the analysis of harmonic contents for linear and nonlinear load when operation is done with and without compensation. The design concept of the shunt active filter is verified through simulation studies and the results obtained are discussed. Read More...
|
Electrical Power System |
India |
594-598 |
153 |
Analysis of Beam using Timeshenko Method& Compare with Eulers Elementry Beam Theory
-Akhilesh Sharma ; Rashmi Sakalle; Nitin Tiwari
This paper describes analysis of simply supported beam subjected to uniformly distributed load with different length to depth ratios by Timoshenko method and compared it with Euler's Bernoulli Theory. According to IS code 456-2000 a beam is considered as deep, if the span to depth ratio is 2 or less for simply supported beam and 2.5 or less for continuous beam. The parameters observed were flexural stress, shear stress and strain components. The effective span to depth ratios of beam considered were 8.0, 6.0, 4.0, 3.0 and 2.0. Read More...
|
Civil Engineering |
India |
599-602 |
154 |
Enhancing File Storage Security in Cloud Computing using Hybrid Cryptographic Algorithm
-Dhawal Darji ; Siddhesh Jain; Shubham Heda
Cloud computing is an information technology paradigm which is used in different areas like military, educational purposes, IT industry to store vast amount of data daily. Uploading data, downloading data, exchange of information are some of the basic characteristics of Cloud Computing. But there are certain challenges and issues which need to be resolved for providing efficient access to user’s data. Sometimes use of single algorithm in Cloud Computing is not sufficient to provide high level security, so use of multiple algorithms results in more secured platform. In this proposed system AES, blowfish and RC4 algorithms are used to provide block wise security to data. All algorithm key size is 128 bit. Steganography technique is introduced for key information security. Key information contains which part of file is encrypted using by which algorithm and key. All the three algorithms simultaneously work on to encrypt in Hybrid way. Reverse of the same above process is applied to decrypt the file. Read More...
|
Computer Science |
India |
603-606 |
155 |
Active Power Filter Control Strategy with Implicit Closed Loop Current Control and Resonant Controller
-Hassain Sohail Aamir
Novel straightforward indirect management ideas for a full of life power filter (APF) application area unit projected here. The ideas area unit exemplarily bestowed to regulate a changed APF structure. The most advantage over different management ways is that the achieved wonderful simplicity-to-performance magnitude relation. The projected management ways area unit supported the thought of virtual resistance emulation to produce high power consider a system. To validate the operative principle, a single-phase low-power system has been tested package MATLAB/Simulink computer code. This single-phase low-power system operates at a remarkably low package frequency of five rates and is digitally controlled by a digital signal processor. Read More...
|
FINGER PRINT BASED ON VOTING SYSTEM |
India |
607-610 |
156 |
A Study of Static Site Layout Using QAP and Its Visualization through BIM
-Shaikh Shafiq Ahmed ; Mr. Rahul D. Shinde ; Dr. Shailesh Shriniwas Angalekar
Efficient layout planning and implementation of a construction site are essential for the successful completion of the project, as it improves productivity and safety on construction site. This task consists in identifying the temporary structures necessary to support the construction operations, determining their shape and size and then positioning them optimally in unoccupied areas or occupied areas within the boundaries of the site. The problem of site layout design is a complex problem of combinatorial optimization that involves various goals and develops fundamentally in measure as it builds the quantity of offices and limitations. The objective of this investigation comprises in the advancement of doable and effective site plan arrangements a realistic representation scheme that considers the total distance traveled and the frequency of travelling between them. An optimization model is developed with the aim of minimizing the travel distance the facilities of an actual commercial project. The reduced travel distance is achieved by optimizing the travel distances between the various temporary facilities. The factors taken into consideration are the travel distance between the facilities and the frequency of travel between them. An optimized model is suggested with the aim of reducing the total cost and energy of travelling to a minimum. Also, a BIM model is developed for better visualization of the improved site layout. Read More...
|
Civil Engineering |
India |
611-614 |
157 |
Identification and Location Testing Techniques for Underground Cable Faults
-Utkarsh Yadav ; Dilbag Singh
A fault is one of the most important drawbacks in the power system whether it occurs due to instruments failure or cables failure. Mostly fault occurs in conductors or cables due to weakness, in homogeneity or any defect. These faults generally take long time to detect and hence long time to repair the damaged cables and restore the power supply. Long outages cause heavy production loss to industries, revenue loss to power distribution companies and inconvenience to general public. This calls for quick fault location and restoration of power supply in minimum possible time. The aim of this dissertation is to introduce the techniques for pin pointing the location of the different types of faults and to work out the distance or gap of cables through one end to other end. Read More...
|
Instrumentation and Control Engineering |
India |
615-618 |
158 |
Study on Motivational Model for Civil Engineers and Workers in Construction Industry
-Mrs Shivangi A. Malviya ; Mr. Abhay M. Joshi
One of the major concerning issue of constructors and owners of construction are how to improve construction productivity and how construction project can be completed cost effectively. Because of large number of labours and civil engineers involved in construction industry there have been several studies that have focused on how to motivate them, so as to improve construction productivity. It has been seen that increasing construction workers and civil engineers productivity through improved method of motivation will result in considerable saving and in time completion of construction work. In this paper covered all relevant studies which possess and are primarily concerned what energize human behavior and how behavior is maintained or sustained throughout the project. Read More...
|
Civil Engineering |
India |
619-624 |
159 |
Dispute Resolution in Construction Industry
-Mr. Akshaykumar M. Karape ; Mr. Abhay M. Joshi
Construction disputes can arise from many factors like inadequate planning, changes in prizes, unexpected conditions at work site, differing interpretations of contract language and lack of communication among parties involved in the project; these can affect project performance and ultimately lead to litigation. Although construction projects face enormous uncertaininties and the contract is unavoidably incomplete in terms of the inability to incorporate provisions to deal with all the possible contingencies. Joint efforts are needed in such situations to solve the problems that may arise. Any unresolved issue arising here, which may become dispute, is one of the most damaging relationships. Many researchers have studied the reasons for construction claims. Earlier some experts identified three root causes of disputes as 1.Behavioral Problems 2.Contratual Problems 3.Technical Problems due to uncertainty and low experience. The case studies of various disputes is intended to cover broad range of construction with regard to type of project, size of project, type of owner and contract administration policies. Both residential and commercial construction is included because problems in this category may be more economically and emotionally charged. Read More...
|
Civil Engineering |
India |
625-631 |
160 |
Implementation of Cloud Broker and Cloud Bursting for different Application
-Mala Patidar ; Ajitabh Mahalkari
Cloud bursting is an application deployment model during which an application runs in the private cloud or data center and bursts into public cloud when the actual demand for computing capacity spikes. The advantage of this type of hybrid cloud deployment is make fish an organization only pays with regard to extra compute resources when they are needed. Key advantages of cloud computing is ability to fulfil recourses demand by user for application. Some organization create own private cloud are interested in leveraging cloud bursting. Conventionally some architecture has run application workload fully in private cloud till workload is not over the threshold value. After cross the threshold value application burst into public cloud for additional compute resources. We proposed bridge between multiple clouds and deal with cost and security issue relating to communication between public and private clouds. Read More...
|
Software Engineering |
India |
632-637 |
161 |
Boredom Calculator - Facial Expression Detection: Survey
-Prof. Priya Pise ; Amar Pundir; Akshada Jadhav; Sanchaya Bonde; Jyotsana Rakshe
Human emotional facial expressions play an important role in interpersonal relations. This is because humans demonstrate and convey a lot of evident information visually rather than verbally. Although humans recognize facial expressions virtually without effort or delay, reliable expression recognition by machine remains a challenge as of today. To automate recognition of emotional state, machines must be taught to understand facial gestures. Read More...
|
Computer Engineering |
India |
638-641 |
162 |
Future Movie Rating Prediction using Machine Learning : Survey
-Akshata More ; Sukanya Ladi; Gayatri Sinnarkar; Prathamesh Shilarkhane; Prof. Vandana. S. Rupnar
Movies rating prediction using Machine learning is one of the most interesting and difficult tasks. Many websites are designed to estimate rating of released movies, Storing movies data and generation of simple statistics. Some websites and systems are using decision support systems, but they are largely limited. They can respond to simple queries like "What is the average date of release movies for a particular actor, directors and so on?", "How many movies had released in 10 days?", "how many awards had to achieved by an actor in the current year?" Still, they cannot answer complex queries like "Give a possibility of the forthcoming movie? Is it hit or not?" and so on. Hence, there is a need to develop a system that can answer such a question. This paper gives the survey of the different techniques used by the researcher for predicting movie ratings. Read More...
|
Computer Engineering |
India |
642-644 |
163 |
Application of TBC Materials in I C Engine Combustion Chamber: A Review
-Prof. Dipak C. Gosai ; Mahesh M. Chudasama
Revolt fuel prices and more precise requirements in the field of the vehicle emissions such as nitrogen oxides, fine dust and carbon dioxide are increasing the pressure on the engine manufacturers to utilise technologies which contribute to a reduction in the emissions. In this study, a complete literatures review of Thermal barrier coating(TBCs) applications in Internal combustion engines Chamber performed to select a proper type and to find coating effects. The TBC coating technique has effects on the specific fuel consumption, the power and the combustion characteristic, pollution contents and the Thermal fatigue lifetime of engine components. Usually there are several beneficial influences by applying ceramic layers on the combustion chamber, including the piston, the cylinder head, the cylinder block, intake and exhaust valves by using a plasma thermal spray method. In this article, all effects, merits and demerits of TBCs are investigated based on presented articles. Read More...
|
Mechanical Engineering |
India |
645-650 |
164 |
URL Filtering Solution at ISP
-Rajveer Singh Rajawat ; Vikas Jain; Rajesh Pokhriyal; Rajesh Patil; Jatin Nagpal
URL filtering solution is a mechanism to block access to specific websites for compliance purpose or to prevent employees from wasting time at work via using social websites, chat sites etc. It also used to prevent malware infections. Read More...
|
Telecommunication Engineering |
India |
651-653 |
165 |
Weight Optimization of Chain Link using Glass Fiber Composite as Alternative Material
-Bhosale S. P. ; Patil A. R.
Chain is the most important element of the industrial processes required for transmitting power and conveying of materials. Roller conveyor chain performs efficient and economical in wide range of applications in manufacturing and agricultural industries. In chain conveyor system motor capacity of conveyor depends on the weight of chain and weight of chain conveyor is covered by outer link and inner link. So, weight is the main problem with metal chain and power consumption is more due to bulky stacker chain. So, to reduce power consumption we have to reduce weight of chain link plate. In this project we performed, theoretical analysis of the stresses in chain link, pin and estimation of required breaking load as per given capacity of roller conveyor chain, finite element analysis of stresses in chain link and pin for traditional material and composite material (Glass Fiber) using ANSYS. Then Experimental analysis of chain link and pin of suggested alternative composite material (Glass Fiber) will be done and comparison of theoretical, FEA and experimental results for Chain Link Plate made of Glass Fiber will lead to the conclusion of the study and final results. Read More...
|
DESIGN |
India |
654-661 |
166 |
RFID Based Toll Collection System
-Pandhari Haribhau Jadhav ; Sarendra P. Akudari; Lokesh Nikhade
this paper describes the RFID based mostly automatic toll-tax assortment system for toll gate. Most of the tollassortment systems ordinarily utilized in India is manual dealings. Now days, streams of traffic are increased and toll gate on highways are congested. It will cause the holdup and waste time. The objective of this project i s to transform manual transaction to automated toll collection with the help of RFID technology. There are three portions in toll collection system. They are RFID system, balance deduction system in host computer and toll gate control system. For the RFID system, 13.56 Mc passive RFID reader and tag pairs ar used. The balance deduction system is enforced by Microsoft Visual Studio and C# language is employed to implement this technique. The AVR microcontroller is additionally accustomed management the dc motor and shows the deposit on the liquid crystal display. AVR microcontroller will check the ID numbers, vehicle numbers and the amount of balance with the database on PC. By victimization this technique, it will save time, i.e. by avoiding long queue as no have to be compelled to stop the vehicle and no want of manual dealings at the toll gate. Read More...
|
Electronics and Telecommunication Engineering |
India |
662-665 |
167 |
Enhancement of Low Light Images via IIIumination Map Estimation using Variational Optimization-based Retinex Model
-Priyanka B. Waghmode ; Nilesh Vani
Retinex is a method of bridging the gap between images and the human observation of scenes. Retinex theory is a model of lightness and color perception of human vision proposed by Edwin Land in 1986. While the retinex theory was actually aimed at providing explanation of human color perception, it has led to various image enhancement algorithms called as retinex algorithms, which are usually used to enhance local image contrast. Single-scale Retinex (SSR) is defined as an implementation of center/surround Retinex. Superposition of weighted different scale SSR balances both dynamic range compression and tonal rendition, which is Multiscale Retinex (MSR). For color images, spatial averages of the three color bands are far from equal, thus the output appears grey. To address this issue, a weight factor for different channels is introduced which is Multiscale Retinex with color restoration (MSRCR). In this paper, SSR, MSR and MSRCR systems for image enhancement are implemented and their performances are compared using MATLAB as the software tool. Read More...
|
Computer Engineering |
India |
666-669 |
168 |
SQL Injection Attacks and Prevention Mechanism
-Vikash Kesharwani ; Safa Bint Sami; Lokendra Kumar Tiwari
Today is the era of internet each task is performed using web-application so; it is required to provide security to the applications which are vulnerable to such type of attacks. According to the ponemon institute SQL Injection is used to: “Attack data-driven applications: in which malicious SQL statements are inserted into an entry field for execution (example: to dump the database contents to the attacker). SQL Injections exploits security vulnerabilities in applications softwares. SQL Injection is most commonly known as an attack vector through public facing websites, but can be used to attack SQL databases in a variety of ways.†The fact that SQL Injection attacks were discovered more than15 years ago by Jeff Forristal and are still successful. Other vulnerable software applications eventually are fixed, but not SQL. The Open Web Application Security Project (OWASP) offers this explanation: “SQL Injection attacks are unfortunately very common, and this is due to two factors: the prevalence of SQL Injection vulnerabilities and the attractiveness of the target (databases containing the interesting/critical data for the application)â€. The rest of the paper structured as follows: Section 1 Introduction section 2 describes SQL Injection and the classification of SQL Injection attacks. Section 3 is related to prevention mechanism. Section 4 is evaluation and results of attacks. Section 5 finally concludes references/ Remarks. Read More...
|
Information Technology |
India |
675-677 |
169 |
A Review Article of SAF based Transmission System
-Shivani Patel ; Gaurav Katare
Line commuted converter user in SAF (Shunt Active Filter) transmission systems inject harmonics into their associated AC and DC systems. A conventional approach to filter these harmonics is to use passive filters on both AC and DC sides of the converter. Apart from their technical problems, harmonic filters constitute a considerable part of the volume and cost of present DC terminal stations. Another possible alternative of harmonic suppression is to increase the number of pulses of AC-DC converters by transformer phase-shifting techniques, but the resulting complicated circuitry together with its problems of insulation produce significant technical and economical disadvantages. This Paper presents an overview of classical SAF transmission system. It also provides a brief historical development of the technology and state of art in the field of SAF transmission system. Based on outcome of literature survey, broad research goals are identified. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
678-681 |
170 |
Study on Effect of Non-Motorised Vehicles in Mixed Traffic Movement
-Attul Thakur ; Dr. Rakesh Gupta
In countries like India we generally can find a mixed traffic i.e. a traffic flow constituting of all type of vehicles like cycle, rickshaw, car, bus etc. In Indian cities the share of non-motorized vehicles at peak hours is too high. In every public transport, mode of transport involves access trips by non-motorised vehicles at each end. Non-motorised vehicles provide door to door service in congested parts of cities. Thus, non-motorized mode of traffic plays a very important role in meeting travel demand in countries like India. To design a traffic facility it is necessary to understand the behavior of traffic stream. Understanding the behavior of a traffic stream with mixed traffic is quite complex. In this work an attempt has been made to study the effect of non-motorized vehicle on mixed traffic movement. Traffic volume data was collected from Majri Crossing and Zirakur-Patiala Crossing for 30 minutes. This data was then analysed with the help of fundamental diagrams. It was seen that with increase in percentage of non-motorised vehicles the flow, density and speed are adversely affected. Density decreases at a particular flow rate when percentage of non-motorised vehicles increases. It was seen that with increase non-motorised vehicles adversely affects the capacity of the road. Along with this, a study on pattern of vehicular occupancy of non-motorised vehicles and motorised vehicles was done. Read More...
|
Civil Engineering |
India |
682-685 |
171 |
An Advanced Six Circuit Traffic Light Controller using Verilog HDL
-K Vinod Kumar ; M Riyaz Pasha
Traffic control is a challenging problem in many cities. This is due to the large number of vehicles and the high dynamics of the traffic system. Poor traffic systems are the big reason for accidents, time losses. In this it will reduce wa iting time of the vehicles at traffic signals. In traffic light controller, density of traffic is sensed by using IR sensors throughout day and night, and accordingly time is allotted for users to pass. Traffic Light Control (TLC) system also based on microcontroller and microprocessor. But the disadvantage of with microcontroller or microprocessor is that it works on fixed time, which is functioning according to the program that does not have the flexibility of modification on real time basis. Other advantages of this system are: i) System senses emergency vehicles on the individual road moreover it gives priority to the traffic of that particular road where the emergency vehicles is sensed. ii) Finds out defaulter who crosses the red signal by capturing images using camera. In this, we are using FPGA with traffic sensors to control traffic according requirement means we can change the program if it require and thus reduces the waiting time. The hardware design has been developed using Verilog Hardware Description Language (HDL) programming. The output of system has been tested using Xilinx ISE 9.2i. Read More...
|
VLSI |
India |
686-689 |
172 |
Underwater Image Quality Enhancement Methods and Problems: A Review
-Prateek Gawande ; Amit Chouksey
Underwater environments generally cause color cast or color scatter while photography. Color scatter is due to haze effects appearing when light reflected from thing which absorbed or may be scattered several times by particles of water. This cause lowers the visibility and less contrast of the image. Color cast is due to the varying attenuation of light in various wavelengths, and this is cause underwater environments bluish. To mention distortion from color scatter and color cast, this paper proposes a method to reconstruct underwater images that which is a combination of a wavelength compensation and de-hazing algorithm (IDWC). One has to determine the distance between the objects and the camera using dark channel prior, then haze effects cause by color scatter can be removed by the de-hazing algorithm. Next, one has to estimation the photography scene depth using residual energy ratios for each. According to the attenuation of every wavelength, reverse compensation conducted to restore all distortion from color cast. Read More...
|
Image processing |
India |
690-692 |
173 |
A Glorified Secure Search Schema over Encrypted Secured Cloud Storage with a Hierarchical Clustering Computation
-A. M. Sermakani ; T. Veena; S. Julia Faith
There are many secure objections in a multi-user strategy. First, all the users habitually keep the same secure key for trapdoor origination in a symmetric SE scheme. In this case, the revocation of the user is big demanding. If it is needed to revoke a user in this scheme, we demand to rebuild the index and disseminate the new secure keys to all the authorized users. Second, symmetric SE schemes frequently consider that all the data users are trustworthy with believable in nature. For an instance consider, a dishonest data user may search the documents and disseminate the decrypted documents to the unauthorized ones. There may be also chances of; a dishonest data user may disseminate his/her secure keys to the unauthorized ones. In the proposed work, we improve the SE scheme to grasp these challenge problems. In our enhancement model, a hierarchical clustering method is designed to guide more search semantics with an additional feature of making the system to cope the demand for fast cipher text search in large scale environments such as Big Data scenarios. The proposed hierarchical approach clusters the cloud documents with the minimum relevance threshold, and then divides the resulting clusters into sub-clusters until the necessity on the maximum size of cluster is reached. In the search module part of the proposed system, this advent model can influence a linear computational complexity against an exponential size increase of document collection. Read More...
|
Computer Science |
India |
693-696 |
174 |
Image Interpolation Methods and Problems: A Review
-Prashant Kushwaha ; Amit Chouksey
In computer graphics, image interpolation is the process of resizing a digital image. Interpolation is a non-trivial process that involves enhancement in sense of efficiency, smoothness and sharpness. With bitmap graphics, as the size of an image is enlarged, the pixels that form the image become increasingly visible, making the image appear "soft" if pixels are averaged, or jagged if not. Image interpolation methods however, often suffer from high computational costs and unnatural texture interpolation. This work intends to give an overview of image Interpolation, its uses & techniques. The paper work is an implementation of Image interpolation of images. Read More...
|
Image processing |
India |
697-699 |
175 |
Crankshaft Failure Analysis
-Yashraj Dewangan ; Dr. Himanshu Agarwal
This paper reports a failure mode analysis of a diesel engine crankshaft. Crankshafts are components which experiment severe and complex dynamic loadings due to rotating bending combined with torsion on main journals and alternating bending on crankpins. High level stresses appear on critical areas like web fillets, as well as the effect of centrifugal forces and vibrations. Since the fatigue fracture near the crankpin web fillet regions is one of the primary failure mechanisms of automotive crankshafts, designers and researchers have done the best for improving its fatigue strength. The present failure has occurred at approximately 2000 manufactured engines, and after about 96,000 km in service. The aim of this work is to investigate the damage root cause and understand the mechanism which led to the catastrophic failure. Recommendations for improving the engine design are also presented. Read More...
|
THERMAL ENGINEERING |
India |
700-702 |
176 |
Investigation of Aluminium Alloy - 20% Fused Silica Metal Matrix Composite
-Dr. L. John Baruch ; George Oliver D; K. Vinoth Kumar
Combining high specific strength with good corrosion resistance, metal matrix composites (MMCs) are materials that are attractive for a large range of engineering applications. Given the factors of reinforcement type, form, and quantity, which can be varied, in addition to matrix characteristics, the composites have a huge potential for being tailored for particular applications. Incorporation of hard second phase particles in the alloy matrices to produce MMCs has also been reported to be more beneficial and economical due to its high specific strength and corrosion resistance properties. This work focuses on the fabrication of aluminum alloy (LM13) matrix composite reinforced with 20% fused silica particulates using stir casting route. The microstructure and hardness of the fabricated composite were analyzed and reported. Read More...
|
M Tech. in Material science and technology |
India |
703-705 |
177 |
Cyber-Attacks Pattern, Statistics and Remediation
-Bajjuri Avinash Reddy ; Rithvik Gosukonda; Santosh P Korupolu
Cyber-attacks landscape is changing rapidly due to exponentially increasing cybercrime every year. In the last few years we have been seeing the unprecedented increase in internet usage because of economically and easily available smartphones that are almost always connected to internet. and because of advent of IoT (Internet of Things). These smart phones and mobile devises provide an ease of access to social networking sites, online transactions, cloud computing platforms, and automated processes (IoT) with the help of respective applications. But with the ease of access and technological evolution comes the progress of cybercrime, which continually develops new attack types, tools and techniques that allow attackers to penetrate very well engineered infrastructure and cause damage, but still remain untraceable. Information security has always been a zero-sum game i.e.., the easier it is to use, the harder it is to defend it against the attacks, the harder it is to use the easier it is to defend it from the attacks. This article aims to give an overview of the cyber- crime, its' patterns, statistics and remediation techniques based on patterns and trends in cyber-attacks in last few years. Based on the extensive study, this article presents remediation techniques that companies may undertake to ensure improved security, thereby defending their business from attacks (from information security viewpoint). Read More...
|
Computer Science and Information Technology |
India |
706-710 |
178 |
Wastewater Treatment using Bio-Coagulant as Cactus Opuntia Ficus Indica - A Review
-Saurabh O. Deshmukh ; Dr. M. N. Hedaoo
Reusing wastewater by effective treatment can contribute to counter the water scarcity. Conventional metal based coagulant treatment methods may prove inadequate to apply in aspects such as non-biodegradability and altered pH in post-treatment. There has been an extensive research on the use of biological plant material such as Agricultural waste, Chitosan, Moringa Oleifera, Eichhornia crassipes, Bark of acacia, Surjana seed, Maize seed, Tannin, Cicer aretinum, Cactus plant etc. as a coagulant. The present paper review to explore the use of cactus species in the bio-coagulation process and also it aims about investigation on effectiveness of cactus species Opuntia Ficus Indica as bio-coagulant which involve pH implication in post-treatment. In addition, the cactus had no significant effect on pH of treated water. This review highlights about optimum dosage and optimum pH at which turbidity removal is maximum. Some studies show the effectiveness of cactus in removing chemical oxygen demand (COD) and coloration in wastewater. Plant-based coagulants have the potential are effective in wastewater treatment which is sustainable and environmentally appropriate. The bio-coagulant proved to be efficient in turbidity and colour removal. Read More...
|
Environmental Engineering |
India |
711-717 |
179 |
Design of Concept Wheel
-Kamlesh Vijay Baviskar ; Chaitanyaprabhu Padhar; Ishant Patil; Nikhil Mate; S.P Dhamone
Wheel is designed to fit into the frame and hold tyre. Wheels are used in the vehicles like bicycle, bike, cars etc. Focusing mainly on bicycle we have decided to design a wheel that can be made portable whenever needed. In this way it will allow user to keep it in a backpack or carry it from one place to another occupying less space. It is a concept wheel that would open new possibility of futuristic foldable vehicle. Its simplicity and compact design make it unique and highly portable. Read More...
|
Mechanical Engineering |
India |
718-719 |
180 |
The Sparse Approximations of the LMMSE Channel Estimation in OFDM with Transmitter Diversity
-Kotra Priyanka ; Billa Ramprasad; Maddhi Raju; M. Sruthi
The main goals in developing the next generation of wireless communication systems are for delivering multimedia services such as voice, data and image in local coverage networks. These will be a complement to the existing wide area coverage systems, for example to the third generation of mobile communications. In order to provide these services, a high data rate and high quality digital communication system is required in a restricted bandwidth. A major limiting factor is, however, the multipath propagation phenomenon. It causes frequency-selective fading due to different echoes of transmitted symbols overlapping at the receiving end, which can lead to the bit-error-rate (BER) degradation. One way to effectively combat the multipath channel impairments and still provide high-data rates in a limited bandwidth is use of an orthogonal frequency-division multiplexing (OFDM) modulation method and multiple antennas at the transmitting end. OFDM is an attractive multi-carrier modulation (MCM) technique because of its high spectral efficiency and simple single-tap equalizer structure, as it splits the entire bandwidth into a number of overlapping narrow band sub channels requiring lower symbol rates. Furthermore, the inter-symbol interference (ISI) and inter carrier interference (ICI) can be easily eliminated by inserting a cyclic prefix (CP) in front of each transmitted OFDM block. OFDM can be implemented using a coherent or non-coherent detection technique. A coherent detection method generally provides the SNR gain over the non-coherent method as the former modulation technique uses channel state information. This implies, however, a more complex receiver as the channel state information is generally obtained using channel estimation. Read More...
|
Advanced Electronics and Communication Engineering |
India |
720-730 |
181 |
Alternative Materials for Mini Tractor Brake Drum - A Review
-M. Easwaramoorthi ; G. Dinesh; S. Karthick; T. A. Naveenraj; A. Pattusamy
Normally grey cast iron drum brakes are used in tractor’s rear wheel brake drum. Alternative materials like aluminium metal matrix composite are used in automobile, marine ships and aerospace brake drums to improve the breaking effect and efficiency. The drum brake failure normally occurs due to high temperature generated inside the drum and also high stress. An attempt is made in this paper to investigate the scope of using aluminium alloy with combination of silica carbide as an alternative material with heat dissipation, strength, corrosive resistance, hardness and thermal expansion perspective. Read More...
|
AUTOMOBILE ENGINEERING |
India |
731-733 |
182 |
Development of Ni-Cr base Alloys for Steam Generator Tubes and other Parts in Pressurized and Boiling Water Reactors
-Ch. Ranganayakulu ; Dr. P Sreenivasulu; K. Loknadh
Incoloy-800 is a nickel-chromium alloy that is best known for its ability to maintain a stable structure during prolonged exposure to high temperatures. Incoloy-800 possesses more than the strength to withstand the basic stress caused by heat, though. It has high levels of resistance to oxidation and carbonization, making it one of the most effective materials for use in carbonizing equipment and heating element sheathing. Ni-Cr-Fe alloy that resists high temperature oxidation. This alloy is a first choice for an upgrade from the 300 series stainless steels when improved performance or strength at temperature is required. It is an iron based super alloy for steam generators and its chemical composition is:
- Ni=30-35%
- Cr=19-23%
- S=0.015%
- Al=0.15-0.6%
- Ti=0.15-0.6%
- Cu=0.75%
- C=0.1%max.
- Si=1%
- Mn=1.5%
- Fe=balance
The chromium in the alloy imparts resistance to oxidation and corrosion. The high percentage of nickel maintains an austenitic structure so that the alloy is ductile. The nickel content also contributes resistance to scaling, general corrosion, and stress-corrosion cracking. The iron content provides resistance to internal oxidation. Our present study aims to find out the manufacturing process of the Incoloy-800. The Incoloy-800 tubes are manufactured in the Nuclear Fuel Complex, by the extrusion process. Initially the powders of the alloy are mixed to proper composition and then compacted at high pressure. The compacted components are heated in the Electric Arc Furnace to prepare the Billets. The Billets are extruded to form tubes and then it undergoes pillgaring to decrease the thickness of the tube wall and increase the length. The samples are taken from the billet, from the tube after extrusion and from the tube after final pillgaring. From the obtained samples the properties of the Incoloy-800 alloy is analyzed before extrusion, after extrusion and after final pillgaring. In the microstructure of the incoly-800 becomes finer as it undergoes pillgaring and mechanical properties of the Incoloy-800 alloy changes with microstructure.
Read More...
|
M.Tech Thermal Engineering |
India |
734-738 |
183 |
Can Artificial Intelligence Take Over Teaching & Learning Process from Human in near Future
-Er. Prashant Saxena
Artificial Intelligence is big boo in today’s world and everyone wants to know the reality of AI. Artificial intelligence is an interesting field where human are working to develop self – thinking, self-decisive machines which can decision in any situation like human takes. According to the researchers these machine will be taking better decisions because critical programming instructions which will not bother from other conditions around them. It will be purely target oriented and task will be completed in all aspects. Read More...
|
Artificial intelligence |
India |
739-741 |
184 |
Application of Thermal Power Plant Fly Ash and Water Treatment Plant Sludge in Brick Making
-Manish Bunker ; Kaushik Majumdar
Sludge from a water treatment plant is, frequently, disposed and launched directly within the water bodies, inflicting a negative effect in the environment. Also, ash is produced due to burning of coal in thermal power plant and is the industrial solid waste most generated roughly around five million tons/year. An efficient disposal of coal ash is a problem attributable to its large volume and harmful risks to the environment. The specific purpose of this study was to judge the technical potentialities of incorporating cyclone ash and sludge from a waste water treatment plant within the production of ecological bricks. The wastes were analyzed for physico-chemical, mineralogical and morphological properties. Numerous mixtures were made ready by incorporating these industrial wastes in brick production. The results of wastes incorporation on physical properties like compressive strength and water absorption were determined. The simplest result, in terms of compression strength and water absorption, was reached by the series of bricks made with 55% soil, 15 % cement, 12 % fly ash and 18 % sludge by weight. The results showed that sludge and ash can be used as waste additives within the making of soil-cement bricks rank fraud. Malware is also detected before the time of downloading. Read More...
|
Civil Engineering |
India |
742-746 |
185 |
Heavy Metals Removal from Wastewater using Aquatic Plants
-Vikas Kushwaha ; Ashish Saxena; Nidhi Shukla
Water pollution is the serious issue. In last some decade, a lot of or so many resources has been done on the potential of aquatic plant for pollutants removal. Aquatic plants successfully used for wastewater treatment. It is very useful to removing pollutant like heavy metals, suspended solids, BOD, and organic matters. This paper has been mainly focused on the removal of heavy metals from waste water using aquatic plant. Aquatic plant could grow in sewage; they absorb and digest the pollutants in waste water, thus diverting sewage effluents to clean water. Thus, the plant or set up is a natural water purification system, which can be stabilized at a fraction of the cost of a conventional sewage treatment facility. Read More...
|
Environmental Engineering |
India |
747-751 |
186 |
Analysis of Fly Ash and Water Treatment Plant Sludge in Brick Manufacturing
-Manish Bunker ; Kaushik Majumdar
Sludge received from a water treatment plant is generated in huge quantity, which is mostly, disposed and launched directly in the water bodies, resulting a negative effect in the environment. Also, ash is produced due to burning of coal and is the industrial solid waste most generated roughly around six million tons/year. An efficient disposal of ash is always problem attributable to its large volume and harmful risks to the environment. The specific purpose of this analysis was to judge the technical potentialities of ash and sludge from a waste water treatment plant within the production of ecological bricks. The wastes water were analyzed for physico-chemical, mineralogical and morphological properties. Numerous mixtures were made ready by incorporating these industrial wastes in brick production. The results of wastes incorporation on physical properties like compressive strength and water absorption were determined. The simplest result, in terms of compression strength and water absorption, was reached by the series of bricks made with 50% soil, 20 % cement, 15 % fly ash and 15 % sludge by weight. The results showed that sludge and ash can be used as waste additives within the making of soil-cement bricks. Read More...
|
Civil Engineering |
India |
752-755 |
187 |
Evaluation of Flexible Pavement Failures
-Ashpaq Majeed Naikl ; Dr. Rakesh Gupta
This study is a survey to evaluate the flexible pavement conditions to determine and specify the types of the failures in the pavement for the selected highway. It is very significant to evaluate and identify the causes of the flexible pavement failures and select the proper and best treatment and maintenance. The study had two major and critical goals which covered by considering the following three tasks, the first was the visual evaluation and inspection of existing flexible pavement conditions including the failures, the second to determine and find out the actual causes of these failures in the pavement, and the third is to select the most and effective treatments and maintenance types. As a case study, of Ambala Cantt to Saha road was selected for evaluation and inspection purposes. The field evaluation works were achieved on the existing flexible pavement conditions of the selected rural highway. The results were most of the damages and failures in the pavement are serious and extreme surface deformation, cracks, disintegration, and surface defects. These damages and failures are caused by fatigue and other types of failures resulted from the movement of heavy vehicles and trucks, poor drainage design, unsuitable pavement layers thickness design, and improper pavement mix design and selected materials. Read More...
|
Civil Engineering |
India |
756-760 |
188 |
Design and Fabrication of Frictionless Electromagnetic Braking System - A Review
-Sugumar .M ; Krishna Moorthy .S; Manojkumar .J; Manoj Kumar .T; Poovananthan .R
Brakes could be the crucial parts in most of the moving system that are generally used to slow down or stop the motion of the any moving system. Braking system uses the friction force to transform the kinetic energy of a moving parts into heat by the use of the brake pads. Frequently using of these type of friction braking leads to rise in temperature of brake pads, these leads to effecting the effectiveness of the braking system. By overcoming these effects we use electromagnetic braking .In this project, we have to use eddy current braking in vehicle to stop the vehicle by non-contracting type. This braking system is friction-less, it has an advantages over the ordinary braking system in the performance and maintenance. Read More...
|
AUTOMOBILE ENGINEERING |
India |
761-762 |
189 |
Effect of Natural Admixture on Compressive Strength of Flyash Blended Concrete
-J Prathima Sudarsan ; T. Venkaiah
A durable concrete is one that has ability to withstand the damaging effect of the environment and of its service conditions without undue deterioration and excessive maintenance over the design life of a structure. The used of high performance concrete is an alternative in producing high-strength concrete, durable and construction friendly. In the present investigation, experimental results on compressive strength of concrete made with various mixture proportions i.e., fly ash (0%-20%) and egg (0%-0.35%) have been presented. The increasing trend in compressive strength and UPV values observed from 0% egg dosage to 0.35% egg dosage at all curing periods. At 0.5% egg dosage the compressive strength has decreased at all ages. Similar trend has been observed for the other fly ash proportions i.e. from 10% to 15%. At 20% fly ash dosage, all the values have decreased when compared to the 15% dosage mixes. From the results it is observed that 0.35% egg dosage and 15% fly ash dosage can be taken as optimum dosages. Read More...
|
Civil Engineering |
India |
763-766 |
190 |
Pipeline Concept for Implementing High Speed and Low Area Digital Radix-2 CSD Multipliers
-Prof. Sandhya Shinde ; Prof. Amruta Chore
There are many types of algorithms or multipliers available in literature, Such as Modified Booth multiplier, Wallace tree multiplier, Radix-2 CSD multiplier and so on. Especially, there have been extensive researches about Radix-2 CSD multipliers as CSD numbers represented with lesser number of non-zero digits. In this paper, a study on various techniques of CSD conversions and best of these conversions is applied to different CSD multipliers. Horner method based multiplication is taken as reference in this paper. It reduces complexity. But, it faces the problem of high power consumption along with low speed. In this paper, Pipeline based multiplication is proposed which eliminates above said problems. This method saves execution time by 87.96% time and reduces number of slice LUTs by 92.86% in comparison with the earlier method (Horner based) while designing them in Verilog HDL and targeted on Xilinx Vertex-7 device. Read More...
|
Electronics and Telecommunication Engineering |
India |
767-769 |
191 |
Steel Tiffin: Hotel Food Delivery System with Shortest Path in GPS using Mobile App
-Rutuja Maslekar ; Pooja Bachhewar; Atul Patil; Anurag Jaiswal
Steel Tiffin Hotel Food Delivery System with Shortest path in GPS using Mobile App is a application designed for use in the food delivery industry. This system will allow hotels and restaurants to increase scope of business by providing safe food to the customers. The system also allows to quickly and easily manage an online menu. The project of smart services deals with the system of monitoring services of Tiffin to the metropolitian cities and for the department of business cooperatives.An analysis of the current topic is to enable one's time and distance in order to carry their work without any disturbance and constantly. The report also makes analysis about the designed project in terms of time reduced services for all the need full people and their issuance of smart services along with it's usage which meant to provide maximum benefits with minimum losses. It is seen that these advance system for the food services which improves the environmental pollution by reducing the vehicle flow and also it gives the service healthy to all the human begins those are not able to manage their time and business. Read More...
|
Computer Engineering |
India |
770-772 |
192 |
Design, Optimization and Experimentation of an Impact Attenuator to Reduce Impact on Vehicle during Accident
-Yogesh Anadrao Patil ; A. M. Naniwadekar
Impact attenuation is promising technique used in automobile industry to absorb the impact for sake of driver's safety. It is important to analyze the impact attenuator for crash worthiness. Honeycomb structure is analyzed as impact attenuator for its impact energy absorption capacity with different material in order to ensure drivers and occupants safety in case of high speed crashes. This paper provides a review on Impact attenuator and impact attenuation techniques using different structures. Read More...
|
M.E. IN MACHINE DESIGN |
India |
773-775 |
193 |
Analysis of Different Similarity Measures for Text Document Comparison
-R. Anushya ; Dr. Antony Selvadoss Thanamani
Present days people are related with substantial measure of information on standard premise. The sole reason for produced information is to meet the quick needs and no endeavor in sorting out the information for later proficient recovery. Data mining is an idea of separating learning from such a gigantic measure of information. While a few grouping techniques and the related similitude measures have been proposed before, there is no deliberate near investigation of the effect of closeness measures on bunch quality. This might be on the grounds that the famous cost criteria don't promptly decipher crosswise over subjectively extraordinary measures. In this paper we look at four well known likeness measures (Euclidean, cosine, Pearson relationship and broadened Jaccard) related to various kinds of vector space portrayal (Boolean, term recurrence and term recurrence and reverse report recurrence) of archives. Grouping of reports is performed utilizing summed up k-Means; a Partitioned put together bunching strategy with respect to high dimensional inadequate information speaking to content records. Execution is estimated against a human-forced grouping of Topic and Place classifications. We led various analyses and utilized entropy measure to guarantee factual essentialness of results. Cosine, Pearson relationship and broadened Jaccard similitudes rise as the best measures to catch human classification conduct, while Euclidean measures perform poor. Read More...
|
Computer Science |
India |
776-780 |
194 |
Data Collecting in Wireless Sensor Networks using Middle Nodes
-Deepika. M ; Dr. Antony Selvadoss Thanamani
Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting data from sensor nodes and transmitting these data to the sink node or base station. An effective way to perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters where a number of nodes, called cluster heads, are responsible for gathering data from other nodes, aggregate them and transmit them to the Base Station (BS). In this paper we produce a new algorithm which focused on reducing the transmission path between sensor nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved with this technique compared to the well-known LEACH_C algorithm. Read More...
|
Computer Science |
India |
781-783 |
195 |
Smart Solution for Agriculture using Wireless Sensor Network and Internet of Things(IOT)
-Prof. Shweta Suryawanshi ; Prof. Neha Tiwari
This paper presents the technology of Active Radio Frequency Identification (RFID) and Wireless Mesh Sensor Network (WMSN) that will be used in agriculture. In this paper, ZigBee technology platform is applied in 2.45 GHz and active RFID to sustain the WSN by developing a fully automated IoT solution in agriculture for irrigation system. The system includes a plurality of sensor nodes installed in a crop field sending an ID, which are embedded sensor and WSN that work on ZigBee 2.4 GHz platform. The ID was sent to act as a signal of soil in dry condition of a specific area to a reader at base station. The pump stations will use information from base station to sprinkling water in the specific area of the dry state automatically. The automatic control system is very practical in agriculture but most of it is based on schedule and timer regardless of soil condition and temperature. Therefore, wireless automated irrigation system for efficient water use and production is proposed. Read More...
|
Internet of things (IoT) |
India |
784-786 |
196 |
Smart QR-Code System for E-Documents using Keylogging Security
-Ms. Sukeshini Ingale-Gawai ; Ms. Madhuri Bidwe-Gurale
In this digital era of computer and technology, we are still lacking behind when it comes to government offices documentation work and processes. In order to get nay work done which involves our national government, there is a long procedure and unnecessary queues. Moreover, its harsh reality that government official takes more than instructed time to accomplish any work related to public. It’s difficult for senior citizens to be present every time and wait in long queue Worst case scenario is that sometimes after submitting al the required documents, they inform us that they have misplaced or not received any one of the document. In this case even though we have submitted we do not have any option rather than resubmitting again so that our process is completed. This is too tedious and time consuming. Thus to avoid all this document loss and steady up the current procedure we have come up with a digital solution that guarantees reliability, no document loss and safety along with fast processing and thus not only helping working citizens but also senior citizens from standing in long queue. Read More...
|
Computer Science and Engineering |
India |
787-788 |
197 |
Influential Node Tracking on Dynamic Social Network using Data Mining
-Prof. Neha Tiwari ; Prof. Amruta Chore
A social network sites plays very important role for spreading the information and influence in the form of whole world in hand. There is a basic thing to find small set of influential people in a social network such that targeting them initially. It will increase the spread of the influence but the problem is that to finding the most influential nodes in network. There is one Algorithm called as Greedy algorithm used for mining top-K influential nodes. It has two components: dividing the post of social network into several communities by taking into account information diffusion and selecting communities to find influential nodes by a dynamic programming. Using Location Based community Greedy algorithm is used to find the influence node based on Location of the user and we can sort out the influence for particular Area. There is one more Serious problem in social network is that there are so many malicious attacks spread by the people and that malicious contents are hidden behind some attractive posts. i.e viral marketing techniques in the promotion of new products or posts like how much luckiest today or what does your name meant or post which states the giving you iPhone in lesser prize or giving them free samples of the product etc. such posts in social network may be harmful to users which has the negative intention of stealing the personal information user. So the takes the advantage of such usage history of ads i.e. rating of such posts the system analyses the that products impact on social media users and predicts the positive or negative category for that posts which is beneficial for future users on social media. So we need to find out that post and block them. Read More...
|
Computer Science and Information Technology |
India |
789-790 |
198 |
An Improved Compressive Sensing Data Gathering in Wireless Sensor Networks
-Deepika. M ; Dr. Antony Selvadoss Thanamani
In wireless sensor networks (WSNs) the sampling rate of the sensors determines the pace of its energy use since most of the energy is used in sampling and transmission. In wireless sensor network (WSN) there are two main problems in employing conventional compression techniques. Recent advances in technologies have increased the use of wireless sensor networks in different applications like chemical and physical monitoring, healthcare, tracking and soon. The compression performance depends on the organization of the routes for a larger extent. The efficiency of an in-network data compression scheme is not solely determined by the compression ratio, but also depends on the computational and communication overheads. Propose a sparser analysis that depends on modified diffusion wavelets, which exploit sensor readings' spatial correlation in WSNs. In particular, a novel data-gathering scheme with combine routing and CS is presented. A modified ant colony algorithm-based diffusion wavelets (ACBDW), where next hop node selection takes a node’s residual energy and path length into consideration simultaneously. The simulation results, show that our proposed technique improves the delivery ratio while reducing the energy and delay. Read More...
|
Computer Science |
India |
791-795 |
199 |
Stress Analysis and Weight Optimization of Connecting Rod Reinforced with AL based Composites-FEA Approach
-Laxman P. Khose ; Navalkant Konda
The automobile engine connecting rod is a major link inside of an internal combustion engine. It is the intermediate member between the piston and the crankshaft. Its primary function is to transmit the push and pull from the piston pin to the crankpin and thus convert the reciprocating motion of the piston into rotary motion of the crank. Previously connecting rods are manufactured using cast iron but now days AL based alloys finds wide application in manufacturing the connecting rod. In the present study, FEM analysis is carried out by considering two materials viz. cast iron and Al based composite material reinforced with the boron carbide with addition of some amount of fly ash. The parameters like von misses stress, strain and displacements were obtained from ANSYS software. Compared to cast iron the new material found to have less weight (reduction of 70-75%), with more stiffness and 75-80% reduction in displacement. Read More...
|
M.Tech MECHANICAL ENGG |
India |
796-799 |
200 |
Analysis of Ethanol Blended Biodiesel on VCR Engine
-Vishal Nagar ; Shambhuraj Patil; Ass. Prof. S. S. Tambade
In this present research work, waste cooking oil biodiesel combined with diesel fuel blends were used as alternative fuels for diesel engines. The six different types of blends namely B5, B10, B15, B20, B25 and B30 were prepared. The optimization of production of biodiesel from waste cooking oil from transesterification process was evaluated on varying the various parameters such as reaction time, KOH concentration and molar ratio. An experimental investigation was carried out to evaluate the performance and emission characteristics of a cooking oil biodiesel blends at various compression ratios like 12, 14 and 16 on a compression ignition engine and important fuel properties were determined. The performance parameters analyzed include BP (Brake Power), BSFC (Brake Specific Fuel consumption), BTE (Brake Thermal Efficiency) and exhaust gas concentration including oxides of nitrogen, HC and CO. The calorific value of optimized waste cooking oil biodiesel was lower than diesel fuel. The flash and fire point of waste cooking oil biodiesel were determined to be 154oC and 160oC respectively which are higher than diesel fuel. The bsfc for all blends decreases as the compression ratio increases and at all compression ratios bsfc remains higher for the higher blends as the biodiesel percent increase. The blends of biodiesel with small content in place of petroleum diesel can help in controlling air pollution and easing the pressure on scarce resources without significantly sacrificing engine power and economy. Read More...
|
Biotechnology |
India |
800-802 |