No. |
Title and Author |
Area |
Country |
Page |
1 |
Proton Exchange Membrane Fuel Cells (PEM) Alternative Fuel Resource
-V. Karthikeyan ; P. Praveen; S. Tamilarasu; M. Nethaji
One of the major sources of power is the engines. These are presently used for transport and for other applications. The fuels to these engines are nothing but the products obtained from fractional distillation of petroleum. Incomplete combustion produces carbon monoxide which depletes the ozone layer. These are the problems our environment faces today. Since there are more kinds of fuel cells, this paper has been narrowed down to PEM fuel cell which uses only hydrogen as a fuel to produce power. Hydrogen is available in plenty. The bye product is nothing other than water. So there is no hazard to environment. Same water can be used to produce hydrogen by passing current into water. It does not create any noise pollution as like a generator. These are some points to be highlighted in PEM fuel cells. Read More...
|
AUTOMOBILE ENGINEERING |
India |
1-4 |
2 |
Sustainable Agriculture using IoT Based Automated Soil Fertility Measuring Device
-Kamlesh D. Thummar ; K. G. Bhuva
India is likely to become most populated country by 2022 in which people are suffering due to starvation, In spite of agricultural resources, potential, skilled persons for farming. Since independence agricultural sector is backbone of Indian economy which needs to be advanced with latest technology. This thesis is focused on advance farming using Internet of Things (IoT) and Wireless Sensor Networks (WSN) which include soil measurement ,plant growth, nutrition, quality and quantity of crops/fruits, stock analysis and selection of crop cultivation. This Thesis is desired for Soil measurements, Suitable plant growth and effective fertilization. Conventional soil testing methods are not optimal it needs to be implemented with sensor, controller/processor and network for advance farming. Read More...
|
Electronics & Communication Engineering |
India |
5-9 |
3 |
Analysis of Manufacturing Techniques on Strength Properties of Glass Fibre Reinforced Composites to be used in Automobile
-Prof. Ashwin Thakkar ; Hiren N. Upadhyaya
In recent era the demands of Fiber Reinforced Composite materials are increasing because overall properties of the composites are superior to those of individual materials. Composites materials are used in almost all aspects of the industrial and commercial fields. Glass Fiber Reinforced Composites are considered to have potential use as a reinforcing material in polymer based composites. Glass Fiber Reinforced Composites have been prepared by various manufacturing technology and are widely used for various applications. Glass fibers are having excellent properties like high strength, flexibility, stiffness and resistance to chemical harm. Glass Fiber Reinforced Composite structures are manufactured by using E-class glass fibre and polyester resin using two different methods - hand lay-up and spray-up manufacturing techniques in the application area of car bumper for passenger cars. The specimens prepared from composite laminates are tested for mechanical properties such as tensile strength, flexural strength and impact strength as per the ASTM standard D638, D790 and D256 respectively. Results show improved strengths for spray-up method. Read More...
|
Textile Engineering |
India |
10-15 |
4 |
Face Recognition: Control of Photo Sharing on Online Social Networks
-Ms. Pathak Anchal ; Ms. Karina Maiyani; Ms. Sawani Erande; Ms. Rumana Mulani; Prof. S. S. Gawai
In online social network (OSN) user's resource may contain the privacy of other resources. Most of the social networking sites provides features that allows user to easily upload and post photos on social network. Many privacy violations occur in current online social network which becomes a serious problem. Unfortunately photos that a user is tagged in, have very few privacy control. Nowadays researchers focuses on how to integrate into co-worker's willingness of privacy when setting access rule for resource. In this paper we study the situation when a client shares a photograph containing people other than himself/herself. We proposed a system where photo can be shared in a secure way. Proposed framework can help clients to effortlessly and appropriately design security settings. The existing system has the individual face recognition system installed with each user, which is very time-consuming. Proposed system has a centralized FR engine in charge of recognizing all users over a large OSN. Effectiveness and Flexibility is good of Proposed Solution. Read More...
|
Computer Engineering |
India |
16-18 |
5 |
Development of Design Spreadsheet Tool for R.C.C. Beam Design using V.B.A.
-Suryam Tiwari ; Vijay Shrivastav
The design methodology in light of Limit State Method includes various mathematical statements and parameters, which makes the outline handle a confusing and repetitive undertaking. Additionally, outline being a trialing procedure is extremely repetitive and time- consuming in nature. Henceforth utilization of spreadsheets can decrease the time and effort of a planner/build widely. On account of the minimization and compliance, spreadsheets have turned into one of the best choices for a designer, notwithstanding the accessibility of number of standard configuration programming packages. The primary point of this undertaking is to set up a Microsoft Excel Spreadsheet using VBA Programming which will allow user to
1) Analyse a beam for Shear Force, Bending Moment, Slope & Deflection for various End Conditions and for different load patterns.
2) To analyse a beam for its Safe Load Carrying Capacity
3) To Design RCC Beams
The result of this venture will be an outline apparatus, which can be advantageously utilized by a specialist to analyse and design a RCC beam.
Read More...
|
Civil Engineering |
India |
19-24 |
6 |
Database Manager - My SQL Query Generator with Modern GUI - Android Application
-A. K. Baitule ; Vaishnavi R. Shende; Tanzila A. Sheikh; Yeshwarya K Dandhare
Database manager is Android application which allow users to access Database from smartphone with remote connection to database and here user can create tables from drag and drop editor. Any programmer can connect their databases with remote MySQL connection through database manager. User can manage multiple back ends of several domains with smartphone. User also update-delete tables and rows without writing queries and without using MySQL Clients. Database manager is based on PHP, Angular, mobile J Query, Java script with responsive view.In this Project all the modules are web based and all the pages are built with material design so user can also connect databases through web client (query transfer protocol). Data management has been extensively by many sectors across the globe. In the Database Industry it is not only beneficial to developers but also aids owners, employers, employees, IT companies and multiple other parties involved in the same. From our research we observed that Database manager applications can help in managing tables/records, making entity relationship management decisions and user receive better response services. Furthermore, it was seen that huge amounts of data generated by during database operations are too complex and voluminous to be +processed and analyzed by traditional methods. Here is where Operations Research techniques come in the picture. Operations Research provides the methodology and technology to transform these mounds of data into useful information for decision making. Hence, the combination of using Operations Research and Data Managing in the IT Industry has become exceedingly popular if not necessary. Here is Android application from which any programmer can connect the database is from anywhere with few simple steps. GUI provided by database manager is able to perform multiple operations very quickly a without writing queries. Read More...
|
Computer Engineering |
India |
25-27 |
7 |
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
-Faiz Mapkar ; Akshay Desale; Ankit Loharaj
With the personality of low preservation, cloud computing provides a cost-effective and effective solution for sharing workforce useful resource amongst cloud users. Unfortunately, sharing data in a multi-owner method at the same time retaining information and identity privateness from a un relied on cloud is still a difficult problem, due to the well-known trade of the membership. In this paper, we endorse a cozy multi owner knowledge sharing scheme, named Mona, for dynamic organizations within the cloud. By using leveraging staff signature and dynamic broadcast encryption approaches, any cloud person can anonymously share data with others. In the meantime, the storage overhead and encryption computation fee of our scheme are impartial with the quantity of revoked customers. Additionally, we analyze the security of our scheme with rigorous proofs, and show the effectivity of our scheme in experiments. Read More...
|
Computer Engineering |
India |
28-31 |
8 |
Automatic Stair Climbing Trolley
-Sohan Subhash Kumawat ; Milind Devidas Sonawane; Shubham Kiran Khadangle; Omkar Rajendra Chavan; Prof. B. J. Vispute
This project aims at developing a mechanism for easy transportation of heavy loads over stairs. The need for such a system arises from day-to-day requirements in our society. Devices such as hand trolleys are used to relieve the stress of lifting while on flat ground; however, these devices usually fail when it comes to carrying the load over short fleet of stairs. In the light of this, the project attempts to design a stair climbing hand cart which can carry heavy objects up the stairs with less effort compared to carrying them manually. It also endeavors to study the commercial viability and importance of such a product. Several designs were conceived that would allow a non-industrial hand trolley to travel over stairs, curbs, or uneven terrain while reducing the strain on the user. In our project, the trolley is equipped with Tri-Star wheels which enable us to carry load up and down the stairs. It also eases the movement of trolley in irregular surfaces like holes, bumps, etc. Read More...
|
Industrial Design |
India |
32-35 |
9 |
Semantic Web Based Ontology Development using Cloud Environment
-B. Priyanga ; M. Suguna
The Ontology is the main issue of semantic web architecture as the model of knowledge and recognition of knowledge. In this approach, ontology modeling for the semantic web based on cloud environment has been proposed. First step involves, the process of creating cloud model on ontology is presented. Second step involves, semantic web is used to express ontology from concept cloud climbing-up. Third step, analysis are done based on air conditioner performed in knowledge representation. The result provides the accurate value to create domain ontology in terms of cloud model. Read More...
|
Computer Science and Engineering |
India |
36-38 |
10 |
Amphibot for Sewage Monitoring System
-Dr. B. Jaishankar ; Sudharsan. V; Sarathkumar. A; Vimalkumar. A
involved in the sanitation of our surroundings. Now a day’s people are affecting a lot due to improper sewage control. There is a lot of sewage maintaining methods can be provided by government but it can’t be worked as not too well. Technology came into existence because, without human interaction computers were able to access data from objects and devices. Amphibot can replace the human entering in the sewage for cleaning purpose and amphibot is more advanced it can easily detect the toxic gas present in the sewage. The amphibot is not only for the monitoring purpose it able to clean the sewage. This makes it essential to provide a way that can connect the monitoring and control systems to an Internet of Things platform. The proposed model provides a system of monitoring the water flow and toxic gas inside a manhole and to clean the sewage. Read More...
|
Electronics & Communication Engineering |
India |
39-42 |
11 |
Network Remote Surveillance
-Ansari Ayaz Azad ; Prashant H. Rathod; Sankhe Natali Ghanashyam; Sane Sayali Surendra
This Project deals with monitoring the Network Screen Activities. In the proposed system we introduce current session option to monitor the network systems at the same time and in the accesses folder option shows the username and user accessed folders. While client logins to the server, the Client IP Address and System names are added to the server. Server will display all the user names, from server we can monitor the particular Client Screen Activities like that currently opened screens, what are all the files created, modified and deleted. Protocols we are using are SNMP, FTP, SMTP, RDP etc. Read More...
|
Computer Engineering |
India |
43-44 |
12 |
Effect of Warm Mix Additive on the Performance of Bituminous Mix
-Darshan P Joshi ; Ashraf M. Mathakiya
Asphalt industries expend a lot of powers and discharge contamination gases into the climate. Warm blend black-top is the most perceived approach to limit these negative effects, which have offered ascend to various issues identified with their execution and the materials utilized. WMA innovation permits the blending, set down, and compaction Asphalt blends at fundamentally bring down temperatures contrasted with Hot Mix Asphalt (HMA). The innovation can lessen creation temperatures by as much as 30 percent. The present examination explores the impacts of two unique sorts of warm blend black-top added substances on the properties of black-top fasteners and blends. In this examination consistency review bitumen VG-30 is considered and two sorts of warm blend added substances Zycotherm with the doses (0.05%, 0.1%, and 0.15%) is utilized. This Research introduces an orderly lab examine With Aggregate covering, Marshall Mix Design for Dense Bituminous Macadam (DBM) grade II for warm blend added substance (WMA) i.e. Zycotherm. Read More...
|
Transportation Engineering |
India |
45-49 |
13 |
A Survey on Secure and Verifiable Access Control Scheme for Cloud Computing
-Namith Rajan ; Abhay Deshpande; Rohit Thorat; Shubham Sarolkar; Dipti Chaudhari
Due to the quality and volume, outsourcing data to a cloud is deemed to be one in all the foremost effective approaches for large knowledge storage and access. With increase in number of users the amount of data being stored on the cloud has substantially increased. The access legitimacy of a user firmly depends on the ciphertext policy accepted by the owner. Ancient approaches either fully ignore the difficulty of access policy update or delegate the update to a 3rd party authority. There are always possibilities of duplicate data on cloud. This paper has discussed various development their advantages and limitations of different encryptions. Read More...
|
Computer Engineering |
India |
50-51 |
14 |
High Performance Concrete with the Use of Silica Fumes and Other Materials
-Disha Shah
Concrete, a composite material, composed of aggregate, generally refers to Portland cement concrete. The downside of plain concrete is that it expands and contracts with change in temperature, shrinks on drying, leads to creeping action, and requires larger sections for carrying load. A new group of concrete that exhibit mainly improved strength & durability properties has recently developed. The Ultra High Performance Concrete (UHPC), also called as Reactive Powder Concrete. It is a high strength, ductile material formulated by combining Portland cement, silica fume, fine sand, Quartz, super plasticizer, steel fibres & water. The aim of this research is to provide a thorough characterization of the UHPC material properties. Various tests like compressive test, split tensile test & durability test have been elaborated in the project for different composition & also comparison between plain concrete and UHPC of different mixes has been discussed with conclusion. Read More...
|
Civil Engineering |
India |
52-57 |
15 |
Utilization of Marble and Granite Slurry in Clay Bricks
-Mr. Om Prakash Singh ; Dr. Shailesh Chaudhary
Stone industries of Rajasthan spread across all its districts forms the backbone of its economy. The increasing popularity of the marbles of Rajasthan, growing demand for finished and unfinished products, discovery of new marble deposits have led to a significant growth in marble industry of this State. This leads to simultaneous rise in waste generation causing concern towards the deteriorating environmental quality. A wide spread need is being felt to make This industry environmentally sustainable. It proposes the use of waste marble and granite slurry in clay bricks. In this report, investigation will be carried out to use such clay brick in compression strength, density and water absorption. And the problem of waste stone slurry would be solved drastically by use of marble and granite waste in the clay brick as brick is the most widely used construction material at present. Read More...
|
Civil Engineering |
India |
58-60 |
16 |
A Survey on Secret Sharing by Visual Cryptography
-Bhaskar Marapelli
At the point when contrasted and the customary cryptography, the visual cryptography unscrambles mystery images alluding to the qualities of human vision, instead of the cryptography learning or complex calculations. Moreover, seeing to the freeness of the mystery key, the entire procedure of encryption and also decryption for the visual cryptography meets a quick managing course. With regards to the security concern, it ensure that nobody can approach any pieces of information about the substance of a mystery image from singular cover images. In this way, inferable from the investigations on this field, the objective of light-weighted cryptography is come to. Presently the visual cryptography has been produced from the aimless shadows to the significant ones. Watching the much created system, some progressed visual cryptography methods are presented in this overview, individually. Read More...
|
Computer Science and Engineering |
India |
61-65 |
17 |
A Review Paper on Automatic (Intelligent) Braking System with Gas Sensor and Alcohol Detector
-Aniruddha Deshmukh ; Sagar Lande; Mahesh Mahale; Amit Korde; Pravin Darade
Road accidents are a commonplace in today's scenario. Accident prevention has been one of the leading areas of research. Our project is designed to prevent accidents due to loss of control, drunken driving, and rash driving. Using circuitry aided by a microcontroller kit to provide a real time monitoring system. In our work, braking distance and the distance of the obstacle are taken into consideration along with the speed of the vehicle to provide the basis for calculation. The microcontroller kit is powered with a microcontroller 16PI and programmed to calculate the braking distance and take actions accordingly. The Hall sensor helps in finding the speed of movement of the vehicle and the ultrasonic sensor senses the distance of the object in front. These sensors provide real- time inputs to the microcontroller program. Using a Hall sensor the system will sense the speed of the vehicle and with the microcontroller, it will calculate the braking distance: that is the distance required to bring the vehicle to a complete stop for that speed. Braking motors is incorporated to activate the brakes thereby achieving automatic braking procedures. The system helps in conjunction with the driver judgment if the driver doesn’t sense the obstacle and applies the brake at the right time then the microcontroller initiates braking motor to apply the brakes automatically. Our future work deals with incorporating real time brake shoe wear system to provide enhanced feature for the intelligent braking system. Our Intelligent Safety concept car provides a glimpse into the future of automotive safety, and how much more advanced these individual systems can be for avoiding accidents and protecting vehicle occupants when they are integrated into one system. The future of automotive safety is more than just developing new technology; it is shifting the approach to safety. By looking at safety in terms of avoiding accidents in the first place – and then protecting occupants when a crash is unavoidable – we can prevent more accidents, save more lives, and reduce insurance and medical costs to society. Read More...
|
Mechanical Engineering |
India |
66-68 |
18 |
Fuzzy Keyword Search over Data in Cloud Computing
-Saharsh Gera ; Shreya Kapoor
Cloud computing is on-demanding delivery of computing power, databases storage, application, & other IT resources by the use of cloud services platforms via the internet with pay as you go pricing. Cloud computing provided a simple and easy way to accessing servers, storages, database & a broad set of application services over the Internet / network. A fuzzy search is the process of locating Web pages that're likely to be relevant to a searching arguments even when the arguments doesn’t exactly similar to the desired information. A fuzzy keyword search is done by the means of a fuzzy matching algorithms, which return a list of result based on similar words even though search argument words and spellings may not exactly similar. Exactly and highly relevant matches are appears on the top of the list. A fuzzy keyword search matching program can operates like a spelling checker and spelling-error correctors. For example, if the user types "Misissippi" into Google, a list of hit is returnes along with the questions like, "Did you mean Mississippi?" Alternative spelling, & words that sounds the same but spelled differently, are given. A fuzzy keyword matching programs can compensate for a common input typing errors, as well as errors introduce by optical characters recognition scans of printed document. This program can returns hits with contents that contains a specified based words along with the prefix and suffix. For example, if "planet" is enter as a searching word, hit occur for site contains words such as "protoplanet" or "planetary." This program can also used to find synonyms & related terms, it working as an on-line thesaurus or encyclopaedic cross-references tools. In the Ask Jeevs searching engines, if the word 'galaxy' is entered, hit are returned such as "Galaxy Photography","Milky Way" and "The 9 Planet Solar System". Fuzzy searching can also be used to locate individuals based on incomplete or partially inaccurate identifying information.[1]. Read More...
|
Information Technology |
India |
69-71 |
19 |
Microcontroller Based LPG Gas Detector and Monitoring System
-Abhay A. Gase ; Bhavika Mesare; Shubham Datir; Dushyant Mankar
Gas leaks represent the cause of many accidents both in the industry sector and domestic environments. Due to the deployment of complex supervisory control and data acquisition systems, accident rates have decreased in the industry sector but they are still high in domestic environments. Here, we propose a gas leak detection system based on redundant sensing units and investigate ways of integrating it in the distributor's system. We also look at some off-the-shelf gas leak detection devices for home usage and present results of the study made on them. The performance of each studied device is analyzed in comparison to our solution. Results of this analysis show that the proposed implementation is suitable for a more reliable detection of gas leaks. Read More...
|
Electronics & Communication Engineering |
India |
72-74 |
20 |
Networking of Pressures and Temperatures using IOT for Industrial Applications
-Sourav Khawas ; Sourav Khawas; Dr. ASR Murty; S. Pavan Aakarsh
Pressure and Temperature play important role in heat engines and machines. In a constant volume or known volume changes of these two parameters and their knowledge can lead to many important decisions. High rise in temperature or pressure either directly noted or indirectly obtained through extrapolations and calculations can help in maintenance activity to even intercept and avert accidents. Temperature and Pressure in real time can be simultaneously monitored by resorting to IoT. Using sensors and Arduino mother board we monitor these parameters in this work. Decisions related to maintenance or calculations therefore (around Temperature, Pressure and Volumes known) can be improved to higher precision and accuracy by this technique. Thermodynamic cycle related experiments for example can use this network method if the sensors can be installed in the work volume. Only ranges of the sensors have to be carefully kept in mind at design stage. Also their time to time calibration has to be duly taken care. Read More...
|
Electronics & Communication Engineering |
India |
75-80 |
21 |
Extraction and Analysis of WhatsApp Database
-Anish Dassi ; Viola Gupta; Mr. Varun Goel
This paper seems to explore the safety and security of our WhatsApp, with over 1.4 Billon people using WhatsApp to stay connected with each other, we try to look at how secure WhatsApp really is along with how you can take some extra steps to ensure the safety of your data. WhatsApp stores conversations of the user in database files as a backup in the internal storage of the mobile device. Security experts at WhatsApp implemented AES, using which the stored backup files prevented or restricted unauthorized access. Using the results discussed in this paper, any person will be able to reconstruct the list of contacts and the chronology of the messages that have been exchanged by users. Furthermore, thanks to the multiple research papers, studies and forum that helped me complete this. Read More...
|
Information Technology |
India |
81-83 |
22 |
Detection of Selective Forwarding Attacks in Wireless Sensor Networks using Channel-Aware Adaptive Detection Threshold
-J. Jayabharathi ; Dr. R. Saminathan; Dr. G. Ramachandran
Wireless Sensor Network (WSN) are vulnerable to selective forwarding attacks that can maliciously drop a subset of packets for degrading network performance and endanger the information security. Meanwhile,due unstable to wireless channel in WSN the packet loss rate during the communication of sensor nodes may be high and varying from time to time. In this paper Channel-aware Reputation System with Adaptive Detection Threshold in Wireless Sensor Networks (CADT) to detect selective forwarding attacks is proposed. The CADT evaluates the data forwarding behaviors of the sensor nodes, according to the deviation from monitored packet loss and estimated normal loss. To optimize the detection accuracy of CADT, the optimal threshold for forwarding evaluation is adaptive to time varied channel condition and the estimated attack probabilities of compromised nodes. Furthermore an attack-tolerant data forwarding scheme is developed to collaborate with CADT for stimulating the forwarding cooperation of compromised nodes and improving the data delivery ratio of the network. Extensive simulation results demonstrate that CADT can accurately detect the selective forwarding attacks and identify the compromised sensor nodes, while the attack-tolerant data forwarding scheme can significantly improve the data delivery ratio of the network. Read More...
|
Computer Science and Engineering |
India |
84-89 |
23 |
Stabilization of Black Cotton Soil by using Bio-Enzyme
-Kajal V. Sinha ; Anushree S. Borkar; Supriya D. Waghmare; Kajal C. Pachdhare
A large part of central India and south India are covered with black cotton soil such soil need to improved. The conventional methods are time consuming are not economically feasible. Hence there is need to discover the other possible ways to satisfy the performance as well as economical criteria. The stabilization soil with bio-enzymes is a revolutionary technique which is environment friendly, cost effective and convenient to use. There are many bio enzymes available for soil stabilization such as DZ-1X, Renolith, perma-zyme, terra-zyme and fujibeton. Bio-enzyme improves CBR value of soil. Increases strength of soil and decreases free swell index and cracks formation. It is economical and also reduces the pavement thickness. Bio-enzymes are largely use for stabilization of soil of roads. The present study deals with the effect of DZ-1X, a bio-enzyme on shear strength and CBR value of expansive soil. Their efficiency depends upon the amount of dose type of soil available and field conditions. The use of bio-enzyme in soil stabilization is not very popular due to lack of awareness between engineers and non-availability of standardized data. Read More...
|
Civil Engineering |
India |
90-92 |
24 |
Parent's Attitude towards Elementary Education: A study of Educational Zone Aishmuqam, Anantnag
-Masroora Akhter ; Prof. P. P Goswani; Dr. Tanveer Ahmad Bhat
The present study is aimed at assessing attitude of parents towards the education and schooling of their children. The study analyzes the data from parents, who have one or more than one school going children. Out of these, 60 parents, 43 belong to literate parents and 17 belong to illiterate parents from Educational zone Aishmuqam, Anantnag Kashmir. In the present study, Parent Involvement Scale (PIS) developed by Dr. R. Chopra and Dr. S. Sahoo was administered on sample participants. The respondents were required to indicate their agreement or disagreement with each of the statements about their attitude towards children's education on a three-point scale. The findings of the study reveal that 7%, 79%, 14% of literate parents showed High, Average, and Low attitude respectively towards the Elementary Education of their children. In case of illiterate parents, their attitude towards the Elementary Education of their children is (12%) (41%) and (47%) showed, High, Average, and Low attitude respectively. Read More...
|
Education |
India |
93-95 |
25 |
An Experimental Study on Flexural Behaviour of Geopolymer Concrete Beams
-A. Lakshmi Priya ; K. Shalini; C. Sreenivasulu; J. Guru Jawahar; K. Narasimhulu
Geopolymer binders have been proved to be green building materials that can totally replace OPC by an alkaline reaction between silica and alumina are presented in source material. This paper mainly focused on the Flexural behaviour of geopolymer concrete beams with partial replacement of silica sand as natural sand at different proportions like 100:0, 90:10, 80:20, and 70:30 (natural sand: silica sand). The grade of conventional concrete was made as M40, which is equivalent to grade of geopolymer concrete. The beams were cured for 28 days at ambient room temperature and tested for two point loading. The parameters under flexural behaviour like First crack load, Ultimate load, service load, yield load, Ultimate deflection, bending stresses, Load deflection characteristics, Moment characteristics are presented. The study has given a final conclusion that at 20% replacement level of silica sand as natural sand gives better results at 8M. By increasing the replacement level decreasing the strength, hence the silica sand used as a filler material for well graded geopolymer concrete which is more sustainable. Read More...
|
Civil Engineering |
India |
96-99 |
26 |
Go Safe: Android Application for Accident Detection and Notification
-Isha Madhukar Khot ; Madhura Sanjay Jadhav; Abhijeet Jyotiram Desai; Vaibhav Bangar; Prof. Vidya Patil
With the rapid development of society, there are some side effects including the increasing number of car accidents. On average one out of every three motor vehicle accidents results in some type of injury. Traffic accidents are one of the leading causes of fatalities in most of the countries. As number of vehicle increases mean while the accident also increases. The government has taken number of actions and so many awareness program also contacted even though the accident increases as population increases. The Propose system can detect accident automatically using accelerometer sensors and notify all the nearest app user and emergency points. (Police station, Hospital). Read More...
|
Computer Engineering |
India |
100-102 |
27 |
Nuisance Monitoring System
-Soumya Khandelwal ; Rikesh Kumar; Shalini Raghuvanshi; Shubham Dharpale Patil
Noise pollution is a common problem in urban environments that has been shown to affect people's health and children's cognition caused by vehicular traffic, Festival celebration, loudspeakers etc. In the last decade, several studies have been conducted to assess this noise, by measuring the equivalent noise pressure level to acquire an accurate sound map using wireless networks with acoustic sensors. Environmental noise monitoring systems continuously measure sound levels without assigning these measurements to different noise sources in the acoustic scenes, therefore incapable of identifying the main noise source. The goal is to evaluate the hardware limitations of a low-cost wireless acoustic sensor network. The sensor is based on an inexpensive credit-card sized single-board computer with a microphone and associated electronics and wireless connectivity. The measurement results and source information are send from the sensors scattered around the measurement site to a storage service and a noise portal is used to visualize the data to users. A conveniently study has been done on this concept in which an acoustic pattern classification algorithm is working in a wireless sensor network is used to automatically assign the measured sound level to different noise sources. This noise monitoring system can reduce the amount of required human effort for validation of the sound level data when the target noise source is known. Read More...
|
Internet of things (IoT) |
India |
103-105 |
28 |
Design and Fabrication of Gearless Power Transmission in Any Angular Position
-Mukesh Bhaulal Chouhan ; Ankit D. Tiwari; Roshan S. Varma; Vinay R. Lanjewar; Virendra D. Gobade
The modern gear drives has been widely applied due to excellent accuracy and reliability. However, the major downside of even the most efficient gear drive is the low efficiency due to errors like backlash and considerable vibrations. These vibrations engender noisy operation and cause more wear and tear resulting in low life span. The development of a more efficient multi-angular gearless drive has been explored relatively unsuccessfully and negligently regardless of its advantages over both gear drives and simple gearless drives. Recent advances in technologies, material, analytical modeling and simulation capabilities has opened the possibility of major advances towards the design and development of a reliable, cost effective and ultra-efficient multi-angular gearless drive. Read More...
|
Mechanical Engineering |
India |
106-108 |
29 |
Modern Warfare Use of EMP Bomb and Bio-Weapon in UAV
-Sukhjeet Singh Sandhu ; Pranav Bansode
The modern warfare lead to optimization and autoschediasm in the field of weaponry by electronization. New age prognosticates this as electronic and biological warfare. Modern weapons in hands of chaotic organizations is one of the major reasons of unethical deaths of military infantry. Terror invasions have gone worse in recent times. The traditional methods have not yield expected results. To control and restrain the situation, use of EMPs (Electromagnetic Pulse) bomb and Bioweapon would be a big breakthrough. These weapons can be mount on high altitude and artificially intelligent drone which will yield beneficial results. These drones can be remotely or automatically controlled. Thus, use of Bioweapon and EMPs in Indian defense system could save a large number of military infantry casualties, with provision of good head start and slowing down the enemy unit by killing their electronic and electrical units. This will lead to escalation in Indian Defense system. Read More...
|
Mechanical Engineering |
India |
109-111 |
30 |
A Smart Helmet for Hazardous Event Detection for the Mining Industry
-Kowshika V ; Ramesh A; Kiruthika R; Mahalakshmi L
The main object of this paper is to design a smart helmet for coal miners using zigbee technology. This project utilizes zigbee and sensor technology and upload data to the cloud and notification is given to the user by e-mail and miner gets led alert. To monitor the surrounding sensors like infrared, humidity, sound and gas sensors are used and it is interfaced to arduino Uno. These sensors will observe the change in environment and this data is transmitted to raspberry pi. The passed information is uploaded in Thingspeak. Read More...
|
Electronics & Communication Engineering |
India |
112-114 |
31 |
Performance and Emission Characteristics on Diesel Engine with Biodiesel Blend using Ballnutt Oil
-J Natarajan ; R. Murasolimaran; K. R. Sukumar
Due to the increasing demand for fossil fuel and more liberation of pollutants in environment, a number of renewable sources of energy have been studied worldwide. Non-edible oil contains several unsaponifiable and toxic components, which make them unsuitable for human consumption. An attempt is made to assess the suitability of vegetable oil for diesel engine operation, without any modification in its existing construction. Biodiesel is a clean and renewable fuel which is considered to be best substitution for diesel fuel. In order to achieve this, Biodiesel was prepared from the non-edible oil of ball nut by transesterification of the oil with methanol in the presence of NaOH as catalyst. The important fuel properties of biodiesel produced from ballnut oil, like viscocity, flash point, fire point, calorific value and emission should be found out to compare with the properties of Indian standard biodiesel for its use. Read More...
|
mechanical engineering |
India |
115-119 |
32 |
Comparison of Priority based Energy Efficient Algorithms for Residual Energy Path Selection
-Nirali Shaileshbhai Patel ; Shah Pooja K.
MANET in which mobile nodes gently connected without any centralized base station of network. For transmitting data from one node to another node routing protocol used.one of the main challenge in MANET is link breaks between the routes due to energy of nodes having limited battery. Using AODV routing protocol in MANET we select maximum energy path based on threshold. In proposed work how to priority based next path is select based on energy if link or node fail some reasons so reduce link failure. Read More...
|
M.E COMPUTER SCIENCE |
India |
120-122 |
33 |
Cooling Load Calculation for an Auditorium
-Deepanshu Prasad
This research with the cooling load calculation for an Auditorium, commercial complex, etc., using central air conditioning system which includes the study of auditorium layout, determination of cooling load, and distribution of cool air. The auditorium requires a conditioned air of certain quality. The cooling load calculation will be done by considering the ambient temperature as 32 °C which is temperature encountered in the winter season in this local area. The compressor capacity will be found after determination of cooling load required. Read More...
|
Mechanical Engineering |
India |
123-125 |
34 |
Searching Trajectories for Trip Planning
-Prajakta Jadhav ; Miss.Sanjivani Gite; Miss. Shweta Nikam; Miss. Ashwini Bharambe
As Social media is widespread for rating system presently days users update share or tag photos throughout their visits. The geographical info set by good phone bridges the gap between physical and digital worlds. Location info functions as results of the affiliation between user’s physical behaviors and virtual social networks structured by the good phone or web services user provides ratings there to put and this place becomes famous the help of rating prediction and user is utilized social media for rating. Presently a day’s social media becomes widespread. We have a tendency to tend to project these social networks involving geographical data as location-based social networks (LBSNs). Such data brings opportunities and challenges for recommender systems to resolve the cold begin, exiguity disadvantage of datasets and rating prediction. With the increasing accessibility of moving-object following data, flight search is a lot of and a lot of vital. We have a tendency to tend to propose and investigate an awfully distinctive question kind named flight search by regions of interest (TSR query). It’s helpful for trip coming up with mistreatment rating and recommendation. We have a tendency to develop this technique for famous or advertising location mistreatment TSR queries to tackle these challenges, a series of recent metrics are printed to model spatial-density correlations. Associate economical flight search formula is developed that exploits higher and lower bounds to prune the search house that adopts a query-source selection strategy, still as integrates a heuristic search strategy supported priority ranking to schedule multiple question sources. Rating and Review of places introduced here, First of all user visited to famous places afterward user provides rating and reviews of these places or it sends notification to friend or person. Read More...
|
Computer Engineering |
India |
126-129 |
35 |
MHR-Tree Based Spatial Approximate String Search
-Miss. Ashvini Shankarrao Shingare ; Miss. Ashvini Shingare; Miss. Nitu Pariyal
Keyword search in a large amount of data is very essential factor in data mining. This project focuses on keyword search, called as spatial approximate string search (SASS).A main limitation of the approximate search is that it only supports exact keyword search in a large amount of data. Keyword search for retrieving estimated string matches is required. Since, exact match is a special case of approximate string match, it is clear that keyword search by approximate string matches has a much larger pool of applications. In this work, we focus on range queries and name such queries as Spatial Approximate String (SAS) queries. (i.e. ESAS, RSAS). We have to efficiently find that string in the collection that is similar to a query string. Such type of query is called an "approximate string search". Read More...
|
Computer Science and Engineering |
India |
130-133 |
36 |
War Field Spying Robot with Wireless Camera and Bomb Diffusion
-Miss. Tejaswini Prakash Khairnar ; Miss Trupti Jagadish Pawar; Miss Himani Dagadu Suryawanshi; Miss Rupali Vijay Bagale; Prof. Pankaj R. Patil
The aim of this venture is to lessen human casualties in fear based oppressor assault, for example, 26/11. So this issue can be overwhelmed by outlining the RF based covert operative robot which includes remote camera, So that from this it will be anything but difficult to look at rivals when it required. This robot can unobtrusively go into foe territory and sends us the data by means of remote camera. The development of this robot is remotely controlled by a hand held RF transmitter to send charges to the RF beneficiary mounted on the moving robot. Since human life is constantly significant, these robots are the substitution of officers in war regions. This government operative robot can likewise be utilized as a part of star lodgings, shopping centers, adornments demonstrate rooms, and so on where there can be danger from gatecrashers or fear based oppressors. At the season of war where it can be utilized to gather data from the foe landscape and screen that data at a far secure zone, and securely devise an arrangement for the counter assault, Tracking areas of psychological militant associations and afterward design assault at reasonable time. Making a reconnaissance of any catastrophe influenced zone where individuals can't go. Read More...
|
Electrical Engineering |
India |
134-136 |
37 |
Waste to Useful: A Business Strategic View of Crumb Rubber and Beach Sandal Manufacturing
-Abraham Cyril Issac ; Tina Susan Thomas
This paper presents qualitative research that investigates the feasibility and prospects of crumb rubber and beach sandal manufacturing. Further it deals on with detailed financial analysis for the setup of the crumb rubber and beach sandal manufacturing by thoroughly addressing the demand of the same. Rubber in its commercial form is obtained from latex by a set of processes. Havea latex in the latex vessel of the tapped trees contains 30-40% rubber in the form of particles. Latex is a hydrosol in which the dispersed particles are protected by a complex film. The grading of synthetic rubber is done by technical specification. Technically specified rubbers are largely block types made by adopting new methods of processing which include size reduction, de-watering, dirt removal, drying, baling and grading. The detailed financial analysis shows that the plan will make a profit of around Rs.148 lacs in a year and the break-even will be achieved in one year. Read More...
|
Management science |
India |
137-142 |
38 |
CMOS Design and Analysis of Receiver System in Satellite Communication using 180 nm technology
-Vishnu V ; Santhosh Kumar. M; Magesh Kumar. S
This project describes the complete design of a low-cost 14 GHz Receiver front-end in 180 nm technology. It covers the topics of a system plan, designs of building blocks, designs of application-boards and real environment tests. A homodyne architecture with a 500 MHz IF. The design of a LNA in Radio Frequency (RF) circuit requires the trade-off in many importance characteristics such as gain, Noise Figure (NF), stability, power consumption and complexity. Expressions developed will help circuit and system designers to come to an optimum power consumption versus performance trade-off. An RF receiver front-end Receiver systems is designed. The receiver occupies only 0.35 mm2 in a 0.18 μm CMOS process, consists of a low-noise amplifier, downconverter and a low pass filter. The measured receiver gain is 21 dB, Noise Figure is less than 5 dB, input IIP3 is -5 dBm and the receiver consumes 19.5 mW from a 1.8V supply. The receiver covers all the bands from 13 GHz to 15 GHz. Read More...
|
VLSI |
India |
143-144 |
39 |
Multi-Classification of Satellite Images
-Shivan Nawal
Every minute, the world loses an area of forest the size of 48 football fields. And deforestation in the Amazon Basin accounts for the largest share, contributing to reduced biodiversity, habitat loss, climate change, and other devastating effects. But better data about the location of deforestation and human encroachment on forests can help governments and local stakeholders respond more quickly and effectively. Convolution layers are used to extract the features from input training samples. Each convolution layer has a set of filters that helps in feature extraction. In general, as the depth of CNN model increases, complexity of features learnt by convolution layers increases. For example, first convolution layer captures simple features while the last convolution layer captures complex features of training samples. Another name for feed forward networks like these are Shift Invariant or Space Invariant Artificial Neural Networks (SIANN), as their architecture is mainly based on their weight sharing attribute and transient architecture. With upcoming Deep Learning techniques every year, the field of computer vision research has been advancing at a fast pace resulting in building robust models that have been created benchmarks on a world scale. Read More...
|
Information Technology |
India |
145-147 |
40 |
fabrication of reverse gear system in two wheeler
-Nitesh R. Maraskolhe ; Dukeshwar R. Padoti; Laxman S. Pandhare; Ratnadip N. Meshram; Arvind P. Petkar
In fast growing modern world many types of vehicles are being innovated. But until now it is a major problem for the physically challenged peoples to move back the vehicles and to "U" turn the vehicles. Even to a small distance they cannot move the vehicles backside. So To eliminate this problem we invent the reverse gear mechanism in two wheeler. The challenged peoples can easily reverse the vehicles without getting down from the vehicle by easily operating hand lever. The project title is "REVERSE GEAR MECHANISM IN TWO WHEELER FOR PHYSICALLY CHALLENGED PEOPLE". The main objective of our project is to facilitate 'comfort ability and safety' to the challenged peoples. This project requires the motor vehicle, lever, reverse gear box, v-belt, sprocket and other necessary parts. When need to reverse the vehicles they can engage the hand lever for reverse gear, the vehicle moves backwards. This project will be more useful for the challenged peoples in the society. Read More...
|
Mechanical Engineering |
India |
148-153 |
41 |
An Implementation & Utilization of Solar Water Heater by using Boiler Waste Heat Recovery Method
-P. L. Navaneethakrishnan ; Bibin P Mathew; Naveenprasanth M; Muhammed Mashood T; Balamurugan K
Presently peoples are need to hot water for domestic and commercial purpose. Solar energy is the main alternative to replace the conventional energy sources. There are different types of solar water collector system available in the commercial market to fulfil the customer's demand, such as flat plate collector, concentrating collector, evacuated tube collector and integrated collector storage. Which combination of solar collector for heating the water system with heat exchanger to recovery the boiler waste heat. The more waste heat are available in environment such as house hold Refrigerator, IC Engines etc. So the boiler Waste heat recovery system is the best way to recover the waste heat and saving the fuel. The recovery and utilization of waste heat not only conserves fuel but also reduces the amount of waste heat and exhaust gas emission to the environment. So it will be control the global warming and energy crises. This paper concentrated to the no delay of energy saving process and improving performance efficiently. This waste heat converted in to use full energy and also reduce the environmental pollution. The boiler waste heat will transfer to heat exchanger and combined to solar water collector for heat the cold water into hot water. Therefore it is energy saving and economically based system. Read More...
|
Solar Energy |
India |
154-156 |
42 |
Survey for Surviving Network in Enterprise
-Mr. Gaurav Kumar ; Shreya Singh; Shreya Singhania
As indicated by survey, Network, and Security administrators everywhere throughout the world are beginning to feel the impacts of burnout. This survival guide plans to help security experts to adjust the duties and prerequisites of their part to stay away from pressure and burnout. Security experts are undertaking ever-more extensive duties in an increasingly requesting condition. To limit the danger of burnout, security experts must comprehend the most recent specialized, legitimate, and business patterns and their suggestions, and they have to understand pressure and how it can be manage. Eventually, making progress and satisfaction in the profession for any enterprise relies on meeting least measures, defining objectives for profession and achieving certification, utilizing the advantages of the security group, and clinging to a code of expert morals. Read More...
|
Information Technology |
India |
157-159 |
43 |
The Performance and Emission Characteristics of a Diesel Engine Fueled with Neat Biodiesel
-S. Aruljothi ; P. Ashok Kumar; A. R Mahesh Kumar; M. Sakthivel
Due to increasing the demand for fossil fuels and more liberation of pollutants in environment, a number of renewable sources of energy have been studied worldwide. Non edible oil contains several unsaponifiable and toxic components, which make them unsuitable for human consumption. An attempt is made to assess the suitability of vegetable oil for diesel engine operation, without any modifications in its existing construction. Biodiesel is a clean and renewable fuel which is considered to be the best substitution for diesel fuels. In order to achieve this, biodiesel was prepared from the non-edible oil of Mahua oil by transesterification of the crude oil with methanol in the presence of NaOH as catalyst, and adding nano particles (TiO2, Al2O3). The important fuel properties of methyl esters of biodiesel produced from Mahua oil, like viscosity, flash point, fire point, calorific value etc., should be found out to compare with the properties of Indian standard biodiesel for its use. Read More...
|
Mechanical Engineering |
India |
160-162 |
44 |
Agriculture Manure Spreader for Natural Farming
-M. Jayamoorthy ; P. Jayabharath; A. S. Antony Pravin Raj
India is agricultural based country. Our economy is also depends on agricultural related product. In the recent days it has been found that farmers are unable to grain more crop production by use of conventional agricultural methods. This project is based on manually spreading the solid manure by using the manure spreader. A method is generated to spread the soiled manure over a fallow land by dropping the fertilizer over the spreader disc. It is a trolley based system of manure spreader. Read More...
|
mechanical engineering |
India |
163-165 |
45 |
Literature Survey on CDA Generation and Integration on Cloud
-Puja M. Bhendarkar ; Minakshi D. Padmagiriwar; Shubham Ratne; Akshay Tembre; Nitinkumar Chaudhary
Successful deployment of Electronic Health Record helps improve patient safety and quality of care, but it has the prerequisite of interoperability between Health Information Exchange at different hospitals. The Clinical Document Architecture (CDA) developed by HL7 is a center report standard to guarantee such interoperability, and engendering of this record design is basic for interoperability. Unfortunately, hospitals are reluctant to adopt interoperable HIS due to its deployment cost except for in a handful countries. An issue emerges notwithstanding when more doctor's facilities begin utilizing the CDA report arrange in light of the fact that the information scattered in various archives are difficult to oversee. In this paper, we describe our CDA document generation and integration Open API service based on cloud computing, through which doctor's facilities are empowered to helpfully create CDA reports without purchasing exclusive programming Our CDA report joining structure arranges diverse CDA records per calm into a lone CDA chronicle and specialists and patients can examine the clinical data in successive demand.. Our system of CDA document generation and integration is based on cloud computing and the service is offered in Open API. Designers utilizing distinctive stages along these lines can utilize our framework to upgrade interoperability. Read More...
|
Information Technology |
India |
166-168 |
46 |
Airline Delay Prediction
-Neha Jain ; Poornima Harjai; Ms Narinder Kaur
The project deals with airline delay problem. The airport delay can be understood by delay distribution of airport. The assessment of an airport’s schedule performance is also discussed. Various factors that lead to flight delay are analyzed with the help of functions and graphs. The outcomes conclude the dependence of originate and arrival delay. The airport arrival delay is found to show monthly and weekly patterns, which is related to the schedule performance. Read More...
|
Information Technology |
India |
169-170 |
47 |
Digit Recognition using Optical Flow Approach
-Mayank Sandilya ; Vishal Gupta
In this study, a new model to the problem of video action recognition has been proposed. The model is based on temporal video representation for automatic annotation of videos. Video action recognition is a field of multimedia research enabling us to recognize the actions from a number of observations, where representation of temporal information becomes important. Visual, audio and textual features are important sources for representation. Although textual and audio features provide high level semantics, retrieval performance using these features highly depends on the availability and richness of the resources. Visual features such as edges, corners, interest points etc. are used for forming a more complicated feature, namely, optical flow. For developing methods to cope with video action recognition, we need temporally represented video information. For this reason, we propose a new temporal segment representation to formalize the video scenes as temporal information. The representation is fundamentally based on the optical flow vectors calculated for the frequently selected frames of the video scene. Weighted frame velocity concept is put forward for a whole video scene together with the set of optical flow vectors. The combined representation is used in the action based video segment classification. Proposed method is applied to significant data sets and the results are analyzed by comparing to the state- of-the art methods. Read More...
|
Computer Science and Information Technology |
India |
171-173 |
48 |
Rising Innovations and Exploration Difficulties for 5G Remote Systems
-Deepa. B ; Naeem. Naik; Deepa. Patil
As the take-up of Long haul Advancement (LTE)/4G cell quickens, there is expanding enthusiasm for innovations that will characterize the people to come (5G) media transmission standard. This paper recognizes a few rising advancements which will change and characterize the future ages of media transmission norms. Some of these innovations are as of now advancing into principles, for example, 3GPP LTE, while others are still being developed. Also, we will take a gander at a portion of the exploration issues that these new advances posture. Read More...
|
Computer Science and Engineering |
India |
177-179 |
49 |
Improved Search for Fraud and Malware Detection in Google Play
-Dhanashree Chumbhale ; Priyanka Kathe; Supriya Dilip Kale; Harshali Sunil Patil
Fraudulent behaviors in Google Play, the foremost widespread automaton app market, fuel search rank abuse and malware proliferation. To spot malware, previous work has centered on app viable and permission analysis. During this paper, we have a tendency to introduce FairPlay, a unique system that discovers and leverages traces left behind by fraudsters, to discover each malware and apps subjected to search rank fraud. FairPlay correlates review activities and unambiguously combines detected review relations with linguistic and behavioral signals gleaned from Google Play app information so as to identify suspicious apps. FairPlay achieves over 95th accuracy in classifying gold customary datasets of malware, dishonest and. We go for broad read by applying some technique to each application to gauge its ranking. In this paper we discovered ranking fraud for mobile applications, we develop a necessity to create a perfect, fraud less and result that shows corrected application accordingly offer ranking; wherever we tend to truly create it happen by looking out fraud of applications. They create fraud by downloading application through numerous devices and provide fraud ratings and reviews. So, as we tend to aforesaid on top of here we've got to mine crucial information relating specific application like review that we tend to aforesaid comments and conjointly such a lot of alternative data we've got to mine and place rule to find fakeness in application rank. Read More...
|
Computer Engineering |
India |
180-181 |
50 |
Comparative Study of Foundation of Suspension Tower with Square and Rectangular Base
-Popat Akash Maheshbhai ; Paresh G. Patel
Foundation of transmission tower plays very important role for safety and better performance of tower as it transmits loads of the transmission system to earth. This paper presents the comparative study of the isolated foundation of the self supported suspension type transmission tower for square and rectangular base for different soil conditions. Foundation of suspension tower has been designed for five different base width of tower by changing the ratio of longitudinal face and transverse face LF:TF = 1:1, 1:1.1, 1:1.2, 1:1.3, 1:1.4. Five types of soil conditions were used. From the comparison, it was concluded for every type of soil condition the minimum cost of foundation was for base width ratio LF:TF = 1:1.3 to 1:1.4. Read More...
|
Structural Engineering |
India |
182-185 |