No. |
Title and Author |
Area |
Country |
Page |
151 |
Electromagnetic Energy Harvester on Overhead Power Distribution Lines for Atmospheric Sensors
-Snehal Gangadhar Waghmare ; Mitkari Shubhangi Parappa; Zurule Omprakash S; Gawade Anjali M
In this paper we present a small, credit-card sized, and low-cost electromagnetic energy harvester that couples energy from one conductor of an overhead power distribution line. We use a rectangular coil, placed near the power line without encircling it, to extract electrical power from the time-varying magnetic ï¬eld. The addition of a U- shaped electrical steel sheet (a high-permeability material typically used in transformers) near the coil signiï¬cantly increases the magnetic flux through the coil and consequently raises the output power. Experiments have shown that the harvester with an optimal load resistance obtains 230 mW (AC) when the power-line conductor current is 50 Arms. The energy harvester is able to power a wireless gas sensor board having a carbon monoxide and an ozone sensors at 10 Arms. In this paper, we describe the design, modeling, and experimental study of the electromagnetic energy harvester with an output power range between several milliwatts to hundreds of milliwatts from an ac current up to 50 Arms. We anticipate that the energy harvesters could be installed inexpensively on the overhead power distribution lines by a utility operator using a hot stick. Read More...
|
Electrical Engineering |
India |
567-569 |
152 |
An Experimental Investigation of Waste Plastic and Crushed Sand in Paver Block
-Pramod Raghunath Thorat ; Rushikesh Gosavi; Poonam Sutar; Kishori Gavane; Yogita Phadatare
Concrete paving blocks are ideal materials on the footpaths and roads for easy laying, better look and finish. Paver block has low cost maintenance and easily replace with a newer one at the time of breakage. So an attempt is made to study regard the properties of the paver block which is manufactured using waste plastic and crushed sand. Waste plastic used to replace cement in the production of pavement block. conventional M20 grade concrete paver block and paver block made of waste plastic and crushed sand of proportion waste plastic to crushed sand: 100:00, 90:10, 80:20,70:30 and 60:40 and tested for weight, water absorption, rebound hammer and compressive strength test. Paver block of proportion 100% plastic and 0% sand gives maximum compressive strength of 23 N/mm2 which is more than conventional M20 grade concrete paver block. Read More...
|
Civil Engineering |
India |
570-573 |
153 |
Students Academic Performance Analysis by using Apriori Technique
-Rekha Thakillapati ; G Ananthnath
Educational data mining (EDM) is a multi-disciplinary research area that examines statistical modeling, artificial intelligence and data mining with the data generated from an educational institution. In this mainly focus on prediction of student’s academic performance. Some statistical tools are also used for predicting student’s performance. In this paper we implemented Apriori and k-means clustering algorithm is use for predicting the student’s result. Apriori algorithm more efficient and less time over whelming for predicting the student results. The main objective of exploitation Apriori and k-means clustering algorithm is for predicting the students’ academic performance and also improving students’ academic performance. During this academic student performance is evaluated supported some attributes are selected which generate rules by suggests that of association rule. In this paper we used k-means algorithm for calculating the test anxiety (stress) and time management of the students at the time of examination. It will help to improve the student’s tutorial performance. Experiment is conducted usingWeka and real time knowledge set on the market within the college premises , collected from the students and the result which released by the university. Read More...
|
Software Engineering |
India |
574-578 |
154 |
Optimization and Characterization of Friction Stir Welding of AA7075 & Aa6082 Aluminium Alloy by using Response Surface Methodology
-Dinesh M ; Thilagham K.T; Sundararaj P
Frictional Stir Welding (FSW) is a technique employed to fuse two or more metal pieces in order to improve its properties. Depending on the tool rotational speed, Travel speed, tilt angle the properties of the jointed metals varies such as yield strength, tensile strength, fracture of position. This review paper provides an overview about the comparison of ultimate tensile strength (UTS) along with the tool rotational speed(A),travel speed(B) and the tit angle(C) applied in the Aluminium and its alloys AA7075 and AA6082.From that we get the optimized parameter by using Response Surface Method(RSM).Due to this and check the SEM analysis whether the fracture position is ductile or brittle mode and also evaluate the microstructure and macrostructure by using keller’s reagent. Read More...
|
M.E in Production Enginerring |
India |
579-582 |
155 |
An Enhanced R-R Load Balancing Algorithm for VM Scheduling in Cloud Computing Environment
-Y Geetha ; Dr. K Venkataramana
Cloud computing is the next generation of computation and comprises web-based tools and applications as opposed to a direct connection to a server. Cloud providers typically use a "pay-as-you-go" model, which can lead to unexpected operating expenses if administrators are not familiarized with cloud-pricing models. The availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of hardware virtualization, service-oriented architecture, and autonomic and utility computing has led to growth in cloud computing. It is a model that provides an on-demand network access to a shared pool of computing resources. It comprises a huge number of concepts primarily Load Balancing, Scheduling, etc. The number of users in cloud computing is growing in an exponential rate at every day. The number users access cloud server by sending enormous request for many application which lead to high load on cloud server. To reducing the heavy load on server, the virtual machines are allocated for resources based on priority. Allocating the resources on virtual machines based on priority achieves the better response time and processing time. The main aim of the system is to minimize the make span and to maximize the resource utilization and user satisfaction. Read More...
|
Master of Computer Application |
India |
583-588 |
156 |
MPLS_VPN Implementation in Corporate Environment
-Shradha Prakash Khandare ; S. J. Nandedkar
This paper gives us comprehensive performance analysis of MPLS enable network and IP enable network. It states the behaviour of MPLS protocol with OSPF protocol .We have analysis these two on basis of latency, utilization in the network with the help of graphical network simulator-3.We have used nine cisco Series 3745 router with IOS version 12.4 for testing network performance with MPLS and traditional IP routing. Results obtain in these testing shows how service provider can befit from MPLS services with increasing network latency and additional benefits obtain from MPLS. Read More...
|
Electronics and Telecommunication Engineering |
India |
589-594 |
157 |
A Survey on Gas Metal Arc Welding (GMAW)-Review
-Harender Kumar ; Neeraj Kumar; Manmohan
Welding is a system of immutable joining two materials (regularly metals) through restricted blend coming about due to a proper mix of temperature, weight and metallurgical conditions. Dependent upon the blend of temperature and weight from a high temperature with no weight to a high weight with low temperature, a wide extent of welding shapes has been made. There are various sorts of welding including Metal Arc, Submerged Arc, Resistance Butt, Flash, Spot, Seam and Projection. While there are various procedures for joining metals, welding is a champion among the most accommodating and quick systems 1available. The gas metal roundabout portion welding (GMAW) process uses a solid wire terminal that is constantly supported into the weld pool. The wire anode is eaten up and transforms into the filler metal. GMAW equipment is reasonably low in cost. The low beginning cost, the ability to weld continually, and the ability to store weld metal faster, settle on GMAW an appealing choice for welding. This section uncovers each part of GMAW. It includes all parts of GMAW, for example, welding machine, protecting gases, filler/terminal wire and welding joint get together of welding plates. V furrowed butt joint will be loaded up with 1.6 mm cathode wire ( ER 90 BL-3) utilizing ESAB AUTO K 400 welding machine. Example for different tests, for example, hardness, tractable, small scale structure, consideration and gas ingestion will be drawn from the butt welded joint according to particular. Read More...
|
M.TECH in MANUFACTURING TECHNOLOGY |
India |
595-600 |
158 |
Experimental Study on Effect of Length of Twisted Tape Insert on Performance of Double Pipe Heat Exchanger (DPHE)
-Rakesh ; Prof. Sanjay Kumar Singh
Heat transfer is the science that seeks to predict the energy transfer that may take place between material bodies or fluids as a result of a temperature difference. The heat transfer or heat exchange by the Heat Exchanger. The use of heat exchangers in Power plants, Chemical plants, Pharmaceutical, Agriculture products, cooling of electrical machines and electronic devices. Our discussion of heat exchangers will take the form of technical analysis; that is, the methods of predicting heat-exchanger performance. A particular application will dictate the rules which one must follow to obtain the best design commensurate with economic considerations, size, weight etc. In this respect, we limit our discussion to heat exchangers where the primary modes of heat transfer are conduction and convection. Double pipe heat exchanger having a relatively small diameter and it is easy to fabricate as compare to helical tube, corrugated , baffled tube and many more compact type of heat exchanger. In the present work experiment is carried out on double pipe heat exchanger in which hot water is flowing through inner tube where as cold water is flowing through the annulus and hot water to cold water heat exchange is taken into consideration. Read More...
|
THERMAL ENGINEERING |
India |
601-605 |
159 |
Effective Diagnostic System of Fetal Heart Disease Based on Cardiotocography using AdaBoost
-D. Rubiya Sweetlin ; Dr. I. Muthulakshmi
Fetal health is commonly surveilled by cardiotocography (CTG) monitor, which documents fetal heart rate (FHR) signal. The fetal health monitoring is very important to predict the growth of the fetal as well as improvement in its each stage. For yielding the status of the fetal more accurately, fetal heart rate (FHR) signal is the best well known source. From this gained information, embryo’s unhealthiness can be visualized and it provides a chance to take action before an irremediable harmness happening to the fetal. Previous work uses Naïve Bayes and SVM classifier, which was used in the olden days, to classify the CTG data, produced low accuracy. To improve the classification accuracy, the proposed work addresses Adaptive Boosting algorithm for classification of congenital heart disease in fetus. Fetal state is commonly grouped into normal and pathological class. The results of these classifiers are to be compared and the best classification technique is to be identified. Read More...
|
Computer Science and Engineering |
India |
606-609 |
160 |
Image Encryption and Decryption for Secure Internet
-Prof. S. R. Dhavle ; Shubhangi. P. Kale; Parwati. C. Kore; Ashwini. S. Nakod; Almas. S. Navidgi
In today’s era ubiquitous computing is worldwide adopted. Internet is the main root for providing a ubiquitous network for communication between different people across the world, such communications can be through a wireless channel or wired channel that helps in getting messages or confidential information exchanged between different groups of people. Data security is of utmost importance because of wireless communications on insecure network. So the concept of cryptography is emerged which is nothing but known as an art of writing a secret code and it provide diverse set of services for protecting data over network such as authentication, confidentiality, non-repudiation and integrity. Cryptography offers wide range of algorithms which can help to guard communications over an insecure network such as symmetric encryption techniques which uses one key for encryption and decryption. For a symmetric cipher security can be compromised as it uses a single key, with this an advantage comes out while using an asymmetric security technique that makes use of a pair of keys to secure communications over unsafe channels. In this paper the positive characteristics of both the techniques discussed above are taken and a hybrid approach is used to guard messages on timid wireless medium. AES which is known as symmetric algorithm is combined with ECDH algorithm that is asymmetric by nature and is an amalgam of ECC and Diffie-Hellman – anonymous key agreement protocol. Different text files are taken as input to the model with varying sizes. Encryption and decryption is performed using Advance encryption standard (AES) whereas ECDH will help in securing the communication for a session set up between client and server by generating key for AES. Also Diffie-Hellman will provide security by establishing a shared secret between client and server after successful key agreement. At last analysis of proposed model is done on the basis of different metrics like storage, encryption time, decryption time, correlation and avalanche effect. Proposed approach has been proven effective in reducing the gaps discovered in the present literature. Read More...
|
Computer Science and Engineering |
India |
610-613 |
161 |
Data Mining Approach for Children’s Frequent Medicine Item Set using FP Growth Algorithm
-Surekha Uppathi ; S. Anthony Mariya Kumari
Know-how mining is a redesigning innovation for studying extraction in countless fields like restorative, instructive, today s, and many others. Extricating a critical understanding from large database is most crucial component. Know-how extraction process were finished through numerous methods like component extraction, forecast, characterization, etc. for our examination investigations expectation of understanding digging helps a first-rate deal for attending to useful knowledge. In this paper we targeting road site visitors dataset and we utilized fluffy expertise extraction for participation work by using FCM. For the understanding extraction method right here we actualized the connection and coefficient calculation for avenue visitors dataset and property decrease had been completed through utilising Genetic calculation ultimately with the help of A-Priori calculation we create the ordinary for the digging the associate object for spotlight lower. Read More...
|
Software Engineering |
India |
614-617 |
162 |
Review Paper on Design and Optimization of Duct and Its Effect on System Performance
-Manoj Dharma Nimase ; Mandar Padwal; Aniket Salunkhe; Dhirajkumar More; Bharatbhushan Kale
This paper focuses on the design parameter and procedure of duct. While designing the duct according to different cooling load condition requirement and according to availability of space how duct layout should be made optimum that should be decided. This paper focuses on study of design and optimization of air cooling duct. Generally while designing a duct it’s very important to select suitable shape, material, method of duct designing. At the same times the network structure of duct, topology or geometry of duct shape and size, location of air cooling fan, calculation procedure of duct design that’s are some parameter which is consider for effective duct design[1]. Read More...
|
Mechanical Engineering |
India |
618-621 |
163 |
Secure Email Service in Cloud by using Modified Homomorphic Encryption Algorithm
-J. Sai Krishna ; Dr. K. Venkataramana
In Recent trends shows Cloud computing technology is adopted by many IT companies as it reduces the investment burden for infrastructure, software, hardware or any reasonably resource in a company. However, one amongst the most important problems in implementing or adopting cloud is threats due to security breaches. To ensure security, countless ancient secret writing algorithms are used like various truthful cipher mechanisms, RSA, Homomorphic secret writing etc. however these algorithms are solely accustomed to convert plain text into cipher text during transit or at storage. Homomorphic encryption can be a particular type of encryption where mathematical operations on the cipher text is like mathematical operations on the corresponding plaintext. Homomorphic encryption (HE) is fascinating on account of the particular proven fact it can operate on big databases. In this paper discussed and studied the fundamental concepts of HE, along with various homomorphic encryption schemes and their possible implementation in cloud computing. Read More...
|
Computer Science |
India |
622-626 |
164 |
Customer Product Search Analysis in E-Commerce by using Genetic Algorithm
-T. Rupendra ; Ms. Anthony Mariya Kumari
The product takes review of various users, based on the review, Based on the review, it produces a variety of customer reviews, specifying that products and services offered by e-commerce activities are reviews and rating. We use reaction-based keywords based on these response keywords that are drawn on user review and ranking along with compatibility or negative weight in the database. This system allows consumers to buy different products and online products can review and ratings. Read More...
|
Software Engineering |
India |
627-630 |
165 |
Influence of Desiccant on the Performance of Solar Dryer
-Ravi R Rathod ; Jvalant Bharatkumar Trivedi
The primary purpose of this report is to present the design of a solar dryer cum solar cooker and also the investigations carried out in order to evaluate the influence of incorporating a desiccant on the drying efficiency of the solar dryer. The findings obtain in this project through experimentation reveal that the incorporation of a desiccant can help improve the drying efficiency. The use of silica gel as a desiccant was made. The study also describes the conditions that led to the selection of silica gel as a desiccant. Read More...
|
Renewable Energy |
India |
631-634 |
166 |
Artificial Intelligence in Mental Health and Psychological Practice
-Namrata B. Thamke ; Shraddha B. Uikey; Trupti S. Gudadhe
This conference paper reviews about, how we use Artificial Intelligence for stabilizing the mental health of any patients in effective manner rather than in conventional manner. Those are some vital assisted activities incorporating such as Clinical Training, Psychological Assessment and Clinical Decision Making. Artificial Intelligence concept has been innovated for numerous patients. Due to these phenomena, the potential job loss has to be occurred among Mental Health Professionals. The advancement of Artificial Intelligence Technologies and their application Psychological Practice have important implications that can be expected to transform the mental care field. In development of ethical use of AI technologies, Psychologists and other mental health care professionals play vital role. Read More...
|
Computer Engineering |
India |
635-637 |
167 |
Effect of Changes in Materials and Working Fluids on the Performance of Vortex Tubes
-Ravindra Shende ; Jagdeesh Saini
Refrigerating systems has emerged as an important necessity of human life in present century. Today, these systems are used in many applications. Present research work is devoted to the investigations for of an important category of refrigerant systems, vortex tubes. In the research work, combinations of six gases and three materials are made for analyzing pressure differences and thermal gradients for a vortex tube. The flowing gases were Argon, CO2, Nitrogen, Oxygen, Helium, and air, and the materials are Cast iron, Copper and Brass. As a result, combination of Helium and Brass emerged out as the best combination for the application. Read More...
|
M-Tech(thermal power engineering) |
India |
638-646 |
168 |
Water Pump Controller using Arduino Uno
-Mrs. V. C Sanap ; Viraj V Khapre; Ankit Fabian; Inamulhaq Inamdar; Vishal Mohite
People face a problem of water shortage cause of very low temperature in the high altitude areas resulting in freezing of water pipes. So, they either have to change the water pipes or remove the blockage. As the diameter of water pipe is small so water easily gets frozen, as in other case it takes a lot of time for large amount of water to get frozen like water tank, etc. By using this Arduino water pump controller it will make it very easy for the people to get access to water for their daily use. Read More...
|
Computer Engineering |
India |
647-649 |
169 |
Implement k-means Clustering Algorithm for Document data Analysis
-Gutha Murali ; Ms. S Anthony Mariya Kumari
At present time enormous measure of helpful information is accessible on the web for access, and this gigantic measure of information is shared data which can be utilized by anybody expected to utilize. The accessibility of different nature of record information has lead to the assignment of grouping in the dataset. Bunching is one of the essential procedures utilized for grouping of the huge dataset and broadly pertinent numerous territories. High caliber and quick archive bunching calculations assume a huge job to effectively explore, outline and arrange the data. Late investigations have demonstrated that partitional grouping calculations are suit-capable for substantial datasets. The k-implies calculation is commonly utilized as partitional grouping calculation since it may be effortlessly actualized and it is most effective as far as execution time. The significant issue with this calculation is affectability for determination of the underlying allotment and its intermingling to nearby optima. In this examination it think about refined helpful data from record informational collection utilizing least crossing tree for archive bunching and great nature of groups have been produced on a few report datasets, and the yield demonstrates acquired shows a viable enhancement in execution. Read More...
|
Software Engineering |
India |
650-653 |
170 |
Implementation of Smart Bag
-Prof. Dodmise U. S. ; Gham Shritej Shrikant; Reddi Sudatta Satling; Shaikh Shirin Ab. Gani; Gire Supriya Dhananjay
The security of ATM machine has become more vital day by day. The vehicle which carry the money to be feed into ATM machine needs to be more secure. In general, all the vehicle is having GPS tracker device fitted inside the vehicle, and which is inspect by the high authority. But the authority could check only the location of the vehicle and not to the money case inside the vehicle. Nowadays field of electronic has designed with advanced electronic technology that can provide facilities like surveillance. All the electronic inventions are to reduce manual effort upon mechanical work and to create an interaction between human and machine. Human following bags are one of the finest technologies in electronics and by utilizing its advantages and applications in day to day life in this paper we are providing authority to the person inside the vehicle. The only person will be responsible for the money loss or theft. The person will have some authority to open the suitcase and transfer the money to the ATM machine. In terms of privacy the bag can be activated by owner’s identity and also location can be tracked using GPS and GSM. In this bag within a small platform all the facilities are implemented together efficiently. Read More...
|
Computer Science and Engineering |
India |
654-656 |
171 |
Use of Data Mining Tools and Techniques in Improving Productivity of Education Industry
-Dr. Omkar Gadre
In today’s scenario collecting a productive data & scrutinizing it is a tedious job. Data mining is one tool which can help to improve data quality in less time consuming manner. Data mining is known as Knowledge Discovery in Database (KDD). Education industry has grown rapidly over a last few years. Usage of technology has improved teaching learning methodology. A growing number of institutes in both public and private sector are offering huge diversity to all its aspirants students whether graduate, under graduate, post graduate, diploma or vocational courses. It is a concern for today’s education system and this gap has to be identified and properly addressed to the learning community. Utilization of DM techniques in education sector is a developing and new growing research area. It is also known as Educational Data Mining. The Educational Data Mining is involved with developing the methods that helps to search specific types of data sets that come from education surroundings. Hence it has become important to understand the requirement of students and their academic progression. Educational Data Mining helps in a big way to answer the issues of predictions and profiling of not only students but other stake holders of education sectors. This paper can highlight some tools and techniques to discuss predictions of students progress and its impact on teaching learning methods. Read More...
|
MANAGEMENT |
India |
657-659 |
172 |
Study on Hot Cracking Weldability Testing Methods
-P. Archunan ; R. Vinothbabu; P. Sundarraj
Weldability testing is majorly used to find the fabricability of materials by various welding processes methods, different filler materials, electrical characteristics to determine the service performance of welded construction. The weldability tests are useful to find the physical behaviour, mechanical behaviours, metallurgical degradation, selection of welding process, selection of filler material, susceptibility to cracking. Weldability is relative suitability of material for welding according to the AWS, Weldability is defined as the capacity of material or combination of materials to be welded under fabrication condition into specific suitability designed structure and to perform satisfactory in the intended service. Read More...
|
mechanical engineering |
India |
660-662 |
173 |
An Efficient Network Intrusion Detection System using Multilayer Perceptron
-Roshini Rajendran ; L. Sankara Maheswari
Presently, the growth of internet has given rise to increasingly utilize internet for public and commercial services. As a result malicious activities are on the rise to exploit users to steal information related to credit card details, passwords, sensitive information etc. It has become a major concern in the society to protect data shared across networks and stored in computer. At the same time attackers use many techniques to gain advantage of breaking firewalls and security measures. The attacker use techniques to steal the data such as malware, viruses, Trojans etc. An intrusion detection system is used to detect and block malicious traffic originating from attackers. Traditional Intrusion detection systems are becoming less effective to capture the malicious traffic. Combining data mining techniques into intrusion detection system offer more security than traditional methods. Since data mining can use vast number of data, detecting a tiny variation in the network traffic is possible leading to detect and block unwanted traffic in the network. In the present study multi layer perceptron classifier is used to classify the network attack types. MLP based intrusion detection system is designed to support network administrators to find signature based attacks and anomaly of the network traffic. The IDS is trained on the traffic data using MLP to capture the known attack types and differentiate traffic as intrusion and normal traffic. Read More...
|
Computer Science |
India |
663-667 |
174 |
Embedded Based Supporting System for Visually Impaired Person
-J Thilagavathy
Blind cane stick is an innovative cane stick designed for visually disabled people for improved navigation. We here propose an advanced blind cane stick that allows visually challenged people to navigate with ease using advanced technology. The blind cane stick is integrated with ultrasonic sensor along with light and water sensing. Our proposed project first uses ultrasonic sensors to detect obstacles ahead using ultrasonic waves. On sensing obstacles the sensor passes this data to the microcontroller. The microcontroller then processes this data and calculates if the obstacle is close enough. If the obstacle is not that close the circuit does nothing. If the obstacle is close the microcontroller sends a signal to sound a buzzer. It also detects and sounds a different buzzer if it detects water and alerts the blind. One more feature is that it allows the blind to detect if there is light or darkness in the room. The system has one more advanced feature integrated to help the blind find their cane stick if they forget where they kept it. A wireless RF based remote is used for this purpose. Pressing the remote button sounds a buzzer on the cane stick which helps the blind person to find their cane stick. Thus this system allows for obstacle detection as well as finding cane stick if misplaced by visually disabled people. Read More...
|
Electronics & Communication Engineering |
India |
668-671 |
175 |
On Harmonic Mean of Certain Triangular Line Graphs
-A. Lakshman Kumar ; K. Gurusamy
We investigate the harmonic mean of several standard line graphs such as path, Triangular line snakes graphs, Quadrilateral lien snakes graphs. etc. Read More...
|
MATHEMATICS |
India |
672-673 |
176 |
Improving Cluster Efficiency by Density Based Approach using Hybrid Optics
-Dr J. S. Kanchana ; G. Aayeesha Siddiqa Hussainibi; T. R. Amirtha Nandhini; P. A. Archanamai
Clustering is the one of the important methods used in data mining, which has wide range of applications in Image processing, Pattern recognition and Compression. The clustering algorithms are categorized into five methods, such as Partitioning, Hierarchy, Grid-Based, Density Based and Model Based. A new approach based on the Hybrid OPTICS is proposed, which is the Density based method used to cluster the data with high dimension and variable densities. OPTICS is an Ordering Points To Identify the Clustering Structure used to find the density based clusters. It addresses the one of the DBSCAN problem of detecting meaningful clusters in the data of varying densities. OPTICS requires two parameters, ε is used to describes the radius and MinPts is used to describe the number of points require to form the cluster. A point p is a core point if at least MinPts points are found with Epsilon neighbourhood N ε (p). Using this parameters Hybrid OPTICS computes core distance and reach ability distance to find local and global minimum. Hybrid OPTICS automatically determines the border set based on global and local minimum and then performs cluster analysis for each local cluster based on local minimum and integrate the all local minimum to obtain the global minimum. The efficiency of the Hybrid OPTICS is validated using real data set when compared with existing SDE algorithm. Read More...
|
Information Technology |
India |
674-677 |
177 |
Home and Industrial Alert System Based on Internet of Things
-Chavhan Ashwini Ramesh ; Prof. T. N. Sawant; Deshmukh Snehal Ananta; Khade Anita Shivaji; Mahajan Manas
In today’s Hi-tech era crime is increasing day by day. Security and safety has always become a basic necessity for urban population. Due to increasing threats and intrusions in society, everyone needs a advanced security system which can keep their belongings secure and at the same time they also want to protect their home assets from any kind of hazard. They require simple, reliable and high performance system that can be easily implemented. This system can detect the theft, fire, door break, etc. and sends an auto-generated email remotely to intimate the owner. The major goal of the system is to design a cost effective home security system based on wireless sensor network using Wi-Fi and cloud technologies. Mobile phones can remotely control household appliances and can receive a feedback SMS when any intrusion is suspected in house or industry. Read More...
|
Electronics and Telecommunication Engineering |
India |
678-680 |
178 |
Exploring Application Level Semantics for Data Compression
-S. Madhumathi ; L. Sankara Maheswari
Natural phenomena shows that many creatures form large social groups and move in regular patterns. These works are mainly focused on finding the movement patterns of each single object or all objects. Here, we tend to initial propose AN economical distributed mining formula to collectively establish a bunch of moving objects and find out their movement patterns in wireless detector networks. Then we propose a compression algorithm, called 2P2D, which exploits the obtained group movement patterns to reduce the amount of delivered data. The compression formula includes a sequence merge and an entropy reduction phases. In the sequence merge section, we propose a Merge algorithm to merge and compress the location data of a group of moving objects. And in the entropy reduction phase, formulate a Hit Item Replacement (HIR) problem and propose a Replace algorithm that obtains the optimal solution. Moreover, we tend to devise 3 replacement rules and derive the utmost compression quantitative relation. The experimental results show that the projected compression formula leverages the cluster movement patterns to cut back the number of delivered knowledge effectively and expeditiously. Read More...
|
Computer Science |
India |
681-684 |
179 |
Home Automation- Today and Tomorrow,India and World
-Suyash Agrawal
Smart Home Automation refers to using management systems and information technology to operate, manage and control daily use home appliances such as lights, fans, televisions, thermostats doors, windows, etc and doing so reducing the need for human interference. The world is moving towards a digital era and implementing Internet of Things devices will be a necessity, this paper presents an insight into the current scenario of Home Automation across India and feasibility and Future Scope of Smart Home Automation in India. India’s growing economy has led to an increasing population receiving higher wages which in turn will increase the standard of living, thus augmenting the demand for Home Automation Devices. Home Automation is still a niche market in India catering to the upper class. This paper will focus on the scope and adaptability of Home Automation in India from 3 perspectives - Energy, Safety & Comfort. The importance and limitations on Smart Home Devices will be discussed and trends in Smart Home Automation will be analyzed through the course of paper. Challenges and feasible solutions will be considered to device an efficient smart home system. Read More...
|
Internet of things (IoT) |
India |
685-687 |
180 |
Banks and Rural Development
-Ravichandra
Rural development is a process that aims at improving the standard of living of the people living in the rural areas. India is a country of villages and its development is synonymous with the development of the people living in rural areas. India is a vast and second most populous country of the world. According to the 1991 census, 74.28 percent population of our country resides in the countryside. Rural development has been receiving increasing attention of the governments across the world. Banks have contributed a lot in developing in rural India. Regional rural banks were also created to meet the credit requirements of only weaker sections and small entrepreneurs. The RRBs were setup in 1975 as the poor man’s bank or low cost banks to supplement the efforts of cooperative and commercial banks. The RRBs since then have passed through various phases and now have been recognized as integral part of rural credit delivery system in the country. India is a country of villages. According to Census of India’s 2011 Provisional Population, out of 121 crore Indians, 83.3crore live in rural areas while 37.7 crore stay in urban areas. There are about 6 lakhs villages in our country. Around 70% of the population of India lives in villages i.e. rural areas. So the rural areas need to be developed. This research paper is based on the secondary data and its focusing how Nationalized banks, RRB’s private banks and co-operative banks contribute their role for the development of rural area. Read More...
|
COMMERCE |
India |
688-693 |
181 |
Authentication and Integration of Cloud Storage Services
-Gayathri V ; Soujanya K C; Keerthana J; Manickavasagan V
In this Information age, the volume of data dealt everyday is enormous already, and is still growing. This has led to the development of various cloud storage services that help users store and manage the data with ease. So, it is natural that a user s data stored across multiple accounts in various cloud services, bringing with it the overhead of maintaining these accounts. Therefore, there is a need for unifying these accounts into a single module to help the user access them easily. The paper aims to solve this problem by integrating many of these services into a single cloud service. The service can be authenticated by the user only once. To access the files a tabbed view of all the services is being provided. The use of REST (Representational State Transfer) APIs of all the services to retrieve and list the files, is integral to the working of the module. The OAuth 2.0 protocol, which is the current industry standard, is followed to authenticate all of the services. The idea helps in managing various cloud platforms within a single unit. The access and management of projects is easier, since the integration of various cloud services is scalable. Read More...
|
Computer Science and Engineering |
India |
694-698 |
182 |
Effectiveness of Traditional and Social Media Marketing
-Mr. M. Robinson ; M. Sangeetha
The purpose of the paper is to report on the process and finding of factors that influencing the effectiveness of customer engagement, brand reputation, customer brand attitudes towards traditional and social media marketing. The paper contains adequate details to support that objective and suitable to be presented at the conference. Besides, this paper examines the connection between factors influencing effectiveness of traditional media and also examine the key determinants of those factors towards social media marketing performances. A literature review is presented to explain the effectiveness of traditional media towards social media marketing performance. The effectiveness of traditional media and social media marketing contributed to success and to their growth in the future, although some problems are acknowledged. Read More...
|
MANAGEMENT |
India |
699-702 |
183 |
Secure and Open Cloud for Deduplication using HMAC Algorithm
-Mr. V. Manickavasagan ; Aparna PM; Mohammed Shakura Banu SA
The elimination of duplicate data particularly in computer related data is called as data deduplication. According to deduplication, we introduce a method that eliminate redundant encrypted data owned by different users. This mechanism uses the concept of secure cloud where user is able to generate data tags before storing data on cloud which helps during performing audit to check integrity of data. Read More...
|
Computer Science and Engineering |
India |
703-705 |
184 |
Portable Speech to Speech Translation on an Android Smartphone
-Mrs. H. A. Shinde ; Priyanka Ashok Kute; Shraddha Laxman Binawade; Shraddha Dhondiram Koakate; Nilesh Vijay Dolase
This paper examinations the technology used in Speech-to-Speech Translation that is the phrases spoken in one language are immediately spoken in another language by the device. Speech-to-Speech Translation is a three step software process which includes Automatic speech acknowledgement, Machine Translation and voice synthesis. This paper includes the major speech translation projects using different approaches for speech recognition, translation and text to speech synthesis importance the major pros and cons for the approach being used. Read More...
|
Computer Engineering |
India |
706-707 |
185 |
Comparative Study between Simplex and Graphical Methods in a FLPP
-Dr. A. SahayaSudha ; P. Meena
This paper portrays the recent techniques that have been developed for optimization of linear programming problems. This paper aims to solve the fuzzy linear programming problem using ranking function and here the fuzzy numbers which are involved are trapezoidal fuzzy numbers. Read More...
|
MATHEMATICS |
India |
708-710 |
186 |
Smart Waste Management System
-C. Bennila Thangammal ; P. A. Maria Rashika Shifali; B. Monika; E. S. Keerthana; Malepati Tejasree
As urbanization is spreading rapidly, there is an increase in production of waste. Waste management is a crucial issue to be considered at public places where waste is overflowed from the bins and may cause different diseases. The present work focuses to develop a model of smart dustbin which can be effectively used at public places in smart cities. The model has two dustbins (named as Dustbin A and Dustbin B) which will be kept at public places mostly. Dustbin A can be used but Dustbin B cannot be used until Dustbin A is full. Dustbin B can only be used once Dustbin A is full and then Dustbin A will not open until the waste is cleared in the Dustbin A. Whenever any dustbin is filled up, a message is sent to the concerned authority. This will avoid overflow of waste in the bin. Dustbins have automatically close and open feature depending on the presence of an obstacle. In our system, the garbage level in the dustbins is detected with the help of Ultrasonic sensor and presence of the obstacle is detected by IR Sensors and communication to the authorized control room by GSM system. Read More...
|
Application based system |
India |
711-714 |
187 |
Experimental and Analytical Investigation of Cold-Formed Steel I-Section with Corrugated Web
-K. Elakkiya ; M. Anbarasan
Cold-formed steel makes the major role in structural construction. Footing, column and beam are makes the major role to strengthen the structure. Beam of the I-section with corrugated web can be investigated by experimentally and analysed by ANSYS software. Also comparison between beams with flat web to the corrugated web normally the beam of I-section with flat web can be used. But our aim is to attain more strength with corrugated web. Mainly the flexural strength can be studied and discussed. Experimental test should under two points loading in simply supported condition. Similarly the numerical analysis could do with same condition. As a result that the I-section with corrugated web attains higher flexural strength compared to flat web and there was no failure in shear zone. Also the depth of web increases thus the strength increases. Read More...
|
Structural Engineering |
India |
715-717 |
188 |
Development of Brain-Computer Interface based on Stimuli for the Movement of Robot Joints
-S. Karuppaiah ; Hari Priya .M; Hema .R; Jegatheeswari .M .V; Karthiga Sethu .S
This paper presents a brain computer interface (BCI) to control a robotic arm by brain signals. BCI establishes a channel of communication for the purpose of interaction between brain and controller. It helps paralyzed patients to move their robotic limbs just with their brain signals. The following signal processing steps were established; acquisition of brain signals by electroencephalography (EEG) electrodes; noise reduction; extraction of signal characteristics and signal classification. Electroencephalograms (EEGs) have been used to estimate human emotions. In this project, we developed an emotion analyser and applied it in a robotic arm system that changes its movement based on the user’s emotion. Read More...
|
Electronics & Communication Engineering |
India |
718-720 |
189 |
Experimental Treatment of Tannery Effluent by using UASB Reactor
-M. Saravanan ; S. Mohamed Asharutheen; B. Pragadeesh; S. Sethuram; R. Aswin Kumar
There are much more tannery based industries presented in India .wastewater released from tannery industry produces high inclusion of toxic content, which is more dangerous in environment without treatment, so it’s more challenge to keep environment clean. Now a days some new advance techniques were developed, such as adsorption, treatment with Nanoparticles, using UASB reactors. Among all these techniques, UASB (Up Flow Anaerobic Sludge Blanket) reactor is popular and more effective method for treating the tannery wastewater. UASB reactor method is anaerobic treatment. This process effectively treat wastewater and produces bio-gas (CH4) which is combustion gas as well as good energy source, so that make this process more economical. In UASB reactor the amount of energy gas produced is directly propositional to amount of inorganic matter removed. Read More...
|
Civil Engineering |
India |
721-722 |
190 |
Energy Conservation in Mobile Ad-Hoc Network using Enhanced Fitness Function
-Vijayasharmila .S ; Divya .V; Naganandhini .G
In MANET, a collection of mobile nodes forms a wireless network. MANET forms a temporary network without the aid of any fixed infrastructure or centralized administration. A MANET is referred as an infrastructure-less network. The mobile nodes in this network dynamically sets up paths among themselves to transmit packets temporarily. Though MANET possess attractive advantages, it faces some challenges due to their particular characteristics. One of the important challenges is the limited energy resource, as the mobile nodes do not possess permanent power supply and have to rely on batteries. It reduces the network lifetime as batteries get exhausted very quickly as nodes involves the transmitting and receiving of packets and mobility of nodes. In existing system, the energy in MANET is conserved by applying the fitness function technique to optimize the energy consumption in Ad Hoc on Demand Multipath Distance Vector (AOMDV) routing protocol. The protocol used is AOMDV with fitness function (FF-AOMDV). The problem identified is usage of intermediate nodes for forwarding packets is more. It reduces the energy of the nodes. In this paper, the usage of intermediate nodes is reduced based on maximum transmission range by using Enhanced Fitness Function. It conserves the energy of the remaining nodes in the network and increases the lifetime of the network. Read More...
|
Information Technology |
India |
723-726 |
191 |
Spy Robot Surveillance using nRF401 and Arduino
-Mohammad Ikram Sheikh ; Abdul Talib Sheikh; Sheikh Ayaz Kashmiri; Prof. Ramizuddin Khwaja
A nRF401 Controlled Spy Robot is an Arduino Uno based robot that can be monitored and controlled by a remote using a single-chip radio transceiver. The Wireless Network Camera mounted on the robot can also be displayed on any other Android device for monitoring. In this project simple materials are used like plastic wood for the chassis, cycle spokes for the wheel axle, L293D motor driver and two 600 rpm DC motors for propulsion in four directions namely front, reverse, left and right. nRF401 module is used to receive commands in the form of strings from the robot. The robot is covered with camouflage texture so that it does not alert surroundings. It is made up of simple materials rather than preassembled kits because the materials are readily and cheaply available, the robot becomes very lightweight and it can be formed into any desired size. Read More...
|
Electronics and Telecommunication Engineering |
India |
727-729 |
192 |
Analysis and Tribological Behavior of Tin-Cr Based Hard Coating Materials and Experimental Study
-Onkar D. Dhanke ; Shubham. L. Dhongade; Chandrakant B. Durge; Satyajeet S. Gaikwad
The progress in cutting tool materials, coating techniques, and machine tools has satisfied the way for machining of materials higher cutting speeds, higher feed rates or in hardened state. The requirement of tool has to be ductile to prevent fracture and hard to decrease tool wear.[1] TiAlN has been one of the most significantly investigated hard coatings in real life applications. A new tri-nitride AlCrN with high percentage of aluminum and superior properties has become increasing interest. As per the research, Compared to the TiAlN coating, the AlCrN coating presented better characteristics against the anti-oxidation, and removing debris from the contact interface. It was found that the AlCrN coating with good wear resistance probably has a most possible tribological applications than the TiAlN coating under the condition of sliding wear. [2]. Read More...
|
Mechanical Engineering |
India |
730-733 |
193 |
Secure Key Deduplication with Identity Based Broadcast Encryption
-T. Mounish ; I. Madhavi Latha
Deduplication, which can save storage cost by enabling us to store only one copy of identical data, becomes unprecedentedly significant with the dramatic increase in data stored in the cloud. For the purpose of ensuring data confidentiality, they are usually encrypted before outsourced. Traditional encryption will inevitably result in multiple different cipher texts produced from the same plaintext by different users’ secret keys, which hinders data deduplication. Convergent encryption makes deduplication possible since it naturally encrypts the same plaintexts into the same cipher texts. One attendant problem is how to reliably and effectively manage a huge number of convergent keys. Several deduplication schemes have been proposed to deal with the convergent key management problem. However, they either need to introduce key management servers or require interaction between data owners. In this paper, we design a novel client-side deduplication protocol named KeyD without such an independent key management server by utilizing the identity-based broadcast encryption (IBBE) technique. Users only interact with the cloud service provider (CSP) during the process of data upload and download. Security analysis demonstrates that KeyD ensures data confidentiality and convergent key security, and well protects the ownership privacy simultaneously. A thorough and detailed performance comparison shows that our scheme makes a better tradeoff among the storage cost, communication and computation overhead. Read More...
|
Software Engineering |
India |
734-738 |
194 |
A Prospective towards Smart Vehicle System
-Vinesha .P ; S. Rajarajeshwari; K. Sowmiya
Currently, we are at a stage or world where everything is made smart and digital. Technology has grown faster when compared to past generations and now it’s time for another step ahead. Yes, the concept of a smart city is now the recent plan that is still in existence. A smart city implementation doesn’t just involve a single technology but requires the collaboration of various techniques and one such amazing concept is the use of Wireless Sensor Network (WSN). When sensor networks are utilized as a core in various applications like the smart street light system and still many more, smart safety vehicle implementation is also now possible. This paper illustrates the use of sensor nodes for adjusting inside mirror or outside mirror of a vehicle based on the pre-stored information and thus guiding the driver in a proper direction to avoid accidents. Temporal factors, environmental factors, medical and entertainment technologies are all taken into consideration to steer the driver correctly. This idea is related to various fields like telematics, traffic safety, vehicle development and so on…. Read More...
|
WIRELESS SENSOR NETWORKS |
India |
739-741 |
195 |
Integrate Multiple Relevant Tuple Units to Effectively Answer Keyword Queries Over RDBMS
-K Dinesh ; Ms. S Mariya Anthony Kumari
Existing studies on keyword search over relative information typically realize Steiner trees composed of connected database tuples as answers. Recently, tuple units square measure planned to boost search potency by classification structural relationships, and existing ways establish one tuple unit to answer keyword queries. However, in several cases, multiple tuple units ought to be integrated to answer a keyword question. Thus, these methods will involve false negatives. To address this downside, during this paper, we tend to study the way to integrate multiple connected tuple units to effectively answer keyword queries. To attain a higher performance, we conceive two bond indexes, SKSA index and KPSA index, and incorporate structural relationships between different tuple units into the indexes. We use the indexes to expeditiously establish the answers of integrated tuple units. We develop new ranking techniques and algorithms to increasingly realize the top-k answers. We have enforced our methodology in real information systems, and therefore the experimental results show that our approach achieves high search potency and result quality, and outperforms progressive ways considerably. Read More...
|
Software Engineering |
India |
742-745 |
196 |
Customer Data Clustering using M.F.P to Improve the Performance of Sales and Marketing
-C Lakshmi Devi ; Dr. K. Venkataramana
Bunching is the assignment of collection a lot of articles in a similar gathering that are more like each other than to those in different gatherings. The information mining in deals and showcasing encourages organizations to advance their most beneficial items and boost the benefit. This paper displays the examination and investigation of four bunching calculations that is Density Based grouping, Canopy, Farthest First and Hierarchical Clustering by utilizing Wholesale Customer dataset. The exhibitions of these calculations are looked at utilizing the execution assessment measurements, for example, Time taken to assemble, Number ofbunch, and Number of group occurrences. The exploratory outcomes demonstrate that Hierarchical Clustering and Farthest First produce preferable outcome over Make Density based and Canopy. Read More...
|
Computer Applications |
India |
746-748 |
197 |
A Modified Two Level Security for Data by using Robust Quantum Key Distribution Technique
-Morumpalli Girish Reddy ; Mr. S. Muni Kumar
The privacy is primary when imparting inconspicuous data, and individuals have formulated some unordinary systems to encode their discussions. The Quantum Key Distribution consents for the dependable transmission of unbreakable encryption keys and it gives an immaculate relaxed coding to take care of the hassle of key circulation. At present this is more and more boost software within the discipline of quantum figuring. The elemental inspiration of this conference includes two gatherings, wishing to trade a key both with entry to a normal open correspondence channel and a quantum correspondence channel. The snare refining technique of BB84 is usually utilized in light of the truth that the demonstration of perusing a quantum bit (QuBits) alterations the bit, it is tough for programmers to meddle with out being recognized ample number of bits. Yet, this procedure makes use of just four bearings of electron tendencies so it is possible to determine the key. To beat these hazards right here two dimension QRNA process is proposed for security. In first dimension DNA is connected on undeniable content material after BB84 conference is connected. This procedure offers superior safety over each BB84 convention and DNA alone. Read More...
|
Software Engineering |
India |
749-752 |
198 |
Watershed Management in Sonari Village
-Pratima Balasaheb Magar ; Pradeep A. Hangargekar
Sonari is small village in Aurngbad District of State Maharashtra. It is facing acute water security problem due to insufficient rainfall every year. Watershed development structures like rain water harvesting, check dam, vanarai bandhara ,farm pound, are suggested to make the village self sufficient in case of water demand. Read More...
|
Civil Engineering |
India |
753-756 |
199 |
Removal of Phenol from Waste Water by using Saw Dust
-Mr. Sonawane Bhausaheb Karbhari ; Mr. Gangadware Mithun Motiram
Phenol is a major pollutant in the wastewater because of its presence in the effluent of more processing and refining plants. Suitable method for phenol removal can be selected based on availability of the material, extent of separation required and properties of phenolic effluent. Locally available sawdust, a very low cost and promising material was tested experimentally as an adsorbent, after carbonization, for the removal of phenol from industrial waste waters for a safe disposal. The experiments were performed in batch wise to remove phenol from synthesized aqueous solutions. The equilibrium of adsorption was determined as a function of the solution, contact time, adsorbent dose. Adsorption isotherms of phenol for adsorbents were determined and correlated with the usual isotherm equations such as Langmuir and Freundlich. Equilibrium model analysis indicates the fitness of Langmuir Isotherm model (R2=0.9943) to Phenol-Sawdust adsorption system. Read More...
|
Environmental Engineering |
India |
757-761 |
200 |
Nickel Base Alloys and Associated Problems on Welding
-R. Karthikeyan ; Pro. P. Sundharaj
To study the various types of nickel based alloys and effect of alloying element on properties of alloy, welding problems present in nickel based alloys. The Super alloys are primarily used in gas turbines, coal conversion plants and chemical processing industries and for other specialized applications requiring heat and corrosion resistance. The γ phase in the Nickel base super alloys is reasonable for the elevated temperature strength of the material and its incredible resistance to creep deformation and grain boundary dislocation. The effect of alloying elements on the Ni base super alloys were studied. The possible welding problems of Ni based super alloys were studied .The Nickel base alloys are mostly prone to the strain age cracking, Solidification cracking, HAZ liquification cracking, Fusion Zone Solidiï¬cation Cracking. The presence of the carbides MC, M23C6, M6C, M7C3 and the laves phases are leads to hot cracking. Read More...
|
mechanical engineering |
India |
762-767 |