No. |
Title and Author |
Area |
Country |
Page |
251 |
Copra(Coconut) Dryer
-V. Kumaresan ; S. Nivetha; R. Poovarasi; S. Shanmugarajaa
Coconut’s major product is copra which is used for extraction of oil. Major coconuts are produced in Indonesia, Philippines, India. Moisture content of coconut is 50-55%. Coconut’s moisture level is reduced by drying it in open sun known as traditional drying. Drying is the phenomenon of transfer of mass and heat, which results in moisture reduction by evaporation under controlled condition. This system of drying has a defect of poor quality copra and it takes more days for drying (about 7 days). To reduce the drying time and to solve the problem of hygiene, induction heating is used to dry the coconut. It is the more efficient method for reducing the moisture content to 8.1% in 2 days and also for obtaining good quality copra. The drying air temperature is 60oC. The temperature and moisture is continuously monitored and the process is automatically controlled by arduino. The moisture and temperature level is indicated by lcd display. This method is used in rainy season and coconut will not be affected by fungi, dust etc. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
949-951 |
252 |
Intelligent Drive Assistant System
-P. Hithesh ; Gopisetty Neehar Sai; Ch. Srinuvasulu
Most of the academic research on driving support systems focuses on automating the actual driving rather than assisting the driver by enhancing its awareness of the car s surroundings. None of such automated driving systems are currently available to the public. On the other hand, several types of practical driving-aid devices have been developed and made available on the market. Blind-spot detectors, lane change assistants, and back-up/parking sensors are a few examples. The current technology in driver support systems is diverse in terms of functionality, methodology and implementation. The common denominator of all those systems is obstacle detection by sensing: to this end they utilize various forms of sensors, such as laser light, ultrasonic, radar, infrared, and CCD cameras, which are very expensive techniques. Reckless driving is another major moving traffic violation. It is usually a more serious offense than careless driving, improper driving, or driving without due care and attention and is often punishable by fines, imprisonment, and/or driver s license suspension or revocation. Reckless driving is often defined as a mental state in which the driver displays a wanton disregard for the rules of the road; the driver often misjudges common driving procedures, often causing accidents and other damages. Read More...
|
Electronics & Communication Engineering |
India |
952-955 |
253 |
Water Cleaning Boat
-Nikita Jiwtode ; Namrata Rajurkar; Vaishali Nandekar; Kirti Dhenge
Water pollution has been a topic of concern in recent years both in India and worldwide. The floating objects on the water surface many times get clogged in the drainage system and cause chocking of the system which results in other harmful effects. Also such floating objects are consumed by the animals residing in the waters as food items and become the cause of their death. Another concern is the security of the water bodies. To deal with this problem we are proposing this water cleaning boat(Ship). This paper presents the design, development and fabrication of water Cleaning boat. This system works on solar energy so it is non-polluting. As the ship is designed to operations in water wireless communication system bluetooth module is used to communicate with the ship for reliable operation. This work can be very useful in improving life style of mankind. Read More...
|
Electrical Engineering |
India |
956-958 |
254 |
Implementation of Adaptive Dispatching Task in Cloud Sort Task based Allocation Algorithm
-C Arun Kumar ; Ms. C Yamini
Cloud Computing is that the use of computing resources like hardware and software package that are use as a service over a net to the tip users. In Cloud Computing multiple users will request range of cloud services, thus there should be a way that everyone resources are created out there to user in economical manner. In Cloud Computing there are many roles needed to be dead by the out there resources to satisfy best performance, marginal total execution time, shortest time interval, utilization of resources and etc. so we would like associate economical algorithmic program for task programming in cloud setting. During this numerous task allocation strategy is mentioned. Clouds is one in every of the simulation tools of cloud setting that provides analysis and testing of cloud services and infrastructure before the event of the important world. Throughout the comparison of the algorithmic program, we offer the sorted tasks to the TBA algorithmic program once and un-sorted tasks within the second time. we have compared sorted-TBA, unsorted-TBA and random algorithmic program wherever the sorted-TBA algorithmic program performs higher. Here we have a tendency to gift associate algorithmic program for this drawback, that uses the concept of branch associated certain with underestimates for reducing the computations to find an best task allocation. Read More...
|
Master of Computer Application |
India |
959-962 |
255 |
Design and Operation of Wi-Fi IP-PBX Device for Free Voice Calling System using Raspberry Pi
-Shrutika B Pund ; Monika K. Kapgate; Puja N. Chahande; Piyush D. Duragkar; Rajendra B. Khule
IP-PBX is a complete telephony system that provide the free cost, wireless IP data network. An internet protocol based on private branch exchange system consists of one or more SIP phones. Here we need a VOIP (Voice over internet protocol) server with the best open source framework "ASTERISK". An IP-PBX term function as proxy server which is dedicated server using Raspberry pi. A GSM dongle is used for the internal SIM facility for the work. By implementing the server we make a wireless communication in the range of WiFi. The SIP Client must register on IP-PBX server and when a user wish to call it asked the server to make connection. Raspberry pi server is used to handle call request and managing traffic through the platform. IP-PBX has a directory of the all users with their SIP address only those can connected and communicate the server. Also communications are made in between these users only. External traditional also be allowed using this system. IP-PBX can enable each and every person to an organization to be provided with voice extension, hence increase productivity which may easier to manage the routine operation. These no need to disturb current external communication infrastructure and operation since it use existing network. Read More...
|
Electronics Engineering |
India |
963-966 |
256 |
Hungry India- Food and Chef Ordering System at Your Door-Step using Android Based Application
-Pranav Malve ; Pushpam Patil; Pranav Shivale; Sanket Jagtap; Pallavi Suradkar
Increased demands of restaurants, customer needs more attention for food delivery providing much options with ease of ordering and delivery in need of hours. Technology interface has become mandatory to improve the quality of service and business in this industry. As Sweegy, Zomato, Foodpanda are limited with only restaurants and cafe where we can place orders. All the time it is not affordable for people to order the food from the restaurants, so there is need of an application which will provide the facility of home –made food and mess too. So from this application, we are filling the gap of availability of mess and chef which is not in other food delivery apps. Highlighting feature of our application is chef-at-home and other feature is searching using GPS technology. This app will deal with the real time data as data of food posted on each day will be invalid after one day. Various messes can register through this app and can start their own business. The App will also provide the facility of booking the caterers for various events. Read More...
|
Computer Engineering |
India |
967-968 |
257 |
Twitter Mining by using SHU Algorithm and Analysis
-K Lokanadha Reddy ; Dr. K Venkataramana
Time-based association rule mining and regular Twitter message cannot meet the demands arising from some real applications. By considering the various types user of individual items as utilities, utility mining focuses on distinctive the item sets with high utilities. Recently, high utility Twitter messages is one of the most important analysis problems in data mining. present a mining using an algorithm named Generalized Linear Models another name known as simple High Utility algorithm (SHU-Algorithm) to efficiently prune down the amount of candidates and to get the whole set of high utility item sets. If we area unit given a large transactional Social Media consisting of various transactions this notice all the high utility things expeditiously using the projected techniques. The projected algorithmic rule uses bottom up approach, wherever high utility things area unit extended one item at a time. This algorithmic rule is a lot of economical compared to different state -of-the-art algorithms particularly once transactions continue adding to the Social Media from time to time. With the projected SHU Algorithm, progressive information Twitter mining are often done expeditiously to produce the power to use previous information structures so as to cut back supernumerary calculations once a Social Media is updated tweets, or once the minimum threshold is modified. Tweet analysis plays a key role in analysis systems, opinion mining systems, etc. Twitter, one in all the micro blogging platforms permits a limit of one hundred forty characters to its users. Read More...
|
Software Engineering |
India |
969-972 |
258 |
Buildability Assessment in Indian Construction Industry
-M. Gobinath ; R. Babu
In construction projects customer requirements, constructive aspects and quality standards are defined during the design phase. However this phase is usually carried out with little interaction between constructor and design teams which may cause some problems during construction. The design details provided by the Structural Engineer or Architects sometimes find difficult to implement in the site conditions which may cause delay in the work progress. In short, Buildability is defined as "What designers think, contractors do". Questionnaire survey is conducted among Contractors, Structural Engineers and Architects to find the factors affecting buildability and the top critical factors can be eliminated thus enhancing the buildability. Read More...
|
Civil Engineering |
India |
973-975 |
259 |
A Time-Bound Cryptographic Key Assignment Scheme for Access Control of Files in Cloud Storage by using KAC-UC
-U. Anuradha ; Mr. Dr. K. Venkataramana
Cloud computing is an emerging paradigm during which resources of the computing infrastructure can be able to share over the web. As this paradigm even have several challenges for information security and access management when users outsource their sensitive information in cloud servers. Secure and economical information sharing in Cloud with single key size uses Key mixture cryptosystem. That could be a public-key cryptosystem that manufacture constant-size cipher texts for any set of secret key and create them compatible as single key as alternative information in cloud remains confidential. The limitation is that the amount of cipher text categories and also the constant key size that makes the key certain and information is unsecure. In this paper, the KAC-UC (KAC with unbounded Cipher text classes) theme is planned, in which the amount of cipher text categories in cloud storage is unbounded and also the cipher text categories may be extended by increasing the public and passkey pair. The Variable size secret is been accustomed securely share information that avoids the matter of being attacked and provides complexness for estimate the key. Additionally, the ordered search is included to search the required information that is decrypted at the receiver aspect. Read More...
|
Software Engineering |
India |
976-980 |
260 |
Identifying and Preventing False Detection by using Honey Words
-Gunde Raghu ; Mrs. I MadhaviLatha
The development in the field of information has given individuals fulfillment and solace, however there are numerous issues identified with security of information. To beat these issues Juels and Rivest have as of late presented the nectar word idea. Many existing strategies for honeyword age are accessible yet there are impediments identified with capacity cost, numerous framework defenselessness, DoS assault opposition, and so on. In this paper we have proposed a honey word age approach utilizing ASCII esteems which gives better security against animal power assault. In this calculation arbitrarily produced numbers are utilized to create the honey words from the first secret key. The general examination demonstrates that ASCII strategy accomplishes a high location rate. Read More...
|
Master of Computer Application |
India |
981-985 |
261 |
Furniture Inventory Management System
-Shrutika Andewar ; Shrutika Someshwar Andewar; Shivani Hiware; Akash Bawane; Ankit Sahu
Manual handling of the inventory leads to the wastage of time, reduced efficiency and more over keeping track on the inventory. Also, accuracy of maintaining the inventory becomes impractical some times. This project works in intended to minimize the above mentioned drawbacks using automatic identification and tracking of the inventories with the help of RFID technology. RFID based Inventory Management System (IMS) would allow fast transaction flow for the inventory and will prove immediate and long term benefits to inventory in traceability and security. The planned system is based on Low Frequency Midrange RFID readers, and items containing RFID-transponders which are able to electronically store information that can be read or written with the help of radio medium. The inventories across the globe started to use RFID to speed up the self check in or out processes, to control the theft and to ease the inventory control. Moreover, RFID could have a positive impact on the inventory control processes of the organization by either streamlining or formalizing them and facilitate the electronic storage of information captured in real-time, relating to the movement of stock and the amount of stock held, providing visibility to members of the organization. This project presents the experiments conducted to set up an RFID based IMS. Therefore, this system can play a vital role in removing the ongoing difficulties & irregularities in the inventory management. Read More...
|
Electronics Engineering |
India |
986-989 |
262 |
The Real Time Monitoring of Distribution Transformer and Motor
-Sagar Chandore ; Rupali Chavan; Trupti Rupwate; Pooja Gavhane; Pooja Dhangar
Distribution transformers are one of the most important equipment in power network. Because of, the large amount of transformers distributed over a wide area in power electric systems, the data acquisition and condition monitoring is important issue. Induction motor is used in majority of the industrial applications. Most of electrical energy is utilized by induction motors. And thus it is essential to monitor the performance of the motor without changing its operation. Here in this project, introduces a new technique in which embedded system is integrated into the wireless network. During this technique, different sensors are connected with the motor and transformer. The values are extracted using an AVR microcontroller. It is then transmitted to the base station. The main aim of this system is distribution transformer and motor monitoring through IOT. Also, it sends SMS to a central database via the GSM modem for further processing. The idea of on-line monitoring system mixes a global service mobile (GSM) Modem, with arduino and different sensors. The obtained parameters are processed and recorded in the system memory. Now in this system we are concentrating on temperature of transformer and motor. In this system temperature monitoring and control action is performed based on the AVR microcontroller. Read More...
|
Electrical Engineering |
India |
990-993 |
263 |
Handling Missing Data in Voter Data Analysis using Rough Set and Soft Set
-Kanchi Lakshmaiah ; Ms. C. Yamini
Precisely when examine the voter records a section of the records may just likewise appear to overlook. By means of making utilization of quite a lot of strategies such deficient relating to certainties may also be passed on to line. Among the many techniques which might be connected to adapt to this predicament to recover the lacking features some recognized systems perhaps received, for instance, CDC (complete Delete Case), LOCF (final remark Carried forward), RST (tough Set manner) and (SS) smooth Set. On the element when measurements is penniless down truly for essentially the most part 3 types of missing documents occurs depending upon the causes of missingness. They maybe named MCAR, MAR and MNAR. With a purpose to survey the execution of this three natural lacking information instances assortment of comparative examinations beneath a collection of movements wherein brought about convey the educated reasons to the ground on this paper. It wind up noticed that the CDC process can not be connected throughout the actualities examination of educational starters. The approaches for LOCF and RST are effectively accomplished beneath the lacking aspect of MCAR. The systems which will also be reliably and with out situation grounded underneath the MAR lacking contraption are the RST and SS procedures. Read More...
|
Software Engineering |
India |
994-997 |
264 |
Predicting Hospital Admissions using Logistic Regression and Random Forest
-V. Roshini ; G. Rekha; R. Rihana
Too many patients in the Emergency Departments (EDs) can have negative consequences for patients. There is a need of some innovative methods to prevent overcrowding and improve patient flow. In order to accomplish this we use machine leaning techniques. Some of the existing algorithms to build the predictive models are: (1) logistic regression, (2) decision trees, and (3) reconstructability analysis. In this paper logistic regression and Rain forest technique is used in predicting if a particular patient will get admitted in the ED in his/her next visit. Random forest is a machine learning algorithm. It is an ensemble of weak decision trees in order to form a strong decision tree. It flexible and easy to use and produces accurate result mostly even without hyper-parameter tuning. It is simple and can be used for both classification and regression tasks. So it is a good practice to adopt logistic regression and random forest in predicting a patients admission. Read More...
|
Computer Science and Engineering |
India |
998-1007 |
265 |
Log Analysis for Security in Big Data
-B. Yuvaraju ; G. Ananthnath
Sources and all the visitors’ from external from outside to inside. The Severe digital inflows assaults these days will by and large shut down the manage frameworks the whole thing being equal and drawn out utilization of this outcome in digital warfare. Wish of latest safety framework is required in these days protection management which is called as corporation safety management ESM which is an integrated procedure framework includes firewall, web conference and so forth. The present protection management framework has the ability to shield the knowledge protection framework proposes that perception of protection via determining the connection between safety and understanding occasions from the method framework. This process is completed with the aid of giant know-how. It likewise applies Distribution headquartered innovation by means of the protection log framework. These assaults incorporate dynamic assaults, aloof assaults, and SQL infusion assaults. Read More...
|
Master of Computer Application |
India |
1008-1011 |
266 |
Hand Gesture Recognization for Words and Sentences
-Rahul Ananda Jadhav ; Dhanashree Vivek Sakharkar; Sayali Vijay Samgiskar; Priyanka Chandrakant Sonawane; Yogesh Shahare
Today it is difficult for most of us to imagine that many people who are deaf-mute rely on sign language for their communication. They, talk through their hands. Sign languages are visual languages. There are natural languages used by many deaf-mute people all over the world. In sign language the hands convey most of the messages. In our proposed system, we recognize some words, alphabets and sentences of sign language and translate them to text and voice. Firstly, the video shall be captured, the captured video will be processed and the appropriate image will be selected, this selected image will be further processed and will be sent to the statistical database; here the captured image shall compared with the other image saved in the database and the matched image will be used to determine the performed alphabets, words or sentences sign in the language. Here, we will be implementing only American Sign Language Finger-spellings. Read More...
|
Information Technology |
India |
1012-1013 |
267 |
Overview and Analysis of Lung Cancer
-Amjad Khan ; Zahid Ahmed Ansari
Lung cancer is a malignant lung tumor characterized by uncontrolled cell growth in tissues of the lung. This growth can spread beyond the lung by the process of metastasis into nearby tissue or other parts of the body. Most cancers that start in the lung, known as primary lung cancers, are carcinomas. The most common symptoms are coughing, weight loss, shortness of breath, and chest pains .This paper focuses on the study of how the lung cancer develops and its analysis to mitigate the problem. Soft-computing is an important analysis tool of lung cancer. Read More...
|
Electronics & Communication Engineering |
India |
1014-1018 |
268 |
Design and Analysis of Piston by Aluminium Alloy and Silicon Carbide Composite Material
-B. Brindhavanan ; M. Tharun Kumar ; V. Vinoth Kumar; E. Yunganeshwaran ; S. Sivasankar
In an engine the purpose of the piston is to transfer force from expanding gas in the cylinder to the crank shaft via a piston rod. Piston has to endure the cyclic gas pressure and the inertial forces at work, and this working condition may cause the fatigue damage of the piston such as piston side wear, piston head cracks and so on. Usually the pistons are made of Aluminum for lightweight, thermal conductivity. But it has poor hot strength and high coefficient of expansion makes it less suitable for high temperature applications. In this project, Aluminum and Silicon Carbide (AlSiC), an aluminum matrix composite is used as an alternative for aluminium. A 3D model was made using Autodesk Fusion 360 and Structural and thermal analysis was done on ANSYS 13.0. Compared to Aluminium, AlSiC has better abrasion resistance, creep resistance, dimensional stability, exceptionally good stiffness-to-weight and strength-to-weight ratios and better high temperature performance. Fabrication of piston using AlSiC is also easier than using Aluminium. Read More...
|
Mechanical Engineering |
India |
1019-1022 |
269 |
Securing Dynamic Storage Mechanism in Cloud Environment using SHA Algorithm
-M. Anitha ; J. S. Ananda Kumar
The main idea behind this paper is to provide integrity to the cloud storage area. In order to provide security in cloud computing we use SHA algorithm. In this method some important security services including key generation, encryption and decryption are provided in Cloud Computing system. Here the TPA is the trusted entity that has expertise and capabilities to assess cloud storage security on behalf of a data owner upon request. The main goal is to securely store and manage the data so that only authorized users can have access over the data. Read More...
|
Computer Applications |
India |
1023-1026 |
270 |
Experimental Study on Model Caissons in Soft Clay under Lateral & Vertical Loading
-Aaja AS ; Binil Gopinath
Caissons are relatively new design being considered for foundations in a wide variety of applications. The effect of lateral loading and vertical loading in soft clay has been studied. The object here is to establish a broad framework of response of caissons under the above mentioned loadings. The load displacement curves and load settlement curves under the lateral and vertical loads for consistency index Ic=0.42of clay has been studied. The maximum lateral and vertical loads has been taken by the circular shaped caisson of diameter and height 16cm when compared to the square shaped caissons with minimum displacement and settlement. Therefore, it can be seen that as the depth of caissons increases the settlement decreases. Read More...
|
Geo Technical Engineering |
India |
1024-1027 |
271 |
Secure Student Database Integrated with AES Algorithm
-M Mahesh ; C Yamini
Now a days information systems play an important role for organizations and people, during which the safety is given the high priority. Often, solutions square measure developed for terribly similar problems over and once more. During this paper, the files square measure encrypted and hold on within the disk by employing a secret key and asking for identical secret key whereas decrypting. The algorithmic program used in this technique is Advance cryptography normal (AES). AES-128, AES-192 and AES-256 represents the cryptography key sizes (128 bits, 192 bits and 256 bits) and in their variety of rounds (10, 12, and 14, respectively) needed to open the vault that is wrapped round the knowledge. During this algorithmic program, encryption is done by interchanging a number of the characters with key and data in it. The encrypted files square measure set to be scan solely, so the data within the files can not be tampered. The most feature of the system is disabling the delete possibility within the right click menu for the encrypted files. This provides a lot of security for the files on the disk. Read More...
|
Computer Science and Information Technology |
India |
1027-1030 |
272 |
Secure Sharing of Sensitive Data in Cloud using Multi-Prime RSA Algorithm
-Shaik G. Aliya Anjum ; Dr. K. VenkataRamana
Federated Cloud computing is an internet based technology where a large amount of resources are shared as a service among several cloud service providers. Some business organizations using the federated cloud due to the organizational needs. Data Security is very important and critical factor needs to be considered .Different encryption strategies have been carried out for attaining the secure data storage and access security. In this paper, we propose Multi-prime RSA algorithm used for data extraction as requested by sender then forwarded to receiver. The data is decrypted and provided to the receiver. Read More...
|
Software Engineering |
India |
1031-1034 |
273 |
Pre & Post Stressed Concrete from DAGLOCS Composition: A Review
-Shubham Chaudhary ; Ankur Kumar
This project work is the review of the study accomplished in the Buddha Institute of Technology on the use of DAGLOCS composition for pre-stressed and post-stressed concreting. The use of conventional concrete mix for the making of prestressed concrete and post-stressed concrete will make the whole system more expensive. Further it is required that the mixes which we normally used are not very effective for resisting the weathering and chemical attacks due to which the concrete which is used for making the conventional structures will have low durability. This project work basically targets on the implementation of the DAGLOCS composition in the preparation of the pre-stressed concrete and post-stressed concrete. This composition is used in this composition because it is economical and more durable in comparison to those pre-stressed concrete and post-stressed concrete which is made with the conventional concrete. Here we have introduced steel scrap fiber (SSF) for reducing the brittleness of the pre-stressed concrete and post-stressed concrete. These structures will not give the warning before the failure of the structure and the further use of various wastes and supplements like chemicals i.e. admixture and superplasticizers will support the whole pre-stressed concrete and post-stressed concrete. In this composition the provision of different waste materials is done after the study of their physical and chemical properties, which makes the net properties of the concrete composition better than the conventional concrete. By the use this specifically selected concreting materials the strength, durability and chemical resistance increases in a combined form. Read More...
|
Civil Engineering |
India |
1035-1038 |
274 |
Secure The Data using Modified Homomorphic Encryption and Pailliers Technique
-R Niranjan ; K Venkataramana
Homomorphic Encryption is a Scheme which performs the operations on encrypted data. A homomorphic encryption scheme allows evaluating of encrypted data even without knowing the secret decryption key. It can be applied on various system by using different public key algorithms. The major advantage of the Homomorphic encryption can be taken by cloud computing applications. It supports the algebraic operations to be computed on the encrypted data. In this paper, the focus of homomorphic encryption scheme is based on the prime integers. This paper includes additive and multiplicative Homomorphism. Homomorphic encryption has wide range of applications like secured electronic voting system. The paper mainly focus on enhanced homomorphic encryption using paillier cryptography. Read More...
|
Master of Computer Application |
India |
1039-1042 |
275 |
Enhancement of Structural Strength of Cotter Joint with Composite Material Alumina Saffil using ANSYS Structural
-Deepak Kumar Rakesh ; Dr. R. S. Shikarwar; Prof. Ranjeet Kumar
In this article we have studied so many authors to get the parameters which affect the performance of cotter joint. we found that factors and parameters such as construction and size of the cotter joint, mechanical properties of cotter joint, optimization methods for cotter joint, innovative design of cotter joint, material of cotter joint are the parameters which can be optimized for getting better results of structural performance enhancement of cotter joint. Following the review process we modeled a 3d geometry of cotter joint in Catia v5 and performed structural analysis on Ansys 14.0. We have done a comparative analysis with original material of cotter joint i.e. structural steel and replacement material which is alumina saffil which is a composite material. We found out by solution of the analysis that alumina saffil is suitable for manufacturing of cotter joint since we got less total deformation for alumina saffil when compared with the conventional material of cotter joint i.e. structural steel. The values of stresses and strains were found to be optimum as well. These all contributed to increase the structural performance of cotter joint. Read More...
|
M.Tech in Machine Design |
India |
1043-1046 |
276 |
Ignition Controlling Helmet Integrated with Breath Analyzer and Inter Cooling System
-Sathish G ; Senbaga Priya S; Senthil Kumar S; Ramesh A
The key objective of our system is to ensure & safeguard customer’s life provided with high quality of entertainment that he/she requires. Nowadays, wearing helmets is made mandatory while driving for protecting their lives from the risk of danger. According to the recent analysis for our paper we found that in India, for every one hour 14 people are getting killed by road accidents and annually nearly 1.4 million people are getting killed. So, we decided to develop a product which provides the following features:
1) Alcohol level detection
2) Ignition control
3) Inter cooling system based on aerial design
Read More...
|
Electronics & Communication Engineering |
India |
1047-1049 |
277 |
Traffic Signalling & System
-Shah Jigar Prakash ; Bing David Abraham; Mishra Anil Kumar Diwakar Prasad; Pal Vikas Rajnarayan; Bhagat Viraj Sanjeevan
As in the cities traffic is always an issue for the passenger and the people of the various cities like Mumbai, Delhi, Bangalore, Kolkata, etc. To curb the Traffic issue of the cities. By providing iron panels, adruino chips and pressure cells on the road which is coming towards the traffic signal. As the cities lack the land spaces required for new ventures but by applying the methodology of providing iron panels and pressure cells on the present existing structure that is rigid pavement or flexible pavement. It improves the road infrastructure with a little demolition of existing structures. Iron panels and pressure cells get into the act when the load from vehicles comes on them and it changes the signal. Read More...
|
Civil Engineering |
India |
1050-1052 |
278 |
Min Hash Algorithm in Multi Cloud Storage for Optimizing the Leakage Information
-A. Chiranjeevi ; J S Ananda Kumar
Presently multi day every unmarried one shops their data in cloud. At something point they need facts they sent solicitation to that unique cloud. Numerous plans were as of past due progressed for putting away statistics on various mists. Circulating statistics over numerous distributed garage providers (CSPs) therefore offers customers a selected level of records spillage manage, for no unmarried motive of assault can release all the facts. Be that as it cans spontaneous dissemination of records lumps can set off high facts publicity even at the same time as utilizing extraordinary mists. In this paper, we think about a critical information spillage issue delivered approximately by using spontaneous statistics appropriation in multi-distributed garage administrations. At that point, we present a statistics spillage aware capability framework in multi cloud. We plan an estimated calculation to proficiently create similitude saving marks for facts portions dependent on Min Hash and Bloom channel, and moreover shape a capability to register the statistics spillage depending on those marks. Next, we present a hit stockpiling plan age calculation depending on bunching for conveying records lumps with negligible statistics spillage over numerous mists. Min Hash. In software engineering and data mining, Min Hash (or the min-clever self reliant levels location delicate hashing plan) is a gadget for rapidly assessing. Read More...
|
Software Engineering |
India |
1053-1056 |
279 |
Voter Data Analysis using Attribute based Encryption
-B. Sambasivaiah ; Mr. Dr. K. Venkataramana
In Cloud Storage Services (CSS) to achieving data privacy the Attribute Based Encryption (ABE) schemes face number of essential challenges. The existence of a single authority is one of the crucial tasks for attributes management. Second task is the shortage of an efï¬cient characteristic revocation mechanism that prohibits an unauthorized access without delay after an attribute revocation is requested. The third task is the avoidance of the usage of attribute revocation scenario as a mechanism for user revocation. In this paper, a sturdy established multi-authority attributes management device is provided to conquer those demanding situations for CSS. The proposed gadget can be carried out the usage of either Ciphertext Policy ABE (CP-ABE) or Key Policy ABE (KP-ABE) approach that possesses a speciï¬c set of characteristics. In addition, the proposed gadget presents a novel structure for consumer virtual identity that prohibits the collusion among gadget customers. Moreover, the proposed gadget does not oblige cooperation among the participated attributes government to accomplish any of the proposed system responsibilities. Furthermore, the attributes government can join or leave the proposed machine without mandating the proposed system reinitialization. Finally, the presented performance measures prove the proposed system validity to perform all the speciï¬ed dreams with perfect performance. Read More...
|
Software Engineering |
India |
1057-1061 |
280 |
Customizing Web Analytics using Open Source
-Aman Kasangottuwar ; Prof. Manali Patki; Rashika Manke; Piyush Ojha
Web analytics has been growing very fastly, and it is since the development of World Wide Web. It has grown from a simple function of HTTP (Hypertext Transfer Protocol) traffic logging to a more comprehensive suite of usage data tracking, analysis, and reporting. The web analytics industry and market are also booming with a plethora of tools, platforms, jobs, and businesses. The market was projected to reach 1 billion in 2014. Read More...
|
Information Technology |
India |
1062-1063 |
281 |
Fabrication and Analysis of Helical Spring Load Testing Machine
-Kumaresan .C ; Dinesh .M; Gokulnath .V; Jayasurya .A; Malathi .S .K
A spring stiffness testing machine was produced which differentiates a good spring from bad one using hydraulic principle and locally sourced materials were used to produce at relative low cost and high efficiency. It also categories each spring by stiffness into one of several distinct categories based on its performance under test. This is to ensure that in the final assembly process, springs with similar performance characteristics are mated to ensure a better ride, more precised handling and improved overall vehicle or equipment performance. Taken into consideration under test were types of compression springs with varying spring loading and their different displacement recorded at different pressures to compare their stiffness. Read More...
|
ENGINEERING |
India |
1064-1066 |
282 |
Agricultural Robot for Automoised Fertilizing and Vigilance for Crop
-P. Aishwarya ; T. Dharshini; Ms. Jenny Niveditha
In recent times, smart-phones have become an important part of our daily lives. Now days, the water wastage is major problem around the world. The water consumption will help you to increase the fresh water level. So, water management system is used to decrease the water wastage. The design and implementation of water management system, calculating the respective quantities of water required for the school and for the hospital to run effectively and evaluating the alternative green solutions available to ensure efficient use of water. Installing water flow sensor at every valve and pipes to monitor the establishment s water consumption. The amount water consumed is called based on that the monthly water consumption and cost is calculated. The consumed amount of water and cost can be viewed using webpage. The robot system is used to develop the process of cultivating agricultural land without the use of man power. To reduce the man power, time and increase the productivity rate. Web camera is fixed on the robotic set up, that web camera will continuously monitor the crops. In this project we are designing the agricultural autonomous system which will sense the conditions in real time, we are analyzing the field parameters such as, Temperature, humidity, soil Moisture etc. The soil moisture, Temperature, Humidity sensor is interfaced with the raspberry pi, the sensor will sense the data and it will pass the information to raspberry pi so that it will ON/OFF the DC motor to irrigate automatically. The robot can be controlled through web page. Just giving an instruction on web page the robot will move according to the direction also we can give the command to cut the crop, it will automatically cut the unwanted crop. By giving the command on the webpage, fertilizer will be sprayed on the field. To reduce the man power, time and increase the productivity rate. Read More...
|
Electronics & Communication Engineering |
India |
1067-1069 |
283 |
Improving Data Archival Performance of HDFS in Hadoop by E-PABR Algorithm
-Arambakam Murali ; Ms. C. Yamini
Hadoop Distributed file system (HDFS) is highly a fault-tolerant distributed file system associated with Hadoop framework. HDFS can handle a large amount of {data|of knowledge|of information} known as big data. HDFS deals with information archival as well. data archiving is a phenomenon which finds inactive data and moves it into a separate storage premise. Cloud-based storage facilitates it cost effectively while Hadoop clusters provide the computational power required. However, protecting archived data is the main concern of the information owner purpose of read. Erasure secret writing (EC) may be a methodology that has the mechanism to regain lost data as well. Of late a HDFS was developed to have special data archival features with (EC). The problem with it is that it needs similar the computational price for information of various sizes. Towards this finish, we proposed a methodology to beat this downside. A model application has built to exhibit evidence of the idea. The empirical results revealed that the methodology presented improves the computational efficiency in rendering data archival services. Read More...
|
Software Engineering |
India |
1070-1073 |
284 |
Privacy Preservation of Product Usage Experience of Customer by using Matrix Factorization using Techniques
-M. Rajinesh Reddy ; Dr. K. VenkataRamana
The increasing ability to track and collect large amounts of data with the use of current hardware technology has lead to an interest in the development of data mining algorithms which preserve user privacy. A recently proposed technique addresses the issue of privacy preservation by perturbing the data and reconstructing distributions at an aggregate level in order to perform the mining. This method is able to retain privacy while accessing the information implicit in the original attributes. Some of the most successful realizations of latent factor models are based on matrix factorization. In its basic form, matrix factorization characterizes both items and users by vectors of factors inferred from item rating patterns. High correspondence between item and user factors leads to a recommendation. These methods have become popular in recent years by combining good scalability with predictive accuracy. In addition, they offer much flexibility for modeling various real-life situations. One strength of matrix factorization is that it allows incorporation of additional information. When explicit feedback is not available, recommender systems can infer user preferences using implicit feedback, which indirectly reflects opinion by observing user behavior including purchase history, browsing history, search patterns, or even mouse movements. Implicit feedback usually denotes the presence or absence of an event, so it is typically represented by a densely filled matrix. Read More...
|
Software Engineering |
India |
1074-1076 |
285 |
A Novel Approach on Food Delivery Network Utilizing Spatial Publicly Supporting (SC)
-G Hari ; Mrs. I MadhaviLatha
This paper assembles a Food Delivery Network (FooDNet in short) utilizing spatial publicly supporting (SC). It examines the cooperation of urban cabs to help on interest take-out sustenance conveyance. Not at all like existing SC-empowered administration sharing frameworks, the conveyance of sustenance in FooDNet is additional time delicate and the advancement issue is progressively mind boggling with respect to high-productivity, enormous number of conveyance needs. Specifically, two on interest sustenance conveyance issues under various circumstances are contemplated in our work: (1) for O-OTOD, the nourishment is shrewdly conveyed by taxicabs while conveying travelers, and the improvement objective is to limit the quantity of chose cabs to keep up a moderately high motivator to the partook drivers; (2) for D-OTOD, taxis dedicatedly convey sustenance without taking travelers, and the point is to limit the quantity of chose taxis (i.e., to raise the reward for every member) and the aggregate heading out separation to diminish the expense. A two-arrange approach, including the development calculation and the Adaptive Large Neighborhood Search (ALNS) calculation dependent on reproduced tempering, is proposed to tackle the issue. We have led broad examinations dependent on this present reality datasets, Trial results exhibit that our proposed calculations are more compelling and proficient than baselines, satisfying the nourishment conveyance benefit utilizing fewer taxicabs inside the given time. Read More...
|
Master of Computer Application |
India |
1077-1081 |
286 |
Experimental Investigation on Buckling Behaviour of Light Gauge Steel Section with and without Lip
-V. Kumaran ; C. Priyanka; S. Saral Evangilin; W. Vinesha; S. Dhatchayani
Cold form steel structures are used for numerous purposes in construction industry. An attempt has been made in this study to check the flexural behaviour of cold form steel, a closed built-up channel section with and without lip are experimentally and theoretically studied. Finally the experimental results are compared with theoretical results. Here the cold formed sheet of size 1.2mx2.4m is taken. And by cutting and bending the sheet channel sections with flange 70mm and web 180mm is made. Then the channel section is jointed with plate on both sides by welding inorder to make a built-up section . The distance between two channel section is 30mm and the lip of size 20mm is provided. Then by using 1000kN loading frame machine the built-up section is tested and LVDT is used to measure the deflection. For theoretical calculation IS 801-1987 code of practice for use of cold formed light gauge steel structural members in general building construction is used. Read More...
|
Civil Engineering |
India |
1082-1085 |
287 |
Study of Friction Stir Welding and Materials and Its Properties
-S. R. Abdul Hameed ; J. Kishore; K. V. Abishiek; D. Jegadeesh
Friction stir welding is one of the types of joining process. In a solid state welding process like Friction Stir Welding there is no usage of filler material. In this study, friction stir welding is explained in detailed. Aluminum series of alloys are also explained with its application based on friction stir welding. Normally used tool material is tool steel, Ni alloy, metal carbides etc. The new material are called rhenium alloy which have more advantage is also explained in detailed. Read More...
|
Mechanical Engineering |
India |
1086-1088 |
288 |
Fabrication of Frictionless Electromagnetic Braking System
-S. Palanisamy ; S. Harikrishnan; M. Kannan; P. Durairaja; B. Gokul Kannan
In recent days, braking is affected during rainy, winter seasons or certain places which creates a lot a safety issues regarding the wear and failure of brakes which creates uneconomic car maintenance. The response time or time lag between two consecutive braking is comparatively higher. Heat generation during braking is very high. To diminish these problems to some extent we introduce a new technology, Frictionless braking system. In this system an electromagnet is magnetized by a 12 Volt battery which is powered by a dynamo. An ON/OFF switch is used as an alternate to the brake pedal. Once the switch is ON the electromagnet gets magnetized and stop the motion of the vehicle with quick response. This system provides better response time for emergency situations and in general keeps the frictionless brake working longer and safer. Read More...
|
AUTOMOBILE ENGINEERING |
India |
1089-1092 |
289 |
Effect of Glass Fiber on Strength of Interlocking Concrete Tiles
-Parashuram Lokre
The effect of glass fibre on wet transverse strength, water absorption and compressive strength was studied for different fibre content on M-20 grade concrete designed as per IS10262. The maximum size of aggregates used was 20mm. The size of glass fibres used was 30mm were alkali resistant. To study the effect on wet transverse, compressive strength and water absorption required number of interlocking tiles were casted and tested. The thickness of the tiles was 60mm.The water cement ratio was kept consistent. The mix proportion used was 1:2.26:3.54. Read More...
|
Civil Engineering |
India |
1093-1096 |
290 |
Securing Grouping Sharing of Client Data in Judicial Magistrate by using B-RSA Algorithm
-Chintham Mallikarjun Reddy ; Mr. S. Muni Kumar
Relocation of information from change frameworks/manual tasks to the new framework will incorporate distinguishing proof of statistics motion necessities, amassing and relocation of consumer information, accumulation and relocation of ace facts, shutting or movement of open exchanges, collecting and movement of narrative information, and relocation of statistics from the inheritance frameworks. The SI will play out the records digitization and movement from guide as well as the modern frameworks to the brand new framework. The Data digitization and movement to be performed by using the SI will be long gone before via an appropriate statistics relocation wants evaluation which includes records great evaluation. The notion of RSA relies upon on the way that it is far tough to factorize an expansive entire quantity. The open key incorporates of numbers where one range is augmentation of substantial top numbers. What is greater, non-public key is likewise gotten from a comparable two high numbers. So at the off hazard that an individual can factorize the big wide assortment, the personal thriller is undermined. Therefore encryption extraordinary genuinely lies at the important element length and at the off threat that we twofold or triple the key duration, the splendid of encryption augments exponentially. RSA keys is probably usually 1024 or 2048 bits in period, but execs accept as true with that 1024 piece keys could be broken swiftly. In any case, until now it is miles by methods for all duties an infeasible endeavor. Read More...
|
Software Engineering |
India |
1097-1100 |
291 |
Implementation of BJKST Algorithm for Data Stream Mining
-C. Eswari ; K. Venkataramana
Lately, progresses in an equipment innovation have endorsed higher techniques for the collection records consistently. In enormous wide variety of utilizations, as an instance, a machine observing, the extent of the such records is massive to the factor that it is probably tough to store the information on the circle. In many of applications such as a network monitoring, the volume of the such data is so large that it may be impossible to a store the data on the disk. Also there is not enough space to a store these unbounded data streams. Read More...
|
Software Engineering |
India |
1101-1103 |
292 |
A Efficient TTTD-S Algorithm Used in Deduplication for Secure Storage Data in Cloud
-K. Bhagya Sree ; Ms. S.Anthony Mariya Kumari
Data de duplication is an emerging technology that introduces reduction of storage utilization and an efficient way of handling data replication in the backup environment. in cloud data storage, the deduplication technology, plays a major role in the virtual machine framework, data sharing network and structured and unstructured data handling by social media and, also, disaster recovery. in the deduplication technology, data are broken down into multiple pieces called “chunksâ€. Two Threshold two Denominators (TTTD) emerged to optimize chunking algorithms. Secure deduplication is a system for disposing of copy duplicates of capacity information, and gives security to them[2]. To decrease storage room and transfer data transmission in distributed storage deduplication has been a surly understood strategy, for that reason concurrent encryption has been broadly embrace for secure deduplication. Read More...
|
Software Engineering |
India |
1104-1108 |
293 |
Footings on Granular Trenches: A Correlation between CBR and Plate Load Test
-Athira C. H ; Binil Gopinath
The present investigation is undertaken to study the effect of encapsulated granular trenches in increasing the bearing capacity and settlement resistance under strip footing. To ensure the most efficient use of granular material, rectangular and triangular trenches of various sizes were tested with sand as replacing material with jute geotextile encapsulation. A correlation between CBR and Plate load test were carried to determine the optimum trench configuration and results shows that rectangular trench is efficient in increasing bearing capacity with an optimum trench depth of 1.5B and trench width of 1.6B. Read More...
|
Geo Technical Engineering |
India |
1109-1111 |
294 |
Android Based Application for College Management System
-S. Sulochana
The prime objective of "student out pass application" is to create a full-fledged Android application which could help the students to fill an out pass form and get approval from the consent staff and coordinators at one click. The form will be approved finally by the parent also thus making sure that the student’s activity is brought to parents notice. This helps in avoiding the problems which occur when carried out manually. It improves the efficiency of the system. It is a customized user-friendly application for students which provides out pass information. Read More...
|
Electronics & Communication Engineering |
India |
1112-1114 |
295 |
Effect of Oyster Shell Powder Loading on Mechanical Properties of Natural Jute Fiber/Oyster Shell Composites
-J. Prabakaran ; S. Sivaprakash; P. Surendhar; M. Suriya; B. Vinoth Kumar
The Natural Fiber Composites in India based on a two pronged strategy of preventing depletion of forest resource as well as ensuring good economic returns for natural fiber. Jute with oyster shell powder is mixed to form composite developed as substitutes for plywood & medium density fiber boards. In this project natural fiber composites fabricated, by combining materials of jute with oyster shell powder in chopped form by hand lay method. In this composite, Epoxy resin used as a matrix material. The NFR composite made in different fiber volume fraction such as 35% of Jute and 0% Oyster Shell Powder, 35% of Jute and 2% Oyster Shell Powder, 35% of Jute and 4% Oyster Shell Powder. The mechanical properties of this sample investigated according to the ASTM standards. From the result it observed that the 35% of Jute and 4% of Oyster Shell Powder reinforcement showed the highest flexural strength among the other fiber volume fraction. Read More...
|
Mechanical Engineering |
India |
1115-1118 |
296 |
Classroom Automation using Raspberry Pi
-Mohana Arasi M ; Bharath G; Kiruba Sri P; Miruthubhazini M
This paper depicts a computerized classroom that can be utilized at instructive foundations. Astute classroom comprises of programmed participation passage, entryway locking tasks and control of electric machines, for example, light, fan and projector. The framework depends on utilization of RFID, portable correspondence, Bluetooth and IT innovations. This framework is equipped for gathering, recording and handling information on members of a specialized assembling and their exercises, participation or diverse sessions, visiting distinctive display stalls, and so on. The framework can likewise produce constant consolidated detail writes about participation, inflow and outpouring of the members amid the occasion, their most and least favoured interests and exercises. Electric machines, for example, fan, light and projector can be consequently turned off when it is not being used. This framework bolts the entryway while the individual is not accessible in the classroom and maintains a strategic distance from the unlawful exercises in the classroom. It likewise bolts the when the rooms are not being used and furthermore opens the entryway when there need utilization of rooms. Read More...
|
Electronics & Communication Engineering |
India |
1119-1122 |
297 |
Performance Analysis of Industrial Boiler
-A. H. Rana ; S. H. Zala
Boiler performance analysis is necessary activity in industry to work out it efficiency. Energy efficiency of boiler is key parameter in performance test which indicate how efficiently energy conversion taking place. Inefficient energy conversion leads to waste of energy resource and pollution too. Energy resources are scare and depleting very fast day by day to cater need of large population. Fuel price is increasing day by day therefore its efficient use is prime concern for any industry [1]. The preset work is about performance analysis of industrial boiler which is carried out at Yash Chemicals Pvt Ltd, Bhavnagar. This analysis mainly focus various energy losses in wood fire boiler system. Various losses like heat loss due to flue gas, heat loss due to moisture in fuel, heat loss due to unburnt coal in bottom ash, heat loss due to incomplete combustion of fuel, heat loss due to radiation and convection and heat loss due to insulated and uninsulated surface were calculated by using standard equations [2]. Fuel consumption rate, steam pressure, temperature and flow rate, ambient air temperature, flue gas temperature etc., one month Data is taken for energy analysis. The major energy losses are heat loss due to flue gas (19%), and heat loss due to moisture in fuel (8.8%). It was suggested that to use heat recovery from exhaust flue gas by putting economizer. Fuel (wood) should be dried by a suitable dyer and it should be broken in small sizes between 25mm to 40 mm (according to Bureau of energy efficiency guide line). Proper Insulation and using VFD fan for boiler system could play major role in increase energy efficiency of boiler system. Read More...
|
Mechanical Engineering |
India |
1123-1126 |
298 |
Analysis of Frequent Item Set in Super Market by using Enhanced FP-Growth Algorithm
-D. Jyosthna ; Ms. S. Anthony Mariya Kumari
Association Rules, however the rules itself remains the market analysis is a process to analyze the buyer’s habits to get the correlations between the different items in their shopping cart. Calculated correlations can help the retailers to ascertain a profitable sales strategy by considering frequently purchased items together by customers. Association rule mining is one of the famous data mining techniques used to discover the correlations between one items to another. Association rule mining technique has range of algorithms, but this focuses on the effectiveness. The combination of the three association rule mining algorithms are "FP-GROWTH algorithm". Used to frequent Item sets in supermarket analysis. The collaboration of all algorithms revealed that three ways use the same concept with different criteria of processing the same. Read More...
|
Software Engineering |
India |
1127-1130 |
299 |
Application of ECLAT-Hash Algorithm for Prediction of Share Value in Market
-Y Komala ; Dr. K. Venkata Ramana
The purpose of this is to provide an outline of predictive analysis, review how it is strike data creation in marketing, and recommend future expansions in marketing and predictive analysis for both organizations and researchers. Predictive analysis uses confirmed relationships between variables to predict future outcomes. Findings predictive analysis area unit increasingly well-liked as a result of the substantial contributions they will build in changing info to data. Promoting is among the most persistent applications of the techniques, and whether you are thinking that regarding product growth, advertising, distribution and distribute, or marketing research and business intelligence, data processing and prophetical analysis growingly are being applied. So in our planned implementation paper us area unit using Éclat hybrid formula which is combination of weighted Éclat-Hash tree algorithm for preceding our data sets. For search result. Furthermore this acquire result is additional processed toward FDM (fast distributed mining algorithm) for comparison purposes. Read More...
|
Software Engineering |
India |
1131-1134 |
300 |
A Simple Symmetric Searchable Encryption Scheme for String Identification
-C. Hareesh ; J. S. Ananda Kumar
In this paper, we give an efficient and simple to-actualize symmetric accessible encryption plot for string look, which takes one round of correspondence, O(n) times of calculations over n archives. In contrast to past plans, we use hash-binding rather than chain of encryption activities for file age, which makes it reasonable for lightweight applications. Not at all like the past SSE plans for string seek, with our plan, server adapts nothing about the recurrence and the general places of the words being sought aside from what it can gain from the history. We are the ï¬rst to propose probabilistic trapdoors in for string seek. We give solid verification of non-versatile security of our plan against legit yet inquisitive server dependent on the deï¬nitions of. We likewise present another thought of inquiry pattern privacy, which give same a sure of security against the leakage from trapdoor. We have demonstrated that our plan is secure under hunt design lack of definition deï¬nition. We show why SSE conspire for string seek can not accomplish versatile lack of definition criteria as referenced in. We additionally propose medications of our plan with the goal that the plan can be utilized against dynamic foes at the expense of more adjusts of interchanges and memory space. Read More...
|
Software Engineering |
India |
1135-1138 |