No. |
Title and Author |
Area |
Country |
Page |
301 |
Ways to Improve Spoken English & Gaining Fluency with Accuracy
-Shikha Nandi
English is a global language which is spoken worldwide. English language is the gateway to global growth. The most important function of language is to communicate properly. Hence, English language plays a powerful tool in communication. It bridges the gap between the 2 nations, cultures, state. In order to connect successfully, one needs a language that is normally understood by most of the people. In today’s world, the knowledge of English language makes an individual literate. Those who have the command over the English language are considered and respected highly educated. Moreover, the ocean of career opportunities is opened to those English-speaking people anywhere and everywhere. The main aim of this paper is thus to render solutions to those people who faces problems in English language learning and communication. Though this study will not only remove all the hurdles but yes, practice makes a man perfect. Hence this paper provides you all the basic tips and tricks to improve your skills of English language. This paper not only focusses on the DO’S but on the other hand it equally throws light on the DONT’S which is necessary to keep in mind for a better understanding of the language. Read More...
|
Computer Science and Engineering |
India |
1139-1142 |
302 |
Designing One Bit Adder using Quantum Dot Cellular Automata
-Darpan Gajghate ; Shishir A. Bagal; Manish Potan; Nikita Shelokar; Niranjana Gedam
Quantum dot cellular automation (QCA) is witnessing advancements in nanotechnology in 21st century. Over last 10 years QCA has got tremendous importance as it operate in a very low power, it can attain a very high frequency (usually in Tera-Hertz) and we can make dense circuit for implementing any digital circuit. This work presents a compressed QCA full adder which has an extended ability to form multiple adder circuit. Read More...
|
Electronics Engineering |
India |
1143-1144 |
303 |
Analysis and Design of Airport Hangar
-M. Murugalingam ; S. M. Muhammed Ansar; B. Anbarasan; Daulton Thomas; S. Govindaraju
This paper describes about the planning, analysis and design of portable frame hangar to be built at Chennai. Normally lot of internal space is required for hangar, so it is preferable to build a portal frame. In this project analysis will be done both manually and by using STAADPro. The following components will be designed as per IS Standards Roof truss, purlin, columns, bases and footing will be designed. The hangar to be designed is a "FREE STANDING AIRCRAFT HANGAR". Read More...
|
Civil Engineering |
India |
1145-1148 |
304 |
Secured Cloud Data for Outsourced Enterprise Environment using RSA Algorithm
-Vankireddy Rojeswarreddy ; I Madhavilatha
Numerous associations are creating a lot of information which they have to store yet putting away such vast information is fairly dangerous at a nearby capacity zone. So this framework gives stockpiling as an administration office and cloud specialist co-op. This framework enables the diverse associations to store information at the remote site by paying some sum according to the use. Along these lines, it limits the overhead of putting away substantial information at nearby capacity. Read More...
|
Software Engineering |
India |
1149-1153 |
305 |
Effect of Foundry Sand on the Compaction Characteristics of Metakaolin Soil
-Neethu S S ; Shruthi Johnson
Soil stabilization is a technique of improving the properties of soil such as bearing capacity, shear strength etc. This can be done by using several methods. The usage of admixtures is such a technique. Foundry sand waste is an industrial waste which we can add to improve the properties of soil. It will also solve the problem of disposal of waste foundry sand. The effect of Foundry sand on the geotechnical characteristics were investigated by conducting various tests as per Indian Standard specifications. This paper focuses on the beneficial use of Waste Foundry Sand on the geo technical characteristics of soil and its applications as a soil stabilizer. Read More...
|
Geo Technical Engineering |
India |
1154-1155 |
306 |
Implementation of JFKI to Prevent DoS Flooding Attacks on Network Traffic
-Challa.Lakshmi ; Dr K. Venkataramana
In computing, a denial of services attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or identify disrupting service of a host connected to the internet. There are different types of attacks i.e., ping of Death, Slowloris, SYN Flood, Teardrop attack and UDP Flood. Different methods are used to prevent DOS attacks i.e., Create a DDOS action plane, Improve the security of your internet of Things(IOT) devices, monitor traffic levels, PID and JFKi, In this paper we have discussed about JFKi method to prevent to attacks. Read More...
|
Software Engineering |
India |
1156-1158 |
307 |
Applying Huffman Coding to Images and Data for Compression
-Surekha Kurukunda ; Mr. S. Muni Kumar
Huffman coding is a method of data compression that is independent of the data type that is the data could represent an images and data. This compression scheme is used in JPEG. Huffman coding works by looking at the data stream that makes up the file to be compresses. The image compression is a technology in the field of digital image processing. Images are very important documents nowadays; to work with them in some applications they need to be compressed, more or less depending on the purpose of the application and it reduces the size of the files. The need for an efficient technique for compression of Images ever increasing because the raw images need large amounts of disk space store seems to be a big disadvantage during transmission & storage.so that compression techniques are used. There are various algorithms that performs this compression in different ways; some are lossless and keep the same information as the original image, some others loss information when compressing the image. In this paper we have to propose the Lossless technique method of image compression and decompression using a simple coding technique called Huffman coding. This lossless technique is simple in implementation and utilizes less memory. Read More...
|
Software Engineering |
India |
1159-1162 |
308 |
Secure Data Sharing using Data Encryption Standard in Cloud
-Nara Kalyani ; Ms. C Yamini
The vital objective managing the plan of any encryption calculation must be security against unapproved assaults. Inside the most recent decade, there has been a huge increment in the collection and correspondence of computerized PC information in both the private and open divisions. A lot of this data has a noteworthy esteem, either straight forwardly or in a roundabout way, which requires security. The calculations extraordinarily characterize the numerical advances required to change information into a cryptographic figure and furthermore to change the figure back to the first frame. Execution and security level is the primary attributes that separate one encryption calculation from another. Here acquaints another technique with improve the execution of the Data Encryption Standard (DES) calculation is presented here. This is finished by supplanting the predefined XOR task connected amid the 16 round of the standard calculation by another activity relies upon utilizing two keys, each key comprises of a mix of 4 states (0, 1, 2, 3) rather than the conventional 2 state key (0, 1). This substitution includes another dimension of assurance quality and more vigor against breaking techniques. Read More...
|
Master of Computer Application |
India |
1163-1167 |
309 |
Analysis of Air Pollution Control Devices
-Y. D. Chintanwar ; Dhanshree Rokade; Rechal Chawhan; Samiksha Kawale
There are various sources of air pollution like power plants, oil refineries, industrial facilities, factories etc. It consist of pollutant particles like NOx, SO2, Ozone CO, PM2.5 etc. which are very hazardous to human health. To purify air there are many devices among which fabric filter is most efficient. They collect particles with sizes ranging from submicron to several hundred microns in diameter with better efficiency. Read More...
|
Civil Engineering |
India |
1168-1169 |
310 |
Investigation of Mechanical Properties of Hybrid Jute Fiber Abaca Fiber with Epoxy Composite Material
-J. Prabakaran ; K. Venkatachalam; C. Soundhara Pandiyan; A. Sudhakar; B. Sri Kumaresan
Fibre-hybrid composites are composed of Jute and abaca fibers are matrix. Such composites offer more design freedom than hybrid composites. The aim is often to alleviate the drawbacks of one of the fiber types while keeping the benefits of the other. The hybridization can also lead to synergetic effects or to properties that neither of the constituents possesses. Epoxy resin used as a matrix material. The hybrid composite made in different fiber volume fraction such as 20% of abaca and 15% of jute, 15% of abaca and 25% jute, 17.5% of abaca and 17.5% jute. The mechanical properties of this sample investigated according to the ASTM standards. From the result it observed that the 12.5% of Kenaf and 12.5% of sisal fiber reinforcement showed the highest flexural strength among the other fiber volume fraction. Read More...
|
Mechanical Engineering |
India |
1170-1173 |
311 |
Applying a Modified Cart Algorithm for Analyzing Diabetic Patients
-Chintham Swetha ; Dr. K. Venkataramana
Data mining is the useful tool to uncovering the knowledge from large information. Some methods & algorithms are available in data mining. Classification is most familiar method used for finding the mine rule from the large info. Decision tree learning algorithm has been successfully used in expert systems in capturing understanding. decision tree method normally used for the Classification, because it is the simple hierarchical structure for the user understanding making. Data mining is the process of discovering patterns in large data sets require methods at the intersection of machine learning, statistics, and database systems. It is also called as KDD (knowledge discovery and databases). A decision tree is a tree in which each branch node represents a choice between makings . Decision tree starts with a root node represents a classification or decision. Some methods & algorithms are available in data mining. Classification is most familiar method used for finding the mine rule from the large database. Read More...
|
Software Engineering |
India |
1174-1176 |
312 |
Sharing and Storage of Cloud Data by using Revocable Storage Identity Based Encryption
-T. Vinay Prasad ; C. Hemavathy
Cloud computing provides a flexible and convenient way for data sharing, which brings specific favors for both the general populace and people. Regardless, there exists a component limitation for customers to direct re-appropriate the common information to the cloud server for the reason that information a whole lot of the time includes gainful records. In like way, it is far critical to position cryptographically advanced get entry to oversee at the commonplace statistics. Character based totally encryption is promising crypto graphical rough to create a sensible records sharing shape. In any case, get the chance to govern is not static. That is, the time while a couple of customers endorsement is slipped with the aid of; there ought to be an element which could empty him/her from the structure. Therefore, the denied shopper cannot get to every it in advance of time and in this manner shared measurements. To this give up, we suggest an concept alluded to as revocable-restrict character primarily based encryption (RS-IBE), which can deliver the forward/in inverse protection of have a look at message thru presenting the functionalities of customer refusal and perceive content material supplant the majority of the even as. In addition, we blessing a steady development of RS-IBE, and exhibit its safety in the portrayed well-being appear. The execution relationships exhibit that the proposed RS-IBE plot has functions of aspect interest as some separation as cost and productiveness, and along those follows is suitable for a practical and monetarily sharp records sharing structure. At shutting, we bring execution aftereffects of the proposed association to discover its practicability. Read More...
|
Software Engineering |
India |
1177-1180 |
313 |
An Adapte Analytic Accord Shore Scheme to Anticipate Diabetes Plague using Data Mining
-Jothi Prabha. N ; Ashika. A; Ramya. U
Data Mining plays a systematic role in medical industry for prognosis of diseases. Diabetes disease is one among the major global health problem. Diabetes could be a un wellness within which the body’s ability to supply or reply to the secretion hormone is impaired, leading to abnormal metabolism of carbohydrates and elevated levels of glucose in the blood. This method helps to predict Diabetes. Detecting the disease in early stage can save human life from other health issues which can occur due to Diabetes. This paper provides a survey of information mining ways that are commonly applied Read More...
|
Computer Science |
India |
1181-1184 |
314 |
Analyzing Data for a College Physical Training Center to Future Data Analysis by Exploratory Data Analysis (Era)
-S Reddy Jaipal ; S Muni Kumar
Exploratory data analysis (EDA) is a well-established statistical tradition that provides conceptual and computational tools for discovering patterns to foster hypothesis development and refinement. These tools and attitudes complement the use of significance and hypothesis tests used in confirmatory data analysis. Although EDA complements rather than replaces, use of without EDA is seldom warranted. Even when well-specified theories are held, EDA helps one interpret the results of and may reveal unexpected or misleading patterns in the data. This article introduces the central heuristics and computational tools of EDA and contrasts it with CDA and exploratory statistics in general. EDA techniques are illustrated using previously published psychological data. Changes in statistical training and practice are recommended to incorporate the tools. Read More...
|
Software Engineering |
India |
1185-1190 |
315 |
Intrusion Detection while Sharing through Networks
-Pasupuleti Raja ; Ms. S. Anthony Mariya Kumari
By means of the significant improvement of the usage of computers through the network and spreading out in application running on several platform captures the deliberation toward network security. This suggestion exploits security susceptibilities on the entire computer systems that are theoretically challenging and expensive to resolve. Therefore, intrusion is employs as a key to conciliate reliability, availability and privacy/confidentiality of a computer resource. An Intrusion Detection System (IDS) participates a noteworthy responsibility in detecting anomalies and attacks over’s network. In this research work, data mining conception is integrated with IDS to sort assured the relevant, masked information of interest for the user efficiently and with fewer execution times. Four concerns likely categorization of Data, Lack of labeled Data, Extreme Level of individual Interaction and efficiency of D-DOS are being determined by using the projected algorithms like EDADT algorithm, Semi-Supervised come within reach of, Hybrid IDS model and transforming HOPERAA Algorithm correspondingly. In this paper, proposes a SVM and KNN-ACO scheme for the in. This proposed algorithm shows enhanced precision and concentrated false alarm rate when matched with existing algorithms. Read More...
|
Software Engineering |
India |
1191-1195 |
316 |
Learning Weighted Naive Bayes with Accurate Ranking, using a Correlation-Based Feature Weighting
-Manamasi. Krishna Prasad ; Mr. G. Ananthanath
On the grounds that of its straightforwardness, productiveness and adequacy, gullible Bayes (NB) has stored on being some of the primary 10 calculations within the understanding mining and AI persons crew. Of more than a few ways to deal effortlessly its contingent freedom supposition, spotlight weighting has put more accentuation on particularly prescient highlights than those which are much less prescient. On this paper, we contend that for NB profoundly prescient highlights ought to be very related to the class (finest fashioned pertinence), yet uncorrelated with special highlights (least shared extra). In view of this motive, we propose a relationship centered element weighting (CFW) channel for NB. In CFW, the burden for an element is similar to the contrast between the element type relationship (fashioned importance) and the typical factor highlight inters correlation (usual shared excess). Test results demonstrate that NB with CFW just about beats NB and the more than a few current innovative highlight weighting channels used to believe about. Contrasted with highlight weighting wrappers for making improvements to NB, the principle features of curiosity of CFW are its low computational multifaceted nature (no inquiry incorporated) and the way that it keeps up the straightforwardness of the last model. Additionally, we follow CFW to content order and have complete distinguished upgrades. Read More...
|
Software Engineering |
India |
1196-1199 |
317 |
I-Gaurd (Offline Mobile Tracker)
-Apurva Mane ; Asmita Patil; Divya Gadade; Rashmi Gaikwad
According to the reports of World Health Organization, NCRB social government organization 35%Women all over the world face a lot of unethical physical harassment publicly places like railway bus stands, foot methods etc. so propose system is useful in such things.Propose system offline mobile security feature that takes an image of anyone World Health Organization inputs a phone’s parole incorrectly 3 times or further. Its intent is to help people with stolen phones grab a shot of the criminal, maybe to help phone owner. It works taciturnly. The app uses the front-facing camera to snap a picture of the snoop and email it to you. There area unit several places like Hospitals, petrol pumps, Universities, corporate offices etc. wherever it is clearly mentioned, "KEEP YOUR MOBILE PHONES SILENT!!" over and over individuals forget to change the mobile to the "Silent Mode" which is not possible every time like during an important meeting, lectures etc. This application automatically changes user profile as per location. With the help of propose system user can get any contact from his/her mobile, user can start mobile information and track location by sending specific SMS and point is user can access them from anywhere at any time. Read More...
|
Computer Engineering |
India |
1200-1202 |
318 |
Identifying Dropout Students using ID3 Decision Tree Algorithm
-Venugopalreddy Aalagadda ; Mrs. I. Madhavi Latha
The objectives of this research work is to identify relevant attribute from socio-demographic, academic and institutional data of first year students from undergraduate at the university and in the form of a model machine learning tool that automatically determines whether the student can continue his study or use the classification method based on the Decision tree. For powerful decision making tool different parameter are need to be considered such as socio-demographic data, parental attitude and institutional factors. The generated knowledge will be quite useful for tutor and management of university to develop policies and strategies related to increase the enrolment rate in university and take precautions and advice and reduce student drop. It can also use to find the reasons and relevant factors that affect the dropout students. Read More...
|
Software Engineering |
India |
1203-1206 |
319 |
Maximum Power Extraction for Hybrid Renewable Energy Source Fed Micro Grid using Genetic Algorithm MPPT
-K. Balachander ; K. Niraimathy
A noval method of hybrid system with solar power generation and wind power generation to form a microgrid is proposed. It consists of DC-DC interleaved boost converter for step up of DC voltage from the PV panel. Maximum Power Point Tracking (MPPT) technique used here is genetic algorithm. Genetic algorithm provides a good dynamic response over the non-linearity of the solar PV panel input irradiance variation. The renewable sources forms a common DC link bus where the solar and wind power generation is synchronized and the DC voltage is converted to three phase AC output voltage using VSI with Pulse Width Modulation (PWM) pulse generation. The PWM pulse is generated with PI controller. The output of the proposed system is connected to the grid with nominal voltage and nominal frequency. The proposed system is simulated in the MATLAB / Simulink Simulation software. Read More...
|
Electrical Power System |
India |
1207-1215 |
320 |
Classification of Red Blood Cell using Texture Analysis
-Dharang Sharma ; Kunal Gupta
Red blood cell count plays a vital role in medical diagnosis. If the numbers of red blood cells are less or more in count, it could lead to several diseases. There are several methods to count red blood cells that involve conventional as well as automatic methods. Conventional methods require high skills and experience pathologist to determine the shape and count of red blood cells. This method involves manually counting the number of cells under a microscope that is conducted by a pathologist that usually generates inaccurate results. There are also some automatic methods present that are basically the hardware solutions such as ‘Automated Haematology Counter’ but developing countries such as India are not capable of installing such expensive machines in every hospital laboratory. As a solution, in this project an automated RBC counting and classification system is proposed to speed up the time consumption and to reduce the potential wrongful identification RBC. This paper presents the preliminary study of automatic blood cell counting based on digital image processing. The number of blood cell count the may be use to diagnose the patient as well as detection of important oncogenic patterns. Read More...
|
Computer Science and Engineering |
India |
1216-1220 |
321 |
A Comparative Analysis on Association Rule Mining Techniques with Weight, Privacy and Utility Features
-Deepthi Das .K ; Uma E S
The data mining methods are applied to discoer the hidden knowledge from large databases. The association rule mining methods are applied to discover the frequent item set mining process. The association rule mining method considers only the frequency values. The importance of the attributes are not focused in the traditional rule mining process. The weighed rule mining and utility based mining methods are introduced to discover the rules with item importance analysis. The literature survey is conducted on weighted rule mining, sequential rule mining, privacy preserved mining and utility based mining methods. Distributed rule mining and rule pruning techniques are also analyzed in the comparison process. The high utility rule mining process is build with pruning methods. Read More...
|
Computer Science and Engineering |
India |
1221-1226 |
322 |
Design and Improvement of Centrifugal Pump using Computational Fluid Dynamics
-Anil Maruti Mohite ; Satyam Surendra Tiwari; Suraj Sunil Shinde; Priyanka Vitthal Ekhande
Centrifugal pump are a sub-class of dynamic axi-symmetric work absorbing turbomachinery. Centrifugal pump are widely used for pumping water from over short to medium distance through pipelines where requirements of head and discharge are moderate. This project is focused to enhance the centrifugal pump through design modification of centrifugal pump. The pump designed in software CFturbo (10.2). CFD analysis of centrifugal pump used to unsteady reynold’s average navier stroke equation together with two equation k-epsilon turbulence model. Pump impeller models have been recreated for critical design parameters of the pump. CFD analysis is done in the model to predict the pump performance. Read More...
|
Mechanical Engineering |
India |
1227-1229 |
323 |
Prediction of Throat Cancer using Naive Bayes Decision Tree Classification Techniques
-T. Sreelatha ; G. Ananthnath
Throat Cancer is one of the large issues today, diagnosing Throat malignant boom in prior stage is as yet trying for professionals. Distinguishing proof of hereditary and ecological elements is essential in developing novel strategies to understand and anticipate malignancy. Accordingly a novel multi layered strategy becoming a member of bunching and desire tree process is utilized to assemble a Throat malignant growth threat expectation framework. The proposed framework is predicts Throat cancer growths and it is simple to understand and cost sparing. This exploration makes use of statistics mining systems, for example, characterization, grouping and expectation to differentiate potential disease patients. We have proposed this Throat cancer growth expectation framework dependent on records mining techniques. We to start with propose the transitive end based totally requirement spread technique, which makes usage of the transitive conclusion administrator and the fondness engendering to cope with the most important impediment. At that factor, the abnormal subspace based totally semi-supervised clustering form with a lot of proposed certainty elements is meant to deal with the second one constraint and deliver gradually constant, powerful and genuine outcomes. This framework gauges the danger of the Throat ailment in the prior stage. This framework is authorized by using different it is expected results and affected person s ahead healing info. The first purpose of this version is to supply the earlier note to the shoppers and it is moreover fee effective to the customer. At long closing associate degree expectation framework is created to have a glance at chance stages which assist in visualization. This examination enables in vicinity of an man or woman s inclination for malignant increase earlier than going for scientific and lab tests that is price and tedious. Read More...
|
Software Engineering |
India |
1230-1233 |
324 |
Reducing the Waiting Time of a Treatment Report by using K-Means Algorithm in Big Data
-Y. Sivamma ; C. Yamini
K-means is one of the simplest unsupervised learning algorithms that solve the well known clustering problem. The procedure follows a simple and easy way to classify a given data set through a certain number of clusters fixed apriority. The main idea is to define k centers, one for each cluster. These centers should be placed in a cunning way because of different location causes different result. In this research work, proposed algorithm will perform better while handling clusters of circularly distributed data points and slightly overlapped clusters. Big data is a time period used to consult records sets which can be too large or complex for traditional facts-processing utility software program to effectively address. Big information demanding situations include taking pictures statistics, records garage, statistics evaluation, search, sharing, switch, visualization, querying, updating, records private ness and records supply. Read More...
|
Software Engineering |
India |
1234-1236 |
325 |
Rainfall Prediction using Linear Regression Model
-Arundhati T R ; Agalya S; Annapoorani S S; C Geetha
Rainfall prediction is considered to be one of the important weather forecasting related research since rainfall heavily affects our nature and surroundings. Natural phenomenon such as flood, draught, weather indicators such as relative humidity, etc. are highly affected by rainfall. In the existing system, a hybrid neural network based two-step prediction model is developed. The training phase is developed by using a collection of datasets. Greedy forward selection algorithm is used for feature selection. In the proposed system fuzzy logic method is used. The fuzzy logic Algorithm is an influential algorithm for mining frequent item-sets for Boolean association rules. Rainfall occurrence dataset is collected through global predictions and which can be converted into a readable format through MATLAB commands. Read More...
|
Computer Science and Engineering |
India |
1237-1240 |
326 |
Writer Classification based Edge-Hinge Directional Features and Genetic Algorithms
-Bhumika Baboria ; Prabjot Kaur; Bhanu Gupta
The Handwriting Recognition enables a person to scribble something on a piece of paper and then convert it into text. If we look into the practical reality there are enumerable styles in which a character may be written. These styles can be self combined to generate more styles. Even if a small child knows the basic styles a character can be written, he would be able to recognize characters written in styles intermediate between them or formed by their mixture. This motivates the use of Genetic Algorithms for the problem. In order to prove this, we made a pool of images of characters. We need to convert them to graphs. The graph of every character was intermixed to generate styles intermediate between the styles of parent character. Character recognition involved the matching of the graph generated from the unknown character image with the graphs generated by mixing. Read More...
|
Image processing |
India |
1241-1244 |
327 |
Optimization of CNC Face Milling Process by using Different Coating Inserts - A Review
-Sumaiyya Shahajahan Nadaf ; Minakshi Y Shinde
Productivity and Quality play important role in today’s manufacturing market. In machining operations, for machined products Achieving desired surface quality like surface roughness and flatness, maximum material removal rate and minimum power consumption is really a challenging job on vertical machining center. Due to very exacting and challenging competitive market condition in manufacturing industries. The main objective of any industries reveal with producing better quality product at minimum cost and increase productivity. CNC milling machine can give better quality product with dimensional accuracy and good surface quality with minimum time. To obtain main project an attempt is made to understand the effect of machining parameters such as spindle speed(rpm), feed rate (mm/min),depth of cut (mm) that are influences on responsive output parameters can be measured by using optimization technique. In this work three levels and three parameters are considered; and L27 orthogonal array should be carried out by using two different insert coatings PVD and CVD coated inserts and compare both them. For the experimentation the wet conditions is taken. In this optimization of milling process parameters using Taguchi method in machining of Mild steel IS 2062 is carried out. Read More...
|
M.Tech MECHANICAL ENGG |
India |
1245-1249 |
328 |
Generation of Electricity using Campus Food Waste
-Prof. P. D. More ; Chavan Chandrakanta Chandrakant; Wavare Shubhangi Chandrakant; Kolekar Monika Baban; Devakate Deepashri Datta
In our institution we have one food court having there are three messes and international school have two messes. These all mess are produce large amount of kitchen waste which can be used for biogas production. Anaerobic digestion is used for biogas production. Our Project is to create an Organic Processing Facility to produce biogas which will be more cost effective, eco-friendly. It will generate renewable fuel. Kitchen waste is collect from different messes of Sanjay Ghodawat Institute. The anaerobic digestion of kitchen waste produces biogas, which consist of primary methane (CH4) & Carbon dioxide (CO2). Biogas can be used as energy source & also for numerous purposes. But, any possible applications require knowledge & information about the composition & quality of constituents in the biogas produced. For this we have made experiment on food waste potential for production of biogas & study its economical feasibility. With our calculation of 84kg, 0.84 cubic meter production of biogas is possible. With this equation electrical power of KW is possible for generation. Read More...
|
Electrical Engineering |
India |
1250-1252 |
329 |
Novel Design of Crusher and Digester for Generation of Electricity using Campus Food Waste
-Vaishnavi Pravin Salunkhe ; Pradnya Sampat Mohite; Samruddhi Ashutosh Patil; Mayuri Rajendra Mali; Komal Rajaram Pawar
To extract the power from biogas available in Campus after design of crusher and digester plays important role for generation of electricity using waste food. As in the waste food waste is available in different sizes so that is necessary to crush into small particles that will be helpful for bacteria to consume organic matter efficiently. For designing of crusher some calculations are carried out. For digestion process fixed dome type digester is used. There are two methods of digestion process first is aerobic and anaerobic digestion. Anaerobic digestion is more efficient that aerobic. So that anaerobic digestion processes is used. In anaerobic digestion processes the digestion will be takes place in the absence of oxygen. Then this biogas produced is given to generator for electricity generation purpose. After that electricity produced is used in classroom and computer lab in college campus. Read More...
|
Electrical Engineering |
India |
1253-1254 |
330 |
Privacy Protection of Encoding and Decoding Information using Genetic Algorithm
-Ms. K. Lakshanaa ; Ms. U. Ramya; Mr. K. P. Adarsh
These days data is critical in numerous fields, for example, drug, science and business, where databases are utilized viably for data sharing. Nonetheless, the databases face the danger of being pilfered, stolen or abused, which may result in a great deal of security dangers concerning possession rights, information altering and protection assurance. Over the span of ongoing years, reversible watermarking methodology for social databases have been proposed to give security of ownership rights, data solidifying and data trustworthiness. Basically these strategies ensure novel data recovery from watermarked data while irreversible watermarking plans simply guarantee ownership rights. This typical for reversible watermarking has created as a confident response for the protection of ownership benefits of data, excruciating to changes, for instance, helpful data, inherited data, charge card and money related parity data. Reversible watermarking is used to ensure data quality nearby data recovery. In any case, such techniques are ordinarily not healthy against malevolent attacks and do not give any segment to explicitly watermark a particular attribute by thinking about its part in data disclosure. Along these lines, reversible watermarking is required that ensures; (I) watermark encoding and unwinding by speaking to the piece of the impressive number of features in data exposure; and, (ii) one of a kind data recovery inside seeing powerful vindictive attacks. In this paper, an incredible and semi-amaze reversible watermarking technique for numerical social data has been prescribed that keeps an eye on the above objectives. Watermarking frameworks have genuinely been used to ensure security to the extent ownership protection and fixing for a wide arrangement of data bunches Watermarking has the property that it can give ownership protection over the propelled substance by indicating the data with a watermark intriguing to the owner. The embedded watermark can as such be used for showing and affirming ownership. Read More...
|
Computer Science |
India |
1255-1258 |
331 |
Properties of Sabarmati River Sand
-Yogeshwarsinh Ajitsinh Chauhan ; Mauni N. Modi
This study mainly focus on characteristic of sand of Sabarmati river. Representative soil samples were collected from the Sabarmati River bed near Gandhinagar area and were investigated as per Indian standard for their index properties with a view to classifying for their use in infrastructural development. Mainly this location is leading sites of sand mining from where the soils are supplied as construction material. Mainly three samples were collected. These samples were classified as per depth at which these samples collected. Read More...
|
Civil Engineering |
India |
1259-1261 |
332 |
Trolley Based Automatic Billing System
-P. Tamilarasu ; G. Kowshika; S. Karthika; R. Rhohithkumar
Now a days despite the presence of online shopping people choose to buy products only in supermarkets and in megamalls for the sake of their own satisfaction. One of the common difficulties faced by customers in supermarket is to follow the long queue for billing the items purchased. Even though if the customer purchased only one or two products there is no other way that the person has to wait in a queue for billing items. Another difficulty lies in pulling the trolley from rack to rack and collecting items and the customer has to keep track of the items purchased in order to fit within his budget. In order to avoid such headache of pulling the trolley, waiting in a queue for billing, thinking of budget, we propose a system which makes shopping much easier and reliable. Our aim is to design a smart trolley which follows a customer while purchasing and all the billing operations are performed in the trolley itself. By using RFID technology the product is scanned and the purchased product information will be sent to the central billing system through zigbee module. At the billing section the customer has to tell the trolley number and pay for the items purchased. The proposed system prevents theft and also facilitates the users in case if the product is dropped unknowingly in the cart by cautioning them. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
1262-1264 |
333 |
Low Cost Water Purification Technique
-Mrs. Prof. Thorat Nilam Pramod ; Prof. D. B. Patil; Mr. S. D. Jagtap; Mr. A. J. Patil; Mr. V. T. Gaikwad
Clean water use being a prime concern in many communities of developing countries. Contaminated water plays significant role in taking numerous lives in these localities, for which a number of efforts are being made for accessing safe purified drinking water. Fortunately, efficient and cheap water purification systems are being utilized and being tried to be accessed worldwide for easy access to clean water. In the following project we had tried to develop a “Low Cost Water Purification Technique†using the basic ideas of Slow Sand Filter, some locally available filter material like charcoal, bone char, sand, manganese modified sand, clay, rice husk, banana residue ash, anthracite and try to improve the methodology using the UV Filter, RO Filter, and Activated Carbon Filter mechanism. Main focus was removal of turbidity from surface water by adsorption and oxidation followed by precipitation technique. Rice husk, which considered a waste, has a high level of silicon. This paper investigates the use of carbonized rice husk and wood charcoal in water purification. The carbonization was done using a handmade carbonizer. The preparation process starts with the production of a precursor that is rich in carbon through the pyrolysis of the rice husk in an inert atmosphere. The results show an important contribution of the use of carbonic materials, by giving a direct evidence of the permanence of sodium ion Na+ in activated carbon. The results also show that the utilization of wood charcoal and rice husks in the purification of water is quick, efficient and economically viable. Read More...
|
Civil Engineering |
India |
1265-1268 |
334 |
PV Solar Cell and MAG-LAV Wind Power Hybrid for Irrigation System
-Prachi Satishrao Damedhar ; Rashmi Shing
This work describes the implementation of VAWT and solar panel for electricity generation from renewable energy sources that are wind energy and solar energy respectively. The VAWT worked on electromagnetism principle has suspension system of permanent magnets instead of ball bearing used in conventional wind turbines. The electrical energy generated by this hybrid system is then used for streetlight purpose. Read More...
|
Electrical Power System |
India |
1269-1271 |
335 |
Low Power Excavating the Hidden Parallelism inside DRAM Architectures with Buffered Compares
-Srisrinivasan K ; Senthilkumaran V
I propose the approach called buffered compares, a less-invasive processing-in-memory solution that can be used with existing processor memory interfaces such as DDR3/4 with minimum changes. The design is based on observation that multibank architecture, a key feature of main memory Dynamic RAM devices, can be used to provide huge internal bandwidth without any modification. i place a small buffer and a simple ALU per bank, define a set of new DRAM commands to fill the buffer and feed the data to the ALU, and return the result for a set of commands (not for each command) to the host memory controller. By exploring the under-utilized internal bandwidth using ‘compare-n-op’ operations, which are frequently used in many applications, i not only reduce the level of energy inefficient processor–memory communication, but also accelerate the computation of big data processing used by utilizing parallelism of the buffered compare blocks in Dynamic RAM banks. i present two versions of buffered compare architecture full scale architecture and reduced architecture in trade of performance and power. The experimental results show that our solution significantly improves the performance and efficiency of the system on the tested tasks. Read More...
|
VLSI |
India |
1272-1275 |
336 |
Design and Analysis of Fulcrum Cycle
-Deepak B Dukale ; Kunal Deshmukh; Aniruddha Gavade; Ashish Ingawale; Ganesh Povekar
Conventional bicycle is exhaustive for long drives as it causes fatigue to the knees. To overcome this there is advancement in cycle technology leading to fulcrum bicycle. This bicycle works on the lever principle instead of conventional circular pedalling. The cycle has the same sprocket and chain mechanism but a slight difference in the process of actuation. Lever principle provides mechanical advantage which helps in reducing the fatigue caused by conventional cycling. One end of the lever is connected to the pedal whereas the other end is connected to two binary links. The primary link undergoes slight oscillations providing rotary motion to the secondary link which rotates the axis shaft of the sprocket. Conventional cycle has the pedals attached to the secondary link. The lever length and the length of primary link can be changed in accordance to the convenience needed by the rider. Read More...
|
Mechanical Engineering |
India |
1276-1278 |
337 |
IoT based Smart Bulb
-Sayali Arunrao Ghude ; Diksha Kamble; Shruti Ghagre; Shraddha Ingle; Rahul R. Burange
This project deals with the design & analysis of the Microcontroller based Smart battery charger specifically designed for multimode operation to ensure no power cut. The main objective of this project is to provide uninterrupted power supply to a load by selecting the power supply from multiple sources such as Mains, Solar Power, Battery Bank and Generator automatically on the basis of their preference. The design and performance analysis of a power factor corrected (PFC), single switch forward buck converter proposes Smart Charger is carried out for low power battery charging applications. The main features of battery charger are low cost, fast charging, high power factor, high efficiency, minimum ripple and high reliability. The concept of this project is the combination of solar power inverter, wireless power transfer concept used for the generation of power and Internet of Things (IoT) based home automation system. The advantage of this project is to provide access to an everlasting and pollution free source of energy. This option is provide to use the system in two possible operating modes; the stand alone mode which is used to satisfy this needs, and the grid connected mode which used to sell electricity to utility when in excess; thus eliminating the need of battery storage. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
1279-1282 |
338 |
Effect of Material Parameters on the Mechanical Behaviour of Hybrid Natural Fiber Composites
-C. Praveen Kumar ; V. Saran Raja; K. Prakasam; G. Rajesh Kumar
Fiber reinforced polymer composites play vital role in wide variety of applications for their high specific strength and modulus. Although the glass and other synthetic fiber reinforced plastics possess high specific strength and modulus, their field of application is limited because of their high cost. But the natural fibers are light weight and cheaper. Areca and Calotropis fibers are easily available in India. The present work deals with the development and characterization of hybrid composite material reinforced with areca and Calotropis fibers with various process parameters. The effect of alkaline treatment on fibers has been studied. The composite materials were developed with various composition and different lengths of areca and Calotropis fibers. They were tested for the tensile strength, and impact strength to study the performance characteristics of this composite material and to select the best composition and length of the fiber for suitable application. Read More...
|
Mechanical Engineering |
India |
1283-1285 |
339 |
Design and Fabrication of Six Jaw Chuck
-R. Arun Kishore ; S. Hari Haran; S. Jakir Hussain; B. Dhinesh; M. Herose Arockiaraj
In this project, the six jaw chuck is designed and fabricated with provision of replaceable soft jaw. Standard chuck in the market has only hard jaws and soft jaw in two jaw and three jaw chuck type In our project, six jaw self centering chuck uses soft jaws. So, it can hold various type of work piece of different materials. Read More...
|
Mechanical Engineering |
India |
1286-1289 |
340 |
Advance Level Hand Gesture Recognition for Day to Day Life Use
-Siddharthsinh Pradumansinh Yadav
In this technical era life is becoming easier day by day. But its not the same for disabled people also. As they can not use all the technologies. Blind people can not use smart phone as efficiently as we can, as they can not see where to touch. So with this hand gesture recognition we can make their life easy as they would be able to do it now with their hand gestures without needing to know where exactly to touch. The system is able to recognize 27 different and easy gestures which anybody can use easily in daily life. Read More...
|
Machine Learning |
India |
1290-1292 |
341 |
New Construction Materials and Techniques for Effective Noise Control in Industrial Sectors
-Pramod Raghunath Thorat ; Mr. Ashish J. Babar; Mr. Avinash R. Londhe; Mr. Vipul N. Kumbhar; Mr. Vilas K. Pawar
A comfortable workplace free from unwanted noise is dream of every industrial worker. In heavy industries workers are continuously exposed to noises the whole work day.Higher noise level in heavy industries is harmful for workers. It causes ill effects like hearing loss, tired, weakness, higher blood pressure on health of industrial workers. Therefore, to improve the environment of the workplace and reduce unwanted noise in industries it is very important to find out effective and harmless noise control methods. The research work was conducted to investigate use of natural materials for industrial noise reduction to give effective solution for existing industrial noise problem .specimens having size of 75 mm (dia.) and 12.5mm, 25mm (thick.) were cast using material via; Salvinia Bagasse, Cement, Adhesive wood grip). Salvinia and Bagasse mixed with cement at ratio 1:0.5:0.5and 1.5:0.5:0.5 with addition of water. Noise reduction coefficients of prepared specimens were calculated by using an experimental set-up. Experimental set-up consisted Noise level meter, function generator, speaker. Noise reduction capacity of materials was calculated by using Noise reduction coefficient (NRC). Effectiveness of natural materials for industrial noise reduction is discussed in this paper. Read More...
|
Civil Engineering |
India |
1293-1295 |
342 |
Industrial Energy Audit and Statistical Analysis
-Buddhabhushan Nagrale ; Prof. Vaishali Surjuse; Sumit Katore; Tarak Chitriv; Roshan Wasnik
The Smart Grid is an expansion of the current electricity grid. It comprises of a two-way transmission where electricity and information are interrelated by the end user and utility to amplify efficiency. Advancement in technologies has contrived homes a better planning, efficient and even more guarded. Familiarizing Arduino-UNO to the domain of home automation contribute plentiful customizations to turn a regular home into a smart home. The main objective is to provide a low cost setup/platform for interconnection electrical/ electronic devices and various sensors in a home via internet of things (IoT). The main goal of present scenario of work is to design a smart grid using various sensors which can be monitored and controlled by the Arduino-UNO via the Internet of Things (IoT). This will provide a simple, fast and reliable way to automate their environment and thus will play a major role to the owner. This paper proposed a system composed of digital sensors, communication, and control devices and field technologies that function to provide systematization for various electric parametric processes. The proposed system of grid setup includes an application to engineer and monitor new data and thus permitting relevance for more efficient and dynamic analysis of grid operations. The information provided by the system will thus enable to take informed decision about a plan for managing energy treatment. Read More...
|
Computer Network Engineering |
India |
1296-1299 |
343 |
CMOS Design and Comparison of Instrumentation Amplifier using Traditional Method and GM/ ID Method using Cadence 180nm Technology
-Sivakarvendhan ; Vishnuvaman .D; Sarankumar .T; Prabhu Raj .M
Instrumentation amplifiers are important integrated circuits when dealing with low voltage situations. This application note will teach the reader how to design an instrumentation amplifier by discussing important characteristics and by deriving a transfer function. An instrumentation amplifier is an integrated circuit (IC) that is used to amplify a signal. This type of amplifier is in the differential amplifier family because it amplifies the difference between two inputs. The importance of an instrumentation amplifier is that it can reduce unwanted noise that is picked up by the circuit. The ability to reject noise or unwanted signals common to all IC pins is called the common-mode rejection ratio (CMRR). Instrumentation amplifiers are very useful due to their high CMRR. Other characteristics, such as high open loop gain, low DC offset and low drift, make this IC very important in circuit design. Read More...
|
ENGINEERING |
India |
1300-1303 |
344 |
Use of Blast Furnace Slag (Iron Slag) in Paver Blocks
-Vaishali Badwaik ; Chaitanya Zade; Pranit Kolhe; Shubham Velani; Vanshree Wahane
The research exploits blast furnace slag as a replacement of sand on the physic-mechanical properties of concrete. The main objective of this experiment is to study the use of by-products like blast furnace slag. In addition to it also helps in reducing the cost of manufacturing concrete. This will be beneficial, the use of this waste material will save the cost as well as it will protect the environment from the effects of more pollution. The recyclable blast furnace slag is replaced with sand with the mix ration of 1:1.3:2.6 the percentage replacements are (50%, 75%, and 100%). Compressive test is conducted in this experiment. The results of compression test shows improvement after the use of blast furnace slag as a replacement of sand in concrete mixture. And this is helping towards the sustainable development. The optimum results of 80mm paver blocks is In between 30% to 40% more after the use of Blast furnace slag. Read More...
|
Civil Engineering |
India |
1304-1306 |
345 |
Improving the Prediction Accuracy of Liver Disorder Disease with Oversampling
-B Umadevi ; G. Ananthanath
Data mining is the useful tool to acrooss the knowledge from large data. Different methods & algorithms are accessible in data mining. Classification is most common method used for finding the quarry rule from the large database. decision tree method generally used for the Classification, because it is the simple hierarchical structure for the user understanding Liver disorder diseases one of the main diseases within the world, Liver is one in all the massive solid organ within the physical body and is additionally thought-about a gland because, among its many functions, it makes and secretes bile. The liver coliseum vital role in many physical functions from protein manufacture and blood clotting to fat, sugar and iron metabolism. Liver disorder diseases area unit any bother of liver purpose that reason for illness. The experiment performed by using totally different data mining classification algorithm to get better result compared with the earlier liver diseases prediction study. All experiments are executed within the weak tool. The study of paper to predicting and analyzing liver disorder diseases to produce better performance accuracy by comparing numerous data mining classification algorithm and the performance of the accuracy is measured by confusion matrices. Read More...
|
Master of Computer Application |
India |
1307-1310 |
346 |
Shell and Tube Type Heat Exchanger
-Akash Waghumbare ; Aquib Shaikh; Uddhav Bobade
A heat exchanger design is the procedure of satisfying a design of heat transfer rate and heat transfer area and checking the assumed design satisfying (with trial and error method )consider parameter or not the purpose of this paper is to design the shell and tube type heat exchanger with use of various type of fluids to fluid or air heat transfer the general design and consideration and design procedure is written in this paper in this calculation we calculate heat transfer rate and area with the given temperature requirement of hot fluid and cold fluids. Read More...
|
Mechanical Engineering |
India |
1311-1315 |
347 |
GWCET Training and Placement Portal
-Papul P. Khapekar ; Tanmay Sherekar; Smit Kharkate; Shashank Bansod; Prof. N. I. Jagtap
In the portal students can do registration with simple registration process after that student build their profile as per academic achievement admin can view the students profile and company profile also. Company also goes to the simple registration process, but company account activation done after the admin approval. Company post their placement openings with special requirements and the students applied directly from their own account. Company can see the applied students list and take them to the hold or reject as per criteria. Company and students have change password facility with the special encryption technique. Company can change their HR. name if there officer is changed. And admin have full facility to manipulate the data, T&P officer can see the statistics related to training and placements. Read More...
|
Computer Science and Engineering |
India |
1316-1319 |
348 |
The Experimental Study of Strength Properties of Polymer Concrete by using Manufactured Sand
-Sanket Gharge ; Prafull Bhosale; Anant Ingole; Sagar Suryawanshi; Prof. B. M. Mohite
This project deals with study of strength of polymer concrete by using manufactured sand. These studies involved high strength concrete HSC, were highly dependent on the quality of ingredient– materials. The objectives of this study were to reduce the production cost, time required and to improve HSC properties by providing control mixes and using Orthophthalic polyester resin as partial cement replacement. This was done by experimentally investigating the HSC production using 8%, 10% and 12% replacement of cement by Orthophthalic polyester resin and selecting the optimum replacement content. Orthophthalic polyester resin additions further improved the workability. The concrete specimens were subjected to different tests such as compressive strength test, flexure strength test. Read More...
|
Civil Engineering |
India |
1320-1322 |
349 |
Performance of High Strength Self Compacting Concrete at Elevated Temperature
-Salagala Surya Prakash ; K. Srinivas; SK. Shajahan
The High Strength Self Compacting Concrete comprises of higher level of fines when contrasted with the customary cement. So it has higher danger of spalling when presented to lifted temperatures due its conservative miniaturized scale structure. In this examination the impact of hoisted temperature running from room temperature to 600oC for various lengths on the compressive quality and weight reduction of high quality self-compacting cement of review M70 with Fly fiery remains and Micro Silica as mineral admixtures. The blend extents are gotten based on NAN-SU blend structure. This plan depends on pressing element (PF) of total and W/C proportion and FA/CA utilized are 0.25 and 52/48 for various Packing Factors. The water concrete proportion is considered from writing survey. Pressing variable of total is characterized as the proportion of mass of total of firmly stuffed state in SCC to that of approximately pressed state. Extents of Coarse total, Fine total, Fly Ash, Super plasticizer and water cover proportions are unique and extents of Cement, Micro Silica and VMA are consistent for various Packing Factors. The rates of Micro Silica and VMA included are 7% and 0.3% for all blends. It is seen that the rate of abatement in compressive quality of High Strength Self Compacting Concrete (HSSCC) is increasingly when contrasted with High Strength Vibrated Concrete (HSVC) of same review at higher temperatures, and also rate in loss of weight in HSSCC is progressively when contrasted with HSVC of same review at high temperatures. (i.e.at 600 0C). It is distinguished that, when the temperature is under 2000C the lingering compressive quality and misfortune in weight of HSSCC is less contrasted with HSVC. At the point when the temperature is above 4000C the lingering compressive quality and misfortune in weight of HSVC is less contrasted with HSSCC. Read More...
|
Civil Engineering |
India |
1323-1325 |
350 |
An Efficient 2-Wheeles Purchase Predication by J48 Datamining Techniques
-K. Navya ; Dr. K. Venkataramana
Today the computer technology and computer network technology has grown so much and is still developing with pace. Thus, the amount of data in the news industry is getting higher day by day. Among the different data mining techniques, call Tree is also the popular one. Decision tree uses divide and defeat technique for the basic learning strategy. A decision tree is a flow chart-like construction in which each internal node represents a "test" on an attribute where each branch represents the outcome of the test and each leaf node represents a class label. This paper study various data mining Algorithms of the decision tree, J48, Naïve bayes. Read More...
|
Software Engineering |
India |
1326-1329 |