No. |
Title and Author |
Area |
Country |
Page |
101 |
Importance of Time in Our Life
-Preetha Banerjee
Time is defined as the duration in which all things happen, or a precise instant that something happens. One of the most essential life skill is time management. Time management is also life management. Learning every day how to make count for something is the objective. The article examines the reasons for the popularity of time management in this era. A successful transition from young to adulthood requires that a person finds a balance across competing activities in- order to accomplish their daily activities. We see the youth around us spend their time in a frenzy of activity but achieve very little because they are not concentrating on the right things. People are perpetually busy but it does not necessarily mean that they make optimum utilization of their time. Hence there is a great need for effective Time Management in our lives today. We keep hearing the word "Busy" a lot. There are two kinds of busy, chaotic, disorganized busy and calm effective busy. It goes hear the refrain that we without saying that being the latter take up. Improving our "effectiveness Quotient" calls for mastery of basic time management skills. We will be well on our way to the top if we know how to squeeze the most out of even a minute managing time. Time can be divided into three aspects for applying techniques of managing it; biological time that pertains to body functions. Social time pertains to self, family and society and professional time pertaining helps to pack in more productivity in your work. We constantly do not know where the time goes. Whether you are an executive, a student or a homemaker, you need to achieve more in every minute of the day and to enjoy each task that you time spent at work. It is essential to maintain equilibrium between these three aspects. Any imbalance may prove to be detrimental to one’s physical and mental health and can adversely affect the individual in the long run. It is essential, therefore, to allocate one’s time in balanced manner to the extent possible to all these three aspects. The most important of all the time management is the professional time. In this aspect, one has to manage time during the fixed working hours. Your aim should be to optimally utilize the available time for maximum productivity. It is, therefore, essential to plan one’s work on daily basis and time taken to carry out the work in an efficient manner. Also identify the ‘time wasters’ and make efforts to eliminate or reduce them. This will help in a great deal to increase the efficiency of your work and you will be cynosure of all eyes for producing maximum output during the given time. Read More...
|
Humanities |
India |
378-381 |
102 |
A Review on DDOS Attack, TCP Flood Attack in Cloud Environment
-Vivek Anjan Shrivastava
Trend of victimization cloud computing within the field of knowledge Technology to affect providing climbable and versatile facilities to the purchasers as per demand is rising recently. Cloud computing compromises services in 3 levels referred to as infrastructure, platform and package to affect the requests of form of customers. The straightforward cloud characteristics enclose with multi abidance, location and device independence, elasticity, resource pooling and measured service. because the use of theses service will increase the a lot of there
s security concern as a result of the a lot of variety of IT capabilities provided as a service in cloud, the a lot of the chance in security is concern. From the assorted attacks which will affect the cloud setting, TCP Flood, DDoS attacks will reason a significant breach in security. For coping with DDOS attacks there area unit numerous techniques and ways that area unit supported associated condition of true which will be additional categorised as interference, detection and reaction thats once effects. a lot of exactly this leads from avoiding prevalence of DDOS, acceptable solutions to observe once it occurred and correct technique to handle this denial of service attacks while not obtaining system services unrealizable by user. Read More...
|
Computer Science and Engineering |
India |
382-386 |
103 |
Research Study on Waste Glass Powder Partial Replacement with Cement Concrete
-Pokala Adithya ; Konnoju Saikumar Chary
This study was conducted to investigate the effect of using waste glass powder in concrete. Laboratory work was conducted to determine the performance of control sample and concrete with used waste glass powder. The performance of these types of concrete was determined by the workability test, density test and compressive strength test. The workability of concrete is determined using slump test and compacting factor test. Meanwhile, compressive strength test is done to determine the strength of concrete. For each type of concrete, a total of six 150mm x 150mm x 150mm cubes were cast. The cubes were tested at the ages of 7, 14 and 28 days to study the development of compressive strength. The results indicate that the concrete with using waste glass powder were able to increase the workability of concrete and also the compressive strength. However, the density is reduced compare to standard mixture of concrete. Read More...
|
Civil Engineering |
India |
387-390 |
104 |
Experimental Study on Granite Quarry Dust as Partial Replacement of Sand in Concrete
-Pokala Adithya ; K. Sai Kumar Chary
The demand of natural sand in the construction industry increased resulting rapid depletion of natural river beds and acute shortage of natural sand resulted in increase of construction cost. This experimental study presents the variation in the strength of concrete when replacing sand by granite quarry dust from 0% to 100% in steps of 10%. M20 and M25 grades of concrete were taken for study keeping a constant slump of 60mm. The compressive strength of concrete cubes at the age of 7 and 28 days were obtained at room temperature. Also the temperature effect on concrete cubes at 1000C on 28th day of casting was carried out to check the loss of strength. From test results it was found that the maximum compressive strength is obtained only at 50% replacement at room temperature and net strength after loss due to hike in temperature was above the recommended strength value due to 50% replacement itself. This result gives a clear picture that quarry dust can be utilized in concrete mixtures as a good substitute for natural river sand giving higher strength at 50% replacement. Read More...
|
Civil Engineering |
India |
391-395 |
105 |
Andriod Based Application :Online KMT Bus Ticket Booking using QR Code
-Shailesh Ananda Talekar ; Mohit M. Suryawanshi; Ashish Tukaram Raut
Android Based Application: Online KMT Bus Ticket Booking Using QR Code integrates all the services provided by city bus to the conductor & the passengers. In this application, the user can book the city bus ticket and also register for a pass by specifying the source and destination. The application will generate the QR code according to the information filled by users and which will be used by the conductor or an authorized person to scan the ticket. The information of each user is maintained properly. Also the ticket checker is provided with a checker application to scan and check for the user’s ticket. Read More...
|
Computer Science and Engineering |
India |
396-397 |
106 |
Teaching Quality using Data Online Leave System
-Jadhav Saurabh Dhondibhau
In the current Online Leave System, each College/Departments follows manual strategy in which workforce enters data in a record book. Toward the finish of every month/session, Administration Departments ascertains leave/s of each part which is a period taking procedure and there are risks of losing information or mistakes in the records. This framework can be utilized to mechanize the work process of leave applications and their endorsements. The occasional crediting of leave is additionally computerized. There are highlights like email notices, programmed endorsement of leave, report generators and so forth right now. Leave Management application will diminish paper work and keeps up record in progressively effective manner. At first participation is taken by utilizing the participation register in the school for staff. Staff needs to present their leaves physically to their regarded higher specialists. Read More...
|
Computer Science |
India |
398-399 |
107 |
A Review: Experimental Study on the Effect of Partial Replacement of Cement by Fly Ash & using Silica Fume in Concrete
-Mayank Bhawsar ; Rahul Sharma; Akash Jaiswal
— In the ongoing past, there have been considerable actions for enhancing the properties of cement as for eminence and stiffness, particularly in dynamic conditions. The development of concrete technology can decrease the use of natural resources and energy sources and lessen the burden of pollutants on environment. The improvement of solid innovation can reduce the utilization of common assets and vitality sources and minimize the weight of toxins on condition. Proper introduction of fly ash & silica fume in concrete improves both the mechanical and durability characteristics of the concrete. A huge quantity of by-product or wastes such as fly-ash, copper slag, silica fume, stone-dust etc. are generated by industries, which causes environmental as well as health inconvenience due to discarding and removal. The waste materials which can be utilized as extra cementitious material and proper presentation of fly ash & silica smoulder in cement enhances both the mechanical and stiffness qualities of the solid. This paper presents the literature review on partial replacement of Cement by Fly Ash & adding of Silica Fume in the mix which includes recent and future trends of research. To reduce the amount of cement in concrete supplementary material are used. Fly Ash & Silica Fumes are most popular material used in the concrete to improve its compressive, flexural, split tensile strength and also increase its durability. Read More...
|
Civil Engineering |
India |
400-406 |
108 |
Optimization of Electricity Consumption by using Machine Learning
-Nihal Dilip Sharma ; Karan Atul Kulkarni; Vishal Hanamant Kumbhar; Yugal Dilip Manwani; Sandeep Pradeep Menon
In India, electricity supply is fixed in the particular area without taking different parameters in considerations. These parameters include actual utilization of electricity, electricity wastage, seasons and festivals. As India is becoming a developed country the need for proper supply of electricity is essential. Due to lack of knowledge there is a lot of electricity wastage which could have been supplied to areas where there is a shortage of electricity. So, we are providing software that will efficiently predict the amount of electricity that’ll be required in a particular area. Read More...
|
Computer Science and Engineering |
India |
407-408 |
109 |
Review: Hand Motion Translator for Speech and Hearing Impaired using Image Processing
-Miss. A. A. Patil ; Prof. K. K. Pandyaji
Deaf & Dumb peoples in our community are always and commonly facing a common problem that is interaction with normal peoples, its very difficult to understand what they want to say and vice versa…… the person on which we depend for this is INTERPRETER [the mediator person]. The proposed system is a cost-effective and possible to minimize the distance between deaf and dumb people with normal people, this system captures the hand signs and compare with existing database and then accordingly converts into text followed by speech in a commonly spoken language like English. This system is using an Image Processing algorithm which processes the detection and extraction of the input hand gesture from the image stream. In this system we are using functions like skin color based thresholding, contour detection and convexity defect (convex hull) for detection of hands and identification of important points on the hand respectively. The distance between these contour points from the centroid of the hand becomes our feature vector against which we will train our neural network. Read More...
|
M.E. in ELECTRONICS ENGINEERING |
India |
409-411 |
110 |
Online Stationary System
-Ugale Priyanka Anil ; Hadawale Shraddha Ramdas
The Stationery store gives every unique sort of books just as all school related things. In any case, there are bunches of online shop accordingly yet the dealers utilize different sites to sell their items. As the locales have n number of items, there is certifiably not a decent reaction to from the customers. In versatile arrangement we are giving portable variant of shop and client can investigate entire stuffs on the tip of fingers without going to real store and can pay when they got the bundle just as we are giving selective element where we putting offers on hardly any things for a month and consistently things will be refreshed. In addition, we are giving solicitation choice where client can demand new things. Read More...
|
Computer Science |
India |
412-413 |
111 |
Artificial Intelligence and Future Interaction Between Humans and Robots (An Alternative to the Human Brain)
-Sharma Rupal Ravindra
In software engineering, man-made reasoning (AI), now and then called machine insight, is knowledge shown by machines, rather than the characteristic knowledge showed by people. Driving AI reading material characterize the field as the investigation of "insightful specialists": any gadget that sees its condition and takes activities that amplify its risk of effectively accomplishing its goals. Colloquially, the expression "man-made brainpower" is frequently used to depict machines that copy "psychological" capacities that people partner with the human personality, for example, "learning" and "critical thinking". This paper portray about another procedure to execute Artificial Intelligence, Cloud and Internet of Things in Robots. Presently a days, Artificial Intelligence take a fundamental part on the planet into mechanical autonomy. Practically all businesses use robots for different works. They were utilizing co-usable robots to make distinctive sort of works. Read More...
|
Computer Science |
India |
414-417 |
112 |
Foot Step Power Generation with Solar
-Handore Aditya Dayaram ; More Rutik; Jadhav Pushpak; Vishwakarma Sunil; Prof. B. J. Vispute
As the demand of energy is increasing day to day life, so the ultimate solution to deal with these sorts of problems is just to implement the renewable sources of energy Humans are using the renewable energy which are solar, wind etc. but we still could not satisfy our power needs, because of that we have to generate electricity through each and every possible ways. Now a day’s energy and power are the one of the basic needs regarding this modern world. In this project we are generating electrical energy by means of a renewable method just by walking on the footsteps. Non-conventional energy system is very essential at this time for developing countries like India, China etc. Energy generation using footsteps requires no fuel to generate electricity. The objective of this work is to produce power through footsteps as a source of renewable energy that we can obtained while walking or standing on to the certain arrangements like footpaths, stairs, plate forms and these systems can be install specially in the more populated areas. In this project we are generating electricity just with the help of rack and pinion arrangement along with alternator and chain drive mechanism. For its proper functioning such that it converts vertical force into electrical energy, the mechanism consists of rack & pinion, chain drives, alternator and battery. We have discussed its various alternate (electricity is produced by DC generator) applications with extension also. The power generation is much worthy but it has little bit higher initial cost. Read More...
|
Mechanical Engineering |
India |
418-423 |
113 |
An Enhanced Swarm Optimization Algorithm for Network Reconfiguration
-Suman Rani ; Dr. Silki
Power distribution networks are mostly operated in a radial configuration. The dynamics of distribution system operation often requires reconfiguration of the network. Distribution network reconfiguration is achieved by using sectionalizing switches that remain normally closed and tie switches that remain normally open. The main purpose of reconfiguration is to minimize active power losses in order to improve distribution system performance. Particle Swarm optimization to find the best switching pattern which leads to minimum load confined to all equality and inequality constrains allied to distribution system. The objective of the optimization is minimizing active power loss and to improve voltage profile while the distribution network is maintained in the radial structure. In this paper, reconfiguration of IEEE-33 Bus distribution system is done using PSO and results obtained are compared with existing algorithms. The outcome attained illustrates the improvement in voltage profile of each bus and reduction in loss profile as compared with existing algorithms. Read More...
|
Electronics & Communication Engineering |
India |
424-427 |
114 |
Automatic Skyscraper window cleaning machine Using ATmega328P Microcontroller
-Nisanth Ranganathan ; Mohan M
The aim is to replace the current skyscraper which operates semi-automatically to move up and down in the building. In the conventional method the one end of the string is connected to the machine and other end passes through the pulley, which is coupled to the DC motor. The machine moves vertically upwards and downwards. So, each time after the operation is completed the instrument is dislocated to the new position. It also has a defect, when machine reaches the highest point of the building the water pressure is reduced based on the principle of elevation. To eliminate these errors an automatic skyscraper window cleaning machine is developed which uses high pressure pump to maintain a constant flow rate through the tube and spray out of the nozzle. The two DC motors are used to create a motion in both axes. In addition to that an Altitude/Pressure sensor is added to measure the height and pressure of air. The recorded data are sent to the operator periodically through the GSM module attached in the platform. Moreover, a DC motor attached to the shaft is used to clean the facade and flat jet nozzle to spray the water. This entire operation is controlled by an Arduino UNO microcontroller. Once the dimensions of the building are fed to the microcontroller it carries the operation. Read More...
|
MECHATRONICS |
India |
428-430 |
115 |
An Intelligent Online Catering System
-Sonawane Reshma Ramchandra
So as to improve the operational productivity of eatery and providing food ventures by utilizing present day data innovation, this paper builds up an E-trade on-line providing food saving and requesting framework dependent on portable shrewd terminal, which depends on Android stage. The framework incorporates with remote interchanges, man-made consciousness, whats more, database advances and accomplishes numerous capacities, for example, saving, requesting, assessment, prescribing, eateries route, planning, data showing, and requesting records the board, and so forth. The framework has acknowledged customer focused, customized, and top notch providing food holding and requesting administration and has been utilized in a few eatery in Beijing. Read More...
|
Computer Science |
India |
431-432 |
116 |
A Survey on Crop Disease Identification Approaches Based on Machine Learning and Deep Learning
-Narendra Pal Singh Rathore ; Tanvi Rathi
In recent era convolutional neural networks plat a very important role in image classification. Day per day development in deep learning model provides researcher to improve accuracy and performance of existing system. Agriculture is the field where we can apply deep learning model to improve production. In this paper we have focus only soybean disease identification and types of disease which is predicted by the deep learning models. Read More...
|
Computer Science and Engineering |
India |
433-437 |
117 |
Charity with Minimum Fraud using Blockchain Technology
-Shadab Shaikh ; Disha Devalia; Jainam Zaveri; Tousif Ansari; Khushboo Tiwari
In the current scenario of various charity trusts we donate money online for a good cause. After we donate the money online we don’t know where that money goes, is it even being used for the said cause. There are a lot of trust issues. To overcome this issue, we can implement blockchain technology into the charities. After the implementation of blockchain we can see history of all the transactions made by the NGO in the past. By this we can determine whether the NGO is trustworthy or not. After the donation of money, we can also track where our money is being used. Also if the NGO is unable to collect the required amount in the given time then the money can easily be wired back to the donator. Or the people who have donated the money can cast their vote to extend the time limit for fund collection depending upon the milestone reached. Read More...
|
Computer Science and Engineering |
India |
438-440 |
118 |
An Overview on AC/DC Hybrid Microgrid
-Manish S. Potdar ; Dr. A. G. Thosar
The concept of microgrid is emerging as one of the most promising solutions that connects/integrates various distributed renewable energy sources to the grid. This paper focuses on a hybrid AC/DC microgrid that inherits AC grid and a DC grid which operates individually or in grid-tied mode. The AC grid comprises of various diesel generator sets (DG), Wind turbine generators (WTG) and AC loads whereas DC grid is connective network of fuel cell generators, DC loads and PV arrays with boost converters. A four quadrant operating three phase converters are used as a coupling mean between AC and DC bus. The converters can act as a either inverter or rectifier. The energy requirement during isolated operation of the system is maintain by Battery Energy Storage System (BESS) which is connected to the DC bus via charging/discharging converter. When an individual grid (AC or DC) is operative, it requires multiple conversions of power for AC and DC loads at user end hence results in less efficient system. Thereby, hybrid AC/DC microgrid avails best solution to avoid losses during multiple conversions. This paper presents an overview, issues and measures to overcome challenges of hybrid AC/DC microgrid. Read More...
|
Electrical Power System |
India |
441-445 |
119 |
IoT based Home Automation using Raspberry-Pi: A Review
-Achit Shivaji Khot ; Prof. A. P. Mane
The term Automation is not only specified for industrial applications. It can be enormously used for domestic applications also. Home automation extended from ‘security to convenience’. It is a modern technology that modifies your home and control the home appliances automatically. In this paper we are going to discuss IoT based Home Automation using Raspberry-Pi. The combination of Internet of Things (IoT) and credit computer like Raspberry-Pi provides flexibility and comfort for automation to user. This paper explains the basic concepts of proposed system along with discussions of various strategies implemented for the same. Read More...
|
Electrical and Electronics Engineering |
India |
446-447 |
120 |
A Novel Method For Haze Removal: A Dark Channel Prior Based Contrast Enhancement
-M. Kedareeswara Rao
Basic Haze removal methods are developed to adjust the saturation and contrast of an image which is fully covered by fog and moisture. These methods will enhance the quality of the reconstructed image, but eventually the removal of haze in this manner can change the luminance away from its ideal value. So haze removal involves a balance of improvement between luminance and contrast we improved an algorithm for haze removal as a luminance reconstruction scheme, in which an energy term is used to achieve favorable balance between luminance and contrast. The developed model based up on the luminance values for reconstructed image on statistical analysis of haze free images, there by achieving contrast values superior to those obtained using other methods for a given brightness level. We also developed a novel module for the estimation of atmospheric light using the color constancy method. Read More...
|
Electronics & Communication Engineering |
India |
448-453 |
121 |
Disaster Management: A Worldwide Issue
-Somsukla Maity
Expanded vulnerability is reflected in current disaster patterns. Furthermore the exercises of Human creatures in the Globe additionally become a reason as a result of which nature now and again changes its routine course. All these Geological Disasters, biological and other manmade disasters influence individuals of different locales or countries. There is a risk that these disasters may one or other day pulverizes the Globe or all the life in the Globe. In such conditions, each Government has the obligation to anticipate issues, strategy, and so on, for guaranteeing the well creatures of its residents. All things considered there is a requirement for the United Nation to anticipate issues, strategy, and so on., for guaranteeing the well creatures of individuals in the earth: in that capacity there is a requirement for a worldwide policy to guarantee coordination among different partners and furthermore to give International Disaster Management Plans (IDMP). The policy need to address on the accompanying:
Developing an International Disaster Management Policy and Strategy
Strengthening human and money related assets for Disaster Management
Ensuring solid Disaster Management Structures. Consequently this examination is made to assess the endeavours of Human creatures on Disaster issues for a sheltered and secure life in the Globe.
Read More...
|
MANAGEMENT |
India |
454-458 |
122 |
Faceopedia- High Speed Face Recognition System
-Sagar Rai
The paper titled “FACEOPEDIAâ€- A High speed face recognition system using DCT RBF Neural Network is designed to identify the face. There are number of algorithm proposed to do the task of face recognition. The face recognition is one of the most trending and new research area where several research activities taking place. The face is a composed of complex structure, it varies from person to person. There are several application regarding the face recognition they are attendance system, door opening system, authentication system etc. In this project we are using Discrete Cosine Transform (DCT) algorithm along with the Radial Basis Function Neural network. The neural network is needed to identify the complex facial architecture present in the face. The DCT will reduce the dimension and also extracts the essential features of the face. Read More...
|
Computer Applications |
India |
459-463 |
123 |
Study of Flight Dynamics and Various Forces & Drags in Construction of Radio Control Aircraft
-Deep Narendra Nagare ; Shrikant Annasaheb Nawale
R/C aircraft is one of the integral flying models made by the use of nearly all fundamentals of Aerodynamics which to be used in the basics of a building of a real engineer aircraft. Scientific and military organizations are also using RC aircraft for experiments, gathering weather readings, aerodynamic modeling, and testing. Distinct from recreational Unmanned aerial vehicles or autonomous capabilities are used for public service like firefighting, disaster recovery, etc. and maybe armed in the military. Building the model will study designing using the fundamental design of materials by applying the calculations on the ratios and forces needed to build an aircraft model successfully. This research will study the abilities of technological design and understandings of science and technology as they analyze the individual components of an R/C aircraft, how each component works and the understanding of flight dynamics. Electronics components used in aircraft models are being studied in detail electronics of each component with its Circuit connection and rating as necessary, discussed various forces acting on R/C aircraft. This paper is to encourage the aerodynamics study and learning of designing an aircraft mechanically. Study of the various function of each part of aircraft. In this, it is mainly concentrated on aerodynamic Designing, structural Construction, Electronics. Read More...
|
Mechanical Engineering |
India |
464-468 |
124 |
Case Study of Faurecia Techniques in Manufacturing Sector
-Shiban Fayaz Ahmed ; Navneet Kumar Gupta
Improving the production efficiency through standardized work using Faurecia emission control technique. The main focus is to improve the productivity of the system by using standardized work, cause and effect diagram and root cause analysis which can be done by finding out the cause leading to less productivity and suggest the possible solution to improve production. Read More...
|
Mechanical Engineering |
India |
469-472 |
125 |
A Systolic Hardware Architecture for Montgomery Modular Multiplication for Secure Data Communication
-M.Ravikumar ; V.Hendri Rajesh
In modern communication systems, security is a main concern which is offered by cryptosystems Modular arithmetic is core operation in most of the cryptography systems. Most cryptosystems including RSA and DSA and ECC systems need modular multiplication for private key generation. That uses modular exponentiation function of large numbers to encrypt data, which is a slow process due to repeated modular multiplications. The efficiency of cryptography systems practically depends on how fast the multiplication is done. This is the base of computation. Most hardware and software designs for faster modular multiplication have been proposed, the Montgomery Multiplication Algorithm is recognized as the most efficient as others. This project that presents a 32 bit implementation of a Faster Montgomery algorithm for performing modular multiplication. The algorithm is based on the method proposed Montgomery for modular multiplication. The Simulation results shows that our design performs faster in terms of clock frequency while it requires lower Area and power. Read More...
|
Electronics & Communication Engineering |
India |
473-476 |
126 |
Performance Analysis of A Compact Heat Exchanger
-Dilshad Ahmad ; Er Deepak Agarwal ; Er. Atul Sharma
Compact heat exchangers are one of the most critical components of many cryogenic components; they are characterized by a high heat transfer surface area per unit volume of the exchanger. The heat exchangers having surface area density (β) greater than 700 m2/m3 in either one or more sides of two-stream or multi stream heat exchanger is called as a compact heat exchanger. Plate fin heat exchanger is a type of compact heat exchanger which is widely used in automobiles, cryogenics, space applications and chemical industries. The plate fin heat exchangers are mostly used for the nitrogen liquefiers, so they need to be highly efficient because no liquid nitrogen is produced, if the effectiveness of heat exchanger is less than 87%. So it becomes necessary to test the effectiveness of these heat exchangers before putting them in to operation. The available plate fin heat exchanger has rectangular offset strip geometry and is tested in the laboratory using the heat exchanger test rig. The experiment is conducted under balanced condition i.e. the mass flow rate for both sides of fluid stream is same, and the experiment is carried out at different mass flow rates. The effectiveness of heat exchanger is found out for different mass flow rates. Various correlations are available in the literature for estimation of heat transfer and flow friction characteristics of the plate fin heat exchanger, so the various performance parameters like effectiveness, heat transfer coefficient and pressure drop obtained through experiments is compared with the values obtained from the different correlations. The longitudinal heat conduction through walls decreases the heat exchanger effectiveness, especially of cryogenic heat exchangers, so the effectiveness and overall heat transfer coefficient is found out by considering the effect of longitudinal heat conduction using the Kroegers equation. Read More...
|
M.Tech MECHANICAL ENGG |
India |
477-481 |
127 |
Using Extended Reality in IoT based Integrated Advance Home Automation for Multiple Approach
-Shaikh Saquiboddin Amanoddin ; Proff. Dr. Hiren Dand
We are leaving in advance world where everything is converting into smart using different technology. This research paper explains how you can convert normal home into smart home using IoT with extended reality. Extended reality is a new concept where you can see, feel and interact with the object. Extended reality concept can be apply with IoT (Internet of thing) home automation to do various function of home automate. With the help of extended reality user can be present virtually at home. They can perform most of the function virtually like appliance on and off, door lock and unlock, etc. Read More...
|
Information Technology |
India |
482-483 |
128 |
Eye Ball Based Cursor Movement
-Chetan Kumar ; Sunil Kumar Beemanapally; Diksha Kumari
In this paper, a private human computer interface system using eye motion is introduced. In traditionally system, human computer interface uses mouse, keyboard as an input device. This technology is meant to exchange the traditional computer screen pointing devices for the utilization of disabled or a replacement way to interact with mouse. The system we describe is real time, on- intrusive, fast and affordable technique for tracking face features. The paper presents interface between computer and human. This technological idea is capable to get rid of and replace the unique interface which is that the mouse or we will say traditional mouse with the human eyes, as a new way to interact with computer. Thus, mouse working with the assistance of human eyes is called as Virtual mouse. The system we discussed is sensible & fast and a reasonable technique for tracking face features. It is expected that the availability of this technique will facilitate the event of eye - tracking applications and therefore the eventual integration of eye tracking into subsequent generation of everyday human computer interfaces. Read More...
|
Computer Engineering |
India |
484-486 |
129 |
Real Time Vehicle And Environment Monitoring In Smart Cities
-Sharanya P S ; Shilpa Shetty
In this paper, the use of sensor networks in environmental monitoring and vehicle monitoring, which are important in a smart city. The connectivity provided by WiFi are needed to realize the concept of Internet of Things (IoT). The main cause of environmental pollution in most cities are industries and automobiles emitting different types of poisonous gases. This paper discusses the implementation of a unit which senses the presence of gases and uploads the information to a website. The second part of this work is a vehicle monitoring unit that can be ï¬xed in vehicles. This system tracks the vehicle and monitors its engine temperature and the presence of poisonous gases. In the case of the vehicle is stolen, it will be tracked and a message is sent to the owner. An Android app is developed so that all the required information is easily available. The paper describes the hardware and software implementation of the prototype system. Read More...
|
Internet of things (IoT) |
India |
487-489 |
130 |
Blind Wear: A Smart Footwear for Visually Impaired people.
-Prathmesh Gadekar ; Mohit Gupta; Aashish Shinde; Neelam Phadnis
Today technology is evolving at a rapid pace. Due to technical advances science is beneficial and helpful to the people in need. The blind and visually impaired comprises to be 36 million of the total world population. The proposed system will provide low cost portable solution to the blind and visually impaired people. The system consists of shoes having ultrasonic sensors to survey the scene. After detecting the object, camera module activates and processes real-time object detection to predict the object type, according to which information will be sent as audio via a Bluetooth headset to the user. So, the visually impaired human will get the audio instructions accordingly about the road obstacle. The proposed system helps the blind and visually impaired person to identify the obstacle ahead and thus making his/her analysis for avoiding that obstacle better. Read More...
|
Computer Engineering |
India |
490-491 |
131 |
Design and Manufacturing of 3 Axis Portable Machine by Using Criss Cross Mechanism
-Omkar Uttam Powar ; Pramod Chandanshive; Ranjit Bhise; Yogesha T. Bandgar; Prof. D.A.Baitule
Conventionally, we use a drilling machine to make holes which is operated manually. But the height to which holes will be drilled is normal to human height. And for higher levels we generally use ladders or cranes. This process is time consuming and also there will be chances of accidents. In this project, we will design and manufacture such a mechanism that it will be used at different levels by using a criss-cross mechanism also called as the scissor mechanism. The scissor mechanism will be operated by DC motors. And the tailstock movement in X-Y direction will be controlled with the help of lead screw. Read More...
|
Mechanical Engineering |
India |
492-494 |
132 |
A Survey on Internet of Things (Iot)
-Mr.Somnath Machindra Shinde ; Mr.Parag Sunil Patil; Mr.Shushil S. Upadhayay
As we know that we are entering in the new future of computing technology in the IoT means Internet of Things. Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent Systems call it what you want, but it’s happening, and its potential is huge. As the IoT has millions of smart technologies connected to "THINGS" (a sorted of “universal global neural network†in the cloud) that will encompasses every aspect of lives or lively things. IoT is compressed of smart technologies, machines, object communicating and interacting with other machines and infrastructures. Hence, their huge amount of data abstraction and generation of data are being processed into the useful actions which can "command & control" things to make our day to day lives easier and protectful and also to reduce our impact on the environment. The creativity of this era is an unbreakable bound with amazing technologies and potentiality to improve our lives and our upcoming future. The following thesis is an extensive reference to the possibilities, utility, applications and the evolution of the Internet of Things. Read More...
|
Information Technology |
India |
495-497 |
133 |
Depression Management exerting Sentiment Analysis
-Ark Pandey
The paper embarks on predicting the sentiments of a human being and identifies the ones who are facing the state of Depression, following with the cure of this misery using some machine learning algorithms from a scientific perspective. The study suggests that out of every 3 individuals 2 suffers from depression and the major cause of this depression are the THREE VILLAINS of the current generation, and they are “overthinkingâ€, “lack of confidence†and the most important is the “unknown fearâ€. These 3 factors make a healthy one depressed and their mind feels inferior to everyone. How can someone or some technology stop this from happening? It’s easy, there’s a study which states that over 50% don’t even know why they are a victim of this disease. And this paper is for those individuals who don’t know why they have those “unknown fear†which results in nothing but anxiety. There’s an emerging technology that can predict their cause of depression and even suggest the way to cure this deadly disease and help the victim, live a fruitful life. Nowadays people talk to their phones or their personal computers more than any other individual or even by themselves. So, this research is a modern one and will cover only the current techniques, a regular soul understands the most. The model will keep the track of the contents they post on their social media account, and the pages or handles he/she follows on the respective account. Which will cause a huge dataset about their personal life. The details got from those sources are more genuine and accurate than the data retrieved by communicating with the person himself/herself. The model discussed further will consider all the data obtained by the subscriber and train itself for the work it is assigned for and give the result, whether or not the subscriber is depressed (classification). And also states the reason for depression. Which will help him/her to conquer the depression and can live a happy life ever after. Read More...
|
Computer Science |
India |
498-503 |
134 |
Computer Lab Management and Maintenance System Using IOT and Data Science Concept
-Rajesh Kumar S ; Umapathy M; Chandru N; Karthik B
In this paper we presented the computer lab management and maintenance is very difficult. In this challenges are fixed by the data science and IoT concepts. Data Science are the information is generated from different sources like text files, multimedia forms, sensors, and instruments. We need more complex and advanced analytical tools and algorithms for processing, analyzing and drawing meaningful conclusions and results. So the data science concepts are used to maintain the logs, because the huge amounts of data are collected in various systems. Internet of Things is the concept of connecting any device on/off switch to the Internet and to other connected devices. The IoT is a giant network of connected things and people, so the IoT concepts are used to controlling the electronic appliances using Raspberry pi. A computer lab is a space which provides computer services to a defined association. This generally consists of the user not engaging in illegal activities or undertake to any security or content-control software while using the computers. Above the illegal activities are controlled by generating random password because of security purpose. Read More...
|
Computer Science and Engineering |
India |
504-507 |
135 |
IOT Based Landslide Prediction System
-Mr. Shubham Sakharam Powar ; Ms. Sayali Sanjeev Torase; Ms. Himani Vidyadhar Sohani; Mr. Ajay Manohar Pol
A Landslide is a geological phenomenon that includes a wide range of ground movements. Landslide hazards have caused loss of human lives, failure of structures, damage to agricultural lands and the natural environment. To overcome this, monitoring is essential to predict the behavior of landslide and forecasting which storms can trigger large number of landslides. This can help saving number of lives and prevent loss of life and property as people will be aware of the upcoming danger and can take necessary steps for safety. The purpose of this system is developing and testing of landslide early warning system. The early warning system uses sensors network for monitoring factors like rainfall, soil moisture, ground movements etc. A microcontroller ATMEGA328 is used to process the input signal and activate the alarm. Network of IOT is used in the project that helps updating the information about landslide on the internet. Webpage is developed to analyze the instantaneous data. Wireless landslide monitoring systems collect environmental data from the slope and transfer it to connected computer systems. It monitors and detects the landslide and alert people from landslide hazards. Read More...
|
Electronics and Telecommunication Engineering |
India |
508-510 |
136 |
Analysis of Implementation of Value Stream Mapping Tool in the Industries for Waste Reduction and Lean Production: A Review
-Pranav Seth ; Punnet Puri; Sangandeep Singh
In today’s international scenario industries, face cost cutback and efficiency challenges in their operations. They have to find alternatives to trim down production time, costs and eradicate non-value added activities in order to get better performance and product quality to stay alive in the highly competitive world. Value Stream mapping technique requires recording steps, activities, material flows, process flows, information flows, communications and other process elements that are desirable for the transformation process. Value Stream Mapping aids the organization to recognize the wastes in a targeted process and brings a product or product family that uses the same resources through the main flows, from raw material to the customers. This paper discusses the use of Value Stream Mapping technique and its benefit that it reaps to the different industries. The paper also presents a Literature Review to show applications of this technique and significant improvements in lead time, cycle time and inventory level reduction in a range of industries. This paper encapsulates with specifying the vital contribution of value stream mapping technique in attaining the accomplishment. Read More...
|
PRODUCTION ENGINEERING |
India |
511-514 |
137 |
Convolutional Neural Network Based Coherent Acoustic Signal Receiver Design for Underwater Acoustic Sensor Networks (UASNs)
-Sweetline Sonia.M
In Underwater Acoustic Sensor Networks communication systems, synchronization is one of the most important problems. The need for synchronization is especially intensified when there is strong channel distortion. The Doppler effect can shift the carrier in the frequency domain and scale the signal in time domain. Like the multipath propagation channels poses problems to the conventional synchronization methods. The application is focused on the underwater acoustic communications, where the time varying multipath fading dominates the channel characteristics. The conventional synchronization techniques are generally derived based on maximum likelihood principle. In this project, a new entropy based synchronization technique is explored. Synchronization is achieved by minimizing the entropy estimated from the use of eye diagram and the constellation diagram. Key implementation details are addressed towards the realization of entropy based synchronization algorithms. In addition, the performance is evaluated in controlled conditions and that is shown that entropy minimization has great potential and offers certain advantages for synchronization in wireless communication, particularly for pulse shaping filters with small excess bandwidth, as well as in multipath fading channels. In final latest deep learning technique is applied to synchronize the Base band signal. A neural network based coherent receiver is designed and tested. Unlike the conventional receiver which consists of a series of function blocks, the neural network based (CNN) receiver does not explicitly implement in any function blocks. Its function is trained from end to end to achieve over all optimization. As such the new receiver structure has the potential to outperform the conventional receivers in nonlinear or nonparametric propagation channels. Read More...
|
Communication Systems |
India |
515-518 |
138 |
Seismic Analysis of G+5 Storey Building with Bracings using ETABS
-Osama Bin Sami ; Kundan Kulbhushan
Earthquakes is the usual calamity known to mankind from many years, from the ancient time researches, researched many ways to protect the buildings. There was a need to control the damage caused by earthquake to the both existing and newly to build structures. Many existing reinforced concrete buildings need retrofit to overcome deficiencies to resist seismic loads. Bracing is the most effective method which can be incorporated to the reinforced concrete buildings. Steel bracing is a highly efficient and economical method of resisting horizontal forces in a RC frame structure. Bracing has been used to stabilize laterally the tallest building structures. Braced frames can resist large amount of lateral forces and have reduced lateral deflection and thus reduces devastation. Steel bracing framework expands the stiffness and strength of the RC G+5-storey building and reduces their deformation. In present study we have used an H shaped irregular building with 36m along X and 36 m along Y direction. Equivalent static linear seismic analysis is carried by using ETABS software, where the comparison of results is made between bare frame and X braced frame. The performance of the building is evaluated in terms of lateral displacement, base shear. The study is to be carried for the Zone Ó€V and medium soil as specified in IS codes. Read More...
|
Structural Engineering |
India |
519-524 |
139 |
Detecting Cyber Attack Based On Data Mining
-A. Jothi ; R. Sundaresh
Data mining is the way toward identifying patterns in big datasets. Data mining methods are vigorously utilized in logical research and additionally in business, generally to accumulate measurements and profitable data to upgrade client relations and marketing techniques. Data mining has likewise demonstrated a helpful apparatus in cyber security for finding vulnerabilities and social affair pointers for base lining. Read More...
|
Computer Applications |
India |
525-528 |
140 |
To Control 3D Printer Remotely Using Raspberry Pi
-Divya T ; Divya T; Vahini J C; Mrs Sermakani A M
The main objective of this project is to print things remotely and monitor the 3D printer employing a Raspberry Pi laptop. We will remotely load new print, monitor the extruder temperature. Flip the printer off and on, check the standing of the prints, and watch the prints with a live video feed and a lot of. 3D printer with on-line access and remote to be operated from multiple devices together with mobile devices. Completely different technological solutions which will be used with distinct printers ar known and tested. Because the system is IoT primarily based octoprint provides an online interface for dominant 3D printers, permitting the users to start out print job by causing G-code to 3D printer connected via USB. Octoprint is free, open supply code that permits you to remotely perform and monitor all the aspects of your 3D printer employing a Raspberry Pi. Read More...
|
Information Technology |
India |
529-531 |
141 |
A Review on Properties and Failure in Tungsten Carbide
-Dipak S Welkar ; Vilas Dhagate; Permindur Singh; Shrihari Upasani
This paper mainly focus on the properties of Tungsten carbide being a popular material for tools and dies and wear parts because of their property of resistance to wear. Unfortunately user that finds difficulty in matching the proper grade of tungsten carbide for proper application. They may also face problem when component fails during the operation. So this paper provide the industry guideline for properties and failure analysis .Thus understanding the properties and what different circumstances can cause the failure can help users to pinpoint the problem and solve them. Read More...
|
Mechanical Engineering |
India |
532-534 |
142 |
Human Face Identification using Haar Cascade & Local Binary Pattern Histogram Algorithm
-Aditya Kumar ; Amit Birthalia; Bipul Devashish; Gajendra Singh Rathore
In the modern era of the 21st century there has been a massive development and growth in the field of applications and technology, several highly sensitive data like banking data, stock market data are now being dealt with a simple mobile application or by a web-applications. A great deal of security is assured by everyone but is it really that secure? The sensitive information is present in the form of data which can be easily stolen used to scam or plot against someone. Security intrusion can be simply caused by a lurker one glance of your computer or mobile is enough to get you in a great deal of trouble. This study aims to conduct an experiment by applying new methods and techniques in order to provide new results which will increase the scope to security. Read More...
|
Computer Engineering |
India |
535-537 |
143 |
Future Efficient Solar Electric Vehicle Charging Station
-Prashant Jaywant Mahajan ; Kalyani Vijay Pagare
Solar energy is free and clean. There is enough for everyone, and we will never run out of it. Depending on the efficiency of the solar panel, we can produce electricity from the frequencies of the solar light and also cannot cover the entire range of solar wavelength and hence much of the incident sunlight is wasted. I am going to present a paper about using different techniques to power the electric vehicle such as use of tandem perovskite solar cell smart tree, coupling it with wind turbine to have constant electric supplies for the wireless charging of electric vehicle and using the automobile windshield as solar cell for the electricity production for the consumptions of the various operations in the automobile. This could generate more energy, so that our dependencies on the fossils will be ended. Read More...
|
Bechlore of engineering in mechanical |
India |
538-539 |
144 |
Storage Optimization of Video Surveillance
-Shital P. Kakade ; Namrata B. Jadhav; Siddhi S. Surve; Priyanka A. Kurade
Video surveillance becomes easier to monitor the premises and also gather information of an incident. Video surveillance is an important component for the protection of infrastructures. As digital and networking technologies have been expanding worldwide and penetrating into many traditional industrial areas during the past years, the video surveillance industry has rapidly adopted these technologies. Now a day Closed-circuit television (CCTV) or video surveillance is the most useful technology used in the field of security purposes. CCTVs can be found at many places. The proposed idea is to reduce the storage space. We are proposing a method to optimize the storage space occupied by the CCTV footage. The approach will optimize the storage space occupied by unnecessary data, as well as it maintains quality of the video. Read More...
|
Computer Science and Engineering |
India |
540-542 |
145 |
High speed Vedic multiplier using Urdhva Tiryagbhyam Sutra
-Shubham Kumar ; Dhanesh Kumar; Bhawna Kalra
Vedic mathematics comes under the category of fast multipliers. In the field of communication different multipliers are used but they consume more power and they are less area efficient. Vedic multiplier gives high speed and its latency is also good. Proposed work presents a direct method of computing multiplication by using the Vedic mathematics sutra “Urdhva Tiryagbhyamâ€. The hardware implementation of proposed multiplier is done on FPGA. This can be used in many applications like FFT computation, Convolution, ALU, CPU, etc. The coding is done in VHDL. Simulation and synthesis are performed using the Xilinx ISE design suite 14.2 Simulated results for the proposed 2x2 bit Vedic multiplier circuit shows a reduction in delay as compare to previously made multipliers. Read More...
|
Electronics & Communication Engineering |
India |
543-546 |
146 |
Design and Fabrication of Attachable Wheelchair Automator
-Shantanu G. Gulhane ; Sumit R. Dafe; Mayur A. Shirbhate; Mrunali M. Mahalle; Ajinkya P. Edlabadkar
Attachable wheelchair automator provide a means to transport patients or mobility to people with walking disability. They can be attendant propelled, which are highly maneuverable in confined spaces, but offer no power assistance. Also, they can be electric powered with mechanical control interface, which provide power assistance. With the objective of providing power assistance and having excellent maneuverability, this paper presents a motorized attachable wheelchair automator. It is light and portable because it has no actuator. Moreover, its operation is simple. It is useful not only at home or in a nursing home, but on any flat surface during daily excursions and activities, even in a conventional lavatory. Read More...
|
Mechanical Engineering |
India |
547-549 |
147 |
An improved optimization approaches for Homogeneous and heterogeneous hierarchical clustering in WSN
-B.Vani ; Dr.Shrishail Math
Remote sensor organizes is an asset requirements arrange in which all sensor hubs have restricted assets and vitality information must be accumulated to decrease the measure of traffic in the system. To increase the network lifetime by grouping of sensor nodes into clusters and electing cluster head (CHs) for all the clusters is done using clustering method. CHs gather the information from individual groups hubs and forward the collected information to the base station. A major challenge in WSN to select appropriate cluster heads. Clustering is gathering of hubs in free groups and each cluster contains at least one group head dependent on web size. The sensed data will transfer to the separate cluster heads and retransfer the collected data to base station. By maintain the long space transmission nodes through base station, Clustering Algorithms can be used. In this paper, we categorize all up-to-date and published works based on how the users can access various clustering approaches are discussed with working of few clustering algorithms and distinguish them based on performance of algorithm. Read More...
|
Computer Science and Engineering |
India |
550-555 |
148 |
One Touch Transaction for Multi-Banking System Using Biometric and Unique-Id Identification
-Naresh Thoutam ; Ashish Chousalkar; Sayali Kokane; Pralhad Gaikwad; Vaishnavi Pawar
Each and every individuals has many bank accounts in different banks, people’s need to carry multiple ATM cards for transaction, there may be different PINs for each and every account. In traditional system, ATM customer recognition systems is only depends on bank cards, security pin number, and such identity verification methods which are used to measures are not perfect and functions are too single and at time there are incidents where we forget security PIN number, lose of cards, cards get stolen, PIN numbers get stolen. To overcome these situation in traditional ATM system, introducing a new ATM terminal customer recognition system, “One Touch Transaction for Multi-banking System Using Biometric and Unique-ID Identificationâ€. Biometric based fingerprint authentication technique is one of the most secure systems, unauthorized accesses will be restricted, as this makes fingerprint a unique identification for everyone. Also this system assures a secure GSM (OTP-One time Password) based transaction. And also the proposed system has no risk overhead in managing multiple account transactions and achieves high security as compare to the traditional ATM system. Read More...
|
Computer Engineering |
India |
556-558 |
149 |
Gesture Based Sign Language for Deaf and Dumb People
-Thamayanthi.B ; Dr.Sivasankari.B; Shifna.S; Shobana.S; Sanjay.S.M
Gesture is one of the method used in sign language for non-verbal communication. It is most commonly used by deaf and dumb people who have hearing or speech problems to communicate among themselves or with normal people. A disabled person who is not able to speak or a person who speak a different language, the mobile device can be a boon for them as understanding, translating and speaking system for those people. In this paper, we implement an android based hand sign recognition system which can be used by disabled person. Vision- based Technique is capturing by an image through acamera which converts the text to speech. It provides a way for the deaf people to read a text by speech to text conversion technology. Also, it provide a technique for dump people using text to voice conversion. Read More...
|
Electronics & Communication Engineering |
India |
559-562 |
150 |
Rice Grain Classification and Analysis using Image Processing
-Dr. D.Deepa ; P. Vaishnavi; P. Yogeswari
Different types of grains are available in our country. Out of which Rice is the major food grains used by the people. Quality is the important factor to be carried out for local and expert purposes. The quality analysis includes classifying the rice grains based on the features from which they differ. The distinct features include width, height, color, size attributes of the rice grains. The main aim of the paper is to provide the automatic solution to classify the rice grains using image processing technique. A database has been created by feeding and training the images of each variety of rice grains. By comparing the rice grain images with the image in the dataset, the classification and analysis is done. To detect the edges the several edge detecting techniques have been carried out. Out of which the Cannys edge detection gives the best results. The paper provides the clear analysis on the classification of rice grains and also determines the purity of the rice grains. Read More...
|
Electronics & Communication Engineering |
India |
563-566 |