No. |
Title and Author |
Area |
Country |
Page |
251 |
Google File System (GFS) by Google for Data Intensive Applications using Cloud Computing
-G. Nandhini ; B. Mahalakshmi; Dr. M. Suganya
This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing, and outlines cloud architecture and its major components. Readers will discover how a business can use cloud computing to foster innovation and reduce IT costs. Introduction Enterprises strive to reduce computing costs. Many start by consolidating their IT operations and later introducing virtualization technologies. Cloud computing takes these steps to a new level and allows an organization to further reduce costs through improved utilization, reduced administration and infrastructure costs, and faster deployment cycles. The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Cloud computing describes both a platform and a type of application. A cloud computing platform dynamically provisions, configures, reconfigures, and deprivations servers as needed. Cloud applications are applications that are extended to be accessible through the Internet. These cloud applications use large data centers and powerful servers that host Web applications and Web services. Read More...
|
Computer Science and Information Technology |
India |
1020-1025 |
252 |
A Review on Image Demosaicing Methods
-Shweta Pandey ; Chandradatta Verma
Digital Camera tales the images by employing a single image detector covering different color filter, so demosaicing is a process of converting these samples into a viewable format. Image Demosaicing is a method to build full resolution color image from Color Filter Arrays(CFA) images. In this paper, we have critically analyzed various demosaicing algorithms and basic demosaicing strategies and their common measures are also covered. Read More...
|
Electronics & Communication Engineering |
India |
1026-1032 |
253 |
Improvement of Power System Stability in wind Generation by using FACT Devices
-Manish Verma ; Vijay Kumar Singh
This project is established predictive power control strategy which is used to improve stability of power system. This has been done presence of wind farm based double fed induction generator using static series synchronous compensator & super capacitor energy storage system. In our proposed system super capacitor energy storage system used to control active power in grid side converter and SSSC is used to reduce the low frequency oscillations. SCESS is composed of a capacitor bank and a dual switch DC/DC converter which is connected to DFIG through the DC link. In this method, it is used to control the active and reactive power of the Rotor Side Converter [RSC] as well as damping controller design for SCESS and SSSC. For improving the power system stability, an SSSC is used, which is a modern power quality FACTS device that employs a voltage source converter connected in series to a transmission line through a transformer. The Model Predictive Control (MPC) is used, which will predict the future value of the system in order to increase the damping ratio of the system. Thus, the system has been simulated and tested on Matlab software. Read More...
|
Electrical Power System |
India |
1033-1035 |
254 |
The Past, Present & Future of Design Thinking in the World of Technology
-Pratik Kailas Jain ; Tejas Chandan Choudhari
The concept of design thinking is central to the process of developing software solutions, which target the exact needs of the customer and have the flexibility of getting modified in an iteration process based on the feedback given by the client Like problem solving, design is a natural and ubiquitous human activity. Needs and dissatisfaction with the current state combined with a determination that some action must be taken to solve the problem is the start of a design process. Read More...
|
DESIGN |
India |
1036-1038 |
255 |
Design and Analysis of Leaf Spring
-B. D. Dhangar ; P. G. Patil
A multi-leaf spring is one of the important components of automobile suspension system. Leaves are basically a series of flat plates, usually of elliptical shape. Generally, a multi-leaf spring used in automobile suspension, consists of 2 types of leaves i.e. graduated-length leaves and full-length spring. The current work is an attempt to estimate the magnitude of bending stresses in the above mentioned leaves for a semi-elliptic multi-leaf spring made of steel. A lot of work has been carried out in the context of leaf spring considering its material and a important progress has been observed in the field of weight reduction, improvement of load carrying capacity when he replace the material of the spring by any advanced material like composites as E-glass/epoxy, carbon/epoxy etc. Finally referring to the grades obtained in the studies, the present work proposes a new idea regarding the construction of multi-leaf spring based on practical applications. Dimensions of the multi-leaf spring are taken from practical understanding and calculate dimension manually from standard chart of automobile spring. The leaf spring has modelled in CATIA and the same examined under similar environments using ANSYS (Workbench 16.0). Read More...
|
M.E IN MECHANICAL ENGINEERING (TRIBOLOGY AND MAINTENANCE ENGINEERING) |
India |
1039-1043 |
256 |
Digital Forensic
-Harshitha K S ; Shilpa S N; Dr. Samitha Khaiyum; Prof. Divya M D; Rajeev Athani
The DIGITAL FORENSIC is a used to detect the malicious threats in any organization. There are several crimes occurring in the cyber networks to detect that threats this project is use full. DIGITAL FORENSIC is a project which helps the admin to access the employee system to collect the data from there system. The admin creates the package that contains the commands that explains the which type of data should collect. Once the package is created then it pushed n number of computers but the computers doesn’t know the data is collecting from there system. Then admin receives an encrypted data from all n number of systems and then the admin decrypts the encrypted data then we will get file with the all details from the employee system and then it is given to forensic analyzer to find threats. Read More...
|
Computer Applications |
India |
1044-1046 |
257 |
Experimental Investigation on the Effect of Eggshell Powder as a Partial Replacement of Clay in Bricks
-Rajani. Saranadgoudar ; Ambika; Ashwini; Seema; Vijaylaxmi
The study involves the utilization of eggshell powder (ESP) as an auxiliary addendum to lime in stabilization of an expensive soil with the objective of evaluating its potential in augmenting the performance of lime. Locally available soil was excavated and transported to the lab where it was characterized. The main composition of eggshell is calcium carbonate (CaCO2) while the main composition of earthenware aluminosilicate (Al2O2.2SiO2.2H2O ) and other oxide compounds calcium carbonate in eggshell can react to chemical substance in earthenware clay compound to form calcium aluminosilicate or anorthite and wollastonite or calcium silicate phase formation of the fired clay bricks .Adding 10% 14% and 20% weight eggshell powder into clay bricks and fired at 1000°C for 5 hours ,affects to the physical -mechanical thermal properties, i.e. high compressive strength and hardness ,good thermal expansion coefficient, good true density and low water absorption .In general, the theoretical compressive strength, hardness and water absorption of desired refractory are more than 7.0 MPA ,6.0HV ,and less than 25% weight respectively. Therefore, the obtained fired clay bricks added eggshell powder and fired at 1000°C for 5 hrs, are potential for use as bricks for construction and thermal insulation. Brick is one of the most common masonry units as a building material due to its properties. Read More...
|
Civil Engineering |
India |
1047-1049 |
258 |
A Review on Global Positioning System (GPS)
-Dilpreet Kaur
In this paper use of GPS (Global Position System) geo-technique in traffic management and live location of vehicles has been studied and experiments. Regardless of time, location and or Global Position System offers unrivalled services for commercial military and consumer applications. The majority of these services allow users in the air, on land and at sea to know their exact speed, location and time, wherever and whenever on earth. The development and capabilities of GPS technology have become outdated and impractical, other traditional positioning and well-known navigation systems and technologies such as magnetic compasses, radio devices and chronometers among others. Global Positioning System consists of 24 satellites. Read More...
|
Computer Science and Engineering |
India |
1050-1053 |
259 |
A Survey on Applications of Blockchain beyond Bitcoin
-Dr. Asif Ali ; Mr. Jacob Antony
Since its inception more than a decade ago, the core technology powering Bitcoin and other modern cryptocurrencies, namely blockchain, has seen promising and diverse application prospects in a variety of domains—including IoT, healthcare, security and smart contracts. This paper presents a comprehensive catalogue of literature on existing blockchain technologies and further projections for future implementations. We begin with an introduction and technical background of the blockchain and then provide an overview of the domains followed by specific applications and projections within each of the domains. We conclude with a section on the security issues and challenges to the adoption of blockchain. Read More...
|
Computer Engineering |
India |
1054-1062 |
260 |
Techniques to Analyze, Identify and Verify the Risk of an Android Application
-Pooja Gurunath Isame
Android is an open source mobile operating system contributed by Google. In general, Google Play is the most secure place to download the mobile applications for Android system. Products from this website are surely safe promised by Google Company. But there are many other third-party app stores around the world offering similar software. One incentive for them is that the security policy on different platforms varies a lot, and Android developers are free to distribute apps in any intended ways, which leads to a certain risk in the assorted stores such as malware. Therefore, it is crucial to know which application store can be trusted from the various app stores. To support our research, a tool named APK Safety Test is developed to compare the APK files from different application stores with the version on Google Play. In this study, nine stores around the world are chosen and 20 various applications from .them are checked in real-time by using the tool. From this research, people can learn the different risk how can be detected. Furthermore, this paper analyzes the result of risks how to affect the applications. Read More...
|
MASTER OF COMPUTER APPLICATIONS |
India |
1063-1064 |
261 |
Smart Card Currency for Future Transaction
-Pooja Ulhas Sambare ; Pooja Chandrakant Todkar
A smart card, chip card, or integrated circuit card (ICC) is a physical electronic authorization device, used to control access to a resource. It is typically a plastic credit card sized card with an embedded integrated circuit. In a Modern Age of 21st Century .The generation are so fast and smart that they require smart card and smart currency. So, we build smart card and smart currency which will be safe, secured and easy to use and also reduce fraudulent transaction as well as printed currency (Note). Here in this paper we are providing the concept of bringing different applications together in one smart card. Thus, the person needs not to carry different cards for different purposes. The person can carry one card and can use the same card for different purposes. In this paper, we are introducing a smart card, which will work for different purposes like voting, attendance and transportation. It will also work as a personal ID. Read More...
|
MASTER OF COMPUTER APPLICATIONS |
India |
1065-1066 |
262 |
Design and Manufacturing of Pneumatically Operated Stairs by using Scissor Mechanism
-Dattatraya Pralhad Mali ; Mangesh Kamlakar Wagh; Saurabh Shrikant Pawar; Kiran Pralhad Mane; Aditya Sanjay Dhumal
In many mechanical Industries machinery is on the top or place the floor wise. For excess purpose stairs are used. But for stairs more space is required. For space saving, there is improper design of stairs and it is very unsafe for workers to work there. Due to such stairs chances of accidents or increases. To overcome space problem this project deals with compact design of stairs. Due to compact design space utilization is less and due to proper design, there are very less chances of accidents. The stairs operate on scissor mechanism by pneumatic which is safer than hydraulic operation. Read More...
|
Bechlore of engineering in mechanical |
India |
1067-1071 |
263 |
Wireless Power Transmission an Overview of Technological Advancements
-Vijay Kumar Singh ; Manish Verma
In today’s world most of the developments would have been impossible without the existence of electricity. The main mode of transmission of this electrical energy available to all of us is through wires but efficiency is significantly reduced in power transmission through wires. Only 70% of the electrical energy can be transferred efficiently. Moreover it is always difficult to lay cables in remote area. All these factors have given rise to necessity of a concept where the losses are minimized and convenience of energy transfer is increased. The concept being wirelessly transmitting power i.e. Witricity. In this paper we have given an overview of the recent researches and advancement in the field of wireless transmission of electricity. Various methods of wireless power transfer such as laser beaming, microwave power transfer, solar and magnetic resonant induction coupling are explained. We have also discussed the future aspects of wireless power transmission and have stated its various advantages. This paper helps us in understanding thoroughly the alternative method of transmission of power. Read More...
|
M.Tech Power System Engineering |
India |
1072-1074 |
264 |
Experimental Investigation of Crack Propagation and Branching in Lightly Reinforced Concrete Beams
-Rizwan Showket ; Tarundeep Singh
The main aim of this project is to investigate the nature of fracture in reinforced concrete. An experimental investigation was therefore undertaken to explore the cracking process in lightly reinforced concrete (RC) beams and to observe the details of the localized fracture process zone development. More specifically, the aim was to observe the effect of beam depth (150 mm and 180 mm) and steel reinforcement ratio (0.3–0.6%) on ductility through the investigation of crack branching. A total of six beams were cast in two series of two sizes (depths of 150 and 180 mm and lengths of 1000mm and 1200 mm respectively) keeping the width same (100 mm) for all the beams. Each of the series includes one unreinforced and two reinforced beams. All the six beams were tested in three-point bending and experimental surface strains and crack openings were inferred using high resolution digital camera and crack microscope. It was found that the presence of the reinforcement prevented premature fracture and led to crack branching where a single crack bifurcated in the region of the compression zone. In the larger beams (of depth 180mm and length 1200 mm) the branching developed at a lower relative depth and a greater reinforcement ratio led to a wider branching angle. These observations were associated with ductility measures for lightly reinforced concrete beams. Read More...
|
Civil Engineering |
India |
1075-1087 |
265 |
Limitation of Big Data and Solution
-Dheeraj Ramchandra Karande
A huge terabytes of data is generated every day from information systems and digital technologies such as Internet of Things and cloud computing. Analysis of such massive data requires a lot of efforts at multiple levels to extract correct and knowledgeable data for decision making. Hence, big data analysis is an area of research and development. The basic objective of this paper is to explore the potential impact of big data challenges. As a result, this article provides a platform to explore big data at various stages. Additionally, it opens a new scope for researchers to develop the solution, based on the challenges and open research issues. Read More...
|
Computer Applications |
India |
1088-1089 |
266 |
Multi Objective Parameter Optimisation in Drilling of Aluminium Alloy towards Minimum Ovality and Surface Roughness
-Rahul Raj ; Pankaj Rathore
This work will discuss the investigation on performance characteristics of AA6101 T6 aluminum alloy during drilling process. Factors like spindle speed, feed rate and drill bit diameter affect the performance parameters such as the surface roughness and ovality in drilling process. For getting or achieving desired surface roughness and minimum ovality is a primary concern, we have to select optimum level of cutting parameters. Therefore this work will present the multi-objective optimization of drilling process parameters using GRA. The experiments will be conducted based on design of experiment. The experiment results are collected and analyzed using statistical software Minitab17. Read More...
|
Production engineering |
India |
1090-1092 |
267 |
Design and Fabrication of Multi-Purpose Automatic Seed Sowing Machine
-Prof. P. L. Firake ; Pravin. G. Choudhary; Sagar. S. Thorat; Tejas. S. Dhumal; Tarun. K. Das
Agriculture is the backbone of Indian economy. About half of the total population of our country has chosen agriculture as their chief occupation. As centuries passed, certain modern techniques were invented in agriculture due to the progress in science. Agro-Technology is the process of applying the technology innovation occurring in daily life and applying that to the agriculture sector which improves the efficiency of the crop produced. Hence in this work of project we decided to design a better mechanical machine which is available to the farmers at a cheaper rate and also which can sow and seed the crop at the same time. This project consists of the better design of the machine which can be used specifically for sowing of soybean, maize, pigeon pea, Bengal gram, groundnut etc. For various agricultural implements and non-availability of sufficient farm labor, various models of seed sowing implements becoming popular in dry land regions of India. The success of crop production depends on timely seeding of these crops with reduced dull work of farm labor. The ultimate objective of seed planting using improve sowing equipment is to achieve precise seed distribution within the row. Read More...
|
Mechanical Engineering |
India |
1093-1095 |
268 |
An Experimental Investigation of Partial Replacement of Cement and Sand by Silica Fume and Stone Dust in Concrete
-Rakesh Chandra Chouhan ; Dr. J. N. Vyas
The development of concrete technology can decrease the use of natural resources and energy sources and lessen the burden of pollutants on environment. The major benefit of supplementary cementitious material is their ability to return certain amount of cement and still capable to present cementitious property, as a result reducing the cost of using Portland Pozzolana cement. The waste materials which can be used as additional cementitious material like fly ash, silica fume, blast furnace, stone dust etc. From all these waste material the most successful cementitious material is silica fume and stone dust because it improves the strength and durability of concrete to such level that recent design rules also identify for the addition of silica fume and stone dust for design of high strength concrete. Silica fume is also known as micro silica; it is used as an artificial pozzolanic super plasticizer. Stone dust is a waste material obtained from crusher plants. It has potential to be used as partial replacement of natural river sand in concrete. Use of stone dust in concrete not only improves the quality of concrete but also conserve the natural river sand for future generations. Substitution of normal sand by stone dust will serve both solid waste minimization and waste recovery. To reduce the amount of cement and sand in concrete supplementary material are used. Silica fume and stone dust are most popular material used in the concrete to improve its compressive, flexural, split tensile strength and also increase its durability. For this purpose silica fume is partially replaced by 0%, 5%, 7.5%, 10%, 12.5% and 15% by the weight of cement and stone dust is partially replaced by 0%, 10%, 15%, 20%, 25% and 30% by the weight of sand. The design mix proportion of 1:1.55:3.44 at water cement ratio of 0.50 were used for M20 grade of concrete. Various tests were conducted in the research which showed the results of the above percentage for the time period of 3, 7, 14 and 28 days curing as a substitution of cement by silica fume and sand by stone dust on compressive strength, flexural strength, split tensile strength and durability. The results show the maximum increase in strength of concrete occurred when cement and sand were replaced by 10% silica fume and 20% stone dust. Read More...
|
M.Tech in Structural Engineering |
India |
1096-1102 |
269 |
Study on Feature Selection Methods in Image Processing
-Patil Sarika ; Yogita Talekar
Feature extraction and selection is an important step in pattern recognition for the image processing. Feature selection directly affects the efficiency and accuracy of the pattern classification algorithm. Feature selection methods provides a way to create a perfect predictive model and is also used to remove unneeded, irrelevant and redundant attributes in the data. This paper gives the introduction to four feature selection methods with the comparative study. It shows that the selection of the methods is to be done based on the input parameters and the environmental situations as needed. Read More...
|
Electronics and Telecommunication Engineering |
India |
1103-1106 |
270 |
Mobile Cloud Computing Security Models: An Overview
-Manzamasso Kpelou ; Mr. Keshav Kishore
Cloud computing is the on demand of database storage, IT services and application over the internet. When paired with mobile computing, it vastly augments the limited resources of mobile devices in terms of processing power, battery life and storage. Hence raise up the Mobile Cloud Computing technology in which mobile users can access data anywhere and anytime, execute application regardless of the platform and benefit from various cloud services. However the MCC comes along with major challenges in data security and privacy that prevent it to be widely adopted. The purpose of this survey is to present data security and privacy requirement in Mobile Cloud Computing environment and the challenges it introduces. We also present the corresponding solutions that have been identified by various researchers to settle the challenges. Furthermore, we analyze and compare the works done by others researchers. We find out the best practices from each researcher work and combine them to build a framework. Read More...
|
Computer Science and Engineering |
India |
1107-1111 |
271 |
Effective Technique for Area Optimization for Pune Metro Project
-N. J. Satalkar ; K. H. Ghorpade; S. C. Tandale
An independent expert group should conduct the review based on clear, objective criteria and examine all aspects such as their justification, governance, accountability, viability and integration with other modes, and the review findings should be publicly discussed. The objective of this paper is to present a pre-feasibility study conducted by carrying out household surveys and focusing on the short-comings of the Pune metro to be faced in near future based on the available data and providing suggestions for the afore-mentioned problems. The Urban local bodies must be reformed to make them transparent and directly accountable to citizens, and undertake integrated, comprehensive, least-cost planning considering supply and demand side options. Otherwise, it is very likely that there would be large investments in urban transport projects with very little benefits, and our cities will grow increasingly grid-locked and unliveable. The above given solutions which are given, can be put to use to implement and eradicate some of the issues the metro is facing in the market. Care should be taken to develop an integrated transportation system and not favour any one mode of transportation. If the solutions are given and implemented, the problems can be dealt with and the issues which are being faced by other existing metros can be swayed and a faster integrated system can be achieved in a shorter span of time. Read More...
|
M.E. Civil (Construction & Management) |
India |
1112-1115 |
272 |
IOT Based Anti-Theft Vehicle Tracking and Regaining System
-Abhishek M S ; Sumana K R
Conceptual Structuring Anti-Theft vehicle Tracking and Regaining System which track the vehicle and offers to stop the vehicle in a base time allotment when it is lost. Hostile to Theft Vehicle following and recapturing System has a GPS(Global Positioning System) and a GSM(Global System for versatile communication).GPS is used to find the zone of the vehicle GSM for sending SMS to the owner of the Vehicle. Vehicle Tracking and Regaining structure is planned for both bicycle and four Wheeler Vehicles. Owner can send a SMS at whatever point to the contraption which is in the vehicle. This System in like manner consolidates the accident ready Feature. Subsequent to tolerating a message, then the owner may rise significant exercises to getting back the vehicle. The whole system is constrained by a fueled battery and connector. Read More...
|
Internet of things (IoT) |
India |
1116-1118 |
273 |
Firewall Algorithm Approach for Diminution of DDOS Attack on Cloud
-Vaishnavi D. Gawale ; Varshapriya J. N.
Although cloud computing practice has been increased extensively due to its more flexible and expanded infrastructure resources, using one of its major virtual (machine) instance service has become the centre of activity. These virtual instances are abstracted from public as well as private cloud and though the cloud security is treated as a prime issue still these cloud instance are vulnerable to DDOS attack. DDOS attack is second most influential and powerful attack seen on the cloud platform. The proposed solution emphasizes on preventing cloud instance from DDOS attack by implementing a new Firewall Algorithm. Here, the packets are categorized either as malicious or genuine. If packets are identifies as coming from attacker, then the respective IP addresses are blocked and thus, resulting in mitigating of DDOS attack. This paper frames the detailed execution of algorithm, attack study and staging results using statistics and graphs. Read More...
|
Computer Science and Engineering |
India |
1119-1124 |
274 |
Supply Chain In Analysing Rural E-Commerce Activity
-Jason Endigeri ; Akshay Kolhapur; Samitha
A supply chain is a network of facilities and distribution channels which encompasses the procurement of materials, production, assembly and delivery of product or service to the customer. The roles of various actors involved will differ from industry to industry and company to company in the management of the supply chain. Supply Chain Management become a vital issue for manufacturers, professionals and researchers as a result. This paper gives an idea and facts and figures on e-commerce in India. In addition the approach for understanding depth of Supply chain is proposed which traverse the domain of SCM. This paper gives an awareness into how supply chain management is handled in rural parts of the country and how efficiently it is or it can be managed. Read More...
|
Computer Applications |
India |
1125-1127 |
275 |
Design and Analysis of Runout Measuring Machine using FEA
-Mr. Sandip Subhash Narkhede ; Prof. Vijay Liladhar Firke; Mr. Dhruvakumar B. Sharma
Industrial engineering is a branch of engineering which deals with the optimization of complex processes or systems. It is concerned with the development, improvement, implementation and evaluation of integrated systems of people, money, knowledge, information, equipment, energy, materials, analysis and synthesis, as well as the mathematical, physical and social sciences together with the principles and methods of engineering design to specify, predict, and evaluate the results to be obtained from such systems or processes. While industrial engineering is a traditional and longstanding engineering discipline subject to (and eligible for) professional engineering licensure in most jurisdictions, its underlying concepts overlap considerably with certain business-oriented disciplines such as operations management. Depending on the subspecialties involved, industrial engineering may also be known as, or overlap with, operations management, management science, operations research, systems engineering, management engineering, manufacturing engineering, ergonomics or human factors engineering, safety engineering, or others, depending on the viewpoint or motives of the user. For example, in health care, the engineers known as health management engineers[not verified in body] or health systems engineers are, in essence, industrial engineers by another name. Read More...
|
M.Tech in Machine Design |
India |
1128-1129 |
276 |
A Review on Optimization of Process Parameters of AWJM
-Suraj Raghunath Tambe ; Subhash Kore
The abrasive water-jet machining is a new machining technique. Abrasive water-jet machining is extensively used in many industrial applications. There are so many process parameters affect quality of machined surface cut by AWJM. In this paper there is an overview of different process parameters of AWJM which determines the quality of performance measure. Read More...
|
Mechanical Engineering |
India |
1130-1132 |
277 |
On Scaling Ethereum Transactions and other Blockchain Based Cryptocurrencies
-Rajkumar Kamala Prasad Singh
The increasing of blockchain-based transactions has made cryptocurrencies scalability a primary and urgent concern. Here we have tried to analyze how the fundamental and circumstantial bottlenecks in Ethereum limits the ability of its current peer-to-peer overlay network to support substantially higher throughputs and lower latencies. Our results suggest that reparameterization of block size is only ï¬rst increment toward achieving upscaling, high-load blockchain protocols, and major advances will additionally require a basic rethinking of technical approaches. We offer a structured perspective on the design space for such approaches. Within this perspective, we enumerate and briefly discuss a number of recently proposed protocol ideas and offer several new ideas. Read More...
|
MASTER OF COMPUTER APPLICATIONS |
India |
1133-1136 |
278 |
A Need to the Valuation of Social Cost Incurred Due to Noise Pollution in Infrastructure Construction
-Junaid Z Shah ; Smita V Pataskar
Construction activities result in various types of hazards and discomforts at the time of operation. These problems may seem quite low in comparison with the benefits of any project, but they economically affect the environment around the site. This, in monetary terms, is known as social cost, often not taken into account while evaluating the total cost of the project. Of many different parameters for social cost, Noise pollution due to construction activity is identified as one of the few major threats to the environment surrounding the site of construction. Earlier studies have shown the Noise related ill-health effects of construction activities such as Stress, Blood pressure, severe headaches, lost in concentration, hearing deficiency, anxiety, etc. These inflicted parameters are a responsibility of the parties under the contract. Any Construction project benefits the society as a whole. Yet the problems of Noise due to its construction activities are faced by a very small part of the society, under-influence population. This study focuses on Review of various previous studies done in identifying the problems arose due to the Noise at the time of construction and the different formulas evaluated to evaluate the associated social cost. Read More...
|
M.E. Civil (Construction & Management) |
India |
1137-1141 |
279 |
Simulation of Heat Affected Zone Cracking Tendency during Tungsten Inert Gas Welding of Mild Steel Plates
-Nishant M ; Dr. Joy Varghese V M
TIG welding has been the most widely accepted welding processes so far in the industry due to its availability and versatility of welding equipment, low-cost equipment and excellent quality. Metallurgical changes, residual stress and distortions near the weld bead due to localized heating by the welding process and subsequent rapid cooling are the major problems to be addressed during welding. Defects may be on the surface or inside the weld metal. Certain defects like cracks are never tolerated but other defects may be acceptable within permissible limits. The 3D numerical simulation ANSYS code is used to predict cracking tendency in the mild steel plate. The thermo-mechanical effect of welding is simulated to study the residual stress distribution and the cracking tendency. As fusion zone of weld comprise of semi-solid phase, considering only the thermo-mechanical effect of welding is not desirable to predict the cracking tendency in the fusion zone as other factors like weld pool flow characteristics, the metallurgy of the zone depends. Thus cracking tendency in the heat-affected zone is only considered for the study. Firstly the thermal distribution developed during welding of mild steel plate was modelled by three-dimensional thermal model. Secondly, the stress distributions arising during the welding of mild steel plate was simulated based on simulated thermal distributions. The structural analysis gives residual stress and critical strain distribution which is further analysed and studied to determine the cracking tendency in the heat-affected zone. Read More...
|
M Tech. in Manufacturing and Automation |
India |
1142-1146 |
280 |
IOT Implementation in Vehicle Safety
-Dharamveer Mithilesh Gupta ; Sudeep Radhakrishnan Menon
Nowadays a lot of accidents happen on highways as a result of an increase in traffic and put together as a result of rash driving of the Riders. Many accidents are happening as a result of alcohol consumption or texting on the phone while driving & speeding. In case of an accident, there is a chance that police or ambulance might not reach the place in time. So our research is concerning Safety Detection in the Motor-Bikes and additionally an Accidental Location Detection using IoT. Once an accident happens, an Emergency message with location details is sent for the protection of the people travelling on the Motor-Bike. These systems have to be compelled to be installed inside the Motor-Bike & helmet. So helmet can be paired with Motor-Bike to check if it is paired then only the Motor-Bike will start or else it will not start. Read More...
|
Internet of things (IoT) |
India |
1147-1149 |
281 |
Novel Approach for Isolation of Malicious Nodes in MANET
-Saurabh Kumar ; Tarun Kumar
The mobile ad hoc network is decentralized type of network in which mobile nodes can join or leave the network when they want. Due to such type of property malicious nodes enter the network which triggers various type of security attacks. The wormhole attack is the active type of attack in which delay is increased in the network. In this research work, the approach of threshold is proposed for the isolation of malicious nodes in the network. The proposed technique detect malicious node based on the delay in the network. The proposed technique is implemented in network simulator version 2 and results are analyzed in terms of certain parameters. Read More...
|
M.Tech in Computer Science And Engineering |
India |
1150-1153 |
282 |
Health Impact Assessment on Sand Stone Mining Workers Due to Respirable Suspended Particulate Matter from Mining Activities near Kota City
-Rohit Kumar Meena
Mining is viewed as one of the important economic activities which have the potential of contributing to the development of economies. At the same time, the environmental and health impacts of mining on surrounding communities has been a major concern to governments. Rajasthan has been the largest sandstone producing state of India. The sand stone is obtained from underground by a process of drilling, blasting or cutting. Very small mines are called quarries from which stone is excavated by open mining. In sand stone mines both of the procedures mechanically and manually were adopted. Many mines/quarries used mining machinery, such as compressors, drilling machines for drilling and blasting, cranes for lifting big blocks, and dampers and trucks for transport. All of these processes produce huge amount of mining dust. A high percentage of silica presence in mining dust and the particle size distribution further suggest that the occupational environment of the workers and surrounding areas may be hazardous to human health. A high volume air sampler is used for sampling of RSPM (PM10) from various locations and the Questionnaire health survey conducted on 50 quarry workers at the mining area, which results indicate that the observed dust may be harmful to respiratory system and health. These workers inhale air which contains high amount of dust and these small particles are deposited in the respiratory system at different places. In this survey workers were divided in four groups depending upon the type of their age. Questionnaire survey is describe health problems by mining dust (breathing problem, fever, weight losses hearing problem, eye visuals effect, etc.) of quarry workers. Read More...
|
Environmental Engineering |
India |
1154-1158 |
283 |
A Performance Based Comparison of Two Automated Software Testing Tools: Review
-Ashish Kumar Sharma ; Surendra Kumar
Software testing is a very important part of any software development life cycle. Testing is an important part of delivering a quality software product. Software testing are basically two types manual testing and automated testing. Manual testing requires many effort and hard work, so there was always a need in software testing to decrease the testing time. For reducing the testing time and find the more effective result automated testing is used. Now a day the use of the computer is increased. To improve the quality of the software product is very essential. Read More...
|
Computer Science and Engineering |
India |
1159-1163 |
284 |
Fault Current Limiting Technology for PMSG Based Wind Turbine with DC Microgrid
-Rahul Ratan Aher ; S. S. Hadpe
Permanent magnet synchronous generator (PMSG) wind turbine widely use with dc micro grid having large number of advantages with dc bus system. When fault is takes place in the system more energy is reflected to PMSG and its affect on the moving part of PMSG causes over speed and mechanical stress on the rotor. Also heavy current will flow the generator side converter. In this paper use super conducting fault current limiter (SFCL) is use to minimize the fault current and improve capability of PMSG wind turbine with dc microgrid in faulty condition. Where entire system is simulated by using MATLAB software and developed the PMSG, converter AC/DC, SFCL and DC bus. First study the operation of the SFCL to increases the DC output of the converter. Then detailed result are obtained with and without SFCL is consider for study the impact of SFCL on the speed, torque, and output power of PMSG. Obtained result make sure that SFCL is suitable to minimize the fault current. In addition acceptable current limiting resistance value is also establish to obtain the successfully operation of PMSG. Read More...
|
Electrical Engineering |
India |
1164-1167 |
285 |
Application of k-means Clustering to Multidimensional Geo-spatial Data and Clustering Algorithm for Handling Data Precision
-Kiran M N ; Dhanjai N; Mahendra Kumar .B
Clustering is a method of grouping a group of objects in such a way that data objects in same group called "CLUSTER" have similar properties to each other than to those in other cluster (group). The K-means algorithm is based on simple idea i.e. Given a set of initial clusters points, assign each point to one of items, then each cluster center is replaced by the mean point on the respective cluster. These two simple steps are repeated until convergence. A point is assigned to the cluster which is close in Euclidean distance to the point. In this paper we will discuss how K-means algorithm is used for clustering of data (objects) and solve problems like active learning intrusion detection, distribution of teachers, clustering of multidimensional geo-spatial data and handling data precision. Read More...
|
MASTER OF COMPUTER APPLICATIONS |
India |
1168-1173 |
286 |
Agriculture in Cloud Computing
-Manjunatha ; Jyothishree; Suma S
Proposed paper gives information about how the cloud computing is helpful for the agricultural sector. Cloud computing plays a very important role in the field of agriculture, in which nearly 70% of our India population is completely depend on the agriculture. The major income of the India is from the agriculture only. Because the farmers of India are still following the crude method of farming, that reduces the productivity and they will not be able to get more profit. Use of cloud computing technology may increase the productivity and profit percentage of the farmer. Cloud is one of the technology where all the information are stored, and can be accessible from anywhere at any time by the end users. Agriculture cloud contains the information about the climate, soil fertility, humidity, fertilizers, crop details, insecticides and other information that helps the farmers to improve their knowledge and to take good decision about the variety of crops to be select for cultivation. This paper informs about the agricultural cloud, services provided by the cloud, role of cloud computing in agriculture, benefits of cloud computing in agriculture, challenges of agriculture and deployment models, different technologies used in cloud computing. Read More...
|
Master of Computer Application |
India |
1174-1177 |
287 |
Fire Detection System Based on CNN
-Jinsha C J ; Shejina N M
The embedded processing have enabled the vision based systems to detect fire during surveillance based on convolutional neural networks (CNNs).The proposed method for a cost-effective fire detection CNN architecture for surveillance videos. The model is inspired for GoogleNet architecture. The fire are features are extracting the super pixel method. Its computational complexity and suitability for the intended problem compared to other computationally networks. When balanced the efficiency and accuracy. The nature of the problems and fire data. The Experimental results helpful for fire datasets reveal the effectiveness of the proposed framework and its suitability for fire detection in CCTV surveillance systems compared to another fire detection methods. Read More...
|
Computer Science and Engineering |
India |
1178-1182 |
288 |
Design and Optimization of Aluminium Alloy Wheel Rim using Finite Element Analysis
-Abhishek Keskar ; Saurabh Nagarkar; Prabhash Patil; Akshay Jadhav
This paper deals with the design and optimization of Aluminium Alloy wheel rim of a Maruti Suzuki Alto car using Solid works and Finite Element Analysis software named Ansys. The main motive of our project is to convert a traditional wheel rim with nave plate into an aesthetically sound wheel rim bearing less weight as compared to traditional wheel rim. The newer design of the wheel rim is done over solid works software in which the dimensions of the traditional wheel rim were not altered but the Nave plate was modified into an Alloy wheel rim with spokes. And further the Static structural, Modal and Random vibration analysis was carried out to test the durability of our newly proposed design of the wheel rim. This new design will be less in weight and cost compared to Traditional wheel rim. Read More...
|
Mechanical Engineering |
India |
1183-1189 |
289 |
Designing and Analysis of an Earth Air Heat Exchanger using CFD
-Akash Deep Yadav
One of the real objectives of current innovation is to change vitality framework to diminish unfriendly ramifications on biological system. Earth air cooling is a decent choice for sparing vitality by diminishing the electrical utilization, water use and for lessening outflows; contrasted with customary cooling strategies. Earth air heat exchanger (EAHE) utilizes temperature slope among earth and air to cool the air and to supply this precooled air to the structure. Perceptions demonstrate that the ground temperature beneath a specific profundity remains generally steady consistently. This is because of the way that the temperature vacillations at the outside of the ground are lessened as the profundity of the ground expands as a result of the high heat latency of the soil. Likewise, there is a period slack between the temperature changes at the surface and in the ground. Thus, at an adequate profundity, the ground temperature is constantly higher than that of the outside air in winter and is lower in summer. This temperature slope between the ground and surrounding air can be utilized for fluctuating the states of air before it goes into the room. Pipes are covered somewhere down in the ground and when the air went through these pipes, air is warmed/cooled by the temperature difference between the air and ground. This framework is called Earth Air Heat Exchanger (EAHE) framework. In this paper, a model of the framework was created in ANSYS ICEM programming to foresee the cooling limit of earth air heat exchanger. The model was broke down utilizing ANSYS FLUENT reenactment program. The reenactment results gotten by utilizing computational fluid dynamics (CFD) device is approved utilizing experimentation done on a test setup. Great understanding between the exploratory perceptions and mimicked results are obtained. The model talked about in this paper is made of 0.7 m long PVC pipe with 0.075 m distance across. Experimentation done on the model demonstrates a temperature drop of 1.90C – 3.20C at a stream speed of 2.5m/s through the cylinder when the temperature distinction among soil and encompassing air was 10.9 - 20.20C separately. The impact of working parameters on the EAHE framework by differing the pipe breadth, speed of wind current and pipe length is likewise examined in this paper. Read More...
|
M. Tech Mechanical Engineering Design |
India |
1190-1196 |
290 |
Utilization of Red Mud and Pondash as Alternative Raw Materials to Produce Eco-Friendly Bricks
-Ms. Sonashri. K ; Ms. Vanishree. H; Ms. Suprita. S. More; Ms. Supriya. A. G; Mr. Vinay. R. B
Red mud is the waste product generated by bayer process in the aluminium industry. Enoromous quantity of redmud is generated worldwide every year facing a serious environmental problems of storage occupying a lot of space. Pondash is produced in large quantities during the combustion of coal for energy production and recoganised as an environmental pollution. The study focused on evaluation of mechanical properties of bricks by replacement of normal soil with varying % of red mud and pondash. The test results are compared with normal bricks, optimum compressive strength values was achieved for 5% redmud replacement to normal soil, normal soil + 5%redmud +15%pondash, normal soil+10%redmud+5%pondash and also water absorption and efflorescence test results were also found satisfactory. Read More...
|
Civil Engineering |
India |
1197-1200 |
291 |
Review of Bandwidth Enhancement of a Microstrip Patch Antenna with a Different Shape for WLAN Communication
-Amit Mishra ; Prof. Dhruv Singh Thakur
Micro Strip patch antenna is an important concern in any communication either it is wired or wireless network. Wireless Communication is an important role in any type of communication. Microstrip patch antenna is generally used because of light weight cheaper cost and easily installed in any type of communication system. Here we are discussed about the different type and different structure of antenna for different application and also impedance matching technique by using different type of stub matching and slotting. Moreover in microstrip patch antenna which is self- organizing, to enhance the bandwidth as well as gain depending on structure of an antenna. Read More...
|
Electronics & Communication Engineering |
India |
1201-1203 |
292 |
Smart Glass for Visually Impaired
-Kriti Dubey ; Rishab Bhattacharyya; Manvitha Raju; Chandra Kiran Reddy Y; Dr. B. S. Shylaja
Smart Glass is a device which is a wearable spectacle that adds more information to what the wearer sees. These glasses are computerized with heads up display which collects information from internal as well as external sources. Smart glasses have all the features of Smart Phones like they support Bluetooth, Wi-Fi, GPS – which has an inbuilt function of an activity tracker which tracks the distance walked or run, calories burned and heartbeat count. Blind and Visually impaired people find difficulties in walking the street, which makes it dangerous. In this paper, the proposed system is based on a Raspberry Pi Module 3B, which acts as processor, to capture images through Raspberry Pi Camera to detect faces. The system detects and sends a warning message via an earphone. The experimental result achieved using the LBPH classifier is 85% accurate in face detection. The smart glass is economically friendly and user-friendly. Read More...
|
B.E. INFORMATION SCIENCE AND ENGINEERING |
India |
1204-1207 |
293 |
Implementation and Applications of CORDIC Algorithm in Satellite Communication
-Mr. Manoj Sarjerao Jadhav ; Dr. Manik S Gaikwad
CORDIC is nothing but COrdinate Rotation DIgital Computer. This is a versatile algorithm, widely used for VLSI implementation of digital signal processing (DSP) based communication systems. How to use CORDIC in satellite communication is explained in this paper. Specifically, Digital Down Converter (DDC), Direct Digital Frequency Synthesizer (DDFS), and use of CORDIC in digital modulator and demodulator has been explained. The algorithm and its applications are first realized on System Vue software tool and then designs are coded in VHDL. Apart from the implementation aspects, paper presents new results regarding the number of branches required for computation. The paper also analyzes the performance of CORDIC based DDC and DDFS on the basis of hardware requirement. The system is implemented on XILINX FPGA platform and tested in real time for its performance. Read More...
|
VLSI & Embedded Systems |
India |
1208-1212 |
294 |
A Key-Arrangement Quality Based Transitory Watchword Look Plot for Secure Distributed Storage
-Chandra Shekar L ; Abhishek Dube
Brief catchphrase seek on secret informations in a cloud situations is the principle focal points of this exploration. The clouds suppliers are not completely trusted. In this way, it is important to re-appropriate informations in the encoded structure. In the excellence based watchwords look (ABKS) plans, the approved client can produce some inquiry tokens and send them to the cloud for running the hunt activity. These hunt tokens can be utilized to remove all the cipher texts which are created whenever and contain the comparing watchword. Later this may quick some data discharge, it is progressively locked to propose a plan in which the examination token can just concentrated the cipher text produced in a program time temporary. To this end, in this paper, we presents another cryptographic crude called key-strategy trait based transitory catchphrase look (KPABTKS) which give this property. To assess the security of our plan, we formally demonstrate that our proposed plan accomplishes the catchphrase mystery property and is secure against specifically picked watchword assault (SCKA) both in the arbitrary prophet display and under the hardness of Decisional Bilinear Diffie-Hellman (DBDH) presumption. Besides, we demonstrate that the unpredictability of the encryption calculation is direct as for the quantity of the included traits. Execution assessment demonstrates our plans common sense. Read More...
|
Computer Science and Information Technology |
India |
1213-1215 |
295 |
Android OS and its Versions
-Poorna Pragnya S ; Vibha M B
The operating system of Android is mainly used for smartphones, tablets and even televisions. Basically it is an Open Source operating system. It is the widely used Operating system for smartphones. Android operating system stack comprised of four layers: application framework layer, application layer, Libraries, Linux Kernel. This paper defines Android software stack and its versions. Read More...
|
Computer Applications |
India |
1216-1217 |
296 |
Study on Face Recognition
-Champa M S ; Rekha B S
Face recognition deals with identifying the person from digitally captured image from previous knowledge. Face recognition has applications in security, image database investigations, access control and surveillance. Various features or patterns can be extracted from the images stored in database and can be used for training the machine learning model in order to classify the captured probe image. There are various techniques for extracting features and classifying the probe image. This survey provides various feature extraction and classification techniques that can be implemented. Read More...
|
Artificial intelligence |
India |
1218-1221 |
297 |
A Comprehensive Report on Water Jet Cutting
-Yogesh Kumar Ojha ; Abhishek Gupta
In this paper a comprehensive report has been presented in the light of research work undertaken in the field of abrasive water jet cutting. This machining process is the one of the non-conventional machining processes. Various research has been carried out computationally and experimentally in order to bridge the research gap in metal machining process through non-conventional machining technology. Read More...
|
M Tech in Adavanced Manufacturing Systems |
India |
1222-1225 |
298 |
A Study on the Effect of Zeolite in Lime Treated Clayey Soil
-Vaishna Prabhakar B
Nowadays organic clay soil can be found in many reclaimed lands. These soil exhibit high settlement potential and low strength. So this soil needs to be improved by means of effective ground improvement techniques. Commonly used conventional and low cost technique is to modify the soil with lime at the site itself to make it suitable for construction and allow it to increase its strength by pozzolanic reactions between lime and clay minerals. Lime is found to be an effective stabilization material for clayey soil, but it is not as such in soil containing organic impurities. In this study an attempt is made to improve the performance of lime treated organic clay by adding a catalyst zeolite by conducting laboratory test. The unconfined compressive strength test (UCC) is conducted on remoulded samples for different curing period. The addition of synthetic zeolite in lime organic stabilized soil has much increased the soil strength on curing. The unconfined compressive strength of optimum percentage of lime treated soil with 8% zeolite shows 97% increase for 56 days of curing period. Increase in Maximum Dry Density (MDD) is also found during zeolite addition for the lime treated soil. Maximum increase in MDD is observed for the soil with 8% lime and 5% zeolite. Read More...
|
Civil Engineering |
India |
1226-1230 |
299 |
Investigation of Importance of Earthquake Resistant Building with Seismic and Non- Seismic Analysis
-Malik Mohd. Rizwan ; Tarandeep Singh; Arpan Chabba
Low-rise and medium-rise models shall be prepared, designed and analyzed in the Bentley’s software Staad.pro. Staad.pro is a common designing tool in which the structures are analyzed and designed as per their respective codes. 3 storey, 5 storey, 7 storey and 9 storey buildings were modeled once the modeling is done; different design methods shall be adopted. First, the various structures shall be analyzed without the earthquake forces and then, the same structures shall be analyzed with earthquake forces as per IS: 1893-2016 by considering the various seismic parameters. Design of RCC framed buildings was done as per IS: 456. Grades of steel and concrete were taken as Fe500 and M25 respectively. Rest of the parameters was taken as per the guidelines of aforementioned codes. Result shows that the earthquake resistant buildings entail more material cost (1.16% to 1.35% more than non-seismic resistant building). But the other structural parameters were also increased such as forces and bending moment and displacement as well. The displacement tends to increase 11 times when the earthquake forces were introduced which will not be restrained by the building which was not analyzed with seismic forces. Therefore, it is necessary to analyze the building with earthquake forces so that, in future, the building will be earthquake proof and it can easily withstand its forces. Achieving economy is useless if the building fails during such calamities. Read More...
|
Civil Engineering |
India |
1231-1234 |
300 |
Computer Laboratory Automation System using IoT
-Chandra Prakash
The Advancement of Automation technology now a day, as information sensing, communication, monitoring, and control become more sophisticated and ubiquitous. The idea behind this project is to design and implementation of Computer Laboratory Automation System that uses Internet of Things (IOT) integration as a network infrastructure connecting to its components. Like we all know that more usages of a hardware are become non-existed or frequently faulty. Therefore, the better option is, increase the usages of software over hardware to protect the environment from e-waste. This project aims to increase the use of software technology to automate the Computer Laboratory by mobile phones using the aforementioned approach. This system consists of two main components; the first part is the single board microcontroller (Arduino Uno R3 SMD Development Board), which controls the input command receive from mobile phone via Bluetooth and send it to relay, which is connected to panel controller of the computer via mother board. Second part is the Bluetooth module (HC-05), which is work as an interface between android mobile phone application and the microcontroller. If my work is continued and my system is made more efficient, this could be a breakthrough for computer laboratory automation because it does not require the aid of a human at any point during the monitoring and controlling phase except hands on mobile phone. The same project can be scale up as additional functionalities like monitoring of more computer functionality. Read More...
|
Computer Science and Engineering |
India |
1235-1238 |