Quantitative Determination of Swertiamarin in Swertia chirayita by HPTLC |
Author : LAIQA ANJUM, ZAINUL A. ANSARI, ARADHNA YADAV, MOHD. MUGHEES, JAVED AHMAD & ALTAF AHMAD* |
Abstract | Full Text |
Abstract :A simple, rapid, and accurate High-Performance Thin-layer chromatographic (HPTLC) method has been developed for the determination of Swertiamarin in aerial parts of Swertia chirayita procured from Nepal & collected from Gangtok and Kumaon respectively. The methanolic extracts of Swertia chirayita samples were applied on TLC aluminum plate pre-coated with Silica gel 60 GF254 and developed using a solvent system containing Ethyl acetate : Methanol : Water (7.7 : 1.3 : 0.8, v/v/v) as a mobile phase. The densitometric detection of spots was carried out using a UV detector at 245 nm in absorbance mode. This system was found to give compact spot for swertiamarin (Rf value = 0.53±0.02). The calibration curve was found to be linear in the range of 200 to 1000 ng/spot. The limit of detection and quantification were found to be 50 and 200 ng/spot, respectively for swertiamarin. The highest and lowest concentration of swertiamarin in Swertia chirayita was found to be present in sample from Nepal and Gangtok, Sikkim respectively. The method was validated in accordance with ICH guidelines. |
|
Simulation & Implementation Of Three Phase Induction Motor On Single Phase By Using PWM Techniques |
Author : Ashwini Kadam1,A.N.Shaikh2 |
Abstract | Full Text |
Abstract :The main objective of this paper is to control the speed of an induction motor by changing the frequency using three level diode clamped multilevel inverter. To obtain high quality sinusoidal output voltage with reduced harmonics distortion, multicarrier PWM control scheme is proposed for diode clamped multilevel inverter. This method is implemented by changing the supply voltage and frequency applied to the three phase induction motor at constant ratio. The proposed system is an effective replacement for the conventional method which produces high switching losses, results in poor drive performance. The simulation & implementation results reveal that the proposed circuit effectively controls the motor speed and enhances the drive performance through reduction in total harmonic distortion (THD). The effectiveness of the system is checked by simulation using MATLAB 7.8 simulink package. |
|
Analysis of T-Source Inverter with Integrated Controller using PSO Algorithm |
Author : Sathyasree.K1,Ragul.S2,Divya.P3,Manoj kumar.R4 |
Abstract | Full Text |
Abstract :This paper deals with the design and simulation of integrated controller for T-source inverter (TSI) based photovoltaic (PV) power conversion system. The TSI has less reactive component, high voltage gain and reduced voltage stress across the switches compared to conventional inverter used in PV power conversion system. Integrated controller provides the maximum power point tracking and DC link voltage control to the PV power conditioning system. Here the Maximum Power Point Tracking (MPPT) in achieved by PSO algorithm and DC link voltage is controlled by capacitor voltage controller algorithm. T-Source inverter implemented with integrated control for PV system is simulated using MATLAB Simulink. The results are analyzed, compared with DC link controller; the same has been verified with experimental setup. |
|
Seismic Behavior of soft Storey Building : A Critical Review |
Author : Devendra Dohare1, Dr.Savita Maru2 |
Abstract | Full Text |
Abstract ::- Soft first storey is a typical feature in the modern multi-storey constructions in urban India. Though multi-storeyed buildings with soft storey floor are inherently vulnerable to collapse due to earthquake, their construction is still widespread in the developing like India. Functional and Social need to provide car parking space at ground level and for offices open stories at different level of structure far out-weighs the warning against such buildings from engineering community. With the availability of fast computers, so that software usage in civil engineering has greatly reduced the complexities of different aspects in the analysis and design of projects. In this paper an investigation has been made to study the seismic behaviour of soft storey building with different arrangement in soft storey building when subjected to static and dynamic earthquake loading. It is observed that , providing infill improves resistant behaviour of the structure when compared to soft storey provided. |
|
Effect of water temperature during evaporative cooling on Refrigeration system |
Author : Mohit Yadav, Prof. S.S Pawar |
Abstract | Full Text |
Abstract :Refrigerator is mainly a composition of four devices Compressor, Condenser, Expansion device and evaporator which have some limitations [1]. Temperature range of working is also a limitation for Refrigerator which affects their performance. Here we provide more effort to reduce the limitations related to working temperature range and try to modify the size of refrigerator with the effect of evaporative cooling.Since condenser rejects latent heat of refrigerant to atmosphere due to higher temperature of refrigerant at condenser. So due to this rejection of heat it provides the cooling in evaporator [2]. Co-efficient of performance of refrigeration system mainly depends on temperature difference between the condenser and that medium where heat is to be rejected. More temperature difference, more heat rejection so more cooling on account of same work to refrigeration system. But if the temperature difference is less, less heat rejection will be there so less cooling by giving same amount of work which decreases the Co-efficient of performance of the system. [3] |
|
Review on Sensor parameter analysis for forward collision detection system |
Author : . Vaishali B.Gadekar1, Mrs. Savita R, Pawar2 |
Abstract | Full Text |
Abstract :Automobile crash safety is becoming one of the important criteria for customer vehicle selection. Today, passive safety systems like seat belts, airbags restraints systems have become very popular for occupant protection during collisions. Even the active safety systems like ABS, ESP, parking assist camera etc are becoming regular fitments on many vehicle models. Also many technologies are evolving for collision detection, warning & avoidance as well. Different sensors, which comprise of RADAR, LIDAR / LASER or Camera, are used in forward collision warning (FCW) to avoid the accidents. In this project scope, study is carried out on sensing parameters for different types of sensors on Indian road environment in context of collision avoidance systems to benefit the overall road safety in India. The analyses of the parameters will support towards selection of best sensing configuration, to achieve optimal system performance. Such a study would also provide insights into the functionality limitations of different types of sensing systems. |
|
Parameter Optimization and Evaluation of Hydrodynamic Functions in the Wet Range of Water Availability in Different Soils |
Author : R. K.Malik^1, Deepak Kumar2 |
Abstract | Full Text |
Abstract :The knowledge of the soil hydrodynamic functions is essential for modeling the soil water dynamics and different components of water balance. Major contribution of these components occurs during the wet range of water availability in the soil profile. The functional form of the most commonly used theoretical hydrodynamic functions of Brooks-Corey and van Genuchten coupled with Burdine and Mualem hydraulic conductivity models were developed for coarse, medium, and moderately fine-textured soils. For developing these functional forms, parameterization and fitting performance of the corresponding soil water retention functions were performed using RETC computer code employing non-linear least-squares optimization. It was observed that for the wet range of water availability in the loam and silty clay loam soil, the best performance was given by the Brooks-Corey soil water retention function followed by van Genuchten functions with m = 1-1/n and m = 1-2/n. However for this range of water availability, the van Genuchten functions with m = 1-1/n gave a slight better performance in sand in comparison to other functions which gave same performance. It was observed that as the sand content of these soils decreases, the hydraulic conductivity and soil water diffusivity at particular soil water content also decreased. The hydraulic conductivity predicted by the Mualem-van Genuchten function were observed to be less than predicted by Mualem-Brooks-Corey function and the same trend was observed for the soil water diffusivity for these soils. |
|
Design and Implementation of Advanced ARM Based Surveillance System using Wireless Communication |
Author : Ms. Jadhav Gauri J. |
Abstract | Full Text |
Abstract : This paper evaluates development of a low cost surveillance system using different sensors built around the microcontroller with fingerprint sensor module. The low power PIR detectors take advantage of pyroelectrcity to detect the change in environment temperature through human temperature in our experiment. Also we are using Ultrasonic sensors and vibration sensors. Ultrasonic sensor (Obstacles detection) detects the intruder on their physical presence .Vibration sensors detect sound of breaking or senses vibration signal. Fingerprint sensor module is based on taking fingerprint of the user with the help of fingerprint sensor module and matching it with the database details corresponding to the user fingerprint and displays it on the computer screen. Detecting the presence of any unauthorized person it triggers an alarm and send sms to a predefine number through a GSM modem. This surveillance system has a better percentage of security with respect to other security system available. Apart from this it is fast processing less expensive and better probability, alter and copy of information between source and database. |
|
Experimental study of different operating temperatures and pressure in PEM fuel cell |
Author : Sudhir Kumar Singh |
Abstract | Full Text |
Abstract : This Paper also give the Various range parameter of temperature of using fuel cell and including current voltage power characteristic , uniformity of cell unit voltage, Gas, pressure impact and air flux impact operating temperature of fuel cell has been change in anode and cathode side. This paper also give the experimental approach of the fuel cell. The effects of different operating parameters on the performance of proton exchange membrane (PEM) fuel cell have been studied experimentally using pure hydrogen on the anode side and air on the cathode side. |
|
Engineering and Sustainable Environment |
Author : Er. Amit Bijon Dutta 1, Dr. Ipshita Sengupta 2 |
Abstract | Full Text |
Abstract : India is one of the promising universal business giant with a second fastest fiscal escalation rate (8.9%) and a fourth largest GDP in terms of Purchasing Power Parity (US$ 3.6 trillion). Every industry faces the threat of failure in business. Construction companies are predominantly susceptible to fiscal risk owing to the nature of the industry, intense rivalry, reasonably low access barrier, soaring uncertainty and risk involved, and fanciful rise and falls in construction volume. We need to encompass a closer perceptive of the correlation involving the two inter-related matters of risk management and funding on construction projects. It is becoming progressively more essential to attain the goals of the patron, the proprietor and the constructor and its supply chain, particularly when the interest in PFI and PPP arrangements are incessantly budding all around globally. Engineers carry on their shoulders the responsibility of endorsing the principles of sustainable growth. Sustainable development deals with meeting existing individual needs from naturally accessible reserves, while preserving and enhancing the surrounding environmental quality. This paper deals with the various issues involved in the process of engineering while taking in view the environmental considerations for future generations, the prospective responsibility industrial engineers can have in putting a stop to pollution caused by industrialized processes and accentuate how both disciplines can be pooled to craft well-organized and competent resolutions. |
|
Automation of Inter-Networked Banking and Teller Machine Operations |
Author : Prof. Mazher Khan 1 Dr.Sayyad Ajij 2 Mr.Majed Ahmed Khan |
Abstract | Full Text |
Abstract :— In this article about biometric systems the general idea is to use of facial recognition to reinforce security on one of the oldest and most secure piece of technology that is still in use to date thus an Automatic Teller Machine. The main use for any biometric system is to authenticate an input by Identifying and verifying it in an existing database. Security in ATM’s has changed little since their introduction in the late 70’s. This puts them in a very vulnerable state as technology has brought in a new breed of thieves who use the advancement of technology to their advantage. With this in mind it is high time something should be done about the security of this technology beside there cannot be too much security when it comes to people’s money. |
|
Analysis of Noise Signal Cancellation using Adaptive Algorithms |
Author : Abhishek Chaudhary1, Amit Barnawal2, Anushree Gupta3, Deepti Chaudhary4 |
Abstract | Full Text |
Abstract :Noise is an indispensable part in signal processing that we encounter every day. The study of reducing noise arises from the need to achieve stronger signal to noise ratios. It is any unwanted disturbance that hampers the desired response while keeping the source sound. The different sources may include speech, music played through a device such as a mobile, IPod, computer, or no sound at all. Active noise cancellation involves creating a supplementary signal that DE constructively interferes with the output ambient noise. The cancellation of noise can be efficiently accomplished by using adaptive algorithms. An adaptive filter is one that self-adjusts the coefficients of transfer function according to an algorithm driven by an error signal. The adaptive filter uses feedback in the form of an error signal to define its transfer function to match changing parameters. The adaptive filtering techniques can be used for a wide range of applications, including echo cancellation, adaptive channel equalization, adaptive line enhancer, and adaptive beam forming. In last few years, a lot of algorithms have been developed for eradicating the distortion from the signals. This paper presents analysis of two algorithms namely, Least Mean Square (LMS), Normalized Least Mean Square (NLMS) and gives comparative study on various governing factors such as stability, computational complexity, filter order, robustness and rate of convergence. It further represents the effect of error with alteration in amplitude of noise signal fixating reference signal and desired signal. The algorithms are developed in MATLAB |
|
An Assessment on Asha Worker’s Awareness and Implementing a Low Cost Integrated Toolkit for Accredited Social Health Activist(Asha) Using Android Device (Aakash Tab) |
Author : Dipanwita Debnath1, Suman Deb1, Kaushik Debnath2, Subir Saha3 |
Abstract | Full Text |
Abstract :The objective of Government of India is to provide comprehensive integrated health care to the rural people underthe umbrella of National Rural Health Mission (NRHM). Avillage level Female community health worker “Accredited Social HealthActivist” (ASHA)’ acts as an interface between the communityand the public health system. Therefore present study wasconducted to access the socio-demographic profile of ASHAworkers and to assess the knowledge awareness and practice oftheir responsibilities.Mobile technologies have penetrated rural parts of the countries unlike any other technology. This canbe leveraged to provide primary maternity healthcare services. A low cast toolkit containing AAKASH TAB (android smart phone) is designed in such a way that it helps to take decision and supports for decision making. |
|
Espionage on Search Optimization using Dynamic Query Form |
Author : Prajkta Dagade1, Mansi Bhonsle2 |
Abstract | Full Text |
Abstract :Traditional data mining technologies cannot work with huge, heterogeneous, unstructured data. Modern web database as well as scientific database maintains tremendous and heterogeneous data. These real word databases may contain hundreds or even thousands of relations and attributes. Query form is one of the most widely used interfaces for querying database. Traditional query forms are designed and pre-defined by developer or DBA in various information management systems. But extracting the useful information with this traditional query form from large dataset and streams of the data is not possible and it is difficult to design set of static query forms to satisfy numerous ad- hoc database queries on those complex databases. In this paper, we propose a Search optimization using dynamic query form system SODQF. SODQF is a query interface which is able to dynamically generating query forms for user. Unlike to tradition document retrieval, users in database retrieval are often willing to perform many rounds of action before identifying final results. Dynamic query form captures user interest during the user interaction and to adapt the query form interactively. Each iteration consists of three types of user interactions, Selection from an assortment of the forms, Query form Renovation and Query Execution. The Query from is enriched repeatedly until the user is satisfied with the query results. In this paper we are mainly focusing dynamic generation if query forms and ranking of query form components |
|
An Investigative and Synoptic Review on Helium Liquefaction Using a Commercial 4 K Gifford- McMahon Cryocooler |
Author : Mahesh N1, S A Mohan Krishna2 |
Abstract | Full Text |
Abstract :The review paper describes liquefaction of helium using a commercial cryocooler with 1.5 W cooling power at 4.2 K, equipped with heat exchangers for precooling the incoming gas. Measurements of the pressure dependence of the liquefaction rate are considered. Also liquefaction rate and temperature can be observed by placing resistors in series inside the liquefaction container. There by taking voltage reading we will get liquefaction rate. The assembly of Gifford -McMahon cryocooler with heat exchangers and helium liquefaction container is usually accomplished. The pressure gauge has to be connected to the container in order to examine the oscillation which gives the liquefaction rate. Also resistors are placed inside the container to measure the temperature and pressure of helium at different stages in container. This paper furnishes detailed information about the methodology and experimental technique about the utility of Gifford-McMahon cryocooler for Helium liquefaction |
|
Structural Analysis on Unconventional Section of Air-Breathing Cruise Vehicle |
Author : BASHETTY SRIKANTH1, K.DURGA RAO2, Dr.S.SRINIVAS PRASAD3 |
Abstract | Full Text |
Abstract :High temperatures encountered during hypersonic flight lead to high thermal stresses and a significant reduction in material strength and stiffness of airframe of air-breathing hypersonic cruise vehicle. Thermo-structural analysis on hypersonic vehicle airframe is one of the challenging problems since the properties, yield strength and ultimate tensile strength varies with temperature. Thermal analysis, structural analysis and coupled thermo-structural analysis has been carried out on an unconventional section of hypersonic air-breathing cruise vehicle subjected to high temperatures and flight loads. The unconventional section having constant cross section designed for housing the fuel tank and intake-cowl opening mechanism of cruise vehicle has been modeled using commercial software CATIA V5. Analytical stresses have been calculated due to flight loads at control surface deflection of 0° and 15° at Mach 6, 590°C temperature. Linear relation between E, G and K with temperatures has been considered in the computational and analytical calculations. Computational analysis has been carried out using commercial software ANSYS Workbench in the present study. Static analysis has been carried out on section subjected to maximum bending moment of 6900 N-m to verify the structural integrity of the section. The results obtained from computational analysis are in good agreement with analytical results. This study provides the material combination which ensures structural safety of airframe of cruise vehicle at all operating conditions. |
|
Big Data using Hadoop |
Author : Dinesh D. Jagtap1 |
Abstract | Full Text |
Abstract : Big Data” is data that becomes large enough that it cannot be processed using conventional methods. The term Big Data concerns with the huge volume, complex and rapidly growing data sets with multiple, independent sources .Due to fast development of networking ,data storage and data collection capacity the concept of big data is now rapidly expanding in all science and engineering domains including biological, physical and biomedical sciences. Social networking sites, mobile phones ,banking and stock exchange sectors, sensors and science contribute to production of peta bytes of data daily. That’s why Big Data analysis now drives almost every aspect like mobile services, retail, financial services, manufacturing and life sciences. We all have heard a lot about “big data,” but “big” is actually a red herring. Telecommunications companies, Oil companies, and other data-relevant industries have had vast datasets for a long time. And as storage capacity continues to enlarge, today’s “big” is certainly tomorrow’s “medium” and “small.” In next week. The best meaningful definition of “big data” is when the size of the data itself becomes part of the problem. |
|
Analysis of Cancer Gene Expression Profiling in DNA Microarray Data using Clustering Technique |
Author : 1C. Premalatha, 2 D. Devikanniga |
Abstract | Full Text |
Abstract :DNA microarray technology has been extremely used in the field of bioinformatics for exploring genomic organization. It enables to analyze expression of many genes in a single reaction. The techniques currently employed to do analysis of microarray expression data is clustering and classification. In this paper, the cancer gene expression is analyzed using hierarchical clustering that identifies a group of genes sharing similar expression profiles and dendrograms are employed that provides an efficient means of prediction over the expression. |
|
Dynamic Book Search Using RFID Technology |
Author : A.Ankit Kumar Jain, T. Rama Krishna |
Abstract | Full Text |
Abstract :In view of the problems existed in library management; we designed a RFID Intelligent Book Conveyor using Radio Frequency Identification (RFID) technology. This book conveyor is portable equipment with complete functions, friendly interface and convenient operation. It can greatly improve the work efficiency of librarians and the service quality of the library. This project contains one server and multi slave microcontrollers here we are using system (PC) as a server and slave is an LPc2148 microcontroller, each slave microcontroller contains one RFID and each one communicates with master microcontroller. |
|
Air Entrapment Analysis of Casting (Turbine Housing) for Shell Moulding Process using Simulation Technique |
Author : Mr. Prasad P Lagad1 |
Abstract | Full Text |
Abstract : Casting simulation plays a very important role in predicting defect before going to actual trials in shell moulding process. Air entrapment analysis, fluid flow analysis & solidification analysis generally performed in shell moulding. Fluid flow analysis to be done to see Temperature distribution for molten metal during pouring, Air entrapment, Flow related defects cold shut, misrun. Solidification/Thermal analysis to be done to simulate progressive solidification, Predict the solidification defects (porosity), Degree of soundness of casting. This paper describes the benefits of casting simulation for air entrapment analysis to understand the possibility of area where air might be entrapped during solidification & give us solution to provide the flow off to avoid air entrapment related defect such as blow holes in the foundries. |
|
Gps Based Advance soldier Tracking with Emergency Messages and Communication System |
Author : Mr. Palve Pramod |
Abstract | Full Text |
Abstract :— In today’s world enemy warfare is an important factor in any nation’s security. The national security mainly depends on army (ground), navy (sea), air-force (air).The important and vital role is played by the army soldier’s. There are many concerns regarding the safety of these soldiers. As soon as any soldier enters the enemy lines it is very vital for the army base station to know the location as well as the health status of all soldiers. In our project, the soldier can ask for directions to the army base unit in case he feels that he is lost. By using the location sent by the GPS, the base station can guide soldier to safe area & GSM will help to communicate the Soldier unit with Base unit. By getting the exact location of soldiers it will help the Soldiers to discuss about their war strategies and take guidance from Base unit. The various Health Sensors such as Temperature sensor, Heart rate sensors, Humidity sensors, Gas detection sensors will help to decide the health status of that particular soldier. |
|
Minutiae Extraction and Variation of Fast Fourier Transform on Fingerprint Recognition |
Author : Amandeep Kaur1, Ameeta2, Babita3 |
Abstract | Full Text |
Abstract :A fingerprint is the feature pattern of one finger. It is believed with strong evidences that each fingerprint is unique. Each person has his own fingerprints with the permanent uniqueness. So fingerprints have being used for identification and forensic investigation for a long time. The fingerprint recognition problem can be grouped into two sub-domains: one is fingerprint verification and the other is fingerprint identification In addition, different from the manual approach for fingerprint recognition by experts, the fingerprint recognition here is referred as AFRS (Automatic Fingerprint Recognition System), which is program-based. This paper presents the variation of Fast Fourier Transform on finger print recognition by fast fingerprint minutiae extraction and recognition algorithm which improves the clarity of the ridge and valley structures of the input finger print images based on the frequency and orientation of the local ridges and thereby extracting correct minutiae .This research work has combined many methods to build a minutia extractor and a minutia matcher. Simulation results are obtained with MATLAB going through all the stages of the fingerprint recognition is built. It is helpful to understand the procedures of fingerprint recognition. And demonstrate the key issues of fingerprint recognition |
|
IMPROVED FUZZY TECHNOLOGY FOR EFFICIENT SEARCHING |
Author : Mr. R. P. Sabale |
Abstract | Full Text |
Abstract : Instant search is an information-retrieval in which a system finds answers to a query instantly while a user types in keywords character-by-character. Fuzzy search further improves user search experiences by finding relevant answers with keywords similar to query keywords. A main computational challenge in this the high-speed requirement, i.e., each query needs to be answered within milliseconds to achieve an instant response and a high query throughput. At the same time, we also need good ranking functions that consider the proximity of keywords to compute relevance scores. In this paper, we study how to integrate proximity information into ranking in instant-fuzzy search while achieving efficient time and space complexities. A naıve solution is computing all answers then ranking them, but it cannot meet this high-speed requirement on large data sets when there are too many answers, so there are studies of early-termination techniques to efficiently compute relevant answers. To overcome the space and time limitations of these solutions, we propose an approach that focuses on common phrases in the data and queries, assuming records with these phrases are ranked higher. We study how to index these phrases and develop an incremental-computation algorithm for efficiently segmenting a query into phrases and computing relevant answers. |
|
Efficient Scheme for Data Transfer Using XOR Network Coding |
Author : Er. Anjali Gupta |
Abstract | Full Text |
Abstract :Compromised senders and pollution attacks are the key issues in designing and operating in any network either it is a wired or wireless (especially in applications like sensor networks, lossy wireless networks etc.) XOR network coding, an extension of Network coding is a new research area in information theory. It is a paradigm in which intermediate nodes are allowed to create new packets by combining (XORing) the incoming packets which provides the possibility to maximize network throughput and reduce number of transmissions. This paper explains the basic concept of network coding and XOR network coding, their applications and related challenges |
|
A Survey about Key Pre-distribution Scheme in Wireless Sensor Networks |
Author : Amol Abhiman Magar |
Abstract | Full Text |
Abstract :Wireless sensor network (WSN) has a wide range of applications in military as well as in civilian services. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments and also nearly all aspects of wireless sensor network defenses relying on solid encryption and mainly key predistribution is a challenging task in sensor networks. Because the neighbor of a node after the deployment of sensors is unknown. An attacker can easily obtain a large number of keys by capturing a small fraction of nodes, and hence, can gain control of the network by deploying a replicated nodes or packets preloaded with some compromised keys. For secure communication, neighbors must possess a secret common key or there must exist a key-path among these nodes. In this paper I have discussed in brief about various key pre-distribution schemes for homogeneous sensor networks and I had analyzed merits and demerits for each of them. Among various schemes a suitable scheme can be chosen based on the requirement and the resource availability of the sensors. |
|
Power Aware Routing for Path Selection with Minimum Traffic in Mobile Adhoc Network |
Author : Sathya.E1,Rajpriya.G2 |
Abstract | Full Text |
Abstract :A mobile Ad-hoc network (MANET) is a collection of wireless nodes that forms a network without central administration. The nodes in such kind of network serve as routers as well as hosts. The nodes can forward packets on behalf of other nodes and run user applications. These devices are operated on battery which provides limited working capacity to the mobile nodes. Power failure and the energy consumption of the nodes is a critical factor in the operation of a mobile ad hoc network. The performance of the node can be hampered by power failure, which affects the ability of node to forward the packet and hence affects the overall network lifetime. So an important objective is to consider Energy Aware design of network protocols for Ad hoc network environment. Different approaches can be applied to achieve the target and different energy-related metrics that have been used to determine energy efficient routing path. More efficient algorithm is proposed here, which tries to maximize the lifetime of network by minimizing the power consumption during the route establishment from source to destination. The proposed algorithm is incorporated with the route discovery phase of AODV and by simulation using NS/2 it is observed that the proposed algorithm is better than AODV in terms of packet delivery ratio and network lifetime. |
|
Emoticon-based unsupervised sentiment classifier for polarity analysis in tweets |
Author : Geeta.G.Dayalani1 |
Abstract | Full Text |
Abstract :— Today, Micro blogging has become a very popular communication tool among millions of Internet users. Vast number of users shares their opinions on different aspects of life everyday.Microblogging web-sites are rich sources of data for sentiment analysis. Sentiment Analysis is the process of detecting the contextual polarity of text. In our paper, we focus on one of the famous micro blogging platform, Twitter, for performing sentiment analysis on it. We propose a simple and completely automatic approach for analyzing the sentiment of users in Twitter. Firstly, we built a Twitter entirety by grouping the tweets. Tweets express positive and negative polarity through a completely automatic procedure by using only emoticons in tweets. Then, we have built a sentiment classifier where an actual creek of tweets is processed and its content is classified as positive, negative or neutral. The classification is made without the use of any pre-defined dictionary or polarity thesaurus. The thesaurus is automatically inferred from the creeking of tweets. We observe that our simple system captures the polarity perceptions matching reasonably well with the classification done by human judges. |
|
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System |
Author : ArchanaThange |
Abstract | Full Text |
Abstract :Cloud based RFID authentication is becoming a large area of interest among researchers and engineers these days. However, there is not much attention given to the RFID authentication concern. Most of the work done on this issue till now has its focus on RFID functionality without considering security and privacy. Classical RFID authentication schemes do not meet the security and privacy requirements of cloud based RFID. Main features available in traditional backend-server-based RFID authentication are secure backend channels and purely trustworthy database, which are not available when moved to cloud based scenarios. Here the concept is implemented on employee management system. Many organizations now days wants have a high-tech employee management system using which a salary, attendance and location of a particular employee within an organization can be easily find out. An organization invests a large amount of money for developing and maintaining its own software and system. As compared to traditional model, newly adapted cloud based IT model is more cost effective but they are having the problems of insecure database and disclosing the privacy of tags and readers. So, there is a RFID authentication protocol is developed and VPN agency is suggested to build secure backend channels. It will secure the database using hashing technique and preserves the privacy of tags and readers by providing backend communication over secure channels. Proposed scheme has the advantages like deployment cost saving, pervasiveness of authentication, database security and mobile reader holders privacy. |
|
Survey on Scheduling Algorithms in Cloud Computing |
Author : 1Backialakshmi.M,#2Sathya sofia .A, |
Abstract | Full Text |
Abstract :Cloud computing is a general term used to describe a new class of network based computing that takes place over the internet. The primary benefit of moving to Clouds is application scalability. Cloud computing is very beneficial for the application which are sharing their resources on different nodes. Scheduling the task is quite a challenging in cloud environment. Usually tasks are scheduled by user requirements. New scheduling strategies need to be proposed to overcome the problems proposed by network properties between user and resources. New scheduling strategies may use some of the conventional scheduling concepts to merge them together with some network aware strategies to provide solutions for better and more efficient job scheduling. Scheduling strategy is the key technology in cloud computing. This paper provides the survey on scheduling algorithms. There working with respect to the resource sharing. We systemize the scheduling problem in cloud computing, and present a cloud scheduling hierarchy. |
|
Review Paper on Energy Audit of a Boiler in Thermal Power Plant |
Author : Gaurav T. Dhanre, Urvashi T. Dhanre, Krunal Mudafale |
Abstract | Full Text |
Abstract :The world over energy resources are getting scarcer and increasingly exorbitant with time. In India bridging the ever-widening gap between energy demand and supply by increasing supply is an expensive option. The share of energy costs in total production costs can, therefore improve profit levels in all the industries. This reduction can be achieved by improving the efficiency of industrial operations and equipments. Energy audit plays an important role in identifying energy conservation opportunities in the industrial sector, while they do not provide the final answer to the problem; they do help to identify potential for energy conservation and induces the companies to concentrate their efforts in this area in a focused manner. |
|
Effect of Carbon Nanotubes Addition on Fracture Toughness in Aluminium Silicon Carbide Composite |
Author : Binoy C.N*, Sijo M.T |
Abstract | Full Text |
Abstract :In this paper, an approach to find the effect of carbon nanotubes addition on fracture toughness in aluminium silicon carbide composite is been analyzed. Although properties like specific strength, specific stiffness, elevated temperature strength, wear and corrosion resistance increases has proven, property of fracture toughness is decreasing. In this paper aluminium silicon carbide in the proven composition 25% Silicon Carbide and 75% Aluminium has casted by using stir casting process as per standard dimensions (ASTM E399). With the same dimension aluminium silicon carbide composite with added carbon nanotubes were also casted in the ratio 0.2% multi walled Carbon Nanotube, 24.8% Silicon Carbide and 75% Aluminium. All the test pieces were tested by using universal testing machine and stress intensity factor KIC was found out. Results showed that there is increase in fracture toughness of aluminium silicon carbide with added carbon nanotubes by 16% than the 25% Silicon Carbide and 75% Aluminium combination of composite |
|
Harmonic Mitigation of a Solar FED Cascaded H-Bridge inverter using Artificial Neutral Network |
Author : Priya.G, Ramani.G, Revathy.G |
Abstract | Full Text |
Abstract :A concept of application of Artificial Neural Network (ANN) for estimating switching angle in an 11 level full bridge cascaded multilevel inverter with optimal pulse width modulation , which was powered by five varying dc input sources. A solar panel was connected to each cascaded inverter. For a given modulation index the optimal switching angles with lowest THD is generated using trained neural network by replacing look-up table is proposed in this paper. The odd harmonics( 5,7,11) in the inverter is eliminated by using the trained network. Theoretical concepts have been validated in simulation results using artificial neural network technique which shows the high performance and technical advantages of the developed system. |
|
Multiple Harmonics Elimination in Hybrid Multilevel Inverter Using Soft Computing Technique |
Author : 1R.Ragunathan,1PG scholar, 2A.Rajeswari |
Abstract | Full Text |
Abstract :— Multilevel inverters are extensively used in various voltage applications. Harmonic elimination in multilevel inverter is a complex optimization problem. A fresh nine level hybrid multilevel inverter using harmonics elimination is presented in this paper. This method involves less number of switches associated with more number of voltage levels. The stages with higher DC link have more advantages like low commutation, reduced switching losses, increased efficiency and low input stages with more number of output levels. In this method the bacterial foraging optimization technique (BFO) algorithm is used to determine the switching angles of the inverter. The proposed method employs multicarrier pulse width modulation technique, this eliminated harmonics component from inverter output. It can be easily implemented using a PIC micro controller. Simulation result reveals the quality of feasible result. |
|
Nutritional characterization of Indian traditional Puranpoli |
Author : Nitin G. Suradkar1, Deepika Kamble3 and Varsha Fulpagar2 |
Abstract | Full Text |
Abstract :The effort has been made to prepare the puranpoli by using traditional method and to analyze its nutritional composition. The main ingredients of puranpoli are wheat flour, maida and Bengal gram flour. These unique combinations of cereals and legume fulfill the nutritional requirement of essential amino acids like Methionine and lysine as well as have good nutritive values and were quite rich in carbohydrates accompanied by enough protein, ash, crude fibers, fat, and minerals like calcium and iron. |
|
A Survey on Data Mining Methods for Malware Detection |
Author : Ms. Shital Balkrishna Kuber |
Abstract | Full Text |
Abstract : Malware is any type of malicious software that has the capability to enter into system without authorization of the users. Thus malware detection is the important issue in the computer security. Signature based detection is more popular method to detect the malware attack but main drawback of this method is that it is not used to detect the Zero-day attack. We need to update the database regularly and human experts are needed to create the new signature. The drawbacks of Signature based malware detection is minimized by using heuristic method. Heuristic method is used to detect zero-day attacks. There are various methods used to detect the malware like n-gram method, Finite state automaton method, Control Flow Graph method, N-gram analysis at byte level etc. These methods having their various advantages and disadvantages. This study enlightens the various methods used to detect malwares. |
|
Optimized implementation of ANN control strategy for parallel operation of single phase voltage source inverter |
Author : Dinesh Kumar.V1 PG Scholar, Dr. Balachandran.M2 Associate Professor, Nirubha.M3 |
Abstract | Full Text |
Abstract :This paper describes about the efficient control strategy in parallel operation of inverters in common alternating current(AC) bus which is used in real time applications like uninterrupted power supply (UPS), medical equipments and many. The control system for parallel operation of inverters consists of two main loops; the first control loop is parallelism control over the feedback inductor current to modify the input voltage to the filter. The second loop is voltage control over the output voltage of each individual voltage source inverter connected to the common AC bus. Here control system is implemented in neuro fuzzy control strategy which ensures less precise, flexible, better stability in control. The proposed control strategy ensures the voltage source inverters(VSI) operating in common AC bus with proper sharing of load current, redundancy and without any needs of communication exchange between inverter modules .The parallel operation of inverters in common AC bus with proposed control system are verified both in theoretical and experimental results. |
|
Isolated Quasi-Switched-Capacitor DC/DC Converter using solar PV |
Author : Sathish kumar. T1 PG Scholar, Dr. Balachandran. M2 |
Abstract | Full Text |
Abstract :This paper proposed to utilize the DC source from the solar PV. The DC/DC converter is the unidirectional power flow between the solar PV and load, while in existing its bidirectional. The proposed converter becomes compact using wide band gap devices which provide high efficiency and reduces heat generation of the circuit. PSO is used for the switching control for the converter. The converter can step up, step down and current doublers, synchronous rectifier is also present. The load can be a DC motor. |
|
Security in Cloud Computing |
Author : Mr.OmarAbd Al-kaderkalaf |
Abstract | Full Text |
Abstract : omar_abdel2003@yahoo.com Abstract— Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pays everywhere i.e. for the subsidy unaccompanied. Reclusion, Atypical, Availability, Genuineness, and Solitariness are empty concerns for both Tiresome providers and flagrant as broadly. Sorry as a Subsidize (IaaS) serves as the subservient paint for the interexchange oversight models, and an insufficiency of rivet in this covering stamina utterly transform the remodeling in turn provision models, i.e., PaaS, and SaaS cruise are technique from IaaS jacket. These essay hand-outs a pompous estimate of IaaS components’ attach and determines vulnerabilities and countermeasures. Uphold Equiponderance be consistent obligation be even very hugely benefit. |
|
An Efficient Implementation of Speed-PFC of Interleaved Converter FED BLDC Motor Drive System |
Author : SuthesKumar.P1, Prabhakaran.S2 |
Abstract | Full Text |
Abstract :This project proposes a power factor corrected (PFC) interleaved converter- fed brushless direct current (BLDC) motor drive.Back Emf sensing method is proposed which reduces switching loss and no attenuation.Speed control is done by controller which makes the corrected PWM signals.And also efficiency is improved by using interleaved converter. |
|
Limnological study of dal lake Srinagar j and k |
Author : Muzaffar U Zaman Khan1, Ishtiyaq Majeed Ganaie2, Kowsar Hussain Bhat3 |
Abstract | Full Text |
Abstract : Dal Lake, known as the jewel of kashmir, is a world famous lake in the city of srinagar,the summer Capital of Jammu and Kasmir state India. The current study aimed at analysing the various physico-chemical parameters of the lake and assessing its water quality using the methodology as given in APHA 1998. The results revealed higher values for nitrogen, showing the excessive use of nitrogenous fertilizers in the floating gardens of the lake and agricultural fields surrounding the lake. Phosphate values also remained on the higher side indicating the eutrophic nature of the lake. The values for iron were also high, while as the results for alkalinity revealed that the lake waters fall under the category of hard waters |
|
Congestion Management in Deregulated Power System using Facts Controller |
Author : Ms. Namrata Rao |
Abstract | Full Text |
Abstract :— Congestion in the transmission lines is one of the technical problems that appear particularly in the deregulated environment. There are two types of congestion management methodologies to relieve it. One is non-cost free methods and another is cost-free methods, among them later method relieves the congestion technically whereas the former is related with the economics. In this paper congestion is relieved using cost free methods. Using FACTS devices, congestion can be reduced without disturbing the economic matters. STATCOM and UPFC are two mainly emerging FACTS devices and they are used in this paper to reduce the congestion. Above method is tested on 5-bus system and it can be extended to any practical system. FACTS devices can be an alternative to reduce the flows in heavily loaded lines, resulting in an increased power capability, low system loss, improved stability of the network, by controlling the power flows in the network. Modeling, simulation and analysis of 5 bus system in MATLAB environment is proposed in this paper. Comparison with and without FACTS devices is done to control the power flow and obtain the power system steady state operation. The same system is again analyzed under dynamic conditions and the performance of these devices is observed. |
|
Static and Dynamic Analysis of Railway Track Sleeper |
Author : D.Kishore Kumar1, K.Sambasivarao2 |
Abstract | Full Text |
Abstract : The increased speed and weight of modern trains puts the components of a railway track in a highly dynamic load situation. Irregularities of the wheels and rails induce substantial dynamic loads that have to be accounted for in the procedure of designing the railway track. The concrete sleeper is an essential part of the track structure and there is a growing demand for improved analytical tools for concrete sleepers under dynamic loading. A typical finite element model of the concrete sleeper is established that focuses on analyzing the behavior of a concrete sleeper during a train passage. A finite element model of a pre-stressed concrete sleeper is established for static load conditions. The studies done with the sleeper model showed that the train load has great impact at the rail seat positions at the two ends of the sleeper maintained at broad gauge distance i.e. 1.76m. The natural frequencies obtained for a sleeper in free-free condition are lesser compared to the natural frequencies obtained for sleeper in-situ condition. The analysis also showed that the interaction between the sleeper and the underlying ballast is of great importance for the dynamic behavior of the sleeper. |
|
An Enhanced Detection of Fake Vehicle Identity in Vanet |
Author : M.SAKTHIVEL1, S.KARTHIKEYINI 2 |
Abstract | Full Text |
Abstract :In vehicular networks, moving vehicles are enabled to communicate with each other via inter-vehicle communications as well as with road-side units (RSUs) in vicinity via roadside-to-vehicle communications. In urban vehicular networks, where privacy, especially the location privacy of secret vehicles is highly concerned, secrets verification of vehicles is indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can easily launch a Sybil attack, gaining a disproportionately large influence. A location-hidden authorized message generation scheme is designed for two objectives: first, RSU signatures on messages are signer indistinct so that the RSU location information is concealed from the resulted authorized message; second, two authorized messages signed by the same RSU within the same given period of time ( temporarily linkable) are recognizable so that they can be used for identification. |
|
Relational Keyword Search System |
Author : Pradeep M. Ghige#1, Prof. Ruhi R. Kabra*2 |
Abstract | Full Text |
Abstract : — Now a day’s for extending the keyword search to relational data set has been an area of research within the database and Information Retrieval. There is no standardization in the process if information retrieval, which will not clearly show the actual result also it displays keyword search without ranking and Execution time is more in existing system. We propose a system for; performance evaluation of relational keyword search systems. In the propose system combine schema-based and graph-based approaches and propose a Relational Keyword Search System to overcome the mentioned disadvantages of existing systems and manage the information and user access the information very efficiently. The objective of this technique is to manage Information, Database and Information Retrieval systems involved independently and developed their own unique systems to allow users to access information. We also explore the relationship between execution time and factors. The proposed search technique will overcome the poor performance for datasets exceeding tens of thousands of vertices.. |
|
Vehicle Collision Recognition and Monitoring System Based on AVR Platform |
Author : Apurva Mane1, Prof. Jaideep Rana2 |
Abstract | Full Text |
Abstract :Security in travelling is primary concern for everyone. Demand for automobile has increased traffic and thereby causing more accidents on the road. People lose their lives because of poor emergency facilities. Preemption of the accidents taking place on the roads is not possible but at least after effects can be reduced. Proposed system ensures, making emergency facilities available to accident victims as early as possible by letting people or hospital or rescue team or police station know the accident spot with the help of accelerometer embedded in the vehicle. As vehicle rolls over on the road thereby changing position of the accelerometer, message is sent to the first aid center, rescue team or police station using GSM. With the help of space navigation system GPS locates the position of the vehicle where accident has occurred. So, this paper deals with the GSM-GPS module and accelerometer and ATMEGA 16 microcontroller mounted vehicle, which even meet with the accident, let people know about the accident location and provides situational awareness. This project is about making cars more intelligent, they provide basic information covering geographical co-ordinates to the police station. |
|
Live Hand Gesture Recognition using an Android Device |
Author : Mr. Yogesh B. Dongare |
Abstract | Full Text |
Abstract :In the field of image processing it is very interesting to recognize the human gesture for general life applications. Gesture recognition is a growing field of research among various human computer interactions; hand gesture recognition is very popular for interacting between human and machines. It is nonverbal way of communication and this research area is full of innovative approaches. This paper aims at recognizing 40 basic hand gestures. The main features used are centroid in the hand, presence of thumb and number of peaks in the hand gesture. That is the algorithm is based on shape based features by keeping in mind that shape of human hand is same for all human beings except in some situations. The recognition approach used in this paper is artificial neural network among back propagation algorithm. This approach can be adapted to real time system very easily. In this paper for image acquisition android camera is used, after that frames are send to the server and edge detection of the video is done which is followed by thinning that reduce the noise, tokens are being created from thinning image after tokens are fetched. The paper briefly describes the schemes of capturing the image from android device, image detection, processing the image to recognize the gestures as well as few results. |
|
Design And Analysis of Pressure Disc Type Filter |
Author : Mr.Rutuparna R.Deoghare, Prof. Shailesh Dhomne,Prof.Atul S.Shriwaskar |
Abstract | Full Text |
Abstract :Presently used Filters for Beverages making industries are very bulky in shape and gives low outlet discharge. Hence they are less efficient .Therefore there is a need to design compact, automated unit that produces completely clear liquor and which have large outlet discharge. This concept highlights the design of new filter which fulfill the requirements of beverages making industries for filteration.For making filteration more feasible, unit is to be design in which multiple disc comprising of blades is to be mounted on a shaft for filteration. Multiple discs will get patterned throughout the shaft and number of disc decides the capacity of filter. The special arrangement of Two cake discharge blades (scrapper remover) suspended from a frame mounted on the tank and serve to deflect and guide the cake to the discharge tube. On large diameter filters, the blades are of the swing type that float to maintain the cake to disc clearance and so allow for the wobble of the turning discs. |
|
ANALYSIS OF EFFECTIVE MULTI USER DISTRIBUTION KEY MANAGEMENT SCHEME IN CLOUD DATABASE |
Author : Dr.P.SUMITRA, M.Sc., M.Phil.,MCA.,Ph.D.,1 M.KAVINNELA, |
Abstract | Full Text |
Abstract :Database is a service paradigm poses several research challenges in terms of security and cost evaluation from a tenant‘s point of view. The cloud database as a service is a novel paradigm that can support several Internet-based applications, but its adoption requires the solution of information confidentiality problems. A novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the tradeoff between the required data confidentiality level and the flexibility of the cloud database structures at design time. This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. The project demonstrates the feasibility and performance of the proposed solution through a software prototype. The proposed architecture manages five types of information: plain data represent the tenant information; encrypted data are the encrypted version of the plain data, and are stored in the cloud database; plain metadata represent the additional information that is necessary to execute SQL operations on encrypted data; encrypted metadata are the encrypted version of the plain metadata, and are stored in the cloud database; master key is the encryption key of the encrypted metadata, and is known by legitimate clients |
|
Heart Disease Prediction Using Classification with Different Decision Tree Techniques |
Author : K. Thenmozhi 1, P.Deepika2 |
Abstract | Full Text |
Abstract :Data mining is one of the essential areas of research that is more popular in health organization. Data mining plays an effective role for uncovering new trends in healthcare organization which is helpful for all the parties associated with this field. Heart disease is the leading cause of death in the world over the past 10 years. Heart disease is a term that assigns to a large number of medical conditions related to heart. These medical conditions describe the irregular health condition that directly affects the heart and all its parts. The healthcare industry gathers enormous amount of heart disease data which are not “mined” to discover hidden information for effective decision making. Data mining techniques are useful for analyzing the data from many different dimensions and for identifying relationships. This paper explores the utility of various decision tree algorithms in classify and predict the disease. |
|
Improvement in Radiation Parameters of Rectangular Microstrip Patch Antenna |
Author : Monika Kiroriwal and Sanyog Rawat |
Abstract | Full Text |
Abstract :This paper introduces a new geometry of a rectangular microstrip patch antenna that improves the performance of a conventional microstrip patch antenna .This antenna is designed to operate at 5.38 GHz with enhanced bandwidth of 11.15%. For the desired result, a triangular notch is inserted into the patch antenna. The proposed geometry provides improvement in other radiation parameters like gain, efficiency and impedance behavior, when it is compared with conventional antenna. |
|
A Survey on Rekeying Framework for Secure Multicast |
Author : HITESH PATIL |
Abstract | Full Text |
Abstract : — Group key management (GKM) in mobile communication is important to enable access control for a group of users. A major issue in GKM is how to minimize the communication cost for group rekeying. To design the optimal GKM, researchers have assumed that all group members have the same leaving probabilities and that the tree is balanced and complete to simplify analysis. In the real mobile computing environment, however, these assumptions are impractical and may lead to a large gap between the impractical analysis and the measurement in real-life situations, thus allowing for GKM schemes to incorporate only a specific number of users. In this paper, we propose a new GKM framework supporting more general cases that do not require these assumptions. Our framework consists of two algorithms: one for initial construction of a basic key-tree and another for optimizing the key-tree after membership changes. The first algorithm enables the framework to generate an optimal key-tree that reflects the characteristics of users’ leaving probabilities, and the second algorithm allows continual maintenance of communication with less overhead in group rekeying. Through simulations, we show that our GKM framework outperforms the previous one which is known to be the best balanced and complete structure. |
|
Flow Simulation and Performance Prediction of Cross Flow Turbine Using CFD Tool |
Author : Misrak Girma1* and Edessa Dribssa2 |
Abstract | Full Text |
Abstract : the need of small hydropower schemes and availability of small hydropower potential sites in Tanzania makes Dar Es-Salam University and NBCBN to work together towards designing and manufacturing of cross flow turbine for the rural population electrification program. The aim of this paper is to study the internal flow and performance characteristics of the cross flow turbine using CFD-Tools. A 2D-CFD steady state flow simulation has been performed using GAMBIT for geometry creation and ANSYS FLUENT for analysis. Simulations were carried out using viscous, standard K-epsilon and standard wall function model. The velocity and pressure distribution within the internal surface runner of the cross-flow turbine were analyzed. From the simulation results it was observed that there is a high pressure area inside the nozzle and near to the first stage runner blades. Then it is going to decrease at the second stage and the out let of the turbine. And even it can be negative at the region where there is no cross flow. In general, the simulation using CFD-Tool is very important to show the velocity and pressure distribution inside the nozzle, runner and casing. |
|
Analysis of Jammer Circuit |
Author : Chirag Gupta, Nitin Garg |
Abstract | Full Text |
Abstract : Users of mobile communication devices have dramatically increased in the last twodecade. This proliferated the need of a more effective and secures signal scrambler for a cultured society. Mobile jammer circuits are used to prevent mobile phones from receiving or transmitting signals. Mobile jammer effectively disables mobile phones within the defined range zones without causing any disturbance/interference to other communication means. Mobile jammer can be used in any practically location, but generally are used in places where phone calls are disruptive like Schools, Churches, Libraries, Hospitals etc. Similarly with other radio jamming, mobile jammer sends the radio waves of same frequency that mobile phones uses to block the signal. This signalcauses interference with the communication between mobile phones and base stations to make the phones unusable. When mobile jammer is activated all mobile within the range willindicate "NO NETWORK” service. Design and study of Mobile jammer is discussed in this paper |
|
A Study of Fault Management Algorithm and Recover the Faulty Node Using the FNR Algorithms for Wireless Sensor Network |
Author : Mr . Takale Dattatray1, Mr.Priyadarshi Amrit |
Abstract | Full Text |
Abstract :In Wireless Sensor Network every Sensor node having a tendency to shut down ,due to computation power, Hardware Fail, Software Fail, environmental Condition and energy depletion. Fault Tolerance is a major problem in a wireless sensor Network. A Fault Management is key of Network Management. Fault management Algorithms is divided into fault detection, fault diagnosis and fault recovery.The fault detection schemes classified in a two types: Centralized Approach and Distributed Approach.Fault diagnosis is the whole process of fault management. In a Fault Diagnosis cover only three question like where the fault is located,what type of fault it is like node failure,how a fault does occurs. Fault recovery is the last phase of the fault management process. The various algorithms are available for the recover the Faulty Node like FNR Algorithm. The increase the Lifetime of WSN Using Fault Node Recovery Algorithm when Sensor Node is dead. Fault Node Recovery Algorithm it depend on Generic Algorithm and Grade Diffusion Algorithm. The algorithm can result in fewer replacements of sensor nodes and more reused routing paths. This Algorithm also increases the number of active nodes, reduces the rate of data loss and reduced energy consumption. |
|
Study of Infrequent itemset mining Techniques |
Author : Ms.KalyaniTukaramBhandwalkar,Ms.MansiBhonsle |
Abstract | Full Text |
Abstract :Pattern mining has become an important task in data mining. Frequent itemsets find application in a number of real-life contexts. Most of the past work has been on finding frequent itemsets, but also infrequent itemset mining has demonstrated its utility in web mining, bioinformatics, fraud detection and other fields. The infrequent itemset mining problem is discovering itemsets whose frequency of occurrence in the analyzed data is less than or equal to a maximum threshold. This paper provide a general overview of the different papers related to infrequent patterns and gives the knowledge on different algorithms proposed for mining infrequent patterns which are basis for future research in the field of pattern mining. |
|
Autoconfiguration of OCTANE Nodes in MANET to Reduce flooding |
Author : Dipika M. Pimpre |
Abstract | Full Text |
Abstract :MANET is infrastructure less network and the routing protocol in MANET is not designed specifically with dynamic, self-starting behavior required for wireless networks. Each and every node in MANET acts as a forward and receiver node. Performance of most of the protocols is not encouraging in a highly dynamic interconnection topology. Most routing protocols in MANETs rely on a flooding mechanism to broadcast data and control packets over the entire network for establishing routes between source destination pair. However, the basic nature and characteristics flooding mechanism causes a large number of packets propagation in MANETs. This will eventually overload the network and traffic is congested affecting the overall performance of network. So, there is a need of such a protocol which not only reduces the flooding but also reduces the routing overhead. In this paper, a reliable broadcast approach for MANET is proposed, which improves the transmission rate. This work proposes a methodology where certain nodes are assumed to be high energy transmission nodes known as Octane Routing Node (ORN)/ High Power Routing (HPR) nodes, or Tower Node (TN) in the network which are utilized for routing. The route is established only through these nodes which are capable of communicating to long distance. Since the proposed approach reduces the flooding, we have considered functionality of the proposed approach with AODV variants. The effect of network density on the overhead and collision rate is considered for performance evaluation. The performance is compared with the AODV variants found that the proposed approach outperforms all the variants |
|
Generic Visual Perception Processor (GVPP) |
Author : Suhas Uttamrao Shinde, Asst Prof. Seema Singh Solanki |
Abstract | Full Text |
Abstract :TheGeneric visual perception processor is a single chip modeled on the perception capabilities of the human brain, which can detect objects in a motion video signal and then locate and track them in real time. Imitating the human eyes neural networks and the brain, the chip can handle about 20 billion instructions per second. This electronic eye on the chip can handle a task that ranges from sensing the variable parameters as in the form of video signals and then process it for co-Generic visual perception processor is a single chip modeled on the perception capabilities of the human brain, which can detect objects in a motion video signal and then locate and track them in real time. Imitating the human eyes neural networks and the brain, the chip can handle about 20 billion instructions per second.[1] |
|
Survey on ExFeature: A Feature Modelling and Recommending Technique For Domain Oriented Product Listing |
Author : Kanifnath S. Hirave |
Abstract | Full Text |
Abstract : This The activity of detecting and documenting the similarities and differences in related software products in domain is called as domain analysis. For efficient detection and utilization of commonality across related software systems, the effective software reuse is required. Domain experts providing information about a domain under analysis. Feature oriented domain analysis (FODA) is used for efficient detection and utilization of commonality across related software systems. Reuse of software product is one of the encouraging resolutions to the software disaster. Feature Oriented Reuse Environment (FORM) model constructed during the analysis is called a feature model, it captures commonality as an AND/OR graph. Domain analysis and Reuse Environment (DARE) is CASE tool that supports domain analyst in carrying out a clear domain analysis method. DARE is useful for detection and documenting domain information from documents and program. Recommender systems are used to find affinity among features across products, for which two different techniques are used. First technique uses association rule mining algorithm, in which two algorithms are used i.e. Apriori and AprioriTID. Another technique which is collaborative filtering recommender system is to analyze neighborhoods of similar products to identify new feature of items |
|
Analysis of Scheduling Nested Transactions in Distributed Real-Time Environment |
Author : Anup A. Dange, Prof. Neha Khatri-Valmik |
Abstract | Full Text |
Abstract :A lot of research work has been done in the field of real-time database system to seek optimizing transaction scheduling to ensure global serializability. Nested transaction offers more decomposable execution units and finer-grained control over concurrency and recovery than “flat” transactions. For most applications we believe that it is desirable to maintain database constancy. It is possible to maintain consistency without serializable schedules but this requires more specific information about the kinds of transactions being executed. Since we have assumed very little knowledge about transactions, serializability is the best way to achieve consistency. |
|
A Survey Paper on Security Issues in Satellite Communication Network infrastructure |
Author : Syed Muhammad Jamil Shah, Ammar Nasir, Hafeez Ahmed |
Abstract | Full Text |
Abstract :Satellite communication is one of the most popular next generation communication technologies for global communication networks in parallel to terrestrial communication networks. In modern age military intelligence, navigation & positioning, weather forecasting, digital video Broadcasting (DVB), and broadband internet services, are the few demanding applications of Satellite communication. Although Satellite communication is cost effective solution for such long distance communication application, However security over the link is still a major concern in satellite communication. Due to limitations such as high bit error rate, power control, large distance between end nodes, high link delays because of large round trip times, and link availability, common security techniques incorporate a lot of issues in implementation of proper secure communication over the satellite links. In this survey paper, we explore the importance of security, trivial and currently deployed security tools, and the limitations to be considered while deploying such security techniques and protocols for securing satellite communication. Finally we reported some future research space in process to further optimize the security tools and measures for the proper security frame work over the satellite communication infrastructure. |
|
Fault Tolerant Over Hardware Efficient FIR Filter |
Author : P.Jeevitha 1, B.Ganesamoorthy |
Abstract | Full Text |
Abstract :— In today’s world there is a great need for the design of low power and area efficient high performance DSP system.FIR filter is considered to be the fundamental device in the broad application of wireless as well as the video and image processing system. With the aim of getting the reliable operation, these filters are protected using the Error correction Code. The pipelined FIR filter design which reduces the critical path by interleaving the pipelined latches along the datapath, with the sense of increasing the number of latches and then the system latency. But the parallel processed FIR filter design increases the sample rate thereby replicating the hardware, so that the multiple number of inputs gets processed parallely and at the same time generating multiple number of outputs with the disadvantage of increased area in the design. To overcome this disadvantage and in the sense of retaining these such advantage of parallel processing,the hardware efficient filter structure is to be proposed, and these filter structure is to be recovered from error by the application of Error Correction Code. |
|
Analysis of ETL Process in Data Warehouse |
Author : N.Nataraj1, Dr.R.V.Nataraj2 |
Abstract | Full Text |
Abstract :ETL is responsible for the extraction of data, their cleaning, conforming and loading into the target. ETL is a Critical layer in DW setting. It is widely recognized that building ETL processes is expensive regarding time, money and effort. In this, firstly we review commercial ETL tools and prototypes coming from academic world. After that we review designing works in ETL field and modelling ETL maintenance issues. We review works in connection with optimization and incremental ETL, then finally challenges and research opportunities around ETL processes. |
|
Survey of Large-scale Hierarchical Classification |
Author : Ms. Ankita A. Burungale1, Prof. Dinesh A. Zende2 |
Abstract | Full Text |
Abstract :Large-scale classification taxonomies have thousands of classes, deep hierarchies and skewed category distribution over documents. Hierarchical classification can speed up the classification process because problem is sub divided into smaller sub problems, and each of which can be efficiently and effectively managed. Most commonly used method for multiclass classification is one versus rest method. It is inflexible due to computational complexity. The top down method is usually accepted, but it has an error propagation problem. The metaclassification method solves error propagation problem. In this paper, several challenges for hierarchical document classification such as scalability, complexity, and misclassification are reviewed. The questions concerning about the learning and the classification processes are reviewed. |
|
Implementation of Fast Normalized Cross Correlation Algorithm for Large Scale Image Search |
Author : MR.B.MATHANKUMAR, MRS.S.JEYANTHI |
Abstract | Full Text |
Abstract :- In recent years, there has been growing interest in mapping visual features into compact binary codes for applications on large-scale image search.Encoding high-dimensional data as compact binary codes reduces the memory cost for storage. Besides, it benefits the computational efficiency since the computation of similarity can be efficiently measured by Hamming distance.The correlation between two signals (cross correlation) is a standard approach to feature detection as well as a component of more sophisticated techniques. Unfortunately the normalized form of correlation (correlation coefficient) preferred in template matching does not have a correspondingly simple and efficient frequency domain expression. For this reason normalized cross-correlation has been computed in the spatial domain.Due to the computational cost of spatial domain convolution, several inexact but fast spatial domain matching methods have also been developed. For obtaining normalized cross correlation from transform domain convolution the Fast Normalized Cross Correlation Algorithm is introduced. This new algorithm provides an order of magnitude speedup over spatial domain computation of normalized cross correlation. |
|
Active and Reactive Power control using UPFC |
Author : Vaishali Kuralkar |
Abstract | Full Text |
Abstract :FACTS devices have the capability to control voltage, impedance and the phase angle in transmission circuit and hence control the power flow. Among the converter based FACTS devices Unified Power Flow Controller (UPFC) is considered in this paper. Static and dynamic analysis of the standard 5 bus system is done in MATLAB .The result of network with and without using UPFC is compared in terms of active and reactive power flows in the line and at the bus to analyze the performance of the device . |
|
Design of efficient Linear Feedback Shift Register for BCH Encoder |
Author : S.Aiswarya, S.Aravinth, S.Uma |
Abstract | Full Text |
Abstract :The sequential circuit designed was Look-Ahead Transformation based LFSR in which a hardware complexity was present and it may limit their employ in many applications. The design of efficient LFSR for BCH encoder using TePLAT (Term Preserving Look-Ahead Transformation) overcame this limitation by opening the employ of minimizing the iteration bound and hardware complexity in wide range of applications. A TePLAT convert LFSR formulation behaves in the same way to achieve much higher throughput than those of a native implementation and a Look-Ahead Transformation-based. |
|
Assess the Knowledge Rearding Lung Cancer Among Men at a Selected Hospital |
Author : Dr.S.Aruna, M.Sc(N), Ph.D1, Mrs.Kavitha2.S, Mrs.P.Thenmozhi, M.Sc(N)3 |
Abstract | Full Text |
Abstract :: Lung cancer is a leading cause of cancer related death commonly for men. There are many causes for lung cancer like inhalation of carcinogenic pollutants by susceptible host. Out of all the risk factors, cigarette smoking is the most important risk factor in the development of lung cancer in men. Objective: To assess the knowledge regarding lung cancer among men Methods: Non experimental descriptive research Design was employed. 60samples were selected by using convenient sampling technique at OPD in selected Hospital. Knowledge on lung cancer was assessed by structured questionnaire and data were analyzed by descriptive and inferential statistics. Results: The findings of the study revealed that many of them were not aware of lung cancer. Conclusion: It is to be concluded that the study participants may get benefited by self instructional module regarding lung cancer and its prevention |
|
Fast Feature subset selection algorithm based on clustering for high dimensional data |
Author : Mrs. Komal Kate¹, Prof. S. D. Potdukhe² |
Abstract | Full Text |
Abstract :A Feature selection algorithm employ for removing irrelevant, redundant information from the data. Amongst feature subset selection algorithm filter methods are used because of its generality and are usually good choice when numbers of features are large. In cluster analysis, graph-theoretic clustering methods to features are used. In particular, the minimum spanning tree (MST)-based clustering algorithms are adopted. A Fast clustering bAsed feature Selection algoriThm (FAST) is based on MST method. In the FAST algorithm, features are divided into clusters by using graph-theoretic clustering methods and then, the most representative feature that is strongly related to target classes is selected. Features in different clusters are relatively independent. A feature subset selection algorithm (FAST) is used to test high dimensional available image, microarray, and text data sets. Traditionally, feature subset selection research has focused on searching for relevant features. The clustering-based strategy of FAST having a high probability of producing a subset of useful and independent features. |
|
Survey on Graph-Based Video Sequence Matching &BoFs method for Video Copy Detection |
Author : Avinash H. Kakade |
Abstract | Full Text |
Abstract :Number of videos are uploaded daily on different web servers like you-tube. From such videos there may chances of uploading the duplicate video or modified videos. There is some copy right videos are uploaded from reputed institutes and industries which may download by unauthorized one and re-uploaded on server which may affects their standards. To avoid such misuse of copy right videos there are different techniques invented which are basically detectscopied videos respect to the content of the videos. Such techniques uses different methods and algorithms like SVD, SIFT features and BOFs techniques. These techniques work over contents i.e. images of the videos and detects the copy of video after comparing binary values (Features) extracted from the frames/images of the videos. Due to such techniques it’s possible to detect the copied video on particular motion or activity. |
|
Survey of Social Influence Analysis |
Author : Swati A. Adhav |
Abstract | Full Text |
Abstract :Social media networks is becoming popular these days, where user interacts with each other to form social networks. Social media has revolutionized the way people share and access information. The photo sharing websites include Flicker, Picasa, YouTube support users to create, annotate, share, and comment on Media data. The user’s social tagging includes metadata in the form of keywords that reflects user’s preference over photos and tagging can be better utilized to mine the user’s preference. It explicitly model user interaction and social relations in the tag generation process. It propose a regularized hypergraph learning solution to refine the correlations among user, image, tag and other metadata. While the traditional social tag analysis work focus on analyzing the image tag binary correlation, taking user factor and metadata into consideration shows superior performance in image tag refinement task. |
|
HYBRID METHOD FOR AUTOMATICALLY FILLING OF THE CHEMICAL LIQUID INTO BOTTLES USING PLC & SCADA |
Author : JAGAT DHIMAN ER.DILEEP KUMAR |
Abstract | Full Text |
Abstract :n today’s fast-moving, highly competitive industrial world, a company must be flexible, cost effective and efficient if it wishes to survive. In the process and manufacturing industries, this has resulted in a great demand for industrial control systems/ automation in order to streamline operations in terms of speed, reliability and product output. Automation plays an increasingly important role in the world economy and in daily experience. A prototype of commercial “ Hybrid method of automatically filling the bottles using PLC&SCADA and show its visualization on SCADA screen” , controlled using programmable logic controller (PLC) is proposed and the whole process is monitored using supervisory control and data acquisition (SCADA). This system provides the provision of mixing any number of liquids in any proportion. It’s remote control and monitoring makes the system easily accessible and warns the operator in the event of any fault. One of the important applications of automation is in the soft drink and other beverage industries, where a particular liquid has to be filled continuously. The objective of this paper is to design, develop and testing of the “Real time implementation of PLC,SCADA system for ratio control based bottle filling plant”. This work will provide low operational cost, low power consumption, accuracy and flexibility to the system and at the same time it will provide accurate volume of liquid in bottle by saving operational time. |
|
Vibration Analysis of Beam With Varying Crack Location |
Author : P.Yamuna1, K.Sambasivarao2 |
Abstract | Full Text |
Abstract : The importance of the beam and its engineering applications is obvious, and it undergoes different kinds of loading. Such loading may cause cracks in the beam. Crack depth and location are the main parameters for the vibration analysis of such beams. These cracks and their locations effect on the shapes and values of the beam frequency. So it becomes very important to monitor the changes in the response parameters of the beam to access structural integrity, performance and safety. In the current work, the natural frequency of a simply supported beam with a triangular crack, is investigated numerically by finite element method using of FE analysis software ANSYS. Different crack location effects are considered and the results are compared with that of the simply supported beam without crack. The results obtained from the vibration analysis of the beam show that the lowest fundamental frequency of the beam without crack is higher than the lowest frequency obtained for beam with cracks. When the location of the crack varies from the either end of the simply supported beam to the centre of the beam the lowest natural frequency decreases. |
|
SIMULATION AND EXPERIMENTAL VALIDATION OF FEEDING EFFICIENCY IN FG 260 GREY CAST IRON CASTINGS |
Author : Sarath Paul*, Rathish R ** |
Abstract | Full Text |
Abstract :Significant amount of cast iron are being used to fabricate components such as engine blocks, cylinder heads etc., in response to consumer demands for the increase in performance with excellent cast ability and machinability, the use of cast iron has grown dramatically from the past. Production of cast iron castings is a complex process which involves many parameters that affect the quality of castings. In this study, a new approach is attempted to produce sound FG 260 grey iron castings by computer simulation through experimental validation in a cast iron foundry. The entire casting process is simulated by means of finite element simulation software and then the results are compared with shop floor trials. A simple rectangular plate casting of dimension 200x100x15 mm is produced with different combinations of riser dimensions. The aim is to increase the yield as well as to reduce defects that occur in the cast iron castings due to design parameters for which a cylindrical riser of hemispherical bottom with h/d=1.3 is considered for analysis. Solidification simulation is made with ANSYS software to compute solidification time and optimal riser combinations to obtain defect free castings in the shop floor. The experimental results revealed that the simulation performed using ANSYS holds good to produce defect free cast iron castings in the foundry. |
|
The Formulation and Study the Problem of Mining Probabilistically Frequent Sequential Patterns in Uncertain Databases |
Author : Priyanka V. Patil Ismail |
Abstract | Full Text |
Abstract : Uncertainty in various domains implies the necessity for various data mining techniques and algorithms that can handle uncertain datasets. Many studies on uncertain datasets have main focused on modeling, query ranking, classification models, discovering frequent patterns, clustering, etc. However despite the existing need, very few studies have considered uncertainty in sequential data. In this paper, we propose to measure pattern frequentness based on the various possible world semantics. We are looking to establish two uncertain sequence data models abstracted from many real-life applications involving uncertain sequence data, and formulate the problem of mining probabilistically frequent sequential patterns (or p-FSPs) from data that conform to our models. Using the prefix-projection strategy of the famous PrefixSpan algorithm, we are developing two new algorithms, collectively called U-PrefixSpan, for p-FSP mining. UPrefixSpan avoids the problem of “possible world explosion”, and when combined with our three pruning techniques and one validating technique, it achieves good performance |
|
Document-Document similarity matrix and Naive-Bayes classification to web information retrieval |
Author : Dr.Poonam Yadav1 |
Abstract | Full Text |
Abstract :Due to the continuous growth of web database, automatic identification of category for the newly published web documents is very important now-a-days. Accordingly, variety of algorithms has been developed in the literature for automatic categorization of web document to easy retrieval of web documents. In this paper, Document-Document similarity matrix and Naive-Bayes classification is combined to do web information retrieval. At first, web documents are pre-processed to extract the features which are then utilized to find document-document similarity matrix where every element within matrix is similarity between two web documents using semantic entropy measure. Subsequently, D-D matrix is used to create a training table which contains the frequency of every attributes and its probability. In the testing phase, relevant category is found for the input web document using the trained classification model to obtain the relevant categorized documents from the database. The relevant category identified from the classifier model is used to retrieve the relevant categorized documents which are already stored in the web database semantically. The experimentation is performed using 100 web documents of two different categories and the evaluation is done using sensitivity, specificity and accuracy. |
|
Analysis of Access Control Techniques: R3 and RBAC |
Author : Priyanka Jairath*, Rajneesh Talwar# |
Abstract | Full Text |
Abstract :Cloud computing could be a new approach of computing that leverages the economical pooling of on-demand, self managed, virtual infrastructure. Multicloud designs deploying and evolving our application to include new clouds. This paper provides a survey regarding however multi cloud design will scale back the protection risks and by exploitation multiple distinct clouds at an equivalent time helps in disaster recovery, geo-presence, and redundancy. Though respectable progress has been created, a lot of analysis has to be done to deal with the multi-faceted security issues that exist among cloud computing. |
|
Survey of Social Tagging with Assistance of Geo-tags and Personalization |
Author : PrasannaS. Wadekar |
Abstract | Full Text |
Abstract : Social websites such as Flickr, zoomer, Picasa are photo sharing websites that permit users to share their multimedia data over the social networks. Flickr inspires sharing photos with tags, joining in interested groups, contacting other users with similar interest as friends as well as expressing their preference on photos by tagging, commenting, sharing, annotating. The user’s social tagging includes metadata in the form of keywords reflects users preference over those photos and those can be better utilized to mine the users preference. The social tags are used in various ways by many of the recommender systems to predict searchers preference on returned photos for personalized search. Geotagging of a photo is the process in which a photo is marked with the geographical identification of the place it was taken. Geotagging can help users to find a wide variety of location-specific information. In personalized tag recommendation, tags that are relevant to the user’s query are retrieved based upon the user’s interest. |
|
Utilization of six sigma(DMAIC) Approach for Reducing Casting Defects |
Author : 1Virender verma,2Amit sharma,3 Deepak juneja |
Abstract | Full Text |
Abstract :— DMAIC approach is a business strategy used to improve business profitability and efficiency of all operation to meet customer needs and expectations. In the present research work, an attempt has been made to apply DMAIC (Define, Measure, analysis, improve, control) approach. The emphasis was laid down towards reduction in the defects (Blow holes, Misrun, Slag inclusion, Rough surface) occurred in the sand castings by controlling the parameters with DMAIC technique. The results achieved shows that the rejection due to sand casting defects has been reduced from 6.98% to 3.10 % which saved the cost of Rs.2.35 lac appx. |
|
Hollow Nano Spheres for Lithium-ion Batteries |
Author : Venkatesh Yepuri* |
Abstract | Full Text |
Abstract : Technology in the Twentieth century requires miniaturization of devices into nanometer sizes while their ultimate performance is dramatically enhance. This raises many issues regarding to new materials for achieving specific functionality and selectivity. Nanomaterials a new branch of materials research are attracting a great deal of attention because of their potential applications in areas such as Electronics. There are two ways of approaching the properties of nanoscale objects: the bottom-up approach and the top-down approach. In the first, one assembles atoms and molecules into objects whose properties vary discretely with the number of constituent entities, and then increases the size of the object until this discretisation gives way in the limit to continuous variation. The relevant parameter becomes the size rather than the exact number of atoms contained in the object. In the second case, one considers the evolution of the properties of a sample as its size is whittled down from macroscopic toward nanometric lengths. It is this approach that we shall examine here, whilst mentioning zones of overlap and exclusion between the two approaches. Nanomaterials plays a very important role in various applications. One of the best applications of Nanomaterials is for Energy Storage Applications. Since the surface reactivity increases in Nano dimensions, their structures play a very important role under these dimensions. The Nanoparticles shape and morphology can also help to improve the performance of the devices. This paper mainly deals with the importance of Nanoparticles, particularly Hollow Nanospheres helps the movement of ions to circulate between the hollow spaces and to act as a transport media for the ions. Various methods are adopted for the synthesis of Hollow Nanospheres, The best methods among these are Hydrothermal Sol-gel Method, SoftMicelle template method, Hard Micelle Template method. One of these Soft Micelle template methods is reported in this paper. |
|
Hybrid Communication System using MIMO-OFDM |
Author : K.Swathi1, S Mallikarjun Rao2 |
Abstract | Full Text |
Abstract : The enormous growth for Wireless broadband services and huge take up of mobile technology demands for higher data rate services.For a communication network to be successful only provisioning of high data rates alone is not sufficient, but also should provide wide coverage.Both satellite and terrestrial networks cannot guarantee this on their own. This incapability is attributed to capacity of coverage issues in densely populated areas for satellites and lack of infrastructure in rural areas for terrestrial networks. Therefore hybrid architecture between terrestrial and satellite networks based on MIMO-OFDM with frequency reuse is employed here.In hybrid architecture, the users will be able to avail the services through the terrestrial networks as well as the satellite networks. The users located in urban areas will be served by the existing terrestrial mobile networks and similarly the one located in rural areas will be provided services through the satellite networks providing global connectivity. Andthe combination of multiple-input multiple-output (MIMO) signal processing with orthogonal frequency division multiplexing (OFDM) is regarded as a promising solution for enhancing the data rates of next-generation wireless communication systems. However, this frequency reuse introduces severe co-channel interference (CCI) at the satellite end. To mitigate CCI, we propose an OFDM based adaptive beamformer implemented on-board the satellite with pilot reallocation at the transmitter side. The system performance is simulated by using the software MATLAB, the experimental result shows the efficiency MIMO-OFDM communication system. |
|
Software Development Risk Management Using OODA Loop |
Author : Sanjeev Kumar Punia, Dr. Anuj Kumar, Dr. Kuldeep Malik |
Abstract | Full Text |
Abstract :Software development projects are subject to risks like any other project. These risks must be managed in order for the project to succeed. Current frameworks and models for risk identification, assessment and management are static and unchangble. They lack feedback capability and cannot adapt to future changes in risk events. The OODA (Observe, Orient, Decide and Act) loop, developed during the Korean war by fighter pilot Colonel John Boyd, is a dynamic risk management framework that has built in feedback methods and readily adapts to future changes. It can be successfully employed by development teams as an effective risk management framework, helping projects come in on time and on budget. |
|
DESIGN OF A CLOSED LOOP CONTROL OF THE BOOST CONVERTER (AVERAGE MODEL) |
Author : AHMED MAJEED GHADHBAN |
Abstract | Full Text |
Abstract :This paper addresses the design of closed loop control of the boost converter based on specific criteria given. The closed loop boost converter is used to convert a low level DC input voltage from a DC power supply and use to control the average model. The average model is useful when investigating the dynamic behavior of the converter when it is subject to changes in operating parameters. The design methodology will comprise of hand calculation that involves theory and simulation. The simulation carried out in Pspice software. The Performance analysis, which covers the closed loop control of the average model on related waveforms of output voltage, current and power are discussed and achieved. |
|
Advancement in surface finishing by abrasive flow machining:Review |
Author : Prof. Nagnath Kakde1, Tejas Deshmukh2, Prof.Akshaykumar Puttewar3, Prof.S.V.Lutade4 |
Abstract | Full Text |
Abstract :Abrasive flow machining (AFM) is a manufacturing technique that uses the flow of a pressurized abrasive media to remove work piece material. In comparison with other polishing technique, AFM is very efficient, suitable for the finishing of complex inner surfaces. In recent years, hybrid-machining processes have been developed to improve the efficiency of a process by clubbing the advantages of different machining processes and avoiding limitations. It is experimentally confirmed that abrasive flow machining can significantly improve surface quality of nonlinear runner, and experimental results can provide technical reference to optimizing study of abrasive flow machining theory. This project is a genuine effort to optimize all the available modifications and permutation of abrasive flow machining in order to get the best available surface finish with minimum changes in the pre existing setups at no or very little cost. |
|
A Web – Based System for Classification of Remote Sensing Data |
Author : Dhananjay G. Deshmukh |
Abstract | Full Text |
Abstract :The availability of satellite imagery has been expanded over the past few years, and the possibility to perform fast processing of massive databases comprising this kind of imagery data has opened ground-breaking perspectives in various different fields. Remote sensing data have become very widespread in recent years, and the exploitation of this technology has gone from developments mainly conducted by government intelligence agencies to those carried out by general users and companies This paper describes a web-based system which allows an inexperienced user to perform unsupervised classification of satellite/airborne images. The processing chain adopted in this work has been implemented in C language and integrated in our proposed tool, developed with HTML5, JavaScript, Php, AJAX and other web programming languages. Image acquisition with the applications programmer interface (API) is fast and efficient. An important added functionality of the developed tool is its capacity to exploit a remote server to speed up the processing of large satellite/airborne images at different zoom levels. The ability to process images at various zoom levels allows the tool an improved interaction with the user, who is able to supervise the final result. The previous functionalities are necessary to use efficient techniques for the classification of images and the incorporation of content-based image retrieval (CBIR). Several experimental validation types of the classification results with the proposed system are performed by comparing the classification accuracy of the proposed chain by means of techniques available in the well-known Environment for Visualizing Images (ENVI) software package. |
|
Implementation of fruit Grading System by Image Processing and Data Classifier- A Review |
Author : Miss.Anuradha P. Gawande 1, Prof. S.S. Dhande |
Abstract | Full Text |
Abstract :— Sorting of fruits and vegetables is one of the most important process in fruits production, while this process is typically performed manually in most countries. In India,basically in Vidharbha Region, productions of oranges are on the large scale. So, for sorting and grading of oranges, would be more helpful in industry. Machine learning and computer vision techniques have applied for evaluating food quality as well as crops grading. Different learning methods are analyzed for the task of classifying infected/uninfected Orange fruits from images of their external surface. Linear discriminant analysis is then used to transform the feature space after feature fusion for better separability, while three classifiers, naive Bayes, k-nearest neighbor and supported vector machines, and will be investigate.Abstract must be of Time New Roman Front of size 10 and must be justified alignment. |
|
DATA PRIVACY USING MDSRRC |
Author : Priyanka k. Dhongade1 ,Prof. Yogesh Nagargoje2 |
Abstract | Full Text |
Abstract : The use of the data mining techniques and its related application is increased in recent years to extract important knowledge from large amount of data. This has increased the disclosure risks to sensitive information when the data is released to outside parties. Database containing sensitive knowledge must be protected against unauthorized access. Seeing this it has become necessary to hide sensitive knowledge in database. In this paper, we propose a heuristic based algorithm named MDSRRC (Modified Decrease Support of R.H.S. item of Rule Clusters) to hide the sensitive association rules with multiple items in consequent (R.H.S) and antecedent (L.H.S). This algorithm overcomes the limitation of existing rule hiding algorithm DSRRC. Proposed algorithm selects the items and transactions based on certain criteria which modify transactions to hide the sensitive information. Experimental result shows that proposed algorithm is highly efficient and maintains database quality. |
|
Data Encryption Using DNA Sequences Based On Complementary Rules – A Review |
Author : Ms.Amruta D. Umalkar |
Abstract | Full Text |
Abstract :With the quick development of net technology and data process technology, the knowledge is unremarkable transmitted via the net. The vital data in transmission is definitely intercepted by unknown person or hacker. So as to reinforce the knowledge security, encryption becomes a vital analysis is direction. A message cryptography formula supported deoxyribonucleic acid (Deoxyribo Nucleic Acid) sequence for presenting during this paper. The most purpose of this formula is to write the message with the premise of complementary rules deoxyribonucleic acid sequence. |
|
The Sun and its Activities |
Author : Geeta Rana1, M K Yadav2 |
Abstract | Full Text |
Abstract : : The objective of this paper” THE SUN AND ITS ACTIVITIES” is to explain the solar activities. The paper aims to provide the reading with the main elements; that characterize the peculiar structures, the prominences and their environment as deduced from observations of solar radiations/solar activities. As modern life is very technology dependent, so studying solar activity becomes a big concern. It is well known that the technology of satellites for telecommunication and human space activities are very sensitive to solar eruptions. For all these reasons, the past decade has seen the development of space weather as a new branch of science aimed at forecasting solar activity and its consequences on earth. |
|
Aluminium Alloy Metal Matrix Composite: Survey Paper |
Author : Vengatesh.D [1] Chandramohan.V [2] |
Abstract | Full Text |
Abstract :For the last few years there has been a rapid increase in the utilisation of aluminium alloys, particularly in the automobile industries, due to low weight, density, coefficient of thermal expansion, and high strength, wear resistance. Among the materials of tribological importance, Aluminium metal matrix composites have received extensive attention for practical as well as fundamental reasons. Aluminium alloys and aluminium-based metal matrix composites have found applications in the manufacture of various automotive engine components. Compound work pieces are developed to combine favourable properties of different materials. Many composite materials are used in home and industrial production. Weight reducing in rapid moving parts of automobile engines such as Crankshaft, connect rod. to a reduction of the weight and wear reduction purpose. For this review paper discussed with recent composite technology and performance behaviour and also we discussed MMC. the material mixed with non metal and analyzed in this mechanical properties and fabrication technique |
|
Modified Bidirectional Quasi Z-Source Inverter Design with Neuro Fuzzy Control Technique |
Author : Barna Prince.M1, Jamuna.P2 |
Abstract | Full Text |
Abstract :This paper proposes a new controller design and realization of a high-power bidirectional quasi-Z-source inverter (BQ-ZSI). A bidirectional active switch in the quasi-Z-source network improves the performance of the inverter under small inductance and low power factor. To maintain constant output neuro fuzzy control technique is used in the closed loop. And also overall efficiency of the inverter is increased. The quasi-Z-source inverter (qZSI) with battery operation can balance the stochastic fluctuations of photovoltaic (PV) power injected to the grid/load, but its existing topology has a power limitation due to the wide range of discontinuous conduction mode during battery discharge. |
|
WINLAR (SOLAR AND WIND ENERGY SYSTEM) |
Author : Naragani Chiranjeevi, Gadde Megha Syam. |
Abstract | Full Text |
Abstract :There is an emergency need to work out an extension of non-conventional hand in total power generation as we see a lot of power scarcity due to lack of surplus amount of natural resources. Our project “WINLAR” is an archetype which helps in harnessing wind and solar energy within a single model. In view of considering different aspects like low installation cost, decrease in cost charge per unit, development in the area, employment, direct connection of wind power plant to conventional grid are some of the advantages of our prototype, places where wind currents would be high will be of good use for the constructive output of our prototype. |
|
Calculation Methodologies for The Design of Piping Systems |
Author : Mr. Suyog U. Bhave |
Abstract | Full Text |
Abstract : Piping systems are constantly present in industrial facilities, being in some cases associated with the transport of fuels, processing of crude oils and chemical plants. Due to the nature of those fluids, the design of the piping system that transports them is a task of great responsibility, which must follow codes and standards to guarantee the system’s structural integrity. Many times the piping systems operate at a temperature higher than the temperature at which they are assembled, leading to the thermal expansion of the system’s pipes and since no piping system is free to expand, the thermal expansion will lead to stresses. Besides the stresses caused by thermal expansion, the studied systems will also are subjected to constant loads caused by their weight, as well as occasional loads like wind, earthquake. In this perspective, calculation methodologies were developed in order to do quick analysis of the most common configurations, according to the codes like ASME B31.3, allowing that way improvements on the flexibility of the projected systems. Although the methodology developed may only be used in simple systems and gives very conservative results, in practical cases it can be used to analyse complex systems, by dividing them in simpler cases. [6, 8, 10] |
|
Review of Security Policy Enforcement for Mobile Devices |
Author : Dimpal V. Mahajan1, Prof. Trupti Dange2 |
Abstract | Full Text |
Abstract :— Mobile devices like smartphones and tablets are commonly used for personal and business purpose. Enterprises are more concerns about security of mobile devices compared to personal mobile subscribers. The challenges an enterprise may face include unlimited access to corporate resources, lack of encryption on corporate data, unwillingness to backup data, etc. Many of these issues have been resolved by auditing and enforcing security policies in enterprise networks. However, it is difficult to audit and enforce security policies on mobile devices. A substantial discrepancy exists between enterprise security policy administration and security policy enforcement. So in this paper we will study different security policies. |
|