DESIGN AND MANUFACTURING OF COST EFFICIENT HORIZONTAL AXIS WIND TURBINE |
Author : Hemant Pathade, Ketan Deshpande, Yogesh Nawale, Sagar Damare, Sanket Ambre |
Abstract | Full Text |
Abstract :Wind energy and solar energy are the types of renewable energy which widely used in the world. Wind is the most available clean energy in the form of renewable energy. In current scenario, the horizontal and vertical axis wind turbine is the recent trend for power generation and energy utilization. But the cost of the HAWT & VAWT is high due to the cost of blades. Generally, blades are made up of carbon fibers and balsa wood. These are too much expensive materials. To overcome this problem we found the alternative material for carbon fibers. We use polymer composites & glass fiber composite as an alternative to carbon fibers. Once the die manufactured; the blades can be manufactured easily. The blades of this composite materials results in less cost and ease of manufacturing of the windmill. Hence we can provide green energy to the world in affordable cost. This cost effective wind turbine can be used in Remote areas, Farm-houses, Schools, Colleges, Banks etc. |
|
COST EFFECTIVE CASCADING MULTI-TANK RAINWATER HARVESTING SYSTEMS FOR MULTI-STOREY BUILDINGS |
Author : S. Sendanayake, M. T. R Jayasinghe |
Abstract | Full Text |
Abstract :Rainwater harvesting (RWH) is a practice which is gaining ground to ensure water security in areas where reticulated service water supply is not viable or reliable. Much research has been done to optimize a conventional RWH system, maximizing the Water Saving Efficiency (WSE) and minimizing the storage tank capacity. The conventional RWH system has been upgraded by the introduction of cascading multi-tank model, to feed service water points through gravity in multi-storey building situations by distributing the storage capacity among different floor levels. However, the multi-tank model is in requirement of a pumping unit to re-circulate the collected rainwater intermittently, as and when needed, to keep the cascading cycle sustained to maintain a desired WSE, incurring a running cost on power. By eliminating the need for pumping,
a significant improvement can be made to the model in reducing both the capital investment and the running cost, which would proliferate the use of RWH for multi-storey buildings while enhancing the system reliability.
|
|
PRIORITIZING AND HANDLING CONGESTION IN VOIP FLOWS USING DIFFSERV MODEL |
Author : M.V.Sreeraj, T.Satya Savithri |
Abstract | Full Text |
Abstract :The VoIP traffic flow is emerging out as one of the commonly used day to day technology. This is a very effective technology but at the same time is susceptible to various threats. This is due to several features of the wireless networks, with some being congestion, attacks, etc. So in this paper, we propose to develop a technique for Prioritizing and Handling Congestion in VoIP Flows Using DiffServ Model. In this technique, the VoIP traffic flow is mapped into the DiffServ network, for traffic protection and prioritization. Then to handle the unpredictable congestion in the VoIP network, a dynamic token bucket traffic shaper is employed, which adaptively manages the congested packets based on its dynamic token generation rate. |
|
A BIO INSPIRED ALGORITHM FOR BIOMETRIC FAKE DETECTION USING FACE, FINGER & IRIS |
Author : Snehal G.Parate, Mrs.Pooja Thakre |
Abstract | Full Text |
Abstract :The biometric person recognition technique based on the pattern of the human iris, face and fingerprint well suited to be applied to access control and provide strong security .A typical biometric system consists of sensing, feature extraction, and matching modules. But now a day’s these systems are attacked by using fake biometric. Also the methods used are slow and expensive. To ensure the actual presence of a real legitimate
trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. There are various search techniques among which Genetic algorithms (GAs) are powerful search techniques that are used successfully to solve problems in many different disciplines .In this paper Genetic algorithm (GA) is used with 25 General Image quality features for biometric fake detection using Face, Fingerprint and Iris. Genetic algorithm does not require special equipment’s and can be used in system where fast detection is required. Proposed System, it is a software based system which is used for multiple fake detections with the help of database.
|
|
A RESEARCH PAPER ON ENDLESS FUN |
Author : Nizamuddin, Shreshth Kumar, Rishab Kumar |
Abstract | Full Text |
Abstract :The main objective of the thesis is to observe and learn the process of developing an infinite running game. The game is known as ‘Endless Fun’ and is developed on Python programming language using Pygame Module. The proposed game will be a computer game in a 2 Dimensional (2D) environment. Players will be able to play the game in the multiplayer style, where users take turns at the same computer and the high scores are recorded for further competition. The game will allow any number of players to play the game. The game will not deal with any artificial intelligence but there’ll rather be time-based obstacles. The theory of the thesis focuses on the game’s concepts, such as the genre, history, tools used, coding, etc. The practical part of the thesis focuses on game’s programmed features, block diagrams, level designs, basis of difficulty, etc. Python was chosen for the development of the project so as to learn Pygame module and easy implementation of python as a language with real world entities.
|
|
STEGANOGRAPHY USING DYNAMIC KEY GENERATION |
Author : Priyanka Kumari, Aritra Pal, Parth Dixit, Dr. A. Shanthini |
Abstract | Full Text |
Abstract :3D printers are now being used everywhere from simple prototyping to complex product creation. However, there
still are a lot of hurdles to overcome for a much wider adaptation of such printers. One of the biggest problems is the difficulty in 3D model creation. It takes a lot of experience to create such models also, most of the 3D model creating software available today comes at a high price tag. To help with this, 3D scanners are available, but these scanners are sold separately and come at a high price. To solve these problems, a 3D printer with an integrated 3D scanning is proposed here |
|
IOT BASED VEHICLE MONITORING SYSTEM WITH COLLISION DETECTION |
Author : A. Sriram, Vijay Raghavan S, G. Ramasesshan, S.A Gautam |
Abstract | Full Text |
Abstract :The advancement in technology has created a thrive for a materialistic world. People are using road as a faster means of travel within the city. The trivial traffic control technology is still a step behind in ensuring road safety and monitoring everyone. The growth of road traffic in India has resulted in fatal road accidents.
The main objective of this paper is to provide a proper method to monitor accidents and over speeding. This paper proposes a method that uses various sensors for monitoring vehicles and uses Internet of Things (IOT). |
|
EXPERIMENTAL INVESTIGATION ON PARTIALLY REPLACEMENT OF FLUORESCENT LAMP POWDER WITH CEMENT AND FULLY REPLACEMENT OF FINE AGGREGATE BASED CONCRETE |
Author : Jahir Hussain .S , Jose Ravindra Raj.B |
Abstract | Full Text |
Abstract :Resources are found to be depleted due to making of ordinary concrete. One of the main
ingredients in making concrete is fine aggregate. There is a huge demand for fine aggregate at present
scenario. As growth of industries takes place, production of slag from industries increases
In this work an attempt has been made to use fluorescent lamp powder 20% replacement of
cement. And the fine aggregate was fully replaced by iron slag and quarry dust. The fine aggregate
replaced by iron slag 50% and Quarry dust 50%.
Mortar cube of ratio 1:3 and 1:4 and M25 gradeof concrete cubes were cast with water cement
ratio 0.5 and 0.52 respectively andthe compressive strength of concrete cubes aged 7, 14 and 28 days
were tested and the results were compared. The results were found to be good. |
|
A REVIEW ON SECURITY OF GOOGLE’S INFRASTRUCTURE & DATA STORAGE |
Author : S.B.Rafiah, N.Sreevidya, M.Yellamma |
Abstract | Full Text |
Abstract :Google is the leader of the software community by offering the users many services like Consumer Services
and Enterprise level Services.//Google is one of the topmost search engines, is offering the users many
services like Consumer Services and Enterprise level Services.// Some of them include Search, online
advertisements, Gmail, photos, Cloud computing etc., and also almost every literate without any age barriers
makes use of googles services and products. Such gigantic ruler might have followed very strong security
techniques. Googles growth itself is an evidence of its secured services. Everyone might want to know how
such big organization is providing security to the petabytes of data being generated every second. This paper
provides glimpses about its Security design. |
|