Actual generation process requires the working of many components of the power system in tandem t... more Actual generation process requires the working of many components of the power system in tandem to maximize the output. One of the main components to form a major part is the reactive power in the system. It is required to maintain the voltage to deliver the active power through the lines. Loads like motor loads and other loads require reactive power for their operation. To improve the performance of ac power systems, we need to manage this reactive power in an efficient way and this is known as reactive power compensation. Reactive power can be best described as the quantity of “unused†power that is developed by reactive components, such as inductors or capacitors in the AC circuit or system. In a DC circuit, the product of “volt-amps†gives the power consumed in watts by the circuit. However, while this formula is also true for purely resistive AC circuits, the situation is slightly more complex in a AC circuit containing reactive components as this “volt-amps†product can change with frequency. There are two aspects to the problem of reactive power compensation: load compensation and voltage support. Load compensation consists of improvement in power factor, balancing of real power drawn from the supply, better voltage regulation, etc. of large fluctuating loads. Voltage support consists of reduction of voltage fluctuation at a given terminal of the transmission line. Two types of compensation can be used: series and shunt compensation. These quite satisfactorily do the job of absorbing or generating reactive power with a faster time response and come under Flexible AC Transmission Systems (FACTS).
Batticaloa lagoon is an inland body of water plays a significant role to uplift the standard of l... more Batticaloa lagoon is an inland body of water plays a significant role to uplift the standard of living of people, especially fishing community in Batticaloa district. However, lagoon water pollution has become a growing menace to human society and natural ecosystems in recent decades. Hence, it is vital to understand the spatial and temporal variability of pollutants within aquatic systems. Therefore, this study aimed to investigate the spatial and temporal variations of surface water of Batticaloa lagoon. This study was carried out from November, 2013 to June, 2014. Batticaloa lagoon was divided into three divisions based on anthropogenic activities where twenty sampling points were randomly selected from these divisions and water samples were taken monthly. Physico-chemical parameters such as temperature, pH, EC and TDS were measured at sampling points while TSS, TS, DO, BOD, phosphate, nitrate and turbidity were measured at laboratory. Data were analyzed statistically to interpret the results. Results showed that all the quality parameters tested except turbidity exceed the standard levels for aquatic life while DO falls within the acceptable range. There were high range in tested parameters, temperature ranged between 27.2˚C to 32.5˚C, pH 6.4 - 9.2, EC 600µS/cm - 1700μS/cm, TDS 296mg/l - 873mg/l, TSS 13mg/l – 35mg/l, phosphate 0.19mg/l - 0.76mg/l, nitrate 0.97mg/l - 2.60mg/l, DO 4.64mg/l - 7.12mg/l, BOD5 4.13mg/l - 8.66mg/l and turbidity 6.6NTU - 13.9NTU. Phosphate and nitrate levels significantly (p<0.05) varied among the divisions. Further, temperature, pH, EC, TDS, TS, DO and phosphate were high during dry season while TSS, BOD, nitrate and turbidity were high during wet season. The variations of EC, TDS, TS, TSS, BOD and turbidity between wet and dry seasons were also significant. The study concludes that, the Batticaloa lagoon water has been polluted. However, pollution level is not severe. Therefore, measures should be taken to prevent the further pollution of Batticaloa lagoon.
In Android devices, Memory management has become a major concern as a result of it has vital impa... more In Android devices, Memory management has become a major concern as a result of it has vital impact on system performance and battery life. Additionally it's vital to with efficiency use and manages the interior and external memory house gift within the mobile software. Thus it is essential to create a facility that helps in reducing memory consumption. The projected Classic compression rule compress the RGB color exploitation lossless compression rule with the assistance of prophetical secret writing supported Color quantization for mechanical man Mobile Devices. Supported this it'll scale back the image size whereas achieving the most effective image quality with less knowledge loss. it'll show on output screen MSE, PSNR, and compression magnitude relation and compression time of compressed Image.
Rural areas development is necessary for the developing countries like India. Public transport is... more Rural areas development is necessary for the developing countries like India. Public transport is the major source for such developments as people living in rural areas are willing to improve their living standards. Now a days public transport facing problem with intermediate-public transport. Transport planner has to care of these problem and necessary precautions to increase a public transport facility which in turn helps to increase the public transport usage by the commuter. Present study focused to increase the public transport accessibility in safe and efficient way. This study helps in financial growth to the public by diverting intermediate public transport to public transport. The study area selected is between Anandapuram to Vishakapatnam, household surveys and onboard survey are carried out to analyze the current nature of accessibility to these zones.
Vehicle to vehicle data transmission, we present initial designs and results of a small-scale pro... more Vehicle to vehicle data transmission, we present initial designs and results of a small-scale prototype using light fidelity (Li-Fi) technology, a new technology that was developed in the last few years, which still needs more systematic inquiry on its sustainability for outdoor vehicular networks. Vehicle to vehicle communication is the most effective solution we have used in order to reduce vehicle's accidents. The propose use of Li-Fi technology comprises mainly light-emitting diode (LED) bulbs as means of connectivity by sending data through light spectrum as an optical wireless medium for signal propagation. In fact, the usage of light emitting diode (LED) eliminates the need of complex wireless networks and protocols. The design system is aim to ensure a highly-reliable communication between a commercial LED-based transaction light and a receiver mount on a vehicle.
Data duplication is technique has been widely used in a cloud to reduce storage space and upload ... more Data duplication is technique has been widely used in a cloud to reduce storage space and upload bandwidth. This technique is also used for eliminating duplicate copies of data. However, in cloud only one copy of each file is stored even if each file is owned by a huge number of users. The duplication system improves storage utilization but it reducing reliability, according to user. Furthermore, in above challenges the Data duplication is a technique has been widely used in cloud servers that are data storage makes first attempt for formalize notation of distributed reliable duplication system. We propose, new distributed duplication systems are improves security and reliability. In which the multiple cloud servers are distributed in data chunks. In Distributed storage system, the deterministic secret sharing scheme is achieved security requirements of data confidentiality and tag consistency, instead of using tag conversion and message authentication code as in duplication system. Security observations makes clear by reasoning that our de-duplication systems are get in terms of the clear outlines detailed in the made an offer safety good example. As a fact in support of idea of a quality common to a group, we give effect to the made an offer systems and put examples on view that the caused overhead is very limited in true to likeness conditions.
The interactive voice response system (IVRS) is an automated phone system and software that allow... more The interactive voice response system (IVRS) is an automated phone system and software that allows an individual to conduct transactions by phone without the assistance of a live worker. The telephone user can access the information from anywhere at any time simply by dialling a specified number and following an on-line instruction when a connection has been established. The user can get the information at anytime from anywhere by dialling the specified mobile number. The AVR system uses computer stored data. The student data is stored in computer. The parent’s mobile number is stored in the computer.
Online Social network is growing to large extent to share information between the different diver... more Online Social network is growing to large extent to share information between the different diversity people around the world. The main objective of the proposed system to identify the community in the multidimensional data such as users , Tags , stories , locations ,employment details ,photos and comments . We propose a data mining technique to detect the frequently interacting users based on the common subjects and grouping them in single community. The main incorporation of the work is to identify a seed-based community in a multi-dimensional network by evaluating the affinity between two items in the same type of entity (same dimension) or different types of entities (different dimensions) from the network. Our idea is to calculate the probabilities of visiting each item in each dimension, and compare their values to generate communities from a set of seed items and explore the feature evolution from the seed item in the same dimension or different dimension. We also propose the friend suggestion system and information suggestions system based on the data relevancy for the items in the different dimensions using seed of the data selection. In order to evaluate a high quality of generated communities by the proposed algorithm, we develop and study a local modularity measure of a community in a multi-dimensional network. Experimental results prove that proposed system outperforms the state of approach in terms of precision and recall.
In this paper we develop an Application in order to visualize the architecture of flat on develop... more In this paper we develop an Application in order to visualize the architecture of flat on development site with the concept of virtual reality. With the help of android phone and Google cardboard we are building a device for developing virtual reality. The effects will be developed in Unity 3D and also using DIVE Software Development Kit. The user of it can only visualize the places or structures those are already built and developed or at development stage. In this paper we will be developing and implementing sensor fusion algorithm for detecting orientations in three dimensions. We will be implementing A* approach for path finding and also Kalman filter is designed to compensate the sensor errors[2]. The app implemented would be suitable on android platform and Google Cardboard will also be used for displaying purpose[1].
During last few years, use of mobile phones as a official work and many organization using mobile... more During last few years, use of mobile phones as a official work and many organization using mobile device as a business communication. Location based services allow user to provide physical location provenance proof and privacy protected. Our framework maintains a privacy of data sharing and provides witness proof. It is a significant challenge to generate provenance witness and generate a proxy in one framework.so far propose system fulfill the framework requirement. We produce a novel framework for location specific secure data sharing which will provide user location proofs generation and proxy location.
A Mobile ad hoc network (MANETs) is a group of mobile nodes that communicate with node to node vi... more A Mobile ad hoc network (MANETs) is a group of mobile nodes that communicate with node to node via wireless links with no fixed infrastructure and no centralized administration. In MANETs many routing protocol works as on-demand routing protocol and these on-demand protocols have faster response time and lower overhead. In MANET there are many attacks that affect the routing and one of them is rushing attack. In this paper, we have study various prevention techniques, which are used to prevent the rushing attack. In Rushing attack, a malicious node or an attacker further the speed of routing process. Rushing attacks represent one of such possibilities. In these Rushing attacks, malicious nodes send the Route Request (RREQ) packets, asking for a route, to the destination node quicker than the legitimate nodes do.
In many applications of communication network data transfer between nodes is a common but critica... more In many applications of communication network data transfer between nodes is a common but critical operation. Some error bit and noise is added with data when the data is transfer through communication network. Error Correction Codes are used to generate the original data at the receiver side by removing error and noise. Communication performance is improved by enabling the transmitted signal to better withstand the effects of channel disabilities such as noise, interference and fading which occur during transmission as well as during comparison. In short the Error Correction is the detection of errors and reconstruction of the original, error free data. There are errors correcting codes to detect as well as correct errors. One of the main drawback of error correcting code is time of the execution which increase the delay in the communication network. In this paper error correction code is implemented with the pipelining technique to improve the execution time of the communication system.
The main objective of this concept is used to apply the gear by using automation system in automo... more The main objective of this concept is used to apply the gear by using automation system in automobile vehicles. This is the new innovative model mainly used for the vehicles to control the vehicle. Here we are concentrating to design the automatic gear changing mechanism in two wheeler vehicles by using the electronic devices. This is very useful for the gear changing mechanism in automobile vehicles. By using this we can easily control the vehicle and improve the performance of the vehicle also we can avoid the wear and tear of the gear.
One of the technical challenges in Power system deregulation is Congestion. In deregulated electr... more One of the technical challenges in Power system deregulation is Congestion. In deregulated electricity market congestion in transmission line occurs when there is inadequate amount of transmission capability to simultaneously accommodate all constraints for transmission of a line. Flexible Alternative Current Transmission System (FACTS) devices is a solution to reduce the flows in over loaded lines, resulting in an increased loadability, controlling the power flow in the network, improved stability of the network ,low system loss, and there by reduced cost of production. This paper deals with effect of different types of FACTS devices such as thyristor controlled series capacitor (TCSC) and Unified Power Flow Controller which are deal with particular 300km,3 Phase,400 V, (L-L), 50 Hz. long transmission line prototype system for improvement of the power flow at receiving end and also the voltage at the receiving will be effected by different types of nonlinearity present in power transmission which improved by FACTS devices. From result we will compare different FACTS devices by which we can conclude that UPFC will have maximum capability for power flow improvement. All simulations have been carried out in MATLAB/SIMULINK environment.
Biometric is an emerging trend of science for identifying a person based on physical and behaviou... more Biometric is an emerging trend of science for identifying a person based on physical and behavioural attributes. Large scale of biometric systems are used both in commercial and government agencies to increase the level of security. Face recognition is the powerful method of recognizing an individual. It is a computer application which compares the facial features with the database image. A unique approach is introduced for recognizing multi pose images with different conditions. The classification is performed by using Back Propagation Algorithm and Radial Basis Algorithm and Adaptive Neuro Fuzzy Inference System. The proposed method is based on extraction and Eigen face method. Experimental results are tested using FERET database and shows that the proposed method is effective for face recognition. The feature extraction using PCA is to reduce the dimensionality and to calculate the feature points. The performance evaluations between the proposed methods are analyzed. The characteristic features calculated using PCA called Eigen faces are obtained from the stored images are combined with the Back Propagation Neural Network, Radial Basis Function Network and Adaptive Neuro Fuzzy Inference System algorithms for recognition of images. For extracting the feature points from the input image, entropy and mean of each image are detected. The experimental results on performance of testing images are compared with Back Propagation, Radial Basis Function Network and Adaptive Neuro Fuzzy Inference System algorithms. Thus Face recognition can be achieved through the architectures and algorithms of artificial neural networks.
For fingerprint matching the set of minutiae was considered as the minutiae points were most dist... more For fingerprint matching the set of minutiae was considered as the minutiae points were most distinctive points to represent fingerprint. First it was believed that minutiae set is not sufficient for reconstruction of fingerprint image. But, in this paper with the help of prior knowledge termed as orientation patch dictionary and continuous phase patch dictionary it is somehow possible to reconstruct fingerprint image from their minutiae representations. The two dictionaries improves the reconstruction of fingerprint. Orientation patch dictionary helps in reconstruction of orientation field, and continuous phase patch dictionary helps in reconstructing ridge patterns.
Chromatic dispersion is very serious issue for communication engineers while designing a wave div... more Chromatic dispersion is very serious issue for communication engineers while designing a wave division multiplexing for optical communication. In the present scenario there is a increasing demand of high speed internet which require more capacity and more bandwidth. The effect of chromatic dispersion can be reduced by compensation technique. [1, 2] The chromatic dispersion also has inverse relationship with FWM. In this paper we used post dispersion compensation along with the fiber Bragg grating to reduce the effect of chromatic dispersion. Also we can compare the Bit error rate at different power levels 5 db, 10 db and 20 db while the length of fiber is fixed. After simulation it is proven that bit error rate is a function of input power level. The pulse broadening is a function of length of fiber which has been shown in this work When the BER increases quality factor decreases and overall fiber optic system degraded. In this paper we also prove that the BER is also a function of Length of Fiber. As the fiber length increases BER also increases. The whole simulationn is performed by Optisystem simulation software. Also by examine the eye diagram it is clear that link performance is improved by using dispersion compensation.
Recognizable proof of the plant ailments is the way to keeping the misfortunes in the yield and a... more Recognizable proof of the plant ailments is the way to keeping the misfortunes in the yield and amount of the agrarian item. The plant's investigations ailments mean the investigations of outwardly detectable examples seen on the plant. Wellbeing observing what's more, ailment location on plant is extremely basic for feasible farming. It is extremely hard to screen the plant illnesses physically. It requires colossal measure of work, expertise in the plant maladies, furthermore require the extreme preparing time. Consequently, picture handling is utilized for the identification of plant ailments. Malady recognition includes the progressions like picture obtaining, picture pre-handling, picture division, highlight extraction and arrangement. This paper talked about the routines utilized for the identification of plant infections utilizing their leaves pictures. This paper additionally talked about some division and highlight extraction calculation utilized as a part of the plant illness discovery.
The research work was conducted with the objective to find the various channels of e-banking in I... more The research work was conducted with the objective to find the various channels of e-banking in India available as on date and the banking channels and services that can be offered in future on smart devices. This paper is pursued by collecting information through a literature review of the websites, brochures, products and services of related banks and by observation method, examining the banking services offered by various banks. The study suggests the various channels of e-banking available in India currently and also suggests certain Banking Channels and Services that can be offered in future on smart devices.
Augmented Reality alters the way or process by which the user is able to interact with virtual ob... more Augmented Reality alters the way or process by which the user is able to interact with virtual objects. It is basically an idea of superimposing a certain virtual object, image, texture, video, etc. over an existing marker. Marker is a common point or a junction as per say for the Real world and the Virtual to meet allowing the user to then interact with the virtual object superimposed over the marker (up to some extent.). Due to this ability the concepts of virtual world and real world meet creating a vista of application was based on the internet, Intranet or on the Device of the User itself. The Computer Vision plays a vital role in Augmented Reality, because it actually lets the user device perceive the environment and allow digital manipulation and interaction.
Actual generation process requires the working of many components of the power system in tandem t... more Actual generation process requires the working of many components of the power system in tandem to maximize the output. One of the main components to form a major part is the reactive power in the system. It is required to maintain the voltage to deliver the active power through the lines. Loads like motor loads and other loads require reactive power for their operation. To improve the performance of ac power systems, we need to manage this reactive power in an efficient way and this is known as reactive power compensation. Reactive power can be best described as the quantity of “unused†power that is developed by reactive components, such as inductors or capacitors in the AC circuit or system. In a DC circuit, the product of “volt-amps†gives the power consumed in watts by the circuit. However, while this formula is also true for purely resistive AC circuits, the situation is slightly more complex in a AC circuit containing reactive components as this “volt-amps†product can change with frequency. There are two aspects to the problem of reactive power compensation: load compensation and voltage support. Load compensation consists of improvement in power factor, balancing of real power drawn from the supply, better voltage regulation, etc. of large fluctuating loads. Voltage support consists of reduction of voltage fluctuation at a given terminal of the transmission line. Two types of compensation can be used: series and shunt compensation. These quite satisfactorily do the job of absorbing or generating reactive power with a faster time response and come under Flexible AC Transmission Systems (FACTS).
Batticaloa lagoon is an inland body of water plays a significant role to uplift the standard of l... more Batticaloa lagoon is an inland body of water plays a significant role to uplift the standard of living of people, especially fishing community in Batticaloa district. However, lagoon water pollution has become a growing menace to human society and natural ecosystems in recent decades. Hence, it is vital to understand the spatial and temporal variability of pollutants within aquatic systems. Therefore, this study aimed to investigate the spatial and temporal variations of surface water of Batticaloa lagoon. This study was carried out from November, 2013 to June, 2014. Batticaloa lagoon was divided into three divisions based on anthropogenic activities where twenty sampling points were randomly selected from these divisions and water samples were taken monthly. Physico-chemical parameters such as temperature, pH, EC and TDS were measured at sampling points while TSS, TS, DO, BOD, phosphate, nitrate and turbidity were measured at laboratory. Data were analyzed statistically to interpret the results. Results showed that all the quality parameters tested except turbidity exceed the standard levels for aquatic life while DO falls within the acceptable range. There were high range in tested parameters, temperature ranged between 27.2˚C to 32.5˚C, pH 6.4 - 9.2, EC 600µS/cm - 1700μS/cm, TDS 296mg/l - 873mg/l, TSS 13mg/l – 35mg/l, phosphate 0.19mg/l - 0.76mg/l, nitrate 0.97mg/l - 2.60mg/l, DO 4.64mg/l - 7.12mg/l, BOD5 4.13mg/l - 8.66mg/l and turbidity 6.6NTU - 13.9NTU. Phosphate and nitrate levels significantly (p<0.05) varied among the divisions. Further, temperature, pH, EC, TDS, TS, DO and phosphate were high during dry season while TSS, BOD, nitrate and turbidity were high during wet season. The variations of EC, TDS, TS, TSS, BOD and turbidity between wet and dry seasons were also significant. The study concludes that, the Batticaloa lagoon water has been polluted. However, pollution level is not severe. Therefore, measures should be taken to prevent the further pollution of Batticaloa lagoon.
In Android devices, Memory management has become a major concern as a result of it has vital impa... more In Android devices, Memory management has become a major concern as a result of it has vital impact on system performance and battery life. Additionally it's vital to with efficiency use and manages the interior and external memory house gift within the mobile software. Thus it is essential to create a facility that helps in reducing memory consumption. The projected Classic compression rule compress the RGB color exploitation lossless compression rule with the assistance of prophetical secret writing supported Color quantization for mechanical man Mobile Devices. Supported this it'll scale back the image size whereas achieving the most effective image quality with less knowledge loss. it'll show on output screen MSE, PSNR, and compression magnitude relation and compression time of compressed Image.
Rural areas development is necessary for the developing countries like India. Public transport is... more Rural areas development is necessary for the developing countries like India. Public transport is the major source for such developments as people living in rural areas are willing to improve their living standards. Now a days public transport facing problem with intermediate-public transport. Transport planner has to care of these problem and necessary precautions to increase a public transport facility which in turn helps to increase the public transport usage by the commuter. Present study focused to increase the public transport accessibility in safe and efficient way. This study helps in financial growth to the public by diverting intermediate public transport to public transport. The study area selected is between Anandapuram to Vishakapatnam, household surveys and onboard survey are carried out to analyze the current nature of accessibility to these zones.
Vehicle to vehicle data transmission, we present initial designs and results of a small-scale pro... more Vehicle to vehicle data transmission, we present initial designs and results of a small-scale prototype using light fidelity (Li-Fi) technology, a new technology that was developed in the last few years, which still needs more systematic inquiry on its sustainability for outdoor vehicular networks. Vehicle to vehicle communication is the most effective solution we have used in order to reduce vehicle's accidents. The propose use of Li-Fi technology comprises mainly light-emitting diode (LED) bulbs as means of connectivity by sending data through light spectrum as an optical wireless medium for signal propagation. In fact, the usage of light emitting diode (LED) eliminates the need of complex wireless networks and protocols. The design system is aim to ensure a highly-reliable communication between a commercial LED-based transaction light and a receiver mount on a vehicle.
Data duplication is technique has been widely used in a cloud to reduce storage space and upload ... more Data duplication is technique has been widely used in a cloud to reduce storage space and upload bandwidth. This technique is also used for eliminating duplicate copies of data. However, in cloud only one copy of each file is stored even if each file is owned by a huge number of users. The duplication system improves storage utilization but it reducing reliability, according to user. Furthermore, in above challenges the Data duplication is a technique has been widely used in cloud servers that are data storage makes first attempt for formalize notation of distributed reliable duplication system. We propose, new distributed duplication systems are improves security and reliability. In which the multiple cloud servers are distributed in data chunks. In Distributed storage system, the deterministic secret sharing scheme is achieved security requirements of data confidentiality and tag consistency, instead of using tag conversion and message authentication code as in duplication system. Security observations makes clear by reasoning that our de-duplication systems are get in terms of the clear outlines detailed in the made an offer safety good example. As a fact in support of idea of a quality common to a group, we give effect to the made an offer systems and put examples on view that the caused overhead is very limited in true to likeness conditions.
The interactive voice response system (IVRS) is an automated phone system and software that allow... more The interactive voice response system (IVRS) is an automated phone system and software that allows an individual to conduct transactions by phone without the assistance of a live worker. The telephone user can access the information from anywhere at any time simply by dialling a specified number and following an on-line instruction when a connection has been established. The user can get the information at anytime from anywhere by dialling the specified mobile number. The AVR system uses computer stored data. The student data is stored in computer. The parent’s mobile number is stored in the computer.
Online Social network is growing to large extent to share information between the different diver... more Online Social network is growing to large extent to share information between the different diversity people around the world. The main objective of the proposed system to identify the community in the multidimensional data such as users , Tags , stories , locations ,employment details ,photos and comments . We propose a data mining technique to detect the frequently interacting users based on the common subjects and grouping them in single community. The main incorporation of the work is to identify a seed-based community in a multi-dimensional network by evaluating the affinity between two items in the same type of entity (same dimension) or different types of entities (different dimensions) from the network. Our idea is to calculate the probabilities of visiting each item in each dimension, and compare their values to generate communities from a set of seed items and explore the feature evolution from the seed item in the same dimension or different dimension. We also propose the friend suggestion system and information suggestions system based on the data relevancy for the items in the different dimensions using seed of the data selection. In order to evaluate a high quality of generated communities by the proposed algorithm, we develop and study a local modularity measure of a community in a multi-dimensional network. Experimental results prove that proposed system outperforms the state of approach in terms of precision and recall.
In this paper we develop an Application in order to visualize the architecture of flat on develop... more In this paper we develop an Application in order to visualize the architecture of flat on development site with the concept of virtual reality. With the help of android phone and Google cardboard we are building a device for developing virtual reality. The effects will be developed in Unity 3D and also using DIVE Software Development Kit. The user of it can only visualize the places or structures those are already built and developed or at development stage. In this paper we will be developing and implementing sensor fusion algorithm for detecting orientations in three dimensions. We will be implementing A* approach for path finding and also Kalman filter is designed to compensate the sensor errors[2]. The app implemented would be suitable on android platform and Google Cardboard will also be used for displaying purpose[1].
During last few years, use of mobile phones as a official work and many organization using mobile... more During last few years, use of mobile phones as a official work and many organization using mobile device as a business communication. Location based services allow user to provide physical location provenance proof and privacy protected. Our framework maintains a privacy of data sharing and provides witness proof. It is a significant challenge to generate provenance witness and generate a proxy in one framework.so far propose system fulfill the framework requirement. We produce a novel framework for location specific secure data sharing which will provide user location proofs generation and proxy location.
A Mobile ad hoc network (MANETs) is a group of mobile nodes that communicate with node to node vi... more A Mobile ad hoc network (MANETs) is a group of mobile nodes that communicate with node to node via wireless links with no fixed infrastructure and no centralized administration. In MANETs many routing protocol works as on-demand routing protocol and these on-demand protocols have faster response time and lower overhead. In MANET there are many attacks that affect the routing and one of them is rushing attack. In this paper, we have study various prevention techniques, which are used to prevent the rushing attack. In Rushing attack, a malicious node or an attacker further the speed of routing process. Rushing attacks represent one of such possibilities. In these Rushing attacks, malicious nodes send the Route Request (RREQ) packets, asking for a route, to the destination node quicker than the legitimate nodes do.
In many applications of communication network data transfer between nodes is a common but critica... more In many applications of communication network data transfer between nodes is a common but critical operation. Some error bit and noise is added with data when the data is transfer through communication network. Error Correction Codes are used to generate the original data at the receiver side by removing error and noise. Communication performance is improved by enabling the transmitted signal to better withstand the effects of channel disabilities such as noise, interference and fading which occur during transmission as well as during comparison. In short the Error Correction is the detection of errors and reconstruction of the original, error free data. There are errors correcting codes to detect as well as correct errors. One of the main drawback of error correcting code is time of the execution which increase the delay in the communication network. In this paper error correction code is implemented with the pipelining technique to improve the execution time of the communication system.
The main objective of this concept is used to apply the gear by using automation system in automo... more The main objective of this concept is used to apply the gear by using automation system in automobile vehicles. This is the new innovative model mainly used for the vehicles to control the vehicle. Here we are concentrating to design the automatic gear changing mechanism in two wheeler vehicles by using the electronic devices. This is very useful for the gear changing mechanism in automobile vehicles. By using this we can easily control the vehicle and improve the performance of the vehicle also we can avoid the wear and tear of the gear.
One of the technical challenges in Power system deregulation is Congestion. In deregulated electr... more One of the technical challenges in Power system deregulation is Congestion. In deregulated electricity market congestion in transmission line occurs when there is inadequate amount of transmission capability to simultaneously accommodate all constraints for transmission of a line. Flexible Alternative Current Transmission System (FACTS) devices is a solution to reduce the flows in over loaded lines, resulting in an increased loadability, controlling the power flow in the network, improved stability of the network ,low system loss, and there by reduced cost of production. This paper deals with effect of different types of FACTS devices such as thyristor controlled series capacitor (TCSC) and Unified Power Flow Controller which are deal with particular 300km,3 Phase,400 V, (L-L), 50 Hz. long transmission line prototype system for improvement of the power flow at receiving end and also the voltage at the receiving will be effected by different types of nonlinearity present in power transmission which improved by FACTS devices. From result we will compare different FACTS devices by which we can conclude that UPFC will have maximum capability for power flow improvement. All simulations have been carried out in MATLAB/SIMULINK environment.
Biometric is an emerging trend of science for identifying a person based on physical and behaviou... more Biometric is an emerging trend of science for identifying a person based on physical and behavioural attributes. Large scale of biometric systems are used both in commercial and government agencies to increase the level of security. Face recognition is the powerful method of recognizing an individual. It is a computer application which compares the facial features with the database image. A unique approach is introduced for recognizing multi pose images with different conditions. The classification is performed by using Back Propagation Algorithm and Radial Basis Algorithm and Adaptive Neuro Fuzzy Inference System. The proposed method is based on extraction and Eigen face method. Experimental results are tested using FERET database and shows that the proposed method is effective for face recognition. The feature extraction using PCA is to reduce the dimensionality and to calculate the feature points. The performance evaluations between the proposed methods are analyzed. The characteristic features calculated using PCA called Eigen faces are obtained from the stored images are combined with the Back Propagation Neural Network, Radial Basis Function Network and Adaptive Neuro Fuzzy Inference System algorithms for recognition of images. For extracting the feature points from the input image, entropy and mean of each image are detected. The experimental results on performance of testing images are compared with Back Propagation, Radial Basis Function Network and Adaptive Neuro Fuzzy Inference System algorithms. Thus Face recognition can be achieved through the architectures and algorithms of artificial neural networks.
For fingerprint matching the set of minutiae was considered as the minutiae points were most dist... more For fingerprint matching the set of minutiae was considered as the minutiae points were most distinctive points to represent fingerprint. First it was believed that minutiae set is not sufficient for reconstruction of fingerprint image. But, in this paper with the help of prior knowledge termed as orientation patch dictionary and continuous phase patch dictionary it is somehow possible to reconstruct fingerprint image from their minutiae representations. The two dictionaries improves the reconstruction of fingerprint. Orientation patch dictionary helps in reconstruction of orientation field, and continuous phase patch dictionary helps in reconstructing ridge patterns.
Chromatic dispersion is very serious issue for communication engineers while designing a wave div... more Chromatic dispersion is very serious issue for communication engineers while designing a wave division multiplexing for optical communication. In the present scenario there is a increasing demand of high speed internet which require more capacity and more bandwidth. The effect of chromatic dispersion can be reduced by compensation technique. [1, 2] The chromatic dispersion also has inverse relationship with FWM. In this paper we used post dispersion compensation along with the fiber Bragg grating to reduce the effect of chromatic dispersion. Also we can compare the Bit error rate at different power levels 5 db, 10 db and 20 db while the length of fiber is fixed. After simulation it is proven that bit error rate is a function of input power level. The pulse broadening is a function of length of fiber which has been shown in this work When the BER increases quality factor decreases and overall fiber optic system degraded. In this paper we also prove that the BER is also a function of Length of Fiber. As the fiber length increases BER also increases. The whole simulationn is performed by Optisystem simulation software. Also by examine the eye diagram it is clear that link performance is improved by using dispersion compensation.
Recognizable proof of the plant ailments is the way to keeping the misfortunes in the yield and a... more Recognizable proof of the plant ailments is the way to keeping the misfortunes in the yield and amount of the agrarian item. The plant's investigations ailments mean the investigations of outwardly detectable examples seen on the plant. Wellbeing observing what's more, ailment location on plant is extremely basic for feasible farming. It is extremely hard to screen the plant illnesses physically. It requires colossal measure of work, expertise in the plant maladies, furthermore require the extreme preparing time. Consequently, picture handling is utilized for the identification of plant ailments. Malady recognition includes the progressions like picture obtaining, picture pre-handling, picture division, highlight extraction and arrangement. This paper talked about the routines utilized for the identification of plant infections utilizing their leaves pictures. This paper additionally talked about some division and highlight extraction calculation utilized as a part of the plant illness discovery.
The research work was conducted with the objective to find the various channels of e-banking in I... more The research work was conducted with the objective to find the various channels of e-banking in India available as on date and the banking channels and services that can be offered in future on smart devices. This paper is pursued by collecting information through a literature review of the websites, brochures, products and services of related banks and by observation method, examining the banking services offered by various banks. The study suggests the various channels of e-banking available in India currently and also suggests certain Banking Channels and Services that can be offered in future on smart devices.
Augmented Reality alters the way or process by which the user is able to interact with virtual ob... more Augmented Reality alters the way or process by which the user is able to interact with virtual objects. It is basically an idea of superimposing a certain virtual object, image, texture, video, etc. over an existing marker. Marker is a common point or a junction as per say for the Real world and the Virtual to meet allowing the user to then interact with the virtual object superimposed over the marker (up to some extent.). Due to this ability the concepts of virtual world and real world meet creating a vista of application was based on the internet, Intranet or on the Device of the User itself. The Computer Vision plays a vital role in Augmented Reality, because it actually lets the user device perceive the environment and allow digital manipulation and interaction.
The basic endeavor in any production process is to produce an acceptable component at the minimum... more The basic endeavor in any production process is to produce an acceptable component at the minimum possible cost. In order to achieve this objective in metal cutting or metal machining, many attempts have been made in several different ways; such as optimizing the tool life in order to minimize the production cost, maximizing the production rate to reduce the production cost, etc. but no single effort has been found fully successful because of the numbers of complexities involved in the process. For example, if cutting speed is reduced in order to enhance the tool life, the metal removal rate is also reduced and therefore, the production cost increased. A similar effect is observed if the efforts have been made to increase tool life by reducing the feed rate and depth of cut. Against this, if the effort is made to increase the production rate or to reduce the machining time by substantially increasing the cutting speed, feed and depth of cut, the tool life shortens and therefore, tooling cost increases and so the total production cost is also increased. A balance is therefore required to be stuck and a reasonable cutting speed determined, corresponding to which an economical tool life will be ensured and an economical production will result. The present study introduces one such method of improving the production rate in turning operation.
There is many reasons that can be listed for carrying out water quality monitoring. In many facto... more There is many reasons that can be listed for carrying out water quality monitoring. In many factors they will split the information obtained for one purpose may be useful for another .Quality of water can be measured in local, national as well as international level. Monitoring provides the information that permits rational decisions to be made on the following: 1) Describing water resources and identifying actual and emerging problems of water pollution. 2) Formulating plans and setting priorities for water quality management. 3) Developing and implementing water quality management programs. 4) Evaluating the effectiveness of management actions. Water quality ‖ is a concept used to show the properties of water to use of various areas. Any particular use will have certain requirements for the physical, chemical or biological properties of water. There are many examples like limits on the concentrations of toxic substances for drinking on temperature and pH range of water supporting invertebrate communities. Consequently, water parameter can be defined by variables which limit water use.
Big data may be a gather of structured, semi-structured and unstructured data sets that contain t... more Big data may be a gather of structured, semi-structured and unstructured data sets that contain the large amount of data, social media analytics, information management ability, period of time information. For giant data processing Hadoop uses map scale back paradigm. We have report the complete work of Hadoop Map reduce and its use for big data processing. Once explaining this system we will going to} explain however we tend to are exploitation HDFS to implement our system. We’ve used Apache Tika for process of resume and Hive is employed for data warehousing solution on prime of hadoop. Our systems are going to be providing steering to the tip users. A resume could be a kind of document utilized by human to indicate their educational background and skills. Resumes will be used for many reasons, but the most reason is employed to secure employment. A resume mainly contains a outline of job expertise and education. The resume could be a personal and educational data of worker, that an acceptable leader understands connected the duty seeker associated wont to screen candidates usually followed by an interview. Our project is deals with the parsing application developed for the resumes received through emails in various formats like Document, text etc.The thought provides associate outlook of a project on deploying data removal techniques within the method of resume info extraction into tiny and highly-structured data. The Resume computer program mechanically completely different data on the premise of various fields and parameters like name, mobile nos. etc. and large volume of resumes is not any problem for this technique and every one work is completed automatically without any personal or human involvement.
The design and analysis of infinite impulse response (IIR) peak and notch filter has been perform... more The design and analysis of infinite impulse response (IIR) peak and notch filter has been performed, which is employed various communication systems to eliminate unwanted narrow band interference. In communication system, radio frequency band for FM lies between 88MHZ - 108MHZ. A method for design of digital peak and notch filter of center frequency 90MHZ has been presented. Two parametric values like pass band ripple & stop band attenuation have been calculated by using mathematical modelling. Various transposed second order system (SOS) algorithm such as direct form I and II elliptic design method have been applied. By tuning quality (Q)-factor, peak filter (order 4) and notch filter (order 2) for range of Q between 2 -18 and 2 –100000 respectively have been generated with the help of different RF & AF oscillator. Filter approximation and order of the notch and peak filter determines overall performance in terms of multiplier, adder, no. of states, multi per input sample (MPIS) and add per input Sample (APIS) narrow band interference. From the realization perspective, the filter consumes more power and becomes more complex with increase in filter order. It is easy to implement in communication at transmitter or receiver point and has good communication system response. The observed settling time & fixed bandwidth gain confirms the performance of designed filter.
This paper describes a type of car’s side impact performance on the BIW. The main intensio... more This paper describes a type of car’s side impact performance on the BIW. The main intension is to co-relate the performance of the BIW frame (when vehicle undergo crash with a various angles towards rigid pole) and occupant safety after the crash. Initially, FEM model of BIW frame is created based on logical method to solve the problem. Then, analysis evaluation of the side impact safety, method of design and manufacturing processes and the results of the side impact feature will be discussed. Then, analysis of the intrusion level according to the FMVSS No.214 or EURO NCAP standards towards the occupant (boot) space and of the occupant injury levels is discussed.
There are many research papers available dealing with web services and its composition. The main ... more There are many research papers available dealing with web services and its composition. The main motive of this paper is to bring out the clear concept about the web services and its composition. This paper brings out the idea of what is mean by web services and web services and its composition views and what are all the issues found in composing a web services and what is the necessity of using it etc.., finally this paper also deals with the composition services framework and how the composition is done on web services with the help of the framework.
Diesel fuel is a complex mixture of hydrocarbons and it is well known that in extreme cold operat... more Diesel fuel is a complex mixture of hydrocarbons and it is well known that in extreme cold operating conditions some of these (paraffin) form wax crystals that will block the fuel filter and prevent engine operation. Also, due to dust and foreign particles engine may get damage. Filtration is mainly done with filter rod. If this rod is missing, then filter will not work properly and hence will result into the dysfunction. Poka-yoke is a concept in total quality management which is related to restricting errors at source itself. It deals with "fail-saving" or "mistake-proofing". A poka-yoke is any idea generation or mechanism development in a total productive management process that helps operator to avoid (yokeru) mistakes (poka). The concept was generated, and developed by Shigeo Shingo for the Toyota Production System. This paper is based on project for detection of the missing filter rod by using Poka yoke method.
Human activity recognition has received a great attention in the recent years due to its applicat... more Human activity recognition has received a great attention in the recent years due to its applications, especially in medical, security, industry fields. This paper presents a new way for detecting the human activity from the single image captured from a single camera. Different methods are there for the detection of human activity. One of them is HOG which is mostly used for human detection. In our study we found that the results of HOG feature is very fast and accurate as compared to other methods.
Cryptography is an protecting the information by transforming it into an unreadable format in whi... more Cryptography is an protecting the information by transforming it into an unreadable format in which a message can be concealed from the casual reader and only the intended recipient will be able to convert it into original text. In this research work the analysis is made between symmetric key algorithms such as AES, RC6 and Blowfish. The algorithms are compared in terms of various factors such as key length, cipher type, block size, resistance, security, possible keys, CPU time, encryption time, memory utilization and throughput. To analyze the performance of the algorithms it is required to know its strength and limitation. Consequently the assessment of different existing algorithms based on certain parameters is necessary. The parameters may include Architecture, Security, Scalability (in terms of Encryption rate, Memory Usage, Software hardware performance and computational time), Limitations, and Flexibility.
Taxi is the most popular type of on-demand transportation service system in urban areas because t... more Taxi is the most popular type of on-demand transportation service system in urban areas because taxi sharing system offer more and better services in terms of short waiting times and travel convenience. However, a shortage of taxicabs has always been rare in many urban contexts especially during rush hours and taxi has great rate to maximize its efficiency by employing shared-ride concepts. There are recent successes in real-time ridesharing projects that are expected to bring substantial benefit on energy consumption and operation efficiency, and thus it is important to develop advanced vehicle dispatch algorithms to maximize occupancies and minimize travel times in real-time. This paper investigates how taxicab services can be improved by proposing shared-taxi algorithms and what type of objective functions and parameters could be employed to prevent excessive passenger tours.
Lead (Pb) being very high poisonous heavy metal, non-biodegradable affects the food chain and are... more Lead (Pb) being very high poisonous heavy metal, non-biodegradable affects the food chain and are hazardous to all living beings. This paper investigates about the removal of lead from lead- acid battery effluent by phytoremediation technique using Eichhornia Crassipes (Water Hyacinth). Synthetic Chelator (EDTA) is induced to increase the mobility and uptake of lead by the plant from the effluent. Removal of lead from the contaminated effluent is varied by concentrations of 5 ppm, 10 ppm, 15 ppm and it is tested with the time interval of 15 days. The parameters like concentration of lead in the effluent, concentration of root and shoot uptake by the plant, degradation of lead by the plant, proline, chlorophyll, carotenoid characteristics of the plant is considered. The factors such as Bioconcentration Factor (BCF), Metal accumulation in plant and water, Enrichment Factor (EF), and Translocation Ability (TA) are calculated. The uptake of lead by the plant has been transferred from root to various other parts of the plant. Accumulation of lead in various parts of the plant, soil and water sample is analyzed by using Atomic Absorption Spectroscopy.
A vehicle suspension system is required to improve ride comfort and road handling. In current art... more A vehicle suspension system is required to improve ride comfort and road handling. In current article it is simulated and analyzed the handling and ride performance of a vehicle with passive suspension system, quarter car model with two degree of freedom. Since, the equations of the system can be solved mathematically a scheme in Matlab Simulink and also in state space has been developed that allows analyzing the behavior of the suspension. The scheme that was created in Matlab Simulink, can be introduced excitation signals, this case a step signal.
The Deep Web, i.e., content hidden behind HTML forms, has long been acknowledged as a significant... more The Deep Web, i.e., content hidden behind HTML forms, has long been acknowledged as a significant gap in search engine coverage. It represents a large portion of the structured data on the Web; accessing Deep-Web content has been a long-standing challenge for the database community. Deep web crawling is fundamental problem faced by web crawlers that has profound effect on search engine efficiency. Recent study shows that nearly 96% of data over internet is hidden i.e. not found to search engines. The challenge imposed on search engines is to retrieve hidden web data at low cost. This system uses a machine learning approach that is completely automatic, highly scalable, and very efficient, that helps to improve data retrieval at reduced cost. This system uses focused crawling strategy for retrieving accurate results related to query and selects only relevant links according to their similarity with respect to query. The algorithm used in this system efficiently selects only possible candidates rather than searching whole search space for inclusion in too ur web search index.
Internet is a changing technology and it is impossible to anticipate the changes that are occurri... more Internet is a changing technology and it is impossible to anticipate the changes that are occurring constantly. Every change leads to more dangerous threats that had not been previously imagined, reason for this condition is expeditious expansion in internet innovations. This elaboration of the cyberspace has involved with it an aggressive raise in the type and frequency of cyber-attacks. So there is a need of cyber security solutions to block these attacks. However, the generation of Big Data over computer networks is expeditiously rendering these traditional solutions are outdated. To overcome this problem, corporate researchers are now focusing on Security Analytics, i.e., the application of Big Data Analytics approach to cyber security. The security in big data analytics has the ability to congregate huge amounts of data to be analyzed visualized and drawn insights that can make it possible to predict and avoid cyber-attacks. This paper will presents a inclusive survey on the state of the art of security analytics i e its representation, the technology, the trends and its tools. It hence achieves to satisfy the reader of the forthcoming application of analytics as an unparalleled cyber security solution in the near future.
In organization large amount of data are collected daily and these data are used by the organizat... more In organization large amount of data are collected daily and these data are used by the organization for data mining tasks. These data collected may contain sensitive attribute which not disclosed by un-trusted user. Privacy is very important when release the data for sharing purpose or mining. Privacy preserving data mining allow publishing data while same time it protect the sensitive or private data. For privacy preserving there are many technique like k-anonymity, cryptography, blocking based, data Perturbation etc. In this paper, various privacy preserving approaches in data sharing and their merits and demerits are analyzed.
To design and manufacture the efficient machine capable to accurately manufacture and design the ... more To design and manufacture the efficient machine capable to accurately manufacture and design the helical spring. We all have came across in the modern age of technology spring has got primary importance right from application of retaining the motion to the storing of the energy for some positive work. The springs, which we are going to manufactured, will be in various diameters of different stiffness of closed coil type or of open coil type, either to take compressive or to take the tensile load. Similarly to store the potential energy or to retain the motion or to achieve the inertia of the object. Also it is capable to absorb the shock in case of automobile or in case of the machine tools or the luxury, amenity equipments. The machine will be operated in such a condition that the spring which it will design will have an constant parameters Accurate motion of the shaft with respect to the tool guidance or coil wire suppliance is the essential functioning of the machine. We have designed a machine which may be hand operated/motor operated depending upon the requirement.
Multilabel classification is a framework in which each input data in training data set can be rel... more Multilabel classification is a framework in which each input data in training data set can be related to more than one class labels simultaneously. The goal of multilabel classification is to produce set of labels for unseen instances by analyzing training dataset. This paper presents fundamentals of multilabel classification, some multilabel classification algorithms and evaluation metrics.
In previous research works, denoising is a great idea in the digital image processing. It support... more In previous research works, denoising is a great idea in the digital image processing. It support various types of digital images that been taken from the digital cameras and CCTV cameras using various methodology. In image denoising research works, various techniques play some important role in the geographical research and scientific research field to improve the quality of original image. Digital cameras and CCTV cameras may be noisy and blur that degrade the quality of the vision image. Due to noisy and blur images come the problem of less information of the working object. This paper describes multiple matrices to optimize the original image which are based on the denoising scheme for the better performance. These techniques will support to the satellite images, television pictures, medical images and natural digital images. These images may also suffering from imperfect old instrument, not proper sensing image of the object and some compression or natural disaster phenomena. In this research work we have compared the previous method and proposed method using mse, psnr and ssim. Our proposed methodology has been shown better result in denoisng images
As recently as year 2011, long term contracts were being finalised for tariff of INR 18 per kWh f... more As recently as year 2011, long term contracts were being finalised for tariff of INR 18 per kWh for Solar PV in India. The recent bid of INR 4.63 per kWh for NTPC 500MW tender proves how far India has travelled in Solar PV in last 4 years. ACWA POWER, a water and power developer based in the Saudi capital Riyadh, won the world’s largest ever solar tender with the cheapest ever price for a large scale solar project– a 260MWp solar PV plant at the Solar Park in Dubai, at a cost of just $US0.058/kwh .With Solar PV competing with non-renewable sources ,this paper tries to analyze the factual position on tariffs & investment in Solar PV viewed with corresponding prospects of fossil fuel industry as per recent developments reported worldwide.
This paper deals with the modelling of Cable Stayed Bridges with different shapes of pylons. The ... more This paper deals with the modelling of Cable Stayed Bridges with different shapes of pylons. The cable stayed bridge is one of the modern bridges which were built for the longer spans. There is a need of study on the effect of shape of pylon on the dynamic response of cable stayed bridge, for this, the bridge span dimension and other parameters are kept constant, and only the pylon shape is varied i.e. A type, H type, inverted Y type, Single pylon, Diamond or Pyramid shapes & Double Diamond or Spread Pylon shapes. The height of the pylon is kept constant for all the shapes for comparison purpose. The modelling of bridge is prepared on SAP 2000 software. For this, the arrangement of cable stay has been taken as semi fan type as well as fan type for the purpose of comparison. The study reveals the following points such as the spacing of cables, the inclination of pylon legs & spacing of intermediate supports which needs to be considered for the modelling of bridge.
Masonry infill (MI) panels have been used as a means to strengthening existing moment resting fra... more Masonry infill (MI) panels have been used as a means to strengthening existing moment resting frames and there is evidence that they improved the performance of structures under severe earthquake loading. In this paper dynamic analysis has been performed using Equivalent lateral force, Response spectrum for different reinforced concrete (RC) frame building models that include bare frame, infilled frame and different percentages of opening in infilled frame. The results of bare frame, infilled frame and different percentages of opening in infilled frame are discussed and conclusions are made.The opening size of the infill has a significant influence on the Modal period, displacement storey drift and maximum storey acceleration, and base shear. Generally they increase as the opening size increases. The base shear decreases as the opening size increases. In modelling the masonry infill panels the Equivalent diagonal Strut method is used and the software ETABS is used for the analysis of all the frame models.
This paper discusses about the Mode Conversion from TE11 to TM11 mode in circular waveguide using... more This paper discusses about the Mode Conversion from TE11 to TM11 mode in circular waveguide using step discontinuity is investigated. We use this method for Ku band (12GHz – 18GHz) application and our designed frequency is 15 GHz. We get the amount of power converted from TE11 to TM11 is 10 to 20 %. In this paper we have designed the light weight, compact size and high directivity Circularly Polarized waveguide with high Directivity, high Gain, low return losses and good VSWR. It is found that an abrupt change in guide radius (step) will produce a wide range of mode conversion which can be used in most dual – mode feed horn applications. The step discontinuity is found to produce relatively constant mode conversion over a wide band of frequencies. In this we have varied the length, flare angle, aperture diameter of the conical antenna These dimensions will explain the required features such as impedance matching, radiation pattern of the conical antenna. The electromagnetic accuracy of the antenna is measured with the help of High Frequency structure simulator (HFSS) Software. The measured results of the conical antenna confirmed the simulation results and satisfied the design requirement. In view of this paper, the measured results show that this antenna has gain of 10.80 to 13.20 dB, bandwidth of 300 %, return losses level of -25dB. Simulation for horn antenna has been done on Ansoft HFSSv11.
An electronic system is being developed to allow anonymous file sharing with chatting capabilitie... more An electronic system is being developed to allow anonymous file sharing with chatting capabilities using a Wi-Fi router and storage devices. The main purpose of the project is to give a cost-effective and portable system to the users. It can be used in conferences, team meetings, industrial projects and also for general communication and file sharing. The existing system provides the users with communication facilities which requires an internet connection for connecting to various users. There are many applications available today through which we can chat and share files. These existing systems commonly run on smartphones and android devices for its working. Users can send large amount of files but with limitation that only two users can connect at a given time during any transaction between them. These applications provide one-to-one communication. Keeping in mind the existing system drawbacks, Communication Box has been introduced.An electronic system is being developed that has potential of transferring large amount of files in a given environment with many users connected to it. These sharing of files and communication between the users will be anonymous. The main components of the project are Wi-Fi router and storage devices such as a pen drive and SD Card. The key principle in design is to give the users a portable, compatible and cost effective device. The system will create a local Wi-Fi network through a WiFi router which would be independent from the Internet. As soon as user connects to the Wi-Fi of the ComBox, the user will directly redirect to the landing page of the ComBox. After the redirection of landing page the user will have the access to all the files that are stored in the ComBox with the additional feature for the user to upload the files to the same. The user be anonymous to other users connected in the network in such a manner that name of the user will be unknown which can only be changed on the wish of user.
This paper represents the reconstruction of sampled signal in CS by using OMP algorithm. We have ... more This paper represents the reconstruction of sampled signal in CS by using OMP algorithm. We have used the concept of compressive sensing for sub Nyquist sampling of sparse signal. Compressive sensing reconstruction methods have complex algorithms of l1 optimisation to reconstruct a signal sampled at sub nyquist rate. But out of those algorithm OMP algorithm is fast and computationally efficient. To prove the concept of CS implementation, we have simulated OMP algorithm for recovery of sparse signal of length 256 with sparsity 8.
A selective forwarding attack is one of the most crucial security problems in MANET. Usually such... more A selective forwarding attack is one of the most crucial security problems in MANET. Usually such attacker degrades the network performance in terms of packet loss rate, collision, and overhead. Designing MANET that can work reliably even in the presence of inside packet drop attackers is really challenging. In ant based defense mechanism we have implemented S-ACK scheme to transmit the secure acknowledgement. To detect attackers, a trust model is designed. The Forward ant agents transmit back the digitally signed SACK through the Backward Ant agent to detect any selective forwarding attack against any source node. Cluster distributes traffic among diverse multiple paths to avoid congestion, which optimizes bandwidth using and improves the sharing rate of channel. It uses clustering’s hierarchical structure diverse to decrease routing control overhead and improve the networks scalability. By implementing the algorithm on the OPNET environment, the result shows that this algorithm balances the load of the network and deals with the change effectively of the network topology, and also improves the reliability, throughput and stability of the network efficiently.
Due to the high density of the chip, the power dissipation increases. So we are in the need of th... more Due to the high density of the chip, the power dissipation increases. So we are in the need of the best power optimization techniques. Reversible logic is the one which is used to optimize the power getting wasted. Reversible logic finds its applications in the field of low power CMOS designs, quantum computing, nanotechnology and optical computing. There are number of circuits designed by Reversible logic and possess their own importance in the digital world In this paper we have proposed a new reversible T-Flip flop using a newly proposed RHR(Raju Hazar Rahul) Gate. It is also shown that the proposed one is better than the existing one. Using the proposed design we also have implemented the counters which owns many advantages compared to the existing one.
A plant-based diet protects against chronic oxidative stress-related diseases. Dietary plants con... more A plant-based diet protects against chronic oxidative stress-related diseases. Dietary plants contain variable chemical families and amounts of antioxidants. Highly reactive free radicals can cause tissue damage. The extent of tissue damage is the result of the balance between the free radicals generated and the antioxidant protective defense system. The free radical scavenging and hence the antioxidant activity of different extracts of S. torvum fruit was studied against DPPH and nitric oxide free radicals using ascorbic acid as standard equivalent. Percentage of inhibition was found to increase in a dose dependant manner. Aqueous extracts were found to be more effective antioxidant followed by methanol, ethanol, ethyl acetate, diethyl ether and hexane respectively in both DPPH and NO scavenging methods. A concentration of 400 µg/ml of the aqueous extract was found to have an activity equal to ascorbic acid, a potent antioxidant. This study indicate that S. torvum fruit is an excellent source of natural antioxidant and could be an effective nutritional food supplement, which inturn will have therapeutic applications.
The main aims of this paper is hydrodynamic analysis of Intze water tank and comparison of the co... more The main aims of this paper is hydrodynamic analysis of Intze water tank and comparison of the cost of water tank for different staging conditions like shaft and frame type. For this the container of the water tank has designed by prepared Excel worksheet. The hydrodynamic analysis is carried out in excel worksheet. The staging part is analyze in software STAAD Pro. V8i and the design has been done in excel worksheet. The configuration of container was taken same for different staging in same capacity. For frame type supporting system the horizontal parallel type bracing was considered at various levels. Here various parameters change is tank capacity, number of column, height of staging, spacing of bracing, earthquake zone and soil type. After the complete design the quantity of material has been founded and then the costing of water tank is done using GWSSB- SOR (2013-14).
Due to rapid growth of population, rapidly increasing in industries which directly increases wast... more Due to rapid growth of population, rapidly increasing in industries which directly increases waste without any management. In this world where some countries are developed and some are developing, the unbelievable demand of steel is on its peak, but it leads toward a dumping ground of industrial waste. For reduction of this dumping of scrap and save the earth from this hazardous problem utilization of steel scrap in concrete is the key step for save the environment and achieving sustainability that will enable the earth to continue to support human life. This paper presents a research to utilization of waste (CNC lathe waste) by partial replacement (5% by weight of natural coarse aggregate) with coarse aggregate. Also for the increment in strength of concrete, wire mesh is used while casting in the form of 10mm3 cubes.
Social network is one of the admired communication medium and serves as the platform for tracking... more Social network is one of the admired communication medium and serves as the platform for tracking and analyzing public sentiment of various people on different domains or products. With the explosive growth of user generated messages, Twitter and Facebook has become a social site where millions of users can exchange their opinion. Sentiment analysis affords as an economical and effective way to expose public opinion timely, which is critical for decision making in various domains. Similarly, due to the large volume of opinions, rich web resources such as discussion forum, review sites, blogs and news etc are available in digital form; much of the current research is focusing on the area of sentiment analysis. The information is very useful for businesses for marketing, governments and individuals. While this content meant to be helpful, analyzing the bulk of user generated content is difficult and time consuming. In the existing system there is no way of analysis and ranking the user opinions and sometimes they consider the individual opinions without conducting any reviews. But in proposed there is a need to develop an intelligent system which automatically extract such huge content and classify them into positive, negative and neutral type using Artificial Neural Networks based on the specified criteria.
In most automotive companies they maintain the stock details in Excel sheet, that’s not se... more In most automotive companies they maintain the stock details in Excel sheet, that’s not secure for all transactions. Here the E-excel bills of materials are computerized and an easy viewing and tracking of all bill details are done. The bills here contain both the material needed and the primary design of BIW (Body in white) for reference, if any material is to be added or removed from bill or in case of any change in design the bill is updated (i.e) revised. Since bill contain the primary design and the material used which might be needed by other company to produce a better product or to attract customer to produce the same product with some change in design for low cost. This leads to concern in security so a new technique for securing bill of material is introduced in proposed system to provide higher security from hacker like third party hacker, employee leak data to another company. This primarily concerns when unauthorized remote computer break-ins through communication networks such as the Internet, but also includes those who debug or fix security problems, and the morally ambiguous. A secured environment for billing of material is provided using data leakage detection, IDS, IP synchronization. The system is tested for its effectives, flexibility, accuracy and user friendly. The proposed system is found to be delightfully running under the web application system.
Now a day’s mobile air-conditioning system health check at workstation / service station i... more Now a day’s mobile air-conditioning system health check at workstation / service station is done by, the feel of air flow by hands, and measures air vent temperature by thermometer. This procedure is not accurate enough to conclude whether the AC system performance is up to the mark or not. If problem persists then we instrument the vehicle with thermocouples, pressure gauges and capture the data it asks for using different equipment’s like data logger, data processor, which is time and money consuming.Hence, there is scope to improve the diagnostic method and establish standard procedure to minimize the time required for mobile AC system troubleshooting. Major issues faced in mobile AC system are as follows- – No refrigerant – Insufficient refrigerant – Excess refrigerant – Air entered in refrigerant circuit – Inadequate heat rejection / poor cooling. – Blower not functioning – AC compressor pumping failure – Restriction in refrigerant high pressure line – Excess opening of expansion valve – Blockage in expansion valve This paper documents method to diagnose mobile AC system by monitoring refrigerant circuit pressures and AC vent temperatures. Also it documents different remedies to rectify / troubleshoot the issue in minimum time.
This paper presents the failure analysis of a suspension system. As a case study a suspension sys... more This paper presents the failure analysis of a suspension system. As a case study a suspension system has been taken as a case study. An actual suspension system of TATA INDICA car has been selected. A premature failed system of passenger car is analyzed mathematically and metallurgical. Force and deflection analysis has been performed. At the same time metallurgical analysis has been done on the basis of microstructure of suspension system. Using High resolution SCM pictures for spring has been captured and analyzed. It has been observed that the system failed because of Poor surface finish, poor operating condition and excessive loading.
The present study has been taken up for evaluating the different grades of concrete. Emphasis has... more The present study has been taken up for evaluating the different grades of concrete. Emphasis has been given to the compressive strength, flexural strength, split test and workability properties of glass fiber concrete beams. This paper presents the results of an experimental investigation carried out on ten re concrete beams, 150 mm 150 mm 700mm in size. The beams were tested under two point loading. 90 cubes 150 mm 150 mm and 10 cylinder of 150 mm dia &300 mm length with different dosages of glass fiber (0%, 0.5%, 1.0%, 1.5%&2.0%) The study parameters include first crack load and ultimate load. And load was at 5.2 KN/s in 2000 KN compressive testing machine.
Existing studies in data mining focus on Outlier detection on data with single clustering algorit... more Existing studies in data mining focus on Outlier detection on data with single clustering algorithm mostly. There are lots of Clustering methods available in data mining. The values or objects that are similar to each other are organized in group it’s called cluster and the values or objects that do not comply with the model or general behavior of the data these data objects called outliers. Outliers detect by clustering. Many Algorithms have been developed for clustering. Where partitional and Hierarchical Clustering is the two well known methods for clustering. In comparison of Hierarchical and Partitional Clustering Majority of the Hierarchical algorithms are very computationally, complex and consume high memory space. Whereas majority of Partitional clustering algorithm have required a linear time with better effectiveness. The clustering quality is not as Better as that a Hierarchical clustering algorithm. Hierarchical and Partitional Clustering algorithm have advantage over each other so in our proposed algorithm we integrate the Partitional Algorithm K-Modes because of Categorial Dataset and Hierarchical Clustering Algorithm CURE because of Large dataset, robust to outliers and identified cluster having non-spherical shape. And we plan to implement that algorithm in MapReduce Framework so the execution time of the algorithm is improve.
In mobile cloud computing (MCC), mobile devices can be rely on cloud computing and resources are ... more In mobile cloud computing (MCC), mobile devices can be rely on cloud computing and resources are stored to perform computationally various operations such as searching, mining and accessing the files in secure manner. During the file access in secure network, there are no efficient cryptographic algorithms. For secure the files in cloud, various cryptographic approaches are used but most of them increase the computational cost of file storage. Thus a new technique is required to develop which efficiently used for data storage and data access. Therefore the presented work is intended to find an approach by which the security in file hosting and management can play an important role. Therefore, we give techniques and algorithms for secured access in mobile cloud environment. So we can provide three tier architecture that includes MD5 (Message Digest) algorithm, Advance encryption standard algorithm and Elliptic curve cryptography algorithm. These algorithms can be implementing in real time mobile cloud environment and an experimental result proves with minimal performance degradation.
Brain activity is an essential key to understanding the psycho physiological states of humans. Co... more Brain activity is an essential key to understanding the psycho physiological states of humans. Conventional wet electrodes are commonly used to measure EEG signals; they provide excellent EEG signals subject to proper skin preparation and conductive gel application. However, a series of skin preparation procedures for applying the wet electrodes is always required and usually creates trouble for users. Using non-invasive electroencephalograms (EEG) with capacitive electrodes, brain states can be measured and analyzed without complex medical procedures. This paper reviewed about capacitive electrodes which used for neural monitoring.
A real time indoor environmental air pollution measuring system which is cost efficient is sole a... more A real time indoor environmental air pollution measuring system which is cost efficient is sole aim of this paper presentation. Real time indoor air pollution measuring system measures the concentration of various gases in air at the particular time. Some of the indoor air pollutant is CO, CO2, NO2, Formaldehyde, O3 etc. Constant exposure to this pollutant over a long period causes harmful effect on human health. Effect of poor indoor air-quality on human-health is cough, lung disorder, liver and kidney disorder. Some pollutant like Asbestos, Radon can even cause cancer. Proposed measuring system contains a series of sensors, open source hardware Arduino board, a wireless sensor network based on ZigBee. The performance of system is checked in real-field.
Web applications are the main source of information exchange of businesses over the globe. The ma... more Web applications are the main source of information exchange of businesses over the globe. The main problem over the globe about the web applications is the service of the particular server. As a server has its own capacity to handle some amount of particular clients, there is always a possibility the number of Clients may get increased, at this time most of servers are unable to respond. This paper gives a purposed solution for Servers to handle more clients even when its capacity exceeds without scaling it horizontally that is (without increasing hardware). Management of clients requests on a web Server is managed In order to increase the capacity on a server and hence it gets capable to handle more clients. Architecture for scaling web servers is uses application level scaling which makes it flexible to be applied on any other servers.
The timing elements and clock interconnection Networks such as flip-flops and latches, is One of ... more The timing elements and clock interconnection Networks such as flip-flops and latches, is One of the most power consuming components in modern very large Scale integration (VLSI) system. The area, power and transistor count will compared and designed using several latches and flip flop stages. Flip Flop is a circuit which is used to store state information. Power consumption is one of the main objectives in designing a flip flop. The flip flops used in designing are Hybrid Latch Flip Flop (HLFF), explicit- pulsed data-close-to-output flip-flop (ep-DCO) and Adaptive-Coupling Redundant Flip-Flop (ACFF). Compare pulse triggered latches based on transistor count, power and layout area. Constructing shift registers by using conditional capture pulsed latches instead of normal flipflops, because a pulsed latch is much smaller than a flip-flop. All the latches and flip flop designs are made by using 90nm technology in DSCH2 schematic tool and MICROWIND design tool.
The current trends in CI engine are to use Water-diesel emulsion as alternative fuel. It can be e... more The current trends in CI engine are to use Water-diesel emulsion as alternative fuel. It can be employed directly to the existing CI Engine system with no additional modifications. This system helps in reduction of NOx as well as PM, which in turn improve the combustion efficiency of the engine. However there are still investigations have to be done. The current work mainly concentrated on diesel engine run on water-diesel emulsions and its effect on engine performance and emissions were studied. The various loads were applied on a constant speed diesel engine run on water-diesel emulsions of varying ratios of 0.2:1, 0.3:1. 0.4:1 and 0.5:1. Emission and performance characteristics were measured and were compared with base diesel operation. The emissions like NOx and smoke density were found to decrease greatly and brake thermal efficiency was found to increase at high loads. Smoke level was 4.2 BSU and 3 BSU for base diesel and water diesel emulsion of 0.4. The ignition delay was found to increase with water diesel emulsions. This also increased the maximum rate of pressure rise and peak pressure. The engine was found to run rough with water-diesel emulsions. The optimal water-diesel ratio was found to be 0.4:1 by weight. HC and CO emissions were found to increase with water diesel emulsions.
As the military operations concerned surveillance, law enforcement and search and rescue operatio... more As the military operations concerned surveillance, law enforcement and search and rescue operations are very critical. In past aircraft and helicopter were used for this types of operations. However recently unmanned flying objects (UFOs) are becoming more popular and an excellent resource for surveillance missions. This project is to create an UFO that is light weight, inexpensive and easy to manufacture. The drone is designed as quad copter that includes two cameras and a detector with a wireless transmission system that provide live feed from cameras and detector to ground stations. It will be used in the applications areas like military applications, weather monitoring and many other detection based applications. The idea will be implemented through simulation and testing.
In this paper it is discuss about AODV protocol and security attacks and man in the middle attack... more In this paper it is discuss about AODV protocol and security attacks and man in the middle attack in detail. AODV Protocol is use to find route and very important protocol for communication in wireless network. So AODV protocol should be Secured and it is a big challenge. There are various attacks that occur on it. Here in this paper it discussed about the detection and preventions of man-in-the-middle attack in detail.
Pressure is an important physical parameter to be controlled in process boiler, heat exchanger, n... more Pressure is an important physical parameter to be controlled in process boiler, heat exchanger, nuclear reactor and steam carrying pipeline. In the article the issue has been face in boiler operation due to pressure is handled. In boiler, the problem is due to maximum and minimum range of pressure. Due to the issues there is a chance to causes the hazop. To avoid such the problem the high and low pressure in boiler has to control. In the paper such the problem has sorted out by implementing ON-OFF control. Here the proposed control action for pressure control is implemented with the help of LabVIEW (Laboratory Virtual Instrument Engineering Workbench) software and NI ELVIS hardware. In the idea the boiler’s low range and high is monitored and controlled valve desirably. And also the high range and low range of pressure in the boiler is signified to plant operator by alarm signal.
In this modern era, Orthogonal Frequency Division Multiplexing (OFDM) has been proved to be an ex... more In this modern era, Orthogonal Frequency Division Multiplexing (OFDM) has been proved to be an explicit promising technique for wired and wireless systems because of its several advantages like high spectral efficiency, robustness against frequency selective fading, relatively simple receiver implementation etc. Besides having a number of advantages OFDM suffers from few disadvantages like high Peak to Average Power Ratio (PAPR), Intercarrier Interference (ICI), Intersymbol Interference (ISI) etc. These detrimental effects, if not compensated properly and timely, can result in system performance degradation. This paper mainly concentrates on reduction of PAPR.A comparisons have been made between various precoding techniques against conventional OFDM.
Turning metal removal is the removal of metal outside diameter of a rotating cylindrical workpiec... more Turning metal removal is the removal of metal outside diameter of a rotating cylindrical workpiece. As it is used to reduce the diameter. of the work piece generally to a specified dimension and to produce a smooth finish on the metal. Often, the work piece is turned so that the sections have different diameters. As is the machining operation that produces cylindrical. In its basic form, it can be defined as an outer surface machining: Based on the findings of the Pilot study, actual experimentation work will be designed and input machining parameters and their values finalized. The results are expected to show that the response variables (output parameters) strongly influenced by the control factors (input parameters). So, the results which are obtained after experimentation analyzed and modeled for their application in manufacturing industry It is concluded that for MRR be maximum factor Cutting speed has to be at high level 3, Feed has to be at high level & D.O.C has to be at high level.
Today’s life is totally based on Internet. Now a days people cannot imagine life without I... more Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Generally user authentication is done using username and password that is called as login process... more Generally user authentication is done using username and password that is called as login process. This login process is not more secure because, however a login session is still unprotected to impersonator when the user leaves his computer without logging off. Keystroke dynamics methods can be made useful to verify a user by extracting some typing features then, after the authentication process has successfully ended. From the last decade several studies proposed the use of keystroke dynamics as a behavioral biometric tool to verify users. We propose a new method, for representing the keystroke patterns by joining similar pairs of consecutive keystrokes. The above proposed method is used to consider clustering the di-graphs which are based on their temporal features. In this project, authentication system is provide to project management system that make more Secure management system without acknowledging unauthorized user. The Project Management System addresses the management of software projects. It provides the framework for organizing and managing resources in such a way that these resources deliver all the work required to complete a software project within defined scope, time and cost constraints. The system applies only to the management of software projects and is a tool that facilitates decision making.
In Today’s world, the social media has given web users a place for expressing and sharing ... more In Today’s world, the social media has given web users a place for expressing and sharing their thoughts and opinions on different topics or events. For this purpose, the opinion mining has gained the importance. Sentiment classification and Opinion Mining is the study of people’s opinion, emotions, attitude towards the product, services, etc. Sentiment Analysis and Opinion Mining are the two interchangeable terms. There are various approaches and techniques exist for Sentiment Analysis like Naïve Bayes, Decision Trees, Support Vector Machines, Random Forests, Maximum Entropy, etc. Opinion mining is a useful and beneficial way to scientific surveys, political polls, market research and business intelligence, etc. This paper presents a literature review of various techniques used for opinion mining and sentiment analysis.
Artificial intelligence techniques are day by day getting involvement in all the classification a... more Artificial intelligence techniques are day by day getting involvement in all the classification and prediction based process like environmental monitoring, stock exchange conditions, biomedical diagnosis, software engineering etc. However still there are yet to be simplify the challenges of selecting training criteria for design of artificial intelligence models used for prediction of results. This work focus on the defect prediction mechanism development using software metric data of KC1.We have taken subtractive clustering approach for generation of fuzzy inference system (FIS).The FIS rules are generated at different radius of influence of input attribute vectors and the developed rules are further modified by ANFIS technique to obtain the prediction of number of defects in software project using fuzzy logic system.
In this experimental work ninety nine cubes has been prepared having dimension 70.7x70.7x70.7 mm ... more In this experimental work ninety nine cubes has been prepared having dimension 70.7x70.7x70.7 mm are cast as per IS:4031 (2000). In this experimental investigation cement mortar mix 1:3 by volume were selected for 0%, 20%, 40%, 60%, 80% and 100% partially replacement of natural sand (NS) by Granulated blast furnace slag (GBFS) and quarry dust (QD) [3 cubes on each parameter respectively] for W/C ratio of 0.55 respectively. All the cubes were tested under compressive testing machine. To compare the average compressive strength of natural sand (NS) with granulated blast furnace slag (GBFS) and quarry dust (QD).
Customers satisfaction is the most important criteria before buying any product. Technology today... more Customers satisfaction is the most important criteria before buying any product. Technology today has grown to such an extent that every smallest possible query is found on internet. An individual can express his reviews towards a product through Internet. This allows others to have a brief idea about the product before buying one for them. In this paper, we take into account all the challenges and limitations encountered while reading the online reviews and time being consumed in understanding quality of the product from the reviews. We include several methods and algorithms that help the consumer to understand the Quality of the product in better way.
Artificial Neural Networks is the new technology. It is the branch of Artificial Intelligence and... more Artificial Neural Networks is the new technology. It is the branch of Artificial Intelligence and also it is an accepted new technology. Now a days Neural Networks Plays a Vital role in Medicine, Particularly in some fields such as cardiology, oncology etc. And also it has many applications in many areas like Science and Technology, Education, Business, Business and Manufacturing, etc. Neural Networks is most useful for making the decision more Effective. In this Paper, by the use of Neural Networks how the severe disease Lungs Cancer has been diagnosed more effectively. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. The Neural Networks has been successfully applied in Carcinogenesis. The main aim of this research is by the use of Neural Networks the Carcinogenesis can be diagnosed more cost-effective, easy to use techniques and methods. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. Sputum Cytology is used to detect the Lungs Cancer in Early stages.
Data mining is a technology used in different disciplines to search for significant relationships... more Data mining is a technology used in different disciplines to search for significant relationships among variables in n number of data sets. Data mining is frequently used in all types’ areas as well as applications. In this paper the application of data mining is attached with the field of education. The relationship between student’s university entrance examination results and their success was studied using cluster analysis and k-means algorithm techniques.
The matrix game theory gives a mathematical background for dealing with competitive or antagonist... more The matrix game theory gives a mathematical background for dealing with competitive or antagonistic situations arise in many parts of real life. Matrix games have been extensively studied and successfully applied to many fields such as economics, business, management and e-commerce as well as advertising. This paper deals with two-person matrix games whose elements of pay-off matrix are fuzzy numbers. Then the corresponding matrix game has been converted into crisp game using defuzzification techniques. The value of the matrix game for each player is obtained by solving corresponding crisp game problems using the existing method. Finally, to illustrate the proposed methodology, a practical and realistic numerical example has been applied for different defuzzification methods and the obtained results have been compared
In case of friction stir welding, the maximum temperature along the weld line within appropriate ... more In case of friction stir welding, the maximum temperature along the weld line within appropriate range at tool workpiece interface is responsible for quality of welded joint. Through this paper, an attempt is made to establish a relationship between the input process parameters and the maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075. The design of pre-experimental simulation has been performed in accordance with full factorial technique. The simulation of friction stir welding has been performed by varying input parameters, tool rotational speed and welding speed. The analysis of variance (ANOVA) is used to investigate the effect of input parameters on maximum temperature during friction stir welding. A correlation was established between input parameters and maximum temperature by multiple regression lines. This study indicates that the tool rotational speed is the main input parameter that has high statistical influence on maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075.
Big data is a popular term used to define the exponential evolution and availability of data, inc... more Big data is a popular term used to define the exponential evolution and availability of data, includes both structured and unstructured data. The volatile progression of demands on big data processing imposes heavy burden on computation, communication and storage in geographically distributed data centers. Hence it is necessary to minimize the cost of big data processing, which also includes fault tolerance cost. Big Data processing involves two types of faults: node failure and data loss. Both the faults can be recovered using heartbeat messages. Here heartbeat messages acts as an acknowledgement messages between two servers. This paper depicts about the study of node failure and recovery, data replication and heartbeat messages.
The intent of this paper is to study the various forces and stress acting on a rotor shaft of a s... more The intent of this paper is to study the various forces and stress acting on a rotor shaft of a standard rotavator which is subjected to transient loading. The standard models of rotavator, having a progressive cutting sequence was considered for the study and analysis. The study was extended to various available models having different cutting blade arrangement. The study was carried on different papers and identifies the various forces acting on a Rotor shaft of a rotavator. The positions of the torque and forces applied are varied according to the model considered. The response was obtained by considering the angle of twist and equivalent stress on the rotor shaft. This paper presented a methodology for conducting transient analysis of rotor shaft of a rotavator,
Balloon forming is the fundamental processes by which the stents are manufactured that are utiliz... more Balloon forming is the fundamental processes by which the stents are manufactured that are utilized for angioplasty to cure critical heart diseases. Careful selection of various parameters such as pressure, temperature, along with the time duration, etc. affects the balloon quality and plays vital role in effectiveness of critical care of the patient. The proposed system converts the microprocessor controlled balloon forming unit to GUI based computer controlled balloon forming unit. Keeping most of the important variables of the balloon forming process same, and hence utilizing the same transducers, some new sensors are also introduced to avail more information on the operator station. The proposed system is comparatively not only more user-friendly and accurate, it also results into easy to expand and modify type simple but reliable as well as cost-effective solution.
Technology has elevated to grab an important position in humans life, the best example is smartph... more Technology has elevated to grab an important position in humans life, the best example is smartphones. They offer access to network as well as online banking transactions, where simplification of human labour affects security and user authentication, and passwords are first line of defense, it’s crucial to pick a strong password. Online banking applications currently use alphanumerical usernames and passwords for authentication, which are exposed to eves dropping, attacks, and shoulder surfing. Users often choose either easy to remember passwords, which can be easily guessed or difficult ones, which tend to be forgotten. The paper revolves around the views, limitation of current system and offers a dynamic biometrics, as it can be easily integrated into the existing computer security systems with minimal alteration and user intervention. The main objective is to secure using cued click point (CCP), which is one click based graphical password scheme for sequence of images and measuring, assessing humans typing rhythm, it’s based upon the human tendency to memorize graphical passwords more comfortably.
Uploads
Volume 3 Issue 8 by IJSRD Journal