1 |
|
|
1-5 |
|
NOVEL DATAMINING TECHNIQUE FOR ONLINE SHOPPING
Abstract
Opinion mining is a type of NLP for tracking the mood of the public about a particular product. Here we have used computer products for the process. Admin clusters the user’s opinion and their correlated (positive or negative) opinion of the products. The opinion will be predicted based on the users’ feedback. Advanced Products Review system that detects hidden sentiments in feedback of the customer and rates the products accordingly. Opinion Mining for Products Reviews is a web application which gives review of the feedback that is posted. The System takes feedback of various users, based on the opinion, system will specify whether the posted products are good, bad, or worst. We use a mysql DB of sentiment based keywords along with positivity or negativity weight in database and then based on these sentiment keywords mined in user feedback is ranked. Once the user login to the system he views the products and gives feedback about the restaurant. The role of the admin is to post new products and adds keywords in database. This application also works as an advertisement which makes many people aware about the products quality. When the user clicks on a particular restaurant, user can view the products and give comment about the restaurant. This system helps to find out good products.
2 |
|
|
6-10 |
|
REVIEW ON CONSTRUCTION OF PARITY CHECK MATRIX FOR LDPC CODE
Abstract
— LDPC codes have become the most popular error control code in various fields like telecommunication, magnetic recording, optical communication etc. due to their high error correcting capability. This paper outlines a work on a design of parity check matrix for regular LDPC codes. In this paper we represents an algebraic method to construct parity check matrix for decoding of LDPC code by using weight of row and weight column of matrix.
In this paper we have done encoding of LDPC code and representation of parity check matrix by using tanner graph [8]. The construction of LDPC code determines how good the decoding performance and hardware implementation will be.
This algebraic method is used in decoding of LDPC code which will be use in sum product algorithm operating on Tanner Graph of LDPC code. The structure of Tanner graph improves the performance in the decoding of LDPC code.
3 |
|
|
11-23 |
|
Snow Avalanche: Study and Detection using Remote Sensing Techniques
Abstract
Snow avalanche is one of the most life-claiming calamities in the world. In avalanche-prone regions, it is necessary to alert the population about such events beforehand to abate the effects. Hence it is important to build a snow avalanche detection system which will also detect landslides. To understand how an avalanche is started, snow physics needs to be understood which describes us about types of snow avalanche. If the snow is loose then possibility of snow-slide is more which depends on some of the parameters such as depth and character of old and new snow, moisture content, precipitation intensity and some environmental factors such as wind action and temperature, as described in this paper. It also lists some of the state-of-the-art instruments used in avalanche detection and some employing acoustic nature of avalanche. Wireless sensor nodes can be used as they are low power devices and can be adapted to suit the intended application. Finally, we brief about implementation using ZigBee and tabulate some of the popular wireless sensor nodes and their features which can be used for the same.
4 |
|
|
24-26 |
|
Android based SQL Learning Application
Abstract
In today's world you just can't escape the database. A database is a collection of information that is organized so that it can easily be accessed, managed, and updated. Right now there are literally over a million databases at work storing all sorts of information from government files to company employee records to consumer shopping habits. Therefore it is very important to learn database related SQL queries to perform basic operations like insert, update, delete, etc. In this application user will learn the basics of structured data modelling, gaining practical SQL coding experience, and develop an in-depth understanding of data manipulation. The user will be able to write SQL query in app itself and will get the desired results making his concept clearer. This app will consists of 2 stages Learning and Performing. In learning stage the user can learn all commands of SQL query language. In Performing the user can perform what he had learned. User can also give the test in order to evaluate himself, what topics he need to focus depending on test results. The forum section will consist of questions posted by user and other user can reply on that. To generate revenue ads will be displayed on the current Activity.
5 |
|
|
27-31 |
|
A Survey on Remote Data Integrity Checking in PCS with ID-Based Proxy minded Record Uploading
Abstract
An increasing the number of clients would like to store their records to public cloud servers (PCSs). At the side of the rapid development of cloud computing a new protection issues have to be solved a good way to help more customers to process their information in public cloud. When the client is restrained to get entry to PCS he will delegate its proxy to handle his information and add them. However, remote data integrity checking is additionally an crucial security problem in public cloud garage. It makes the clients test whether their outsourced information are kept intact without downloading the entire statistics. From the security issues, we recommend a singular proxy-oriented data uploading and remote data integrity checking version in identity-primarily based public key cryptography: identity-primarily based proxy-oriented record uploading and remote data integrity checking in public cloud (identity-PUIC). We provide the formal definition, machine model, and safety version. Then, a concrete identity-PUIC protocol is designed using the bilinear pairings. Our identity-PUIC protocol is likewise green and bendy. Based on the original patron’s authorization, the proposed identity-PUIC protocol can understand non-public remote integrity checking, delegated remote integrity checking, and public remote records integrity checking.
Keywords—cloud computing, Proxy Public Key cryptography, Public cloud servers, identity based Cryptography, Remote data integrity checking.
6 |
|
|
32-38 |
|
Substation Automation System for Energy Monitoring and Control Using SCADA
Abstract
Automation can easily increase the efficiency of the Industries the main aim of our concept is to monitor and control the Industrial substation by using SCADA. The power grid was previously monitored by Manual modes and now it can be monitor by using Internet. Main functions of substation automation include accurate fault location to prevent false tripping and to minimize the area affected by the fault. We can access data securely from any part of the world by point to point communication using internet. Substation automation increase reliability and performance of electrical protection, advanced disturbance and event recording capabilities is possible. The changes in load and stability affects the operation of a power system. The increase in power conception lead to the construction of many substations. This lead to the automation of substation for reducing the complexity of power transmission. Our proposed
7 |
|
|
39-45 |
|
Helical Modification and Analysis of Straight Spur Gear
Abstract
It is difficult to solve the issue of uneven load distribution and improve the bearing capacity and reliability for straight spur gear pairs with small load and large axial deviation. Thus, some experts put forward the method of helical modification, but few people conducted simulation analyses to apply and verify the method. Therefore, based on the finite element analysis technology, helical modification is applied and the modification effect is evaluated. In addition, conducting comparative analysis and contact fatigue analysis for a pair of gears, it is verified that helical modification can solve the issue of uneven load distribution and improve the reliability of gear pair.
8 |
|
|
46-48 |
|
A Game Theoretic Approach To Overcome Jamming In Wireless Network
Abstract
The main aim of our paper is to enable communication between the sender and receiver even in the presence of jammer or a malicious node placed between them in the network. Malicious node is one such node that emits high bandwidth signal and high power signals in order to block low power communication signal. Jammers will block particular frequency spectrum used for communication. Since jammer is capable of blocking communication signals we communicate data in the form of time intervals which cannot be blocked. We also analyze the strength and weakness of the jammer. In this paper we are using two equilibria technique which is Nash Equilibria(NEs) and Stackelberg Equilibria(SEs).
9 |
|
|
49-53 |
|
Increasing Efficiency of IC Engine by Electrolysis process
Abstract
Commonly used fuels such as petrol and diesel have definite energy values and the extent of energy retrieval is limited due to the operating principle of the IC engine. Water upon electrolysis dissociates into hydrogen and oxygen, both the gases together in a common duct called as oxyhydrogen(HHO) is used to increase the overall energy content of the primary fuel with a proportionate increase in efficiency. Now a days we are facing a lot of problems with respect to fuel demand. A common problem is how to increase engine efficiency and how to manage the fuel economy. So in this project we are going to find a way to increase the efficiency of internal combustion engine by the use of electrolysis process.
10 |
|
|
54-64 |
|
Prediction of Cost of Quality Using Artificial Neural Network in Construction Projects
Abstract
Quality is the fitness for use, conformance to requirements, predictable degree of uniformity and dependability, at low cost and suited to market. Cost of quality is an essential element of the total cost of any construction project. The main objective of this paper is to develop a neural network model that will enable the construction firms to access cost of quality for any future building project. The different sequences of the model development will be investigated. Moreover, the validity of the proposed model will be evaluated using case study applications. The main 29 factors affecting the expected cost of quality were identified. A questionnaire survey was carried out which was conducted among 60 expert in the construction domain to determine the importance of these twenty nine factors. By using Microsoft Excel, relative importance index of the factors are obtained and the factors with important index more than 70% was selected for a second stage questionnaire survey. Second stage questionnaire survey was conducted among construction experts from different construction industries and the result obtained was used as the input parameters of the proposed cost of quality model.
11 |
|
|
65-72 |
|
Critical Factors Influencing Quality Performance in Construction Projects
Abstract
Quality is one of the important aspects of all projects. Quality in construction cannot exist without a project and a construction project cannot exist without quality. The quality of a product or service can be its ability to ensure complete customer satisfaction and will depend upon the use of product. The main objective of this paper is to identify the critical factors affecting quality performance in construction projects and to suggest ways to improve the quality performance of construction projects. A preliminary survey identified 75 attributes responsible to impact quality performance of the projects. Statistical analysis of questionnaire responses on the attributes resulted into two distinct sets of success and failure attributes. Using factor analysis in SPSS found critical success and failure factors affecting quality performance of construction projects.
12 |
|
|
73-76 |
|
DIFFERENT TECHNIQUES TO REDUCE ROUTING OVERHEAD IN MANET
Abstract
In MANET frequent path change, and dynamic nature of nodes cause linkage crash ups which results into route findings. This paper includes some techniques to reduce overhead of links of MANET like Neighbor Coverage-Based Probabilistic Rebroadcast Protocol (NCPR), which works on the technique of rebroadcasting of Request packet(RREQ) without creating storm problem. Fellowship Model which works on Rate limitation component, Enforcement component and Restoration component. Neighborhood discovery protocol works on control message which removes unnecessary bytes and redundancy in message. Cut Based On Demand Routing with Coordinate Awareness (CBORCA) works on Coordinate system with a method to reduce routing overhead by using concept of PIVOT in quadrants
13 |
|
|
77-81 |
|
PREDICTION OF PRETERM BIRTH USING ELECTROHYSTEROGRAM
Abstract
Preterm birth is the major complication during pregnancies. The timely prediction of preterm birth can decrease the infant mortality, morbidity as well as the economic costs. This study aimed to predict the premature births using Electrohysterogram (EHG).EHG is a non-invasive diagnostic technique, which measures the electrical activity responsible for the uterine contractions. The abdominal signals were acquired using Ag-AgCl electrodes in a bipolar configuration and the EHG was obtained by bandpass-filtering in the range of .34-1Hz. certain signal features are extracted for classification, linear and binary SVM classifiers are used. The result showed that it is possible to predict the preterm birth with an accuracy of 66.67%, specificity of 83.34% and sensitivity of 50%.
14 |
|
|
82-93 |
|
Study of Aluminium Metal Matrix Composites – Review
Abstract
Metal matrix composites have superior mechanical properties in comparison to metals over a wide range of operating conditions. This makes them an attractive option in replacing metals for various engineering applications. This paper provides a literature review, on machining of Aluminium metal matrix composites (AMMC) especially the particle reinforced Aluminium metal matrix composites. This paper is an attempt to give brief account of recent work over AMMC. By suitably selecting the machining parameters, machining of AMMC can be made economical.
15 |
|
|
94-97 |
|
RFID BASED ATTENDANCE SYSTEM
Abstract
--In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this project, an attempt is made to solve recurrent attendance monitoring problem in developing countries using RFID technology. The application of RFID to attendance monitoring as developed and deployed in this study is capable of eliminating time wasted during manual collection of attendance and an opportunity for the educational administrators to capture face-to-face classroom statistics for allocation of appropriate attendance scores and for further managerial decisions.
In this project we have used AT89C52 Microcontroller. It is a low power, high performance CMOS. 16x2 Alphanumeric Display which can display alphabets, numbers as well as special symbols. EM-12 RFID reader module with passive RFID tags used in our project which content 13digit number tag in it.
16 |
|
|
98-101 |
|
Pixel Value Differencing Algorithm in Steganography Image
Abstract
with the development of information technology and telecommunications, the concern on the security level will become increasingly important, such as the degree of safety data insertion or information. Security enhancement data insertion can be performed using steganography. Steganography is the technique of hiding messages into digital media. Digital media which could be use are text, images, sound, and video. This research discusses the process of steganography to insert messages into images using Pixel Value Differencing algorithm that did the insertion into the domain of RGB pixels in an image.
17 |
|
|
102-108 |
|
A REVIEW ON DIFFERENT ARTIFACTS REMOVAL TECHNIQUES IN ELECTROHYSTEROGRAM
Abstract
uterine contraction detection is fundamental component of pregnancy monitoring. Electrohysterogram (EHG) provides a non-invasive and accurate alternative to intra uterine pressure catheter (IUPC). EHG measures the electrical signal responsible for the uterine contractions. The signal is influenced by different artifacts, the removal of artifacts are essential for the accurate preterm birth prediction and detection. In this paper different monitoring techniques for uterine contractions and a comparison of different artifacts removal methods are also included.
18 |
|
|
109-111 |
|
Using Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
Abstract
The complexity of criminal minded’ experiences reflected from social media content requires human interpretation. However, the growing scale of data demands automatic data analysis techniques. In this project data mining algorithm based on Naïve Bayes Multi-Label Classifier is implemented which contains several steps like Data Collection from twitter, Cleaning the data by removing stop words, removal of non letter and punctuation marks, probability of the words for various categories namely Heavy Study Load, Sleep Problems, Lack of Social Engagement, Negative Emotion and Diversity Issues is estimated. For all the tweets Accuracy, Precision, Recall, F1 measure, Micro Averaged & Macro Averaged values are computed for each category and also for the various users. Therefore we can conclude on average how many criminal minded have various categories of problems as well as extend this to the problems faced by which user.
19 |
|
|
112-119 |
|
To Make an application to Improve Blood Donation Process Using Data Mining Technique
Abstract
Blood is the vital thing for human being because there is no alternative for replacing it. This makes it necessary for the presence of a system for predicting continuous behavior of healthy blood donors in blood transfusion organization. The aim of predicting behavior of donor’s is to determine and collect proper information about the blood donor, his health status and blood groups for providing future continuity to blood bank. As the Urgent need of blood is rapidly growing it is desire need to find the blood donor information properly and efficiently. It is becoming more and more difficult to extract the information using the conventional database techniques. So, in this paper we proposed the solution for properly mining the proper and required donor information from large amount of blood donor’s database. It is necessary to analyze the blood donor database, along with his information from blood banks as it is useful when urgent need occurs. For retrieving the proper information from large database related to the blood donor’s data mining is used to analyze their availability, number of donors and all related information. There are various different techniques and algorithms present in data mining like classification, clustering, association, etc. which suits better for desired task. Blood is the vital thing for human being because there is no alternative for replacing it. This makes it necessary for the presence of a system for predicting continuous behavior of healthy blood donors in blood transfusion organization. The aim of predicting behavior of donor’s is to determine and collect proper information about the blood donor, his health status and blood groups for providing future continuity to blood bank. As the Urgent need of blood is rapidly growing it is desire need to find the blood donor information properly and efficiently. It is becoming more and more difficult to extract the information using the conventional database techniques. So, in this paper we proposed the solution for properly mining the proper and required donor information from large amount of blood donor’s database. It is necessary to analyze the blood donor database, along with his information from blood banks as it is useful when urgent need occurs. For retrieving the proper information from large database related to the blood donor’s data mining is used to analyze their availability, number of donors and all related information. There are various different techniques and algorithms present in data mining like classification, clustering, association, etc. which suits better for desired task.
20 |
|
|
120-132 |
|
Experimental Investigation of Various Bio fuels
Abstract
This project work deals with “EXPERIMENTAL INVESTIGATION OF VARIOUS BIOFUELS”. Bio-fuels are renewable and eco-friendly alternative fuels derived from natural fats or vegetable oils and it is considered as an attractive alternative to replace diesel fuels. The various sources for bio-fuel used in the project are Soybean oil, Mustard oil, Linseed Oil and Sesame Oil. The bio fuel is obtained from these oils through transesterification process after which the bio fuel is blended with diesel to make bio diesel of B10, B20 and B30 ratios. The performance characteristics of these blends are then compared with diesel. From our study we observed that biodiesel are more viscous then petroleum diesel with mustard’s oil being the highest and therefore mustard oil is not used in further research as it may cause damage to apparatus. Also it can be observed that the biodiesels have much higher flash point then diesel which shows that their cetin number is higher than that of diesel and so engine can be operated at higher compression ratios the Sesame oil & Soybean B30 has highest cetane number followed by Soybean B20 blend. Clearly from our assessment we can conclude that Sesame B20 blend has bettered other fuels. We can see on the basis of power the sesame gets the highest rating while soybean B30 having worst performance characteristics. From our assessment we concluded that the Sesame B20, Linseed B20 and soybean B20 have performed and given better performance than petroleum diesel and thus can be used as blends with diesel to enhance performance of diesel.
21 |
|
|
133-137 |
|
Review Article: Eco-friendly light weight concrete incorporating e-waste & corn cob
Abstract
The indiscriminate infrastructural growth is leading to rapid environmental degradation. Concrete is most widely used constructional material all over the world in view of its compressive strength, high mouldability, structural stability & economic consideration. The processing of “ELECTRONIC WASTE" causes serious threats to human health, pollution problem due to improper disposal. It contains some very serious contaminants such as Lead cadmium, Beryllium & Brominates flame retardants. Also high demand of natural resources due to rapid urbanization & disposal problem of agricultural waste have created opportunities for use of agro waste (CORN COB) in the construction industry. This experimental investigation is aimed to utilized "E- WASTE" & "CORN COB" which is use as partial replacement to coarse aggregates on strength criteria of M-30 grade concrete to increase its mechanical properties & to make the concrete light weight. Different properties of fresh concrete in harden concrete reviewed. There are maximum number of experiments have been conducted using various agro waste, but still more examinations are required for other waste such as CORN COB in concrete. There is less research work reported on CORN COB use as substitution, so it is felt that further detailed investigations are required.
Keywords— E- waste, Corn cob, concrete, compressive strength, durability.
22 |
|
|
138-142 |
|
Novel Automatic Demoulding and Feeding Device for Oil Seal Transfering Molding Press and Simulation Analysis
Abstract
The production equipment of the small volume rubber oil seal is mainly the transfering molding press. To solve the problems of low efficiency, high production cost and low cleanliness in the process of transfering molding vulcanizing at present, this study designed a novel type of automatic demoulding and feeding device for oil seal transfering molding press, which was composed of start button, stop button, guide rail bracket, elevating mechanism, middle template, holder, frame box and skeleton releaser. The holder clamped the middle template, and the oil seal demoulding could be achieved by rotating the holder, which made the labor intensity of the workers is effectively reduced, and the labor force is liberated. Multiple skeletons can be placed simultaneously using skeleton releasers on the frame box, which avoids the impurity adsorption on the surface of the skeleton, ensures the quality of the oil seal, and effectively improves the work efficiency. The simulation analysis of the automatic demoulding and feeding device for oil seal transfering molding press was carried out in this study. The analysis results show that the deformation condition and stress distribution are consistent with the design results, and the the maximum stress is less than the expected result.
23 |
|
|
143-145 |
|
Blockchain and Its Applications
Abstract
Blockchain innovation was initially presented as the innovation behind the Bitcoin decentralized virtual currency, yet there is the desire that its qualities of precise and irreversible information move in a decentralized P2P system could make different applications conceivable. Blockchain an apparently unassuming information structure, and a suite of related conventions, have as of late taken the universes of Finance and Technology by tempest through its earth shattering application in the present day crypto-currency Bitcoin, and all the more so due to the problematic advancements it guarantees.
24 |
|
|
146-148 |
|
Face feature based extraction and classification for Gender Recognition and Age Estimation using Fuzzy Model: A Review
Abstract
Facial demographic classification is an attractive topic in computer vision. Attributes such as age and gender can be used in many real life application such as face recognition and internet safety for minors. In this paper, we present a novel approach for age estimation and gender classification under uncontrolled conditions following the standard protocols for fair comparison. Our proposed approach is based on Multi Level features which are extracted from normalized face images. We proposed fuzzy model base gender prediction and mining base age estimation techniques. An approach for gender prediction fuzzy model show that gender prediction performance can be boosted by up to a great extend. Our study is based on a dataset from natural data mining competition. We propose an architecture for gender prediction, which consists of the “fuzzy learning model". The experimental results will show our proposed method significantly outperform baseline methods. A detailed analysis of features provides an entertaining insight into behavior variation on female and male users. Furthermore, the combination of visual cues resulted almost as strong as textual analysis in predicting gender, while providing complementary information that can be employed to further boost gender prediction accuracy will be up to 96%. As a byproduct of our investigation, we were also able to extrapolate the semantic categories of posted pictures mostly correlated to males and females.
25 |
|
|
149-153 |
|
The Design of Discovery and Reconcilliation of LTE Network
Abstract
Discovery and Reconciliation of LTE Network describes the web-based discovery and reconciliation tool used to discover and reconcile discrepancies between two entities, in particular, between the network and Adaptive Inventory (AI).It is necessary to keep records of each and every device in network for the company by which it can keep the details about the devices recorded in the network as per the status of presence or failure of that device. Discovery and Reconciliation of LTE Network supports the discovery of physical and logical network assets. The discovered objects are then compared with objects stored in a system, typically the Adaptive Inventory. Discrepancies are identified, along with recommended ways to resolve the discrepancies. This paper provides the overview of system flow of Discovery and Reconciliation of LTE Network and also includes the existing system and the proposed system.
26 |
|
|
154-159 |
|
ORIGIN OF GAMING IN VIRTUAL REALITY
Abstract
Today, with the virtual gaming industry evolving at such a high rate and making a huge place for itself in the market, gaming companies are looking for new ways to improve the gaming experience for the consumer. After revolutionary ideas like 3-D gaming, motion gaming, this industry finally emerged with one of the revolutionary idea, Virtual Reality Gaming.
While 3-D gaming tries to bring video games to life by getting them in user environment, motion gaming on the other hand tries to makes the gaming experience more interactive by using player motions as an input. V.R. Game on the other hand, immerses the player inside the game environment in such a way that user can interact with the virtual environment.
27 |
|
|
160-164 |
|
Automated Driving Car Using Image Processing
Abstract
In day to day life many car accidents occur due to lack of concentration as well as lack of judgement . Automatic Parking system and Automatic Driverless Cars are the current solution for the erupting problems. Multiple cameras are used to guide the car and make it a safer option to ride. An Image Processing Unit is used to store few basic instructions and make the car changes according to the road signs present on the road as well as follow the GPS to reach a specific destination. The car also adjust its speed according to the density of vehicles present on the lane and changes if found significant less density on the other lane.
28 |
|
|
165-169 |
|
Bike Safety System
Abstract
It’s a bike safety system safer than helmets. It’s a control approach rather than warning approach. The control approach is done with bike side stand retrieval. While the two-wheelers is concerned accidents occurs due to riding the vehicle in high speed, ignores to use helmets, does not maintains the speed limit and forgets to lift the side stand while riding the vehicles. These are the major source for accidents. Forgetting to lift the side stand causes huge accidents in rural areas partly in urban areas too, because all the other source of accident has preventive measure, but accident due to side stand do not have proper preventive measure. If you see the accident status 36% of the accidents occur due to this problem.
So this system is developed to prevent this accidents through use of minimum linkage and it’s also cost efficient. This device is more efficient than mechanically operated device.
Petrol indicator will indicate the amount of petrol in fuel tank, so through this driver gets the idea and fills the petrol to avoid any problem and stopping of vehicle.
29 |
|
|
170-174 |
|
Doctor Patient Data Sharing Using Android Chat Application
Abstract
Today there are lots of Chat applications available in market that are useful for communication and sharing of data between doctor and patient. But In all available chat applications both doctor and patient must know mobile numbers of each other. The objective of this paper is to build a system where patient can communicate and share his data with doctor without knowing mobile number of doctor.
This paper presents an application that is developed based on the Android operating system, using Android Studio and Firebase. The programming language is Java. The project is tested on an Android Emulator which is a tool that allows developers to easily test an application without having to install the application on a real device.
30 |
|
|
175-183 |
|
STUDY AND DESIGN OF WASTE ENERGY CONVERTION TECHNLOGY
Abstract
waste management, unavailable of pure water, electricity, Fuel crises are the major problem that we face every day. Considering these problems we introduce a new method to eradicate these problems. We created a system that will make a solution for these problem. Using all types of wastes we can produce water, fuels, natural gases, electricity, and bio char or carbon ash. This system is economically friend, cheap, more efficiency and green in nature and this system does not release hazard gases and vapors to the atmosphere.
31 |
|
|
184-190 |
|
A Survey of Virtual Keyboard with its Senses
Abstract
Since the development of computers had undergone rapid miniaturization. Disks and components grew smaller in size, only component that remained similar for decades is keyboard. Input to small devices is becoming an increasingly crucial factor in development for the ever-more powerful embedded market. Since miniaturization of a traditional QWERTY keyboard is very difficult we go for virtual keyboard. Here, a sensor tracks the finger movements of the typist to get the correct keystroke. A virtual keyboard is a keyboard that a user operates by typing on or within a wireless or optical-detectable surface or area rather than by depressing physical keys. As, new and advanced technologies have been invented for providing relief to humans in day-to-day life, in every field of world. These devices have witnessed a rapid improvement in its technology to fulfill the increasingly human usage demands of weightless devices which can be taken anywhere. In this embedded market, sensor plays an important role in sensing human activities, detecting environment factors and providing accurate result to humans that helps man to use virtual keyboard anywhere in any part of world with small input device. So, this paper gives summary of sensors in virtual keyboard , which includes introduction, research issues and future research directions of virtual keyboard.
32 |
|
|
191-196 |
|
A Survey on Porting a Desktop application as a RESTful web service
Abstract
A web service acts as a boon for today’s dynamically growing cloud era. Web service is a pack of manageable code that can be activated using the HTTP requests, i.e it can be invoked remotely using the HTTP. A RESTful web service is a software architecture for activating services over the web. This RESTful web service helps us in eliminating the drawbacks of the desktop application. All these web services are made available publicly in the web repository as web data. They provide higher probability to satisfy the user demands. A survey on porting a desktop application as a RESTful web service to the best exploitation of the resources and to achieve the required goal has been thus explained. These RESTful web service has been greatly evolved and has taken the upper hand in the medical domain, in the field of education and banking. The paper contributes towards exploring the best possible approach to port an available desktop application as a RESTful web service.
33 |
|
|
197-203 |
|
Survey on Road Traffic System and Violation Using Sensor Networks
Abstract
Road Traffic in crowded cities like Tokyo, Mumbai, Pune, Kolkata, Bangalore, New Delhi, Bangkok, Mexico, Romania, Indonesia, Russia China and India. Traffic accidents occur for various reasons. While problems with roads or safety facilities lead to some accidents, Unsafe road environments, Insufficient driver knowledge, Improper thinking and Wrong driving habits are the dangerous behaviors. Traffic congestion in the larger cities of the world is a growing problem that has to be taken into explanation critically. After a general survey in the field of Vehicle and Highway System, different alternatives are analyzed to solve this problem and the concept of intellectual Transportation System is proposed as the best solution. Intellectual Transportation System includes to detect wrong way vehicles and at a time to measure speed of the vehicles using traffic sensor. This contains separate entirely-functional units with their own characteristics organized to each other to conform a flexible system that can respond in an effective way to solve the problem of traffic blocking. Increasing the efficiency and of the existing traffic monitoring network is today’s requirement due to the continuous increase in traffic volume and the limited construction of new highway facilities in urban and rural areas. Smart street systems that contain real-time signal control systems, traffic monitoring detectors, motorist communications media and control to develop smart corridors that increase the effectiveness of the transportation network. The infrastructure improvements and new technologies are being integrated and public access areas to intelligent transportation systems. Car accidents happen all the time – one drive down the freeway can attest to that. To avoid getting into one yourself, you need to account for yourself as a driver and for those around you, too. Not only will this lead to safer driving, but it can also save you time and unnecessary expenses.
34 |
|
|
204-207 |
|
Numerical Investigation of Nano Fluids Influence on Thermo-Hydraulic Performances of MCPFHS
Abstract
Numerical study were applied on the influence of Nano fluids (Di-water, CuO-water, Ag-water and TiO2-water) as a fluid at volumetric concentration has used (c= 4%) in micro circular pin fin heat sink has studied with the assistance of simulations developed victimization commercially accessible procedure fluid dynamics software Fluent fourteen. The comparison of liquid flow and heat transfer characteristics of cooling fluids has been created beneath the similar stipulation and also the range of Reynolds number has used (100-500). The obtained results is illustrated that, CuO-water Nano fluid is offers the minimum pressure drop and most heat transfer rate compared to Ag-water and TiO2-water Nano fluids. And Di-water Nano fluid is offers most heat transfer rate compared to others. it's additionally supported that Di-water & TiO2-water Nano fluids offer approximate same performance on pressure drop.
35 |
|
|
208-213 |
|
A Study of Numerical Methods for Simultaneous Equations
Abstract
ABSTRACT :- Engineers are often confronted with the problem of finding a solution for a set of simultaneous equations involving multiple variables . Traditional mathematical methods are not amenable to computerization & hence too cumbersome to use in case of large number of variables . Numerical methods are programmable , can deliver solutions rapidly with reasonable accuracy & hence provide a viable alternative for handling such problems . In this paper the working procedure of different numerical methods have been amply described , using simple illustration and compared .
36 |
|
|
214-221 |
|
Present and Future of E-Retailing in India: A Case Study of Flipkart
Abstract
Few years back technology brought the shopping information on to the laptops, today it brings the products right to the doorstep. With the use of internet as a medium a person can buy products from a virtual store (shopping website). Though detractors to this technological advancement thought that this would take the joy off shopping, it has only added a whole new perspective to shopping. Electronic retailing (e-tailing),E-Retailing is a buzzword for any business-to-consumer (B2C) transactions that take place over the Internet. Simply put, e-retailing is the process of selling retail goods using the internet. Companies like Flipkart, Amazon and Dell created the online retail industry by putting the entire customer experience - from browsing products to placing orders to paying for purchases - on the Internet. The success of these and other companies encouraged more traditional retailers to create an online presence to augment their brick-and-mortar outlets. The penetration rate is quite low in comparison to other countries worldwide; however the number of users is significantly high. The Indian e-tailing sector has matured enough to deal with the rapid transformations from the era of offline to online platform to be used by the consumers and addresses the challenges faced in this process. The paper examines the growth and opportunities in the Indian e-tailing sector by focusing on the current and future wave of the big giant e -tailer in India, Flipkart.
Keywords: E-tailing, Multichannel, Product, Diversity, Service.
37 |
|
|
222-230 |
|
A Smart Information System for Public Transportation Using IoT
Abstract
New application and businesses are created continuously with the help of technology through the internet. IoT(Internet of Things) can assist in integration of communication, control and information processing across various transportation systems. In public transportation, there is lack of real time information. The public transit usage can be improved if real time information of the vehicle such as the seating availability, current location and time taken to reach the destination are provided with easier access. It would also be helpful for the passengers to find alternate choices depending on their circumstances. As excessive long waiting often discourage the travelers and makes them reluctant to take buses. A smart information system has been proposed where the travelers get prior information about current location, next location of bus and crowd level inside the bus. This system is designed using ARDUINO UNO, IR Sensor and GPS Module. An Intelligent Transport System (ITS) removes the barriers for public transport usage and creates the positive impact about the bus journey.
38 |
|
|
231-246 |
|
Organic materials with π-conjugated molecules based on thiophene and carbazole for optoelectronic applications
Abstract
Four oligomers are designed and studied by using density functional theory (DFT) and method ZINDO (Zerner’s Intermediate Neglect of Differential Overlap) calculation for the absorption properties in three states: neutral, doped(p) and doped(d) to predict the effect of doping in the structure of these oligomers and to determinate the relationship between the different forms and the gap energy. Furthermore, we have calculated many parameters such as Voc, IP, AE, max to suggest these materials to use in solar cells
39 |
|
|
247-250 |
|
Smart E-Billing
Abstract
In today’s busy world online shopping is the go-to option. In spite of it being a big time saver, it fails to provide the touch and feel satisfaction to the buyers. One is always in doubt of the quality, size, and worthiness of the product being offered to them online. Hence a major section of people still prefers to go shop for their products themselves. The procedure of shopping in marts can be really exhausting due to the waiting in long queues at billing counters. The proposed system of E-Billing provides a smart and an efficient way of shopping where the customers simply need to scan the barcode or QR code of the products they are purchasing. Once the shopping is done and a list of scanned products is submitted, the customer shall be provided with a unique code using which he/she shall make the payment at the counter thereby saving a lot of time.
40 |
|
|
251-255 |
|
Solid waste management :Factor selection Using Analytical Hierarchy Process
Abstract
The solid waste management is one of the major issues all over the world. Human practices has been directly linked to the management of solid waste due to its effect on both public and environmental health. As the world become more urbanized and developed consumption rate are on the rise. Inevitable consequence of more consumption is the rapid increase in the quantity of solid waste that is produced. Rapid population growth and uncontrolled industrial development are seriously destroying the urban and semi urban environment in many parts of the world’s developing countries, which lead to enormous strain on natural resources and obstructing efficient and sustainable development. This paper identified the major factors responsible for inefficient municipal solid waste management. One of the methods utilized is the multi-criteria analysis method called the analytical hierarchical process (AHP).In analytical hierarchical level weight of the elements are calculated from AHP, it is found that insufficient information quantity of municipal solid waste has high priority compared to other factors
41 |
|
|
256-260 |
|
Alternative Approaches to Big Data Analysis
Abstract
This paper focuses on various other alternatives to Hadoop that have emerged recently such as Apache Hadoop and how they provide a unique aspect in large-scale data processing.
42 |
|
|
261-266 |
|
Prediction of Municipal Solid Waste Generation for Tirur City in the State of Kerala, using ANN
Abstract
Rapid industrialization and population explosion has led to the migration of people from villages to towns which generate thousands of tons of MSW daily. One of the main functions of urban local bodies in developing countries is Municipal Solid Waste Management (MSWM). Forecasting of solid waste generation is a vital component f MSWM. This paper deals with modelling of solid waste generation in medium scale towns located in a developing country. Primary data is analysed to identify independent variables to be used to predict solid waste generation. Different empirical models are used for population projection. Projected population is used to predict solid waste to be handled during the study period. Artificial neural network models are proposed for estimation of solid waste generation in medium scale towns located in the study area.Inevitable consequence of more consumption is the rapid increase in the quantity of solid waste that is produced. Rapid population growth and uncontrolled industrial development are seriously destroying the urban and semi urban environment in many parts of the world’s developing countries, which lead to enormous strain on natural resources and obstructing efficient and sustainable development. This paper deals with modelling of solid waste generation. Projected population is used to predict solid waste to be handled during study period.
43 |
|
|
267-275 |
|
ANALYSYS & OPTIMIZATION OF HYDRAULIC EXCAVATOR BUCKET TEETH USING FEM
Abstract
In this paper various configurations of the bucket teeth have been designed in order to perform static analysis. The analysis has been carried out by using ANSYS14.5 where various configurations of teeth are designed as per SAE J1179 standard and using boundary condition for the maximum digging force condition all the design teeth are subject to maximum force. The effect of maximum digging force has been observed on maximum tooth deformation and Maximum Equivalent Von-Mises stress. In order to validate the obtained results are compared with the available literature and the results are within acceptable limit. Moreover, the effect of fillet on the teeth tip has been observed in terms of maximum total deformation and Von mises stresses. And the optimum condition of the fillet has been proposed for the all the configuration of the bucket teeth.
44 |
|
|
276-282 |
|
Numerical Analysis of Centrifugal Compressor for Process Industry
Abstract
Until recently, a little attention has been paid to the determination of transient behavior of dynamic compressors, and the response rate of such compressors during testing was established empirically. Now, the transient behavior is often predicted by mathematical models and a detailed knowledge of the dynamic response at the design stage is becoming increasingly important for the design and development of control systems. This is particularly the case in the aero gas turbine industry where it is common practice for manufacturers to be asked to guarantee the transient behavior of their products when negotiating contracts
45 |
|
|
283-289 |
|
Indoor Navigation System
Abstract
Recently there has been increasing research on the development of localization and navigation systems. Whereas most of the proposed approaches are suitable for outdoor operation, only a few techniques have been designed for indoor environments. This paper details the development of an indoor navigation system. It presents a general system consisting of sensors and algorithms for localization and navigation which enables to operate indoors. This is done by using trilateration method which has been successfully applied on complex nature of indoor environments. Set of experiments presented to validate our system using MATLAB program. Testing verified that good accuracy, sufficient for navigation, was achieved. This technique shows promise for future handheld indoor navigation systems that can be used in malls, museums, hospitals, and college campuses.
46 |
|
|
290-292 |
|
DICTIONARY LEARNING APPROACHES FOR LANGUAGE IDENTIFICATION
Abstract
The With the growth of global partnership, the demands for communication across the boundaries of language are increasing. This gives rise to new challenges for Automatic Speech Recognition (ASR): before the machine can understand the meaning of the utterance, it must identify which language is being spoken. The task of automatic Language Identification (LID) is to quickly and accurately identify the spoken language being used (e.g. English or Mandarin Chinese).
47 |
|
|
293-297 |
|
Segmentation And Analysis Of Interstitial Lung Disease Pattern In HRCT Images And Disease Classification By K- Means
Abstract
Automated segmentation of pathological bearing region is the first step towards the development of lung CAD. Most of the work reported in the literature related to automated analysis of lung tissue aims towards classification of fixed sized block into one of the classes. This block level classification of lung tissues in the image never results in accurate or smooth boundaries between different regions. In this work, effort is taken to investigate the performance of the automated image segmentation or clustering algorithm that results in smooth boundaries among lung tissue patterns commonly encountered in microscopic images of the thorax. A public database that consists of HRTC images taken from patients affected with Interstitial Lung Diseases (ILDs) is used for the evaluation. The K-means algorithm is used here to find the clusters. The performance of K-means algorithm is evaluated for varied value of K(number of clusters) and its effect is studied.
48 |
|
|
298-305 |
|
The Analysis of Privacy issues in Big data
Abstract
Big data is a term used for enormous amount of data sets that have distinguished and complex structure. These characteristics usually correlate with other difficulties in saving, analyzing and using different procedures or taking out results. Big data analytics is the keyword used to describe the process of researching massive amounts of complex data in order to show hidden patterns or identify the secret correlations. However, there is an obvious contradiction issues between the security and privacy of big data and the widely use of big data.
49 |
|
|
306-313 |
|
A State of Art -Thermodynamic analysis of Gas Turbine Based Hybrid Power Cycle
Abstract
this paper presents an extensive review in the field of hybrid gas turbine system. In order to make gas turbine hybrid thermal integration of fuel cell is considered as the best practice in the present scenario. Various integration of Gas turbine cycle with fuel cell has been presents with the potential of gas turbine based power cycle with fuel cells for fuel flexibility, which could expand the prospective for sustainability and profitability in energy conversion systems. The impact of various thermal integration and their performance parameters has been present in terms of energy efficiency, exergy efficiency and economical analysis. In gas turbine based power plant exhibits high content of waste heat which cannot been utilized which leads to lower thermal efficiency, but due to advancement in the technologies various integrations are available which improves the performance of the cycle. such as HRSG, HAT cycle, SOFC, gasification system, refrigeration system, photovoltaic system, etc.
50 |
|
|
314-318 |
|
Modeling of Three-phase Zero voltage Switching, Four switch Boost Rectifier
Abstract
51 |
|
|
319-325 |
|
A Review on Heat Transfer and Fluid Flow within U-pipe and Bend Pipe
Abstract
This paper focuses on extensive literature review in the field of heat transfer and fluid flow within the U pipe or bends Pipe. Several researchers have examined the fluid flow characteristics experimentally as well as computationally. Pipes are extensive been used in various application from day to day life to various engineering marvels. Within the pipe when fluid flows, due to friction various losses takes place which affects the hydrodynamics as well as thermo hydrodynamics performance.
At turbulent flow, the flow within these bend pipes have high significance in terms of secondary flow or flow separation. Researcher examined these flow characteristics and developed various empirical correlations which are particularly been used in exploring other engineering application
52 |
|
|
326-332 |
|
A Comprehensive Review in the Field of Abrasive Water-jet Machining
Abstract
The progress in research and development in the field of making composites and advanced ceramic formulated in high performance material, but on others it also offers various challenges when shaping (cutting) them in desired shape and size. It has believed that these materials cannot be effectively been machined by conventional machining techniques. Excluding economics, the selection of process of machining mainly depends upon the machined surface integrity. The water jet with multiphase i.e. water +abrasive+air, makes this cutting process one viable option as compared to other conventional processing. In this paper an extensive review has been presented in the field of abrasive water jet machining which includes various research work undertaken by the researchers, computational as well as experimentally, who investigates the influence of various process parameters during cutting operations.
53 |
|
|
333-341 |
|
Microcontroller Based Flow Control For Insulin Infusion Process
Abstract
- In every aspect of life automation is required to reduce the work. So we have designed Automatic flow control system for Insulin Infusion Process. This System will overcome the current drawbacks of insulin flow control pump used for injection of insulin into the body of diabetes patients. Infusion pumps can administer fluids in ways that would be impractically expensive or unreliable if performed manually by nursing staff. For example, it can inject as little as 0.1 mL per hour injections (too small to inject), injections every hour, injections with repeated doses requested by the patient, up to maximum number per hour (e.g. in diabetes patients), or fluids whose volumes vary by the time of day. The MFC system is having unit to measure the patient’s blood glucose level and accordingly automatically adjusts the flow of insulin through the pump. This system can also be used for precise flow control of biomedical fluids as well as medicines. The MFC eliminates the need for continuous monitoring of diabetes patients in ICU to take care of their lab method sugar measurement after an hour and then adjusting the Insulin pump speed in the presence of doctors. So in absence of responsible doctor the MFC can take care of all the necessary things with reduced man power. The proposed system has blood glucose measuring unit through which the nurse or doctor can measure patient’s blood glucose level in time and accurately there after the insulin flow into the body of patient is adjusted or set. The Insulin pump flow can be set automatically on the amount of sugar or manually by the nurse or doctor as according to the need. The Proposed system is having three IPs running at a time and also having PC interface through which the total control and setting can be made.
54 |
|
|
342-348 |
|
Pupil Tracking Using Low Resolution Devices
Abstract
Pupil movement tracking enabled computer interface are highly advanced in processing immobilized human inputs. It reduces hardware cost of external input devices such as keyboards, mouse and touch. Our study uses low resolution images from a built-in or external webcam to capture the positioning of the eye while looking at computer screen. This experiment focusses on the working of a generalized system that can be modified based on user requirements to deliver different purposes. The algorithm used gives faster results in tracking the pupil than other algorithms and techniques. The challenge is to successfully detect the pupil centres and get offsets during pupil tracking. Offsets, further can be helpful in many applications like mouse pointer calibration. We are using information of eye and head positioning that produces the probability estimates of eye positions.
55 |
|
|
349-357 |
|
Computational Analysis of Heat sink or Extended Surface -“A Comprehensive Review”
Abstract
Heat sink and extended surface in the form of the fins module are the most commonly used various industrial applications such as Nuclear reactor, Mixing tank, solar air heater and even in electronic filed also such in the CPU as heat exchanger, the purpose of employing these is to enhance heat transfer by Forced and Natural heat transfer phenomenon. This paper provides a compressive review on the finned surface or heat sink which is subjected to thermal condition i.e. for Forced and Natural transfer phenomenon. Vast research has been carried out in the field of Fin and extended surface both in experimentation as well as computationally. Various optimization algorithms have also been reported by the researchers and are illustrated by various graphs and mathematical modeling by developing correlations
56 |
|
|
358-364 |
|
A Review on Heat Transfer and Fluid Flow Over Wavy Channel or Surface
Abstract
This paper concentrates to extensive review on the fluid flow and heat transfer over an wavy surface and channel. Wavy surfaces and channel have been employed in many environmental and industrial applications. The key factor for adopting such shaped (wavy) instead of using flat surface is due to improving the mass and heat transfer mechanisms, associated with large pressure variations.
Fundamentally, the fully developed flow over a wavy surface, in either laminar or turbulent regime, is much further complex than that over a flat surface because of the additional parameters to be utilized and the correlated flow phenomena to be deduced. Numerous researches perform numerical-computation simulations and experimentation in order to explore the flow characteristics over wavy surfaces are stated in this paper.
57 |
|
|
365-369 |
|
Review on Multi-User Multi-Keyword Privacy Preserving Ranked Based Search Over Encrypted Cloud Data
Abstract
Advancement in cloud computing have revamped the view of modern information technology which is motivating the data owners to outsource their data to the public cloud server like Amazon, Microsoft Azure, Google Drive, etc. With the help of data outsourcing, the organizations can provide reliable data services to their users without any concerns for the data management overhead. One more advantage of outsourcing the data over cloud as SAAS (Storage as a Service) is its cost-effectiveness, scalable and it can be accessed from anywhere and anytime. Considering the large number of data users and documents in cloud, it is crucial for the search service to allow multi-keyword query and provide result similarity ranking to meet the effective data retrieval need. Related works on searchable encryption focus on single keyword search or Boolean keyword search, and rarely differentiate the search results. In this paper, for the first time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. Among various multi-keyword semantics, we choose the efficient principle of “coordinate matching”, i.e., as many matches as possible, to capture the similarity between search query and data documents, and further use “inner product similarity” to quantitatively formalize such principle for similarity measurement. We first propose a basic MRSE scheme using secure inner product computation, and then significantly improve it to meet different privacy requirements in two levels of threat models. Thorough analysis investigating privacy and efficiency guarantees of proposed schemes is given, and experiments on the real-world dataset further show proposed schemes indeed introduce low overhead on computation and communication.
58 |
|
|
370-373 |
|
A technique to safeguard cluster-based Wireless Sensor Networks against Sybil Attack
Abstract
Security is one of the most challenging issues in Wireless Sensor Networks (WSNs) due to its resource constraint nature. One of the harmful attacks on these sensor networks is the Sybil attack, where a node illegitimately claims multiple identities. This paper presents a secure key management scheme adopted on clustered architecture of WSNs. The proposed scheme uses partial key pre-distribution and indirect validation of sensor nodes. This scheme outperforms other available protocols since it reduces the load on the base station and also the processing time.
59 |
|
|
374-378 |
|
Implementation of Cloud integrated IoT as Garbage collection system
Abstract
This paper presents an architecture where the cloud is integrated to IoT. All the computations will be done at the cloud to reduce the overhead for the sensors to take care of the various applications which request data from only a subset of sensors. We use this proposed model to develop an application where the Garbage level is measured using methane and pressure sensors whose data will be send to two different set of users based on their location.
60 |
|
|
379-387 |
|
Factors Affecting Construction Cost Estimation of Building projects
Abstract
Construction industry could be considered as a very important sector for development all over the World and the construction cost estimation is the most important element in it. Realistic estimation of construction cost is vital for both successful planning and completion of every construction project. The key factor in a project’s success is the accurate cost estimation at its early stage. It is difficult to quickly and accurately estimate construction costs at the planning stage itself when project information is limited. This study was carried out to identify the factors affecting construction cost estimation. The factors were identified based on questionnaire survey. Questionnaires were given to 64 experts in the construction industry to determine the importance of construction cost estimation and to determine the score of each factor. Statistical analysis was carried out on the feedback of the respondents of the survey. RII value of the factors was found using Microsoft Excel. The mean score of each factor was determined and the p-value was calculated using the SPSS software. The significance of each factor used in the questionnaire was determined. The significant factors were identified using the mean score and their p-value.
Key Words: Construction industry, cost estimation, questionnaire survey, structured interview significant factors
61 |
|
|
388-396 |
|
Mobile Cloud Computation: Issues and Challenges
Abstract
Abstract: Despite the evolution and enhancements that mobile devices have experienced, they are still considered as limited computing devices. Today, users become more demanding and expect to execute computational intensive applications on their smartphone devices. Therefore, Mobile Cloud Computing (MCC) integrates mobile computing and Cloud Computing (CC) in order to extend capabilities of mobile devices using offloading techniques. Computation offloading tackles limitations of Smart Mobile Devices (SMDs) such as limited battery lifetime, limited processing capabilities and limited storage capacity by offloading the execution and workload to other rich systems with better performance and resources. This paper presents the current offloading frameworks, computation offloading techniques, and analyzes them along with their main critical issues. In addition, it explores different important parameters based on which the frameworks are implemented such as offloading method and level of partitioning.
62 |
|
|
397-414 |
|
An Approach of Organisational Specialisation in Intelligent Systems
Abstract
There are great similarities between business organisations and intelligent systems like multi-agent systems (MAS) environments with an organisational approach. These similarities make it possible to apply business structures to multi-agent environments, which improves their performance and internal organisation. An important feature that can be measured in these organisations is the availability of specialisation agents, which can be measured at either the task level for each agent, or at the overall system level. The present study proposes that this specialisation improves the performance of the agent and the entire system in terms of efficiency. To this end, a comparison was made between a specialised and a non-specialised system and their ability to process an inventory management problem.
63 |
|
|
415-419 |
|
IMPLEMENTATION OF RFID TECHNOLOGY FOR CONTROLLING CITY TRAFFIC AND IDENTIFICATION OF VEHICLE EMISSION
Abstract
Traffic congestion and vehicle emission disorder in the cities is a common scenario in most of the traffic junction points that leads to disturbances, i.e., i) increased air pollution, ii) de prioritized vehicle movements like ambulances, iii) delay in toll collections, etc. Here the challenge is to identify the traffic density, vehicle emission quantity and road clearance to the prioritized vehicle to move in the required direction using automated traffic signal control .Based on the above challenges the main objectives of the project is To design a framework for a dynamic and automatic traffic light control system for the clearance of critical vehicles (like ambulance, etc) using RFID technology and develop a prototype system using sensors and embedded computing devices. To develop a mobile application for the inspection and notification of the data received from the Radio frequency identification (RFID) based embedded system attached to the vehicle to collect and transmit emission information. This application is also extended to collect the toll charges automatically at a particular junction point. Prototype of the system is developed to demonstrate the working principles mentioned in the proposed model and verified for all the functionalities.
64 |
|
|
420-426 |
|
Energy Driven Adaptive Clustering Hierarchy Protocol For Heterogeneous Wireless Sensor Network
Abstract
Wireless sensor network consists of small battery powered sensors. Therefore, energy consumption is an important issue and several schemes have been proposed to improve the lifetime of the network. In this paper we propose a new approach called energy-driven adaptive clustering hierarchy (EDACH), which evenly distributes the energy dissipation among the sensor nodes to maximize the network lifetime. This is achieved by using proxy node replacing the cluster-head of low battery power and forming more clusters in the region relatively far from the base station. Comparison with the existing schemes such as EECHS (Energy Efficient Clustering Head Selection) and reveals that the proposed EDACH approach significantly improves the network lifetime.
65 |
|
|
427-437 |
|
Trapezoidal Power supply System Based on Fluctuating Input Voltage Method
Abstract
Performance aspect of trapezoidal uninterruptible power supply system based on fluctuating input voltage method is presented. Trapezoidal shaped alternating current (ac) voltage load waveform has remained potentially attractive in the conversing CABLE TV (CATV) and telecommunication market where hybrid fiber/coax (HFC) distribution networks have emerged as one of the preferred approaches for distributing multimedia services to the consumer. The efficient conversion, control, and conditioning by static means of electrical power from its available input form into a trapezoidal form are highly possible and require very stringent control strategy. The remarkable feature of voltage feed-forward Pulse-width Modulation (PWM) control to accommodate the change in the input voltage to a converter has made it worthy of consideration in trapezoidal uninterruptible power supply system (TUPS) control. This work studies by way of voltage waveforms the high-performance of single-stage TUPS for Single-phase trapezoidal ac supply. A trapezoidal-shaped load voltage that is synchronized with the ac mains supply is generated by a single-stage configuration, which offers high efficiency. All necessary voltage waveforms which significantly allow the voltage-load transient to represent the UPS system performance are presented. Transient, Fourier, and AC analyses have been performed. The trapezoidal output waveform of the TUPS system is reasonably free from overshoot and undershoots. It also presents a considerably low total harmonic distortion (THD). The desired load voltage magnitude is achieved without necessarily using a 50Hz step-up transformer.
66 |
|
|
438-443 |
|
Wireless Network Security Fundamentals and Technologies
Abstract
In markets where devices are more widely used, there will be attacks on the devices themselves but quickly will be focused on transactions. As devices develop more capabilities, the threats and attacks are expected to grow more serious and frequent. With increasing deployment of wireless networks, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. With the growing reliance on e-commerce, wireless network based services and the internet; enterprises are faced with an ever increasing responsibility to protect their systems from attack. In this paper we will discuss few of the security technologies developed to provide security for wireless networks.
67 |
|
|
444-449 |
|
A Review on Imbalanced Data Handling Using Undersampling and Oversampling Technique
Abstract
In today’s era of internet the amount of data generation is growing on increasing. Some of the data related to medical, e-commerce, social networking, etc. are of great importance. But many of these datasets are imbalanced that is some records belonging to same category are in much large number and some are very rare. For extracting useful date from such large dataset different data mining or machine learning techniques are used. But these imbalanced nature of the datasets affects the performance of a classifier very greatly. To deal with this it is necessary to understand the problem of imbalanced learning. There are various Undersampling and oversampling techniques available which try to resolve imbalanced learning problem. This paper, performs the study of this imbalance nature of the datasets and different techniques of oversampling and Undersampling that are used to balance the datasets.
68 |
|
|
450-458 |
|
A Review Based on Order Preserving Encryption-Scheme to Preserve the Order of Encrypted Cloud Data Search
Abstract
The data on Cloud computing is encrypted due to security concern or the factor of third party to excavate into it. As the consequence to this, the search over encrypted data becomes a complex task. The traditional approaches like to search in plain text cannot be apply over encrypted data. So the searchable encryption techniques are being used. In searchable encryption techniques the order of relevance must be consider as the concern because when it is large amount of data it becomes complex as relevant documents are more in number. We have discussed the probabilistic OPE technique which known as one-to-many OPE. The expected result is to be that Cloud server cannot penetrate in actual user data and provide the search on encrypted data will be performed and results will appear in order of relevance score. Even though with good security of one-to-many OPE the Cloud can get the information of the plain text if differential attacks occurred on the cipher text by calculating the differences between the cipher text.
69 |
|
|
459-468 |
|
EFFECTIVENESS ANALYSIS OF A TWO UNIT PRIORITY STANDBY SYSTEM UNDER WARRANTY SCHEME WITH TWO REPAIR FACILITY AND DIFFERENT TYPES OF FAILURE
Abstract
In this paper a two non identical unit system model is investigated and analyzed with two repair facility and the concept of priority, as one unit may get priority for both operation and repair. Here we have considered the system which consists of two non identical units namely ‘P’ and ‘C’. ‘P’ is the priority unit that is operative initially and other unit ‘C’ is standby unit is kept as cold standby. Unit ‘P’ has three modes: minor, major and catastrophic failure and the unit ‘B’ has one mode only i.e. normal failure. There is two types of repairman – one is regular and the other an expert. The regular repairman is always with the system and only repairs the unit which fails due to minor failure and giving replacement in case of catastrophic failure of priority unit or fails in the standby state. He does not repair the priority unit which fails due to major failure. In this case, a second repairman, who is an expert, is called on to do the job.
70 |
|
|
469-476 |
|
ROLE OF DVR IN MULTI-LEVEL CONVERTERS FOR SOLAR PV GRID INTERFACING SYSTEMS
Abstract
The main impetus of the present research work is to highlight the Power Quality (PQ) behavior of the three four-level modules connected in parallel where, a DC source available at load side of each module is replaced with a 100 kW SPV module. The transient behavior study has been under taken in all the three phases during the faulted period of simulation. The role of Dynamic Voltage Restorer (DVR) into the PQ evaluation has been investigated. DVR action has been controlled by Proportional Integral (PI) controller whereby this action has been able to control voltage-current waveforms at three bus-bars. The study on real power flow among the three modules, utility grid and a three phase load has been undertaken during the single line to ground fault grid side. Additionally, the reactive power compensation has been demonstrated using the three modules. Reactive power requirement of the load is also met from the utility grid operating at unity power factor. Finally, harmonics study has been highlighted using the fast fourier transform tool of Matlab simulation at all bus-bars. The harmonics level has been studied and has been found that the level of harmonics is less than 5% at all voltage and current levels.
71 |
|
|
477-485 |
|
ROLE OF UPQC IN POWER QUALITY ANALYSIS OF SOLAR PHOTOVOLTAIC AND NINE LEVEL INVERTER SYSTEMS
Abstract
The present work mainly indentifies the importance of Multi Level Inverter (MLI) and associated control systems to obtain a pure sinusoidal waveform at the output. In order to obtain Maximum Power Point (MPP) under changing environmental conditions, Maximum Power Point Tracking (MPPT) techniques are discussed and implemented. The model for a nine level MLI employing a cascaded transformer to synthesize nine output voltage levels is developed, which is operated by a solar Photovoltaic (PV) array at the input side. Incremental Conductance (IC)-MPPT technique has been able to generate the maximum power from solar PV array under changing conditions. The role of Unified power Quality Conditioner (UPQC) on the operation of H-bridge nine level MLI system during the faulted conditions is highlighted. Waveforms at the PCC have attained the sine nature with reduced distortion and harmonics level. Nine level voltages have been observed at the output of cascaded transformer by the application of UPQC.
72 |
|
|
486-490 |
|
Twitter Sentiment Analysis on Demonetization an Initiative Government of India
Abstract
Declaration of 86 percent of currency notes as illegal tender in just a blink of time on eve of 8th November 2016 mandated the creation of immediate interruption in daily lives. The chaos was created in every strata of the society whether upper, middle, or lower. Where some welcome the move as it was seen for curbing black money, many are suffering by this movement. But the supreme suffers of this move were the informal sector of India economy, where cashless transaction are minimal. Informal sectors of India Economy include 106 activities like agriculture, worker in construction, local transport, community services and small workshops like shoe makes and garment makers (International Conference of Labour Statistics (2003), rural populations and the urban poor and middle class. This paper aimed at reviewing the general implication of demonetization on people.
73 |
|
|
491-496 |
|
Anti Screenshot, Shoulder Surfing Resistant Virtual Keypad for Online Platform
Abstract
Internet today is not just a source of information; it also let us carry out several important transactions. In order to increase the popularity and usage of internet banking, banks also encourage their customers to carry out transaction online. Online transactions are more convenient, quicker and secured. But current method of user authentication and validation is quite unsecured. Current system allows user to register on the online bank portal and validate account by some secured password in order to carry out authentication process in future. There are two methods for password entry; use of physical keyboards is one of the two; which perhaps put authentication process to risk. Virtual keyboard service is second method, in this password is taken as virtual input using virtual keyboard. But user suffers badly if system is infected with Trojans which may take screenshots of virtual keypad or any risk of shoulder surfing. This paper describe implementation of more safe and secure virtual keypad for online banking and what security measures can be adopted to maintain the confidentiality.
Keywords: Authentication System; Shoulder Surfing; Virtual keyboard; Anti-screenshot.
74 |
|
|
497-502 |
|
WIBREE TECHNOLOGY
Abstract
Now a day’s technology is making rapid progress and making many things very easier. As the innovative thinking of persons is increasing day-by-day, new methods for wireless networking have been evolved. Some of the technologies now in use are Wi-Fi, Wi-max, Zigbee, and Bluetooth. Out of which Bluetooth is most popular. These technologies are widely used to connect the large devices like mobile phones or personal computers. No other existing wireless technologies will connect with small button cell battery devices so effectively. So the Nokia introduced the new radio technology called Wibree.
In this paper we present the development, technology, architecture and applications of Wibree technology. This is the first open technology offering connectivity between mobile devices or personal computers, and small, button cell battery power devices such as watches, wireless keyboards, toys and sports & health care sensors.
75 |
|
|
503-512 |
|
Design for Testability Implementation Of Dual Rail Half Adder Based on Level Sensitive Scan Cell Design
Abstract
Design for testability (DFT) refers to hardware design styles or it is an added hardware that reduces test generation complexity and test cost, also increases test quality. Sleep Convention Logic (SCL) is an asynchronous logic style which is based on Null Convention Logic (NCL). In the SCL the combinational blocks are made of threshold gates. SCL utilizes power gating method to further reduce the power consumption by incorporating the sleep signal in every single gate. There are currently no DFT methodologies existing for SCL. But in the current NCL, specific DFT methods cannot be directly used due to the sleep mechanism for power gating. The aim of this paper is to analyze various stuck-at-faults within SCL pipelines. Hence by using scan based testing methodology the SCL circuit is analyzed at the cost of usual area overhead .The proposed methodology is based on fault analysis.
76 |
|
|
513-518 |
|
GSM Based Automatic Energy Meter billing system
Abstract
This paper develops the design for automatic reading of electrical energy consumed in units using GSM technology . A LED of the digital energy meter is paired with the LDR whose output is connected to the microcontroller. Each blink of LED sends a signal is to the microcontroller and micro controller count the number of blinks of the LED. The frequency of the blinking of led depend up on the connected load. The microcontroller updates the readings and display it over the LCD and saves in the EPROM. This recorded readings from the microcontroller is programmed to send the SMS after every one month of meter reading. Initially these details are updated in a electricity board and later the bill is sent back to the customer. For transmitting the data GSM module is used. The continuous monitoring and measuring of the energy meter is done by ARM controller. This intended system will be helpful for the electricity board for the accurate billing without any mish up and to reduce the manual manipulation.
77 |
|
|
519-527 |
|
PARALLEL DATA COMPRESSION IN PERSONAL HEALTH RECORD WITH CHUNKING ALGORITHM ON A CLOUD
Abstract
The emergence of massive datasets in a clinical data presents both challenges and opportunities in data storage and analysis. Advances in information and communication technology present the most viable solutions to big data Storage and analysis in terms of efficiency and scalability. As data progressively grows within data centers, the cloud storage systems continuously face challenges in saving storage capacity and providing capabilities necessary to move big data within an acceptable time frame. The storage pressure on cloud storage system caused by the explosive growth of data is growing by the day, especially a vast amount of redundant data waste a lot of storage space. Data deduplication can effectively reduce the size of data by eliminating redundant data in storage systems. In cloud data storage, the deduplication technology plays a major role. Current big sensing Clinical data processing on Cloud have adopted some data compression techniques. However, due to the high volume and velocity of big sensing data, traditional data compression techniques lack sufficient efficiency and scalability for data processing. Instead of compressing basic data units, the compression will be conducted over partitioned data chunks. In the deduplication technology, data are broken down into multiple pieces called “chunks”. The chunking algorithm uses a new parallel processing framework The Two Thresholds Two Divisors (TTTD) algorithm is used for chunking mechanism and is used for controlling the variations of the chunk-size. It is vital those big data solutions are multithreaded and that data access approaches be precisely tailored to large volumes of semi-structured/unstructured data. To restore original data sets, some restoration functions and predictions will be designed. Successful restoration of Electronic Health Record helps improve patient safety and quality of care.
Key Words: Deduplication, Two Thresholds Two Divisors(TTTD)
78 |
|
|
528-529 |
|
Functional testing of Time Code Translator
Abstract
Indian Remote Sensing satellites are remote sensing satellites which consist of various sensors such as panchromatic, LISS, WIFS, OCM, SAR, etc. The on-board sensor data is QPSK modulated and transmitted via X-band downlink. The remote sensing data is received at Various Centre through Data Ingest System.
Time Code Translator receives serial input from Serial Time Distribution unit and convert the parallel Binary Coded Data to the Front End Hardware for time tagging the Real-time Raw Data (Satellite Image Data) for reference. Time Code Translator is designed and developed and is required to be tested for its functionality.
79 |
|
|
530-534 |
|
COMBINED BAIT DISCOVERY APPROACH FOR DEFENDING COLLABORATIVE ATTACKS IN MANETS
Abstract
The most required technology which is still an interesting topic for researchers is the Mobile Adhoc Networks. It provides various flexible characteristics which are useful at many situations but launch few threats related to security. These threats are the collaborative attacks such as black hole and gray hole attacks. These severe attacks which are responsible for dropping the packets during transmission can be overcome in this paper using a secure mechanism called the Combined bait discovery method(CBDM).This method includes dynamic route discovery scheme and selective repeat protocol for defending the attacks. Node ranking algorithm is used to identify the true malignant nodes and by adopting this algorithm the resource consumption can be reduced.
80 |
|
|
535-549 |
|
DESIGN AND OPTIMIZATION OF EXCAVATOR
Abstract
The hydraulic excavators are one of the earth movers playing a major role in the development of the infrastructure like excavation, road construction, building construction, granite mining, ore mining, Coal mining etc. Excavators are generally equipped with a work implement or attachment for performing useful work. Such attachments include digging and material handling buckets, drills, and hydraulic hammers. To reduce number of iterations during the development process, the computational simulation method is used in Excavator for Multi Body Simulation analysis. An explicit finite element code like Altair Radioss is used for the simulation. Optimization is carried out to improve the Lower arm Excavator model to get less weight and stiffest component. This paper explains the FE analysis of Excavator of Lower Arm. All the results obtained from the CAE analysis are evaluated against the requirements which could reduce the process development time and cost. Aim of the Project is to Design and do Multi Body Simulation analysis for Excavator and Perform Topology Optimization to reduce the Weight of the Lower Arm Excavator. Catia V5 R19 for modeling Excavator and Preprocessing in Hyper mesh and Radioss for solving results are viewed in Hyper view. Altair Optistruct is used for weight reduction and change in design of Excavator of Lower Arm.
81 |
|
|
550-558 |
|
Gesture Recognition Technique:A Review
Abstract
Gesture Recognition means identification and recognition of gestures originated from any type of bodily motion commonly originated from face or hand. It is a technology with the goal of interpreting human gestures via mathematical algorithms; also referred as perceptual user interface (PUI). Gesture recognition enables humans to interact with the machine (HMI) naturally without any physical contact with the machine. This paper focuses on the Gesture recognition concept and different ways of gesture recognition.
82 |
|
|
559-564 |
|
Effect of Positive Dust on Non-linear Properties of Ion-acoustic Waves
Abstract
The nonlinear propagation of the dust-ion-acoustic waves in a dusty plasma consisting of cold and hot ions, stationary and streaming electrons, and charge fluctuating stationary dust has been investigated by employing the reductive perturbation method. It has been shown that the dust charge fluctuation is a source of dissipation, and is responsible for the formation of the dust-ionacoustic shock waves in such a dusty plasma. The basic features of such dust-ion-acoustic shock waves have been identified. It has been proposed to design a new laboratory experiment which will be able to identify the basic features of the dust-ion-acoustic shock waves predicted in this theoretical investigation.
83 |
|
|
565-571 |
|
Detection and Prevention of Wormhole Attacks in Wireless Sensor Networks
Abstract
A Wireless Sensor Network (WSN) is a collection of petite sensor terminals, capable of sensing and communication. Here topology is dynamic Node developments result in dynamic topology and cause link failures in an Ad-hoc. Here focusing on the using of packet scheduling technique for AODV (Ad Hoc on Demand Distance Vector) routing protocol by weight hop based scheduling in this paper. The transitional node starts the packet scheduling and manages its buffer memory according to data transfer rate. Intermediate store the data packets and repair the broken route and manage overflow of data packets. This proposed system attempt to send the data packet by utilizing backup routes opposed to dropping it. It evaluates the planned procedure on NS-2.34 simulator. Simulation results show that proposed scheme performance is better than AODV.
84 |
|
|
572-575 |
|
VEHICLE TRACKING SYSTEM USING GPS & GSM
Abstract
The basic concept of the novel work is to track a vehicle travelling from one place another. The GPS continuously takes input data from the satellite and stores the latitude and longitude values in microcontroller buffer. The GPS element track the vehicle. To activate the GSM module sever has to send a message by which it gets activated. Once GSM gets activated it takes the last received latitude and longitude positions values from the buffer and sends a message to the particular number/ server, which is predefined in the program. The system is implemented using GSM (SIM300) and GPS module. The software configuration accomplished by aurdino firmware.
85 |
|
|
576-580 |
|
BIGDATA FRAMEWORKS IN RESULT ANALYSIS
Abstract
Big Data refers to large and complex data sets in which traditional data processing application software are inadequate to deal with them. Big Data collection, processing and analysis are becoming one of the major concerns for large and small organizations companies and academic institutions. In this paper, we propose a framework which can efficiently detect and avoid redundant computations. One of the most important techniques is the materialized view technique which saves and reuses the result of previous computations.
86 |
|
|
581-595 |
|
VISUAL SECRET SHARING SCHEME AND ROBOST REVERSIBLE WATERMARKING TECHNIQUE FOR PERSONAL HEALTH RECORDS IN MULTICLOUDS
Abstract
The fast development in the term of telecommunication helps on the appearance of variety of modern applications such as the telemedicine where the patients' digital data can transfer over insecure mediums between the doctors for further diagnosis and dealing with these transmitted data. Therefore, the protection of the exchanged medical data is essential especially when working on the cloud computing environment, where the security is considered a major issue. In addition to the security, the high visibility of the medical images must also be achieved. This paper presents a novel approach that guarantees the secure sharing of medical images and revisable watermark technique over the cloud computing environment by providing the mean of trust management between the authorized parities of these data and also allows the privacy sharing of the Patients' Health Records (PHR) string data between those parities while preserving the shared medical image from the distortion. The experimental results show the efficiency of the proposed scheme and also the robustness against various types of attacks.
87 |
|
|
596-603 |
|
Analysis of Opinion Targets and Opinion Words from Online Reviews Partially Supported Alignment Model
Abstract
Analysis of opinions, known as opinion mining or sentiment analysis, has attracted a great deal of attention recently due to many practical applications and challenging research problems. Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. Opinion targets are entities and their attributes on which opinions have been expressed. To perform the tasks, we found that there are several syntactic relations that link opinion words and targets. As compared with previous method which is based on nearest neighbor rules and syntactic patterns, this proposed method captures opinion relations more effectively. This paper proposed the technique and develop the application for taking users feedback regarding particular product that he is interested to purchase. After taking this feedback, the proposed algorithm is applied to perform the analysis regarding that product. The results obtained is useful in performing fine grained analysis of particular product. Our experimental results, helps in business development and taking business decisions for both manufacturers and customers.
88 |
|
|
604-607 |
|
RESTURANT AUTOMATION SYSTEM USING ANDROID
Abstract
In early days, people are not use too the different facilities available to them. But now days, they want more than available things, like quick access to the devices which saves there time, an easy way to do things. Here is a system which not only save customer’s time also a quick access to different thing as per users need. We have designed a restaurant system which is automated in many ways and is handled by the customers them self. In early system, almost ever thing was handled by the hotel / restaurant staff lack of customer interface can be seen in every small and five star restaurants and hotels. Orders are taken on paper by waiter and then circulated to the kitchen staff, this also consumes lots of time and which may result in irritation of customer i.e. impatience in customer behavior. But this system increases quality and speed of service and is one time investment system for the hotels and restaurants. We are implementing this system using android application for Tablet. The front end will be developed using Android studio and the backend will work on SQLite.