Sr/No/ |
Title |
Pdf |
1 |
PLC Based Bottle Filling Capping Labelling & Counting
Kolekar Yogesh D, Mane Vijay B, Patil Aniket s, Thombare Rachana
Abstract — Automation plays an increasingly important role in
the world economy. One of the important applications of
automation is in the soft drink and other beverage industries,
where a particular the field of automation has had a notable
impact in a wide range of industries beyond manufacturing.
Automation is the use of control systems and information
technologies to reduce the need for human work in the
production of goods and services. In the scope of
industrialization, automation is a step beyond mechanization.
Whereas mechanization provides human operators with
machinery to assist them with the muscular requirements of
work, automation greatly decreases the need for human sensory
and mental requirements as well. Liquid has to be filled
continuously. For these kinds of applications. The trend is
moving away from the individual device or machine toward
continuous automation solutions. Totally Integrated Automation
puts this continuity into consistent practice. Totally Integrated
Automation covers the complete production line, from receipt of
goods, the production process, filling and packaging, to shipment
of goods.
|
Download
|
2 |
Survey on Cluster Analysis
Arun Marx.M, Pavithra.T, Praveena.V
Abstract — Data analysis plays a vital role for understanding
various phenomena. Cluster analysis is a challenging field of
research in which its potential applications pose their own special
necessities. Clustering is used to group the similar objects in the
datasets and further precede these clustering data to perform other
data analysis techniques. This paper deals with the types of
clustering techniques and the type of data used in each clustering
technique. And the efficiency of clustering technique over
classification is given in this paper. Several clustering techniques
are discussed here to find out the suitable technique for different
datasets.
|
Download
|
3 |
Self-Employment through Skill Development Initiative
S.Uma Maheswari, Dr.B.Mythili
Abstract — In Indian Economy there is a drastic changes
occurred due to skill development of an individuals. Recent
trends in the composition of employment indicate a migration
from the work on the basis of Agricultural to the Industrial
based & Service Sectors. India has one of the country deals
with young & energetic with high potentialities of people for
ensuring the inclusive Economic Growth. In this context this
paper highlights the self employment of people through their
own skill development.
|
Download
|
4 |
Design of Jitter Spectral Shaping as Robust with
various oversampling techniques in OFDM
Alasapuri Ramya Sri , B. Nagarjuna , Guduru Kalyani , G.Pavani
Abstract — Deformation caused by the jitter acts as a limiting
factor for the performance of the OFDM system in high
data rate. The letter says that oversampling is used to
reduce jitter noise. Two types of techniques, fractional
oversampling and integral oversampling are considered.
The simulation results are compared with the theoretical
results of phase jitter analysis showing very precise
obligations. Oversampling results in 3 dB reduction of jitter
noise for every doubling of the sampling frequency.
|
Download
|
5 |
Design and Analytical Investigation of Disk Brake
Nitin A Patil , Ajay Mahawadiwar
Abstract — Each single system has been studied and developed in
order to meet safety requirement. Instead of having air bag, good
suspension systems, good handling and safe cornering, there is
one most critical system in the vehicle which is brake systems.
Without brake system in the vehicle will put a passenger in
unsafe position. Therefore, it is must for all vehicles to have
proper brake system. In this paper carbon ceramic matrix disc
brake material use for calculating normal force, shear force and
piston force. And also calculating the brake distance of disc
brake. The standard disc brake two wheelers model using in
Ansys and done the Thermal analysis and Modal analysis also
calculate the deflection and Heat flux, Temperature of disc brake
model. This is important to understand action force and friction
force on the disc brake new material, how disc brake works more
efficiently, which can help to reduce the accident that may
happen in each day.
|
Download
|
6 |
Mechanization of bricks manufacturing
C.Prasanth kumar reddy, B. Lokesh kumar, Sathish kumar V S
Abstract — The provision of shelter is one the most basic demand
of a Man all over the World. It is one the most important
challenges a man faces in his life. The problem of good shelter
varies from place to place. A good shelter provides, first and
foremost Security and Privacy. It is an undisputed fact that
shelter is one of the basic human necessities. However,
irrespective of the importance of shelter, most people do not have
access to good shelter, most especially in developing countries.
Now a days time is more precious so people want to complete the
work in less time so in building shelter bricks are the vital
components that cannot be replaced by any another subsidiaries.
Thus, the machine is very affordable for small scale enterprise
(SME). In other words, bricks or blocks produced by using this
machine are relatively cheap and affordable for those in the
rural areas and for low income earners.
|
Download
|
7 |
A Survey of Various Algorithms to Achieve Fault
Tolerance in Wireless Sensor Networks
S.Puvaneswari, S.hemalatha, B.Sangeetha
Abstract — We survey various algorithms for tolerating
permanent and transient failures in Wireless Sensor
Networks. These algorithms attempt to provide low-cost
solutions to fault tolerance, graceful performance
degradation, and load shedding in such systems by
exploiting tradeoffs between space and/or time
redundancy, timing accuracy, and quality of service.
Here we describe various algorithms which are used to
achieve fault-tolerant and increase the performance of a
system. The algorithms are dynamic scheduling, off-line
or static scheduling, and scheduling, a technique which
is used the concepts of mathematical optimization to
allocate tasks on the processors and derive fault tolerant
and fault aware feasibility and diskless check pointing
approach.
|
Download
|
8 |
IoT-On Demand based Location Aware System for Smart
Museum
S.Gnanapriya, A.Karthik, N.AjayKumar
Abstract — In Existing system, today, museums and art galleries
usually provide visitors either with paper booklets or with audio
guides. Visits at museums are often considered boring. It is hard
for museum’s curators to catch the attention of tourists. In
particular, it is difficult to define in advance a tour for all the
visitors, because interests may vary from person to person. To
overcome all these a Cloud environment is maintained by the
admin to store the details of the art work, a wearable device
given to the user which acts as the camera, BLE is used to obtain
the location of the user, camera sends the specific frames to the
processing center and checks for the frame if the frame is been
matched then the cloud content (audio, video, text) is been
retrieved and sent to the user mobile phone.
|
Download
|
9 |
Efficient Multicast Authentication
B.Sangeetha, S.Puvaneswari, S.Hemalatha
Abstract — Conventional block-based multicast authentication
protocols overlook the heterogeneity of receivers in mobile
computing by letting the sender choose the block size, divide a
multicast stream into blocks, associate each block with a
signature, and spread the effect of the signature across all the
packets in the block through hash or coding algorithms. They
suffer from some drawbacks. First, they require that the entire
block with its signature be collected before authenticating every
packet in the block. This authentication latency can lead to the
jitter effect on real-time applications at receivers. Second, the
block-based approach is vulnerable to packet loss in mobile
computing in the sense that the loss of some packets makes the
other packets unable to be authenticated, especially when the
block signature is lost. Third, they are also vulnerable to DoS
attacks caused by the injection of forged packets. In this article
we propose a novel multicast authentication protocol based on
an efficient cryptographic primitive called a batch signature.
Our protocol supports the verification of the authenticity of any
number of packets simultaneously and avoids the shortcomings
of the block-based approach.
|
Download
|
10 |
Energy Efficient Communication In Wireless Sensor
Network
P.Nalayini
Abstract — Energy efficiency is the most promising approach
for addressing the wireless sensor network in
communication networks for wireless big data. In wireless
sensor network the sensors are powered by battery that
drains sooner or later and will have to be taken out and
then replaced or recharged. In the existing system nodes
have utilized same amount of energy for communication
regardless of their distances. To deal with issue the
proposed algorithm focused on efficient utilization of an
energy based on the node distance. Maintaining the lowest
transmission power in wireless sensor network is
vulnerable to the interference fluctuations because of the
bad signal-to interference-plus-noise-ratio (SINR). The
proposed method is to harvest energy from radio
frequency. The exact distance between the nodes can be
calculated and obtained by RSSI measurement. The
parameter of measurement model is determined by anchor
nodes, and further corrects the measurement data, which
can reduce the measurement error. Each node
dynamically adjusts the transmission power and the
received signal strength (RSS) target; hence the optimal
energy is used for the transmission.
|
Download
|
11 |
Scientific Workflows Using Dynamic and Fault-
Tolerant Clustering
R.Ranitha, A.Monika, L.Marutharasi
Abstract — In this project, we conduct a theoretical
analysis of the impact of transient failures on the
runtime performance of scientific workflow executions.
We propose a general task failure modelling framework
that uses a maximum likelihood estimation-based
parameter estimation process to model work flow
performance. Task clustering has proven to be an
effective method to reduce execution overhead and to
improve the computational granularity of scientific
workflow tasks executing on distributed resources.
However, a job composed of multiple tasks may have a
higher risk of suffering from failures than a single task
job. We further propose three fault-tolerant clustering
strategies to improve the runtime performance of
workflow executions in faulty execution environments.
Experimental results show that failures can have
significant impact on executions where task clustering
policies are not fault-tolerant, and that our solutions
yield makespan improvements in such scenarios. In
addition, we propose a dynamic task clustering strategy
to optimize the workflow’s make span by dynamically
adjusting the clustering granularity when failures arise.
|
Download
|
12 |
A Comparative Study of the Customer Satisfaction
between Postal Services and Nationalised Banking
Services
Reshma S
Abstract — People have a propensity of saving out of
their income to secure their future as future cannot be
predicted. To be financially secure, people prefer
saving scheme offering maximum return with
minimum risk. Saving attitude offers safety net
during emergency situations. The major banks in
India are increasingly providing services through
electronic channels such as ATMs, internet banking,
Tele-banking and mobile banking. One of the biggest
problems in banking today is the large and ever
increasing population of the unbanked those who are
not gaining the benefits of the regulated banking
system and must rely on high cost fringe lenders to do
simple transactions like cash their pay checks. The
primary objective of the study is to compare the
satisfaction level of customer between postal and
nationalised bank. The significance of the study in the
recent scenario is due to take in high service charge
by the nationalised bank. So this study reveals that
the customers trend of postal banking services.
|
Download
|
13 |
Collaboration Complexity Reducing Strategy in Cloud
Computing
R. Priya, R. Jeevidha, V. Sowmiya, K. Kiruthiga
Abstract — Cloud computing is an innovative technology that has
been applied to business. The cloud collaboration software
industry is a rapidly developing sector with new key players
breaking into the market each year looking to how we work and
communicate. The project management process and its paradigm
are changing. With Information and Communication
Technologies it’s possible to work together with heterogenic
teams, geographically spread, using web-based project
management software. In these teams, the most important are the
process by which the project is carried out. The collaborative
project is associated with a virtual team that is a team with a real
distance between their members compelled by a purpose. But a
good virtual team relies on the inputs brought, the results
produced, and the process to pass from the first to the second
ones. All the process is held with trust, cohesion, relationship,
communication, and coordination. The management process can
face difficulties. So to face the difficulty it’s necessary to build
trust between team members which rarely or never cross each
other and consolidates all the tasks assigned to personally across
projects and teams, and sorts them by priority. Hence the work
based on multiple projects can be done easily without any
collaboration complexities.
|
Download
|
14 |
Intelligent Decision Support System Towards
Managing Production Of Firm
Akshay Kumar Sahu, Pradeep Sahu
Abstract — In last decade, each firm has begun to
establish the production with rapid rate due to rich
demand of goods with best quality. Many firm
perceived the necessity to balance the production
chain of organization. In the presented research
work, a centroid approach merged with fuzzy set is
applied on constructed G-F-A-L-R supply chain
module for identifying a sick and strong chief driver
of a firm; so that managers could hike their firm’s
performance up to standard level in case of non
wanted performance. An empirical case research of
assumed gear and shaft manufacturing firm is
presented; proposed DSS is active for tracing the GF-
A-L-R supply chain’s sick and strong chief drivers.
|
Download
|
15 |
Intelligent Decision Support System Towards
Measuring Performance Of Firm
Akshay Kumar Sahu, Pradeep Sahu
Abstract — In present era, it is realized in order to
respond the production activities of individual firm in
accordance with customer demand. It became
necessitate to keep the various modern supply chains
well. G-F-A-L-R (Green-Flexibility-Agility-Leanness-
Resilient) SC strategies of SC worked influential to
answer production of firms. In the presented research
work, a multi criterion decision making performance
appraisement module (consist of green flexibilityagility-
leanness-resilient activities corresponding to
their interrelated metrics) coupled with Fuzzy
Performance Index mathematical model has been
proposed to assess the overall performance of
individual firm.
|
Download
|
16 |
A Study on Assessment of Nutritional Status of
Housemaids and Its Effect on Their Health in
Mumbai City
Nikita Waghere, Rekha Battalwar
Abstract — To assess the nutritional status of the housemaids and its
effect on their health in Mumbai City.
|
Download
|
17 |
Automatic Scrap Segregation using PLC
Mangesh B. Nagapure, R. M. Deshmukh
Abstract — This paper deals with the problems faced while
segregation of waste in urban and rural areas. Rapid surge in
bulk and different types of metal and nonmetal scrap is serious
issue due to urbanization and industrialization in the countries.
Hence, we have segregate the scrap materials into metal and
nonmetal categories using PLC mechanism. Also the aim of using
PLC mechanism or any other type of separation of waste on a
machine is to perform work. This system describes an
Automated Scrap Segregation; we are developing a prototype for
separating out metal and nonmetal particles using
Programmable Logic Controller. In this system the scrap will be
fed to the conveyor belt. Object Sensors will detect the Scrap
material on the conveyor belt and start the rotation of conveyor
belt. After this, metal Sensors which are clamped below the
conveyor belt, will sense the metal particles and in turn stop the
conveyor belt. A robotic arm attached to the system will extract
the metal and will deposit it into a metal bin. The scrap material
will be carried on further once the metal is extracted and
dumped into a metal bin.
|
Download
|
18 |
Neighbor Position Verification Protocol for Non Line of
Sight using Multiple Road Side Units in VANET
J.Shiny Susan, P.Chitra
Abstract — Vehicular Ad hoc Networks (VANETs) is a form of
Mobile Ad-hoc Network (MANET), that provide communication
and exchange of information among nearby vehicles, between
vehicles and nearby fixed equipment, usually described as Road
Side Unit (RSU). The information among vehicles is being
exchanged through direct communication within each vehicle’s
radio communication range .In reality, the radio frequency
signals are susceptible to interference and the direct
communication may be restricted by certain topographic
features, man- made structures and other moving vehicles that
are of different sizes and shapes. VANET environment is not only
concerned on fixed obstacles like trees and buildings but also on
moving objects on the road that causes the signal block. Obstacles
create a Non-Line of Sight (NLOS) state that could prevent a
vehicle from receiving consistent updates and Location
information from its neighbors. To overcome NLOS condition
rather than relying on Tall Vehicles for the choosing them as next
hop relay candidates, Neighbor Position Verification
Protocol(NPVP) is used in cooperative neighboring vehicles to
provide optimal solutions in all possible ways. In order to prevent
the vehicles from NLOS state the Location of the vehicles are
identified by considering many scenarios in the road environment
using a Common vehicle or a Road Side Unit (RSU). It will help
to maintain localization services integrity and reliability. It
prevents traffic jam and provides accident control.
|
Download
|
19 |
Bluetooth Enabled Energy Meter for Smart Housing and
Smart Cities
M. Nandini Swami, Srividya Dyaram
Abstract — This research work primarily focused on energy
meter reading, processing and transmitting information of
energy consumed by a consumer. This work is based on
application of Bluetooth technology embedded system
development. Design is well focused on its flexibility, faster data
transfer, low power consumption, cost effectiveness, data
security, small size and light weight.
In this work, an embedded controller is interfaced with the
digital energy meter to get consumed power information in
digital form. Then processes these pulses to calculate number of
units consumed.
The consumer will be able to check the consumption displayed on
the LCD screen and also on the devices paired with the smart
energy meter for continuous operation.
The exponential increase in smarter and better metering, billing
and payments systems rising is demand. We proved a solution
for a smart energy metering system for future upcoming Internet
of Things ( IoT) era WiFi enebled smart cities.
|
Download
|
20 |
A Novel Low Complexity Logic Encryption Technique for
Secure Design
Deeksha Sharma, Shweta Agrawal
Abstract — Several applications demand secure devices to
prevent loss of data or leak of information. The use of
untrusted intellectual property (IP) and foundry may cause IP
theft, IC overproduce, counterfeit and or insert malicious
functionality called hardware Trojan.The logic encryption
technique hides the functionality by inserting additional
circuitry such that the design functions correctly with valid
key and provides wrong output with invalid key. This work
reviews existing insertion based techniques and then presents
a new low overhead logic encryption technique. Designs are
implemented on Tanner and simulated with 45nm technology
file. Simulation results show that proposed techniques
technique provides small area, power and delay over the
existing logic encryption techniques.
|
Download
|
21 |
Review on Logic Encryption Technique for Secure
Hardware Design
Deeksha Sharma, Shweta Agrawal
Abstract — Secure hardware is the prime requirement for the
modern applications such as medical, finance and defense.
The economic constraint and time criticality results in use of
untrusted intellectual property (IP) and foundry which may
cause IP theft, IC overproduce counterfeit and or insert
malicious functionality called hardware Trojan. The logic
encryption technique hides the functionality using additional
circuitry such that the design functions correctly with valid
key only. Several encryption techniques are proposed in the
literature. This work reviews existing insertion based
techniques and then presents comparative analysis. Designs
are implemented on Tanner and simulated with 45nm
technology file. Simulation results provide comparative
analysis of different design metrics.
|
Download
|
22 |
Shape optimization of Primary Air
Duct of Thermal Power Plant Using CFD
N.J. Mohamad afshar farhan, M. Masi, P. Meenakshi sundaram, V.J. Mathan, S. Maniamramasamy
Abstract — Generally simple shape ducts are used in thermal power plants to ease of manufacturing however modification has to be done in order to accommodate interfacing of equipments which are associated with plant operation leading to higher pressure drop, higher power consumption and flow misdistribution zones having higher or lower velocity. To readdress this situation, baffles, guide vanes and other internals components are used to smoothen the flow through ducts especially in bend. The basic disadvantage in using baffles get punctured/eroded due to impact of high velocity ash particles in flue gas ducting and the effectiveness of baffles is lost in short duration. So using guide vanes and deflector plates will be more efficient in coal handling. We have optimized primary air duct to overcome the above disadvantages, the bend of the duct is filleted and guide vanes are attached in the middle of the duct bends in such a way that a more streamlined flow is maintained across any cross-section.
|
Download
|
23 |
A Study on Production and Marketing Constrains of Farmers in Coimbatore District – Tamil Nadu
P. Kanaka Durga Devi
Abstract — India is basically an agrarian society where sole dependence has been on agriculture since time immemorial. In the olden days, the agricultural produce was fundamentally barter by nature where farmers exchanged goods for goods and also against services. Gradually the scenario changed with the changing times and agriculture produce began being sold with an element of commercial value. Trading of agriculture produce began for exchange of money. And from trading to marketing of agricultural produce began although mostly it is a way of traditional selling. The marketing as a term is broader than traditional trading. And agricultural marketing as a concept is still evolving in the Indian agrarian society. Mahatma Gandhi the father of the nation, who always stressed upon ―self sufficient villages‖ as the building blocks for making India a strong nation. Hence, the present study is a modest attempt to throw the more light on the farmers’ problems in marketing of their produce in the study area. The study also gives various recommendations to solve the above said problems. you can type your own text.
|
Download
|
24 |
Gaseous Emission in Electronic Fuel Injection system- A
Review
Sathish M, Loganathan V N, Sugumar M
Abstract — This review paper includes introduction to
Electronic fuel injection and working principles of it. Now a
days all automobile manufacturer are very much concern in
making less emission vehicles inorder to meet the emission
norms. By using carburettor version, automobile
manufacturer cant able to achieve the emission norms. Hence
there is new technology implemented where carburettor
version vehicle are replaced by Electronic Fuel injection
vehicle. Where the fuel injection is totally controlled by
Electronic Control Unit (ECU).
|
Download
|
25 |
Analysis of Karanja Alternate Fuel-A Review
M.Balakrishnan, M.Sugumar
Abstract — Now a days there has been an increasing demand for fuels which has been a challenge for today’s scientific workers. The availability of fossil fuel resources are reducing day by day and there has also been an increase in price level. Bio-Diesel seems to be a solution for future. It is an environmental viable fuel. The main purpose of a our project is to reduce the emission level of exhaust gas(i.eNOx, HC and CO) like a nitrogen oxide, hydro carbon, and carbon monoxide. There are many alternate fuels are available like soy bean, castor, jatropha, neem, undi and moha. In this project we choose karanja oil. The main reason for we choose of this oil is non-edible and non-toxic. The catalysts are KOH, NaOH.
|
Download
|
26 |
Tactile and Kinesthetic Stimulation for the Babies Born Too
Soon: A Review
Umarani J, Sharadha Ramesh, Prakash Saldanha, Rohan Dilip Mendonsa, Kayalvizhi
Abstract — Premature infants face many challenges which are not
faced by the full-term babies. As they are born prematurely they
are not exposed to the same cuddling, holding, and feeding
patterns as of the full-term, healthy newborns. They are often
isolated in incubators and deprived of much of the mechano
sensory stimulation they would otherwise receive. In the
Neonatal Intensive Care Units the infants are exposed to
continuous, noise and bright lights and also lacking the human
touch they would otherwise experience in the hands of the
mother. The advent technologies in the medical field save the
lives of many infants born prematurely. Tactile stimulation is a
form of massage which improves the well being of the neonates
by activating the nerve signals under the skin. Studies showed
that preterm neonates who were massaged cried less, slept better,
gained weight and had lower levels of stress hormones and also
the intervention improved the interaction between mother and
infant compared to the infants who were not given massage. This
article reveals the methods and the research studies evidenced
the benefits of tactile and kinesthetic stimulation.
|
Download
|
27 |
Broken Rotor Bar Fault Detection of Induction Motors
Based on Fast Fourier Transform
Siddharth Jain, Dr. A.K. Wadhwani
Abstract — Induction motors play a key role in the industrial
field. Therefore, continuous monitoring and online diagnostic
system are essential to guarantee the seamless operation of
modern industrial facilities. Condition monitoring and fault
detection of induction motors are of great importance in
production lines. It can significantly reduce the cost of
maintenance and the risk of unexpected failures by allowing the
early detection of potentially catastrophic faults. This paper
proposes a study of broken rotor bar current signal analysis of
motor using Fast Fourier Transform (FFT) algorithm for fault
detection. The experimentations are implemented in a 1.5-kw, 2-
Hp, 3-phase, 415-Volt, 1420-rpm, 4-pole, star connected squirrel
cage induction motor. The experimental results show the
variation of the fault indication signal while the motor is
operated under the broken rotor bar conditions. Motor Current
Signature Analysis (MCSA) is a condition monitoring technique
used to detection problems in induction motors. It is the
technique used to analyse and monitor the trend of dynamic
energized systems.
|
Download
|
28 |
Design and Performance Anaysis of Sequential Circuit Using Clocking Techniques
M.Lavanya angelin, M.Thiruveni
Abstract — The major issue of the VLSI design are area,cost,performance and reliability.But in the last few years power in the circuit is the major problem which is being faced by the very large scale integration industries.The power dissipation usually increased by the clocking system which includes the clock distribution system and sequential element(Flip-flop and Latches).The amount of power dissipation by clocking system in any chip is about 30% to 60% of the total chip power dissipation.So a new paradigm is introduced for clock distribution that uses current rather than voltage to distribute a global clock signal with reduced power consumption.So a new high performance current mode pulsed clock gate enable(CMPCGE)is designed using 45nm CMOS technology in tanner EDA tool.
|
Download
|
29 |
A Study on Organizational Climate with Special
Reference to Patspin India Ltd, Ponneri, Udumalpet
C.Boopathi, P.John Leeson
Abstract — Organizational climate tends to be shared
by all or most members of some social group; is
something that older members usually try to pass on
to younger members; shapes behavior and structures
perceptions of the world. Climate are often studied
and understood at a national level, such as the
American or French climate. Climate includes deeply
held values, beliefs and assumptions, symbols, heroes,
and rituals. Climate can be examined at an
organizational level as well. The main distinction
between organizational and national climate is that
people can choose to join a place of work, but are
usually born into a national climate. The
organizational context in which people work is
characterized by numerous features (e.g., leadership,
structure, rewards, communication) subsumed under
the general concepts of organizational climate and
culture
|
Download
|
30 |
Tongue Diagnosis by Image Segmentation
RinishaBagaria, SulochanaWadhwani
Abstract — Tongue image analysis is a key component in clinical medicine. Tongue diagnosis is unique and important area in diagnosing for most of the diseases. Tongue diagnosing is vast area which helps by processing the tongue images, but the processing of tongue image is not easy task to carry out. But difficulties strikes due to the irregular shape and size of the tongue, here interference of lip also occur with the tongue etc. In this paper, we proposed the K-means clustering image segmentation method for processing the tongue image. The method has some phases such as first, shape detection phase, second, colour extraction and third, texture extraction etc. For shape extraction we use region growing algorithm with an edge detector and it also helps in the pimple detection and cracks detection, for colour extraction we use colour intensity method and for texture extraction we use Local Gabor XOR Pattern it is well known as LGXP method, which is very efficient technique in finding texture from an image. The main aim of this segmentation of tongue image is to reduce the complexity as much as possible.
|
Download
|
31 |
Effect of Intermittent Curing on Compressive Strength of
Concrete
Honey Gaur
Abstract — Curing is essential if concrete is to perform the
intended function over the design life of the structure
while excessive curing time may lead to the escalation of
the construction cost of the project and unnecessary
delays. The parameters of the study include the curing
period [ 7, 14, 21 and 28 day], curing method [Atmosphere
curing, Membrane curing, Fulltime curing, without
curing, under water] and the type of cement [Portland
pozzolo Cement(PPC) 43 grade,].In this study specimens
i.e. cube were cast and cured under different conditions
before testing. The study demonstrates that the method
and duration of curing greatly affects the strength
characteristics of concrete. Hence quality control for
proper field curing is of the almost importance. Studies of
the effects upon strength of the various curing periods of
alternate dry and wet curing at different air temperatures
were done.
|
Download
|
32 |
Design evaluation of industrial robot under mixed
information: A multi objective optimization design
evaluation approach
Vijesh Wani, Devendra Dewangan
Abstract — An industrial robot is a manipulator designed
to move materials, parts and tools, and perform a
variety of programmed tasks in manufacturing and
production settings. Industrial robots are reshaping the
manufacturing industry. They are often used to
perform duties that are dangerous or unsuitable for
human workers. Design evaluation of industrial robot
for any industrial application is difficult tasks in real
time manufacturing. Many robot design evaluation
problems are considered in the context of Multi Criteria
Decision Making (MCDM) in present era. In the
presented research work, the authors have designed an
Multi Objective Decision Making (MODM)
appraisement module, which has been solved by multi
objective optimization design evaluation approach.
|
Download
|
33 |
Developed a module towards evaluating design of
industrial robot
Vijesh Wani, Devendra Dewangan
Abstract — Design evaluation of industrial robot for any
industrial application is difficult tasks in real time
manufacturing. Multi criteria Decision Making dealt
with a set of techniques involving multiple evaluation
criteria facilitating in managerial decision making.
Many robot design evaluation problems are considered
in the context of Multi Criteria Decision Making
(MCDM) in present era. In the presented research
work, the authors has designed an Multi Criteria
Decision Making (MCDM) appraisement module, which
undertook pertinent objective and subjective
dimensions, corresponding to numerical data and fuzzy
data against objective and subjective dimensions,
respectively, is valid for design evaluation. Proposed
module can be solved by multi objective optimization
design evaluation approach, which must handle mixed
information.
|
Download
|
34 |
Design of AXI Coherency Extensions (ACE) to APB
Bridge: Review
Ashish jhariya, Deepika soni
Abstract — Microprocessor performance has improved
rapidly these years. In contrast memory latencies and
bandwidths have improved little. The result is that
the memory access time is the bottleneck which limits
the system performance. In case of larger system
design which requires more number of I/O ports and
more memory capacity the system designer may
interface external I/O ports and memory with the
system. We are using advanced microcontroller bus
architecture with its advanced high performance bus.
The Advanced Microcontroller Bus Architecture
(AMBA) is a widely used interconnection standard
for System on Chip (SoC) design. In order to support
high-speed pipelined data transfers, AMBA supports
a rich set of bus signals, making the analysis of
AMBA-based embedded systems a challenging
proposition. The goal of this is to synthesize and
simulate complex interface bridge between Advanced
eXtensible Interface (AXI) and Advanced Peripheral
Bus (APB) known as AXI2APB Bridge. This also
involves the Back notation for Synthesized of Bridge
module and to perform Functional and Timing
Simulation using Xilinx ISE. In this we are using ace
to APB interfacing via a bridge and using parallel
operations which we are divided the large program or
modules into a smaller one. Here used parallel
pipeline to fast operation. In the thesis we are
proposing to design a very high performance ace to
APB and vice versa bridge and to achieve our
proposed work we have used pipelining for data
transfer.
|
Download
|
35 |
An Efficient 32-bit Multiplier Design for High Speed
Applications using Urdhav-Tiryagbhyam Algorithm
Avani Gurudeo, Dr. Vinod Kapse
Abstract — The use of Vedic mathematics lies in the
fact that it reduces the typical calculation in the
conventional mathematics to very simple once. This is
because the Vedic formulae have been claimed to be
building on the natural principles on which the
human mind works. Vedic mathematics is a several
effective algorithms, which has spread over to various
branches of engineering such as computing. In
computers, typical central processing unit devotes a
considerable amount of processing time in
implementing arithmetic operations, particularly
multiplication operation. In this work, I have studied
different multipliers, which give low power
requirement and high speed, also give information of
‘urdhva-Tiryagbhyam’ algorithm of ancient Indian
Vedic mathematics, which has utilized for
multiplication to improve speed of multipliers. For
Improving our generated result we used the concept
of pipelining and design 4-bit, 8-bit, 16- bit & 32-bit
pipeline Multiplier. The multiplier is implemented
using Verilog HDL, targeted on Spartan-3E and
Virtex-6 FPGA.
|
Download
|
36 |
Design and Verification of New Area Efficient RSA
Algorithm: Review
Ritu, Shivam Solnki
Abstract — This paper, present a new structure to develop
64-bit RSA encryption engine on FPGA that can be
used as a standard device in the secured communication
system. The RSA algorithm has three parts i.e. key
generation, encryption and decryption. The algorithm
also requires random prime numbers so a primarily
tester is also design to meet the needs of the algorithm.
We use right-to-left-binary method for the exponent
calculation. This reduces the number of cycles
enhancing the performance of the system and reducing
the area usage of the FPGA. These blocks are coded in
Verilog and are synthesized and simulated in Xilinx
13.2 design suit.
|
Download
|
29 |
VHDL Implementation of UART with Detecting
wrong bit position and Error Correction
Capability
Sourabh Tiwari, Dr. Vinod Kapse
Abstract — UART is important in industrial environment
which employs multiprocessor for working and in this
process noise is likely to affect the data and due to
which control in system is improper. Several existing
UART resolve this problem by using error detecting
logics which detect error, it detects error and
retransmit the data which takes time which is more
than two times. This paper presents a novel VLSI
implementation of UART designed to include (11,4)
extended hamming code that can correct up to one
error and detect up to two errors. This improves the
noise immunity of the system optimizing the error free
reception of data. The whole design is implemented in
Xilinx ISE 12.2 simulator targeted to Xilinx Spartan 6
FPGA[1].
|
Download
|
38 |
Triple Modular Redundant Fingerprint Recognition
with high throughput: A survey
Swati Sharma, Prof. Anshuj jain
Abstract — Fingerprint recognition system design may
be used for authentication of right person in real time
situation however at RFID based authentication is a not
reliable because it may be used by anyone. Fingerprint
recognition has many of application in society form
authentication; Internet banking, Identity to finding
criminals. limitation of available work is to find correct
person when latent prints (blur fingerprint) normally
available procedure is has less recognition rate for latent
figure prints also time for recognition is also very high
hence it is also require to reduce time for recognition &
improve throughput. Objective for this thesis is to develop
an algorithm which may efficiently recognise latent figure
print with high recognition rate & with high throughput.
Latent fingerprint [1] have very less miniature points less
information to find out correct fingerprint & that does not
let us find correct fingerprint hence it is necessary to
enhance Latent fingerprint [1] quality & to improve
miniature points. To enhance fingerprint quality preprocessing
is done in proposed work with cropping of
fingerprint followed by morphological filter in cropping
centre area of fingerprint & morphological filter uses
erosion & dilation method enhance fingerprint quality &
improve miniature points.
|
Download
|
39 |
Pushover Analysis of Setback Building
Honey Gaur
Abstract — Pushover analysis is a nonlinear static analysis used mainly for seismic effect on building. At the time of Earthquake or seismic vibration maximum framed and R/C building damaged and their response depends on the distribution of mass, stiffness, and strength. This effects is in one or both direction in horizontal and vertical. In multi-storey framed buildings, damage from earthquake ground motion generally initiates at locations of structural weaknesses portion like beam and column joint present in the lateral load. In this case generally irregular multi storey buildings are setback at one side. Reason behind this damage is different distribution of mass of the building. In some cases, these weaknesses may be created by discontinuities in stiffness, strength or mass between adjacent storeys. It also depends on the height of the building , this sudden variation cause many disastrous effect for the people and environment.There are many examples of failure of buildings in past earthquakes due to such vertical discontinuities (like BHUJ Earthquake 2000 in Gujrat ). A common type of vertical geometrical irregularity in building structures arises from reduction of the lateral dimension of the building at specific levels of the elevation. This building category is known as the setback building.
|
Download
|
40 |
Automatic Irrigation System
Kunduru Nirosha, V.Sai Niveditha, S.Vinay
Abstract — This system is designed to develop an
“Automatic Irrigation System” which switches the
pump motor ON/OFF on sensing the moisture
content of the soil. In the field of agriculture, use of
proper method of irrigation is important. The
advantage of using this method is to reduce human
intervention and still ensure proper irrigation.
|
Download
|
41 |
Intruder Detection Using Data Mining Techniques
A Srinivas, Rama Raju
Abstract — Anti-virus systems traditionally use signatures to detect malicious executables, but signatures are over fitted features that are of little use in machine learning. Other methods seek to utilize more general features, with some degree of success. Through this project, we presented a data mining approach that conducts an exhaustive feature search on a set of computer viruses. Data mining methods detect patterns in large amounts of data, and use these patterns to detect future instances in similar data. We can also use classifiers to detect malicious executables. A classifier is a rule set, or detection model, generated by the data mining approach that was trained over a given set of training data.
|
Download
|