VOLUME 3, ISSUE 6, JUNE 2016
AN APPROACH FOR MODELLING OF SECURITY PROCEDURES FOR INFORMATION RESOURCES PROTECTION
Radi Romansky, Irina Noninska
INTUITIONISTIC FUZZY DOT β-SUB ALGEBRA OF β- ALGEBRAS
A. Ramesh Kumar, G. Gomathi Eswari
AUDIO WATERMARKING BY USING REVERSIBLE CONTRAST MAPPING (RCM)
Pandit Madhurima Rajendra, Swati Patil
PARALLEL MEMORY-INTENSIVE MAPREDUCE APPLICATIONS
Ramya.P, Dr. V. Venkatesakumar
PLANNING SCHEDULING AND DELAY ANALYSIS- CASE STUDY
Rathod Rajshekhar Gopal
ENERGY AND EXERG ANALYSIS OF TRIPLE EFFECT VAPOR ABSORPTION AIR CONDITIONING SYSTEM
Imran khan, J P Mani, J P Kesari
SECURE ROUTING AND TRUTHFULL BASED PACKET DROP ATTACKS IN WIRELESS AD HOC NETWORK
T. Parameshwaran, Dr. C. Palanisawmy, R. D. Saranyadevi
SOLAR PV AND BATTERY STORAGE INTEGRATION USING A NEW CONFIGURATION OF A THREE-LEVEL NPC INVERTER WITH ADVANCED CONTROL STRATEGY
N. Rajesh Kumar Gowd, G. Lakshmi Prasanna, E. Maheswara Ashok, S. Yasar Arafath, K. Vijay Kumar, A. Surendra
BATTERY MANAGEMENT ARCHITECTURES FOR ELECTRIC VEHICLES USING CAN CONTROLLER
S. Devaneyan, Dr. V. Kirubakaran
AN AUTOMATED SYSTEM TO FILTER UNWANTED MESSAGE FROM OSN USER WALL
Mr. Sagar A. Dhanake, Prof. V.S. Nandedkar
WEAR BEHAVIOR OF ALUMINIUM METAL MATRIX COMPOSITE WITH SILICON CARBIDE USED FOR BRAKE PADS UNDER DRY FRICTION CONDITION
Mr. A. V. Purkar, Prof. Dr. E.R. Deore
FORCED CONVECTIVE HEAT TRANSFER ENHANCEMENT BY USING CONICAL RING INSERTS- A REVIEW
Shrikant M. Mohale, Prof. P.R. Kulkarni
FINITE ELEMENT ANALYSIS HEAVY VEHICLE LEAF SPRING: A REVIEW
K.J. Kharwade, S.M. Chaudhari, S.A. Giri
INTELLIGENT ENVIRONMENT: A ECSN SMART HOME TECHNOLOGY
Sachin Sonawane, P. B. Borole, Mayur Kadlag
EVOLUTION OF MICROSTRUCTURE DURING THE PREPARATION OF TIB2 REINFORCED IN-SITU ALUMINIUM MATRIX COMPOSITES
Hemanth Kumar V, Ravishankar K.S
MIXED SIMULATED ENERGY OPTIMIZATION MODEL FOR HOUSEHOLD BUILDING HAVING PV ENERGY SYSTEM AND GRID ENERGY SYSTEM
Mohd Hafizullah, Sanjay Gomasta
FINITE ELEMENT ANALYSIS OF CUTTING TOOL AND REGRESSION ANALYSIS FOR INTERNAL TURNING PROCESS
Mahesh Patil, Mrs. Pranjali Deole-Dongre
EXPERIMENTAL ANALYSIS AND MATHEMATICAL MODEL OF AIR COOLED CONDENSER IN DOMESTIC REFRIGERATOR
Sneha Y. Naukarkar, Dr M.M. Gupta, Shruti S. Chouhan, Yogesh V. Borse
DIFFERENTIALLY PRIVATE FREQUENT ITEM SET MINING USING SMART SPLITTING AND OCCT
Miss. Varsha V. Dabhole, Prof. V.S. Nandedkar
GREEN CHEMISTRY ALTERNATIVES FOR SUSTAINABLE DEVELOPMENT IN ORGANIC SYNTHESIS
Dr. Mrs. Sangita Sanjay Makone, Dr. Sandeep Nivruttirao Niwadange
DETECTION OF MISBEHAVING NODES IN AD-HOC NETWORKS
P. Satyanarayana, K.V. Prasad, Yeluri. Sri Harsha
COMPARISON AND ANALYSING THE PERFORMANCE OF AODV AND DSR PROTOCOL IN MANET IN TCP AND UDP ENVIRONMENT
Neelpawan Kalita, Utpal Barman
IMPROVED DYNAMIC S-BOX ENCRYPTION FOLLOWED BY INTER PIXEL DISPLACEMENT FOR SECURE E-MAIL
Vaseeja V, Logaprakash M, Labeed K Abdulgafoor
IMPROVEMENT OF COP AND ENERGY EFFICIENCY RATIO OF DOMESTIC REFRIGERATOR BY USING ADDITIVE IN REFRIGERANT R134A
Shruti S. Chouhan, Sneha Y. Naukarkar, Dr. M.M. Gupta
FAKE ACCESS POINT AND INVALID CLIENT DETECTION ELIMINATION USING AGENT MULTI SOURCING
Miss. Prachi M. Kharat, Prof. N. D. Kale
DISASTER RECOVERY PLANNING FOR DATA CENTERS AND IT SERVICES
Yasin Akıllı, Ali Güneş
HOME AUTOMATION AND INTERNET OF THINGS
Somnath Singh, Debjyoti Saha, Pragya Khaware, Suman Das, Dayanidhi Raj, Subhabrata Das, Chandra Sekhar Nandi
IMPLEMENTATION OF HIGH SPEED MULTIPLIER USING FAST PARALLEL PREFIX ADDER
Pramod Karale, R.D Daruwala
ANALYSIS OF BOX CULVERT UNDER CUSHION LOADING
A. D. Patil, A. A. Galatage
SECURE CLOUD COMPUTING USING DECENTRALIZED INFORMATION FLOW CONTROL
Priyanka S. Mane, Yogesh B. Gurav
CFD ANALYSIS OF INVESTIGATION OF HEAT TRANSFER USING SINGLE SWIRLING JET AIR IMPINGEMENT WITH TWISTED TAPES
Mr. Jaspreet Singh, Mr. Rakesh Kumar, Mr. Parampreet Singh
COMPUTATIONAL FLUID DYNAMICS ANALYSIS OF BLOOD FLOW IN HUMAN AORTA
Yogesh V. Borse, Prof. S.A. Giri
COMPRESSION IGNITION ENGINE SIMULATION USING COMPUTATIONAL FLUID DYNAMICS
V.C. Momale, S.A. Giri, M.S. Yadav
MICROCONTROLLER BASED PATIENT MONITORING SYSTEM USING WIZNET
Balaji K. Shrichippa, Sachin A. Sonawane, P. B. Borole
DESIGN, FABRICATION AND PERFORMANCE ANALYSIS OF SOLAR TUNNEL DRYER USING VARIOUS ABSORBER MATERIALS
Piyush S. Thakre, Prof. S.S. Deshmukh, Pratik Jain
GSN: GACVO– BASED SECURE NAVIGATION FOR VANETS
C. Kiruthika, Prof. N. Gugha Priya
TUBE SIDE OPTIMIZATION OF A COMPACT HEAT EXCHANGER BY GENETIC ALGORITHM
Mona S. Yadav, Sagar A. Giri, Vishal C. Momale
THE EFFECTIVENESS OF IMPLEMENTING TOTAL QUALITY MANAGEMENT IN SOFTWARE DEVELOPMENT
Samar Ahmed Alamri, Azrilah Abdul Aziz, PhD
EMBEDDED SYSTEM DESIGN FOR CANAL GATE AUTOMATION
Shashikumar P. Tale, A. R. Khaladkar, Mukesh Arora, S. K. Shah
DEVELOPING D-MATRIX OF UNSTRUCTURED TEXT USING ONTOLOGY BASED TEXT MINING
Padmini M. Magdum, Prof. V. S. Nandedkar
THE EFFECT OF APPLICATION REQUIREMENT AVAILABILITY ON CLOUD COMPUTING ADOPTION IN JORDAN
Salwa Alsamra, Omar Sabri, Amaal Al-Amawi
VARIOUS BLENDS OF OXY HYDROGEN GAS AND GASOLINE IN 4-S S.I. ENGINE
Pratik Jain, Piyush Thakre, Prof. S.S.Deshmukh
A STUDY ON GOODNESS OF FIT FOR NORMALITY
Tripakshi Borthakur, Bipin Gogoi
COLLISION AVOIDANCE OF TRAINS USING ARM CORTEX M4, RF AND GSM
Smita S Bhavsar, A.N. Kulkarni
A SURVEY ON SVM AND NAIVES BAYES NETWORK TRAFFIC CLASSIFICATION USING CORRELATION INFORMATION
Dipti Tiwari, Bhawna Mallick
FIXED POINTS OF AUTOMORPHISMS PERMUTING THE GENERATORS CYCLICALLY IN FREE SOLVABLE LIE ALGEBRAS
Zerrin Esmerligil
DEVELOPMENT OF ARDUINO BASED QUADCOPTER
Anurag Singh Rajpoot, Namrata Gadani, Sagar Kalathia
MESSAGE AUTHENTICATION AND SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS USING GLOBAL ELLIPTIC CURVE CRYPTOGRAPHY METHOD
J. Ghayathri, M. Jhanani
STUDY OF MODELING AND CONTROL OF RENEWABLE HYBRID ENERGY SYSTEM WITH HYDROGEN STORAGE
Priyanka S Kole
A RELAY NODE BASED ROUTE DISCOVERY ALGORITHM WITH HIGH NETWORK LIFETIME
Sateesh Mathapati, Mrs. Nithya S
ANALYSIS OF CONVENTIONAL CONTROLLERS FOR HIGH PRESSURE RATED MODIFIED CSTR SYSTEM
Jimisha K, Shinu M M
PC BASED OSCILLOSCOPE USING PROCESSOR
Seema Kakade, Dr. S. S. Lokhande
IN-VITRO BIOMECHANICAL ASSESSMENT OF A NEWLY DESIGNED CEMENT LESS FEMORAL STEM
Rahul Ribeiro, Beni Ram Rawal
REVIEW ON SOFT COMPUTING FORMALISMS FOR RANKING OF HAZARDOUS INDUSTRIAL PLANT SITES
T Srinivas Reddy, Dr. Shalini Goel
Abstract
AN APPROACH FOR MODELLING OF SECURITY PROCEDURES FOR INFORMATION RESOURCES PROTECTION
Radi Romansky, Irina Noninska
DOI: 10.17148/IARJSET.2016.3601
Abstract: This article discusses several core aspects of security system organization which are able to guarantee efficient protection of corporative resources. These resources could be stored in a common case as an internal sub-system. Recently many enterprises prefer to store them in data centres relying on cloud services. Nevertheless which one of these two approaches will be applied strong procedures for corporative information security and personal data protection must be defined. In order to investigate security procedures for accessing and using business information in a corporative system the article deals with formalization of the processes by using data flow diagram and modelling by Petri Nets (PN) apparatus (in the stochastic extension). An analytical evaluation of the results is carried out and calculated assessments for a case study are given.
Keywords: Information security, Modelling, Stochastic Petri Nets (SPN), Evaluation.
Abstract
INTUITIONISTIC FUZZY DOT β-SUB ALGEBRA OF β- ALGEBRAS
A. Ramesh Kumar, G. Gomathi Eswari
DOI: 10.17148/IARJSET.2016.3602
Abstract: In this paper, we introduce the notion of intuitionistic fuzzy dot sub algebras on algebras and investigate some of their properties.
Keywords: BCK/BCI algebras, B-algebras, fuzzy dot subalgebra, intuitionistic fuzzy dot subalgebras on algebras.
Abstract
AUDIO WATERMARKING BY USING REVERSIBLE CONTRAST MAPPING (RCM)
Pandit Madhurima Rajendra, Swati Patil
DOI: 10.17148/IARJSET.2016.3603
Abstract: In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of unauthorized distribution, as well as unauthorized tampering of copyrighted audio data is an important technological and research issue. Audio watermarking has been proposed as a solution to tackle this issue. The main purpose of audio watermarking is to protect against possible threats to the audio data and in case of copyright violation or unauthorized tampering, authenticity of such data can be disputed by virtue of audio watermarking. For this I propose a Reversible Contrast Mapping (RCM) which is a simple integer transform that applies to pairs of pixels. For some pairs of pixels, RCM is invertible, even if the least significant bits (LSBs) of the transformed pixels are lost. The data space occupied by the LSBs is suitable for data hiding.
Keywords: Watermarking, Audio watermarking, Reversible Contrast Mapping, Least Significant Bits (LSB's).
Abstract
PARALLEL MEMORY-INTENSIVE MAPREDUCE APPLICATIONS
Ramya.P, Dr. V. Venkatesakumar
DOI: 10.17148/IARJSET.2016.3604
Abstract: The Map Reduce platform has been widely used for large-scale data processing and analysis recently. It works well if the hardware of a cluster is well configured. However, our survey has indicated that common hardware configurations in small- and medium-size enterprises may not be suitable for such tasks. This situation is more challenging for memory-constrained systems, in which the memory is a bottleneck resource compared with the CPU power and thus does not meet the needs of large-scale data processing. The traditional high performance computing (HPC) system is an example of the memory-constrained system according to our survey. The proposed new MapReduce system, which aims to improve Map Reduce performance using efficient memory management. The parallel multi-buffer technique to balance data production from CPU and data consumption of disk I/O's, which implements the non-blocking I/O. The parallel also caches the final merged files output by Map tasks in memory to avoid re-reading them from disks before transferring them to remote reduce tasks. All Map/Reduce tasks in a physical node run inside the execution engine, and therefore in a multi JVM, which is one of the key architectural differences between multi JVM and Hadoop. A multi-threaded execution engine, which is based on Hadoop but runs in a multi JVM on a node. In the execution engine, we have implemented the algorithm of hyper scheduling to job assignment, such as sequential disk accessing, multi-cache and shuffling from memory, and solved the problem of full garbage collection in the MJVM. We have conducted extensive experiments to compare parallel Mammoth with scheduling algorithm against the native Hadoop platform. The results show that the modified mammoth system can reduce the job execution time by more than 80 percent in typical cases, without requiring any modifications of the Hadoop programs. Given the growing importance of supporting large-scale data processing and analysis and the proven success of the MapReduce platform, the parallel Mammoth system can have a promising potential and impact.
Keywords: Map Reduce, HPC, CPU, Mammoth, Hadoop, HDFS, MJVM.
Abstract
PLANNING SCHEDULING AND DELAY ANALYSIS- CASE STUDY
Rathod Rajshekhar Gopal
DOI: 10.17148/IARJSET.2016.3605
Abstract: Planning and scheduling and delay analysis have become an essential part of any project for the timely and economical completion of the project. A proper construction schedule can be used for different purposes. By using construction schedule to predict project completion, contractors can adjust crew size, shifts or equipment to speed or slow the progress. All the construction projects will vary from each other in size. All the projects have time constraint. Delay in completion of project will increase the overall cost of the project. Small projects can be managed efficiently manually; whereas large projects are not so large projects can be better handled by the use of computers. Many types of software are available with the help of which project management can be done easily. Large quantities of different kinds of resources are also required for execution and the risk is more in the case of projects. So planning and scheduling of activities for construction of big projects is essential. In this study, an effort is made in planning, scheduling and delay analysis updating of various activities, which is done by using MS Project and MS Excel software, manpower of each activity is determined and allocation is done using the software. Labor requirement for each activity is calculated from standards obtained from site. An updated schedule, which helps to finish the project well in time with optimum resources and update helps in delay analysis, is under the scope of this study.
Keywords: Planning, Scheduling, Delay analysis, MS Project.
Abstract
ENERGY AND EXERG ANALYSIS OF TRIPLE EFFECT VAPOR ABSORPTION AIR CONDITIONING SYSTEM
Imran khan, J P Mani, J P Kesari
DOI: 10.17148/IARJSET.2016.3606
Abstract: Energy and Exergy analysis of an Air-Conditioning plant which is running for the last four and half year is presented in this paper. This plant is actually a demonstration project installed by Thermax and Ministry of New and Renewable Energy at National Institute of Solar Energy for research purpose. Triple effect vapor absorption chiller is utilized to produce cooling and the input heat is provided by solar energy with the help of parabolic trough collector. Mathematical modeling of vapor absorption chiller is done for formulating the required relations for evaluation. Energy and exergy balance equations of chiller are clearly presented. The results of analysis of chiller shows that the two heat exchangers, (HX I) and (HX II) are the biggest source of exergy destruction, destroying 16.40 % and 8.60 % of exergy respectively. Deviating from the previous published results in literature, absorber is not the component where maximum exergy is destroyed. The components that need to be optimized are the three generators. The COP is also calculated from energy balance and it comes out to be 1.27. Exergetic efficiency of chiller obtained is 9.2 %.
Keywords: Energy, Exergy, Generator, Heat exchanger, Triple effect.
Abstract
SECURE ROUTING AND TRUTHFULL BASED PACKET DROP ATTACKS IN WIRELESS AD HOC NETWORK
T. Parameshwaran, Dr. C. Palanisawmy, R. D. Saranyadevi
DOI: 10.17148/IARJSET.2016.3607
Abstract: Packet dropping attack, which is a crucial issue in networks. Link error and malicious packet dropping are two sources for packet losses. While observing a sequence of packet losses in the network, it is difficult to identify whether the loss is due to link errors or malicious nodes. Packet may be dropped during forwarding of routing information or during data forwarding. Dropping can be due to presents of malicious nodes or due to link error. Hence to improve the detection accuracy, the correlations between lost packets is identified. The proposed method is based on detecting the bitmap between the lost packets over each hop of the path. It provides a truthful and publicly verifiable decision statistics as a proof to support the detection decision. The high detection accuracy is achieved by exploiting the correlations between the positions of lost packets, as calculated from the Audit based elliptic curve cryptography (AECC) which describes the status of each packet in a sequence of packet transmission. Therefore, by detecting the correlations between the lost packets, one can decide whether the packet loss is purely due to link errors, or is a combined effect of malicious drop and link error. Audit node is used to identify the malicious node or not. The Audit management in the WSN is like usually RREQ and RREP message passing between nodes. The energy is used to distinguish between altruism and selfish node.
Keywords: Packet dropping, Secure routing, Attack detection, AECC, Auditing.
Abstract
SOLAR PV AND BATTERY STORAGE INTEGRATION USING A NEW CONFIGURATION OF A THREE-LEVEL NPC INVERTER WITH ADVANCED CONTROL STRATEGY
N. Rajesh Kumar Gowd, G. Lakshmi Prasanna, E. Maheswara Ashok, S. Yasar Arafath, K. Vijay Kumar, A. Surendra
DOI: 10.17148/IARJSET.2016.3608
Abstract: In this paper, a novel configuration of a three-level neutral-point-clamped (NPC) inverter that can integrate solar photovoltaic (PV) with battery storage in a grid-connected system proposed. The strength of the proposed topology lies in a novel, extended unbalance three-level vector modulation technique that can generate the correct ac voltage under unbalanced dc voltage conditions. This paper presents the design philosophy of the proposed configuration and the theoretical framework of the proposed modulation technique. A new control algorithm for the proposed system is also presented in order to control the power delivery between the solar PV, battery, and grid, which simultaneously provides maximum power point tracking (MPPT) operation for the solar PV. The effectiveness of the proposed methodology is investigated by the simulation of several scenarios, including battery charging and discharging with different levels of solar irradiation. The proposed methodology and topology is further validated using an experimental setup in the laboratory.
Keywords: Battery storage, solar photovoltaic (PV), space vector modulation (SVM), three-level inverter.
Abstract
FIRE EXTINGUISHING ROBOT
Mandar R. Deshmukh
DOI: 10.17148/IARJSET.2016.3609
Abstract: The purpose of designing fire extinguishing robot was to protect a building say house, from fire when left unattended. Hence an independent robot was made using embedded system, which would detect fire. Once fire is detected the robot approaches the fire and extinguishes it using centrifugal pump.
Keywords: Sri Jan Board, centrifugal pump, potentiometer.
Abstract
BATTERY MANAGEMENT ARCHITECTURES FOR ELECTRIC VEHICLES USING CAN CONTROLLER
S. Devaneyan, Dr. V. Kirubakaran
DOI: 10.17148/IARJSET.2016.3610
Abstract: Electric Vehicles [EV] of next generation are pushing the development of new battery technologies. To minimize cost and maximize efficiency, vehicle system should have full usable battery storage capacity. Remarkable progress has been achieved on battery technologies for EVs and HEVs [Hybrid Electric Vehicles]. Battery energy densities have steadily increased, and batteries today can be reliably charged and discharged thousands of times. If designers can effectively exploit these advancements in energy capacity, EVs and HEVs have the potential to be competitive with traditional vehicles in terms of cost, reliability, and longevity. An important consideration for the battery pack monitoring system is the communications interface. For communication within a PC board, common options include the Serial Peripheral Interface (SPI) bus and Inter-Integrated Circuit (I2 C) bus. Each has low communications overhead, suitable for low interference environments. Another option is the Controller Area Network (CAN) bus, which has widespread use in vehicle applications. The CAN bus is very robust, with error detection and fault tolerance, but it carries significant communications overhead and high materials cost. While an interface from the battery system to the main vehicle CAN bus may be desirable, SPI or I2C communications can be advantageous within the battery pack.
Keywords: Electric Vehicle [EV], Hybrid Electric Vehicle [HEV], Microcontroller, Controller Area Controller [CAN], CAN Gate way, CAN Bus, LTC6802 [Battery Monitor], Galvanic isolation transformer.
Abstract
AN AUTOMATED SYSTEM TO FILTER UNWANTED MESSAGE FROM OSN USER WALL
Mr. Sagar A. Dhanake, Prof. V.S. Nandedkar
DOI: 10.17148/IARJSET.2016.3611
Abstract: One fundamental issue in today On-line Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now OSNs provide little support to this requirement. To overcome this problem, we propose a system allowing OSN users to have a direct control on the messages posted on their walls. This is achieved through a flexible rule-based system, that allows users to customize the filtering criteria to be matter-of-fact to their walls, and a Machine Learning based soft classifier automatically labelling messages in content-based filtering.
Keywords: Facebook 4j API, Filtered walls, Machine Learning, Filtering Rules, Text Categorization.
Abstract
WEAR BEHAVIOR OF ALUMINIUM METAL MATRIX COMPOSITE WITH SILICON CARBIDE USED FOR BRAKE PADS UNDER DRY FRICTION CONDITION
Mr. A. V. Purkar, Prof. Dr. E.R. Deore
DOI: 10.17148/IARJSET.2016.3612
Abstract: In this paper, the wear behavior of Aluminium Metal Matrix Composite with Silicon Carbide used for Brake Pads under Dry Friction Condition is to be studied. The percentage of silicon carbide is varies from 4 to 13 in four steps. The tribological behavior of composites was investigated by pin on disc apparatus. Percentage reinforcement, load, sliding speed and sliding distance were taken as the process variable. The parameters are set for different levels and in optimum possible combination by Taguchi experimentation design array. Wear rate is obtained as a response of experimentation and then further analyzed in design expert software. Parametric relation is developed in the form of equation for each material composition. At the end all three materials are compared on the basis of wear rate and coefficient of friction. As graphical representation is the most user friendly way of interpretation of statistical data, three-dimensional graphs comparing wear rate of all three materials simultaneously under the influence of individual parameters namely load, sliding distance and sliding velocity are given in results. Conclusions of the present work are, as load and sliding distance increases wear rate also increase, and as the velocity of sliding increases wear rate slightly decrease. Material composition is the major factor influencing the wear rate of brake pad, as the wear rate of all four material are different which is shown in paper in tabulated form. The increase in percentage of silicon carbide increases the wear resistance.
Keywords: wear rate, aluminium metal matrix, SiC, pin on disc apparatus, and design expert software.
Abstract
FORCED CONVECTIVE HEAT TRANSFER ENHANCEMENT BY USING CONICAL RING INSERTS- A REVIEW
Shrikant M. Mohale, Prof. P.R. Kulkarni
DOI: 10.17148/IARJSET.2016.3613
Abstract: In the recent years, heat transfer augmentation techniques plays an important role for improving the rate of heat transfer without affecting the overall performance of the system. Enhanced heat transfer surfaces are mostly used in heat exchanger, air conditioner, refrigeration system, chemical reactor. The high cost of energy and material has resulted in an increased effort aimed at producing more efficient heat exchange equipment. Augmentation techniques increase forced convective heat transfer by reducing the thermal resistance in a heat exchanger. These techniques are broadly classified as passive, active and compound techniques. Passive techniques, where inserts are used in the flow path to intensify the heat transfer, are advantageous when compared with active techniques, because the insert manufacturing process is simple and these techniques can be easily employed in an existing heat exchanger. In this paper, emphasis is given to work dealing with round pipe conical ring inserts. Conical ring inserts are generally more efficient in the turbulent flow compared to the laminar flow.
Keywords: Augmentation techniques, forced convective heat transfer, conical ring insert, heat transfer coefficient.
Abstract
FINITE ELEMENT ANALYSIS HEAVY VEHICLE LEAF SPRING: A REVIEW
K.J. Kharwade, S.M. Chaudhari, S.A. Giri
DOI: 10.17148/IARJSET.2016.3614
Abstract: Fuel efficiency and emission gas regulation of automobiles are two important issues. To fulfill this problem the automobile industries are trying to make new vehicle which can provide high efficiency with low cost. The best way to increase the fuel efficiency is to reduce the weight of the automobile. The weight reduction can be achieved primarily by the introduction of better material, design optimization and better manufacturing processes. The achievement of weight reduction with adequate improvement of mechanical properties has made composite a very good replacement material for conventional steel. Out of many components of automobile, the leaf spring which is required to carry out the whole weight of the vehicle is the best option for replacement of steel material by composite material. FEA analysis would be conveniently used for the analysis. Methodology for the analysis and on the composite material study is carried through literature.
Keywords: Leaf spring, FEA Analysis of leaf spring.
Abstract
INTELLIGENT ENVIRONMENT: A ECSN SMART HOME TECHNOLOGY
Sachin Sonawane, P. B. Borole, Mayur Kadlag
DOI: 10.17148/IARJSET.2016.3615
Abstract: Intelligent Environments mark out physical environments in which sensor networks are used to assemble information of the surroundings in which we live. Which deals with the design and implementation of environment sensing system based on Arduino and ZigBee using embedded controlled sensor network (ECSN). Sensor networks are compact wireless networks of small, low-cost sensors, which collect and spreads environmental data. So called intelligent environment as it helps inhabitants to automate task components. They have applications in a variety of fields such as environmental monitoring, military purposes and gathering sensing information in inhospitable locations. In the proposed system Arduino based controller and wireless sensors are used to control various parameters of home and are networked to monitor the information regarding the home environment using ZigBee and Visual Basic06. Using Visual Basic06 the various parameters are displayed on GUI panel and also parameters versus time graph is plotted. This paper presents an idea of low cost and less power consuming smart home system. This system is flexible and controlled by user friendly Embedded System. Purpose of system to enhance ordinary life and automate non living things.
Keywords: Intelligent Environments, ZigBee, Arduino, Visual Basic06, ECSN.
Abstract
EVOLUTION OF MICROSTRUCTURE DURING THE PREPARATION OF TIB2 REINFORCED IN-SITU ALUMINIUM MATRIX COMPOSITES
Hemanth Kumar V, Ravishankar K.S
DOI: 10.17148/IARJSET.2016.3616
Abstract: AA6082 aluminium alloy was reinforced with 5wt% of TiB2 particles using the Flux Assisted Technique (FAS) using inorganic K2TiF6 and KBF4 salts at 800ºC. The evolution of the microstructure and the grain size effect was investigated by varying the reaction time of the salt with aluminium alloy melt. The reaction time was varied from 0-90min in steps of 30min. At lower reaction time the presence of more number of Al3Ti, AlB2 particles were predominantly observed. As the reaction time increased the formation of more number of TiB2 particles in the matrix alloy was evident. At lower reaction time of 30min the grain size of the composite decreased compared to the matrix alloy due to the presence of more number of effective Al3Ti nucleant particles, whereas at higher reaction time increase in grain size was observed due to the absence of Al3Ti particles, which dissociates to form TiB2 particles.
Keywords: AA6082-TiB2 composite, in-situ processing, microstructure evolution.
Abstract
MIXED SIMULATED ENERGY OPTIMIZATION MODEL FOR HOUSEHOLD BUILDING HAVING PV ENERGY SYSTEM AND GRID ENERGY SYSTEM
Mohd Hafizullah, Sanjay Gomasta
DOI: 10.17148/IARJSET.2016.3617
Abstract: This research work lay work laid emphasis on the efficient usage of energy transmitting module and the advantageous integration of renewable energy into household energy systems, the use of building energy management systems (BEMS) for the efficient use of the energy is undeniable. In this research work, we have focused on a modulated BEMS and its ability to modify or build architecture according to the need and personal specification or preferences that enable an adjustable and flexible way towards the optimization of building energy system. This approach is able to achieve the continuous energy flow in the building and across all energy transmitting module as well as the mutually dependency between the appliances and other devices, as long as this observatory approach is used for the devices and optimizing its operational system. The estimations with the help of simulated model and comparison with real world model shows the ability of the BEMS to improve the efficient use of energy, self-consumption, and self-reliance as well as to minimizing the energy consumption and costs/unit by an improved arrangement of the devices that considers all energy transmitting module in the buildings as well as its mutually dependent appliances and devices. A simulated mixed energy optimization model for optimal energy management strategy for household building using PV energy system and grid-connected energy system is developed. The simulated model is tested for various maximized values of the storage battery in storage system which can be consumed for household requirement at any point of time and minimizing the energy consumption from the grid-energy system. In this study we have considered four houses nearby in the neighborhood which are using both PV energy system and grid-energy system along with the battery storage. This simulated model is able to provide us with satisfactory solution than other algorithm with comparably a less computational effort and processing time.
Keywords: Simulated, Optimization model, grid energy, PV energy.
Abstract
FINITE ELEMENT ANALYSIS OF CUTTING TOOL AND REGRESSION ANALYSIS FOR INTERNAL TURNING PROCESS
Mahesh Patil, Mrs. Pranjali Deole-Dongre
DOI: 10.17148/IARJSET.2016.3618
Abstract: In machining heat is generated during machining operation which affects tool life and tool wear. In this study cutting tool temperature is determined during internal turning process at different levels of cutting parameters. For temperature measurement IR pyrometers is used during machining process. IR pyrometer is non-contact high temperature measurement type of instrument. Finite element simulation of cutting tool insert is done in this study to find out temperature distribution on cutting tool. In this study, the temperature distribution on cutting tool insert during internal turning process was found with the help of finite element analysis. FEA is carried out by using ANSYS workbench 15. In this study experimental results and FEA results are compared and their percentage difference is not more than 10%. Regression analysis is done to find out mathematical expression for cutting tool temperature. From this regression equation cutting tool temperature is calculated at different parameters. By changing the levels of cutting parameters, work piece material, tool materials and at different ambient conditions, cutting tool temperature is calculated.
Keywords: FEA, Internal Turning Process, IR pyrometer.
Abstract
EXPERIMENTAL ANALYSIS AND MATHEMATICAL MODEL OF AIR COOLED CONDENSER IN DOMESTIC REFRIGERATOR
Sneha Y. Naukarkar, Dr M.M. Gupta, Shruti S. Chouhan, Yogesh V. Borse
DOI: 10.17148/IARJSET.2016.3619
Abstract: Refrigerator is one of the home appliances operating on vapour compression cycle in its process. Performance of the system becomes the main issue and many researches are still going on to evaluate and improve the performance of any used system. The main objective of this experimental investigation is to enhance the heat rejection rate of the condenser by incorporating axial fan with maximum speed of 4.6m/s at the bottom of condenser tube and the performance is analysed by natural and forced convection condenser under varying mass flow rate of air and refrigerant (R134a). Results of experimentation revealed that Heat rejection rate of forced convection condenser increased by 36.5% and COP is improved up to 33.43%. The performance of system is also evaluated by multiple linear regression analysis and a mathematical model is developed for both natural and forced convection to computed predicted COP.
Keywords: Refrigerator- COP Enhancement of Household Refrigerator - Condenser - Multiple linear regression.
Abstract
DIFFERENTIALLY PRIVATE FREQUENT ITEM SET MINING USING SMART SPLITTING AND OCCT
Miss. Varsha V. Dabhole, Prof. V.S. Nandedkar
DOI: 10.17148/IARJSET.2016.3620
Abstract: Frequent item set mining (FIM) is one of the most fundamental problems in data mining. In this paper, a differentially private FIM algorithm is given which can not only achieve high data utility and a high degree of privacy, but also offer high time efficiency. A differentially private FIM algorithm is based on the FP-growth algorithm, which is referred to as PFP-growth. The PFP-growth algorithm consists of two main phases, preprocessing phase and mining phase. In the preprocessing phase, a smart splitting method is used to transform the database. In the mining phase, to cover the information loss caused by transaction splitting, we used a run-time estimation method to estimate the actual support of item sets in the original database. Through formal privacy analysis, we show that our PFP-growth algorithm is differentially private. After this one-to-many data linkage method is used to link different item sets and this method is based on One Class Clustering Tree (OCCT).
Keywords: Frequent Item set Mining, Differential Privacy, Smart Splitting, OCCT, Data Linkage, and Clustering Tree.
Abstract
GREEN CHEMISTRY ALTERNATIVES FOR SUSTAINABLE DEVELOPMENT IN ORGANIC SYNTHESIS
Dr. Mrs. Sangita Sanjay Makone, Dr. Sandeep Nivruttirao Niwadange
DOI: 10.17148/IARJSET.2016.3621
Abstract: This paper includes green efforts towards awareness of green chemistry as an alternative for organic synthesis on existing methods and provides new tools, knowledge and design of organic synthesis in a way which will contribute to the societal economy to protect environment and health. To avoid the environmental hazards generated from organic synthesis green chemistry alternatives plays a key role in sustaining the planet from gray effect of various chemical and solvents in synthesis.
Keywords: Green Chemistry, sustainable development, green alternatives, organic synthesis.
Abstract
COMPARISON AND ANALYSING THE PERFORMANCE OF AODV AND DSR PROTOCOL IN MANET IN TCP AND UDP ENVIRONMENT
Neelpawan Kalita, Utpal Barman
DOI: 10.17148/IARJSET.2016.3623
Abstract: Mobile Ad-hoc system framework (MANET) is a self decision plan of flexible centers related by remote associations. Each center point acts as an end system and in addition a change to forward packs. The centers are permitted to move about and create themselves into a framework. These center points change position a significant part of the time. The essential classes of routing protocol are Proactive, Reactive and Hybrid. A Reactive (on-interest) routing strategy is a predominant coordinating grouping for remote uncommonly selected directing. It is a decently new directing rationale that gives a versatile response for the most part broad framework topologies [1]. The framework takes after the prospect that each center tries to decrease sending in order to guide overhead coordinating packs at whatever point a correspondence is inquired. In this paper an endeavour has been made to analyze the execution of two conspicuous on demand responsive routing protocol for MANETs: Ad hoc On Demand Distance Vector (AODV) and Dynamic source routing protocol (DSR). Here we are analysing and comparing AODV and DSR protocol in TCP and UDP environment by varying number of nodes. we will analyse the Throughput, End-To-End Delay and Packet delivery ratio. We will analyse the result for both the protocols and compare them which protocol best suit in which environment.
Keywords: MANET, NS-2 Simulation tool, Routing, AODV, DSR, TCP, UDP.
Abstract
IMPROVED DYNAMIC S-BOX ENCRYPTION FOLLOWED BY INTER PIXEL DISPLACEMENT FOR SECURE E-MAIL
Vaseeja V, Logaprakash M, Labeed K Abdulgafoor
DOI: 10.17148/IARJSET.2016.3624
Abstract: The security of the E-mail messages is an important issue; no such security is supported by the Internet standards. To overcome the attacks and to improve the security a new model is used which is "Secure Mail using Visual Cryptography". In this method the messages have to be transmitted is converted into a gray scale image. Then (2, 2) visual cryptographic shares are generated from the gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm using Wavelet Transform and authenticated using Public Key based Image Authentication method. One of the shares is send to a server and the second share is send to the recipient's mail box. The two shares are transmitted through two different transmissions medium so man in the middle attack is not possible. If an adversary has only one out of the two shares, then he has absolutely no information about the message. At the receiver side the two shares are fetched, decrypted and stacked to generate the grey scale image. From the grey scale image the message is reconstructed .But in this can see an outline of image from one share. And also Encryption techniques used for encrypting textual data does not work with images, so separate encryption techniques are required for images. So, we proposed here a new scheme for image encryption which is helpful for end to end secure transmission of digital information on open network using explosive block displacement followed by inter-pixel.
Keywords: chaos based image encryption algorithm, low frequency wavelet coefficient, visual cryptography, dynamic s-box algorithm, wavelet decomposition, Image Encryption, Block, Transformation, Inter-Pixel.
Abstract
IMPROVEMENT OF COP AND ENERGY EFFICIENCY RATIO OF DOMESTIC REFRIGERATOR BY USING ADDITIVE IN REFRIGERANT R134A
Shruti S. Chouhan, Sneha Y. Naukarkar, Dr. M.M. Gupta
DOI: 10.17148/IARJSET.2016.3625
Abstract: Refrigerator-freezers are one of the major energy consuming appliances in the household environment, and so more attention should be paid in improving their efficiency throughout the world. A certain additives are provided by a company Infinity HVAC, which can be used in the refrigeration and air conditioning system. These additives are a chemical solution which helps in improving the performance of the system and reducing the energy consumption of the system by removing oil fouling from the inner surface of the evaporator and condenser. The system used in this work is 165 litre domestic refrigerators with R134a as a working refrigerant. Experimental results have shown that the COP is increased by 7 % and energy consumption is increased by 4.48 %.
Keywords: Performance additive, Refrigerator, COP, Energy efficiency ratio, R134a.
Abstract
FAKE ACCESS POINT AND INVALID CLIENT DETECTION ELIMINATION USING AGENT MULTI SOURCING
Miss. Prachi M. Kharat, Prof. N. D. Kale
DOI: 10.17148/IARJSET.2016.3626
Abstract: Presently a day's remote (wireless) LAN is broadly utilized as a part of many public open spaces. Wireless access points expand wired network. It gives more flexibility to the clients. One of the fundamental concerns is that of Rogue Access Points (RAP). These security threads which bring about extreme damage to hierarchical information and assets could be because of inside or outer cause. Access point could be one reason which might permit attackers to break the security of authoritative system and permit them to get to sensitive data from system. The access points deployed without clear and definite permission from network administrator are called unauthorized, fake or rogue access point. There are numerous chances of presences of RAP in LAN. Rogue Access Points (RAPs) is one of the primary security threads in current framework circumstance, if not honestly dealt with in time could lead from minor framework issues to genuine system network failure. We propose a Multi-Agent Sourcing Based Methodology, which recognizes Rogue Access Point as well as totally eliminates it. This Methodology has the going with phenomenal properties: (1) it doesn't require any particular equipment or hardware; (2) the proposed calculation identifies and totally disposes of the RAPs from system; (3) it provides a cost-effective solution. The proposed procedure can block RAPs and also remove them from the systems.
Keywords: WLAN, RAP, Multi-Agent Source.
Abstract
DISASTER RECOVERY PLANNING FOR DATA CENTERS AND IT SERVICES
Yasin Akıllı, Ali Güneş
DOI: 10.17148/IARJSET.2016.3627
Abstract: In accordance with the technological developments in today's world many companies implement their vital operations on their data centers and IT services.In connection with the fast development in technology and risimg complexity of business processes, the control of the systems and critical data that companies have, became more and more complicated. Therefore; it became an obligation for most companies to have a well-organized "Disaster Recovery Plan".
Keywords: Disaster Recovery, Business Continuity, Disaster Recovery Plan, Disaster Management.
Abstract
REVIEW ON MISBEHAVIOR ON VANET
Neha kushwah, Prof. Abhilash Sonker
DOI: 10.17148/IARJSET.2016.3628
Abstract: VANET is system which is permitted to have correspondence and well-being on street vehicle like autos. In vehicular system numerous malignant exercises are performed that are destructive to drivers and also travelers. VANETs have now been arranged as sheltered systems that auto utilizes for correspondence on parkways or urban situations. Alongside the favorable circumstances, there emerge countless in VANET, for example, provisioning of QoS, high availability and transmission capacity and well-being to auto. In this paper, showing a brief study on VANET, and is connected assaults. These assaults upset this system in a way that outcomes in corruption of exhibitions. Counterfeit Neural System that empowers conglomerating judgments and keeps the one-sided choices is additionally amassed in this paper.
Keywords: VANET, Attacks, security.
Abstract
HOME AUTOMATION AND INTERNET OF THINGS
Somnath Singh, Debjyoti Saha, Pragya Khaware, Suman Das, Dayanidhi Raj, Subhabrata Das, Chandra Sekhar Nandi
DOI: 10.17148/IARJSET.2016.3629
Abstract: This paper introduces a system, which uses the idea of Internet of Things for bringing in automation in our homes. Internet of Things or IoT is nothing but an evolved version of Internet, which includes sensors, consumer electronic devices and other embedded systems connected to it besides computers, smart phones and tablets to collect and exchange data with one another. This interaction of data is the key element behind the development of this proposed system. The system consists of different sensor modules, ubiquitous microcontroller board Arduino Mega 2560, various household electrical devices connected to the microcontroller board via the relay and a computer connected to the Internet. The sensor modules are used to find the number of persons, ambient temperature, humidity and light prevailing in a room. These values along with the user made requests are then used to control the various electrical devices connected via the relay, by the microcontroller and also conveyed to the end user on a website.
Keywords: Internet of Things, Home Automation, Arduino microcontroller board, Relay.
Abstract
IMPLEMENTATION OF HIGH SPEED MULTIPLIER USING FAST PARALLEL PREFIX ADDER
Pramod Karale, R.D Daruwala
DOI: 10.17148/IARJSET.2016.3630
Abstract: With the rapid advancement in information technology, there is a huge demand for high speed processors. This has led to design of advanced processors capable of performing all mathematical computations at a faster speed. Multiplication is one such dominating computational technique which plays an important role as far as speed is concerned. In this paper, design and implementation of multiplier using Vedic mathematics named as Urdhva Triyakbhyam which incorporates Kogge Stone adder is presented. Adder is a parallel prefix derived from carry look-ahead adder which is the faster. This multiplier is implemented on Xilinx Board is shown to have exhibited high performance in terms of speed in the simulations.
Keywords: Urdhva Triyakbhyam, Kogge Stone adder, Xilinx Board.
Abstract
ANALYSIS OF BOX CULVERT UNDER CUSHION LOADING
A. D. Patil, A. A. Galatage
DOI: 10.17148/IARJSET.2016.3631
Abstract: Box culverts are the structures constructed below highways and railways to provide access to the natural drainage across them. The opening of the culvert is determined based on the waterway required to pass the design flood, whereas the thickness of the culvert section is designed based on the loads applied on the culvert. Culverts and bridges often serve the same purpose; however, they differ on the size of the structure. Box culverts are ideal for flows where hydraulic head is limited. For an equivalent waterway area to circular pipes, box culverts can be configured to have less impact on upstream water levels and downstream flow velocities than equivalent pipe structures. This report devotes to the box culverts constructed in reinforced concrete having different aspect ratios. The box culverts are analyzed for varying cushion and no cushion loading. The main emphasis is given to the behavior of the structure under the types of loading as per IRC codes and their combinations top produce worst effect of loading for safe structure. Comparison and conclusion are made on the basis of maximum bending moments shown for different loading cases.
Keywords: Aspect ratio, Bending Moments, IRC, Cushion, Earth pressure, Surcharge loading.
Abstract
SECURE CLOUD COMPUTING USING DECENTRALIZED INFORMATION FLOW CONTROL
Priyanka S. Mane, Yogesh B. Gurav
DOI: 10.17148/IARJSET.2016.3632
Abstract: There is major demand to introduce cloud computing in many organizations today. The reason is cloud's sharing infrastructure, multi-tenancy and huge storage facilities ensures increase in computing efficiency, flexibility, generality and cost effectiveness. But with this, organizations want that the computing platform should be secured and should satisfy all the important rules and regulations. So security is the key point for the success of cloud computing. It is examined that cloud computing is less satisfactory in providing security due to its heterogeneity. In this paper a solution named - Decentralized Information Flow Control (DIFC) is defined to solve the problem of security specifically of Software as a Service (SaaS) level. DIFC is a Mandatory Access Control method which is able to provide better security and integrity than is provided by other approaches available today. DIFC enforce general policies by using proper labeling and checking methods. DIFC gives a way to control and monitor the flow of data continuously according to the policy. Hence we believe that DIFC is a powerful tool to enhance SaaS cloud security and to help cloud providers to satisfy rules and regulations and audit this compliance with easy in future.
Keywords: Decentralized Information Flow Control, Cloud security, Access control, labeling.
Abstract
CFD ANALYSIS OF INVESTIGATION OF HEAT TRANSFER USING SINGLE SWIRLING JET AIR IMPINGEMENT WITH TWISTED TAPES
Mr. Jaspreet Singh, Mr. Rakesh Kumar, Mr. Parampreet Singh
DOI: 10.17148/IARJSET.2016.3633
Abstract: This paper reports the computational fluid dynamics (CFD) modelling of heat transfer analysis from a heated target surface, using single swirling jet air impingement at different Reynolds numbers. Swirl is produced by using a nozzle body with half-length downstream twisted tape insert (HLDI). The nozzle to plate (target surface) distance and twist ratio (y) of twisted tape is taken to be constant as 21mm (H/D = 1) and y = 2.93 respectively. Different Reynolds numbers as 12000, 17000, 22000 and 27000 are used to investigate the heat transfer characteristics on heated surface.
Keywords: CFD, Swirling jet, Reynolds number, Heat transfer.
Abstract
COMPUTATIONAL FLUID DYNAMICS ANALYSIS OF BLOOD FLOW IN HUMAN AORTA
Yogesh V. Borse, Prof. S.A. Giri
DOI: 10.17148/IARJSET.2016.3634
Abstract: Computational fluid dynamics becomes a powerful tool to gain insight into the physical behaviour of the cardiovascular system. An area of cardiovascular disease has received little attention from a computational viewpoint is the analysis of arterial stiffening with age and disease and its relationship with the underlying blood flow behaviour. Due to the complex geometry and material properties of the Aorta, therein, large-scale three dimensional computational models of arterial mechanics can improve our ability to interpret current clinical hemodynamic metrics and to advance our fundamental understanding of the mechanisms of disease progression. In the present research, three dimensional geometry of Aorta is created in CATIA and blood flow behaviour is analysed by Ansys CFX. Mainly, pulsatile flow is investigated for 10 timesteps, Blood is modeled as Newtonian fluid, and the viscous laminar model is employed for the analysis. The CFD simulations successfully produce the effect of blood pressure on the structure of human Aorta; this demonstrated that the methodology can be used to explore blood flow behaviour in Aorta and to relate these to important clinical issues.
Keywords: computational fluid dynamics (CFD), Aorta, Ansys CFX.
Abstract
COMPRESSION IGNITION ENGINE SIMULATION USING COMPUTATIONAL FLUID DYNAMICS
V.C. Momale, S.A. Giri, M.S. Yadav
DOI: 10.17148/IARJSET.2016.3635
Abstract: Combustion efficiency and emission levels are prime concern for the compression ignition engines, which should have high combustion efficiency and meet the stringent emission norms. Combustion is very complex phenomenon which cannot be analyzed easily with the analytical method or different visualization technique. Computational Fluid Dynamics (CFD) has becoming useful tool in understanding the fluid dynamics of IC Engines for design purposes. The methodology for CFD analysis involves use of CATIA V5 for geometry creation. ANSYS FLUENT is used as solver. CFD analysis is able to predict in cylinder combustion, peak pressure and peak temperature hence proposed combustion model can be utilizes for combustion analysis.
Keywords: Computational Fluid Dynamics, CI engine, Combustion modeling.
Abstract
DESIGN, FABRICATION AND PERFORMANCE ANALYSIS OF SOLAR TUNNEL DRYER USING VARIOUS ABSORBER MATERIALS
Piyush S. Thakre, Prof. S.S. Deshmukh, Pratik Jain
DOI: 10.17148/IARJSET.2016.3637
Abstract: Sun drying of agricultural products is the traditional method employed in most of the developing countries. Sun drying is used to denote the exposure of a commodity to direct solar radiation and the convective power of the natural wind. Drying is cheapest and most common method of preservation and storing of agricultural products. It was observed that dryer efficiency continuously changing during drying process due to change in solar radiation and temperature. Performance of solar tunnel dryer is depends upon on different performing parameters. The flow rate, temperature and relative humidity of drying air plays major role in drying. Also moisture content in product, area of collector plate, thickness of polythene sheet, absorbing material and thickness of drying layer are important parameter. The main aim of this project is do the performance evaluation of solar tunnel dryer by varying input performing parameters such as absorber material for collector area flow rate of drying air and thickness of polythene sheet and to determine the output performance parameters such as efficiency of solar tunnel dryer, Time required for drying agricultural product, and cost of solar tunnel dryer.
Keywords: Solar tunnel dryer, Performance parameter, Absorber material, OSD (Open Sun Drying).
Abstract
GSN: GACVO– BASED SECURE NAVIGATION FOR VANETS
C. Kiruthika, Prof. N. Gugha Priya
DOI: 10.17148/IARJSET.2016.3638
Abstract: The vehicular ad-hoc networks are described by high mobility of nodes, which resulting in regular and rapid changes in the network topologies. A trust based framework is proposed for safe and reliable information dissemination in vehicular networks. Group Based Receiver-Driven Protocol divides the network into clusters or groups, where nodes are grouped using the same search query like the same direction or same destination route, or so on. Each cluster has a cluster head (Group Leader), its task is to manage communication processes inside, and to outside its cluster. The proposed scheme has the benefit of using real-time road environment to figure a better route and at the same time, the information source can be correctly authenticated. Protecting the privacy of the drivers, the query (destination) and the driver who issues the query are assured to be unsinkable to any party including the trusted authority.
Keywords: Vehicular ad hoc networks, Group based receiver-driven Protocol, Request and reply propagation, Clustering.
Abstract
TUBE SIDE OPTIMIZATION OF A COMPACT HEAT EXCHANGER BY GENETIC ALGORITHM
Mona S. Yadav, Sagar A. Giri, Vishal C. Momale
DOI: 10.17148/IARJSET.2016.3639
Abstract: The present work is concentrated on optimization of Compact Heat exchangers. For this a louvered fin flat Tube Compact Radiator is considered as case study. Optimization is carried out by means of Genetic Algorithm. The task of optimization may be considered as a design process, in which any possible variables will be evaluated based on requirements. Savings of materials or energy, as well as capital cost and operating cost, are common objectives for industrial applications of heat exchangers. In this work, the GA technique is used in the geometrical optimization of compact heat exchanger in order to obtain optimal results under specified design objectives within the allowable pressure drops. Heat Transfer rate is considered as objective function whereas Tube side parameters are taken for optimization. The outcomes of Genetic algorithm formulation showed 17.77 % increase in Heat Transfer rate that to with decrease in each considered parameter.
Keywords: Compact heat exchanger, Genetic algorithm, Optimization.
Abstract
THE EFFECTIVENESS OF IMPLEMENTING TOTAL QUALITY MANAGEMENT IN SOFTWARE DEVELOPMENT
Samar Ahmed Alamri, Azrilah Abdul Aziz, PhD
DOI: 10.17148/IARJSET.2016.3640
Abstract: The following paper examines the effectiveness of total quality management regarding the software development process. Sufficient discussion focuses on the real-world issues as well as the methodological concepts of software development that affect quality. While a significant portion is dedicated to the examination of scholarly articles and publications on the subject matter, this paper includes problem statements and presents several alternatives, solutions, and approaches for effective quality management. The conclusion consolidates the research and recommendations discussed throughout the paper.
Keywords: quality; quality management; stakeholders; communication; software; development process; failure; tools.
Abstract
EMBEDDED SYSTEM DESIGN FOR CANAL GATE AUTOMATION
Shashikumar P. Tale, A. R. Khaladkar, Mukesh Arora, S. K. Shah
DOI: 10.17148/IARJSET.2016.3641
Abstract: The water discharge from the canal depends on the various canal parameters viz. upstream water level, downstream water level, canal dimensions, etc. For the correct water distribution, the upstream and downstream water levels need to be maintained properly. Continuous discharge of water at constant rate is can be achieved by keeping the difference between upstream and downstream water levels constant. The canal gate opening needs to be corrected according to the changes in the upstream water level, desired water discharge, flow rates, etc. The Proportional Integral Derivative (PID) control algorithms are robust and efficient to achieve zero steady state error. Thus in order to maintain the correct the gate position, PID algorithm can be used. A PID algorithm based embedded system is implemented to maintain the upstream water level in the canal at constant desired level. The implemented system maintains the desired upstream water level within the acceptable tolerance limits.
Keywords: Upstream water level, downstream water level, canal dimension, PID algorithm.
Abstract
DEVELOPING D-MATRIX OF UNSTRUCTURED TEXT USING ONTOLOGY BASED TEXT MINING
Padmini M. Magdum, Prof. V. S. Nandedkar
DOI: 10.17148/IARJSET.2016.3642
Abstract: Every complex system interacts with its environment to perform number of tasks within acceptable tolerances. Any change in performance or unacceptable result is treated as fault or error. The Fault Detection and Diagnosis (FDD) technique is used to determine such faults or errors, to find the root cause and to take necessary actions to prevent such error to occur in the system. This will protect the system from damage and will give maximum throughput. Fault Dependency D-matrix is one such approach to find faults at different levels which consists of dependencies observed and actual failure symptoms associated with the system. But in practical it's difficult to construct d-matrix . In this paper we define a text mining method based on ontology for automatically constructing D-matrix by mining thousands of unstructured data. In this method we first construct the fault diagnosis ontology consisting of concepts and relationships usually observed and examined in the fault diagnosis domain. Then we use the text mining algorithms that make use of the ontology concept to develop the D-matrix. Then we use the text mining algorithms that make use of the ontology concept to develop the D-matrix. Next Graph is created for every D Matrix & from all generated graphs similarity graph is created.
Keywords: Text mining, D-matrix, fault detection and diagnosis, text processing.
Abstract
THE EFFECT OF APPLICATION REQUIREMENT AVAILABILITY ON CLOUD COMPUTING ADOPTION IN JORDAN
Salwa Alsamra, Omar Sabri, Amaal Al-Amawi
DOI: 10.17148/IARJSET.2016.3643
Abstract: The purpose of this study is to evaluate the effect of application requirements availability on adopting cloud computing applications in several government institutions in Jordan. To go deeper in cognition of the phenomena under investigation, survey method was used to collect data, and for respondent persuade all the inquiries asked in this study were coordinated in Arabic language. We applied (Cronbach's Alpha) to analyze the validity and reliability of the survey which resulted in acceptable stability for the purposes of conducting research. The research sample was represented by all the workers of the system implementation in different government institutions, where the total sample size was 50 employees. The statistical analysis showed that there was a significant and positive influence of the availability of cloud computing technology requirements on the adoption of its application in the Jordanian institutions.
Keywords: Cloud Computing adoption; Government institutions; Survey; Jordan.
Abstract
VARIOUS BLENDS OF OXY HYDROGEN GAS AND GASOLINE IN 4-S S.I. ENGINE
Pratik Jain, Piyush Thakre, Prof. S.S.Deshmukh
DOI: 10.17148/IARJSET.2016.3644
Abstract: The ever increasing cost of conventional fossil fuels and their associated environmental impact have become major concerns worldwide.[1] In order to conserve the petroleum fuels for future and to eliminate the environmental problems there is need of alternative fuel. Using hydrogen or hydrogen enriched gas has proved to be one of the viable solutions for alternative fuel. . this study is carried out to investigate the effect of HHO gas addition on engine emission and it with pure gasoline fuelled engine. Here the HHO gas was produced by the process of water electrolysis and device called HHO generator has been easily integrated with SI engine test rig. The experimental work is carried out on a 250cc single cylinder petrol engine under constant speed with varying load condition. Amount of HHO gas aspirated into the combustion chamber along with intake air system at Four different amperes i.e. 1 ampere,3 ampere 5 ampere and 6 ampere with 12 volts DC supply at compression ratio 7. The result shows that the carbon monoxide (CO) has been reduced by 38.6% and hydrocarbon (HC) has been reduced by 39.7% .
Keywords: -Internal combustion engine, Petrol engine, electrolysis, Oxy hydrogen gas, Emission.
Abstract
A STUDY ON GOODNESS OF FIT FOR NORMALITY
Tripakshi Borthakur, Bipin Gogoi
DOI: 10.17148/IARJSET.2016.3645
Abstract: One of the important assumptions of data is the normality on which most of the statistical model and procedures rely on regarding the validity of given data hypothesis. Assuming the normality assumption blindly may affect the accuracy of inferences and estimation procedures. As observed, the collected data from real field are not always follow the normality assumption. So, data must be verified with adequate statistical test before used. There are various kinds of goodness of fit tests in literature. Some of them are special purpose tests, so that they are suitable and perform well for some special situations. Others are omnibus tests that are applicable to general cases. Most commonly used tests are Pearson's chi-squared test and EDF (empirical distribution function) tests, such as Kolmogorov-Smirnov, Cramer-Von-Mises and Anderson-Darling test. The chi-squared test is easy to use but they are generally less powerful than EDF tests. In this paper we want to study the performance of twelve different tests for normality including the above mentioned tests. Considering various sample sizes and different alternative hypotheses results are obtained and displayed in different tables. Finally, discussions are made on the basis of the results.
Keywords: normality test; power comparison; simulation method, alternative of the form symmetrical and asymmetrical distribution
Abstract
COLLISION AVOIDANCE OF TRAINS USING ARM CORTEX M4, RF AND GSM
Smita S Bhavsar, A.N. Kulkarni
DOI: 10.17148/IARJSET.2016.3646
Abstract: The Railway network is the world's biggest transport network. There have been many accidents occurs in the railway network system. Most of the accidents occurred due to the collision between the trains and human negligence The proposed system is used to predict that kind of collision between trains and prevents them from occurring collision and accident .Railways are the convenient, reasonable and popular node of transport in almost all major cities of not only in India but also all over the World. The major reason for railway accidents is collision of trains on the same track or near crossing. It is very difficult to stop such collisions due to speed of moving trains, which is needs a lead distance to stop. The primary goal of our train collision detection system is to identify possible train collision ahead of time and to report these to the main control room or driver before collision happens. Train Collision Avoidance System includes the microcontroller ARM Cortex TM4C123GH6PM which controls the whole operation of the system. In this the train tracks in railway network are given distinct track numbers/track ids which are read by RFID reader. If two trains are travelling on the same track then system sends SMS through GSM network to the authorized person to take appropriate action. In areas where GSM network is poor then also the system avoid collision by using RF Module. Wherever at crossing LDR sensor and microcontroller unit take appropriate action if obstacle can be observed.
Keywords: RFID Tag, RFID Reader, GSM, ARM Cortex, RF Module, android device and LDR sensor.
Abstract
A SURVEY ON SVM AND NAIVES BAYES NETWORK TRAFFIC CLASSIFICATION USING CORRELATION INFORMATION
Dipti Tiwari, Bhawna Mallick
DOI: 10.17148/IARJSET.2016.3647
Abstract: Traffic classification is an automatic method that categorizes electronic network traffic per varied parameters into variety of traffic categories. Many supervised classification algorithms and unsupervised clump algorithms have been applied to reason web traffic. Traditional traffic classification strategies embody the port-based prediction strategies and payload-based deep scrutiny strategies. In current network environment, the traditional strategies suffer from variety of sensible issues, such as dynamic ports and encrypted applications. In order to enhance the classification accuracy, Support Vector Machine (SVM) and Naïve Bayes estimator is projected to reason the traffic by application. In this, traffic flows are represented mistreatment the discretized applied math options and flow correlation data is modelled by bag-of-flow (BoF). This methodology uses flow statistical feature based mostly traffic classification to boost feature discretization. This approach for traffic classification improves the classification performance effectively by incorporating correlated data into the classification method. The experimental results show that the proposed theme will come through far better classification performance than existing progressive traffic classification strategies.
Keywords: Support Vector Machine (SVM), Traffic Classification, Supervised algorithm, Naïve Bayes.
Abstract
FIXED POINTS OF AUTOMORPHISMS PERMUTING THE GENERATORS CYCLICALLY IN FREE SOLVABLE LIE ALGEBRAS
Zerrin Esmerligil
DOI: 10.17148/IARJSET.2016.3648
Abstract: We investigate fixed points of an automorphism of a free solvable Lie algebra which permutes the generators cyclically. Let ? be a cyclic permutation of order n which belongs to the nth symmetric group S_n. We give form of the fixed points of an automorphism of a free solvable Lie algebra which is induced by the permutation ?.
Keywords: Free Solvable Lie algebra, automorphism, fixed point, cyclic permutation.
Abstract
DEVELOPMENT OF ARDUINO BASED QUADCOPTER
Anurag Singh Rajpoot, Namrata Gadani, Sagar Kalathia
DOI: 10.17148/IARJSET.2016.3649
Abstract: The internal aspects of the Quadcopter based on Arduino UNO development board is enlightened through this paper. It also explains about the maximum weight lifting capacity of the Quadcopter and the other various parameters relevant to transmitter-receiver, gyroscope, electronic speed controllers (ESCs), PID control etc. The paper emphasize on making Quadcopter cost-effective and reliable along with making it highly stabilized in windy and dusty environment. Also we have tried to make it multi-tasking through module based approach for having a single Quadcopter to be used for multiple tasks.
Keywords: Quadcopter, UAV, Arduino, PID, Autonomous Flight.
Abstract
MESSAGE AUTHENTICATION AND SECURE TRANSMISSION IN WIRELESS SENSOR NETWORKS USING GLOBAL ELLIPTIC CURVE CRYPTOGRAPHY METHOD
J. Ghayathri, M. Jhanani
DOI: 10.17148/IARJSET.2016.3650
Abstract: Message authentication is used to stop unauthorized and corrupted messages from being in Wireless Sensor Networks (WSNs). Message authentication schemes have two approaches: public-key based and symmetric-key based approaches. To address these issues, this research work proposes a scalable authentication scheme based on Global Elliptic Curve Cryptography (GECC). The proposed scheme allows any number of messages to transmit in intermediate node authentication. In addition, the GECC scheme can also provide message source privacy and multiple base station environments. The proposed GECC scheme enables the intermediate node authentication so that all corrupted message can be detected and dropped.
Keywords: Key Management, ECC, GECC, ESAMA.
Abstract
STUDY OF MODELING AND CONTROL OF RENEWABLE HYBRID ENERGY SYSTEM WITH HYDROGEN STORAGE
Priyanka S Kole
DOI: 10.17148/IARJSET.2016.3651
Abstract: Renewable energy systems are of importance since being modular, nature-friendly and domestic. This paper involves study ofmodeling and control of wind-photovoltaic-fuel cell hybrid energy system. The hybrid system consists of main components like: wind turbine,photovoltaic array, proton exchange membrane fuel cell (PEMFC), electrolyzer, boost converter, controllers and a power converter. The model for each process component is developed, and all the components are integrated in a MATLAB/Simulink environment.This kind of hybrid system is completely stand-alone, reliable and has high efficiency. Power converter and inverter are used to produce AC output power.Control scheme of fuel-cell flow controller and voltageregulatorsare based on PID controllers. Combination of PV and wind renewable sources has made the advantage of using this system in regions which have higher wind speeds in the seasons that suffers from less sunny days and vice versa. Simulation is carried for step changes in electrical load and wind speeds .Results showed that the ability of the system in adapting itself to sudden changes and new conditions.
Keywords: Wind Energy, Photovoltaic, Fuel Cell, Hybrid Energy Systems.
Abstract
A RELAY NODE BASED ROUTE DISCOVERY ALGORITHM WITH HIGH NETWORK LIFETIME
Sateesh Mathapati, Mrs. Nithya S
DOI: 10.17148/IARJSET.2016.3652
Abstract: Energy savings optimization becomes one of the major concerns in the wireless sensor network (WSN) routing protocol design, due to the fact that most sensor nodes are equipped with the limited non rechargeable battery power. In this paper, we focus on minimizing energy consumption and maximizing network lifetime for data relay in one-dimensional (1-D) queue network. Following the principle of opportunistic routing theory, multihop relay decision to optimize the network energy efficiency is made based on the differences among sensor nodes, in terms of both their distance to sink and the residual energy of each other. Specifically, an Energy Saving via Opportunistic Routing (ENS_OR) algorithm is designed to ensure minimum power cost during data relay and protect the nodes with relatively low residual energy.
Keywords: Wireless Sensor network, Energy efficiency, one dimensional (1-D) queuenetwork, ENS_OR, Relay nodes.
Abstract
ANALYSIS OF CONVENTIONAL CONTROLLERS FOR HIGH PRESSURE RATED MODIFIED CSTR SYSTEM
Jimisha K, Shinu M M
DOI: 10.17148/IARJSET.2016.3653
Abstract: The control of chemical reactor is one of the most challenging problems in control process. A Continuous Stirred Tank Reactor (CSTR) is the heart of many processes, its stable and efficient operation is important to the success of an entire process. The CSTR is one of the optional machineries available to mimic and maintain the deep sea conditions such as pressure, temperature, pH etc in the laboratory to study environmental effects. This paper presents the design of suitable conventional controller and tuning methods to optimize the system performance for a hyperbaric reactor system. In environmental CSTR the control of temperature is an absolute challenge due to strong on-line non linearity. The suitable control strategy was explored here to develop the environmental CSTR system for deep sea applications using real time on-line open loop temperature curve. The First Order Plus Dead Time (FOPDT) process model was chosen to derive transfer function from real time on-line system curve at atmospheric pressure and 310C temperature condition. Simulation and result comparison is carried out using MATLAB &SIMULINK. Different conventional controllers are examined to optimize the temperature control for environmental CSTR system. The simulation result on the environmental CSTR system is presented to show efficiency of various controllers.
Keywords: Process modeling, PI controller, PID Controller.
Abstract
PC BASED OSCILLOSCOPE USING PROCESSOR
Seema Kakade, Dr. S. S. Lokhande
DOI: 10.17148/IARJSET.2016.3654
Abstract: An oscilloscope, previously called an oscillograph, and informally known as a scope, CRO or DSO is a type of electronic test instrument that allows observation of constantly varying signal voltages. All are in hurry and needs gadgets follow our moves with minimum cost. A gadget that will be easily carried from one place to another and work efficiently as an oscilloscope. An oscilloscope using PC or laptop instead of carrying another gadget. The idea is to monitor the signal and it is implemented by first making signal conditioning on given signal, give it to good sampling rate and high resolution ADC. The ADC will send data to the raspberry pi, high speed processor. This Raspberry will read the data and by creating GUI and further processing is carried out for displaying data on display.
Keywords: Probe, Bit scope micro Model 5, USB interfacing with Raspberry Pi, GUI software in Python.
Abstract
IN-VITRO BIOMECHANICAL ASSESSMENT OF A NEWLY DESIGNED CEMENT LESS FEMORAL STEM
Rahul Ribeiro, Beni Ram Rawal
DOI: 10.17148/IARJSET.2016.3655
Abstract: The stability of an artificial cement less femoral stem depends on its fit within the femoral cavity. In this study, a cement less hip joint stem was designed based on the anthropometric data of 98 femurs of patients of Indian (Asia) origin. The design was manufactured on a standard CNC milling machine and was made of Ti6Al4V. In vitro stability studies were carried out using standard test protocol incorporating standard potting cement, a selective laser sintered (SLS) femur and a dry cadaveric femur. The micro-motion of the stem was measured using LVDTs attached at various locations along the designed implant. The entire setup was placed in an Instron test machine with an applied static axial load of 2500N. For the test in potting cement, the strains ranged between 320 and 1211 ?m over the measured sites. Strain on the lateral side was found to be less for the new design as compared with a conventional design, while on the medial side it was almost the same for both. The maximum micro motion for the stem-dry femur construct was found to be 1800 ?m whereas for the stem-SLS femur combine, it was found to be 380 ?m. The finite element models developed were found to closely match the behavior of the stem-potting cement construct and stem-SLS femur.
Keywords: Include at least 4 keywords or phrases
Abstract
REVIEW ON SOFT COMPUTING FORMALISMS FOR RANKING OF HAZARDOUS INDUSTRIAL PLANT SITES
T Srinivas Reddy, Dr. Shalini Goel
DOI: 10.17148/IARJSET.2016.3657
Abstract: The piece of this paper work aims at enhancing the proficiency of the positioning methods by parameter diminishment and concentrating on the more pertinent parameters. We connected element choice systems, for example, insect settlement improvement, dormant semantic examination, essential segment investigation, molecule swarm advancement and fluffy delicate sets. The properties are evacuated such that the lessened characteristic set gives the same prescient ability of the choice element as the first bigger quality set. The diminished parameters got with the above methods have been considered for foreseeing their cutting edge esteems (in the coming years). In this segment we talk about different endeavors for basic leadership and site choice for industrial plant installations. We additionally talk about a few endeavors towards parameter lessening, forecast of impacts because of setting of industrial units at certain areas, and hazard based ideal ranking procedures for condition related basic leadership.
Keywords: Hazard, diminished, semantic, parameter, impacts, delicate sets, settlement, Industrial plant.
