S.No. |
Title |
Page |
Downloads |
1. |
Implementation of Spyware Detection Using Data Mining With Decision Tree Algorithm
Implementation of Spyware Detection Using Data Mining With Decision Tree Algorithm
Abstract: Any software that monitors user behavior, or gathers information about the user without adequate notice, consent, or control from the user. " Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and send it to a third party without informed user consent. Our approach is inspired by DM-based malicious code detectors, which are known to work well for detecting viruses and similar software We extract binary features, called n-grams, from both spyware and software and apply to train classifiers that are able to classify unknown binaries by analyzing extracted n-grams.
Key words: N-Gram, ARFF (Attribute Relation File Format) CFBE (Common Feature-based Extraction), FBFE (Frequency-based Feature Extraction), RFS (Reduced Feature Sets).
Reference
[1] http://www.security-informatics.com/.
[2] Download, http://download.com.
[3] Spyware Guide, http://Spywareguide.com.
[4] Linux/Unix Command: xxd, http://linux.about.com/library/cmd/blcmdl1_xxd.htm.
[5] http://vl.netlux.org/v1.php
Leena T. Patil, Shamal S. Pawar,Shrutika N. Lad, Nilambari Joshi |
01-04 |
 |
2. |
Implementation of Lean in Continuous Industry: A Case Study (Steel Industry)
Implementation of Lean in Continuous Industry: A Case Study (Steel Industry)
Abstract: The goal of this research is to investigate how lean manufacturing tools can be adapted from the discrete to the continuous manufacturing environment, and to evaluate their benefits on a specific application instance. Although the process and discrete industry share several common characteristics, there are areas where they are very different. This research attempts to identify commonalities between discrete and continuous manufacturing where lean techniques from the discrete side are directly applicable.
Key words: Lean, lean tool, Discrete manufacturing, Competitiveness, Sources of Competitiveness.
Reference
[1] Abbett, D., and V. Payne, "Gulfstream V Value Stream Tour," (Presentation at 1999 Lean Summit), 1999.
[2] Attri Rajesh ,Kumar Deepak (2012) Analysis of barriers of Total Productive Maintenance , "International Journal of System Assurance Engineering and Management"
[3] Billesbach, J.T., "Applying Lean Production Principles To A Process Facility," Production and Inventory Management Journal, Third Quarter, 1994, PP. 40-44.
[4] Brunt, D., "From Current State to Future State: Mapping the Steel to Component Supply chain," International Journal of Logistics: Research and Applications, Vol. 3, No. 3, 2000, PP. 259-271.
[5] Cleland, D.I., and B. Bidanda, The Automated Factory Handbook: Technology and Management, (Blue Ridge Summit, PA,1990).
Deepak Kumar, Sumit Kumar Singh , Khemchand Sharma |
05-12 |
 |
3. |
Automatic Vehicle Speed Reduction System Using Rf Technology
Automatic Vehicle Speed Reduction System Using Rf Technology
Abstract: For vehicle safety and safety for passengers in vehicle is an important parameter. Most of the vehicles get accident because no proper safety measures are taken especially at curves and hair pin bends humps and any obstacles in front of the vehicle. This system can be used for the prevention of such a problem by indicating a pre indication and also reducing the speed of vehicles by reducing the fuel rate of vehicle. As the action is in terms of fuel rate so the vehicle automatically goes to control and avoids the accidents. At curves and hair pin bends the line of sight is not possible for the drivers so the special kind of transmitter which is tuned at a frequency of 433MHZ are mounted as these transmitters continuously radiate a RF signal for some particular area. As the vehicle come within this radiation the receiver in the vehicle gets activate. The transmitter used here is a coded transmitter which is encoded with encoder. The encoder provides a 4 bit binary data which is serially transmitted to transmitter. The transmitter used here is ASK type (amplitude shift keying) which emits the RF radiation.
Key words: Speed Reduction of vehicle where Humps detection, obstacle detection, steep edge detection.
Reference
[1] Telaprolu,m.k, sarma,V.V.; ratankanth, E.K.;Rao, S.N.; Banda,v., vehicular Electronics and safety (ICVES), IEEE international conference pune (2009). [2] Gangadhar, S.; R N shetty Inst. Of Technol, An Intelligent road traffic control system, IEEE conference publication kahargpur (2010). [3] Berndt, Don, Real-Time Embedded Technology and Applications Symposium (RTAS), IEEE Education & Learning (2005). [4] Kassem, N. Microsoft Corp., Redmond, WA, USAKosba, A.E.; Youssef, M.;VRF-Based Vehicle Detection and Speed Estimation vehicular Technology Conference (VTC Spring), IEEE (2012). [5] Murthy, C.; Manimaran, G.; Resource Management in Real-Time Systems and Networks2001.
Deepa B Chavan, Abdul Rahim Makandar, Faizul Hakeem Khan, Syed Azimuddin Inamdar |
13-16 |
 |
4. |
Data Hiding and Retrival Using Advanced Encryption and Decryption Algorithms
Data Hiding and Retrival Using Advanced Encryption and Decryption Algorithms
Abstract: In this era of digital world, with the evolution of technology, there is an essential need for optimization of online digital data and information. Nowadays, Security and Authenticity of digital data has become a big challenge. This paper proposes an innovative method to authenticate the digital documents. A new method is introduced here, which allows multiple encryption and decryption of digital data.
Reference
[1] Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm " Proceedings of Information and Communication Technologies (WICT), 2011 " held at Mumbai, 11th – 14th Dec, 2011, Pages:1175-1180. [2] Symmetric Key Cryptography using Random Key generator: Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: "Proceedings of International conference on security and management(SAM'10" held at Las Vegas, USA Jull 12-15, 2010), P-Vol-2, 239-244(2010).
[3] New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm: NeerajKhanna,Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130(2011). [4] Somdip Dey, Joyshree Nath, Asoke Nath, "An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm", IJMECS, vol.4, no.5, pp.1-9, 2012. [5] Somdip Dey, Joyshree Nath and Asoke Nath. Article: An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. International Journal of Computer Applications46(20): 46-53, May 2012. Published by Foundation of Computer Science, New York, USA.
Mamtha Shetty, Shreedhar. A. Joshi |
17-20 |
 |
5. |
Pipeline Vandalisation Detection Alert with Sms
Pipeline Vandalisation Detection Alert with Sms
Abstract: Automated crack and vandalism detection alert for pipeline with remote monitoring and location specification is implemented in this study. The design circuit consists of transceiver (GSM module), microcontroller, power supply and alarm nits. Simulation of the various units was done individually using visual modeling application Proteus. Most of the components used in the research were available on the software and alternatives with similar specifications were used for components that were not available on the Proteus for simulation purposes only. A continuous electrical path was provided by resistant sensor and any break in the signal path causes cessation of signal and provides detectable change in the state of the system. The system was tested on performance of the task of detecting breakage on pipelines and the exact location of such problems.
Key words: Impact Sensor, Microcontroller, Pipeline Monitoring, SMS Alert, Security, Transceiver.
Reference
[1] A nation in search of pipeline safety www.saharareproters.com/nigeria
[2] Shifts in pipeline vandalism in Nigeria www.aggbrokomeyer.word.com/2013
[3] NNPC lost about N163billion in the space of three years to pipeline vandalism www.thisdaylive.com (visited 19th August; 2013).
[4] How pipeline vandals cripple fuel supply.www.nnpcgroup.com/public relation (Visited 19th August; 2013).
[5] Lagos Jetty explosion caused by pipeline vandalization. www.informationng.com (visited 19th August; 2013).
G.N Ezeh, N. Chukwuchekwa, J .C. Ojiaku and E. Ekeanyawu |
21-25 |
 |
6. |
Investigation of Foundation Failure of a Residential Building – A Case Study
Investigation of Foundation Failure of a Residential Building – A Case Study
Abstract: Movement and distress in low rise building most commonly occur as a result of interaction between the footing system and the ground. This summarizes the study that is carried out to evaluate the possible causes of distress in the G+1 residential building founded on shallow foundation in Chennai, Tamilnadu, India by Detailed Investigation. Disturbed and Undisturbed samples are collected by drilling borehole up to significant depth by auger. Laboratory tests are carried out on disturbed and undisturbed soil samples obtained from the site of distressed building. The cause of failure of the structure are identified by considering the soil properties, intensity of loading, nature of foundation and pattern of cracks developed. Based on the degree of distress, the suitable measures are recommended.
Key words: cracks, distress, foundation, investigation, recommendations
Reference
[1] Robert W. Day, Forensic Geotechnical and Foundation Engineering, (Second Edition, McGraw hill Publications, U.K 2011).
[2] Richard Driscoll, , The influence of vegetation on the swelling and shrinking of clay soils, Geotechnical research journal, U.K (1983).
[3] D. Nagarajan, Investigation of Foundation failures of residential buildings, M.E Thesis, Dept. of Civil Engg., Anna university, Chennai, Tamilnadu, India (2013).
[4] AS 2870, Code of Practice for Residential slabs and footings, Australia (1996).
[5] ASTM D-4546, Standard Test Methods for One-Dimensional Swell or Settlement Potential of Cohesive Soils, Annual Book of ASTM Standards, Vol. 04.08., U.S (1996).
D. Nagarajan, K. Premalatha |
26-30 |
 |
7. |
Hybrid Approach for Outlier Detection in High Dimensional Data
Inline content">Hybrid Approach for Outlier Detection in High Dimensional Data
Abstract: It has been observed recently that the prominence of multidimensional data is increasing. Existing outlier detection techniques generally fail to work on multi-dimensional data. The need for analyzing high dimensional data has thus increased in today's data trends. It has enormous application in medical domain, network intrusion and satellite imagery. Even though there are existing methodologies supporting high dimensionality and outlier detection problems, most of them are computationally intensive and time consuming. Thus there arises a need for an efficient and hybrid algorithm which will help to analyze and address these problems.
Index Terms: Outlier Detection, Feature extraction, DBSCAN algorithm, K-Mean algorithm.
Reference
[1] J. Han and M. Kamber, Data Mining: Concepts and Techniques, J. Kacprzyk and L. C. Jain, Eds. Morgan Kaufmann, 2006, vol. 54, no. Second Edition. [2] Yogita and D. Toshniwal, \A framework for outlier detection in evolving data streams by weighting attributes in clustering," in Proceedings of the 2nd International Conference on Communication Computing and Security, India, 2012. [3] S. Ramaswamy, R. Rastogi, and K. Shim, \E_cient algorithms for mining outliers from large data sets," in Proceedings of the 2000 ACM SIGMOD international conference on Management of data, ser. SIGMOD '00. New York, NY, USA: ACM, 2000 [4] M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, \Lof: identifying density- based local outliers," in Proceedings of the 2000 ACM SIGMOD international conference on Management of data, ser. SIGMOD '00. New York, NY, USA: ACM, 2000 [5] Z. He, X. Xu, and S. Deng, \Discovering cluster based local outliers," Pattern Recognition Letters, vol. 2003
Neha Randive, Sneha, Neha Singh, Ruby Singh, Deepa Abin |
31-35 |
 |
8. |
Adaptive Space-Time Processing For Multiuser Detection in
Multipath CDMA Systems
Adaptive Space-Time Processing For Multiuser Detection in
Multipath CDMA Systems
Abstract: Wireless communications poses some unique challenges including multipath fading and co-channel
interference. Diversity techniques, among which space diversity, are overwhelmingly used in wireless
communication systems to enhance capacity, coverage and quality. We have considered sample-by-sample
adaptive space-time multiuser detectors for multipath CDMA channels with multiple receive antennas. Fully
exploiting diversities through space-time processing and multiuser detection offers substantial improvement in
the performance of CDMA systems.
Key words: Code Division Multiple Access (CDMA), Adaptive MMSE ST MUD.
Reference
[1] S. Verdú, Multiuser Detection, Cambridge, UK: Cambridge University Press, 1998.
[2] J. Paulraj and C. B. Papadias, "Space-time processing for wireless communications," IEEE Signal
Processing Mag., pp. 49-82, Nov. 1997.
[3] X. Wang and H. V. Poor, "Space-time multiuser detection in multipath CDMA channels," IEEE Trans.
Signal Processing, vol. 47, no. 9, pp. 2356-2374, Sept. 1999.
[4] S. Haykin, Adaptive Filter Theory, third edition, Englewood Cliffs, NJ: Prentice- Hall, 1996.
Khairy Elbarbary, Tarak Bahroun |
36-41 |
 |
9. |
Analysis of Conventional Sram 6t at Low Power and High Perfomamce 32nm Technologies
Analysis of Conventional Sram 6t at Low Power and High Perfomamce 32nm Technologies
Abstract: Here we analysis and compare the conventional SRAM 6t at two different nano-scale technologies. First is low power 32nm PTM technology and second is high performance 32nm PTM technology. At low power 32nm PTM technologies power dissipation is significantly reduces at reducing power supply but both read and write delay increases drastically. In other side, at high performance 32nm PTM technologies power dissipation reduces at reducing the power supply, and read delay increase moderate but write delay reduces gives the high performance and low power SRAM, all the simulation is done in Tanner Tool.
Key words: SRAM 6T, LP-32PTM, HP-32PTM
Reference
[1]. Lab Manuals for T-Spice, S-Edit and L-Edit [2]. J. M. Rabaey, Digital Integrated Circuits: A Design Perspective, Prentice Hall, NJ, 1996. [3]. Sung-Mo Kang and Yusuf Leblebici, "CMOS Digital Integrated Circuits" Third edition; Tata McGraw-Hill; New Delhi; (2003) [4]. VLSI Memory Chip Design By Kiyoo Itoh [5]. A. Karandikar and K. K. Parhi, Low power SRAM design using hierarchical divided bit-line approach
Loveneet Mishra |
42-45 |
 |
10. |
Wireless Power Transmission Using Resonance Inductive Coupling
Wireless Power Transmission Using Resonance Inductive Coupling
Abstract: In this paper, we present the concept of transmitting power without using wires i.e.transmitting power as Magnetic waves from one place to another is in order to reduce the transmission and distribution losses. This concept is known as Resonance Inductive Coupling (RIC). We also discussed the technological developments in Wireless Power Transmission (WPT). The advantages, disadvantages, biological impacts and applications of WPT are also presented. Wireless power or wireless energy transmission is the transmission of electrical energy from a power source to an electrical load without man-made conductors. Wireless transmission is useful in cases where interconnecting wires are inconvenient, hazardous, or impossible. the proportion of energy received becomes critical only if it is too low for the signal to be distinguished from the background noise. With wireless power, efficiency is the more significant parameter. A large part of the energy sent out by the generating plant must arrive at the receiver or receivers to make the system economical.The most common form of wireless power transmission is carried out using direct induction followed by resonant magnetic induction. Other methods under consideration are electromagnetic radiation in the form of microwaves or lasers and electrical conduction through natural media
Key words: Wireless Power Transmission (WPT), Resonance Inductive Coupling (RIC)
Reference
[1] Nikola Tesla, "The Transmission of Electrical Energy without Wires as a means for Further Peace," Electrical World and Engineering, p. 21, January, 7 1905. [2] William C. Brown and E. Eugene Eves, "Beamed Microwave Power Transmission and its Application to Space," IEEE Transactions on Microwave Theory and Techniques, vol. 40, no. 6, pp. 1239-1250, June 1992 [3] K. K. Rakes, "Wireless Power Transmission," Department of Electronics and Communication Engineering, NMAM Institute of Technology, Nitte, Presentation Report. [4] L.JosefssonandP.Persson, Conformal Array Antenna Theory and Design [5] Norman S. Nise, Control System Engineering,New York [6] PIC Microcontroller And Embedded SystemBy Mazidi.
Prof. Vishal V. Pande, Pooja D. Doifode, Dhanashree S. Kamtekar, Prashant P. Shingade |
46-50 |
 |
11. |
Talking Without Talking
Talking Without Talking
Abstract: The Silent sound technology is a completely new technology which can prove to be a solution for those who have lost their voice but wish to speak over phone. It can be used as part of a communications system operating in silence-required or high-background- noise environments. This article outlines the history associated with the technology followed by presenting two most preferred techniques viz. Electromyography and Ultrasound SSI. The concluding Section compares and contrasts these two techniques and put forth the future prospects of this technology.
Key words: Articulators , Electromyography, Ultrasound SSI, Vocoder, Linear Predictive Coding
Reference
[1] Shehjar Safaya, Kameshwar Sharma, Silent Sound Technology- An End to Noisy Communication, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 9, November 2013 [2] Karishma Gupta, Mohd. Salman Khan, SILENT SOUND TECHNOLOGY , VSRD International Journal of Computer Science &Information Technology, Vol. IV Issue I January 2014
[3] Petajan, E.D., 1984. Automatic lipreading to enhance speech recognition. IEEE Communications Society Global Telecommunications Conf., Atlanta, USA
[4] Nakamura, H., 1988. Method of recognizing speech using a lip image. United States Patent 4769845, September 06
[5] Sugie, N., Tsunoda, K., 1985. A speech prosthesis employing a speech synthesizer-vowel discrimination from perioral muscle activities and vowel production. IEEE Trans. Biomed. Eng. BME-32 (7), 485–490
Deepak Balwani, Honey Brijwani, Karishma Daswani, Somyata Rastogi |
51-56 |
 |
12. |
Asynchronous Power Flow Controller
Asynchronous Power Flow Controller
Abstract: In the present system demand of electrical power increases so fast and transfer of electrical
power is need of today‟s scenario. . The electrical power is transfer at same frequency through AC transmission
line. However, power generation may be at different frequencies such as wind generation, sources at islanding
or power generation in different countries. The proposed Asynchronous Power Flow Controller (APFC) system
essentially consists of two back-to-back voltage source converters as "Shunt Converter" and "Series Converter"
which is coupled via a common dc link provided by a dc storage capacitor This paper suggests the power
transfer and control between the sources operating at different or same frequencies.
Key words: Shunt converter, Series Converter, Phasor, Direct-drive, National grids.
Reference
[1] N.G Hingorani and L. Gyugyi,"Understanding FACTS: Concepts and Technology of Flexible AC Transmission Systems," IEEE press/Standard Publishers Distributors, Delhi, 2001. [2] J. Wu, J. Wen, H. Sun, and S. Cheng, "Feasibility study of segmenting large power system interconnections with ac link using energy storage technology," IEEE Tras. Power Syst. On page(s): 1-8, March 2012.DOI-10.1109/TPWRS20122185255 (Early Access Articles). [3] Dr. P.S. Bimbhra,"Generalized Theory of Electrical Machines," KHANNA Publishers,Delhi,2012.
Rahul Juneja, Prof.M.M.Renge |
57-62 |
 |
13. |
Building Automation Using Wired Communication
Building Automation Using Wired Communication
Abstract: In this paper, we present the design and implementation of a building automation system where communication technology LAN has been used. This paper mainly focuses on the controlling of home appliances remotely and providing security when the user is away from the place. This system provides ideal solution to the problems faced by home owners in daily life. This system provides security against intrusion as well as automates various home appliances using LAN. To demonstrate the feasibility and effectiveness of the proposed system, the device such as fire sensor, gas sensor, panic switch, intruder switch along with the smartcard have been developed and evaluated with the building automation system. These techniques are successfully merged in a single building automation system. This system offers a complete, low cost powerful and user friendly way of real-time monitoring and remote control of a building.
Key words: Building automation, LAN, Security, sensors, Real-time monitoring.
Reference
[1] A. R. Al-Ali and M. Al-Rousan, "Java-based home automation system", IEEE Transactions on Consumer Electronics, Vol.50, no.2, pp.498-504, 2004.
[2] N. Sriskanthan, F. Tan and A. Karande, "Bluetooth based home automation system", Microprocessor and Microsystems, Vol.26, no.6, pp.281-289, 2002.
[3] H. Ardam and I. Coskun, "A remote controller for home and office appliances by telephone'', IEEE Transactions on Consumer Electronics, Vol.44, no.4, pp.1291-1297, 1998.
[4] T. Baudel and M. Beaudouin-Lafon, "Charade: remote control of objects using free-hand gestures", Communication of ACM, Vol.36, no.7, pp.28-35, 1993.
[5] T. Saito, I. Tomoda, Y. Takabatake, J. Ami and K. Teramoto, "Home Gateway Architecture And Its Implementation", IEEE International Conference on Consumer Electronics, pp.194-195, 2000.
Ms. Supriya Gund, Ms. Sneha Kumari, Ms. Alice Joseph, Prof. Mrs. Madhuri Namjoshi |
63-68 |
 |
14. |
Network Intrusion Detection System
Network Intrusion Detection System
Abstract: Attacks on computers and data networks have become a regular and sophisticated issue. Intrusion detection has shifted its attention from hosts and operating systems to networks and has become a way to provide a sense of security to these networks. The aim of intrusion detection is to detect misuse and unauthorized use of the computer systems by internal and external elements. Typically, Intrusion Detection Systems allow statistical anomaly and rule-based misuse models to detect intrusions as the behavior of the intruding element is considered to be different from the authorized user behavior.
Key words: Denial of Service (DOS),Intrusion Detection System (IDS), Network Intrusion Detection System (NIDS), Unified Modelling Language (UML)
Reference
[1] R.G.Bace, "IntrusionDetection", TechnicalPublishing,1995.
[2] B. Mukherjee et al., "Network intrusion detection", IEEE Network, vol.8,no.3,pp.26–41,1994.
[3] K.Ramamohanaraoetal., "Thecurseofeaseofaccesstotheinternet," 3rdInternationalConferenceonInformationSystemsSecurity.
[4] ITL Bulletin "Acquiring and Deploying Intrusion Detection Systems" Nov. 1999.
[5] K.K.Gupta,"Robustandefficient intrusiondetectionsystems",Ph.D. dissertation,TheUniversityof Melbourne,Departmentof Computer ScienceandSoftwareEngineering,January2009.
Gopalkrishna N. Prabhu, Kushank Jain, Nandan Lawande, Narendra Kumar, Yashasvi Zutshi, Rohan Singh, Jyoti Chinchole |
69-72 |
 |
15. |
Forces and Bending Moments in a Ram Press BP30
Forces and Bending Moments in a Ram Press BP30
Abstract: In this paper the experimental setup, the equipment used, the location of the strain gauges, the experimental results and the analysis of forces and moments acting upon a ram press machine BP30 are presented and analyzed. The data are obtained under operating conditions when sunflower seeds are crashed and oil is expressed. The results for forces and moments are estimated and analyzed to acquire their average maximum values. By using the data for the maximum forces and maximum bending moments acting on connecting rods the coefficient of kinetic friction is calculated to be 0.0718. It is found that the value of this coefficient agrees with the values listed in the literature for lubricated steel on steel contact surfaces. It is concluded that the results obtained in this study could be used for a subsequent analysis regarding the energy losses and energy balance in the machine. Based on that analysis the mechanical efficiency may also be determined and comparison analysis with other designs of ram presses can be conducted.
Key words: coefficient of kinetic friction, forces, moments, torques, ram press machine, strain gauges.
Reference
[1] J. Uziak, J.D.G. Foster, I.A. Loukanov, Application of Ram Press Technology for Small Scale Sunflower Rural Oil Expression. Proc. International Conference Ag.Eng, Budapest, Hungary, 2002, 286-287
[2] J. Uziak, I.A. Loukanov, Ram Press Technology Projects in Sub-Saharan Africa. Proc. of the International Scientific Seminar "Farm Machinery Management and Sustainable Agriculture", Lublin, Poland, 2006, 89-92.
[3] J. Uziak, I.A. Loukanov, Ram press oil expression projects in Sub-Saharan Africa. Roczniki Naukowe: Stowarzyszenia Ekonomistow Rolnictwa i Agrobiznesu, IX(3), 2007, 219-222 (in Polish).
[4] I.A. Loukanov, J. Uziak, Theoretical and experimental analysis of forces and energy utilization in a Ram Press Machine BP42 for sunflower oil expression. Mechanics of Machines, 41, 2002, 24-32.
[5] J.D.G. Foster, J. Uziak, I.A. Loukanov, Measurement of operating forces in a ram press crushing sunflower seed. STRAIN: An International Journal for Experimental Mechanics, 45(2), 2009, 190-193.
Ivan A. Loukanov, Jacek Uziak |
73-79 |
 |
16. |
Improvements In Agile Manifesto For Small Software Development Industries
Improvements In Agile Manifesto For Small Software Development Industries
Abstract: Now a day's business environment is much more dynamic, and organizations are constantly changing their software requirements to adjust to the new environment. They also insist on fast delivery of software products as well as for accepting changing requirements. Agile is swift active and quick to respond, and this is what agile software development methodology refers to. Agile methods are much attracted to small projects, but no agile methods workings glowing as a standalone system so some adoption or customization is needed. The paper describes an agile adoption survey for small industries in Gujarat region. The main objective is to find reasons for less agile adoption. The circulated survey results are analyzed thoroughly and discussed to prove the arguments made during the research time and the recommendations are provided to improve appropriate enhance required changes for the agile principles. Finally, these improvements are implemented by various industries and The analysis of the results showed that the improvements used in the aforementioned cases were effective.
Key words: Small project, Agile Adoption survey questions, challenges of agile adoption, Improvement theory, process flow improvement
Reference
[1] Claudia Melo∗, Daniela S. Cruzes†, Fabio Kon∗ and Reidar Conradi† Department of Computer Science, University of S˜ao Paulo, Brazil Department of Computer and Information Science, NTNU, Trondheim, Norway. Agile Team Perceptions of Productivity Factors- 2011 Agile Conference.
[2] Seiyoung Lee* and Hwan-Seung Yong** J Inf Process Syst, Vol.9, No.1, March 2013 http://dx.doi.org/10.3745/JIPS.2013.9.1.069 Agile Software Development Framework in a Small Project Environment [3] Ghulam Rasool1*, Shabib Aftab1, Shafiq Hussain2, Detlef Streitferdt3 eXRUP: A Hybrid Software Development Model for Small to Medium Scale Projects Journal of Software Engineering and Applications, 2013, 6, 446-457 [4] Robert W. Ferguson A Project Risk Metric The Journal of Defense Software Engineering April 2004
[5] Chetankumar Patel and Muthu Ramachandran Agile Maturity Model (AMM): A Software Process Improvement framework for Agile Software DevelopmentPractices Int.J. of Software Engineering, IJSE Vol.2 No.1 January 2009
Ratnmala Raval, Haresh Rathod |
80-87 |
 |
17. |
A Novel Model Based Testing (MBT) Approach for Software Validation
A Novel Model Based Testing (MBT) Approach for Software Validation
Abstract: Software validation is an important activity in order test whether the correct software has been developed. Several testing techniques have been developed, and one of these is model based testing (MBT). The main purpose of Model based testing is to test a software product from a user's point of view. Hence, usage models are designed and then test cases are developed from the models. The development of test cases from the usage model can be made automatically by using a tool. In order to increase the efficiency of the test phase, software tools are important. This paper presents a tool for model based testing called MaTeLo. The tool is developed in a joint European project with six industrial partners and two university partners. As the major outcome of a European project, MaTeLo is a test tool based on the Markov Chain model. This project is used to investigate specification languages for various industries, specifications simulation methods and associated tools. MaTeLo provides an automatic generator which generates test cases based on a Markov Chain usage model and statistical testing methods. MaTeLo supports test execution in heterogeneous environments. In addition, it also provides users with test results analysis and quality reports generation. The tool use model-based metrics to accurately evaluate software reliability and performance throughout the development process. This project integrates the testing tools in real development environments for industrial validation. - MaTeLo offers a graphical way to formalize the requirements test specification based on a usage model that makes the links between Doors, TestStand. - MaTeLo generates automatically different kind of TestStand test sequences and systematically improves the SUT reliability; reduce the testing cost and duration
Key words: Model Based Testing, MaTeLo, Automation testing, Manual testing, Markov Chains.
Reference
[1] R. Mall, Fundamentals of software engineering, 2nd Ed. New Delhi: Prentice-Hall of India Ltd, 2008. [2] S.-D. Gouraud, A. Denise, M.-C. Gaudel, B. Marre. A new way of automating statistical testing methods. Proceedings of the 16th IEEE international conference on automated software engineering, 2001 [3] Blackburn, M., Busser, R., and Nauman, A. "Why Model-Based Test Automation is Different and What You Should Know to Get Started." In International Conference on Practical Software Quality (2004). [4] A. Pretschner, W. Prenninger, S. Wagner, C. Kühnel, M. Baumgartner, B. Sostawa, R. Zölch, and T. Stauner, "One Evaluation of Model-Based Testing and Its Automation," Proceedings of the 27th International Conference on Software Engineering, May 15–21, 2005, St. Louis, Missouri, ACM, New York (2005), pp. 392–401. [5] Sandeep K. Singh, Sangeeta Sabharwal, J. P. Gupta, "A Novel Approach for deriving test scenarios and test cases from events", Journal of Information Processing Systems, Vol. 8, No. 2, June 2012.
Ghanshyam Gagged, Vengatesan Natarajan, Kauser Ahmed P |
88-93 |
 |
18. |
Laboratory Investigation Of Partial Replacement Of Coarse Aggregate By Plastic Chips And Cement By Human Hair
Laboratory Investigation Of Partial Replacement Of Coarse Aggregate By Plastic Chips And Cement By Human Hair
Abstract: The use of plastic is increasing day by day, although steps were taken to reduce its consumption. The suitability of recycled plastics as coarse aggregate in concrete and its advantage are discussed here. Experimental investigation was done using M20 mix and tests were carried out as per recommended procedures by relevant codes. As 100% replacement of natural coarse aggregate (NCA) with plastic coarse aggregate (PCA) is not feasible, partial replacement were examined. And also Hair is used as a fibred reinforcing material in concrete as partial replacement of cement. It has a high tensile strength which is equal to that of a copper wire with similar diameter. It is also available in abundance and at a very low cost. Tests were conducted to determine the properties of plastic aggregate and human hair such as density, specific gravity and crushing value. Experiments were conducted on concrete cubes with various percentages of human hair i.e. 0%, 0.5%, 1%, 1.5%, 2%, and 3% by weight of cement and with constant percentage of plastic aggregate as 20%.
Key words: human hair, plastic coarse aggregate, compressive strength, split tensile strength.
Reference
[1] Jain D. And Kothari A, Hair Fibre Reinforced Concrete, Research Journal Of Recent Sciences Vol. 1(ISC-2011), 128-133 (2012)
[2] Yadollah Batebi, Alireza Mirzagoltabar, Seyed Mostafa Shabanian And Sara Fateri, "Experimental Investigation Of Shrinkage Of Nano Hair Reinforced Concrete", Iranica Journal Of Energy & Environment 4 (1) Special Issue On Nanotechnology: 68-72, 2013
[3] R. Lakshmi And S. Nagan Investigations On Durability Characteristics Of E-Plastic Waste, Incorporated Concrete Asian Journal Of Civil Engineering (Building And Housing) Vol. 12, No. 6 (2011).
[4] T. Senthil Vadivel And M. Doddurani, An Experimental Study On Mechanical Properties Of Waste Plastic Fiber Reinforced Concrete, International Journal Of Emerging Trends In Engineering And Development Issue 3, Vol.2 (March 2013).
[5] M. Elzafraney1,P. Soroushian And M. Deru, Development Of Energy-Efficient Concrete Buildings Using Recycled Plastic Aggregate, 10.1061/_Asce_1076-0431_2005.
A.S.Balaji and D.Mohan Kumar |
94-98 |
 |
19. |
Software Testing Techniques and Strategies
Software Testing Techniques and Strategiese
Abstract: Software testing provides a means to reduce errors, cut maintenance and overall software costs. Numerous software development and testing methodologies, tools, and techniques have emerged over the last few decades promising to enhance software quality. This paper describes Software testing, need for software testing, Software testing goals and principles. Further it describe about different Software testing techniques and different software testing strategies
Key words: Debugging, Software Testing Goals, Software Testing Life Cycle, Software Testing strategies, Software Testing Techniques.
Reference
[1] Sahil Batra and Dr. Rahul Rishi,"IMPROVING QUALITY USING TESTING STRATEGIES," Journal of Gobal Research in Computer Science, Volume 2,No.6,June 2011.
[2] S.M.K Quadri and Sheikh Umar Farooq,"Software Testing-Goals,Principles and Limitations," International Journal of Computer Applications, Volume 6-No.9,September 2010.
[3] Mohd. Ehmer Khan,"Different Forms of Software Testing Techniques for Finding Errors,"IJCSI International Journal of Computer Science Issues,Vol. 7, Issue 3, No 1, May 2010.
[4] Ajay Jangra, Gurbaj Singh, Jasbir Singh and Rajesh Verma,"EXPLORING TESTING STRATEGIES,"International Journal of Information Technology and Knowledge Management, Volume 4, NO.1,January-June 2011.
[5] Jovanovic and Irena,"Software Testing Methods and Techniques," May 26,2008.
Isha, Sunita Sangwan |
99-102 |
 |
20. |
Spectral Analysis of Sm3+& Dy3+: B2O3-Zno-Mgo Optical Glasses
Spectral Analysis of Sm3+& Dy3+: B2O3-Zno-Mgo Optical Glasses
Abstract: The present paper reports on the spectral results pertaining to Sm3+ or Dy3+ (0.2 mol%) ions doped B2O3-ZnO-MgO (BZM) glasses. The amorphous nature of the reference glass (65B2O3-20ZnO-15MgO) has been confirmed from its XRD measurement. Thermal analysis has been carried out for the precursor chemical mix and its weight loss has been noticed from the TG profile. Based on the DTA profile, the precursor chemicals mix transition temperature (Tg) and crystallization temperature (Tc) have been identified. The transformation of trigonal BO3 units into tetrahedral BO4 units has evidenced from the Fourier transform infrared (FTIR) spectrum of reference glass without dopant ion(s). Spectral measurements of absorption, excitation, emission and emission transition lifetimes have been carried out for the Sm3+ and Dy3+ ions containing BZM glasses separately. These glasses exhibit strong intense absorption bands in the near-infrared (NIR) region. The emission spectrum of Sm3+: BZM glass shows a prominent and bright orange-red emission at 602 nm (4G5/2 6H7/2) upon excitation with λexci = 404 nm (6H5/24F7/2). In the case of Dy3+: BZM glass, an appreciable blue emission at 485 nm (4F9/26H15/2) has been identified with an excitation at λexci = 387 nm (6H15/24I13/2). Energy level schemes relating to the emission mechanisms involved both in Sm3+ and Dy3+ glasses have also been explained. Decay curves are have been plotted in order to evaluate emission band lifetimes.
Key words: RE,3+ glasses, Optical analysis
Reference
[1] R.T. Karunakaran, K. Marimuthu, S. Surendra Babu and S. Arumugam, Dysprosium doped alkali fluroborate glasses-thermal, structural and optical investigations, J. Lumin. 130, 2010, 1067-1072. [2] Y. K. Sharma, S.S.L. Surana and R.K. Singh, Spectroscopic investigations and luminescence spectra of Sm3+ doped soda lime silicate glasses, J. Rare Earths 27, 2009, 773-780. [3] L. Zhu, C. Zuo, Z. Luo and A. Lu, Photoluminescence of Dy3+ and Sm3+: SiO2-Al2O3-LiF-CaF2 glasses, Physica B 405, 2010, 4401-4406. [4] P. Chimalawong, K. Kirdsiri, J. Kaewkhao and P. Limsuwan, Investigation on the Physical and Optical Properties of Dy3+ Doped Soda-Lime-Silicate Glasses, Procedia Eng. 32, 2012, 690-698.
[5] I. Pal, A. Agarwal, S. Sanghi and M.P. Agarwal, Investigation of spectroscopic properties, structure and luminescence spectra of Sm3+ doped zinc bismuth silicate glasses, Spectrochim. Acta A 101, 2013, 74-81.
M. Venkateswarlu, V. Naresh, R. Ramaraghavulu, B.H. Rudramadevi and S. Buddhudu |
103-113 |
 |
21. |
Design of E-City Bus Tracking System
Design of E-City Bus Tracking System
Abstract: E-city bus tracking system will serve as a viable notification system that will effectively assist passengers in making the decision of whether to wait for the bus or not. This system is a standalone system designed to display the real-time location(s) of the buses with the use of GSM module technology. The system will consist of an IR transmitter module installed on the buses, receiver boards installed on the bus stops and GSM receiver connected with PC monitoring the whole arrangement. It will also have passenger information system software installed at the bus stops and which will provide user the relevant information regarding all the bus numbers going for his source to destination along with the route details. It will also transmit its bus numbers and route names, with the help of LED transmitter, continuously as soon as the bus comes within the range of the receiver at the bus stop.
Key words: GSM, LED, IR, PC, standalone
Reference
[1] Dr. Saylee Gharge, Manal Chhaya, Gaurav Chheda, Jitesh Deshpande, Niket Gajra ``REAL TIME BUS MONITORING SYSTEM USING GPS", (IRACST - Engineering Science and Technology: An International Journal $($ESTIJ$), ISSN: 2250-3498) Vol.2, No.3June 2012. [2 ] Gaurav Chheda, Niket Gajra, Manal Chhaya, Jitesh Deshpande, Saylee Gharge ``REAL TIME BUS MONITORING AND PASSENGER INFORMATION SYSTEM" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-23207, Vol.-1, Issue -6, January 2012.
[3] www.atti.gps-vehicle-tracking-systemsg.htm
Shekhar Shinde, Vijaykumar Nagalwar, Nikhil Shinde, B.V.Pawar |
114-117 |
 |
22. |
Biodiesel Production from Waste Cooking Oil & Its Evaluation in Compression Ignition Engine Using RSM
Biodiesel Production from Waste Cooking Oil & Its Evaluation in Compression Ignition Engine Using RSM
Abstract: Lack of energy, deterioration of the environment and hunger,these are the three problems the humans are facing in todays era. There is an exponential rise in the demand is arrising for petroleum based energy. This has been followed by problem of depleting conventional petroleum fuels and a hike in price of these fuels, almost on a regular basis. Moreover, these green house emissions are results of petroleum fuels and other forms of pollution in the environment. The rise in the price of the fuel has also been alarming for us to find alternate energy resource.The vegetable oils has proved to be a promising source to obtain fuels for IC engines. Like, biodiesel is biodegradable, non- toxic and renewable fuel. It is obtained from vegetable oils, animal fats and waste cooking oil by transesterification with alcohols. The high cost of raw materials and lack of modern technology has led to the commercialization which can optimize the biodiesel yield. A modified engine can lead to better engine performance along with lesser specific fuel consumption. In this thesis, Response Surface Methodology (RSM) has been used which has focused on the optimization of biodiesel production, engine performance and exhaust emission parameters. There is abundant availability of Waste cooking oil in India which is non- edible. Biodiesel performance testing is done using C.I engine.Biodiesel has been prepared using waste cooking oil which is prepared by mechanical stirring method and compared with diesel. An experimental investigation to evaluate the performance, emission and combustion characteristics of a diesel engine. The optimization of performance and exhaust emission parameters of diesel engine which is run using waste cooking oil biodiesel. The studies were performed on single cylinder, four-stroke, water cooed, direct injection kirloskar diesel engine. The performance parameters like brake specific fuel consumption (BSFC), brake thermal efficiency (BTE), and unburnt hydrocarbons (HC), carbon monoxide (CO), nitrous oxide (NOx) and smoke have been tested upon by the biodiesel and are optimized using Response Surface Methodology. A.V.L smoke meter has been used to check smoke capacity. The performance parameters were identified to be very close to mineral diesel. The emission like carbon monoxide, nitric oxide and hydrocarbons were found to be lesser in quantity than commercial diesel.
Key words: Waste Cooking oil based biodiesel, Performance and emission characteristics, Response Surface Methodology, Central Composite Design.
Reference
[1] Lokesh, K., Deepak, K., Avinash, A.
"Performance evaluation of a vegetable oil
fuelled compression ignition engine",
Renewable Energy, 2008, 1147-1156.
[2] Sims, R.E.H. "Tallow esters as an
alternative diesel fuel", Trans ASAE, 1985,
16-21.
[3] Demirbas A. "Progress and recent trends in
biodiesel fuels" Energy Conversion and
Management, 2008, 14-34.
[4] Maheshwari N, Balaji C, Ramesh A. A
nonlinear regression based multi-objective
optimization of parameters based on
experimental data from an IC engine fueled
with biodiesel blends. Biomass &
Bioenergy 2011;35:2171-83.
[5] Lakshmi CV, Viswanath K, Venkateshwar,
Satyavathi B. Mixing characteristics of the
oil-methanol system in the production of
biodiesel using edible and non-edible oils.
Fuel Processing Technology 2011;92:1411-
7.
Jashan Deep Singha, Beant Singh |
118-125 |
 |
23. |
Ac and Dc Electrical Conductivities Measurements on Glycine Family of Nlo Single Crystals
Ac and Dc Electrical Conductivities Measurements on Glycine Family of Nlo Single Crystals
Abstract: In the present work, the AC/DC conductivity studies were carried out on Glycine family of NLO single crystals such as Trisglycine Zinc Chloride (TGZC), Triglycine Acetate (TGAc) and Glycine Lithium Sulphate (GLS). The AC conductivity measurements were carried out using HIOKI 3532-50 LCR HITESTER in the frequency range of 50 Hz to 5 MHz for the grown NLO single crystals. The DC electrical conductivity measurements were also carried out for the crystals using the conventional two – probe technique in the temperature range of 313 – 423 K. The present study indicates that both the AC and DC conductivity of the samples increase with the increase in temperature. The activation energies were also calculated from AC/DC conductivity studies.
Key words: AC conductivity, DC conductivity, Glycine family of NLO Single Crystal
Reference
[1] Prasad PN and Williams DJ, Introduction to nonlinear optical effects in organic molecules and polymers. Wiley, NY, (1991) [2] Jordon G, Kobayashi T, Blau WJ, Pfeiffer S, Horhold H-H, Advanced Functional Material. 13, (2003), 751–4. [3] Yang Z, Aravazhi S, Schneider A, Seiler P, Jazbisnek M, Gunter P. Advanced Functional Materials. 15, (2005), 1072–6 [4] Boyd GT, J. Opt. Soc. Am. B 6, (1989), 685 [5] Hatton BT, Landskron K, Hunks WJ, Benett MR, Shukaris D, Perovic DD, and Ozinn GA, Mater. Today. 9, (2006), 22
Suresh Sagadevan |
126-130 |
 |