-
A Fast and Easy Mechanism for Identifying Data Provenance and Packet Drop Attack by Applying Bloom Filter in WSN
Fouziya Parveen ; Veeranna Gatate
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 307 - 309
For the sake of creating big applications domain, many sensors are installed and the core vital physical building uses accumulated data from these frameworks. Here the core duty of center processed nodes is to accumulate information from variety of sources that are being accumulated in the sensors. In this system at the time of calculating the dependency of sensor data, data provenance plays a prominent role. Less energy, bandwidth control, well-organized memory storage and highly dependency transmission these are the tough requirements which are needed to be fulfilled by the sensors at the time of governing the provenance in WSN.
Read More...
-
Paper on Design and Analysis of Bending Furnace using Light Disel Oil as a Alternative Fuel
Ramesh D. Bokde ; Vaibhav H. Bankar
Mechanical Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 310 - 317
The aspect of heat transfer which in itself requires an elaborate model is considered here. Taken into account are the convection and radiation between gas and brick wall, and the conduction from bricks to light diesel oil as a fuel used in this paper. by taking minimum heat loss rate (HLR) as optimization objective. Two boundary conditions of the insulation layers, convective heat transfer and combined convective and radioactive heat transfer, are taken into account. The optimal constructs of the insulation layers with the two boundary conditions are obtained. Improvement of energy efficiency of the most consuming facilities was achieved by improving the use of alternative energy minimization such as reducing the heat loss of hot gases, minimizing the heat radiated through refractory linings of metallurgical furnaces.
Read More...
-
A Numerical Approach for Solving Nonlinear Boundary Value Problems in Finite Domain using Spline Collocation Method
Nileshkumar A Patel ; Dr. Jigisha U Pandya
Engineering Maths
Year: 2016, Volume:3, Issue : 1
Pages: 318 - 321
A collocation method with quartic splines has been developed to solve third order boundary value problems. The proposed method tested on third order nonlinear boundary value problem. The solution of nonlinear boundary value has been obtained linear boundary value problems generated by quasilinearization technique. Numerical results obtained by the present method are in a good agreement with the analytical solutions available in the literature. Based on the Spline Collocation Method, a general approximate approach for obtaining solution to nonlinear boundary value problems in finite domains is proposed. To demonstrate its effectiveness, this approach is applied to solve three point nonlinear problems.
Read More...
-
Safety of Women Passengers in Share Autos- A Case Study of Chennai
R Manikandan ; Dr. S. Lakshmi ; P. Bakiya
Civil Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 322 - 328
Chennai is the fourth largest Metropolitan Area in India with a population of 8.02 million as of 2015. The city Chennai is internally connected by road and rail networks. In Chennai, 3531 Metropolitan Transport Corporation buses are operating with an equal number (3500) of share autos in operation. The inability to provide the last mile connectivity by the public transport system has made the people to look for Para-transit system or Intermediate Public Transport (IPT) system for their day to day commuting. Many literatures have shown that women are the users of public transit and IPT because of they have less access to private transport due to many reasons. Here in this research work a questionnaire survey has been conducted in two corridors of south Chennai to find out women passengers view on usage of share autos, problem they face and their safety while travelling preference for share autos. Women commuters in the working age group prefer share autos because of overcrowded bus service and the problems attached to it (harassment and robbery). However, share autos also have some limitation in certain aspects like invasion of personal space by an unknown co male passenger, and travelling alone late evening and in poorly lit streets were the reasons for in secured feeling. To have a safe journey women prefer special buses for ladies during late evenings and have share autos driven by women only for women passengers.
Read More...
-
Dynamic Hand Gesture Detection & Recognition System Using HSI, YCbCr & Morphology Method Using SVM
Hemlata Chavan ; Mr. Prateek Gupta
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 329 - 335
During past few years, human hand gesture for interaction with computing devices has continues to be thriving area of research. Hand gesture Recognition system received great attention in recent years because it provides human computer interaction and sign language. Hand gesture recognition is containing three stages: Pre-Processing, Features Extraction, classification. Most current approaches is based on the static hand gesture recognition Hand gesture recognition is often too sensitive to poor resolution ,environment of background, occultation among other prevalent problems and recognition dynamic hand gesture. So, proposed work investigates dynamic hand gesture recognition using Conditional Random Field. Result shows dynamic hand gesture recognition under complex background and achieve better recognition rate.
Read More...
-
Deterministic Relay Node based Improved Leach Protocol for Wireless Sensor Network
Manisha ; Nidhi Mittal
Electronics & Communication Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 336 - 339
Wireless sensor network (WSN) is a network consisting of small nodes with sensing, computation and capabilities of wireless communication. Nodes collect, transmit and forward data to base station. It is a hot emerging technology. Each sensor fetches data from the monitored area like temperature, sound, vibration, pressure etc. In WSN energy constraints makes energy saving and make longer the network lifetime. In this paper we reviewed different approaches of LEACH proposed by different researchers relating to clustering and scheduling of wireless sensors. In this paper, we done the comparison the various protocols of LEACH and its parameters are energy efficiency, Lifetime of networks etc.
Read More...
-
Strong Presentation and Acknowledgment of Facial Feelings Utilizing Great Meager Learning
Ameena Fatima Chowdry Bagwan ; Prof. Shivleela Patil
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 340 - 342
Acknowledgment of normal feelings from human countenances is an intriguing point with an extensive variety of potential applications like human-PC association, robotized coaching frameworks, picture and video recovery, keen situations, and driver cautioning frameworks. Customarily, facial feeling acknowledgment frameworks have been assessed on research facility controlled information, which is not illustrative of the earth confronted in true applications. To heartily perceive Facial feelings in true common circumstances, this system gives an architecture called high learning, which can mutually take in a word reference (set of premise) and a non-direct characterization representation. This given perspective consolidates this discriminatory force for artificial machine learning accompanied by recreation possessions like inadequate illustration up to precise characterization while given boisterous signs and defective information recorded in regular settings. Moreover, this work introduces another nearby spatio-transient descriptor that is particular and posture invariant. The given structure can accomplish best in class acknowledgment exactness on both acted and unconstrained facial feeling databases.
Read More...
-
An Approach To Improve The Energy Efficiency Of LEACH Protocol using Genetic Algorithm
Ratna Patil ; S. K. Padaganur; Dr. J. D. Mallapur
Electronics & Communication Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 343 - 350
Wireless sensor network (WSN) plays significant role in wireless communications. The major constraint with WSN is limited battery power nodes. In this report, we propose a modification to a popular protocol for sensor networks called LEACH (Low Energy Adaptive Clustering Hierarchy). LEACH is known as one of the best hierarchical routing protocols concerning energy efficiency in the networks. In this work, we enhance the life span of the nodes in the LEACH protocol using Modified-LEACH. The results of Modified-LEACH are further improved using Genetic Algorithm, which is more effective in enhancing the network lifetime when compared to LEACH.
Read More...
-
Sensor Deployment And Scheduling using Optimization Techniques in WSN
Namrata B. Bannur ; S. R. Purohit
Electronics & Communication Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 351 - 357
Network lifetime assumes an essential part in setting up an effective remote sensor network. This should be possible by conveying sensor nodes at ideal area and sensing these nodes in a manner that network accomplishes the most extreme network lifetime .In this report manufactured honey bee state calculation" and Particle swarm advancement†are utilized for sensor sending issue and Heuristics for planning reason. A similar study demonstrates artificial bee colony algorithm performs exceptional for sensor organization issues.
Read More...
-
An Efficient and Censored Adaptive Mobile Video Streaming for the Social Video Sharing in the Clouds
Nadiya Samreen ; Nadiya Samreen; Rashmi K. H
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 1
Pages: 358 - 362
During the last two decades streaming in the internet has increased tremendously and transformation of the ancient technology into the mainstream technology. As demand for videos is increased, video traffic has increased rapidly over the video traffic, so the wireless link cannot maintain the traffic demand. The gap among the link capacity and traffic demand, time-varying link, leads to poor quality of video streaming in the networks of mobile which ultimately leads to disruptions and buffering time. As there is large development in technology special importance should to given to security of data for avoid the manipulation of information. The privacy and data protection should be provided to avoid misuse of data uploading which can harm emotions of user. The videos that are uploaded into the network should maintain high security and must be censored so as to avoid unauthorized leakage of private videos of the users. Thus, we propose a very efficient way of uploading videos by censoring the adultery and offensive video by providing the admin. The admin takes care of either accepting or rejecting the request from the user end before uploading the videos each time through his account. To make the user delight with the video services, this can be achieved by incorporating the cloud in the architecture by the service provider. The video cloud architecture is formed to specific application like providing the good video service to the user. The finest solution to the service providers to provide the uninterrupted network (i.e. the network without disturbance) for the customer for using video services is by incorporating video cloud.
Read More...