Brakes has been an essential part of today’s modern automotive system. Brake are mechanical device that stops or retards the motion of moving member by absorbing kinetic energy and converting it heat energy. In the case of automobile this moving member is wheel. Brakes are not only important for stopping the vehicle but also for controlling it. Many different types of brakes are available in the market. Mostly disc brakes are preferred in two wheelers, because in disc brakes it gets enough time and space to disperse the heat produced during braking. Disc brake consists of brake pad, caliper, disc, hub and piston. Hub is attached to the wheels it rotates along with the wheels. Disc is attached to the hub and brake pad are mounted on disc on both side with the help of caliper. This caliper is operated by piston. When brakes are applied piston forces the caliper to move towards each other, thus forcing the brakes pads to rub against the rotating disc. And thus the speed of vehicle reduces and which eventually result in stopping of vehicle. In this paper we are modelling and analyzing the disc brake system of Honda CB Unicorn 150. Keywords: ANSYS, Disc Brake, Finite Element Analysis, SolidWorks, Honda
Cloud computing is also known as “on-demand Computing”, is use for sharing Data, Resources and Information. Cloud computing has now become a highly demanded service. Cloud Computing is one of the important and popular internet computing. It emerges as a new computing paradigm which aims to provide reliable and customized computing environments for end-users. From the past few years, there has been a rapid progress in Cloud Computing. Today's IT professionals in educational institutions need to respond quickly to increasing demands from students and faculty, while coping with fixed or declining budgets and staff. In this challenging environment, cloud-based computing has become an increasingly attractive option for delivering education services more securely, reliably, and economically. In today’s higher education environment, IT organizations must keep pace with a long list of competing demands. This paper has discussed the concept of Cloud Computing in education and on the basis of this issue analyzes its impact and advantages in the field of education.
Diabetes mellitus has been a deadly and widespread disease majorly in Africa and Asia. A number of approaches have been employed in diagnosing this disease to provide awareness to patients who may have such. Several research work have been publishes and presented to look into a management system for its diagnosis. Some crucial elements are yet missing from some of these literatures. However, few reviews have been centered on this systematically and thoroughly, that is, none have performed review systematically capturing the entire crucial elements such as diabetes type addressed, control recommendation considered, main contributions and approach strengths. This have brought about the lack of sufficiently good context of operation. In this paper, we carried out a systematic review of existing literature concerning diabetes diagnosis management system in so as to present a summarized evidences regarding the issue and background for positioning new research activities appropriately.
Design a Low Power Zigbee based smart energy Metering
Amrinder kaur, Manwinder Singh,
The Designing and implementing a system based on wireless communication. This paper presents an implementation methodology for a wireless automatic meter reading system using LabVIEW platform and ZigBee network technology. A system design using low power radio communication which is low cost, high performance, highest data rate, highest coverage area and most appropriate to deal with shortcomings of traditional meter reading system , which are related errors in reading the data , inaccuracy of parameters, and timely availability of data . The system is designed and tested wireless in lab environment against it performance, data payload, and reliability.The system is designed using electric meter, National Instruments software and, and ZigBee module. This system performs tasks creating the wireless network and transmits and receives the command for meter reading. This proposed system had potential to save meter reading cost, and additional enabling the many advance services of electrical utilities. Keywords: ZigBee, GPRS, NI, LabVIEW, Mesh Network
Mining of Retail Transactional Data for Revealing Seasonal Facts
Darshna B. Rajput
Retail market generated so many daily transactions throughout the day. This transactional data has been maintained by the bill information given to the consumers. This data set also maintains the facts regarding date and time for the particular transaction. In this paper, the goal is to mine the retail transaction data and find different facts regarding the particular season that are, WINTER, SUMMER and MONSOON. For finding these facts, the need of identifying frequent item sets is required. This frequent item sets find using classification and association techniques of data mining. The Weka tool is used for this analysis and applying different methods of classification and association. According to the research, season wise different facts regarding item groups and items in super store have been revealed which is helpful for predicating consumer behavior and product buying patterns in particular season.
Abhishek Chowdhury, Sidhyant Tejas, Thirunavukkarasu K
Predicting whether songs will be hit using Logistic Regression
Abhishek Chowdhury, Sidhyant Tejas, Thirunavukkarasu K
This paper predicts whether a song will be super hit and will it reach it to chart buster based on several music features. It is crucial to predicting the popularity of a song, especially in a business competitive world. We will use Logistic Regression in our model to predict the probability of reaching Top 10 songs in the popularity.
Cloud Robotics: Its Industrial Automation Implementation And Challenges
Hitashu Kanjani
Since the cloud computing is easily and widely available and robots along with its automation system have been at the front of research with majority of systems still operating on the basis of onboard computation and memory management , it is wise to develop a system which allows integration of robotic services with cloud services. The cloud robotic architecture leverages the combination of a cloud formed by machine to machine (M-2- M) communication among participating robots and an infrastructure cloud enabled by machine to cloud communications(M-2-C). Success in cloud robotics implementation will also help in future robotics application to evolve more as one of the standard service accessible through the cloud similar to the applications of other domain which were based on cloud computing. The aim of this paper is to provide a better understanding and implementation of cloud robotics in industries using parallel grid computing and cloud architecture.
This paper extract the features of folk music of west region of India with consideration of elements of music such as duration, dynamics, harmony, melody, structure, texture and timbre of folk songs. This paper also helps to improve the performance of the folk songs.
Offline Signature Verification System for Bank Cheques Using Zernike Moments, Circularity Property and Fuzzy Logic
Ashok Kumar. D and Dhandapani. S *
Handwritten signature plays its authorization role in most legal and financial documents. It is the most accepted and economical means of personnel authentication. It can be verified using online or offline verification schemes. This paper proposes a model to verify signatures by combining features like Zernike moments, circularity and aspect ratio. Unlike characters, signatures vary each time because of its behavioural biometric property. Signatures can be identified based on their shape. Moments are the good translational and scale invariant shape descriptors. The amplitude and phase of Zernike moments, circularity property and aspect ratio of the signature are the features that are extracted and fed to fuzzy classifier. Fuzzy logic classifies the signature into genuine or forged. Experimental results reveal that this methodology of combining zernike moments along with the two mentioned geometrical properties give higher accuracy and the accuracy rate increases with the increase in number of samples given to the fuzzy classifier. Keywords: Offline Signature Verification, Zernike Moments, Fuzzy Logic.
Multilevel inverters are mainly used in high power applications, where they have proved to be reliable and robust. They operate with low frequency and present high efficiency. Current demand on different reliable, efficient and robust inverters for different energy system has extended multilevel application to small power system as well. In this project, an inverting system will be developed using the cascaded H-bridge multilevel inverter technology, which is able to synthesize a desired ac voltage from several levels of dc Voltages. Multilevel inverter as compared to single level inverters have advantages like minimum harmonic distortion, reduced EMI/RFI generation and can operate on several voltage levels. A multi-stage inverter is being utilized for multipurpose applications, such as active power filters, and in many renewable energy power applications. The PWM signal thus generated is then used as triggering pulses for the multilevel inverters. This Project aims at the simulation study of single phase cascaded H- bridge multilevel inverter using DC voltages MATLAB software. It will be used to investigate and verify the quality of the ac output voltage, harmonic content of the output voltage and effects of different switching scheme.
Review on various scheduler used by Hadoop framework
Usha Rani , Anurag Rana, Sahil Barjtya
A distributed system is a collection of independent computers that appears to its user a single coherent system. This definition can explain several important aspects. The first fact is that a distributed system is the collection of different types of component’s for example computer, networking devices, storage, printers etc. In this paper we presented a detailed review of all the scheduling technique used by Hadoop framework this paper provides you deep insight of these scheduler working.
In this paper we discussed about most emerging field of computer science engineering name as Big Data. This paper provides you detailed information about big data from basic to advance level. In this paper we describe about massive amount of structured, unstructured and semi structured because big data related to gathering and analysis of huge amount of data and analysis of data in this paper we also discussed about tools such as (Hadoop and HIVE) used in big data. This paper provides you deep insights about big data and various area of research available in this field.
Soha S. Zaghloul, Hadeel Al-Jami , Maha Bakalla , Latifa Al-Jebreen , Mariam Arshad, Arwa Al-Issa
Parallelizing A* Path Finding Algorithm
Soha S. Zaghloul, Hadeel Al-Jami , Maha Bakalla , Latifa Al-Jebreen , Mariam Arshad, Arwa Al-Issa
Parallel processing is adopted with the aim to run multiple independent program tasks simultaneously on multiple CPUs with the objective of minimizing the execution time of the whole program. In this research, parallel A* is implemented on a shared-memory multiprocessor system. Experimental results are compared with the sequential A* to find an optimum or near-optimum path between two points in a grid map. The most prominent drawback of the A* algorithm is the long execution time since it examines each of the neighbor nodes, beginning at the start node going through to the goal node. Therefore, having different threads running simultaneously to find the path from each neighbor of start node to goal node is expected to reduce the computation time dramatically. Different parameters are used to assess the performance of the parallel version of the A* algorithm; namely, the execution time, the speedup, the scalability, and the efficiency. The experiments are conducted with different number of threads. Interesting results are given with respect to the previously mentioned four metrics. Keywords: Parallel A*, Shared-memory multiprocessors, Path finding.
Conventional combustion engine vehicles are very much responsible for various kinds of pollutions in current decade due to emission of Green-house gases. To control the problem of pollution occur by Combustion engines and also reduce the effect of Global warming, renewable energy sources are come in picture. Various kind of renewable energy sources are used for domestic as well as industrial applications. In Asian Countries Solar energy is accomplished in very large amount. To overcome the disadvantages of Conventional combustion engine vehicles this research introduced Hybrid Solar Vehicle.Hybrid Solar Vehicle is performs on the principle of Photovoltaic Solar Cells. Sunlight or Solar energy is directly converted into Electrical energy by using Photovoltaic cells for displacement of vehicle. Lithium-ion batteries are used in this future designed Hybrid vehicle for storing the Electric Power which is generated from Photovoltaic Cells. This future designed vehicle is more efficient in the manner of Green-house gases emission.
A Secure Framework for Messaging on Android Devices with Honey Encryption
Rasmita Sahu , Shajid Ansari
Nowadays, there are various encryption techniques used to secure the messaging services before send it through the unsecure network. But still the attackers hack the message by using various hacking methods. So for providing more security and to avoid the Brute force type attack, we provide a best encryption technique with encoding scheme. The proposed approach aim to develop a secure messaging framework for Android based devices using Honey Encryption with Symmetric key cryptography techniques, for preventing the text based messages from brute face attacks in order to make messaging communication more secure and efficient. In this work we combine the Honey encoding with both AES and Blowfish separately and then compare the performance of both the algorithm. Experiments show that Blowfish algorithm when combined with Honey Encryption scheme produces result in less time.
User Awareness of Privacy Concerns Posed by the Use of mHealth Apps
J.I. Apuru , D.R. Andembubtob , A.K Dodo
The proliferation of mobile devices such as phones, iPads, tablets, PDAs and other handheld devices, in the society have revolutionised how human activities are carried out today. Jobs and tasks which were erstwhile undertaken only by professionals and specialised institutions within a certain confined environment are now done by individuals who are novices by the mere advantage of owning a mobile device. The health industry is one of the sectors reaping the benefits of this advancement and large number of mobile devices with the applications used on them, mainly Mobile Health Applications. It is observed that this knowledge poses privacy concerns among users of these apps on their mobile devices. Therefore, we propose a research to assess user‟s awareness of their data privacy as it concerns the requesting, collection and usage of their personal information by mHealth applications. We focus on how, when and why these personal data are collected from users in the use of mHealth applications. From our study, it is observed that users, who show indifference concerning their data privacy, have come to know that they can‟t install mobile apps without granting certain permissions. Users‟ nonchalant attitude towards how their personal data are collected and used online is seen in the fact that they say nothing in the User Review section to complain. Also in an online survey conducted most of participant say they review required permissions and apps privacy policies; and read other users‟ review but still installed the apps since they needed to use them. This also affects the adoption of responsible practices by developers. It is argued that had developers seen users showing serious concern over their data privacy they would be more responsible in handling these data during the development of their apps. Non-adoption of responsible research in mHealth apps development places users‟ personal (identity) data at a high risk of mismanagement.
Analysis of Dynamic Buffer Management Approaches in Mobile Ad hoc network
Surbhi Kushwah, Mr. Upendra Dwivedi
Mobile ad hoc network also known as wireless ad hoc network is one of the most popular network technologies in research and development. The ad hoc nature of network keep attracted researchers and engineers for finding the new and enhance techniques. This paper presents a analysis on mobile ad hoc network and the buffer management technique. Therefore the paper includes the MANET details, buffer management techniques, recent research work centered on buffer management and a proposal for improving the network performance by incorporating the buffer management in MANET.
Edge Detection using Average filter & Thresholding
Saloni Lamba , Paru Raj
Images play an important role in the visual perception and vision is the most powerful sense among all the senses of human. Digital image processing is an important and crucial concept in computer vision for the purpose of effective image display and extraction of desired features as well as for editing and manipulating images. Edge detection is an authoritative concept in the digital image processing and is the initial step for image segmentation. Edges are detected for the purpose of creating a boundary or contour between an object and the background surface or different parts of a particular image. Detection of the edges include a number of different mathematical techniques that are used with the motive of identifying sharp discontinuities in a digital image. Edge detection is the fundamental concept used in image processing, machine and computer vision, image segmentation, and face recognition. In this paper, we are going to present an edge detection algorithm based on the average filtering of an image followed by thresholding and at last masking.
Measurement of Network Delay between Two Internet Hosts Using Mininet
Baby Praska K, K.Syama Sundara Rao , B.N.Swamy
Ad hoc methods have complete self planning and self-configuring capabilities, that needs no current program features or management. Hypothetically TCP happens to be a transport-layer technique designed to provide a efficient end-to-end submission of data over untrustworthy methods. But actually TCP actions some complications in multi hop ad hoc methods especially direction issues. To address this problem previously an improved TCP technique to cope with direction issues using discussion identification using obstruction window difference (CWA–CD) methods is designed and used. Although it's efficiency is appropriate its incapability to consider node versatility as a part to cope with direction issues is a cause for issue. So for a effective and better program efficiency I suggest to use a choose and focus on forwarder a history requirements that controls node versatility part along with CWA–CD methods. The requirements contains ongoing up-dates of location information for every small-time periods of time and steps to sort out the delivering history that helps connections. A realistic performance of the recommended program validates the declare in terms of efficiency.
Now in these days the traffic on road is increases much frequently. In addition of that to manage the road traffic various efforts are also prepared. In this context the vehicle number plate recognition is a valuable step to identify the vehicle and their identity. In this paper the review of such kind of vehicle recognition system is prepared. In addition of that for improving the accuracy of number plate recognition a new model based on existing technique is prepared. That model claims to provide the efficient and accurate recognition. In addition of that the future extension of the proposed work is also included.