T R A C K       P A P E R
Close

Login Panel

Close tab

Password Meter

Volume 05 Issue 07 (July 2018)

S.No. Title & Authors Page No View
1

Title : Importance of Study of Mathematics in Engineering Education

Authors : Mr. Rakesh Kumar Verma, Dr. Arvind Dewangan

Click Here For Abstract

Download Certificate
Abstract :

The word engineering comes from the Latin word "inenerare," which means "to create." Engineering is a science where the forces of nature are converted for the utility of mankind. Natural forces and mathematical analysis are juxtaposed for the benefit of people. Science and mathematics are integral parts of engineering. Science teaches us about the laws of the natural world and mathematics helps us to establish relationships among different quantities. Both subjects are of paramount importance if you are planning to study engineering at the university level. While in school, you must build a very strong understanding of science and mathematics because these are the foundations upon which your study will be based.

1-3
2

Title : Solving the Traveling Salesman Problem using Genetic Algorithms

Authors : Luis F. Copertari

Click Here For Abstract

Download Certificate
Abstract :

The Traveling Salesman Problem (TSP) is solved using genetic algorithms. Two alternative ways to represent the solution (genes in series and genes in two columns) are used and different mutation rates as well as different population sizes are considered. Two computer programs are created to solve the problem and yield experimental data. The data is analyzed and discussed and conclusions are derived. An equation relating the percentage of the population with the same solution (w) and the mutation rate (g) is discussed. This equation and the tradeoff between population size, mutation rate and chromosome portraying method are the theoretical contributions of this work, as well as an innovative way to solve the TSP, which is a hard problem to solve using traditional optimization, such as linear programming.

4-14
3

Title : Efficiently Discovered Deep Web Interface Using Data Mining Approach

Authors : Ms. Bangar Abhishek P., Prof. Kore K.S.

Click Here For Abstract

Download Certificate
Abstract :

the content hidden behind HTML forms, has long been Recognized as a significant gap in search engine coverage. It represents required contents of the data on the Web; accessing Deep-Web content is not an easy challenge for the database community. Indexing of the searched data is fundamental problem faced by web crawlers that has profound effect on search engine efficiency. Recent study about searching contents on the web shows that nearly 96% of data over internet is encapsulated as well as hidden i.e. not found to search engines. The challenge faced by the search engines is to retrieve and access hidden web data or contents at low cost.  This composed system uses a machine learning approach that is highly scalable, completely automatic, and very efficient to use, that helps to improve data retrieval functionality at lower cost. This system uses focused crawling strategy for accessing accurate searched results related to query and selects only relevant information or data according to their similarity with respect to query. The algorithm used in this system intelligently selects only possible candidates rather than searching whole document for addition in too your web search index. The automatic attribute building is used for form classification that helps to minimize manual training time and data set building.

15-19
4

Title : Study on Stability and Convergence Speed of Comprehensive National Strength System with Time Delay

Authors : Chunpu Zhang, Yanhui Zhai

Click Here For Abstract

Download Certificate
Abstract :

The stability andof the comprehensive national strength model with time delay are discussed. The linear stability and of the model are studied by using the geometric criterion of stability switching for time delay systems, and the differences and relations between the two stability are compared. Finally, numerical simulation is applied to verify the accuracy and effectiveness of the conclusion.

20-22
5

Title : Detection and Monitoring Of Induction Motor Faults Using Lab View

Authors : S. Prashanth, Dr Rajashekhar J S

Click Here For Abstract

Download Certificate
Abstract :

early detection of faults in stator winding of induction motor is crucial for reliable and economical operation of induction motor in industries. Whereas major winding faults can be easily identified from supply currents, minor faults involving less than 5 % of turns are not readily observable. The electric motor usually consists of two types of faults they are electrical and mechanical faults. In these two faults mechanical faults play a major part. In order to protect the motor from such kinds of faults we are implementing suitable methods for detecting and monitoring those using standard models and software tool. In this project we are using LABVIEW as the software tool for monitoring the faults. The main purpose of using this software is that we can display the results in graphical way which is useful for the comparing purposes.

23-27
6

Title : Novel Low Cost Adsorbent for the Removal of Rhodamine B Dye from Wastewater

Authors : Shweta Mitra, Tirthankar Mukherjee

Click Here For Abstract

Download Certificate
Abstract :

This study deals with the preparation of Activated Carbon (AC) from spent tea leaves collected from local shops and stalls. 5% NaOH solution was used to chemically activate the tea leaves in a ratio of 1.5:1 (NaOH: Carbonized tea). The activated tea leaves were further subjected to carbonization at 350°C for 2hrs. The prepared AC was impregnated with iron nano-particles (TAC/Fe). This TAC/Fe was used to adsorb Rhodamine B dye aqueous solution. The effect of different parameters such as pH, adsorbent dosage (g/l), the initial concentration of dye (ppm) and temperature (°C) were studied. The removal % decreases as the initial dye concentration increases and with increase in pH it also decreases as obtained from the effects of the individual parameters. The removal of RB dye increases with the increase in adsorbent dosage. From the thermodynamic study it has been observed that at a low temperature of 30°C the molecular motion was very low and the removal efficiency was 85.25 % but at higher temperatures around 80-100°C, the removal efficiency increased to 90.2%.

28-32
7

Title : Secure Data Embedding In Images from External Attacks

Authors : Vanita J. Dighe, Dr.Baisa L Gunjal

Click Here For Abstract

Download Certificate
Abstract :

Most of the times in the data hiding process in images least significant bits of the pixels are used to store the data. And many of the researches are done based on the serial placing of the data bits without estimating the data allocation size. Due to this an irregularity is raised and data may not be hidden properly in the image.  So it is a need to estimate the data allocation bits before performing steganalysis by doing reverse engineering. So proposed methodology put forwards an idea of estimating the  least significant bits before storing the textual data bits and then these bits are embed into the pixels bytes to perform steganalysis  in proper manner. Proposed model exposes to many attacks like image encryption, Image compression and file segmentation. Even though all this proposed model efficiently recovers the hidden data from the image.

33-38
8

Title : Announcement Effects of Share Buyback: Study of IT Companies Listed on NSE

Authors : PreetiAttri, Dr. Hem Shweta Rathore

Click Here For Abstract

Download Certificate
Abstract :

This paper examines the reaction of market share prices on announcement of share buyback, as a tool of restructuring of shares and the regulation of buyback practices in India. Companies announce buyback of shares either to increase the value of issued shares or to eliminate any fear by shareholders who may be looking for a controlling stake. The effect of announcement of buyback is always revealed on share prices. The Information Technology companies are chosen for study which is listed on the National Stock Exchange of India. The provisions regulating buyback of shares are enclosed in Section 77A, 77AA and 77B of the Companies Act, 1956. These sections were inserted by the Companies Amendment Act, 1999. The paper reveals the previews of the buyback of shares by IT companies and its impact on financial performance of the company.

39-42
9

Title : Review on Computer Aided Design and Analysis of Modular Fixture for Milling Operation

Authors : Prof. M.V Gudadhe, Shahidzama

Click Here For Abstract

Download Certificate
Abstract :

Milling operation which refers to production of various profiles forms an integral part of any machine shop and it is intended to provide faster material removal rate due to application of multi point cutting tool. Fixture which comprises of the locators, clamps and support structure provides efficient machining of large volume of production by saving considerable amount of setting time involved by using conventional work holding devices.  Last few decades have seen the tremendous growth of industries and has resulted in development of its allied operations of which milling is one of the crucial operation performed. The conventional milling operation which surely involves a dedicated fixture which has to be subjected to change with the change in design of the component results in wastage of time and material required to build a new fixture for new component. The present paper attempts to design and analyze a modular fixture which will can adapt to change in the design of the component. The component selected are swing lever and cylindrical component which are used in Ginning machine and this are milled using same fixture in the proposed design of milling fixture. The locators used for two components are according to the geometry of component of which swing lever requires cylindrical pin locator and diamond pin locator and cylindrical component requires V Block locator. The locators can be replaced on the same base structure and can be subsequently clamped using the strap clamp which can be employed for milling of both the coomponents. This milling fixture with modularity is designed in CAD tool named as CATIA V5 and efficiently analyzed by using FEA technique which is the working phenomenon for ANSYS.

43-47
10

Title : Study of Cyber Security Challenges Its Emerging Trends: Current Technologies

Authors : Veenoo Upadhyay, Dr. Suryakant Yadav

Click Here For Abstract

Download Certificate
Abstract :

Cyber Security plays a vital role within the field of knowledge technology. Securing the data became one in every of the largest challenges within the gift day. Once ever we expect concerning the cyber security the primary factor that involves our mind is ‘cyber crimes’ that area unit increasing vastly day by day. Numerous Governments and corporations area unit taking several measures so as to forestall these cyber-crimes besides numerous measures cyber security continues to be a awfully huge concern to several. This paper primarily focuses on challenges visage by cyber security on the newest technologies. It conjointly focuses on latest concerning the cyber security techniques, ethics and therefore the trends dynamical the face of cyber security.

48-52
11

Title : Pipelines Leak Classification Based on Artificial Intelligence

Authors : Dr. Hanan A. R. Akkar, Dr. Wael A. H. Hadi, Ibraheem H. M. Al-Dosari

Click Here For Abstract

Download Certificate
Abstract :

Many industrial activities play an important role in life by delivering the adequate resources. However fluid pipelines represent the back bone for these industrial resources due to oil and gas transportations around the world. But unfortunately great losses are recorded annually due to leakages in these fluids pipelines.so this idea attracts most of the researcher to shrink the heavy loses by incorporating the artificial intelligence theory to predict the behavior for these pipelines and estimate the probability for leak occurrence and provide enough information about leak position and size rather than a prior protective actions against the corrosion and environmental risks. This work adopts a neural network model with back propagation algorithm as one of the popular methods for leak detection in a pipeline which is usually used to classify the leak size and position. Different transfer functions are compared from classification accuracy and training performance points of view.

Results of the paper explained the difference between various transfer functions used for hidden and output neurons in ANN, also the confusion matrix for each learning algorithms shows the outperformance for the batching method against the incremental method for weights updating in the BPNN

53-61
12

Title : The first and second Order Polynomial Models with Double Scalar Quantization for Image Compression

Authors : Prof. Dr. Ghadah Al-Khafaji, Sara A. Abdulrahman

Click Here For Abstract

Download Certificate
Abstract :

This paper introduced a mixed separated polynomial coding technique of linear and nonlinear base of two stage scalar quantizer to compress grayscale images. The test results of the proposed compression method showed highly performance compared to traditional polynomial technique of linear and nonlinear base

62-68
13

Title : Experimental Study of a Hybrid Evacuated Tube Solar Collector Using Methanol as Working Fluid

Authors : J.Ferdous, M.R.I. Sarker, R. A. Beg

Click Here For Abstract

Download Certificate
Abstract :

Bangladesh is immensely dependent on conventional fuels to fulfill its energy demand, so these resources are depleting continuously. Renewable energy can be the alternative source to mitigate the increasing energy demand of this country. Among all renewable energies, solar energy is pollution free and available. Evacuated tube solar collectors are the most popular form of solar collectors because of its low coefficient of heat losses and high thermal efficiency. This paper deals with the design, fabrication and experimental investigation of a hybrid evacuated tube solar collector (ETSC). The constructed ETSC is attached to the air cooler, which helps to minimize the compressor power. ETSC consists of four borosilicate glass tubes and manifold. Each glass tube has a heat pipe and the heat pipe contains methanol as a heat transfer fluid inside it. A single pass header pipe is installed inside the manifold where water takes heat from the condenser. The experiments were conducted in the period of September to February in the climatic condition of Rajshahi, Bangladesh. The solar intensity varied in between 874 W/m2 to 984 W/m2. The results obtained from the experimental investigation showed that the thermal efficiency of the collector was 28.69% at a mass flow rate of 0.00188 kg/s. The collector energy is helpful to reduce the compressor power of the air cooler and results in an improved and efficient system

69-74