International Journal for Research in Applied Science and Engineering Technology (IJRASET)

International Journal for Research in Applied Science and Engineering Technology (IJRASET)

Basic info

  • Publisher: International Journal for Research in Applied Science and Engineering Technology (IJRASET)
  • Country of publisher: india
  • Date added to EuroPub: 2017/May/21

Subject and more

  • LCC Subject Category: Engineering, Applied Linguistics
  • Publisher's keywords: Applied Science, Engineering Technology
  • Language of fulltext: english
  • Full-text formats available: PDF

Publication charges

  • Article Processing Charges (APCs): Yes 50 USD
  • Submission charges: No
  • Waiver policy for charges? No

Editorial information

Open access & licensing

  • Type of License: CC BY-NC
  • License terms
  • Open Access Statement: Yes
  • Year open access content began: 2013
  • Does the author retain unrestricted copyright? False
  • Does the author retain publishing rights? False

Best practice polices

  • Permanent article identifier: DOI
  • Content digitally archived in: Nopolicy
  • Deposit policy registered in: None

This journal has '5163' articles

Network Security Attacks Solution and Analysis

Network Security Attacks Solution and Analysis

Authors: Umesh B. Shingote, Vaibhav P. Sawalkar
( 23 downloads)
Abstract

Network security is that the composition of the vital policies and managed criteria adopted by an individual for the interference of unauthorized access, modification network-accessible resources network security plays a vital role in single laptop users, numerous organizations, and business networks. With the increasing use of the web, issue of laptop security became vital half and concern. By modifying the design of designing of the web, presumably reduces the attacks across the network. The study of those attack strategies permits for the acceptable security technique to specialize in the analysis. Several organizations create additional secured from the web by coding and firewall security strategies. An “intranet” to stay connected to the web however secured from potential threats. The complete field of network security is huge and in an organic process stage. So as to know the analysis being performed these days, background of the web, its vulnerabilities, attack strategies through the web, and security technology is vital and so they're reviewed.

Keywords: Networks, Attacking methods, Network security, confidentiality, integrity.
A New Approach to Provide Security to Audio Information Using Cryptography & Steganography

A New Approach to Provide Security to Audio Information Using Cryptography & Steganography

Authors: Mr. Sanket. N. Wawale, Prof. Arindam Dasgupta
( 23 downloads)
Abstract

Information in any form is a very important resource for any organization or individual person. Due to research and new technologies it is possible to store and exchange information in different formats. Information can be stored and distributed through different medium such as text, audio, video, graphics, etc. Audio or sound medium is found to be used in many applications for providing security, voice commands, voice synthesis and entertainment. This project is an approach for providing security to audio information. This concept is based on Cryptography and Steganography. With the help of these two techniques, two levels of security is provided. Cryptography will convert the original data in different form and Steganography will hide one audio file into other audio file.

Keywords: Cryptography, Information Hiding, Steganography and LSB.
Analysis and Classification of Software Engineering Risks

Analysis and Classification of Software Engineering Risks

Authors: Rashmi Dhruv
( 21 downloads)
Abstract

Despite various methods that exist in software risk management, software projects have a high rate of failure. When complexity and size of the projects are increased, managing software development becomes more difficult. In these projects the need for more analysis and risk assessment is vital. In this paper, a classification for software risks is specified. Then relations between these risks using risk tree structure are presented. Analysis and assessment of these risks are done using probabilistic calculations. This analysis helps qualitative and quantitative assessment of risk of failure. Moreover it can help software risk management process. This classification and risk tree structure can apply to some software tools.

Keywords: Risk analysis, Risk assessment, Risk classification, Risk tree.
Controller Area Networks (Can) Evolution, Response Time Analysis and Applications

Controller Area Networks (Can) Evolution, Response Time Analysis and Applications

Authors: Kulbhushan Singh
( 22 downloads)
Abstract

Initially designed as a new mean in providing communication network between control units in automotive industries, the controller area network (CAN) has shown a great surge of interest due to its vast advantages. Since then it is widely used in various automation industries including military, aviation, electronics, factories and many others. CAN was designed to allow microcontrollers and devices to communicate with each other without the presence of a host computer and avoiding extensive load to the main controller. It is a high performance and high reliable advanced serial communication protocol which effectively supports distributed real- time control. Ideally, CAN is suitable in application requiring a large number of short messages with high reliability in rugged environment. These characteristics along with many others, allows wide opportunity in development of intelligent ubiquitous sensor network and controller system. This paper presents a brief introduction on CAN operating principles, its architecture and protocols. Also, various applications of CAN are introduced and surveyed.

Keywords: Controller Area Network, Scheduling, Time analysis.
An experimental study of heat transfer intensification in a channel having corrugated plate by using twisted tape as an obstacle

An experimental study of heat transfer intensification in a channel having corrugated plate by using twisted tape as an obstacle

Authors: Raman Kumar , Ishu Monga
( 21 downloads)
Abstract

At present, the technology of the twisted-tape inserts is widely used in various industries. Twisted tapes are inserted in a channel which is a passive method for enhancing the heat transfer. Swirls are generated in the flow and by disturbing the boundary layer the heat transfer can be increased. The proposed research paper is an attempt to explain that such tapes induce turbulence and superimposed swirl flow causing a thinner boundary layer and consequently resulting in a high heat transfer coefficient and Nusselt number due to repeated changes in the twisted tapes with different twist ratios.

Keywords: Heat Transfer Intensification, Twisted tape, Nusselt number.
Multi-objective Thermal Power Scheduling by Evolutionary Search Weighted Simulation Techniques

Multi-objective Thermal Power Scheduling by Evolutionary Search Weighted Simulation Techniques

Authors: Mrinal Ranjan, Ravi Kumar
( 23 downloads)
Abstract

In the present paper multi-objective thermal power dispatch problem with three objectives and constrains has been addressed. The multi-objective economic-emission dispatch problem is converted into a scalar optimization problem using weighting method. The criterion is to determine a non-inferior solution using weighting method. The decision maker has been provided to search the best alternative from all the possible non-inferior solutions to decrease the computation time as the numbers of objectives are more than two. Hook- Jeeves and Evolutionary search techniques have been implemented to search the “preferred” weightage pattern in the noninferior domain which corresponds to the best optimal solution. Subsequently a Fuzzy methodology has been implemented to decide optimal operating point by interacting with the decision maker. The non-inferior solution which attains maximum satisfaction level from the membership function of participation of objectives has been adjusted the best solution. This proposed method requires few search moves to get the optimal operating point in the non-inferior domain.

Keywords: Evolutionary technique, fuzzy decision making,membership function, multiobjective, weight simulation method.
Studies on Enzymatic Action, Manufacturing Process, and Purification of Papain Enzymes

Studies on Enzymatic Action, Manufacturing Process, and Purification of Papain Enzymes

Authors: Meenakshi Nath
( 22 downloads)
Abstract

Papain is a common enzyme obtained from the green papaya (Pawpaw) fruit. It is cysteine protease present in Papaya, are essentially synthesized as inactive proenzymes with N- terminal propeptide regions.The activation process involves removal of propeptide regions. Papain are used in many Industrial purposes, along with pharmaceuticals, food, leather, detergents and fish processing etc. The enzyme Papain was isolated from the unripe papaya fruit and obtained by milky latex under suitable temperature and humidity. Papain was then manufactured by the process involving the harvesting and drying of latex. And, around 150 tonnes per year of Papain are produced in India. The study of Papain proteolytic action were done by the method of hydrolysis of protein with the use of casein substrate and other method “ Absorptiometry”. Then the Papain was purified by Gel filtration method with the use of sephadex G-75, Non denaturing Page method and SDS Page method, stained by Coomassie Blue R 250, and Brilliant blue G colloidal concentrated.

Keywords: papain, cysteine protease, proteolytic action, sephadex G-75, SDS Page
Evaluation of LSB Based Digital Watermarking Algorithm Using Various Parameters

Evaluation of LSB Based Digital Watermarking Algorithm Using Various Parameters

Authors: Shefali Manchanda, Er.Ravinder Bisht, Deepika Chaudhary
( 24 downloads)
Abstract

Digital Image watermarking is the process of trouncing the digital data in the image, by inclusion of digital mark into the image. The research presents digital watermarking algorithm using least significant bit (LSB). LSB is used because of its reserved effect on the image. In this an invisible and a visible watermarking technique is implemented.. Various attacks are also performed on watermarked image and their impact on quality of image is also studied using various parameters like Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Signal to Noise Ratio (SNR), Signal Mean Square Error (S_MSE) and the effect of rotation on watermarked image is also observed. The work has been implemented through MATLAB.

Keywords: Watermarking, Least Significant Bit (LSB), Mean Square Error (MSE) Peak Signal to Noise Ratio (PSNR), Signal to noise ratio( SNR),and Signal to Mean Square Error( S_MSE).
Power Quality Improvement In Weak Grids With Three Phase Three Leg Active Power Conditioner

Power Quality Improvement In Weak Grids With Three Phase Three Leg Active Power Conditioner

Authors: Putta Praveen Kumar, Savarapu Chandra Shekar
( 22 downloads)
Abstract

This paper presents a three phase three leg active power conditioner to improve power quality based on renewable energy. A micro-grid is a weak electrical grid, which can be easily subject to disturbances because it includes a variety of intermittent power sources, single-phase, three-phase and nonlinear loads, which can have a dynamic impact on power quality. The unbalance and the harmonic components in current and voltage waveforms are the most important among these. In this paper, the topology and the control strategy of Active Power Conditioner (APC) have been investigated in order to improve the operation of a micro-grid. The APC topology presented in this paper act as an interface between renewable energy sources and the AC bus of a micro-grid. They also use an improved control strategy, which makes possible to inject energy in the micro-grid, compensate the current harmonics and correct the power factor. Moreover, the proposed control strategy allows the line current at the point of common coupling (PCC) to be balanced and sinusoidal even when the load is unbalanced. Consequently, the voltage at the PCC becomes balanced. The simulation results are grouped and presented according to the following power quality indicators: THD (Total Harmonic Distortion), power factor and unbalanced load.

Keywords: Active power conditioner, micro-grids, renewable energy, current control, power quality.
Comparative Study on Emissions from Traditional and Improved Biomass Cookstoves Used in India

Comparative Study on Emissions from Traditional and Improved Biomass Cookstoves Used in India

Authors: Harshika Kumari, Avinash Chandra, S.C. Kaushik
( 23 downloads)
Abstract

Cooking is central to our lives. In developing countries, about 90% of rural households depend on the solid biomass fuels for cooking. Unprocessed solid biomass fuels are used by the poor urban and rural folk for cooking and heating. Approximately 67% of households in India (equivalent to 166 million households) remain wedded to solid fuels as their primary source of cooking fuel. The traditional cookstoves used for cooking are not energy efficient and the fuels are not burnt completely, thus resulting in release of complex mixture of health damaging indoor air pollutants like carbon monoxide and nitrogen oxide. This paper estimates and compares the extent to which the pollutants like carbon monoxide and nitrogen oxides are generated when biomass fuels is burnt in traditional cookstove (U-shaped) as compared to improved cookstove (Priyagini) which is commonly used in northern India. The thermal efficiency of the cookstoves and characteristics of biomass fuels were also established.

Keywords: Crop residue; Dung cake; Emissions; Improved cookstove; Indoor air pollution; Traditional cookstove; Wood.
Diagnosis Techniques in Medical Technology using Soft Computing

Diagnosis Techniques in Medical Technology using Soft Computing

Authors: Parli B. Hari
( 24 downloads)
Abstract

We have covered and implemented techniques and novel methods for Medical Technology. In this paper we are going through different methodologies of Soft Computing (SC) which are used for these CAD systems. The Methods coming under this are Neural Networks, Fuzzy Logic, and Genetic Programming. In this paper we will first briefly discuss what makes Soft Computing different from traditional Computing. What were the drawbacks of traditional computing which were removed by it. And introduce the three ingredients of Soft Computing and then review the work done by different people using these tools. Our main emphasis is on images used for medical diagnosing. We will review the different algorithms used for studying these medical images. And also discuss positives and negatives faced by these algorithms. In this paper we will try to answer what work has been done in the field of medical image processing using Soft Computing and what is its future. We will discuss how they are contributing to medical imaging for improving the health and well being of people worldwide.

Keywords: Medical Technology, Diagnosis Techniques, Soft Computing
Application of Radar Technology in Combating Insurgency in Nigeria

Application of Radar Technology in Combating Insurgency in Nigeria

Authors: Iroegbu. C, Okonba. B. J
( 24 downloads)
Abstract

Nigeria as fondly called the ‘giant’ of Africa has experienced series of insurgency attacks in the recent past. These attacks have claimed many lives and properties worth billions of naira destroyed. The recent abduction of over 200 Chibok school girls by the dreaded Bokoharam groups has provoked the entire world to seek for an alternative means of combating this negative menace. The big question comes to our mind; “WHERE DO WE GO FROM HERE”. The solution to this question is not too difficult to arrive at this point in time. Radar technology is the answer. Radar means Radio Detection and Ranging. It is a means of getting information about distant objects or target, by flinging electromagnetic waves at them and analyzing the echoes. The basic principle behind radar is simple - extremely short bursts of radio energy (traveling at the speed of light) are transmitted, reflected off a target and then returned as an echo. This paper aims at exploring the use of Radar systems in tacking insurgency in Nigeria

Keywords: Radar, Insurgent, Detection, Target, Echo
slugA Survey on State-of-Art Flip-Invariant Descriptors

slugA Survey on State-of-Art Flip-Invariant Descriptors

Authors: Aysha Mol K S
( 18 downloads)
Abstract

In image processing , flip operation creates the mirror o f an image. Flip is common copyright infringement technique used in creating near - duplicate videos, since it will not change the video content. Hence in a video copy detection system , flip operation need to be identified . Most of the salient region descriptors do not take flip into consideration. This paper compares the performance of existing salient region descriptors over flip operation.

Keywords: Flip, Video copy detection, copyright infringement, descriptor, key frame
A Fast Reading and Processing Method of Obstacle Detection in Changing Environment Using Color and Texture

A Fast Reading and Processing Method of Obstacle Detection in Changing Environment Using Color and Texture

Authors: Priya Singla, Neha Goyal
( 22 downloads)
Abstract

A leading obstacle detection algorithm based on color and texture feature used monocular vision is basically described in this paper. The purpose of this paper is to provide an eye to a visually impaired people so that he is able to safely navigate in a surrounding environment of the campus. Color and texture feature is used to implement the algorithm. Color information is easily available and computationally cheap to process the image. Color of surface changes dramatically when the illumination condition changes so in many cases, color information alone is not sufficient to detect an obstacle in the path of visually impaired people. To safely navigate in campus texture feature is used with color feature. A set of 100 sample images is collected from the College campus. Our algorithm learns a set of color and texture feature from a set of sample images and the only most effective features are used in classification. As our algorithm works in challenging outdoor environment it achieves better performance and efficiency to locate an obstacle and to navigate safely in campus.

Keywords: Color, local edge pattern (LEP), training set, histogram, obstacle detection
Evaporative Effectiveness & Mass Transfer Coefficient of A U-Shape Brass Tube of an Evaporative Heat Exchanger

Evaporative Effectiveness & Mass Transfer Coefficient of A U-Shape Brass Tube of an Evaporative Heat Exchanger

Authors: Sachin Duhan, Raj Kumar
( 22 downloads)
Abstract

The results of this experimental investigations on evaporative effectiveness and mass transfer coefficient of U shape brass tube of an evaporative heat exchanger are offered in this thesis report. The U shape brass tube is subjected to flow of water only & concurrent flows of cooling water from the top; air flows from the underneath and the process fluid are flowing through the tubes. Evaporative effectiveness and mass transfer coefficient are estimated within following range of operating variables Reynolds number of water223 ≤ Rew≤ 1032. Reynolds number of air 2460 ≤ Rea ≤ 8059. It is reported that the increase in evaporative effectiveness is found with slight stagnation with increase of Reynolds number of water and Reynolds number of air. Evaporative effectiveness and mass transfer coefficient decreases with increase of Dimensionless enthalpy potential. The percentage increase in Evaporative effectiveness with increase in Reynolds number of water is from 9. 23% to 14.72% Mass transfer coefficient increases almost proportional to increment in film Reynolds number of water and Reynolds number of air. The percentage increase in mass transfer coefficient with increase in Film Reynolds number is from 80.94 % to 108.50 %. Based on the experiments correlations derived using the multiple regression analysis. The present empirical results show good agreement with the experimental results. Developed correlations are helpful in improvement of the design of heat transfer devices and many other engineering applications.

Keywords: Evaporative effectiveness, mass transfer coefficient, U shape brass tube, heat exchanger

About Europub

EuroPub is a comprehensive, multipurpose database covering scholarly literature, with indexed records from active, authoritative journals, and indexes articles from journals all over the world. The result is an exhaustive database that assists research in every field. Easy access to a vast database at one place, reduces searching and data reviewing time considerably and helps authors in preparing new articles to a great extent. EuroPub aims at increasing the visibility of open access scholarly journals, thereby promoting their increased usage and impact.