- For Authors
- For Reviewers
The document illustrates problem of unbalanced transportation. With the advancement of technology the vehicle usage has become a mandatory part in everyone’s life, without considering the age factor. This paper aims at providing help to the user by tracking the information of the vehicle using efficient technologies without any third party involvement. The proposed application gives the parameters of current vehicle location at regular intervals of time from GPS (Global Positioning System) then the values from GPS are passed to the raspberry pi 2, the values are processed there and stored in Amazon cloud EC2 instance. A request is sent from android application to fetch the data from Amazon server, the appropriate data is sent to the android application. The system is developed using Android Studio, GPS module, Python, Elastic Search Technology, Raspberry pi 2 OS (NOOBS) and Amazon Web Service EC2 Instance.
Keywords : Android Studio, Amazon Web Service EC2 Instance, Elastic Search Technology, GPS Module, NOOBS, Python, Raspberry Pi 2
 Rahul Gautam, Shubham Choudhary, Surbhi, Indrajeet Kaur, Mamta Bhusry. (2015). Cloud based automatic accident detection and vehicle management system, 2nd International Conference on Science, Technology and Management. University of Delhi (DU), Conference Centre, New Delhi (India).  Aburva Poongundran.A, Jeevabharathi.M. (2015). Vehicular Monitoring and Tracking using Raspberry Pi, IJIRSET, Chennai India.  L.Kishore, Arun Raja. (2015). Advanced Vehicle Tracking System using ARM7, Asian Journal of Electrical Sciences, Coimbatore, Tamilnadu India.  Albert Alexe, R.Ezhilarasie. (2011). Cloud Based Vehicle Tracking Information Systems, IJCST Vol. 2, Issue 1, SASTRA University, Thanjavur, India.  R.Ramani, S.Valarmathy, Dr.N.Suthanthira Vanitha, S.Selvaraju, M.Thiruppathi, R.Thangam. (2013). Vehicle Tracking and Locking System Based on GSM and GPS, I.J.Intelligent Systems and Applications, Tamilnadu India.
In this contribution a novel methodology called Leadership Learning Model is proposed for increasing the outcome based education in technical education institutes. This model creates a platform where students and faculty can work collectively for academics as well as for student’s area of interest and leads to skill set development in their concerned areas. Keeping in the view of outcome based education, skill set empowerment and student psychology; Eight clubs were designed based on Gardner multiple intelligence concepts and developed by considering broad domains of engineering, social and personal interests of students. Further a rural area located technical education institute: Excel College of Engineering & Technology- Komarapallayam, India has been considered for testing the proposed model. A group of students were identified randomly as leadership students for testing the model and were allowed to identify their area of interest based on some preliminary competitions. Accordingly they have been kept in corresponding clubs and are given support to work for the club. The model is successfully implemented in the campus and is kept under observation for three consecutive academic years. It is found effective and efficient model in developing a student in his interested area which leads to skillset empowerment and increased employability and entrepreneurship.
Keywords : Employability; Leadership; Outcome, Students
 http://www.aicte-india.org/  http://www.ugc.ac.in/  Gardner, H. (1983). Frames of mind: The theory of multiple intelligences. New York: Basic Books  http://adityatekkali.edu.in/  Victor O. K. Li “Hints on Writing Technical Papers and Making Presentations”, IEEE Transactions On Education, Vol. 42, N0. 2, MAY 1999.  http://www.leadershipfoundation.info/  U. Mohan Rao; NIT Hamirpur.
To maximizes the throughput performance of the systems, the scheduling algorithm which is widely used in multi-hop wireless networks and high speed switches need wide range of study. Various studies have subsequently focused on the design of simpler and faster scheduling algorithms which provide performance guarantee on the throughput. Recent results of this, highlights the deficiencies which are arisen due to all these scheduling systems mainly based on throughput. Moreover the development of analytical techniques to study the delay performance of such systems has to provide more focus to maintain the QOS, network design (choice of buffer size, capacity of links) etc. Analyzing the delay performance of multi-hop systems which follow throughput optimal scheduling policies are very difficult due to complex relationship between arrival, service and queue length processes. In this paper, I develop novel techniques for performance analysis of wireless networks and also design novel scheduling policies that are delay-efficient.
Keywords : Back-pressure, Delay Performance, Multi-hop, Throughput Optimal
 Gagan Raj Gupta, Ness B Shroff, ”Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks”, IEEE/ACMTransactionsonNetworking,vol.19, No.1,February 2011  Lei Ying, Sanjay Shakkottai, Aneesh Reddy, “On Combining Shortest Path and Back Pressure Routing Over Multihop Wireless Networks”,IEEE/ACM Transactions on Networking, vol. 19, No. 3, June 2011  Loc X Bui, R Srikant and Alexander Stolyar “A Novel Architecture for Reduction of Delay and Queuing Structure Complexity in the Back-Pressure Algorithm”, IEEE/ACM Transactions on Networking,vol.19,No.6,December 2011  T. Leandros and A. Ephremides, “Stability properties of Constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks,” IEEE Trans. Autom. Control, vol. 37, no. 12, pp. 1936–1948, Dec. 1992.  Gupta, Gagan Raj “Delay efficient control policies for Wireless networks”, SIGMETRICS-Student thesis panel copyright, 2009.
A Bench vice or fixture is a production tool. The main aim is to locate, support and hold the work securely so we can perform the required machining operations. Feeler or thickness gauges and set blocks are also used to provide reference of the cutter with the work piece. A bench vice must be easily fastened with the machine and the table. As a result, the work can be done. It can be used for the other operations on most of the standard machining tools like drilling machine. Bench Vices are available in different size and shapes ranging from cheap and simple devices to very expensive and complicated devices. Bench Vices can also help to simplify the metalworking operations which are performed on the special equipment. Considering the advantages of fixture and jigs, a fixture was designed to cater to our needs. We are going to design a work holding device which will be able to hold the work piece in any direction. The one-part bottom assembly is free to rotate and other part of bottom assembly fixed to bench. This type of assembly will assist to top assembly which consist jaws. These jaws are likewise pipe vice & conventional bench vice. Lead screw is provided for engagement & disengagement of the jaws.
Keywords : Cutter, Gauges, Metal working operation, Jigs and fixture, Jaws, Lead screw, Industrial applications.
Website References  http://explore.ijert.org/  http://www.ijetcse.com/  http://industrialscience.org/  http://www.ijist.net/ Basic Format for Handbooks  Hazra Choudhary,Workshop Technology.  Dr.Chapmans. 5th ed.Workshop Technology. Basic Format for Journals (When Available Online)  Mr. Shrikant M. Chougule (2015, July). “Design & Manufacturing of Components of Modified Bench Vise on Rapid Prototype Machine”. volume4 (7). Available:www.ijaiem.org  Y. Ras mathew (“Design and Fabrication of Work Holding Device for Drilling and Spot Facing of Bucket Wheel Excavator Teeth” Y. Ras Mathew and J. Gowtham  “Design and fabrication of work holding device for a drilling machine” Pritam Kumar Kundu  “Pivoted yoke pipe vise” Patent No. US 2616320A Inventor Richard W. Vosper  “PNEUMATIC VICE “Amit G. Korat, Harshil R. Thakkar, Tahir J. Saiyad, Satish A. Miyani and Vishal M. Purohit
The presented paper aims at the analysis of stress fields which occur while applying loads to a photo elastically coated notched sample. The analysis was done by means of Photo Stress method using reflection Polaris cope and digital video camera. On the notched sample subject to loads by eccentric tension we determined the differences of principal normal stresses in specified point at loads 3 kN, In addition, we determined the value of principal normal stress at the edge of the sample during load of 4 kN and 5 kN which was later compared with numerical solution in FEA method ANSYS software. On the photo elastically coated sample we observed maximum elongation of the coating, too. And also by changing the composition of notch specimen do the same and compare the above mention results.
Keywords : Stress, Photoelasticity, Visual inspection, Photo spectrometer
 P. Lazzarin , S. Filippi , “A generalized stress intensity factor to be applied to rounded V- shaped notches”, Journal of Solids and Structures , Vol. 43, (2006), pp 2461–2478.  Wenjing Wang, a,Li Kai, Randy Gu, AnandAsundi, “Dynamic Stress Concentration – a Hybrid Analysis”,Onal Conference on Optics in Precision Engineering and Nanotechnology .Physics Procedia,Vol.19, (2011),pp 220–226.  P. Frankovskya, O. Ostertaga, E. Ostertagovab, “Automation of experiments in Photo elasticity”, Procedia S  Peter Frankovsky, PavolZubko, Oskar Ostertag, WładysławPapacz, Martin Smida, “Application of Photo Stress Method in the Analysis of Stress Fields Around a Notch”, American Journal of Mechanical Engineering,Vol.1, No. 7,(2013), pp 329-334.  P. FRANKOVSKY, F. TREBUNA “Application of Photo Stress method in stress analysis of a rotating disc”, Original Scientific Paper METABK, Vol.53 (4), (2014), pp 541-544.  Alberto Sapora, Pietro Cornetti, Alberto Carpinteri “Analytical Stress Intensity Factors for cracks at blunted V-notches” Procedia Materials Science 3 ( 2014 ) 738 – 743, Science Direct.  Introduction to Stress Analysis by the Photo Stress Method, Micro-Measurements Document Number: 11212, Tech Note TN-702-2, firstname.lastname@example.org  How to Select Photoelastic Coatings Tech Note TN-704-2 micro measurement Document Number:11213 www.micro-measurements.com, Revision:04-Aug-2015 Books Referred  Experimental Stress analysis by, Dally Riley  Experimental Stress analysis by, Shrinath  Experimental Stress analysis by, Sadhu singh Website Referred  email@example.com (Accessed on date 10/04/2016)  www.micro-measurements.com (Accessed on date 15/5/2016)  firstname.lastname@example.org (Accessed on date 25/5/2016)
Biometric verification is defined as the verification of a individual based on the physical, chemical or behavioral attributes of the person. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs).These PPBSs can be classified into Biometric encryption based schemes, Cancelable biometric based schemes, Multi-modal and hybrid based schemes, secure computation (SC) based schemes. There is a comparative study of PPBS and select the best one .On the bases of comparisons select the best PPBS is Biometric encryption based schemes.
Keywords : Biometric encryption, Cancelable biometric, Hybrid based, Multimode, Secure computation
 Iynkaran natgunanathan, abid nmehmood, yong xiang, (Senior dmember, IEEE),gleb beliakov, gsenior member, ieee), and john vbyearwood Protection of Privacy in Biometric Data School of Information Technology, Deakin University, HJGeelong, VIC 3220, AustraliaCorresponding author: Y. F)  Handbook of Biometrics. A. K. Jain, P. Flynn, and A. A. Ross, New York,GNY, USA: Springer, 2008.  R. Belguechi, E. Cherrier, V. BNAlimi, P. Lacharme, and C. BNAn Overview on Privacy BNPreserving Biometrics. Rijeka, Croatia: InTech,2011.  N. K. Ratha, J. H. Connell, and R. M. Bolle, ``Enhancing security and privacy in biometrics-basedVauthentication systems,'' IBM Syst. J., Bvol. 40,no. 3, pp. 614_634, Apr.2001  C. Rathgeb and A. Uhl, ``A survey on biometric cryptosystems and cancelable biometrics' 'EURASIP J. Inf. Secur., p. 3, Sep. 2011  S. Rane, Y. Wang, S. C. Draper, and P. Ishwar, ``Secure biometrics:Concepts, authentication architectures and challenges,'' IEEE Signal Process. Mag., vol. 30, no. 5, pp. 51_64, Sep. 2013.  J. Bringer, H. Chabanne, and A. Patey, ``Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends,'' IEEE Signal Process. Mag., vol. 30, no. 2, pp. 42_52, Mar. 2013.  A. Cavoukian and A. Stoianov, ``Biometric encryption,'' Encyclopedia of Cryptography and Security. New York, NY, USA: Springer, 2009.