Archive

Publication for Volume-2 Issue-1, December 2016

Title
:
Simulation of Photovoltaic Burp Charge System on Energy Saving by Smart Charge Management
Article Type
:
Reveiw Article
Author Name(s)
:
S. Ravikanth, DVR & Dr.HS MIC College of Technology; K. Saiteja ,DVR & Dr.HS MIC College of Technology
Country
:
India
Research Area
:
non conventional

To accomplish beat charge utilizing direct photovoltaic (PV) vitality, it is important to keep the vitality supply from PV module constant and ideal, particularly to keep vitality supply from hindering amid the beat break period. To play out the said thought, a PV burp charge framework (PV-BCS) proposed is to make PV vitality pump constant with ideal most extreme power point following (MPPT), which builds the PV use, and to dispatch the rest of the PV vitality for further stockpiling in the beat break period. A brilliant charging administration (CM) presents three sorts of charge statuses, a burp beat (BP) charge and two heartbeat charges, which charges three batteries, Bm, B1, and B2 con-as of now and exclusively. The two heartbeat charges gave are to going with the BP charge so as to keep the PV vitality supply ceaseless and esteem the rest of the vitality for further stockpiling. The BP charge for Bm is made out of a positive heartbeat (PP) charge in a positive burp beat (PBP) period and negative heartbeat (NP) charge in non-PBP period. The other two batteries B1 and B2 are dependably with PP charge in the non-PBP period, in which B1 charges the rest of the PV vitality to keep the PV vitality supply consistent, understanding the vitality loving idea; B2 charges the release sum from Bm by seriously releasing, which to be sure is proportional to the NP charge, accomplishing the vitality recuperation idea. A lab model, 250-W PV-BCS, with explained reenactment and investigation exhibits the proposed simultaneous charging thought, which is practical for considering a vitality sparing idea, particularly relevant in an extensive scale vitality administration for, for example, battery trade station to electric vehicle benefit. Furthermore, the PV-BCS can be further as a mixture charger for renewable vitality application if extra renewable vitality is blended with the PV vitality, for example, wind vitality.

Keywords : PV-BCS, MPPT, Multi Level Inverter

Recent

[1] M. Calais and V. G. Agelidis, “Multilevel converters for single-phase grid connected photovoltaic systems—An overview,” in Proc. IEEE Int. Symp. Ind. Electron. 1998, vol. 1, pp. 224–229. [2] S. B. Kjaer, J. K. Pedersen, and F. Blaabjerg, “A review of single-phase grid connected inverters for photovoltaic modules,” IEEE Trans. Ind. Appl., vol. 41, no. 5, pp. 1292–1306, Sep./Oct. 2005. [3] P. K. Hinga, T. Ohnishi, and T. Suzuki, “A new PWM inverter for photovoltaic power generation system,” in Conf. Rec. IEEE Power Electron. Spec. Conf., 1994, pp. 391–395. [4] Y. Cheng, C. Qian, M. L. Crow, S. Pekarek, and S. Atcitty, “A comparison of diode-clamped and cascaded multilevel converters for a STATCOM with energy storage,” IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1512– 1521, Oct. 2006. [5] M. Saeedifard, R. Iravani, and J. Pou, “A space vector modulation strategy for a back-to-back five-level HVDC converter system,” IEEE Trans. Ind. Electron., vol. 56, no. 2, pp. 452–466, Feb. 2009. [6] S. Alepuz, S. Busquets-Monge, J. Bordonau, J. A. M. Velasco, C. A. Silva, J. Pontt, and J. Rodríguez, “Control strategies based on symmetrical components for grid-connected converters under voltage dips,” IEEE Trans. Ind. Electron., vol. 56, no. 6, pp. 2162–2173, Jun. 2009. [7] J. Rodríguez, J. S. Lai, and F. Z. Peng, “Multilevel inverters: A survey of topologies, controls, and applications,” IEEE Trans. Ind. Electron., vol. 49, no. 4, pp. 724–738, Aug. 2002. [8] J. Rodriguez, S. Bernet, B. Wu, J. O. Pontt, and S. Kouro, “Multilevel voltage-source-converter topologies for industrial medium-voltage drives,” IEEE Trans. Ind. Electron., vol. 54, no. 6, pp. 2930–2945, Dec. 2007.

Title
:
Art Quest
Article Type
:
Other
Author Name(s)
:
Jayasheela Kallaganiger, KLEIT, HUBBALLI; Jayasheela D K ,KLEIT, HUBBALLI; Anupama S N ,KLEIT, HUBBALLI; Ananthraj A ,KLEIT, HUBBALLI; Ishwari V G ,KLEIT, HUBBALLI
Country
:
India
Research Area
:
Computer Applications

The “Art Quest” is a web application through which paint art object meet the audience safely. The exhibition is universally understood to be for temporary period. This web application is an online paint art exhibition where art picture will be uploaded and displayed for auction. The application helps artist and non-artist (painters) to exhibit and sell their paint arts. The application assures to get good price for the arts as auction facility is available. The paint arts are exhibited online, avoids the burden of carrying art from one place to another. Artist thus need not worry about transport damages to the arts.

Keywords : Exhibition, Bids on arts, Commercial Exhibition, Auction, Revolution

Recent

[1] R.Priyah1, Viji Vinod2”Digital Online Shopping Using 3D in Augmented Reality” International Journal of Web Technology ISSN: 2278-2389 [2] Upasana Kanchan1 , Naveen Kumar2 and Abhishek Gupta “A STUDY OF ONLINE PURCHASE BEHAVIOUR OF CUSTOMERS IN INDIA”, http://ictactjournals.in/paper/IJMS_paper_4_pp_136_142.pdf [3] Prof. Sanjeev Kumar, Savita Maan “Status and Scope of Online Shopping: An Interactive Analysis through Literature Review”, International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 pg. 100-108

Title
:
A Comparative Analysis: DuckDuckGo Vs. Google Search Engine
Article Type
:
Reveiw Article
Author Name(s)
:
Dr. Vaishali S Parsania, AITS; Foram Kalyani ,AITS; Dr. Krunal Kamani ,AAU
Country
:
India
Research Area
:
Search Engine

Search engines are like power houses of the World Wide Web, returning number of responses to number of queries every day satisfying people. Search Engine has been the key utility of internet. There exists many search engines in the world like Google search engine, Bing, DuckDuckGo, Baidu, Soso, Naver, Yandex, Seznam etc. Number of search engines in the world kept on linearly increasing at one instant, but the only search engine that went through bricks and succeeded in being highly used today is - Google Search Engine. To get compete many search engine tried to incorporate flexibility and facilities along with security, but Google search engine turned to be at top in terms of all. DuckDuckGo’s unique features like Zero-click information, category pages, ambiguous keyword detection, simpler links, less spam and many others have made it popular among users. Nowadays most of the Linux based system is using DuckDuckGo as default search Engine. It was also introduced in hardware such as ' Raspberry pi' as default. It work more efficiently on Raspbian( A raspberry pi Operating System ). In this paper features of both search engines are analyzed. And based on that comparative analysis of both search engines is being done in this paper.Nowadays most of the Linux based system is using DuckDuckGo as default search Engine. It was also introduced in hardware such as ' Raspberry pi' as default. It work more efficiently on Raspbian( A raspberry pi Operating System ). In this paper features of both search engines are analyzed. And based on that comparative analysis of both search engines is being done in this paper.

Keywords : Search Engine, Google, DuckDuckGo, Raspberry pi, Raspbian, Baidu, Naver, Yandex, Seznam, Googlebot

Recent

[1] “DuckDuckGo search engine”, Internet:http://www.duckduckgo.com, [July, 2016] [2] “Features of DuckDuckGo”, Internet:http://www.duckduckhack.com/, [July, 2016] [3] “Features of Google search Engine”, Internet: http://thenextweb.com, [July, 2015] [4] “Architecture of DuckDuckGo”, Internet: http://insightsdelight.wordpress.com, [August, 2016] [5] “Architecture of Google Search Engine”, Internet: http://googleguide.com, [August,2016] [6] M. Cui and S. Hu, "Search Engine Optimization Research for Website Promotion," 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, Nanjing, Jiangsu, 2011, pp. 100-103. [7] “DuckDuckGo vs. Google Search Engine”,Internet:http://www.maketecheasier.com, [August, 2016]

Title
:
Overview of Industrial Inverters for Photovoltaic Applications
Article Type
:
Reveiw Article
Author Name(s)
:
Mr. Nathgosavi Kiran M., Rajrambapu Institute of Technology, Rajaramnagar
Country
:
India
Research Area
:
Power System

As the growth of India is goes on increases rapidly power demand is also increases. To meet this power demand it is not good to only depend on the available power sources such as dam cola power plant etc. On the other hand there is huge development in renewable energy sources has been done. So one solution to fulfill power demand is to interconnect renewable energy sources with grid. To interconnect renewable sources with grid power converter plays an important role. This paper presents the overview of industrial inverters for photovoltaic application. What are the conventional topologies are present that introduce in section II and advance inverter topologies such as ac-dc and dc-dc are introduced in section III.

Keywords : String Inverter, Multistring Inverter, Central Topology, AC modular Topology, PV system.

Recent

[1] R. Teodorescu, M. Liserre, and P. Rodríguez, Grid Converters for Photovoltaic and Wind Power Systems. Piscataway, NJ: IEEE Press/Wiley, 2011. [2] J. M. Carrasco, L. G. Franquelo, J. T. Bialasiewicz, E. Galvan, R. Portillo, M. M. Prats, J. I. Leon, and N. Moreno-Alfonso, “Power-electronic systems for the grid integration of renewable energy sources: A survey,” IEEE Trans. Ind. Electron., vol. 53, no. 4, pp. 1002–1016, Apr. 2006. [3] B. Burger and D. Kranzer, “Extreme high efficiency PV-power converters,” in Proc. 13th European Conf. Power Electronics and Applications (EPE 2009), 8–10 Sept. 2009, pp. 1–13. [4] J. R. Dreher, F. Marangoni, L. Schuch, M. L. da S. Martins, and L. D. Flora, “Comparison of H-bridge single-phase transformerless PV string inverters,” in Proc. IEEE/IAS Int. Conf. Industry Applications (INDUSCON 2012), Nov. 2012, pp. 1–8. [5] S. Kjaer, J. Pedersen, and F. Blaabjerg, “A review of single-phase grid-connected inverters for photovoltaic modules,” IEEE Trans. Ind. Applicat., vol. 41, no. 5, pp. 1292–1306, Sept.–Oct. 2005. [6] R. Gonzalez, J. Coloma, L. Marroyo, J. Lopez, and P. Sanchis, “Single-phase inverter circuit for conditioning and converting DC electrical energy into AC electrical energy,” Eur. Patent EP 2 053 730 A1, 2009. [7] S. Saridakis, E. Koutroulis, and F. Blaabjerg, “Optimal design of modern transformerless PV inverter topologies,” IEEE Trans. Energy Convers., vol. 28, no. 2, pp. 394–404, June 2013. [8] D. W. Karraker, K. P. Gokhale, and M. T. Jussila, “Inverter for solar cell array,” U.S. patent 2011/0299312 A1, 2011. [9] T. Urakabe, K. Fujiwara, T. Kawakami, and N. Nishio, “High efficiency power conditioner for photovoltaic power generation system,” in Proc. Int. Power Electronics Conf. (IPEC 2010), 21–24 June 2010, pp. 3236–3240. [10] M. Meinhardt and G. Cramer, “Multi-string-converter: The next step in evolution of string converter technology,” in Proc. 9th European Power Electronics and Applications Conf. (EPE 2001), 27–28 Aug. 2001, pp. 1–9. [11] M. Fornage, “Method and apparatus for converting direct current to alternating current,” U.S. patent 7,796,412B2, 2010. [12] P. Garrity, “Solar photovoltaic power conditioning unit,” U.S. patent 8,391,031B2, 2013. [13] J.-S. Lai, “Power conditioning circuit topologies,” IEEE Ind. Electron. Mag., vol. 3, no. 2, pp. 24–34, June 2009. [14] G. Spagnuolo, G. Petrone, S. V. Araujo, C. Cecati, E. Friis-Madsen, E. Gubia, D. Hissel, M. Jasinski, W. Knapp, M. Liserre, P. Rodriguez, R. Teodorescu, and P. Zacharias, “Renewable energy operation and conversion schemes: A summary of discussions during the seminar on renewable energy systems,” IEEE Ind. Electron. Mag., vol. 4, no. 1, pp. 38– 51, Mar. 2010. [15] E. Romero-Cadaval, G. Spagnuolo, L. G. Franquelo, C. A. Ramos-Paja, T. Suntio, and W. M. Xiao, “Grid-connected photovoltaic generation plants: Components and operation,” IEEE Ind. Electron. Mag., vol. 7, no. 3, pp. 6–20, Sept. 2013. [16] F. Z. Peng, “Z-source inverter,” IEEE Trans. Ind. Applicat., vol. 39, no. 2, pp. 504–510, Mar./Apr. 2003. [17] Y. Li, J. Anderson, F. Z. Peng, and D. Liu, “Quasi- Z-source inverter for photovoltaic power generation systems,” in Proc. 24th Annu. Applied Power Electronics Conf. Expo. (APEC 2009), 15–19 Feb. 2009, pp. 918–924. [18] B. Ge, H. Abu-Rub, F. Z. Peng, Q. Lei, A. T. de Almeida, F. J. T. E. Ferreira, D. Sun, and Y. Liu, “An energy-stored quasi-Z-source inverter for application to photovoltaic power system,” IEEE Trans. Ind. Electron., vol. 60, no. 10, pp. 4468– 4481, Oct. 2013. [19] O. Husev, S. Stepenko, C. Roncero-Clemente, E. Romero-Cadaval, and D. Vinnikov, “Single phase three-level quasi-z-source inverter with a new boost modulation technique,” in Proc. 38th Annu. Conf. IEEE Industrial Electronics Society (IECON 2012), 25–28 Oct. 2012, pp. 5852–5857. [20] N. A. Rahim and J. Selvaraj, “Multistring fivelevel inverter with novel PWM control scheme for PV application,” IEEE Trans. Ind. Electron., vol. 57, no. 6, pp. 2111–2123, June 2010. [21] N. A. Rahim, K. Chaniago, and J. Selvaraj, “Single-phase seven-level grid-connected inverter for photovoltaic system,” IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2435–2443, June 2011. [22] L. Zhang, K. Sun, L. Feng, H. Wu, and Y. Xing, “A family of neutral point clamped full-bridge topologies for transformerless photovoltaic grid-tied inverters,” IEEE Trans. Power Electron., vol. 28,no. 2, pp. 730–739, Feb. 2013. [23] S. Rivera, S. Kouro, B. Wu, J. I. Leon, J. Rodriguez, and L. G. Franquelo, “Cascaded H-bridge multilevel converter multistring topology for large scale photovoltaic systems,” in Proc. 2011 IEEE Int. Symp. Industrial Electronics (ISIE 2011), 27–30 June 2011, pp. 1837–1844. [24] Y. Yang, H. Li, A. Aichhorn, J. Zheng, and M. Greenleaf, “Sizing strategy of distributed battery storage system with high penetration of photovoltaic for voltage regulation and peak load shaving,” IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 982–991, Mar. 2014. (2013, Dec.). Available: www.sma.de/en/products/ system-solutions- packages/sunny-boy- 3600-5000-smart-energy.html [25] B.-I. Craciun, T. Kerekes, D. Sera, and R. Teodorescu, “Overview of recent grid codes for PV power integration,” in Proc. 13th Int. Conf. Optimization of Electrical and Electronic Equipment (OPTIM 2012), 24–26 May 2012, pp. 959–965. [26] Y. Yang, P. Enjeti, F. Blaabjerg, and H. Wang, “Suggested grid code modifications to ensure wide-scale adoption of photovoltaic energy in distributed power generation systems,” in Proc. 2013 IEEE Industry Applications Society Annu. Meeting, 6–11 Oct. 2013, pp. 1–8. [27] T. LaBella and J. S. Lai, “A hybrid resonant converter utilizing a bidirectional GaN AC switch for high-efficiency PV applications,” in Proc. 29th Annu. IEEE Applied Power Electronics Conf. Expo. (APEC 2014), 16–20 Mar. 2014, pp. 1–8. [28] M. Kasper, M. Ritz, D. Bortis, and J. W. Kolar, “PV panel-integrated high step-up high efficiency isolated GaN DC-DC boost converter,” in Proc. 35th Int. Telecommunications Energy Conf. (INTELEC 2013), 13–17 Oct. 2013, pp. 1–7. [29] D. Vinnikov and I. Roasto, “Quasi-Z-sourcebased isolated DC/DC converters for distributed power generation,” IEEE Trans. Ind. Electron., vol. 58, no. 1, pp. 192–201, Jan. 2011. [30] F. Z. Peng, “Z-source networks for power conversion,” in Proc. 23rd Annu. IEEE Applied Power Electronics Conf. Expo. (APEC 2008), 24–28 Feb. 2008, pp. 1258–1265. [31] H. Cha, F. Z. Peng, and D. Yoo, “Z-source resonant DC-DC converter for wide input voltage and load variation,” in Proc. Int. Power Electronics Conf. (IPEC 2010), 21–24 June 2010, pp. 995–1000. [32] C. P. Dick, F. K. Titiz, and R. W. De Doncker, “A high-efficient LLCC series-parallel resonant converter,” in Proc. 25th Annu. IEEE Applied Power Electronics Conf. Expo. (APEC 2010), 21–25 Feb. 2010, pp. 696–701. [33] Z. Liang, R. Guo, J. Li, and A. Q. Huang, “A highefficiency PV module-integrated DC/DC converter for PV energy harvest in FREEDM systems,” IEEE Trans. Power Electron., vol. 26, no. 3, pp. 897–909, Mar. 2011. [34] H.-D. Gui, Z. Zhang, X.-F. He, and Y.-F. Liu, “A high voltage-gain LLC micro-converter with high efficiency in wide input range for PV applications,” in Proc. 29th Annu. IEEE Applied Power Electronics Conf. Expo. (APEC 2014), 16–20 Mar. 2014, pp. 637–642. [35] Y.-H. Kim, S.-C. Shin, J.-H. Lee, Y.-C. Jung, and C.-Y. Won, “Soft-switching current-fed push–pull converter for 250-W AC module applications,” IEEE Trans. Power Electron., vol. 29, no. 2, pp. 863–872, Feb. 2014. [36] J. V. Mapurunga Caracas, G. De Carvalho Farias, L. F. Moreira Teixeira, and L. A. de Souza Ribeiro, “Implementation of a high-efficiency, high-lifetime, and low-cost converter for an autonomous photovoltaic water pumping system,” IEEE Trans. Ind. Applicat., vol. 50, no. 1, pp. 631–641, Jan.–Feb. 2014.

Title
:
Energy Efficient Collaborative Spectrum Sensing in Cognitive Radio Networks
Article Type
:
Research Article
Author Name(s)
:
Mr.S.Esakki Rajavel, Francis Xavier Engineering College, Tamilnadu,,India; Mr.B.Pradheep T Rajan ,Francis Xavier Engineering College, Tamilnadu,,India; E.Edinda Christy ,Francis Xavier Engineering College, Tamilnadu,,India
Country
:
India
Research Area
:
Electronics and Communication Engineering

Depending on trust management, an energy efficient collaborative spectrum sensing (EE-CSS) protocol is put forward. In contrast to the traditional collaborative spectrum sensing (T-CSS), here we are attaining energy efficiency by limiting the overall count of sensing reports exchanged between the honest secondary users (HSUs) and the secondary user base station (SUBs). In EE-CSS, it is concluded that the least total count of sensing reports needed to fulfill a target global false alarm (FA) and missed detection (MD) probabilities in T-CSS is more. We are calculating steady-state average SU trust value and total count of SU sensing reports transmitted in both T-CSS and EE-CSS. Derivations are made for the global FA and detection probabilities Qf and Qd for a data fusion method. The effect of link outages on Qf and Qd are also examined. The output tells that the energy consumption in T-CSS is comparatively higher than in EE-CSS for long range communications where the transit energy is dominant.

Keywords : EE-CSS Protocol T-CSS, Data Fusion Techniques

Recent

[1] Chen. H, Jin. X, and Xie. L, “Reputation-based collaborative spectrum sensing algorithm in cognitive radio networks,” in Proc. IEEE Int. Symp. PIMRC, 2009, pp. 582–587. [2] Chen. R, Park. J-M, and Bian. K, “Robust distributed spectrum sensing in cognitive radio networks,” in Proc. IEEE INFOCOM, 2008, pp. 1876–1884. [3] Chen. H, Wu. H, Zhou. X, and Gao. C, “Agent-based trust model in wireless sensor networks,” in Proc. ACIS Int. Conf. SNPD, 2007, pp. 119–124. [4] Ghasemi. A and Sousa. E, “Collaborative spectrum sensing for opportunistic access in fading environments,” in Proc. IEEE DySPAN, 2005, pp. 131–136. [5] Ghasemi. A and Sousa. E, “Opportunistic spectrum access in fading channels through collaborative sensing,” J. Commun., vol. 2, no. 2, pp. 71–82, Mar. 2007. [6] S.Esakki Rajavel, C.Jenita Blesslin, “Energetic Spectrum Sensing For Cognitive Radio Enabled Remote State Estimation Over Wireless Channels”, International Journal of Advanced Research Trends in Engineering and Technology (IJARTET), Vol. 3, Special Issue 19, April 2016 (12 – 15). [7] Hillenbrand. J, Weiss. T, and Jondral. F, “Calculation of detection and false alarm probabilities in spectrum pooling systems,” IEEE Commun. Lett., vol. 9, no. 4, pp. 349–351, Apr. 2005. [8] Hong. L, Ma. J, Xu. F, Li. S, and Zhou. Z, “Optimization of collaborative spectrum sensing for cognitive radio,” in Proc. IEEE ICNSC, 2008, pp. 1730–1733. [9] Li.H and Han. Z, “Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks,” IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3554–3565,Nov. 2010. [10] Mishra. S, Sahai. A, and R. Brodersen, “Cooperative sensing among cognitive radios,” in Proc. IEEE ICC, 2006, pp. 1658–1663. [11] Haykin.S ,“Cognitive radio: Brain-empowered wireless communications,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb. 2005.

Title
:
Design and Fabrication of Mechanical Lift for Transportation
Article Type
:
Research Article
Author Name(s)
:
Miss. Aishwarya B. Shinde, NBN Sinhgad COE, Ambegaon, Pune; Miss. Pranita B. Daphal ,NBN Sinhgad COE, Ambegaon, Pune; Miss. Pratiksha S. Nilange ,NBN Sinhgad COE, Ambegaon, Pune; Miss. Vrushali H. Dongre ,NBN Sinhgad COE, Ambegaon, Pune; Prof. R. K. Nanwatkar ,NBN Sinhgad COE, Ambegaon, Pune
Country
:
India
Research Area
:
Design Engineering

Lift is a simple mechanical device used to raise element or object from ground level to a certain height to perform a specific work with maximum load and minimum efforts. This project describes the design as well as analysis of a mechanical scissor lift which works on the principle of screw jack. The design will be developed keeping in mind that the lift can be operated by mechanical means so that the overall cost of the scissor lift is reduced. Also such design can make the lift more compact and much suitable for medium scale work. Conventionally a scissor lift or jack is used for lifting a vehicle to change a tire, to gain access to go to the underside of the vehicle, to lift the body to appreciable height, and many other applications. But in this case along with lifting a vehicle we are also going to make an effort to move the vehicle to a short distance by incorporating roller mechanism. Finally, the analysis will be carried out in order to check the compatibility of the design values.

Keywords : Scissor Lift, Screw Jack, Hydraulic Lift, Pneumatic Lift, Mechanical Lift

Recent

[1] Balkeshwar Singh, Anil Kumar Mishra, “Analysis and Fabrication of Remote Control Lifting Jack”. International Journal of Scientific Engineering and Applied Science (IJSEAS) ‐ Volume‐1, Issue‐3, June 2015 ISSN: 2395‐3470. [2] Dr. Ramachandra C G, Krishna Pavana, Shivraj Shet and Venugopal Reddy, “Design and fabrication of automotive hydraulic jack system for vehicles”.International Journal of Advances in Engineering Research (IJAER) 2013, Vol. No. 6, Issue No. VI, Dec. [3] M.M.Noor, K. Kadirgama, M.M. Rahman, M.S.M. Sani, M.R.M. Rejab, “Development of Auto Car Jack Using Internal Car Power”. Malaysian Science and Technology Congress,MSTC08, 16~17 Dec, KLCC, Malaysia, 2008. [4] Helmi Rashid and et.al, “Design Review of Scissors Lifts Structure for Commercial Aircraft Ground Support Equipment using Finite Element Analysis”. International Symposium on Robotics and Intelligent Sensors 2012 (IRIS 2012). [5] Bharath Kumar K, Gowtham S., Paul James Thadhani,Deepak Kumar.Bibin George Thomas, Kiron Antony Rebeiro “Fabrication of zig zag pneumatic lift” published by international journal of scientific engineering and applied science (IJSEAS) ‐ Volume‐1, Issue‐3, June 2015 ISSN: 2395‐3470. [6] Jaydeep M. Bhatt, Milan J. Pandya, “Design And analysis of an aerial scissor lift” Journal of information knowledge and research in Mechanical Engineering, Volume – 02, Issue – 02, P.N.452-455, Nov 12 To Oct 13. [7] Ivan Sunit Rout, Dipti Ranjan Patra, Sidhartha Sankar Padhi, Jitendra Narayan Biswal, Tushar Kanti Panda” Design and fabrication of motorized automated object lifting jack” IOSR journal of engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 05 (may. 2014), ||V5|| pp 06-12. [8] Rahul J.Kolekar, S.S. Gawade “Design and development of lift for an automatic car parking system” published by India. [9] Gaffar G. Momin, Rohan Hatti, Karan Dalvi, Faisal Bargi, Rohit Devare “Design, manufacturing & analysis of hydraulic scissor lift”International Journal of Engineering Research And General Science Volume 3, Issue 2, Part 2, March-April, 2015 ISSN 2091-2730733. [10] P.S. Rana, P.H. Belge1, N.A. Nagrare, C.A. Padwad1, P.R. Daga1, K.B. Deshbhratar N.K. Mandavgade “Integrated automated jacks for 4-wheelers” Scholars Research Library European Journal Of Applied Engineering And Scientific Research, 2012, 1 (4):167-172. [11] Osman Adil Osman, Ehab Murtada El-Tijane” A thesis submitted in partial fulfillment of the requirements for the degree of B.Sc. in mechanical engineering” university of khartoum faculty of engineering mechanical engineering department August 2015. [12] Divyesh Prafulla Ubale, Alan Francy, N.P Sherje “Design, analysis and development of multiutility home equipment using scissor lift mechanism”International Journal of scientific research and management (IJSRM)||Volume||3||Issue||3||Pages||2405-2408||2015||.

Title
:
A Survey of Information Extraction Using Different Databases
Article Type
:
Reveiw Article
Author Name(s)
:
Miss. Aparna M. Bagde, KJCOE, Pisoli, Pune; Prof. D. C. Mehetre ,KJCOE, Pisoli, Pune
Country
:
India
Research Area
:
Computer Networks

Information extraction is one time process for extraction of a particular kind of relationships of interest from a document collection. Information Extraction is the task of automatically extracting structured information from unstructured or semi-structured machine readable documents. A pipeline of special-purpose processing modules is implemented by Information extraction systems. And a pipeline of special-purpose processing modules targeting the extraction of a particular kind of information. But this kind of extraction of information is not enough because there is some disadvantages occurs i.e. when the information have to be modified or improved, here only small part of the corpus might be affected. In this seminar we proposed the new extraction technique in which extraction needs are expressed in the form of database queries, which are evaluated and optimized by database systems. Furthermore, our approach provides automated query generation components so that casual users do not have to learn the query language in order to perform extraction. “Efficiency and quality of extraction “are the two things in which we highlighted in the information extraction system. In this, we propose a new paradigm for information extraction. In this extraction framework, intermediate output of each text processing component is stored so that only the improved component has to be deployed to the entire corpus. Extraction is then performed on both the previously processed data from the unchanged components as well as the updated data generated by the improved component. Performing such kind of incremental extraction can result in a tremendous reduction of processing time. To realize this new information extraction framework, we propose to choose database management systems over file-based storage systems to address the dynamic extraction needs. Our proposed information extraction is composed of two phase’s i.e. initial phase and extraction phase. Here we use different types of DBMS and its comparison with conclusion that, which database is efficient for incremental information extraction.

Keywords : Information extraction, DBMS, file-based storage systems, extraction framework, Efficiency of extraction.

Recent

[1] D.Ferrucci and A.Lally,"UIMA: An incremental Approach to unstructured information processing in the corporate Research Environment,"Natural language Eng.,vol. 10,nos.3/4,pp.327-348,2004. [2] H.Cunningham, D.maynard, K.Bontcheva, and V. Tablan,"GATE: A Framework and Graphical Development Environment for robust NLP tools and applicationas,"Proc.40th Ann.Meeting of the ACL, 2002. [3] D.Grinberg, J.Lafferty, and D.Sleator," A Robust Parsing Algorithm for link Grammars," Technical Report CMU-CS-TR-95-125, Carnegie Mellon Univ. 1995 [4] S.Bird et al., "Designing and Evaluating Programs an XPath Dialect for Linguistic Queries," Proc 22nd Int'l conf.Data Eng.,(ICDE '06),2006. [5] D.D.Sleator and D. Temperley," Parsing English with a link Grammar," Proc Third Int'l workshop Parsing Technologies,1993. [6] E.Agichtein and L.Gravano, "Querying Text Databases for Efficient Information Extraction,"Proc.Int'l conf. Data Eng.(ICDE),pp.113-124,2003. [7] J.Hakenberg,C.Plake, R.Leaman, M.Schroeder, and G.Gonzalez," Inter-Species Normalization of Gene Mentions with GNAT," Proc. European Conf. Computational Biology (ECCB '08),2008. [8] L.Hunter , Z.Lu, J.Firby, W. Banumgartnar, H.Johnson, P.Ogren, and K.B.Cohen,"OpenDMAP:An Open Source ,Ontology Driven Concept Analysis Engine, with application capturing Knowledge Regarding Protein Transport, Protein Interactions and Celltype- Specific Gene Expression,"BMC Bioinformatics, vol.0,article no.78,2008. [9] A.Jain, A.Doan, L.Gravano," Optimizing SQL Queries over text database," Proc IEEE 24th int'l conf. Data Eng.(ICDE '08),pp.636-645,2008. [10] A.R. Aronson, “Effective Mapping of Biomedical Text to the UMLS Metathesaurus: The MetaMap Program,” Proc. AMIA Symp., p. 17, 2001. [11] A.Carolin Arockia Mary, S.Abirami, A.Ajitha, “Incremental Information Extraction Using Dependency Parser”, International Journal of Engineering Research & Technology (IJERT), 2013.

Title
:
Implementation of a General Purpose Sorter on FPGA
Article Type
:
Research Article
Author Name(s)
:
Mr.Kamel AliKhan Siddiqui, Deccan College of Engineering and Technology
Country
:
India
Research Area
:
Soc- VLSI and FPGA

The objective of the paper is to implement a general purpose sorting algorithm. The paper should offer a sorting network that can be deployed in various applications in impulsive noise reduction filters for image processing and other signal processing applications. The algorithm and sorting network should offer less hardware complexity and better memory usage options. It involves design, simulation and FPGA implementation of a general purpose sorter processor. The paper describes a detailed survey of sorting algorithms that are acquiescent to FPGA implementation, homing in on the most suitable one that may be deployed in digital signal and image processing applications. The work extends by demonstrating the potential of the implemented sorter in noise reduction filters.

Keywords : Digital Algorithm Model & FPGA Implementation, using Xilinx, Finite State Machine for Controller and Design of the Data Path Structure of the Filter

Recent

[1] Cormen, Thomas,H ,”Introduction to algorithms", Second edition. Cambridge Mass: MIT press c2001. [2] Knuth, Donald Ervin ,”The art of computer programming”, Volume 3 , Sorting and searching, second edition, Reading, Mass. ; Harlow : Addison-Wesley, c1998. [3] Gonzalez, Rafael .C, Woods, Richard E ,”Digital Image processing”, second edition, Upper Saddle River, N.J. ; London : Prentice Hall, c2002. [4] Mittermair, D, Puschner, P,” Which sorting algorithms to choose for hard real-time applications”,Ninth EUROMICRO Workshop on Real-Time Systems,1997, 11-13 June, Page(s):250 - 257 [5] Olariu, S., Pinotti, M.C.,Zheng, S.Q.,”How to sort N items using a sorting network of fixed I/O size”, IEEE transactions on Parallel and Distributed systems,Volume 10,Issue 5, May 1999 Page(s):487 - 499 [6] Herruzo, Ezequiel.,Ruiz, Guillermo., Benavides, J. Ignacio.,Plata, Oscar.,” A New Parallel Sorting Algorithm based on Odd-Even Mergesort”, 15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing, 2007,Page(s):18-22 [7] Chakrabarti, C.,”Sorting network based architectures for median filters”, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, Volume 40, Issue 11, Nov. 1993 Page(s):723 - 727 [8] Govindaswamy, V.V.,Balasekaran, G.,Marquis, J., Shirazi, B.A.,”A faster implementation of sequential sorting algorithms using the PARSA methodology”, Canadian Conference on Electrical and Computer Engineering, 2003. IEEE CCECE 2003, Volume 2, 4-7 May 2003 Page(s):1313 - 1316 [9] Maheshwari, R.,Rao, S.S.S.P., Poonacha, P.G.,”FPGA implementation of median filter”, Tenth International Conference on VLSI Design, 1997. Proceedings. 4-7 Jan. 1997 Page(s):523 – 524 [10] Vasicek, Z., Sekanina, L.,”Novel Hardware Implementation of Adaptive Median Filters”, 11th IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems, 2008. DDECS 2008, 16-18 April 2008 Page(s):1 - 6 [11] Fahmy, S.A., Cheung, P.Y.K., Luk, W.,”Novel FPGA-based implementation of median and weighted median filters for image processing”, International Conference on Field Programmable Logic and Applications, 2005, 24-26 Aug. 2005. [12] Morling,R.C.S., Kale,Izzet. ,”VLSI design Techniques”,University of Westminster, October 2007. [13] Douglas L.Perry “VHDL programming by example”, fourth edition 2002. [14] Ashenden, P.J., The Designer’s Guide to VHDL, 2nd Edition, Morgan kaufmann, 2001. [15] Smith, D.J., HDL Chip Design, Doone Publications, 1996.

Title
:
Fabrication and Analysis of Waste Heat Recovery System from Automobile Vehicle for Refrigeration Effect
Article Type
:
Research Article
Author Name(s)
:
Mr. Akshay Taru, NBN sinhgad school of engg.; Mr.Akshay Karande ,NBN sinhgad school of engg.; Mr. Akshay Painjane ,NBN sinhgad school of engg.; Mr. Vishal Sutar ,NBN sinhgad school of engg.; Prof. R. K. Nanwatkar ,NBN sinhgad school of engg.
Country
:
India
Research Area
:
Thermal

The principle of this project is to recovering waste heat from automobile vehicle and utilizes it for refrigeration affection. The waste heat from engine is recovered by using a copper tube wound around exhaust pipe of engine which contains water, which absorbs heat from flue gasses and supplies it to ammonia container through tubes. The ammonia container contains liquefied ammonia under pressure. The tubes containing hot water supplies heat to liquefied ammonia which evaporates and evaporated ammonia is supplied to chiller box. And hence refrigeration is created by vaporized ammonia in chiller box. Waste heat is heat, which is generated in a process by way of fuel combustion or chemical reaction, and then “dumped” into the environment even though it could still be reused for some useful and economic purpose. The essential quality of heat is not the amount but rather its “value”. The strategy of how to recover this heat depends in part on the temperature of the waste heat gases and the economics involved. Large quantity of hot flue gases is generated from Boilers, Kilns, Ovens and Furnaces. If some of this waste heat could be recovered, a considerable amount of primary fuel could be saved. The energy lost in waste gases cannot be fully recovered. However, much of the heat could be recovered and loss minimized by adopting following measures as outlined in this chapter. A waste heat recovery is an energy recovery system which recovers heat from hot streams containing high potential energy, such as hot flue gases from a diesel generator or steam from cooling towers or even waste water from different cooling processes such as in steel cooling or automobiles.

Keywords : Waste heat recovery, Exhaust pipe, Copper tube, Ammonia, Chiller box

Recent

[1] Satish K. Maurya et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 1), March 2014, pp.441-444 [2] Ammonia Refrigeration properties of ammonia https://www.osha.gov/SLTC/etools/ammonia_refrigeration/ammonia/ [3] R12 Refrigerant, R-12 or R 12 or Freon 12: Properties Advantages & Disadvantages. http://www.brighthubengineering.com/hvac/63281-refrigerant-r12-properties-advantages-and-disadvantages/ [4] Carbon Dioxide as Natural Refrigerant Padalkar A. S., Kadam A. D. [5] Parametric Study of R744-R717 Cascade Refrigeration System K.S. Rawat1, R. Kshetri2, H. Khulve3, A.K. Pratihar4 [6] Roberge, P. R. (1999). Handbook of Corrosion Engineering (1st ed.). McGraw-Hill Professional. ISBN 0-07-076516-2. Copper Tube Handbook, the Copper Development Association, New York, USA, 2006 Crane Copper - Australian Standards, Australian Standards AS 1432:2000 [7] Copper Tubing – Wikipedia. https://en.wikipedia.org/wiki/copper_tubing.

Title
:
Some Properties of Bipolar Fuzzy Normal HX Subgroup and its Normal Level Sub HX Groups
Article Type
:
Research Article
Author Name(s)
:
Manikandan, PSNA COLLEGE OF ENGINEERING & TECH., DINDIGUL; R. Muthuraj ,H.H. THE RAJAHS' COLLEGE, PUDUKOTTAI; M. Sridharan ,PSNA COLLEGE OF ENGINEERING & TECH., DINDIGUL
Country
:
India
Research Area
:
FUZZY ALGEBRA

In this paper, the notion of the normal level sub HX group is introduced. We discuss the properties of normal level sub HX groups of a bipolar fuzzy normal HX subgroup of a HX group under homomorphism and anti-homomorphism. AMS Subject Classification (2000): 20N25, 03E72, 03F055, 06F35, 03G25.

Keywords : fuzzy set, bipolar fuzzy set , bipolar fuzzy HX subgroup, bipolar fuzzy normal HX subgroup, level sub HX group, normal level sub HX group,

Recent

[1] S.Abou-Zaid, On normal fuzzy subgroups, J.Fac.Ed.Ain Shams Univ. Cairo, 13, 1998, pp. 115- 125. [2] K.Chandrasekahara Rao, V.Swaminathan, Anti homomorphisms in Near Rings, Journal of Inst.of Maths.Comp.Science ( Maths.ser) ,Vol.21 , No.2, 2008, pp.83-88. [3] K.Chandrasekahara Rao, V.Swaminathan, Anti homomorphisms in Fuzzy Ideals,World Academy of Science ,Engineering and Technology, Vol.4, 2010, pp.08-29. [4] F.P.Choudhury, A.B.Chakraborty, S.S.SKhare, A note on fuzzy subgroups and fuzzy homomorphism, J.Math.Anal.Appl., 131, 1988, pp. 537-553. [5] P.S.Das, Fuzzy groups and level subgroups, J.Math.Anal.Appl , 84, 1981, pp.264-269. [6] V.N. Dixit , A.Rajesh Kumar, Naseem Ajmal , Level subgroups and union of fuzzy subgroups, Fuzzy Sets and Systems, 37, 1990, pp.359-371. [7] G.Gopalakrishnamoorthy, Ph.D Thesis , Alagappa university, (May2000), Karaikudi, Tamilnadu,India. [8] S.D.Kim , H.S.Kim, On fuzzy ideals of near rings, Bull.Korean math-Soc., 33, 1996, pp.593-601. [9] K.H.Kim , Y.B.Jun, On Anti fuzzy Ideals in Near Rings , Iranian Journal of Fuzzy System , Vol.2, No.2, 2005, pp.71-80. [10] I.J.Kumar, P.K.Saxena , P.Yadav, Fuzzy normal subgroups and fuzzy quotients, Fuzzy Sets and Systems , 46, 1992, pp.121-132. [11] K.M.Lee , Bipolar –valued fuzzy sets and their operations, Pro.Int.Conf.on Intelligent Technologies, Bangkok, Thailand, 2000, pp. 307-312. [12] Li Hongxing, HX group, BUSEFAL, 33, 1987, pp.31 – 37. [13] Luo Chengzhong, Mi Honghai , Li Hongxing, Fuzzy HX group, BUSEFAL, 41-14 , 1989, pp.97 – 106. [14] S.V.Manemaran , B.Chellappa , Structure on Bipolar fuzzy groups and bipolar fuzzy D-ideals under (T,S) norms, International Journal of Computer Applications, Volume 9, 2010, pp. 7-10. [15] Mehmet Sait Eroglu, The Homomorphic image of a fuzzy subgroup is always a fuzzy subgroup, Fuzzy Sets and Systems, 33, 1989, pp. 255- 256. [16] R.Muthuraj , M.Sridharan, Homomorphism and anti-homomorphism on Bipolar fuzzy sub HX groups, Gen.Math.Notes, (ISSN 2219-7184), Volume 17,Number 2, 2013, pp. 53-65. [17] R.Muthuraj , M.Sridharan, Bipolar fuzzy HX group and its level Sub HX groups, International Journal of Mathematical Archive, (ISSN 2229-5046), 5(1), 2014, pp. 230 - 239. [18] R.Muthuraj , M.Sridharan, Bipolar fuzzy Normal HX subgroups, International Journal of Engineering Associates, (ISSN 2320-0804), Volume 3, Issue7, 2014, pp.8-13. [19] Mohamed Asaad, Groups and Fuzzy subgroups, Fuzzy Sets and Systems, 39, 1991, pp.323- 328. [20] Rajesh Kumar, Homomorphism and fuzzy (fuzzy normal) subgroups, Fuzzy Sets and System, 44 , 1991, pp.165 – 168. [21] Rosenfeld A, Fuzzy Groups, J.Math. Anal. Appl. 35, 1971, pp. 512-517. [22] Wu Wangming, Normal Fuzzy Subgroups, Fuzzy Math.(in Chinese),1, 1981, pp. 21-30. [23] Zadeh L.A, Fuzzy Sets, Inform and Control, 8, 1965, pp. 338-365. [24] Zhang W.R, Bipolar fuzzy sets, Proc. of FUZZ-IEEE, 1998, pp. 835-840.

Title
:
Techniques for Privacy Preservation
Article Type
:
Reveiw Article
Author Name(s)
:
Aswini Prasad, Mount Zion College of Engineering
Country
:
India
Research Area
:
cryptography

A form of biometrics, also called Biometric Encryption or BioCryptics, in which the proves is protected against the misuse of template data by a dishonest verifier. Biometric identification requires that a verifier searches for matches in a data base that contains data about the entire population. This introduces the security and privacy threat that the verifier who steals biometric templates from some (or even all) persons in the data base can perform impersonation attacks. When a private verification system is used on a large scale, the reference data base has to be made available to many different verifiers, who, in general, cannot be trusted. Information stolen from a data base can be misused to construct artificial biometrics to impersonate people. Creation of artificial biometrics is possible even if only part of the template is available. To develop an insight in the security aspects of biometrics, one can distinguish between verification and private verification. In a typical verification situation, access to the reference template allows a malicious verifier to artificially construct measurement data that will pass the verification test, even if the prover has never exposed herself to a biometric measurement after the enrollment. In private verification, the reference data should not leak relevant information to allow the verifier to (effectively) construct valid measurement data. Such protection is common practice for storage of computer passwords. When a computer verifies a password, it does not compare the password typed by the user with a stored reference copy. Instead, the password is processed by a cryptographic one-way function F and the outcome is compared against a locally stored reference string F(y ). So y is only temporarily available on the system hardware, and no stored data allows calculation of y. This prevents attacks from the inside by stealing unencrypted or decrypt able secrets. Biometric verification is defined as the verification of a individual based on the physical, chemical or behavioural attributes of the person. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs).These PPBSs can be classified into Biometric encryption based schemes, Cancel able biometric based schemes, Multi-modal and hybrid based schemes, secure computation (SC) based schemes. There is a comparative study of PPBS and select the best one .On the bases of comparisons select the best PPBS is Biometric encryption based schemes.

Keywords : biometric encryption ,cancelable biometric, hybrid based, multimode, secure computation.

Recent

[1] Iynkaran natgunanathan, abid nmehmood, yong xiang, (Senior dmember, IEEE),gleb beliakov, gsenior member, ieee), and john vbyearwoodGProtection of Privacy in BiometricDataSchool of Information Technology, Deakin University, HJGeelong, VIC 3220, AustraliaCorresponding author: Y. F) [2] JHandbook of Biometrics. A. K. Jain, P. Flynn, and A. A. Ross, New York,GNY, USA: Springer, 2008. [3] R. Belguechi, E. Cherrier, V. BNAlimi, P. Lacharme, and C. BNAn Overview on Privacy BNPreserving Biometrics. Rijeka, Croatia: InTech,2011. [4] N. K. Ratha, J. H. Connell, and R. M. Bolle, ``Enhancing security andprivacy in biometrics-basedVauthentication systems,'' IBM Syst. J., Bvol. 40,no. 3, pp. 614_634, Apr.2001 [5] C. Rathgeb and A. Uhl, ``A survey on biometric cryptosystems and cancelable biometrics''EURASIP J. Inf. Secur., p. 3, Sep. 2011 [6] S. Rane, Y. Wang, S. C. Draper, and P. Ishwar, ``Secure biometrics:Concepts, authentication architectures and challenges,'' IEEE Signal Process.Mag., vol. 30, no. 5, pp. 51_64, Sep. 2013. [7] J. Bringer, H. Chabanne, and A. Patey, ``Privacy-preserving biometricidentification using secure multiparty computation: An overview and recent trends,'' IEEE Signal Process. Mag., vol. 30, no. 2, pp. 42_52, Mar. 2013. [8] A. Cavoukian and A. Stoianov, ``Biometric encryption,'' Encyclopedia ofCryptography and Security. New York, NY, USA: Springer, 2009.