Special Issue (NSER-2012)

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Implementation of Online Image Editor
Country
::
India
Authors
::
Prof. Gaikwad K.P, Shivam, Divyang Raval, Bhalani Hemal, Patel Mayank
Page
::
01-03

Online image Editing is an intense process that involves various operations such as color correction by using different color enhancement methods like contrast enhancing, image negative etc, Image resizing by changing style elements (Height and width) of an image, Image cropping by use of non-rectangular mat. or picture frame for selection of portions, Image flipping by flipping an image at horizontal or vertical axis and Image blurring by Gaussian Algorithm. It's obvious that these are all a part of creative methods that can simply make your images outstanding, hence this are very advantageous for customers from different industries and sectors to share single environment of editing images. With these services customers can separate objects from their background by selection tool, correct colors and adjust tone in images, insert extra photographs or graphics in the image, remove unwanted elements from your images by cropping, change the color of all the sections of an image.

 

Keywords: - Image Editor, Image Processing, Contrast Enhancement, Image cropping, Image Blurring, Image Flipping

[1] Luc Vincent,"Morphological Grayscale Reconstruction in Image Analysis: Applications and Efficient Algorithms",IEEE Transaction on Image Processing,Vol. 2,No. 2,pp. 176-201,, April 1993,Page 1-25.
[2] Michael Unser,Philippe Thevenaz,and Leoid Yaroslavsky,"Cobvolution-Based Interpolation for Fast,High-Quality Rotation of Images", IEEE Transaction on Image Processing ,VOL. 4, NO. 10, OCTOBER 1995,Page 1371-1381.
[3] Shantanu D. Rane and Guillermo Sapiro, Member, IEEE," Evaluation of JPEG-LS, the New Lossless and Controlled-Lossy Still Image Compression Standard, for Compression of High-Resolution Elevation Data", Ieee Transactions On Geoscience And Remote Sensing,VOL. 39, NO. 10, OCTOBER 2001,Page 2298-2306........

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Biometric Template Security Attack: A Review
Country
::
india
Authors
::
Mrs.Swati A.Jadhav
Page
::
04-08

Now a days, for any computer security biometric is became more popular due to its uniqueness. Mainly biometric is used for identification and verification of a particular person but this is suffered from some kind of security threats. In many application authentication for a particular system is provided with biometric template protection. Because biometric based authentication has more advantage over traditional method such as password and token based authentication method. The main advantage of any biometric over traditional method is that while recognizes any person at that time the person must be physically present at that place. But in case of password mechanism system does not identify difference between the attacker and an authorized
person/user. Hence, we can say that biometric is a strong weapon in any traditional authentication method. Sometime biometric is also lacks in some of its privacy, security and revocability .So, there is need to secure these biometric by/with combining these it with cryptography. Also we are aware that biometric plain template cannot be replaced if they are get compromised or attacker can access it purposely. For any secure system authentication can be identified with three main components that are what the person know? What he have? What he is? In this paper we summarized various aspects of biometric system security. Our goal is to broadly categorize various attacks that affect the biometric system failure and identify the effects of such failure.


Keywords: - authentication, cryptography, Identity management, revocability, biometric systems security, template protection, salting, non-invertible transform, key binding, key generation.

[1] A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process. 2008.
[2] G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identification," in IEEE Symp. Privacy and Security, 1998, pp. 148–157.
[3] F. Monrose, M. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice," in Proc. IEEE Symp. Security and Privacy, 2001, pp. 202–213.
[4] N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometric-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614–634, 2001.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Data Mining Using Artificial Neural Network Tree
Country
::
India
Authors
::
Pushkar Shinde
Page
::
09-12

Proper diagnosis, classification and prediction of diabetes are essential due to the increasing prevalence of the disease and the increasing cost to control it. Data Mining can help researchers to find knowledge regarding this disease which will in turn help in finding cure for the disease. Appropriate discovery of knowledge from historical data for this disease would be a valuable tool for clinical researchers. The main purpose of data mining is to gain insight of the data, and extract knowledge (inter-relational patterns) from the data. Applying data mining techniques in diabetic data can facilitate systematic analysis. Artificial Neural network (ANN) has already been applied in a variety of domains with remarkable success. However, it has not has been well utilized in data mining because of the "black box" nature. In this paper we present a method of using ANN in data mining and overcoming the "black box" nature using Decision Tree (DT).

 

Keywords: - Diabetes, data mining, rule extraction, neural network, decision tree

[1] Y. Bengio, 1M. Zurada.. Introduction to the Special Issue on Neural Networks for Data Mining and Knowledge Discovery, IEEE Tran. on. Neural Networks, vol.ll, no. 3, pp. 545-549. 2000.

[2] S. Kalaiarasi Anbananthen Sainarayanan , Ali Chekima, Jason Teo "Data Mining using Artificial Neural Network Tree", IEEE Conference on Computers , Communications and Signal Processing.

[3] Jiawei Han, Micheline Kamber "Data Mining Concepts and Techniques" .

[4] S.Kalaiarasi Anbananthen, Fabian H.P. Chan, K.Y. Leong. Data Mining Using Decision Tree Induction of Neural Networks, 3rd Seminar on Science and Technology. Kota Kinabalu : SST. 2004

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Mobility and Security Management in the GSM System
Country
::
India
Authors
::
Mr. Yogesh S. Amle, Mr. Datta S. Shingate, Mr. Pramod C. Patil
Page
::
13-18
Nowadays, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users surrenders to several security vulnerabilities. Although some of its security problems are addressed in its upper generations, there are still many operators using 2G systems. This paper mainly focuses on the most important security flaws of the GSM network and its transport channels. It also provides some practical solutions to improve the security of currently available 2G systems.
Important aspects of mobility and security in the Global System for Mobile communications system are discussed in this paper. Mobility management functions are categorized into three groups: a) Mobile turned on, b) Mobile turned off, and c) Mobile in conversation. The paper first outlines the mobile synchronization sequence followed by its mobility functions: mobile identification, authentication, international mobile station identity attach/detach, and its location update. The important role of security in
[1] A. Mehrotra, GSM System Engineering. Norwood, MA: Artech House, 1997.
[2] C-C Lo, and Y-J Chen, "Secure Communication Mechanisms for GSM Networks," IEEE Transactions on Consumer Electronics, Vol.45, No.4, pp.1074-1080, Nov. 1999.
[3] S.M. Siddique, and M. Amir, "GSM Security Issues and Challenges," 7th IEEE International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD'06), pp.413-418, June 2006
[4] GSM World News - Statistics: http://www.gsmworld. com/news/statistics/index.shtml. Access: Jan. 23 2008

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Person Identification using Biometrics (Iris Recognition)
Country
::
India
Authors
::
Mrs. Sanchita Soni, R.J. Bhiwani
Page
::
19-21
Biometric-based personal verification and identification methods have gained much interest with an increasing emphasis on security. Iris recognition is a fast, accurate and secure biometric technique that can operate in both verification and identification modes since the iris texture pattern has no links with the genetic structure of an individual and since it is generated by chaotic process. In this paper, we present a method for iris recognition based on a wavelet packet decomposition of iris images. Each iris image is described by a subset of band-filtered images (sub images) containing wavelet coefficients. From these coefficients, which characterize the iris texture, we compute a compact iris feature code using the appropriate energies of these sub images to generate binary iris codes according to an adapted threshold. Thereafter, we show how an efficient and reliable Hamming distance can be used in order to classify iris codes. Results are presented that demonstrate significant improvements in iris recognition accuracy through the use of the public iris database CASIA.
Keywords: - Biometrics, Iris identification, CASIA Iris database
[1] Vanjanaroselin.E.Chirchi,Dr.L.M.Waghmare,E.Rchirch i-Iris Biometric Recognition For Person Identification In Security Systems,International Journal Of Computerappliactions(0975-8887)Volume24-No.9,June 2011
[2] Christel-Loïc TISSE1, Lionel MARTIN1, Lionel TORRES
[3] 2, Michel ROBERT ―Person Identification Technique Using
[4] Human Iris Recognition
[5] Shimaa M.Elsherief, Mhamoud E.Allam And Mohamed

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Optimization of Gear Pairs Using Genetic Algorithm
Country
::
India
Authors
::
Y.K.Mogal , D.D.Palande, V.D.Wakchaure
Page
::
22-26

Up to now many optimization techniques have been developed & used for optimization of engineering problems to find optimum design. Solving engineering problems can be complex & time consuming when there are large number of design variables & constraints. A Gear design require the designer to compromise many design variables; i.e. continuous, discrete & integer variables in order to determine best performance of gear set. Therefore a conventional optimization technique has difficulty in solving those kinds of problem. In this paper Genetic algorithm is introduced for, 1] Minimization of power loss of worm gear mechanism with respect to specified set of constraints. 2] Minimization of volume of two-stage gear train.

 


Key words: - Optimization, Genetic Algorithm and Gea

[1] Hong bing Fang, Qian Wang," Multiobjective design of a vehicular structure using metamodelling and an efficient genetic algorithm", International journal of design Engineering, Vol. 1,pp.41-55, 2007.
[2] Khadiza Tahera, Raafat N. Ibrahim, Paul B. Lochert, "GADYM - A Novel Genetic Algorithm in Mechanical Design Problems", Journal of Universal Computer Science, vol. 14, no. 15,pp. 2566-2581,2008.
[3] Muhammet Yaman, Hamit Saruhan, Faruk Mend," Power Loss Optimization Of A Worm Gear Mechanism By Using Genetic Algorithm" Technical Education Faculty, Machine Design And Construction Department, Konuralp Yerleskes,

[4] Tae Hyong Chong* and Joung Sang Lee, "A Design Method of Gear Trains Using a Genetic Algorithm", International Journal of the Korean Society of Precision Engineering, Vol. 1, No. 1, June 2008.

.........

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
An Experimental Investigation to Control the Flow Emerging From a Wide Angle Diffuser
Country
::
India
Authors
::
Shende M. D, More K. C., Rakhade R. D.
Page
::
27-32
In the absence of any flow control, the flow through a wide-angle diffuser consists of a narrow axial jet surrounded by regions of separated flow, which persists downstream. The results of an experimental investigation into the use of perforated plates to control the velocity profile emerging from wide-angle diffuser are reported here. Geometry has an important influence on the flow features for short wide-angle diffuser. The incorporation of perforated plates has a considerable influence on the flow properties within the diffuser. Tests were undertaken using different perforated plates in an axisymmetrical type of wide-angle diffuser, having rectangular cross-section with area ratio 10 and total included angle 600. Without the use of perforated plates to control the flow, highly non-uniform velocity profiles occur. Depending upon the porosity of the screens and their locations within the diffuser, different types of exit velocity profile were found.

[1] M.N. Noui- Mehidi, J. Wu, I.D. Sutalo, C. Grainer "Velocity Distribution Downstream of an Asymmetric Wide-Angle Diffuser", Experimental Thermal and Fluid Science, Vol. 29, Issue 6, 2005, Pp 649-657

[2] N.L. Kachhara, J.L .Livesey, P.L. Wilcox "An Initial Approach to the Design of Very Wide Angle Axisymmetric Diffusers with Gauzes to Achieve uniform outlet Velocity Profiles", Transactions of the ASME Journal of Fluids Engineering, Vol. 99, Issue 2, 1977, Pp 357-364.

[3] B. Sahin and A.J. Ward-Smith "The Pressure Distribution in and Flow Characteristics of Wide Angle Diffusers Using Perforated Plates for Flow Control with Application to Electrostatic Precipitators", International Journal of Mechanical Science, Vol. 35, No. 2, 1993, Pp 117-127.

[4] B. Sahin and A. J. Ward-Smith, D. Lane "The Pressure Drop and Flow Characteristics of Wide Angle Screened Diffusers of Large Area Ratio", Journal of Wind Engineering and Industrial Aerodynamics,. Vol. 58, Issue 1-2, 1995, Pp 33-50.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Piston Design and Analysis by CAE Tools
Country
::
India
Authors
::
Ghodake A. P., Patil K.N.
Page
::
33-36
Computer aided engineering (CAE) tools allow engineers to design product and to simulate these designs for residual stress, structural response, pre-processing and post processing fatigue and similar effects on the machine component. CAE allows engineers to load the component at its extreme conditions and simulate its response or otherwise it is not possible to do it because of safety limitations of cost consideration. Particularly for automobile components CAE helps to analyze them for crash simulation, creep and fatigue test on virtual component leading to reduction in time consuming trial and error procedure for design the prototype and it also helps to reduce the cost of manufacturing. The leading manufactures have accepted simulation as a part of early design process with prototyping and testing are done to ultimately verify the designs.
[1] "CAD/ CAM/ CAE "by Chougule N. K. [Scitech Publication] pp1.6,17.1,17.2
[2] "Computer Aided Engineering in Compression Molding" (Antoine Rios, Bruce Davis and Paul Gramann, The Madison Group: Polymer Processing Research Corporation 505 S. Rosa Rd. Madison, WI 53719)
[3] C.H. Li., Piston thermal deformation and friction considerations, SAE Paper 820086, 1982.
[4] Properties and Selection: Irons, Steels and High Performance Alloy, ASM Handbook, vol. 1, ASM International, 1990.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Study of Failure Analysis of Gas Turbine Blade
Country
::
India
Authors
::
Patil A.A., Shirsat U.M.
Page
::
37-43
The failure of a second stage blade in a gas turbine was investigated by metallurgical and mechanical examinations of the failed blade. The blade was made of a nickel-base alloy Inconel 738LC. The turbine engine has been in service for about 73,500 hrs. Before the blade failure. Due to the blade failure, the turbine engine was damaged severely. The investigation was started with a thorough visual inspection of the turbine and the blades surfaces, followed by the fractography of the fracture surfaces, micro structural investigations, chemical analysis and hardness measurement. The observation showed that a serious pitting was occurred on the blade surfaces and there were evidences of fatigue marks in the fracture surface. The micro structural changes were not critical changes due to blade operation at high temperature. It was found that the crack initiated by the hot corrosion from the leading edge and propagated by fatigue and finally, as a result of the reduction in cross-section area, fracture was completed. An analytical calculation parallel to the finite
[1] E. Poursaeidi , M. Aieneravaie (2007), "Failure analysis of a Second stage blade in a gas turbine engine"; Engineering failure analysis; 15 (2008) pp 1111-1129.
[2] A. Kermanpur (2008), "Failure analysis of Gas turbine compressor blade"; Engineering failure analysis; 15 (2008) pp 1052-1064.
[3] Z. Mazur (2004) "Failure analysis of gas turbine blade made of Inconal 738LC alloy"; Engineering failure analysis; 12 (2005) 474-486.
[4] Jung-Chel Chang (2003) "Failure analysis of gas turbine buckets"; Engineering failure analysis; 10 (2003) pp 559-567.
[5] N. J. Lourenco (2007), "Fatigue failure of a compressor blade"; Engineering failure analysis; 15 (2008) pp 1150-1154.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Development of computer controlled colour mixing illumination network using RGB LEDs
Country
::
India
Authors
::
Mrs. S. S. Umare, Prof. A. M. Jain, Prof. Dr. B. E. Kushare,
Page
::
44-47

At present LED light sources are gradually applied to LCD backlighting and video projection. But increasing luminous efficacy (lm/W) makes the use of LED light sources for general lighting and modern lighting like mood lighting. Based on the demands of mood lighting and combination of light colour of Red, Green and Blue LED light sources gives the desired colour effect. This paper is focused on the concept of colour mixing. For this an attempt is made to design personal computer based RGB illumination module. It consist of microcontroller and LED driver ,will enable the users to select desired colour by just clicking on the CIE chromaticity chart. The microcontroller regulates LED light output with pulse width modulated current and changes the light colour with the ratios of red, green and blue LEDs. This paper covers the block diagram development necessary for this RGB illumination module.


Index Terms: - RGB LEDs, CIE chromaticity chart, illumination network, PWM, tristimulus values

[1] B Ackermann,V Schulz,C Martiny ,A Hilgers,X Zhu, "Control Of LEDs " IEEE 2006
[2] Shang Ping Ying ,Chun Wen Tang and Bin Jain Huang, "Characterizing LEDs For Mixture Of Coloured LED Light Sources " IEEE 2006
[3] Mohd Rozaini and Rahim,Rozeha A Rashid ,Nur Hija Manalian,Esther Cheng ,"The Development Of Computer Controlled Multicolour Illumination Network Using RGB based Light Emitting Diodes",IEEE 20008
[4] Yueh-Ru Yang, "Implementation of A Colourful RGB LED Light Source With an 8 bit Microcontroller" IEEE 2010

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Application of Active Power Filter for Power Factor Correction of Nonlinear Loads
Country
::
India
Authors
::
D R Kirtane, P M Sonwane, B E Kushare
Page
::
48-51

Reduction of harmonics is one of the major needs for an ideal power system and it is demanded that it should ideally provide a balanced and pure sinusoidal voltage of constant amplitude to the loads. Loads should draw a current from the line at unity power factor .With the rapid development in power semiconductor devices, power electronics systems have matured and expanded to new and wide applications range from residential, commercial, aerospace to military and others. Power electronics interfaces, such as switchmode power supplies (SMPS) are now clearly superior over the traditional linear power supplies resulting in more and more interfaces switched into power systems. While the SMPSs are highly efficient, but because of their nonlinear behaviour, they draw distorted current from the line, resulting in high total harmonic distortion (THD) and low power factor (PF). To achieve a smaller output voltage ripple, Practical SMPSs use a large electrolytic capacitor in the output side of the single phase rectifier. Since the rectifier diodes conduct only when the line voltage is higher than capacitor voltage, the power supply draws a high rms pulsating line current. As a result high THD and PF are present in such power systems. Hence introduction of such devices in power system needed a solution for harmonic reduction and power factor correction.

 

Keywords: - Nonlinear loads, Harmonic distortion, Power factor, Active power filter, Current compensation.

[1] Rahul Virmani, Prerna Gaur, Himanshu Santosi, A.P.Mittal, Bhim Singh, "Performance Comparison of UPQC and Active Power Filters For A Nonlinear Load ", 978-1-4244-7781-4110, IEEE 2010.
[2] Mikko Rautimo, Mika Salo, and Heikki Tuusa, "Comparison of Voltage source And Current source Shunt Active Power Filters", IEEE Transaction on Power electronics,vol.22, No.22,March 2003.
[3] Roger C. Dugan, "Electrical Power Quality".2nd ed.,Chap.5 and 6,PP167-294, Tata McGraw Hill, Professional Engineering.
[4] J.G.Pinto, Pedro Neves, Ricardo Pregitzer, Luis F.C. Monteiro, Joao L.Afonso,"Single Phase Shunt Active Filter With Digital Control" POCTI/ESE 48242/2002.
[5] L. Wuidart , Application note on "Understanding Power Factor", AN824/1003.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Measuring Semantic Similarity between Words Using Web Search Engines:A Survey
Country
::
India
Authors
::
Shweta A.Koparde
Page
::
52-54

Semantic similarity measures play important part in information retrieval and Natural Language Processing. Earlier work in semantic web-related applications such as community mining, relation extraction, automatic metadata extraction has used various different semantic similarity measures. In spite of the usefulness of semantic similarity measures in these applications, measuring semantic similarity in two words (or entities) remains a challenging task. This paper performs a survey on semantic similarity measure and proposes a strong semantic similarity measure that uses the information available on the web to measure similarity between two words or entities. The proposed method exploits text snippets returned by a web search engine. This paper proposes new approach to compute semantic similarity using automatically extracted Lexico-syntactic patterns from text. These different similarity scores are included using support vector machines, to leverage a strong semantic similarity measure.

 

Keywords: - Semantic similarity, Web mining

[1] M. Sahami and T. Heilman. A web-based kernel functions for measuring the similarity of short text snippets. In Proc. of 15th International World Wide Web Conference, 2006.
[2] D. Bollegala, Y. Matsuo, and M. Ishizuka. Disambiguating personal names on the web using automatically extracted key phrases. In Proc. of the 17th European Conference on Artificial Intelligence, pages 553{557, 2006.
[3] H. Chen, M. Lin, and Y. Wei. Novel association measures using web search with double checking. In Proc. of the COLING/ACL 2006, pages 1009{1016,2006.
[4] C. Buckley, G. Salton, J. Allan, and A. Singhal.Automatic query expansion using smart: Trec 3. In Proc. of 3rd Text REtreival Conference, pages 69{80,1994.

........

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Minimum Quantity Lubrication
Country
::
India
Authors
::
Nilesh C Ghuge, Dhatrak V.K., Dr.AM.Mahalle
Page
::
55-60
Metal cutting fluids changes the performance of machining operations because of their Lubrication, cooling, and chip flushing functions. In the machining of hardened steel materials, no cutting fluid is applied in the interest of low cutting forces and low environmental impacts. Minimum quantity lubrication (MQL) presents itself as a viable alternative for hard machining with respect to tool wear, heat dissertation, and machined surface quality. This review paper gives comparison of the mechanical performance of minimum quantity lubrication to completely dry lubrication for the turning of hardened bearing-grade steel materials based on experimental measurement of cutting forces, tool temperature, white layer depth, and part finish. This review paper shows that the use of minimum quantity lubrication leads to reduced surface roughness, delayed tool flank wear, and lower cutting temperature, while also having a minimal effect on the cutting forces.

[1] LUBRILEAN® Digital Super Minimal Quantity Lubrication, UFD 10 – 02x Systems for Internal Lubrication, UFD 20 – 02x, Operating -manual
[2] LubriLean -"MQL for customized dry machining process, 1-5102-US, WILLEY VOGEL Product Catalog
[3] Ronan Autrate, Atven Liang"Minimun Quantity Lubrication In Finish Hard Turning" ,HNICEM'03,pp1-9
[4] Klocke, F., Eisenblatter, G., "Dry Cutting," Annals of the CIRP, 46 (2), pp. 519-526,1997.
[5] MaClure, T. F., Adams, R. and Gugger, M. D, Comparison of Flood vs. Micro lubrication on Machining Performance, 2001.

.....

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Natural Frequency and Mode Shape Analysis of Circular Cutters
Country
::
India
Authors
::
Mr. Katale Ganesh Dhanaji, Prof. J.H.Bhangale
Page
::
61-65
The objective of current dissertation work is to analysis of vibration characteristics of circular cutters with free boundary condition but having different ( numbers of cutting teeth, aspect ratio, effect of radial slots, enlargement of stress concentration holes) is done here. Analysis for circular cutters with inner edge clamped and outer edge free is done here. For same aspect ratio of annular cutter but variable numbers and variable lengths of radial cracks for inner edge clamped and outer edge free boundary condition. When the excitation frequency of any structure matches with one of the natural frequency of the plate then resonance occurs and a damage of plate takes place. So here objective is to determine the modal parameters and an effort can be made to avoid the resonance

[1] H. Jiang, W. X. Tang and Y. P. Qu College of Chemistry and Chemical Eng., Shandong University, NO.27, Shanda South Rd,250100, Shandong, P.R.China, This paper focuses on analysis for the dynamic characteristics of the high-speed rotary tools. In this process, the rotary tools' structural parameters are taken into account, dynamic characteristics analysis of the rotary tools models are performed and natural frequencies and mode shapes of vibration are calculated. It is testified that the results of calculation are in agreement with those of experiment. And the dynamics modeling proposed and the dynamic characteristics obtained in this paper can be used to evaluate and optimize the dynamic behaviors and stability of the rotary tools in high-speed machining (HSM) system

[2] G. N. Weisenel have cutter used the results of an extensive literature search and review of available sources of numerical natural frequency information for stationary circular and annular elastic plates. In addition to source information is given regarding the specific plate theory, boundary conditions, geometric properties and material properties used to determine the natural frequency information Sources of information are tabulated according to the above parameters for easy reference and selection of desired information This information may be particularly useful to experts and designers when frequency data are required without the need for detailed analysis.
[3] C.A. Malfa, C.A.Rossit, P.A.A. Laurahave focused on analytical and experimental investigation on transverse vibrations of solid circular and annular plates carrying a concentrated

......

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Some Curvature Properties of Sasakian Manifolds
Country
::
India
Authors
::
Dr. S. M. Bhati, A. R. Tambe
Page
::
66-69

In this paper, we established several curvature properties of a Sasakian manifold of dimension n  5. The Bochoner curture tensor B of a Sasakian manifold 2n 1 M  with structure (,,,g) is introduced as an analogue of the Weyl conformal curvature tensor of a Reimannian manifold (see Matsumoto and Chuman [3]) We obtained many identities containing components of Bochoner curture tensor. We studied some geometrical implication of vanishing of the contact Bochoner curture tensor in Proposition 2.1 and 2.2

 

Key words: - Subject Classification: 53 C 20 Global Differential Geometry

[1] D.E. Blair, Contact Manifolds in Riemannian Geometry, Lecture Notes in Math.,509, Springer -Verlag, Berlin and New York, 1976
[2] M. Kon, Invariant Submanifolds in Sasakian manifolds, Math. Ann. 219(1977) 277- 290
[3] M. Matsumoto and G. Chuman, On the C-Bochoner curvature tensor, TRU Math. 5 (1999)21-30.

 

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Role of stored energy on operation of squirrel cage induction motor during voltage sag conditions
Country
::
India
Authors
::
Mrs. A. A. Ghotekar,Prof. A. M. Jain, Prof. Dr. B. E. Kushare
Page
::
70-74

Voltage sag being one of the biggest problems in power quality, a method for analysis of effects of voltage sag on performance characteristics of induction motor is proposed in this paper. Induction motor being most popular in industry, it is very important to carry out studies about the effects of power quality on operational performance of induction motor. The major effects of voltage sag on operation of induction motor are speed loss and fluctuations in torque but not all sag conditions results in above effects. This paper covers study and role of stored energy in induction motor during its operation which is important to consider during voltage sag conditions to differentiate between tolerable and vulnerable voltage sag. Also load types and performance criteria for load can also be considered to clearly state the adverse effect of voltage sag on application.

 

Index Terms: - Voltage sag, energy stored in magnetic field and mechanical system, Electrical & Mechanical time constants, Induction motor

[1] J. Pedra, F. Co´ Rcolesand L. Sainz ―Effects Of Unsymmetrical Voltage Sags Onsquirrel-Cage Induction
Motors‖
[2] solivio C. N. Soutojodc. De Oliveira Lucian0 M. Net0paul0 F. Ribeiro ―Power Quality Impact On Performance And Associated Costs of Three-Phase Induction Motor‖
[3] davar Mirabbasi1, Ghodratollahseifossadat2 ,Mehrdad Heidari1 ―Effect Of Unbalanced Voltage On Operation Of Induction Motors And Its Detection‖, 1 Phd Student Of Shahidchamran University, Ahvaz, Iran2 Assistant Professor Of Shahidchamran University, Ahvaz, Iran
[4] Prof. Dr. B E Kushare ―Power Quality Workshop‖

........

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Solid Waste Used As Construction Material
Country
::
India
Authors
::
Kanthe V.N., Chavan P.G.
Page
::
75-77

There is increase in population in very large amount due to this the disposal of solid waste is a major problem. The main objective of this study is to investigate the potential use of various solid wastes for producing construction materials (such as bricks). The present paper is based on the innovative work in solid wastes in which various admixtures are used such as fly ash & glass fibers to increase brick strength. This paper also shows the results which are taken by the test on bricks.

 

Keywords: - Solid waste,Flyash,Brick

[1] Chee-Ming Chan, "Effect of Natural Fibres Inclusion in Clay Bricks: Physico-Mechanical Properties", International Journal of Civil and Environmental Engineering, 2011, pp: 51-55.
[2] Ren K. B, and Kagi D.A, "Upgrading the Durability of Mud Bricks by Impregnation", Journal of Construction and Building Material, 1995, pp: 432-440.
[3] Binici H, Aksogan O. and Shah T, "Investigation of Fibre Reinforced Mud Brick as Building Material", Journal of Construction and Building Material, 2005, pp: 313-340.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Watermarking relational databases: A Review
Country
::
India
Authors
::
Prof.Bhawana Ahire, Prof. Neeta Deshpande
Page
::
78-83

With the wide use of internet and growing technologies, one needs to protect the confidential information and data from the intruders and data hackers. Watermarking is an information hiding technique which is used to embed a mark within some host content. One of the main applications of watermarking is to prevent non-compliance of copyrighted works by embedding a copyright mark within the content to be protected. There is a rich body of literature for watermarking techniques to address these issues. Steps of watermarking relational database basically include data partitioning watermark embedding, decoding threshold evaluation and threshold decoding. The desirable properties of the watermarking relational databases are robustness, imperceptibility, private key selection, etc. This paper strongly focuses on the review of four relational database watermarking techniques proposed by researchers [R.Agarwal, R.Sion, Zhi-Hao Zhang and M.Shehab].

 

Keywords: - Digital watermarking, robustness, relational database.

[1] F. Petitcolas, R. Anderson, and M. Kuhn. Attacks on Copyright Marking Systems. Lecture Notes in Computer Science, 1525:218– 238, April 1998.
[2] M. Swanson, M. Kobayashi, and A. Tewfik. Multimedia Data-Embedding and Watermarking Technologies. Proceedings of the IEEE, 86:1064–1087, June 1998.
[3] I. Cox, J.Bloom, and M.Miller ,Digital Watermarking, Morgan Kaufmann, 2001.
[4] R. Agarwal and J Kieman, Watermarking relational databases In Proceedings of 28th International In Proceedings of 28th International Conference on very large databases, Hong Kong, China, 2002.
[5] D. Gross-Amblard .Query Preserving Watermarking of relational databases and XML documents, In PODS ‟03: Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 191–201. ACM Press, 2003.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Determining applicability of SCM practices in Process Industries
Country
::
India
Authors
::
Shrihari Upasani, V. Kadbhane
Page
::
84-89
WORLD SCENARIO Since last two decades the competition in different organizations intensified and markets became global, so did the challenges associated with getting a product and service to the right place at the right time at the lowest cost. Organizations began to realize that it is not enough to improve efficiencies within an organization, but their whole supply chain has to be made competitive. For any organization a supply chain consists all stages involved tangibly or intangibly to fulfil the customer request. The supply chain includes not only manufacturers & suppliers but also the transporters, warehouses, retailers & even customers themselves. Within each organization such as manufacturer the supply chain includes all functions involved in receiving & filling customer request.
[1] Aburto L.& Weber R. (2005) Improved supply chain management based on hybrid demand forecast Elsevier doi: 10.1016/j. asoc 2005 .06 .001
[2] Andersen B, Fagerhaug T, Randmael S. (1998) Benchmarking Supply Chain Management: Finding Best Practices.
[3] Arora, A., Arunachalam V., Asundi J., Fernandes
[4] R.,The Indian Software Industry
[5] Avittathur B.& Swamidass P (2006) Matching plant flexibility and supplier flexibility: Lessons from small suppliers of U.S. manufacturing plants in India Journal of operations management 25(2007) pp 717-