Amol S. Shinde and Dhanashri E. Patil
This paper proposed a potential and robust active force control (AFC) to minimize friction induced vibrations that is caused by the mechanisms of negative damping. Mathematical models that are based on Shin and Hoffmann schemes are first simulated And analyzed using conventional closed loop proportional-integral-derivative (PID) controller. It is seamlessly integrated with AFC elements to develop into a two degree-of-freedom (DOF) controller. Numerical simulations of system demonstrate proper selection of control parameters on degree of stability and robustness can attain the global stability of system. Active force control effectively reject the disturbances and consequently reduce the vibrations in the models. After running several tests it is found that the integrated PID-AFC scheme is very effective in suppressing vibration compared to the pure PID controller alone as clearly demonstrated through the results presented in time domain.
Nitesh.S.Hirulkar and RajendraS.Tajane
The current cam and follower mechanism in four stroke internal combustion engine employs a flat follower. In this work an attempt is made to change the flat face of follower to a curved face follower, so that the required point contact can be achieved. As line contact between existing cam and follower mechanism results in high frictional losses which results in low mechanical efficiency. It is observed that the frequency of vibration in the existing and modified cam and follower mechanism remains almost same. The finite element approach is used to perform the analysis.
Jyoti Darekar, Prof. V. G. Raut, Prof.Harjeet Kaur
The LMS algorithm is used for the filter coefficient adjustment, which uses only current residual values and the number of registers are evidently reduced and convergence speed is also much improved compared to existing methods by using FPGA for FIR filter Structure. Most of digital signal processing (DSP) algorithm requires many multiplications. Many multipliers in hardware implementation will decrease the speed of operation, use more area for VLSI design, and also consume morepower consumption. An implementation of least mean squared (LMS) adaptive filter using distributed arithmetic (DA) for filter coefficient adjustment. Distributed arithmetic (DA) is a famous technique for hardware implementation of DSP algorithm without any multipliers. Coefficient-distributive DA is used instead of conventional DA because filter coefficient are varied by time hence adder network and multiplexer structure is used in coefficient distributive DA. So the proposed LMS adaptive filter will bemiltiplierless and without lookup table. It includes for the application of echo cancellation in future and for improve the speed.
Bhavana S. Pansare,Rajesh B. Singh,Supriya B. Bamane
The energy efficiency in battery limited MANET is achieved by dynamically changing the network topology based on various traffic conditions. In routing process, topology is created dynamically involving smaller no. of nodes awake and other nodes are put into sleep mode. The active nodes are chosen on the basis of stability factor, utility factor and energy factor. The proposed technique is implemented over the network using AODV as routing protocol that ensures energy efficiency in MANET without affecting node connectivity and also increases the lifetime of network with the performance better in terms of energy, delay, and delivery ratio.
Shilpa Litake and Dr.Prachi Mukherji
The 802.11 wireless LAN standards have been widely deployed. The 802.11 MAC layer uses CSMA/CA algorithm with exponential backoff to regulate access to the shared wireless channel. Mobile users and applications are putting pressure on wireless operators to integrate various wireless technologies seamlessly in order to deliver unlimited content to users. This paper provides insight on various techniques available to improve backoff algorithm and vertical handover.
Shrikant R. Shelke,Harshad M. Wabale,SwapnilD.Shende, SurendraR.Yadav Prof. ThaksenJ. Parvat
Deep Packet Inspection provides secure and congestion free network. It determine whether incoming traffic matches a database of signatures up to payload level where each signature represents an attack, vulnerability, warm, virus. The problem that DPI system faces is low packet throughput, high memory requirement, latency and low accuracy. Different multi-string matching algorithm are used in DPI are compared and discussed. AhoCorasick algorithm is one of the algorithms which can match multiple patterns simultaneously and guarantee deterministic performance under all circumstances. A comparative study has been performed for this approach on the basis of packet throughput and memory requirement. In this paper, we survey the deep packet inspection implementationschallenges, techniques and algorithms. Finally, we provide a comparison between different applied systems.
Ujwala D.Podgantwar(Member,CSI) and Prof.UmeshRaut
This paper will presents a review on the Finger vein authentication system. In this system we are using the blood vessel patterns as a personal unique identifying factor. The blood vessels will transport the blood throughout the body to sustain the metabolism, using a network of arteries, veins as being a part of the circulatory system. By using such vascular structures in the palm and Fingers has been invented in the biometrics literature with high success. There are two basic reasons that are considered for the preference of finger-vein biometrics. First, As the finger veins are hidden structures inside the body of human being; it is extremely difficult to steal the finger-vein patterns of an individual without their prior knowledge, therefore will gives us a high degree of privacy or security. Second, the use of finger-vein pattern will leads to strong antispoofing capabilities as it can also ensure livenessin the presented fingers. Hence,The finger vein authentication technology leads to a high level of accuracy by considering both time and space parameters. Also the Finger vein is a secure biometric pattern for personal identification in terms of its security and convenience both. The importance of biometrics trends in the current field of Security has been depicted in this complete work. Japan’s Bank of Kyoto has adopted Hitachi’s biometric finger-vein authentication system on its ATMs since March 2006.Customers are expected to be using the system. On the heels of its recent development of Finger Vein Authentication Technology, Hitachi is showing off a similar system designed to thwart car thieves. To start the car, the driver needs to slide her finger into the scanner, mounted behind the steering wheel, which illuminates the digit and matches the internal vein pattern to a pre-registered profile. Once a match is made, the engine starts. No match, no start. Once the scanner has determined.the identity of a registered driver, the system can initiate custom settings for car systems, as well, including mirrors, climate control, seat position, and audio settings.
Manish Gupta and Akhilesh Kumar Choudhary
Supplier relationship is a discipline of working collaboratively with those suppliers that are vital to the success of the organization, so as to maximize the potential value of relationships. Many growing companies focus on the price of their suppliers, along with the price there are many factors to be considered in the supplier relationship like trust, communication, co-operation, conflict handling and co-operation. A questionnaire was prepared according to review of literature. A survey was conducted and sample data was collected from 31 Indian organizations. The results reveal that the trust and communication improve the buyer supplier relationship. This paper explores the study of various other relationship dimensions in the light of buyer supplier relationship.
Chaitanya Kulkarni and Prof.Dr.S.D.JOSHI
Copying code fragments and then reuse by pasting with or without minor modifications or adaptations are common activities in software development. This type of reuse approach of existing code is called code cloning and the pasted code fragment (with or without modifications) is called a clone of the original [1]. The area of clone detection (i.e., searching for duplicate fragments of source code) has received wide interest recently as indicated by numerous efforts in clone detection tool development [2]. A clone detector must try to find pieces of code of high similarity in a system’s source text. The main problem is that it is not known beforehand which code fragments may be repeated. Thus the detector really should compare every possible fragment with every other possible fragment. Such a comparison is prohibitively expensive from a computational point of view and thus, several measures are used to reduce the domain of comparison before performing the actual comparisons. Even after identifying potentially cloned fragments, further analysis and tool support may be required to identify the actual clones [3]. The act of copying indicates the programmer’s intent to reuse the implementation of some abstraction. The act of pasting is breaking the software engineering principle of encapsulation. While cloning may be unstructured, it is commonplace and unlikely to disappear via fiat. A clone is a program fragment that identical to another fragment. A near miss clone is a fragment, which is nearly identical to another [4]. There are different forms of redundancy in software. Software comprises both programs and data. Sometimes redundant is used also in the sense of superfluous in the software engineering literature. Redundant code is also often misleadingly called cloned code although that implies that one piece of code is derived from the other one in the original sense of this word. Although cloning leads to redundant code, not every redundant code is a clone.
Jyoti Darekar, Prof. V. G. Raut, Prof. Harjeet Kaur
The LMS algorithm is used for the filter coefficient adjustment, which uses only current residual values and the numberof registers are evidently reduced and convergence speed is also much improved compared to existing methods by using FPGAfor FIR filter Structure. Most of digital signal processing (DSP) algorithm requires many multiplications. Many multipliers inhardware implementation will decrease the speed of operation, use more area for VLSI design, and also consume more powerconsumption. An implementation of least mean squared (LMS) adaptive filter using distributed arithmetic (DA) for filtercoefficient adjustment. Distributed arithmetic (DA) is a famous technique for hardware implementation of DSP algorithmwithout any multipliers. Coefficient-distributive DA is used instead of conventional DA because filter coefficient are varied bytime hence adder network and multiplexer structure is used in coefficient distributive DA. So the proposed LMS adaptive filterwill be miltiplierless and without lookup table. It includes for the application of echo cancellation in future and for improvethespeed.
Manish Bhelande, Prof. (Dr) J. W. Bakal, Prasad Pulekar
In this paper we have designed and implemented a method in which the images can be easily denoised without affectingthe edge information.
Ms. Swati Pawar and Prof. Mr. V. S. Patil
Based on wavelet decomposition theory, an image source can be decomposed into different weight levels. Then, the bit streams with different weight are modulated by FH-OFDM system, which can give low frequency bits more protection with the help of hop frequency graphics design in FH_OFDM. A joint system combined with source coding and adaptive modulation method is studied to give the image bit streams with different subcarriers, which eliminates ISI in low frequency streams more effectively. Therefore, a better reconstruction image can be obtained at receiver. Simulation results indicate that the scheme withjoint source coding and adaptive modulation method can outperform the system without adaptive modulation in image quality.
Chaitanya Kulkarni and Prof. Dr. S. D. Joshi
Copying code fragments and then reuse by pasting with or without minor modifications or adaptations are common activities in software development. This type of reuse approach of existing code is called code cloning and the pasted code fragment (with or without modifications) is called a clone of the original [1]. The area of clone detection (i.e., searching for duplicate fragments of source code) has received wide interest recently as indicated by numerous efforts in clone detection tool development [2]. A clone detector must try to find pieces of code of high similarity in a system's source text. The main problem isthat it is not known beforehand which code fragments may be repeated. Thus the detector really should compare every possible fragment with every other possible fragment. Such a comparison is prohibitively expensive from a computational point of viewandthus, several measures are used to reduce the domain of comparison before performing the actual comparisons. Even after identifying potentially cloned fragments, further analysis and tool support may be required to identify the actual clones [3].
Pankaj Srivastava, Gagan Kant Tripathi,Neeraj K. Jaiswal
First-principles calculations within the local spin-density approximation have been used to investigate the electronic properties of chlorine adsorbed armchair born nitride nanoribbons (aBNNRs). The sensing was investigating by band structure. Boron nitride nanoribbons are randomly arrangement of the adsorption of chlorine one edge or both edge the comparing results ofbare boron nitride nanoribbons. It is revealed that presence of chlorine has a profound effect on the electronic properties of aBNNRs. BaresaBNNRs are non magnetic semiconductor in natures whereas chlorine adsorption turns them semiconductingirrespective of adsorption site. Further, the negative differential resistance (NDR) has been observed in bare ribbons which disappear upon the chlorine adsorption.
SCMR is a centre for multi-disciplinary research work, A few activities of SCMR for the benefit of industry.
© 2018, SPJ Centre for Multi-disciplinary Research . All rights reserved | Design by Design For U