Open Access. Powered by Scholars. Published by Universities.®

Mechanical Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 2516

Full-Text Articles in Mechanical Engineering

Synergy Of Thermochemical Treatment Of Dried Distillers Grains With Solubles With Bioethanol Production For Increased Sustainability And Profitability, Samuel O’Brien, Jacek A. Koziel, Chumki Banik, Andrzej Białowiec Sep 2020

Synergy Of Thermochemical Treatment Of Dried Distillers Grains With Solubles With Bioethanol Production For Increased Sustainability And Profitability, Samuel O’Brien, Jacek A. Koziel, Chumki Banik, Andrzej Białowiec

Agricultural and Biosystems Engineering Publications

The bioethanol industry continues improving sustainability, specifically focused on plant energy and GHG emission management. Dried distiller grains with solubles (DDGS) is a byproduct of ethanol fermentation and is used for animal feed. DDGS is a relatively low-value bulk product that decays, causes odor, and is challenging to manage. The aim of this research was to find an alternative, value-added-type concept for DDGS utilization. Specifically, we aimed to explore the techno-economic feasibility of torrefaction, i.e., a thermochemical treatment of DDGS requiring low energy input, less sophisticated equipment, and resulting in fuel-quality biochar. Therefore, we developed a research model that ...


Preemptive Priority Scheduling With Aging Technique For Effective Disaster Management In Cloud, Mahitha. O, Suma. V Aug 2020

Preemptive Priority Scheduling With Aging Technique For Effective Disaster Management In Cloud, Mahitha. O, Suma. V

Graduate Research in Engineering and Technology (GRET)

Cloud computing has intern the attention of today’s leading IT industries offering huge potential for more flexible, readily scalable and cost effective IT operation. There is a significant anticipation for emergent innovation and expanded capabilities of a cloud-based environment as the cloud services are still in the infant stage. With all technology innovation, the biggest gain will be realized when the Cloud services are efficiently utilized. One of the prime contributions of Cloud is its capacity to handle a huge amount of data for either processing or storing. The inadequacy of this model is that it is prone to ...


User Interface Design For Management Of The Network Elements Using Dojo, Sudharani T. K, Shanthakumar A. H Aug 2020

User Interface Design For Management Of The Network Elements Using Dojo, Sudharani T. K, Shanthakumar A. H

Graduate Research in Engineering and Technology (GRET)

This paper focuses on the design of the user interface for managing network elements using dojo. Dojo is an open source java script toolkit which is used for constructing dynamic web user interfaces. Here we are designing the user interface for the management of the network elements in a optical management system .User can see the tree list of all the network elements and network element hierarchy and will be able to access on any network element and view the details and status of it and perform provisioning operations on it. It also provides various user forms and tabular representation ...


Evaluating Performance Of Hybrid Networks By Using Latency And Pdv, Anushri Dixit, Jinal Kothari, Mr. Ashwinikshirsagar, Prof. Rajesh Kolte Aug 2020

Evaluating Performance Of Hybrid Networks By Using Latency And Pdv, Anushri Dixit, Jinal Kothari, Mr. Ashwinikshirsagar, Prof. Rajesh Kolte

Graduate Research in Engineering and Technology (GRET)

Hybrid networks are widely used in networking sector. They combine the finest features of both Wired and Wireless networks to give optimum results. Using different types of routing protocols, the capabilities of a hybrid network will be demonstrated using certain performance metrics. In this paper, we will be simulating real-time scenarios of three networks of different sizes. Each of these networks will be implemented with single routing protocol i.e. Enhanced Interior Gateway Routing Protocol (EIGRP). The networks will be simulated using Cisco Packet Tracer simulation tool. Furthermore, we have evaluated the performance of the networks by considering performance metrics ...


An Efficient Method To Feed High Resolution Images To Facial Analysis Systems, Roopa R, Mrs. Vani.K .S Aug 2020

An Efficient Method To Feed High Resolution Images To Facial Analysis Systems, Roopa R, Mrs. Vani.K .S

Graduate Research in Engineering and Technology (GRET)

Image Processing is any form of signal processing for which the image is an input such as a photograph or video frame. The output of image processing may be either an image or a set of characteristics or parameters related to the image. In many facial analysis systems like Face Recognition face is used as an important biometric. Facial analysis systems need High Resolution images for their processing. The video obtained from inexpensive surveillance cameras are of poor quality. Processing of poor quality images leads to unexpected results. To detect face images from a video captured by inexpensive surveillance cameras ...


Encoding Personal Information On Data Sharing In Cloud Using Base64 Algorithm, P.L. Rini, Y. Gold Anand.N Aug 2020

Encoding Personal Information On Data Sharing In Cloud Using Base64 Algorithm, P.L. Rini, Y. Gold Anand.N

Graduate Research in Engineering and Technology (GRET)

A major feature of cloud services is that user data are processed remotely among machines. But user fears of losing control of their own data, particularly financial and health data can becomes a significant barrier to wide adoption of cloud services in order to avoid this problem we provide a novel approach, namely Cloud Information Accountability (CIA) for clients. So that the authorized client can only access the data in the cloud. Data owner store data in the format of JAR format thus client access data only by the permission of data owner. To strengthen user’s control also provide ...


Automated Sentiment Analysis An Automated Analysis Of News Feeds, Karthik Balasubramanian, Aparajith Chandran Aug 2020

Automated Sentiment Analysis An Automated Analysis Of News Feeds, Karthik Balasubramanian, Aparajith Chandran

Graduate Research in Engineering and Technology (GRET)

This Paper explains the importance of Sentiment Analysis in today's business. Information which is hidden as unstructured data in the Internet can be utilized more efficiently. In this paper we quote an approach which explains the experiment for collection of news data and analyzing the sentiments for those data. The results provide almost accurate analysis outcomes with a few discrepancies. These are also explained and research is in progress towards making an efficient system.


An Energy Efficient Deactivation Technique For Reactive Jammers In Wireless Sensor Networks, Supreetha Patel T P, K. N. Shreenath Aug 2020

An Energy Efficient Deactivation Technique For Reactive Jammers In Wireless Sensor Networks, Supreetha Patel T P, K. N. Shreenath

Graduate Research in Engineering and Technology (GRET)

In recent days, reactive jamming attack has emerged as a great security threat to wireless sensor network [WSN]. Several strategies are developed to identify the trigger nodes, whose legitimate transmission activates any reactive jammer. After identifying the trigger node, the node will be shut down to deactivate the jammer and its routing information is deleted from the routing table, then the node can’t be used again in the network. Since the node can’t be used again in the network it is one of the major drawbacks. Hence to overcome the problem, In this paper we propose a novel ...


Securing Multihop Network By Detecting And Locating Pollution Attacks Using Spacemac., Anupama. T. .A, R Aparna Dr. Aug 2020

Securing Multihop Network By Detecting And Locating Pollution Attacks Using Spacemac., Anupama. T. .A, R Aparna Dr.

Graduate Research in Engineering and Technology (GRET)

It has been widely observed that providing security is one of the challenging task in Wireless sensor network(WSN). Program images need to be updated continuously as network programming happens in WSN. Many Networking protocols provide an efficient way to update these program images running on sensor nodes. One of the cryptographically strong protocol called DELUGE exists to address this challenge, but it involves high computational cost such as power consumption and communication costs. So Multiple one way key chain is proposed to secure a multihop network programming protocol which is lower in power consumption and communication costs. Even though ...


Impertinent Trilateration: Secure Localization Of Wireless Sensor Network Using Greedy Technique, M. B. Nirmala, Mr. Nayana, A.S Manjunath Aug 2020

Impertinent Trilateration: Secure Localization Of Wireless Sensor Network Using Greedy Technique, M. B. Nirmala, Mr. Nayana, A.S Manjunath

Graduate Research in Engineering and Technology (GRET)

Wireless sensor network localization is an important area that attracts significant research interest. Current localization algorithms mainly focus to localize as many nodes as possible for a given static set of anchor nodes and distance measurement. In this paper, we discuss a new technique that aims to localize all the sensor nodes in the network using trilateration with greedy technique, and a security protocol is used for providing confidentiality and authentication between anchor nodes and sensor nodes.


Using Different Searching Schemas For Fuzzy Keyword Search Over Cloud Data, Syeda Farha Shazmeen, Rangaraju Deepika Aug 2020

Using Different Searching Schemas For Fuzzy Keyword Search Over Cloud Data, Syeda Farha Shazmeen, Rangaraju Deepika

Graduate Research in Engineering and Technology (GRET)

Cloud Computing is a construct that allows you to access applications that actually reside at a location other than our computer or other internet-connected devices, Cloud computing uses internet and central remote servers to maintain data and applications, the data is stored in off-premises and accessing this data through keyword search. So there comes the importance of encrypted cloud data search Traditional keyword search was based on plaintext keyword search, but for protecting data privacy the sensitive data should be encrypted before outsourcing. Fuzzy keyword search greatly enhances system usability by returning the matching files; Fuzzy technique uses approximate full ...


Secure Dependable Selective Storage Services And Support For Dynamic Data Operations In Cloud Computing, Vinitha S. P, Guruprasad E Aug 2020

Secure Dependable Selective Storage Services And Support For Dynamic Data Operations In Cloud Computing, Vinitha S. P, Guruprasad E

Graduate Research in Engineering and Technology (GRET)

Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard ...


A Novel Algorithm Based On Cascading Of Neural Network Models And Wavelet Transform For Image Enhancement., Shobhit Verma, Hitesh Gupta Aug 2020

A Novel Algorithm Based On Cascading Of Neural Network Models And Wavelet Transform For Image Enhancement., Shobhit Verma, Hitesh Gupta

Graduate Research in Engineering and Technology (GRET)

Image enhancement and restoration is pre-request of computer vision. The distortion and degradation of image suffered the process of pattern matching and quality of image. Wavelet is very important transform function play a role in image enhancement and image de-noising. The concept of wavelet used as soft thresholding and hard thresholding. A processing of data through wavelet is very efficient in process of neural network. In this paper we discuss the proposed algorithm for image enhancement based on self organized map network and wavelet transform. Basically self organized map network is unsupervised training mechanisms of pattern, due to this reason ...


Mobile Data Collector For Secure Time Synchronization In Clustered Wireless Sensor Network, Ramya M Dr., A.S. Poornima Aug 2020

Mobile Data Collector For Secure Time Synchronization In Clustered Wireless Sensor Network, Ramya M Dr., A.S. Poornima

Graduate Research in Engineering and Technology (GRET)

Secure time synchronization is a key requirement for many sophisticated application running on these networks. Most of the existing secure time synchronization protocols incur high communication and storage costs and are subject to a few known security attacks. In wireless sensor network (WSN), lifetime of the network is determined by the amount of energy consumption by the nodes. To improve the lifetime of the network, nodes are organized into clusters, in which the cluster head (CH) collects and aggregates the data. A special node called mobile data collector (MDC) is used to collect the data from the CH and transfer ...


Maximizing The Lifetime And Security Of Wireless Sensor Networks, Saranya. S, Gowri. V Aug 2020

Maximizing The Lifetime And Security Of Wireless Sensor Networks, Saranya. S, Gowri. V

Graduate Research in Engineering and Technology (GRET)

Recent technological advances have facilitated the widespread use of wireless sensor networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In wireless sensor networks, sensor nodes are typically power-constrained with limited lifetime, and so it’s necessary to understand however long the network sustains its networking operations. We can enhance the quality of monitoring in wireless sensor networks by increasing the WSNs lifetime. At the same time WSNs are deployed for monitoring in a range of critical domains such as military, healthcare etc. Accordingly, these WSNs are vulnerable to attacks. Now this proposed ...


An Efficient Approach Using Rule Induction And Association Rule Mining Algorithms In Data Mining, Kapil Sharma, Sheveta Vashisht Aug 2020

An Efficient Approach Using Rule Induction And Association Rule Mining Algorithms In Data Mining, Kapil Sharma, Sheveta Vashisht

Graduate Research in Engineering and Technology (GRET)

In this research work we use rule induction in data mining to obtain the accurate results with fast processing time. We using decision list induction algorithm to make order and unordered list of rules to coverage of maximum data from the data set. Using induction rule via association rule mining we can generate number of rules for training dataset to achieve accurate result with less error rate. We also use induction rule algorithms like confidence static and Shannon entropy to obtain the high rate of accurate results from the large dataset. This can also improves the traditional algorithms with good ...


An Efficient Fault Tolerant System Using Improved Clustering In Wireless Sensor Networks, Venkatesh S Aug 2020

An Efficient Fault Tolerant System Using Improved Clustering In Wireless Sensor Networks, Venkatesh S

Graduate Research in Engineering and Technology (GRET)

In Wireless Sensor Networks (WSNs), Efficient clustering is key for optimal use of available nodes. Fault tolerance to any failure on the network or node level is an essential requirement in this context. Hence, a novel approach towards clustering and multiple object tracking in WSNs is being explored. The Proposed method employs judicious mix of burdening all available nodes including GH (Group Head) to earn energy efficiency and fault tolerance. Initially, node with the maximum residual energy in a cluster becomes group head and node with the second maximum residual energy becomes altruist node, but not mandatory. Later on, selection ...


Achieving Availability And Data Integrity Proof In Hierarchical Attribute Encryption Scheme Using Hybrid Cloud, Pallavi R, R Aparna Aug 2020

Achieving Availability And Data Integrity Proof In Hierarchical Attribute Encryption Scheme Using Hybrid Cloud, Pallavi R, R Aparna

Graduate Research in Engineering and Technology (GRET)

It has been widely observed that the concept of cloud computing has become one of the major theory in the world of IT industry. Data owner decides to release their burden of storing and maintaining the data locally by storing it over the cloud. Cloud storage moves the owner’s data to large data centers which are remotely located on which data owner does not have any control. However, this unique feature of the cloud poses many new security challenges. One of the important concerns that need to be addressed is access control and integrity of outsourced data in cloud ...


Implementation Of Model Predictive Control And Auto Tuning Based Pid For Effective Temperature Control In Cstr, Chenimineni Kishore, T. Vandhana, Sheereen Hussain, S. Srinivasulu Raju Aug 2020

Implementation Of Model Predictive Control And Auto Tuning Based Pid For Effective Temperature Control In Cstr, Chenimineni Kishore, T. Vandhana, Sheereen Hussain, S. Srinivasulu Raju

Graduate Research in Engineering and Technology (GRET)

Continuous Stirrer Tank Reactor (CSTR) is an important topic in process control and offering a diverse range of researches in the area of chemical and control engineering. A simulation on mathematical model has several advantages over the experiment on a real model or system, which is used for steady state analysis and dynamic state analysis. The main objective is to control the temperature of CSTR in the presence of disturbance. Various control approaches have been applied on CSTR to control its parameters through PID control and MODEL PREDICTIVE CONTROL (MPC). Model design and simulation are done in MATLAB SIMULINK


Leaking Agent Detection And Email Filtering, Girish Shankar, Someshwar Dhayalan, Ashish Anand Aug 2020

Leaking Agent Detection And Email Filtering, Girish Shankar, Someshwar Dhayalan, Ashish Anand

Graduate Research in Engineering and Technology (GRET)

Leaking of confidential data to an unauthorized agent is a major concern for an organization. In this article we seek to detect the trusted node that leaks the confidential data to an unauthorized agent. Traditionally, leakage of data is handled by water marking technique which requires data modification. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. But one of the issues with watermarking method is data modification. To overcome the disadvantages of using watermark, data allocation strategies are used to improve the probability of identifying guilty third parties. The idea is to ...


Android Based Security And Remote Surveilance System, Senthil Kumar.M, Padmavathy. N Aug 2020

Android Based Security And Remote Surveilance System, Senthil Kumar.M, Padmavathy. N

Graduate Research in Engineering and Technology (GRET)

Mobile phones have been important Electronic devices in our life. Consequently, Home automation and security system becomes one of the prominent futures on mobile devices. In this paper, we have developed the android application that interfaces with the security system using wifi direct technology. The wifi technology is relatively new as compared to other technologies and there is huge potential of its growth and practical application. The android application loaded on mobile devices, can connect with security system and easy to use GUI. The application developed to command lock, unlock or video monitoring of the home. The security system then ...


Design And Implementation Of Machine-Controlled System For Public Bicycle-Sharing In Urban Areas, G. Suseendhar, D. Vasanthi Aug 2020

Design And Implementation Of Machine-Controlled System For Public Bicycle-Sharing In Urban Areas, G. Suseendhar, D. Vasanthi

Graduate Research in Engineering and Technology (GRET)

This paper presents a design of machine controlled intelligent system for public to share bicycles for short distance transportation in urban areas. It allows us to take bicycle from wherever we are and to park at our nearest place of destination. The design schemes used here are automated system for bicycle delivery unit (base station) and bicycle parking unit (substation) and automatic amount collection for the usage from user card (RFID tags) and central administration office (GPS) and solar powered substations (PV solar panels). Moreover, it offers auto-locking racks for bicycles, on-Board vehicle tracking, and battery with solar power management ...


Autowagon, Rohit Kesharwani, Jaspreet Kaur Khalsa Aug 2020

Autowagon, Rohit Kesharwani, Jaspreet Kaur Khalsa

Graduate Research in Engineering and Technology (GRET)

This paper deals with research and development of Vehicle Monitoring and Security System which is GPS based vehicle tracking system used for security applications. It uses two main underlying concepts. These are GPS (Global Positioning System) and GSM (Global System for Mobile Communication). The main application of this system is tracking the vehicle to which the GPS is connected, giving the information about its position whenever required and for the security of each person travelling by the vehicle. This is done with the help of the GPS satellite and the GPS module attached to the vehicle which needs to be ...


Wavelet-Based Transmission Line Fault Detection And Classification, Kulkarnisakekar Sumant Sudhir, R.P. Hasabe Aug 2020

Wavelet-Based Transmission Line Fault Detection And Classification, Kulkarnisakekar Sumant Sudhir, R.P. Hasabe

Graduate Research in Engineering and Technology (GRET)

An appropriate method of fault detection and classification of power system transmission line using discrete wavelet transform is proposed in this paper. The detection is carried out by the analysis of the detail coefficients energy of phase currents. Discrete Wavelet Transform (DWT) analysis of the transient disturbance caused as a result of occurrence faults is performed. The work represented in this paper is focused on classification of simple power system faults using the maximum detail coefficient, energy of the signal and the ratio of energy change of each type of simple simulated fault are characteristic in nature and used for ...


Automated Attendance System Using Biometrics With Embedded Webserver, Emmanuel. K, Arun. S, Rajeswari. R Aug 2020

Automated Attendance System Using Biometrics With Embedded Webserver, Emmanuel. K, Arun. S, Rajeswari. R

Graduate Research in Engineering and Technology (GRET)

In this paper, the development of an Automatic College Attendance Management System (ACAMS), a biometric based comprehensive attendance management system is proposed. Complexity in managing the students' attendance during lecture hours, computing the percentage of attendance and conveying the presence/absence of students to their Parent/Guardian have become a difficult challenge and also a time consuming task. For the stated reasons, ACAMS using fingerprint biometrics is designed with an added feature of sending SMS alerts to their Parent/Guardian, for which in this system PHP and CGI scripts and the web site using Lighthttpd server for sharing a common ...


Energy Auditing Of A House Using Matlab, P.V. Narendra Kumar, Jakka Prasad, T.N.V.L.N. Kumar Aug 2020

Energy Auditing Of A House Using Matlab, P.V. Narendra Kumar, Jakka Prasad, T.N.V.L.N. Kumar

Graduate Research in Engineering and Technology (GRET)

Energy crisis is one of the crucial problems faced by all the countries in the world due to depletion in natural resources used for energy generation and the huge investment for generating energy from alternate resources. This article shows the present situation of energy crisis in the state of Andhra Pradesh and suggested some of the major areas of energy conservation practices so that there may be a chance to see the state of Andhra Pradesh as “NO POWER CUT” state in India. A viable and immediate solution in this juncture is the energy conservation as cited by the slogan ...


Designing Of New Pattern Classifier Based On Morphological Parameter, Tripty Singh Aug 2020

Designing Of New Pattern Classifier Based On Morphological Parameter, Tripty Singh

Graduate Research in Engineering and Technology (GRET)

Face and text recognition system should be able to automatically detect a face and text in any sample video or images. This involves extraction and analysis of its features. Pattern Classifier system recognizes face and text, regardless of lighting, ageing, occlusion, expression, illumination and pose. Morphological feature based on thresholding of image and gray level components analysis are used for linear discriminant analysis. These are than tested and compared for the template of face and text recognition of facial and textual images database. Present paper discusses designing of new pattern classifier based on morphological parameter. Present research used standard face ...


Magnetic Resonance Coupling Based Wireless Power Transfer For Contactless Charging Of Electric Vehicles., Shaktiraj Kumar Chaganty, S.Siva Prasad Aug 2020

Magnetic Resonance Coupling Based Wireless Power Transfer For Contactless Charging Of Electric Vehicles., Shaktiraj Kumar Chaganty, S.Siva Prasad

Graduate Research in Engineering and Technology (GRET)

The availability of a convenient charging mechanism will help greatly in dispersal of Electric Vehicles more widely. The concept of Wireless transfer of electrical energy will make this possible. The feasibility of wireless power transfer for Electric Vehicles by electromagnetic resonance coupling is investigated in this paper. The experiment is carried out on small sized antennas that can be equipped at the bottom of a vehicle. The efficiency characteristics of power transmitted wirelessly are analyzed by varying frequency of power, gap between receiving and transmitting coils and power to be transmitted. The feasibility of wireless power transfer with large air ...


False Misbehaviour Elimination In Watchdog Monitoring System Using Change Point In A Wireless Sensor Network, A. Babu Karuppiah Aug 2020

False Misbehaviour Elimination In Watchdog Monitoring System Using Change Point In A Wireless Sensor Network, A. Babu Karuppiah

Graduate Research in Engineering and Technology (GRET)

Wireless Sensor Networks are to be widely deployed in the near future for data monitoring in commercial, industrial and military applications. Though much research has focused on making these networks feasible and useful security has received very little attention. Sensor networks are exposed to variety of attacks like eavesdropping, message tampering, selective forward, gray hole attack, and Wormhole and Sybil attacks. Watchdog is a kind of behaviour monitoring mechanism which is the base of many trust systems in Ad hoc and Wireless Sensor Network. Current watchdog mechanism only evaluates its next-hop’s behaviour and propagates the evaluation result to other ...


Web Semantics Data, M. Markandeyulu, Ch. Jayaraju Aug 2020

Web Semantics Data, M. Markandeyulu, Ch. Jayaraju

Graduate Research in Engineering and Technology (GRET)

Data Semantics is a wide area that continuously faces new challenges arising from the invention of new infor- mation formats and novel applications. An area that is partic- ularly challenging with respect to identifying, representing and using data semantics is the Web. This paper attempts to characterize the nature and challenges of Data Semantics on the Web as an interesting research area to be covered by the Journal on Data Semantics.