Mumbai, India
Mumbai, India

Time filter

Source Type

Narkhede B.E.,V.J.T.I | Choudhari C.M.,Fr.C.R.I.T | Mahajan S.K.,Technical Education
Applied Mechanics and Materials | Year: 2014

Solidification of metals continues to be a phenomenon of great interest to physicists, metallurgists, casting engineers and software developers. It is a non-linear transient phenomenon, posing a challenge in terms of modelling and analysis. This paper attempts to study heat flow within the casting, as well as from the casting to the mould, and finally obtains the temperature history of all points inside the casting. The most important instant of time is when the hottest region inside the casting is solidifying. ANSYS software has been used to obtain the last solidifying region in the casting process by performing transient thermal analysis. Location of the hot spot predicted by software simulation showed good agreement with the experimental trial. It was also observed that the simulation of casting helps in obtaining optimum design of riser. © (2014) Trans Tech Publications, Switzerland.

Deshmukh S.,GHRCEM | Bhirud S.G.,VJTI
International Conference on Emerging Trends in Engineering and Technology, ICETET | Year: 2012

Singer identification is most important application of Music information retrieval. The process starts with identifying first the audio descriptors then using these feature vectors as input to further classification using Gaussian Mixture Model or Hidden Markov Model as classifiers to identify the singer. The process becomes chaotic if all audio descriptors are used for finding the feature vector, instead if the audio descriptors are selected with respect to the application then the process becomes comparatively simple. In this paper we propose a Hybrid method of selecting correct audio descriptors for the identification of singer of North Indian Classical Music. First only strong (primary) audio descriptors are released on the system in forward pass and the classification impact is to be recorded. Then only selecting the top few audio descriptors having largest impact on the singer identification process are selected and rest are eliminated in the backward pass. Then selecting and releasing all the less significant audio descriptors from the groups that had maximum impact on singer identification process increases the success of correctly identifying the singer. The method reduces substantially the large number of audio descriptors to few, important audio descriptors. The selected audio descriptors are then fed as input to further classifiers. © 2012 IEEE.

Nalavade K.C.,VJTI | Meshram B.B.,VJTI
ICWET 2010 - International Conference and Workshop on Emerging Trends in Technology 2010, Conference Proceedings | Year: 2010

Host based and network based intrusion prevention systems are available in the market. Host based Intrusion Prevention Systems are designed to protect information systems from unauthorized access, damage or disruption. We combined these features with the network based intrusion systems which counteract the rapidly evolving threats presented by the latest generation of worms, software and network exploits. The raising number of alarms can be reduced by applying data mining algorithms to the network traffic. Our proposed model combines the knowledge discovery and the intrusion detection so that best action can be taken against the attack. Also this knowledge will be helpful to make the systems efficient and secure. The model is useful against denial of services floods, brute force attacks, vulnerability detection, protocols anomaly detection and prevention against unknown exploits. Thus we propose the prevention technology for the security of networks and host users using data mining algorithms. The sequence pattern, classification and association rule mining algorithms are used for taking the various decisions about security. Copyright 2010 ACM.

Waghmare S.A.,VJTI | Gulhane N.P.,VJTI
Solar Energy | Year: 2016

Ray tracing for solar collectors shows the behavior of light rays which falls on collector surface and reflected to the receiver. Accordingly the solar collectors are designed or modified to enhance thermal performance. Compound parabolic collectors (CPC) are capable of collecting and reflecting a large amount of solar radiation towards the receiver with less tracking effort. With the help of ray tracing technique its performance can be increased by minimizing the optical losses. In this paper, the limiting diameter (LD) of the tubular receiver at the focus of CPC is determined by the geometrical method of ray tracing. The CPC is designed and ray tracing analyses were performed without receiver to differentiate the region of maximum collection and no collection of reflected rays. The region where not a single reflected ray enters from a CPC half follows an elliptical shape which is tangent internally to the LD of the receiver at the focus and its geometrical relation with the acceptance angle is presented. The geometrical relationship between LD and maximum diameter is also determined. The receiver height is obtained on the basis of receiver surface covered and collector surface utilized. © 2016 Elsevier Ltd

Sheth J.R.,VJTI
2014 International Conference on Control, Instrumentation, Communication and Computational Technologies, ICCICCT 2014 | Year: 2014

Steganography is the art of hiding data in a particular form of media and making it accessible for the recipient. This process of encrypting data can be embedded in media like image and audio. This paper represents a snake and ladder based algorithm for encrypting a streamline of bits in a greyscale image. © 2014 IEEE.

Karande A.M.,V.J.T.I. | Chunekar V.N.,V.J.T.I. | Meshram B.B.,V.J.T.I.
Communications in Computer and Information Science | Year: 2011

Service Oriented Architecture is used to achieve loose coupling among diverse interacting software applications. SOA is used for reduction in development time and cost. Web services standards used for SOA are distributed software components that provide information to applications rather than to humans, through an application-oriented interface. SOA with web services standards provide greater interoperability. It also provides protection from lock-in to proprietary vendor software. Using XML based orchestration business process execution language (BPEL) enables task sharing across multiple enterprises using a combination of Web services. Web services combine the advantages of the component-oriented methods and web techniques. Maintaining Web service quality requires more effort to manage overall Web service framework than each of Web service. Web Services Manager is a security administrator's environment designed to secure access to Web services and monitor activities performed on protected Web services. Web services provide platform independence for the service oriented communication. This way data integration can be done providing the service as a request and service as provider. © 2011 Springer-Verlag Berlin Heidelberg.

Rai N.,VJTI | Daruwala R.D.,VJTI
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

The most fundamental issue in any wireless sensor network (WSN) design and/or analysis is the node deployment strategy and the number of nodes to be deployed. In this regard, a critical quality of service (QoS) parameter is network coverage which defines how well an area of interest is being monitored by a deployed network. The percentage coverage achieved for a given number of nodes in a predetermined network area can be computed using various sensing models. However, a more practical computation must determine the optimum density of nodes to be deployed such that it satisfies the specific spatial and temporal sampling of the network area within a given economical budget. In this paper, investigation is carried out to estimate the optimum density of nodes to be randomly deployed in a given network area of any size in order to attain the desired network coverage using deterministic and probabilistic sensing models. Parametric analysis is carried out to study the effects of sensing device characteristics and environmental parameters on the optimum density of nodes. The results obtained are used to empirically derive a formula based on regression analysis using least square polynomial curve fitting technique. The formula includes the parameters that affect the optimum number of nodes and thus can be used to estimate the number of nodes to be randomly deployed in order to attain desired percentage coverage in a WSN system. To the best of our knowledge, ours is the first work that revisits the theoretical foundation of network coverage to result into a mathematical formulation that can be readily and accurately used to design any practical WSN system. © 2016 IEEE.

Jadhav S.,VJTI | Daruwala R.,VJTI
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

Modeling Statistically Dependent observations in a Wireless Sensor Network (WSN) environment is considered by Copula approach. Copulas model dependence of several random variables. Multivariate distribution function with arbitrary marginal distributions can be constructed using copulas. This paper extends the copula approach for three sensor design with reference to 3-D model. Also mathematical model is developed for evaluating their joint distribution functions with copulas. © 2016 IEEE.

Sabnis S.K.,Rajiv Gandhi Institute of Technology | Awale R.N.,VJTI
Procedia Computer Science | Year: 2016

Steganalysis of high capacity Wavelet based fusion image steganography with encryption, using Image quality metrics (as a set of features) is proposed. As the first order image statistics using the proposed algorithm are inherently preserved, which is desirable feature of the scheme, improving the security of algorithm against the targeted attacks.In addition comparing the present steganography scheme with two different encryption techniques, on the undetectibility ground, the generalized objective metric like SVD is used as a steganalysis tool. DFrFT encryption is found statistically and visually undetectable achieving the desired robustness though PSNR values are better in DNA encryption. © 2016 The Authors.

Rai N.,VJTI | Daruwala R.D.,VJTI
2016 International Conference on Computational Techniques in Information and Communication Technologies, ICCTICT 2016 - Proceedings | Year: 2016

One of the critical quality of service (QoS) parameter that needs consideration in any wireless sensor network (WSN) design is network area coverage which signifies the efficiency with which the network area can be covered by the deployed network. Node sensing models are used to predict the coverage fraction percentage for a given number of sensor nodes in a predetermined network area. Alternatively, a more practical approach is to compute the optimum density of sensor nodes to be deployed such that they can satisfy temporal and spatial requirement within a given economical constraint. In this paper, these node sensing models are revisited to investigate the optimum density of randomly deployed sensor nodes required to attain the desired network area coverage. This investigation can be used to estimate the number of sensor nodes to be deployed in a network area of any given size. The effect of the sensing device characteristics and environmental parameters on the density of sensor nodes is also analyzed to emphasize the fact that these parameters need due consideration in a realistic scenario. This comparative study based on node sensing models can be taken up as a starting point to design and evaluate an effective WSN so as to match the proposed model to a real world scenario. © 2016 IEEE.

Loading VJTI collaborators
Loading VJTI collaborators