Characterization of Hydraulic Fluids and Development of Heat Transfer Correlation in Helical Coil using New Dimensionless Number M
Research Paper | Journal Paper
Vol.05 , Issue.01 , pp.1-3, Jun-2017
Abstract
The heat transfer rate in helical coils is higher than in straight tube due to secondary motion developed. The characterization of fluid flow in helical coil is very difficult due to complex flow pattern. In this experimental work, an innovative approach for the characterization of fluid flow and development of heat transfer correlations in helical coil for Newtonian fluids using new dimensionless Number M is presented. Experiments were conducted under isothermal and non-isothermal conditions for the development of innovative heat transfer correlations. Three helical coils of different coil curvature ratios are used in this work. The innovative correlations were validated using work of earlier investigators and are found to be satisfactory.
Key-Words / Index Term
Hydraulic Fluids, Heat Transfer Correlation
References
[1]. H. Ito, “Friction factors for turbulent flow in curved pipes” Journal of basic engineering transactions of the ASME 18 123-134, 1959.
[2]. P.S. Srinivasan, S.S. Nandapurkar and F.A. Holland, “Friction factor for coils” Transactions of the institution of chemical engineer 48, T156-T161, 1970.
[3]. A. Cioncolini and L. Santini, “An experimental investigation regarding the laminar to turbulent flow in helically coiled pipes” Exp Therm fluid Sci 30, pp 367-380, 2006.
[4]. H. Ito, “Flow in curved pipes” JSME Int. Journal 30, pp 543-552, 1987.
[5]. E.F. Schmidt, Warmeubergang and Druckverlust in Rohrschbugen, Chemical engineering technology 13, pp 781-789, 1967.
[6]. Mujawar, B.A. and Rao, M. R., “Flow of Non-Newtonian fluids through helical coils” Ind. Eng. Chem. Process Des. Dev., vol. 17, pp 22-27, 1978.
[7]. S. S. Pawar and Vivek K. Sunnapwar, "Experimental studies on heat transfer to Newtonian and non-Newtonian fluids in helical coils with laminar and turbulent flow". Experimental Thermal and Fluid Science, 44 pp 792-804, 2013.
[8]. Jayakumar, J.S., Mahajani, S.M., Mandala, J.C., Vijayan, P.K. and Bhoi, R., “Experimental and CFD estimation of heat transfer in helically coiled heat exchangers. Chemical Engg. Research Design, 86 (3), pp 221-232, 2008.
[9]. Xin, R.C. and Ebadian, M. A., “The Effects of Prandtl numbers on local and average convective heat transfer characteristics in helical pipes”, Journal of Heat Transfer, 119, pp 467-474, 1997.
Citation
SS. Pawar, Sachin K. Kamble, "Characterization of Hydraulic Fluids and Development of Heat Transfer Correlation in Helical Coil using New Dimensionless Number M", International Journal of Computer Sciences and Engineering, Vol.05, Issue.01, pp.1-3, 2017.
Image Steganography-Hiding Data within Image
Research Paper | Journal Paper
Vol.05 , Issue.01 , pp.4-12, Jun-2017
Abstract
Security of the data is of foremost important in today’s world. Security has become a main important field in information and communication technology. For highly secure, hidden communication and sharing of information steganography is used. Steganography is a method of hiding the existence of communication, by hiding information data in other carriers. Different carrier mediums can be used for this, but digital images are the most famous because of their frequent use on the internet. There are several techniques of steganography, among them some are too complicated than others. Every technique have their strong and weak parameters. LSB, DES and AES algorithm is been used in this project. LSB technique is simple, high payload, low complexity and easy to detect. AES and DES are the complex technique but provide high security. The execution time of LSB is more, DES moderate and AES takes less time. Using these three methods we are going to design our project. This will enhance the security of the data which is being transferred.
Key-Words / Index Term
Steganography, stego-key, AES, DES, LSB
References
[1] X. Zhou, W. Gong, W. Fu, L. Jing “An Improved Method for LSB based colour Image Steganography Combined with Cryptography”, Jin. Information Engineering School, Communication University of China,CUC. 15TH International confrence on Computer and Information Science(ICIS), 2016
[2] L. Randa and P. Saxena, “Security Improvisation in Image Steganography using DES”, International Journal of Advanced Research in Computer Engineering and Technology (IJARCET). Volume 3 Issue 7, July 2014.
[3] S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 663-666.
[4] D. Selent, “Advanced Encryption Standard”, Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
[5] B. Li, J. He, J. Huang, Y.Qi. Shi. “A survey on Image steganography and steganalysis”, Volume 2, Number 2, April 2011.
[6] S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric AES algorithm," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, 2016, pp. 1-5.
doi: 10.1109/CDAN.2016.7570921
[7] S. Nimje, A. Belkhede, G. Chaudhari, A. Pawar, K. Kharbikar, "Hiding Existence of Communication Using Image Steganography", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.163-166, 2014.
[8] C.R. Gaidhani, V.M. Deshpande, V.N. Bora, "Image Steganography for Message Hiding Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.67-70, 2014.
[9] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[10] S. Singh and V.K. Attri, “Dual Layer Security of data using LSB Image Steganography Method and AES Encryption ”, ISSN: 2231-2307, Volume-2, Issue-3, July 2015.
[11] V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013.
[12] Rajesh Shah and Yashwant Singh Chouhan, "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.1, pp.22-28, 2014.
Citation
Esha Deshmukh, Juily Dangle, Sagar Ghadi, Shailesh Kewat and Kalpana Shewale, "Image Steganography-Hiding Data within Image", International Journal of Computer Sciences and Engineering, Vol.05, Issue.01, pp.4-12, 2017.
IoT Based Waste Management System for Smart Cities
Review Paper | Journal Paper
Vol.05 , Issue.01 , pp.13-15, Jun-2017
Abstract
In present day scenario, many times we see that the garbage bins placed at various public places in cities are over flowing due to increase in the waste every day. It creates unhygienic condition for the people and creates bad odour around the surroundings thus leads in spreading some deadly diseases and human illness. To avoid such situation, we are planning to design “IoT based Waste Management System for Smart Cities”. In this proposed system, there will be multiple garbage bins located throughout the city or campus, these garbage bins will be equipped with low cost embedded device which will helps in tracking the level of garbage in particular bin along with location tracking module to get real time location of bin. All the real time information including garbage level as well as location of that bin will be send frequently to concern authority and garbage collector truck driver as well. The truck driver will have android application which will show real time information about all bins to driver that which bin is how much full and which location in graphical form. So he can go directly to place where actually need to empty the garbage bin to achieve Resource optimization, cost reduction, time management and active participation of truck driver.
Key-Words / Index Term
IOT, Smart Cities, IoT-GSI, RFID
References
[1]. Pranay Kujur and Kiran Gautam, “Smart Interaction of Object on Internet of Things”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.2, pp.15-19, 2015.
[2]. RVD Meulen, “Gartner Says 6.4 Billion Connected Things”, Will Be in Use in (2016).
[3]. Kerav Shah, Gourav Inani, Darshan Rupareliya, Rupesh Bagwe and Bharathi H N, “RFID Based Toll Automation System”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.51-54, 2016
[4]. N Mangesh, K Swapnil, P Avinash, G Avinash, “IoT based waste Management for smart City”, International Journal of Advance Research, Ideas and Innovations in Technology, Vol.3, Issue.2, pp.247-250, 2017.
[5]. Shrungashri Chaudhary and Mudit Kapoor , “Design and Implementation of Reservation Of Parking Spaces Using RFID and GSM Technology”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.188-191, 2015.
[6]. Kadali Sridhar, K. Naga Divya and D. Sree Lakshmi, “A Fingerprint and RFID Tag Based Authentication System for Driving”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.71-76, 2015.
[7]. S. Jayasri, D.Karthika, “Microcontroller Based Traffic and Road Condition Monitoring Alert System Using Internet of Things”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.272-279, 2016.
Citation
A. Patil, S. Prajapati, R. Salunke, SS. Chaudhari, "IoT Based Waste Management System for Smart Cities", International Journal of Computer Sciences and Engineering, Vol.05, Issue.01, pp.13-15, 2017.
Opportunities and Challenges of Reverse Mortgage Scheme in Indian Scenario
Research Paper | Journal Paper
Vol.05 , Issue.01 , pp.16-21, Jun-2017
Abstract
Major part of a person’s lifetime savings is used to buy or build a house; hence, people are emotionally attached with their property. Senior Citizens are a growing section of the society and dependency in old age is increasing. They need a retirement plan/regular case flow stream for supplementing pension/other income and addressing their financial needs. Reverse mortgage is a welcome instrument that helps them convert some or all of their rising but locked home equity into a cash stream that can comfortably sustain them in their old age. In many developed country reverse mortgage loan scheme is very famous. Despite having many advantages and global acceptability, reverse mortgage has not managed to captivate the Indian market because of multiple reasons. It is expected that this scheme will grow after few years in India. Age group of more than 40 years is interested in this scheme as they believe that this scheme will be helpful in their old age. This paper studies opportunities and challenges faced by mortgage industry in lieu of reverse mortgage scheme in India.
Key-Words / Index Term
Reverse mortgage, Retirement plans, Home loan
References
[1]. Bardwell, S.H.”Regulatory and Economic Factors Determining the Sub-Prime Mortgage Outcome”, International Journal of Economic Research, vol. 10, no. 1,pp. 7-18, January-June 2013.
[2]. Brar, J. K. “Reverse Mortgage: It’s Potentials in Indian Market”, Pranjana, vol. 14, no. 1, pp. 52-66, January-June 2011.
[3]. Committee on the Global Financial System, 2006: Housing Finance in the Global Financial Market, Report by CGFS Working Group on Housing Finance.
[4]. Credit Suisse Securities Research & Analytics ‘India Mortgage Sector’ 2013.
[5]. Gaur, A. “Customer Satisfaction Regarding Home Loans– A Comparative Study of ICICI Bank and SBI Bank”, International Journal of Information Technology and Knowledge Management, vol. 2, no. 2, pp. 379-381, July-December2009.
[6]. Gupta, N. and Maleri, A. “Challenges & Opportunities for Mortgage Industry in India – A Study of ICICI Bank Ltd.”, GianJyoti E-Journal, vol. 1, no. 3, pp. 70-79, April – June 2012.
[7]. Khan, H. R. “Enabling Affordable Housing for All – Issues & Challenges”, International Conference on Growth with Stability in Affordable Housing Markets, pp. 1-14, April 2012.
[8]. Johnson, David W. and Simkins, Zamira S. “Retirement Trends, CurrentMonetary Policy, and theReverse Mortgage Market”, Journal of Financial Planning, pp.52-59, March 2014.
[9]. Khan, H. R. “Banks in India: Challenges & Opportunities”, BFSI Conference, Mumbai, , pp. 1-14, June 2014.
[10]. Mukherji, S. “Affordable housing: In conversation with Ramesh Ramanathan, Chairman, Janalakshmi Social Services and Janaadhar”, IIMB Management Review, vol. 26, pp. 183-192,2014.
[11]. National Urban Housing and Habitat Policy, Government of India Ministry of Housing & Urban Poverty Alleviation New Delhi,2007.
[12]. Performance Review of Housing Finance Companies and Industry Outlook ‘Indian Mortgage Finance Market’2011-12.
[13]. Rajagopalan, R ‘Reverse Mortgage Products for the Indian Market: An Exploration of Issues’, Bimaquest, vol. 6, no. 1, pp. 7-42, January 2006.
[14]. Rajashekhar, D., Saravanan, S. ”Housing Finance: Problems and Prospects”, Southern Economist, vol. 47, no. 9 (1), pp. 15-18 , September 2008.
[15]. Rao, S.T. “A Study on Comprehensive Problems of HDFC & SBI Home Loan Takers in Andhra Pradesh State”, Innovative Journal of Business and Management, vol. 2, no. 5, pp. 123 - 127, September – October 2013.
[16]. Salter J. R. “The Home Equity Conversion Mortgage: An Overdue Introduction”, Journal of Financial Service Professionals, vol. 68, no. 2, pp. 15-18, March 2014.
[17]. Thingalaya, N. K., Moodithaya, M. S., Shetty, N. S. “Housing Finance: A Study of Experiences of Commercial Banks”, Indian Institute of Banking and Finance, Mumbai, pp. 265- 341, 2009.
[18]. Zujo, V., Car-Pusic, D., Zileska-Pancovska, V. “Cost and Experience Based Real Estate Estimation Model”, Procedia - Social and Behavioral Sciences, vol. 119, pp. 672 – 681, 2014.
[19]. www.google.com
[20]. www.nhb.org.in
[21]. www.cibil.com
[22]. http://rustybee.com/insights-into-the-retail-lending-policies-of-the-indian-mortgage- industry/
[23]. http://rustybee.com/insights-into-the-retail-lending-policies-of-the-indian-mortgage-industry/
[24]. http://www.ukessays.com/dissertation/literature-review/literature-review-on-american-mortgage-history.php
[25]. http://www.huffingtonpost.com/jack-m-guttentag/insanity-in-todays-mortga_b_3429147.html?ir=India
[26]. http://profit.ndtv.com/news/your-money/article-how-senior-citizens-can-benefit-from-reverse-mortgage-373027
[27]. http://www.indexmundi.com/india/age_structure.html October 8, 2016
Citation
Amee Nagar, N. Mahesh, "Opportunities and Challenges of Reverse Mortgage Scheme in Indian Scenario", International Journal of Computer Sciences and Engineering, Vol.05, Issue.01, pp.16-21, 2017.
AES Based Digital Data Security System
Research Paper | Journal Paper
Vol.05 , Issue.01 , pp.22-26, Jun-2017
Abstract
Financial records, health records, government documents, business documents and quality control information often start out in paper form. While this paper-based records and documents are gradually digitized, security concerns about how such electronic data is stored and transmitted have increased. The prevention of unauthorized modification and loss of records is highly important in the all this sectors. It is hard to keep track of who has used or copied which paper documents. Paper documents are often maintained with very low security control. Therefore, a secured system is not only required but also important. This paper presents system for the management of paper document securely in the digital form. Document digitization refers to the process of capturing the image of a paper document and turning it into digital form. A document scanner is usually used for capturing the document image. While saving the digitized document it is encrypted first and then saved or direct transmitted as per the need. In this paper, we use the AES encryption algorithm to secure data.
Key-Words / Index Term
AES, Encryption, Decryption
References
[1] S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric AES algorithm," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, 2016, pp. 1-5.
[2] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[3] Surbhi Sharma, "Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme", International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.111-115, 2016.
[4] P. Thakkar, H.K. Mishra, Z. Shaikh, D. Sharma, "Image Encryption and Decryption System Using AES for Secure Transmission", International Journal of Computer Sciences and Engineering, Vol.5, Issue.5, pp.109-114, 2017.
[5] Sachin sharma and Jeevan Singh Bisht, "Performance Analysis of Data Encryption Algorithms", International Journal of Scientific Research in Network Security and Communication, Vol.3, Issue.1, pp.1-5, 2015.
[6] William Stallings, “Advance Encryption Standard,” in Cryptography and Network Security, 4th Ed., India: PEARSON, pp. 134–165.
[7] Behrous Forouzen, “Cryptography and Network Security”, Tata Mc Graw –Hill Education 2011
Citation
R. Jadhav, S. S. Redake, P. R. Patil3, S. V. Patil, K. R. Jain, "AES Based Digital Data Security System", International Journal of Computer Sciences and Engineering, Vol.05, Issue.01, pp.22-26, 2017.
Design and Implementation of Solar Tracking
Research Paper | Journal Paper
Vol.05 , Issue.01 , pp.27-30, Jun-2017
Abstract
Energy crisis is the most important issue in today’s world. Conventional energy resources are not only limited but also cause environmental pollution. Renewable energy resources are getting priorities in the whole world to lessen the dependency on conventional resources. Solar energy is rapidly gaining the focus as an important means of expanding renewable energy uses. Solar cells those convert sun’s energy into electrical energy are costly and inefficient. Different mechanisms are applied to increase the efficiency of the solar cell to reduce the cost. Solar tracking system is the most appropriate technology to enhance the efficiency of the solar cells by tracking the sun. A microcontroller based design methodology of an automatic solar tracker is presented in this paper. Light dependent resistors are used as the sensors of the solar tracker. A small prototype of solar tracking system is also constructed to implement the design methodology presented here.
Key-Words / Index Term
Solar Energy, Solar Tracking, H-Bridge, Solar Power System
References
[1]. Krishna N. Das (January 2, 2015). "India`s Modi raises solar investment target to $100 bln by 2022". Reuters. Retrieved 2015-01-02
[2]. A. Kassem, M. Hamad,”A Microcontroller-Based Multi-Function Solar Tracking System”, IEEE 2011.
[3]. Deepthi.S, Ponni.A, Ranjitha.R, R Dhanabal, “Comparison of Efficiencies of Single-Axis Tracking System and Dual-Axis Tracking System with Fixed Mount”, International Journal of Engineering Science and Innovative Technology (IJESIT), Volume 2, Issue 2, March 2013.
[4]. Diffenderfes, Robert (2005). Electronic Devices: System and Applications. New Delhi: Delimar. p. 480. ISBN 978-1401835149.
[5]. "Arduino - Introduction". arduino.cc.
Citation
A.S. Sawant, P.M. Tambavekar, P.D. Kokate, S.S. Vichare, J. Satheesh, "Design and Implementation of Solar Tracking", International Journal of Computer Sciences and Engineering, Vol.05, Issue.01, pp.27-30, 2017.
An Efficient Multistage Authentication System
Research Paper | Journal Paper
Vol.05 , Issue.01 , pp.31-34, Jun-2017
Abstract
This paper proposes a multilayer security system, which can be used at domestic, organization and industrial level as a strict safety and regulatory measure to prevent thefts and unauthorized access. Here, we incorporate the three best measures into one multilayer security which is a sequence of RFID, Biometric and Password module system. These modules are controlled through Arduino (UNO r3) microcontroller based board. If the RFID tag content, password and fingerprint image confirmation are matched, then only the user will be allowed to access to the organization. We propose a more efficient and reliable system that can provide multilevel security which would be difficult to breach and a system that would digitize that particular organization.
Key-Words / Index Term
RFID, Arduino UNOr3 Microcontroller, Fingerprint sensor
References
[1]. Prerna Medhi, A Paper On An Efficient Multistage Security System For User Authentication, Proceedings of 29th IRF International Conference, Pune, India, ISBN: 978-93-85465-41-3, 21st June 2015.
[2]. B. Bhanu Teja (Assistant Professor), A. Balakrishna ( M.Tech, Embedded Systems), A Paper On RFID And Fingerprint Recognition Based Electronic Voting System For Real Time Application, 2014 IJEDR | Volume 2, Issue 4 | ISSN: 2321-9939
[3]. Shrungashri Chaudhary and Mudit Kapoor , "Design and Implementation of Reservation Of Parking Spaces Using RFID and GSM Technology", International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.188-191, 2015.
[4]. Raghu Ram.Gangi, Subhramanya Sarma.Gollapudi, A Paper On Locker Opening And Closing System Using Rfid, Fingerprint, Password And Gsm, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 2, ISSN 2278-6856, March – April 2013
[5]. Kadali Sridhar, K. Naga Divya and D. Sree Lakshmi, "A Fingerprint and RFID Tag Based Authentication System for Driving", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.71-76, 2015.
[6]. G.V. Ambadkar, R.Karwankar, A Paper On Radio Frequency Identification And Fingerprint Based Student Attendance System, International Journal Of Industrial Electronics And Electrical Engineering, Issn: 2347-6982 Volume-3, April 2015.
Citation
K.V. Mishra, P.J. Sanas, N. A. Sapkal, A.P. Pansare, A. D. Deogire, "An Efficient Multistage Authentication System", International Journal of Computer Sciences and Engineering, Vol.05, Issue.01, pp.31-34, 2017.