Undergraduate Academic Research Journal
Latest Publications


TOTAL DOCUMENTS

27
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By Institute For Project Management Pvt. Ltd

2278-1129

Author(s):  
K. Rajeswari ◽  
E. Jeevitha ◽  
R. Stephy Graph ◽  
M. Suresh Kumar

A Web service is a software system designed to support interoperable machine-to-machine interaction over a network. Web services provide a standard means of interoperating between different software applications, running on a variety of platforms and/or frameworks [1]. One of the main advantages of the usage of web services is its ability to integrate with the other services through web service composition and realize the required functionality. This paper presents a new paradigm of dynamic web services composition using network analysis paired with backtracking in the perspective of tour planner where booking for flight, car, hotel room, scenic spots, etc are to be done. An algorithm called “Zeittafel” for the selection and scheduling of services that are to be composed is also presented.


Author(s):  
S. H. Sawant ◽  
Mrunalinee V. Belwalkar ◽  
Manorama A. Kamble ◽  
Pushpa B. Khot ◽  
Dipali D. Patil

A front suspension of Hyundai Elantra 1992 model is assigned as quarter car model and is considered for the performance study. Modeling the dynamic performance of an automobile car system represents a complex task and forms an important step in its design procedure. In this paper the stationary response of quarter car vehicle model moving with a constant velocity over a rough road is considered for the performance study. For this a simplified model and experimental set up is developed. The deterministic impulses due to road profile are given by an eccentric cam which gives input motion to front suspension acting as a follower of the cam. The displacements obtained by FFT analyzer at upper mount of shock absorber were compared with the analytical and MATLAB results.


Author(s):  
Nitish Sharma ◽  
Swapnil Naik ◽  
Rasika Kulkarni ◽  
Tanvi Gokhale

With all the latest technologies and techniques being implemented, Cell phones are no more used for just calling or messaging. They are at a stage where they can be used for doing almost anything and everything. The leading cell phones in today’s tech-race are the Android phones and the iPhones of Apple. These two are leading the market when it comes to phones with latest and leading technology. iPhone applications are developed in Objective C language while Android applications are developed in Java. Due to the current restrictions and differences between iPhone and Android platforms, applications that need to be deployed on both the platforms need to be developed twice. This involves double effort and time. Hence, there is a rise in demand, for Java to Objective C translator. This translator will allow an application to be developed only once but deploying it on both the platforms, i.e. iPhone and Android. Whenever any new application is to be developed, its application code along with the translation details are sent to the translator. If the application to be developed is for an iPhone, then the translator will refer to the Objective C library and generate a respective Objective C code for that application. If it is to be developed for an Android phone, then the translator will refer to the java library and generate java code for that same application. The generated code will then be sent to be implemented on the required platform. This would help in reducing the development time and energy. Languages that will be used to implement this technique are Java, for the translator and Android, and Objective C for the iPhone.


Author(s):  
Sunil Jauhar ◽  
Piyush Tillasi ◽  
Rachana Choudhary

This paper describes the fusion of Lean and Six Sigma is required to achieve the fastest rate of improvement in quality, cost, delivery and process speed. By combining Lean and Six Sigma it is possible to achieve highly effective improvements in a company’s operations. Six Sigma doesn’t focus on speed. And, Lean cannot bring a process under statistical control. Lean Six Sigma efforts tend to be aligned by organizational functions rather than supply chains. This can result in departmental improvements, but fall short in achieving end to end supply chain improvements. Supply chain management (SCM) is a major issue in many industries as organizations begin to appreciate the criticality of creating an integrated relationship with their suppliers and customers, as well as all other stakeholders. It is concerned with smoothness, economically driven operations and maximizing value for the end customer through quality delivery. Hence, research is undertaken to integrate lean Six Sigma and SCM that will focus on how their integration drives rapid focused product and process improvements which result in controlled, sustainable, and validated improvements to the bottom line.


Author(s):  
Milind Thomas ◽  
Vikas Chelani ◽  
Rahul Ramesh ◽  
Sanjay Sukumar ◽  
Saurav Singh

The design of a miniaturized proximity-coupled microstrip antenna (PCMA) is presented here. The antenna has very small size, wide bandwidth and moderate gain and may be used as small, compact antenna for 5GHz band wireless local area network(WLAN). Simulated results using IE3D software are verified by measurement.


Author(s):  
Vishal Gautam ◽  
Tarun Varma

- Inthis paper,we propose an improved median filtering algorithm. Here, we introduced salt and pepper noise for the image corruption and reconstruct original image using different filters i.e. mean, median and improved median filter. The performance of improved median filter is good at lower noise density levels.The mean filter suppresses little noise and gets the worst results.The experimental resultsshow that our improved median filter is better than previousmedian filterfor lower noise density (upto 60%). It removes most of the noises effectively while preserving image details very well.


Author(s):  
Abhishek Singh Chauhan ◽  
Mohnish Kumar

Wireless technology is one of the main areas of research in the world of communication systems today and a study of communication systems is incomplete without an understanding of the operation and fabrication of antennas. The main aim of this paper explain basic introduction of antenna and brief explanation of YAGI-UDA antenna .YAGI-UDA antenna mostly use in communication field today in mostly communication system use YAGI –UDA antenna.


Author(s):  
Nagaraj N. Bhat ◽  
Tarun Vashisth

One of the major problems in robotics is to recognize the robots position with respect to a given environment. More recently researchers have begun to exploit the structural properties of robotic domains that have led to great success. A general solution for such problem is the implementation of particle filters. The particle filter is more efficient than any other tracking algorithm because this mechanism follows Bayesian estimation rule of conditional probability propagation. In this paper we would like to present an approach to improvise the particle filter algorithm using SIFT pattern recognition technique and image database processing to obtain unimodal uncertainty for effective position tracking.


Author(s):  
Kumar Ayush ◽  
Navin Kumar Agarwal

The paper gives a mathematical model to efficiently implement social constraints in mobile robots and accordingly control its' tracking. A generalized constraint set including minimizing distance, obstacle avoidance, social avoidance, personal space and their applications such as real time planning, person detection and tracking are demonstrated hereby. Social conventions are implemented using weighted constraint method resulting in human-like behavior. Related simulation-based experiments, performed for verification of the conclusions drawn, are suitably described.


Author(s):  
S. Belose ◽  
M. Malekar ◽  
S. Dhamal ◽  
G. Dharmawat ◽  
N.J. Kulkarni

In the real world, it is difficult to transmit data from one place to another with security. To ensure secured data transmission, universal technique called cryptography is used, which provides confidentiality of the transmitted data. In this paper Encryption and decryption process uses Armstrong number which is referred as a secret key. To make the Authentication between two intended users along with the security, server is used. With the help of server, both sender and receiver will get validated. Then actual data could be transmitted by any of the means.


Sign in / Sign up

Export Citation Format

Share Document