Manuscripts

Recent Papers

Research Paper

CFD analysis of heat transfer enhancement in double pipe heat exchanger using single and double triangular tape as inserts

The need to increase the thermal performance of heat transfer equipment (for instance, heat exchangers), thereby effecting energy, material, and cost savings, as well as a consequential mitigation of environmental degradation, has led to the development and use of many heat transfer enhancement techniques. These methods are referred to as augmentation or intensification techniques. This project deals with the analysis of heat transfer augmentation for fluid flowing through pipes using CFD. Using CFD codes for modeling the heat and fluid flow is an efficient tool for predicting equipment performance. CFD offers a convenient means to study the detailed flows and heat exchange processes, which take place inside the tube. Friction factor and Nusselt number for water flowing through the specified pipe were obtained first for the smooth pipe and then for the pipe with a single/double triangular tape insert in the Reynolds number range and Prandtl number. Calculated values (obtained from empirical equations available in literature) were compared with CFD values. Comparisons were also made between the smooth tube results and the single/double triangular tape results to establish the heat transfer augmentation due to the use of the insert. Simulations were carried out using commercial CFD software ANSYS.

Published by: Timesh Sanjiv Patil, Sanket Sunil Mane, Sagar Ramesh Ramne, Karan Ganesh Kadam

Author: Timesh Sanjiv Patil

Paper ID: V5I2-1857

Paper Status: published

Published: April 13, 2019

Full Details
Research Paper

Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks

Internet of Things (IoT) devices is rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides, analyze and characterize intruders and attacks facing IoT devices and services.

Published by: M. Hemanth Kumar, Dr. A. Swarupa Rani

Author: M. Hemanth Kumar

Paper ID: V5I2-1835

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

Eye ball movement controlled mouse and keyboard using camera

Some are not ready to work with PCs in light of a sickness. Eye controls of extraordinary use to the eventual fate of characteristic contribution as well as more essentially the impeded and debilitated. Besides executing a controlling framework in it empowers them to work PC without the assistance of someone else. It is increasingly useful to the crippled. Those have to work PCs without hand this one is most valuable those can work cursor by the development of the eye. In this paper, the camera is catching the picture of eye development. First, distinguish student focus position of the eye. At that point, the distinctive minor departure from understudy position gets diverse development of cursor. The Implementation process for Pupil location utilizing Raspberry Pi and on the terminal of the Raspbian picture introduced on a raspberry pi. The eye tracker depends on pictures recorded by a transformed webcam to gain eye developments.

Published by: Vidhat Ganga, Saaima T., Sweta Kumari, Monika Jain, Rohan Madan, R. Veera Amudhan

Author: Vidhat Ganga

Paper ID: V5I2-1808

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

Moringa oleifera as a natural coagulant

The powder obtained from the seeds of the M.olifera shown to be an effective primary coagulant for water treatment. In this paper, preliminary investigations M.olifera seed suspension for the softening of hard water is furnished. To analyze the influence of Moringaoleifera seeds in coagulant activity when used for natural raw water treatment. Water samples were collected from pond, tap, and the lake of Kammanahalli, HennurBande and Bagalur rural areas of Bangalore and are labeled as sample 1, sample 2 and sample 3 respectively. In each of the water sample, 25mg of dried M.olifera seed extract was added and allowed to settle for 1 hour 15 minutes. The parameters such as color, turbidity, odor and pH were analyzed before and after the inoculation of M.olifera seeds of all the three water samples. The water was analyzed for the parameters such as color, odor, turbidity, and pH. When the seeds are dried, crushed and added to water, the powder acts as a coagulant. Removal of efficiency was found to increase with increasing dosage of M.oleifera. The higher dosage was required to achieve equivalent residual hardness. Based on the results it is ascertained that seeds stored in dry containers at room temperature can be used as a coagulant for few years. Creation of awareness amongst the rural farmers on the usefulness of the M.olifera enables its cultivation which will have overall economic benefits to the entire country.

Published by: Dr. Vanitha G. Ramesh, Ashrith Kumar

Author: Dr. Vanitha G. Ramesh

Paper ID: V5I2-1830

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

Detection of spoofing attacks in network over IP calling

Detection of call is one of the key process this generation for customers to look over and find the details and information of the caller. It is easy to identify a caller by the method of caller detection. But the calls that come from an IP based computer system through a scheme of VoIP it is difficult to find or detect a call where mostly attackers use this kind of technique. This caller detection process is also used by many banks in order to take the confirmation of the customer. This detection can be done by using a smartphone by installing an appropriate application in the mobile or by using service providers that offer caller ID spoofing. The upgrade of old hardware is very costly, and there is no mechanism available to end users where there is no storage of information and it also very difficult to locate the physical location of the attacker. The main drawback is that it is more complex when it is considered in the real world. In this article, we consider an appropriate solution named as Passive IP Trace-back to overcome the challenges in deployment in caller id detection. PIT is a kind of technique where we can find out the history of the attacker through which we can consider that a specific person is trying to attack the victim. PIT exploits the path back-scatter messages to find the location of the attacker. The scheme of PIT is used as an efficient software for computers to validate their effectiveness in the detection of spoofing attacks.

Published by: Vijay Ankamma Reddy Male, Hruthik, P Renuka Devi

Author: Vijay Ankamma Reddy Male

Paper ID: V5I2-1854

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

IoT based ATM monitoring using cloud data with sensors

In this system, we are using sensors like IR sensor, LDR sensor, Temperature sensor, smoke sensor, and the vibration sensor. The IR Sensor is used to monitoring the person IN/OUT in the ATM room. If more than 2 person enters the ATM, then it gives an alert to the user. LDR sensor is used to monitor the light intensity inside the ATM room. If the LDR output values are lower than the threshold value, then the ATM room light will automatically switch ON. Temperature Sensor is used if the temperature inside the ATM room goes below the specified limit, then the AC can be switched off, thus we can have a power saving. Smoke Sensor is to monitor the smoke level in the ATM room. If the smoke sensor value crosses the threshold value, the buzzer will get ON automatically. The Vibrator Sensors used to monitor the ATM when try to break. This will lock the door and send the message to the police station. The whole system relates to the IoT. So the user can monitor the ATM (like temperature level, Smoke) from anywhere and also can control the loads (Like AC, light, door) from the long distance

Published by: P. Visalakshi, D. V. Sai Teja, K. Muni Kiran

Author: P. Visalakshi

Paper ID: V5I2-1864

Paper Status: published

Published: April 12, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X