Author(s): P.Gopal, Azhagiri Pon Abstract: Compliant mechanisms have been designed for various types of applications to transmit desired forces and motions. It also focuses the active research, because of the stability, robustness and ease of manufacturing endowed by their unitized construction. The objective of the proposed…
Download Category: Volume02 Issue03
Performance Analysis of Solar Water Purification Concentrators Parabolic Trough Collector for Ni-Cr Coating
Author(s): P.Gopal, Azhagiri Pon Abstract: The motivation for this project is the limited availability of clean water resources and the abundance of impure water available for potential conversion into potable water. Our project goal is to efficiently produce clean drinkable water from solar energy conversion. To…
Study and Analysis of Tamil Major Students’ Interest in Tamil Language
Author(s): C. Kiruba Thangarani, S. Ezhilmaran Abstract: The present study analyze after the completion of higher secondary education, some of the students opt for higher education in Tamil literature for academic and profession. Learning outcomes of Tamil literature courses stand for the conceptual development, viz mastery…
Experimental Studies on a Dimpled Tube Heat Exchanger with Copper Twist Inserts
Author(s): S. Thulasi, S. Jaisankar Abstract: Heat Exchanger is equipment which transfers the energy from a hot fluid to a cold fluid. In this experiment there are two pipes are fixed one over another. One is copper pipe and another one is Galvanized iron pipe. The…
Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks
Author(s): R.Tamilarasan, K.Preethi Abstract: Lightweight protocol is secure communication and preserving users’ anonymity and location privacy in hybrid ad hoc networks. The payment can be secured without submitting or processing payment proofs (receipts) with our Lightweight Privacy-Preserving and Secure Communication Protocol. Also Symmetric-key-cryptography operations and payment…
Implementation of Puma [Protocol for Unified Multicasting through Announcements] in MANET
Author(s): P. Thiyagarajan Abstract: An ad-hoc network is the self-organizing network that does not needed a wired infrastructure. Each node can communicate with another node, no access point controlling medium access is necessary. Multicast is a transmission method that allows copies of a information/message to be…
Optimization of Turning Process Parameters Using Vikor Method In Turning Operation
Author(s): S. Sivasankar, B. Singaravel Abstract: In this work, process parameters are optimized in turning of EN25 steel with different types of coated carbide tools by the application of combined VlseKriterijumska Optimizacija I Kompromisno Resenje in Serbian (VIKOR) method. The selected process parameters are cutting speed,…
Dynamic Secure Cloud Data Search over Encrypted Results
Author(s): P .Muthamil Selvang, S.Sanjeev, G. Elatharasan Abstract: Many data user are encouraged to outsource their data to cloud servers for great portable and reduced costs in data management which is increased popularity of cloud computing. However, sensitive data should be encrypted before outsourcing for privacy…
Development of Driver Fatigue Monitoring and Alarming System using OpenCV
Author(s): N. Tiruvenkadam, R. Raghul, P.R. Karthik Abstract: Driver drowsiness is recognized as an important factor in vehicle accidents. It was demonstrated that driving performance with increased drowsiness results in approximately 20% of all vehicle accidents. The development of technologies for preventing drowsiness has been a…
Private Security and User to User Relationship Using OSN
Author(s): R.Kayalvizhi, L. Helen preethi silviya Abstract: In current years we are undergoing the wonderful growth in Online Social Networks (OSNs) and develop a hundreds of millions of Internet users. Digital social communications and information security are the means offered by these OSNs, but also raise…