http://WWW.FINALYEARPROJECTS.NET
http://WWW.FINALYEARPROJECTS.NET

Checking delivery availability...

background-sm
Search
3

Updates found with 'simulation results'

Page  1 1

Updates found with 'simulation results'

CFD (Computational fluid dynamics) TITLES1. Flow control over airfoils using different shaped dimples2. Analysis of flow field across blunt fin with dimples –experimentation3. Aerodynamic characteristic and flow pattern on dimples structure of a sphere4. Numerical flow simulation for aircraft5. Analysis of surface augmentation of airfoil sections via flow visualization techniques6. Experimental and numerical investigations of a high performance co-flow jet airfoil7. Modelling & implementation of aerodynamic zero-lift drag into adapdt8. Cfd analysis on the main-rotor blade of a scale helicopter model using overset meshing9. Investigation of different airfoils on outer sections of large rotor blades10. Analysis of foils and wings operating at low reynolds numbers11. A computational study of the clap and fling aerodynamic mechanism12. Aeroelastic analysis of aircraft with control surfaces using cfd effects of winglets on a first-generation jet transport wing13. Aerodynamic analysis of the use of multi-winglets in light aircrafts14. Drag analysis of an aircraft wing model with and without bird feather like winglet15. Aerodynamic analysis of a blended-wing-body aircraft configuration16. Drag reduction in aircraft model using elliptical winglet17. Experimental investigation on the effect of multi-winglets18. Aerodynamic analysis of multi-winglets for low speed aircraft19. Aerodynamic efficiency study of modern spiroid winglets near-field tip vortex behind a swept wing model20. Analytic and experimental investigation of three-winglets21. Aerodynamics of wingtip sails22. Performance analysis of a wing with multiple winglets23. Cfd analysis of winglets at low subsonic flow24. The design of winglets for low-speed aircraft25. Design of multiple winglets to improve turning and soaring characteristics of angelo d’arrigo’s hangglider26. Numerical study of wingtip shed vorticity reduction by wing boundary layer control27. Numerical simulation of missile28. Heat transfer studies on blunt body at hypersonic speeds29. Simulation of flow over a wedge30. Design and develop a vortex generator based on boundary layer theory31. Designing and simulating flow across axisymmetric inlet32. Flow inside a vortex tube 33. Horizontal tail analysis (2-seat amphibious airplane)34. Analysis of the z-wing configuration35. Numerical analysis of injectors in rocket propellant36. Design and analysis of ramjet engine37. Cfd analysis of thrust vector control in nozzle38. Numerical investigation of aero spike nozzle39. Aerodynamic design study of ground vehicles40. Cfd analyses of ship hull forms41. Cfd prediction of loads on marine structures42. Design and analysis of a radial turbine with back swept blaring43. Evaluation of cfd sub-models for the intake manifold port flow analysis44. A vehicle body drags analysis using computational fluid dynamics45. Cfd calculation of convective heat transfer coefficients and validation46. A study of computational fluid dynamics applied to room air flow47. Cfd analysis of airflow and temperature distribution in buildings48. Assessment of turbulence modeling for cfd 49. Cfd analysis of diffuser50. Cfd analysis of engine valve 51. Nozzle design optimization for to reduce noise for turbo jet engine.52. Air and fuel flow interaction in combustion chamber for various injector locations53. Cfd investigation of airflow on a santro zing car by using fluent54. Cfd analysis of rocket nozzle55. Cfd analysis of supersonic exhaust in a scramjet engine56. aerodynamic design for bus/car vehicle57. Cfd analysis of exhaust manifold58. Cfd analysis of centrifugal fan59. Cfd analysis of intake manifold in si engines60. Cfd modeling of the automobile catalytic converter61. Cfd analysis of fluid flow and heat transfer in a single tube-fin arrangement of an automotive radiator62. Computational flow field analysis of a vertical axis wind turbine63. Cfd analysis of mixed flow pump impeller64. Cfd analysis of flow through venture meter to determine the coefficient of discharge65. Design improvements on mixed flow pumps by means of computational fluid dynamics66. Turbulent flow simulation in kaplan draft tube67. Flow analysis of marine propeller68. Design and analysis of globe valve as control valve using cfd software69. Numerical analysis of wax melting70. Conjugate heat transfer analysis in electronics devices
Send Enquiry
Read More
VLSI PROJECTS ABSTRACT 2016-2017 HIGH-SPEED AND ENERGY-EFFICIENT CARRY SKIP ADDER OPERATING UNDER A WIDE RANGE OF SUPPLY VOLTAGE LEVELS ABSTRACT: In this paper, we present a carry skip adder (CSKA) structure that has a higher speed yet lower energy consumption compared with the conventional one. The speed enhancement is achieved by applying concatenation and incrementation schemes to improve the efficiency of the conventional CSKA (Conv-CSKA) structure. In addition, instead of utilizing multiplexer logic, the proposed structure makes use of AND-OR-Invert (AOI) and OR-AND-Invert (OAI) compound gates for the skip logic. The structure may be realized with both fixed stage size and variable stage size styles, wherein the latter further improves the speed and energy parameters of the adder. Finally, a hybrid variable latency extension of the proposed structure, which lowers the power consumption without considerably impacting the speed, is presented. This extension utilizes a modified parallel structure for increasing the slack time, and hence, enabling further voltage reduction. The proposed structures are assessed by comparing their speed, power, and energy parameters with those of other adders using a 45-nm static CMOS technology for a wide range of supply voltages. The results that are obtained using HSPICE simulations reveal, on average, 44% and 38% improvements in the delay and energy, respectively, compared with those of the Conv-CSKA. In addition, the power–delay product was the lowest among the structures considered in this paper, while its energy–delay product was almost the same as that of the Kogge–Stone parallel prefix adder with considerably smaller area and power consumption. Simulations on the proposed hybrid variable latency CSKA reveal reduction in the power consumption compared with the latest works in this field while having a reasonably high speed.
Send Enquiry
Read More
IEEE 2016 -2017 BIG DATA ANDROID DOTNET JAVA TITLESBIG DATA1. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce.ss2. Self-Healing in Mobile Networks with Big Data.ANDROID1. An Exploration of Geographic Authentication Schemes.2. Intelligent Hands Free Speech based SMS System on Android.3. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords.4. Privacy-Preserving Location Sharing Services for Social Networks.5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones.6. A Shoulder Surfing Resistant Graphical Authentication System.7. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies.8. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users.9. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions..NET1. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing.2. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing3. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing4. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal5. Cloud workflow scheduling with deadlines and time slot availability6. Dynamic and Public Auditing with Fair Arbitration for Cloud Data7. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems8. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates9. Identity-Based Encryption with Cloud Revocation Authority and Its Applications10. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud11. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection12. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud13. Providing User Security Guarantees in Public Infrastructure Clouds14. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys15. Reversible Data Hiding in Encrypted Images by Reversible Image Transformation16. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage17. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption18. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps19. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis20. A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets DetectionJAVA1. A Locality Sensitive Low-Rank Model for Image Tag Completion2. A Shoulder Surfing Resistant Graphical Authentication System3. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments4. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search5. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage6. Mining User-Aware Rare Sequential Topic Patterns in Document Streams7. Mitigating Cross-Site Scripting Attacks with a Content Security Policy8. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy9. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases10. SecRBAC: Secure data in the Clouds11. Tag Based Image Search by Social Re-rankingCLOUD COMPUTING1. Cost Minimization for Rule Caching in Software Defined Networking.2. Performance Enhancement of High-Availability Seamless Redundancy (HSR) Networks Using OpenFlow.3. Data Plane and Control Architectures for 5G Transport Networks.4. HBD: Towards Efficient Reactive Rule Dispatching in Software-Defined Networks.5. SDN-based Application Framework for Wireless Sensor and Actor Networks.6. Geo-Social Distance-based Data Dissemination for Socially Aware Networking.7. An Open-Source Wireless Mesh Networking Module for Environmental Monitoring.8. Hybrid IP/SDN networking: open implementation and experiment management tools.9. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.10. Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System.NETWORK SECUIRTY1. Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing.DATA MINING1. Systematic Determination of Discrepancies Across Transient Stability Software Packages.2. Identification of Type 2 Diabetes Risk Factors Using Phenotypes Consisting of Anthropometry and Triglycerides based on Machine Learning.3. Teaching Network Security With IP Darkspace Data.4. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection.5. Mining High Utility Patterns in One Phase without Generating Candidates.6. An Improved String-Searching Algorithm and Its Application in Component Security Testing.
Send Enquiry
Read More
VLSI PROJECTS ABSTRACT 2016 -2017A LOW-COST RADIATION-HARDENED METHOD FOR PIPELINE PROTECTION IN MICROPROCESSORSABSTRACT: The aggressive scaling of semiconductor technology has significantly increased the radiation-induced soft-error rate in modern microprocessors. Meanwhile, due to the increasing complexity of modern processor pipelines and the limited error-tolerance capabilities that previous radiation hardening techniques can provide, the existing pipeline protection mechanisms cannot achieve complete protection. This paper proposes a complete and cost-effective pipeline protection mechanism using a self-checking architecture. The radiation-hardened pipeline is achieved by incorporating soft-error- and timing-error-tolerant flip-flop (SETTOFF)-based self-checking cells into the sequential cells of the pipeline. A replay recovery mechanism is also developed at the architectural level to recover the detected errors. The proposed pipeline protection technique is implemented in an Open RISC microprocessor in a 65-nm technology. A gate-level transient fault-injection and analysis technique is used to evaluate the error-tolerance capability of the proposed hardened pipeline design. The results show that compared with the techniques such as triple modular redundancy, the SETTOFF-based self-checking technique requires over 30% less area and 80% less power overheads. Meanwhile, the error-tolerant and self-checking capabilities of the register allow the proposed pipeline protection technique to provide a noticeably higher level of reliability for different parts of the pipeline compared with the previous pipeline protection techniques.
Send Enquiry
Read More
Page 1 1