<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Faculty of Engineering</title>
<link href="http://localhost:8080/xmlui/handle/123456789/6766" rel="alternate"/>
<subtitle/>
<id>http://localhost:8080/xmlui/handle/123456789/6766</id>
<updated>2026-04-12T00:35:23Z</updated>
<dc:date>2026-04-12T00:35:23Z</dc:date>
<entry>
<title>Parametric study on structural behaviour of mast tower</title>
<link href="http://localhost:8080/xmlui/handle/123456789/7512" rel="alternate"/>
<author>
<name>Singh, Amrit</name>
</author>
<id>http://localhost:8080/xmlui/handle/123456789/7512</id>
<updated>2020-11-10T04:10:09Z</updated>
<published>2020-04-01T00:00:00Z</published>
<summary type="text">Parametric study on structural behaviour of mast tower
Singh, Amrit
Mast tower are generally tall structures, self-supporting structures and in engineering&#13;
terms cantilever structures, which are designed to support the high-tension wires,&#13;
testing the other towers and so on.&#13;
Further to the parametric study on structural behavior of masts, basic parameters are&#13;
studied, like axial, compression and tension capacity of the members, deflection&#13;
behavior etc.&#13;
The analysis of the tower testing high mast is carried out in different ways, mainly&#13;
governs under high tensions due to testing and wind action on exposed area. These&#13;
mast towers are generally used at tower testing stations. Two masts present to test a&#13;
tower, one of them is Longitudinal Mast and other one is Transverse Mast. These&#13;
masts have numbers of columns and beams according to size of tower beds, which are&#13;
to be tested.&#13;
In the analysis, the tower model firstly fixed and then wind pressure applied to the&#13;
exposed area of the mast. Wind force is the computed with IS875: part-III, in which&#13;
different categories factors are used according to mast height, locations and other ones.&#13;
The design of the tower is done with IS:802 part-1/sec-2 &amp; part-2.&#13;
The applications of the mast towers are at each testing stations for testing 132kV to&#13;
1200kV gantry, transmission line towers and for reviewing the same.
For Full Thesis Kindly contact to respective Library
</summary>
<dc:date>2020-04-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Comparative analysis of Protection scheme for HVDC converter against DC side fault</title>
<link href="http://localhost:8080/xmlui/handle/123456789/7237" rel="alternate"/>
<author>
<name>PATEL, ATISH J.</name>
</author>
<id>http://localhost:8080/xmlui/handle/123456789/7237</id>
<updated>2020-11-06T09:36:41Z</updated>
<published>2016-10-01T00:00:00Z</published>
<summary type="text">Comparative analysis of Protection scheme for HVDC converter against DC side fault
PATEL, ATISH J.
In this project, a protection scheme for HVDC converters (classical VSCs as well as MMCs) against dc-side faults is contemplated. The contemplated scheme provides complete segregation between the ac side and the HVDC converters during dc faults which allow the dc-link current to freely decay to zero (the grid current contribution into the dc fault is eliminated). This posses combining and connecting the double thyristor switches a cross the ac output terminals of the HVDC converter. The contemplated protection scheme provides advantages, such as lower dv/dt stresses and lower voltage rating of thyristor switches in accumulation to providing full segregation between the converter semiconductor devices and ac grid during dc-side faults. A simulation case study has been carried out to reveals the effectiveness of the contemplated scheme.
For Full Thesis Kindly Contact to Respective Library
</summary>
<dc:date>2016-10-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>INTEGRATING COMPRESSION TECHNIQUE FOR ASSOCIATION RULE MINING</title>
<link href="http://localhost:8080/xmlui/handle/123456789/7236" rel="alternate"/>
<author>
<name>SINGH, SHUBHAM</name>
</author>
<id>http://localhost:8080/xmlui/handle/123456789/7236</id>
<updated>2020-11-06T09:34:38Z</updated>
<published>2016-10-01T00:00:00Z</published>
<summary type="text">INTEGRATING COMPRESSION TECHNIQUE FOR ASSOCIATION RULE MINING
SINGH, SHUBHAM
Data Reduction in the field of process becomes a challenging issue in the data mining. Everyone wants that there data must be processed quickly in order to get the result. There are various methods that can allow the large data to be processed quickly or in lesser amount of time. In order to do so, one of the method which is widely used in most of the fields is, “Data&#13;
Compression” which can easily made availability of the required space. Data mining has many useful applications in recent years because it can help users to discover the interesting knowledge in large databases. If the Data is already pre-processed then data compression over such type of data can easily be done in quick succession of time, Here we analyze the methods simple Apriori, and the Partition Apriori over compressed database using the mining merge transaction compression technique, existing compression algorithms are not appropriate for mining due to lack of consistency of maintaining the compressed database. Two different approaches were proposed in which, first we need to compress databases by applying K-mediod while merging the transaction tables and then perform the data mining process that can promises to increased up the processing time in large databases by using the compression techniques. In this research an approach called Mining Merged Transactions with the Quantification Table is used by applying k-mediod merge compression. The Partition Apriori is used to find the frequent item sets in the database then the compressed database is maintained in the future as this table relationship of transactions is used to merge related transactions and builds a quantification table to prune the candidate item sets.
For Full Thesis Kindly Contact to Respective Library
</summary>
<dc:date>2016-10-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Energy Efficient Cryptographic Techniques in Mobile Cloud Computing</title>
<link href="http://localhost:8080/xmlui/handle/123456789/7235" rel="alternate"/>
<author>
<name>TAMBOLI, GRISHMA P.</name>
</author>
<id>http://localhost:8080/xmlui/handle/123456789/7235</id>
<updated>2020-11-06T09:32:05Z</updated>
<published>2016-05-01T00:00:00Z</published>
<summary type="text">Energy Efficient Cryptographic Techniques in Mobile Cloud Computing
TAMBOLI, GRISHMA P.
The Technology World, Mobile Devices such as Smart phones, Tablets are becoming important part of the Human life. They are facing some challenges in their resource such as battery life, bandwidth and storage. They also are facing some challenges of communication and security. It describes how securely mobile data to store in a cloud using various cryptographic technique with Symmetric Algorithm &amp; Asymmetric Algorithm using Parameter Mean Processing time And Speedup ratio which related to this Parameters to find out Time Efficiency and increase security using Asymmetric algorithm.
For Full Thesis Kindly Contact to Respective Library
</summary>
<dc:date>2016-05-01T00:00:00Z</dc:date>
</entry>
</feed>
