No. |
Title and Author |
Area |
Country |
Page |
1 |
Operation Research on Project Evaluation and Review Technique and Critical Path Method : A Novel Study
-Dr. Pratibha Pant
Due of the growing effects of the globalization in various business environments, the manufacturing industry is expected to be effective and yet efficient. According to this, in planning, scheduling and controlling a project, which is a combination of various activities, project management techniques (PERT and CPM) are used. Therefore, the research question is how will the implementation of CPM and PERT influence the effectiveness and efficiency of Furniture Company. In oder to point out the importance of those methods in reducing the project completion time and costs. The data are taken from the furniture company ''Dallas'' and it will be combined with literature reviews. The research study is fuelled by the following objectives: First is to determine the activities that are involved in the manufacturing process in selected company. Second is to demonstrate the benefits, as well as the drawbacks that those methods might create in the organization. And third is to demonstrate the influence of CPM and PERT in the entire furniture industry and its competitiveness. Implications of this research paper are evaluation of the project completion time and control of the resources, in order to see that the project is completed within the planned time and cost by using mentioned methods. At the end of the study, the result is expected to help all the individuals as well as the companies to understand more the concept of CPM and PERT methods in reducing the project completion time and costs. Read More...
|
MATHEMATICS |
India |
1-3 |
2 |
Analysis of Static Load Bearing Capacity of the Ball Bearing by using ANASYS
-Ritendre Kumar Patel ; Dr. Rashmi Dwivedi
The study was conducted in order to generate a systematic and more accurate system that can be used to determine the static load bearing capacity of the ball bearing without destructive test of the costly bearing which can help to reduce the cost time and efforts required. The findings of the research were that the deviation between the static load bearing capacity of a ball bearing obtained by finite element soft wares and the result that were obtained by the practical test that were conducted on Universal testing machine of the Laboratory has a linear relation with size of bearing under test. When the relation between this deviation and the bearing size was established using statistical tool of Linear Interpolation the following relation were obtained. Read More...
|
DESIGN |
India |
4-7 |
3 |
Loss Minimization of Power Distribution Network using Distributed Generation
-Rajni Prasad ; Amit Gupta
Distributed generation (DG) is an emerging concept in the power sector, which represents good alternatives for electricity supply instead of the traditional centralized power generation concept. Due to sharp increase in power demand, voltage instability & line overloading has become challenging problems for power engineers. Voltage collapse, unexpected line & generator outages & blackouts are the major problems associated with voltage instability. Reactive power unbalancing is the major cause of voltage instability. So that the problem of enhancing the voltage profile and decreasing power losses in electrical systems is a task that must be solved in an optimal way. This type of problem is in single phase & three phases. Therefore to improve & enhance the voltage profile & stability of the existing power system, FACTS devices and load flow analysis are the alternative solution. This paper describes a forward backward sweep method based approach for load flow analysis in radial distribution system to improve voltage stability and to minimize the transmission line losses considering cost function for entire power system planning. The proposed approach will be tested on IEEE -33 bus system. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
8-10 |
4 |
Simulation of Mock Drills in Cyber Security
-Ashish Yadav
Over the years, Information Technology has transformed the global economy and connected people and markets in ways beyond imagination. The government is also encouraging financial institutions, industry and other critical sectors to earmark higher budgets in line with the international practices towards development and implementation of appropriate technologies, as well as bringing forth best practices for protecting their information and communication technologies. Read More...
|
SCIENCE |
India |
11-12 |
5 |
A Novel Technique to Prevent Node Isolation Attack in Wireless Ad Hoc Networks using OLSR Protocol
-Itte Lavanya
Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network and is infrastructure-less network of mobile devices connected wirelessly. MANET consists of Peer-to-Peer, self-forming, self-healing network. Generally different routing protocols are available for MANET, the widely used protocol is Optimized Link State Routing (OLSR) Protocol. These algorithms are mainly focusing on routing efficiency, resulting causes various attacks in the network. One of the major attacks is DOS attack called Node Isolation Attack in OLSR. We proposed a novel solution to prevent the DOS attack and to reduce the network overhead by minimizing the fictitious nodes in the network and also select an alternative path. Read More...
|
Computer Science and Engineering |
India |
13-15 |
6 |
Design and Analysis of Manually Operated Floor Cleaner
-Khengare Sharad Lahanu ; Ankush R. D.; Tupe Raviraj Ashok; Patil Akshay Mohan; Doshi Nikhil Sanjay
The customary floor cleaning machines is most broadly utilized as a part of airplane terminal stages, railroad stages, clinics, transport stands, shopping centers and in numerous other business places. These gadgets require an electrical vitality for its activity and not easy to understand. In India, particularly in summer, there is control emergency and a large portion of the floor cleaning machine isn't utilized adequately because of this issue, especially in transport stands. Henceforth it is a need to grow minimal effort, easy to use floor cleaning machine. In this venture, an exertion has been made to build up a physically worked floor cleaning machine with the goal that it can be an option for traditional floor cleaning machines. In this work, demonstrating and investigation of the floor cleaning machine was finished utilizing appropriate financially accessible programming. The ordinarily utilized materials were considered for the parts of floor cleaning machine. From the limited component examination, we watch that the feeling of anxiety in the physically worked floor cleaning machine is inside as far as possible. Read More...
|
Mechanical Engineering |
India |
16-17 |
7 |
A Study on Mechanical Properties and Durability of Studies of Concrete using Rice Husk Ash as Partial Replacement of Cement using Sulpuric Acid
-Grandhi Vijaya Mohan ; M. Rama Chandra Rao
Rice husk slag is a stringy waste result of rice refining industry. This item causes extreme condition id contamination, which calls for dire methods for taking care of the waste. Bagasse fiery remains mostly check ins aluminum particle silica, press and calcium oxides The slag consequently turns into a mechanical waste and stances transfer issues. So few examinations have been accounted for that sugarcane bagasse fiery remains as great pozzolanic material in fractional substitution of bond In ibis venture objective is to ponder the impact of incomplete supplanting of Portland concrete with nee husk cinder in cement exposed to various relieving conditions Experimental examination on corrosive obstruction of cement in H2SO4 arrangement. The variable components considered in this investigation were solid review of M35 and relieving times of 7days, 28days, 60days, 90days, 180days of the solid examples in 1%. 2%, 3%, 4% and 5% H2SO4 arrangement. Rice husk fiery remains has been artificially and physically described and in part supplanted in the proportion of 0%, 5%, 10%, 15%, and 20% by weight. Read More...
|
M.Tech in Structural Engineering |
India |
18-20 |
8 |
Design and Thermostructural Analysis of Automotive Disc Brake
-R. Srikanth ; Z. Triveni; B. Amulnag
A brake is a device to stop the motion of a machine, by means of which artificial frictional resistance is applied to moving machine member. In the process of performing this operate; the brakes draw either kinetic energy of the moving member or the potential energy ceased by objects being brought down by hoists, elevators, etc. The energy sucked by the brakes is dissipated in the form of heat energy. Disc brake is a familiar automotive application where they are applied extensively for car and motorcycle wheels. In the past, surface roughness and wear at the pad interface have rarely been counted in studies of thermal analysis of a disc brake assembly using finite element method. The main purpose of this project is to Optimization of Automotive Brake Disc and analysis the thermal and structural conduct of the dry contact between the brake disc and pads during the braking phase. The thermal-structural analysis to determine the thermal flux and the Von Misses stresses built in the disc. The objective of the project is the design, analysis and optimization of solid and ventilated disc brake using Ansys. The ventilated brake disc assembly is built by a 3D model in Catia and imported to Ansys to evaluate the stress fields and thermal flux's which are established in the disc with the pressure on the pads and in the conditions of tightening of the disc. Read More...
|
M. Tech in Mechanical Engineering Design |
India |
21-26 |
9 |
A Study of Maintenance Planning in a Power System using Fuzzy Logic
-Anil Kashyap ; O P Dixit; A J Khan
The inspection planning in electric power industry is used to assess the safety and reliability of system components and increase the ability of failure situation identification before it actually occurs. It reflect the implications of the available information on the operational and maintenance history of the system. The output ia s ranked list of components, with the most critical ones at the top, which indicates the selection of the components to be inspected. In this paper, we demonstrate the use of a fuzzy relational database model for manipulating the data required for the critically component ranking in thermal power systems inspection planning, incorporating criteria concerning aspects of safety and reliability, economy, variable operational conditions and environmental impacts. Often, qualitative thresholds and linguistic terms are used for the component critically analysis. Fuzzy linguistic terms for criteria definitions along with fuzzy inference mechanisms allow the exploitation of the operator’s expertise. Read More...
|
MATHEMATICS |
India |
27-34 |
10 |
Literature Review in Analysis of Horizontally Curved Box-Girder Bridges
-Vivek P Joshi ; Ronak S. Gajjar; Javal J. Patel; Prakash M. Joshi
This paper present a literature review related to Curved span PSC Box girder. The curvilinear nature of box girder bridges with their complex deformation patterns and stress fields have led designers adopt conservative methods for analysis & design. Recent literature on curved girder bridges to understand the complex behavior. In the present study an attempt has been made to study the Significance of PSC Box Girders & Type, Curvature effect of span, live load effect, wrapping stress in curved Box girder, Shear Lag & Torsion effect due to curvature. Comparative study of analysis & design of PSC T-girder with PSC Box girder using software Staad - pro, ANSYS, MIDAS and CSI Bridge. Normal & Skew Box Girder with different geometrical combination has been included. Read More...
|
M.E. IN STRUCTURAL ENGINEERING |
India |
35-40 |
11 |
Scope of Urban Conservation in Agra
-Nida Hasan
The majority of the historic cities in India are not only momentous for their historical monuments and precincts, but also for their rich and diverse mix of tangible and intangible heritage resources: built and natural heritage, communities of craftsmen and ordinary people with their beliefs, practices, and rituals. In such areas, structures are under a constant threat of demolition because of development pressure. Such special areas are generally under private owners where the need of development of the community cannot be denied. Enactment of rules and restrictions need to be imposed, public awareness as well as people‘s involvement. What is required is a pragmatic approach to make people understand that conservation is not a liability but a desirable approach for the sustainable and holistic living, an approach that ensures the better quality of life and also economical in the long run. The present study focuses on protection, restoration and enhancement of the image and essence which includes key monuments, buildings, and landmarks, together with associated contents and surroundings, throughout the old city. For this study, the evolution process of the city over the years is understood and the historical context is analyzed. To study the changes in the characteristic features, the historical fabric and the major causes of deterioration are understood. Tried to minimize permanent cultural heritage losses and improve, contribute and rehabilitate to social life. The major findings show that the basic facilities are lacking behind and also the new construction is a threat to the urban fabric of Agra. The recommendations for the same also portrait well. Read More...
|
Architecture & Planning |
India |
41-52 |
12 |
Artificial Intelligence in Agriculture: Overview
-Aditi Agrawal
In this paper, we will discuss how AI can change the agriculture landscape, the application of drone-based image processing techniques, precision farming landscape, the future of agriculture and the challenges ahead The domain of agriculture faces many challenges such as disease and pest infestation, improper soil treatment, inadequate drainage and irrigation, and many more. These leads to severe crop loss along with environmental hazards due to excessive use of chemicals. The field of artificial intelligence with its rigorous learning capabilities have become a key technique for solving different agriculture related problems. Systems are being developed to assist the agricultural experts for better solutions throughout the world. Read More...
|
Computer Science and Engineering |
India |
53-55 |
13 |
How to Instate Cyber Resilience in the Organisation
-Ashish Yadav
The current trends point to a growing mandatory for cyber threat "resilience" in the digital age. Governments, organizations and individuals must all contribute their part in building an ecosystem that is resilient to cyber threats. Read More...
|
Information Technology |
India |
56-57 |
14 |
Critical Elements of a Vigilant Cybersecurity Response Plan
-Ashish Yadav
Incident response is the technique (science) of responding to cyber security-related breaches. That's why preparing effective Cybersecurity response plan has to be on the top priority for all organizations, regardless of strength and size. Here some of the critical elements to which consider when building such type strategies or plans. Read More...
|
Computer Science and Information Technology |
India |
58-59 |
15 |
Improving Clustered Email Benefit using Text Mining
-M Divya ; K Sekar
Scholarly letter box is an online aggregation which holds loads of sends connected to not at all like subject regions. Letter box additionally has a rundown page herself to introduction the presents comparing on sends proposed for a given client inquiry interest. This query output leaf shows the investigation results as per the significance order, with no substance based collusion. This paper exhibits an exploratory reasoning of a query output bunching strategy to aggregate the sends, pursued by the mission result page for a specific catchphrase, in light of the substance of the email archives, symbolized by the related and name these come about sets seriously. The anticipated approach depends on the ideas and hypotheses of Text Mining. Gathering of list items makes laid-back and capable for the client in finding the coveted electronic post. It is likewise conceivable to see the different applications and utilizations of a given catchphrase rapidly. This work distinguishes the best collection calculation for archive packaging and examines the approaches to decide ideal number of bunches to have a superior gathering and mark the gatherings. We gage our proposed strategy by going with a few examines and the outcomes demonstrate that our way has a higher exactitude and review. Read More...
|
Computer Science and Engineering |
India |
60-62 |
16 |
Fatigue Analysis of DOHC Engine Rocker Arm and Characterization using Taguchi Method
-Y. Saibabu ; K. Namcharaiah; K. Balakrishna Reddy
Cam shaft design has advanced in leaps and bounds over last three decades but overhead valve engines with centrally located camshafts still use lifters and push rod and rocker arms as a means of opening and closing the intake and exhaust valves in fuel injection pumps. Advancement in materials used in construction of rocker arm for reducing the noise, weight and higher strength for efficient operation is going on throughout the globe since long. The usual materials used for such purpose are Steel, Tungsten, Aluminum, and Forged steel to Stainless steel, aluminum alloys and composites. The success to investigate the possibility creating a light weight rocker arm that could provide a higher fatigue life, friction reducing fulcrum using needle bearings and a roller tip for reduced friction between the rocker and the valve stem but still be less expensive than steel lies in the development of composite rocker arms. Lighter mass at the valve is also allowed for increased speed while strength of the material caters to durability. Read More...
|
M.E. IN MACHINE DESIGN |
India |
63-66 |
17 |
Juniper Networks: An Overview of the Concept
-Deepak Chahal ; Abhijaat Bhatnagar; Jasmeet Singh
The present research paper discusses the Juniper network including its history, growth and development, merits-demerits and future scope. Juniper is found to be more advantageous due to its free accessibility, open architecture, smart automation and many other reasons. This has led Juniper to form a huge market across the world in a few years of time. Thus, Juniper is believed to have a huge scope in future. Read More...
|
Computer Network Engineering |
India |
67-68 |
18 |
An Appraisal on FECG Elicitation
-G. L. Karthik ; Dr. R. Samson Ravindran
Observation of Fetal Heart Rate (FHR) is an effective method for fetal reconnaissance and offers vital data about wellbeing of the unborn. The procurement of FECG turns into a tedious work since it is death-challenging for an immediate contact over the fetus. Fetal electrocardiogram (ECG) waveform examination is performed with the estimation of electrical action from fetal heart and has created in the course of the last 3 decades. The FECG can be estimated by fixing electrodes on the mother's abdominal region. In any case, it has low power and is contaminated with various noises and interference. The FECG signal illustrates fetal heart action, which is exceptionally imperative to detect the FHR, fetal growth and presence of fetal disorder or investigate multiple births, to prevent neonatal disease and to perform parametric examination of the fetal heart. This paper surveys the current methodologies utilized for FECG extraction. Read More...
|
Bio mechanical & Biomedical Engineering |
India |
69-73 |
19 |
Using Different Machine Learning Techniques for Predicting the Price of Used Cars
-Harikrushna Vanpariya
In this paper, various machine learning techniques investigates to predict used car price in India. The prediction is based on the historical data and the data is fetched from various website which is selling the used cars. Here the predictions are made with different techniques like, M5P, Random Tree, Random Forest, K nearest neighbors, K*, Fast decision tree and various regression methods. We have derived the top prediction methods post analyzing above prediction methods. Read More...
|
Computer Science and Information Technology |
India |
74-78 |
20 |
Comparative Analysis of Extraction of Oil from Lemon Grass and Its Usage as DEET Free Insect-Repellent
-Tapoja A. Diwan ; Shital P. Dehankar; Prashant B. Dehankar
The work done will focus on the study and optimization of extraction of ingredient oil from lemongrass. This study investigates the influence of operating parameters like time, size, and type of grass on the extraction of oil. Lemon grass is an important herbal and aromatic plant and its oil is one of the major essential oils used in the perfumery and cosmetic industry. It is widely used in the scented soaps, sprays, deodorants, polishes and medicines. The extracted oil is rich in Citral A & P. Citral is the starting material for the manufacture of vitamin A. In the present experiment citral is isolated by Hydro-distillation of lemon grass, by using both bath and continuous methods. The distillate contains 90 % citral and 10 % neral, the isomer about the 2, 3-bond. Various experiments are carried out on a lab scale to optimize the parameters and get the maximum yield. The extracted oil is analyzed by using gas chromatography. The result indicates that the wet grass gives the maximum extract. The Yield can be raised from 8% to 12% by using Hydro-distillation and pre heated water as solvent. During the comparative study it is clearly seen that the batch experiments with wet grass as raw material gives maximum yield. The repellent effects of different doses of the essential oils from the lemon grass, Cymbopogon citratus were evaluate in laboratory. The results of lemon grass oil testing were compared with those that were obtained when test animals were treated with an equivalent dose of diethyl-3-methylbenzamide, which is a repellent that is commonly used as a positive control. Read More...
|
Chemical Engineering |
India |
79-82 |
21 |
A Review on Desiccant Dehumidification Assisted Air-Conditioning System
-Y. S. Sharma ; D. B. Jani; Milan Pithva; M. R. Chandravadia; Rushik Thummar
The current article describes about construction and working of desiccant assisted various cooling technologies. The contribution of the building sector to the above problem so as to maintain indoor environment providing human thermal comfort is prone area for the future research. In the present review, the alternative cooling methods for the provision of the human thermal comfort through desiccant dehumidification and cooling technologies are discussed. These technologies are potential alternatives to the conventionally used mechanical vapor compression cooling technologies in the provision of human thermal comfort conditions. However, the development and application is mostly in developed and advanced developing countries. For a global scale solution to the problem of energy and environment contributed by the building air-conditioning sector for the maintenance of comfortable conditions, dissemination of ideas and technologies to the developing countries enhances the applicability and practicability of these technologies in building cooling sector. Read More...
|
Mechanical Engineering |
India |
83-87 |
22 |
Checklist for (Must Have) Cloud Security Roles and Responsibilities
-Ashish Yadav
This document contains a Checklist for cloud security roles and responsibilities that can be used to develop or calculate security, privacy, risk and requirements for any kind of cloud computing jobs and services. The paper has been conjunct from established industry rules, guidelines, policies, standards and best practices, additional with importance of GDPR guidelines, and discussing minimum security suggestions in recent research on cloud security. Read More...
|
Computer Science and Information Technology |
India |
88-89 |
23 |
A Review on Digital Marketing Elements and Strategies
-S. Sasireka
Digital marketing is the booming technology which paves an effective and efficient way for promoters for promoting their products, services into the market. Internet users are gradually increasing in day to day life like paying bills in online, e-shopping and finally increased marketing is done online. Digital marketing have changed the mode and way of communication through its effective social media which attracts the customers all over the world. Marketers use digital marketing for electronic communication for better services. Overall growth of the firm is achieved by the digital marketing. Cost is less expensive when compared to offline purchases. Customers are attracted through digital media. But this online practice is not much effective compared to offline due to many fraudulent practices. This creates a negative attitude among the online purchasing customers. Due to highly developed cybercrime systems, this fraudulent practice has been detected and avoided in the infant stage itself. This proposed article focuses the impact of digital marketing for consumers and marketers and discusses various scopes and opportunities in digital marketing. Read More...
|
Department of Marketing |
India |
90-91 |
24 |
User Behavior to Identify Malicious Activities in Large-Scale Social Networks
-Miss. Punam Ashok Bane ; Prof. S. S. Nagtilak
The enormous growth and volume of online social networks and their features, along with the vast number of socially connected users, it has become difficult to explain the true semantic value of published content for the detection of user behaviours’. Without understanding the contextual background, it is impractical to differentiate among various groups in terms of their relevance and mutual relations, or to identify the most significant representatives from the community at large. In this paper, we propose an integrated social media content analysis platform that leverages three levels of features, i.e., user-generated content, social graph connections, and user profile activities, to analyse and detect anomalous behaviours’ that deviate significantly from the norm in large-scale social networks. Several types of analyses have been conducted for a better understanding of the different user behaviours’ in the detection of highly adaptive malicious users. Read More...
|
Electronics and Telecommunication Engineering |
India |
92-95 |
25 |
Survey: Chatbot for Medical Assistance.
-Mehnaaz Girniwala ; Rashmi Yerwa; Payal Khatri; Cyril Sibi
Customer satisfaction is the major concern for developing web based platform which analyze customer’s sentiments along with the relationship of the customer with the company and helps to generate priority levels to resolve the complaint depending upon the negation. The real benefit of this application is the ability to provide advice and information’s for a healthy life because some groups of people don’t have a good basic knowledge of health. Some people live for years with debilitating but they do not pay attention to symptoms simply because they think they don’t require a doctor. Read More...
|
Computer Science and Engineering |
India |
96-98 |
26 |
Survey: Author Identification using Data Mining Techniques
-Aishwarya Chavan ; Yashodhara Jamdade; Priyanka Hundalekar; Poonam Kamble
With the rapid growth of the Internet and the expansion of its users, the Internet is becoming an ideal platform for the criminal activities which mainly includes committing fraud, stealing identities, or violating privacy, and etc. The sender can hide their true identity by creating sender’s address; Route through an anonymous server and by using multiple usernames via different anonymous channel and perform the crime. This type of the message spread the incorrect information and evidence in society that give rise to social conflict. This paper presents a survey of the literature on author identification schemes and different techniques up till date. The paper outlines an overview of the author identification schemes. The different algorithms adopted for the schemes are discussed. Outlining the application and merits of the same. Read More...
|
Computer Engineering |
India |
99-101 |
27 |
A Study on Reliability Assessment of Truss Girder Railway Bridge
-S. Sasidhar ; S. Pavan Kumar
Bridges, over the overall scaffolds the expense of railroad connect is more than alternate scaffolds. The issue of productively planning auxiliary framework includes unwavering quality imperatives forced at both workableness and extreme limit state. Strategies are created utilizing auxiliary unwavering quality guideline to assess time subordinate dependability of structure. These techniques empower the effect on security and usefulness of vulnerabilities in stacking conditions, basic corruption because of forceful condif administration life of harmed or decayed steel structures stays at the phase of parametrisation to be evaluated subjectively. Which are utilized for various purposes, for example, on the off chance that it is utilized to cross cycles and creatures, it is called as foot spans. In the event that it utilized for expressway activity, it is called Highway Bridge, or in the event that it is utilized to convey railroad stacking, it is called Railway erosion in steel structures for as fa back as three decades. Administration life of steel structures is restricted by the powerlessness of the part to erosion. Oxidation of iron prompts the plan of different items, (for example, ferrous and ferric oxides), some of which possess a lot more noteworthy volume than the first iron that gets devoured by the erosion procedure. At this stage the part loses its capacity to oppose the powers. Read More...
|
M.Tech in Structural Engineering |
India |
102-105 |
28 |
Dynamic Load Balancing in Cloud Computing using CloudSim Simulator over Static Load Balancing
-Munazza Sheikh ; Mr. Makarand Samvatsar
Load balancing in the cloud-computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. Load balancing with cloud computing provides a good efficient strategy to several inquiries residing inside cloud computing environment set. complete balancing must acquire straight into accounts two tasks, one will be the resource provisioning as well as resource allocation along with will be task scheduling throughout distributed System. Round robin algorithm can be via far the Easiest algorithm shown to help distribute populate among nodes. Because of this reason it is frequently the first preference when implementing a easy scheduler. One of the reasons for it being so simple is that the only information required is a list of nodes. The proposed algorithm eliminates the drawbacks of implementing a simple round robin architecture in cloud computing by introducing a concept of assigning different time slices to individual processes depending on there are priorities. Read More...
|
Computer Science and Engineering |
India |
106-108 |
29 |
Thermal and Mechanical Characteristics of Mortars Produced with a Binder Containing Two Ashes of Cow Dung and Industrial Fly Ash
-Ernesto Cabral HOUEHANOU ; Armand A. DJOSSOU; Aristide C. HOUNGAN; Ezechiel I. ALLOBA; Antoine VIANOU
This work is a comparative study of thermal and mechanical behavior of 04 different mortars including a reference mortar made from commercial binder (Portland cement CEMII / A-LL 42.5 R) and sand, three other mortars made from industrial fly ash (based on bituminous coal), ash obtained by incineration of cow dung in laboratory and ash obtained by artisanal incineration of cow dung. In order to better appreciate the influence of ashes incorporation in mortars, various assays were carried out : 0 %, 5 %, 10 %, 15 %, 20 % and 25 % of each ash. Thermal conductivity and resistance of mortars were measured with FOX200 device, in accordance with ASTM C518-04 (Standard Test Method for Steady-State Thermal Transmission Properties by Heat Flow Meter Apparatus). Compressive strength of mortars was determined with Tecno Test device, in accordance with NF EN 12390-01 standard. The results obtained showed that thermal conductivity and resistance vary from 0.6132 W.m^(-1).K^(-1) to 0.3782 W.m^(-1).K^(-1) respectively, and from 0.0498 m^2.K.W^(-1) to 0.0877 m^2.K.W^(-1). Thermal conductivity decreases and thermal resistance increases as ash content increases. In addition, the lowest thermal conductivity and therefore the highest thermal resistance were obtained with bituminous coal ash mortar. It is also observed that thermal resistance of cow dung ash mortars are very close between 0 and 5 % of ash, but beyond 5 %, thermal resistance of artisanal ash mortar is greater than that of mortar based on laboratory ash. Mechanical results showed that mortars compressive strengths of 28 day and 90 day decrease as the ash content increases. Compressive strength varies from 24.35 MPa to 35.56 MPa at 28 days, and 29.65 MPa to 37.89 MPa at 90 days. Highest compressive strength was obtained with reference mortar, and the lowest with artisanal ash mortar. Read More...
|
Civil Engineering |
Benin |
109-114 |
30 |
SSR Markers: In Assessment of Genetic Diversity for Forest Management
-Mrs Ritashree Khanikar Dutta
Forest management aims at the sustainable provision of multiple goods and services from forests. Study of genetic diversity is important for tree breeding and improvement programs of tree species as without genetic diversity, evolution is impossible. Without adaptation, population size eventually declines, which can result in local extinction .There are different types of DNA markers to study the Genetic diversity at molecular level. Among them simple sequence repeat (SSR) markers are an excellent markers in diversity assessment as these are highly variable in genome, co-dominant, abundant, highly reproducible ,highly polymorphic and easy to assay . The genetic diversity of tree species which modify tree density and age class structure, at different stages during a forest stand rotation, can have strong effects on genetic diversity, connectivity and effective population size. This paper reviews how genetic diversity of tree species may affect on the functioning of forest ecosystem and management. Read More...
|
Biotechnology |
India |
115-116 |
31 |
Effect of Soil Structure Interaction on Seismic Response of Building
-Nawale Vishal Dattatraya ; Navale A. V.
Masonry infill wall panels may not contribute towards resisting gravity loads, but contribute significantly, in terms of enhanced stiffness and strength under earthquake (or wind) induced lateral loading. However, in practice, the infill stiffness is commonly ignored in building frame analysis, resulting in an under-estimation of stiffness and natural frequency. Also, the infill has energy dissipation characteristics that contribute to improved seismic resistance. Thus a reasonably accurate model for the soil-foundation-structure interaction system with computational validity, efficiency and accuracy is needed in the improved seismic design of structures. Most of the times, the effect of soil flexibility is not considered by structural designer with the feeling that such omission is conservative and simple, this could be true for static analysis but not for dynamic analysis. This omission is because of experimental and computational difficulties of the soil data and complicated modelling behaviour of substructure and superstructure. It is instructive to study the implications of the common practice of ignoring the infill stiffness with regard to performance under seismic loading. The present study makes an attempt to show the effect of flexibility and rigidity of foundation in earthquake analysis of structure by the considering the combined effect of soil structure interaction and infill wall stiffness of building. For superstructure G+3 simple rectangular building is considered for seismic analysis. The infill wall is replaced by equivalent diagonal member. The total work is divided into two parts. In first part, the manual analysis is done in which response spectra applied in both X (longitudinal) and Y (transverse)direction and in second part the analysis is done with ANSYS software considering soil structure interaction effect. The more emphasis is given on manual earthquake analysis by using model superposition response method as per IS 1893-2016 (part-I). The stiffness of soil is calculated by the formulae as per the FEMA 356. After studying this behaviour, it is found that base shear decreases in seismic analysis of superstructure by considering the effect of soil structure interaction in X (Longitudinal) and Y (Transverse) direction. Read More...
|
M.E. IN STRUCTURAL ENGINEERING |
India |
117-121 |
32 |
Improvement of Power Quality by using Multiconverter Unified Power Quality Conditioner
-Kuppam Udayasree ; N. Narasimhulu
This project presents a new unified power-quality conditioning system (MC-UPQC), capable of simultaneous compensation for voltage and current in multi-bus/multi-feeder systems. By using one shunt voltage-source converter (shunt VSC) and two or more series VSCs the configuration is made. The system can be applied to adjacent feeders to compensate for supply-voltage and load current imperfections on the main feeder and full compensation of supply voltage imperfections on the other feeders. The configuration will be designed as all converters are connected back to back on the dc side and share a common dc-link capacitor. Therefore, power can be transferred from one feeder to adjacent feeders to compensate for sag/swell and interruption. The proposed topology can be used for simultaneous compensation of voltage and current imperfections in both feeders by sharing power compensation capabilities between two adjacent feeders which are not connected. The system is also capable of compensating for interruptions without the need for a battery storage system and consequently without storage capacity limitations. By the simulation the performance of MC-UPQC as well as the adopted control algorithm will be illustrated. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
122-128 |
33 |
Secure Scalable Private Cloud: A Survey
-Vikash Kumar ; Divya Makhija; Rosy Banerjee; Yash Bajaj; Prof. S. A. Kakade
The Cloud computing scenario is the reason why we are widely speaking about Security, Privacy and Trust issues even though it exists since the evaluation of the Internet. Any client/small organization/enterprise that processes data in the cloud is subjected to an inherent level of risk because outsourced services bypass the "physical, logical and personnel controls" of the user. When storing data on the cloud, one might want to make sure if the data is correctly stored and can be retrieved later. As the amount of data stored by the cloud for a client can be enormous, it is impractical and very costly to retrieve all the data, if one's purpose is just to make sure that it is stored correctly. Hence there is a need to provide such guarantees to a client. Hence, it is very important for both the cloud provider and the user to have mutual trust such that the cloud provider can be assured that the user is not some malicious hacker and the user can be assured of data consistency, data storage and the instance he/she is running is not malicious. Hence the necessity for developing trust models/protocols is demanding. Here we give a brief survey of the different techniques used for securely stored data on the cloud by keeping in mind all the necessary parameter. Read More...
|
Computer Engineering |
India |
129-131 |
34 |
Text Independent Speech Recognition
-Aniruddha Mohanty
Voice is one of the well-researched biometrics for speaker authentication. So, in the literature a number of techniques have been proposed which make use of speaker’s voice to verify their identity, control access to services, utilize information services, voice mailing, security control for confidential information areas, and remote access to computers. Speaker recognition is the task of automatically recognizing the speaker among several reference speakers using speaker-specific information embedded in speech waves. The extraction of this information is termed as features, and matching process are implemented right after the pre-processing of the signal. In literature, techniques have been proposed where Mel-Frequency Cepstral Coefficients (MFCCs) are taken as features for modeling by the Gaussian Mixture Model (GMM) during the identification process. The GMM algorithm is one of the clustering algorithms employed for the text independent speaker recognition. In this context, by adopting the idea of hierarchical clustering and GMM, an adaptive clustering algorithm, i.e., AGMM that can determine the number of optimal clusters automatically has been proposed. Numerical experiments demonstrate that the AGMM achieves better performance than the traditional GMM where the number of clusters is fixed. Read More...
|
Artificial intelligence |
India |
132-136 |
35 |
Analysis of Network System Vulnerability
-Mangoldip Saha ; Shirsendu Sain
All assaults originate from the effective usage of the vulnerabilities of the telecommunication system or frameworks by the assailants. So it is the first critical thing to clear the powerlessness of certain system or framework. The theoretic strategies are accessible to break down the deficiencies of system topology and activities. Loads of vulnerabilities are found by useful work. This paper dissects and outlines the vulnerabilities of keen system framework from acknowledgment application cases. It is significant to the father innovative work. Read More...
|
Computer Science and Engineering |
India |
137-139 |
36 |
Multilabel Classification of Breaking News of Website by RSS by Multiple Classifier
-Amin Manisha Arkhabhai ; Rakesh Shah
Classification is plays major role in all areas of domains. Today we are getting Online News by so many websites and. Every Second we are getting we are getting so many Breaking news from various websites. The Previous research of multilabel classification for news using TF-IDF. The Purpose of this paper is to implementation of multilabel classification using feature based on Word2Vec. Word2Vec is an unsupervised task utilizing unlabelled data to convert a word into vector representation. We are going to research over classification of Breaking News in Multi Class Category. To get the Breaking News we are using RSS Parsing of various news channel/ newspaper websites. Read More...
|
FINGER PRINT BASED ON VOTING SYSTEM |
India |
140-141 |
37 |
Investigation the Impact of Culture & on the Overall Health and Safety from the Oil and Gas Sector
-Ashok Kag ; Nisha Kushwaha; Vivek Shukla
This review attempts to describe a cultural approach towards understanding SIS. It aims to help the reader understand SIS from a cultural viewpoint, and how SIS culture can be assessed as part of a process of organizational improvement. The aim is to convey up-to-date information on this complex topic in a straightforward, condensed way, trying to build a bridge between research and practice. The review is intended as an informative text for business managers in general, and as a practical guide for SIS practitioners. This is because much of the academic research related to the topic is published in scientific books and journals that are often less accessible for non-academic SIS professionals. Furthermore, in the course of this study, data was collected through open-ended Questionnaires to the workers and the Occupational Health Doctor. Also, Environmental Monitoring/Surveillance was carried out in seven main units of the Refinery. The questionnaire was administered to the workers randomly and was used to identify the Health Hazards, determine the awareness of the workers of the Health Hazards and evaluate the Occupational Health Practice that exists in the Refinery. Environmental Monitoring/Surveillance which includes the use of specialized equipments and good housekeeping were used to identify the different Health Hazards, and also, to assess the risk associated with the Health Hazards identified. Hazard Risk Assessment Matrix was used to identify the Health Hazards and the risks associated with them. A total of 85 respondents participated in the study. Most of the respondents were in the age range of 31- 40 years and approximately 31% run Shift Duty. Majority of respondents (82.4%) were males, married (64.7%) and had completed tertiary education (81.2%) respectively. Majority of respondents were able to identify the Health Hazards: Physical Health Hazard (74.2%); Chemical Health Hazard (70.9%); Mechanical/Ergonomics Health Hazard (78.8%) but the level of awareness of Psychosocial Health Hazard (48.3%) and Biological Health Hazards (9.6%) were low especially that of the latter. For the evaluation of Occupational Health Practice most of the respondent (78.1%) agree that management is committed to the health and well-being of their workers. With the Environmental Monitoring, it was deduced that the above named first three Health Hazards and the Biological Health Hazard are prevalent in the Refinery. With the Hazards Risk Assessment Matrix, the level of risk these identified Health Hazards pose on the workers was 3D, 5E, 3C and 0A respectively. However, workers’ susceptibility to work related-diseases depends on a lot of factors, and it usually takes some time before the manifestation of the illnesses and diseases on the worker could be diagnosed. Consequently, Health Effect Management Process which is an element in Occupational Health and Safety Management System (OHS-MS) amongst others is recommended management protocol that would assist the management of an Oil and Gas Refinery protect, promote and rehabilitate the health and well-being of their workers. Read More...
|
Industrial Engineering |
India |
142-146 |
38 |
Chapter: Physiological Disorders in Fruit Crops
-Anupam Singh ; Pradip Kumar Saini; R. K. Yadav; Gulab Chand Yadav; Sunil Kumar
Physiological disorders mainly affect deciduous tree fruits, such as apples, pears and most citrus fruits. Most of these disorders affect discrete areas of tissue, whether the produce be fruits. Thus, physiological disorder may be defined as the abnormal growth pattern or abnormal external or internal conditions of fruits caused by adverse environmental conditions (such as deviation from normal state of temperature, light, moisture, nutrient, harmful gases and inadequate supply of growth regulators). Read More...
|
Agricultural Sciences |
India |
147-153 |
39 |
A Survey on Security Issues in Cloud Computing
-Giriraj Patil
Cloud computing is a distributed computing paradigm capable of providing agile IT services to individual users and organizations. Cloud computing is a technology which will facilitate companies or organizations to host their services without worrying about IT infrastructure and other supporting services. Cloud computing providers can build large data centres at low cost due to their expertise in organizing and provisioning computational resources. Cloud security has emerged as arguably the most significant barrier to faster and more widespread adoption of cloud computing. Indeed, cloud computing suffers from threats and vulnerabilities which hinders the users from trusting it. In this paper, we explore the vulnerabilities and threats of cloud storage one of the domains of cloud computing that affects the different cloud service model. Read More...
|
Computer Engineering |
India |
154-157 |
40 |
Network Coding Based Reliable Data Storage in Cloud: A Comprehensive Review
-Hina Tandel ; Prof. Ketan Patel; Prof. Rakesh Shah
Cloud storage can be accessed anytime, anywhere. User can store and retrieve their data remote cloud server without difficulty. It is very useful technology which it can store the numerous of data in servers and it can be accessed from anywhere in the world through Internet. Distributed storage is usually considered within a cloud provider to ensure availability and reliability of the data. Network coding enabled distributed storage over multiple commercial cloud solutions, such as, Dropbox, Box, Sky drive, and Google Drive, as a way to address these reliability and privacy issues. Network coding has been considered as a promising solution in next generation networks because of the significant improvement in the transmission rate and reliability. Read More...
|
Computer Engineering |
India |
158-160 |
41 |
Fraud Detection on Event Logs using Constraint Based Association Rule Mining
-KamaljitKaur Badwal ; Anju Ranavadia; Rakesh Shah
ERP is used in most of the businesses to operate it. When integrating many processes like banking, finance, marketing, HR etc. together, it keeps changing itself. Here, there are possibility of data based fraud because transaction are varied and have different sources to process on. There is a approach called association rule mining with process mining can be apply to detect such fraud. Process mining technique mine the fraud in the business process by checking the mismatch between event logs of business process with business process model of a company, which is better known as Standard Operating Procedure (SOP).As the event logs of a company is secured data for them, we will get results on artificial data of a school or a business with customized ERP. Here, the process fraud detection ratio is 96%, but they have considered limited resources. And because the data is not original the result can be processed on likewise criteria. We will try to get it processed with more trust worthy data. Read More...
|
Computer Engineering |
India |
161-163 |
42 |
Identifying the Factors Affecting Quality of Residential Construction Project in Surat
-Prajapati Arunkumar Hariprasad
This research is intended to offer customers, mission managers, designers, and contractors with the necessary statistics had to higher manage the nice of residential creation tasks in Surat. Numerous papers, reviews, the findings of a studies look at, has been undertaken to determine the underlying elements affecting fine of building production initiatives. The elements affecting residential construction satisfactory have been categorised into 8 most important elements and 46 sub-factors. The notion of practitioners i.e. representative, architect, engineer & contractor could be obtained via this questionnaire. The sub-factors that have an effect on the first-rate of building construction initiatives and their relative importance can be recognized and utilized in identifying the principle elements the use of the relative importance index (RII) approach. Later the preventive / corrective measures may be evolved for minimizing the outcomes took place by means of the principle issue affecting satisfactory. After mixed analysis of normal survey end result it was found that layout, web page format and location personnel, economic troubles, system and generation uses, cloth and equipment, Contractor and Subcontractor, challenge and surroundings, exertions are maximum essential least essential among all factors. Read More...
|
Civil Engineering |
India |
164-168 |
43 |
Hybrid Algorithm with Map Reduce Framework to Mine Distributed Association Rules from Big Data
-Jaini A. Doshi ; Rakesh Shah; Anjuman Ranavadiya
When its big data, it's extremely large data sets. These datasets are analyzed computationally to reveal patterns, trends, and associations. That could be related to human behavior and interactions and product reordering ratio or understanding the symptoms or related signs of a disease. Many data analysis techniques are already defined and used by researchers. Results are still showing the scope of improvement. Based on the volume, variety, and velocity of data, the techniques are needed to be used or improved. Association rule mining is one of the technique to solve issues of accuracy in retrieved results. They are used to detect changes in customer behavior, buying trends and reasons that affect such process. Researches till date has proven the results are better than the earlier one. Though several methods have been suggested for the extraction of association rules, problems arise when data is in growing pattern with large volume. To overcome such issue, we propose, in this paper, a hybrid approach based on ARM techniques with Map Reduce framework, modified for processing large volumes of data in an increasing manner. Furthermore, because real life databases lead to a huge number of rules' including many redundant rules, our algorithm proposes to mine a compact set of rules with no loss of information. The results of experiments tested on large real world datasets highlight the relevance of mined data. Additionally in this research, the experiments are performed in continuous growing data which still yields comparative results. Read More...
|
Computer Engineering |
India |
169-170 |
44 |
Review Paper on Power Theft Monitoring and Controlling using Various Technologies
-Shivamkumar Intwala ; Neha Chauhan
Power burglary is the distinction between the power provided and client's utilization, in the circulation framework. Productive use and protection of vitality is the real need of all power utilities, transmitting the created capacity to client stacks through transmission and dissemination frameworks. Be that as it may, existing transmission framework, experience the ill effects of specialized misfortunes in electrical types of gear and non-specialized misfortunes in the dispersed circuits. Circulated misfortunes are chiefly caused because of burglary of provided power at the client premises. Along these lines, it is important to structure more intelligent methods at the dissemination framework, which are fit for recognizing and limiting burglaries at the client premises. This paper assesses the notable methods including Zigbee, IoT, GSM, electronic energy meter and microcontroller which are utilized to limit robbery in appropriation framework. Read More...
|
Electrical Engineering |
India |
171-174 |
45 |
Cyber Security Indispensable
-Ashish Yadav
The Cyber Security indispensable are the basic cyber security fundamentals applicable to all the organizations. By deploying these indispensable or essentials, organisations can defend against the most common form of basic cyber-attacks originating from the Internet or malicious insiders. The security identified through these indispensable deal with diminished the initial attack surface. Read More...
|
Computer Science and Information Technology |
India |
175-175 |
46 |
Survey of Routing Protocols in Vehicle to Vehicle Communication-City Scenarios
-Deep Joshi ; Prof. Rakesh Shah
Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS).Mainly VANET classified into two categories: Vehicle to Vehicle and Vehicle to Infrastructure Communications. In this paper we describe a survey of routing protocols in Vehicle to Vehicle communication. There are two types of scenarios: Highway and City. In this paper we discussed only Highway Scenario. This paper discusses the main 2 types of protocols for VANET Topology Based, Positioned Based Protocols. This paper discusses the advantages/disadvantages and the applications of various routing protocols for vehicle to vehicle communication. It explores the motivation behind the designed, and traces the evolution of all v2v routing protocols. Finally, we conclude that routing protocol depends on speed, position, movement and direction in vehicle to vehicle communication- highway scenarios. Read More...
|
M.Tech Computer Science |
India |
176-181 |
47 |
Analysis of Cable Stayed Bridge under Dynamic Loading Considering different Pylon Types
-Avinash Singh ; Pratiksha Malviya
A bridge is a structure built to span physical obstacles without closing the way underneath such as a body of water, valley, or road, for the purpose of providing passage over the obstacle. There are many different designs that each serve a particular purpose and apply to different situations. In engineering, a bridge is a structure that "consists of two-force members only, where the members are organized so that the assemblage as a whole behaves as a single object". In this Project work, live project of cable stayed bridge i.e. (Raja Bhoj Setu), Bhopal is considered. It is located at V.I.P. road. It has been designed, constructed considering details and hydraulic data as per site. In this study analysis of different types of pylon in cable stayed bridge i.e. H-type, A-type and Y-type is presented to determine the most suitable type and compare it with the executed H-type pylon. It is concluded in this research work that A-type pylon is comparatively more stable, economical and efficient in bearing load whereas H-type is second best and Y-type is worst in comparison. Read More...
|
Civil Engineering |
India |
182-185 |
48 |
Designing And Developing Water Cooler cum Air Conditioner
-Suraj Uttam Jagtap ; Akash Sukhdev Bankar; Sujit Shivaji Kadam; Vikas Harishchandra Pawar; Kailas Murlidhar Kare
This project “Designing And Developing Water Cooler Cum Air Conditioner System†makes the study of the development of a water cooling system using a normal air conditioner. The main aim behind developing this device is to develop a multifunctional unit which can provide cold water along with regular air conditioning cycle. The refrigerant is used as the medium which absorbs and removes heat from the space to be cooled and subsequently rejects that heat. This heat of the refrigerant is used to cool the water and heat of water is used to cool the air. The air cycle is the conventional vapor compression cycle. Read More...
|
Mechanical Engineering |
India |
186-188 |
49 |
Comparative Study between Civil Engineering Softwares
-Pallavi Dandwate ; Dr. Pankaj Singh
A significant revolution with computers’ usage in civil engineering business and construction process has been presented. Computers reduce all the extensive work specifically through the introduction of programs and software. Lately, software development has effectively contributed in various civil engineering disciplines, as it provides engineers with the ability to perform variety of complex calculations, modeling, drafting, designing practice and several analysis processes for civil engineering infrastructure. Many commercial companies that provide users with thousands of software are available today in the markets. However, the recent requirement is to select the suitable software that can perform multi engineering tasks efficiently and satisfy more specific users’ demands. In this regard, this paper presents lists of common software that is used in civil engineering field with their contributions in civil engineering applications. Read More...
|
Civil Engineering |
India |
189-198 |
50 |
Analysis of Accident Rate At Black Spots on NH-6, Amravati (Maharashtra)
-Anjali. M. More ; Dr. M. R. Vyawahare; Prof. A. R. Bijwe
India is a developing country and road safety of is still in a premature stage. An Accident is the result of a combination of factors such as road defects, human error, engineering defects of the vehicle, non-availability of pedestrian facility, cyclist facility, circumstantial factors such as weather condition, visibility etc. Accident causes death, disablement, damage to property and health, social suffering and also general degradation of the environment. The location on a roadway where the traffic accidents often occur is called a black spot. A case study was taken on NH-6 of Amravati district in Maharashtra state. The main problems on this road are bad condition of road and shoulder, trees and poles on the shoulder. The safety deficiencies were detected to minimize accidents on road and save the road users. The deficiencies along with the measures for further improvement had been presented in this paper. Read More...
|
Transportation Engineering |
India |
199-203 |