No. |
Title and Author |
Area |
Country |
Page |
51 |
Applications of Artificial Intelligence in CyberSecurity
-Shreyash Mahadik ; Prajakta Khatal ; Shalaka Mahadik
The growing and evolving cyber security risk facing global businesses can be stemmed by the integration of AI into security systems. The main focus of this paper is the improvement of cyber security with various uses of artificial intelligence and machine learning. And machine learning can help IT security professionals to achieve cyber hygiene and enforce least privilege environments at scale. The purpose of this paper is to shed light on current trends and applications, in industry and government, at the intersection of artificial intelligence and the security field. In addition to a spotlight on current uses, we also touch on up-and-coming applications and room for innovation. Read More...
|
Computer Engineering |
India |
221-223 |
52 |
Construction Cost Management in Resource Based Economy
-A. Varamma ; P. Ravi
Resource Based Economy tested according to criteria formulated from the construction cost management best practices. A cost management plan modelled to demonstrate the possibility of construction management under a new socio economic system, which counts the consumed natural resources by construction as the dry cost to the environment. Reliable estimates of construction costs and schedules presented by contemporary construction companies, their consultants and suppliers at the time of project approval are important for justifying a project on economic ground and for planning the means of financing it. The economic impact of a construction cost overrun is the possible loss of the economic justification for the project. A cost overrun can also be critical for creating policies within sustainable development on the basis of economic costs. The financial impact of a cost overrun results also in demand for construction investments credits. This study presents a case of construction cost analysis for wooden energy efficient house that meets sustainable aspects. Analysed object is characterized by high costs of the construction investment that result from specific characteristics of the construction output. In the result of analysis of the construction investment costs for the efficient house and its comparison with the costs of traditional construction investment on maintenance costs, it can be stated that additional cost resulting from the energy efficient house building is higher than costs of traditional construction investment and it can be treated as the investment in the energy efficient house solutions since it brings savings for home expenditures. Read More...
|
M.E. Civil (Construction & Management) |
India |
224-226 |
53 |
Cloud Computing Application in Mobile Cloud Computing
-T. S. Rathish ; T. Sathiyabama
Cloud computing is an information technology model that enables appearing access to share a little area of configurable system resources and high-level services that can be very quickly equipment with minimum amount of management effort, often over the Internet. If you use an online service to send email, edit documents, watch movies, music, play games or store pictures, it is like that cloud computing can make all possible behind the sequence. The first cloud computing services are almost ten years old, but already a different of organizations from very small start-ups to global corporations, government agencies where they accept the technology for all sorts of reasons. Read More...
|
Computer Science |
India |
227-228 |
54 |
Analysis of the Method of Selection of a Software for a SCADA System
-Alvaro Ruddy Miranda Torrez ; Gan Xinji
When a SCADA system is carried out, the use of software that serves as an interface is essential, but due to the existence of a lot of software from different developers and each one with different characteristics, an analysis of the selection method of this software is important. For its selection, different criteria were taken into account such as compatibility, functionality, security and price. In the end it was determined that there is no software that is the best, but what is important is the analysis of the process to see which software is the best for a process. Read More...
|
MECHATRONICS |
China |
229-231 |
55 |
Black Hole Attack in Mobile Adhoc Network
-Avinash Kamal Mishra ; Hina Rabbani
The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviours because the route discovery process is necessary and inevitable. An assortment of attacks is there to mischief the dexterous working of MANET. One of these attacks is the Black Hole attack which leads to dropping of messages. Attacking node leading agrees to forward packets and then not succeeded to do so. Black Hole attack may take place due to a malicious node which is consciously misbehaving as well as a smashed node interface. In any case, nodes in the network will continuously trying to find a route for the destination, which makes the node consume its battery in addition to losing packets. In this paper we analyse Black Hole attack in MANETs using AODV and OLSR which are reactive and proactive respectively in nature. Read More...
|
Computer Engineering |
India |
239-244 |
56 |
Investigation of Multiple Cracks in Cantilever Beam- A Review
-Suhail Ahmad ; Dr. Rashmi Dwivedi
Beam kind structures area unit being ordinarily utilized in steel construction and machinery industries, in structures and machines, and fatigue cracks area unit the most reason behind beams failure. Crack happens in beams to vary its dynamic behaviour of structure and examining these changes in crack location and crack size area unit known. The NDT ways area unit used for crack detection and that area unit expensive and time intense. During this paper the beam bear in mind to open thwart wise cracks. Presently analysis has targeted on using modal parameters i.e. natural frequency used for crack detection. During this paper the modal analysis was performed on cracked beams and a healthy beam, to calculate natural frequency. The primary 5 natural frequencies wear thought-about for crack detection. To find the crack i.e. crack depth and crack locations area unit aforethought. The intersection of those contours indicates crack location and crack depth, thence to notice multiple cracks. The experimental results area unit obtained by using FFT analyser. Finally the ANSYS result compare with experimental result. Read More...
|
M-Tech(thermal power engineering) |
India |
245-247 |
57 |
Analysis and Validation of Speed Control of Three Phase Induction Motor using Two Level Inverter and MATLAB Based SPWM Technique
-Mr. Ankur P. Desai ; Dr. R. J. Motiyani
This paper presents the theoretical and practical aspects of implementation of Sinusoidal Pulse Width Modulation (SPWM) in controlling the speed of three induction motor. SPWM is implemented by using 32 bit ARM Cortex Microcontroller Discovery Board (STM32F4072F407XX MCU). The algorithm to generate SPWM has been implemented as Simulink model constructed in MATLAB and applied two level inventor module which is connected to three phase induction motor. Digital Storage Oscilloscope Tektronix is used to trace and analyze all output waveforms. Read More...
|
Electrical Engineering |
India |
248-251 |
58 |
Fuzzy Logic: Evolution and Relevance in the Hi-Tech Era
-Farhat Nasar
Fuzzy logic is a form of multi-valued logic. It is based on imprecise reasoning and perception. Compared to conventional bivalent-logic (where a proposition has exactly one truth value either true or false), fuzzy logic variables may have a truth value that can range in degree between 0 and 1. Fuzzy logic has been applied to conceptualize the notion of partial truth, where the truth value may range between completely true and completely false. There has been difference in opinion amongst the mathematicians on the use of fuzzy logic as the base of probability theory. The article describes in details the origin of fuzzy logic and its growing popularity in the current hi-tech world. Read More...
|
Computer Applications |
Saudi Arabia |
252-254 |
59 |
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
-Sudipto Palit ; Dr. Tripti Arjariya
In mobile cloud computing the data security problem are becomes more grievous and intercept in the development of mobile clouds. In the mobile clouds there many research are done to improve the mobile cloud security. But many clouds are not supporting to the mobile services since mobile devices has limited power and computing resources. To find the solutions to mobile cloud applications with low computational overhead is important task. In this research paper, we proposed technique to solve this issues for mobile cloud computing. The normal cloud environment has an access control technology, but the proposed system changes the access control tree to use easily cloud environment with mobiles cloud. We discuss the proposed technique for mobile cloud computing. Attribute-based encryption (ABE) system is used for cloud storage security when multiple users are read the same file which is stored on the mobile cloud. For the personal storage system, we developed the modified cipher text-policy attribute based encryption system using flexible and expressive access policy in public domains. Our scheme supports multi-authority scenario, in which the authorities work independently without an authentication center. To decrease the user revocation cost, it also introduce the attribute description fields for implementing the efficient lazy revocation, it is an important issue in program based CP-ABE system. We try improving performance of system with respect to time. Read More...
|
Computer Engineering |
India |
255-258 |
60 |
Li-Fi Technology Transmission of Data through Light
-Gobinath C ; Madhanraj P; Manikandan S
Li-Fi stands for Light-Fidelity. Li-Fi technology, proposed by the German physicist Harald Haas, provides transmission of data through illumination by sending data through an LED light bulb that varies in intensity faster than the human eye can follow. This paper focuses on developing a Li-Fi based system and analyzes its performance with respect to existing technology. Wi-Fi is great for general wireless coverage within buildings, whereas Li-Fi is ideal for high density wireless data coverage in confined area and for relieving radio interference issues. Li-Fi provides better bandwidth, efficiency, availability and security than Wi-Fi and has already achieved blisteringly high speed in the lab. By leveraging the low-cost nature of LEDs and lighting units there are many opportunities to exploit this medium, from public internet access through street lamps to auto-piloted cars that communicate through their headlights. Haas envisions a future where data for laptops, smart phones, and tablets will be transmitted through the light in a room. Read More...
|
Computer Science |
India |
259-262 |
61 |
Gesture Analysis
-Aadesh Borgaonkar ; Shruti Bhagat; Ajinkya Bangar
The research field of Artificial Intelligence has fulfilled many promises, even if the achievements are different from the unrealistic demands. The limitations of current robotics are clearly revealed when it comes to communication. The communication method used by each human being is different and when it comes to deaf people, the sign language is the main source of communication. In this paper we try to solve the problem of evaluating sign and gestures by implementing an algorithm to detect the gesture. We use two images as current image which has been captured and base image which matches it approx 60% and above. There are mainly three steps involved and they are capturing the gesture, cleaning the input and then finally matching it with any template present for proper interpretation. Read More...
|
Computer Engineering |
India |
263-264 |
62 |
A Study on Mission Indradhanush Programme under Reproductive & Child Health Among Rural Population of Tikamgarh District of Madhya Pradesh
-Ashish Jain ; Neena Gupta; Akanksha Singh; Rahul Singh; Ratnesh Dubey
Immunization programs are one of the most well-recognized and successful public health programs across the world. The immunization programs have achieved significant successes in a number of countries; however, the coverage with available vaccines remains sub-optimal in many low- and middle-income countries (LMICs). Lahariya(2015) described under Mission Indradhanush, the Government has identified 201 high focus districts across the country. Nearly 50% of all unvaccinated or partially vaccinated children in India are in these 201 districts. Mission Indradhanush aims to strengthen key functional areas of immunization programme for ensuring high coverage throughout the country, with special attention to 201 identified high focus districts. Objectives: To determine the factors responsible for not availing vaccination in community. Material and Methods: It was a descriptive research study conducted during March to April 2018. The random sampling technique was adopted to select the district and block. The data was collected using interview schedule. Results: This article, based upon extensive review of literature and using implementation of Mission Indradhanush Programme under universal immunization program (UIP) in India as a case study, summarizes the latest developments and initiatives in the area of vaccination and immunization in the last few months. The article analyzes initiatives under UIP in India from the “health system approach†and argues that it is possible to increase coverage with available vaccines and overall program performance by focused attention on various functions of health systems. It also discusses the emerging evidence that health systems could be strengthened prior to the introduction of new interventions (vaccines included) and the introduction of new interventions (including vaccines) could be planned in a way to strengthen the health systems. Conclusion: It concludes that Mission Indradhanush program under UIP could be one of the entry points for strengthening health systems in the countries and lessons from vaccine introduction could pave pathway for scaling up other health interventions and therefore, could contribute to advancing Universal Health Coverage (UHC). Read More...
|
MASTER OF PUBLIC HEALTH |
India |
265-268 |
63 |
Mobile Applications in Cloud Computing
-G. Nithiya ; S.Venkateshkumar
Mobile Cloud Computing which merge mobile computing and cloud computing, has revolve into one of the mechanized energetic words and a main case thread in the IT world .As MCC is tranquil at the in the untimely hours step of evolution, it is necessary to grab a thorough tolerant of the information in sort to tip out the way of prospect examine. The simplest possible human computer edge is mobile cloud computing as it merge and makes the use of all current day entity oriented technology. Cloud computing is growing as one of the most important standard for providing faultless applications on mobile devices. Grouping of Mobile computing and Cloud computing which is period as Mobile cloud computing model is predict as decision to this hitch. Currently, it is stiff to imagine any calculation without the influence of mobile applications. Read More...
|
Computer Applications |
India |
269-271 |
64 |
Study & Calculation of Loss in Rail Length Occurred in the Bhilai Steel Plant Due to Scaling in the Furnace
-Jayant Kumar Sahu ; Hrishabh Singh
Conventionally the production of rail track comprises of forming process in which rail is manufactured through rolling, during the process, semi-finished product i.e. bloom is recharged inside the furnace for several hours by using different types of mixed fuel gases. After getting the certain recrystallization temperature the bloom is passed by several passes and stages, to get an appropriate desired profile of rail section as per requirement. So basically in “Universal Rolling Mill†and “Rail & Structural Mill†of Bhilai Steel Plant there is some common issues related to Rail length during manufacturing process i.e. Shortage of length. This paper majorly focuses on the cause of scale loss during the production process & its effects on rail length. The methodology will describe about how process are carried out in order to collect data. Evaluation & outcome deals with the calculation & comparison of different parameters in both the unit of BSP. Finally, in the conclusion, methods are proposed for reducing the metal loss so as to get required rail length. Read More...
|
M.Tech Production Engg. |
India |
272-276 |
65 |
A Study on Database Management System
-R. Yagavan ; Mrs. T. Sathiyabama
A Database is an organized collection of data. A database management system is a computer software application that interacts with end users, other application, and the database itself to capture and analyze data. A general-purpose DBMS allows the definition, creation, querying, update and administration of databases. A database is not generally portable across different dbms but different dbms can interoperate by using standards such as SQL, ODBC OR JDBC to allow a single application to work with more than one dbms. Computer scientist may classify database management systems according to the database models that they support. Read More...
|
Computer Applications |
India |
277-278 |
66 |
Effect of Partial Replacement of Cement with Silica fume on the Strength and Durability Characteristics of High Performance Concrete using Silica Fume and Super Plasticizer
-Dr.K.Perumal ; S.Senthil kumar; K.Sekar
The cement content of conventional high strength concrete is generally high which often leads to higher shrinkage and greater evolution of heat of hydration. In special situations a very high compressive strength of concrete is necessary together with sustainability to aggressive environments. Very few studies have been reported in India on the use of silica fume (SF) for development of high performance concrete (HPC). In order to make a quantitative assessment of different cement replacement levels with SF on the strength and durability properties for M90 and M100 grades of HPC trial mixes and to arrive at the optimum level of replacement of cement with SF, investigations were taken. This paper reports on the performance of HPC trial mixes having different replacement levels of cement with SF. The strength and durability characteristics of these mixes are compared with the mixes without SF. Compressive strengths of90MPa and 100MPa at 28 days were obtained by using 10 percent replacement of cement with SF. Read More...
|
Civil Engineering |
India |
279-283 |
67 |
Monitoring and Evaluating Tribal Educational Project
-Mrs. Asawari Shiposkar ; Gayatri Oleti
Effective Monitoring and Evaluation (M&E) process and tools are necessary for the successful implementation of any project. Vidya is a project to promote digital inclusion and eLearning among the school students in Talasari. Digital Literacy & Life skill has been going on in 41 schools for the last 4 years and this paper describe the mechanism for its measurement and evaluation. The tools for evaluation have been designed in view the objective, implementation plan and key performance indicator. The data was collected using the framework designed for this purpose. The analysis of data and meaningful conclusions are given at the appropriate places for various places like individual, institution and society. Read More...
|
Computer Engineering |
India |
284-287 |
68 |
Design and Development of Portable Vapour Compression Refrigerator
-Laxman P. Khose
Today we can preserve the food in refrigerator by keeping it at desired low temperature. But when we went for a picnic or for a long journey we require to preserve the food and maintain the beverages at low temperature. In order to maintain the optimal temperature range of 2 to 8áµ’ Celsius for food preservation, these region need reliable refrigeration system. The most of the refrigerator products in the market are not suitable because they are large in size and bulky. In this attention is made on mini refrigerator which are smaller in size and portable. so, we can use this unit to transport the beverages over long distances in remote areas by storing them at low temperature. The aim of this study is to design the components of the mini VCRC one by one and to analyse the cycle. The effect of heat transfer in condensation and evaporation processes has been investigated. Moreover, an isentropic, rotary compressor has been selected for the system. R-134a has been considered as the refrigerant throughout the study. Firstly, the evaporator part will be presented in the report. The design procedure and the dimensions of the evaporator will be mentioned in the other chapter of the report. Also, the design of cabinet is done and the heat losses from each side of the cabinet are calculated to decide the power input required for the stated system. Read More...
|
Mechanical Engineering |
India |
288-293 |
69 |
Soil Stabilization using Cow Dung
-Divyam Kumar Sharma ; Simranjit Singh
This research, reports on the investigation into the strength and the durability properties of earth soil stabilized with Cow dung. The main objective behind this research was to find an economical yet efficient way to improve the properties of soil or in other words to get a stabilized soil better than other methods already present in the market in terms of economy and performance. A normal earth soil was taken and crushed dry cow dung was added to it on varying percentages along with some amount of dry grass in it. Various tests were performed on different samples accordingly such as Procter test, unconfined compression test, CBR test, etc. After the compilation of tests or on the basis of test results the conclusions were made specifying maximum strength or abrasive resistance of the soil with increase in the cow dung content at varying percentages. The strength of soft soil or the sandy soil was significantly/almost the same with the use of these materials and supposed that they do not had the potential as effective soil stabilizer in field application but, the beneficial reuse of wet cow dung in soil stabilization can be proved as a milestone towards a green economy in the coming future as if the research is conducted. Read More...
|
Geo Technical Engineering |
India |
294-296 |
70 |
Simulation, Analysis and Implementation of Cascaded 7 Level Inverter
-Aakash Shirishbhai Suthar ; Dr. Pramod. S. Modi
this paper a contrivance of inverter of cascaded type is presented in which the number of switches needed is lowered compared to usual used inverters. In this paper, concept which discussed are THD and low dv/dt for multilevel converters. This topology is also work on high power quality and lower harmonic components. And also better work for electromagnetic consistence and low dv/dt as well as lower switching losses. This Theory also presented different voltage source in generating all voltage levels as positive or negative is verified by using the MATLAB/SIMULINK results of a 7,13 &19 -level 1-phase & 3-phase inverter. This paper main focused on T.H.D, dv/dt losses, single phase and three phase 7 level, 13 levels, 19 level inverter. Read More...
|
Industrial Electronics |
India |
299-303 |
71 |
Green Synthesis of Nickel Nanoparticles from Extract of Coriandrum Sativum Leaves
-K. Aparna ; S. Sharada
Nickel nanoparticles have got much consideration in unique industrial applications due to catalytic and magnetic properties. A number of paths were elaborated to synthesize nickel nanoparticles keeping in view of specific applications. Among all those, to synthesize nickel nanoparticles, the use of plant section extract will become an emerging discipline due to the fact plant parts act as reducing agent and a capping agent. For the large-scale and ecologically benign manufacturing of nickel nanoparticles through green chemistry technology route is very beneficial due to most economical during synthesis and basically available materials. In the current study, it is referred to that nickel nanoparticles had been synthesized via green synthesis, with coriander (Coriandrum Sativum) leaves extract and nickel chloride. Considering NiCl2 as precursor and coriander leaves extract as a reductant and as well as a stabilizing agent. The plant adopted for the current study due to its regarded medicinal properties, easily available in all seasons and everywhere in INDIA. The synthesized Ni nanoparticles were characterized and analyzed by using X-ray diffraction (XRD), UV-Vis spectroscopy, SEM and FT-IR techniques. Read More...
|
M.Tech in NANOTECHNOLOGY |
India |
304-306 |
72 |
Worldwide Business in Dynamic Global Scenario
-Padmavathy V
As we have entered the new thousand years, one of the significant difficulties confronting specialists and governments is the global business. Albeit worldwide business is certainly not another wonder, the volume of universal venture and exchange is picking up quickly in significance. The motivation behind this paper is to: an) indicate new rising patterns of the global business, b) give a nearby consideration regarding numerous ongoing advancements that present the two difficulties and chances to the worldwide supervisors who can contend in this regularly changing business world. The essential targets of this paper are: a) to give a general point of view of global business, b) to present, investigate, and portray a human side of universal business, c) to distinguish principle difficulties and openings as far as the worldwide business skylines. The point of the exploration is to present and clarify worldwide business in an imperative developing light of globalization. The paper infers that representatives and governments around the globe should be more educated about the worldwide measurements of administration than whenever before. Read More...
|
MANAGEMENT |
India |
307-313 |
73 |
Gesture Control using Leap Camera
-Shruti Narayanan Nair ; Dr. Prof. S. O. Rajankar
BOT are the technology which is widely used nowadays for videographer or surveillance. A simple gesture controller can make the task of controlling drone much easier. In this project, the Leap Motion Controller is used for recognition of gestures, which are motion of the hand, and as a result, we can control the same. The Leap Motion Controller is an eight by three centimeter unit, which comprises two stereo cameras and three infrared LEDs. This proposes a hand gesture recognition scheme explicitly targeted to Leap Motion camera. The two cameras that are LEDS are used to capture the gesture and control the BOT. The main advantage of this system is that capturing all the points of hand & will help to control the bot without using any remote. Read More...
|
Digital System |
India |
314-316 |
74 |
Gender Recognition System using Human Fingerprint: A Review
-Vandana Khatri Himthani ; Rajender Singh Yadav
Fingerprint recognition system design may be used for authentication of right person in real time situation however at RFID based authentication is a not reliable because it may be used by anyone. As ladies have a tendency to have a fundamentally higher edge thickness(scaled down focuses)than men however it may be separated just when unique mark is in model frame (great)not in inert shape (not great). confinement of accessible work is to discover amend individual when inert prints (obscure unique mark) typically accessible technique is has less acknowledgment rate & less edge thickness, for idle figure prints likewise time for acknowledgment is additionally high henceforth it is likewise require to decrease time for acknowledgment & enhance edge thickness. Objective for this paper is to develop an algorithm which may efficiently latent fingerprint into exemplar fingerprint with high recognition rate & high throughput. Read More...
|
Image processing |
India |
317-320 |
75 |
Stress Concentration of Circumferential Notch by FEA
-Chetan Sanjay Lokhande ; Paras Murlidhar Mahajan
Engineers develop the engineering components for different application. Most of the engineering components contain geometrical discontinuities, such as slots and grooves. Generally grooves in termed of notches use in shaft or bar. These geometrical irregularities play important role in the stress-strain concentration generated in notch area. The stress increases above the certain limit then material gets failure. Hence, knowledge of stress-concentration on the engineering components is very important for design and application of various engineering elements. In addition to knowledge of total deformation in components at various loading condition is very important. That is the study of stress-concentration and total deformation in notch bar at axial loading is necessary. There are very few attempts has been made to investigate stress concentration in double circumferential notch bar effect for various type of loading condition. In this studied investigation for Square, U-shape and V-shape double circumferential notch bar, under the axial load and found stress concentration and total deformation of notch bar by using analytical, finite element analysis and experimental analysis. Read More...
|
mechanical engineering |
India |
321-323 |
76 |
A Literature Review on Analysis of Transformer Cooling System
-Aradhana Saket ; Mrs. Seema Pal; Dr. A. K. Sharma
Transformer plays an important role in electrical power system. Ever since the invention of a transformer, we have been facing the trend of increasing its nominal power. Together with the increase of nominal power, losses in transformers increase as well, while a transformer's own capability of cooling decreases. According to generally adopted estimate states that if a transformer's maximum operating temperature is reduced by 6°C, the thermal life of insulation system is approximately doubled. As a part of this, many authors have presented different methodologies to provide an efficient cooling of transformer. The purpose of this paper is to provide a literature review on new technology of cooling system of transformer and its effect on transformer's life. Read More...
|
M.E- HIGH VOLTAGE AND POWER SYSTEMS |
India |
324-326 |
77 |
Prediction of Diabetes using Machine Learning
-Ankita Kulkarni
Classifying a dataset has always been a computational method. This paper represents the classification of female Pima Indians patients who were diagnosed for diabetes type-II. It comprises of 768 records of medical details of the patients. It provides measurements of Pregnancies, Glucose, Blood Pressure, Skin Thickness, Insulin, BMI, Diabetes Pedigree Function, Age and finally the outcome in binary if the patient has encountered diabetes or not. We train the system using various classifiers to classify patients into positive and negative classes and then differentiate the classification in accuracy with and without data pre-processing. Read More...
|
Artificial intelligence |
India |
327-330 |
78 |
Applying the Test Maturity Assessment (TMA) and Test Process Improvement (TPI) for the Improvisation of Test Maturity Models
-Fanish Lal. S ; VR. Nagarajan
Many of the software testing procedures and practices are not performed properly that leads to pessimistic results. The immaturity of the testing procedures will be ineffective in predicting the defects, cost and planning activities in testing. The state of the art practices are to be noted to merge all the kinds of test maturity models that are developed by various researchers for examining the drivers, challenges and outcomes of TMA/TPI. Various models are developed to enhance the maturity by running the test maturity assessment (TMA) and test process improvement (TPI). The survey helps to bring the positive outcomes while examining and upgrading the test maturity model. To attain the above feature, a study is conducted based on Multi vocal Literature Review (MLR) to analyse the facts about TMA/TPI. A MLA is the method of grey literature for posting the blogs. The present survey tells how TMA/TPI is used to determine the various test maturity models, to synthesize the drivers, issues and advantages in improving the maturity model. Read More...
|
Computer Science |
India |
331-335 |
79 |
Cloud Backup Services using Geneic Algorithm
-N. Gomathi ; Meenalochini. M; K. Saranya; S. Indumathi
Cloud computing empowers individual users by providing storage space with better security and privacy, which in addition also provides anytime and anywhere access to data. Increase in the usage of the personal computing devices resulted in the dramatic increase in the data to be stored in the cloud backup services. Thus, these personal computing devices mainly rely on the cloud backup and restore services. The duplicates in the cloud environment introduce two major challenges of bandwidth and the storage space. Data deduplication is the ideal technique for reducing the bandwidth and storage space utilization. The proposed Genetic Algorithm based deduplication approach combines the application-based and file similarity function for supporting its functionality. The application-based scheme improves data deduplication efficiency by exploiting application awareness and reduces backup window. Read More...
|
Computer Science and Engineering |
India |
336-339 |
80 |
Analysis and Minimization of THD by 7L- Neutral Point Clamped Converter and Its Modulation Strategy
-Avinash Kumar Dewangan ; Mithlesh Gautam
This thesis aims to extend the knowledge about the performance of multilevel inverter through harmonic analysis. Large electric drives and utility applications require advanced power electronics converter to meet the high power demands. As a result, multilevel power converter structure has been introduced as an alternative in high power and medium voltage situations. A multilevel converter not only achieves high power ratings, but also improves the performance of the whole system in terms of harmonics, dv/dt stresses, and stresses in the bearings of a motor. Several multilevel converter topologies have been developed; i) diode clamped, ii) flying capacitors, and cascaded or H-bridge. Referring to the literature reviews, the cascaded multilevel inverter (CMI) with separated DC sources is clearly the most feasible topology for use as a power converter for medium & high power applications due to their modularization and extensibility. The H-bridge inverter eliminates the excessively large number of (i) bulky transformers required by conventional multilevel inverters, (ii) clamping diodes required by multilevel diode-clamped inverters, , and (iii) flying capacitors required by multilevel flying-capacitor inverter. As a preliminary study the thesis examined and compared the most common multilevel topologies found in the published literature. Starting from the essential requirements, the different approaches to the construction of multilevel inverter are explained and compared. In particular, aspects of total harmonic distortion (THD) and modulation which are required or desirable for multilevel converters are discussed. Sine-triangle carrier modulation is identified as the most promising technique to pursue for both technical and pedagogical reasons. Since multilevel inverter is considered to be suitable for medium & high power applications, the thesis examined & compared the harmonic analysis of 7-level multilevel inverter through analysis and simulation. Read More...
|
POWER ELECTRONICS |
India |
340-343 |
81 |
Text Analytics: The Convergence of Big Data and Artificial Intelligence
-Swapnil Sunil Chopade ; Aishwarya C. Chowdhari; Siddhi S. Chorghe; Ashwini D. Padekar
The analysis of the text content in emails, tweets, SMS, blogs, forums and other forms of textual communication is called text analytics. Text analytics is applicable to most industries: it can help analyse millions of emails, using text analytics we can analyse customer's comments and questions in forums, we can perform sentiment analysis using text analytics by measuring positive or negative perceptions of a company, brand, or product. Text Analytics has also been called text mining, and is a subcategory of the Natural Language Processing (NLP) field, which is one of the founding branches of Artificial Intelligence, back in the 1950s, when an interest in understanding text originally developed. Currently Text Analytics is often considered as the next step in Big Data analysis. Text Analytics has a number of subdivisions: Information Extraction, Semantic Web annotated domain's representation, Named Entity Recognition, and many more. Several techniques are currently used and some of them have gained a lot of attention, such as Machine Learning, to show a semi supervised enhancement of systems, but they also present a number of limitations which make them not always the only or the best choice. We conclude with current and near future applications of Text Analytics. Read More...
|
Computer Engineering |
India |
344-347 |
82 |
Brief Survey on Persuading Data Security and Privacy Issues in Cloud Computing
-Safeena. C ; VR. Nagarajan
A few years ago, the company's information will be stored generally on their own servers in the organizations' data center and the more confidential data is separated and stored in the individual servers. Currently, the concept of virtualization and cloud is established where the information stays physically in their own infrastructure but it is administered by another entity. Cloud computing is anticipated as the growing architecture to transfer the information to the cloud, since the data is growing high and data needs to be approachable from the outside device. The cloud storage is preferred due to the reduction in cost and the emerging agile business environment. Still there are many complications in storing the data in the cloud beginning from the virtual device that acts as the medium for resource sharing and the cloud storage extremity. This happen because the infrastructure and resource computation owned and administered by the external party and the cloud storage is termed as unscrupulous in providing authentication. Hence there is a need to provide security to the data stored in the cloud by contributing the services like data confidentiality, authentication and integrity. The survey is to analyze the risks involved in storing the data in cloud and the risks can be minimized by offering the solutions to provide authentication and authorization. Read More...
|
Computer Science |
India |
348-351 |
83 |
A Flexible Thresholding Based Image Edge Detection with High Resolution: A Review
-Megha Khare ; Prof. M. P. Parsai
Edge detection s one of the important parameter of image processing it basically help with preserving the image quality when image is either interpolating (enhance pixels) or decimating (compression/reduce pixels), if edges are clear and detected it can be preserve and if not the output image after image processing will not be a good quality image and image processing is in use almost in every area like Modern communication, Medical image processing, Mobile phones, graphics card etc. From the above discussion it is been clear that edge detection is one of the critical part of image processing but the question arise here is that the available methods are good or improvements required, answer is yes there are methods of edge detection which works good but not for all type of images, some methods like Canny, Roberts and Prewitt, works better for the images having high intensity and high frequencies in other hand Sobel works better for low intensity and low frequency images. Proposed work has better solution which provides edge detection for the high and low frequency/ intensity images with modified Thresholding and combination of sobel and canny Edge detection. Feature extraction is a classic problem image processing. Edges are often detected using integer-order differential operators. Hence proposed edge detection method is working in frequency and time domain parallel. Read More...
|
Image processing |
India |
352-355 |
84 |
A Study on Water Sanitation and Hygiene [Wash] in Rural Area of Allahabad, Uttar Pradesh, India
-Dr. Ratnesh Kumar ; Dr. Akanksha Sing; Dr. Neena Gupta; Dr. Ashish Jain; Dr. Ram Nivash Kushwaha
Background: Adequate drinking water, sanitation and hygiene are all essential ingredients to ensure health. Most often related to unsafe drinking water, poor sanitation and inadequate hygiene causes Diarrhea and leads to death among children under five. It kills more children than Malaria or HIV/AIDS.
Objective: To determine Knowledge of Hygiene and Sanitation among respondents.
Methods: A community based descriptive study was conducted among 305 respondents from 6 villages of Allahabad from February to March 2018 systematic random sampling method was adopted to choose the respondents above 18 year. The data were collected using a pretested semi-structured interview schedule, through the house to house visits.
Results: Half (50%) of the respondents were farmer whereas 27.5% had business, 19.3% were labourer in occupation and 3.3% were unemployed. 97.7% of the respondents were not treating drinking and cooking water. 2.3% of the respondents filter water use for drinking and cooking. 6.6% of the respondents used soap for hand wash before eating, 5.6% before cooking, 85% after toilet and 2.2% after feeding.
Conclusion: The study reveals that knowledge and practice about Water Sanitation and hygiene was limited among rural population in Allahabad. Read More...
|
MASTER OF PUBLIC HEALTH |
India |
356-358 |
85 |
A Brief Empirical Survey on Test Case Prioritization Techniques in Regression Testing
-Binoop Kumar C A ; A. Venugopal
Software testing plays the most significant mechanism in improving the software system's quality. The software can be modified and validated by analyzing the new faults that gets evolved in the preceding tested code. Prior to the implementation phase, the early identification of faults, anomalies and bugs are detected and finally the software is moved to the maintenance stage. The anomalies can be effectively identified by the usage of accurate methodology. Here, regression testing is one of the most important methodologies in software testing. Any enhancement or updation can be implemented on the software and the changes do not have impact on remaining sections of the software because the test cases present in the regression testing are prioritized to reprocess the already available and new test cases in regression testing. The approaches available in test case prioritization are used to organize the test cases to maximize the effectiveness to attain their performance. The performance measure is the fault identification rate i.e. the rate of quickly analyzing the faults during the testing phase and enhanced fault identification rate imparts feedback quickly. Previous reports have proved that the test prioritization efficiently improves the fault detection rate. But there arises few questions related to the reports: a) Will the prioritization techniques are effective at target specified versions? b) What is the exact trade-off value that occurs between coarse and fine granularity techniques? c) Can the effectiveness get improved by collaborating the fault proneness measures into prioritization mechanisms? To answer the above statements, several methods are analyzed to improve the overall fault detection test suite rate and small improvements are performed by both fine and coarse granularity. This survey brings some of the effective measures in accosting the above questions. Read More...
|
Computer Science |
India |
359-363 |
86 |
Reduction in Stress and Deformation in Rectangular Slab by using NBD Fibre Strips Instead of CFRP
-Mrs. Ruchika Sharma ; Prof. Tapeshwar Kalra
Slabs, A shallow i.e. having depth very less to other dimensions reinforced-concrete structural member that is very wide compared to depth spanning between beams, girders & columns. Concrete slabs are widely used for floors, roofs & bridge decks. When a slab is supported on four sides with reinforcing bars is called a two-way slab. Those slabs are generally designed by empirical methods. This is a fine & cost effective structural system. The slab will deflect in both directions, and the loads on the slab are transferred to all supports. There are different types of two-way slabs. The two way slabs are further divided to 3 different systems: flat plates, flat slabs, & two-way beam-supported slabs. The simplest type of two-way slab is known as a flat plate. This type of slabs is supported directly by the columns. Column spacing typically ranges from 15 to 25 ft with minimum slab thicknesses of 0.5 to 0.83 ft for live loads of about 2.5 kPa. Drop panels are added at the columns for longer spans. These types are known as a flat slab and have an economical span range of 25 to 30 ft with minimum slab thicknesses of 0.70 to 0.83 ft. In this report a Rectangular slab is modeled using a 3D modeling software called SOLIDWORKS. Computer based analysis software called ANSYS is used to perform the deformation tests of various Rectangular slabs with or without openings. The 3D model of the Rectangular slabs is imported to ANSYS software to carry out the Finite Element modeling. Meshing is done using ANSYS software. Also change the CFRP strips material with NBD material to reduce the cost of the product. Because of the cost of NBD material is very less as compared to the CFRP material. And also drop in stress and deformation in the RC slab. Read More...
|
Civil Engineering |
India |
364-369 |
87 |
CP_ABE with Cloud Revocation
-P Pravallika ; K Sekar
Cipher text-strategy quality based encryption (CP-ABE) is broadly utilized as a part of numerous digital physical frameworks and the Internet of Things for ensuring data security. Keeping in mind the end goal to enhance the execution and efficiency of CP-ABE, this paper rolls out an improvement to the entrance structure of portraying access polices in CP-ABE, and presents another CP-ABE framework in view of the arranged double choice graph (OBDD). The new framework makes full utilization of both the ground-breaking depiction capacity and the high computing efficiency of OBDD. To start with, in the entrance structure, the new framework permits various events of a similar property in a technique, underpins both positive characteristic and negative trait in the portrayal of access polices, and can depict freestyle get to polices by utilizing Boolean activities. Second, in the key age arrange, the extent of mystery keys produced by the new framework is steady and not influenced by the quantity of properties; moreover, time many-sided quality of the key age calculation is O(1). Third, in the encryption arrange, both the time many-sided quality of the encryption calculation and the measure of produced cipher text are dictated by the quantity of legitimate ways contained in the OBDD rather than the quantity of characteristics happening in get to polices. At long last, in the unscrambling stage, the new framework bolsters quick decoding and the time many-sided quality of the decoding calculation is just O(1). Thus, contrasted and existing CP-ABE plans, the new framework has better execution and efficiency. It is demonstrated that the new CP-ABE framework can likewise oppose impact assault and picked plaintext assault under the decisional bilinear Define Hellman supposition. Read More...
|
M.Tech in Computer Science And Engineering |
India |
370-371 |
88 |
Strong Semi Continuity in Topological Spaces
-P. Chandramoorthi
In this paper, we introduce and study strong semi continuity in topological spaces. Read More...
|
MATHEMATICS |
India |
372-376 |
89 |
Virtual Cement Concreting
-Mr. Anirudh Dubal
Concrete has proved to be a most versatile material of construction. Although the technology of concrete has advanced during the nineteenth and twentieth centuries, empiricism continues to prevail in this field. If concrete construction and performance have to be predictable, this can come only from very intensive and extensive application of theoretical and numerical techniques to concrete science. In this paper the recent work done in the sphere of computer simulation models is highlighted. Read More...
|
Civil Engineering |
India |
377-381 |
90 |
K-Medoid Algorithm to Forcast the Lake Level
-Priyanka Dey ; Avinash Dhole
The shifting of water level in the lake creates fluctuation that results in the in balance of water label from its base level. The people who are leaving in the bank of these lakes remains in danger since the label of the lake increases or decreases and once it cross its upper limit it will create disaster. The basis of Remote sensing method there are various system has been designed to forecast this variation of water in the lakes. So it becomes very much important or it is a biggest challenge in order to identify the lake level so that disaster can we avoid. In this method we have designed an algorithm in MATLAB to detect the lake level so that the above-mentioned problem can overcome. Read More...
|
Software Engineering |
India |
382-385 |
91 |
Autonomous Car using end to end Deep Learning
-Babysyla. L ; Shijo George
A Autonomous car (also known as self-driving car, or driverless car) has the capability to sense about its environment and navigating without human decision. Self-driving cars are the next generation technology which promise road safety. Implementing a self-driving car is difficult which includes many parts. Some of them are traffic light identification and classification, MPC controller, Path planning, behavioral cloning, vehicle detection and distance calculation, PID controller, object detection and identification, lane finding. The first and most important part is the behavioral cloning part which can be implemented by using CNN (Convolutional Neural Network) nvidia end to end deep learning model, widely used model for behavioral cloning. In this paper we have explained how to implement an autonomous car using the end to end deep learning model on simulators and real world games. Read More...
|
Computer Science and Engineering |
India |
386-389 |
92 |
Feature Selection and Classification on Human Activity Recognition using Machine Learning Approaches
-Macha Sai Saran ; Nori Siva Kiran; B. Saritha
Human Activity Recognition (HAR) is a well-researched area that aims to recognize the activity performed by a person. But the practical applications often encounter complications such as “The curse of dimensionality†and “Redundant features†which results in their poor performance. Hence, the need for feature selection is very imperative in such cases. This paper aims at identifying the subsets of HAR dataset that consists of most important and relevant features using Boruta Feature Selection Algorithm. Because the dataset with less number of features that are more relevant requires less computational time to train the classifier and it also improves the accuracy rate of the classification model. Upon identification, this paper also implements Support Vector Machines (SVMs) classification algorithm on identified subsets as well as HAR dataset. Furthermore, comparing the accuracy rates attained by the classifier on different subsets as well as their computational time. Read More...
|
Computer Science |
India |
390-393 |
93 |
Study on Blue Brain
-Vishnu Priya. S ; Karunya. C; Ramkumar; Hemand Kumar. D
The Blue Brain is an attempt to reverse engineer the human brain and recreate it at the cellular level inside a computer simulation. The project was founded in May 2005 by Henry Markram at the EPFL in Lausanne, Switzerland. Goals of the project are to gain a complete understanding of the brain and to enable better and faster development of brain disease treatments. The research involves studying slices of living brain tissue using microscopes and patch clamp electrodes. Data is collected about all the many different neuron types. This data is used to build biologically realistic models of neurons and networks of neurons in the cerebral cortex. The simulations are carried out on a Blue Gene supercomputer built by IBM. Hence the name "Blue Brain". The simulation software is based around Michael Hines's NEURON, together with other custom-built components. As of August 2012 the largest simulations are of mesocircuits containing around 100 cortical columns (image above right). Such simulations involve approximately 1 million neurons and 1 billion synapses. This is about the same scale as that of a honey bee brain. It is hoped that a rat brain neocortical simulation (~21 million neurons) will be achieved by the end of 2014. A full human brain simulation (86 billion neurons) should be possible by 2023 provided sufficient funding is received. Read More...
|
Computer Science and Information Technology |
India |
394-396 |
94 |
Three Level Security System using Color QR Code
-Waseem Sultan ; Dr. Kiran Bhandari
In this system three levels of security are added in which most of the attacks are not possible to do because of strong technology. In this system two important tabs are provided the first one is registration and the second login. In the first level the system represents the Text Based authentication by which user can choose any text password which plays a part in third level of security this text password can be any type of password. In second level image based authentication is provided in which user have to select one set from two different difficult set and in this two sets three level grids are represented and user has to select one image from each grid. Now after completion of these two levels we are having Colour QR Code level in this level QR code is generated on the basis of our provided information in previous two levels. In third level as QR Code is generated user has to scan this code with mobile phone app QR Code Scanner now this scan provides a code and we have to enter this code into the third level and after entering correct code we are forwarded to the successful login and registration. Once you have registered yourselves in the system then system take very less time for the login process. Read More...
|
Information Technology |
India |
397-400 |
95 |
A Naive Bayes Approach for Word Prediction using NLP
-Vivek Chandrakar ; Virendra Swarnkar; Suman Kumar Swarnkar
Word prediction is a very important natural language processing downside during which we would like to predict the proper word in an exceedingly given context. Word completion utilities, prophetical text entry systems, writing aids, and language translation square measure a number of common word prediction applications. This paper presents a brand-new word prediction approach supported context options and machine learning. The planned technique casts the matter as a learning-classification task by coaching word predictors with extremely discriminating options designated by numerous feature choice techniques. The contribution of this work lies within the new approach of presenting this downside, and also the distinctive combination of a prime performing artist in machine learning, svm, with numerous feature choice techniques MI, X2, and more. The tactic is enforced and evaluated victimization many datasets. The experimental results show clearly that the tactic is effective in predicting the proper words by utilizing little contexts. The system achieved spectacular results, compared with similar work; the accuracy in some experiments approaches ninety-one correct predictions. Read More...
|
Computer Engineering |
India |
401-407 |
96 |
Stock Market Prediction using RFR, DTR & SVR
-Ravikant ; Suman Kumar Swarnkar; L. P. Bhaiya
Stock market or equity market have a profound impact in today's economy. An increase or fall within the share worth has a very important role in deciding the investor's gain. the prevailing foretelling strategies build use of each regression (AR, MA, ARIMA) and non-linear algorithms (ARCH, GARCH, Neural Networks), but they concentrate on predicting the indicator movement or worth foretelling for one company victimization the daily price. The planned methodology could be a model freelance approach. Here we have a tendency to don't seem to be fitting the info to a particular model, rather we have a tendency to be distinguishing the latent dynamics existing within the information victimization deep learning architectures. During this work we have a tendency to use 3 totally different deep learning architectures for the value prediction of firms and compares their performance. We have a tendency to be applying a window approach for predicting future values on a brief term basis. The performance of the models were quantified victimization proportion error. Read More...
|
Artificial intelligence |
India |
408-412 |
97 |
Survey on Techniques of Stock Market Forecasting
-Aayush Shah ; Harmit Sampat; Shail Vira; Nikita Raut
Stock market prediction has been always a centre of attraction from people working in financial domain, over the years there has been a lot of forecasting made through regression, Machine learning algorithms, sentimental analysis etc. We have studied how these methods have been efficient and accurate in forecasting the stock prices, all the methods that have been studied have different methodology and feature selection however it is mutually agreed upon that the stock prices depend on a lot of features and all of them can never be truly accounted for however the models have been quite successful in forecasting the stock market upto a great extent which is helping the people who are working in the financial domain. Read More...
|
Computer Engineering |
India |
413-418 |
98 |
Bending Strength Analysis of Involutes Spur Gears with Asymmetric Profile
-Jayant Koshta ; Anshul Choudhary
Analysis estimating the variation of most bending stress and make contact with magnitude relation reckoning on tooth range and pressure angle of the drive facet, has been developed for uneven drives. The bending stress analyses are performed with the help of FEM for uneven and bilaterally symmetrical tooth. The strain results obtained by FEM analyses and calculable by the developed program are compared. It's been proved that uneven teeth have higher performance than each bilaterally symmetrical tooth it's been confirmed that, because the pressure angle on the drive facet will increase, the bending stress decreases and also the bending load capability will increase. It's been seen that, whereas the worth of most bending stress is dynamical, the situation of most bending stress remains constant in finite component analysis. Read More...
|
M.E MECHANICAL ENGINEERING (DESIGN) |
India |
419-422 |
99 |
Use of Treated Waste Water for Concrete Mixing
-Vikram Sharad Chakor ; Prof. S. B. Kandekar
This work deals with the effect of different type of treated waste water on properties of strength of concrete such as compressive strength, tensile strength & flexural strength with respect to potable water. The waste water sample was collected from waste water treatment plant near Pimpri Chinchwad, Pune. Water samples were used as Primary Treated Waste water (PTWW), Secondary Treated Waste Water (STWW), Domestic Waste Water, Portable Waste Water (PWW) was analyzed for chemical properties in laboratory. In that the used of concrete mix as M30 and the potable water is fully replaced with the PTWW, STWW, Domestic Waste Water and Portable Water tests were carried out initial and final setting time, compressive strength, tensile and flexural strength compared with mix of M30 of potable water. The results indicate that the initial and final setting time was same as that of potable water and STWW but not for PTWW was be decreases and for the compressive strength will be increased in STWW and domestic water at long duration, for tensile and flexural strength will be same, there is no any improvement in Tensile and flexural strength by using STWW. Read More...
|
Structural Engineering |
India |
423-428 |
100 |
1-Bit Full Adder based on Novel Self-controllable Voltage Level Technique for Low Leakage Current
-Arman ; Paras Gupta
In this work many discharge reduction techniques is studied and analyzed, once that a specific discharge reduction technique is chosen. Hand-picked technique is Self-controllable Voltage Level (SVL) technique. This method is any improved to boost the system of CMOS VLSI circuit. A full adder is that the needed CMOS circuit whose discharge current reduction is decided with the assistance of self manageable voltage level technique. Any we are going to carry our project to cut back discharge current of 4-bit adder. We are going to use Microwind 3.1 and DSCH2 package to style the circuit for coming up with the layout of one-bit adder and 4-bit adder with self manageable voltage level technique. DSCH2 is employed for coming up with the circuit with AND, OR, NOR gates and additionally with transistors. Simulation results of 1-bit adder with improved self manageable voltage level technique are much better than the previous self manageable voltage level technique. Read More...
|
Electronics & Communication Engineering |
India |
429-432 |