No. |
Title and Author |
Area |
Country |
Page |
101 |
Protection of 3-Phase Induction Motor with Automatic Power Factor Corrector (APFC)
-Vijay Arjun Deshmukh ; Ishwar Govinda Dhawade; Snehal Kailas Sukhdeve; Pravin M. Sakharwade
The intrinsic aim of this paper is to protect an Induction motor (IM) against various culpability like Over voltage, Over current, under voltage, Single phasing. The Protection of motor from such faults is very essential, because faults can diminished its efficiency. IMs can be saved using some ingredients, such as timers, contactors, voltage, and current relays. We are using the microcontroller based circuit for capability detection and it will save the motor from sundry faults. The power demand is raising day by day as the industrial load is raising. In modern power network cater to a wide variety of electrical load and power electronics loads, which fabricate a varying power demand on the supply network and warp the network environment. It is request of automatic switching operation of the worthy capacitor depending upon the load fluctuations without manual peacemaking. It can be peel by using APFC network which can maintain consistently large factor nearer to unity. Majority of load are inductive in nature in industries. So they ingest reactive power which influence the generation of plant. To give this subsidiary power we entail to raise generation or raising KVA rating of transformer. Read More...
|
Electrical Engineering |
India |
391-392 |
102 |
Applying Map Reduction Technique for Privacy of Outsourced K-Means ++ Clustering
-R. Sarath Kumar Reddy ; J. S. Ananda Kumar
Get-together strategies have been exhaustively gotten in different veritable information examination applications, for example, client lead examination, made progressing, modernized terrible direct scene examination, and so on. With the effect {of information of learning of information} in the present huge information time, a fundamental case to deal with a social gathering completed liberal scale datasets is re-appropriating it to open cloud stages. This is by prudence of appropriated figuring offers time attempted association with execution assurances, and benefactors on in-house IT frameworks. Notwithstanding, as datasets utilized for get together may contain delicate data, e.g., understanding flourishing data, business information, and social information, and whatnot, especially re-appropriating those to open cloud servers unavoidably raise security concerns. In this paper, we propose a reasonable security saving K-means++ gathering plan that can be reasonably re-appropriated to cloud servers. Our plan favors cloud servers to perform pressing direct finished encoded datasets, while accomplishing measure up to computational fluctuated nature and precision white and bunch over decoded ones. We tend to in like course get much information concerning secure joining of Map lessen into our blueprint, which makes our game plan impressively fitting for passed on picking condition. Cautious security examination and numerical examination do the execution of our technique as for security and ability. Read More...
|
Software Engineering |
India |
393-397 |
103 |
Prescribing the Stock Market using Web Media
-J Lavanya ; R K Shivaranjani; N Sree Monisha; G Indumathi
Analyze the financial data for making a prediction in stock markets by using big data analytics and recommend the user investment in various category stock markets based on web media. Hadoop is a Java-based programming framework that supports the processing of large data sets in a Parallel and distributed computing environment. It makes use of the commodity hardware Hadoop is Highly Scalable and Fault Tolerant. Hadoop runs in the cluster and eliminates the use of a Supercomputer. Hadoop is used as a big data processing engine with a simple master- slave setup. In the stock market industry, predictive analytics plays a key role in providing data-driven decisions for managing the resources under an NSE and BSE. There are certain attributes that trigger redemption by investors are complex in nature to identify and analyze. Predicting redemption behavior requires a sophisticated platform that can capture multiple factors that affect redemption behavior. However, big data predictive analytics using advanced analytics platform can analyze these massive amounts of transaction data and other time trend variables at a macro level. This platform can investigate these factors for near real- time data and can provide highly accurate predictions for the redeeming investors in the future at an investor-level. Read More...
|
Computer Science and Engineering |
India |
398-400 |
104 |
A Case Study on Implementation of Total Quality Management Projects in Manufacturing Industry
-Shubham Tripathi ; Mr. Surjeet Singh Baghel
The objective of this study is the application of some important TQM tools and techniques subsequently study the tangible and intangible benefits gained through implementation of these tools. The finding shows that Rejection quantity level of NISSAN IMS reduced from 270 to 0. Productivity of RPS assembly line YAD model improves by increasing the production rate from 77% to 99 %. Rack housing rejection quantity level reduced from 25 to 0 and also some parameters like customer’s satisfaction and profits for the company increases. Read More...
|
Industrial Engineering |
India |
401-403 |
105 |
Caission Deep Foundation Stimulated Model
-Darshilkumar Natvarbhai Machhi ; Suresh C. Jain; Harshilsinh B. Matroja; Pintukumar L. Meena; Kashyap K. Patel
As development in the field on peak in recent years deep foundation is one of the field to explore. Specially, deep foundation from caisson is one of the most used construction practice for bridges and harbours for laying foundation in sea or river. Therefore, this research determine difficulties on site during sinking of caisson through reduced scale model made up of solid p.v.c material. Read More...
|
Civil Engineering |
India |
404-406 |
106 |
Three Level Security Password
-Ankitkumar Vaishya ; Ankitkumar Vaishya; Omkar Poojary; Shreyas Yadav; Manas Pandey
Authentication is one of the most important security service provided to system by the different authentication schemes or algorithms which must be provided so that only authorized persons can have right to use or handle that system and data related to that information system securely. Techniques used include token based, biometric based as well as knowledge based. Despite these, no single mechanism is efficient and effective to provide adequate security for computing resources such as programs, files, messages, printers, internet, etc. A 3 – level authentication is proposed in this paper that is more confidential for ensuring adequate security. Read More...
|
Computer Engineering |
India |
407-409 |
107 |
Review Paper on Electrical Vehicle
-Shete Sourabh Shital ; Prof. Godhade Sandip Sarjerao; Mr. Tarlekar Teli Avinash Shivaji; Mr. Kumbhar Soumitra Vilas; Mr. Pawar Digvijay Suresh
An electric rickshaw consists of a battery, an electric motor and a controller. The motor is powered by batteries by mistreatment the batteries voltage and changing it to mechanical energy. The controller regulates the energy flow to the electrical motor. An electric automotive stores its energy on board in batteries. These batteries can be plugged into an electrical outlet or charged by another source such as a gasoline engine, fuel cells or solar power. The two main kinds of electrical cars square measure all electrical and hybrid. All electrical cars run solely on batteries that square measure charged up by associate degree wall socket and square measure solely powered by the electrical motor. This project involves designing and construction "Electrical Vehicle" for garbage collection that would be economical, reliable and environment friendly. Read More...
|
Electrical Engineering |
India |
410-412 |
108 |
An Improved Design of Smart Alarm System for Hearing Impaired People using Arduino
-Dr. S. Gopiya Naik ; T. A. Sunil Raj; C. Jagan; T. Kanagavel; N. Krishna Prashant
About nine million people in the world are considered to be a hearing impaired people. Communications between hearing impaired peoples and a normal person have always been a challenging task. This lack of communication can be minimized or rectified by using suitable technologies. Thus developing such a technology which is connecting the hearing impaired people and normal people are necessary in this situation. This project work represents the design and construction of smart alarm system for hearing impaired people. The inconvenience caused to the people standing outside the door seeking for the response from the hearing impaired person who is inside. This system consists of Arduino Microcontroller for controlling all the operations. Vibration motor which is fitted as a smart band on hearing impaired person wrist which is used to notify the person is standing outside. Camera paired along with this system used to see and monitor the person standing outside. Along with this DC Gear motor coupled for automatic opening and closing of doors. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
413-415 |
109 |
Broadcasting Emergency Messages in VANET after an Emergency Event
-Sowmiya K ; Dhanalakshmi G; Kiruthihaa R; Swetha S
With the increasing traffic on the road, Vehicular Ad-Hoc Networks can help reduce traffic accidents by broadcasting emergency messages to vehicles in advance so that vehicles can take necessary precaution to avoid accidents. In VANET environment it is a difficult task to deliver messages to right vehicles without delivery latency. The previously proposed protocols have been used in VANET which causes various problems such as message latency while disemminating messages among vehicles as well as the messages not delivered to the right vehicles. We propose a new protocol which decreases delivery latency while broadcasting emergency messages. Read More...
|
Information Technology |
India |
416-417 |
110 |
Advance Protection of Three Phase Loads
-Ashish A Damahe ; Bhushan H Rahangdale; Nandkishor D Mohankar; Shital L Kamble
This Project tends to develop for protection of three phase induction motor from single phasing, phase reversal, over voltage and under voltage. Due to this electrical fault the winding of motor get heated which lead to insulation failure and thus reduce the life time of motor. This fault is generated in induction motor due to variation in induction motor parameters. When three phase induction motor runs continuously, it is necessary to protect the motor from these anticipated faults. Three phase induction motor generally directly connected through the supply, if the supply voltage has sag and swell due to fault the performance of motor is affected and in some cases winding is burned out. When phase sequence (RYB) is reversed due to wrong connection then motor start rotating in another direction, if supply system has only one phase and other phase is disconnected then it is single phasing problem. Read More...
|
Electrical Engineering |
India |
418-420 |
111 |
Fabrication of Automatic Pipe Cutting Machine
-Nitesh Baghele ; Archana Belkhede; Shubham Raut; Akshaykumar Gaidhane; Harshal Dongare
To reduce the human effort for repetitive work of cutter as well as providing fixture to support and hold the pipe during cutting Pipe cutting machine is one of the leading machines in the industry. Cutting machine is one of the principle machine in industry in the age automation , we need mass production in particular time period the feeding mechanism is used to feed the pipe while cutting. This mechanism is automatically operated in the AVR microcontroller. It is able to cut pipe and metal bar of different sizes of pipe and will be helpful in many industries due to its compatibility, reliability and efficiency. Read More...
|
Mechanical Engineering |
India |
421-422 |
112 |
Prediction of Lung Cancer Symptoms using Naive Bayes and J48 Classification Techniques
-Y. Hemalatha ; G. AnanthNath
Cancer is the disease which is most dangerous that leads to death for both men and women. Lung cancer is uncontrollable disease if they affect both lungs. Early diagnosis of lung cancer saves enormous life’s, failing which may lead to another severe problems causing sudden fatal end. The advance detection of cancer is not easier process but if it is detected, it is curable. We analyzed the lung cancer prediction using classification algorithm such as Naive Bayes and J48 algorithm. Initially 100 cancer and non-cancer patients’ data were collected pre-processed and analyzed using a classification algorithm for predicting lung cancer. The dataset have 100 instances and 25 attributes. The main aim of this paper is to provide the advance warning to the users and the performance analysis of the classification algorithms. By using classification algorithms Naïve Bayes and j48 .we are going to analyze the lung cancer. Here both cancer and non cancer patient details are collected for processing and analyzing the data which have different instances and attributes. Read More...
|
Software Engineering |
India |
423-427 |
113 |
Improving Trust Worthiness of Data Integrity Verification in C-MAC Algorithm
-C. Lochan Yadav ; Mr. J. S. Ananda Kumar
Many users store their data in the cloud storage and benefit from high quality applications and services from a common group of composition computing resources like networks, servers, storage, applications, and services, by these users can bypass the load of local data storage and protection. However, the fact that users no longer have physical control of the large size of data makes data trustworthiness protection in Cloud computing a challenging task, especially for users with constrained computing resources. Cloud computing is used by many software industries nowadays, since security is not provided in cloud, many organizations adopt their unique security structure. To improve the performance by making use of CMAC algorithm. The cloud must not command on user the responsibility to verify his/ her stored data. Taking this into consideration and relieve client form the overhead of data trustworthiness verification, we introduce an entity called the Third Party Auditor (TPA), which acts on behalf of client for data trustworthiness checking and send an alert to notify the status of the stored data. We further become the TPA to finish various assessing errands all the while and competently. In this paper, we are tying down the customer data and giving security by using CMAC Algorithm. We further become the TPA to finish various assessing errands all the while and competently. Wide-extent of security and execution examination exhibits the proposed plans is provably secure and significantly profitable. Read More...
|
Software Engineering |
India |
428-432 |
114 |
Graphical Password to Avoid Shoulder Surfing
-Mrs. Vrushali Sonar ; Harshada Shitole; Priyanka Chaure; Pradnya Thorat; Ashwini Gaikwad
The focused of this report is on Graphical password system & how can contribute to handle security problems that threaten authentication processes. Once such threat is shoulder surfing attacks which are also reviewed in this project. Computer security depends largely on passwords to authenticate the human user’s from attackers. The most common computer authentication method is to use alphanumerical usernames & passwords. However there are significant drawbacks of this method. For example passwords selected by user’s are easily guessed by attackers. On the other hand passwords which are difficult to remember. To overcome the problems of low security. Authentication method are developed by researchers that we used barcode image as password & also we avoid shoulder surfing using this method. In this paper we conduct a comprehensive survey of the existing graphical password techniques & provide a possible theory of our own. Read More...
|
Computer Engineering |
India |
434-436 |
115 |
Bhojnum
-Hemlata Shinde ; Aishwarya Gaikwad; Sakshi Ghume; Namrata Pawshe; Rutuja Shirame
Nowadays, several eating house are still victimization the standard manner of taking order services, as we are able to see that the waiter use a pen and a paper once takes the client order. This is often a coffee potency methodology, inconvenient and will contain mistakes. For instance, the waiter had lost his order of the day within the hustle or in another state of affairs, the waiter’s handwriting is difficult to grasp by the opposite folks, could that will cause the room additionally the secretary devastate the orders also may cause calculation errors. This situation if it happen usually, it should cause the client had tired of something to return once more and this may cause the massive impact for the eating house. By victimization eating house Ordering System victimization Mobile Application, it makes the ordering system additional potency and may facilitate the manager to avoid human error and enhance the business development during this system, the ordering group action could be a step by step model to create the group action additional systematic and also the system will guide the workers to avoid any order mistakes. Besides the potency service, by victimization this technique it will provides a higher quality service to client and it will attract additional customers to the eating house to induce this quality of services. This technique is victimization mobile application to require orders. The customer’s orders are sent to the room through the mobile device. The waiters do not have to travel to the room or bar department to relinquish the order as a result of the order lists are show to the department’s screen. The group action between the waiter additionally the eating house departments and also between waiter and also the cashier are systematic. Read More...
|
Computer Engineering |
India |
437-441 |
116 |
Designing Advanced College Network using Cisco Packet Tracer
-Prajyot Y. Kanojkar ; Vaishanavi R. Kapgate; Shubham S. Charde; Nikita N. Bhujade; Dipak B. khadse
The aim of this project was collage network design and implementation and the introduction of a suitable network for most college’s around the world with IOT devices implementation. This thesis/project includes advanced proposal for "College Network architecture", where in we have implemented some techniques like IOT device connectivity. The network design is without any references to the existing computer network being used in the college but we had made a case study to build it more reliable and upgraded. The upgraded network design in college model keeps in view services like
1) IOT device implementation and their connectivity
2) (ii)Wi-Fi enabled campus with restricted and secured access
3) Providing a high quality of service for the college’s network with ensuring internet on each desk by implementing dual ISP dynamic configuration.
The thesis/project also focuses on the problems in network connectivity and effectively implements new technologies that helps to reduce problem’s in existing network and also protocols as HSRP (Hot spot routing protocol), OSPF (Open shortest path first routing protocol) routing, use of DHCP (Dynamic host configuration protocol server). This project should be useful to Network Communications Engineers as it covers the major requirement that necessitates of a college network. The proposed network design uses simulator software Cisco Packet Tracer 5.1. Details of Cisco Packet Tracer 5.1 have also been provided in this thesis report. All the necessary networking basics and background information has also been provided for the sake of completeness in the Appendix section and non-experts can refer the same.
Read More...
|
Computer Science and Engineering |
India |
442-445 |
117 |
Development of Onion Grading Machine for Indian Food Agro Industries
-Rahul A. Lekurwale ; Prasad A. Hatwalne; Anil C. Gawande
In the economic development of India, agriculture sector plays a key role. For the proper price of any agriculture product, grading according to size is necessary. And it is also value adding technique to the product. To makes the product more attractive and improve its processing qualities uniformity in size is important. Grading according to the sizes is an important value adding technique for most agricultural products. At present, size grading of most agricultural products including lemon, garlic, onion, tomato, Orange, mandarin, apple are carried out manually by farmers, agents, whole sellers, retail sellers and customers also. Most of farmers market their products without any grading. Persons engaging in postharvest crop handling such as collectors, whole sellers, retail sellers, and farmers cannot use high technical and costly grading technique. And also by the local market survey it is found that retail market price of the fruits is significantly varied according to its size. Fruit grading by human is inefficient, labor intensive and error prone. The automated grading system not only time saving but also minimizes error. Improvement of quality and value addition of agricultural produces has gained higher concern in recent times. There is a great demand for fruits in both local and foreign markets. The study is carried out for the design of a machine which can be used to grade multiple fruits by making adjustments. Machine should be simple to use so it can be operated by any illiterate person also so that farmers can also use it. Read More...
|
Mechanical Engineering |
India |
446-447 |
118 |
One Touch Suite Services
-D.R.Prasath Krishnaa ; MARICHELVAM A; PRASANNA V; NANDHAKUMAR M
According to the hospital service survey in recent years, waiting time in hospitals, emergency admissions, etc., are extremely higher. It also increases the workload of doctors and medical professionals. Most of the hospitals fail to monitor the patient’s in a regular way. When the patient in need of service, the physician could not respond in time. Also, the information is hard to reach the physician. Most of the hospitals haven’t taken any report of the patients along with the physician details. If the physician doesn’t reach on time, the patient will be disappointed. In order to avoid these circumstances, we have come up with a solution. We have provided a switch, indicator light, and RFID reader to each room and monitor with Node-red GUI (Graphical User Interface) is connected to the physician cabin in the hospital. This paper reviews the current research and development of patient monitoring and emergency alerting. A variety of system implementations were compared and evaluated to identify the technical shortcomings in the present monitoring systems in the hospitals. The aim of this survey is to give direction for future research and developments. Read More...
|
Electronics & Communication Engineering |
India |
448-450 |
119 |
Experimental Investigation of Submerged Arc Welding on High Strength Low Alloy Steel (HSLA)
-Mohit Sharma ; Manmohan; Neeraj Kumar
Welding is a procedure of changeless joining two materials (normally metals) through confined mixture coming about because of an appropriate blend of temperature, weight and metallurgical conditions. Contingent on the mix of temperature and weight from a high temperature with no weight to a high weight with low temperature, a wide scope of welding forms has been created. There are numerous kinds of welding including Metal Arc, Submerged Arc, Resistance Butt, Flash, Spot, Seam and Projection. While there are numerous techniques for joining metals, welding is a standout amongst the most helpful and fast strategies 1available. SAW is fundamentally a circular segment welding process in which the curve is hidden by a cover of granular and fusible flux. Along these lines, physical properties of flux are critical contemplations in SAW for enhancing welding properties. Three parameters are taken into consideration for performing the welding these are: current(A), voltage(B) and flux(C). From above principle impact plot of dot width it might be inferred that ideal condition for dot width is A3 B1 C1 for example current 320 A, bend voltage 32 V and transition 1.It must be noticed that the above blend of factor levels A3 B1 C1 are not among the nine mixes tried for the investigation. This is normal in light of the multifaceted idea of the test configuration utilized (9 from 33=27 conceivable blends). Read More...
|
M.TECH in MANUFACTURING TECHNOLOGY |
India |
451-457 |
120 |
Drive Now, Text Later: Nonintrusive Texting while Driving Detection using Smartphones
-Ms. Pawar Darshana ; Ms. Yadav Pranjali; Ms.Inamdar Firdose; Ms. Bhange Sonam; Ms. Jadhav Manali
The system proposes a security system, named the Internal Intrusion Detection and Protection System (IIDPS for short) at system call level, which creates personal profiles for users to keep track of their usage habits as the forensic features. The IIDPS uses a local computational grid to detect malicious behaviors in a real-time manner the proposed work is regarded with Digital forensics technique and intrusion detection mechanism. The number of hacking incidents are increasing day by day as new technology rolls out. The system designed Intrusion Detection System (IDS) that implements predefined algorithms for identifying the attacks over a network. Therefore, in this project, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The system can identify users forensic features by analyzing the corresponding SCs to enhance the accuracy of attack detection, and able to port the IIDPS to a parallel system further shorten its detection response time. Read More...
|
Computer Science and Engineering |
India |
458-459 |
121 |
Offline Mobile Tracking
-Ms. Adsule Shrutee ; Mrs.Mahajan Prerna; Ms. Sushma Jadhav; Ms. P D Kusalkar
As per the reports of WHO, NCRB social government organization more than 35%Women all over the world are facing a lot of unethical physical and mental harassment in public places such as railway stations, bus stands, foot paths etc. so propose system is useful in such situations. Propose system offer mobile security feature that takes a picture of anyone who inputs a phone’s password incorrectly three times or more. Its intent is to help people with stolen phones grab a shot of the thief, perhaps to help phone owner. It works silently. The app uses the front-facing camera to snap a picture of the snoop and email it to you. There are many places like Hospitals, Petrol pumps, Universities, Corporate offices etc. where it is clearly mentioned, "KEEP YOUR MOBILE PHONES SILENT!!" Many times people forget to switch the mobile to the “Silent Mode†which is not feasible every time like in an important meeting, lectures etc. This application automatically changes user profile as per location. With the help of propose system user can get any contact from his/her mobile, user can start mobile data and track location by sending specific SMS. Plus point is user can access them from anywhere at any time. Read More...
|
Computer Science and Engineering |
India |
460-461 |
122 |
Smart Parking System for Smart City
-Mr. Dubey Rohhit ; Mrs. P S Ahuja; Ms.Sutar Harshada; Mr. Jain Aryan; Mr. Pataskar Nilesh
The research presents a novel cloud-based smart-parking system for vehicles in the cities where parking the car or vehicle is found as major problem. This paper introduces a Parking system that helps users automatically find a parking space which minimizes the waiting time at the least cost based on new performance metrics to calculate the user parking cost by considering the time of the parking time to park. The system takes the current location of user location, based on user’s current location system check the nearest available parking lot and suggest to users with cost of that parking lot. Once user confirms the parking lot for specific time that information will be update in the system. The analytical study demonstrates that the system can efficiently that increases the efficiency of the current smart-parking system and develops a network architecture based on the Internet-of Things. Read More...
|
Computer Science and Engineering |
India |
462-463 |
123 |
Dynamic Multi-Hop
-Mr. Amey Maskawadkar ; Mrs. Sukeshni Gawai; Mr. Onkar Naram; Mr. Samiksha More; Mr. Akshata Botre
Multi-hop routin is where cluster heads close to the base station functionaries as intermediate nodes for father cluster heads to relay the data packet from regular nodes to base station. Building such a backbone requires efficient clustering algorithms which aggregate network nodes into logical groups, each group being managed by a cluster head and any two neighboring clusters being interconnected by at least one gateway node or gateway path. In this concept G-hop clustering refers to cluster structures where cluster members are at most G hops away from their cluster head. Where as the dynamicity of mobile wireless network is often considered as the biggest challenge, in this work we explicitly exploit node mobility in order to support cluster formation and maintenance of G-hop clusters. Many protocols have been emerged for facing the problem of energy consumption in the wireless sensor network (WSN). Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is one of those protocols, which achieves a lot of spreading though. In this paper, dynamic multi-hop technique (DMHT-LEACH) protocols have been proposed based on the LEACH protocol. Read More...
|
Computer Science and Engineering |
India |
464-465 |
124 |
Classroom Management System
-Ms. Mansi Dhake ; Mr. Nikhil Soniminde; Ms. Sakshi Pawale; Ms. Alisha Sonawane
As the name says the project is used to manage classroom based options like providing students with Questions Banks for Exams or posting the upcoming Syllabus for the Academic Year. The project will allow the Admin/Faculty member(s) to Sign Up and Login into their account and Upload the required Study material to their appropriate Classrooms. After Uploading the Data the Admin has an option to whether Log Out of the System or upload more Data, the admin can also keep track of the students who have/haven’t downloaded the study material. Student(s) have to create their account on the system once they Sign Up they can check for study materials posted by the faculty members and akso have an option to download it to their local System. Read More...
|
Computer Science and Engineering |
India |
466-467 |
125 |
Analysis of a High Rise Building Frame with Different Type of Slab Considering Seismic Forces with Lateral Load Resisting Members
-Himanshi Bais ; Rahul Satbhaiya
Continuous developments in new forms of buildings and ever increasing demands to create aesthetically good looking structures without affecting the strength and overall cost has led designers and engineers all over the world to innovate and adopt different type of structural systems in building and other structures. Flat slab and grid beam systems are two major type of structural system of Reinforced concrete buildings which provide the advantage of cost effectiveness and aesthetics without seriously affecting the strength and serviceability aspects of buildings. An important type of structural system which affects the overall stability and strength of building is floor system which is also termed as roof system or slab system. "Flat slab" is the term given to the floor system in which roof slab is rested directly on column and whole load on slab is transferred directly to columns. Since beams are not used in this system hence cost is definitely reduced. Nevertheless the strength of building is affected as slab is now affected by other kinds of stresses, punching shear in particular. In case of heavy loads, the shear stresses in slabs around column may become significant therefore various methods are used to enhance it is stiffness like increasing the thickness, providing drops and/or capitals etc. The obvious advantage of flat slab is aesthetic appeal. The system gives plane ceiling without any discontinuity of beams. This also leads to indirect cost cutting in case of reducting in form work and ease of construction. In present study, two type of floor systems - flat slab and grid slab are compared for an RC building. The comparison is done under the criteria of strengths, stability and cost effectiveness. The analysis of building structures is performed considering seismic zone V and medium soil type in Staad.pro software which is a popular structural analysis and design software. Read More...
|
Civil Engineering |
India |
468-471 |
126 |
Traffic Police Management using QR Code
-Ms. Kamble Sayali A ; Ms. Yadav Pranjali; Ms.Surwase Pooja A; Ms.Kamble Sayali A; Ms. Hidge Surbhi C
This project aims at implementing a vehicle document check system where databases and documents are
Retrieved by the traffic police by their smartphones and the physical documents are not needed to be carried along by saving time in document verification Initially we assign them unique identity numbers and scan their RC, Insurance, Emission paper, vehicle name, and number and store it in the database at the back end. Using the above information, we create a QR code and stick it on an irreplaceable part of the vehicle. At the front end we create an application with which traffic police can scan the QR code on his phone and all the details about the owner of the vehicle and all the documents earlier stored will be shown on the phone. We can make the driver’s license as unique identification if needed for the application query search in case scanner fails to work. In this project, Systems main focus is to no need to carry the documents of the vehicle for authorization and identification of the respective vehicles. Here, System Use QR code technique for the documentary purpose. In this system, the main actor is retailer, traffic police, department police. Through this actor our system become very helpful to user also and government also.
Read More...
|
Computer Science and Engineering |
India |
472-473 |
127 |
A Deadline Guaranteed Cloud Storage by Request Redirection Algorithm
-P. Bhargava Reddy ; C. Yamini
An ever increasing quantity of associations circulate their information and high-quality task handy to business allotted garage frameworks. Be that as it can, the multiplexing and sharing of the belongings in a allotted storage framework gift capricious records get to idleness to inhabitants, which might also make on line data critical applications helpless to meet their due date requirements. Therefore, it is far important for distributed garage frameworks to offer due date ensured administrations. In this paper, to meet a present sort of administration stage intention (SLO) that compels the level of each occupant s statistics get to needs neglecting to satisfy its required time constraint below a given restrict, we construct a scientific model to infer the top sure of good enough call for entry charge on each server. We at that factor propose a Deadline Guaranteed stockpiling management (called DGCloud) that fuses three important calculations. Its due date conscious burden adjusting plan diverts asks for and makes copies to discharge the overabundance heap of every server beyond the inferred upper sure. Its exquisite project at hand mixture calculation tries to maximally lessen servers even as as yet gratifying the SLO to reinforce the asset use. Its records situation enhancement calculation re-plans the information arrangement to restrict the transmission cost of statistics replication. We further advise three improve strategies to additionally improve the execution of DGCloud. An information ask for line improvement approach sets distinct needs to the data reactions in a server s line with the purpose that extra needs can fulfill the SLO prerequisite. Our comply with driven examinations in reenactment and Amazon EC2 reveal the foremost execution of DGCloud contrasted and beyond strategies as a long way as due date assurances and framework asset usage, and the viability of its man or woman calculations. Read More...
|
Software Engineering |
India |
474-477 |
128 |
Checking the Security of Data by Continuous Auditing and Providing Certificates
-DurgaDevi S ; Hemalatha D. S; Neranjana M; Mr. Raja R
Cloud computing has become an associate integral part of the IT infrastructure for several corporations worldwide. Security is one of the issues which reduces the growth of cloud computing and complications with data privacy and data protection. Cloud security auditing depends upon the surroundings, and also the rise of cloud computing is a crucial new context in world economics. Cloud service certificate from the cloud security alliance must have for those having a hacking background. Public cloud account compromises new attack vectors, causing 27% of organizations to have users whose accounts are potentially compromised. To prevent the file from attack, there is a need for continuous auditing and providing certificates regarding the security of the file. A file is uploaded and distributed to the cloud storage. A file is split into blocks based on Dynamic block generation algorithm. The MD5 algorithm is used to generate a signature for the particular file. Also, data gets encoded using the Base64 algorithm. Continuous auditing is done by allocating the audit time. File recovery is done by the verifier if the data gets corrupted during checking. Finally, a certificate is generated and grade is provided based on the security of the file. We also focus on the challenges and benefits of auditing the file on a cloud platform. Further on we find the advancement in the related previous technology and the gaps. Read More...
|
Computer Science and Engineering |
India |
478-482 |
129 |
Analysis the Causes and Impact of Defect in Building Construction
-Ms Amruta Vyankatesh Mundhe ; Dr. A. S. Pote
In countries like India, construction industry plays a significant part to develop the economy. But many time this construction industry is blamed for poor quality, delay in completion of work and losses gain during the project period. The rate of construction project accomplishment is weak because of the rapid increasing rate of major defects in building as a result of poor workmanship and poor quality materials which have been identified as the major cause of defects in the construction industry .Construction defects are very common and frequently arising in construction project, especially in the project which has poor workmanship, poor project management in the construction site. Construction defect can be known as major problem in the construction industry that could cause the value of building decreases. As the defect impact on time and cost overrun, identification of defect at early stage of construction makes easy to complete project in stipulated timing. This helps to avoid or minimize defect in future work. Numerous analytical or statistical methods are available for analyzing impacts and selection of proper method depends upon: statistical data, time limitation of method. This information further helps to fix responsibilities, penalties on various parties involved in construction. This data is also required for suggesting different selection of remedial measures for improving useful life of structure. The purpose of this study is to review various symptoms & causes of construction defects occurring in construction project. Identify the defect through questionnaire survey, interviews, also study the causes of defect of construction and impact of defect in construction project. finally in giving the conclusion, recommendation of defect in building construction. Read More...
|
M.E. (Construction Technology & Management) |
India |
483-484 |
130 |
Task Scheduling Approaches Based on Weighted Round Robin Algorithm in Cloud Environment
-S Noortaj ; Dr. K. Venkataramana
Cloud computing uses the concepts of scheduling and load balancing to move around tasks to underutilized VMs for effectively sharing the resources. The scheduling of the tasks in the cloud computing environment is an irrecoverable restraint and hence it has to be assigned to the most appropriate VMs at the initial placement itself. Practically, the arrived jobs consist of multiple tasks and they may execute the tasks in multiple VMs or in the same VM’s multiple cores. Also, the jobs arrive during the run time of the server in changeable random intervals under various load conditions. the Objective of this work is to introduce and evaluate the proposed scheduling and load balancing algorithm by allowing for the capability of each virtual machine (VM), the task length of each requested job, and the of multiple tasks. Read More...
|
Computer Applications |
India |
485-487 |
131 |
Scored Based Online Hostel Management System for Student
-Ms. Pranjali Yadav ; Ms. Shreya Kumari; Ms. Suruchi Kothare; Ms. Andreya Borgia; Mr. Aryan Jain
As the name says the project is used to manage hostel based options like providing students with required accommodation options based on their academic score for the past year. The project will allow the Students to create and login in to their account. After Logging in they will be provided with a list of Available Room Categories and Cost (per bed) for which they can apply and also set a category wise room preference. A special Admin/Warden account would enable him/her to check for the received requests for room allotments, later Admin can allot a room to the student based on the pupil s Academic records. Online Hostel Management System is software developed for managing various activities in the hostel. For the past few years the number of educational institutions is increasing rapidly. Thereby the number of hostels is also increasing for the accommodation of the students studying in this institution. And hence there is a lot of strain on the person who are running the hostel and software’s are not usually used in this context. This particular project deals with the problems on managing a hostel and avoids the problems which occur when carried manually. Identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible to the existing system with the system which is more user friendly and more website oriented. We can improve the efficiency of the system, thus overcome the drawbacks of the existing system. Read More...
|
Computer Engineering |
India |
488-489 |
132 |
Fingerprint Spoof Detection using of Minutiae-Centered Patches and Energy
-Ms. Tajane Prajakta ; Ms. Sukeshni Gawai; Ms. Nakhate Swapna; Ms. Kadlag Tejashree
The individuality of fingerprints is being used tremendously now a days, for a day today applications, ranging from unlocking a smartphone to every security device’s out there. While the major purpose of a fingerprint recognition system is to ensure a reliable and accurate user authentication, the security of the recognition system itself can be jeopardized by spoof attacks. This study addresses the problem of developing accurate and generalizable algorithms for detecting fingerprint spoof attacks. We propose a system which utilizing local patches extracted around fingerprint minutiae. The individuality of ï¬ngerprints is being used for a day-to-day applications, ranging from unlocking a smartphone to major military applications. While the primary purpose of a ï¬ngerprint recognition system is to ensure a reliable and accurate user authentication, the security of the recognition system itself can be jeopardized by spoof attacks. This study addresses the problem of developing accurate and generalizable algorithms for detecting ï¬ngerprint spoof attacks. Read More...
|
Computer Science and Engineering |
India |
490-491 |
133 |
An Experimental Study on Light Translucent Concrete by using Optical Fiber
-Akshay Anna Jadhav ; Mahesh Mohan Mane; Ganesh Vishwas Shewale; Mahavir Dilip Damakale; B. M. Mohite
This project deals with ligth translucent property of concrete by using optical fiber. This project study which not only includes aesthetical consideration but also the strengthening property of optical fiber in concrete by increasing the percentage of concrete from 1.5% to 2.5%. The study aims at producing the concrete specimens by optical fiber and comparing it with the conventional concrete. The concrete specimens were subjected to different tests such as compressive strength test, flexure strength test, and ligth translucent test etc. optical fiber are one which help for transmission of light through fiber. The concept of ligth translucent concrete. When it is used in ceiling or side wall, it is exposed to direct sun ligth which transmit the image but not completely transparent. In this paper the smart translucent concrete can be regarded as a green energy saving construction material. It is promising technology for field application in civil infrastructures. Read More...
|
Civil Engineering |
India |
492-494 |
134 |
Online Data Security for Secure Cloud Storage
-V. Bhavatharani ; S. Jaisudha; S. Kaavya; N. Indira
The capacity benefit given by cloud server is not completely trusted by clients. In an existing data are corrupted by the unauthenticated user with the help of the employees. Normally the data are securely handled by the organization but some employees sold their access specifiers to the hackers for money. Due to this issue, the data are not safe. We can use the advanced safe technology. The data are uploaded by the encryption format with video mode and the data are downloaded by the user with the help of face detection video mode when the data user accept the user request by the face detection video mode. Then the data are shared from one place to another. Here we are using the Encryption algorithm to share the data. Read More...
|
Computer Science and Engineering |
India |
495-497 |
135 |
Offline Management System using Wireless Routers
-Kamath Aswin P M ; Manoj Kumar D; Jaya Krishna Kumar R K; Gowtham K; Ayush Mishra
This project is to implement offline networking to a closed area using WIFI Routers. So, that user can interact or manipulate with multiple web applications without using Internet in a closed network. To implement a secure and reliable way of accessing services rendered by the organizations through a closed offline network. Read More...
|
Computer Science and Engineering |
India |
498-499 |
136 |
Child Monitoring Application
-Sravani C ; Mythily N; Swarnalatha V; Chitra R
These Days parents are worried about their children’s so they want a complete track of them and monitor them all the time, This is physically not possible so we introduce Safety Monitoring system which is helpful for monitoring or tracking the child and their activities from anywhere in the world. The major issue of child missing can be solved with the help of child tracking system as well as parents who need to keep a track of their every steps, this system plays a vital role. The android application utilizes GPS and communication administrations to find their tyke’s area. This application secretly retrieves all the Call Logs, Message Details, Contact list, browsing histories which includes YouTube search histories and accurate Location without the children’s permission or without their knowledge as this application runs is in background and the major advantage of this feature is, if child reboots the Mobile phone the background process starts as the reboot is complete, so the process is never ending. This application sends all the data from the child’s phone to the server and from the server to the parent’s phone in every 10 minutes interval. This application is divided into 2 Apps, one is for the parent where they can see all the activities of their children and other is the Child Part, where the child can only see a calculator while the data is been fetched in the background without child’s knowledge. Read More...
|
Computer Science and Engineering |
India |
500-504 |
137 |
Raspberry Pi Based Home Automation
-Gupta Rishi Chandrashekhar ; Archana Chaugule; Phatak Netra Latesh; Mamaniya Karan Navin; Rawal Narendra Prem
This IoT Application focuses on building a smart wireless home Automation system which controls and manages hardware devices accessed by the owner using IoT technology which includes Raspberry Pi and Android application as User Interface (UI).It allows to control number of home appliances simultaneously. User can use different mobile devices like Smartphone’s and tablets to operate the home appliances. Relay modules are used for current controlling and stability. This application also consists of IR sensor to detect intruder and provide appropriate alert. Read More...
|
Information Technology |
India |
505-507 |
138 |
Beacon Based SDR Communication System
-Sagar D. Barde ; P. J Suryawanshi
The Software defined radio (SDR) is an advanced type of radio communication that provide a more flexible design for the wireless and mobile industry. In this paper we are proposing methods which can increase the efficiency of SDR. The beacon, Multi transmitter and receiver, pipelining and parallel processing are some techniques used for enhancing the system. We are proposing a system that will improve power efficiency of SDR and will reduce delay of SDR using beacon based technique. Read More...
|
VLSI |
India |
508-510 |
139 |
Experimental Investigation of Gas Metal Arc Welding (GMAW) on 2.25 CR-1MO Steel
-Harender Kumar ; Neeraj Kumar; Manmohan
Welding is a procedure of changeless joining two materials (normally metals) through confined mixture coming about because of an appropriate blend of temperature, weight and metallurgical conditions. Contingent on the mix of temperature and weight from a high temperature with no weight to a high weight with low temperature, a wide scope of welding forms has been created. There are numerous kinds of welding including Metal Arc, Submerged Arc, Resistance Butt, Flash, Spot, Seam and Projection. While there are numerous techniques for joining metals, welding is a standout amongst the most helpful and fast strategies 1available. The gas metal circular segment welding (GMAW) process utilizes a strong wire terminal that is ceaselessly bolstered into the weld pool. The wire anode is devoured and turns into the filler metal. GMAW hardware is moderately low in expense. The low starting cost, the capacity to weld constantly, and the capacity to store weld metal quicker, settle on GMAW an alluring decision for welding. This chapter reveals every aspect of GMAW. It comprises all components of GMAW such as welding machine, shielding gases, filler/electrode wire and welding joint assembly of welding plates. V grooved butt joint will be filled with 1.6 mm electrode wire ( ER 90 BL-3) using ESAB AUTO K 400 welding machine. Specimen for various tests such as hardness, tensile, micro-structure, inclusion and gas absorption will be drawn from the butt welded joint as per specification. Read More...
|
M.TECH in MANUFACTURING TECHNOLOGY |
India |
511-517 |
140 |
Grain Separator
-Mr. R. Karthik Kumar ; Santhiya K; Subalakshmi R; Jai Pragadeesh I R
The abstract of our project deals about the grain separator. For separating the grains from straw or bundle, farmers mainly depend on heavier machine. These grain separators though available now are beyond the reach of the most due to their cost. These separators had a lot of maintenance issues and needed regular upkeep and will be applicable for those having a larger area, for which the farmers hesitate to buy the high cost grain separators. To reduce the problems faced by the farmers, we have proposed an idea. This is to help the farmers to separate the grains from straw or bundle. In this project, the grain separator is a low cost motorized machine for separating the grains without breaking the straw and capable of threshing moist crop as well. It consists of a cylindrical drum attached with a shaft and it is driven by a simple motor. When the machine is in on condition, the straw will be kept on the cylindrical drum and the grains will be separated from the straw. Moreover the separated grains can be sieved using the winnower. These separators are safer than the heavier machine. Another feature of the thresher is that it retains the complete straw and does not chop it. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
518-521 |
141 |
Social Media Security using Image Encryption
-Prof. S M Rampur ; Dhanshri D. Kadam; Akanksha B. Lull; Sandhya S. Mukare; Pooja R. Godse
Social Networks are becoming and integral part of people’s lives. Students are spending much time on social media and are considered the largest category that uses application. social networking became a source of intelligence for advanced persistent threats and cyber criminals have shifted their focus toward targeting social networks for their attacks. This indicates that the nature of the use of social networks becomes a means for such threats to be able to move easily from one user to another. The proposed multimedia image sharing system includes Key Generation Center, Data Owner, Data User, Data Storing Center system entities that helps to share image securely using CP-ABE scheme. Here, specifically focus is on sharing image in ".jpg" format. Read More...
|
Computer Science and Engineering |
India |
522-524 |
142 |
A Review of Hybrid Solar PV and Wind Energy System
-Saurabh Keshri ; Shinu Kundu; Srishti Bansal
In Today’s scenario, conventional energy are resources depleting rapidly as every work requires or needs energy. But energy resources are depleting whereas demands for energy is increasing therefore we are guided towards renewable energy resources namely solar energy, wind energy, nuclear energy and other renewables. Among these solar and wind plays a major role in generation of energy and almost everywhere can made available so our main focus is on solar and wind energy. In this paper we present a review of hybrid system of solar PV and wind as a substitute of conventional energy system for environment friendly power generation and sustainable development for future. Read More...
|
Electrical Engineering |
India |
525-528 |
143 |
Design of Rubber Dam
-Ms. Dounde P. R ; Mr. Suhail S. Tamboli; Ms. Amruta R. Koshti; Ms. Priyanka D. Salunkhe
Rubber dam is a relatively new type of hydraulic structure compared with steel sluice gate, weir, causeways, etc. which is made of high strength fabric adhering with rubber forming a rubber bag. The barrage, made of rubber, will be filled with air, so that it can be inflated or deflated as per requirement. The concept of rubber dam and its application in India has yet to develop to gain from its advantages, though the system has been used in great extent in countries like China, Australia and in Scandinavia. It is used in site specific cases where it may prove to be a very good alternative to costlier permanent structures. A rubber dam has many advantages, such as simple hydraulic structure, short construction time, perfect seismic performance, and low resistance to water flow in flood season etc. General description of system, various configuration and types, working principle and comparative analysis has been presented in this paper. Read More...
|
Civil Engineering |
India |
529-531 |
144 |
Implementation and Design of Chain Rule Protection over the Internet using OTP Based RSA
-M. Swathi ; Dr. K. VenkataRamana
The chain rule is a formula for computing the derivative of the composition of two or more functions since information could be an imperative asset that must be exchanged over the net, the wellbeing issue of this asset ought to be thought of truly. There region unit various ways are arranged by specialists; various them are upheld, similar to DES and AES. Regardless, one great figure technique known as past cushion (OTP) had been arranged. In this way, this paper arranged a route known as the RSA, to encipher a wide range of plaintexts before causing over the net to its goal, each in twofold mode and content mode. This approach is implemented bolstered the OTP build aside from that everyone intricacies of OTP are constrained over. To boot, the RSA recipe is that the chain rule security strategy wherever a plaintext ought to be part into a private square size before the mystery composing technique begins. Multifaceted validation, especially 2Factor Authentication (2FA) is most main stream to static passwords-just verification. Just once Passwords (OTPs) assume a critical job inside the development of 2FA conventions. Amid this paper, AN efficient OTP age equation, upheld RSA topic is referenced. Execution and machine issues related with the recipe are referenced. Read More...
|
Software Engineering |
India |
532-537 |
145 |
Maximum Utilization of Power from Solar PV under Partial Shading Condition using Luo Converter
-V. Surendar ; G. Poornima; S. Rohinth; M. C. Rahini
This project mainly aims in maximum utilization of power from solar panel array under the partial shading condition. However, the performance of the PV system gets affected by the environmental conditions such as change in solar radiation and temperature. When one(or many) of the module in a solar panel comes under the effect of shading(which can be due to trees, neighboring buildings, clouds and many more circumstances can be there), its voltage drops, so, it works as a load instead of working as a generator. If the solar array is subjected to shading condition, its output power level decreases. In order to utilize maximum of the power generated we have designed a Luo converter (a boost converter). Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
538-540 |
146 |
Identification of Duplicated Data by using Fixed Size Chunking Algorithm
-B. Vijay Kumar Naik ; Mrs C. Hemavathy
From the past few years, there has been a fast progress within the cloud and big data, with the increasing type of firms using the resources from the cloud, it is important for shielding the information from completely different users, that are exploitation centralized resources. Every second millions of information is being generated because of the use of various new technologies like IOT and device. So it is very troublesome to store and handle such great deal of data. Many enterprise organizations unit investment numerous money to store such huge data for backup and disaster recovery purpose. But ancient backup resolution does not provide any facility of preventing the system from storing duplicate data, that may increase the storage value and backup time that in turn decreases the system performance. Fixed size chunking algorithm in data De-duplication is that the resolution for such disadvantage. It is a replacement rising technique that eliminates the duplicate or redundant data and stores entirely distinctive copy of data. So it reduces the storage utilization and worth of maintaining redundant data. Read More...
|
Software Engineering |
India |
541-545 |
147 |
Block Cipher: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis
-Vijaysinh K. Jadeja ; Mr. Jignesh N. Solanki; Mr. Chirag R. Patel; Mr. Sohil A. Gadhiya; Mr. S. S. Parmar
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in time is one of the most interesting subjects in the security related communities. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides a fair comparison between three most common symmetric key cryptography algorithms: DES, AES, and Blowfish. Since main concern here is the performance of algorithms under different settings, the presented comparison takes into consideration the behaviour and the performance of the algorithm when different data loads are used. The comparison is made on the basis of these parameters: speed, block size, and key size. Simulation program is implemented using Java programming. Read More...
|
Computer Science and Information Technology |
India |
546-550 |
148 |
A Survey on Submerged Arc Welding (Saw)-Review
-Mohit Sharma ; Manmohan; Neeraj Kumar
Welding is a system of unchanging joining two materials (ordinarily metals) through kept blend coming about as a result of a suitable mix of temperature, weight and metallurgical conditions. Dependent upon the blend of temperature and weight from a high temperature with no weight to a high weight with low temperature, a wide extent of welding frames has been made. There are various sorts of welding including Metal Arc, Submerged Arc, Resistance Butt, Flash, Spot, Seam and Projection. While there are various systems for joining metals, welding is a champion among the most supportive and quick techniques 1available. SAW is in a general sense a round section welding process in which the bend is covered up by a front of granular and fusible motion. Thusly, physical properties of motion are basic examinations in SAW for upgrading welding properties. Read More...
|
M.TECH in MANUFACTURING TECHNOLOGY |
India |
551-557 |
149 |
The Literature Survey on Behavior of Asphalt Concrete Pavement using Steel Wool Fiber
-Neha Duryodhan ; Prof. Shahrukh Kureshi; Ashwini Jiwane; Rishi Dubey
The main purpose of this study is to provide waterproof and self heating concrete in pavement design. Asphalt concrete is a self heating concrete. In asphalt concrete, the steel fiber is assembled to make it electrically conductive and applicable for induction heating. The purpose of steel wool fiber added in asphalt concrete for improve its strength and fatigue characteristics during ductility. Cracking is one of the major problem occur on the pavement and it is directly affected to serviceability, strength, life span, quality of flexible pavement. When small amount of cracks occurs in the asphalt concrete pavement that time induction generator is used to heat the material to recover the cracks through the high temperature. During the summer season if the temperature is high, then there will be cracks start closing by themselves. It may be also promoted artificially through induction heating or by microwave heating. Performance of asphalt pavement must constantly be repaired to meet the demand of today’s transportation. Read More...
|
Civil Engineering |
India |
558-560 |
150 |
Influence of Glass Powder in Concrete
-Shubham G. Keshattiwar ; Vipul Rathod; Dhiraj Wankhede; Saurabh Kurrewar; Prof. Aishwarya Meshram
Disposal problem of waste material is becoming critical day by day. Millions tone of waste glass powder generated every year in world. In this topic, attempt has been made to utilize glass powder, which is waste of glass industry. The research work is determination of the effect of the use of Glass powder as a replacement of cement to assess the pozzolanic nature of fine glass powder when mixed in concrete and compare the difference in performance with other pozzolanic materials are mixed in concrete like silica flume and fly ash. The concrete in place of cement to some extent i.e., 10%, 20%, 30% and mechanical properties of M40 (Design Mix) are investigated. Cube specimen of 36 numbers were cast, cured and tested for 3, 7, and 28 days strength. Compression was conducted and the results were compared. The finding revealed an increase in compressive strength with the increase in the replacement of cement by Glass powder. To reduce the demand of cement, glass powder decreases the unit weight as well as the porosity as indicated by decrease in water absorption. It reduce the quantity of cement to be used in concrete. Also glass powder is proved to be economical and is considered as environmental friendly construction material. Read More...
|
Civil Engineering |
India |
561-566 |