IJSRET Volume 5 Issue 3, May-Jun-2019

Comment

Uncategorized

An Overview of Deep Q Learning
Authors:- Bhavesh Dhera, M. Mani Teja, G. Yashwanth Reddy

Abstract: – This paper gives a bird’s eye view of Reinforcement Learning, an area under Artificial Intelligence. It starts with the history of reinforcement learning and its traditional models then goes on to delve deeper into one of the modern algorithm called Deep Q-Learning. It is aimed at discussing the intuition behind Deep Q-Learning and ways to implement it. Also discussed are various aspects to overcome drawbacks of Q Learning.

A K- Nearest Neighbors’ based on Clustering for High Performances and High Volumes of the Data
Authors:- Vijayalakshmi. K, Associate Prof. Priya .M

Abstract: – A new classification method is presented which uses clustering techniques to augment the performance of K-Nearest Neighbour algorithm. This new method is called Nearest Cluster approach, [NC]. In this algorithm the neighbour samples are automatically determined using clustering techniques. After partitioning the train set, the labels of cluster centers are determined. For specifying the class label of a new test sample, the class label of the nearest cluster prototype is used. Computationally, the NC method of KNN is faster than the k-means with 2 times. Also the clustering techniques leads to find the best number of neighbours based on the nature of feature space. The proposed method is evaluated standard sales dataset. Experimental results show the excellent improvement both in accuracy and the time complexity in comparison with the KNN method. Many clustering algorithms have been developed to address the problem of very large data size as well as for high dimensional data. This algorithm have their own disadvantages but they are often impractical when the data is large in both aspects. The proposed system uses the KNN algorithm based clustering so the KNN queries can be evaluated with minimum seconds.

Virus-Detection Processors in Mobile Device Using an Adaptively Dividable Dual Port Bi-TCAM
Authors:- Asst. Prof. S. Mubeena, Asst. Prof. K. Vairaperumal

Abstract: – A Network security for mobile devices is in high demand because of the increasing virus count. Since mobile devices have limited CPU power, dedicated hardware is essential to provide sufficient virus detection performance. A TCAM-based virus-detection unit provides high throughput, but also challenges for low power and low cost. In this paper, an adaptively dividable dual-port BiTCAM (unifying binary and ternary CAMs) is used to achieve a high-throughput, low-power, and low-cost virus-detection processor for mobile devices. The dual-port BiTCAM is realized with the dual-port AND-type match-line scheme which is composed of dual-port dynamic AND gates. The dual-port designs reduce power consumption and increase storage efficiency due to shared storage spaces. In addition, the dividable BiTCAM provides high flexibility for regularly updating the virus-database. The BiTCAM achieves a 48% power reduction and a 40% transistor count reduction compared with the design using a conventional single-port TCAM.

Android Phone Protection System
Authors:- M. Tech. Scholar Shipra Joshi, Asst. Prof. Rahul Sharma

Abstract: – Today, everyone necessarily requires a smart phone. There are tremendous amount of possibilities and numerous scopes witnessed in different areas of the mobile world. With this rapid growth in mobile services the researchers are alarmed about the security threats and are working upon it by securing the infrastructures which support the online-interface and other distributed services. In this paper, we discuss about secure android application on android phone. The objective is to provide such services which can secure customers’ android devices. This data security methodology of cell phones is quite novel.

TFET Based DPA Resistant Secured Adiabatic Logics for Energy Efficient and Secure hardware
Authors:- Vrushali Gandla, Kasthuri Thilagam, Anil Srikanth

Abstract: – Adiabatic logic is one of the design techniques for designing energy- efficient hardware. Low-power mobile devices such as RFID tags and WSNs that employ cryptographic modules are susceptible to differential power analysis (DPA) attacks. The secret information stored in these hardware devices can be explored by side channel effects. A Secured Quasi-Adiabatic Logic (SQAL) has been proposed in designing Differential Power Analysis (DPA)-resistant and energy-efficient hardware. SQAL shows improvement over all other existing DPA resistant adiabatic logic in terms of energy dissipation and area-overhead. However, the drawback is, SQAL suffers from non-adiabatic energy loss during the evaluation of the outputs. To minimize the non-adiabatic loss, we propose a Symmetric Pass Gate Adiabatic Logic (SPGAL).To validate our proposed logic, we have evaluated the energy dissipation of the individual secure adiabatic logics; proposed CSSAL, secure adiabatic logic, symmetric adiabatic logic, 2N-2N2P. Furthermore, this work delves into the implementation of 2*2 multiplier operation using TFET at 0.3v. The bit parallel multiplier implemented using SPGAL saves up to 80% energy as compared to SQAL.

Reproductive Technology: A Doorway That Changes Women’s Live
Authors:- Research Scholar Mukesh Kanaujiya

Abstract: – Reproductive technology plays an important role in women’s life because, Infertility can be considered a health problem according to the World Health Organization’s broad definition of health – “Health is a state of complete physical, mental and social well-being and not merely the absence of disease or infirmity. Statistics show that almost Three million infants have been delivered using Assisted Reproductive Technology in the last 30 years, all over the world. Infertility in the global can have severe and interrelated social, economic, and health-related consequences for women. Infertility often produces a sense of isolation, resentment and anger which can lead to a vicious circle of cutting oneself off from social support networks: Infertile couples experience a difficult dilemma, particularly around holiday time or important family events. The infertile couple is caught in an emotional bind. They already feel isolated from most of the world. The new reproductive technologies provide a good basis for the study of changing perceptions of nature because the field to a large degree consists of stories of de-naturalisation and re-naturalisation. A very simple illustration is how the very term for these technologies over time has gradually shifted from artificial reproductive technologies (that is to say de-naturalisation) to assisted reproductive technologies (indicating a re-naturalisation). The latter term indicates that the intervention of medical technology is meant to restore the body to its natural state. This Paper aims to find out the importance of new reproductive technology and its impact on woman and society.

Stone Matrix Asphalt Based Flexible Pavement
Authors:-Asst. Prof. Shriram P Marathe, Sakshar S Huddar

Abstract: -stone matrix asphalt (sma) was originally developed in europe as an impervious/highly durable wearing surface for bridge decks. based on its performance history, split matrix asphalt began to be used as a surface layer for roadways carrying heavy truck traffic throughout Germany and other european countries. today, it is the pavement surface of choice where long-term performance and durability is needed. in this study various research works on sma have been reviewed, out of which, sma study using crmb-55 as binder, major influence of fibers on sma, the sma using different filler, properties of sma, use of carbon fiber and glass fiber, study of sma using coir fiber and pineapple fiber are investigated.

Inequality Concerning the Polar Derivative of a Polynomial
Authors:- Jahangeer Habibullah Ganai, Anjna Singh

Abstract: – For the present paper, we will give a correct proof of Lp-inequality concerning the polar derivative of a polynomial with restricted zeros. We will also extend Zygmund’s inequality to the polar derivative of a polynomial.

Experimental Investigation on Water Hyacinth Ash as a Supplementary Cementing Material
Authors:-Ashima Manoj, Aleena, Eldho Saju, Sujitha S

Abstract: – Concrete is an important construction material consists of cement, coarse aggregate, fine aggregate and water. Among these ingredients cement is the major constituent and it is one of the major producers of carbon dioxide into atmosphere while manufacturing cement. To reduce carbon dioxide emission cement is replaced as a supplementary cementing material by water hyacinth ash. Experimental investigations are done to evaluate the effect of water hyacinth ash in the replacement of cement. For this M30 grade of concrete is used. In which cement is replaced with water hyacinth ash by 0%, 5%, 10% and 15% by weight of cement and cast cubes and cylinders with varying proportion. And also study how it affects properties of concrete like workability, compressive strength and split tensile strength. The casted specimens are removed from the mould after 24 hours, cured and tested for 7, 14 and 28 days. The tested results are compared with ordinary concrete and water hyacinth ash replaced concrete. Finally evaluate the effect of water hyacinth ash on various strength properties of M30 concrete.

Eco-friendly concrete produced through alkali activation by Utilizing Industrial Wastes
Authors:- Asst. Prof. Shriram P Marathe, Prof. R Mithanthaya, Basaveshwara G V

Abstract: -The development of new, sustainable, low-CO2 construction materials is essential if the global construction industry is to reduce the environmental footprint of its activities, which is incurred particularly through the production of Portland cement. One type of non-Portland cement that is attracting in particular attention is based on alkali-aluminosilicate chemistry, including the class of binders that have become known as geopolymers. This review discusses the synthesis of alkali-activated binders from blast furnace slag, calcined clay (metakaolin), and fly ash, including analysis of the chemical reaction mechanisms and binder phase assemblages that control the early-age and hardened properties of these materials, in particular initial setting and long-term durability. Perspectives for future research developments are also explored and also discuss about the various investigations carried out on alkali activated (Geopolymer) concrete produced using industrial byproducts which otherwise considered as waste disposal products.

Energy Efficiency Reliability and Availability of Real Time Task in Cloud Based Environment
Authors:- B. Artinie, Asst. Prof. Dr. T. Nirmalraj

Abstract:-Green computing is the study of Designing, Manufacturing, Engineering and deposing of computing device in a way that reduces their environmental infects. Green computing also called as Green Technology is the environmentally responsible use of computers and related resources. Search practices include the implementation of Energy-Efficient central processing units (CPU), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (E-waste).In existing system they focus on the problem of energy consumption when providing fault tolerance. Xia et al focus to find out the scheduling solution for minimizing the network power consumption of down link C-RAN. Bertossi et al considers both backup over booking and deallocation to reduce system overhead. These works are designed for homogenous systems and not suitable for heterogeneous system. In our proposed system the work as been done on dynamic energy-efficient fault-tolerant scheduling for real time task. Both energy conservation and fault tolerant is considered while meeting the real time requirement. We first analyze the CPU schedulability of real time task and also find out the weather condition to reduce the energy consumption. Our work brings substantial improvement in energy efficiency and task guarantee ratio. Our proposed system shows excellent performance in energy consumption based on the CPU scheduling and weather condition.

EADP: Enhanced Authentication using Novel Dynamic Password
Authors:- Sarthak Gupta, Virat Singh Chauhan

Abstract:- In today’s modern age of Internet, gifted by technology, for verification of user, Password is used. Password is a collection of different characters exists in ASCII code (Text Based) or set of different control signal which is generated based on biological impression of human being (Biometrics). Existing work shows that both Text based password and Graphical password suffer socio-economic problems and internal security issues. By considering this issue, a new security method, Enhanced Authentication scheme using Dynamic Password (EDAP), has been proposed with two-fold; first fold uses Ratings (of Color or Alphabets) for user verification and the second fold uses mathematical matrix for dynamic password generation. In every login of session, user feeds new password, which is completely shielded from various attacks.

Sign Language Translator Using CNN Model
Authors:- Diniya A J, Arathi Remesh, Dona Jose, Jasmi Davis

Abstract:- As the web has developed it has become a place where people interact. They post opinions, modify and enhance each other’s contributions and share information.The problem we are investigating is sign language recognition through supervised feature learning. With the technological trend in man-machine interfaces and the machine intelligence, exploiting these powers has become a challenge in many fields. In particular, it was observed that the body gesture-based interactions of human to human and human to machine are rapidly increasing, especially in the area of sign language interpretation. Statistics strongly suggest that the population of deaf and mute people is on the rise and there is a need to train more people the American Sign Language (ASL) to bridge the gap. Furthermore, the electronic devices such as TVs, PCs, PDAs Robots, cameras, etc. are advanced and built toread users gestures and respond to their commands. Therefore, it is of a great interest to try to conduct research in this area and propose efficient and effective solutions for man-machine gesture-based interaction. Here we propose a system for the automatic recognition of American Sign Language gestures. A series of image and vector processing operations are used in order to transform a visual hand gesture into a spoken letter, display the text and convert the received voice back into text providing a two-way communication.

Reasons to Reduce Our Reliance upon Crude Oil Based Internal Combustion Engines
Authors:-Elavarasan G, Kannan M, Karthikeyan D

Abstract:- Crude Oil based Internal Combustion Engines (ICE) have taken the major role in our country’s transport, energy supply system and various appliances. This paper gives complete detail about not only our dependence upon the crude oil but also why we need to reduce the usage of it. Currently, there are more than 1.2 billion automobiles present in the road which are the basic sources of pollution that result in serious damage to the environment. It is noted that the certain harmful gases were formed as a by-product due to the variation in the engine combustion process and were released to the atmosphere through the exhaust pipe which causes serious effect to the human health; they were Hydrocarbons (HC), Nitrogen Oxides (NO), Carbon monoxide (CO) & Particulate Matter (PM).This paper also gives the complete situation about the crude oil energy scenario in India and the disadvantages of using it.

Seismic irregularity: A validation on the regularity index of tall structure
Authors:- M. Tech. Scholar Aakash Verma, Asst. Prof. Suhail Qureshi

Abstract:- As there is an economic boom there is an increasing demand for infrastructure in order to accommodate the requirement. As this will lead to high demand for all structures with multiple housing units that is not only spacious but also visually appealing. This leads to the various kinds of irregularity that has been prescribed in IS 1893 and these various irregularities forces the building to deviate from their expected behavior. The aim of this paper is to review the previous works on the irregularity of structure and the various indexes that can be helpful to the standardization of the behavior the structure because of seismic activity.

Design and Fabrication of Hydraulic and Mechanical Crane Lift
Authors:- S. Santhosh Kumar

Abstract:- A Simple hydraulic – mechanical Movable crane is necessary mobile equipment for lifting and moving heavy loads used in small scale manufacturing and production industries. Due to the growing of small scale industry based on the current policy of the Government, the demand of load lifting equipments has increased. To deal with such a challenge, we have come up with the brilliant concept of designing and manufacturing a simple and affordable mobile floor crane which we hope will solve the problem of lifting equipments and minimizing manufacturing costs by reducing manpower. The idea of designing and manufacturing a hydraulic-mechanical movable floor crane was best concept among the three major concepts that were initially generated. The manufacturing of the product will involve fabrication works by using hollow section steel materials. Some other parts like tires, hydraulic Jack and motors fitted in the hollow section structure.

5 Pen Pc Technology
Authors:- Krithika. S

Abstract:- The 5 pen pc technology is under developing stage which includes five functions in a single object. It consists of cpu pen, communication pen, led projector, digital camera, virtual keyboard. It was first designed by TOUR ICHIHASH and was created by Japanese company NEC and the corporation and they displayed a conceptual of 30,000 dollars prototype of p-ISM. It is connected with one and another with wireless technology and as a whole it is connect to the cellular data or internet through mobile phones.

Rheological Study of Performance Enhancement of Ubakala Clay for Use as Drilling Mud
Authors:- Alison F.N., Nwanekezie, M.N., Osoka, E.C

Abstract:- This work studied the performance enhancement of Ubakala clay for use as drilling mud. A sample of Ubakala clay was used for this research. The clay sample was collected, processed and beneficiated with varying concentrations of soda ash (0-6wt %). Experiments were conducted to determine the viscosities of the control and clay-soda ash mixture at different curing time intervals (0-8hours), temperatures (30OC-90OC) and speed of agitation (200rpm-600rpm). Response surface methodology, with the aid of MATLAB statistical toolbox was used to perform a statistical study and optimization of the data obtained from the study. The MATLAB curve-fitting toolbox was also used to determine the rheological model that best fit the beneficiated clay and its control. The result revealed that soda ash concentrations, temperature, curing time and their interactions terms are significant variables in the statistical model with temperature being the most significant term, while time is the least significant term. The rheological study of the process showed that the Bingham plastic model appropriately described the performance of the clay samples as it gave the best fit for most of the samples (71.67%) studied, based on the value of the adjusted R2. The graphical representation of the control showed a decreasing rate in viscosity within the required range of speed of agitation unlike those of the clay soda ash mixture. Further work on Bingham model shows that an optimum predictive value of yield stress occurs for a curing time of 8hours, temperature of 900C and soda ash concentration of 5.183wt% are the operating parameters for enhancing the performance of Ubakala clay sample for use as a drilling mud.

A Review Rumors Detection on Twitter Using Machine Learning Techniques
Authors:- M. Tech. Scholar Monu Waskale, Prof. Pritesh Jain

Abstract:- In this period, web based life stage are progressively utilized by individuals to pursue newsworthy occasions since it is quick, simple to get to and modest similarly. In spite of the expanding utilization of web based life for data and news assembling, its tendency prompts the development and spread of gossipy tidbits i.e., data that are unconfirmed at the season of posting, which may makes genuine harm government, markets and society. Along these lines, there is need of compelling framework for distinguishing bits of gossip as ahead of schedule as conceivable before they generally spread. Viable framework should comprise of four parts: Rumor location, gossip following, position grouping, and veracity arrangement. Loads of work has been done in later segment while less work in segment talk identification. In this way, presently we should take a shot at gossip location. In this paper, we will condense endeavors done till now around there. A large portion of existing techniques identifies from the earlier bits of gossip, i.e., predefined gossipy tidbits. So it is required to have robotized gossip discovery strategy which recognizes new developing gossipy tidbits viably and as ahead of schedule as could reasonably be expected.

A study of GFRA products made with scrap plastic and glass for asphalt pavement road in Mongolia
Authors:- Khulan Altankhuyag, Associate Prof.Yi-Ching Chen, Badmaanyambuu Narantsetseg

Abstract:- The world’s population grows day by day, the technological developments and people’s needs are increasing environmental issues are increasing. Recycling and production of waste products in recent years is highly demanded. In this study commonly used in our country, absorbed in the environment for long periods of time, recycling of scrap glass and plastic was studied and the possibilities for producing roads and construction materials were studied. PEGS (PolyEthylene glass scrap) and PPGF (Polypropylene glass fiber) picked, the tests were carried out to improve the properties of the asphalt mixtures, the main material of the road construction. The hot asphalt mixture added the additives, then will determine the physical and mechanical characteristic of the additive and non-additive asphalt mixtures laboratory test by Marshall method. Then observations will determine the rutting 3m width and 50m length at the test area for 6 months. Further, it is necessary to develop a detailed analysis using modern laboratory tools to improve testing methods.

A Comparative Study on Multistoried Building by Time History Analysis Method for Nepal Earthquake
Authors:- Anu Shekhar , Subhankar Manna, Dona Chatterjee

Abstract:- Nonlinear time history analysis is known for simulating structural behaviour under severe earthquake more proper than other methods. The present paper mainly studies seismic response of four building models of variable heights with constant base dimensions under ground motion records of Nepal earthquake 2015 which are modelled and analysed using STAAD software. The results of the study are discussed and compared in terms of accelerations and displacements versus time plots and seismic response such as base shear, bending moment, storey drift shows a similar trend of variation with increase in height of the building.

A Systematic Review on K-Means Clustering Techniques
Authors:- Swagita Dwivedi, Prof. Lalit Kumar P.Bhaiya

Abstract:- Number of data points are grouped together to form a cluster. Data of same class are grouped together. K-Means clustering is most essential and fundamental clustering technique through which data centers are analyzed. K-means is most broadly used algorithm for clustering with known arrangements of median points. It is likewise called as nearest neighbor clustering. Beforehand, a different endeavor has been done to improve the performance of k-means algorithm. The result of improved k-means has extraordinary performance improvement for little to medium size of data. Be that as it may, for vast and exceptionally expansive amount of data, k-means fall behind. This paper reviews different methods and techniques used in literature and its advantages and limitations, to analyze the further need of improvement of k-means algorithm.

Secure and Efficient Commercial Data Retrieval in Cloud Computing
Authors:- Kummari. Ilayaraja, A. Uday Kishore

Abstract:- In Cloud computing, cloud customers can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. The fact that data owners and cloud server are no longer in the same trusted domain may put the outsourced unencrypted data at risk. It follows that sensitive data has to be encrypted prior to outsourcing for data privacy. However, data encryption makes effective data utilization a very challenging task given that there could be a large amount of outsourced data files. Also outsourcing data to the cloud causes loss of control over data on a data owner’s part. This loss of control over data is further intensified with the lack of managing users’ access to the data from practical cloud computing perspectives. We address these challenging issues, a privacy-preserving data search Scheme is proposed, and that can support both the identifier -based and feature-based product searches. Specially, two novel index trees are constructed and encrypted, that can be searched without knowing the plaintext data. Data user is enabled to create queries to retrieve data by the Data user query. The index value is attached to every data and it is stored in the cloud. If the user wants to retrieve the data from cloud then the given index value is to be matched with the index value.

Intelligent Traffic Monitoring System Using IOT
Authors:- Mukund Vaidya, Satish Matsagar, Mayur Mandavkar, Prof. D. S. Nath

Abstract:- Accurate and timely traffic flow information is important for the successful deployment of intelligent transportation systems. Over the last few years, traffic data have been exploding, and we have truly entered the era of big data for transportation. Existing traffic flow prediction methods mainly use shallow traffic prediction models and are still unsatisfying for many real-world applications In this paper, we are presenting the system by which we are able to get the correct information of real time traffic density without totally relying on the conditions like mobile gps as such. We are able to get an information about the rain as well as pollution level of the desired path. This system will help to increase the precise prediction and understanding of traffic as well as atmospheric conditions of the area.

Rumors Detection on Twitter Using Machine Learning Techniques
Authors:- M. Tech. Scholar Monu Waskale, Prof. Pritesh Jain

Abstract:- Location systems of malignant substance, for example, spam and phishing on Online Social Networks (OSN) are regular with little consideration paid to different kinds of low-quality substance which really impacts clients’ substance perusing background most. The point of our work is to identify low-quality substance from the clients’ viewpoint continuously. To characterize low-quality substance conceivably, Expectation Maximization (EM) calculation is first used to coarsely order low-quality tweets into four classifications. In light of this starter think about, an overview is cautiously intended to assemble clients’ feelings on various classifications of low-quality substance. Both immediate and backhanded highlights including recently proposed highlights are recognized to portray a wide range of low-quality substance. We at that point further consolidate word level examination with the distinguished highlights and fabricate a watchword boycott lexicon to improve the recognition execution. We physically mark a broad Twitter dataset of 100,000 tweets and perform low quality content discovery continuously dependent on the described noteworthy highlights and word level investigation. The consequences of our exploration demonstrate that our technique has a high precision of 0.9711 and a decent F1 of 0.8379 dependent on an irregular woodland classifier with continuous execution in the discovery of low-quality substance in tweets. Our work in this manner accomplishes a positive effect in improving client involvement in perusing internet based life content.

Rumors Detection on Twitter Using Machine Learning Techniques
Authors:- M. Tech. Scholar Monu Waskale, Prof. Pritesh Jain

Abstract:- Location systems of malignant substance, for example, spam and phishing on Online Social Networks (OSN) are regular with little consideration paid to different kinds of low-quality substance which really impacts clients’ substance perusing background most. The point of our work is to identify low-quality substance from the clients’ viewpoint continuously. To characterize low-quality substance conceivably, Expectation Maximization (EM) calculation is first used to coarsely order low-quality tweets into four classifications. In light of this starter think about, an overview is cautiously intended to assemble clients’ feelings on various classifications of low-quality substance. Both immediate and backhanded highlights including recently proposed highlights are recognized to portray a wide range of low-quality substance. We at that point further consolidate word level examination with the distinguished highlights and fabricate a watchword boycott lexicon to improve the recognition execution. We physically mark a broad Twitter dataset of 100,000 tweets and perform low quality content discovery continuously dependent on the described noteworthy highlights and word level investigation. The consequences of our exploration demonstrate that our technique has a high precision of 0.9711 and a decent F1 of 0.8379 dependent on an irregular woodland classifier with continuous execution in the discovery of low-quality substance in tweets. Our work in this manner accomplishes a positive effect in improving client involvement in perusing internet based life content.

Application of Regression Analysis and Artificial Neural Network in Construction Project
Authors:- Anjana T

Abstract:- Project can be defined as a sequence of unique, complex, and attached activities having one goal or purpose and that must be completed by a specific time, within budget, and according to specification. Success of construction projects depends mainly on success of performance of a project. Project performance is predicted mainly based on the four performance metrics i.e., schedule and quality performance. This study is carried out to identify the factors affecting the performance of construction project and their significance on the schedule, and quality performance. The next objective of this research is to develop regression models and neural network models to predict schedule performance and quality performance.

A Machine Learning based Embedded Criminal Face Identification System for Residential Security
Authors:- Pruthvi Ski, Prithviraj Hiremath, Pavan Kumar S, Nimmanapalli Sai Abhijith Reddy

Abstract:- With an extremely arousing and increasing number of criminal activities in and around our surroundings, it has become very difficult to protect ourselves and live in such an environment.This project model helps in evaluation of such entities in real time and provides us rapidly fast and accurate satisfactory conclusions in order to classify the entities (faces) based on the pre-trained dataset, with advancement in technology like Machine Learning, we are able to come up with designing and embedding this highly reliable real time image recognition model with already existing visual devices and also design a dedicated device for the same purpose. YOLO (You Only Look Once), real time Object Detection and Classification model is used for faster results which helps in detecting any face familiar with respect to the trained dataset with criminal record, which can be further reported to the responsible authorities.

Time Cost Risk optimization in construction Using ant colony Algorithm
Authors:- Lakshmi C R

Abstract:- Construction planners often face the challenge of optimum resource utilization to compromise between different and usually conflicting aspects of projects. Time, cost and risk of project delivery are among the crucial aspects of each project with both client and contractor striving to optimize the project duration and cost concurrently. Studies have been conducted to model the time–cost relationships, ranging from heuristic methods and mathematical approaches to genetic algorithms. Emergence of new contracts that place an increasing pressure on maximizing the quality of projects while minimizing its time and cost, require the development of innovative models considering risk in addition to time and cost.. Besides time and cost of activities, every resource utilization option will yield a specific performance quality according to the involved. The optimization of trade-off between these time, cost and risk parameters is done using Multi-Objective Ant Colony Optimization technique. The optimization program was run for a number of giving weight age for the parameters. The total time, cost and risk for the project when executed in various combinations of alternatives were taken the trade-off between the parameters are analyzed.

Production of Biodiesel from spent cooking oil and Oxidative stability Improvement using Onion scale extracts
Authors:- Anusi, M.O., Oyoh, K.B., Osoka E.C., Ojukwu, P.U., Igboko, N.

Abstract:- The need for a clean and cheap source of energy is ever increasing in our world today. Biodiesel has become a topic of interest for some time and researches are still on-going on how to obtain cheaper feedstock for biodiesel production. Moreover, there is need to improve the oxidative stability of biodiesel which is a measure of its shelf life, seeing that biodiesel is biodegradable. This research work considers the production of biodiesel from a cheap and viable feedstock; spent cooking oil. The feedstock was subjected to acid etherification reaction which reduced its free fatty acid level from a value of 2.16% to 0.9% which is suitable for biodiesel production. A transesterification reaction catalyzed by Sodium Hydroxide was carried out on the oil at 60OC, using a methanol to oil ratio of 6:1 for a period of 60 minutes. The biodiesel yield was 89.4% and the product was subjected to physicochemical characterization which showed that its properties closely approximate the standard values. Furthermore, the ethanolic extract obtained from waste onion scales were introduced into some of the biodiesel after which the acid and peroxide values were monitored for a period of seven weeks. The results obtained showed that the onion extract was able to fairly inhibit the rate of increase in the acid and peroxide values of the biodiesel produced which are parameters that were used to measure the oxidative stability of biodiesel and hence its shelf life. It was therefore concluded that onion extract is a viable natural antioxidant for improving the oxidative stability of biodiesel and hence its shelf life.

Prevention of Voter Fraud using Block chain
Authors:- Asst. Prof. Uma Tomer, K.Swapnil, Nishkarsh Bareja

Abstract:- Voter Fraud without a doubt has been catastrophic at so many levels. The wrong leader makes a wrong decision which starts a domino effect of bad decisions thereby affecting the nation. The aim here is to establish trust between the citizens of the nation and their elected leaders from various political parties. ‘Bit coin’ has lately been the buzzword, but the real buzzword should have been ‘Block chain’. Block chain runs on the basic philosophy of Trust and Security which are the core essentials of a voting system in a democratic country. Here, we introduce an effective concept to solve the major issue of voter frauds in our country. This concept is not only bound to our country – India but also applicable to every country across the globe.

Catalytic Peroxide Oxidation for Detoxification Of Organic Waste
Authors:- Neena Saju, Lipin K.V, Reshma Tomy, Princy Paulose

Abstract:- Voter Fraud without a doubt has been catastrophic at so many levels. The wrong leader makes a wrong decision which starts a domino effect of bad decisions thereby affecting the nation. The aim here is to establish trust between the citizens of the nation and their elected leaders from various political parties. ‘Bit coin’ has lately been the buzzword, but the real buzzword should have been ‘Block chain’. Block chain runs on the basic philosophy of Trust and Security which are the core essentials of a voting system in a democratic country. Here, we introduce an effective concept to solve the major issue of voter frauds in our country. This concept is not only bound to our country – India but also applicable to every country across the globe.

Catalytic Peroxide Oxidation for Detoxification Of Organic Waste
Authors:- Dr. R. Umamaheswari, Ramya Princess M, Dr. P.Nirmal Kumar

Abstract:- The release and accumulation of organic and inorganic pollutants in the environment by the natural and anthropogenic sources have led to serious environmental problems; this subsequently results to adverse effects on human health. Therefore, to prevent the harmful effects of environmental contaminants, the development of newer technologies for the remediation of contaminated water has been of great importance. Water is an irreplaceable basic component of life. Protecting the integrity of our water resources is one of the most essential issues of the 21st century. Advanced oxidation processes were expected to decompose that typically stable product into carbon dioxide, water, and inorganics into harmless compounds. Advanced oxidation processes, based on very strong oxidizing free radicle which destroy the pollutants often leading to their mineralization. Advanced Oxidation Processes (AOPs) is an efficient alternative for the complete removal and detoxification of toxic organic pollutants because the process will not cause any kind of secondary pollution to the environment.Catalytic Wet Peroxide Oxidation process is a very broad area under AOPs for the complete degradation and removal of toxic organic compounds from aqueous streams at mild reaction conditions.

Leave a Reply

Your email address will not be published. Required fields are marked *