Category Archives: Uncategorized

Wire Transfer / Telegraphic Transfer Details

Uncategorized

Dear Author: Kindly use below transaction details for the “Wire Transfer / Telegraphic Transfer”. Transfer amount is mention in your acceptance mail.

Correspondent Bank Details
  • Bank Name: YES Bank
  • SWIFT: YESBINBB
  • Account Number: 011961900001439
  • Branch Address: MP NAGAR Zone 1 BHOPAL M.P. India
Further Credit To
  • SWIFT/ BIC Code: YESBINBB
  • Beneficiary Name:Deng Infotech solutions Pvt LTD
  • Beneficiary Account No: 011961900001439
  • Purpose: Paper / Article Publication Charges
Published by:

Call For Paper International Journal

Uncategorized

International Journal IJSRET invite researcher of Science and Engineering field to submit their latest review paper or research paper or study paper or letter or implementation paper. Here Editor has call for paper international journal publication under following points:

  • Paper or article should have innovative title with latest research area content.
  • Paper must have good content with deep understanding of topic
  • Paper should not be highly plagued
  • Proper reference should be used in the paper
  • Papers written in English language are invited

Submit Your Paper  / Check Publication Charges

Paper publication sites when Call for Paper International Journal

Number of question present in authors mind are list below with their answer.

Q1. Validity of international journal?

Ans: Type 8 digit number ‘2395566X’ of journal on www.portal.issn .org, you can get validity and year of publication Open website

Q.2 Impact factor of journal?

Ans: 3.24 is impact factor

3 Review time after submission?

Ans: Normally it takes 3 to 4 days.

4 Jounal Processing fees ?

Ans: Check Journal Processing fees: https://ijsret.com/article-processing-fee/

5 Jounal paper submission?

Ans: Submit paper through: https://ijsret.com/paper-submission/

6 Journal Increase processing fees as per number of author?

Ans: No, journal do not increase processing fee. Its constant.

7 Journal Increase fees as per number of pages?

Ans: No, journal do not increase processing fee. Its constant.
Published by:

Best Journals To Publish Research Papers

Uncategorized

In order to find the research validity of any field researcher publish paper on Journal. But this take to other confusion of finding the best journals to publish research papers. So scholars who have just start there research carrier need to check following points of an journal and find that either journal is good or not.

  • Journal should have ISSN number (It’s a 8 digit Id)
  • Journal should have high Impact factor obtain from various resource
  • Journal should be at-least three year old
  • Journal should Journal should have proper submission form with Email-Id
  • Journal should have reviewer list
  • Journal should have valid Payment Gateway (People ask for person account payment is not good)
  • Communication should be responsive by email or chat
  • Journal should have copyright form and Paper format

Submit Your Paper  / Check Publication Charges

So how can one come to know about this:

Open this site and type 8 digit number of journal: www. portal. issn .org, you can get validity and year of publication.

Be aware of journal who show improper indexing by images or just type name of good indexes only. So Best Journals To Publish Research Papers have following links

Published by:

IJSRET Volume 4 Issue 5, Sep-Oct-2018

Uncategorized

Development of Secure Image Transposal Algorithm Using 16 *16 Quantization Table
Authors: Vijay Bhandari, Dr. Sitendra Tamrakar, Dr. Piyush Shukla, Arpana Bhandari

Abstract:–Computerized picture scrambling can make an picture into a totally diverse good for nothing picture amid modification,and it is a preprocessing amid stowing away data of the computerized picture, which too known as data camouflage.Picture scrambling innovation depends on data cover up innovation which permits non-password protection computation for data cover up.Data stowing away innovation driven to a insurgency in the fighting of organize data,since it brought a arrangement of unemployed combat computations,and a part of nations pay a part of considerations on this zone. Organize data fighting is an imperative portion of data fighting, and its center thought is to utilize open organize for private data transference.The picture after scrambling encryption computations is chaotic,so aggressor cannot disentangle it.A few made strides advanced tidemarking innovation can apply scrambling method to alter the dispersion of the mistake snippet in the picture to move forward the strength of computerized tidemarking innovation.Arnold scrambling computation has the highlight of effortlessness and periodicity, so it is utilized broadly in the computerized tidemarking technology.

Enhancement of Thermal Plant Efficiency by Using Double Pipe Heat Exchanger
Authors: M. Tech. Scholar Indrajit Patidar, Asst. Prof. Nilesh Sharma

Abstract:–The heat exchanger section of a thermal power plant uses water as a coolant, which is incapable of extracting the low grade heat input in the heat exchanger section. This results in loss of a major chunk of heat energy from the thermal power plant. However, with the use of a proper coolant in the heat exchanger section, it is possible to utilize the heat available in the heat exchanger. This can be done by introducing a secondary cycle for energy generation along with the conventional primary cycle. Isobutane, with its appropriate physical properties, proves to be a good coolant in the secondary cycle for energy extraction from the low grade heat available in the heat exchanger section. The efficiency of a conventional thermal power plant can be improved from 80% to around 87 – 87.65% by incorporating this change. Although, the paper details the improvement of efficiency in a thermal power plant, same methodology can be used in any steam operated power plant, such as in nuclear power plants, in geothermal power plants, or in solar thermal electric power plants. The improvement in efficiency leads to lesser burden on non-renewable resources, such as coal and nuclear fuel, and also lowers the pollution effects on the environment. Proper practical implementation of the proposed model has the potential to revolutionize the energy generation paradigm of the world.

A Study of Customer Satisfaction with Business-To-Business Customers Model
Authors: Shashanka. B. K

Abstract:– Most benefit looking for associations are at last kept running by cash and the specific retail stores are the same in that. In retail markets the customers are the hotspot for benefits and organizations trying to procure them are continually growing new techniques keeping in mind the end goal to get the aggressive edge that baits the customers in to their stores. At the point when a company offers products and services that satisfies the requirements of the customer and produces extra esteem, satisfaction and saw quality appropriately then the company has the best possibilities for progress. High customer satisfaction is one focused edge a company can have and one reason why it is such a critical piece of a company’s methodology and has seen such a large number of researches and concentrates after some time is its association with gainfulness. The customers for the situation company X comprise of ordinary family unit purchasers and business-to-business customers. X conducts periodical studies that measure the satisfaction of the ordinary family unit buyers yet no research have yet been done to quantify the satisfaction of the business customers. This research will in this manner give new information to X and the aftereffects of this study can be valuable to the company for increasing better outcomes. As per this study the B2B customers are somewhat happy with the services and products of X. The desires for the customers were likewise met great. The most noteworthy factor for the B2B customers to visit in X was observed to be the area of the company, which had a definitive impact to the expenses for the customers.

Comparison Study of Flash & Fire Point of Bio-diesel Produced by Mustard and Soya Bean Oil
Authors: Asst. Prof. Mahesh Chand Saini, Mayank Sharma, Manoj Bhandari, Md. Nazwazish

Abstract:–Consumption of fossil fuel is increasing day by day that results decrease in amount of fossil fuels present on earth. After 30-40 years these sources are in danger of extinction so as to meet the requirement of human beings there is a need of using the alternative source of fuels. One of them which cause as alternative fuel that is derived from the vegetable oils and fatty acids. It is a key source as an alternative fuel. The process of biodiesel production is completed by the trans-etherification process and it is the chemical reaction between oil and alcohol in the presence of catalyst which results separating bio-diesel and glycerin. The process is completed in 2-4 hours and also depends upon the type of vegetable oil. Properties of Bio-diesel are also depends on the used oil. This paper illustrates the comparison between Soya bean and mustard oil Bio-diesel which is followed by different parameter such as Flash & Fire Point. Various ratios of blends of Bio-diesel (5%, 10%, 15%and 20%) are taken. Both edible and non-edible oil are used for producing the bio-diesel.

A Review of Methods of Analysis and Mitigation of Landslide
Authors: Emmanuel Arinze, Paul Chibundu Enyinnia, Aju Daniel Ekan, Anthony Chibuzo Ekeleme

Abstract:–Cities around the world that are located on a hilly and mountainous areas are always faced with the challenge of landslide, which can be disastrous and always result to loss of life and properties when it happens, and large expenditures are being incurred by Governments on the investigation, design and implementation of mitigation and preventive measures to reduce the likelihood of the loss of life and economic losses due to landslides. Landslide analysis can be based on hazard or susceptible. The formal is based on evaluation of probability of a landslide failure within a specified period of time and within a given region, while the later is based on classifying the region into several successive classes with different potentials of landslide. Based on the forgoing this paper is focused on the review of landslide hazard analysis and mitigation. There are four ways to a modern landslide hazard analysis which include Inventory approach, Heuristic approach, Statistical approach and Deterministic approach. Mitigation of landslide is based on the type of landslide, the different types of landslide has its own mitigation method which was discuss in this paper type by type. The four approaches can be applied for regional landslide hazard mapping. All the approaches have their shortcomings. The inventory analysis require a lot of maps which require interpretation, the heuristic analysis require a long- period landslide data, which may be insufficient in length of historical records, incompleteness in inventory and a possible mixing of extreme events, the statistical approach looks better as comparing with the weakness of the other three approach, but there still are some further development needed to predict landslide.

Reversible Image Data Embedding using Modified Histogram Feature
Authors: M. Tech. Scholar Kanchan Sahu, Asst.Prof. Pravin Malviya

Abstract:–With the increase in the digital media transfer and modification of data is very easy. So this work focus on transferring data by hiding in image. In this work carrier image was used to hide data where Low Frequency Region was utilized. Here whole data hiding is done by modified by using histogram feature shifting method. This approach was utilized to the point that hiding information and image can be effectively recovered. Investigation is done on genuine dataset image. Assessment parameter esteems and demonstrates that proposed work has keep up the SNR, PSNR values with high security of the information.

An Improved Approach for Tracking in Maneuvering Target Environment
Authors: M. Tech. Scholar Umesh Kumar Ahirwar, Asst. Prof. Nitin Choudhary

Abstract:–A Modern sensor networks, we need most important parameter is Self-organizing capacity for tracking maneuvering (non-constant) targets. for performance gained lot of attention to point out the control and coordination problem in self-organizing sensor network environment used flocking based methods. In this paper we are these type two well-known algorithms, namely, the Flocking and the Semi-Flocking algorithms. Although these two algorithms have demonstrated promising performance in tracking linear target(s), they have deficiencies in tracking maneuvering targets. Flocking algorithm is applied for tracking the target in maneuvering environment. In this paper we are analyzing the performances of flocking-based algorithms, both with and without the proposed approach, are examined in tracking both linear and maneuvering targets. Experimental results demonstrate how flocking algorithm yields better tracking of maneuvering targets, and how applying flocking concept on the target tracking process to improves the quality of tracking and increases the speed of convergence.

A Review on Different Algorithms for Tracking in Maneuvering Target Environment
Authors: M. Tech. Scholar Umesh Kumar Ahirwar, Asst. Prof. Nitin Choudhary

Abstract:–Self-organizing capacity is the most important need of modern sensor networks; particularly for tracing or tracking maneuvering (non-constant) targets. In this paper we presented the different technique of maneuvering Tracking algorithm & also we are proposing which technique is best for this tracking system. In this research brief literature review of different existing algorithm for maneuvering tracking system and proposed a system for maneuvering tracking system for modern sensor network.

Digital Image Retrieval Using Annotation, CCM and Histogram Features
Authors: M. Tech. Scholar Shalinee Jain, Asst. Prof. Sachin Malviya

Abstract:– As the quantity of web clients are expanding every day. This work concentrate on the retrieval of pictures by using the visual and annotation characteristics of the images. In this work two kind of features are utilized for the bunching of the picture dataset. So Based on the comparability of annotation, CCM and histogram components of the picture bunches are made. For bunching here genetic approach was utilized. Here client pass two kind of queries first was content while other is image, this assistance in choosing suitable cluster for retrieval of picture. Analysis was done on genuine and artificial set of pictures. Result demonstrates that proposed work is better on various assessment parameters as contrast with existing strategies.

Development of Safety and Productivity Correlation for A Rolling and Wire Drawing Factory
Authors: M. Tech. Scholar Kamal Shukla, Asst. Prof. Vijay Shankul

Abstract:– The work productivity of workers in a company is affected by several factors, one of which is occupational safety and health program and there is a significant effect of safety and health program on work productivity of workers either simultaneously or partially. A poor safety standard primarily originates from the belief that safety and productivity are mutually exclusive objectives, one eating away the other. But in practice they are correlated. The knowledge of exact nature of dependence of productivity with safety and health in industry is `therefore highly significant in the context of production. In this project safety and productivity are the two parameters have been focused and the mutual correlation between the two has been analyzed on the basis of the data obtained from the industries various department of safety and productivity and has been presented in the tabulated form by using the data with respect to safety and productivity. The developed correlation is a functional relation between total factor productivity and safety elements and cost of production. Hence, the developed correlation can be used to predict total factor productivity (TFP) from the knowledge of the values of input safety elements and planned cost of production.

Garbage Management for Smart Cities Using Internet of Things
Authors: M. Tech. Scholar Anjali Urmaliya, Dr. Neeraj Shukla

Abstract:– Garbage Management of smart city using “Internet of Things”. In our daily life we produce a lot of waste or garbage as last few years witnessed a tremendous rate of population, and it’s also important to manage that garbage properly generated by peoples. By using Internet of things it will easy to manage all the garbage. I will use some IOT devices for the management of garbage of smart city, smartly. The Devices that will make it complete are “Arduino Uno, Raspberry Pi, ESP8266, MQTT Protocol. It Is will also support the “Swachha Bharat Abiyan” campaign by Prime Minister Of India. The purpose of the mission is to cover all the rural and urban areas of the country to present our country as an ideal country to the world. Waste Management is one of the primary things to solve the problem that the world faces to developing country. The main aim of the work is to develop a smart intelligent garbage alert system to for proper management of garbage.

Controller Analysis of Reaction Wheel System for Counter Torque
Authors: Ye Min Htay, Thu Thu Aung

Abstract:– This work addresses the reaction wheel system (RWS) for a Nano satellite and simulator which shows the function of it. The object is to design flywheels that counteract the disturbance torques experienced by satellite in the harsh space environment and to stabilize the platform of simulator. The performance of reaction wheels is analyzed to achieve the stable for system. The satellite and simulator utilizes three reaction wheels as actuators. The controller is designed to change the rotational speed of reaction wheels to adjust the satellite and simulator in the desired position. The mathematical model of reaction wheel system using angular kinetic equation is developed. Control theory is then applied for a required response that deals with both non linarites in equations and disturbance sources. Simulation of closed loop system shows that all desired specification of closed loop (rising time, settling time and steady state error) are robustly satisfied.

Published by:

Publish Research Paper

Uncategorized

As young researcher always get trouble for there first paper to publish on International journal. So this article help those researcher to publish research paper. Here we describe each step since from paper writing to final publishing. So you question for

How to publish research paper is resolve?

  • Researcher Need to cover following points in paper (Title, Abstract, Introduction, Literature survey, Problem Identification, Proposed Work, Results, Conclusion References)

  • Check for unique title as similar title may be rejected by journals.

  • Check Plagiarism of the paper by any software, try to reduce plagiarism below 18%.

  • Prepare paper in format like content and heading font size should be same.

  • Select journal as per your mentor suggestion.

  • Submit paper through selected journal website.

  • Check publication cost of the journal.

  • Ask for digital certificate cost or number of author cost.

  • Check minimum number of paper length for publication in mention fees.

  • Wait for acceptance letter once you submit paper.

In this way one can submit paper on journal for publication of research / survey paper.

Submit Your Paper  / Check Publication Charges

 

 

how to publish a paper
how to publish research paper
Published by:

IJSRET Volume 4 Issue 4, July-Aug-2018

Uncategorized

Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide
Authors: Hitender Chhikara, Asst. Prof. Vikas Kumar, Prof. Sanjay Kumar, Research Scholar Vinay Singh

Abstract:–Tire or Tyre Automotive Industry has emerged as an important field of research under manufacturing and automation technology with environment pollution factors in the last few years. Vehicle Tire Automotive Industry is a set of processes that seek to change the automotive market pattern of knowledge processing to enhance both it and its outcomes. Tire Industry is a core concept involving manufacturing and automation technology and various management practices working for the betterment of the Automotive Industry market are becoming more knowledgeable about technology intensive; they are hiring “minds” more than the hands. The tire industry has become one of the critical approaches for the automotive market as a manufacturing sector and business scenarios. So that many definitions and history of describing a vehicle tire, manufacturing and automation technology Industry has been discussed in the first chapter. A literature review of the process has been discussed in the chapter second. The process is affected by various factors that support and hinders the automotive Industry. These factors were implemented in small and medium levels of the working of technology for tire manufacturing process and their importance has been found out in the research. These factors were mentioned in the chapter third. A Modern Manufacturing & Automation Tire Technology, under in process, today used the latest machines technology for manufacturing of tires with help of automation technology. These factors are mentioned in chapter fourth. In chapter five, tire terminology is very important factors discussed for tire performance and accuracy for working on the road or off-road. A tire is depending on raw- material based upon natural, synthetic rubber and others material, so these materials mentioned in chapter six. The tire is related to rubber, in that case, recycling time many types of pollution work in at surrounding, these concepts discussed in chapter seven. It was the first rubber tire developed in the 1800’s after the analysis and various important factors related to work performance. The important parameters are identified and self-interaction matrixes proposed with the help of Interpretive Technology structure modeling which evaluates the inhibiting power of these parameters. This index can be used in the comparison of different factors responsible for manufacturing processes. Eight chapter of the research includes concluding Remarks of the study, Limitations of the study and Scope of the future work.

Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide
Authors: M.Tech.Scholar Sanjay Patware, Asst. Prof. S.S. Gawande

Abstract:–The microprocessors in the modern era are propelled by high speed, small area and low power circuits. Dynamic logic circuits are used for high performance and high speed applications. Wide OR gates are used in Dynamic RAMs, Static RAMs, high speed processors and other high speed circuits. In spite of their high performance, dynamic logic circuit has high noise and extensive leakage which has caused problems for the circuits. To overcome these problems Domino logic circuits are used which reduce sub threshold leakage current in standby mode and improve noise immunity for wide OR gates. High noise sensitivity is the result of sub threshold leakage current that flows through the evaluation network. With the advancements in CMOS manufacturing process to scale down into the ultra deep sub-micron regime, the leakage current becomes an increasingly more important consideration in VLSI circuit design. According to the simulations in HSPICE at 90nm and 65nm CMOS technology, the proposed circuit shows the improvement of Average power consumption upto for 8 input OR gate 30% compared existing domino logics. This control circuit produces small voltage at the source of the pull down network in the standby mode. It improves the noise immunity of the domino circuits. The performance of these circuits has been evaluated by HSPICE using a BSIM4.

Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide

Authors: Ganesh B. Salomi Ch., Prof. Sri Rami Reddy D

Abstract:–Carbonate producing bacteria have attracted lots of interest as promising natural, environmental friendly novel technique to the improvement of concrete characteristics. Considerable research has been conducted on utilizing microbial induced carbonate precipitation to mitigate several concrete problems such as crack repair, reduction and modification of porosity and permeability. Furthermore, bacterial carbonate precipitation has shown positive influence on compressive strength improvement of concrete. In general, cracks in the concrete structures are early signs of distress which have to be diagnosed properly otherwise the repair of same crack takes place again and again causing loss of time and money. This led to the evolution of self healing concrete. Self Healing Concrete is a term that is used for cement-based materials that repair themselves after the material or structure gets damaged due to some sort of deterioration mechanism. The vast literature review indicated that self healing mechanism can be achieved in various ways, by using certain polymers or by the use of certain species of bacteria. Self healing concrete prepared by using bacteria is called Bio-concrete. There are three approaches for bio-concrete, namely, autogenous, vascular, and capsule-based self-healing. Based on these factors, the present study attempted to interpret the efficiency of Bacillus subtilis as a self healing agent and to study the change in the properties of concrete due to the addition of this species. In the view of this, the primary objectives of this study were to analyze the healing capacity of Bacillus subtilis and the effect of its addition on the compressive strength of concrete. Basic tests such as sieve analysis, determination of specific gravity, compression tests on concrete and serial dilution technique were also performed.

Experiential Investigation on the Stabilization of Expansive Soil with Lime

Authors: San San Myint

Abstract:–Subgrade is an important component in the pavement structure. The performance and durability of pavement also depends on type of subgrade soil and its engineering properties. Expansive soil is one of the major soil deposits of Myanmar. In this research, expansive soil is taken from East and West sides of Mandalay-Madayar Road. Based on Atterberg limit values and particles size analysis, the group symbol of research soil is CL according to Unified Soil Classification System (USCS). The plasticity index of research soil is about 25% and has high degree of expansion. Stabilization is needed for research soil to reduce the expensive potential. Lime increases the optimum water content for compaction, which is an advantage when dealing with wet soil and also increases the strength of clayey soil. In this study, stabilization of expansive soil has been carried out using lime. The plasticity index decreases with increase in lime content which varies from 24.66 to about 10.95 in East side and from 26.5 to about 10.64 in West side. This shows that the degree of expansion decreases to low range when increase in lime content. From the unsoaked CBR test results, the CBR values for natural soil in east and west sides are 44.5 and 20 respectively. When expansive soil treated with lime, the peak value of CBR occurs at 3% and 7% of lime in east side of soil and the CBR value decreases as increase in addition of lime in west side of soil. Therefore, the both sides of soil are suitable for sub- base material in dry condition.Keywords- –Bio concrete, bacteria, bacillus subtilise, Polymers, carbonate producing bacteria.

Augmented & Virtual Reality in Iris Recognition A Modern Approach

Authors: M.Tech.Scholar Rajat Verma, Harshita Mishra

Abstract:–Today, the humanity is living in the domain of technology. This is clearly depicted in this paper. A view to technology is illustrated in this paper. The structure of an eye is also mentioned in this paper. Augmented and Virtual Reality concepts are also mentioned in this paper. All this will certainly contribute in the research sector of biometric dimension. The recognition sector can be of any kind that includes speaker, iris etc. It is expanding at a tremendous rate and also contributing in the dimension of research.

An Innovating Methodology for Measuring The Effective Implementation of OHSMS (Occupational Health And Safety Management System) in Small and Medium Scale Industries

Authors: PG Scholar Saurabh Tiwari, Asst.Prof. Vivek Shukla

Abstract:–The small and medium scale enterprises(SME) have immense growth in the recent years due to the social and economic development of the country, but the safety aspects followed in the SME are very poor, and it becomes highly risky to the employees life, so safety aspects in SME requires huge amount of improvement. In this thesis we propose behavior of small and medium scale industry for safety management. The first target of the industries has to improve the implementation of Occupational Health and Safety Management Systems, especially for small and medium enterprises (SMEs). Safety investments are uncompetitive if compared to other investments, especially for SMEs, due to responsibility attribution management that does not guarantee the exemption of responsibility in the case of unpredictable accidents and to an insufficient incentive policy for enterprises, virtuous in safety investments. For SMEs safety investments are un-profitable also because the individual SME has no real perception of accident risks due both to difficulties in assessing and monitoring the real risk and to the small number of employees. The project has introduced an index (Efficacy Index) to objectively quantify the effective implementation of an Occupational Health and Safety Management System (OHSMS). The paper shows how the index can be practically applied to a company and what kind of information can be collected and processed to determine the effective implementation of the OHSMS. It helps to reduce the accident rate and incident rate of SMEs, highlighting the safety awareness in SMEs from the management level to the employee in order to improve the safety management in SMEs.

Automatic Alcohol Detection and Vehicle Controlling System for Prevention of Road Accidents

Authors: Sunkavalli Raviteja, Aluru Jawahar, P Harsha Vardhini, Y Thejaswi

Abstract:–Our paper proposes a new design to control the fatal road accidents caused due to the drunken drivers with the help of automatic alcohol detection and vehicle controlling unit (ADVCU). Now-a-days, most of the detection model’s senses alcohol but unable to control the vehicle automatically. Here, we developed a new design which prevents the movement of vehicle when the driver was detected with consumption of alcohol. The proposed system determines the amount of alcohol consumed by the driver and if it exceeds the permissible limit, the vehicle will be automatically stopped for stipulated time and message along with vehicle location will be sent to concerned personnel. For this purpose, we have used breath-analyser (MQ3), ATMEGA 328P microcontroller, NEO-7M GPS, SIM 800L GSM Module. The breath analyser senses the level of alcohol present in the breath of driver and acknowledges to Microcontroller. If it is beyond the limit then ATMEGA 328P will drive the signal to GSM, GPS modules and immediately bike engine will be stopped and location from the GPS module will be sent to the person concerned through text message from GSM module.

Natural Language Processing (Nlp) : A Comprehensive Study

Authors: M.Tech. Scholar Rajat Verma

Abstract:–we the people, are living in this modern era of Artificial Intelligence. This is clearly depicted in this paper. The combination of lexical, syntactic, semantic usage in the domain of social networking which is an application of NLP is also mentioned in this paper. Turing Test is also mentioned in this paper. The individual functionalities of lexical, syntactic and semantic analysis is also illustrated in this paper. These all features will clearly increase the usage of all 3 will bring a better tomorrow in the field of Natural Language Processing.

Assessment of Toxicity Index and Consequence Analysis using Aloha in Pharma Industry

Authors: M.Tech. Scholar Rahul Parmar, Asst.Prof. Vivek Shukla

Abstract:– Chemicals are highly hazardous in nature. Starting from the initial stage of manufacturing till the storage of raw chemicals is dangerous to human life. This study has been done in pharma industry where the workers are exposed to hazardous chemicals such as chlorine dioxide, hydrogen peroxide, methanol and the same. The physical and chemical properties of the chemicals are studied. The second step is Checklist analysis where the needed data are gathered which are going to be used for further steps. At next step, to select a highly hazardous chemical, Toxicity Index Calculation is used to rank the chemicals based on the data collected from checklist. After the selection of the hazardous chemical, the next step is to find out what is the next event going to happen if there is a release. For which, Event Tree Analysis (ETA) is used in this step. The next step after finding the final event from ETA is to find the how it is dispersed into atmosphere and how much distance it covered. It can be easily found out using the ALOHA Dispersion Software. The next step is human health and safety loss calculation using the distance found out by software and compensation amount gathered from law. The final step is to make the precautionary & preventive measures to avoid the toxic dispersion into atmosphere and the emergency preparedness should be prepared for what should be done during the toxic release.

Electric Wheel using Non Rotating Tri Spoke

Authors: Shoeb Muzaffar Khan, Sayyad Asef Bashir, Sayyed Sohel Mushiroddin, Vasil Bhisti, Prof.P.D.Kulkarni

Abstract:–The main motto of this review paper is to present the idea and design of electric wheel. There are many electric vehicles are present in market but the innovative thing about our project is the position of all components like motor, battery, controller, generator fixed in wheel. Traveling plays the very important role in human being .as we go forward the need of vehicle increases day by day which in turn increase the emission.so now there is need of another substitution of petrol based vehicle which should be durable, efficient, time taking for traveling should be less and also it should be economical and easily available as compared to present transportation and traveling system.

Implemented Image Processing operationsusing Python

Authors: M.Tech. Scholar Rajat Verma

Abstract:–In today’s modern world, many programming as well as scripting languages are present. Python is one of them which has made its dimension particularly clear that it will rule the scenario of computer science. Many popular websites like Google, YouTube and Yahoo all uses the scripting language python. Python is high level language which is closer to the user rather than the machine. The concepts of Object Oriented Programming is clearly mentioned in this paper. Hand Tracking, Eye tracking and face blurring is also mentioned in this paper. Edge detection in Video and image cartooning is also mentioned in this paper. Calibrating and estimating Output is also mentioned in this paper. Maze solver is also there in this paper. This all will definitely contribute to research sector in some extent.

Analysis of Risk and occupational Hazards in Foundry

Authors: M.Tech. Scholar Sailesh Choudhary, Asst.Prof.Vivek Shukla

Abstract:– Foundry business is taken into account to be a high risk space since it contains the venturous operations. manu factory operation use extraordinarily hot temperature method and enormous quantity of nephrotoxic mud and warmth square measure discharged. The processes utilized in metal casting square measure terribly uproarious. inexperienced sand manufactory manufacture endless pollutants within the surroundings – each operating and close surroundings. throughout the operations, staff might doubtless scraped and plagued by unhealthiness issues. Assessing and dominant the chance is completed in step with the aspects of activity health and safety in manufactory. HIRA study was done to spot the hazard in manufactory business. it had been found that Heat, Dust, Noise and activity square measure the main hazards. Heat stress calculation was done. it’s finished with appropriate management live to scale back major hazards found.

Perfect Semi Complete Graphs

Authors: N. Abdul Ali, M. Shajahan, S.Selvaraj, A.Dhanasekaran

Abstract:– As perfect semi- complete graphs play a vital role in tacking defense problem, a complete study of these graphs gives as overall view to apply them in our practical problems. In this paper a further study about perfect semi-complete graph is made. Path connector set, Edge path connector set, Perfect semi complete graphs are introduced and discussed.

A Study on Normality of Meromorphic Functions

Authors: M.Phil.Scholar Sreejil. K., Rajakumari. N.

Abstract:– A heuristic principle attributed to Andr´e Bloch and P. Montel says that a family of holomorphic functions is likely to be normal if there is no nonconstant entire function with this property. We discuss this principle and survey recent results that have been obtained in connection with it. We pay special attention to properties related to exceptional values of derivatives and the existence of fixed points and periodic points, but we also discuss some other instances of the principle.

Topological Groups and Different Types of Measures

Authors: M.Phil.Scholar Suma Joseph, Dr.B.SenthilKumar

Abstract:– Applying Haar’s Measure theory to probability theory to understand and generalize the uniqueness of invariant measure in the situation of risk and uncertainty. If T is finite topological group and X be subgroup of T then µ(X)|µ(T).

A Study on Unique Factorization an Integral Domain

Authors: M.Phil.Scholar Suja Joseph, Dr.B.Senthilkumar

Abstract:– We take a broad view the notion of “unique factorization domain” in the spirit of “half-factorial domain”. We show that new generalization of UFD implies the now well known notion of half factorial domain. As a consequence, we discover that the one of the normal axioms for unique factorization domains is union scientiouslyred undant.That is, we interested in factoring numbers in integral domains so we have to scrutinize distribution, and so this post will begin with a fairly cursory look at the properties of distribution. Then we will introduce the crucial ideas of units and associates. (In the integers, ±1 are units and ±n, for any fixed n, are associates).

A Study on Distance Pattern of Vertices in a Graph

Authors:M.Phil.Scholar Jeffy Johnson, B. Amutha

Abstract:– This paper discuss about the distance pattern of vertices in a graph. The distance between two vertices is the basis of the definition of this graph parameter. There are several distance related concepts and parameters. We also present several fundamental results on open distance pattern uniform graphs and open distance pattern uniform number of a graph.

A Survey on Robust Image Watermarking Techniques and Different Applications

Authors: M.Tech. Scholar Kanchan Sahu, Asst.Prof. Pravin Malviya

Abstract:– Image Watermarking is used for copyright protection, authentication and ownership of the intellectual property. Visual cryptography is technique in which secret data is decomposed into number of shares and distributed to participants, So that only participants can read that data. Image Visual Cryptography is used to keep the data private from unauthorized users. Here detail survey of different image watermarking techniques used by various researcher are detailed. Various properties of the image data hiding was explained.

Fuzzy Based Electric Springs for Distributed Voltage Control
Authors: Asst.Prof.V.Sunil Kumar Reddy, M.Tech.Scholar E.Subramanyam

Abstract:– Electric spring which was developed recently has become the effective means of enhancing the load voltage regulation and stability of the system. This paper deals about the use of electric spring for distributed voltage control. The basic idea behind this is to maintain the constant voltage across the critical (C) loads by varying the power consumption of non-critical (NC) loads with the help of electric springs. A comparison is made between distributed voltage control using electric spring and general single point STATCOM control in terms of reactive power handling capability noncritical load voltage variation.A low-voltage single-phase power system with different types of loads has been built for the realization of electric springs. Simulation results show the effectiveness of electric springs in maintaining good voltage regulation and lead to demand side response.

Study of user’s behaviour in Structured E-Commerce Websites
Authors: M.Tech.Scholar B. Thejaswini, Asst.Prof.Reddi Durga Sree, Karamala Suresh

Abstract:– Online shopping is becoming more and more common in our daily lives. Understanding users’ interests and behavior is essential in order to adapt e-commerce websites to customers’ requirements. The information about users’ behavior is stored in the web server logs. Nowadays, the growth of World Wide Web has exceeded a lot with more expectations. The internet is growing day by day, so online users are also rising. The interesting information for knowledge of extracting from such huge data demands for new logic and the new method. Every user spends their most of the time on the internet and their behaviour is different from one and another. Web usage mining is the category of web mining that helps in automatically discovering user access pattern. Web usage mining is leading research area in Web Mining concerned about the web user’s behaviour. In this paper emphasizes is given on the user behaviours using web server log file prediction using web server log record, click streams record and user information. Users using web pages, frequently visited hyperlinks, frequently accessed web pages, links are stored in web server log files. A Web log along with the individuality of the user captures their browsing behaviour on a website and discussing regarding the behavior from analysis of different algorithms and different methods.

A Study on Normality of Meromorphic Functions and Discrete Exceptional Sets
Authors: M.Phil.Scholar Sreejil. K., Rajakumari. N.

Abstract:–We consider a class of Normality of meromorphic functions, denoted by K in this paper, which are meromorphic outside a compact and countable set Q (f), investigated by P. Bolschin his thesis in 1997. The set Q (f) is the finish of isolated indispensable singularities. We review main definitions and properties of the Fatou and Julia sets of functions in class K. It is studied the role of Q (f) in this context. Following Eremenko it is defined escaping sets and we prove some results related to them. For instance, the dynamics of a function is extended to its singularities using escaping hairs. We give an example of an escaping hair with a wandering singular end point, where the hair is contained in a wandering domain of f ∈ K.

Analysis of Performance Metric of FinFet Based SRAM Cell
Authors: M.Tech.Scholar Meenakshi, Raghwandra Singh

Abstract:– For molecules to be used as components in molecular machines, methods that couple individual molecules to external energy sources and that selectively excite motion in a given direction are required. Significant progress has been made in the construction of molecular motors powered by light and by chemical reactions, but electrically driven motors have not yet been built, despite several theoretical proposals for such motors. Here we report that a butyl methyl supplied molecule adsorbed on a copper surface can be operated as a single-molecule electric motor. Electrons from a scanning tunneling microscope are used to drive the directional motion of the molecule in a two-terminal setup. Moreover, the temperature and electron flux can be adjusted to allow each rotational event to be monitored at the molecular scale in real time. The direction and rate of the rotation are related to the chiralities of both the molecule and the tip of the microscope (which serves as the electrode), illustrating the importance of the symmetry of the metal contacts in atomic-scale electrical devices.

Health Risk Assessment of Heavy Metals in Water Samples from Hand Dug Wells in isoko Local Government Areas, Delta State, Nigeria
Authors: K. Emumejaye , Solomon U. Edogho

Abstract:– Water is of major importance and is intensively exploited for domestic and industrial uses. Some hand dug wells in Isoko South and North local government areas of Delta State were analyzed for heavy metals using the Atomic Absorption Spectrophotometer (AA320N). For the samples analyzed, Iron, zinc, nickel, chromium and lead concentration range were 0.001 – 0.743mg/l, 0.001 – 0.105mg/l, 0.001 – 0.050mg/l, 0.001 – 0.062 and 0.001 – 0.053mg/l respectively. All water samples were within the WHO and SON permissible limits and fit for drinking with the exception of few wells. Also, the estimated health quotient for Fe, Zn, Ni, Cr, and Pb were less than the safety threshold of 1 except Fe in sample from well2 in Oleh that is 3. Although, these values are relatively low, exposure through the regular consumption of well water in the study area over a long period of time may pose potential health issues to the population. It is recommended that relevant authorities should help to enlighten the people on the necessity for treatment of the water before they can be used for drinking and domestic purposes.

Optimization of a LED Heat Sink using Multi Objective Genetic Algorithm and Computational Fluid Dynamics
Authors: M.Tech.Scholar Suresh Babu, Manjunatha A, Dr.M.Shivashankar, Vijay Kumar Mishra

Abstract:– Light Emitting Diode (LED) devices generate excessive heat during its operation, dissipation of this heat to surroundings is essential for efficient operation of LED unit. Excess of heat from LED unit is dissipated by Heatsink (fins). The volume of the Heatsink should also be as minimum as possible to suit the compact design structure of modern electronic component. In order to obtain the optimal structure size of Heatsink, multiple geometric design parameters that influence the performance of Heatsink are analysed by combining the evolutionary algorithm with computational fluid dynamics. The influences of the geometric variables on the two objective functions are first analysed by commercial code CRADLE scSTREAM through the various samples of design parameters generated by the design of experiments with the help of commercial optimization code EOopti. Using the surrogate model and Multi-Objective Genetic Algorithm (MOGA) the Pareto-optimal solutions are generated. The competitive relationship between the objective functions is depicted in the Pareto front. The values of objective functions obtained from the Pareto front are validated with numerical analysis. The results obtained are within 5% of numerical error. The Pareto solution of objective function values, LED temperature of 65.2474ᵒ C and Heatsink volume of 4.53492 x 10-5 m3 is found to be better solution to the application among the Pareto solutions, which has better trade-off relationship with both the objectives.

Analysis of Customer’s behavior in E-commerce website
Authors: M.Tech.Scholar M. Bhavana, Asst.Prof. T.Venkatarammana, K. Suresh

Abstract:– Online shopping is becoming more and more common in our daily lives. Understanding users’ interests and behaviour is important in order to adapt e-commerce websites to customers’ requirements. The information about customers’ behaviour is stored in the web server logs. The analysis of such information has focused on applying data mining techniques where a rather static characterization is used to model users’ behaviour and the sequence of the actions performed by them is not usually considered. Therefore, incorporating a view of the process followed by users during a session can be of great interest to identify more complex behavioural patterns. To address this problem, this paper proposes a linear-temporal logic model checking approach for the analysis of structured e-commerce web logs. By defining a common way of mapping log records according to the e-commerce structure, web logs can be easily converted into event logs where the behaviour of users is captured. Then, different predefined queries can be performed to identify different behavioural patterns that consider the different actions performed by a user during a session. Finally, the usefulness of the proposed approach has been studied by applying it to a real case study of e-commerce website. The results have identified interesting findings that have made possible to propose some improvements in the website design with the aim of increasing its efficiency.

Test Suite Minimization and Parallel Scheduling
Authors:M.Tech.Scholar Shammi, Asst.Prof.Nitin Bansal

Abstract:– Testing is a vital but luxurious task vital for the assembly of elevated quality software. As such, there is outstanding possible for each useful method that enables the detection of extra faults alongside manipulated software assessing funds. One assessing strategy is to orient the assessing regimen concerning concrete, attainable criteria. Regression assessing is one of the vital maintenance hobbies, but it needs a outstanding deal of period and effort. Often, software firms have pressures alongside period and budget, so luxurious and time-consuming regression assessing might be a main burden for them. To vanquish these design and cost-related concerns alongside regression assessing, countless researchers have counseled assorted price competent regression assessing methods in particular, examination case prioritization methods have been actively learned because they furnish appealing benefits, such as flexibility for testers who demand to adjust their assessing efforts for the manipulated period and budget. The Counseled Examination case Minimization methods endeavor to design examination cases in an killing order according to given criterion. The main intention of this Minimization is to rise the likelihood that if the examination cases are utilized for regression assessing in the given order, they will extra closely encounter the goal than they should if they were gave in a little supplementary order.

Disruptive Analysis of opportunities for block chain and Distributed Ledgers in Telecom Industry
Authors: Deepanshu Rathi, Sushant Kumar, Suraj Singhal, Shivjeet

Abstract:– Block chain technology has huge opportunities in many industries and contexts. To a large degree, its trajectory will be driven by sectors like Financial services, international shipping and healthcare. But that will bring along telecoms with it – and there are also numerous signs of “grassroots” effort by the communications industry, especially when linked to new areas such as IoT.This fragmentation of effort also means that multiple vendors, integrators and block chain platforms (private, but also potentially public block chains) are likely to be relevant.

Assessment of Heavy Metal Concentration in Surface Water in Evwreni Town, Delta State
Authors: B.T.Sawere , K. Emumejaye

Abstract:– This study was designed to determine the concentration of heavy metals in samples of surface water collected randomly from within and around Evwreni Town, Delta state. Ten samples of the surface water were collected and taken to the laboratory for physicochemical properties analysis. The pH value ranged between 6.0 to 6.5. the Conductivity, between 106 to 217µs/cm, TDS was 61.3 to 87.9 and TH ranged between 84.1 to 143. The heavy metal concentration were as follows: Pb ranged from 0.001 to 0.005,Cu from 0.3 to 0.5, Fe from 0.4 to 0.9, Zn 0.2 to 0.6, Cr5 0.01 to 0.05 Co. from BDL to 0.04 and Ni from 0.01 to 0.04. All the concentration values for the heavy metals were lower than the set maximum acceptable concentration by WHO.

An Improve Revocation Mechanism Using Public-Key Concept with Validation for Delay Tolerant Networks (DTN)
Authors: M.Tech.Scholar Ritika Ujjainiya, Asst.prof.Tanvi Khandelwal

Abstract:– Delay –disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. Network security protocol is always required in any of the secure area, such as military. Delay-disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. Network security protocol is always required in any of the secure area, such as military. In DTN there majority of time does not exist the total path from resource to target which is leads to the difficulty of how to route the packet in such environment. Routing in such network is very difficult and for that different routing protocols are developed. In this work we discuss about various routing Strategy. DTN requires mechanism to authenticate messages at each node before forwarding it in the network. So, certificate revocation lists (CRLs) being distributed in DTN network will need to be authenticated and validated for issuer certificate authority (CA) at each node. In this study we work on CRL and update public-key collision in hash table is replaced by secure hash function algorithm SH2 with proper validation by CA. and improve network packet delivery ratio, average latency and throughput. For implementation we use the one simulator.

A Survey on Privacy Preserving Mining Features and Techniques
Authors: M.Tech.Scholar Deepa Agarwal, Asst.Prof. Jayshree Bauddh

Abstract:– The daily use of the word privacy concerning secure data sharing and analysis is commonly imprecise and should be dishonest. The branch of study that embody these privacy considerations are referred as Privacy Preserving Data Mining (PPDM). So these papers focus on this problem of increasing the robustness of the data. Here various approaches adopt by researchers are detailed with their field of security. Some of issue related to the papers is also discussed. Various approaches of association rule mining are explained for finding the or hiding the hidden information as.

A Study on Satisfaction level of Recruitment Training and Development programmes practiced among faculty members with special reference to T.john group of institutions, Bangalore
Authors: Saniya Bahar, Associate Professor Dr.Soniya K

Abstract:– The present study investigates that the Recruitment, Training and Development and its impact towards Job Satisfaction with special reference to T John Group of Institutions, Bangalore. The Recruitment, Training and Development are the elements of Human Resource Management which is predominantly worried about individuals at work and with their relationship inside the association. Enrollment is the way toward drawing in people on an auspicious premise, in adequate numbers and with fitting capabilities. Occupation fulfillment might be characterized as a pleasurable positive enthusiastic state coming about because of the evaluation of one’s activity or employment encounters. It is in this manner vital to have a decent comprehension of a person’s aggregate identity and esteem framework so as to comprehend and portray his/her activity fulfillment. The Training and Development programs insufficiencies in representatives. Preparing makes the representatives flexible. Preparing is the nerve that does the trick the nerve of familiar and smooth working of work which helps in improving the nature of work life of representatives and hierarchical improvement as well. Improvement is a procedure that prompts subjective and additionally quantitative headways in the association, particularly at the administrative level; it is less worried about physical aptitudes and is more worried about information, qualities, mentalities, and conduct notwithstanding particular abilities. Thus, improvement can be said as a ceaseless procedure while preparing has particular regions and goals. Along these lines, each association needs to examine the part, significance and focal points of Recruitment, Training and its positive effect on Development for the development of the association.Preparing suggests valuable advancement in the hierarchical intentions in ideal improvement of nature of work life of the representatives. These sorts of preparing and advancement programs help in enhancing the workers conduct and disposition towards the activity and furthermore inspire their resolve. Thus, the recruitment procedures practiced in the organization and the behaviour and attitude of the HR executive towards the applicants, the training and development programmes of the selected applicants/employees are important aspects which are needed to be studied and focused on from the organizational perspective. This paper focuses and analyses the literature findings on the job satisfaction of the faculties based on the HR Department’s contact with them, the satisfaction level of attending the different training programmes held at T. John Group and the participation and its impact on the faculties for various development programmes.

Internet of Things (IoT) Challenges and Applications
Authors: Asst.Prof.Rohit Tiwari, Asst. Prof. Monika Kohli

Abstract:– The Internet can be taken as a prodigious amalgamation of the powers of a system having Hardware and Software, as they say, you may like it or dislike it, but you cannot ignore the Internet. The Internet is said to be one of the most remarkable inventions of its time and it is the most used form of intercommunication, be it person to person or person to the machine. But there is one more form of intercommunication, getting popular nowadays, is Machine to Machine, wherein machines at both sides are not explicitly supervised by a person at that very time. The Internet of Things (IoT) is behind the evolution of this very form of intercommunication and also works as the backbone technology for the same. This research paper is an effort by the researchers to put some light on some of the most fundamental aspects of this phenomenal technology known in the world of technology, as the Internet of Things (IoT).

A Study on Topological Groups and Haar Measures
Authors: M.Phil.Scholar Suma Joseph, Dr.B.Senthil kumar

Abstract:– Compact right topological groups arise in topological dynamics and in other settings. Following H. Furstenberg’s seminal work on distal flows, R. Ellis and I. Namioka have shown that the compact right topological groups of dynamical type always admit a probability measure invariant under the continuous left translations; however, this invariance property is insufficient to identify a unique probability measure (in contrast to the case of compact topological groups). We amplify on the confirmations of Ellis and Namioka to show that a right invariant probability measure on the compact right topological group G exists provided G admits an appropriate system of normal Subgroups, that it is uniquely determined and that it is also invariant under the continuous left translations. Using Namioka’s work, we show that G has such a system of subgroups if topological centre contains a countable dense subset, or if it is a closed subgroup of such a group.

Investigation of the Bike Wheel Rims With Modified loop Wheel Reinvents
Authors: M.E.Scholar Shweta R. Chandure, Dr. S. M. Kherde

Abstract:– In today’s world, Bicycles are the most favorite choice when it comes to causes like health, pollution, and environment. Several researches have been done in order to make the ride comfortable. Distinctive sorts of cycles have been produced for different applications like Commuter Bikes, Mountain Bike, and Racing bicycle. This undertaking report introduces the Loop wheel which is outlined to such an extent that the suspension framework is coordinated inside wheel for higher stun engrossing execution and better comfort. Loop wheels offer you a smoother ride. Circle wheel springs are generally comprised of a steel material precisely created to offer ideal pressure and horizontal soundness and quality and strength. The three circles in each wheel work along as a self-amending framework. This spring framework between the center point and the edge of the wheel gives suspension that constantly acclimates to uneven landscape padding the rider from anomalies in the street wheel. The spring design allows the torque to be exchanged easily between the center point and the edge. In this project report loop wheel manufactured using C20 steel material and the analysis is done on ANSYS Workbench R15 to determine the stress developed during forces acting on wheel, maximum deflection, principle stresses.

Development of an Efficient and Secure Image Transposal Algorithm Using 16 *16
Quantization Table

Authors: Vijay Bhandari, Dr.Sitendra Tamarkar, Dr. Piyush Shukla

Abstract:– In later a long time, different mystery sharing plans for computerized pictures have been created in arrange to advance communication security. Past strategies in the writing have made endeavours efforts endeavours to accomplish the merits properties for a great mystery picture transposing such as execute (k,n) limit, basic recuperation, no pixel development, the produced covert image are important, the arrange of pictures is elective and lossless recuperation of the mystery image. To the leading of our information, no past mystery sharing scheme accomplishes all the over properties with great quality of important pictures. In this paper, we proposed puzzle image montages based on data stowing away hypothesis to make stride the quality of important pictures with lower computation and great expansibility.In the light of, the proposed plans have the important points of lossless and elective arrange recuperation and no pixel development expansion extension development.This is observing with past advance appear the execution of the planned conspires. The calculations displayed permit distinctive aligned of protection for the data covered up in the covering-documen.

An Online Based Question and answer system in Cloud Environment
Authors: M.Tech.Scholar P. Thilothama, Asst.Prof. K. Suresh

Abstract:– Question and Answer (Q&A) systems play a fundamental role in our daily life for information and knowledge sharing. Users post questions and choose questions to answer in the system. Due to the rapidly growing user population and the number of questions, it is not likely for a user to stumble upon a question by chance that they can answer. Also, humanity does not encourage all users to provide answers, not to mention high quality answers with a short answer. The major objective of this manuscript is to develop the performance of Q&A systems by dynamically forwarding questions to users who are proficient and willing to answer the questions.Social Q&A leverages the social network properties of common-interest and mutual-trust relationship to identify a reader through friendship, who are more likely to answer the question, and enhance the user security. We also improve Social Q&A with safety measures and efficiency enhancements by protecting user privacy and identifies, and retrieving answers automatically for recurring questions. We describe the architecture and algorithms, and conducted complete large-scale simulation to evaluate Social Q&A in comparison with other methods. Our results suggest that social networks can be leveraged to improve the answer quality and reader’s waiting time. We also designed a real web application of Social Q&A, and analyze the Q&A behavior of real users and questions from Social Q&A system.

A Survey on Image Retrieval Approaches with Features Utilization
Authors: M..Tech.Scholar Shalinee Jain, Asst.Prof. Ravi Gedam

Abstract:– Image search refers to finding the precise images related to the user inquiry. Image re-ranking is an efficient way for web-based image search. In image re-ranking, users' intention is captured by one-click on the query image. This assists in providing better search results to the users. This paper presents survey of various techniques which are used for image identification was utilized uptil now is condensed with benefits and drawbacks of these prior proposed work. Here various visual image features are also explained for relevant image detection. Firstly it introduces the object queries which
gives result images specific to some kinds of objects and retrieval models.

A Review Transformer soft Computing Ann, Svm and Genetic Algorithem
Authors: M.Tech.Scholar Sanjay Varfa, Prof.Khushboo Nagar

Abstract:– Transformer soft computing has a very important in the power system such as energy consumption demand Soft computing (ECDF) and peak Transformer Soft computing (PLF). It is a useful tool for a unit commitment and fuel reserve planning in power system. The Transformer demand is depended many variables like industrial index, consumer price index, fuel price, salary index, money exchange, temperature, humidity, and wind speed. Transformer forecast can be classified into four differential types. Very short term Transformer soft computing have period time in a minute, it is importance for real time operation. Short-term Transformer soft computing have period time in a minute to three months, it is importance for unit commitment and operation. Mid-term Transformer soft computing have period time in three months to three years, it is importance for fuel reserve planning and unit commitment. Finally, Long- term Transformer Soft computing have period time in three years to not over fifteen years, it is importance for generation and power plant planning. In this research will offer the energy consumption demand forecasts. It is a very important for fuel reserve planning and unit commitment in power system.

Privacy Protection and Intrusion Avoidance for Patient Medical Data Sharing in Cloud Computing
Authors:M.Tech.Scholar B.Siva Kumar Reddy, Asst.Prof.K. Suresh, Asst.Prof.K. Suresh

Abstract:– With the popularity of smart electronic devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users’ sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Along these lines in this paper, we develop a novel human services framework by using the adaptability of cloudlet. The elements of cloudlet incorporate security assurance, information sharing and interruption location. In the phase of information accumulation, we initially use Number Theory Research Unit (NTRU) technique to scramble client’s body information gathered by wearable gadgets. Those information will be transmitted to close-by cloudlet in a vitality productive form. Also, we introduce another trust model to assist clients with selecting trustable accomplices who need to share put away information in the cloudlet. The trust demonstrate additionally causes comparable patients to speak with each other about their illnesses. Thirdly, we partition clients’ therapeutic information put away in remote billow of healing facility into three sections, and give them appropriate insurance. At long last, keeping in mind the end goal to shield the medicinal services framework from malignant assaults, we build up a novel cooperative interruption discovery framework (IDS) strategy in view of cloudlet work, which can viably keep the remote social insurance huge information cloud from assaults. Our examinations show the viability of the proposed conspire.

Evaluation of Hazards by Event Tree Analysis and Assessment of Toxicity Index using Aloha In Pharma Industry
Authors: M.Tech.Scholar Rahul Parmar , Asst.Prof.Vivek Shukla

Abstract:– Chemicals are highly hazardous in nature. Starting from the initial stage of manufacturing till the storage of raw chemicals is dangerous to human life. This study has been done in pharma industry where the workers are exposed to hazardous chemicals such as chlorine dioxide, hydrogen peroxide, methanol and the same. The physical and chemical properties of the chemicals are studied. The second step is Checklist analysis where the needed data are gathered which are going to be used for further steps. At next step, to select a highly hazardous chemical, Toxicity Index Calculation is used to rank the chemicals based on the data collected from checklist. After the selection of the hazardous chemical, the next step is to find out what is the next event going to happen if there is a release. For which, Event Tree Analysis (ETA) is used in this step. The next step after finding the final event from ETA is to find the how it is dispersed into atmosphere and how much distance it covered. It can be easily found out using the ALOHA Dispersion Software. The next step is human health and safety loss calculation using the distance found out by software and compensation amount gathered from law. The final step is to make the precautionary & preventive measures to avoid the toxic dispersion into atmosphere and the emergency preparedness should be prepared for what should be done during the toxic release.

A Review Article of FPGA ALU Unit Design Based on GA
Authors: M.Tech.Scholar Sakshi Samaiya, Asst. Prof. Anupreksha Jain

Abstract:–The paper primarily deals with review for the construction of arithmetic Logic Unit (ALU) using Hardware Description Language (HDL) using Xilinx Vivado 14.7 and implement them on Field Programmable Gate Arrays (FPGAs) to analyze the design parameters. ALU of digital computers is an aspect of logic design with the objective of developing appropriate algorithms in order to achieve an efficient utilization of the available hardware. Speed, power and utilization of ALU are the measures of the efficiency of an algorithm. In this paper, we have simulated and synthesized the various parameters of ALUs by using VHDL on Xilinx Vivado 14.7 and Basys 3 Artix 7 FPGA board.

Distance Based Accident Avoidance System Using Arduino
Authors: M.Tech.Scholar Shraddha Boshat, Asst. Prof. K. Priyanka Sahu, Asst. Prof. Shubham Yadav

Abstract:–In this paper, we present another system in car innovation about how to forestall street mishap on India in these we keep 10 meter remove between one vehicle and another vehicle, with the goal that the vehicle don’t crash or cause any activity issue. The point of the framework is to avert mischances mostly because of not knowing the accompanying separation (i.e., 5m) between one vehicle and another vehicle. The proposed framework contains a thought of having security while turning around a vehicle, recognizes any question inside the accompanying separation, and presentations the separation between one vehicle and another vehicle to the driver utilizing LCD. We have utilized ultrasonic sensors to distinguish any vehicle on both front and posterior of our vehicle. This framework is additionally utilized as a part of vast crane which is principally worked in harbor zone. On the off chance that the auto achieves 10 meter, green shading light will gleam. At 8 meter separate yellow shading light will shine. When it achieves 5 meter remove red shading light will gleam. The separation is likewise demonstrated to the vehicle driver. By this proposed framework the security is kept up on swarmed zones and in vehicle turning around process.

A Review Article of Instrumental Amplifier 16 Bit Pipelining ADC
Authors: M.Tech.Scholar Meenu Jain, Asst. Prof. Anupreksha Jain

Abstract:–Analog to digital converter is the important component in signal processing and communication system. It is a mixed system which converts the analog signals into the digital signals for transformation of sensor data. There are many types of ADC’s available such as pipeline ADC, successive approximation ADC, delta sigma ADC etc. In present day CMOS technology the flash ADC is composed by utilizing the dynamic method, it reduces the power, and delay. A flash ADC is extremely valuable for fastest speed operations when it is compared with the other ADC architectures. Comparator and Encoder are vital part of flash ADC. This paper presents review of Efficient Low Power High Speed Flash ADC Techniques.

Measure the Dynamics of Malaria Transmission Using Entomological Approaches at Natitingou, Northern-East of Benin
Authors: Yadouleton Anges, Aïkpon Rock, Klotoe-Jean Robert, Agbanrin Ramziyath, Tchibozo Carine, Ahissou Fabrice, Houndeton Geraldo, Agolinou Achaz, Kpodo Edwige, Kpodjedo Jeanne, Akogbeto Martin

Abstract:–To evaluate the level of malaria transmission at Natitingou Northern-East of Benin, a cross sectional entomological study was carried out from April 2016 to March 2017 in urban and rural areas of this city. Adult mosquitoes were collected in both areas by Human Landing Catch and Indoor Pyrethrum Spray Catches (PSC). Entomological parameters like the human biting rate (HBR ; the number of mosquitoes biting a person during a given time period (bites/p/t, time being night, month or year); the Circunsporizoite protein (CSP) rate (CSP; the proportion of mosquitoes found with Plasmodium falciparum CSP over the total number of mosquitoes tested and the Entomological Inoculation Rate (EIR; the number of infective bites of anopheline per person per unit of time (bi/p/t) and calculated as the product of the HBR by the CSP rate) were evaluated in the city. A total of 21,018 mosquitoes were collected between April 2016 and March 2017. Culex Spp was the dominant and represented 82.08%. Anopheles spp which contributed to malaria transmission represented 17.09%. The remaining (0.8%) were Aedes spp and Mansonia spp populations. Moreover, the highest bites of An. gambiae s.l. during the rainy season was found in August at urban (33.75bites/p/n) and rural (25.83 bites/p/n) but, there is no significant different between the average HBR of An. gambiae s.l. in urban area (11.41 bites/p/n) and in the rural area (8.21 bites/p/n) (P>0.05). Transmission was high during the rainy season (June to November) and low during the dry season (December to May) and was vehicled by An. gambiae Colluzzi (65%). and An. arabiensis (35%). The EIRs were significantly higher in the dry season in urban area (0.125bi/p/n) than in rural area (0.021 bi/p/n) (P < 0.05). However, during the rainy season, there was no significant difference between the EIRs from urban and rural areas (P > 0.05). These findings showed that malaria is permanent at Natitingou both in urban and in rural area and was vehicle by An. Coluzzi and An. Arabiensis. These results will be useful to implement a strategy against malaria in this city.

A Review Article of Various old Methods to Improve Thermal Plant Efficiency
Authors: M. Tech. Scholar Indrajit Patidar, Asst. Prof. Nilesh Sharma

Abstract:–This research paper analyses the operational parameters of a thermal power plant to improve effectively& efficient running of the machine while ensuring a degree of compliance with statutory regulations. This study aims to identify the operational gaps associated with running operational parameter in power plant process. It is focused to detect a different thermodynamic variable involved, being multivariate and automatic. For variation of each one of this operational parameters, performance calculations are find out to configure a database of energy variation. The variable data sets now can be used as assessment criteria based on detecting deviations from a reference system that has been updated during plant-performance tests. Although the most important outcome is the highly precise and valuable information that will be obtained on the live operating mode, leading to a head improvements in the cycle efficiency and achieved in the overall control system of the thermal plant. The main aim is to detect any abnormality, reacting as quickly as possible to return the plant to a normal operation mode at best efficient manner.

Factorization in Integral Domains
Authors: M. Phil Research Scholar Suja Joseph, Dr. B. Senthil kumar

Abstract:The M-evaluated spaces R = M Rm, which are nearly Schreier are classified under the suspicion that the fundamental conclusion R of R is a root augmentation of R, where M is a without torsion, commutative, cancellative monoid. For the situation that D[M] is a commutative monoid area it is demonstrated that if M funnel shaped and D[M] ⊆ D[M] is a root augmentation, at that point D[M] is nearly Schreier if and just if M and √D are nearly Schreier. On the off chance that R = Æ[nx] is a request in a quadratic augmentation field $( d) of $, it is demonstrated that the conditions; R[X] is IDPF; R[X] is inside factorial; R[X] is nearly Schreier; R[X] ⊆ R[X] is a root expansion; and each prime divisor of n likewise partitions the discriminant of the augmentation K/$; are equal conditions.

A Comparative Chemical Analysis of Phyto-chemicals Content of Green Cabbage and Red Cabbage
Authors: Nida Tanveer, Gulrez Nizami, Mohammad Azam, Mohammad Arshad, Sheela, Farman Ali, Shifa Rehman Merajuddin

Abstract:–Cabbage is very grandly essential vegetables in the whole world. It becomes into the Brassicaceae family. In this investigation of phytochemical, comparative study of red cabbage and green cabbage were carried out. Some phytochemical were present in both red cabbage and green cabbage while some phytochemical were absent. The phytochemical analysis of red cabbage powder extracts indicated with exist certain phytochemical compound. Some phytochemical in powder extracts such as saponin, tannin, flavonoids, glycosides, and alkaloid were present in a large amount and phytosterols found in only methanol extract. In the analysis of red cabbage juice tannin, phytosterols, flavonoids, and alkaloid were present in each extract of red cabbage juice but the glycoside was present in methanol extract and saponin was found in methanol extract and water extract. The phytochemical detection of green cabbage powder and juice extracts confirmed that the phytochemical is found in a small amount. The phytochemical analysis of green cabbage and red cabbage powder or juice founded that the Phytochemicals were present a small amount in green cabbage as compared with red cabbage. The phytochemical analysis of green cabbage juice and water revealed that the phytochemicals were present in a small amount as compared with red cabbage.

A Study on Only Kind of Real Number an Integral Domain
Authors: M. Phil Research Scholar Suja Joseph, Dr. B. Senthil kumar

Abstract:We take a broad view the notion of “unique factorization domain” in the spirit of “half-factorial domain”. We show that new generalization of UFD implies the now well known notion of half factorial domain. As a consequence, we discover that the one of the normal axioms for unique factorization domains is unconscientiously redundant. That is, we interested in factoring numbers in integral domains so we have to scrutinize distribution, and so this post will begin with a fairly cursory look at the properties of distribution. At that moment we willpower bring in the crucial ideas of units and acquaintances. In the Real number, 1 are units and n, for any fixed n, are associates.

Centrally Suspended Cage-less Differential Gearbox
Authors: Jay Ghodke, Mihir Gajendragadkar, Deepesh Dubey, Ishwari Dighe

Abstract:In the 21st century, the technological advancements are at its peak. Considering the automobile industry, vehicles with better performance parameters are at our disposal compared to the former vehicles and their technologies. The centrally suspended cage-less differential gearbox is one such innovation which aids the performance of the vehicles like improved cornering efficiency, reduced weight, equal torque distribution and elimination of uneven centre of gravity compared to the conventional differential gearbox. In this study the theoretical designs of the gearbox were obtained using standard design formula. The CAD models were designed on CATIA V5. The models were analysed using ANSYS workbench. After obtaining satisfactory results, manufacturing of the gearbox assembly was carried out.

Published by:

International Journal of Mechanical Sciences, Journal of Engineering and Applied Sciences

Uncategorized

Submit Your Paper  / Check Publication Charges

This journal provide Provide High impact factor for the publish papers as reach of this journal is good. Here researcher not only publish paper but also used papers of this journal for there references. So its an international journal of mechanical sciences where students / scholars from Mechanical branch include thermal, automobile, material science etc. This IJSRET journal accept paper from other branch  also so its an journal of engineering and applied sciences as well. As number of researcher submit and publish paper in these field of mechanical sciences and engineering.

 

So we call all researchers / students to find and submit there research work of mechanical sciences of engineering and applied sciences to come on IJSRET for following reasons:

  • We provide fast publication process.
  • Live support in paper submitting by chat / emails.
  • Instant payment option through our website from various sources of national and International researchers.
  • Quick response for each submitted paper by forwarding to respected reviewer.
  • Provide proper guideline for improving the quality of the paper as well.
  • Do paper formatting at journal end only.

So we call people who are looking for

International Journal of Mechanical Sciences, Journal of Engineering and Applied Sciences to come and publish papers.

Published by:

IJSRET Volume 4 Issue 3, May-June-2018

Uncategorized

Privacy Preserving and Identity Based Public Auditing of Data in Cloud

Authors:M.Tech Scholar G.Sivagama Sundari, Asst. Prof. Rakhe eBhure

Abstract:–Distributed storage framework gives facilitative record stockpiling and sharing administrations for circulated customers. To address uprightness, controllable outsourcing, and starting point inspecting worries on outsourced records, it propose a personality based information outsourcing (IBDO) plot furnished with alluring highlights beneficial over existing recommendations in securing outsourced information. To begin with, the IBDO conspire enables a client to approve committed intermediaries to transfer information to the distributed storage server for her sake, e.g., an organization may approve a few representatives to transfer documents to the organization’s cloud account controlledly. The intermediaries are distinguished and approved with their unmistakable characters, which wipes out entangled endorsement administration in common secure dispersed processing frameworks. Second, the IBDO conspire encourages extensive reviewing, i.e., the plan not just allows normal trustworthiness evaluating as in existing plans for securing outsourced information, yet in addition permits to review the data on information root, sort, and consistence of outsourced documents. Security investigation and trial assessment demonstrate that the IBDO conspire furnishes solid security with attractive proficiency.

An Efficient Feature Verification in Image Matching

Authors:Kusuma S (M.Tech), Prof. Kalaimathi B

Abstract:–In present era, verifying the correlation between two features is essential in preventing the disasters such as copy attacks. In this paper, image processing technology applicable in extracting and verifying the image features is discussed. Existing methods which are employed for verification are found to be computationally expensive. Thus an enhanced RANSAC (Random Sample Consensus) algorithm for effective verification of features is employed. It is a multistep line towards verification. Firstly, it involves extraction of features using SURF (Speeded Up Robust Feature) descriptor with RGB color concept. Secondly, verifying the features of images through a match by choosing multiple descriptors in random and thus promoting effective timeliness. The employed method can process huge collection of images of a particular dataset.

Design of a Reversible Central Processing Unit components using Verilog HDL

Authors:M.Tech. Scholar Asra Jabeen, Asst Prof. Pooja M

Abstract:–Balanced mapping from contribution to outcome is the fundamental condition for a reversible computational model traveling starting with one condition of dynamic machine then onto the next. Presumably, the greatest inspiration to examine reversible advances is that, it is thought to be the best powerful approach to upgrade the energy effectiveness than the ordinary models. The examination on reversibility has demonstrated more prominent effect to have colossal applications in rising advances, for example, Quantum Computing, QCA, Nanotechnology and Low Power VLSI. In this paper, we have acknowledged novel reversible engineering segments of Central Processing Unit (CPU). The Central Processing Unit (CPU) is the essential part of a PC that procedures direction. It runs the working framework and applications, continually getting contribution from the client or dynamic programming programs. It forms the information and produces outcome, which may store by an application or showed on the screen.

A Novel Sleep Switch leakage Mitigation technique in DSM Technology

Authors:M. Tech. Scholar Jaya Nigam, Asst. Prof. S.S. Gawande

Abstract:–This paper proposes new technique ON OFF based domino and examines with inputs and clock signals combination in 32nm technology with footerless domino circuit for reduced leakage current. In this technique a p-type and an n-type pass transistor logic are introduced between the pull-up and pull-down network and the gate of one is controlled by the source of the other. Therefore the main focus in proposed work is given into the noise immunity of the circuit. The problem of leakage current here is optimally solved by the keeper transistor logic. In the proposed work two keeper transistor terminologies is taken into account which gives better performance in delay variability which is a big concern for high performance circuit application. The proposed circuit technique for AND2, OR2, OR4 and OR8 circuits reduces the active power consumption by 50.94% to 75.68% and by 64.85% to 86.57% at low and high die temperatures respectively when compared to the standard dual threshold voltage domino logic circuits.

A Survey on Home Automation Systems

Authors:M.E.Scholar R. Rajalakshmi

Abstract:–Internet of Things (IOT) is nothing but connecting different real world objects to provide proper communication, synchronization, and inter-connecting between various devices or physical appliances is also known as “Things”. The Home Automation System (HAS) is extension of current activities performed inside the home and this Home Automation System (HAS) can be developed easily now a day’s, because of powerful computational devices and wireless sensor network(WSN), to provide user friendly and cost fairly home automation system. In Home Automation System (HAS), different technologies like WiFi, Bluetooth and Zigbee are used for communication, and different devices like smart phone, tablet and laptop used for controlling various appliances. In this paper we detailed a survey on different home automation systems considering parameters like type of communication, cost, technology and efficiency of system. A comparative analysis of home automation system is done. In future this system may have high demand and usage for automation of the “Things”. Using Home Home Automation System (HAS) our home will be smart home that can operate without any physical interference of human being.

An Artificial approach to Classify Text Document by Utilizing Clustered Terms

Authors:M. Tech. Scholar Shivangi Pandey, Prof. Deepak Tomar

Abstract:–As the web clients are expanding, so advanced information on servers are increasing, this draws researcher from content mining field to upgrade different services. As different issues are emerge on the server, for example, information dealing, security, support, and so on. In this paper article characterization is recommended that group the document in proficient way. Here Error back propagation artificial neural network was used for the grouping. Proposed approach characterizes the information on the premise of text document features where preparing of neural network is perform by binary contribution of the content. While in testing stage content archives are order according to neural network output. Investigation is perform on genuine and in addition artificial dataset. Result demonstrates that Proposed work is better when compared with past work on various assessment parameters.

A Study on the Strength Behavior of Concrete by Partial Replacement of Cement with Cotton Plant Ash

Authors:Asst. Prof. M. Bhuvaneswari

Abstract:–Cement is widely noted to be the most expensive constituents of concrete. The entire construction industry is in search of a suitable and effective waste product that would considerably minimize the use of cements and ultimately reduces the construction cost. This paper describes the research into use of agricultural wastes in concrete through the development of concrete in corporation cotton plant ash(CPA) as a partial replacement for ordinary Portland cement(OPC). It gives the scope to utilize CPA for civil construction works as a partial replacement for cement so as to keep the environment green and also seeks to optimize the benefits of using CPA in concrete as a replacement for large proportions of cement. Different cotton plant ash (CPA) concretes were developed by replacing 10%, 20%, 30% and 40% by weight of ordinary Portland cement with CPA for M20 grade concrete. The results indicated that the substitution of cement with CPA in Concrete production was relatively possible not exceeding 10% having good compressive strength, Performance and durability. There was a sharp decrease in compressive strength beyond 10% of CPA substitution. The test results indicate that replacing proportions of cement with 10% CPA would provide improved strength and a most cost effective solution.

Analyze the Mechanical Properties of Pervious Concrete by Using Titanium Dioxide (Tio2)

Authors:Asst. Prof. M. Bhuvaneswari

Abstract:–In many developed countries, the use of pervious concrete for the construction of pavements, car parking and driveway is becoming popular. The pervious concrete is produced by using titanium dioxide (TIO2). This concrete are tested and its properties, such as compressive strength, spilt tensile strength, and water permeability. The most important properties of pervious concrete is drainage facility through permeability. Pervious concrete is a concrete containing with or without fine aggregate (no fines concrete); it consists of coarse aggregate and cement paste. It seems pervious concrete would be a natural choice for use in structural application. It consumes less raw material than normal concrete (no sand), it provide superior insulation value when used in walls and through the direct drainage of rain water its help to recharge ground water in pavement application by using the titanium dioxide.

Study the Strength of Concrete Made Using Glass Powder as Partial Replacement of Cement

Authors:Asst. Prof. Brajesh Kumar Suman

Abstract:–Climate change or global warming is caused by emission of green house gases such as carbon dioxide, methane, ozone, water vapor to the atmosphere among them carbon dioxide play important role to enhance the global warning about 65% .The world wide cement industry contributes about 7% of green house gas emission to environment. Keeping in mind to address ecological impacts related with cement manufacturing there is a need to create alternative binding material for concrete therefore broad research is on going in to the utilization of cement replacement utilizing many waste materials. Efforts have been made in concrete to utilize waste glass as partial replacement of coarse, fine aggregate and cement. In present study glass powder is used as a partial replacement of cement in concrete and compared with conventional concrete. To accomplish cement is replaced by glass powder from 0 to 30% at an interval of 10 and tested for its compressive strength. Results show the compressive strength increases at 10% replacement of cement with glass powder.

A Survey on Various Techniques and Features of Sentiment Analysis

Authors:M. Tech. Scholar Arunes Pratap Singh, Asst. Prof. Manisha Patel

Abstract:–As the digital data increases on servers different researcher have focused on this field. The field of sentiment analysis, in which sentiment is gathered, analyzed, and aggregated from text, has seen a lot of attention in the last few years. The corresponding growth of the field has resulted in the emergence of various subareas, each addressing a different level of analysis or research question. In this paper text sentiment analysis was detailed by various techniques of researchers. Here diverse attributes for the text sentiment analysis is explained in detailed with their necessities as attribute vary as per text study.

An Seller in E-commerce Online Website

Authors:Ampattu Sajo Thomas, Anwar Sayyed

Abstract:–To become a seller in an Online Website, first we need to decide an Store Name and which Product should be sold. Amazon would be an best Online website for selling. To Create an Seller Account in Amazon, we need to have the required documents with us such as Gumasta License , GST or VAT number and a Current account for the transactions in any Bank. As the Seller Account in created, we need to upload our product to the website with the help of the catalogue template provided to us by the Amazon. The Account provides us an choice of selling like an Happy Seller and Non- Happy Seller. In Happy Seller the Amazon is also known as FBA- Fulfillment By Amazon and it will take care of all the responsibilities from the Seller like Order fulfillment, delivery, return and refund and Rating as well. In Non-Happy Seller, the Seller has to take care of all the responsibilities of order fulfillment, Delivery, Return and Refund and Ratings as well. Ratings of an Account is based on Customer Feedback, Customer Messages, Late Shipment, Order defect rate.

Behaviour of Skirted Footing Resting on Sea Sand

Authors:Dr. Mariamma Joseph, P.G. Scholar Anju. A.S

Abstract:–To understand the vertical load carrying capacity of soil and in order to solve the combined load carrying problems it is very much necessary to study the relationship between vertical load and its corresponding vertical displacement in soil. Structural skirts hold good as an alternative method of improving the vertical load carrying capacity and reducing the settlement of footing resting on soil. Structural skirts are being used underneath shallow foundations of offshore structures for many decades due to their stability advantages and due to its ease of installation. These foundations are economical, as they lead to cost saving through reduction in materials and in time required for installation. These type of foundations have been used for a considerable period to increase the effective depth of the footing in marine areas and other situations where water scouring is a major issue. In this project work, a series of vertical load test was conducted for different relative density and different skirt length to diameter ratio .Tests were conducted on circular footing placed centrally on sea sand filled tank with and without skirts in different combinations of height and diameters. From the various set of data’s obtained, comparison was made between the results of unconfined case and confined case.

Wastewater Treatment by Root Zone Technology Option for Domestic Waste

Authors:P.G. Scholar Surekha Thorat, Asst. Prof. V. V. Sasane

Abstract:–Root Zone Bed System is one of the lowest cost methods to treat wastewater. With the help of this system we can treat the Non-Point sources with the best results. To achieve this goal, we have to divide the Non-Point sources into constructing channels within the river bank followed by root zone bed or if the NonPoint Sources is coming from natural nalas we can provide this system within its Channel. For model practice, I have prepared reactor on which I have developed the root zone bed and have lab analysis of rector output on a number of parameters. Flow rate and Detention time are the two factors on which channels are to be designed. Therefore, I am changing the flow rate and finding out the change in parameter with respect to detection time. Planting Colacassia and Canna plant. Both plant get nearly same result but we can use planting as per requirement. The optimization is when we get better results with maximum flow. I have got satisfactory results for the detention time of Three days, Seven days and Fifteen day. With the help of this data I have designed the root zone bed system for the domestic wastewater. Coat of root zone technology is small as compared to conventional system.

Comparative Study of RCC Building Considering Effect of Braced Wall Line

Authors:M.Tech Scholar Shailesh B Pahilwan

Abstract:–The effects of the introduction of steel plate shear walls in buildings, on the bending moments, the shear forces, axial loads of the beams and columns and the story drifts are mainly observed. This is because of the fact that the mechanism of shear resistance by the steel shear walls is entirely different than that of the RCC shear walls. Some multistory buildings with SPSWs are analyzed by the equivalent static method as given by the IS 1893 (Part 1): 2002. The strip model as suggested by the code of Canada and the researchers is used to model the steel shear wall using the popular FEA software, the SAP 2000. The strips in the strip model are modeled using the frame element.

Analysing Various Security Attacks in Remote Sensor Networks

Authors:Er. Himanshi Vashisht, Associate Professor Sanjay Bharadwaj, Sushma Sharma

Abstract:–A remote sensor networks is a recent advancement of technology of computer networks and electronics. Its sensing technology in combination with its processing power and wireless communication makes it productive for its abundant exploitation in the near future. A remote sensor arrangement generally, contains sensors, actuators, memory, a processor. The nodes in this network are not connected to a central node, and are self-managing. They are not connected to a specific network topology, practise multi-way routing, preserving the integrity and confidentiality of data, and are robust making them highly applicable for military applications. With development in such applications, security of data has become a crutial need keeping in mind that the end goal is to ensure that the touchy and confidential informationis also included. These networks are prone large number of disastrous attack or hacks such as Sybil, Wormhole, Sinkhole, etc. that threaten data flow or may have a motive to disrupt the entire network. The assault becomes even more viable when the attacker incorporates itself on the way of information flow. In this context, we analysis security aspects of the remote sensor networks like requirements, classifications, and type of attacks etc., in this survey paper.

Analysis of RCC Building Considering the Effect of Variation in Thickness of Steel Plate Shear Wall

Authors:M.Tech Scholar Shailesh B Pahilwan

Abstract:–The effects of the introduction of steel plate shear walls in buildings, on the bending moments, the shear forces, axial loads of the beams and columns and the story drifts are mainly observed. This is because of the fact that the mechanism of shear resistance by the steel shear walls is entirely different than that of the RCC shear walls. Some multistory buildings with SPSWs are analyzed by the equivalent static method as given by the IS 1893 (Part 1): 2002. The strip model as suggested by the code of Canada and the researchers is used to model the steel shear wall using the popular FEA software, the SAP 2000. The strips in the strip model are modeled using the frame element.

An NFC Featured ATM Cards with Biometric for Secure Transactions

Authors:Asst.Prof.Mrs.Vandana, M. Tech. Scholar Ms.Swetha Y

Abstract:– With the payment cards such as Debit and Credit cards usage becoming more common and rapid so are the number of ways to exploit the vulnerabilities associated with them and have become common target for cyber criminals. Moreover, the customer goes through the experience of a laborious process of interacting with the customer care center and to do the necessary errands thus increasing the turnaround time to achieve the end goal that is, to get the payment card blocked or to get a replacement card. This document comprising of a Near Field Communication (NFC) device that can be used as a potential solution to overcome the transaction liabilities (brute force attack, shoulder surfing, skimming of ATM cards etc.) involved in using the payment cards. An additional feature involving blocking/deactivating ATM cards is achieved using QR code technology for authentication scheme.

A Novel Low Power 11T SRAM Design Cell in Nanometer Regime

Authors:M.Tech.Scholar Rahul Baghel, Suresh S Gawande

Abstract:– Now a day’s low power SRAMs have become a critical component of many VLSI chips. This has especially true for microprocessors, where the demanding on chip cache sizes are growing with each generation to bridge the increasing divergence in the speeds of the processors and the main memory. Simultaneously, power dissipation has been becoming an important factor to recognise due to the increased integration and operating speeds, as well as due to the explosive growth of battery operated applications. This proposed 11T SRAM has been compared with standard 6T SRAM and existing 9T SRAM (with bit-interleaving capability) in term of Power consumption, Delay and Power Delay Product (PDP) at various supply voltages as 1.8V, 1.6V and 1.4V. For the stability analysis SNM (Static Noise Margin) also analyzed at the supply voltage 1.8V. The proposed 11T SRAM proves to be better in terms of power and PDP at all the supply voltages. At 1.8V power saving by the proposed design is 73.88% and improvement in PDP is 71.53% compared to standard 6T SRAM cell and significant improvement is observed at other supply voltages also. In term of stability the proposed design proves better as compare to existing circuits.

Security Analysis and Implementation of Private Cloud Infrastructure using Cloud Stack

Authors:Jitendra singh

Abstract:– In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Big companies like Amazon, Google, Microsoft etc., expand their market by adopting Cloud Computing systems which enhance their services provided to a large number of users. However, security and privacy issues present a strong barrier for users to adapt into the Cloud. This research investigates the security features and issues of implementation of cloud platforms using Cloud Stack. The goal was to identify security weakness in terms of Authentication and Identity Management (IAM), and Data Management. Base on the findings, specific recommendations on security standards and management models have been proffered in order to address these problems. These Recommendations if implemented, will lead to trust in cloud computing systems, which in turn would encourage more companies to adopt cloud computing, as a means of providing better IT services.

Self Generative Electric Vehicle

Authors:Asst.Prof.B.Ponkarthika, Dr.E.Kaliappan, Asst.Prof.V.Vijeesh

Abstract:– Transportation accounts for about one-fifth of global energy use and passenger vehicles account for about ten percent of energy-related carbon dioxide emissions. During the last few decades, environmental impact of the petroleum-based transportation infrastructure, along with the fear of peaking oil prices, has led to renewed interest in an Electric transportation infrastructure. Electric Vehicles (EVs) differ from fossil fuel-powered vehicles. The way electricity is consumed in EVs can be generated from a wide range of sources such as solar power, tidal power and wind power or any combination of these. The generated electricity may then be stored on board by using a battery, flywheel, or super capacitors. EVs include road and rail vehicles, surface and underwater vessels, electric aircraft and electric spacecraft. As it is well known one of the drawbacks of these electric vehicles is their driving range. The driving range can be increased with the help of Self-generation and Regeneration operation. Regenerative braking system replaces the traditional braking system in cars as the traditional braking system produces more heat during braking. Therefore the Regenerative braking system ensures high capability of energy storage in braking conditions and under normal operation.

A collision-Mitigation cuckoo hashing scheme for large scale storage systems

Authors:Asst.Prof. Mrs.Kavyashree .C, M.Tech.Schalor Bhagyalakshmi H N

Abstract:– Cloud computing systems consume an outsized quantity of system resources; it’s still difficult to get correct results for question requests in a real-time manner. Due to space inefficiency and high complexity hierarchical addressing schemes fail to meet the wants of real time queries. So as to support real-time queries, hashing based information structures are widely utilized in constructing the index due to constant-scale addressing complexity and fast query response. Unfortunately hashing based information structures cause low space utilization, as well high latency risk of handling hashing collisions. Traditional techniques used in hash tables to deal with hash collisions include open addressing, chaining and coalesced hashing. Cuckoo hashing addresses hashing collisions via simple “kick-out” operations, which moves items among hash tables during insertion, rather than searching the linked list (i.e. hierarchical addressing).

Experimental Investigation on Behaviour of Natural Fibre Concrete (Sisal Fibre)

Authors:Asst.Prof. N.Saravanan, M.Buvaneshwari

Abstract:– Fibre reinforced concrete contains discontinuous discrete fibers along with cement, water, fine, coarse aggregate. Sisal fibre is generally used as the natural discrete fibres. It is extracted from the leaves of sisal plant. The concrete with sisal fibres are called as Sisal Fibre Reinforced Concrete (SFRC). The sisal fibre reinforced concrete can enhance many of the engineering properties of the basic materials, such as fracture toughness, flexural strength and resistance to fatigue, impact, thermal shock and spalling. In this project work, the general properties of the composites are described in relation to fibre content, length, strength and stiffness. The mix is designed for M30 grade concrete with w/c ratio of 0.52 .The mix ratio 1:1.92:3.24 is arrived as per IS code.10262:2009. The sisal fibre of 50mm length and 4 to12 μm. Diameter is used. The specimens are prepared by adding fibre content of 0.5%, 0.75%, 1.0%, 1.25%, 1.5% and 2% volume of concrete. Further specimens are to be cast for 2.5 % Volume of concrete. A total of 15 cubes, 15 cylinders, 15 prisms are cast for SFRC in addition to 3 cube, 3 cylinder and 3 prism specimens for conventional concrete. The Hardened concrete properties of cast specimens after 7 days of curing is tested and the results are compared with conventional concrete. The strength properties of SFRC is found to increase with increase in fibre content upto 1.5%. The results are yet to be found for fibre percentage above 1.5% whose casting is under progress. After that Optimum percentage of sisal fibre content will be founds.

A Review Article of Balancing Assembly Line Using Particle Swarm Optimization Algorithm

Authors:Asst.Prof.Prakash Girwal, M.Tech.Scholar Nikhil Porwal

Abstract:– This review article presents the application of particle swarm optimization (PSO) algorithm for the simple assembly line balancing problem, SALBP-I. A new indirect encoding method for the solution of SALBP-I is developed to keep the feasibility of operation sequence. The particle that represents a feasible operation sequence is based on a smallest position value rule. Given the defined by a particle, the optimal assignment of the operations to the workstations is identified by an optimum seeking procedure with polynomial-time complexity. Then PSO is employed to find the optimum efficiently in the search space comprising the optimal assignments associated. The PSO algorithm is tested on a set of problems taken from the literature and compared with other approaches. The computation results show the effectiveness of the algorithm.

Novel Forced Stack based Power-on-Reset circuit for low energy application

Authors:M.Tech. Scholar Ishika Raj, Mr. Ashish Raghuwanshi

Abstract:–This novel article describes both the function of Power-on Reset (POR) and the strategies for low energy application, when used with dual-supply SoC’s. The article demonstrates why to avoid discrete PORs and PORs internal to processors. It concludes with explanations of voltage sequencing, voltage tracking, and reset sequencing. Design of a low-energy power-ON reset (POR) circuit is proposed to reduce the energy consumed by the stable supply of the dual supply static random access memory (SRAM) using FET devices, as the other supply is ramping up. The proposed design is based on stacking of pull-up and pull-down transistor in push-pull output stage also called sleepy approach to reduce the energy consumption of POR circuit. Proposed design offers 0.1735µs delay which is 8.2% lower than POR-LE while offers 1.2% higher power dissipation than POR-LE. But the multiplication of power and delay (is also called energy) is 7% smaller than POR-LE.

Chemical Reduction of Cu Nanoparticles on Tio2 Project Report

Authors: Sathiyanarayanan. D

Abstract:–The experiment focuses on the chemical reduction of Cu nanoparticles on TiO2 by using NaBH4 as a reducing agent. The experiment includes observation of the coat formed under the influence of various concentrations of CuSO4 on the same amount of TiO2. In this experiment, TiO2 is of known quantity (300mg) is added to 100ml of water and stirred. This is then followed by the addition of CuSO4. The solution of TiO2 and CuSO4 is then kept is ice bath and titrated against freshly prepared NaBH4 solution of known quantity, drop by drop while continuous stirring using a magnetic stirrer. Once the titration is complete, the solution is stirred with a magnetic stirrer for about 3 hours. The experiment is carried out for varying quantities of CuSO4. The final Cu coated TiO2 nanoparticles were subjected to XRD and the intensity with respect to the 2 theta and the absorbance with respect to wavelength was recorded. The alternative method to the reduction technique is the photo reduction which can be used to achieve similar coating. These coated nanoparticles can be further used in the procedure of separation of hydrogen from water.

A Survey on Smart Grid Load Balancing Techniques and Challenges

Authors: Asst.Prof.Ravi Kumar Rajalwal, Dr. Sameena Elyas Mubeen, Priyanka Shrivastava

Abstract:–The electric grid is radically evolving into the smart grid, which is characterized by improved energy efficiency of available resources. Here detail survey of different techniques of grid management for load balancing was discussed. This paper work presents an extensive survey of the existing load balancing techniques proposed so far. These techniques are applicable for various systems depending upon the needs of the computational Grid, the type of environment, resources, virtual organizations and job profile it is supposed to work with. Each of these models has its own merits and demerits which forms the subject matter of this survey. A detailed classification of various load balancing techniques based on different parameters has also been included in the survey.

Classification of the Brain Tumor Using PCA And PNN Classifier

Authors: Ms. Priyanka Suresh Avate

Abstract:–The proposed strategy gives thought regarding the characterization of cerebrum tumor write by utilizing PNN classifier and gives the kind of the tumor thus. Here we will utilize mind attractive reverberation pictures (MRI) as the information database. In the wake of utilizing different clamor expelling channels we will utilize picture division strategy to appropriately acquire the area of enthusiasm from the MRI mind picture. The Morphological activities are additionally done to evacuate some commotion parameters after division. The probabilistic neural system (PNN) classifier and standard part examination (PCA) is utilized to characterize the cerebrum tumor write. This classifier gives quick processing outcome when contrasted with other grouping techniques. The execution of the PNN classifier was assessed regarding preparing execution and arrangement exactnesses. Probabilistic Neural Network gives quick and exact grouping and is a promising instrument for characterization of the tumors

Fabrication of nano-fibrous silk scaffold for NTE (Neural Tissue Engineering)

Authors: M.Tech.Scholar Vipul Kumar, Shalini Priya

Abstract:–Tissue Engineering is a promising and emerging area in the field of medical science for treatment of irreparable injuries. It works in synchronization of scaffold and living entity. Silk has favorable characteristics to be used as a scaffold material. Scaffold made up of silk can provide better scope for treatment of neural disorders and injuries through the implications of basic principles of NTE (Neural Tissue Engineering).

Improvement Productivity in Balancing Assembly Line by using Pso Algorithm

Authors:M.Tech.Scholar Nikhil Porwal, Prof. Prakash Girwal

Abstract:–Assembly line balancing plays a crucial role in modern manufacturing companies in terms of the growth in productivity and reduction in costs. The problem of assigning tasks to consecutive stations in such a way that one or more objectives are optimized with subject to the required tasks, processing times and some specific constraints, is called Assembly Line Balancing (ALB). This research work focuses on optimization of product cost, Assembling time and Production Completed order with the help of PSO 30 days and 26 days data sets of a production industry. The present study also describes KANBAN withdrawal Methodology for production time period of 0.6 minutes only for single stage Assembly line.

An Overview of Cloud Computing

Authors:Harshad M. Kubade, Dr. Pallavi M.Chaudhari, Dr.Archana V.Potnurwar

Abstract:– Tissue Engineering is a promising and emerging area in the field of medical science for treatment of irreparable injuries. It works in synchronization of scaffold and living entity. Silk has favorable characteristics to be used as a scaffold material. Scaffold made up of silk can provide better scope for treatment of neural disorders and injuries through the implications of basic principles of NTE (Neural Tissue Engineering).

Determination of Heavy Metals in Ground Water of Raigarh District (C.G.)

Authors:M.Phil. Scholar Ram Kumar Mali, Asst. Prof.Rashmi Verma

Abstract:– The quality of water is important consideration is suggest criteria of purity of water. Water Quality is one of the most important concerns. Quality of water is an important criterion for evaluating the suitability of water for drinking and irrigation. Metal contamination in water is a major component in the determination of water quality. The heavy metals levels up to ppb levels in drinking water quality may cause savior health problems and also cause cancer. In this study, we made an attempt to know the concentration of six heavy metals in ground water in different locations of Raigarh District up to ppb levels. For this study, 4 groundwater samples were collected in April 2017 and preserved by addisamplesbdrops of nitric acid. These samples were subjected to analysis for four elements like Cd, Pb, Cu, Zn and Fe by using Atomic Absorption Spectroscopy (AAS) (Laniyan et al.). The concentrations of these metals in the study area were compared with drinking water quality limits are given by the World Health Organization (WHO), 4th edition in 2011.

Study on Strength Parameters of Concrete by Using Plastic Waste as Partially Replacing Course Aggregates

Authors:Asst.Prof. Rudresh A N, Shoib Kha, Yogesh R, Ravikiran S Sagar, Mahesh P

Abstract:– The rapid industrialization and urbanization in the country leads lot of infrastructure development. This process leads to several problems like shortage of construction materials, increased productivity of wastes and other products. In this project waste plastics is used as partial replacement of course aggregates by increasing 0%, 2%, 4%, 6% and 8%.In this project fly ash is replaced by 35% of cement to this concrete to enhance the strength and workability of it. Tests was conducted on course aggregate, fine aggregates, cement and plastic to determine their physical properties. Casted concrete were tested for its compressive strength, tensile strength at 3, 7 and14 days. Concrete cylinders and beams were casted and tested for their strength after 28th day of curing of concrete as respective to the partially replaced plastic with coarse aggregates.

Utilization of Functional Fabric Fasteners

Authors: Ikra Salim

Abstract:– Fasteners simply a device which is used to affixes two or more gadget together.” This paper is based on experiments that shows, how effective use of functional fasteners in decorative way. Fasteners basically have a very functional role in a garment and used to close placket opening in proper way. Hook & Eye, button & buttonhole, snaps are some examples. In addition, other Fasteners serve as electric element to garment. Moreover It prominent the area of dress. The best example of decorative fasteners are frog, brooches, safety pins etc. This kind of fasteners close the placket opening on temporary basis along with create an emphasis in a garment. It is very obvious that such fasteners may easily designate the focal point in an outfit but, the functional fasteners can also perform tremendously in aesthetic way and with the help of them we can execute admirable product as well. The main purpose of functional fasteners are used to secure placket opening strongly but, here the interesting feature is that it can be used for making jewelry and surface ornamentation of garment. I know it is quite difficult to imagine how zipper fasteners can converted into beautiful necklace, finger ring , earring etc. but it’s possible. so, there are numerous ideas which has its own peculiarity and uniqueness.

A Review on Delay Tolerant Network Security Routing Protocol

Authors: M.Tech.Scholar Ritika Ujjaniya, Asst.Prof. Tanvi Khandelwal

Abstract:– Delay –disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. Network security protocol is always required in any of the secure area, such as military. In DTN there majority of time does not exist the total path from resource to target which is leads to the difficulty of how to route the packet in such environment. Routing in such network is very difficult and for that different routing protocols are developed. In this Survey paper we discuss about various routing Strategy and at the end compared the different routing protocol with their various performance metrics.

Published by:

IJSRET Volume 4 Issue 3, Mar-Apr-2018

Uncategorized

Privacy Preserving and Identity Based Public Auditing of Data in Cloud

Authors:M.Tech Scholar G.Sivagama Sundari, Asst. Prof. Rakhe eBhure

Abstract:–Distributed storage framework gives facilitative record stockpiling and sharing administrations for circulated customers. To address uprightness, controllable outsourcing, and starting point inspecting worries on outsourced records, it propose a personality based information outsourcing (IBDO) plot furnished with alluring highlights beneficial over existing recommendations in securing outsourced information. To begin with, the IBDO conspire enables a client to approve committed intermediaries to transfer information to the distributed storage server for her sake, e.g., an organization may approve a few representatives to transfer documents to the organization’s cloud account controlledly. The intermediaries are distinguished and approved with their unmistakable characters, which wipes out entangled endorsement administration in common secure dispersed processing frameworks. Second, the IBDO conspire encourages extensive reviewing, i.e., the plan not just allows normal trustworthiness evaluating as in existing plans for securing outsourced information, yet in addition permits to review the data on information root, sort, and consistence of outsourced documents. Security investigation and trial assessment demonstrate that the IBDO conspire furnishes solid security with attractive proficiency.

An Efficient Feature Verification in Image Matching

Authors:Kusuma S (M.Tech), Prof. Kalaimathi B

Abstract:–In present era, verifying the correlation between two features is essential in preventing the disasters such as copy attacks. In this paper, image processing technology applicable in extracting and verifying the image features is discussed. Existing methods which are employed for verification are found to be computationally expensive. Thus an enhanced RANSAC (Random Sample Consensus) algorithm for effective verification of features is employed. It is a multistep line towards verification. Firstly, it involves extraction of features using SURF (Speeded Up Robust Feature) descriptor with RGB color concept. Secondly, verifying the features of images through a match by choosing multiple descriptors in random and thus promoting effective timeliness. The employed method can process huge collection of images of a particular dataset.

Design of a Reversible Central Processing Unit components using Verilog HDL

Authors:M.Tech. Scholar Asra Jabeen, Asst Prof. Pooja M

Abstract:–Balanced mapping from contribution to outcome is the fundamental condition for a reversible computational model traveling starting with one condition of dynamic machine then onto the next. Presumably, the greatest inspiration to examine reversible advances is that, it is thought to be the best powerful approach to upgrade the energy effectiveness than the ordinary models. The examination on reversibility has demonstrated more prominent effect to have colossal applications in rising advances, for example, Quantum Computing, QCA, Nanotechnology and Low Power VLSI. In this paper, we have acknowledged novel reversible engineering segments of Central Processing Unit (CPU). The Central Processing Unit (CPU) is the essential part of a PC that procedures direction. It runs the working framework and applications, continually getting contribution from the client or dynamic programming programs. It forms the information and produces outcome, which may store by an application or showed on the screen.

A Survey on Home Automation Systems

Authors:M. Tech. Scholar R. Rajalakshmi

Abstract:–Internet of Things (IOT) is nothing but connecting different real world objects to provide proper communication, synchronization, and inter-connecting between various devices or physical appliances is also known as “Things”. The Home Automation System (HAS) is extension of current activities performed inside the home and this Home Automation System (HAS) can be developed easily now a day’s, because of powerful computational devices and wireless sensor network(WSN), to provide user friendly and cost fairly home automation system. In Home Automation System (HAS), different technologies like WiFi, Bluetooth and Zigbee are used for communication, and different devices like smart phone, tablet and laptop used for controlling various appliances. In this paper we detailed a survey on different home automation systems considering parameters like type of communication, cost, technology and efficiency of system. A comparative analysis of home automation system is done. In future this system may have high demand and usage for automation of the “Things”. Using Home Home Automation System (HAS) our home will be smart home that can operate without any physical interference of human being.

Analysis of RCC Building Considering the Effect of Variation in Thickness of Steel Plate Shear Wall

Authors:M.Tech Scholar Shailesh B Pahilwan

Abstract:–The effects of the introduction of steel plate shear walls in buildings, on the bending moments, the shear forces, axial loads of the beams and columns and the story drifts are mainly observed. This is because of the fact that the mechanism of shear resistance by the steel shear walls is entirely different than that of the RCC shear walls. Some multistory buildings with SPSWs are analyzed by the equivalent static method as given by the IS 1893 (Part 1): 2002. The strip model as suggested by the code of Canada and the researchers is used to model the steel shear wall using the popular FEA software, the SAP 2000. The strips in the strip model are modeled using the frame element.

Published by: