VOLUME 10, ISSUE 3, MARCH 2023
Impacts Of Additives On Rheological Properties Of Rice Husk And Xanthan Gum Modified Drilling Fluid
Akinyemi O. P, Abdulhadi A, Aliyu A
Physico-Chemical Behaviour’s and Implications for Laterite Genetics from Swarnagadde Plateau of Western Ghats, Karnataka
Rajendrakumar Y. Budihal, A. Sreenivasa
Comparative Analysis of Zoom Technology and Instructional Videos over Classroom Learning System on Polytechnic Students Learning Computer Science Courses
Sulaiman Umar S.noma, Salihu Alhassan, Ajayi Olugbenga Akinbola
Blockchain Technology for Supply Chain and Logistics
Sagar Mal Nitharwal, Pragya Chaudhary
Multi-secret image sharing using the random image and Boolean operations
Sagar Mal Nitharwal, Pragya Chaudhary
Network Slicing for IoT Ecosystem in 5G Networks
Sagar Mal Nitharwal, Himanshu Suyal, Pragya Chaudhary
Home Security and Automation System Using IoT
Aman Kushwaha, Sangharsh Rai, Mukesh Kumar, Chandan B.V
Cloud-hosted concept-hierarchy flex-based infringement checking system
Sai Srinivas Vellela, Khader Basha Sk, Venkateswara Reddy B, Roja D, Kancharakunt Yakubreddy
Effect of Process Parameters on the Production of Pyro-oil from Waste Tyres
Sani Inuwa Lamido, Aminu Uba Alhassan, Bashir Aliyu Abba
Prevalence of Anaemia and its associated factors among pregnant women attending antenatal care at Sir Yahaya Memorial Hospital Birnin Kebbi, North West Nigeria
Umar Sahabi, Sufiyanu Muhammad Dakingari, Abdullahi Ibrahim
BORDER ALERT SYSTEM FOR FISHERMEN USING GPS
G. Amsaveni, R. Purnachandrigaa, M. Selvanayaki, S. Vishnupriya
Marksheet Verification System using Blockchain
Kiran H S, Bhat Divya Subrahmanya, Usha J
Phytochemical Analysis of different parts of Annona squamosa L
D. Herin Sheeba Gracelin* and P. Benjamin Jeya Rathna Kumar
Design and development of high accuracy bomb detection robot defence application
Manuneethi Arasu, Radhakrishnan, Ramesh, Sasikumar, Venkatesh Kumar
Behavioral Economics – A methodical observation
Sushmita Choudhury Sen, Dr. D.K.Mitra
Fruits and Vegetables Disease Detection using CNN
Mrs. Shital Jade, Mr. Bhagyesh Dhande, Mr. Somdatta Kalbhor, Mr. Utkarsh Sarode
Thyroid Cancer Detection using Deep Learning
PANKAJ GUPTA, RAHUL TANWAR, SAURABH BISHT
Development of Tapioca vermicelli infused with Dates flour
M.Kiruthika (2113712055010), V.S. Pavithra (2113712055018), Dr. Simmi Jain
Performance analysis of Electric Vehicles with battery and Asynchronous machine using MATLAB Simulink Model
Vishal Chaudhary, Mahendra Lalwani
Addressing Cloud Computing Security and Visibility Issues
Oluwasanmi Richard Arogundade
Abstract
Impacts Of Additives On Rheological Properties Of Rice Husk And Xanthan Gum Modified Drilling Fluid
Akinyemi O. P, Abdulhadi A, Aliyu A
DOI: 10.17148/IARJSET.2023.10301
Abstract: Four (4) samples A, B, C and D were developed using bentonite clay, rice husk, and xanthan gum in different proportions based on their rheological properties and thixotropic property (Gel strength), pH and density values. Additives (NaOH, NaCl, Na2CO3 and BaSO4) were added to the four samples in composition of 1%, 2%, 3% for (NaOH, NaCl, Na2CO3) and 5%, 10%, 15% for (BaSO4) at temperature of 30 oC. FANN 35 viscometer was used to measure their rheological properties and thixotropic property (Gel strength), while pH meter and mud balance were use to measure their pH and density values respectively. The maximum pH, apparent viscosity (AV) and Gel strength in 10 seconds (GS 10 (sec)) corresponds to 9.1, 51.3 cP and 34.2 (lbf/100 ft2) respectively were observed in sample A without chemical additive. From the results obtained the chemical additives had positive impacts on the rheological properties of the drilling fluid samples. Sample A with xanthan gum and bentonite only had most improved viscosity when the chemical additives were added followed by sample B with bentonite (24.5g), rice husk (20g) and xanthan gum (1g). The Gel strength of the samples were increased by the addition of any of the chemical additives, samples A and B still had more improvement than the other two samples. The yield point and plastic viscosity (YP/PV ratio values) results revealed that the carrying capacity of the drilling fluid samples could be increased by the addition of NaOH, NaCl and BaSO4. The pH values of all the samples were alkaline close to neutral with addition of the chemical additives. Thus, it could be concluded that drilling fluid with 20g rice husk and 1 g xanthan gum and standard 24.5g bentonite proportion could be improved upon with the addition of any of the chemical additives tested in appropriate quantity for effective performance in drilling operations.
Keywords: Rice husk, chemical additives, rheological properties, drilling fluid.
Abstract
Physico-Chemical Behaviour’s and Implications for Laterite Genetics from Swarnagadde Plateau of Western Ghats, Karnataka
Rajendrakumar Y. Budihal, A. Sreenivasa
DOI: 10.17148/IARJSET.2023.10302
Abstract: The Swarnagadde laterites occur extensively as blanket or cappings on the high plateau and hill ranges in the Western Ghats of Karnataka. The general thickness of the ferruginous laterite in the profile varies between 50 cm to 1.2. Granitic gneisses are the oldest rocks of the study area and these are predominantly tonalite/trondhjemites in nature and comparable to similar early Precambrian granitic gneisses of the world. The lateritic formations of Swarnagadde area receives average rainfall of about 3900 m annually. It is aimed here to discuss the physic-chemical parameters and genetic implications for the formation of lateritic profile in this paper. The laterites in the area are dominantly composed of aluminium and kaolin bearing minerals. Frequently quartz is seen as relict mineral present in the lateritisation profile. The chemical analysis of laterites reveal a high percentage of Al2O3, followed by Fe2O3 and SiO2 and all the samples resulted a high value of LOI. These four components together constitute 97.20% of the total component of the laterite profile. The study substantiates that the laterites are the product of chemical weathering under tropical conditions.
Keywords: Include at least 4 keywords or phrases.
Abstract
Comparative Analysis of Zoom Technology and Instructional Videos over Classroom Learning System on Polytechnic Students Learning Computer Science Courses
Sulaiman Umar S.noma, Salihu Alhassan, Ajayi Olugbenga Akinbola
DOI: 10.17148/IARJSET.2023.10303
Abstract: Zoom is a video conferencing tool that allows individuals to meet and collaborate productively just like physically face to face, even when they can't meet in-person. This makes remote meetings more human. This is essential for users to feel and stay connected. Zoom cloud and instructional videos are platforms that are widely used for learning. This study compared the academics performance of experimental and control group students of National Diploma I and II (ND I and II) enrolled in java programming language, web technology and computer application packages for sciences as a computing courses in the school of applied sciences, department of Computer Science and Science Laboratory Technology at Kebbi State Polytechnic, Dakingari. The population of the study comprised of forty two (42) students participated as experimental group and forty five (45) as control group in all the three (3) selected courses. Therefore, a total of eighty seven (87) students participated in the study. Data were collected using 20 items essay test questions with reliability coefficients of 0.76 and analysed with SPSS-V21 using independent sample t-test after eight (8) weeks of continuous treatment. The study were guided by one (1) research question and one (1) null research hypotheses (Ho) at significance alpha value .05. The groups were exposed to pretest before the actual commencements of the treatments. The result of the posttest revealed that, there were no significant differences between the experimental and control group students' performance that learned java programming language and web technology with t(28) = 1.606, p-val = .119, df = 28, mean difference (MD) = 11.933, 95% Confidence Interval (CI) = [-3.284628, 27.151294] and t(7.567) = -1.801, p-val = .112, df = 7.567, mean difference (MD) = -16.857 and 95% Confidence Interval (CI) = [-38.66137, 4.94709] respectively while there is significant different in the academic performance of students that learned computer application packages for sciences with t(41) = 3.479, p-val = .001, df = 41, mean difference (MD) = 21.348 and 95% Confidence Interval (CI) = [8.95460, 33.74106]. The researchers concluded that there is no significant difference between the experimental and control group students that learned java programming language, web technology and computer application packages for sciences using zoom technology and instructional videos and others using traditional (classroom) method in the polytechnics learning system.
Keywords: Zoom technology, Instructional videos, Classroom, Website, YouTube, Computing courses, Students, Polytechnic.
Abstract
Blockchain Technology for Supply Chain and Logistics
Sagar Mal Nitharwal, Pragya Chaudhary
DOI: 10.17148/IARJSET.2023.10304
Abstract: Blockchain technology has the potential to revolutionize the way supply chains and logistics are managed in the manufacturing industry. This technology allows for secure and transparent information sharing across a distributed network of participants, enabling greater visibility and traceability throughout the supply chain. By leveraging blockchain, manufacturers can reduce the risk of counterfeiting, ensure the authenticity of their products, and streamline supply chain operations. With a blockchain-based system, participants can track the movement of goods and materials, verify the origin and quality of products, and ensure compliance with regulations and standards. Additionally, blockchain technology can facilitate faster and more efficient transactions, reducing costs and delays associated with traditional payment and settlement processes. This can help manufacturers to optimize their supply chains, improve inventory management, and enhance customer satisfaction. Despite its potential benefits, implementing blockchain technology in the manufacturing industry can be complex, requiring significant investment in infrastructure, data management, and stakeholder engagement. This paper provides a comprehensive overview of blockchain technology in manufacturing supply chains and logistics and highlights its potential to transform how manufacturing operations are managed and optimized.
Keywords: blockchain; manufacturing supply chain; smart contracts; asset tracking; distributed ledger; Industry 5.0.
Abstract
Multi-secret image sharing using the random image and Boolean operations
Sagar Mal Nitharwal, Pragya Chaudhary
DOI: 10.17148/IARJSET.2023.10305
Abstract: The sharing of personal information and private data via the Internet has increased exponentially, making it essential to protect data from unauthorized access. Numerous cryptographic techniques are used to provide data security, but these techniques have limitations and require encryption and decryption techniques with a high computation cost. To secure shared information, covert information exchange techniques have been proposed, but these schemes have high computational complexity, making them difficult to share. This paper discusses cryptographic techniques for encrypting and decrypting secrets that provide security for images transmitted over a network. In recent research, n secret images are shared among n or n+1 shared images, which poses a problem because fragmentary secret information can be reconstructed from n-1 or fewer shared images. In this paper, the proposed method employs random image and Boolean arithmetic to circumvent this issue. In this paper, we first generated n random images using the random image and XOR operation. Shared images are generated by applying XOR on random images in a sequence. This method assures that secret images cannot be reconstructed until all shared images are available.
Keywords: Pixel permutation, Secret image sharing, Random Image, Cryptography, Information sharing.
Abstract
Network Slicing for IoT Ecosystem in 5G Networks
Sagar Mal Nitharwal, Himanshu Suyal, Pragya Chaudhary
DOI: 10.17148/IARJSET.2023.10306
Abstract: The Internet of Things (IoT) is a new technology that improves the quality of people's lives by dominating a wide range of applications and service sectors. Fifth-generation (5G) wireless networks will soon be able to link this IoT ecosystem. It has been thoughtfully created to support the IoT industry's explosive development. One of the essential technologies in the 5G architecture, network slicing allows for dividing the physical network into several logical networks (i.e., slices) with various network properties. As a result, network slicing is a crucial driver of IoT in 5G. Through dedicated slices, network slicing can meet the different networking needs of heterogeneous IoT applications. We thoroughly review network slicing's use in IoT realization in this study. We cover network slicing in various IoT application scenarios and the technical problems that can be resolved using network slicing. This paper also discusses open research issues and integration challenges linked to network slicing in the IoT ecosystem.
Keywords: Network slicing, IoT, 5G, SDN, NFV, network architecture, latency, reliability.
Abstract
Home Security and Automation System Using IoT
Aman Kushwaha, Sangharsh Rai, Mukesh Kumar, Chandan B.V
DOI: 10.17148/IARJSET.2023.10307
Abstract: The Internet of Things (IoT) has the potential to revolutionize the way we live and work by connecting a wide variety of devices and systems to the internet. One area in which the IoT has seen particularly rapid adoption is home automation, with a growing number of products and services available to help homeowners control and monitor their homes remotely. In this paper, we present a comprehensive review of the state of the art in IoT home automation systems. We begin by discussing the key components of such systems, including sensors, actuators, and control devices, as well as the various protocols and technologies used to connect them. We then review a range of applications for IoT home automation, including energy management, security and safety, and entertainment. We also examine the challenges and opportunities presented by the adoption of IoT home automation, including issues of interoperability, security, and privacy. Finally, we discuss the future direction of IoT home automation and its potential to transform the way we live and work.
Keywords: Internet of Things (IoT), Home Automation, Energy Management, Sensors and Actuators.
Abstract
Cloud-hosted concept-hierarchy flex-based infringement checking system
Sai Srinivas Vellela, Khader Basha Sk, Venkateswara Reddy B, Roja D, Kancharakunt Yakubreddy
DOI: 10.17148/IARJSET.2023.10308
Abstract: Unlike competing online Infringement solutions, Infringement is copy-paste elimination software. Infringement is the illegal use of another person's words or ideas without permission. It's a dishonest thing to do. Copyscape is an anti-piracy programme that ensures all of our customers' essays and term papers are 100% unique. Users and organisations alike can now use cloud computing to access their data and run their programmes from any device with an internet connection, eliminating the need for local installations of software. Cloud computing is a method of storing and accessing information and software on remote servers and networks.Professors should be concerned about infringement because it happens frequently. Students in many engineering and computer science degree programmes take online courses where they are graded on the code they create on their own or in small groups. Multiple indicators make it hard to spot infringing code. Therefore, it is necessary to create an Infringement checking system that will accept code submissions from teachers and quickly identify instances of plagiarism. In other words, it analyses the structure of each uploaded assignment and finds any similarities. A straightforward style is used to summarise the similarity analysis results, which show which tasks are most similar to one another. This method has the advantage of relieving teachers of the tedious task of checking for Infringements.
Keywords: Infringement, fraud, instructors, Cloud.
Abstract
Machine Learning Algorithms for Cloud Computing Security: A Systematic Review
Sagar Mal Nitharwal
DOI: 10.17148/IARJSET.2023.10309
Abstract: Cloud computing, also known as CC, refers to the on-demand availability of network resources, most notably data storage and processing power, which does not require any additional or direct administration on the part of the users. CC has recently surfaced as a collection of public and private data centres that provide customers with a unified online platform regardless of location. The term "edge computing" refers to a new computing paradigm that moves computation and information storage closer to the end users of a network to speed up reaction times and increase available transmission capacity. Mobile processing Cloud (MCC) is an approach to mobile application delivery that uses distributed processing. The rapid acceptance of computing models is slowed down by the fact that cloud computing (CC) and edge computing (edge computing) have security issues. These security issues include a vulnerability for clients and association acknowledgment. The study of computer techniques that can learn and become more efficient on their own through exposure to new data is known as machine learning (ML). In this review article, we present an analysis of CC security threats, issues, and solutions that utilized one or more ML algorithms. These solutions were implemented to combat these threats. We look at the various machine learning techniques, such as supervised, unsupervised, semi-supervised, and reinforcement learning, that are utilized to solve the problems associated with cloud security. After that, we evaluate the effectiveness of each method by contrasting its characteristics, as well as its positive and negative aspects. In addition to this, we outline potential future research directions to protect CC models.
Keywords: cloud security; security threats; cybersecurity; machine learning; network-based attacks; storage-based attacks.
Abstract
Effect of Process Parameters on the Production of Pyro-oil from Waste Tyres
Sani Inuwa Lamido, Aminu Uba Alhassan, Bashir Aliyu Abba
DOI: 10.17148/IARJSET.2023.10310
Abstract: Waste tyres are one of the major causes of environmental pollution, their non-biodegradability nature contributes to hazardous adverse effect they have on the environment. An estimated of 1.5 billion tyres are discarded annually all over the world. In this research, waste tyres were pyrolysed in a fixed bed pyrolyser reactor at 350- 450 ˚C to produce pyro oil as the main desired product. The effect of time of extraction, quantity of gas consumed and quantity of catalyst on percentage oil yield were investigated. The oil yield obtained from the process was found to be 31.1%. The pyro oil properties include: a viscosity of 2.08 cSt, density of 924 kg/m3, flash point of 65 ˚C, pour point of -13˚C, cetane number of 63.19 and calorific value of 37.68 MJ/kg.
Keywords: Pyrolysis, Pyrolyser, Pyro-oil, Recycling, Waste Tyres
Abstract
Prevalence of Anaemia and its associated factors among pregnant women attending antenatal care at Sir Yahaya Memorial Hospital Birnin Kebbi, North West Nigeria
Umar Sahabi, Sufiyanu Muhammad Dakingari, Abdullahi Ibrahim
DOI: 10.17148/IARJSET.2023.10311
+91-7667918914 iarjset@gmail.com 0 Items International Advanced Research Journal in Science, Engineering and Technology
A Monthly Peer-Reviewed Multidisciplinary Journal ISSN Online 2393-8021 ISSN Print 2394-1588 Since 2014 Home
About About IARJSET Aims and Scope Editorial Board Editorial Policies Publication Ethics Publication Policies Indexing and Abstracting Citation Index License Information Authors How can I publish my paper? Instructions to Authors Benefits to Authors Why Publish in IARJSET Call for Papers Check my Paper status Publication Fee Details Publication Fee Mode FAQs Author Testimonials Reviewers
Topics
Peer Review
Current Issue & Archives
Indexing
FAQ’s
Contact Select Page Prevalence of Anaemia and its associated factors among pregnant women attending antenatal care at Sir Yahaya Memorial Hospital Birnin Kebbi, North West Nigeria Umar Sahabi, Sufiyanu Muhammad Dakingari, Abdullahi Ibrahim AIM: This investigation is aimed to determine the prevalence of anaemia and its associated factors among pregnant women attending Fati Lami antenatal care clinic of Sir Yahaya Memorial Hospital Birnin-Kebbi, northwest Nigeria.
Keywords: Anaemia, Antenatal clinics, pregnant women, Prevalence Downloads: | DOI: 10.17148/IARJSET.2023.10311 How to Cite: [1] Umar Sahabi, Sufiyanu Muhammad Dakingari, Abdullahi Ibrahim, "Prevalence of Anaemia and its associated factors among pregnant women attending antenatal care at Sir Yahaya Memorial Hospital Birnin Kebbi, North West Nigeria," International Advanced Research Journal in Science, Engineering and Technology (IARJSET), DOI: 10.17148/IARJSET.2023.10311 Copy Citation Call for Papers Rapid Publication 24/7 April 2026 Submission: eMail paper now Notification: Immediate Publication: Immediately with eCertificates Frequency: Monthly Downloads Paper Format Copyright Form
Submit to iarjset@gmail.com or editor@iarjset.com Submit My Paper Author CenterHow can I publish my paper?
Publication Fee
Why Publish in IARJSET
Benefits to Authors
Guidelines to Authors
FAQs (Frequently Asked Questions)
Author Testimonials IARJSET ManagementAims and Scope
Call for Papers
Editorial Board
DOI and Crossref
Publication Ethics
Editorial Policies
Publication Policies
Subscription / Librarian
Conference Special Issue Info ArchivesCurrent Issue & Archives
Conference Special Issue Copyright © 2026 IARJSET This work is licensed under a Creative Commons Attribution 4.0 International License. Open chat
Abstract
BORDER ALERT SYSTEM FOR FISHERMEN USING GPS
G. Amsaveni, R. Purnachandrigaa, M. Selvanayaki, S. Vishnupriya
DOI: 10.17148/IARJSET.2023.10312
Abstract: Fishermen's livelihoods often require them to cross country borders, which can unknowingly put them at risk of being captured or killed. The lack of easily identifiable sea borders between countries exacerbates this problem. To address this issue, a "Border Alert System for Fishermen Using GPS" has been developed to help fishermen become aware of country borders. The system employs Global Positioning System (GPS) and Global System for Mobile Communication (GSM) technologies. The GPS receiver is used to determine the current location of the fishing boat, and the present latitude and longitude values are sent to a microcontroller unit. The controller unit compares these values with predefined values to identify the current location. The border alert system then notifies the fishermen when they are approaching the nautical border. The region is divided into two zones: normal and warning. When the boat is in the normal zone, the LCD displays "normal zone," making it clear that the boat is in a safe area. If the boat moves further and enters the warning zone, the LCD displays "warning zone," alerting the fishermen of their proximity to the border.
Keywords: GPS receiver, GSM, Alerting fisherman
Abstract
Marksheet Verification System using Blockchain
Kiran H S, Bhat Divya Subrahmanya, Usha J
DOI: 10.17148/IARJSET.2023.10313
Abstract: Faking of mark sheets, forging the mark sheets have become a major problem in today's times in terms of gaining employment opportunities. India is moving towards digitization but this leads to easy forging or tampering of the online documents like the mark sheets. A mark sheet in the PDF format can easily be tampered and this leads to a fear among the institutions to provide soft copies of the mark sheets instead of hard copies. Blockchain is the new trend currently in the digital market. But apart from proving its importance in just the domain of finance it can also be used in the other domains. One among them is the verification of documents, mainly the marksheets for the employment domain, using their hash values. Blockchain provides the facility of adding up data items without giving the provision for editing them which proves the major security aspect of any database.
Keywords: Blockchain, metamask, ethereum, transaction, ganache, smart contracts, solidity.
Abstract
Phytochemical Analysis of different parts of Annona squamosa L
D. Herin Sheeba Gracelin* and P. Benjamin Jeya Rathna Kumar
DOI: 10.17148/IARJSET.2023.10314
Abstract: Phytochemicals are non-nutrient bioactive components found in plants that are primarily responsible for scavenging toxic radicals after oxidative stress by generating antioxidants, the main cause of most chronic diseases. Phytochemical screening is to isolate various constituents of the plants for assessing their biological activity or medicinal uses. The Qualitative analysis is very essential to identify the phytochemical constituents present in medicinal plants. The medicinal value of plants is due to the presence of particular bioactive constituents. Annona squamosa is an important medicinal plant which found in tropical and subtropical area. In India this plant is used as medicine traditionally. Each part of the plant is used to treat various diseases. Hence this present study is focused to screen the presence of phytochemicals in different parts (stem, leaf, flower and seeds) of the Annona plant. Totally 15 phytochemical screening tests were conducted. The methanol extracts of leaves and seeds showed a greater number of phytochemicals than other two extracts. We have found out phytochemicals like tannins, flavonoids, terpenoids, steroids, phlobatanins, alkaloids, anthroquinones, anthocyanins, leucoanthocyanins and emodins in leaves and seeds extracts.
Keywords: Bioactive, Medicine, alkaloids, flavonoids, and anthocyanins
Abstract
Design and development of high accuracy bomb detection robot defence application
Manuneethi Arasu, Radhakrishnan, Ramesh, Sasikumar, Venkatesh Kumar
DOI: 10.17148/IARJSET.2023.10315
Abstract: Countless news stories are handled of injured trained personnel or soldiers losing their lives while defusing bombs. It appears daily in newspapers around the world. Here the robotic arm is designed to safely detect and dispose of a bomb up to 180 meters away. and to provide protection against hazards to the bomb disposal force. The designed robot is manually controlled by the user through a personal computer. Buzzer alarm when the sensor detects a metal. The metal is inspected with the help of a wireless camera to check whether it is a bomb or not. The detected metal is a bomb, and then the user controls the robot through the computer to dispose of the bomb.
Keywords: Bomb detection, Robotics, Design and production
Abstract
Behavioral Economics – A methodical observation
Sushmita Choudhury Sen, Dr. D.K.Mitra
DOI: 10.17148/IARJSET.2023.10316
Abstract: There are various ways a theory might react to a set of data that contradict its central assumptions. Neoclassical economics has made a number of different attempts to address the problem raised by Behavioral Economics. This essay briefly reviews various responses before making a case for one of them.
Keywords: Behavioral economics, Neoclassical Economics, Economic theory, Rational behavior, Economic Methodology
Abstract
Fruits and Vegetables Disease Detection using CNN
Mrs. Shital Jade, Mr. Bhagyesh Dhande, Mr. Somdatta Kalbhor, Mr. Utkarsh Sarode
DOI: 10.17148/IARJSET.2023.10317
Abstract: Fruit and vegetable diseases are typically brought on by pests, insects, and pathogens, and if they are not promptly handled, they significantly reduce yield. Due to several ailments, farmers are suffering losses. The proposed system provides the solution for these problems faced by farmers. These issues that farmers are facing have a remedy in the suggested system. Pre-processing is utilised in the initial phase. In the second phase, various cutting-edge features are retrieved from the segmented picture in order to remove the noisy and blurry parts, and finally, images are categorised into one of the classes by utilising a multi-class. As a test instance, we looked at fruit and vegetable diseases. According to the findings of our experiments, the suggested method can considerably support the accurate detection and automatic identification of vegetable and fruit diseases.
Keywords: Attributes, Classification, Convolution Neural Network, Prediction.
Abstract
Thyroid Cancer Detection using Deep Learning
PANKAJ GUPTA, RAHUL TANWAR, SAURABH BISHT
DOI: 10.17148/IARJSET.2023.10318
Abstract: This research paper aims to detect thyroid cancer using ultrasound image of the thyroid. This is done by using CNN model of deep learning to classify whether the cancer is benign or malignant. This model uses image processing by deep learning using which we are measuring accuracy and loss values of convolutional neural network model and the performance of the algorithm is evaluated by accuracy score, loss and mean accuracy. Finally, we selected the K-fold cross-validation for cross-checking and better accuracy.
Keywords: Thyroid cancer, Deep learning, CNN, K-fold
Abstract
Development of Tapioca vermicelli infused with Dates flour
M.Kiruthika (2113712055010), V.S. Pavithra (2113712055018), Dr. Simmi Jain
DOI: 10.17148/IARJSET.2023.10319
Abstract: Tapioca vermicelli infused with Dates flour is manufactured using different variations of tapioca and dates flour. The minerals in tapioca can provide important health benefits. Tapioca contains iron, an essential mineral we need to help transport oxygen throughout the body. The vermicelli samples were made with Tapioca and Dates flour. These two are themain ingredient in the product. We made three samples proposition 50:50 for sample A and 75:25 for sample B. The best formulation was 75:25. The chemical analysis showed that the moisture content was 6.45%, protein for sample A 4.05% and sample B 4.35%. , acidity 1.80g/1000ml for sample A and acidity 1.78g/1000ml for sample B, PH 5.69 for sample A and 5.45 for sample B. The resultant vermicelli was subjected to chemical, nutritional and organoleptic properties (color, taste, flavor, taste, overall acceptability) investigation.
Abstract
Performance analysis of Electric Vehicles with battery and Asynchronous machine using MATLAB Simulink Model
Vishal Chaudhary, Mahendra Lalwani
DOI: 10.17148/IARJSET.2023.10320
Abstract: As the world's oil reserves are running out, there is a problem with air pollution brought on by diesel and gasoline cars, many researchers are driven to find alternate energy sources to power automobiles. Making an electric car by swapping out the combustion engine for an electric motor is one of the finest alternative approaches. The very first step in this research is to model the power flow in the energy system of an electric vehicle in hopes of determining its characteristics. As electric vehicles mainly rely on the limited electrical energy provided by a battery, the efficiency of power flow is crucial. This paper presented the simulation of battery with an electric motor and analysis the waveform from the output for electric vehicles. Keywords Electric Vehicle (EV), Battery, Fuel, and State of charge (SoC), Hybrid electric vehicle (HEV)
Abstract
Addressing Cloud Computing Security and Visibility Issues
Oluwasanmi Richard Arogundade
DOI: 10.17148/IARJSET.2023.10321
Abstract: Network security has become a critical global issue for organizations due to the increasing cyber-attack rate. To enhance organizations' network security, this paper focuses on categorizing the security threat model, which enables examining the impact of threat classes rather than individual impacts. This paper reviews various threat categorization models and proposes criteria for classifying information system security hazards in cloud computing. It also investigates network security vulnerabilities and classifies security concerns using the CIA (confidentiality, integrity, and availability) triangle. Moreover, this paper explains fundamental concepts and procedures for carrying out various network security operations in cloud computing using both paid and open-source tools. This research aims to educate and enable organizations to reduce security threats while having full visibility and control of their infrastructure both in the cloud and on-premises.
Keywords: Network, on-premises, security, cyber-attacks, cloud computing.
Abstract
Study of Web Page Change Detection to Reduce Network Load
Dr. Kompal
DOI: 10.17148/IARJSET.2023.10322
Abstract: With continuously growing of the Web size, it is becoming extremely difficult to search it for relevant information. Larger part of the bandwidth and internet traffic is consumed by the Web crawlers that collect pages for indexing by different search engines. Web page change detection refers to the process of monitoring a website or web page for any modifications, updates, or new content. The load on the remote server is also caused by crawlers by using its CPU cycles and memory.
Abstract
A Detailed Study of Indoor Air Quality (IAQ)
T. Prabahar
DOI: 10.17148/IARJSET.2023.10323
Abstract: Clean environmental air is a basic right for all humans. Indoor air quality is particularly important to humans since we spend up to 90% of time indoors. While most individuals understand that outdoor air quality is important to their health status, many are unaware of the detrimental effects indoor air pollution can potentially have on them. There has been a strong correlation between air quality and health. Indoor air pollution is an international health concern because people spend a majority of their time indoors. Children are at a higher risk of health problems from pollutant exposure, especially because air in the child breathing zone is more polluted than it is in the adult breathing zone. Pollutants of concern include biological contaminants, combustion pollutants, volatile organic compounds, and radon and other soil gases. All of these toxicants can be minimized or abated. Awareness of these issues is a critical first step in improving air quality in places where people live.
Keywords: Biological contaminants, combustion pollutants, volatile organic compounds, radon, asbestos, child breathing zone.
