VOLUME 9, ISSUE 6, JUNE 2022
Passive Bearing Resistance at the Sand-Geogrid Interface in Direct Shear Mode
Dr. Abdul Latheef Mannissery
Analysis of Facial Expression Recognition Using LBP and Haar-Cascade Classifier
Priyanka K P, Mrs. Divyaprabha, Dr. M. Z. Kurian
The Simulation Study of Small-Signal BJT and FET Amplifiers through Pspice
Ghouse Mohiuddin, Satyendra Nath Tiwari
DESIGN AND ANALYSIS OF THERMAL BARRIER COATING ON GASTURBINE BLADE
A J Sriganapathy, Kiruthika B, Sopika.S, Sujithra.H, Yamuna R
DESIGN AND ANALYSIS OF AEROSPIKE BELL NOZZLE TO IMPROVE THRUST IN ROCKET ENGINE
A J Sriganapathy, Makudesh Arjun Kumar. A, Diwakar.R, Sathish kumar.M, Rahul.B
A COMPARATIVE STUDY ON SEISMIC ANALYSIS OF A RCC FRAMED REGULAR AND IRREGULAR STRUCTURES BY USING FLUID VISCOUS AND METALLIC DAMPERS
DR.K.V.RAMANA REDDY
CLIMATE CHANGE OVER SOUTH INDIAN COAST DUE TO AEROSOL AND AIR POLLUTION
S. Thangalakshmi*, K. Sivasami
Factors that Cause Children to Drop Out of School at SMPN 26 Tulang Bawang Barat
Novi Yuli Ervianni, Sugeng Widodo, Risma Margaretha Sinaga
“Survey of Some Sacred and Medicinal Plants from Malegaon Tehsil of Nashik District, Maharashtra”
Yogesh C Shastri & Pravin D Nikam
A DOUBLE GENERAL INTRGRAL TRANSFORM FOR THE SOLUTION OF PARABOLIC BOUNDARY VALUE PROBLEMS
Dinkar P. Patil, Prerana D. Thakare, Prajakta R. Patil
A STUDY OF EDUCATION LOAN WITH RESPECT TO BANKING SECTOR
Mr.Pavan Kumar Shetty, Mr.Sri Manjunath R, Mr.Suyog Srivatsa K N, Mr.Omkar Patil
SIMULATION STUDY OF DESIGN VARIATIONS FOR AN ENGINE MOUNT OF A PASSENGER VEHICLE
S. Anirrudh Shrinaath, G. Gokul, J. Hari Krishna, V. Kavin
Gender Diversity & Well-Being: Proportions that affect Gender Stereotyping & Unconscious Bias in the workplace
Vaishali Verma, Dr Daleep Parimoo, Dr Santhi Narayan
Study of column structure behaviour with fiber and ferrocement confinement under compression
Syed Jawid Hussain, Dr. Siva Kumar Ramamoorthy
Applications of Emad-Sara Transform for General Solution of Telegraph Equation
D.P. Patil, Shweta Vispute, Gauri Jadhav
A Study On Motor Ride Sharing Service In Dhaka City, Present And Future Challenges
Md. Rasidul Islam, Md. Hasnul Habib, Hasan Ahmed Joy, A. B. M. Shamsul Haque Nayem
STROKE PREDICTION USING MACHINE LEARNING
Sathya Sundaram .M, Pavithra.K, Poojasree.V, Priyadharshini.S
A SURVEY OF COMMERCIALIZATION POTENTIALS OF RESEARCH RESULTS FROM UNIVERSITIES IN NIGERIA
Okopio Alex Momoh, Aliyu Bala, Aminu Sa’idu
Destructive and Non-Destructive Properties of Glass Fiber Reinforced High Performance Concrete with Micro Silica
UPPALAPATI UMA MAHESWAR REDDY, PARSINENI BALAKRISHNA
Effect of Steel Fibres on Concrete with M-Sand as Replacement of Natural Sand
NUNSAVATHU SRINU NAIK, PARSINENI BALAKRISHNA
Experimental Study of Mechanical Properties of Concrete with Stone Dust and Phosphogypsum
MD.MUSHARRUF QADEER, PARSINENI BALAKRISHNA
Investigation of Mechanical Properties of Concrete by Partially Replacing Cement with Silica Fume and Fine Aggregate with Copper Slag
SUNKESULA VIJAY KUMAR, PARSINENI BALAKRISHNA
Strength and Durability of Steel Fiber Reinforced Concrete Containing Phosphogypsum as Partial Reolacement for Cement
MAHANKALI SRIKANTH, PARSINENI BALAKRISHNA
Retinal Diseases Screening Through Deep Learning
Vibha Venkatesh, Rakshini J Gowda, Priyanka R, Sushma V, Dr Ravi P
Experimental Investigation on Mechanical Behavior of Bio-Composite Material
UDHAYA. A. R, T. SEKAR, N. NANDAKUMAR, R. SURENDRAN
Compilation and Analysis of Accidental FIR Data
Amir Ali Khan, Anil Munday, Rinku Bhoria, Yogesh, Tarun, Khushboo, Preeti
Harnessing Geothermal Energy As Alternative Source of Energy
Omojogberun, Y.V., Oigbochie, D., Onibon,G. L.
IoT-Based Wireless Power Transfer for Charging Electric Vehicle
Rohini Thankam A, Sahana R, Saima Farheen, Syeda Roshni Ahmed
Study of Modified Evaporative Desert Cooler For its Performance Optimization
Bhavana C. Bhambarkar, Abhik V. Shambharkar, Ankit R. Ukey, Ravi P. Nagbhide, Prof. M. Nematuallah Nasim
Mitigating unbalanced classes using CycleGAN
Mathias Russel Rudolf Richard, Dr. R. Savitha
WORLD OF SERVERS IN AMAZON WEB SERVICES (AWS) CLOUD
R Bharath, Dr. R Savitha
Fabrication and Characterization of Plant Fiber Composite Material: A Review
Vaibhav Mishra, Narendra Kumar Patel
Touchless Interaction for Smart Devices for Better Accessibility
Sahana J, Dr. S.S. Nagamuthu Krishnan
Plant Disease Detection Using Pre-trained Models
Ritisha D, Dr. S.S. Nagamuthu Krishnan
Vehicle Dynamics of 4 stroke petrol engine off-road race car
Vedaanth B, Shamanth M R, Chethan M, Mr. Mohan V
Blood Cancer Detection Using Machine Learning
Akash Holker, Naveena Hegde, Rakesh M P, Yallalinga, Sushmitha M
The Study of Shear and Flexural Behavior of RC Beam Retrofitted With GFRP
Prasad C. Shinde, U. S. Ansari2, Y. B. Gawande
ANALYSIS & DESIGN OF CANTILEVER RATAINING WALL
Prof. Khamkar Uday B., Prof . Bukka R.S., Patil Vaishnvi R., Joshi Vaishnvi D., Nakka Sanskruti S
Study of Floating Column Considered as Gravity Column for various Plan and Story Configuration
Harshkumar H. Parmar, Dr. Darshana R. Bhatt, Dr. Vinubhai R. Patel
Alkaline Activation of Geopolymer Concrete Using Sodium Silicate and Sodium Hydroxide Solution
Rohan N. Patil, Prof. Yogesh Gawande, Prof. Kasliwal S. S
Finger Vein Detection Using Deep Learning
B.Sujtha, Vellaturi Sai Teja, V.Bala Sai Krishna, Kancharla Sudhakar, Veturi Tarun Kumar
Handwritten Character Recognition Using Convolutional Neural Network
Dr. Roopashree H R, Nisarga C J, Poorvi P S, Roopa N, Sahana H K
A REVIEW ON WEAR THEORY
Udayashankar.E, Dr.N.Nandakumar, Dr.S.Periyasamy
VOLUNTEER DATA MANAGEMENT USING FLASK and SQLITE DATABASE
Anand V, A M Shivaram,Theeba Karthikeyan
A REVIEW ON ADDITION OF NANOPARTICLE ON BIODIESEL
Amith Kumar B, Dheeraj H Tandel, Mohammad Suhaib, Mahesh S Chikkurmath, KV Suresh, Sudheer
DESIGN AND FABRICATION OF SOLAR COOKER
Megharaj Kencharaddi, Ronson A C, Charan D B, Gaurav C S, Hemanth Suvarna
A Review on Various Machine Learning Approaches for Fingerprint Based Health Information Exchange
Vanajakshi S, Hemalatha D, Chethana C, Bharathi R, Kavana M D,Manasvi J Maasthi
Automatic Detectors for Bikers with No Helmet using Deep Learning
Mrs. Asha Rani M, Preethu K R, Punya U M, Ranjana M S, Reshma J
Personality-Aware Product Recommendation System Based on User Interests Mining and Meta path Discovery
Harish G, Sandarsh Gowda M M
A Patient-Oriented Environment for Biomedical Engineering Applications using Big-Data and C means Clustering
Shivananda G C, Sandarsh Gowda M M
Bird Species Identiï¬cation for Large Number of Species : Exploratory Survey
Indhuja N, Dr. T. Vijaya Kumar, Mr. Raghavendra Guligare
Dual access control in cloud computing
Gayathri S Karamadi, Prof. A.G Vishwanath, Raghavendra Guligere
DEVELOPMENT OF CROSS-PLATFORM ONLINE FOOD ORDERING MOBILE APPLICATION
Tejas Gowda K.C, Dr. T Vijay Kumar
Helmet and Number Plate Recognition and Detection
Tanusha M, Prof M S Sowmya
A FRAMEWORK for TOURISM RECOMMENDER SYSTEM BASED on BIG DATA and AI
Bharath Sharma, Seema Nagaraj
Multi-Owner Sharing Secure Data with Groups and Conditional Distribution using Cloud Computing
Karunakara, Dr. T Vijaya Kumar, Mr. Raghavendra Guligare
“Leveraging Affective Hashtags for Ranking Music Recommendations”
Meghana C M, A M Shivaram
ICT Based College Feedback System
Akash Suryavanshi, Shubham Tingare, Rohit Todkar, Dr. Arjun Nichal
Realistic Multiple-watchword Ranked Search Provides Entry Control Over Encoded Cloud Data
Sharadhi S, Suma N R
Effects Of Glass Fibre On Concrete
Prof. Shital Patage, Hirnawale Bharat, Makasare Shivon, Katle Prashant, Ghute Damini
DATA MINING: HISTORY APPLICATIONS AND CHALLENGES
MADHUSHREE. D. S, Vidya. S
Development of Machine Learning Model for Diseases Prediction with an EMR Tool
Ranjitha Kulkarni, Prof. Seema Nagaraj
Hybrid cloud approach and implement the Architecture for network security and storage
Basavaraju M N, M S Sowmya
Security Aspects of Different Technologies Intended for Different Techniques
Arpita B, A G Vishvanath
Searching for Keywords Using Multiple Authorities and Encrypted Cloud Data
Rachana S, Prof. Sowmya M S
“Publicly Verifiable Shared Dynamic Electronic Health Record Using Cloud Computing”
Sushma P, Thanuja J C
SEARCHABLE CRPTOGRAPHY PROTECTION WITH FINE-GRAINED AUTHENTICATION MECHANISM
Sudharani, Swetha C S
EXPERIMENTAL STUDY ON PARTIAL REPLACEMENT OF COPPER SLAG AS FINE AGGREGATE IN CONCRETE
Nandeesh P, Dr. Y.M. Manjunath
Identification of Cyber Harassment on Internet Community Using Machine Learning
Karthik T V, A M Shivaram, Raghavendra Guligare
Open CV Methods for Detecting License Plates
Raghunandan Shastry K N, Sharath K
A Road Accident Prediction Model Based on Machine Learning
Sneha K R, Madhu H K
DISEASE PREDICTION IN BETEL NUT USING CNN
Mithunkumar S Nayak, N Rajeshwari
Rainfall Rate Prediction based on Machine Learning
Sachin Patil, Rajeshwari N
Encrypted Data Storage vs Data Against Unauthorized Access
Nagesh R, Sowmya M S
ONLINE AUDITIONS IS BETTER THAN OFFLINE AUDITIONS
ONLINE AUDITIONS IS BETTER THAN OFFLINE AUDITIONS
CUSTOMIZED TRAVEL RECOMMENDATION SYSTEM DEVELOPMENT WITH RECENCY EFFECTS
Lavayna B.S, Sowmya M.S
ATTRIBUTE-BASED STORAGE FACILITATES SECURE INFORMATION DEDUPLICATION IN THE CLOUD
Anusha H C, Sandarsh Gowda M M
Analysing and Detecting Money-Laundering Accounts in Online Social Networks
Punya R, A M Shivaram
A Small Convolutional Neural Network for Detecting Real-Time Facial Expressions
Bhavana M P, Prof. K. Sharath
“Chronic Kidney Disease Stage Identification in HIV Infected Patients using Machine Learning”
Tejaswini JB, Vidya S
Identifying Psychological Disorders in Online Platforms Using Intense Patterns - Anorexia and Depressive Case Studies
Lakshmi M,A G Vishwanath
Target address Identification for Bitcoin with Blockchain Technology
Jagadish M, A G Vishvanath
Fake Review Detection on Yelp Dataset
Suraj Venkatesh Shetty, Vidya S
Accountable Proxy Re-Encryption for Secure Data Sharing
Karthik Raja M, K Sharath
Managing Big Data with Information HDFS and Evolutionary Clustering
Manaswi DN, Dr.T Vijaya Kumar,Mr. Raghavendra Guligare
Heart Disease Prediction System, Machine Learning Techniques
Prajwal G Ugrani, A M Shivaram
Using CNN for Detecting Melanoma Disease
Rashmi K S, Prof. Seema Nagaraj
Crypt-DAC: Cloud-Based Cryptographically Enforced Dynamic Access Control
Achyuth T S, Dr.T Vijaya Kumar,Mr. Raghavendra Guligare
Advanced banking transaction using secured key generation
Vaibhavalaxmi S Hebsur, Thanuja J C
Extension of UNO to support Active/Active implementation of Oracle Database
Anupriya, Swetha C S
Differential Privacy Protects Your Shopping Preferences
Anant Kumar Jha, Sowmya M S
Private Outsourced Audition Method for Cloud Based Dynamic Data Storage
Dinakar S, Madhu H K
Training and upskilling has uplifted the Education Standards
Shobit Gupta, Vidya S
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in the Cloud
Smitha S Bhat, Seema Nagaraj
Farming recommendations based only on productivity and season
M Tejaswini, Prof. Usha M
AN AUTOMATED APPROACH for DIAGNOSIS of MALARIA DISEASE
Mohan Gowda K, Seema Nagaraj
Optimal Matching over Encrypted Data on Public Cloud: A Verifiable Semantic Searching Scheme
Darshan T R, Usha M
Diabetes Prediction Using Machine Learning
Manjunath Ganganagoudar, H K Madhu
An efficient file system with Multi-Factor Authentication using Cryptography
Ankith Kumar S K, Dr. Jayasimha S R
Know Your Client for Banking System using IPFS and Block Chain
Keerthana P, Usha M
SECURED DATA ACCESS TO DISTRIBUTED STORAGE USING CLOUD
Bhanuprasad C, M Usha
Sign Language Detection system using artificial intelligence
Samarth S Naik, Rajeshwari N
A Comparative Study on Fake Job Post Prediction
Sowmya M, Dr. T Vijay Kumar
An Efficient Spam Detection Technique for IOT Devices using Machine Learning
Debasish Nath, M S Sowmya
Five Advanced Computer Survey Foundations in AI
Ramesh Hanumanthappa Jaggal, Vidya S
Transaction transparency using Block chain
Yashaswini BR, Prof. Rajeshwari N
Healthy Nutrition Prediction Based on Blood Test Parameter using Data Mining Technique
Praveen Kumar S, Prof. A G Vishwanath
Instant Spectral Clustering Over Distributed Data with Efficient Communication
Yashaswini C S, Thanuja J C
Applications of Double General Integral Transform for Solving Boundary Value Problems in Partial Differential Equations
D. P. Patil, Nikhil Raundal
Review of the Role of Deep Learning in Detecting and Classifying Brain Tumors from 2015 to 2020
Shreevatsa Upadhya, Vidya S
REAL TIME ATTENTION SPAN TRACKING IN ONLINE EDUCATION
Chinthu H A, Nirmala Hiremani
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME
Aravind Ganesh S, Seema Nagaraj
Tiredness Detection in Real Time Using Eye State Evaluation
Shruti Chigari, T Vijaykumar
DESIGN OF VIBRATING TABLE FOR CONCRETE MOULD
Vivek P. Dongare, Dr. Mohammad Shakebuddin
Fingerprint spoofing detection using convolution neural network
Pooja Wadageri, Vidya S
Calorie Burn Predection using Machine Learning
Suvarna Shreyas Ratnakar, Vidya S
THE CUSTOMER SUCCESS PLATFORM TO GROW YOUR BUSINESS
Soujanya S Channayyanavar, Dr. T Vijaya Kumar
WINE CLASSIFICATION USING LDA
Tikendrajit Sarmah, Sandarsh Gowda MM
Ranking of Online Reviews’ Helpfulness Using SO-ILES TODIM
Misba Taj, MS Sowmya
Design and Implementation of Order Management System Based on Spring Boot
Shivam Kumar, Seema Nagaraj
Path Finding Visualisation in Mazes Using Various Algorithms
Rohit Kumar, K. Sharath
Digital Ticketing Scheme with Attribute-Based Credentials that Protects Privacy
Chandan CV, Sandrash Gowda M M
FULL STACK WEB DEVELOPMENT
Kanani Jenishkumar Raskibhai, Sandarsh Gowda MM
SEISMIC ANALYSIS OF STRUCTURE WITH STRUCTURAL IRREGULARITIES
Gangotri KInagi, Mr.Lokesh.J.K
Deep Learning based Face Recognition of Newborn Babies
Geethanjali S G, Janhavi L, Keerthana R, Amrutha N, Hithaishini B Urs
APPLICATION FOR AN EFFECTIVE ONLINE CAREER PORTAL
Ranjith V, Madhu HK
ANTIMICROBIAL ACTIVITY OF GARCINIA MANGOSTANA LINN
Seema V. Nayak, Dr. P. N. Mandhare
Post Connection – ARP Poisoning and Protocol Downgrade Attack
Dileep M G, Dr. R Savitha
Design and Development of Autonomous UAV for Thermographic Surveillance
Dr. Hareesha N G, Manjunath M Devaranavadagi, Pruthveek S Badiger, Athith A Kashyap and Ekale Abhaykumar
DOCFACE+: ID DOCUMENT TO SELFIE MATCHING USING BLOCKCHAIN TECHNOLOGY
Pramod C N, Bhavana G
Improved And Protected Banking Transactions Using Cryptographic Techniques
Chaithra S K, Sandarsh Gowda M M
Cloud Computing Application for A Protected Medical Records
Darshan Jain S V, Swetha C S
Deep Learning Algorithm for Classification And Prediction of Lung Cancer
Pavitra B, Thanuja J C
REACTIVE POWER COMPENSATION USING D-STATCOM FOR 3-PHASE INDUCTION MOTOR LOAD
Shubham Singh, A. N. Tiwari
DESIGN AND SIMULATION OF DVR USED FOR VOLTAGE SAG/SWELL MITIGATION AT DISTRIBUTION SIDE
Vipul Vishwakarma, A. N. Tiwari
Wildlife Animal Tracking and Monitoring System
Dr. Chanda V Reddy, Aishwarya MR, Aishwarya N, Dasha C Jain, Pragathi J Reddy
Experimental Investigation of PVC Composite Membrane for Polymer Electrolyte Membrane Fuel Cell
KUMARESAN.P, PERIYASAMY.S, SEKAR.T, NANDAKUMAR.N
AUTOMATIC GENERATION OF MINUTES OF MEETING USING DATA ANALYTICS
Mrs. Navya Damodar, Nandini R, Karthik J, Gangu, Malik Mahammed Shakir
Crypt Cloud: Secured and Descriptive Connectivity Control for Cloud Storage
LAKSHMI AL, Dr. Kanta devangari
Development of Patient Profile in Clinical Data Management
Vinod Kumar K, Prof Saravanan C
EMISSION CONTROL ANALYSIS ON SINGLE CYLINDER 4-STROKE DIESEL ENGINE
Dr.M.Naga Swapna Sri, Dr.P.Anusha, E.Uthpal Ramana Panith, A.Teja Sai Abhiram, B.Sai Kiran Naik, A.Charan Teja
MOBILE PELTIER COOLER
Dr.P.Anusha, Dr. M. Naga Swapna Sri, N.Naveen, T. Sai Kireet, R. Setu Madhav, N. Sai Santhosh
Implementation of e-toll using ML
Ankitha S, Arjun A B, Anoop Kashyap K, Srikar G K, Dr. Shilpa R
GENDER DIFFERENCES IN EMOTIONAL VALUE IN PHYSICAL EDUCATION STUDENTS: A PILOT STUDY
Ramakant D. Bansode, Dr. Vandana Singh
Abstract
Passive Bearing Resistance at the Sand-Geogrid Interface in Direct Shear Mode
Dr. Abdul Latheef Mannissery
DOI: 10.17148/IARJSET.2022.9601
Abstract: A sequence of large scale direct shear tests were carried out to evaluate the involvement of passive bearing resistance at the interface of the cohesion less soil- geogrid in shear mode.Soil samples used are with varying proportions of Sand, 6mm aggregates and 12mm aggregates at different densities. The study results revealed that the transverse ribs contribute 17% of the total interface resistance for soil samples tested with the geogrid. From the test results it is observed that the shear strength at sand - geogrid interface mobilized under direct shear mode is depending on the density, size of the particles and thickness of ribs. Moreover, it is observed that the 21 % of passive resistance contributed by transverse ribs with respect to the total shear resistance found decreasing with increase of normal load at constant density and the passive resistance found decreasing with decreasing of density.
Keywords: combined shear resistance; interface shear ;geogrid-soil; passive resistance;shear mode;soil gradation; transverse ribs.
Abstract
Analysis of Facial Expression Recognition Using LBP and Haar-Cascade Classifier
Priyanka K P, Mrs. Divyaprabha, Dr. M. Z. Kurian
DOI: 10.17148/IARJSET.2022.9602
Abstract: Facial expression recognition is the main factor in human communication that helps us to understand the intension of other emotions. This paper is going to relate human emotions such as anger, happiness, neutral, sad, surprise, disgust. In order to recognize facial expressions from the machines we employed some techniques called local binary pattern (LBP) for face recognition, the algorithm used here is local binary pattern histogram (LBPH), and for detection of face Haar-cascade classifier is used. With this work, the expression of the respective image will be reported, and it will also notify time taken for training an image. A small change in facial expressions signifies lighting, orientation and background. Here the LBP technique is intended only for the purpose of extracting features and Haar-cascade classifier is being utilized for the extracted features from LBP. The dataset is used for the purpose of testing and training of the images.
Keywords: Facial expression recognition, image processing, local binary pattern, Haar-cascade classifier, Feature extraction, Face detection.
Abstract
The Simulation Study of Small-Signal BJT and FET Amplifiers through Pspice
Ghouse Mohiuddin, Satyendra Nath Tiwari
DOI: 10.17148/IARJSET.2022.9603
Abstract: Small signal Common Source FET RC coupled amplifier and Common Emitter BJT amplifier are considered as basic building block for the electronic circuits. In this paper these two important amplifier circuits compared in various parameters like frequency response, bandwidth etc. We have also compared these two amplifier circuits on various parameter e.g. maximum voltage gain, current gain, power dissipation, operating voltage and input-output impedance etc. In this communication simulation study of bandwidth variation with respect to load resistance and bandwidth variation with respect to Vcc has been carried out.
Keywords: Small Signal Amplifiers, Basic Electronics Circuits, BJT Amplifier, FET Amplifier
Abstract
EDUCATION IN SLUMS-CHALLENGES AND ISSUES
Dr. Sumangala N
DOI: 10.17148/IARJSET.2022.9604
Abstract: Slums are overcrowded, densely packed residential areas in cities that lack basic amenities of life. Education is one of the most serious issues in slums as the literacy rate is extremely low. As a part of the NGO Sodari Niveditha Prathisthana, I participated in education awareness programs carried out in the Uttarahalli slum in Bengaluru since 2017. From my observation, children living in these areas usually do not attend school because of financial issues. Most children who attend government school discontinue after a few years as they have siblings to take care of since their parents need to work, and the drop rate increasingly high. The importance of education has been explained repeatedly and stories of great men and women who became successful in spite of their struggles were given as examples. Topics such as the importance of hygiene, nutrition and sanitation, their duties towards society and the nation have been brought up and discussed to push the children to make an effort towards building a healthy society. Parents were advised to admit their wards to schools through door-to-door campaigns. It was observed that many children have habits like smoking, chewing of tobacco and gambling. The ill effects of smoking, tobacco chewing and alcoholism were explained in these awareness programs. Many classes were held on topics in basic science, mathematics, English, Hindi and environmental science. Children were enthusiastic and eager to learn from us apart from school, as our coaching would help them to understand complex concepts easily. For the development of these areas, educational institutions could extend their activities such as street dramas and disease awareness programs. Slum development boards must implement the schemes of the government for the welfare of slums.
Abstract
Problems encountered by women entrepreneurs of SSI units in Kerala with special reference to Thrissur district
Ms Remya.S
DOI: 10.17148/IARJSET.2022.9605
Abstract: The present study has been conducted to identify the main problems faced by women entrepreneurs in Kerala and the opportunities available to them. The socio economic background of women entrepreneurs was also analysed. Age, Marital status, educational qualification, Annual income, business type, size of business, source of financing and spending of business income were the variables for understanding the socio economic background of the women entrepreneurs. The main problems faced by them include lack of strong leadership, financial deficit, misuse of money, lack of education,non awareness of government scheme,non repayment of loan, lack of proper training ,lack of planning and working, health problems and other problems. The financial institutions and government should take steps to facilitate easy availability of credit to give encouragement to women entrepreneurs.. The institutional assistances available to them was also studied. The various institutions for promoting women entrepreneurs include Kerala State Women Development corporation, Small Industries Development bank of India, National Small Industrial corporation, khadi and village industries commission etc. Percentage analysis and weighted ranking method was used for analyzing the data.
Keywords: Women Entrepreneurs-SSI-Institutional assistance
Abstract
DESIGN AND ANALYSIS OF THERMAL BARRIER COATING ON GASTURBINE BLADE
A J Sriganapathy, Kiruthika B, Sopika.S, Sujithra.H, Yamuna R
DOI: 10.17148/IARJSET.2022.9606
Abstract: Thermal barrier coatings (TBCs) are deposited on the turbine blade to reduce the temperature of underlying substrate, as well as providing protection against the oxidation and hot corrosion from high temperature gas. Optimal ceramic top-coat thickness distribution on the blade can improve the performance and efficiency of the coatings. Design of the coatings thickness is a multi-objective optimization problem due to the conflicts among objectives of high thermal insulation performance, long operation durability, and low fabrication cost. This work developed a procedure for designing the TBCs thickness distribution of 100μm to 500μm for the gas turbine blade. The base material of blade geometry is created using Nickel alloy and its coating material is selected as partially stabilized zirconia. Three-dimensional finite element models were built using CATIA and analyzed by ANSYS WORKBENCH, and weighted-sum approach was employed to solve the multi objective optimization problem herein. Suitable multi region top-coat thickness distribution scheme was designed with the considerations of manufacturing accuracy, productivity, and fabrication cost.
Keywords: Thermal Barrier Coatings; Oxidation; corrosion; Ceramic Top-coat thickness; Durability; Low fabrication co
Abstract
DESIGN AND ANALYSIS OF AEROSPIKE BELL NOZZLE TO IMPROVE THRUST IN ROCKET ENGINE
A J Sriganapathy, Makudesh Arjun Kumar. A, Diwakar.R, Sathish kumar.M, Rahul.B
DOI: 10.17148/IARJSET.2022.9607
Abstract: The present computational Analysis deal with improvement of momentum distribution of the high temperature exhaust in Rocket Engine through change in profile of Aero-spike nozzle. Due to change of profile, we can improve thrust and mass flow rate of exhaust gas. This project deals with the Design and Analysis of Aero-spike Nozzle by adding the bell configuration at the end of the Nozzle and also by providing the dimples at the spike of the nozzle to produce higher thrust than the normal aerospike nozzle. The design of the nozzle is carried out with the design software CATIA V5 and the analysis of the Nozzle is done in ANSYS FLUENT 19.2 software. The presence of Dimples at the spike of the nozzle increase the turbulence and enables the flow to be attached to the spike thereby reducing the flow separation of the nozzle. This Profile modification of the Nozzle produces considerable increase in thrust compared to the conventional Aerospike nozzle. The comparison has been done with respect to mass flow rate , velocity , streamline and temperature between unmodified profile and modified profile.
Abstract
A COMPARATIVE STUDY ON SEISMIC ANALYSIS OF A RCC FRAMED REGULAR AND IRREGULAR STRUCTURES BY USING FLUID VISCOUS AND METALLIC DAMPERS
DR.K.V.RAMANA REDDY
DOI: 10.17148/IARJSET.2022.9608
Abstract: Among all the disastrous events, for example, flood, twisters, typhoons, earthquakes, and drought the least comprehended and the most damaging one is earthquake. They are typically affected when rock underground break down along a fault and these seismic events are the most important natural hazards and can cause dangerous destruction by increasing the energy inside the structure. Since the forces applied on a structure are dynamic in nature, they cause vibrations inside the composition and they also increase the energy within the structural system. The major job of a structure is to take the lateral loads and carrying them to the foundation. Such undesirable energy can be dissipated by presenting the few control systems, for example, active, hybrid, passive and semi active control systems. The current work incorporates one such dissipating device called dampers. Dampers are the energy dissipating devices which are utilized to resist lateral forces acting up on the structure. They also resist the displacement that occurred in reinforced Concrete buildings during an earthquake. Dampers are utilized to decrease the buckling of columns and deflection of beams and to expand the stiffness of structure and furthermore used to moderate the vibration and twisting of RCC framed structure during earthquakes. There are various kinds of dampers utilized in general. In this current study fluid viscous damper (FVD) and metallic damper are used to resist the energy from earthquakes. Regular and irregular Models will be created with two dampers .i.e. fluid viscous dampers and metallic dampers and to carry out results such as storey displacement, storey drift etc. Different types of analysis methods such as time history analysis and response spectrum method are adapted to study the storey displacement on a G+20 storey RCC framed structure with dampers by using ETABS software. Performance of structures will be found by comparing the reactions as storey displacement and storey drift for regular and irregular structures. The present study compares the performance and effects on RCC frame regular and irregular structural systems by using fluid viscous and metallic passive energy dissipating dampers. These dampers will be used for different regular and irregular modelled structures and at different locations in a building and also in seismic zone V.
Keywords: Natural hazards, undesirable energy, semi active control systems, fluid viscous dampers, storey displacements , regular and irregular structures
Abstract
CLIMATE CHANGE OVER SOUTH INDIAN COAST DUE TO AEROSOL AND AIR POLLUTION
S. Thangalakshmi*, K. Sivasami
DOI: 10.17148/IARJSET.2022.9609
Abstract: The two most serious dangers to nearly 60 percent of the world's population living in Asian monsoon zones are the growing severity of droughts/floods and decreasing air quality from increased aerosols. These simultaneous challenges have driven a huge amount of study on the effects of aerosols in influencing Asian monsoon weather and climate during the last decade. An aerosol is a colloid of small solid particles or liquid droplets suspended in air or another gas. The excess volume of aerosol in a certain place will have an impact on the health of living organisms as well as the regional climate. The Asian monsoon area is a major source of aerosol emissions from both man - made and natural sources. Aerosol loading patterns are extensively controlled by diverse meteorological and climatic regimens, which in turn are modified by aerosol impacts. Shipping emissions have garnered attention due to their harmful impact on regional climate and air quality at ports and along coasts across the world. As a result, recognising the aerosol in a certain place is critical. CO2, NOX, and SOX emissions from air pollution cause cloudiness and accelerate climate effect 'Radiative Forcing' (RF). Positive RF causes heat, while negative RF causes cooling. These also have an indirect influence on weather due to the Cloud Condensation Nuclei (CCN) ability of clouds, which has a significant impact of gases and particles. An increase in Sulphur may result in a decrease in Negative RF. Several techniques are applied to assess the range of aerosols, such as LIDAR, photometers, particle analysing methods, and so on; in this case, we utilise a particulate analyser to determine the amount of aerosol. To find out, we maintained the particle counter and analyser on the ship's top deck and examined the aerosol concentration over the atmosphere of the south Indian coast.
Keywords: Aerosol, Air pollution, Climate Change, Coast Region, Emission, Particulate Matter, Shipping Emissions
Abstract
Factors that Cause Children to Drop Out of School at SMPN 26 Tulang Bawang Barat
Novi Yuli Ervianni, Sugeng Widodo, Risma Margaretha Sinaga
DOI: 10.17148/IARJSET.2022.9610
Abstract: This study aims to determine the factors that cause children to drop out of school at SMPN 26 Tulang Bawang Barat. The method used is quantitative using the chi-square analysis technique. Data collection techniques in this study use observation techniques, questionnaires, and documentation. The research was conducted at SMPN 26 Tulang Bawang Barat. The results showed that: (1) Interest in learning with a value of X2 arithmetic > X2 table that is equal to 82.94 > 12.59 which indicates Ho is rejected, which means that children's interest in learning causes children to drop out of school. (2) Motivation to learn with a value of X2 arithmetic > X2 table that is equal to 34.12 > 12.59 which indicates Ho is rejected, which means that children's learning motivation causes children to drop out of school. (3) Parent's Economy with a value of X2 arithmetic > X2 table that is equal to 93.97 > 12.59 which shows Ho is rejected, which means that the economy of parents causes children to drop out of school. (4) Parental education with a value of X2 arithmetic > X2 table that is equal to 31.82 > 12.59 which shows Ho is rejected, which means that parental education causes children to drop out of school. (5) The school environment with a value of X2 count X2 table that is equal to 12.54 12.59 which shows Ho is accepted which means that the school environment does not cause children to drop out of school. (6) Living environment with a value of X2 count > X2 table which is 34.49 > 12.59 which indicates Ho is rejected, which means that the living environment causes children to drop out of school.
Keywords: school dropouts, causing factors, interest in learning, motivation to learn
Abstract
“Survey of Some Sacred and Medicinal Plants from Malegaon Tehsil of Nashik District, Maharashtra”
Yogesh C Shastri & Pravin D Nikam
DOI: 10.17148/IARJSET.2022.9611
Abstract: Biodiversity is an important gift of nature that provides all basic requirements for human existence. Since time immemorial plants have played an important role in human existence and civilization. It has been observed that large number of plants being used for the worshiping of gods and goddesses as well as for socio-religious functions and medicinal purposes which serve as a useful tool for conservation of plants. Present work examined how plant parts are used by the local peoples of the area for worships to various gods, goddesses, customs and traditions related with various ceremonies. The religious activities serving as conserving tool for biodiversity. So, it is necessary to preserve and promote aesthetic values to conserve biodiversity and nature, which will surely play an important role in betterment of human beings. During the survey 32 plants belonging to 20 families have been recorded. These plants are used for religious as well as medicinal purpose viz. Achyranthes, Aegle, Annona, Azadiracta, Bambusa, Bauhinia, Butea, Calotropis,, Datura, Emblica, Ficus, Musa, Ocimum, Ricinus, Santalum, Sesamum and Zingiber. People of the study area are highly religious. These beliefs are not only showing the human relation with plant diversity, but also help in the conservation of species.
Keywords: Sacred, Medicinal, Plants, Malegaon.
Abstract
A DOUBLE GENERAL INTRGRAL TRANSFORM FOR THE SOLUTION OF PARABOLIC BOUNDARY VALUE PROBLEMS
Dinkar P. Patil, Prerana D. Thakare, Prajakta R. Patil
DOI: 10.17148/IARJSET.2022.9612
Abstract: Boundary value problems arise in several branches of physics, Engineering, Biological sciences, Health sciences and Environmental sciences. The boundary value problems are of three type's elliptics, parabolic and hyperbolic. These problems can be solved by the variety of methods. To solve these boundary value problems recently many researchers are engaged in applying various types of integral transforms. In this paper, we use recently developed integral transform called as double general integral transform to solve the parabolic boundary value problems.
Keywords: Parabolic boundary value problems, One dimensional heat equation, Double general integral transform.
Abstract
A STUDY OF EDUCATION LOAN WITH RESPECT TO BANKING SECTOR
Mr.Pavan Kumar Shetty, Mr.Sri Manjunath R, Mr.Suyog Srivatsa K N, Mr.Omkar Patil
DOI: 10.17148/IARJSET.2022.9613
Abstract: Banking sector is one of the largest financial service industry in the world. This study focuses on knowledge and information which drive a key force for economic of the country the rapid rate of economic growth of any country depends on technically and professionally trained human man power in huge numbers. Therefore, loans for education are such as investment for economic development and prosperity of a country. India has got large number of students who are aiming and passionate towards pursuing their higher education and are seeking financial assistance in the form of education loans from bank. In this research it is analyzed that is education loans are available for qualified students at specified loan of interest for completing their higher studies in various courses. Education loan has been increasing with the higher growth in interest rate on loan which can affect in affordability to deserving students who cannot pursue their higher education.
Keywords: Banking sector, technical, professional, economic, education, affordability.
Abstract
SIMULATION STUDY OF DESIGN VARIATIONS FOR AN ENGINE MOUNT OF A PASSENGER VEHICLE
S. Anirrudh Shrinaath, G. Gokul, J. Hari Krishna, V. Kavin
DOI: 10.17148/IARJSET.2022.9614
Abstract: The purpose of this project is to gain a deep understanding of the concept of engine mounts, their working properties, design considerations and the factors that affect its performance. The initial step of this project was to learn and understand the functions and components of an engine mount, it's desirable characteristics, types of engine mounts, it's design considerations, commonly used materials, and causes of damage and failure. A rubber engine mount of a typical standard drive vehicle is selected for this study, the reason being that the simulation study is purposed to be simple. The selected engine mount is modeled in Solidworks, and the model is analyzed in ANSYS for static stress, and Modal analyses, which provides the physical, and vibrational properties of the engine mount model like stress distribution, strain rate and Deformation, and Natural frequencies. The obtained results (particularly deformation and region(s) of failure) are then compared to its real-life counterparts and the level of the simulations' accuracy is determined. The engine mount model is then taken up for design changes, where the primary motives are to reduce strain rate and deformation, tuning it's natural frequency, and improve it's fatigue life, stiffness, and damping. The variations in design are based on the ideas to have good vibration damping and dissipation. The models of the design variants are subjected to the same simulation processes that the standard model. The resulting successful model is determined based on the model that has better endurance and damping characteristics.
Keywords: Engine mount, Vibration, design, analysis
Abstract
Gender Diversity & Well-Being: Proportions that affect Gender Stereotyping & Unconscious Bias in the workplace
Vaishali Verma, Dr Daleep Parimoo, Dr Santhi Narayan
DOI: 10.17148/IARJSET.2022.9615
Abstract: Diversity is like two sides of a coin, both have their relevance and the presence of both are inevitable, diversity is inseparable from individuals, some traits of diversity are visible and some are inherited invisible traits which are reflected in one's behaviour consciously or unconsciously. The word diversity is intelligible, which requires strong attention as it is a rising need that requires high consideration from all the organizations. Unconscious bias is social stereotyping about a certain group of people, that an individual is unaware of having. These biases are in the form of races, castes, religions, gender etc. Gender Diversity is more about recognizing the differences of opinions based on Gender and assessing its associated behaviours like Attitude, Skills, Abilities, Perceptions, and Personalities. Gender discrimination is the reality that exists in our society despite the value systems. The changes, beliefs and acceptance of sexism are the various examples of biases and prejudice that are easily produced and it happens every day in the transaction the gender stereotypes and form the judgements and evaluations which ultimately affect the male and female employees. The discrimination leads to the concern that employees are not equally treated or regarded in the same position in the organization, and at times, they are not treated in the same position specifically on the higher levels as a result of gender stereotypes. Most organizations are moving towards equating diversity in the workplace for the listed reasons. This study aims to understand the concept of unconscious biases that exist in the organisation's gender parity which threatens the equal opportunity of employees working in an organisation and the decision-making pattern in an organization. The objective of this study is to address the concern of gender diversity and discrimination that takes place implicitly affects the organizations. The unconscious bias paints the thoughts and decisions of an individual and there's a high need to recognize this need for discrimination-free organization. This study would benefit the organizations to be a torchbearer for the organization because the unconscious bias in the workplace can also affect it negatively and it strongly impacts the culture of the organization.
Abstract
Study of column structure behaviour with fiber and ferrocement confinement under compression
Syed Jawid Hussain, Dr. Siva Kumar Ramamoorthy
DOI: 10.17148/IARJSET.2022.9616
Abstract: Concrete is that the most generally used structural material round the world, due to its higher compressive strength, low cost and might be easily manufactured with the locally available materials. Mould ability to any shape resulting in architectural finishes, high resistance and weathering action, and Aesthetic appearance. Therefore, it's widely utilized in construction. A concrete with reinforcement when subjected to earthquake and nuclear blast etc, fails suddenly because of low durability,Poor ductility,More brittleness. This problem is avoided if the critical section are ready to undergo large plastic deformations and be in an exceedingly position to soak up large amounts of strain energy. The structures which are designed for seismic resistant demands high ductility. Therefore, the ductility of concrete is being improved by confining it in steel binders, as ties in compression members and as stirrups in beams nowadays. within the structures which are statically indeterminate the critical section, at which first hinge forms are incidentally also the section having maximum shear force. The stirrup reinforcement, which is provided must be sure of shear at that section and simultaneously provide confinement. Moreover, use of sophisticated arrangement of closely spaced stirrups in confinement columns not only creates plane of weakness between core and also the concrete and interrupts the continuity but also adds the matter of steel congestion. Therefore it should not be possible to sufficiently confine the structure by providing the laterals ties alone but it'd be useful if a supplementary or indirect confinement, additionally to laterals, is provided at the critical sections or a decent alternative for the confinement is devised several investigations have revailed that incorporation of discontinuous, discrete and uniformly spread fibres in concrete increases durability ductility, impact, toughness, flexural strength and fatigue resistance. Hence reinforcement of concrete is confined with ferro-fibre.
Keywords: fibre, ferrocement , confinement , compression, etc
Abstract
INDIAN LITERACY RATE: A STUDY
Likhitha S and Deepa Yogesh Kamat
DOI: 10.17148/IARJSET.2022.9617
Abstract: A census is the procedure of systematically acquiring and recording information about the members of a given population. The term is used mostly in connection with national population and housing censuses; other common censuses include agriculture, business, and traffic censuses. Here we are focussing on literacy rate, any one above age 7 who can read and write in any language was considered a literate. In censuses before 1991, children below the age 5 were treated as illiterates. In this paper, we are estimating the population and literacy rate for the year 2021 using 2011 census data. We have used cluster analysis, simple regression, logistic curve method, multiple regression and R programming as the tools to estimate the population and literacy rate of 2021.
Keywords: Census, literacy rate, regression, cluster analysis, R programming
Abstract
Applications of Emad-Sara Transform for General Solution of Telegraph Equation
D.P. Patil, Shweta Vispute, Gauri Jadhav
DOI: 10.17148/IARJSET.2022.9618
Abstract: Recently, integral transform are of very much useful for solving variety of problems. Many researchers are now engaged in developing various integral transforms. This paper is devoted to obtain the general solution of one dimensional hyperbolic telegraph equation of second order using Emad-Sara transform.
Keywords: Telegraph equation, Emad Sara transform, Integral transforms, second order one dimensional hyperbolic equation.
Abstract
A Study On Motor Ride Sharing Service In Dhaka City, Present And Future Challenges
Md. Rasidul Islam, Md. Hasnul Habib, Hasan Ahmed Joy, A. B. M. Shamsul Haque Nayem
DOI: 10.17148/IARJSET.2022.9619
Abstract: Ridesharing in Bangladesh began on May 7, 2016, with the launch of an app called "Share A Motorcycle," or SAM. The current and future issues of Dhaka City's motor ride-sharing services are examined in this paper. With a sample of 570 or more consumers or users, the present state andpotential are examined. A total of 570 people have responded to the survey. Because of its specific advantages,Because of its real-time catalyst, more convenient, on-demand position, and consumer, it has garnered widespread favor among the younger generations and enterprises. Concerns about funding, a lack of logistical support, a lack of understanding, bad government regulations, fierce rivalry, and other problems have all been highlighted as major roadblocks.
Keywords: Questioner Survey, Ridesharing Services, Vehicles, Passengers, Dhaka City.
Abstract
STROKE PREDICTION USING MACHINE LEARNING
Sathya Sundaram .M, Pavithra.K, Poojasree.V, Priyadharshini.S
DOI: 10.17148/IARJSET.2022.9620
Abstract: A Stroke is a health condition that causes damage by tearing the blood vessels in the brain. It can also occur when there is a halt in the blood flow and other nutrients to the brain. According to the World Health Organization (WHO), stroke is the leading cause of death and disability globally. Early recognition of the various warning signs of a stroke can help reduce the severity of the stroke. Different machine learning (ML) models have been developed to predict the likelihood of a stroke occurring in the brain. This research uses a range of physiological parameters and machine learning algorithms, such as Logistic Regression (LR), Decision Tree (DT) Classification, Random Forest (RF) Classification, and Voting Classifier, to train four different models for reliable prediction. Random Forest was the best performing algorithm for this task with an accuracy of approximately 96 percent. The dataset used in the development of the method was the open-access Stroke Prediction dataset. The accuracy percentage of the models used in this investigation is significantly higher than that of previous studies, indicating that the models used in this investigation are more reliable. Numerous model comparisons have established their robustness, and the scheme can be deduced from the study analysis.
Keywords: Stroke; machine learning; logistic regression; decision tree classification; random forest classification; k-nearest neighbors; support vector machine; Naïve Bayes classification.
Abstract
A SURVEY OF COMMERCIALIZATION POTENTIALS OF RESEARCH RESULTS FROM UNIVERSITIES IN NIGERIA
Okopio Alex Momoh, Aliyu Bala, Aminu Sa’idu
DOI: 10.17148/IARJSET.2022.9621
Abstract: Commercialization of research which is a primary means through which research results are utilized to generate products and services, has become a key component of the research mission of universities such that novel ideas, techniques and products can be generated for the marketplace for the benefit of relevant stakeholders and society in general. In many developed and newly industrializing nations, commercialization efforts at universities have developed into an integral part of research and innovation activities. In these countries, collaborations between industry and the academia present tremendous opportunities for advancing knowledge, applying it to real-world problems, and bringing about various social benefits. Despite global attention to commercialization of research and innovation for sustainable economic development, little attention is given to it by Nigerian universities. The rating of Nigeria as one of the leading producers of scientific publications in Africa and the need to find out the extent to which these research results and innovations are being turned into commercial products and services justify this research work on survey of commercialization potentials of research outputs from Nigerian universities. The survey utilized the questionnaire method of data gathering from selected universities from each of the six geopolitical zones of the country. The findings of the research include an increasing need for demand - driven research to provide solutions to the many socio-economic problems of society, low level intellectual property generation and commercialization by Nigerian universities compared to some selected American and British universities, research success in Nigeria means being published in international journals rather than helping local industries to grow and there are many constraints to effective commercialization of university research in Nigeria. It is concluded that if Nigeria is to achieve sustainable all-round development to enhance the living standard of the populace, Nigerian universities must regard commercialization of technologies as a vital component of university mandates and act as microenvironments for innovation and entrepreneurship. The authors recommend the establishment of appropriate institutional frameworks by government for research commercialization and Nigerian universities should shift research focus towards research outcomes with high commercialization potentials for economic development.
Keywords: Research, Intellectual Property, Innovation, Commercialization, Entrepreneurship, Patent, License
Abstract
Destructive and Non-Destructive Properties of Glass Fiber Reinforced High Performance Concrete with Micro Silica
UPPALAPATI UMA MAHESWAR REDDY, PARSINENI BALAKRISHNA
DOI: 10.17148/IARJSET.2022.9622
Abstract: As we well known that, the world is developing rapidly and the construction of buildings takes vital role in this development. If we go through in detail the usage of concrete get raised up so it leads to the shortage of the natural resources. In order to save our natural resources we thought that replace some of the proportions in the concrete with the following measures.The study focuses on the compressive strength, split tensile strength and flexural strength performance of concrete containing glass fiber and different percentage of micro silica as a partial replacement of cement. The cement in concrete is replaced accordingly with the percentage of 7.5%, 10%, 12.5%, 15% and 17.5% by weight of micro silica and 0.5%,1%,1.5%,2% and 2.5% of glass fiber is added by weight of cement. Concrete cubes, cylinders and beams are tested at the age of 7, 14 and 28 days of curing. Finally the strength performance of slag blended fiber reinforced concrete is compared with the performance of conventional concrete.
Keywords: glass fiber, micro silica, compressive strength, split tensile strength, flexural strength.
Abstract
Effect of Steel Fibres on Concrete with M-Sand as Replacement of Natural Sand
NUNSAVATHU SRINU NAIK, PARSINENI BALAKRISHNA
DOI: 10.17148/ IARJSET.2022.9623
Abstract: This paper describes the experimental study of fibre reinforced concrete with manufacturing sand (M-Sand) in addition of crimped steel fibres. Normally a huge quantity of concrete is required for the construction but we know that concrete is weak in tension and strong in compression and the fine aggregate that normally used for concrete is natural river sand but our aim is to replace the natural sand by artificial sand (manufactured sand) and to increase the compressive and tensile strength of the concrete by addition of steel fibre .To over-come the difficulties due to excessive sand mining, M-Sand is used as fine aggregate. M-Sand is uniformly in size, produced from gravel crushers. The main objective of this research is to investigate the effect of steel fibres on concrete manufactured by M-sand as fine aggregate and develop a concrete. It is proposed to determine and compare compressive strength, tensile strength and flexural strength of the concrete grades M30 having different percentage of steel fibre 1%, and 10%, 20%, 30%, 40% and 50% by weight of M-sand added by weight of fine aggregates. Concrete cubes, cylinders and beams are tested at the age of 3, 7 and 28 days of curing. Finally the strength performance of slag blended concrete is compared with the performance of conventional concrete.
Keywords: Steel fiber, M-sand, compression test and split tensile test, flexural strength.
Abstract
Experimental Study of Mechanical Properties of Concrete with Stone Dust and Phosphogypsum
MD.MUSHARRUF QADEER, PARSINENI BALAKRISHNA
DOI: 10.17148/IARJSET.2022.9624
Abstract: Stone dust a waste from the stone crushing unit accounts 25% of the final product from stone crushing unit. This Stone dust which is released directly into environment can cause environmental pollution. To reduce the impact of the Stone dust on environment and human, this waste can be used to produce new products or can be used as admixture in concrete so that the natural resources are used efficiently and hence environmental waste can be reduced. Here Stone dust is used for partial replacement of fine aggregate in concrete and gypsum is used for partial replacement of cement for studying the strength property of concrete. The aim of the experiment is to find the maximum content of stone dust partial replacement of fine aggregate and phosphogypsum partial replacement of cement in concrete. The percentages of stone dust partial replacement of fine aggregate in concrete are 10, 20%,30%,40% and 50% and phosphogypsum replacement of cement 5,% 10%, 15 %, 20%, and 25 % In M35, grade concrete cubes of 150x150x150mm size and cylinders of 150x300mm and beams 50x10x10cm were cast for conducting compressive strength, split tensile and flexural test.
Keywords: stone dust, phosphogypsum, compressive strength, split tensile strength, flexural strength.
Abstract
Investigation of Mechanical Properties of Concrete by Partially Replacing Cement with Silica Fume and Fine Aggregate with Copper Slag
SUNKESULA VIJAY KUMAR, PARSINENI BALAKRISHNA
DOI: 10.17148/IARJSET.2022.9625
Abstract: Copper slag is a by-product obtained during the matte smelting and refining of copper. Current options of management of this slag are recycling, recovering of metal, production of value added products and disposal in slag dumps or stockpiles. This paper presents the results of a study undertaken to investigate the feasibility of using copper slag as fine aggregates in concrete. The effects of replacing coarse aggregate by copper slag on the compressive strength, split tensile strength, flexural strength performance of concrete containing different percentage of silica fume as a partial replacement of cement and Copper slag with fine aggregates. The silica fume in concrete is replaced accordingly with the percentage of 5%, 7.5%, 15%, 17.5% and 20% by weight of cement and 5%, 10%, 15%, 20% and 25% of -Copper slag is added by weight of fine aggregate. Concrete cubes, cylinders and beams are tested at the age of 3, 7 and 28 days of curing. Finally the strength performance of silica fume based copper slag concrete is compared with the performance of conventional concrete.
Keywords: silica fume, copper slag, compressive strength, split tensile strength, flexural strength
Abstract
Strength and Durability of Steel Fiber Reinforced Concrete Containing Phosphogypsum as Partial Reolacement for Cement
MAHANKALI SRIKANTH, PARSINENI BALAKRISHNA
DOI: 10.17148/IARJSET.2022.9626
Abstract: As we well known that, the world is developing rapidly and the construction of buildings takes vital role in this development. If we go through in detail the usage of concrete get raised up so it leads to the shortage of the natural resources. In order to save our natural resources we thought that replace some of the proportions in the concrete with the following measures.The study focuses on the compressive strength, split tensile strength, flexural strength performance of concrete containing steel fiber and different percentage of phosphogypsum as a partial replacement of cement. The cement in concrete is replaced accordingly with the percentage of 5%, 10%, 15%, 20% and 25% by weight of silica fume and 1% of steel fiber is added by weight of cement. Concrete cubes, cylinders and beams are tested at the age of 3, 7 and 28 days of curing. Finally the strength performance of slag blended fiber reinforced concrete is compared with the performance of conventional concrete.
Keywords: steel fiber, phosphogypsum, compressive strength, split tensile strength, flexural strength.
Abstract
Retinal Diseases Screening Through Deep Learning
Vibha Venkatesh, Rakshini J Gowda, Priyanka R, Sushma V, Dr Ravi P
DOI: 10.17148/IARJSET.2022.9627
Abstract: In these days there are many problems related to eyes caused by retina and its surfaces which leads to blindness, insight, far sight and AMD (Age-Related Macular Degeneration). In order to prevent or postpone vision loss, early blindness is not essential. To that goal, several AI algorithms have been presented by researchers and current systems that are able to determine if an eye picture is normal or sick. Using fundus pictures and algorithms like CNN and ANN, this research examines the deep learning approaches used at various stages of detection.
Keywords: Machine-Learning, Deep-learning, Convolutional Neural Network, Artificial Neural Network, Image Processing, Fundus images, Preprocessing.
Abstract
Experimental Investigation on Mechanical Behavior of Bio-Composite Material
UDHAYA. A. R, T. SEKAR, N. NANDAKUMAR, R. SURENDRAN
DOI: 10.17148/IARJSET.2022.9628
Abstract: Polylactic acid (PLA) and hydroxyapatite (HAp) are both used in bone healing materials in different ways. Magnesium (Mg)-based biomaterials are being studied extensively for implant applications that are biodegradable. One of the approaches used to enhance bioactivity and minimize Mg degradation rate is to develop Mg-based composites. In this study, new bio-composite material was developed using Hydroxyapatite (HAp) which has been derived from fishbone waste and Magnesium (Mg) reinforced Polylactic acid (PLA) composites. This Bio-composite was prepared through a compression moulding method with different wt.%, such as PLA/HAp/Mg (84%, 15%, 1%), (82%, 15%, 3%), and (80%, 15%, 5%) respectively. The mechanical behaviour of HAp/Mg reinforced PLA was investigated through universal tensile testing. The tensile strength of PLA has been improved by incorporating the HAp/Mg. The ultimate tensile strengths of virgin PLA and PLA/HAp/Mg composites (84%, 15%, 1%), (82%, 15%, 3%), and (80%, 15%, 5%) were 37.9, 40.5, 56.7, and 70.9 MPa respectively. The ultimate tensile strength of the PLA/HA/Mg-(80%,15%,5%) composite was approximately two times greater than virgin PLA. Based on the project outcomes of mechanical strength, the fabricated HAp/Mg with PLA composite is the promising material for high-strength bone replacement applications.
Keywords: Polylactic acid (PLA), hydroxyapatite (HAp), Magnesium (Mg)
Abstract
Compilation and Analysis of Accidental FIR Data
Amir Ali Khan, Anil Munday, Rinku Bhoria, Yogesh, Tarun, Khushboo, Preeti
DOI: 10.17148/IARJSET.2022.9629
Abstract: This study emphasises the compilation and analysis of accidental FIR data from the year 2019 to the year 2021 at Murthal Police Station in Sonipat District, collected from the Haryana Police website. An accident is a mishap caused mainly by user irresponsibility, which leads to so many injuries and lives lost. The number of accidents, accident-prone locations, causes of accidents, vehicles responsible for accidents, nature of accidents, etc. was identified within the jurisdiction of the selected police station. 175 accidents occurred during the period from the year 2019 to the year 2021. The main accident-prone location found in the study is Murthal Chowk. Overspeeding was the primary cause of 166 of the 175 accidents reported in the FIR. It was found that the nature of many accidents is the head-on collision type. Out of 175, 73 accidents were of the fatal type and 79 were of the grievous type.
Keywords: Accidental FIR; Accident-prone location; Overspeeding; Fatal accident; Cause of accident
Abstract
Harnessing Geothermal Energy As Alternative Source of Energy
Omojogberun, Y.V., Oigbochie, D., Onibon,G. L.
DOI: 10.17148/IARJSET.2022.9630
Abstract: Global warming and environmental degradation is a major problem facing our planet. The burning of fossil fuels emits a large amount of carbon dioxide into the atmosphere. The greenhouse gases emitted into the atmosphere causes depletion in the ozone layer resulting in global warming. There are various sources of alternative energy; these include Solar Power, Nuclear Power, Hydroelectric Energy, Wave Energy, Biofuels, Natural Gas, Geothermal Power, Wind Energy, Biomass Energy, Tidal Energy. Geothermal energy is the energy contained in the interior of the earth crust and is enormous among the various renewable energy sources. Geothermal energy is known to be one of the clean energy without smoke and adverse environmental hazard; it stands a major distinction among others due to its availability regardless of the time of the day. Most developed countries have started harnessing geothermal energy as alternative source of energy for heating buildings, direct use and electricity generation. The United State has the highest global electricity generation from geothermal energy making up to about 28% of the global geothermal energy generation. Geothermal Energy made up about one third of the national generation for countries like Philippine and Iceland while Kenya has geothermal electricity generation of about half of its national electricity generation. Inspite of its advantage, geothermal energy has its disadvantages as well but could not be compared to the use of fossil fuel and other alternative source of energy.
Keywords: Geothermal Energy, Alternative Energy, Renewable Energy, Electricity generation
Abstract
IoT-Based Wireless Power Transfer for Charging Electric Vehicle
Rohini Thankam A, Sahana R, Saima Farheen, Syeda Roshni Ahmed
DOI: 10.17148/IARJSET.2022.9631
Abstract: In the current scenario, we are facing issues due to the rising prices of fuel hence encouraging the use of electrical vehicles. A very small portion of the population is willing to buy an electric vehicle, among this population, few are hesitant due to the lack of charging infrastructure. Even though there are charging stations people need to spend most of their time waiting for charging their vehicles. A wireless power transfer system offers an efficient and flexible means for charging electric vehicles. Hence, we have come up with the idea of implementing a wireless charging system for an electric vehicle. Wireless power transfer is achieved through inductive coupling between the transmitter and receiver coil. The transmitter coils are induced underneath the road and the receiver coils are installed in the electric vehicles. This project can open up new possibilities for wireless charging that can be used in our day-to-day life.
Keywords: Electric Vehicle, Wireless Power Transfer, Coils, Arduino UNO.
Abstract
Study of Modified Evaporative Desert Cooler For its Performance Optimization
Bhavana C. Bhambarkar, Abhik V. Shambharkar, Ankit R. Ukey, Ravi P. Nagbhide, Prof. M. Nematuallah Nasim
DOI: 10.17148/IARJSET.2022.9632
Abstract: Evaporative cooling is a very common form of cooling buildings for thermal comfort, since it is relatively cheap and requires less energy than many other forms of cooling. However evaporative cooling requires an abundant water source as an evaporate, and is only efficient when the relative humidity is low, restricting its effective use to dry climates. Traditionally, evaporative cooler pads consist of excelsior (wood wool) inside containment net. Padding media plays a large part in cooling efficiency and water consumption. Our paper aims to review the recent developments of concerning evaporative cooling technologies that could provide sufficient cooling and comfort using a pad material inside mesh net in terms of cooling efficiency, water consumption and air velocity. The purpose of this paper is to make an evaporative desert cooler more efficient and maintenance free, by making wood wool pad slide. They are assembled in such a manner that it can slide through u-channel and the top portion is duct which can also be placed or removed easily.
Keywords: Evaporative Cooler, Human comforter, Modified Desert Cooler
Abstract
Mitigating unbalanced classes using CycleGAN
Mathias Russel Rudolf Richard, Dr. R. Savitha
DOI: 10.17148/IARJSET.2022.9633
Keywords: Generative Adversarial Networks, CycleGANs, Unbalanced distribution of classes, Deep learning, Synthesis
Abstract
WORLD OF SERVERS IN AMAZON WEB SERVICES (AWS) CLOUD
R Bharath, Dr. R Savitha
DOI: 10.17148/IARJSET.2022.9634
Abstract: Cloud computing is one of the trending technologies in the 21st century. Cloud computing has adapted all the upcoming changes for their sustainability. A decade before in 2006 Amazon web services stepped in the market with Elastic Compute Cloud (EC2) service having a vision to rent the infrastructure for software applications. The application data has to be securely stored using elastic Block storage. Each EC2 instance resembles an independent computing machine. AWS offers these services based on a pay-per-use model. There exists a huge performance difference among on-premises instances and the EC2. The outcome of synopsis is to improve the performance of the EC2 and volume through various techniques such as Monitor Memory Consumption at the OS Level, Selecting the Right Storage and Instance Types, replace a degraded EBS Volume and Manually Kill Leaking Processes.
Keywords: Elastic compute cloud, performance EC2 detection and avoidance
Abstract
Fabrication and Characterization of Plant Fiber Composite Material: A Review
Vaibhav Mishra, Narendra Kumar Patel
DOI: 10.17148/IARJSET.2022.9635
Abstract: In general, the aim of the present review was to look into the effects of composite fabrication attributes like fabrication method, reinforcing fibre orientation, fibre type, matrix phase type, and volume fraction of reinforcing phase on the tensile properties of composites used in aerospace, military, civil construction, and automotive applications. Furthermore, the authors made every effort to make this research a reputable source in the field of mechanical properties of composites in the future. Recent research has showed that epoxy resin is an excellent choice for the fabrication of large polymeric composites because to its exceptional tensile, compression, and resistance to corrosion. The purpose of this work is to provide a complete assessment of modern research on the influence of manufacturing variables on composite tensile durability.
Keywords: Hand Layup, Resin Transfer Molding, Injection Molding, Tensile Strength, Matrix etc.
Abstract
Touchless Interaction for Smart Devices for Better Accessibility
Sahana J, Dr. S.S. Nagamuthu Krishnan
DOI: 10.17148/IARJSET.2022.9636
Abstract: Before the presentation of Touchless Screen there was Touch screen innovation which toward the beginning made an incredible furore. The Touch screen empowers the client to relate straightforwardly with what is shown, instead of utilizing some other middle of the road gadget. Yet, it has a few negative marks like screen might get ruined. Likewise, the normal contacting to a Touch screen show with a pointing gadget, for example, a finger or pointer can bring about trudging de-refinement of Touch screen to include and can finally prompt accident of the Touch screen. To keep away from these issues, a plain UI is produced for Touchless run of electrically worked gear. Elliptic Labs imaginative innovation have created contraption like Computers, MP3 players or cell phones without contacting them. divergent different frameworks which rely upon the hold to sensor or sensor decision, this framework relies upon pass or finger developments, a hand display in a firm way, or a flick of the stock in one region, or point with one finger for example as indicated by client's movement. This new innovation that can transform practically any screen into a touchless touchscreen is called Glamos . It identifies movement and conveys a message to the gadget telling it how to respond. The client doesn't have to contact the actual gadget, yet all things being equal, the client contacts the air inside a 180-degree region. Utilizing a blend of sensor innovation and man-made brainpower, it predicts the client's projected objective and chooses it before the client contacts it.
Keywords: Computer, sensors, galmos, IOT, brainPower,gadget, Elliptic Labs
Abstract
Plant Disease Detection Using Pre-trained Models
Ritisha D, Dr. S.S. Nagamuthu Krishnan
DOI: 10.17148/IARJSET.2022.9637
Abstract: In India the major percentage, around 70% of the population relies on agriculture. In order to produce a healthy yield, the identification of the plant diseases is important. The diseases that affect plants cannot be manually observed by the farmers. It's a troublesome and a very time-consuming process for them to detect the plant diseases manually. Hence, image processing and machine learning models can be used to detect the plant diseases at an early stage. Plant disease detection majorly relies on the image classification concept of machine learning. The benefit of using transfer learning is the model being used has a pre-build knowledge on which the model starts from different patterns. These patterns been learnt while training on a different dataset used for a different problem which is similar to the problem being solved using the same model. Automatic recognition and classification of various diseases of a specific crop are necessary for accurate identification. This study mainly concentrates on the transfer learning phenomenon based on four different pre-trained models such as VGG-16, ResNet-34, ResNet-50, and ResNet-50 v2 and then compared the four models based on various standard evaluation metrics such as accuracy, recall and precision. The dataset considered for the study includes the various diseased and healthy leaves of different plants and crops such as Apple, Corn, Pepper, Potato, and Tomato, etc. The goal is to study and recognize the best and most efficient method that can be used to detect the diseases in the crops. Various methodologies with their corresponding accuracies along with a detailed comparison, discussion of the features, input parameters and experimental setup will be discussed. The comparative study of the pre-trained models in terms of their performance will be carried out.
Keywords: Deep learning, Transfer learning, Pre-trained models, Image classification
Abstract
Vehicle Dynamics of 4 stroke petrol engine off-road race car
Vedaanth B, Shamanth M R, Chethan M, Mr. Mohan V
DOI: 10.17148/IARJSET.2022.9638
Abstract: This report tries to summarize the steps taken in finalizing the dynamics of the car in a nutshell. The requirements of suspension systems, steering, gear box, engine, transmission is considered here. The objective of our team was to satisfy these functions while meeting the Mega ATV Championship's rules and regulations with special considerations given to safety of the occupant, ease of manufacturing, cost, weight and overall aesthetics and performance.
Keywords: Suspension systems, steering, gear box, engine, transmission
Abstract
Blood Cancer Detection Using Machine Learning
Akash Holker, Naveena Hegde, Rakesh M P, Yallalinga, Sushmitha M
DOI: 10.17148/IARJSET.2022.9639
Abstract: Leukemia (blood cancer) begins in the bone marrow and causes the formation of a large number of abnormal cells. The most common types of leukemia known are Acute lymphoblastic leukemia (ALL), Acute myeloid leukemia (AML), Chronic lymphocytic leukemia (CLL) and Chronic myeloid leukemia (CML). This project makes an effort to devise a methodology for the detection of Leukemia using image processing techniques, thus automating the detection process. Our project consist of development of a machine learning algorithm to detect cancer using microscopy image.
Keywords: Machine Learning, Blood Cancer, Leukemia, Image Processing, CNN Architecture
Abstract
The Study of Shear and Flexural Behavior of RC Beam Retrofitted With GFRP
Prasad C. Shinde, U. S. Ansari2, Y. B. Gawande
DOI: 10.17148/IARJSET.2022.9640
Abstract: RCC structural members are retrofitted to restore the strength of aged structural concrete elements and prevent additional concrete distress. During their service lives beams can deteriorate due to poor construction, environmental influences, causing a reduction in the beam's strength. As a result, strengthening the weakened Beam is essential for its proper performance, and GFRP wrapping has been demonstrated to provide acceptable strengthening in prior studies. In this study, experiment is carried out on M25 grade concrete beams. Total 6 beams were casted of Standard size (200mm x 250mm) and 2.3 m in length in two groups which were Group A and Group B. In both the groups A and B there were 3 beams in each group. In group A, beams were casted flexure weak intentionally out of which 1 was control specimens and 2 beams of M25 concrete were wrapped with GFRP. Similarly In group B, beams were casted shear weak intentionally out of which 1 was control specimens and 2 beams of M25 concrete were wrapped with GFRP. Flexural and shear testing of beams was done on Universal Testing Machine (UTM) after 28 days of curing. At the time of Casting of beams the 6 no of cubes of M 25 Grade of standard size (150mm x 150mm x 150mm) were casted and tested under Compressive Strength Testing Machine after 7 days and 28 days of curing period. After testing of cubes, the results were extracted for Compressive Strength of cubes of 7 and 28 days and plotted on graph. After testing of both groups beams the results were extracted like deflection, failure modes, ultimate load carrying capacity and Compressive Strength and results were tabulated and plotted on graph. According to the results obtained conclusion was concluded.
Keywords: Glass fiber reinforced polymer (GFRP) sheets, Shear Strength, Flexural Strength, Strengthening.
Abstract
ANALYSIS & DESIGN OF CANTILEVER RATAINING WALL
Prof. Khamkar Uday B., Prof . Bukka R.S., Patil Vaishnvi R., Joshi Vaishnvi D., Nakka Sanskruti S
DOI: 10.17148/IARJSET.2022.9641
Abstract: Structures which are used to hold back a soil mass are called retaining structures. Our project is to design retaining wall for a minor bridge. As the metro Road project is running through Latur Almala Roadway, there is a need for the extension of 4 lane carriage way to 6 lane carriage way. But the carriage way includes a minor bridge, which too has to be extended for facilitating the traffic flow. Thus, this project focuses on the design of retaining wall for the modified section of the minor bridge. Retaining walls are the structures designed to restrain soil to unnatural slopes. They are used to bound soils between two different elevations in areas of terrain possessing undesirable slopes. They are also used in areas where the landscape needs to be shaped severely and engineered for more specific purposes like hillside farming or roadway overpasses. They are also used in bridge abutments and wing walls. The design of structures like retaining wall requires the knowledge of the earth pressure acting on the back of the wall because of the soil backfill in contact with it. Hence relation between the earth pressure on the retaining wall and strains within a backfill is a prerequisite. The project also includes the estimation of safe bearing capacity of soil and its properties, earth pressure calculations and design criteria of a modified section of a retaining wall. The design criteria includes: check for stability against sliding, overturning and bearing capacity.
Abstract
Study of Floating Column Considered as Gravity Column for various Plan and Story Configuration
Harshkumar H. Parmar, Dr. Darshana R. Bhatt, Dr. Vinubhai R. Patel
DOI: 10.17148/IARJSET.2022.9642
Abstract: Now a day's the multi-storey buildings are constructed for the purpose of residential, commercial, industrial etc., with an open ground storey is becoming a common feature. The most important application of floating column is for the construction of soft storey in the ground floor to facilitate free space for parking or entrance corridors. This free space will provide parking option for residential, industrial and commercial buildings. In banquet halls, lobbies, conference room, large interrupted column free space is required for free movement of people and vehicles. For the purpose of parking all, usually the ground storey is kept free without any constructions, except the columns which transfer the building weight to the ground. For a hotel or commercial building, where the lower floors contain banquet halls, conference rooms, lobbies, show rooms or parking areas, large interrupted space required for the movement of people or vehicles. Closely spaced columns based on the layout of upper floors are not desirable in the lower floors. So, to avoid that problem floating column concept has come into existence. With the advancement in construction materials and design technologies and the context of substantial urban growth, tall structures are increasing day by day, the cost of land also increases. Hence, it was the best idea to expand vertically. The design of the tall structure is highly conservative because tall structures are susceptible to seismic forces. In this study, it is checking the behavior of floating column considering as gravity column type. Objective of paper was to avoid seismic effect on floating column by provide shear wall at core and at corner of the building, by provide very less stiffness modifiers for floating column, by providing pin joint at each end of floating column, and as per IS13920:2016, clause 11 additional moment applying on floating column by R times displacement for factored seismic load. The study reveals that the by providing pin joint on each end of floating column are the efficient and good result to avoid moment due to seismic load.
Keywords: Shear Wall, Floating Columns, Seismic Load, Pin joint, Stiffness modifier ETABS-2018.
Abstract
Alkaline Activation of Geopolymer Concrete Using Sodium Silicate and Sodium Hydroxide Solution
Rohan N. Patil, Prof. Yogesh Gawande, Prof. Kasliwal S. S
DOI: 10.17148/IARJSET.2022.9643
Abstract: With the growing need for construction materials, Portland cement manufacturing increases year after year. The global production of Portland cement is increasing by 3% every year. As a result, the amount of carbon dioxide released into the atmosphere during the manufacture of Portland cement is increasing. The manufacture of Portland cement emits roughly 1.35 billion tonnes of greenhouse gases each year, accounting for about 7% of overall greenhouse gas emissions. Furthermore, after aluminium and steel, Portland cement is one of the most energy-intensive construction materials. Cement, fine aggregate, coarse aggregate, and water are all used for concrete. Concrete is the world's second most consumed substance, behind water, due to its importance in the building of infrastructure. Because concrete is such a versatile material that it may be used for a wide range of applications in a variety of environments, regular concrete may not provide the desired quality, performance, or durability. By substituting concrete with suitable pozzalonic material, it is also possible to minimise construction costs and improve concrete performance without losing its original features. This article examines the use of ground granulated blast furnace slag in place of cement (GGBS). The main objective of this study is to investigate the strength and durability parameters of geopolymer concrete for concentration of NaOH in terms of molarity (M). for each mix sizes of cubes, were casted and tested. For strength at the age of 4,8,12,18,24 hours and for durability at the age of 30 days.
Keywords: Granulated blast furnace slag (GGBS, Molarity (M).
Abstract
Finger Vein Detection Using Deep Learning
B.Sujtha, Vellaturi Sai Teja, V.Bala Sai Krishna, Kancharla Sudhakar, Veturi Tarun Kumar
DOI: 10.17148/IARJSET.2022.9644
Abstract: This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an International Journal. The authors must follow the instructions given in the document for the papers to be published. You can use this document as both an instruction set and as a template into which you can type your own text.
Keywords: Include at least 4 keywords or phrases.
Abstract
Handwritten Character Recognition Using Convolutional Neural Network
Dr. Roopashree H R, Nisarga C J, Poorvi P S, Roopa N, Sahana H K
DOI: 10.17148/IARJSET.2022.9645
Abstract: Handwritten character recognition has been one of the active and challenging research areas in the field of image processing and pattern recognition. It has numerous advantages such as reading aid for bank cheques, recognizing character from form applications etc. An attempt is made to recognize handwritten characters for English alphabets using CNN. FKI dataset which consists of English alphabets are made use of to train the neural network. FKI balanced dataset consist of 131,600 images of characters and 47 classes. The feature extraction technique is obtained by normalizing the pixel values. Pixel values will range from 0 to 255 which represents the intensity of each pixel in the image and they are normalized to represent value between 0 and 1. Convolutional neural network is used as a classifier which trains the FKI dataset. The work is extended by adding some more dataset to FKI dataset of characters from English language and training the model. The prediction for the given input image is obtained from the trained classifier.
Keywords: CNN, Handwritten Characters, Feature extraction
Abstract
A REVIEW ON WEAR THEORY
Udayashankar.E, Dr.N.Nandakumar, Dr.S.Periyasamy
DOI: 10.17148/IARJSET.2022.9646
Abstract: Tribology is the study of friction, wear and the lubrication of interacting surfaces. Wear is a progressive loss of material from the mating surfaces of a pair of bodies in relative motion. It is one of the critical tribological domains and a persistent phenomenon regarding the deformation, damage and removal of material at contact surfaces, wear greatly affects the lifetime of mechanical components. Wear is very important as it causes damage to working parts and loss of mechanical efficiency.
Keywords: Tribology, Friction and Wear.
Abstract
VOLUNTEER DATA MANAGEMENT USING FLASK and SQLITE DATABASE
Anand V, A M Shivaram,Theeba Karthikeyan
DOI: 10.17148/IARJSET.2022.9647
Abstract: This paper is aimed at why volunteer management system can be done using Flask and SQLite, that can be used in an NGO or any Organisation. This system offers different features to the volunteers who have separate logins to access. This system is developed to maintain volunteer details and facilitate easy access to information to every member who are associated with this system. For this the volunteers must register with the system and the data is maintained in a database which is inserted using some software as an application. This paper reviews why flask framework is a good for this system and how SQLite can be used as database for this system. This paper also reviews the performances of this framework and database and defines why it can used for storing the volunteer's data.
Keywords: volunteer, flask, SQLite, database
Abstract
A REVIEW ON ADDITION OF NANOPARTICLE ON BIODIESEL
Amith Kumar B, Dheeraj H Tandel, Mohammad Suhaib, Mahesh S Chikkurmath, KV Suresh, Sudheer
DOI: 10.17148/IARJSET.2022.9648
Abstract: The widespread use and rising demand for fossil fuels has delayed the problem beyond its depletion price, and as a result has stimulated a move to tackle the problem with more environmentally friendly and less polluting gasoline for diesel. The use of nanoparticles in liquid gasoline (both diesel and biodiesel) has shown promising and difficult. Using biodiesel as gasoline reduces overall engine performance and increases NOx emissions. The addition of metal nanoparticles and metal oxides to diesel / biodiesel improved overall engine performance and reduced hydrocarbon, carbon monoxide, carbon dioxide and NOx emissions. In this paper, an accurate description of the paint finish achieved with the help of unique researchers, and the benefits, problems, and fateful situations of using nanoparticles as an additive in diesel / biodiesel engines.
Keywords: Conventional fuel, biodiesel, Cashew nut oil, Honge, substitute fuel, diesel engine, blend, transesterification.
Abstract
DESIGN AND FABRICATION OF SOLAR COOKER
Megharaj Kencharaddi, Ronson A C, Charan D B, Gaurav C S, Hemanth Suvarna
DOI: 10.17148/IARJSET.2022.9649
Abstract: The sun's energy is truly strong. Sunlight based energy is sustainable and it's free. We can utilize it to make power, to warm structures and to cook. The field of cooking consumes numerous non-renewable energy sources like gas and wood. Million individuals can't track down sufficient gas or potentially wood to cook, so utilizing sun-based cookers is really smart. During this work, we planned, fabricated and concentrated on an illustrative sunlight-based cooker. The trademark conditions and the trial results are given [1]. In this paper, a careful audit of the accessible writing on sun-based cookers is introduced. The survey is acted in a topical manner to permit a simpler correlation, conversation and assessment of the discoveries got by analysts, particularly on boundaries influencing the exhibition of sun-based cookers. The survey covers a noteworthy outline of sun-based cooking innovation, point by point depiction of different sorts of sun-oriented cookers, calculation boundaries influencing execution of sun-based cookers, for example, sponsor mirrors, coating, safeguard plate, cooking pots, heat stockpiling materials and protection. In addition, thermodynamic appraisal of sun-oriented cooking frameworks and subjective assessment of warm result presented by sun powered cookers are investigated exhaustively. Complex plans of sun powered cookers/broilers with and without heat stockpiling material are represented and moreover potential techniques to have the option to improve the power results of sun-oriented cooking frameworks are introduced. Practicality investigation, natural effects and future capability of sun powered cookers are likewise thought to be in the review [2].
Abstract
A Review on Various Machine Learning Approaches for Fingerprint Based Health Information Exchange
Vanajakshi S, Hemalatha D, Chethana C, Bharathi R, Kavana M D,Manasvi J Maasthi
DOI: 10.17148/IARJSET.2022.9650
Abstract: The personal health records (PHR) is created for personal health information and it provides easy access to a wide range patients, consumers, practitioners and healthcare providers. However, improved accessibility of PHR threatening confidentiality, privacy, and personalized health information security. The concept of biometrics is currently used for healthcare provider's technology to prevent unauthorized access to the individual health data. We are implementing a biometric mechanism which will protect your PHR and makes it easier to control access, Safe exchange of health information. In this article, we have looked at different machine learning approaches to exchange patient information and different biometric identification techniques that provide reliable user authentication to ensure that only authorized persons can access patient health data. In addition, biometric systems can also facilitate remote access to healthcare data by using biometric features as an authentication tool. This paper summarizes the studies conducted on fingerprint matching techniques, their recognition methods and performance analysis. 0.1% to 0.01% way FAR(false acceptance rate),FP(finger print) can be classified as spiral, straight ring, arc, tent arch etc. To ensure the performance of finger print recognition, advanced algorithms are required to improve the clarity of the input fingerprint image.
Keywords: Fingerprint (FP), Biometrics, Security and Privacy, Patient health information (PHI), Electronic Health (ehealth).
Abstract
Automatic Detectors for Bikers with No Helmet using Deep Learning
Mrs. Asha Rani M, Preethu K R, Punya U M, Ranjana M S, Reshma J
DOI: 10.17148/IARJSET.2022.9651
Abstract: The success of digital image pattern recognition and feature extraction using a Convolutional Neural Network (CNN) or Deep Learning was recently acknowledged over the years. Researchers have applied these techniques to many problems including traffic offense detection in video surveillance, especially for the motorcycle riders who are not wearing a helmet. Several models of CNN were used to solve these kinds of problem but mostly required the image pre-processing step for extracting the Region of Interest (ROI) area in the image before applying CNN to classify helmet. In this project, we proposed to apply another interesting method of deep learning called Single Shot MultiBox Detector (SSD) into helmet detection problem. This method is the state-of-the-art that is able to use only one single CNN network to detect the bounding box area of motorcycle and rider and then classify that wearing or not wearing a helmet at the same time. The results of the experiment were surprisingly good. the person who are not wearing helmet are detected and stored in the excel sheet and the mail is sent to them.
Keywords: CNN,Helmet Detection, Sending Mail
Abstract
DNA Data Storage
Hanumantha Reddy, Prof. Prashanth K
DOI: 10.17148/IARJSET.2022.9652
Abstract: Data is stored in DNA. To enable random access to the data, a delimiter is utilised at the end of each file in this system. Use of a specialised Huffman tree will be used to encrypt the data. If necessary, it is possible to encode each file separately using a Huffman tree, which will both strengthen data security and compress the data. Any data fault that occurs while encoding is exclusive to that particular file. Data compression is accomplished via encoding with the Huffman tree. Since no one can decode it without the original tree, it offers security. There is a lot of specialised equipment required for DNA strand sequencing. DNA cannot therefore be read without the necessary tools. DNA contains a maximum of 2 nucleotide repetitions, excluding delimiters. It is possible to keep data for a considerable amount of time since DNA can preserve info for many years. This method allows for the packing of data and the provision of data security. Users can read many files simultaneously thanks to the possibility of parallel file reading. This method keeps two copies of the data. Consequently, its copy can be utilised to read data in the event of data damage. With minimal computational cost, this method can be utilised to store large amounts of data in a very tiny amount of space. This approach is scalable and works well for storing massive files. Additionally, making many copies is simple. Information can be kept in large data or archive systems using this technique.
Keywords: Digital data, data storage, encoding, synthesis, retrieval, decoding, and sequencing
Abstract
Personality-Aware Product Recommendation System Based on User Interests Mining and Meta path Discovery
Harish G, Sandarsh Gowda M M
DOI: 10.17148/IARJSET.2022.9653
Abstract: Any modern online retail or social networking platform includes a recommendation mechanism. As an example of outdated recommendation systems, the product recommendation system has two key flaws: recom-mendation redundancy and unpredictability when it comes to new things (cold start). These limitations arise be-cause traditional recommendation systems rely solely on the user's previous purchasing activity to make new item recommendations. Incorporating the user's social characteristics, such as personality traits and topical inter-ests, could help ease the cold start and eliminate redundant recommendations. As a result, we provide Meta-Interest, a personality-aware product recommendation system based on user interest mining and metapath identi-fication, in this article. Even if the user's history does not contain these or similar items, Meta-Interest predicts the user's interest and the objects linked with these interests. This is accomplished by evaluating the user's subject interests and, as a result, proposing goods related to those interests. In two ways, the proposed system is personal-ity-aware: it uses the user's personality features to forecast his or her themes of interest and to link the user's per-sonality facets to the associated items. Recent recommendation methods, such as deep-learning-based recom-mendation systems and session-based recommendation systems, were compared to the suggested system. The proposed strategy can improve the precision and recall of the recommendation system, especially in cold-start circumstances, according to experimental data. Big-five model, personality computing, product recommendation, recommendation system, social networks, so-cial computing, user interest mining, and user modelling are all terms that can be used to describe the Big-five model.
Abstract
A Patient-Oriented Environment for Biomedical Engineering Applications using Big-Data and C means Clustering
Shivananda G C, Sandarsh Gowda M M
DOI: 10.17148/IARJSET.2022.9654
Abstract: Massive amounts of data and machine learning have recently altered medical care research. Information derived from Electronic Health Records and the many other clinical sources that can be used to the assist different patients. It is also possible to predict the outcomes or effects of pharmaceutical, as well as the risk of infection on the human body, by using Big Data Analytics (BDA) on medical data. To investigate medical care data, a few AI algorithms, such as bunching and categorization, are used. In this paper, a structure for Biomedical Engineering applications is proposed using C-implies Clustering. The structure can also be used benefit professionals and patients. For example, a Clinician can use this paradigm to decide whether or not to provide suitable medication to a certain patient. The information for this structure was taken from the UCI AI repository. The data was subsequently analysed using Hadoop, a well-known large-scale data processing technology.
Keywords: Big Data, Hadoop, Machine Learning, , C-Implies, ID3, MapReduce
Abstract
Bird Species Identiï¬cation for Large Number of Species : Exploratory Survey
Indhuja N, Dr. T. Vijaya Kumar, Mr. Raghavendra Guligare
DOI: 10.17148/IARJSET.2022.9655
Abstract: The revised detection of bird species from their acoustic melody serves as the foundation for such a essay. It is essential to observe wildlife in order to carry out two or three tasks, including evaluating the viability of this dwelling situation or identifying potential threats to aeroplanes posed by avians close to airports. We manage the identification of bird species issue using a signal dealing with and AI systems. Strengths are dispensed with from the avian produced melody using special sound treatments, and then an older AI circumstance handles the problem, where a named data set of recently acknowledged bird tunes are utilized to seek after a choice way of thinking that is utilized to foresee the sorts of another bird tune. Test is conducted on a collection of bird songs that have been acquired and appear in a certain location. The exploratory outcomes look at the show got in various circumstances, enveloping the full areas of strength for scale, as kept in the field, and short sound fragments (beats) got from the signs by a split procedure. These method evaluates the degree to which classifications (bird species) affect classification accuracies.
Keywords: AI, project accreditation, signal management, and identifying bird species
Abstract
Dual access control in cloud computing
Gayathri S Karamadi, Prof. A.G Vishwanath, Raghavendra Guligere
DOI: 10.17148/IARJSET.2022.9656
Abstract: A major innovation is being developed in distributed computing. Everybody in the world has a lot of trouble storing information. Distributed computing is an excellent solution for storing and retrieving data in the most straightforward and quickest way possible. In distributed computing, security is the top priority. In an effort to show another approach for giving distributed computing had admission control in this paper. In distributed computing, this architecture provides secured admittance control. It adopts a progressive construction and use a timer to offer more precise access control. Using this technique, we may effortlessly send, download, and delete documents to and from the cloud.
Keywords: Access Control, Cloud Computing, and Cloud Privacy.
Abstract
DEVELOPMENT OF CROSS-PLATFORM ONLINE FOOD ORDERING MOBILE APPLICATION
Tejas Gowda K.C, Dr. T Vijay Kumar
DOI: 10.17148/IARJSET.2022.9657
Abstract: The proposed system is a cross platform online food ordering system which allows user to order food from various restaurants in preferred location. Customers don't have to wait for hours in queue and travel miles when they can get desired food from the desired restaurant in door steps. It can be achieved through this mobile app. This app is built using react-native which is compatible for both iOS and android. This app provides list of restaurants or cafes for every location. User needs to search for their preferred location and can order food from their preferred restaurant or cafe. Different icons for different types of restaurants are displayed to distinguish between restaurants, cafes, lounges. Restaurants status whether it is currently running or is it closed is also made visible to customer. Favorite section has built to allow users to add their favorite restaurants or cafe to this section which helps customers search their restaurant at ease when visit back to the app. Users can also search restaurants from maps. All the restaurant and location data are collected through google maps API
Keywords: Food ordering, mobile app, iOS, android, Cross platform.
Abstract
Helmet and Number Plate Recognition and Detection
Tanusha M, Prof M S Sowmya
DOI: 10.17148/IARJSET.2022.9658
Abstract: In the current conditions as we all know that death rate by road accidents are increased more and to control that government has made wearing helmet is necessary for two wheelers for this rule who are not up with this they are recognized and punished , not in every situation traffic police can handle this because of some issues and from irresponsibility it may fail. Currently traffic police man are facing problem and risky to handle all the consequence. Hence this condition has given a break through. People who are not wearing helmet they are easily detected and captured in camera automatically by the computer organization and hence it recognize the vehicle and then it will notice and saves the number plate image and hence the saved data is sent to the certain officers to get details and also for the further actions. It is mainly built with advance technologies with varies consequences that may deals with. YOLOv3 is used to provide best visualizing effects for the image. Non-helmet riders are recognized
Keywords: Helmet detection, Number plate recognize, Deep Learning, Traffic rules
Abstract
A FRAMEWORK for TOURISM RECOMMENDER SYSTEM BASED on BIG DATA and AI
Bharath Sharma, Seema Nagaraj
DOI: 10.17148/IARJSET.2022.9659
Abstract: The development of vacationer information has increased at all levels (lodgings, restaurants, transportation, legacy, vacationer events, exercises, and so on) with the advancement of the Internet, innovation, and communication methods, specifically the advancement of (OTA) Online Travel Agencies. However, the possible outcomes presented to visitors by the web-crawlers (or even specific vacationer destinations) can be both overwhelming, and pertinent outcomes are frequently buried in enlightened "commotion," that delays, or at the very least slows down, the decision-making process. Some recommender frameworks have been designed to assist travellers in tour planning and in finding the info they are looking for. In this post, we provide an overview of the various proposal methodologies used in the travel business. In light of a half-and-half suggestion strategy, an engineering and theoretical structure for the travel industry recommender framework is given based on this review. The suggested framework goes beyond simply recommending a list of vacation places based on tourist preferences. It might be considered as an outing planner who creates a specific itinerary for a given visit period, incorporating a variety of travel industry materials. To advance the travel sector specifically in the Daraa - Tafilalet region of Morocco, a clear goal is to construct a recommendation framework based on massive data advancements, artificial knowledge and functional evaluation.
Keywords: recommender frameworks; content-based filtering; client profiling; cooperative filtering; mixture recommendation framework; the travel industry; trip arranging.
Abstract
Multi-Owner Sharing Secure Data with Groups and Conditional Distribution using Cloud Computing
Karunakara, Dr. T Vijaya Kumar, Mr. Raghavendra Guligare
DOI: 10.17148/IARJSET.2022.9660
Abstract: The fast improvement of Internet innovation and informal communities has brought about a high amount of remark texts being created on the Internet. In the period of large information, computerized reasoning advances can be utilized to mine the profound propensities of remarks for a more quickly information on network popular assessment. Feeling investigation is a computerized reasoning strategy, and its review is exceptionally valuable for deciding the opinion pattern of remarks. The message characterization task is at the core of opinion investigation, and different words contribute distinctively to arrangement. Most of contemporary feeling examination research utilizes dispersed word portrayal. Disseminated word portrayal, then again, exclusively examinations the semantic data of a word and overlooks the opinion data. The commitment of opinion data to the exemplary TF-IDF method is coordinated into this paper's proposed superior word portrayal approach, which creates weighted word vectors. The weighted word vectors are sent into BiLSTM (Bidirectional Long Short term Memory) to effectively gather setting data and better portray remark vectors. A feedforward brain network classifier is utilized to decide the opinion of the remark. The proposed feeling investigation approach is contrasted with RNN, CNN, LSTM, and NB opinion examination techniques under the indistinguishable circumstances.
Keywords: Cloud computing, project accreditation and secure data sharing
Abstract
“Leveraging Affective Hashtags for Ranking Music Recommendations”
Meghana C M, A M Shivaram
DOI: 10.17148/IARJSET.2022.9661
Abstract: When it comes to selecting melodic tunes to listen to, mindset and feelings play a big role. Feeling is seen as logical data that is difficult to catch yet profoundly powerful in the field of music data recovery and suggestion. In this article, we examine the relationship between customers' near-home states and their melodic choices. Using an unaided opinion word reference strategy, we eliminate full of emotion relevant data from hashtags present in these tweets. To discover idle element depictions of clients, tracks, and hashtags, we employ a cutting-edge network inserting strategy. A set of eight positioning techniques is provided based on both emotional data and idle factors. We discovered that relying on a placement approach that considers catching a client's overall melodic inclinations well includes combining the inactive depictions of clients and tracks (paying little heed to utilised hashtags or full of feeling data). Nonetheless, we find that positioning techniques that rely on emotional data and influence hashtags as setting data outperform other positioning systems when it comes to catching certain inclinations (a more complicated and individual positioning task). File Terms: Emotion in music, feeling guideline, opinion location, positioning, music proposal, microblogging, hashtags
Abstract
ICT Based College Feedback System
Akash Suryavanshi, Shubham Tingare, Rohit Todkar, Dr. Arjun Nichal
DOI: 10.17148/IARJSET.2022.9662
Abstract: Nowadays, educational Institutions are paying increasing attention to the views of Student's on the involvement in learning and teaching through reviews or feedbacks. "ICT Based College Feedback System" is a web application which provides an easy way for the colleges to conduct student's, their parents, etc Feedback online. The goal of the study was to develop an all in one feedback system serving college feedback. The system comprises analysis of college and a delivery of feedback. The system is developed for the all college students, Students parents, staff members, etc to give a feedback about college through emoji's. The users has to choose from excellent (😍) very good( ) good(😊)satisfactory(😌), poor(😓). Then after attempting feedback emoji for the college then user has to submit his feedback with the system. This online college feedback system is the perfect place to find feedback evaluated according to the
Keywords: Ict Based,Feedback ,System, Project Educational,,Login,,Database
Abstract
Realistic Multiple-watchword Ranked Search Provides Entry Control Over Encoded Cloud Data
Sharadhi S, Suma N R
DOI: 10.17148/IARJSET.2022.9663
Abstract: As the unsteady advancement of volume of data in the dispersed processing domain, owner of the data are logically arranged to save their information on the cloud. Disregarding the way that data revaluating decreases assessment and cost of storage, it most certainly raises security and insurance stresses, as the owners with sensitive information no longer have full authority over it. However, by far the majority of the flow situated watchword search strategies generally pay attention to improving seek capacity or convenience, but it doesn't seem to be doing formal security evaluation and effective entry restriction at the same time. To overcome such obstacles, here we presume an effective and security saving Multiple-watchword Ranked Search plot with Fine-grained permission control(MRSF). Moreover, it truly enhances clients' chase praises by making use of induction methodology based on polynomials. According to standard safety evaluation, the guarantee of records and tokens, as well as revalued information, preserve the secrecy of MRSF. Expansive examinations further show that, MRSF outperforms earlier systems in terms of functionality and pursue accuracy.
Keywords: Cloud registering, positioned watchword search, protection saving, access control, secure k-Nearest Neighbour
Abstract
Effects Of Glass Fibre On Concrete
Prof. Shital Patage, Hirnawale Bharat, Makasare Shivon, Katle Prashant, Ghute Damini
DOI: 10.17148/IARJSET.2022.9664
Abstract: This project was carried out to understand the effects of glass fibre on concrete. Glass fibres are available at cheaper cost in market. Glass fibre was added as an admixture to know its effects on concrete. To increase the life of structure, Glass Fibre reinforced concrete can be used. It is often known as GFRC. Various percentage of glass fibres were added in concrete and the results were compared with Plain Cement Concrete to understand the Effects of glass fibre on concrete. Concrete beams were casted and allowed to cure for 28 days. The result showed that addition of 1% of glass fire increased the flexural strength of concrete, there were minimal or no changes noted in workability of concrete. On further addition of 2% of glass fibre, although the strength of concrete increased significantly but the workability of concrete decreased. It became very difficult to handle thee concrete and carry out tamping process.
Keywords: Glass fibre, Effects, Flexural strength, Analysis
Abstract
DATA MINING: HISTORY APPLICATIONS AND CHALLENGES
MADHUSHREE. D. S, Vidya. S
DOI: 10.17148/IARJSET.2022.9665
Abstract: The Universe is made up of different kinds of data. The different types of data include Bigdata, Structured data, Unstructured data, Timestamp data Machine data, Open data, Dark data, Real time data and other forms of data. Analysis, Classifying and Summarizing all these kinds of data by humans is not possible due to the large increase of data in the present stage.This research paper provides the information regarding analysis of big data, Data Mining and Data Mugging, Challenges involved in Data Mining and Research issues regarding the Data Mining
Keywords: Data, Data Mining, Machine Learning, Artificial Intelligence.
Abstract
Development of Machine Learning Model for Diseases Prediction with an EMR Tool
Ranjitha Kulkarni, Prof. Seema Nagaraj
DOI: 10.17148/IARJSET.2022.9666
Abstract: Machine learning is gradually becoming more prevalent in the realm of medical diagnostics. Designing a Disease Prediction Model with the help of rapid development Application in the field of medical science with using machine Learning, would be helpful for the Doctor to predict and diagnose the diseases at the initial stage to take the necessary precautions. This Prediction is possible with the use of Machine learning techniques, libraries, Statistics and the EMR tool. The Calculation of the Prediction is carried out by implementing various Supervised Machine Learning Algorithms like Decision Tree, Random Forest and KNN. A large set of data can be processed in this system for improvising the accuracy level of Prediction. The data are split. An EMR tool records the data of the patients. The trained dataset were made to compare with test cases. To avoid multicollinearity, a feature has to be extracted and a Statistical Analysis must be carried out. We produce an accuracy level of 90% through this model. It can only predict whether the patient is effected or not and a precautionary steps to be taken. The Predicted results are sent to the patient's Mail ID. The Data are plotted by making us of confusion Matrix with a Binary data Labels i.e., Quantity Analysis.
Keywords: EMR, Disease Prediction, DT, RF, KNN.
Abstract
Hybrid cloud approach and implement the Architecture for network security and storage
Basavaraju M N, M S Sowmya
DOI: 10.17148/IARJSET.2022.9667
Abstract: Operating data centers where entirely different software systems are assembled with massive amounts of growing data to provide information to the system's user is the main focus of hybrid cloud computing. The methods used in hybrid cloud security may be based on key-base security algorithms that are primarily constrained by authentication and authorization methods as in wired and wireless networks, and they may be designed around the secret writing and secret of data. According to the definition given in the intended security model, security analysis shows that our theme is secure. Risks associated with public clouds include those related to data security and privacy, as well as others (such as availability, merchant lock-in, cost, or interoperability). An obvious but not straightforward solution to those issues is the use of both private and public delivery models while integrating them to create a hybrid cloud. Today, cloud computing is one amongst the progressively well-liked technology wherever the client will use the resources of the cloud services supplier to perform their tasks and solely pay money for the resources they use.
Keywords: Cloud Security, Secure Networking, Confidentiality, Hybrid Cloud.
Abstract
Security Aspects of Different Technologies Intended for Different Techniques
Arpita B, A G Vishvanath
DOI: 10.17148/IARJSET.2022.9668
Abstract: Cybersecurity and Cryptography are the current era for giving the safety for personal facts, Security and Privacy are essential elements. The foremost motive of this paper is to fashion and put in force excessive protection machine. Security can be a high challenge in our every day life. Perhaps the most crucial utility of correct non-public identity is securing confined get admission to structures from malicious attacks. Access machine paperwork, a vast hyperlink in a total protection chain. This technology listen approximately protection, privacy, facts, integrity and authentication. Authentication is to allow get admission to manage best for legal quit customers performs a crucial function in carrier company reliability, confidence, and records protection, etc. User authentication is a crucial protection process. Encryption is the crucial element in cryptography, we use AES (Advanced Encryption Standard) & DES (Data Encryption Standard) Algorithms that is used to provide the safety for information. We permit ourselves to growth the overall performance of this set of rules through minimizing the time required for the cryptographic process. Security structures are the pressure of the day, which facilitates to keep away from robbery and avoids unauthorized access of peoples into constrained area.
Keywords: Cybersecurity, Cryptography, Single Sign On, Encryption, AES, DES.
Abstract
Searching for Keywords Using Multiple Authorities and Encrypted Cloud Data
Rachana S, Prof. Sowmya M S
DOI: 10.17148/IARJSET.2022.9669
Abstract: Accessible encryption is a critical strategy for ensuring data safety and security accessibility at the same moment in the cloud (SE). Attribute of Policy Oriented Keyword Search in Cipher text (CP-ABKS) approach achieves catchphrase based recovery & Policy on Cipher Text to offer fine-grained access control, attribute-based encryption is utilised, in the same way (CP-ABE).Nevertheless, the delivery of mystery keys and expensive client certificate verification are placed in the hands of the one characteristic expert in the current CP-ABKS designs. In distributed cloud frameworks, As a result, there is a single point of performance bottleneck. In order to overcome these restrictions and reduce the computation and capacity issues on asset restricted devices in cloud frameworks, we provide in this study a secured Multi authority CP-ABKS (MABKS) framework. The MABKS framework is also expanded to aid in monitoring and updating malicious property authorities' standards. According to our expanded security study, the MABKS model is especially secure in network node and asset models. Our findings from exploratory analysis on real-world datasets indicate the MABKS framework's effectiveness and utility in actual applications.
Keywords: Multi-authority, specific grid model, specific trait model, searchable encryption, characteristic-based encryption.
Abstract
“Publicly Verifiable Shared Dynamic Electronic Health Record Using Cloud Computing”
Sushma P, Thanuja J C
DOI: 10.17148/IARJSET.2022.9670
Abstract: "Electronic health record (EHR)" is one of the systems that gathers patients' mechanized prospering data and then offers it with the other clinical benefits providers in the cloud. Since the EHR contains a ton of immense and tricky data about patients, it is standard that the improvement ensures response rightness and cut off uprightness. Meanwhile, with the move of IoT, more low performance terminals are sent for getting and moving patient data to the server, what accumulates the computational and correspondence weight of the EHR structure. The verifiable database outline (VDB), where a client re-appropriates his huge data base to a cloud server and sets presumptions once he truly needs unambiguous data, is proposed as a possible updatable scattered dealing with model for resource obliged clients. To in addition enable cut-off, most existing VDB plans use explanation reuse and show vitalizing strategy to show precision of the mentioning results. Notwithstanding, it pardons the "reliable" of check age, which achieves an over that the client needs to play out extra cycle (for instance evaluating plans) past what many would consider possible validness, as a matter of fact. In this paper, we propose an obviously certain commonplace updatable EHR illuminating get-together plot that stays aware of safety guarding and gathering uprightness checking with least client correspondence cost. We change the solid reasonable commitment (FC) plot for the VDB plan and make an essential FC under the computational l - BDHE speculation. Besides, the utilization of a capable verifier-close by refusal pack signature plot makes our arrangement support dynamic assembling part exercises, and gives uncommon parts, as obvious quality and non-outline limit.
Keywords: Verifiable database, distributed storage, utilitarian responsibility, protection safeguarding examining, client renouncement
Abstract
SEARCHABLE CRPTOGRAPHY PROTECTION WITH FINE-GRAINED AUTHENTICATION MECHANISM
Sudharani, Swetha C S
DOI: 10.17148/IARJSET.2022.9671
Abstract: Accessible encryption uses a cloud server to allow users to browse over encrypted data without decrypting it. Single watchword-based accessible encryption enables a client to view a subset of records that contain the client's advantage's catchphrase. In this research, we describe a single watchword-based open encryption scheme for applications where distinct information owners send their data and afterwards allow different clients access to the data. The plan uses quality-based encryption to enable clients to access a selected subset of data from the cloud without disclosing their access rights to the cloud server. The plan is shown in the arbitrary prophet model to be adaptively secure against picked watchword attack. We implemented the strategy on a Google cloud example, and the demonstration of the strategy was successful in real applications.
Keywords: Cloud server, Encryption, Decryption, Prophet model.
Abstract
EXPERIMENTAL STUDY ON PARTIAL REPLACEMENT OF COPPER SLAG AS FINE AGGREGATE IN CONCRETE
Nandeesh P, Dr. Y.M. Manjunath
DOI: 10.17148/IARJSET.2022.9672
+91-7667918914 iarjset@gmail.com 0 Items International Advanced Research Journal in Science, Engineering and Technology A Monthly Peer-Reviewed Multidisciplinary Journal ISSN Online 2393-8021 ISSN Print 2394-1588 Since 2014 Home About About IARJSET Aims and Scope Editorial Board Editorial Policies Publication Ethics Publication Policies Indexing and Abstracting Citation Index License Information Authors How can I publish my paper? Instructions to Authors Benefits to Authors Why Publish in IARJSET Call for Papers Check my Paper status Publication Fee Details Publication Fee Mode FAQs Author Testimonials Reviewers Topics Peer Review Current Issue & Archives Indexing FAQ’s Contact Select Page “IARJSET aligns to the suggestive parameters by the latest University Grants Commission (UGC) for peer-reviewed journals, committed to promoting research excellence, ethical publishing practices, and a global scholarly impact.” Call for Papers Rapid Publication 24/7 April 2026 Submission: eMail paper now Notification: Immediate Publication: Immediately with eCertificates Frequency: Monthly Downloads Paper Format Copyright Form Submit to iarjset@gmail.com or editor@iarjset.com Submit My Paper Author CenterHow can I publish my paper? Publication Fee Why Publish in IARJSET Benefits to Authors Guidelines to Authors FAQs (Frequently Asked Questions) Author Testimonials IARJSET ManagementAims and Scope Call for Papers Editorial Board DOI and Crossref Publication Ethics Editorial Policies Publication Policies Subscription / Librarian Conference Special Issue Info ArchivesCurrent Issue & Archives Conference Special Issue Welcome IARJSET is an advanced research journal that is monthly, peer-reviewed, refereed, and open-access multidisciplinary journal dedicated to publishing high-quality scholarly research across major and related areas of Science, Engineering, Technology, Management and Pharmacy. The journal is supported by reputed international indexing and abstracting services, ensuring global accessibility and visibility of published work. IARJSET invites the submission of original research articles, review papers, survey papers, short communications, case studies, methodologies, monographs, and technical notes that contribute to academic and practical advancements in the field. Submit papers to iarjset@gmail.com or editor@iarjset.com UGC approved journal in year 2017, journal id is 47111 View Why publish in IARJSET ✓ Peer-reviewed & Refereed journal ✓ With UGC parameters & COPE ✓ DOI registration with Crossref ✓ Highest Google Scholar citations ✓ UGC approved 2017 ✓ Free DOI from Crossref ✓ Free eCertificate to each author ✓ Life-time free Open Access ✓ Lower-level article acceptance rate ✓ Strict plagiarism policy ✓ Well-constructed ethics and policies ✓ Scientometrics of our journal makes a high-level reputation ✓ Internationally licensed under Creative Commons CC BY 4.0 More Citations Most Cited Cited . Open Access Statement Open Access is a publishing model that provides immediate, worldwide access to the full text of research articles without requiring a subscription to the journal. Accordingly, readers are allowed to copy, use, distribute and display the work publicly and to make and distribute derivative works, in any digital medium for any responsible purpose, subject to proper attribution of authorship. In this model, the publication costs are usually covered by the author's institution or research funds. These Open Access charges replace subscription charges and allow the publishers to make the published material freely available to all interested online readers. At the same time, authors who publish in Open Access journals retain the copyright of their article. Search for: +91-7667918914 Peer-reviewed Impact Factor 8.311 Copyright © 2026 IARJSET This work is licensed under a Creative Commons Attribution 4.0 International License. Open chat
Abstract
Identification of Cyber Harassment on Internet Community Using Machine Learning
Karthik T V, A M Shivaram, Raghavendra Guligare
DOI: 10.17148/IARJSET.2022.9673
Abstract: Due to the expansion of the Internet, the usage of web-based enjoyment has grown dramatically over time and is currently the dominant organising platform of the twenty-first century, surpassing conventional media. However, the increased social accessibility frequently has bad repercussions on society that combine two or three awful traits, such as online abuse, inciting cyberbullying, cybercrime, and web-based savaging. Cyberbullying frequently has negative consequences, particularly for girls and kids. in severe emotional suffering, which may still prompt suicidal thoughts. Online haranguing stands out because of the profound negative impact it has on society. Online harassment has recently resulted in a number of things, including the dissemination of sexual comments, rumours, and private chats. Analysts are thus paying closer attention to the identification of abusive SMS or messages from video streaming. The goal of this project is to combine natural language processing and machine intelligence to design and implement a practical strategy for identifying harmful and harassing online postings. Bag-of-Words (Bow) and word recurrence reverse text recurrence are two unique characteristics that are used to assess the correctness of four different AI systems (TFIDF).
Keywords: Cyber-Harassing, Natural Language Processing, Machine Learning and social media.
Abstract
Open CV Methods for Detecting License Plates
Raghunandan Shastry K N, Sharath K
DOI: 10.17148/IARJSET.2022.9674
Abstract: With the popularity of automobiles and the improvement of computer vision recognition technology, smart tag discovery has evolved into an important part of smart traffic management. The license plate location is used to segment the vehicle image and collect the tag region for the follow-up recognition system to screen. It is commonly used by executives in canny rush hour jams, car video monitoring, and other sectors. Two tag discovery strategies are considered in this paper: one uses Sobel edge identification and the other uses morphological angle detection. Two tag location strategies are implemented using OpenCV and Visual Studio 2012 under the Windows framework, and the two calculations are thoroughly investigated from the standpoint of tag identification accuracy. These techniques have high efficacy and intuitiveness, which serve as a reminder for later tag recognition. Intelligent Transportation System, License Plate Detection, Edge Detection, and Morphological Gradient Detection are some of the catchphrases.
Abstract
A Road Accident Prediction Model Based on Machine Learning
Sneha K R, Madhu H K
DOI: 10.17148/IARJSET.2022.9675
Abstract: The steadily growing volume of traffic on the roads, the number of frequent accidents is increasing at an alarming rate. Given the massive volume of traffic incidents and recent fatalities that occur these days, the ability to predict the number of car crashes beyond a specified time period is essential for the infrastructure organizations to make well-informed suggestions. In this situation, breaking out accident frequency might be useful for coming up with preventive interventions. Despite the fact that vulnerability is a hallmark of the majority of mishaps, there is a degree of routine that can be found when noticing mistakes occurring in a single area over an undefined time period and vehicles in light of the evaluations got.
Keywords: Accident expectation, Data mining, Apriorism calculation, Mining restrictions, classification
Abstract
A Fog-centric Secure Cloud Storage Scheme
Vaishnavi Y N, Sharath K
DOI: 10.17148/IARJSET.2022.9676
Abstract: Distributed computing is currently being used as an imminent option for catering stockpiling administration. Distributed storage security concerns could block its widespread use. Digital threats against distributed storage are emerging, including security breach, malicious manipulation, and information disaster. Recently, a three-layer system with a murkiness server has been proposed for secure boundary employing various fogs. To achieve the goal, Hash-Solomon coding and retried hash estimate are crucial strategies. In any case, it was able to lose more little amounts of data to cloud servers while failing to offer improved data recovery and modification acknowledgment. This study recommends a clever uncertainty driven secure distributed hoarding technique to safeguard data against unauthorised access, modification, and destruction. The recommended plot employs a different type of data concealment called Xor Combination in order to prevent absurd induction. Additionally, Block Management repurposes the effects of Xor Combination to prevent harmful recovery and to ensure improved recoverability in the event of data loss. In the meanwhile, we suggest a methodology that takes hash estimation into account in order to more reliably operate with change acknowledgment. We demonstrate the viability of the suggested scheme through security analysis.. Trial results approve execution matchless quality of the proposed plot contrasted with contemporary arrangements as far as information handling time.
Keywords: Cloud stockpiling, haze server, Xor-Combination, CRH, protection
Abstract
DISEASE PREDICTION IN BETEL NUT USING CNN
Mithunkumar S Nayak, N Rajeshwari
DOI: 10.17148/IARJSET.2022.9677
Abstract: Several diseases have a detrimental influence on the productivity of betel nut crops, which are exacerbated when there is continuous rainfall and high relative humidity. A variety of machine learning-based visual data analysis technologies are currently being employed to look for indicators of the disease. This research presented here is the prediction model and to create a new dataset. This research presented here is about prediction model for predicting disease in betel nut using CNN model. In this we will be discussing about how we can use CNN model for predicting the disease in betel which will help the farmer to decide which type medication need to be applied for that palm tree to reduce that disease at early stage.
Keywords: Machine learning, CNN model, Betel nut diseases
Abstract
Rainfall Rate Prediction based on Machine Learning
Sachin Patil, Rajeshwari N
DOI: 10.17148/IARJSET.2022.9678
Abstract: In this article, we offer a version of a synthetic neural network-based method for predicting the rate of rainfall 30 seconds in advance. one can use the rainfall rate to calculate the suitable washout adversary-level, such as a virtual inflection plan in advance, to keep the bit error rate (BER) at internal link optimal tiers and enable steady understanding drift at the connection throughout a rain event. This research uses a sample reputation a method that considers past rainfall trends over Durban (29.8587°S, 31.0218°E).When given three nearby historical rain rates , It is observed that the associated prediction model can estimate a rain price for the near future. When errors are evaluated using the root mean square (RMSE) method on the outcomes of our prediction model, it is clear that the resulting errors are within acceptable ranges for specific rain events under exceptional rainfall regimes.
Abstract
Encrypted Data Storage vs Data Against Unauthorized Access
Nagesh R, Sowmya M S
DOI: 10.17148/IARJSET.2022.9679
Abstract: In the past, cloud computing offered a wide range of services and various advantages. The term "the cloud" refers to a method of storing large amounts of data online. There are also concerns about privacy and security when it comes to cloud computing. When providing critical information to third parties, the best way to minimise the effect of these concerns is to do so in an encrypted manner. Encrypted storage protects data from unauthorised access, but also complicates routine procedures that are nevertheless critical to carry out in order to keep the data safe from unauthorised access. When conducting online research, keywords are an essential part of the process. Based on how many keywords you require, you can put anywhere from two to five.
Keywords: Cloud, Security, Encryption, Privacy, Keywords.
Abstract
Designing the E-library management system
Rashmi, Thanuja J C
DOI: 10.17148/IARJSET.2022.9680
Abstract: It is the goal of the library's management system to create a computerised system that can handle all of the library's everyday operations. User login is one of the functions that can't be found in most library management systems. n. The admin may keep tabs on the whole system using the admin login feature. After login onto their account, students may check what books they've borrowed and when they've returned them, as well as fill out a form to request the library to add additional books. The librarian may monitor the status of book issuance, return, and new book additions after login into his account, which is the administrator account. Ultimately, our paper is designed to assist students and library staff alike manage the library in the most efficient manner possible, while simultaneously reducing the amount of human labour required.
Keywords: E-library, website, admin, student, books.
Abstract
ONLINE AUDITIONS IS BETTER THAN OFFLINE AUDITIONS
ONLINE AUDITIONS IS BETTER THAN OFFLINE AUDITIONS
DOI: 10.17148/IARJSET.2022.9681
Abstract: In present days most of the TV serials, Dance competition programs, Singing Competition Programs will be telecasted to increase their respective channel TRP's. In today's Reality shows are really hitting up the mark and it has also been become a great business. People are more interested in reality shows and also in the new talented people who star in dance, singing, dramas competitions etc. Hence this encourages the talent search programs in various parts and places. So, people travel miles just to give an audition for these kinds of programs. These programs could be a breaking point in someone's life and also can change their life forever. But there are situations when the people with real pure talent are missed out, in other words, people may lose their valuable opportunity. More over most of the people complaint about the means of transports. So, with these problems in hand most of the rural people lose their chance which could change their lives. So, by providing such chances through online can not only can we change people's life but we could also help them to peruse their Dream goals and ambitions. So, we decided to help and support such people who cannot participate in a live audition which might be held in a further distance from the Contestant. We gathered up information from various of people who missed several Audition and we found out similar reasons from the Contestants. Some of the Reasons was Transport problems, Stage Fear, lack of lodging facilities also some were nervous seeing the vast number of Contestants in the Trails. And nowadays people are scared to come outside due to pandemic situation like covid and for auditions people come from different places, so we can't do offline auditions like these situations
Keywords: Auditions, contestants, online, Offline.
Abstract
CUSTOMIZED TRAVEL RECOMMENDATION SYSTEM DEVELOPMENT WITH RECENCY EFFECTS
Lavayna B.S, Sowmya M.S
DOI: 10.17148/IARJSET.2022.9682
Abstract: An online entertainment activity-based movement suggestion framework offers a personalized setting necessary to satiate client wants and preferences. In general, long-term modifications have an impact on the client's propensity to voice travel complaints. In this work, we assessed Twitter data from clients together with their friends and followers in an understandable way to determine ongoing interest in travel. Tweets about travel are recognized by an AI classifier. The customized journey recommendations are then created using the movement tweets. Our suggested model, in contrast to the majority of customized recommendation frameworks, incorporates time-sensitive regency weight to account for a client's most recent interest. With a general accuracy of 75.23 percent, our suggested model fared better than the current personalized point of interest suggestion model.
Keywords: travel proposal; time awareness; influence of recent events; customization; and online entertainment
Abstract
ATTRIBUTE-BASED STORAGE FACILITATES SECURE INFORMATION DEDUPLICATION IN THE CLOUD
Anusha H C, Sandarsh Gowda M M
DOI: 10.17148/IARJSET.2022.9683
Abstract: Quality-embedded computing is a method of widely used where distributed computing a supplier of information rethinks storing encrypted data in the cloud specialist co-op may provide information to clients who meet specific conditions. However, default architecture not compatible with secure deduplication, not compatible using a safe deduplication process in a, this is necessary for getting rid of copies of identical data to free up space and organise data transport capacity. In this study, we provide a framework for quality-based stockpiling using safe reduction in a cloud mixed environment, where copy recognition handled by a private cloud, while capacity is handled by a public cloud. Our framework has two advantages over the existing information deduplication frameworks. Our framework benefits from two things. By choosing access strategies rather than disclosing decoding keys, it may be used to exchange information with clients in a private manner. Additionally, it achieves semantic security for information confidentiality, whereas other frameworks only do so by outlining a less-secure security concept.
Keywords: Attribute-Based, Storage, Secure Information, Cloud data.
Abstract
Analysing and Detecting Money-Laundering Accounts in Online Social Networks
Punya R, A M Shivaram
DOI: 10.17148/IARJSET.2022.9684
Abstract: Virtual cash in OSNs assumes an undeniably significant part facilitating financial activities include paid gambling, currency exchange, and online purchasing. Clients typically use real money to purchase virtual currency. This reality encourages attackers to use a variety of ways to obtain virtual money dishonestly for free or very cheaply, or illegally, and then to launder the accumulated virtual money for outrageous gain. In addition to causing victims to suffer significant financial losses, such actions damage the biological system's reasonability. Identification of vengeful OSN accounts that take part in washing virtual money is hence of utmost importance. In order to do this, we primarily focus on how people act the light of activity data acquired from Tencent QQ, one of the biggest OSNs on the planet, of both malicious and innocent records. After that, we create multi-layered highlights that depict accounts from the perspectives of account feasibility accounts are connected geographically and through exchange successions. Last but not least, we propose a location approach that combines these elements with a factual classifier and achieves a high discovery pace of 94.2 percent at a remarkably low false positive pace of 0.97 percent.
Abstract
A Small Convolutional Neural Network for Detecting Real-Time Facial Expressions
Bhavana M P, Prof. K. Sharath
DOI: 10.17148/IARJSET.2022.9685
Abstract: In this paper, our team suggests and creates a convolutional neural network (CNN) that is lightweight and can distinguish between face expressions of emotion gradually and in mass to achieve a superior classification impact. We can determine the success of our model by developing a consistent vision framework. This framework uses multiple task flowed to finish face localization and pass the gathered face directions to the facial feelings categorization model that we previously created. neural networks (MTCNN). The feeling classification assignment is then completed. Flowed convolutional networks have an outpouring recognition include, one of which can be used alone, reducing the control of memory assets. Global Average Pooling is used to replace the fully related layer in the conventional deep convolution neural network model. The entirely related layer's discovery abilities are somewhat reduced because the feature map's channels are connected to the appropriate class. Simultaneously, the remaining modules and depth-wise separate convolutions are combined in our model removing massive amounts the model's boundaries and compressing it. Then, using the FER-2013 dataset, we run our model. The task of characterizing looks can be completed with just 0.496GB, or 3.1% of the 16GB memory. Our model has a 67 percent precision on the FER-2013 dataset and fits in an 872.9 kilobyte file. On non-dataset figures, it also has significant discovery and recognition effects.
Keywords: Emotion recognition, lightweight CNN, consistency, and articulation recognition Presentation
Abstract
“Chronic Kidney Disease Stage Identification in HIV Infected Patients using Machine Learning”
Tejaswini JB, Vidya S
DOI: 10.17148/IARJSET.2022.9686
Abstract: Persevering Chronic Kidney Disease persistent Kidney Disease is quite possibly of the most widely recognized clinical issue, with a high harshness and deadness rate. Because there is no side effects in the first stages of chronic Kidney Disease, patient frequently give out to analyse the illness. Patient with HIV are more likely to develop CKD in their basic situation. First detection of CKD assists patients in obtaining brief consideration while also delaying the development of illness. With the obtainability of pathology information, the utilize of AI methods in medical care for order and sickness prediction has enhance more familiar. This paper discusses the categorization of CKD using AI representation. The CKD stages are also determined formed on the glomerular filtration rate in patients who have been diagnosed with CKD. In grouping CKD patients with HIV, the DNN model outperforms with the vast majority of precision.
Keywords: CKD stage identification; chronic kidney infection; support vector machine; machine learning, and KNN.
Abstract
Identifying Psychological Disorders in Online Platforms Using Intense Patterns - Anorexia and Depressive Case Studies
Lakshmi M,A G Vishwanath
DOI: 10.17148/IARJSET.2022.9687
Abstract: Mental diseases that impact reasoning and behaviour affect a large number of people worldwide. It is challenging but essential to correctly identify these problems since doing so may improve the possibilities of offering patients support before their condition deteriorates. Monitoring a person's show their own online, including what they write and how,or maybe more significantly, what emotions they convey In their correspondences for virtual entertainment,is one technique to do this. In this research, examine computational two models which seek to exemplify the existence and variety of experiences mentioned by internet entertainment users.We employed two continuous public informational collections for anorexia nervosa and depression, two serious mental diseases.The findings imply that important information on users of social media who are depressed or anorexic individuals highlighted due to the existence of variation of feelings recorded by the suggested representation.Additionally, combining both representations can benefit the display. because it matches the best detailed the screen. method for sadness and is barely 1%less entertaining for anorexia. Additionally, these representations offer the chance to enhance the results' interpretability.
Abstract
Fake Review Detection on Yelp Dataset
Suraj Venkatesh Shetty, Vidya S
DOI: 10.17148/IARJSET.2022.9689
Abstract: Customer reviews are crucially significant in today's modern era. It is preferable for a consumer to interpret good or service or store reviews before having to decide that which and where to purchase. Consumers may well be misled into purchasing low-quality items given the prevalence of spam feedback/reviews, while satisfactory businesses may very well be defamed by fraudulent feedback. Unlike, say, advertisements, online consumer reviews contain experiences from actual people. It thus has a tremendous influence on the level of customers as well as indirectly on firms. Concerningly, these monetary inducements have produced a market for spammers to generate evaluations in order to falsely boost or criticize firms, practices known as opinion spam. To solve this issue, we discover that the usual reviewers' arrival pattern is consistent and generally indifferent to their ranking patterns. In contrary, spam operations are typically brief and associated with the ranking either favorably or unfavorably. Hence, we advise using abnormally correlated temporal variations to spot such threats. In order to view and exploit such associations, we identify and create multivariate data set based on aggregate data
Abstract
Accountable Proxy Re-Encryption for Secure Data Sharing
Karthik Raja M, K Sharath
DOI: 10.17148/IARJSET.2022.9690
Abstract: Intermediate proxy re-encryption gives a good answer for encoded information taking part in a public cloud. At the point when information proprietor Eve will impart her encoded information to information customer Tom, Eve produces a re-encryption key and transfers it to the cloud (intermediary). An intermediary uses it to convert Eve's cipher texts into Tom's without learning anything about the underlying plain texts. In spite of that current PRE plans can keep the intermediary from recovering Eve's mystery key by agreement assaults with Tom, because of the innate usefulness of PRE, it is unavoidable that the intermediary and Tom together are skilled to acquire and disperse Eve's unscrambling abilities. Much more terrible, the malignant intermediary can reject that it has released the unscrambling capacities and has almost no gamble of getting found out. To handle this issue, we present the idea of Accountable Proxy Re-Encryption (APRE), by which on the off chance that the intermediary is denounced to mishandle the re-encryption key for disseminating Eve's unscrambling capacity, an adjudicator calculation can conclude regardless of whether it is guiltless. Having presented a non-intuitive APRE plot, we are now able to demonstrate the security and responsibility of the CPA under the DBDH supposition. Lastly, we describe the ways it can be made into a CCA secure version.
Keywords: Proxy re-encryption, cryptography, information security
Abstract
Managing Big Data with Information HDFS and Evolutionary Clustering
Manaswi DN, Dr.T Vijaya Kumar,Mr. Raghavendra Guligare
DOI: 10.17148/IARJSET.2022.9691
Abstract: The increased use of Internet-of-Things (IoT) and digitally enabled systems led to a significant amount of information with varied structures. The majority of large-scale data structures rely mostly use Hdfs environmental and make used of its communicated document mechanism (HDFS). In any case, when handling the current information, contemplates have demonstrated shortcomings in such frameworks. Although some research was able to resolve overcome issues across particular kinds of schematic information, there are multiple types of information available now. According to academics, such productivity problems have a significant impact, resulting in larger server farm space requirements, wasteful use of resources (such as labour), and economic issues (that is increased fossil energy by products) [1]. I suggest a module for the Environmental Data -framework it is knowledge conscious. We also provide a widely used encoding method for genetic algorithms. Our organisational design enables Hadoop to handle information transmission and arrangement related to collective Assessment for relevant information. They can capable of handling the wide span from informational information formats, just has we are with upgraded question time and asset use. We conducted our research using several datasets produced by LUBM. Clustering tactics, distributed computing, information management, optimization, and scalability are some of the terms on the list
Abstract
Heart Disease Prediction System, Machine Learning Techniques
Prajwal G Ugrani, A M Shivaram
DOI: 10.17148/IARJSET.2022.9692
Abstract: Heart disease has become a major cause of death in this era. Heart disease claims the lives of about one person every minute. Because of the rapid rise of information technology, data is produced and must be reserved on a regular basis. Heart is considered to be the most important part of our body after the brain. Data analysis and machine learning are used to convert the obtained data into knowledge using a variety of techniques. Medical practitioners who are specialized in this field of heart diseases have some of their own limits, they cannot accurately predict the probability of developing heart diseases. The main goal of the research is to improve accuracy of the heart problems forecasting using the Logistic Regression model of the machine learning taking into consideration the health dataset which further classifies the patients if they have heart problems or not.
Abstract
Using CNN for Detecting Melanoma Disease
Rashmi K S, Prof. Seema Nagaraj
DOI: 10.17148/IARJSET.2022.9693
Abstract: Malignant skin development is a usual occurrence of cancer. Melanoma, which is also a brutal type of skin cancer, is the most fatal type of epidermis illness, which accounts to 76 percent of deaths caused by skin cancer, even though the occurrence of this cancer is not so common . The most efficient strategy to fight this is to try to figure it out in the earlier stage and medicate the disease with minimal medical procedure. In this study, I specifically focus on skin cancer and make use of more advanced, larger, and greater purpose of CNN which improve the execution. In light of these assumptions, I suggest developing a computerised skin cancer recognisation model based on the analysis of skin damage images using EfficientNet - B6, which records finer details of the cancer. The trial results on the ISIC 2020 Challenge Dataset, which was established by the ISIC and include images from a few key clinical sources, revealed cutting-edge order execution when compared to previous prominent on the equivalent dataset of melanoma classifiers.
Keywords: Malignant Skincancer, Melanoma, CNN, EfficientNet-B6.
Abstract
Crypt-DAC: Cloud-Based Cryptographically Enforced Dynamic Access Control
Achyuth T S, Dr.T Vijaya Kumar,Mr. Raghavendra Guligare
DOI: 10.17148/IARJSET.2022.9694
Abstract: Empowering Content supported within the unsecured internet usually subject by entrance restrictions that are applied algorithmically. appealing for some clients and associations. Notwithstanding, planning effective cryptographically authorized powerful Considered throughout the present article, they suggest Vault, an paradigm for dynamically password protection which offers as workable cryptography application. Death Dap rejects accessing authorizations through directing service server should update encrypted data. With Vault, any paper gets encrypted using mixed reduction with cryptographic cryptography that includes the content secret with the collection comprising lines are drawn secrets. In every denial, a devoted director transfers another disavowal ways are put forth by Tomb Asc that enforce security length each keys depletion for encrypting stages. Vault then uses adaptive permissions whereby gives effectiveness, as it doesn't need costly decoding/encryption and transferring/re-transferring of huge information Protection being prioritised there from do so since this swiftly retracts authentication and authorization. Utilizing formalisation structure and framework execution to exhibit the security and productivity of our development. File
Keywords: Computing, authentication and authorization disavowal
Abstract
Advanced banking transaction using secured key generation
Vaibhavalaxmi S Hebsur, Thanuja J C
DOI: 10.17148/IARJSET.2022.9695
Abstract: Empowering Content supported within the unsecured internet usually subject by entrance restrictions that are applied algorithmically. appealing for some clients and associations. Notwithstanding, planning effective cryptographically authorized powerful Considered throughout the present article, they suggest Vault, an paradigm for dynamically password protection which offers as workable cryptography application. Death Dap rejects accessing authorizations through directing service server should update encrypted data. With Vault, any paper gets encrypted using mixed reduction with cryptographic cryptography that includes the content secret with the collection comprising lines are drawn secrets. In every denial, a devoted director transfers another disavowal ways are put forth by Tomb Asc that enforce security length each keys depletion for encrypting stages. Vault then uses adaptive permissions whereby gives effectiveness, as it doesn't need costly decoding/encryption and transferring/re-transferring of huge information Protection being prioritised there from do so since this swiftly retracts authentication and authorization. Utilizing formalisation structure and framework execution to exhibit the security and productivity of our development.
Keywords: Computing, authentication and authorization disavowal
Abstract
Extension of UNO to support Active/Active implementation of Oracle Database
Anupriya, Swetha C S
DOI: 10.17148/IARJSET.2022.9696
Abstract: The principle concept is to dispose of all of the triggers used within the oracle database in Uno product. Heading off auto era of primary key values whilst inserting or updating with the aid of doing away with all of the dependencies on triggers. A primary key's column or columns that include values that uniquely identify each row in a table. A database table need to have a primary key for to insert, update, restore, or delete statistics from a database. This is either done by a saved PL/sq. block or a PL/square, C, or Java technique associated with a desk, view, schema, or the database itself. Oracle Database mechanically executes a cause while a detailed occasion takes location, which may be inside the shape of a machine occasion or a DML announcement being issued against the desk. Oracle GoldenGate is a era that lets in the oracle database in active-lively mode and calls for applications to observe strict rules for the replication to work smoothly without breaking. UNO platform became changed according to the GoldenGate regulations to assist oracle active-energetic database.
Abstract
Differential Privacy Protects Your Shopping Preferences
Anant Kumar Jha, Sowmya M S
DOI: 10.17148/IARJSET.2022.9697
Abstract: Because of various attacks, online banks might have the option to uncover purchasers' shopping inclinations. Each purchaser can disturb his usage aggregate locally prior to sending it to online banks, because of differentiated protection. However, adopting differential protection in web-based institutions will pose complications because current differential security plans do not include the commotion limit issue. Furthermore, we conduct a top-to-bottom hypothetical examination to show that our plans are capable of meeting the differential security criterion. Finally, in order to determine viability, we put our plans to the test in portable installation testing. The importance of the utilisation sum and the online bank sum has decreased significantly, and the security misfortunes for common data are less than 0.5, according to the trial results.
Keywords: Security for Different Privacy, Noise Limit, Online Banking, and Shopping Choice.
Abstract
Private Outsourced Audition Method for Cloud Based Dynamic Data Storage
Dinakar S, Madhu H K
DOI: 10.17148/IARJSET.2022.9698
Abstract: Distributed storage has generally been acknowledged for retaining large volumes of information as data innovation creates. Users of the cloud can examine the legitimacy of downloaded files via cloud auditing without having to download them from the cloud by using a remote information assessment scheme. Given the significant computing cost incurred by the reviewing system, it is suggested that the client reevaluate the important assessing task to an external examiner (TPA). Distributed storage has generally been acknowledged for sustaining large numbers of data, even though the principal redesigning approach can be challenging for data innovation to keep up with. Cloud users can audit against cloud storage without downloading the data to verify the accuracy of their outsourced files thanks to distant information inspection. Considering the critical computational expense brought about by the evaluating system, re-evaluated inspecting model is proposed to cause client to rethink the weighty reviewing errand to outsider reviewer (TPA). The primary rethought inspection method can defend against a spiteful TPA, but this method allows the TPA direct access to the client's re-evaluated information, which puts user data privacy at risk. The topic of "Focus on Users in Outsourced Auditing" is introduced in this study and emphasises the notion that the user should have control over their data. Without depending on information encryption, our proposed system can prevent users' personal and business information from being divulged to outside parties by using User Focus. Based on security analysis and experimental evaluations, our proposed technique is shown to be both much more effective than the malevolent TPA and to be both demonstrably safe. This strategy demonstrates security while giving TPA's instant access to the client's most recent information. We introduce Focus on the User in Outsourced Auditing in this paper, which places emphasis on the idea that the user can influence their data. The results of the security study and experimental evaluations demonstrate how effective and unquestionably secure our suggested technique is.
Abstract
Training and upskilling has uplifted the Education Standards
Shobit Gupta, Vidya S
DOI: 10.17148/IARJSET.2022.9699
Abstract: Commercial Training is a important stage in a student's lifestyles since it bridges the space between theoretical know-how and practical expertise, allowing students to use the standards which can be wished within the corporate international. It gives college students a platform to position into exercise the lessons they have got learned in magnificence and entails running on actual initiatives with c technology which can be employed in industry. Constructing a expert attitude advantages greatly from business training this is nicely concept out, well done, and assessed. It fosters the notice of the commercial method to difficulty solving, that's based totally on a thorough comprehension of organizational technique and mode of operation. Discipline, abilities, teamwork, and technical information are the targets and using forces at the back of this business schooling. The purpose and concept in the back of this commercial training is to presents, a scholar studying facts technology, with the field, competencies, teamwork, and technical knowledge I want to increase a responsiveness to the self-disciplinary nature of problems in facts and verbal exchange generation.
Abstract
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in the Cloud
Smitha S Bhat, Seema Nagaraj
DOI: 10.17148/IARJSET.2022.96100
Abstract: Through distributed computing, a tremendous volume of information is transmitted as cloud administrations quickly evolve. Despite the fact that distributed computing has used cryptographic procedures to provide information classification, current systems are unable to support security concerns over ciphertext linked to different proprietors, preventing founder from having complete power on whether information propagators can truly spread valuable information. In this research, we suggest a cloud-based method for encrypted communication group sharing and conditional distribution with multiple information owners, where the information If the properties fulfil the entrance schemes in the encrypted message, the owner can securely transmit sensitive information into a group of customers via the cloud, and the content propagator will advance the information to a different category based on user. Researchers also present a truly democratic user access architecture for distributed block cipher, allowing information co-owners to change the ciphertext with new access strategies in accordance with their security preferences. Three approach aggregation solutions are also offered to manage the security conflicting issue brought on by various access arrangements, including full grant, proprietor necessity, and greater portion license. Our solution appears to be useful and capable of safely transferring data to several owners in distributed computing, according to the security analysis and exploratory outcomes.
Abstract
Farming recommendations based only on productivity and season
M Tejaswini, Prof. Usha M
DOI: 10.17148/IARJSET.2022.96101
Abstract: Tamil Nadu, being a coastal state, is vulnerable to agribusiness, which limits its growth. Greater efficiency should be possible with more people and more land, but it is not possible. Ranchers have used word-of-mouth for many years, but due to climate factors, they can no longer use it. Farming aspects and boundaries provide the information needed to learn about Agri-realities. A few aspects in Agriculture Sciences are being driven by the development of the IT world to help ranchers with wonderful horticulture data. In this current circumstance, knowing how to utilise modern mechanical tactics in the sector of agribusiness is appealing. AI techniques help us create a clear model using the data and assist us in making projections. Farming difficulties such as harvest expectations, turn, water requirements, and compost requirements Insurance can also be discussed. Due to the changing climatic factors of the climate, an effective approach to deal with yield development and to assist ranchers and executives in their creation is required. This could help aspiring agriculturalists develop a better agribusiness. With the help of information mining, can be offered to a rancher to assist them in crop development. Crops are advised in light of climatic variables and amount to carry out such a methodology. Information Analytics offers a strategy for extracting useful data from rural data sets. Crop Dataset was studied, and harvests were proposed based on efficiency and season.
Keywords: Recommender System, Machine Learning and Data Science, Knowledge Discovery in Databases, Naive Bayes are all buzzwords these days.
Abstract
AN AUTOMATED APPROACH for DIAGNOSIS of MALARIA DISEASE
Mohan Gowda K, Seema Nagaraj
DOI: 10.17148/IARJSET.2022.96102
Abstract: Malaria [1] is a dangerous disease, infection starts when an infected Anopheles mosquito injects plasmodium parasites into the skin of the human. However, patients who have been diagnosed with malaria can get early medical and clinical therapies to improve their possibility of surviving. Therefore, it's crucial to find malaria early on. In this research, we used a trained Convolutional Neural Network [6] to tackle the issue of detecting malaria through a web application. The thin blood smear image is given as input into the application, which then outputs the blood cell's class, which can be either benign (milder) or malignant (harmful), depending on the image. The model used in the web application had a validation loss of 0.3536 and an accuracy of 0.9588.
Keywords: Malaria, Thin Blood Smear, Web Application, Convolutional Neural Network (CNN).
Abstract
ONLINE BUG TRACKING SYSTEM
Pavan A B, Usha M
DOI: 10.17148/IARJSET.2022.96104
Abstract: A small proportion of the world's most successful software developers use bug tracking. Many, including myself, didn't prioritise bug tracking. Instead, shared lists and email were used to monitor concerns. This process is prone to mistake, thus developers often dismiss problems they deem minor. The industry requires criteria for selecting the best systems tool from the available collection of system tools, which will aid in bug fix reporting and tracking. This system is used to keep track of all the products, bugs, and bug trackings. With this, you may keep track of all of the bugs you've encountered, including their causes and solutions. Collection of relevant data from the enormous and unorganised set of bug reports is still a difficult task, as there are numerous bug tracking systems that supply data via numerous means, such as web-based interfaces.
Keywords: Web Development, BTS, Categories Of Bugs, Error, Java Technology, User interface.
Abstract
Diabetes Prediction Using Machine Learning
Manjunath Ganganagoudar, H K Madhu
DOI: 10.17148/IARJSET.2022.96105
Abstract: Diabetes is an illness caused by high altitude of the glucose in the humans body. Diabetes it should not be disregarded and left untreated. Diabetes can cause serious problems such as Blood Heart , kidney problems, circulatory strain, eye harm, and it will also affect different organs in the humans body. Early prediction helps managesdiabetes. To accomplish this objective, Projectwill apply an assortment of Machine Learning methods to predict and improve the accuracy of earlydiabetes in the human body and patients. Machine learning strategies give improved results to forecast by building model from datasets gathered from patients. In the task, applymachine learning order and group strategies to outdataset to predict diabetes. These are the Decision Tree tool algorithm, Support Vector Machine algorithm, XgBoost Classifier algorithm, and Random Forest algorithm. The accuracy of each model is different from the other models. The work of Project Providesan accurate or more accurate model andshows that the model can effectively predict diabetes. Our results show that Random Forest algorithm achieves great accuracy compared with other machine learning.
Abstract
An efficient file system with Multi-Factor Authentication using Cryptography
Ankith Kumar S K, Dr. Jayasimha S R
DOI: 10.17148/IARJSET.2022.96106
Abstract: This project concerning of both privacy and security for web-based cloud services. As sensitive data could even be stored within the cloud for sharing purpose or convenient access; and eligible users also can access the cloud system for various applications and services. We are implementing two factor authentication for the data and implementing secret key generation for each file and each file has unique secret key so no one can access the data without secret key and moreover we are adding one more module called project manager he will be allow the particular user to access the file so if user holds both the things then only they can access the file. The main objective of the project is that two implementing additional security for the files so no one access the file without admin and project manager acceptance certificate..
Abstract
Know Your Client for Banking System using IPFS and Block Chain
Keerthana P, Usha M
DOI: 10.17148/IARJSET.2022.96107
Abstract: The term "know your client" (KYC) refers to a rule that requires the financial framework to authorize a client based on identity, propriety, and risk assessment before creating a financial relationship. The KYC cycle can be confusing and expensive to complete for a single client, which is a result of the rising security concerns. By combining InterPlanetary File System (IPFS) and blockchain innovation, we offer a cheap, quick, safe, and easy KYC archive check service for banks. According to the proposed technique, using the IPFS organization, a client can create a hash value and share it through the blockchain method after setting up a record at one bank, finishing KYC there, and then releasing the hash using the IPFS organization. By acquiring the IPFS organization's confidential key, the client will be able to get the client's information (i.e., KYC) and securely save it if they choose to have another account with the Bank/monetary association. It is believed that this approach can help save time, money, and tiresome effort during the KYC cycle when a record has to be opened in more than one bank.
Keywords: Decentralization, IPFS, Blockchain, KYC, GPG4WIN and Smart Contact.
Abstract
SECURED DATA ACCESS TO DISTRIBUTED STORAGE USING CLOUD
Bhanuprasad C, M Usha
DOI: 10.17148/IARJSET.2022.96108
Keywords: Ciphertext policy, unauthorised use of access credentials, traceability and revocation, auditing and secure cloud storage
Abstract
Sign Language Detection system using artificial intelligence
Samarth S Naik, Rajeshwari N
DOI: 10.17148/IARJSET.2022.96109
Abstract: The act of communicating or sharing information, knowledge, or emotions is defined as communication. All of the participants must understand and be able to comprehend a common language in order to identify communication between two or more persons. The methods of communication, however, differ in the case of dumb and deaf persons. The inability to hear is referred to as deafness, whereas deafness is the inability to communicate. They interact vocally among themselves and with others, but most people do not believe signing to be vital. Communication between a regular person and someone who is dumb or deaf is difficult since not everyone has linguistic skill or comprehension. One can create the model aided by machine learning to get beyond this obstacle. The model will be taught to recognise and translate various linguistic gestures. Many individuals will benefit from this while engaging and communicating with deaf and dumb persons. The single- and double-handed signs used in these Indian Sign Language Recognition systems are constructed utilizing machine learning methods, they are not, however, real-time. We present a method for building an Indian language dataset using a camera in this study. followed by the training of a TensorFlow model utilizing transfer learning to develop a real-time linguistic communication recognition system. Even with a little dataset, the algorithm manages to attain an honest degree of accuracy.
Abstract
Cowin Vaccine booking using RPA
Vishwanath M Hiremath, Usha M
DOI: 10.17148/IARJSET.2022.96110
Abstract: Robotic process automation (RPA) is a newly developed technology that automates repetitive, rule-based, routine human processes with the goal of providing benefits to the organisations who commit to implementing such software.. We can implement Automation developed through RPA to real-life scenarios. In this paper we are going to discuss how we can implement our Automation for Cowin Vaccine slot booking. The Government of India has started the web portal for Cowin Self registration on Cowin.gov.in portal through this portal covid Vaccine Registration 2022 can do online. The Citizens Can Now Book the Cowin vaccine Slot through the portal or the Cowin Vaccinator app. The Government of India have also provided Cowin API which help developers to work with API and implement all the features to their application.
Abstract
A Comparative Study on Fake Job Post Prediction
Sowmya M, Dr. T Vijay Kumar
DOI: 10.17148/IARJSET.2022.96111
Abstract: Because of advancements in current innovation and social correspondence, publicising new job openings has recently become an exceptionally common issue in today's world. As a result, everyone will be concerned about the fake job posting expectation task. As with other grouping endeavours, counterfeit work presenting forecast brings with it a slew of difficulties. This paper proposed using various information mining methods and characterization calculations, for example, KNN, innocent bayes classifier, multi-facet perceptron, and profound brain organisation, to forecast whether a task post is genuine or fake. We examined the Employment Scam Aegean Dataset (EMSCAD), which contains 18000 examples. As a classifier, the profound brain network excels at this characterization task. For this powerful brain network classifier, we used three thick layers. The prepared classifier predicts a deceptive work post with 98 percent order exactness (DNN). Record Terms - bogus work expectation, profound learning, information mining Terms - bogus work expectation, profound learning, information mining.
Abstract
An Efficient Spam Detection Technique for IOT Devices using Machine Learning
Debasish Nath, M S Sowmya
DOI: 10.17148/IARJSET.2022.96112
Abstract: Connecting objects with sensors and actuators over wired or wireless networks is the goal of the Internet of Things (IoT). The Internet of Things (IoT) is predicted to link more than 25 billion devices by 2020. Data received from these devices will rise tremendously in the years to come. Because of the variability in response time and geographic location, IoT devices generate a large amount of data in a variety of formats. AI calculations may play an important role in ensuring security and approval when biotechnology and IoT frameworks are combined, an unusual finding when working on security and usability. Assailants, on the other hand, frequently use learning calculations to exploit the flaws in cutting-edge IoT frameworks. In this research, we use AI to identify spam in IoT devices, resulting in a better level of security. Machine learning-based IoT spam detection is given in order to accomplish this goal. Using a range of metrics and data sets, five AI models are analysed in this system. On the basis of the revised input highlights, an overall spam score is produced for each model. The reliability of an IoT device is evaluated by this score. A new strategic strategy is given the go-ahead thanks to the REFIT Smart Home dataset. The findings show that the proposed conspiracy is a viable alternative to the existing schemes.
Abstract
Five Advanced Computer Survey Foundations in AI
Ramesh Hanumanthappa Jaggal, Vidya S
DOI: 10.17148/IARJSET.2022.96113
Keywords: Artificial intelligence, resilience, rationalizability, responsibility, realism, reproducibility
Abstract
Transaction transparency using Block chain
Yashaswini BR, Prof. Rajeshwari N
DOI: 10.17148/IARJSET.2022.96114
Abstract: Due to the Covid-19 epidemic, there has been a greater-than-ever rise in entrepreneurship. Even though some of the pandemic-era firms failed due to investor withdrawals that scared the economy since startups are seen as sources of employment development, innovation, and economic robustness. Many e-commerce Businesses emerged and also use online transactions because they are convenient, affordable, and quick. when it comes to raising capital for startups and new businesses have gained preference. The number of bitcoin transactions increased in 2021, indicating that the use of blockchain data platforms for digital asset trading is becoming more widespread. Blockchain technology offers solutions to risks with online cryptocurrency transactions related to decentralized finance, security, money laundering, traceability, scams, and illegal transactions. When combined with blockchain technology, we present a framework that can offer a fix for transaction transparency and safety problems. This project involves a crowdfunding and blockchain-based startup fund-raising application. where investors may follow their investments across different startups. Decentralized, unchangeable, transparent, and traceable are all characteristics of blockchain. distributed database system made up of several independent nodes connected using peer-to-peer technology. It keeps track of all transaction details, has an effective and transparent workflow, and highly secure data.
Abstract
Healthy Nutrition Prediction Based on Blood Test Parameter using Data Mining Technique
Praveen Kumar S, Prof. A G Vishwanath
DOI: 10.17148/IARJSET.2022.96115
Abstract: Healthy eating seems to be a key component of overall mental, physical, and social wellbeing. Diurnal diets provide the body with the vitamins and energy it needs for a healthy metabolism. But when it comes to wholesome eating habits, urban and rural people have extremely different food preferences. In our study, we collected survey data on various human diets, food plan kinds, nutritional intake, nutritional demand, and fitness level with regard to food intake behaviour, as well as many records evaluation methods. A records evaluation technique was applied to build our record after investigating data from numerous authorities and stay surveys. Unusual drinking habits and persistent illness rates are lower than inside a city and better than within a village.Our analysis's major goal was to identify the key differences between a healthy diet and a powerful immune system. These discoveries help people live longer, healthier lives.
Keywords: Blood parameter, Flask, KNN,Navie, manage, database
Abstract
Drug Recommendation System
Spurthi R Mukund, Suma N R
DOI: 10.17148/IARJSET.2022.96117
Abstract: Since Covid created, the shortage of real clinical products, such as licenced doctors and nurses, qualified healthcare workers, genuine hardware and pharmaceuticals, etc., has reached an all-time high. The threat to the the whole brotherhood will result in innumerable deaths. Because of accessibility problems, people began utilising drugs with their own with little or no instruction, which caused more problems than good. Recently, the creative work for computers has increased, and AI has gained importance across many industries. This study aims to provide a framework for medication recommendations that can significantly reduce the workload of doctors. In this study, we create a framework for medical advice that utilises patient audits to anticipate future medicines.
Abstract
Applications of Double General Integral Transform for Solving Boundary Value Problems in Partial Differential Equations
D. P. Patil, Nikhil Raundal
DOI: 10.17148/IARJSET.2022.96118
Abstract: In this paper we use double general integral transform to solve boundary value problems in partial differential equations.
Keywords: Boundary value problems, double general integral transform, Partial Differential Equations.
Abstract
REAL TIME ATTENTION SPAN TRACKING IN ONLINE EDUCATION
Chinthu H A, Nirmala Hiremani
DOI: 10.17148/IARJSET.2022.96120
Abstract: Over the last 10 years, e-learning has changed the way students study by offering them access to high-quality instruction whenever and wherever they need it. However, understudies regularly become preoccupied for a variety of reasons, all of which have a negative impact on their learning ability. Many experts have attempted to improve the nature of online education, but we need a comprehensive solution to this problem. This research aims to present a method that uses a camera feed and a mouthpiece contribution to monitor student's continuing attention levels during online classes. Throughout this review, we look at several photo handling strategies and AI algorithms. We suggest a framework that utilises five specific non-verbal features to calculate the understudy's consideration score throughout computer-based tasks and generate continual input for both the understudies and the association. We can use the generated data as a heuristic value to investigate the general exhibition of understudy as well as the speaker's exhibiting guidelines.
Keywords: Artificial Intelligence, Attention, Blink rate, Drowsiness, Eye look following, Emotion arrangement, Face acknowledgment, Body Posture assessment, Noise recognition.
Abstract
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME
Aravind Ganesh S, Seema Nagaraj
DOI: 10.17148/IARJSET.2022.96121
Abstract: Many data owners outsource their data management to cloud servers for simplicity and lower expenses. Encrypting critical data before outsourcing ensures its privacy. Law requires this. Thus, many data-use tactics, such as keyword-based document retrieval, are antiquated. Our method decrypts cloud-stored data without putting users at risk. This method allows simultaneous adjustments. The system allows document deletion and addition. Vector space models and TF-IDF models help indexing and query creation. Using "Greedy Depth First Search," you may search for terms in our tree-based database. Users may search for multiple keywords in the order they appear in results. Secure kNN encrypts both index and query vectors. Encrypting the index and query vectors allows for accurate relevance scoring. This method encrypts index and query vectors. Phantom words conceal search results and protect the index vector against statistical attacks. This safeguards the index. Our tree-based index structure speeds up searches using the suggested strategy. Quickly removing and inserting files are other benefits. The index's tree-like structure enables this. The proposed approach will be tested thoroughly.
Keywords: Multi Keyword Search, Encrypted, Cloud, Data, Cloud Servers.
Abstract
Tiredness Detection in Real Time Using Eye State Evaluation
Shruti Chigari, T Vijaykumar
DOI: 10.17148/IARJSET.2022.96122
Abstract: According to an earlier year's report on street collisions, the main factor in such fatal street mishaps is a result of careless behavior in addition to the sluggishness of the driver. This problem demonstrates the need for such a framework that can perceive the driver's sluggishness condition and gives the driver a ready signal before any mishaps occur. Thus, in light of the eye squint span, this proposed work has laid out tired recognition as well as a mishap evasion framework. First, the open and closed conditions of the eye are identified in relation to the eye viewpoint proportion (EAR). Furthermore, the flicker span or count is broken down while the progressionseye condition from open to closed.Then, when the flicker span exceeds a specific cut-off point, it recognises the tired condition and sends an alarm message to the driver via the caution. On the yawning dataset, our created framework demonstrated an accuracy of 92.5 percent approx. (YawDD).
Keywords: eye squint location;Eye aspect ratio (EAR)I;sleepiness detection;
Abstract
DESIGN OF VIBRATING TABLE FOR CONCRETE MOULD
Vivek P. Dongare, Dr. Mohammad Shakebuddin
DOI: 10.17148/IARJSET.2022.96123
Abstract: The design of a vibrating table for a concrete mould as well as any supporting machinery is part of this project. Composites can have a variety of structures depending on their components and manufacturing methods. Vibration is required to remove air bubbles that are produced in the interior structure of composite materials produced using the mould casting procedure. The final construction ought to be homogeneous and void-free. The scope of this study comprised the design and construction of composites made of resins and aggregates as well as the design and construction of a vibrating table with various uses.
Keywords: Vibrating Motor, Stand Frame, Top Plate, Spring Suspension System, Nut, Bolt, Etc.
Abstract
Fingerprint spoofing detection using convolution neural network
Pooja Wadageri, Vidya S
DOI: 10.17148/IARJSET.2022.96124
Abstract: Various tactics had been used in many studies to give liveness finger impression discovery programmes. This paper will examine the various tests proposed in liveness finger impression location frameworks that are capable of separating genuine and phoney unique mark photographs using AI procedures, as well as dissect various plans. In light of explicit measurements, a contrast of produced the datasets used in the literature. The outcomes suggest that the most notable highlights are LPQ and BSIF. back-end vector machine computations (BVM) were extensively employed as a classifier.
Keywords: Fingerprint, liveness discovery, biometrics that are resistant to parodying, security, and machine learning are all watchwords
Abstract
Calorie Burn Predection using Machine Learning
Suvarna Shreyas Ratnakar, Vidya S
DOI: 10.17148/IARJSET.2022.96125
Abstract: In today's world, people are having very tight schedules due to the changes in their lifestyles and work commitments. But it requires regular physical activity to stay fit and healthy. People do not concentrate on their food habits, leading to obesity. Obesity is becoming a major and common problem in today's lifestyle. This leads people to choose their diet and do an equal amount of exercise to stay fit and healthy. The main part here is people should have adequate knowledge about their calorie intake and burn, keeping a track of their calorie intake is easy as it's available on the product label or on the internet. Keeping track of calories burnt is a difficult part as there are very few devices for that. Calories burned by an individual are based on MET charts and formulas. The main agenda of this study is a prediction of the burnt calories with the help of an XG boost regression model as the ML (machine learning) algorithm to show accurate results. The model is fed with more than 15,000 data and its mean absolute error is 2.7 which will become better over time by feeding the XG boost regression model with more data.
Abstract
THE CUSTOMER SUCCESS PLATFORM TO GROW YOUR BUSINESS
Soujanya S Channayyanavar, Dr. T Vijaya Kumar
DOI: 10.17148/IARJSET.2022.96126
Abstract: The PaaS platform offers software architecture development for cloud computing model. PaaS may customize multiple identity authentication and access control. The layouts of the system design can be generated with collaborative discussions. It allows the programmer to easily create, test, run and deploy application within single system. With the help of good design components it is easy to create the unified designs required for customized task orientation. Cloud-based PaaS services are assisting businesses and developers in accelerating innovation, increasing productivity and delivering greater commercial value more quickly. These days business requires, purchasing cloud resources such as platform, infrastructure and apps "Platform as a Service" (PaaS). PaaS is one of the best cloud services technology because it provides resources including tools, services and templates that can be used to quickly and affordably create robust applications. These services offer multiple tools and platforms which should help in reducing the amount of time and efforts users must spend to find the best cloud services in a market that is usually quite complex. With the continuous development and popularization of Internet technology, e-commerce has begun to challenge the traditional business transaction model and become an important market force, affecting the development process of the world economy [1, 2]. E-commerce is a new business model based on the Internet as a trading platform. Since its appearance in the 1990s, its development momentum has been very rapid. Under the circumstance of making full use of Internet resources, e-commerce has incomparable advantages over the traditional business model [3, 4]. It can realize cross-regional and all-weather business, with a complete range of goods, easy retrieval, low cost, and can provide personalized services for consumers.
Keywords: Cloud computing, Services, Internet, E-Commerce, Application, Business.
Abstract
WINE CLASSIFICATION USING LDA
Tikendrajit Sarmah, Sandarsh Gowda MM
DOI: 10.17148/IARJSET.2022.96127
Abstract: Analysis of wine categories was the primary focus of this endeavour. Through empirical research, the wine dataset is reduced in dimension and grouped into clusters. It is necessary to do a factor analysis on the 13 variables in order to separate the complicated ones into 5 categories: the bitter tropic factor; the visual assessment; colour; pH; and mineral elements. Cluster analysis using K-means clustering was used to divide the data into three distinct groups. The features of each variety may be summarised according to the cluster centre. Using a series of empirical investigations, it is possible to draw a general picture of the wine's qualities and to group them into several groups.
Abstract
Ranking of Online Reviews’ Helpfulness Using SO-ILES TODIM
Misba Taj, MS Sowmya
DOI: 10.17148/IARJSET.2022.96128
Abstract: Internet shopping has turned into a propensity for customers, who frequently pursue buy choices in view of online surveys. Be that as it may, the continuous amassing of audits has caused an issue related with data overt repetitiveness. Thusly, suggesting supportive surveys for buyers has turned into a pressing problem. Film surveys were used as the exploration object, and a SO-ILES TODIM technique was suggested (a TODIM strategy in view of the natural language computation set of emotional and ontological properties). It considers the semantic markers (close to home variables and ontological highlights) and measurable pointers (audit length) Firstly, an assessment set that takes profound and ontological elements was built considering factual guidelines. Second, a quantitative computation technique that incorporates a file weight esteem in view of the logit relapse model was planned. Finally, the scoring capacity and the specific capability were meant to grasp a placement of the supportiveness of surveys given the level of participation variation. We illustrate how this technique might concentrate on surveys that simply assesses the item using a case re-enactment. This paper expands the exploration extent of audits, advances the examination strategy for survey accommodation positioning and gives experiences to vendors or outsider to oversee online surveys.
Keywords: Supportiveness, online audits, TODIM, and ranking.
Abstract
Design and Implementation of Order Management System Based on Spring Boot
Shivam Kumar, Seema Nagaraj
DOI: 10.17148/IARJSET.2022.96129
Abstract: Commercial Training is a important stage in a student's lifestyles since it bridges thespace between theoretical know-how and practical expertise, allowing students to use the standards which can be wished within the corporate international. It gives college students a platform to position into exercise the lessons they have got learned in magnificence and entails running on actual initiatives with c technology which can be employed in industry. Constructing a expert attitude advantages greatly from business training this is nicely concept out, well done, and assessed. It fosters the notice of the commercial method to difficulty solving, that's based totally on a thorough comprehension of organizational technique and mode of operation. Discipline, abilities, teamwork, and technical information are the targets and using forces at the back of this business schooling. The purpose and concept in the back of this commercial training is to presents, a scholar studying facts technology, with the field, competencies, teamwork, and technical knowledge. I want to increase a responsiveness to the self-disciplinary nature of problems in facts and verbal exchange generation.
Abstract
Path Finding Visualisation in Mazes Using Various Algorithms
Rohit Kumar, K. Sharath
DOI: 10.17148/IARJSET.2022.96130
Keywords: Path Finding Algorithms, uninformed, BFS, DFS, A algorithm.
Abstract
Digital Ticketing Scheme with Attribute-Based Credentials that Protects Privacy
Chandan CV, Sandrash Gowda M M
DOI: 10.17148/IARJSET.2022.96131
Abstract: Clients mentioning organizations are habitually expected to give individual data, for instance, age, telephone number, and area, to conform to get to strategies. The use of e-labeling, which allows for restricted access to tourist sites or transportation companies admitting clients who fulfil plans related to their age, handicap, or other specified over qualities, is a clear example of this particular information in action.To protect clients' security, we propose a security-saving electronic ticket plot based on trait-based certifications. The benefit of our arrangement is that a client's characteristics are guaranteed by a believed outcast, so the arrangement can affirm to a seller that a client's credits are significant. The arrangement incorporates the accompanying responsibilities: (1) Different tickets can be purchased by customers from ticket sellers without incurring any fees. delivering their particular characteristics; (2) the association of two tickets from the same customer; (3) the transfer of a ticket to another client; and (4) the double spending of a ticket. Because of our peculiarity, customers will probably be able to persuade ticket sellers that their attributes are compatible with the ticket approaches and purchase exclusive tickets in an anonymous manner. This is a step toward realising an e-labeling strategy that takes the requirements for client security in transportation organisations.The security of our plan is demonstrated and diminished to a notable intricacy supposition. The plan is likewise executed and its presentation is experimentally assessed. Record Terms: Anonymity, characteristic based certifications, security upgraded confirmation, electronic ticket
Abstract
FULL STACK WEB DEVELOPMENT
Kanani Jenishkumar Raskibhai, Sandarsh Gowda MM
DOI: 10.17148/IARJSET.2022.96132
Abstract: This paper identified the understanding of recycling system. This paper identified the understanding of recycling system. This system places a strong emphasis on establishing a secondary market to offer recycling services and collect waste in a way that helps to control environmental issues. GoRecycle is provide service for selling wastage products and earn from them. Wastage products like Electronic devices, such as a refrigerator, TV, phone, washing machine, etc., as well as mechanical ones, such as a car or scooter, or fast food sold in plastic containers or bottles, etc. It also provide Business Facility for doing Business offline to online in digital plateform. Main aim of GoRecycle is save environment and reduce the intermediate broker chain. In future our mission will provide selling of recreated product with lower cost
Abstract
ONLINE ANAMOLY FILE DETECTION
Saikumar S, N.Rajeshwari
DOI: 10.17148/IARJSET.2022.96133
Abstract: Security of data is important. Most desktop application users place a greater emphasis on the value of data and how it connects to their products. Security services for system must typically be offline. There is a chance that it could be hacked and altered if it is online. But everything is done online these days. As a result, we must strengthen data and file security. Many businesses develop internal applications to guard against data leaks. In order to stop data leaking, this document suggests a secure file sharing mechanism. One of the most crucial and sensitive pieces of information for IT organizations is source code. Source code breaches can result in tampering with the goods and services they provide, causing considerable financial losses for the company. In order to prevent the unauthorized sharing of sensitive data like source code, this system intends to create a secure in-file sharing method. For this, the system makes use of Principal Component Analysis.
Keywords: File Sharing, Prevention, Principal Component Analysis, Pattern matching, Anomalies
Abstract
SEISMIC ANALYSIS OF STRUCTURE WITH STRUCTURAL IRREGULARITIES
Gangotri KInagi, Mr.Lokesh.J.K
DOI: 10.17148/IARJSET.2022.96134
Abstract: Behavior of a multi-story building during strong earthquake motion depends on structural configuration. Irregular configuration either in plan or in elevation is recognized as one of the major causes of failure during earthquakes. The paper presents a study on the seismic response of the RC structure under strong earthquake motions. FEM based software ETABS V 19 was used to evaluate seismic performance of the structure. The objective of this study is to understand the importance of irregularities, behavior of different irregularity of reinforced concrete structure to seismic forces, its failure pattern during earthquake, to suggest safe performance level for various types of irregularities.
Keywords: Irregularity, Horizontal Irregularity, Vertical Irregularity, Mass Irregularity, Seismic performance.
Abstract
Deep Learning based Face Recognition of Newborn Babies
Geethanjali S G, Janhavi L, Keerthana R, Amrutha N, Hithaishini B Urs
DOI: 10.17148/IARJSET.2022.96135
Abstract: Infant combining, kidnapping, and unlawful adoption are critical issues that have received little attention. Traditional fingerprint-based and non-biometric procedures are flawed, because they do not provide enough safety for babies. In recent history, face recognition for adults has become a hot topic, while automatic face recognition for babies has received less attention in the literature. As a result, its vital to get started on analysis so that forthcoming facial recognition algorithms can deal with the difficult task of newborn identification. On the new born face image with neutral expression, the suggested matching algorithms have an accuracy of 87.04 percent, demonstrating that no two newborns are alike.
Keywords: Deep learning, Convolution Neural Network, Face recognition
Abstract
APPLICATION FOR AN EFFECTIVE ONLINE CAREER PORTAL
Ranjith V, Madhu HK
DOI: 10.17148/IARJSET.2022.96136
Abstract: In the current situation, every profession is competing against one another. The employment market also reflects this. An online resource for information about both job seekers and recruiters is known as a job portal. Finding the ideal company for employees is made easier by a job portal for both job searchers and recruiters. The job portal presents the job seeker with a list of companies based on their educational background, prior work experience, and personal interests. And from a pool of applicants, it gives the recruiters the qualified individuals. The development of a system that enables communication between employers and applicants is the goal of this application. The goal is to facilitate communication between interested parties and expeditiously conclude the recruitment process.
Abstract
DATA SECURITY MODEL FOR CLOUD COMPUTING
SUMUKHA M, C S SWETHA
DOI: 10.17148/IARJSET.2022.96137
Keywords: Include at least 4 keywords or phrases.
Abstract
DEEP LEARNING: A SHORT REVIEW
Pranay Sahariah, Vidya S
DOI: 10.17148/IARJSET.2022.96138
Abstract: A new area of machine learning study is deep learning. It contains various hidden artificial neural network layers. The Deep Learning approach uses considerable level model debates and nonlinear changes in enormous data sets. The latest developments in Deep Learning designs across a variety of fields have already made significant contributions to artificial neural networks. This article offers a cutting-edge analysis of deep learning's commitments and creative applications. The accompanying audit shows how and in which key applications deep learning algorithm has been applied in a sequential manner. The prominent and beneficial aspects of the deep learning technique, as well as its layering and nonlinear activities, are also introduced. Moreover, contrasting with the more routine calculations found in typical applications. The best in class study also provides a general overview of the concept, the gradually growing advantages, and the pervasiveness of Deep learning.
Abstract
ANTIMICROBIAL ACTIVITY OF GARCINIA MANGOSTANA LINN
Seema V. Nayak, Dr. P. N. Mandhare
DOI: 10.17148/IARJSET.2022.96139
Abstract: In South East Asia GML is used as phytomedicine for treatment of trauma, diahorrea, skin infection. The present study investigates antimicrobial activity of GML in different solvent extracts by broth dilution method by using six different solvent extracts showed inhibition activity against microorganisms. Antimicrobial activity of tested samples shown that highest inhibitory activity was produced by extract. Keywords - Antimicrobial activity, GML, Broth Dilution Technique.
Abstract
Post Connection – ARP Poisoning and Protocol Downgrade Attack
Dileep M G, Dr. R Savitha
DOI: 10.17148/IARJSET.2022.96140
Abstract: The security dangers for companies, organizations, and substances that work with touchy information, from the open or private segment, are more than apparent. In numerous circumstances, these companies are not able to get the expansion of the genuine complex communication structures and have fairly little or no control of them. Besides, these dangers are indeed greater when applications that run on their computing infra-structures are taken into thought. The uncontrolled dangers may increment the number of security assaults and can lead to tremendous budgetary misfortunes. This consideration will offer assistance in recognizing the conceivable chances of assaults that can cause vulnerabilities. Target and the Go betweens are the two clients of this consideration. Target can be the companies, organizations, People or the substances that work with touchy information. Intermediate device will be the assailant who mediates communication between two parties either to take login qualifications or individual data, spy on the casualty, or attack communications and degenerate information. An Man Within The Middle (MITM) assault requires somebody to be essentially displayed between the association of two parties to watch them or manipulate network activity. This can be accomplished either through interferometer with genuine systems or making a fake organism which can be controlled by assailants. Once the casualty interfaces to such a false hotspot, the aggressor picks up to get to any kind of online information trade. Design the inaccessible web server to communicate utilizing HSTS. On the off chance that there's any preload mandate within the application, it is prescribed to switch back to HTTP. An aggressor can send a preload mandate from the application. These preload orders might have genuine issues on the server. The preload order can be used to avoid the users from getting to the internet application together with any of its subdomains.The net application must educate the user's web browser to as it were to get to the application utilizing HTTPS. To do this, the application must empower HTTP Strict Transport Security (HSTS). The HSTS can be empowered by including the reaction header 'Strict-Transport-Security'. Set the esteem 'max-age=expireTime'. We too prescribe including the 'includeSubDomains' flag.
Keywords: Man Within The Middle, Security, Computing, Degenerate, Vulnerabilities, Target, Intermediate device
Abstract
Design and Development of Autonomous UAV for Thermographic Surveillance
Dr. Hareesha N G, Manjunath M Devaranavadagi, Pruthveek S Badiger, Athith A Kashyap and Ekale Abhaykumar
DOI: 10.17148/IARJSET.2022.96141
Abstract: UAVs are being utilized to scout the area in conflict zones. To increase effectiveness, surveillance drones can be equipped with thermal imaging cameras. Using a thermal imaging camera, thermographic surveillance is accomplished. A UAV is created to fulfil the mission's criteria. A quadcopter is developed and evaluated, and the weight of the UAV is approximated. Arduino is used for data collecting and camera capture. An image capture is delivered to a web server. Utilizing image processing techniques like linear contrast adjustment and CLAHE, the image is further improved.
Keywords: Autonomous UAV; Thermographic surveillance; Thermal Imaging; Thermal Image Enhancement.
Abstract
DOCFACE+: ID DOCUMENT TO SELFIE MATCHING USING BLOCKCHAIN TECHNOLOGY
Pramod C N, Bhavana G
DOI: 10.17148/IARJSET.2022.96142
Abstract: The majority of daily activities need us to submit ID cards containing facial images, such as passports and driver's licences, to human operators in order to prove our identification. This process, however, is laborious, slow, and unreliable. An automated method is required to adapt ID document photos to real-time, highly accurate live face images (selfies1). To do this, DocFace+ is recommended in this work. We first show that gradient-based optimization techniques converge slowly when many classes have small samples, which is a defining characteristic of existing ID-selfie datasets (owing to the parameter of classifier weights). To fix this problem, we propose a method known as dynamic weight imprint, which modifies the classification weights and allows for faster convergence and more universally applicable representation. Then, utilising partially shared parameters, a pair of sister networks is created to learn an unified feature representation utilizing domain-specific traits. Cross-validation on to an ID-selfie dataset reveals that DocFace+ significantly raises the true acceptance (TAR) to 95.95 0.54 percent, while InsightFace, a publicly accessible general face matching engine, only did manage a TAR of 88.78 1.30 percent at the a false acceptance rate of 0.01 percent just on challenge.
Keywords: Images, Face verification, Digital certificate.
Abstract
Improved And Protected Banking Transactions Using Cryptographic Techniques
Chaithra S K, Sandarsh Gowda M M
DOI: 10.17148/IARJSET.2022.96143
Abstract: One of the earliest forms of crime is the theft of credit and debit card data. Even so, it is one of the common in present era. Attackers generally target the Point Of Sale(PoS).Or the point at which the retailer first gets client data in an attempt to steal such customer data. Powerful computers with a card reader and running software comprise modern Po's system. User devices are used greater commonly as input to the Po's system. Malware that can steal data card as soon as it has been ready by the device has spread in these situations. This report discusses a secured off-line micro payment solution that is robust to the Po's data breaches this called fraud resistance device for micro payments.
Keywords: PoS system,Credit and Debit Card
Abstract
Cloud Computing Application for A Protected Medical Records
Darshan Jain S V, Swetha C S
DOI: 10.17148/IARJSET.2022.96144
Abstract: The design, implementation, and security measures for personal health records when they are kept in external locations, such as the cloud, are discussed in this study. People can access and organise their lifelong health information using a web-based tool called Personal Health Record. Access to the patient's own PHR is under their control. Before outsourcing the data, we apply attribute-based encryption to ensure the confidentiality of personal health records. Here, we concentrate on various PHR owner scenarios and divide users of personal health records into various security domains to simplify key management for both owners and users. The privacy of patients is ensured to a considerable degree. Our system allows the owner of a personal health record complete control over their data. Extensive security and performance analysis shows that the proposed scheme is highly efficient.
Keywords: Personal health records, attribute based encryption, cloud computing, secure sharing
Abstract
Deep Learning Algorithm for Classification And Prediction of Lung Cancer
Pavitra B, Thanuja J C
DOI: 10.17148/IARJSET.2022.96145
Abstract: Diseases affect our daily lives as a result of most people's lifestyles. In the health-care field, most person's data is analysed as per the sickness that has impacted them as a result of their lifestyle, and some info is hidden that will be valuable in making good decisions. In this research, we use people's lifestyle disorders to process and analyse data using machine learning algorithms, and we use data visualization techniques to predict disease stage using machine learning algorithms Decision tree and K-Nearest Neighbour algorithm. And depending on that training data, we need to perform data validation to forecast the results. And with the dataset we can collect electronic medical records; all the medical record patient details are available as well as precision. The proposed model will help preserve the lives of the majority of patients, and we will be able to avoid the majority of incurable diseases if we can identify causes early on. In the medical field, machine learning can be used for diagnosis, detection and prediction of various diseases. The main goal of this paper is to provide a tool for doctors to detect Lung Cancer disease at early stage. This in turn will help to provide effective treatment to patients and avoid severe consequences.
Keywords: Disease, machine learning, Lung Cancer, K-Nearest Neighbour algorithm
Abstract
REACTIVE POWER COMPENSATION USING D-STATCOM FOR 3-PHASE INDUCTION MOTOR LOAD
Shubham Singh, A. N. Tiwari
DOI: 10.17148/IARJSET.2022.96146
Abstract: Modern AC supply system is characterized by two kinds of power i.e Active power and reactive power and both of these powers are necessary for the proper functioning of modern AC supply system. Active power represents the useful work done while reactive power represents the artificial loading and limits the flow of Active power through the AC supply system thereby decreasing the efficiency of existing system. Reactive power provides some positive attributes to the supply system by maintaining system voltage which is necessary for the flow of active power. Reactive power is also necessary for electromechanical energy conversion because it is required for generation of magnetic field which is essential for the energy conversion. If the flow of reactive power in AC supply system is localised then the efficiency of existing system can be increased. This work presents the reactive power compensation by D-STATCOM in distribution system feeding induction motor load under varying loading conditions. Firstly a supply system of line to line voltage 50 Hz is simulated in MATLAB environment and a squirrel cage induction motor load of 75 kW is directly connected. At first under varying loading conditions flow of power from supply to motor is recorded and analysed. Then D-STATCOM is designed using voltage source converter (VSC). Suitable filter is to be selected for smoothening the current waveform which will be injected by D-STATCOM. A suitable control algorithm should also be selected for the generation of reference voltage. This reference voltage will be used to produce triggering pulse for the VSC of D-STATCOM. Then this realized simulation model of D-STATCOM with suitable filter will be connected to the existing system to compensate the reactive power demand of induction motor load. After recording and analysing power flow data under varying loading conditions it was found that D-STATCOM supplies almost majority of reactive power demand of induction motor load while at the same time active power demand is fulfilled by supply system thereby localising the flow of reactive in supply system.
Keywords: Distributed generation power system, renewable energy resources, energy storage systems, PV system, grid-connected systems.
Abstract
DESIGN AND SIMULATION OF DVR USED FOR VOLTAGE SAG/SWELL MITIGATION AT DISTRIBUTION SIDE
Vipul Vishwakarma, A. N. Tiwari
DOI: 10.17148/IARJSET.2022.96147
Abstract: The Dynamic Voltage Restorer (DVR) is a potential Distribution Flexible AC Transmission system (D-FACTS) has been introduced to protect sensitive loads from voltage sags and other voltage disturbances in addition to this, it mitigates current harmonics distortion. Dynamic voltage restorer is a series connected power electronic based FACT device. It is considered as one of the most efficient and effective solutions. DVR is in smaller size and has a fast dynamic response to the disturbance introduced by the load or fault. This work contains power quality improvement (majorly focusing on the mitigation of voltage sag and swell) using DVR. A simulink model of DVR has been modeled in MATLAB software. Simulation results carried out by MATLAB/Simulink to investigate the performance of the proposed method's effectiveness to smooth the distorted voltage.
Keywords: Distributed generation power system, renewable energy resources, energy storage systems, PV system, grid-connected systems.
Abstract
Wildlife Animal Tracking and Monitoring System
Dr. Chanda V Reddy, Aishwarya MR, Aishwarya N, Dasha C Jain, Pragathi J Reddy
DOI: 10.17148/IARJSET.2022.96148
Abstract: Animals form a big part of the ecosystem. Their existence is very important for the balance of the ecosystem. But nowadays, more and more animals are getting endangered and are on the verge of extinction. To save animals from extinction, humans reserved forest areas (Sanctuaries and national parks) for their safety. However, some animals died due to bad health which couldn't get any attention either. To avoid such casualties, an animal location tracking system with a health monitoring system is used. Proposed system uses a pulse rate and temperature sensor to keep track of the animal's health and also track the exact location of the animal. In the proposed system two main applications have been installed: location tracking, health monitoring.
Keywords: Health monitoring, Location Tracking, GPS, Wi-Fi.
Abstract
Experimental Investigation of PVC Composite Membrane for Polymer Electrolyte Membrane Fuel Cell
KUMARESAN.P, PERIYASAMY.S, SEKAR.T, NANDAKUMAR.N
DOI: 10.17148/IARJSET.2022.96149
Abstract: Now day Fuel cells have received a lot of attention for alternative energy compared to fossil fuel-based energy sources. On various types of composite ion-exchange membranes, the latest initiative is observed with organic and inorganic membranes to overcome the limitations. In this view, a composite membrane comprising PVC combined with titanium dioxide and zirconium oxide represents a new class of ion-exchange materials that may be prepared. It connects physic-chemical characteristics of inorganic parts within a single composite. A composite ion exchange membrane was synthesized with 1g of composite material mixed thoroughly. The ring is left for slow evaporation of THF to obtain thin film and a sheet of master membrane. The Composite membrane was tested for chemical stability in acidic, alkaline, and strongly oxidant media. The composite membrane was found to be thermally and chemically most stable. It is suggested that when swelling and porosity are examined diffusion across the membrane would occur mainly through exchange sites.
Keywords: Polyvinyl Chloride (PVC), Polymer Electrolyte Membrane (PEM), Fuel Cell, Thin Film Membrane (TFM)
Abstract
AUTOMATIC GENERATION OF MINUTES OF MEETING USING DATA ANALYTICS
Mrs. Navya Damodar, Nandini R, Karthik J, Gangu, Malik Mahammed Shakir
DOI: 10.17148/IARJSET.2022.96150
Abstract: At meetings, a variety of outputs such as presentation materials, text minutes, video/audio data are generated. Both meeting participants and absentees can easily understand meeting minutes easily if these data are mutually referred and extracted important points. Therefore, focusing on participants' importance, we have proposed and developed the system that automatically produces Web pages by collecting and editing meeting data with much labor saving so as to easily understand a sequence of meeting. The importance submitted by participants are automatically collected and showed their status to participants in this system.
Keywords: Google Docs, OneNote, Lucid Meetings, Evernote, Agreedo, Minutes.io.
Abstract
Crypt Cloud: Secured and Descriptive Connectivity Control for Cloud Storage
LAKSHMI AL, Dr. Kanta devangari
DOI: 10.17148/IARJSET.2022.96151
Abstract: Secure distributed storage is a newly developed cloud administration that aims to give cloud clients with data that is not under their control flexible information access while also safeguarding the secrecy of reevaluated information. One of the most promising methods for ensuring the assistance is CP-ABE (Ciphertext-Policy Attribute-Based Encryption). Despite this, using CP-ABE may inevitably lead to a cyber attack known as misuse of access accreditation. We analyse two important incidents of access eligibility abuse in this study, one was on the side of moderately power and another in behalf of cloud clients, due to CP's built-in ABE's "go big or go away" decoding component. We introduce CryptCloud+, the first changeable, accountable power, to stop abuse.
Abstract
Development of Patient Profile in Clinical Data Management
Vinod Kumar K, Prof Saravanan C
DOI: 10.17148/IARJSET.2022.96152
Abstract: Healthcare takes more than 10% of the GDP of most developed countries Recent healthcare statistics show that it's one of the largest and fastest-growing industries in the world. Today, approximately 30% of the world's data volume is being generated by the healthcare industry. By 2025, the compound annual growth rate of data for healthcare will reach 36%. Generation of patient profile includes history of patient health visits, tests carried out and such other details are extracted from Medidata Rave. The raw data extraction process is time consuming, several variables are ignored and tedious process. The proposed work "Development of Patient Profile in Clinical data management" helps to solve the issues when extracting the data. The proposed work considers Medidata Rave® clinical data for building patient profile. It consists of modules namely data extraction module, Query Formulation Module and Report Generation Module. In the Data extraction module, the data set retrieved from the Medidata Rave for verification of the specifications stored in the cloud with the specification given to verify for the consistency of the data and identification of the missed variables. In the query formulation module, queries are formulated to fulfil the requirements given in the specification. The report generation module focuses on generating reports for patient profile, missing page report, subject status report and customized EDC report with clinical trial details. The project is implemented using the SAP BO (Business Object) tool is a cloud-based clinical data management system used to capture, manage, and report clinical research data. The outcome of the proposed work helped in developing customized dashboards to provide better visualization. It helped in building clinical data management system pertaining to generation of patient profile, clinical trial details and subject status report. Time taken to process data extraction, query formulation and generating reports was reduced by 70%.
Keywords: Medidata, Patient Profile, Clinical Data Management, Business Object, Dashboards.
Abstract
EMISSION CONTROL ANALYSIS ON SINGLE CYLINDER 4-STROKE DIESEL ENGINE
Dr.M.Naga Swapna Sri, Dr.P.Anusha, E.Uthpal Ramana Panith, A.Teja Sai Abhiram, B.Sai Kiran Naik, A.Charan Teja
DOI: 10.17148/IARJSET.2022.96153
Abstract: Biodiesel is a renewable diesel replacement fuel that is manufactured from domestically produced oils such as neem seed oil, soybean oil, recycled cooking oils, or animal fats. To manufacture biodiesel, these fats and oils are chemically reacted with a short chain alcohol (such as methanol) and a catalyst to produce biodiesel and a glycerin co-product. Biodiesel can be used alone (B100) or blended with petroleum diesel in any proportion. Biodiesel can be legally blended with petroleum diesel in any percentage. This project deal with the analysis of emission properties and performance characteristics of biodiesel. Pollutants like CO (Carbon monoxide), HC (Hydro Carbon), PM (Particulate matters) etc. can be reduced by using biodiesel blended with diesel. Increment in NOx emission has been a problem in biodiesel but it can be overcome by various methods like Cetane no improver. Additives play a crucial role in minimizing NOx emission that could be a sigh of relief for the researcher who are opting biodiesel as an alternative fuel. Mainly animal fats and vegetable oils are used for the production of biodiesel.Several types of fuels can be derived from triacylglycerol-containing feedstock. Biodiesel which is defined as the mono-alkyl esters of vegetable oils or animal fats. Biodiesel is produced by trans esterifying the oil or fat with an alcohol (methanol/ethanol) under mild conditions in the presence of a base catalyst.
Keywords: Biodiesel, Animal Fats, Transesterification, Biodiesel, Petro Diesel, Blends
Abstract
MOBILE PELTIER COOLER
Dr.P.Anusha, Dr. M. Naga Swapna Sri, N.Naveen, T. Sai Kireet, R. Setu Madhav, N. Sai Santhosh
DOI: 10.17148/IARJSET.2022.96154
Abstract: Now a days, Advanced cooling solutions are needed to address the growing challenges posed by future generations of microprocessors. Many types of refrigerators are made using refrigerant which to extent affect our environment. Then it strikes to make a refrigerating system in which there is no use of refrigerant so there is an option of vapour absorption system. Now the problem occurs about its shape refrigeration system with absorption system is heavy & bulky. This leads our project to thermo-electric cooling using concept of peltier effect.Cooling and heating applications are outstanding issues, which are widely investigated in the field of thermodynamics to improve energy efficiency. Peltier devices as an element used for heating, cooling and power generation have been title of many research due to their advantages in the term of their simple structures, low weight, working with low noise and capability to manufacture in small sizes. This work was carried out with the aim of reviewing presented studies to summarize Peltier applications and their performance as an important element for refrigerators and air conditioning. A 40 x 40 x 3.6 mm mini thermoelectric Peltier cooler was designed and built in this study. The Peltier thermoelectric cell was sandwiched between an external and internal heat sinks that acted to remove heat from the cooler box. When the Peltier thermoelectric cell connected to an external power source, the Peltier effect caused the heat from the refrigerator internal space to be conducted and removed to the ambient. This system can achieves minimum temperature of 20℃ and maximum temperature of 35 ℃ where maximum voltage occurs in about 30 minutes. For future development, this system can be used as a replacement of for conventional air-conditioner systems that use coolant that can be harmless for humans in long term.
Keywords: MPC, Thermo electric Principle, Peltier Effect, Coolong, Non Conventional Refrigeration Techniques.
Abstract
Implementation of e-toll using ML
Ankitha S, Arjun A B, Anoop Kashyap K, Srikar G K, Dr. Shilpa R
DOI: 10.17148/IARJSET.2022.96155
Abstract: In this, we will discuss how traffic problems can be reduced by implementing an automatic toll collection system. This system is based on image processing and image classification. It helps in maintaining the transparency of the toll collection system. The aim is to make a digital toll collection system that will be less time-consuming and automated monitoring and control of vehicle entry-exit on a highway using machine learning techniques. At the entrance of the toll, the gate camera captures an image of the vehicle and from the image, it creates a bounding box with probability estimates of the feature classes as output. We present a review of state-of-the-art traffic monitoring systems focusing on the major functionality of vehicle classification. The result is the use of machine learning for effectively detecting vehicles in electronic tolling systems in real-time.
Keywords: e-toll, ml for vehicle classification
Abstract
GENDER DIFFERENCES IN EMOTIONAL VALUE IN PHYSICAL EDUCATION STUDENTS: A PILOT STUDY
Ramakant D. Bansode, Dr. Vandana Singh
DOI: 10.17148/IARJSET.2022.96156
Abstract: The purpose of the study was to determine the gender differences in emotion in Physical Education students. In all, 50 male Physical Education students and 35 female Physical Education students during the academic year 2021-22 selected as a sample size for the study. The Emotional Value measure through self design questionnaire. The result reveals that only significant differences were found in Emotional Value between male and female physical education students. Physical education students was found to have got more emotional value.
