Welcome to International Journal of Emerging Technologies in Engineering Research (IJETER)


Volume 6, Issue 4, April (2018)

S.No Title & Authors Full Text
1 Experimental Investigation on Partial Replacement of Cement by Using Sugarcane Bagasse Ash
D. Dinesh Kumar, A. Ayyappan, S.Dhivagar, B.Dineshkumar, P.Marimuthu, V.Prasanth
Abstract - India produces around 24-25 MEGATON of sugar these days and also same is approximately the estimated sugar cane bagasse ash (SCBA) produce of India. Therefore it is essential that a useful method of utilization of this sugr factory waste should be found and gainfully used. As the demand and consumption of cement raising, researchers and scientist are in search of developing alternates binders that are eco friendly and contribute towards waste management .The utilization of industrial and agricultural waste produced by industrial processes has been focus of waste reduction research for economic, environmental and technical reasons. Sugar cane bagasse ash is a fibrous waste product of the sugar industry, along with ethanol vapor. This waste product is already causing serious environmental pollution , which calls for urgent ways of handling the waste. Bagasse ash is mainly contains aluminium ion and silica. It has limited life span and after use it s either stock piled or sent to landfills. In these project bagasse ash has been chemically and physically characterized and partially replaced in the ratio of 0%,5%,10% and 15% by weight of cement fresh concrete that is slump cone test were undertaken as well as hardened concrete test is compressive strength and Split Tensile Strength at the age of 7,14 and 28 days was obtained.
Download
2 Effect of Chromium Concentration on the Morphology of MAPb 1-xCrxBr3 Thin Films Synthesized by Spin Coating Process for Solar Cells
D. Soro, M. Sidibe, B. Mari, B. Fofana, B. AKA, S. Toure
Abstract - The key materials for the perovskite are compounds with the chemical formula ABX3 (A=CH3NH3, B = Pb or Sn, and X = Cl, Br, or I), which have received extensive attention due to their favorable photovoltaic properties. Usually the optical and structural properties of CH3NH3PbBr3 can be adjusted by introducing other extrinsic ions such as Cl and I. In this work, instead of replacing Br with I or Cl as usual, we replaced lead with chromium (Cr) which is a transition metal and may have the same oxidation state (+2) as lead. Thin films of MAPb1-xCrxBr3 perovskite were produced in a single step from a mixture of MABr, PbBr2 and (ClO4)3Cr powders at 45% by weight in a solution of dimethylformamide (DMF). Films were deposited onto ITO-coated glass substrates by spin coating. X-ray diffraction analyses confirmed that these thin-film perovskites crystallize in the cubic phase (Pm-3m) for all composition range 0 = x = 0.11. The structural analysis reveals films with (110) and (220) as main peaks and no apparent crystal orientation. SEM analysis shows a morphology with good coverage MAPb1-xCrxBr3 showed a high absorbance in the UV–Vis range. The optical band gap was estimated from spectral absorbance measurements. It was found that the onset of the absorption edge for MAPb1-xCrxBr3 thin films ranges between 1.60 and 1.80 eV.
Download
3 A Review on Extrusion Process of Alloys in Semisolid State
Sudip Simlandi
Abstract - The extrusion in semisolid state is a developing technique in present days for the production of military, critical automotive and aerospace components. The importance of the semisolid extrusion technique relies primarily on the distinct rheological behaviour of the alloys during solidification under deformation. It is noticed that, the extrusion in semisolid state depends on various process parameters like shear rate, slurry temperature, cooling rate, length of contact, die angle etc. Hence, theoretical models of semisolid rheology need proper implementation for successful implication of the semisolid extrusion technique. In the present study, the author presented an overview of various theoretical models on semisolid extrusion of alloy slurry based on existing literature and their own work.
Download
4 Experimental Investigation of Concrete in Partial Replacement of Coarse Aggregate and Cement by Sea Shell and Prosopis Juliflora Ash
K.P.Ravikumar, M.Karuppiah, I. Arun Raj, R.Gokulprasath, G.Guna, D.Jeyasuriya
Abstract - The Concrete is heavily used as construction materials in Modern society. With the growth in urbanization and industrialization and its demand is increased day by days. In order to minimize the negative impact of concrete, the use of waste materials. Our project deals with the partial replacement of coarse aggregate and cement by sea shell and prosopis juliflora ash. The substituent to coarse aggregate and cement by sea shell and prosopis juliflora ash at level of 10%, 20% and 30% is to be studied for masteries and strength properties 100% cement concrete mix is of M25 and water cement ratio is 0.48.the strength will be tested during the period of 7 days 14 day 28 days respective. We will compare the replace concrete with the conventional concrete about the strength and durability of the concrete.
Download
5 Health Monitoring System Using IOT and GSM
KritikaVerma, Jignesh Kumar Shah, Anurag Sakure, Lumbini Meshram, N.S.Ambatkar
Abstract - As elderly population increases day by day this automatically increases caretaking demands. Hence patient health monitoring systems are gaining importance in our day to day life. The system proposed in this paper is an advanced solution for monitoring the patients. We have designed and developed a genuine, patient monitoring system. It is capable to send parameters of a patient in a real time. It enables the doctors or a user to monitor patient’s health parameters such as temperature and pulse rate in real time. The current proposed system is using different sensors which are connected to the Arduino board. And the data received is then sent to the server using Ethernet shield which is attached to the Arduino board. If any of the parameters goes beyond the threshold value an alert is given to the doctor using GSM module attached to Arduino board and the patient immediately from anywhere.
Download
6 Dizziness Detector in Cars
S.S Subashka, Manish Prakash, Shantanu Fartyal, Osama Habib
Abstract - The objective of this project is to develop a safety system which consists of systems that are breath alcohol detector, ignition switch controller, pinhole camera setup, Arduino setup, GPS module, car’s infotainment system and an alarm. The existing systems uses an in-car augmented reality system which can predict the collision if it’s about to happen. There also exists a breath detector in which a person has to blow to check if the person has consumed alcohol. We propose to develop a safety system which will consist of a breath analyzer which will be connected to the ignition system of the car and if the alcohol limit exceeds the ignition system is automatically turned off. The cars will also have a camera installed which uses artificial intelligence to check driver’s condition and turn on the alarm if the driver is dizzy. The car will automatically send the location of the car to the important contacts. The hardware modules include the PIC16F877A microcontroller, alcohol sensor, LCD panel and ignition switch circuitry. Programming of the PIC microcontroller will also be required. After installation the circuit will be able to detect alcohol concentration and check if the driver is sleepy. Then, accordingly the system decides to enable or disable the ignition system and alarm. Therefor this system will be very useful to control accidents happening because of dizziness. Keywords: breathalyzer, blood alcohol concentration, ignition, alcohol, drunk.
Download
7 Airport Baggage Handling Using RFID and Cloud Technology
Sakshi Malhotra, Kriti Sinha, Prashant Godara, S.Preethi, R.Angeline
Abstract - Airlines industry is one of the major areas which can be strongly benefitted from RFID and cloud technology. The problems which are frequently faced by passengers at the airports are lost baggage, misplaced baggage or damaged baggage. To provide a better and safer system we have come up with a plan of tracking airport baggage using passive RFID tags and cloud technology. RFID has a lot of benefits over the previously used bar codes. Passive RFIDs are being used here because there is no need of batteries or any sort of maintenance. A paradigm has been designed which includes both the check in and the check out processes. The real time location of the baggage is tracked and stored in cloud. The passenger can obtain the location of the baggage using the unique ID anytime and anywhere. Using the same id one has to collect their respective baggage. The proposed system is very secure, makes sure there is less time consumption and therefore provides customer contentment.
Download
8 Experimental Investigation of Concrete in Partial Replacement of Cement by Dolomite and Fine Aggregate by Copper Slag
N. Kohila, M. Elangovan, A. Kathick Rajapathy, V. Karthik, K. Pandian
Abstract - Concrete plays a vital role in the world of this paper is a part of experimental investigation to study the characteristic of concrete by using the combination of partial replacement of cement by dolomite powder and partial replacement of fine aggregate by copper slag. The dolomite is an anhydrous carbonate mineral made out of calcium magnesium carbonate and it is likewise used to portray as sedimentary carbonate shake. Dolomite is also known as dolomite. The dolomite powder is the crushed mineral from dolomite. Copper slag is a rough impacting coarseness made of granulated slag from metal refining procedures and it is likewise called as iron silicate. The replacement percentages of cement by dolomite powder is 10%, 20% & 30% and fine aggregate by copper slag is 25% by the weight of M25 grade concrete. The dolomite powder and copper slag is mixed with natural cement and fine aggregate in the grade of M25 with the mix proportion of 1:1:2. The concrete cubes were casted with varying content of dolomite powder and copper slag. The test specimens were cured and tested for compressive strength and split tensile strength in 7 days, 14 days & 28 days for concrete.
Download
9 A Study on Human Resource Management and the Outcomes of HRM Practices in Educational Institutions with Special Reference to K.K. District
Dr. N. Jeba Jasmine
Abstract - Several terms have been used by various management thinkers to represent human resources. Human resources are multi-dimensional in nature. People working in an organization have different needs at different times. These needs may physiological, Social or Psychological .Human resources management means employing people, developing their resources, utilizing, maintain and compensating their service in tune with the job and organizational requirements with a view to contribute to the goals of the organization, individual and the society.
Download
10 Device Control Based on Wireless Virtual Reality Technique using Artificial Intelligence
Devi.M, Renukasrinidhi.N, Swarnamaalika.N, P. Rekha
Abstract - Current technology and trend have made designing and implementation of embedded systems for home automation has increased the capabilities and features. There is a demand for smart home automation access via virtual reality. The proposed system allows the owner to access via virtual reality and controls the home appliances. This is very easy to access. In this paper, we present the design and implementation of a low cost but yet flexible, feasible and secure virtual reality based home automation system. In our proposed system we will try to control light, motor and 230v supply. This work also demonstrates the use of virtual reality in the context of the appliance control. In this project we have used image processing techniques for image acquisition, pre processing, image segmentation and feature extraction. The user commands are captured by the camera and transmitted through wireless communication to the receiver end. Thus our project has a huge scope for training and development business using virtual image and setting up a virtual environment.
Download
11 Sensing Vital Signs of Affected Role and Prioritized Clinical Communication in Ambulance
P.Rekha, V.Chitra, T.Nithya
Abstract - In this paper, the Heart Rate Sensor, Temperature Sensor (LM35) used to check the Vital Stipulation of the people. The communicational to the nearby Infirmary and corresponding Ambulance carried out through IoT modem-using Cloud Computing Technology. The Accident occurrence described through MEMS accelerometer. To ensure safe and effective care during emergency Affected Role transfer from rural areas to centre tertiary hospitals, dependable and real-time communication is essential. Regrettably, real-time monitoring of patients postulates transmission of various objective multimedia information of vital signs, which requires use of cellular phone web with high-fidelity communication information measure. However, the receiving set networks along the routes in rural areas range from 4G to 2G to low accelerate orbiter colligates, which gets a substantial dispute to carry vital patient data. Our preliminary rating results show that our solvents assure that most vital patient’s objective data are communicated on higher fidelity. Ambulance service is one of the major services. To figure out the trouble we have come up with the solvent of “Intelligent Ambulance Control”. Here we are chasing the patient’s wellness conditions. If the individual got chance event, sensors record the wellness parameters such as Heart rate, body temperature, if the parameters are unnatural it will mechanically direct to the nearby infirmary using the on board IOT unit. All these arguments are exhibited in the infirmary unit on a personal computer.
Download
12 Elimination of Equivalent Ciphered Data from Online Based Data Storage
D SivaChidambaram, Ramya V, Vidya Varshini R, Janaki E
Abstract - Cloud computing plays a vital role in data storage. In cloud computing data are stored through online, so that it is a trivial process to maintain its privacy and security. As organization increase their reliance on possibly distributed, information system for daily business, they become more vulnerable to security breaches, even as they gain productivity and efficiency advantages Though a number of techniques such as encryption and electronic signature are currently available to protect data when transmitted across sites, a comprehensive approach for data protection must also include mechanism for enforcing access control policy based on data contents. Message Locked Encryption algorithm is discussed about data deduplication in a storage. But this algorithm fails to provide security. To overcome this method, in this paper we propose a scheme called proxy re-encryption. This algorithm works on the situation when the data owners are offline and feels difficult to remove duplicated data. It provides high security and ease of maintenance Both the algorithm are combined together and the result is given.
Download
13 Light Fidelity Based Monitoring of Ship Performance and Data Transmission in WSN
T Saranya, N Meenakshi, K Priyanka, S Priyanka
Abstract - The objective of this project which consists of high priority components of the Environmental Investment Program is to put in place the policy and institutional arrangements necessary to have physical planning, land use control, infrastructure investments and environmental protection managed in a coordinated and rational way. In this project the ship is monitored by using the controller and the sensors that we fixed in the ship. MEMS is used to find the tiltation of the ship when the tidal waves is in extreme range of cyclonic action and the ultrasonic sensor is used to find the obstacle before the ship. Using LIFI we are transmitting the data to the control room at the other end at night time by receiving the light energy.GPS is used to track the position of the ship using the particular ID and it is useful to rescue the ship when it is in dangerous situation. And the alarm signals are intimated using voice play back and speaker. All these things will be monitored in PC.
Download
14 Solar Powered Obstacle Avoiding Robot
S.S. Subashka Ramesh, Tarun Keshri, Sakshi Singh, Aastha Sharma
Abstract - This paper presents a real time motion planning and obstacle avoidance for an autonomous mobile robot. With the help of robots our daily life has become much easier. The mobile robot powered by solar power uses ultrasonic sensors to avoid collision with the upcoming obstacles and changes its direction to a safer side. The vehicle is controlled based on the information from these sensors. This technique is very simple but efficient. Several simulation and experiments demonstrate good performance even though using low-resolution sensors.
Download
15 Vibrational Spectroscopic Analysis with Chemical Computations for NLO Molecule Benzilic Acid
K.S.BhavaniShamee Ram, P.Divya, T.JoselinBeaula, P.Muthuraja, M.Dhandapani, V.BenaJothy
Abstract - Benzilic acid has biological significance and hence is used in the manufacture of glycollate pharmaceuticals including Clidinium, Dilantin, and Flutropium. Experimental findings are added to the quantum chemical studies performed with DFT (B3LYP) method using 6-311+G (d, p) basis sets. Observed FT-IR and FT-Raman spectra have been compared with the theoretical data. Bond length, bond angle and dihederal angle have been calculated using the Gaussian’09 software package wherein experimental values are compared with the theoretical values. Predicted electronic absorption spectrum from TD-DFT calculation has been compared with the UV–vis spectrum. Molecular orbitals and natural bond analysis of the compound have been calculated by Density Functional Theory calculations. HOMO -LUMO energy gap and Molecular Electrostatic Potential values propose the possibility of charge transfer in the molecule.
Download
16 Sentimental Analysis
Anurag Busha, Manoj Prakash.P, Pelash Choudhary, Vakeesh Kanna. T. I
Abstract - Sentimental Analysis algorithm refers to the usage of statistics, natural language processing, and text to identify and extract the text sentiment into categories that can be termed as positive, negative, or neutral. Sentimental analysis is, therefore, the computational treatment of emotions, subjectivity of text and opinion. The present paper provides a comprehensive review of the proposed enhancement of algorithms and some sentimental analysis applications. Some of the areas investigated and presented in the article include emotion detection, transfer learning and resource building. Sentimental analysis provides an opportunity to arrive at a decision that is binary; you are either for or against the decision. An example of such a binary question can be used on Twitter or political polls or for reviewing movies. We use movie review comments from popular website IMDB as our data set and classify text by subjectivity/objectivity and negative/positive attitude. We propose different approaches in extracting text features such as using large movie review corpus, restricting to adjectives and adverbs, handling negations, bounding word frequencies by a threshold and using synonyms knowledge. We evaluate their effect on accuracy of the natural language processing methods- Naive Bayes, Decision trees. We conclude our study with explanation of observed trends in accuracy rates and providing directions for future work.
Download
17 Multi Label Text Classification and the Effect of Label Pyramid Clustering
Stalin Jose J, Dr. P. Suresh
Abstract - Now-a-days, text classification has gained more attention in the field of machine learning, information retrieval, and natural language processing (NLP). The text classification issues discover wide interest in different areas to perform tasks such as a. selection and classification of News, b. Classification of documents in digital libraries, social networks and websites, etc, c. E-mail categorization comprising filtering of spam. A deviation of this issue in which every document can be associated with some number of labels or classes that is known as a multi- label text classification issue. An expansion to such an issue in which the classes are inter-related through a definite hierarchy is known as a hierarchical text classification issue. In this research work, we use real-time dataset to perform multi label text classification experiments and investigate its performance. The algorithm is implemented for leveraging the hierarchy in the classes and examines the impact of various algorithmic methodologies and properties of the dataset over the classification performance.
Download
18 Tribological Characteristics of Steel/TiC surface composite fabricated by Friction Stir Processing
N. Yuvaraj
Abstract - The present work aims to fabricate surface composites on plain carbon steel by using solid state surface modifying technique named Friction Stir Processing (FSP). Titanium Carbide (TiC) particles was applied on the surface and modified by FSP in order to produce composite surface. The effect of three different tool rotational speeds (600, 800 & 1000rpm) on the wear behavior of the surface composite were studied. FSP modified composite surface has shown that significant improvement in friction and wear reductions in compared with base alloy. The friction coefficient of the processed composite samples was not shown any significant changes with changing of tool rotational speeds.
Download
19 Numerical Investigation on Structural Analysis of Connecting Rod Bush
S. Dharani Kumar, Sureesh.G, NithishAravinth.M.B, Revanth.J, Raghul.P, Krishnamoorthy.V, Vinukarthikeyan.P
Abstract - This paper mainly aims to design and analyse the connecting rod bush which is to connect the reciprocating piston in IC engine. The bush is designed according to the data available for specific IC Engine. The static structural analysis of bush is carried out with ABAQUS 6.13 FEA software by considering material properties of cladded copper with backing layer as SAE1010 steel. It is found that the maximum vonmises stress acting on the bush is lesser than the yield strength of the material. From the results, the bush is suitable for particular operating conditions.
Download
20 Analysis of Biomass Feedstock before and after the Anaerobic Digestion Process
S. Paul, P. C. Roy
Abstract - The production of biogas depends on several factors such as feedstock, pH value, temperature, organic loading rate, volatile fatty acid etc. In the present work a 25L capacity single stage anaerobic digester has been designed and fabricated with its accessories. Cauliflower waste of 1.3kg (dried in sunlight), 1.7kg of fresh cow dung, and 14L of water mixed properly have been used for anaerobic digestion at mesophilic condition at 37oC. Complete analyses of biomass feedstock before and after the digestion process have been carried out. After 21 days of observation, it was found that the total solid of the feedstock has decreased from 8.08% to 6.72%. A decrease of percentage of volatile solid from 6.9% to 5.43% and the pH value of the digester becomes 4.73 from 7 have also been observed and discussed.
Download
21 Sentiment Analysis of Twitter Data using CNN
Dr.Balika.J.Chelliah, Darshan Lathia, Sandeep Yadav, Meet Trivedi, Shubham Sagar Soni
Abstract - Classification of opinions through tweets and other micro-blogging sites entails a great scope of study and can yield interesting outcomes and insights on social behaviour and public opinion towards different products, services, events, geopolitical issues and situations and scenarios that affect mankind at large. Through this paper, we propose a multidimensional sentiment classification method based on micro-blog emotion classification of twitter data through the use of Convolution Neural Networks. In this paper we will be using n-gram features on words with word-sentiment polarity score feature to form a set of tweets with sentiment feature where a large corpora of data would be obtained through unsupervised learning and this would be utilised as training set and testing set using cross-validation. Moreover, we shall be using these features to classify the emotion in five categories such as happiness, anger, sorrow, fear and surprise and differentiate data through geotagged information. The feature set is integrated deeply into convolution neural networks and its performance is compared with other methods such as SVM and Naive Bayes.
Download
22 Intranet Chatting System
Deeksha k, P. Hemashree
Abstract - This Project Entitled as ‘Intranet Chatting System’ is basically used for chatting purpose with the remote clients or users on Intranet or local networks. Here in this project a Php client / server combination with backend as MongoDB is used to chat with remote users. When a Client wants to chat with a user on a remote host, he sends a request to the Server with an identification name like chat-id, the server responds to the request by identifying the client-id which is already registered in the server domain and when matched his request is granted and the client can begin to chat with the remote users present on the Intranet or local network. The power of Intranet is such that it integrates together interconnection located across diverse software and hardware forms into a single large communication network that spans the networks. The client needs to have client software such as browsers to retrieve information as well as chat on the www.
Download
23 Experimental Investigation on Process Capability & Process Capability Index in Grinding Machine
M.Prabakaran, P.Viswabharathy, V.Prakash, N.Rajarathinam, P.Rajagopal, M.Sivarajan
Abstract - Quality is a state of a finished product, being free from defects, deficiencies and significant variations. This measure of an excellence can be brought about by the strict and consistent adherence to measureable and verifiable standards to achieve uniformity of output that satisfies specific customer or user requirements. This paper gives a proposed methodology for to increase the quality of a product manufactured in a grinding machine, using the various quality improvement tools like Cause and Effect diagram and Statistical Process Control Charts. The key note in using these tools is because of ease way to detect the problems and solutions for the same. The quality improvement is accompanied by the changes in machining parameters of a grinding machine and the optimization of those changes reflects as an increase in the acceptance level of the product in the world market.
Download
24 IOT Based Real Time Transformer Health Monitoring System and Phase Preventor
P.G.Navamanikumar, S.Agnesha, P.Gowsalya, K.Indhu, N.Sivasakthi
Abstract - Transformer is one of the important electrical equipment that is used everywhere. Monitoring transformer’s health had become a fiery task. Since incase of any damaged in the internal properties of the transformer will result in huge drawback. So it is mandatory to regularly keep an eye of the transformer. The main objective of this proposal is to acquire live data of transformer health remotely over the internet using Internet of Things (IOT) technology. We are going to monitor the transformer parameter such as temperature, current and voltage. These data will be sent over internet using MQTT protocol. In case of any power failure the user will be notified with an alert message using GSM Module. It also has a unique feature of detecting the phase failure. If any phase gets defect then it will indicated in the development board by an LED. These parameters will be displayed in an Android Application. By this process we can get to know the health of the transformer regularly and necessary step can be taken to maintain it in a proper way.
Download
25 Vehicle Tracking System with Alcohol & Accident Detector
Ramu S, Dinesh R, Sabarinathan U, Soundhar G, Shibumon R
Abstract - Everyday people die in motor vehicle crashes that involve an alcohol-impaired driver getting behind the wheel of a vehicle – car, truck, motorcycle or any other motorized vehicle after consuming alcohol is a serious crime. Drinking and driving is referred to as driving under the influence (DUI) or driving while intoxicated (DWI), and involves operating a vehicle with blood alcohol content (BAC) level of at least 0.08 percent. However, even a small amount of alcohol can lead to harmful situations. Aim of the project is prevent accident due to alcohol consumption if vehicle met accident any other causes means track the vehicle by GPS system also implementation of GSM send the SMS to nearby police station and hospital. Using MQ3 sensor detects the alcohol level and its feedback forwarded to embedded micro controller then vehicle ignition turned off. Vibration sensor detects the vehicle shock based on this GSM and GPS activated.
Download
26 An Analysis on Various Coal Samples for Improving Steam Generator Efficiency of a 210 MW Coal Fired Thermal Power Plant
Sudip Simlandi
Abstract - A major portion of electricity is generated across the world based on coal. However, use of coal leads to high level of unwanted emission of greenhouse gases. Due to the limitation of other energy sources, it becomes necessary to rely on coal based power plants. Hence, it is imperative to maximize the steam generator efficiency of the power plants and to minimize the use of coal as basic fuel. Therefore, in the present work, efficiency determination of steam generator of a 210MW power plant in India is considered using relevant data. The steam generator efficiency is determined adopting indirect method for five coal samples. Different heat losses of the steam generator have been calculated for the five coal samples to identify the most prominent losses. It is seen that coal sample-1 provides the maximum efficiency.
Download
27 Experimental Investigation on Leaf Spring using Luffa Cylindrical, Pine Apple and E-Glass Fiber with Resin
P. Sethuraman, R. Prakashraj, M. Vanchinathan, R.R. Vignesh, V. Vijay
Abstract - This chapter discuss the different loading conditions and a suitable composites is selected for the research of luffa cylindrica, pineapple and e-glass fiber with epoxy composite for leaf spring. Our attempt is to test the mechanical properties of composites reinforce by varying strudy are tensile strength, hardness and toughness. In present year’s natural and synthetic fiber composite material locale a major role in industries like aerospace and automobile. The composites formed by fibers gained attention due to their low cost, light weight, low density, high specific strength, non abrasivity, non toxicity etc. in this project discussed the Composite material plate by using luffa cylindrical, pineapple and e-glass fiber with Epoxy composite and to evaluate the Mechanical properties of leaf spring (Tensile strength, Impact and Hardness test).
Download
28 Design of an Inverter Using Ceiling Fan
D.H. Pachchinavar, Mohammed Iqbal Khatib, Md Abdul Feroz, Faizan Hussain
Abstract - A fan is a machine used to create flow within a fluid, typically a gas such as air. The fan consists of a rotating arrangement of vanes or blades which act on the fluid. The rotating assembly of blades and hub is known as an impeller, a rotor or a runner. Usually, it is contained within some form of housing or case. Fans are the most used items in India despite the widespread availability of Coolers and air conditioners. Since the initial capital cost of solar systems is still quite high. When it comes to generate power for a domestic use and energy saving. Since energy generating is a major issue for mankind .This paper presents method of generating power by a ceiling fan. The generated power can be either used or can be stored in a battery for powering some other devices.
Download
29 Design and Fabrication of Thermoelectric Solar Refrigerator
S. Vijayarengan, R.Sooriyaraj, G.Vinithraj, C.Venkatesan, A.Vinoth
Abstract - The global increasing demand for refrigeration, led to production of more electricity and consequently more use of chlorofluorocarbons (CFCs) which acts as a contributing factor in the depletion of ozone layer. Thermoelectric refrigeration is new alternative because it can convert waste electricity into useful cooling. Therefore, thermoelectric refrigeration is greatly needed, particularly for developing countries where long life and low maintenance are needed. The objective of this study is to design and develop a working thermoelectric refrigerator that utilizes the Peltier effect to refrigerate and maintain a selected temperature. The requirements are to cool this volume to temperature within a time period of 2 hours and provide retention of at least next half an hour. Our project also utilizes the solar energy to run a thermoelectric system. In this project we have fabricated a thermoelectric system using both solar power and electrical power supply. The project has various applications like, food preservation, military or aerospace, medical and pharmaceutical equipment.
Download
30 Four Factor Authentication in Web Security
B. Divagar, CH. Sandeep, V. Uday Bhaskar, K. Sai Akhil, CH. Dheeraj Kumar
Abstract - System a spelling based Puzzle system, named And password spell. The proposed scheme, we present a new security primitive based on hard AI problems Click spell, not only tries to improve both security and usability of Puzzle, but also aims to expand the applicability of Puzzle CAPTCHA. Click spell attempt to achieve following goals: Security: Puzzle Login using bubble sort. Usability: To increase the rate of passing the test. Extensibility: To provide a dictionary function for users to learn about the meaning and the spelling of words. In addition, an advertisement can be placed on the top of CAPTCHA images. Security: Image Puzzle solving Using Aes Algorithm OTP Generation.
Download
31 Brain Computer Interface for Home Automation to help Patients with Alzheimer’s Disease
Ahalya Mary J, Parthsarthy Nandi, Ketan Nagpure, Rishav Roy, Bhagwan Kishore Kumar
Abstract - The brain computer interface is a way of communication between the human brain and different appliances. BCI helps in the restoration of natural moments of the human body with respect to the neural signals in an artificial manner. Brain emits different signals with multiple frequency and amplitude. The signal generated by brain was received by the brain sensor and it will divide into packets. The packet data is then transmitted through wireless medium (blue tooth). The Raw Data i.e., the EEG signals are received by the level analysis platform which is a MATLAB GUI. This GUI will convert the signal for the operation of the Home Application modules. The working of the Home Application module works on the muscle contraction while blinking which act as ON/OFF. Now when a person suffering from the starting phase of dementia i.e., Alzheimer’s can use the BCI for accomplishing different day to day works using the above method.
Download
32 Information Concealment in Images Using Least Significant Bit and Pixel Selection Function
Digvijay Singh Sengar, Aditya Shrungi, Anand Singh Kamlesh, Roshan John
Abstract - Steganography is the process of hiding a secret message within a cover object/message and obtaining it when required. Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will be unable to know it contains encrypted data. Images are the most popular cover objects for Steganography and are one of the most widely used media which further helps the concealment. In this paper the existing LSB (Least Significant Bit) replacement technique is being improved upon by creating another layer of selection which can be made by the user. LSB replacement is simplest one to understand, easy to implement and results in stegno-images that contain embedded data as hidden. The disadvantage of Least Significant Bit is that it is vulnerable to steganalysis. This aspect is being improved on by replacing LSB in the pixel selected by user-given function.
Download
33 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
S.S. Subashka Ramesh, M. Venkatesh Yadav, B. Sathya Narayana, T. Rohith, K. Revanth
Abstract - The Benefited from Cloud Computing, clients can achieve a flourishing and moderate methodology for information sharing among gathering individuals in the cloud with the characters of low upkeep and little administration cost. Then, security certifications to the sharing information records will be given since they are outsourced. Horribly, attributable to the unending amendment of the enrollment, sharing data whereas protectively saving remains a testing issue, notably for associate degree untrusted cloud owing to the agreement attack. additionally, for existing plans, the protection of key dispersion depends on the safe line, then again, to possess such channel may be a solid feeling and is tough for apply. during this paper, we have a tendency to propose a secure data sharing arrange for part people. Firstly, we have a tendency to propose a secure route for key dispersion with no safe correspondence channels, and therefore the shoppers will safely acquire their personal keys from gathering administrator. Besides, the arrange will accomplish fine-grained access management, any consumer within the gathering will utilize the supply within the cloud and refused shoppers cannot get to the cloud once more once they're rejected. Thirdly, we can protect the plan from trickery attack, which implies that rejected clients can't get the first information record regardless of the possibility that they scheme with the untrusted cloud. In this methodology, by utilizing polynomial capacity, we can achieve a protected client denial plan. At long last, our plan can bring about fine productivity, which implies past clients need not to overhaul their private keys for the circumstance either another client joins in the gathering or a client is give up from the gathering.
Download
34 Spoofing Detection for Fingerprint, Palm-Vein and Facial Recognition Using Deep Representation
R. Augustian Isaac, Aditya Kathera, K.H. Venkatachalam, Moturu Tarun Raj, G.Gokulnath
Abstract - The authentication scheme is a crucial science mechanism, through which two communication parties might attest one another within an open network setting. To satisfy the necessity of sensible applications, several authentication schemes, strong passwords and good cards are projected. However, passwords may be disclosed or forgotten, and good cards may be shared, lost, or stolen. In difference, biometric strategies, like face, fingerprints or palm vein scans, do not have any such drawbacks. For the system, three biometric traits are collected and are stored in the server at the time of registration. The Multimodal biometric based systems are extremely secure and are economical to use. These systems are sometimes vulnerable to wordbook attacks initiated at the server end. In this paper, we propose a Spoofing detection model for finger print, palm vein and facial recognition biometric identification for user authentication and key exchange system. In this system, we extract the texture property area unit from the palm vein, finger print and face images and are stored as encrypted binary guide within the user’s information, to prevent the wordbook attacks mounted by the server. The image processing technique helps to extract a biometric measurement from the palm vein, finger print and face. Throughout the login process a mutual authentication is performed between the server and user end. The feature value generated is matched with that of the database images feature value and thus identifies if any spoofing occurs. This technique also prevents any meet-in-the middle attack that happens between the user and the server.
Download
35 Voice Operated Smart Notice Board Display Using Android
Satyarth, Jabir Sheikh, Aayushi Patankar, Mohini Mourya, J.M. Bhattad
Abstract - The paper brings in a smart android based notice board display system that enables users to display the messages to be conveyed without typing or writing it. In this the conveyor says after pressing the dedicated soft key through an android smartphone which employs a developed speech to text phone application. The text message is then transferred via Ethernet stacked with Arduino using Wi-Fi Dongle working as repeater and is then displayed on the LCD screen. This project also enables longer connectivity that is over Wi-Fi compared to Bluetooth which are currently used for wireless display. This saves time, labor and its charges, most importantly paper hence eco-friendly and it can be achieved over long distance.
Download
36 Numerical Analysis on Influence of Side Rake Angle on Stress Development in Single Point Cutting Tool
J.Prasanth Kumar Yadav, A.Prasad Yadav, Dr.G.Maruthi Prasad Yadav
Abstract - Machining is process where material is removed from the work piece due to the contact of the work piece with cutting tool. During this cutting process, tip of the tool is going to witness the high stress due to the generation of high heat in the tip by contact of tip tool with work piece. For single point cutting tool most important geometry are rake angles (side & back rake angles). The rake angles affect the ability of the tool to shear the work material and form the chip. It can be positive or negative. In relation to minimize stresses induced at tip of the tool, this attempt aims to predict the effect of the side rake angles in the tool geometry over the tool. In this study by inducing the forces on the tip of the cutting tool and by changing the tool geometry (side rake angle), the stress concentration over the tip of the tool is calculated. The modelling of tool is carried in CATIA V5 R20, followed by structural analysis using the same CATIA V5 R20 (Generative structural Analysis) Analysis study on single point cutting tool is carried out by varying the side rake angle value which aids in minimize the stresses developed within the tool. Results indicate that the side rake angle has significant influence on stress development and through this analysis the recommended side rake angle is determined.
Download
37 Optimum Design and Development of Mechanized Food Processing Machine with Oil Extractor
Amitkumar Bharatkumar Solanki, Savaliya Bhavikkumar Mansukhbhai, Mayani Dipakkumar Jayantibhai, Savaliya Kundan karshanbhai
Abstract - The goal of this research paper is propose the optimum design and development of mechanized food processing machine with oil extractor for domestic and food industries. This is device that squeezes the duff mixture of fast food and produce food strings and also this machine can extract the oil from various oleaginous seeds with categorized efficiency such as time, human effort, safety, cleaning and quality during the food making and oil extraction using screw extruder with fully automatic way. This mechanized food processing machine can produce food string from duff mixture of food using screw extruder using electric power and extruded out with help of rotating conveyor from machine die to away as near to operator and recovery of extracted oil and useful crush of seeds when oil extract with the help of additional heating device which provide required heating during oil extraction. Therefore the process will be low cost, high quality, high performance and also gives high production rate.
Download
38 Influence of Co2+ Ions on Structural and Magnetic Properties of Co-Precipitated Mg-Cr Nanoferrite
S.Sukandhiya, B.Uthayakumar, S.Periandy, R.Sujatha, S.Uthiradevi
Abstract - Co2+ ions doped Magnesium - Chromium nanoferrite (x= 0.0, 0.2, 0.4 and 0.6) synthesized by Co-Precipitation method with pH as 10. Prepared samples are sintered at 1173K. Influence of Cobalt ion on structural and magnetic properties of CoxMg1-xFe1.5Cr0.5O4 nano ferrite was reported here. The structural parameters were estimated by X- ray Diffraction (XRD). Morphology and composition of the synthesized samples has been evaluated Scanning Electron Microscope (SEM) and Energy Dispersive X-ray Spectroscopy (EDX) respectively. The spinel formation have been investigated by Fourier Transform Infrared Spectroscopy (FTIR) and two prominent absorption bands n1 and n2 corresponding to the stretching vibration of tetrahedral and octahedral sites around 600 cm-1 and 400 cm-1. The magnetic parameter such as Saturation magnetization (Ms), Remanent magnetization (Mr), Coercive field (Hc) and Squareness ratio are determined by Vibrational Sample Magnetometer (VSM). The XRD pattern shows synthesized nano powder samples are having cubic spinel structure with average crystallite size ranging from 49 to 57 nanometers. It is found that the lattice constant, lattice strain, and dislocation density value non-linearly varies with increase in Co ions of Mg-Cr ferrite. The magnetic parameters changes with respect to increase in concentration of Co2+ ions. Maximum Anisotropy obtained at x= 0.4. Minimum coercivity value obtained at x=0 and x=0.2.
Download
39 Effect of Fe3+ Ions on Structural and Magnetic Properties of Co-Precipitated Strontium Cobalt Chromite
B. Uthayakumar, S. Sukandhiya, S. Periandy, S.Uthiradevi, R.Sujatha
Abstract - Pure and Fe doped nano Strontium-Cobalt Chromiteswere synthesized by Co-precipitation method with pH as 10. Effect of doping Fe (x= 0.0, 0.5, 1.5 2.0) on structural and magnetic properties are reported in the present work. All samples are sintered at 1173 and characterized. X- ray Diffraction (XRD) used to reveal phase and structural parameters. Morphology has been obtained from Scanning Electron Microscope. Compositions of the synthesized samples are scaled with Energy Dispersive X-ray Spectroscopy (EDX). FTIR is equipped to record vibration of nanoferrite sites and two prominent absorption bands n1 and n2 corresponding to the stretching vibration of tetrahedral and octahedral sites around 600 cm-1 and 400 cm-1. The magnetic parameter such as Saturation magnetization (Ms), Remanent magnetization (Mr), Coercive field (Hc) and Squareness ratio are determined by Vibrational Sample Magnetometer (VSM). The average crystallite size calculated from XRD pattern and it ranging between 41.7 and 57.8 nanometers. Maximum Anisotropy constant obtained at x= 1.5.
Download
40 Optimal Road Trip Planning with Hybrid Genetic Algorithm
V. Arun, Harsh Pandey, Himanshu Badlani, Rishi Pratap Singh Sisodiya, Anshum Sethi
Abstract - Finding an accurate and optimal model for traffic forecasting has always been of utmost importance.Through this paper we will be focusing on achieving the above aim through the use of Hybrid Genetic Algorithm which combines the features of local search with the adaptability and features of genetic algorithm thus enhancing local search and global search capabilities to forecast the most optimal route for the trip. Given how dicy and diverse road trips can get especially in a varied terrain country such as India, it will be of great benefit if there is an optimal route response with respect to the constantly changing state. Through this paper, we propose an algorithm that shall yield the optimal route taken into consideration the maximum tourist points that can be visited or traversed between the initial and final points.
Download
41 Public Information and Welfare System
Aindrila Samanta, Farheen Khan, S. R. Sushmitha
Abstract - Public Information and Welfare System is an android application uniquely designed to improve the connectivity between the citizens and the emergency services like Police and Hospitals. This application specifically focuses on the law and order system, as well as the health care system of a city and helps the users locate the nearest police station, lodge a complaint or request for services like passport verification, job verification etc. Furthermore, users can locate the nearest hospitals, add reviews, give feedbacks and book an appointment swiftly. This is a smart city project aiming at simplifying the lives of citizens through technology.
Download
42 Secured Communication for Mobile Applications
C. Santhosh Kumar, C. Devasenapathi
Abstract - Mobile devices allow us to do nearly everything online from anywhere, at any time. We can do our banking, track our fitness, control Internet of Things devices in our homes, shop, and even work remotely. Driving this mobile productivity are a multitude of mobile apps software that connect to APIs and servers around the world to deliver data, services, and ultimately, value and convenience to users. In this paper I am going to analysis the ranking fraud and what are the proposes of ranking fraud detection system for mobile applications store. Ranking fraud is the term used for referring to fraudulent or suspicious activities having the intention of boosting up the Apps in the popularity list. In fact, App developers are using tricky means frequently for increasing their Apps sales. Finally I examine the proposed system with real-world applications data collected from different-different applications store. I am validating the adequacy of proposed algorithm, and show how it will detects some regularity of fraud activities.
Download
43 Object Detection Using Image Processing With LTP Features
Deva Hema, Pavan Kumar K, M Harish Devarayal, G Bharath, N Sai Harish
Abstract - Object detection is a very important, nonetheless difficult vision task. it's a crucial half in several applications like image search, image auto-annotation and scene understanding. The target of the projected methodology is to find the item mistreatment image process with LTP options. The projected methodology is split into two parts, image classification and cluster methodology. during this classification half, LTP (local ternary pattern) options accustomed match the dataset image. This LTP options extracted from the input de-blurred image. Finally, the item is assessed so object is detected mistreatment cluster ways.
Download
44 Face Recognition Using a Fuzzy Approach from a Video Sequence
Nilesh Kumar, Vivek M Nair, Shaikh M Rizwan, Abhishek Singh, Vijayalakshmi K
Abstract - Digital images and video are playing key roles in the present information era with increasing development in the computer science field. Human face being an important biometric object for Unique Identification in any System. In a Complex Environment such as in videos where noise conditions, illuminations, locations of subjects and pose can vary, it becomes tedious task to identify and locate human face and extract their facial features. This paper proposes a method of classifying the Human Face recognition using Dominant Rotated Local Binary Pattern (DRLBP) & Convolutional Neural Network (CNN).
Download
45 Classification of Mushrooms using Supervised Learning Models
Balika J. Chelliah, S. Kalaiarasi, Apoorva Anand, Janakiram G, Bhaghi Rathi, Nakul K. Warrier
Abstract - Mushroom hunting is becoming increasingly popular as a leisure activity, it is paramount that we have some way of classifying them as poisonous or non-poisonous. Using supervised machine learning models on the dataset that UCI makes available of various characteristics of mushrooms, we can get a prediction system that can classify mushrooms. The inspiration of this project is to understand which machine learning models work best on the dataset and which features are most indicative of poisonous mushrooms.
Download
46 Monitoring The Gas cylinder Level and Gas Seepage Detection through IOT
Mohd Abid
Abstract - The proposed design system explains about the most common problem experienced in our day- to- day lives that is regarding GAS container going empty. The purpose of the system is, to create awareness about the reducing weight of the gas in the container, and to place a gas order using IOT. A load cell is used for the continuous weight measurement of gas container, which is interfaced with an Arduino Uno (to compare with an ideal value). GSM modem is used to send the SMS to user. When it comes it to security of the system as well as gas container we have an MQ-2 (gas sensor), LM 35 (temperature sensor), which will identify the surrounding environment for any chance of error. Whenever any change is subjected in any of the sensors (load cell, LM35, Mq-2) a siren is triggered.
Download
47 Genetic Algorithm and Particle Swarm Optimization for Spectrum Sensing In Cognitive Radios
Shewangi, Roopali Garg
Abstract - During the past decade, wireless industry has increased rapidly due to which demand for bandwidth has increased. Recent study shows that the main cause of spectrum scarcity is inefficient use of Electromagnetic (EM) spectrum which is actually present in large quantity. To manage this problem, Cognitive Radio is the best approach. It allows the radio to run on different parameters, learn from it and sense it. This paper focuses on the spectrum sensing based on popular optimization techniques: Genetic algorithm and particle swarm optimization. They both are evolutionary algorithm and helps in solving optimization problems. This paper emphasize on general review of both the algorithm and their advantage.
Download
48 Experimental Study on Mechanical properties of Steel Fibre Reinforced Self Compacting Concrete
Shariq Masood Khan, Juned Ahmad
Abstract - Self-compacting concrete (SCC) is defined as a flowing concrete mixture that is able to consolidate under its own weight. The highly fluid nature of SCC makes it suitable for placing in difficult conditions and in sections with congested reinforcement. To improve the performance of SCC, polymers are mixed with SCC. It has been observed that steel fibre modified concrete has improved mechanical performance than conventional self-compacting concrete due to superior strength. This study aims to focus on the possibility of using steel fibre in a preparation of self-compacting concrete. The use of the steel fibre was proposed in different percentage as an addition of cement for production of steel fibre modified self-compacting concrete.
Download
49 Experimental Analysis of Lm25 (Al-Si7mg) Aluminium Alloy Welded Properties
Sreenivasulu Reddy.A, Narayana Swamy Naik.R, Narayana Reddy .B
Abstract - In recent years LM25 (Al-Si7Mg) Aluminum Alloy is widely used in various automobile parts. During solidification of LM25 Aluminum alloy some of the casting defects may be occurring and these defects are repaired with the TIG welding process. Finally, The Mechanical properties of repairing casting parts were tested and compared with the same base metal.
Download
50 Face Recognition Using a Fuzzy Approach from a Video Sequence
Nilesh Kumar, Vivek M Nair, Shaikh M Rizwan, Abhishek Singh, Vijayalakshmi K
Abstract - Digital images and video are playing key roles in the present information era with increasing development in the computer science field. Human face being an important biometric object for Unique Identification in any System. In a Complex Environment such as in videos where noise conditions, illuminations, locations of subjects and pose can vary, it becomes tedious task to identify and locate human face and extract their facial features. This paper proposes a method of classifying the Human Face recognition using Dominant Rotated Local Binary Pattern (DRLBP) & Convolutional Neural Network (CNN).
Download
51 Speech Enhancement and Speech Emotion Recognition from Features Extraction on NN Classifier
S.Muthamilselvan, Vuppula Srinath, Peddi Mahesh Kumar, Battina Kalidas, Amireddy Tharun Reddy
Abstract - The project presents speech emotion recognition from speech signal based on features analysis and NN-classifier. Automatic speech emotion recognition plays an important role in HCI systems for measuring people’s emotions has Dominated psychology by linking expressions to group of basic emotions (i.e., anger, disgust, fear, happiness, sadness, and surprise).The process of recognition involves the voice ,which depends on some of the factors they are frequency and related to that ,for each distinct expression there is a sample which is available in its data base and when we give inputs to the compiler through audio file format and in form of and remembrances the input audio by analogizing to the data base files through frequency levels then it shows the audio file is an expression from the data base gives the simulation through NN classifier by which the classification is done by lesser algorithmic complexity compared to other expression recognition approaches .
Download
52 Data Authentication and Theft detection for USB Flash Drive
Shoaib Ahmad, Apoorva Mishra, Uthra R, Akshaya P, K Subha
Abstract - The Internet of things (IoT) is the network of physical devices. Each thing is uniquely identifiable through its embedded computing system but is able to inter-operate within the existing Internet infrastructure. Data has always played the crucial part be it any field work. In the new, faster growing era of technology the data is being shared in numerous ways available - via USB flash drive being one of them and also most popular. The aim of this empirical study is to propose a more secured framework for data sharing via USB flash drive and also for the physical security of the device, using the classic security algorithm along with some theft detection techniques (like GPS, RFID) respectively.
Download
53 Detection of Path Holes, Speed Balancing and Owner Identification of Vehicles
SK. Deneyaz, MD. Taj
Abstract - One of the major problems of developing countries is the maintenance of roads. Well maintained roads contribute a major portion of the country's economy. Identification of pavement distresses such as path holes, unexpected vehicle breakdown due to over speed not only helps drivers to avoid accidents or vehicle damages, but also helps authorities to maintain roads. The proposed approach discusses about previous path hole detection methods that have been developed and proposes a cost-effective solution to identify the irregularities on road surfaces, balancing speed of vehicles and provide timely alerts to drivers to avoid accidents or vehicle damages along with owner identification. Ultrasonic sensors are used to identify the path hole. The proposed system captures the geographical location coordinates of the path holes using a global positioning system receiver. The sensed-data includes the geographic location of the path hole, which is stored in the database and displayed on LCD, a buzzer is also provided to alert the driver. This proposed system also controls the speed of the vehicle by using an accelerometer which calculates the changes in the accelerations and also analyses the vertical vibration signals produced by the vehicle, displays them on LCD and also alerts driver through a buzzer. Besides if any unauthorized person tries to start the vehicle, then by sensing the fingerprint of that particular person using biometric sensor an SMS alert will be given to the owner of the vehicle and the engine will be immobilized.
Download
54 ICT Tool: - ‘C’ Language Program for Shooting Method
P R Kolhe, M H Tharkar, P P Kolhe N Mirajkar
Abstract - In numerical analysis, the shooting method is a method for solving a boundary value problem by reducing it to the solution of an initial value problem. Roughly speaking, we 'shoot' out trajectories in different directions until we find a trajectory that has the desired boundary value. In the era of Information Communication Technology (ICT) .The ICT programming technique, it is easier task. One of the very popular programs in C programming is Shooting Method. This paper discuss Shooting Method in C language, source code and methods with outputs. The source codes of program for Shooting Method in C programming are to be compiled. Running them on Turbo C or available version and other platforms might require a few modifications to the code.
Download
55 Growth Analysis of Plant by Using Computer C Language Program
Prakash R Kolhe, P P Kolhe,Vishnu Jadhav
Abstract - For the maximum growth of crops, the scrutiny of growth and development in scheming methods is necessary. It is necessary to increase the yield of crops. This paper introduces that how can measure the growth analysis of a plan by using C language. Blackman (1919) introduced the growth of plant by an efficiency index of relative growth rate. Monsi and Saeki led to endeavor in rice breeder in the japan for developing more pervasive definition of better plant type and create model of crop photosynthesis. The research deals with the Growth Analysis of plant. The process includes some formulae for analyze the growth of plant by using C language.
Download
56 Analysis of Hybrid Natural Fiber Composite for Bio-Medical Application
T.Gopalakrishnan, J J Jayakanth, C.Gnanavel, R. Sridhar
Abstract - Composite materials have occupied major part in current era due to its light weight, good stiffness, high specific strength etc. The need to pursue an environmentally safer future has prompted the researchers to look beyond the artificial or synthetic fiber based composites and thought about the hybrid composite. The hybrid composite is obtained by compounding the natural fiber with artificial or synthetic fibers in the reinforcement phase. For the current work the natural fibers of banana and jute fibers are combined with glass fibers for various volume fractions. The banana/ glass fiber with epoxy and jute/ glass fiber are analyzed. The fabrication of different sequence of composite in various volume fractions (30%, 40%, and 50%) is done by handy layup technique. The mechanical properties of all different composites are tested and the results are tabulated. From the result the better composite material is selected for the biomedical application. In the current project the bone plate are fabricated with the help of various structural patterns because natural fibers have the advantage that they are renewable resources, high strength, stiffness, acoustic isolation and low cost.
Download
57 Text Categorization and Text Mining Using Different Types of Classifiers
Stalin Jose J, DR.P.Suresh
Abstract - In recent times, text data mining has gained more attention in which text categorization is one of the most interesting fields. It has gained more popularity because of the rapid growth of textual documents. These documents are associated with selective large number classes such as medical, sports, Olympic Games and so on. This text categorization can provide several opportunities to develop multi-label learning techniques which particularly for text based information. Text data mining is the process of finding helpful learning patterns from the text based information, which is one of the key factors used by automatic text categorization. It is achieved by creating new machine learning techniques. In any case, the ML framework produces less expressivity. With the help of Train- Test scenario, this ML framework is deployed. In the event that the current framework is discovered insufficient, then the Train-Test-Retrain is produced that is tedious and time consuming process. In this paper, we have compared the performance of three classifiers such as Naive Bayes, Decision Tree J48, and Multi-Layer Perceptron (MLP) for a text mining dataset. The performance of all three classifiers is obtained through simulation and the experimental results are given. From the obtained results, it is known that the decision Tree J48 classifier provides better performance compared to other two classifiers.
Download
58 The Role of Emerging Technologies in Standardizing Language Teaching and Learning through 5C's
Dr. S.Mercy Gnana Gandhi, Dr.J.Amutha Monika
Abstract - Implementing the standards of language Teaching and learning is an amazing process since it influences assessment, communication, instruction through five ‘C’ is Communication, Culture, Connections, Comparisons and communities. This kind of implementation is applicable to learners at all levels. Since it is as application oriented learning beyond the classroom instructional setting, the students find it highly innovative and technologically interesting. In order to become globally competent, they develop excellent linguistic and intercultural skills themselves with wide array of communication. They learn to communicate effectively in numerous languages to face a variety of situations and for multiple purposes. Most of the present day students involve in interactions relating to cultural practices and products. They offer themselves to connect with other disciplines and acquire wide range of information through diverse perspectives trying to work out the language in career related situations. They make comparisons between languages and develop insight to interact with cultural competence at home and around the world. The goal of this paper is to stress the application of skills measured by the standards, to bring out a natural global competence to their careers, experiences and expectations and thereby standardizing the teaching learning process.
Download





Publication Process

Accepted papers will be published online immediately,upon receiving the final version from the authors in the recent upcoming issue.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: editor@ijeter.everscience.org

Copyright

COPYRIGHT © EverScience Publications