1. EXPERIMENTAL STUDY ON USAGE OF TYRE SCRAPS AS A STABILIZING MATERIAL FOR SUBGRADE OF FLEXIBLE PAVEMENT

Authors -  Arunita Pal, Ashok Kumar Mandal, RA.B.Depaa

Abstract :  This study throws light on the suitability of waste materials like Marble Dust, Marble Chips and Tyre Scraps as soil stabilizer for use in pavement. The role of marble dust, marble chips, and tyre scraps in improving the characteristics of expansive subgrade material is analyzed. The amount of cost savings for a pavement when it is stabilized separately with marble dust, marble chips and tyre scraps is also studied. Initially, the physical properties of clay and marble dust have been studied by conducting wet sieve analysis, Liquid Limit and Plastic Limit tests. Then, for the purpose of determining the strength of virgin and stabilized materials, California Bearing Ratio (CBR) tests have been conducted. The results of the experimental research show that marble dust, marble chips and tyre scraps can effectively be used as soil stabilizer for subgrade as the CBR value is increased. A considerable amount of cost savings is also possible when the expansive clay soil is stabilized with marble dust, marble chips and tyre scraps.
Keywords : Pavement, Stabilizer, subgrade, expansive

PDF - Download Full Article

3.COMPUTING & INFORMATION SCIENCE DEGREES WITH EMERGING FLEXIBILITIES AND ENTRY LEVEL CRITERIA: STUDY OF MSC PROGRAMS IN IT AND COMPUTING FIELDS IN INDIAN PRIVATE UNIVERSITIES

Authors -  P. K. Paul, A. Bhuimali, P. S. Aithal

Abstract :  The world is changing and purely depends on Information rather computer. And for information affairs Computing and similar devices and technologies are very much important in current time. The domain initially started with Computer Science but these days the concept of applied science and interdisciplinary sciences lead various other domains and nomenclatures. The popular programs in the field available with BSc and MSc degree, while in India and few other countries the Computing and Information Sciences related programs also offered as Engineering Degree and thus BTech and MTech programs are also offered. In some countries and universities instead of BE (Bachelor of Engineering) and ME (Master of Engineering) nomenclature are also being offered. In India, the field is available with Science and Engineering in general, however here another discipline is popular with BCA and MCA tag for the candidates of diverse background. In India, Higher Educational Institutes have risen in recent past and among the universities, the categories of Private funded institutions have been increased enormously. The worldwide changes in the academic model, platform, curricula, and eligibility criteria also affect and change the Indian Education System with special reference to Private Universities. Initially, Science programs were open only for science background (except BCA and MCA) but recently non-science candidates are allowed to pursue science based courses. In case of MSc degree in the field of Computing and IT or simply Information Sciences the tradition of science backgrounds become changed; this paper in this respect explores a lot with reference to the initiatives of the private universities in India.
Keywords : Information, IT, Computing, MSc, Masters Degree, Any Degree, Interdisciplinary, India, HEIs, Private Universities, Information Sciences in India.

PDF - Download Full Article

4. GAIT ANALYSIS AND MACHINE LEARNING FOR UNIQUE BIOMETRIC IDENTIFICATION OF INDIVIDUALS (GMLUBI)

Authors - Greshma KP, V Vineet , Rishav Gupta, and P. Mohamed Fathimal

Abstract :  Human identification has become a flourishing area where different techniques are used for identification and verification, each of them having separate and exclusive claims and challenges. Gait analysis refers to the study of animal locomotive behaviour which includes body mechanics, and the activity of muscles. It has applications in various fields such as medical diagnostics and osteopathic utilizations. A unique application of gait analysis is biometrics and identification. This paper describes a representation of gait analysis by identifying people based on their gait patterns. The steps include background modeling, feature extraction, and processing on neural network. The background model is built by getting input from a high-resolution camera which detects the movement. This input in the form of raw RGB video frames which is then passed to a neural network which measures gait biomechanics. This helps in feature extraction of the biometric information such as pace, step angle, height from torso to feet and hand displacement. The created data set will be processed, followed by identifying humans by their unique gait pattern using SVM classifier and neural network. This network consists of two subnet works linked in cascade- Joint identification and tracking (for pose estimation) and Gait recognition and estimation (for gait recognition). Using machine learning in combination with traditional, computer-based gait analysis, one can perform biometric identification while learning the user’s locomotive style.
Keywords : Gait analysis, Feature extraction, Neural Network..

PDF - Download Full Article

5. PROFESSIONAL KEY MANAGEMENT TECHNIQUES AND SECURED MAPPING SCHEMES THROUGH WIRELESS DATA CENTRIC SENSOR NETWORKS

Authors - B. Jareena Banu, D. Sobya, S. Nallusamy

Abstract :  Currently there are many unmanned wireless data centric sensor networks developed for sensing data in different environment conditions facing several security problems, due its unattended nature and its lack of tamper resistance. If the mapping relation between a detector node and a storage node is known to the attacker, the node can be easily compromised. Hence, in this research different data location mapping schemes are utilized to protect against the mapping attack and efficient key management techniques are used to improve the data confidentiality and authentication. Further keyed bloom filter scheme is used to defend against query attack and to optimize the query process. Hashed message authentication code is framed with the established pairwise key and sent several hops down to mobile sink to improve data authentication. Network simulator of NS2 tool is used and from the observed results it was found that, reduced message overhead and message transmission delay and improved privacy level were obtained.
Keywords : WDCS, Security, Mapping Attack, Query Attack, KBF, HMAC

PDF - Download Full Article

6. ENHANCEMENT OF OVERALL EQUIPMENT EFFECTIVENESS THROUGH IMPLEMENTATION OF TOTAL PRODUCTIVE MAINTENANCE

Authors - J. Logeshwaran, RM. Nachiappan

Abstract :  In the present competitive world most of the manufacturing industries are skirmishing by providing their best productivity. In this research article an attempt was made to analyse and implement the total productive maintenance system to improve the overall equipment effectiveness in a manufacturing industry. The details of application of overall equipment effectiveness of the industry are also presented. The current position in the production system, effectiveness of the maintenance system, condition of the machines, workers skill and utilization of the machines can be determined by the calculations of overall equipment effectiveness. Down time of machines which affects the overall productivity have been identified and the results are presented. From the results, after implementation of total productive maintenance cycle time for the identified operation has been decreased from 15 hours to 11 hours. Saving of 4 hours it means by using OEE performance and productivity is improved about 5%. Similarly, the availability of the machines has also been increased up to 90%.
Keywords : OEE, TPM, 5S, Productivity, Cycle Time, Breakdown

PDF - Download Full Article

7. MITIGATING SHOULDER SURFING ATTACK USING GRID AND COLOUR MATRIX

Authors - Deepa R, Vidhya Ashok

Abstract :  In real-time processing, when the user enters the Personal Identification Number (PIN) as a numeric password in mobile or stationary system, including smart phones, tablet computers, Automated Teller Machines (ATM), and Point Of Sale (POS) terminals, a direct observation attack based on shoulder surfing becomes a great concern. The PIN entry can be observed by nearby adversaries, more effectively in a crowded place. The same PIN is usually chosen by a user for various purposes and PIN may cause the user a great risk. To cope with this problem, developing an application which is between the user and the system,  in each round a regular numeric keypad is colored at random, To address this problem, text can be combined with images or colours to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this proposal, two techniques are proposed to generate session passwords using text and colours which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.
Keywords : Personal Identification Number, Shoulder-surfing attack, User authentication, Grey and Color Matrix

PDF - Download Full Article

8. COMPARATIVE STUDY ON E-COMMERCE WITH ERP ON SPECIFIC REFERENCE TO ONLINE SHOPPING

Authors - L. Parthasarathy, Dr. S. Tameem Sharief

Abstract :  A system related administration which is much concern that is incorporated with ERP Business software. It comprises of one application, one user interface, one database for the entire process, while dissimilar system governed sales, distribution, manufacturing, and finance. Among the organizations, an E-dealing is used for clientele transaction with the sustenance of communication and network information, particularly utilizing cyberspace covering like e- chain armor and web services, effectively arrived to global client. Adoption of Cyber trading results, specifically wo-way businesses (B2B) outcome is easily understood by the traditional ERP Business software of the smallest, size medium and out-sized industries. Integration of ERP which is functioned inside around all the areas of organization was designed by the standard ERP Business software’s and it also introduces package solutions with a Web-interface need to extend SCM, Net -enabled CRM, and various pattern of Internet -business organization. The contemporary ERP Business software’s are completely incorporated with Cyber dealing supply chain solutions likee-procurement, seller -oriented marketplaces, exchanges and auction, etc. The part of research in several fields, whereas the increasing connection of ERP in Cyber dealing and its reactions in society has focused the attention of this investigation in analyzing the data which will give the outline about of Non-ERP and ERP Business software. The analysis were executed as suggested, for observed outcomes it clearly denotes that there is a major relationship amongst the ERP integrated system software’s and Cyber dealing in the industry that helps in promoting productivity and assists to offer consistent and efficient service to its business traders while making sure to accomplish similar  from the vendors. Finally, from the outcome there will be unanimous elevation that was done by the technical part along within the management innovations. The effective integration of Cyber dealing and ERP takes full advantage of the responsibility of enterprise to dynamic market, encounter the distinct requirements for the users and grow the enterprises to achieve further economic benefits in the environment that is much economical within new market.
Keywords : Business and Customer (B2C), E-Commerce, Enterprise resource planning (ERP)

PDF - Download Full Article

2. IS INDIAN COMPUTING ACADEMIC UNITS ARE INTERESTED IN THE AREAS OF IT? A CASE OF CLOUD COMPUTING & VIRTUALIZATION

Authors -  P. K. Paul, P. S. Aithal, A. Bhuimali

Abstract :  Computing is one of the emerging and rapidly changing fields. The field is responsible for the development of diverse areas. Initially within Computing, Computer Science was core and main subject and gradually many other subjects have been originated viz. Computer Engineering, Computing, Computer Applications, Information Technology, Information Systems, Informatics, Information Management etc. Though there is a difference in between Computing related fields and Information related fields. Computer Science is theoretical in nature and mainly deals with the mathematical affairs for the study, evaluation, design and development of computer systems. Though Computer Engineering is mainly focuses on design and development and partially software systems. As far as Computer Application is concerned it is purely concentrated on software technologies. Information Technology whereas concentrated on the information related affairs and allied technologies viz. Networking Technologies, Database Technologies, Communication Technology, Multimedia Technology, Web Technology etc. In India, common academic programs of Computing and IT mainly concentrated on the nomenclature Computer Science, Computer Application, and Information Technology. Among the emerging subjects, few important are Big Data Technologies, Cloud Computing etc and these are rising as an academic program as well in different universities internationally. Though the areas of Information Technology in Indian academics have several disparities compared to international universities. However, in recent past Indian academics, mainly private bodies are moving towards some of the applied areas of IT within the department, programs of Computing. This paper deals with the basics of computing and IT related subjects especially the trend of applied computing emphasizing cloud computing in Indian private universities.
Keywords : Computing, Indian Universities, Higher Education, India, Development, Cloud Computing, Emerging Degree, New Age Program, Private Universitie

PDF - Download Full Article

9. NECESSITY FOR LAWS ON UTILITY PATENT IN INDIA

Authors -  JOSEPH ARISTOTLE .S & S.SHANTHAKUMAR

Abstract : In India, there are innumerable inventions that may not satisfy the stringent necessities of patentability but are novel, utilitarian and creative in their own circles. Such 'utility models' or 'petty patents' or 'innovative patents' are Utility Patents and the same are forms of Intellectual properties that deserve to be protected. Such inventions are also recognised in numerous countries under Utility Patent law. However, no such Intellectual property protection law is yet available in India. Consequently, do we need a law on utility patent in India?  

Keywords : Petty Patents, Innovative Patents, Utility Patents.

PDF - Download Full Article

10. EFFECTIVE PERFORMANCE OF WINDMILL TURBINE BLADE USING COIR AND E-GLASS FIBER

Authors -  P. Prathap, M Arun Prakash, Kamalakannan

Abstract : Environmental awareness today motivates the researchers, worldwide on the studies of natural fibre reinforced polymer composite and cost effective option to synthetic fibre reinforced composites. The trend toward ever larger offshore wind farms continues unabated. Wind turbines with rotor blades measuring up to 80 meters in length and a rotor diameter of over 160 meters are designed to maximize energy yields. Since the length of the blades is limited by their weight, it is essential to develop lightweight systems with high material strength.
The lower weight makes the wind turbines easier to assemble and disassemble, and also improves their stability at sea. With low cost and high specific mechanical properties, natural fibre represents a good renewable and biodegradable alternative to the most common synthetic reinforcement, i.e. glass fibre. By improving the design and materials used, we hope to reduce the weight of the blades and thus increase their service life. Despite the interest and environmental appeal of natural fibres, there use is limited to nonbearing applications, due to their lower strength compared with synthetic fibre reinforced polymer compositeConsequently, do we need a law on utility patent in India?  

Keywords :Environmental awareness

PDF - Download Full Article

11. AUTOMATIC FACIAL EMOTION ANALYSIS SYSTEM USING DEEP FEATURE LEARNING

Authors -  Dr.P.V.N.Reddy & A.Kaviya & M.Vishnupriya

Abstract : Most programmed articulation examination frameworks endeavor to perceive a little arrangement of prototypic   articulations, as an example, satisfaction, outrage, shock, and moreover concern. Such archetypal articulations, but can happen rather seldom. Human feelings and goals are a unit frequently conveyed by changes in one or few distinct facial highlights. The key check of face acknowledgment is to form viable part portrayals for decreasing intra-individual variation while growing the between individual contrasts. during this work, we demonstrate that, all around settled by profound study and utilizing each ID of the face and confirmation motions as control associate degreed build up an Automatic Face Analysis (AFA) framework to interrupt down outward appearances in lightweight of each perpetual facial highlights (mouth, temples, eyes) and short facial highlights (developing facial wrinkles) in regarding frontal-see confront image succession. The AFA framework perceives fine-grained changes in outward look energetically units (AUs) of Facial Action writing (FACS). The framework has accomplished on a  traditional acknowledgment rates of ninety six.4 percent for higher face AUs and 96.7%  for bring down face Aus and also the testing LFW dataset, 99.15% face check truth is likewise accomplished. Contrasted and also the best past profound work result on LFW, the rate of error has likewise been fundamentally attenuated by sixty seven.
Keywords : Facial Action Coding System (FACS), Action Unit (AU), Automatic Face Analysis (AFA).

PDF - Download Full Article

12. AGRICULTURAL WASTE MATERIALS AS POTENTIAL ADSORBENT FOR TREATING INDUSTRIAL WASTEWATER

Authors -  Shobby Margret Lydia & Jayachandran.R

Abstract :
The textile industry generates huge amounts of wastewater which must be treated effectively in a bid to prevent water scarcity through re-use. In this chapter, the use of bio adsorbents from agricultural waste which included corn stalk and saw dust were used as bio adsorption carriers for textile water.
Color removal from textile effluents on a continuous industrial scale has been given much attention in the last few years, not only because of its potential toxicity, but also mainly due to its visibility problem. There have been various promising techniques for the removal of dyes from wastewater. However, the effectiveness of adsorption for dye removal from wastewater has made it an ideal alternative to other expensive treatment methods. In this review, an extensive list of sorbent literature has been compiled. The review evaluates different agricultural waste materials as low-cost adsorbents for the removal of dyes from wastewater. The review also outlines some of the fundamental principles of dye adsorption on to adsorbents.
Keywords : Agro waste, bio adsorbents.

PDF - Download Full Article
ISSN (Online): 2348-3105 | ISSN (Print): 2347-6729
Under the aegis of Pranavam Educational & Scientific Public Charitable Trust®
(An ISO 9001:2015 certified)
INTERNATIONAL JOURNAL ON RECENT RESEARCHES IN SCIENCE, ENGINEERING & TECHNOLOGY (IJRRSET)
Copyright @ Pranavam Publications. All rights reserved.