Papers by IJIRST - International Journal for Innovative Research in Science and Technology
IJIRST –International Journal for Innovative Research in Science & Technology, 2019
In a digital circuit theory combinational logic is a type of the digital logic implemented by Boo... more In a digital circuit theory combinational logic is a type of the digital logic implemented by Boolean circuits where the output is dependent of pure present input. A Carry save adder is one of the type of the digital adder that is used in the computer micro architecture to compute the sum of the three or more n-bit binary numbers in binary. It differs from other digital adders in that it outputs two numbers of the same dimension as the inputs one which is a sequence of partial sum bits and another which is a sequence of partial sum bits and another which is a sequence of carry bits. It has few advantages such as it produces all of its outputs in parallel resulting in the same delay as full adder. It has very little propagation delay when implemented. Carry Save adder plus ripple adder is equals to n+1. Two ripple carry adders is equals to 2n. It allows for high clock speeds. Though it is some advantages it also has some disadvantages such as we do not know whether the result is positive a negative. While performing modular multiplication. The behaviour of the efficient Carry Save Adder is designed using tanner eda tools which was useful and the currently existing carry skip adder is designed using xilnx software and lastly the layout for this research is designed with the help of multisim. With help of this research many newly created circuits can designed much smaller.
Nowadays two-wheeler is the most popular modes of transport. However, because of less protection ... more Nowadays two-wheeler is the most popular modes of transport. However, because of less protection there is a high risk involved. As a solution to this, it is highly desirable for bike-riders to use helmet. Observing the usefulness of helmet, Governments have made it punishable offense to ride a bike without helmet and have adopted manual strategies to catch the violators which has limitations of speed. Using video surveillance of the street, the proposed approach detects if the bike rider is wearing a helmet automatically without manual help. If a bike rider is detected not wearing a helmet, the number plate of the vehicle read and noted. A database will be generated with records to identify every offender accurately. The system implements pure machine learning in order to identify every type of helmet that it comes across with minimum computation cost.
A research study entitled, " Impact of Select Government Policies towards MSMEs: Evidence from Od... more A research study entitled, " Impact of Select Government Policies towards MSMEs: Evidence from Odisha and Andhra Pradesh " was undertaken by the researcher with the objective of measuring the impact of selected Government policies on the financials of MSMEs, the quality of their product and the overall enterprise development. An attempt is made to understand the varying perceptions of the policy makers, the policy implementers and the policy beneficiaries (MSMEs) which indeed gives rise to the gaps that make the policies ineffective. The researcher adopts a case study type research method. The research process includes a mixed methodology. It involves both quantitative as well as qualitative analysis of primary data as well as the large pool of secondary data. As part of the above research study, the existing literature has been reviewed. The literature thus reviewed constitutes the content of the current paper.
The connecting rod is an intermediate member between the piston and the Crankshaft. Its primary f... more The connecting rod is an intermediate member between the piston and the Crankshaft. Its primary function is to transmit the push and pull from the piston pin to crank pin, thus converting the reciprocating motion of the piston in rotary motion of the crank. This thesis describe designing and analysis of connecting rod. Currently existing connecting rod is manufactured by using steel. In this drawing is drafted from the calculation. A parametric model of connecting rod is modeled using solidwork 2016software and to that model, analysis is carried out by using ANSYS 15.0 software. Finite element analysis of connecting rod is done by considering the materials, viz... forged steel. The best combination of parameters like Von misses stress and strain, Deformation, Factor of safety and weight reduction for two wheeler piston were done in ANSYS software. Forged steel has more factor of safety, reduce the weight, increase the stiffness and reduce the stress and stiffer than other material like carbon steel. With fatigue analysis we can determine the lifetime of connecting rod. NOMENCLATURE A = cross section area of the connecting rod. L=length of connecting rod. C =compressive yield stress. Wcr =crippling or buckling load. crippling or buckling load. Ixx = moment of inertia of section about x-axis. Iyy =moment of inertia of section about y-axis. Kxx = radius of gyration of section about x-axis. Kyy = radius of gyration of the section about y-axis. D = Diameter of piston. r = Radius of crank.
India, with vast agricultural lands has different crops ranging from paddy to tomato. But few cro... more India, with vast agricultural lands has different crops ranging from paddy to tomato. But few crops are destroyed due to animal menace and hence a protection is required to save the crops from animal. For this project, an attempt is made to save these crops from such menaces by using solar fencing. In this, a triple lift additional circuit is used instead of transformer and rectifier bridge to produce high voltage with low current in order to safeguard the animals to a larger extent so that they experiences high voltage but low current shock for a very short time there by saving their life.
Due to the urgency in the need for standards for heterogeneous computer networks, International S... more Due to the urgency in the need for standards for heterogeneous computer networks, International Standard Organization (ISO) created a new subcommittee for " Open System Interconnection " (ISO/TC97/SC16) in 1977. The first priority of subcommittee 16 was to develop architecture for Open System Interconnection which could serve as a frame work for the definition of standard protocols. As a result 18 months of studies and discussions, SC16 adopted a layered architecture comprising seven layers (Physical, Data Link, Network, Transport, Session, Presentation, and Application). In july 1979 the specifications of this architecture, established by SC16, were passed under the name of " OSI Reference Model " to Technical committee 97 " Data processing " along with recommendations to start officially, on this basis a set of protocols standardizations to start projects to cover the most urgent needs. These recommendations were adopted by TC97 at the end of 1979 as the basis for the following development of standards for Open System Interconnection within ISO. The OSI Reference Model was also recognized by International Telegraph and Telephone Consultative Committee (CCITT) Rapporteur's Group on " Layered Model for Public Data Network Services ". This paper explains the OSI Reference Model, which comprises of seven different layers. Each layer having their own responsibilities.
Normally the Concrete filled columns without shear connectors, under major loads they undergo buc... more Normally the Concrete filled columns without shear connectors, under major loads they undergo buckling phenomena, in order to overcome this phenomena, Concrete Filled Steel Tube (CFST) columns were taken in to an account because of its greater strength and malleability recital contributed by the composite action. At early elastic stage this composite action cannot be absolutely developed as the expansion of steel was quite more than that of concrete. This in turn, creates deficient interface bonding between the composites. Thus, it cut down the elastic stiffness and strength of the CFST columns. To overcome this lacuna in the initial elastic stage, provision of shear connectors was carried out to reduce the lateral dilation of the concrete core and steel. In this experimental work, CFST columns of assorted proportions, with shear connectors were tested for axial compression. A mix design for M40 grade of concrete was adopted, in order to increase the workability of concrete a High Range Water Reducing Admixture (HRWRA) was used in the mixes which showed better compressive strength. High strength bolt (8.8) with smooth shank was used as shear connectors. CFST columns give an L/d (length to diameter) ratio of 2 to prevent local buckling. A chemical admixture, the spacing of the shear connectors in the shear direction is 5d, and in the transverse direction is 2.5d.
Risk Management comprises of identification of risk, quantitative or qualitative assessment of ri... more Risk Management comprises of identification of risk, quantitative or qualitative assessment of risk, selecting the most suitable method for handling risk then proper monitoring and documentation of risk. The risk may occur due to various technical, social and political reasons. Therefore an effective system to assess and manage the risk in construction companies is a challenging task for a civil engineer. In this paper various risk factors are identified and a survey is taken among the persons present at the construction site of different companies. Some risk management policies are suggested to overcome the spotted issues and provide a risk free environment.
The heat released from the flat surface is cooled by the use of jet impingement technique. The he... more The heat released from the flat surface is cooled by the use of jet impingement technique. The heat flux from the isothermally heated flat surface due to two-dimensional turbulent twin oblique confined slot-jet impingement is studied numerically using the ANSYS FLUENT software. Initially the flow and thermal fields for a normal confined slot-jet impingement are investigated using the RNG k-ε model and the SST k-ω model. The local Nusselt number distribution predicted by the SST k-ω model agrees notably better with the existing experimental data. Subsequently, the SST k-ω is employed to study the twin oblique impinging jet heat transfer problem. The study is conducted by varying the jet exit Reynold number, the jet to jet separation distance, jet-exit to target plate distance and the inclination angle of the jet to the impingement. Results indicate that impingement angle is reduced from 90o, the peak Nusselt number at the impingement surface is gradually reduced and its location slightly shifts away from the axis with slight decrease of the average Nusselt number for any combination of Re, L, H. The average Nusselt number is a direct function of the Reynold number and the impingement angle and is inverse function of the jet to target plate separation distance.
There has been a constant search for new materials for high temperature applications, such as for... more There has been a constant search for new materials for high temperature applications, such as for parts of steam generators, parts of thermal power plants, piping of liquid metal reactors, which are likely to be exposed to temperature 5500c and above. Good strength and ductility values possessed by special steels make them the first choice of designers for applications mentioned. Modified 9Cr-1Mo steel has been in use for such applications since a decade. For any given material, along with the mechanical properties, there is a need to determine the creep property if the material is the choice for high temperature service applications. Further, as it has been experienced that the welds are likely zones of failure, under extreme conditions of load and temperature, probing the creep property of the welded joints of a given material becomes an important aspect of research.Hence it is proposed to probe into the creep resistance aspect of the welded joints of 9Cr-1Mo steel under different conditions of load and temperature. It is also proposed to age the samples of 9Cr-1Mo steel under different conditions so that variation of creep properties in both the parent and the weld metal can be studied adopting the indentation creep test methodology. Experiments will be designed to extract all possible information regarding structural disintegration of the material. Additionally, scanning electron microscopy is planned to be adopted to observe micro-structural changes and correlation will be attempted to link them to observed creep behaviour.
This project presents the idea of using programmable logic controller (PLC) in industrial automat... more This project presents the idea of using programmable logic controller (PLC) in industrial automation. The use of PLC is a major factor. A digital computer used for automation of typical industrial electro-mechanical processes such as control of Machinery on factory assembly lines, amusement rides or light fixtures. The PLC is the main controlling unit & dc motor controls the conveyor belt. To accomplish this system, Dc motor, load cell, Photo-sensors are used.
The removal of zinc from aqueous solution by adsorption on Ulva lobata sp. was studied as a funct... more The removal of zinc from aqueous solution by adsorption on Ulva lobata sp. was studied as a function of contact time, pH of the solution, metal ion concentration, adsorbent concentration and adsorbent size. Batch experiments results showed that the adsorptive capacity of Ulva lobata sp. was 13.8 mg/g of adsorbent. The Langmuir and Freundlich models were used to describe the adsorption equilibrium of zinc on Ulva lobata sp. and the adsorption followed the Langmuir isotherm. The Langmuir and Freundlich constants for adsorption of zinc on Ulva lobata sp. were determined. The pseudo first and second order rate expressions were used to correlate the experimental data. The kinetic constants were determined for both the models and the second order rate expression was found to be more suitable.
This Paper reviews and discusses the most important non-linear load-pull techniques used in the d... more This Paper reviews and discusses the most important non-linear load-pull techniques used in the design of the power amplifiers. It discusses and elaborates on the proper change in the load-pull configuration required in order to make them optimally useful for an on-wafer device characterization. Finally, the distinct case studies for a device characterization and the Power Amplifier design that utilizes a load-pull system is reported. In this paper, an overview of an actual state of the art in the load-pull techniques along with the emerging trends is presented. In section II, overview of basics load-pull technique for amplifier design is discussed. Section III presents a detailed discussion on the realization of load-pull techniques and their application domain. Section IV discusses common load-pull techniques and Section-V provides PA design case using load pull technique.
The paper presents an application of data mining for improving the accuracy of prediction of a di... more The paper presents an application of data mining for improving the accuracy of prediction of a disease state by selecting the most relevant features associated with it. The experiments are performed on chronic kidney disease (CKD) data. The basic idea in this study is that use of a number of methods instead of a single one increases the probability of selecting features which are more closely related to the disease. Multiple feature selection methods have been applied independently on the CKD data set and the results integrated into a final optimal set of features. These data have been applied to the classifiers to identify CKD from reference cases. Various classification methods are compared to select the best model over 10-fold cross-validation in the training data set. Random Forest classifier is chosen as the best model with superior performance.
As we are surrounded by variety of post-PC devices, the traditional methods for identifying and a... more As we are surrounded by variety of post-PC devices, the traditional methods for identifying and authenticating users have become time-consuming. We present a system that will provide a capacitive communication method through while a product can identify who is interacting with it. This method exploits the capacitive touchscreens, which are now reached-down in laptops, mobile, and tablets, more as a signal receiver. The signal that identifies the user can be generated by a small transmitter placed into a ring, watch, or other artifact carried on or into the human body.
Due to migration of data from local storage to cloud number of Wi-Fi users are increased. On wire... more Due to migration of data from local storage to cloud number of Wi-Fi users are increased. On wireless network numbers of users get increased and the speed get reduced uniformly. As per IEEE 802.11n Wi Fi provide us speed up to 150-160 Mbps. It is still deficient to accommodate desired no of users. To remedy this restriction, we are presenting the idea of Li-Fi. As per German scientist Harald Haas-Transmitting data through a light-emitting diode light bulb that varies in intensity quicker than the human eyes can follow it. Haas says his discovery, which is called as D-LIGHT, able to make data rates quicker than 10 Mbps, which is speedier than the placed for typical broadband. As we know twentieth century is an epoch of internet. Where so many communications take place over the internet. Wi-Fi is most ordinarily used in the present century for establishing connection with the internet. In Wi Fi the speed of data transferring and the amount of users can use, are restricted. Our project is about visible light is a high speed, duplex and absolutely networked sections of communication. Where light comes in use as a medium for sending the messages. As we know the speed of the light is approximately 3x108 m/s which is going to act as a medium that will offer the incredible speed for data transmissions. Not only speed however also the protection in a closed surroundings will increase with the use of Li-Fi. Our project aims at ascertaining the use of Li-Fi also branded as Optical wireless communication.
IJIRST - International Journal for Innovative Research in Science and Technology, 2016
This paper present a application for enhancing security in internet banking .This paper mainly co... more This paper present a application for enhancing security in internet banking .This paper mainly consists of image morphing, steganography and compression for security purpose. This proposal provides OTP security using image processing .The idea is to encrypt the OTP behind cover image. It includes theoretical analysis of image Steganography, compression and morphing.
This project presents the idea of using Rheostat (Variable resistance) for auto weighing control ... more This project presents the idea of using Rheostat (Variable resistance) for auto weighing control system for automation industry. Auto weighing control system is used for assuring the quantity of liquid filled in the bottles to be exactly as per standard reference. The progressive invention in auto weighing system is becoming an important task especially because of rising demand of products and declining labour availability in industry. In industry the production speed should be high because demand of the product is more. But when we check the weight of the object manually then it will take more time for checking the weight and overall speed of the production will decrease. Hence the purpose of this project is to increase the speed of production and efficiency.
The performance of heat exchangers, for single-phase flows in particular, can be improved by many... more The performance of heat exchangers, for single-phase flows in particular, can be improved by many active and passive augmentation techniques. One such passive augmentation technique used for analysis this paper is vortex generation with the help of twisted tapes. An experimental analysis is carried out on a plain tube and tube with twisted tape under different mass flow rates and heat flux. A tube of 48mm diameter and 400mm length was taken for the experiment and a twisted tape of twist ratio yw=9.09 and thickness 2mm with 400mm length was inserted in the tube. Air supplied through the tube was heated up by the band heater. Temperatures of the air at different sections were recorded with the help of thermocouples. These experimental results are then compared with the numerical model for validation. A parametric study is carried out of different twist ratios of twisted tapes on temperature distribution of air at different section of the tube along its length. Three different twist ratios were considered 9.09, 6.05 and 3.64. Among these it was found that the twisted tapes with 3.64 gave an improved heat transfer as compared to other two twist ratios as well as the plain tube.
Uploads
Papers by IJIRST - International Journal for Innovative Research in Science and Technology
frequencies and positions in the training set. It uses Naïve Bayesian Classifier with supervised learning.
knowledge required to master the organoleptic properties of the product. Methodology: A study was brought in 2018 on the safou
fruit of the safou tree (Dacryodes edulis) 3 months old, plant product harvested in Makoua, urban community located in the central
basin in the Republic of the Congo. Safou pulp manufacturing test and the addition of the ingredients were weighed according to
the quantity while reaching a mass of 536.04 g. The mixture is made with lukewarm water. After kneading, comes the modelling
then frying in a chip in a bath of oil heated to more than 170°C. The cooking lasted for 3 to 5 minutes. In the laboratory, we checked
out the physicochemical and sensory characteristics (14 panelists were asked about the variables color, smell, taste, and texture)
of the resulting product. Results: the physicochemical composition has been represented by different makers: water 9.73%, ash
1.22%, protein 20.25%, fat 34.86% and carbohydrate 43.67%. As tasters, the texture is the only descriptor best enjoyed with
average 4.9 ± 0.28. The gap-type = 1.08, highest variance = 1.17 and the coefficient of variation = 38% reported the smell. The
choice of the product of the sensory analysis the taster test 4 this has the highest average 6.9. The comparison of the coefficients,
the difference was not significant p≤0.05. In conclusion: Although the ingredients have contributed to making the product obtained
snacking, we say that it is good for consumption by humans or even the sprinter (athlete), allowing it to achieve good performance,
to the marketing and commercialization of local products.
with data mining strategies. Versatile Health Care is the use of mobile computing techniques for enhancing interaction among
patients, caretakers, doctors, and other healthcare providers. Here we separate association rule investigation into two information
groups. The first one data collected from the patient's body using smart sensors and the second one the patient's health history
gathered in the past. This framework gathers the diagnosis patterns, orders them into typical and crisis terms and announces an
emergency by contrasting the two information groups as referred to before. Therefore, recommends techniques to examine and
demonstrate examples of a patient's health condition.
The application vision is to connect donors and students on the same platform. The application allows student to register and apply
for educational fund and eliminates the process of student visiting organizations for help, and provides an easy to use platform for
donors to donate funds.
of the bike riders. Sometimes the riders don’t know where the problem is in the bike. So it becomes essential to develop a
monitoring system which will monitor the different parameters for the life of the bike’s health as well as for the safety of the bike
rider. So as monitoring system different sensor can be used and then the parameters are measured and from that values it can be
seen easily that whether the condition of the bike is proper or not. By using this system in the bikes the efficiency as well as life of
bike will increase.
factory automation.
And while that is virtually impossible to achieve, it should still be the ultimate goal. Here are the most common areas of waste in business, like Inventory, Overproduction Over-processing Transportation, and Downtime etc.