International Journal of Science Engineering and Advance Technology (IJSEAT)
Not a member yet
    1075 research outputs found

    Diverse Fuzzy Numerical Systems and Their Utilization in the Context of Rankings

    No full text
    This research article explores the diverse realm of fuzzy numbers, with a specific focus on defuzzification using the bounded area method and its general applications. Fuzzy numbers, introduced by Lotfi A. Zadeh, have proven to be a powerful tool for handling uncertainty in mathematical modelling. The study begins by providing an overview of the foundational concepts of fuzzy numbers, including their types such as Triangular, Trapezoidal, Pentagonal, Hexagonal, and Heptagonal fuzzy numbers. The core of the research delves into the defuzzification process, with a particular emphasis on the bounded area method. This method, introduced for defuzzifying fuzzy numbers, offers a systematic approach to convert fuzzy sets into crisp values by considering the area under the membership function within a defined range. The article explores the mathematical underpinnings of the bounded area method and elucidates its application to various types of fuzzy numbers. Furthermore, the research investigates the general applications of defuzzification by the bounded area method across different domains. From its utilization in control theory to signal processing and decision-making systems, the study highlights the versatility and efficacy of this defuzzification approach. Real-world examples and case studies are presented to underscore the practical significance of employing the bounded area method in diverse applications

    Design and Analysis of Turbo Jet Engine

    No full text
    This project endeavors to create a turbojet engine using Catia software. The design draws upon extensive research from industry experts and historical advancements in jet engine technology. Carefully chosen design methodologies were employed to streamline the engine design process, with the primary goal being the development of a fully functional turbojet engine. The landscape of air travel has evolved significantly, enabling swift global travel. However, the aviation industry faced limitations in the past, relying on Rotary Piston IC engines characterized by constrained travel speeds and distances, high fuel consumption, and elevated transportation expenses. The advent of turbojet engines, classified as Rotary-Reaction Turbine Engines, marked a pivotal advancement in aviation. In contrast to Rotary piston engines, turbojet engines demonstrate superior efficiency, catalyzing the subsequent evolution of engines like turbofan, turboprop, and turbo shaft engines as enhancements over the original turbojet design

    Diagnosis And Detection Of Hepatitis Disease Using ML

    No full text
    The main goal of this research is to determine the optimum method for diagnosing and identifying hepatitis while also taking future patient expectations into consideration. This study involved the completion of a comparative report between several machine learning technologies and neural networks. The precision rate and mean square error both affect the exhibition metric. The Machine Learning (ML) techniques, such as Support Vector Machines (SVM), K Nearest Neighbor (KNN), and Artificial Neural Network (ANN), were thought of as the characterising and anticipating tools for diagnosing hepatitis infection. In light of the accuracy of the sickness diagnosis prediction, a brief report on the aforementioned algorithms was completed

    PV Fed BLDC Driven Water Pumping System With MPPT Technique Employing Zeta Converter

    No full text
    Renewable sources will be increase in value through automotive sector even by usage of a brushless DC (BLDC) driven photovoltaic (PV) pumping systems. The power transfer and address the downside associated with traditional DC-DC converters are being improved by usage of zeta converter. By monitoring the zeta converter operating period via the PSO-based Maximum Power Point Tracking Algorithm, optimum power is derived from either the solar array. That hybrid energy storage system (HESS), which preserves the constant voltage at the input of BLDC generator, PV framework for the reduction of PV performance volatility will be implemented. By using a robust power management algorithm PV-HESS will be properly controlled. That complete MPPT power management allows its Zeta converter simple for both the water pumping device to achieve smooth efficiency. While comparing other methods of MPPT technique, INC-conductance based MPPT technique is best because it provides better results for randomly varying atmospheric conditions.  The control system 's output is displayed with MATLAB/SIMULINK allowing atmospheric variance

    Efficient Authority Verification and Ranked Multi Keyword Search in Cloud

    No full text
    Under the single owner concept, encrypted cloud data has sparked various research projects. In fact, however, most cloud servers do not serve a single owner; rather, they enable several owners to share the benefits of cloud computing. The problem of recovering encrypted data from the cloud is perplexing. For recovering scrambled data from the cloud, a variety of search procedures are used. This work revolves around a set of keyword search instruments applied to encrypted data, resulting in great data recovery proficiency. Because many believe that sensitive data must be scrambled before outsourcing to cloud servers in order to ensure client data security, searching through encrypted data is a method of remarkable interest for the cloud computing moment. Strategies from multiple spaces are used to provide a productive and secure search technique over scrambled data. Keyword search, it is assumed, is the finest way for searching encrypted data in the Cloud. It is more productive than searching for a single term

    K-means- SVM To Predict Diseases From Fruits In Agriculture Data

    No full text
    A fruit disease's early discovery is crucial since it will harm the agricultural sector. This work focuses mostly on the identification and analysis of fruit illnesses that are present in plant regions, as well as the documentation of the agricultural sector. In this study, the author uses the SVM algorithm and KMEANS segmentation to forecast fruit illnesses. When using KMEANS segmentation, similar colour clusters can be created. Clustering features are then utilised to train the SVM classifier, which uses those features to determine if an input image is normal or has a disease

    Design of Robust Hybrid Recommender System For Optimal Business Decision Model In E-Commerce Digital Systems

    No full text
    Now a day’s many e-commerce applications amount of data like products and its details, images, description, reviews etc. Recommender systems make life easier by making recommendations. In e-commerce, often some products doesn’t get sold or less profits are earned from the product. Identification of the reason behind the less profits from the product, was a difficult task. So we are proposing a hybrid recommender system that helps the item manufacturer to improve his product. We built a hybrid recommender system by combining various regression algorithms  along with backward elimination, CAR(Context-Aware Recommendation)model, user to user collaborative filtering. Finally the optimal business decision is taken by the manufacturer

    Steady State Analysis of Quadratic Boost and Interleaved Boost Converters for Renewable Energy Applications- A Comparative Study

    No full text
    Recently, renewable energy sources have acquired more attention as compared with conventional energy sources due of their renewable and eco-friendly nature. DC-DC converters are crucial in their applications. Two different configurations based on the conventional boost converter are compared for renewable energy source applications in this paper. In one configuration, two boost converters are connected in series with a single switch (Quadratic Boost Converter), and in another, they are connected in parallel with two switches (Interleaved Boost Converter). The first configuration has a high voltage gain with a low duty cycle, while the second has a low input current ripple. The two configurations are compared in various aspects, like output voltage, voltage gain, inductor current, inductor current ripple and component counts. The configurations are designed in the MATLAB simulation environment by using the PLECS block set to validate the theoretical studies with ideal values. With a duty cycle value of 0.6 and a 12 V input voltage, the output voltage of the quadratic boost converter is 75 V and that of the interleaved boost converter is 30 V

    E-Voting For Universities Using Face Recognition

    No full text
    This report describes an online voting system designed to meet the needs of colleges and universities. Voting is a widely spread, democratic way of making decisions and can be used for electing student presidents and class representatives at the college level. The main objective of the proposed system is to develop a more secure and user-friendly voting system compared to the existing methods. The process of voting is critical in terms of safety and security. The proposed system allows the voters to scan their faces, which is then matched with the already saved images within the database. There is a high chance that the voter's choice to be revealed in the traditional system, which is not the case in this proposed system. By using face recognition, it provides enough security to eradicate the dummy votes. The system also provides clear visualization of data regarding the percentage of total votes cast, the percentage of votes each party secured, and the final winner in the election

    Data Security Using Steganography Through Media Files

    No full text
    Although cryptography and steganography can provide data security, each of them has a problem. The problem with cryptography is that the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. In steganography, once the presence of hidden information is revealed or even suspected, the message becomes known. According to this paper, a merged technique for data security is proposed using both cryptography and steganography techniques to improve data security. Therefore, two levels ofsecurity will be provided using the proposed hybrid technique. In addition, the proposed technique provides high embedding capacity and high-quality images and videos. Cryptography means encrypting the message using a symmetrickey and decrypting the message using the samekey. Steganography is the art of hiding the fact that communication takes place by hiding the information in other media files. So, encrypting themessage and hiding that encrypted message in the media file is called double security providing. This project hides the message in the media file

    1,006

    full texts

    1,075

    metadata records
    Updated in last 30 days.
    International Journal of Science Engineering and Advance Technology (IJSEAT) is based in India
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇