Indian Journal of Advances in Science Engineering and Technology
Not a member yet
    10 research outputs found

    Damage Identification Method Using Wavelet Transforms and Functional Distraction Shape Degradation

    Get PDF
    Early diagnosis of structural damage can protect against loss of life and prolong the lifespan of structures. This has attracted scholars to have paid a lot of attention to the use of monitoring the health of the structure to identify damages in the structure. A popular method for detecting structural damage is wavelet transform which detects faults by analyzing structural responses. A Wavelet Transform fault detection technique employing functional deflection shape difference is presented in this research. To detect and locate damage, a Continuous Wavelet Transform of two dimensions is used to disintegrate the variation between both the functional deflection shapes of the intact as well as damaged structures. Mathematical modeling of a metal plate is used to demonstrate the efficacy of this technique. Whenever the decomposition signal is noisy, the placement of damage influences the detection performance of damage. This method eliminates the issue of border distortion caused by the application of conventional functional deflection shapes. The methodology demonstrates the simplicity of the proposed techniques, while the results demonstrate their precision

    Natural Dyeing Using Bauhinia Purprea Flower on Selected Fabrics

    Get PDF
    Dyeing process for textiles are practiced by humans since ancient times. In recent years a lot of attention has put in the process of natural dyeing because of the awareness of sustainability and eco-friendly textiles. People are becoming more and more health conscious and demands for producing textile products through environment friendly and sustainable dyes and dyeing process. On that basis eco-friendly natural dye from abundantly available “BAUHINIA PURPUREA” flower used for the current study. In this study 100% silk woven fabric, 100% Cotton Woven fabric and 100% Cotton Knitted fabrics is used for dyeing (BAUHINIA PURPUREA) and color fastness test was carried out for all the three samples and from the result it was concluded that among three samples the 100% silk woven fabric was the best due to its good color fastness test and dye absorbency

    Voice-For-Blind: An Utilizable Email Client for Visually Impaired Users

    Get PDF
    For people who are sighted, visually impaired, or blind, electronic mail has evolved into a vital tool for collaboration and communication. However, the current email-related activities on smartphones cause a number of problems due to insufficient mapping of haptic feedback, complex text-entry layouts, a variety of screen sizes and orientations, illogical ordering of navigational items, and inconsistent interface design. The Components on touch-screen interfaces that can\u27t be seen can be difficult for blind people to precisely access, making it difficult for them to carry out common mailing tasks such as receiving, sending, organising, managing spam, deleting, searching, and filtering. Due to these issues, blind people are having trouble using smartphones and completing a number of tasks related to email. Junk and Spam email frustration and cognitive overload are additional effects. We proposed Voice-For-Blind an utilizable email client that is friendly to visully imapired individuals to get around the obstacles relating to the usability and accessibility of smartphone-related mailing activities. 38 blind participants in an empirical study who carried out 14 email-related tasks are used to evaluate the proposed email client. The outcomes of this prototype\u27s use demonstrate an elevated accuracy in complettion, improved user experience, and improved touchscreen interface control for basic tasks like email management. The findings show that Voice-For-Blind is an email client that is inclusive of accessibility, giving blind individuals an enhanced user - interface experience and reducing cognitive load when managing emails

    Emission and Efficiency of Alternate Fuel Powered Microturbine and Turbofan

    Get PDF
    In order to lessen aviation\u27s carbon footprint, alternative fuels comprising biocomponents made by different technologies are being introduced, but there is little information available on how these fuels affect engine performance and emissions. The goal of this research is to compare the gas emissions and performance full-size DGEN380 turbofan and the GTM-140 microturbine, both of which are propelled by mixtures of either hydroprocessed esters and fatty acids (HEFA) or alcohol-to-jet (ATJ). An engine emittance model will be created using the collected data to forecast gas emissions. In the lab, the physicochemical parameters of blends of petroleum-based synthetic components were added to the fuel in a range of densities. The Semtech DS gaseous analysis tool and the EEPS spectroscopy were used to measure the emission levels from both engines at specific operating points. The effects of the tested blends on motor operating parameters are negligible, and using them carries no risk of noticeably worsening aircraft performance or raising fuel consumption. The operating conditions of ground personnel shouldn\u27t worsen despite a significant rise in CO emissions and a modest increase in some other gas emissions (HC and NOx) caused by increasing the substance of biocomponents. This implies that using tested blends to fuel gas turbine engines is not contraindicated

    An Assay: Next Generation Automated Cyber Defense Mechanism against Advanced Phishing Attacks and Campaigns Using Threat Hunting and SOAR Capabilities

    Get PDF
    We are in the new era of cyber security, now a day’s, a lot of companies and organizations are facing issues against cybercriminals. They are getting more sophisticated attacks creatively and 50-60% of those attacks and incidents are coming through Phishing. Phishing is a type of attack that involves sending an email or making a similar attempt to obtain information from the recipient. To detect these attacks one of solution is Threat Hunting. This whole process takes tedious manual effort and time. To avoid manual intervention and vast time effort we have implemented a framework using different threat hunting approaches conducting an in-depth analysis of phishing emails, integrating with Security Information Event Management (SIEM) and Security Orchestration Automation Response (SOAR) tools and Automated Threat Intel Detection using Internal & External feeds. Here, we combine both automated workflows and Human Investigation to identify advanced persistent attacks. The experiments conducted ascertain that the proposed model can identify 80-90% of threats against any organization and generate accurate metrics & reports

    Assessment of Performances of Spam Detection Capabilities of Nearest Mean Classifier and Gaussian Method

    Get PDF
    oai:ojs2.ijaset.org:article/1The potency of nearest mean classifiers and Gaussian in detecting SPAM has been investigated and the findings are presented in this paper. The outcomes take the form of probabilities of error traces and the duration of classification. Due to the difficulty of detecting SPAM, these automated techniques will save a great deal of resources and time necessary to manage messages in the inbox messages. Due to the difficulty of detecting SPAM, these automated techniques will save a great effort and expense of time required to manage email messages

    A Novel Technique of Using Touch and Keystroke Dynamics for Sequential Authentication on Smartphones

    Get PDF
    Smartphones are now more of a requirement than an accessory in the modern world. Thanks to all of the applications on the smartphone, it has evolved into our personal assistant. Every smartphone user is concerned about mobile security because they conduct a variety of transactions on their phones and store sensitive data there. Passwords can be stolen via finger oil or shoulder surfing, so password authentication is not really a more reliable authentication method. Sequential or continuous authentication on smart devices, touch and keystroke dynamics are behavioral biometric authentication techniques that use the user\u27s typing and touching patterns to confirm their identity continuously. For all smart devices, the authors of this study suggested a TKDSmart system to improve authentication. The TKDSmart system\u27s authenticity was confirmed by the EER 4.1 percent, FRR 6.73 percent, and FAR 1.66 percent, that were systematically proved

    An Innovative Pick and Place Robotic Arm System Using an Atmega328 Microcontroller with Escalating Stability

    Get PDF
    It is well known that the pick and place mechanism can take the role of human arms, particularly in industrial settings, and that it is more accurate and faster at performing jobs. The mechanism created in this study is an inexpensive device controlled by sensors that can propel items swiftly. The proposed system simulates the behavior of a human in accomplishing a specific industrial job with increased stability than the existing designs. Ultrasonic sensors were used to sense anything for picking and positioning in industries, together with servo motors, an Atmega328 Arduino microprocessor, and light steel iron for the frames. The system\u27s stability as derived from the theoretical equations is verified using Matlab software. The elevated stability was achieved utilizing a step input signal that is a type zero system.  The observability, controllability, polar plot, and bode were also established. The phase difference for the bode plot is 173 degrees, and the system rise time is 1.01 seconds. The findings demonstrate the device\u27s escalated stability and dependability, which will increase productivity and lower production costs when used by the industry. The device can be usefully utilized in an environment that is life-threatening to human beings. The limitation of the proposed system is that it is stationary and can be used only to move an object along a conveyor belt; it is not mobile. Nevertheless, it outperforms current ones economically. It is more affordable, exceedingly dependable, repeatable, and steady

    An Efficient Watershed Prioritization Technique Based on Slit Production Prediction Using Remote Sensing Data

    Get PDF
    Prioritization of watersheds based on soil erosion has evolved to turn out to be an integral part of watershed administration so as to preserve the invaluable resource of Mother Nature. Land administration, Land use, slope, soil, and climate are the most significant elements contributing to soil erosion. Due to watershed heterogeneity, these parameters exhibit spatial variation. Consequently, the watershed is typically divided into small regions demonstrating uniformity. Throughout this analysis, the watershed is divided into numerous smaller ones, and the remote sensing technology revolution was employed as a source of data to get accurate and current information about soil and land use. Topographic maps were used to determine the slope details. The slope, soil, and land-use, were employed in an uncomplicated mathematical formulation to estimate the silt production of each smaller watershed; the smaller watersheds were divided into four distinct groups according to statistics. Examining the benefits due to the usage of remote sensing imagery, it is concluded that 2-5 m data sources are inexpensive. It is also advised to use the same imagery in sediment yield prediction as well as watershed management tasks. &nbsp

    An Innovative Design of a Dual Axis Automatic Tracking Solar Power Generation System with Improved Performance in Different Environmental Conditions

    Get PDF
    The term solar energy refers to the radiation in light energy and the heat of the sun that is received in a high amount. The solar energy that is received from the sun reaches the surface from the 6 surface layers that travel from the sun to power the environment. Some parts of solar energy can be converted into electrical energy, and the maximum solar energy is transmitted or reflected in the environment. Solar energy can be converted and used to the fullest extent possible while there is an energy crisis in the world, society, and power companies. In this paper, we will discuss solar energy generation, control of power, tracking of the solar panel, data collection from the SPV power plant, and comparison of the solar tracking data and non-tracking data. The main aims of this research are to reduce the cost and increase the amount of electricity generated for installed PV systems by fabricating a simple control circuit for dual axis solar tracker PV systems. It is possible to design an SPV power plant monitoring system that can be installed along with the solar panels for the generation of electrical energy and can be controlled and monitored remotely. It should be checked frequently to ensure system control and continuous power supply. By implementing both techniques, the cost of a PV power plant can be reduced by increasing the productivity and proper monitoring of the photovoltaic generation system. This paper presents a detailed description of the designed and fabricated electrical circuits used in the tracker PV system and string monitoring system. Reduction in operating cost of SPV dual axis tracking system. Power losses due to control circuits in the moonlight are also avoided, as per the design presented by many authors in the past. Energy losses can be detected and corrected by monitoring the operational performance and analyzing the recorded data of PV systems. Monitoring PV systems is pretty helpful in developing white papers and setting benchmarks for the system performance of PV systems. The sun tracker circuit consists of a 12-volt power supply circuit, an LDR-based sensor circuit, an H-bridge circuit, a timer circuit, and a DC motor driving circuit. For transferring the data wirelessly like PV string array voltage, current, and voltage taken by DC motor during the sun tracking throughout the whole day from the remote station to base station, a simple X-bee-based designed circuit

    10

    full texts

    10

    metadata records
    Updated in last 30 days.
    Indian Journal of Advances in Science Engineering and Technology
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇