966 research outputs found
ESTABLISHMENT OF AGE VS STRENGTH CURVE FOR SET OF MATERIALS
This study was directed toward performance of concrete under varying water to cementitious materials ratio. The influence of constituent materials and various mix proportions on compressive strength of concrete was studied experimentally and reported. At each water/cement ratio varied from .25 to .55 at constant increment of 0.05. For all the concrete mixes,the compressive strength of concrete was determined at ages of 1,3,7,28,90 and 180 days. The experiment was carried out at the same ambient temperature and the compressive strengths of concrete mixes were found to increase with age but decrease as water - cement ratio increases. From the experimental test results,it was observed that the important parameter affecting the strength of concrete is the water/cement ratio and Abrams' generalization law is applicable to concrete in compression for our set of materials. Graphical model is proposed to predict the compressive strength of concrete using Water/Cement ratio.
https://www.ijiert.org/paper-details?paper_id=14101
A Review: Efficient Encrypted Searching and Traffic Reduction As Mobile Cloud Services
Documentation of information on the Cloud Computing run as fast as Cloud entirely in the world. Even so it carriage distress to partron. Unless the data are encrypted For hostage. Encrypted data should be energetically searchable and retrievable Without any concealment particularly for the cellphone user. Although modern Interdisciplinary studies has solved many distress , the architectonically can not be applied on cellphone directly under the cellphone cloud environment. This is due to the contradict charged by wireless networks, such as latency sensitivity ,Poor connectivity, and low transmission rates. due to this extend to a chronic search Time and extra network traffic value. When using the conventional search schemes. This paper solve these matter by providing an efficient encrypted data search Method as cellphone cloud service. This method include lightweight trapdoor (encrypted Keyword) differentiate method, which is optimization of data sending process by decreasing the trapdoors size for traffic efficiency. In this publication we also include two Optimization method for data search, known as the trapdoor mapping table module and Ranked serial binary search algorithm to quick the search time. So by using Efficient data search over mobile cloud it Decreases search time by 34% to 47% and also network traffic by 17% to 41%
Keyword Specific Cloud Computing
It is now a known fact that Internet of things (Iot) and Cloud computing will be the way ahead. Store and transmit of massive amounts of data is on the cards in the coming years which will profoundly affect other areas of everyday life in the next generation. Cloud and Iot are merged together is seen as an enabler of a large number of application scenarios. As an example at the start of 2016 automakers are building a driverless taxi service. Keeping this in mind a novel idea of keyword based Cloud Computing is brought about in this paper which gives out entire data to the user if the user types the keyword of the required entity
Effect on strength of Involute spur gear tooth by considering Uncertainties in Geometry and Material propertiesby using Finite Element Methods-A Review
Gearing is the special division of Mechanical Engineering concerned with the transmission of power and motion between the rotating shafts. Gears not only transmit motion and enormous power satisfactorily, but can do so with very uniform motion. It is the best and the economical means of achieving this transmission. Gear teeth fail due to the static and the dynamic loads acting over it. This paper presents study of effect of various parameters on beam strength of involute spur gear tooth. The effect on strength of involute spur gear tooth is studied by considering uncertainties in geometric parameters like fillet radius, face width etc. Also the uncertainties in material properties which affect strength of involute spur gear tooth are studied
Twitter Event Summarization Using Phrase Reinforcement Algorithm and NLP Features
Abstract-Now a day’s social networking sites are the fastest medium which delivers news to user as compare to the news paper and television. There so many social networking sites are present and one of them is Twitter. Twitter allows large no. of users to share/post their views, ideas on any particular event. According to recent survey daily 340 million Tweets are sent on Twitter which is on a different topic and only 4% of posts on Twitter have relevant news data. It is not possible for any human to read the posts to get meaningful information related to specific event. There is one solution to this problem i.e. we have to apply Summarization technique on it. In this paper we have used an algorithm which uses frequency count technique along with this we have also used some NLP features to summarize event specified by user. This automatic summarization algorithm handles the numerous, short, dissimilar, and noisy nature of tweets. We believe our novel approach helps users as well as researchers.
DOI: 10.17762/ijritcc2321-8169.15020
Forensic Document Analysis using Apriori Algorithm
Today, we find a tremendous increase in crimes like ethical hacking, rackets on different domain packets, unauthorized entrance, in the digital world. So, we need to track such unauthorized access. Our forensic document analysis using apriori algorithm provides an approach which is used to find the evidence by analyzing such massive set of documents. In forensic analysis frequently we examine hundreds of thousands of file which is huge amount of data. Here, we group the retrieved documents into the meaningful categories list which is the most central process by using the k-representative algorithm. Hence we are specifying an approach for forensic analysis using document clustering algorithm helpful in police investigation
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
TWENTY years past, folks generally created friends with others who live or work near themselves, like neighbors or colleagues. we have a tendency to decision friends created through this ancient fashion as G-friends, that stands for geographical location-based friends as a result of they're influenced by the geographical distances between one another. With the speedy advances in social networks, services like Facebook, Twitter and Google+ have provided us revolutionary ways in which of creating friends.According to Facebook statistics, a user has a mean of one hundred thirty friends, maybe larger than the other time in history. One challenge with existing social networking services is a way to suggest a good or reliable friend to a user. Most of them rely on pre-existing user relationships to choose friend candidates. for instance, Facebook depends on a social link analysis among those that already share common friends and recommends  users as potential friends.Unfortunately, this approach might not be the foremost applicable supported recent social science ï¬ndings. according to these studies, the principles to group individuals along include: 1) habits or life style; 2) attitudes; 3) tastes; 4) ethical standards; 5) economic level; and 6) individuals they already know. life styles are typically closely correlate with daily routines and activities. Therefore, if we tend to may gather data on users’ daily routines and activities, we are able to exploit rule #1 and suggest friends to individuals supported their similar life styles. This recommendation mechanism may be deployed as a standalone app on smartphones for existing social network frameworks
Smart Health Monitoring System using Sensors
In real life, we have to constantly monitor the patient. As of now there is no automatic alerting system has not been implemented which will notify a helper or relative a patient who is at a remote location. In this project, we monitor pulse rate, temperature and generate ECG with the help of sensor. Sensors sense the records the value and sends those to android phone . In case of emergency, message is sent to the patients relative. And also the appointments at the hospital will be reminded to the patient. The focus of the project is to build an android platform based application, which uses the idea of IOT. Moreover, we present a prototype of a basic health-care monitoring system, which alerts, in real time patients relative that an elderly people has experienced a problem that could need medical attention or hospitalization
- …