
IJET -Volume 4, Issue 3 , May - June 2018
S.No
|
Title/Author Name
|
Serial No
|
71 |
A Review Paper on the Effect of Supply Chain Management Process in Real Estate- Swati Chauhan, Rajiv Banerjee, Dr. Syed Aqeel Ahmad
Abstract
In the present competitive market, the construction industry demands for delivery of top qual-ity project at very competitive prices. To get the success in market and effective management, con-struction supply chain is to be planned. In the present time, the construction industries are introducing the supply chain management. It is very promising approch to achieve integration between several steps of the chain (Internal and external suppliers, vendors, contractors clients, designers). Many in-ternational construction companies have carried out extensive research and developed computer based programs to experiment the current supply chain management concepts. The supply chain management are identifying factors that cause the budget overruns and schedule delays in the construction industry. The importance of supply chain management has been discussed the scientific literature and especially to improving project performance. The using RII method is control and managing the entire delay factor in construction industry. The objective of this paper is to provide for improving construction supply chain management such as improving of suppliers/contractors performance, elimination of wastage, training and information sharing between parts of the supply chain. The trends of the supply chain management in construction industry. Keyword: Supply chain management, construction management, literature review. × ![]() Swati Chauhan, Rajiv Banerjee, Dr. Syed Aqeel AhmadModified Data Analysis of Big Data Using Map Reduce In Hadoop Process Volume 4 - Issue 3 (432- 435) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P71 |
72 |
Mechanical Engineering in Ancient Egypt, Part 69: Shabti Boxes Inscriptions- Galal Ali Hassaan
Abstract
This paper is the 69th research paper in a series investigating the evolution of mechanical engineering in ancient Egypt. It investigates the inscription of shabti boxes during the Middle and New Kingdoms, Third Intermediate Period and Late Periods of ancient Egypt. It outlines the design , material, decoration, inscription, owner and present location of each shabti box. The type of script used in the inscription of the shabti boxes is outlined and the technique of presenting the text on each box is investigated. Keyword: Mechanical engineering; ancient Egypt; shabti boxes, inscriptions. × ![]() Galal Ali HassaanMechanical Engineering in Ancient Egypt, Part 69: Shabti Boxes Inscriptions Volume 4 - Issue 3 (436-448) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P72 |
73 |
Dynamic Pricing Strategy for Demand Response Management in Smart Grid- Nancy,Navneet Kaur
Abstract
As per the flat tariff rates we have been utilising each and every electronic gadgets at the same cost per unit for the whole day, due to this we are not aware about the genuine price for the distribution and the generation of the electricity. The strategy of dynamic pricing is a key for this issue, in which a customer is charged with different rates contingent on the curve of demand response. Many of the latest studies which are related to the dynamic pricing of electricity are being limited to block rating where the price per unit for electricity increments or at times diminishes after utilizing a specific amount of electricity. Even though the electricity utilization of every customer is not equal, yet at the same time the effect of increasing cost because of load fluctuation in case of peak hours influences every customer to the same extent. So to overcome this we are recommending a different dynamic pricing modelling with the help of which the expanded cost would be shared with those consumers, who really take an interest in destabilizing curve of demand response, but not with those users, whose utilization of electricity is almost minimum or underneath normal. Keyword: Tariff, Demand response, Dynamic pricing, Load balancing , Smart grid. × ![]() Nancy,Navneet KaurDynamic Pricing Strategy for Demand Response Management in Smart Grid Volume 4 - Issue 3 (449- 453) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P73 |
74 |
A survey on Web Contents Classification System- Prof. Nisha R. Wartha, Prof. Vaishali Londhe
Abstract
Currently, the amount of adult (pornographic) content on the Internet is increasing rapidly. This makes an automatic detection of adult content a more challenging task, when eliminating access to ill-suited websites. It is easy for children to access pornographic webpages due to the freely available adult content on the Internet. It creates a problem for parents wishing to protect their children from such unsuitable content.In 2005, the European Parliament launched a large program called “Safer Use of the Internet”, particularly for young people. Some webpages contain a huge amount of combined data related to healthcare (information on diseases, mental health, and physical fitness) and sexual knowledge (medicine for sexual health, birth control, treatment during pregnancy, etc.). In this system, we focus on the recognition of Web adult content. A fuzzy-ontology/SVM–based adult content detection system is proposed to automate the classification of pornographic versus medical websites. The proposed mechanism offers an adult content detection system that classifies webpages into normal, pornographic, or medical webpages using extracted web content features. The adult Web page bag recognition is carried out using multi-instance learning based on the combination of classifying texts, images and videos in Web pages. Additional Key Words and Phrases: Semantic knowledge, fuzzy ontology, SVM (Support Vector Machine), adult content identification, skin patch modeling, recognition of adult images, recognition of adult videos, recognition of adult Web page bags,k-NN (nearest neighbor). Keyword: Put your keywords here, keywords are separated by comma. × ![]() Prof. Nisha R. Wartha, Prof. Vaishali LondheA survey on Web Contents Classification System Volume 4 - Issue 3 (454- 460) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P74 |
75 |
Implementation of The Ieee Standard Binary Floating-Point Arithmetic Unit- Dr. R. Prakash Rao
Abstract
A floating-point system can be used to represent, with a fixed number of digits, numbers of different orders of magnitude: e.g. the distance between galaxies can be expressed with the same unit of length. The result of this dynamic range is that the numbers that can be represented are not uniformly spaced; the difference between two consecutive representable numbers grows with the chosen scale. Over the years, a variety of floating-point representations have been used in computers. However, since the 1990s, the most commonly encountered representation is that defined by the IEEE 754 Standard. The speed of floating-point operations, commonly measured in terms of FLOPS, is an important characteristic of a computer system. Hence, in this work the IEEE standard binary floating-point arithmetic is implemented. Keyword: Fixed Number of Digits, Ieee 754 Standard, Flops, Floating-Point System.× ![]() Dr. R. Prakash Rao" " " Implementation of The Ieee Standard Binary Floating-Point Arithmetic Unit " Volume 4 - Issue 3 (461- 465) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P75 |
76 |
Applying Artificial Intelligence Techniques to Prevent Cyber Assaults- Mohammed Bilal A, Chetan Kumar G.S
Abstract
Digital security apparently is the train that could benefit most from the presentation of Artificial Intelligence (AI).It is hard to make programming for shielding against the capably creating attacks in frameworks. It can be cured by applying methods of computerized reasoning. Where ordinary security frameworks might be moderate and insufficient, computerized reasoning procedures can improve their general security execution and give better security from a growing number of complex digital dangers. Adjacent to the immense open doors ascribed to AI inside digital security, its use has legitimized dangers and concerns. To advance addition the improvement of digital security, an all-encompassing point of view of affiliations digital condition is required in which AI is united with human information, since neither people nor AI alone has demonstrated general accomplishment in this circle. In this way, socially careful usage of AI methods will be expected to additionally alleviate related dangers and concerns Keyword: Cyber security, Artificial Intelligence (AI), Security insight, Cyber barrier, Denial of Service (DoS), Self-Organizing Maps (SOM). × ![]() Mohammed Bilal A, Chetan Kumar G.S " Applying Artificial Intelligence Techniques to Prevent Cyber Assaults " Volume 4 - Issue 3 (466- 469) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P76 |
77 |
Residual Stress analysis of Equilateral Triangular Sectioned bar of Non-Linear Work- Hardening Materials- Dinkar Lal , Lokendra Pal Singh
Abstract
The aim of the paper is to present a theoretical analysis of growth of the elastic-plastic boundary and the resulting stresses while loading, and the torsional springback and the residual stresses after unloading are calculated. Keyword: --- × ![]() Dinkar Lal , Lokendra Pal Singh " Residual Stress analysis of Equilateral Triangular Sectioned bar of Non-Linear Work- Hardening Materials " Volume 4 - Issue 3 (470- 477) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P77 |
78 |
Data mining of Absentee data to increase productivity- Gayathri.T
Abstract
Productivity of an organization reduces when employees are absent for prolonged duration. This could be avoided if the employee�s absentia is understood in the early period and a substitute is assigned. This paper is a research to create classification model to predict whether an employee would be absent for short or long duration. Various classification models are studied and Multilayer perceptron in found to be the best suited model for this purpose. Absenteeism record of Courier company from UCI data repository is used for this study. Keyword: Classification, absent employee, Multilayer Perceptron, Naive Bayes, J48, Data mining. × ![]() Gayathri.T " Data mining of Absentee data to increase productivity " Volume 4 - Issue 3 (478- 480) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P78 |
79 |
The New Service Brokering Policy for Cloud Computing Based on Optimization Techniques- Swati Raghuwanshi , Saurabh Kapoor
Abstract
Cloud computing is an area that is rapidly gaining popularity in both academia and industry. Service broker controls the traffic routing between user bases and data centers based on different service broker policies. Service proximity based routing policy selects closest data center to route the user request. If there are more than one data centers within the same region, it is selected randomly without considering the workload, cost, processing time or other parameters. Randomly selected data center is prone to give unsatisfactory results. In this work, we propose modifying that policy by applying new schedule algorithm that can improve the time response, control the load balance. The evaluation is based on the Cloud Analyst, and the results verified the effectiveness of our proposal that can reduce the response time and the average processing time. Keyword: Cloud Computing, Brokering Policy, Resource sharing, Availability, Cloud Analyst, Cloud Service Broker. × ![]() Swati Raghuwanshi , Saurabh Kapoor " The New Service Brokering Policy for Cloud Computing Based on Optimization Techniques " Volume 4 - Issue 3 (481- 488) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P79 |
80 |
A Review Paper on Analysis of Procurement Methods Used In Construction Industry Using Sampling Techniques- Sahrish Fatima, Anwar Ahmad
Abstract
The aim of this study for establishing an effective materials procurement strategy to magnify the production of building by the using of sampling analysis technique. The purpose of procurement definition is to describe in particular terms what items will be procured and under what conditions. Sometimes items which must be procured for a project can be made internally by an organization. Additionally, procurement deadlines are usually influenced by the project schedule and are needed by certain times to ensure timely project completion. This section is where such items must be listed, justified, and the conditions must be set. Any important technical information should also be included. Individuals may also be listed with authority to authorize purchases in addition to or in the absence of the project manager. The concept is focus directly at producing buildings, where the process of construction and life-cycle of operation, encourage a better quality of living for the inhabitants over a long period of time, putting into consideration the use of energy, water, land and material resources at every stage of construction. Keyword: Procurement Deadlines, Life Cycle, Technical Information, Approve Purchases, Procurement Strategy. × ![]() Sahrish Fatima, Anwar Ahmad " A Review Paper on Analysis of Procurement Methods Used In Construction Industry Using Sampling Techniques " Volume 4 - Issue 3 (489- 492) - May- June 2018, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V4I3P80 |