IJET -Volume 5, Issue 2 , March - April 2019
S.No
|
Title/Author Name
|
Serial No
|
41 |
Hazards in Oil Refineries and its Safety- Mouleeswarn T, Vijay Babu K 10.29126/23951303/IJET-V5I2P41
Abstract
Most of the new of generation petroleum refineries possess high complexity indices, which indicates their extensive conversion capabilities in terms of refining and improving the quality of petroleum product for global consumption. Because of the high demand for petroleum product yield from the aforementioned processes, there is complexity in technology used in handling the processes.This complexity in technology also increases the complexity of petroleum refinery operations.In oil refineries, the concern for safety could be said to focus on two main areas; process safety and personal safety. These two areas are very different from each other but both are important. They require two very different approaches to what one might call “the safety problem”. Process safety involves the development and implementation of interventions concentrated on preventing or minimizing the effect of loss of containment of flammable, toxic, or reactive chemicals. Personal safety interventions focus on the prevention or mitigation of hazards that can result in individual injuries,exposures, or less catastrophic problem, but a no less important one.In this project, the data was collected through open-ended questionnaires from the workers in the oil refinery. The questionnaire was administered to the workers randomly and was used to identify the Health Hazards, determine the awareness of the workers of the Health Hazards and evaluate the Occupational Health Practice that exists in the Refinery.. Keyword: Hazard Control, Safety, Hazardous,Petroleum Process.× Mouleeswarn T, Vijay Babu K"Hazards in Oil Refineries and its Safety" Volume 5 - Issue 2 (274-289) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P41 |
42 |
Effectiveness and Safety Of Open Pit Haul Roads, Operators Performance, Haul Road Design and
Tolerable Methods- Saul Dev, P.V.Prakaash 10.29126/23951303/IJET-V5I2P42
Abstract
Blasting involves the breaking of rocks using explosive that rapidly change due to chemical reaction forming huge volumes of gases with high pressure and temperature causing kinetic energy. The blasting process is primarily a rock–explosive interaction that entails application of pressure generated by detonation of explosives, on rock mass, over a few milliseconds. This rock–explosive interaction results in rock breakage and heaving of the broken rock mass (muck). In comparison to the mechanical methods that rely predominantly on the compressive breakage, blasting exploits the tensile strength of the rock mass. This is probably the reason that blasting is still the most prevalent and economical method for rock breakage. Blasting, in general, results in ‘desired’ and ‘undesired’ outcomes that may be ‘regular’ or ‘random’ in nature. Any mismatch between the energy available and the work done will increase the adverse or undesired blast results like excessive throw and fly rock. Fly rock and excessive throw occur due to deviations in blast design execution, use of excessive explosive energy than the required levels to fragment and throw the rock mass, and/or presence of rock mass features, not accounted for during blasting. Keyword: Chicken mesh, Epoxy resin, Fly ash, Ferro cement laminate, Flexural test, silica fume.× Saul Dev, P.V.Prakaash"Effectiveness and Safety Of Open Pit Haul Roads, Operators Performance, Haul Road Design and Tolerable Methods" Volume 5 - Issue 2 (290-296) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P42 |
43 |
Study Of Cell Tower Radiation and its Health Hazards in Human Body- Obuliraja S, Mr.S.Prabhu 10.29126/23951303/IJET-V5I2P43
Abstract
Mobile Phone usage has been rapidly spread globally and to provide proper coverage, numbers of cell phone towers are also increasing worldwide generating a public concern as to whether frequent utilization of such devices is unsafe. Every technology has some positive as well as negative impacts. There has been a public concern over the adverse impacts of harmful radiation from mobile towers and mobile phones on human ealth.Continuous exposure to microwave radiations from Cell phone towers cause serious health problems over the years. Microwave radiation effects are classified as - thermal and non-thermal. The current exposure safety standards are mainly based on the thermal effects, which are inadequate. Measurements have been carried out at various places near the cell towers and it has been found that the radiation levels are very high. These project various epidemiological and experimental studies, which show significant biological effects far below the current standards. Also, the details of Radiation Shield are given, which consists of orthogonally polarized multiple broad band monopole antennas to absorb the undesired radiation.. Keyword: GFRP rebars; steel rebars; reinforced concrete; flexural strength.× Obuliraja S, Mr.S.Prabhu"Study Of Cell Tower Radiation and its Health Hazards in Human Body" Volume 5 - Issue 2 (297-301) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P43 |
44 |
Protected High Throughput Multicast Routing Wireless Mesh Network- Karthik P, Arivazhagi P 10.29126/23951303/IJET-V5I2P44
Abstract
Multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. We identify novel attacks against high-throughput multicast protocols in wireless mesh networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. We show that these attacks are very effective against multicast protocols based on high-throughput metrics. We conclude that aggressive path selection is a double-edged sword: While it maximizes throughput, it also increases attack effectiveness in the absence of defense mechanisms. Our approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The solution also accommodates transient network variations and is resilient against attempts to exploit the defense mechanism itself. A detailed security analysis of our defense scheme establishes bounds on the impact of attacks. We demonstrate both the attacks and our defense using ODMRP, a representative multicast protocol for wireless mesh networks, and SPP, an adaptation of the well-known ETX unicast metric to the multicast setting. Keyword: networks, attacks, protocols, ODMRP, defense.× Karthik P, Arivazhagi P"Protected High Throughput Multicast Routing Wireless Mesh Network" Volume 5 - Issue 2 (302-306) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P44 |
45 |
Design Systemof Monitoring Invoice Employee Financial in PT. AngkasaPura II- Yuliani, Novita Sari Ayu, Rahmawati Akeda 10.29126/23951303/IJET-V5I2P45
Abstract
PT. Angkasa Pura II is one of the State-Owned Enterprises engaged in the business of airport services and services related to airports in the region of western Indonesia. Effective information systems and accountability are needed by the company as a successful support and success of a plan that is desired by a company. Information is needed to improve the quality of services for the unit technician or customer. Financial information system monitoring bill still using manual systems, by using Microsoft Excel as a data storage medium, such that the need for the development of a computerized system for creating a productive performance. The analytical methods used using PIECES (Performance, Information, Economic, Control, and Efficiency, Service). Design method using UML (Unified Modeling Language), a programming language PHP, using a MySQL database, and using Macromedia Dreamweaver CS3 for web design and testing method using the Black Box Testing. With the development of the system is expected to be the future of PT Angkasa Pura II can improve the productivity performance by using the computerized system. Keyword: Design, Monitoring, financial invoice, online.× Yuliani, Novita Sari Ayu, Rahmawati Akeda"Design Systemof Monitoring Invoice Employee Financial in PT. AngkasaPura II" Volume 5 - Issue 2 (313-320) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P45 |
46 |
Comparative study between Vortex Tube Refrigeration System and regular Air Conditioner: Experiment- Rahul Sharma, Sarthak Nagori, Shailendra Dubey, Sheikh Mohd. Faizan, Yogesh Kadam 10.29126/23951303/IJET-V5I2P46
Abstract
Refrigeration plays an important role in developing countries, primarily for the food preservation, medicinal activities, and for the air conditioning. Conventional refrigeration systems are using Freon and CFC’s as refrigerant. As this chemicals are the main cause for depletion of ozone layer, extensive work is going on alternate refrigeration projects.Thermal separation flow studied and preliminary tests suggest that with the increase in technological advancements, vortex tube refrigeration can be effectively used in place of conventional refrigeration systems. In this paper, comparative study has been done on regular air conditioner and environment friendly refrigeration system. A model is designed and constructed, in the laboratory, for the experiment on the vortex cooling system incorporating the thermoelectric module. Test parameters are the cold fraction from 0 to 1 and an inlet air pressure of 4 bars. The results show that the COP of vortex tube refrigeration system is less than the regular Air conditioner but it can be used as a cooling medium for spot cooling at thermal machinery, cutting tool, electronic enclosure and vest cooling. In the mining where the working environment may be uncomfortable and inconvenient to construct conventional cooling system, vortex cooling has proved to be useful.. Keyword: Refrigeration; Vortex tube; Efficiency; Cooling capacity.× Rahul Sharma, Sarthak Nagori, Shailendra Dubey, Sheikh Mohd. Faizan, Yogesh Kadam"Comparative study between Vortex Tube Refrigeration System and regular Air Conditioner: Experiment" Volume 5 - Issue 2 (313-320) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P46 |
47 |
Surveillance Car using Arduino- Kalpit Jadhav, Ravi Gupta, Sameer Matkar, Isha Gujarathi 10.29126/23951303/IJET-V5I2P47
Abstract
The proposed work presents designing and development of a multipurpose smart robot car using wireless camera detecting harmful gases, metals, obstacles at remote areas and send information to main location. The proposed system uses machine intelligence to provide immediate response from sensors. The robot system is equipped with sensors those can alert the user when some anomaly appears within the range while robot is working.Robotic system can perform many securityandsurveillancefunctionsmoreeffectivelythanhumans.Alsoalongwithgivingtherealtimedatatotheuserwhowillcontrolthebot,needsto send data of the terrain immediately.Such a bot needs to have a sturdy body with wheels andsensors that can tolerate extremeconditions.. Keyword: ---.× Kalpit Jadhav, Ravi Gupta, Sameer Matkar, Isha Gujarathi"Surveillance Car using Arduino" Volume 5 - Issue 2 (321-327) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P47 |
48 |
Image Re Position Based On Focus Multiplicity- P. Sakila M., S. Arun Deva Kumaran 10.29126/23951303/IJET-V5I2P48
Abstract
Image re-ranking is effective for getting better the performance of a text-based image search. However, active re-ranking algorithms are restricted for two main reasons: 1) the textual meta-data associated with images is often unjust with their actual visual content and 2) the extracted visual features do not exactly describe the semantic similarities between images. Recently, user click information has been used in image re-ranking, because clicks have been shown to more accurately describe the relevance of retrieved images to search queries. However, a critical problem for click-based methods is the lack of click data, since only a small number of web images have actually been clicked on by users. Therefore, we aim to solve this problem by predicting image clicks. We propose a multimodal hyper graph learning-based sparse coding method for image click prediction, and apply the obtained click data to the re-ranking of images. We adopt a hyper graph to build a group of manifolds, which explore the complimentarily of different features through a group of weights. Unlike a graph that has an edge involving two vertices, a hyper edge in a hyper graph connects a set of vertices, and helps preserve the local smoothness of the constructed sparse codes. An irregular optimization procedure is then performed, and the weights of different modalities and the sparse codes are simultaneously obtained. Finally, a strategy is used to describe the predicted click as a binary event (click or no click), from the images’ equivalent sparse codes. Thorough empirical studies on a large-scale database including nearly 330K images demonstrate the effectiveness of our approach for click prediction when compared with several other methods. Additional image re-ranking experiments on real world data show the use of click prediction is beneficial to improving the performance of prominent graph-based image re-ranking algorithms. Keyword: Image re-ranking, actual visual content, algorithms, multimodal hyper graph..× P. Sakila M., S. Arun Deva Kumaran"Image Re Position Based On Focus Multiplicity" Volume 5 - Issue 2 (328-332) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P48 |
49 |
Improvement in Substation Protection Using Thyristor Gate Pulse Control Technique- Mr. Amit Ravindra Bopshetti, Mr. Sanket Anil Bhamre, Mr. Shashank Satish Jadhav 10.29126/23951303/IJET-V5I2P49
Abstract
In power system includes various stages like generation, transmission and distribution. All of this stage required protection scheme because each stage voltage levels ar large. That about generating voltage is 11kv. Transmission voltage level is about 11kv, 132kv, 220kv, 400kv. This high voltage step-down by distribution level. But there is presence of various types of fault in this system like line to line, line to ground, double line to ground fault and fault due to lightening. Therefore it is necessary that protects the system against such abnormal conditions. So protection scheme to be provided to provide protection within less time. So as per subject scheme take very less time to protection system from dangerous abnormal conditions.Power electronic devices of thyristor family are required for selecting arrangements.Microprocessor available to implement system protection performance. Keyword: kilo volt (kV), current transformer (CT), silicon controlled rectifier (SCR).× Mr. Amit Ravindra Bopshetti, Mr. Sanket Anil Bhamre, Mr. Shashank Satish Jadhav"Improvement in Substation Protection Using Thyristor Gate Pulse Control Technique" Volume 5 - Issue 2 (333-335) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P49 |
50 |
Data Mining Implementation Using Naive Bayes Method for Prediction of Customers in Customer's Credit Payment in CS Finance- Herfandi, Royan Habibie Sukarna 10.29126/23951303/IJET-V5I2P50
Abstract
Credit collectibility is a way to find out the quality of credit so that Central Santosa Finance can anticipate credit risk early because credit risk can affect the continuity of business enterprises. The quality is based on 3 main standards, one of which is the ability of customers to pay the principal and interest at the time agreed upon together. Whereas, to accurately predict the ability of prospective customers to repay loans based on the characteristics of manually owned data sets is very difficult. Data Mining with the Naïve Bayes method was chosen to find patterns in analyzing and predicting the ability to repay prospective borrowers. The test will be carried out by comparing the initial dataset and dataset characteristics using the attribute selector Gain Ratio Attribute algorithm with the help of WEKA tools. The results showed that there was a difference in the results of accuracy, and that the ROC or AUC (Area Under Cover) curve was greater in the dataset characteristics using the selector attribute by using the Gain Ratio attribute, although not too significant. And the results of this study produced an accuracy rate of 78.56% with a precision of 93.46% and a recall of 72.78%. The method used is included in Good Classification and will later become a reference for the management of Central Santosa Finance, to address the problems that may arise in decreasing the quality of credit (eg decreasing the company's ratio with customers). Keyword: Data Mining, Credit Analysis, Customer Prediction, Naïve Bayes.× Herfandi, Royan Habibie Sukarna"Data Mining Implementation Using Naive Bayes Method for Prediction of Customers in Customer's Credit Payment in CS Finance" Volume 5 - Issue 2 (337-343) March - April 2019, International Journal of Engineering and Techniques (IJET),ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I2P50 |