IJET -Volume 5, Issue 5 , September - October 2019
S.No
|
Title/Author Name
|
Serial No
|
1 |
Finite Element Analysis on Vehicle Bumper Using Springs
- Remalle Vikky, Dr.K. Sunil Rantna Kumar
Abstract
Automobile design with safety and given economy has been a great challenge to engineers in design section. Bumper is main role acting on vehicle which is used in protection of passengers and also protection of a front and rear ends of vehicle from collision. The safety part of the total vehicle act in bumper it act an import role in vehicle, now day’s bumper part are used in vehicle which connect to front and rear ends when directly to chassis .so when act in collision in vehicle are happened the impact forces to transfer the remaining parts through linkage. There is no innovative mechanism to reduce the impact forces. In this present work, a moderate type of bumper system was developed by using the addition of springs to the system and also an alternate material for the bumper is used in place of the existing material. The designed process is carried out by using CATIA and structural analysis is done by ANSYS software. The obtained results show that the use of springs and also alternate material to the bumper leads to reduce in total deformation, strain energy, maximum principal stresses and maximum shear stresses. These results are also shown by using graphs. Keyword: × Remalle Vikky, Dr.K. Sunil Rantna Kumar Evaluation of mechanical properties of Al-2618, Frit and Graphite based AMMC " Volume 5 - Issue 5 (1-9) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I5P1 |
2 |
Evaluation of mechanical properties of Al-2618, Frit and Graphite based AMMC
- Ravi N S, Dr. D Ramesh, Dr. S N Lakshminarasimhan
Abstract
Composites from last few decades, shows excellent properties compared to other alloys and materials. Due to the demand and need in the fields of aerospace, automobiles, for weight, cost, quality, including the performance –hence play vital role in application fields. Several processing techniques available for fabrication of ‘Al’ – MMCs out of which stir casting method was employed by using reinforcements ,Frit and Graphite.Al-2618 with frit and graphite based composite with varying graphite by Weight in 0%, 2%, 4%, 6% and 8% and keeping constant 6% Frit experimental study was carried. The result shows excellent values for2% graphite based for tensile strength, compression strength and hardness values. The microstructures of the composites were also studied. Keyword:MMC, Al × Ravi N S, Dr. D Ramesh, Dr. S N Lakshminarasimhan Evaluation of mechanical properties of Al-2618, Frit and Graphite based AMMC " Volume 5 - Issue 5 (1-6) September-October2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP2 |
3 |
Mechanical Behavior and Analysis of Okra and Pineapple Reinforced Composite Materials
- M. Siva Prasad,Ramu Gurugubilli,V. Pradeep Kumar
Abstract
The cutting edge dynamic world can't envision its improvement without getting the idea of progression material composite. Different explores are going on in this field to accomplish the ideal standard. Characteristic Fibre fortified polymer composite has an immense liking to supplant the composite made up of manufactured Fibre. This is essentially a result of the favorable circumstances like light weight, non-harmful, non-rough, simple accessibility, minimal effort, and biodegradable properties. The manufactured strands have higher end of mechanical properties like rigidity and pliable modulus anyway the particular mechanical properties like explicit malleable modulus and other explicit (properties/explicit gravity) of common Fibre gives a wonderful outcome for composites when contrasted with engineered Fibre based composites. Expanded ecological mindfulness and cognizance, has built up an expanding enthusiasm for normal strands and its applications in different fields. Common Fibre fortified composites assumes a key job in building applications like car parts, vehicle entryways, furniture and so on. The present work expects to decide the mechanical conduct of the pineapple/okra Fibre strengthened in Epoxy LY-556 sap. Pineapple and Okra filaments are separated from the bast of the Okra plant, pineapple leaf of the Tiliaceae family. Their utilization as a potential support in polymer composites requires the comprehension of their mechanical properties. Their utilization in the application world is enormous. The composites of the Pineapple/Okra fiber filaments fortified with the epoxy sap are made into examples and tried for their mechanical properties. The properties of hardness, sway, elasticity and pressure test are estimated. The malleable test is led on examples made by ASTM D-638-1. Keyword:Pineapple Fibre, Okra Fibre, Epoxy Resin, Mechanical Properties. × M. Siva Prasad,Ramu Gurugubilli,V. Pradeep Kumar Mechanical Behavior and Analysis of Okra and Pineapple Reinforced Composite Materials " Volume 5 - Issue 5 (1-8) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP3 |
4 |
Optimization of Machine Cycle Time Using Data Analytics (Python Programming) & Quality Management
- Ritesh Radhakrishnan, Adithya Venkatesh, Priyanka. B
Abstract
This paper is aimed at bringing industrial engineering concepts such as plant layouts and cycle time along with data science and analytics together. A sample layout for an imaginary product has been designed and a suitable code has been created to analyse the machines that cause more delay. By use of this code, we will be able to know about the error prone machine(s) and stock up the spare parts and also arrange our production schedule accordingly. Python programming language has been used along with Microsoft Excel to work upon the collected data. Suitable causes of error are predicted for this product and solutions have been provided to make manufacturing process smooth. Our aim is to provide a package which comprises of a code which people or firms facing similar issues can use. Keyword:Data Analytics, Python, Machine Cycle Time, Assembly Layout. × Ritesh Radhakrishnan, Adithya Venkatesh, Priyanka. B Optimization of Machine Cycle Time Using Data Analytics (Python Programming) & Quality Management " Volume 5 - Issue 5 (1-6) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP4 |
5 |
DESIGN AND FABRICATION OF THERMOELECTRIC REFRIGERATION SYSTEM
- R. Shanmugam, N. Mohanraj, S. Gopinath, P. Kanimozhi
Abstract
The global increasing demand for refrigeration led to production of more electricity and consequently more release of CO2 all over the world which is a contributing factor of global warming. Thermoelectric refrigeration is an alternative as it convert waste electricity into useful cooling. Thermoelectric refrigeration is greatly required, particularly for developing countries where long life and low maintenance are needed. The objectives of this study is to style and develop an operating thermoelectrical white goods interior cooling volume of 10L that utilizes the Peltier result to keep up a specific temperature from 5 °C to 25 °C. The design needs area unit to chill this volume to temperature at intervals a fundamental quantity of half-dozen hrs and supply retention of a minimum of next half hour. The design demand, choices offered and also the final style of thermoelectrical white goods for application area unit given. Keyword:Global warming,thermoelectric refrigeration, Peltier effect. × R. Shanmugam, N. Mohanraj, S. Gopinath, P. Kanimozhi DESIGN AND FABRICATION OF THERMOELECTRIC REFRIGERATION SYSTEM " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP5 |
6 |
FABRICATION AND EVALUATION OF MECHANICAL PROPERTIES ON AL2618 REINFORCED WITH FRIT MMC
- Ravi N S, Dr. S N Lakshminarsimhan , Dr. D Ramesh
Abstract
Several processing techniques available for fabrication of Al–MMCs. Out of which stir casting method was employed by using matrix material Aluminum-2618 combined with reinforcement material Frit in different weight percentages of 2%, 4%, 6% .and 8% l and experimental study was carried. The result shows excellent values for 6% Frit based composition for Tensile strength and Hardness properties. Keyword:Al, MMC × Ravi N S, Dr. S N Lakshminarsimhan , Dr. D Ramesh FABRICATION AND EVALUATION OF MECHANICAL PROPERTIES ON AL2618 REINFORCED WITH FRIT MMC " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP6 |
7 |
TRUSTWORTHY CONVEY FOR SENSOR NETWORKS WITH MOBILE SINK
- Dr. K. Ravi Kumar , V. Tamil Selvi
Abstract
The vehicles speed to prevent crashes occurrence and reduce the impact when they occur, lessening the severity of injuries sustained by the victims. I propose a modern and an efficient methodology for detecting and reporting illegal speeds. The system alerts the driver if he exceeded the allowed speed limit. An infraction is reported against him if he didn’t slow down within a predefined amount of time. The infractions are sent to a central database and are displayed in a webpage. The system was implemented in a local network, so an Ethernet cable sufficed for the communication purpose. Over speeding has been identified as a major cause for traffic accidents. The accidents due to high speed result in crashes, dangerous injuries and death. Keyword:RTO, Web services, Wireless sensor, Speed monitoring, Mobile sink. × Dr. K. Ravi Kumar , V. Tamil Selvi TRUSTWORTHY CONVEY FOR SENSOR NETWORKS WITH MOBILE SINK " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP7 |
8 |
ANTICIPATED SECURITY MODEL FOR SESSION TRANSFER AND SERVICES USING OTP
-Mr.N.Muthumanickam , Mr.A.Senthil Kumar
Abstract
Internet safety measures is a branch of computer sciences often involving browser security, system safety measures, and application and functioning systems to keep the internet as a protected channel to swap in order by sinking the risk and attacks. There are figures of studies that have been conducted in this field consequential in the growth of various safety measures models to attain internet safety measures. However, episodic safety measures information and earlier studies show that the most protected systems are not resistant from risk and much attempt is necessary to get better internet safety measures. This paper planned an effortless safety measures representation to progress internet applications defence and services protections, particular admittance control, cryptographic, cookies and session managements, defence programming practices, care for security from early stage on expansion life cycle. Keyword:fraudulent, Combinationarial Optimization Identification, Public Key Infrastructure, Partial Forward Secrecy, Web services. × Mr.N.Muthumanickam , Mr.A.Senthil Kumar ANTICIPATED SECURITY MODEL FOR SESSION TRANSFER AND SERVICES USING OTP " Volume 5 - Issue 5 (1-5) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP8 |
9 |
PRIVACY PRESERVING FOR ONLINE USER BEHAVIOUR DATA
-Dr. K. Ravi Kumar , K. Saranya
Abstract
Online users’ privacy is thus under the risk of being exposed to third parties. The last decade has spectator a body of research works trying to perform data aggregation in a privacy-preserving way. Most of existing methods guarantee strong privacy protection yet at the cost of very insufficient aggregation operations, such as allowing only summation, which hardly satisfies the need of behavior analysis. We propose a scheme PPSA, which encrypts users’ sensitive data to prevent privacy exposure from both outside analysts and the aggregation service provider, and fully supports selective aggregate functions for online user behavior analysis while guaranteeing the exponent privacy. We have implemented our method and evaluated its performance using a trace-driven evaluation based on a real online behavior dataset. Experiment results show that our scheme expertly supports both overall aggregate queries and various selective aggregate queries with acceptable computation and communication overheads. Keyword:fraudulent, PPSA, Web services, Trace Driven, Selective Aggregation. × Dr. K. Ravi Kumar , K. Saranya PRIVACY PRESERVING FOR ONLINE USER BEHAVIOUR DATA " Volume 5 - Issue 5 (1-3) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP9 |
10 |
Design of Arduino Enabled Solar Powered Grass Cutter
-G K Balaji, S Avinash, Badrinarayanan C V, Toral Anandkumar 10.29126/23951303/IJET-V5I5P10
Abstract
The solar-powered grass cutter is a fully automated grass cutting machine. The main objective of this design & fabrication is to replace the conventional grass cutter that consumes more man-power. This is to construct and develop a mechanical machine to provide the best opportunities for automatic grass cutting. The working of this project depends on the non-conventional energy sources like solar power transmission. The design is simple and easy to operate since it is controlled by smartphones. This equipment is designed to minimize the human effort, to reduce the cost and to provide efficient work output as it utilizes the solar energy which powers to cut the grass. Keyword:Automated, Conventional Grass Cutter, Non-conventional energy sources, solar power transmission and Smartphones. × G K Balaji, S Avinash, Badrinarayanan C V, Toral Anandkumar Design of Arduino Enabled Solar Powered Grass Cutter " Volume 5 - Issue 5 (1-6) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP10 |
11 |
MINIMIZE SHOULDER SURFING ATTACK BY MEANS OF MANUSCRIPT AND COLOUR BASED GRAPHICAL CODE WORD PROPOSAL
-P.Gayathri , Mr. A.Senthil Kumar 10.29126/23951303/IJET-V5I5P11
Abstract
A Textual Password Scheme and passage based shoulder surfing unwilling graphical code word system; the better Text and Colour Based Graphical Password system to decrease Shoulder Surfing Attack is projected. By means of this system user can professionally login the system. The proposed system is used to decrease the Shoulder surfing attack and it will get better the safety measures of existing Applications. Keyword:Graphical Password, Textual Password, Shoulder Surfing, safety measures, recognition model × P.Gayathri , Mr. A.Senthil Kumar MINIMIZE SHOULDER SURFING ATTACK BY MEANS OF MANUSCRIPT AND COLOUR BASED GRAPHICAL CODE WORD PROPOSAL " Volume 5 - Issue 5 (1-3) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP11 |
12 |
CO DETECT: FINANCIAL FRAUD DETECTION SYSTEM BASED ON BEHAVIOR CERTIFICATE (BC)
-V.Santhi , Mr. A.Senthil Kumar 10.29126/23951303/IJET-V5I5P12
Abstract
In today’s world frauds are increasing in both regular purchasing and online shopping. More increases in online shopping. For every transaction bank should check whether the transaction is fraudulent or not. Fraudster uses various techniques to generate the fraudulent transactions. Nowadays online transactions are more fraudulent than offline transactions. Due to increase in frauds more advance fraud detection system needed the most. Banking mostly use data mining techniques for credit card fraud detection. In this paper we propose a new credit card fraud detection system based on Behavior Certificate (BC) which reflects the cardholders’ transaction habits using Random Tree data mining technique. Keyword:fraudulent, data mining technique, online shopping, Behavior Certificate, Random Tree × V.Santhi , Mr. A.Senthil Kumar CO DETECT: FINANCIAL FRAUD DETECTION SYSTEM BASED ON BEHAVIOR CERTIFICATE (BC) " Volume 5 - Issue 5 (1-5) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP12 |
13 |
DESIGN AND FABRICATION OF MANUAL HYDRAULIC JACK
-R. Shanmugam,V.Vasanth kumar,V.Kamalesh,G.Manikanda yuvaraj 10.29126/23951303/IJET-V5I5P13
Abstract
Hydraulic jack is a device used to lift heavy loads through hydraulic cylinder. In several automobile garages, it is revealed that most difficult method were adopted to lift the vehicle for reconditioning. Manual Hydraulic jack mainly designed to overcome the difficulties to lift the vehicles in garages. The working of manual hydraulic jack is to convert rotating motion in to linear motion by using crankshaft arrangement . Due to manual hydraulic jack vehicle can be lifted from the floor land without application of any impact force. The fabrication process has been considered with simplicity and economy, such that this can be accommodate as one of the necessary tools in automobile garages. Keyword:hydraulic jack, automobile garages. × R. Shanmugam,V.Vasanth kumar,V.Kamalesh,G.Manikanda yuvaraj DESIGN AND FABRICATION OF MANUAL HYDRAULIC JACK " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP13 |
14 |
Topology Optimization of Steering Knuckle for Additive Manufacturing
-Jawahar Raja, Jeshurun Paul, Kannan, Toral Anandkumar 10.29126/23951303/IJET-V5I5P14
Abstract
The main objective of the project is to redesign the steering knuckle in such a way that the material could be reduced without affecting its functionalities, as it is one of the major components of the vehicle system. It connects the wheel, suspension system and the steering of the vehicle. By the process of optimization, the topology of the steering knuckle gets more complex when compared to the normal one. The process of doing so with the help of finite element is called Topology Optimization. The finite element analysis is done for the unoptimized steering knuckle and for the iterations of optimized components, the finite element analysis values of the iterations are compared and the most effective design is selected from all the three iterations. The optimized component can be manufactured by additive manufacturing processes, like Powder Bed Fusion, Material Extrusion, Vat polymerization, as it is the only process in which complex shapes can be manufactured with ease. And thus finally a weight reduction of about 55% is obtained using Topology Optimization for the steering knuckle. Keyword:Topology, additive manufacturing, steering knuckle, optimization × Jawahar Raja, Jeshurun Paul, Kannan, Toral Anandkumar Topology Optimization of Steering Knuckle for Additive Manufacturing " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP14 |
15 |
SECURE ATM CARD USING BIOMETRIC IN MOBILE TECHNOLOGY
-Dr. K. Ravi Kumar , S.Manimozhi 10.29126/23951303/IJET-V5I5P15
Abstract
An autonomous ATM host has a right to use any bank. There is no safety measures layer is implemented in the ATM card except for pin number. It is very expensive for the bank to scanner. We supervise the position of the ATM usage, time taken for the user to accessing the ATM machine, sequence of events processed by the user and expected amount of withdrawal by the user. These entire factors are verified for the verification rationale of the user along with ATM scanning and biometric confirmation. If any of the above said, parameter are differing and then the link is generated to the User’s Mobile number for further more secure authentication system. In the modification phase, an automation user Internet (Bank server) recognition model using mobile is designed to enhance the user comfort and detection of the time span spend by the user in the ATM machine. Keyword:ATM, Transaction, Biometric, Bank server, recognition model × Dr. K. Ravi Kumar , S.Manimozhi SECURE ATM CARD USING BIOMETRIC IN MOBILE TECHNOLOGY " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP15 |
16 |
SECURE PHOTO SHARING IN SOCIAL NETWORKS
-G.Keerthana , Mr. A.Senthil Kumar 10.29126/23951303/IJET-V5I5P16
Abstract
Usage of community media’s has been very much growing in today’s globe, which enables the user to split their private in sequence like imagery with other users. This enhanced knowledge leads to seclusion breach where the users can contribute to great figure of images across the system. To make available safety measures for the information, we put ahead this paper consisting Adaptive Privacy Strategy Forecast (APSF) structure to help users generate safety measures for their images. The position of images and its metadata are examined as a calculate of user’s seclusion preferences. The skeleton determines the most excellent isolation strategy for the uploaded imagery. It includes an representation classification skeleton for connection of images with comparable policies and a strategy forecast practice to robotically produce a seclusion strategy for user-uploaded images. Keyword:APSF, Artificial Neural Network, metadata, classification, robotically. × G.Keerthana , Mr. A.Senthil Kumar SECURE PHOTO SHARING IN SOCIAL NETWORKS " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP16 |
17 |
Crawdfunding System WithLaravel Framework and VPS
-PutuAdiGuna Permana, Evi Triandini 10.29126/23951303/IJET-V5I5P17
Abstract
Information Technology is growing rapidly, business actors have started to use a lot of website media in developing their businesses. Many new domains have sprung up which are business people developing business promotion on the internet. Business opportunities have begun to be in demand among young people but not most of them are able to carry out their business due to capital constraints. Crawdfunding is the practice of raising funds from a large number of people to capitalize on a project or business that is generally carried out through the internet. Web based crawdfunding system with laravel framework and virtual private server will strengthen security from the application and data side. Virtual Private Server (VPS) is a cloud-based computing where data and systems are stored all in one private account instead of shared hosting that is commonly used. This system was built to make it easier for business people who have minimal capital but can still run a business. Keyword:technology,crawdfunding, laravel,vps. × PutuAdiGuna Permana, Evi Triandini Crawdfunding System WithLaravel Framework and VPS " Volume 5 - Issue 5 (1-7) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP17 |
18 |
APPLICATION OF CLASSIFICATION ALGORITHM C4.5 FOR PREDICTING ASSET MAINTENANCE
-Muhammad Rizki, Deni Mahdiana 10.29126/23951303/IJET-V5I5P18
Abstract
In asset management, determining maintenance actions is one of the problems faced by the company. The importance of maintenance to accelerate the production or performance of a company is now a necessity that must be run. The problem faced by Astra Daihatsu Motor is the difficulty in determining the maintenance action that must be chosen because of information delays when there are assets that are damaged, failed or failure. With the proposal using a decision tree with C4.5 algorithm can predict failures and damage that occur so that it can determine more accurate maintenance actions. Decision tree is a prediction model using tree structure or hierarchical structure. The concept of a decision tree is to transform data into decision trees and decision rules. The main benefit of using a decision tree is its ability to break down complex decision-making processes to be simpler so that decision makers will better interpret the solution of the problem. Using the decision tree method with the C4.5 algorithm can help the problems faced by Astra Daihatsu Motor in determining maintenance. This is shown from the test results of 98.20%. And it can be concluded that the application of C4.5 algorithm is able to produce asset maintenance patterns with better accuracy. Keyword:Assets, Maintenance, Decision Tree, C4.5 Algorithm, Classification. × Muhammad Rizki, Deni Mahdiana APPLICATION OF CLASSIFICATION ALGORITHM C4.5 FOR PREDICTING ASSET MAINTENANCE " Volume 5 - Issue 5 (1-14) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP18 |
19 |
Modelling of Climatic Change Impact on Water Balance in the Nile Delta Region
-Mohamed A. Ashour, Tawab E. Aly, El-Said M. S. Ahmed, Yousra A. Eldegwee 10.29126/23951303/IJET-V5I5P19
Abstract
Management of the traditional irrigation system of Egypt is considered one of the most complicated problems, as it is based on the efficient assessment of the irrigation network at different levels. However, that management process does not describe the sustainability of the irrigation system to face some serious challenges such as climatic and water supply changes. This could be analyzed by using the integrated concept of water balance, which helps to identify where and when water can be saved or lost in an irrigation system. In the present study, the Distributed Catchment Scale Model (DiCaSM) was applied to study the impact of climate and water supply changes on the water balance components in the Nile Delta region, Northern Egypt, comprising nine governorates with a total area of about 21,107 km 2 . The study area had many problems, such as soil salinization, water quality issues, escalating the gap between water demand and availability, as well as limited information on different hydrological elements, in this regard; mathematical modelling is a reliable method to explain such problems at the regional scale. This research aims to investigate the severity of the climatic and water supply changes impacts; and how will the Nile Delta withstand and cope with such projected changes. The results obtained from this study, demonstrate the capability of the DiCaSM model to compute the different components of the Nile Delta water balance and to effectively simulate the ground water levels and recharge values. Furthermore, the model was employed to simulate different climate and water supply change scenarios for the area of interest. Keyword:Nile Delta, Climatic Changes, Water Balance. × Mohamed A. Ashour, Tawab E. Aly, El-Said M. S. Ahmed, Yousra A. Eldegwee Modelling of Climatic Change Impact on Water Balance in the Nile Delta Region " Volume 5 - Issue 5 (1-9) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP19 |
20 |
Credit Card fraud analysis and detection Using Machine Learning
-K.Banupriya , Mr.S.Baskaran 10.29126/23951303/IJET-V5I5P20
Abstract
Credit card fraud is a serious and ever-growing problem with billions of dollars lost every year due to fraudulent transactions. Fraud has always been present and will always be. It is also ever changing, as the technology and usage patterns change over time, which makes CCFD (credit card fraud detection) a particularly hard problem. Furthermore, a classification of mentioned techniques into two main fraud detection approaches, namely, misuses (supervised) and anomaly detection (unsupervised) is presented. Again, a classification of techniques is proposed based on capability to process the numerical and categorical datasets. Data will be processed by machine learning based on Decision tree, SVM, Linear regression. Thus, it gives chart based result which has been prejudiced by data mining. Keyword:Credit Card, Fraud Classification, Fraud Detection Techniques, Machine Learning. × K.Banupriya , Mr.S.Baskaran Credit Card fraud analysis and detection Using Machine Learning " Volume 5 - Issue 5 (1-5) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP20 |
21 |
AUTOMATIC DIMENSION ANALYZER
(ADA)
-Dhanasekar.R,Dr.Sengottuvel.P 10.29126/23951303/IJET-V5I5P21
Abstract
The main aim of the project is to measure the dimensions of object in the fully automated way and it can be implemented in the industrial applications mainly in the manufacturing industries, when the object was manufactured it was inspected automatically and can also decide automatically whether the manufactured product is accepted or rejected and also either it may be re machined again. Mainly it was used in the QC department of manufacturing industries. Keyword:Dimensions, Photo diode,Stepper motor, IR led. × Dhanasekar.R,Dr.Sengottuvel.P AUTOMATIC DIMENSION ANALYZER (ADA) " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP21 |
22 |
DESIGN AND FABRICATION OF SELF POWER GENERATOR
-Vignesh.A, P.Sengottuve, Chandra mohan.M 10.29126/23951303/IJET-V5I5P22
Abstract
In recent years, there is a increase in fuel and electricity cost of power supply. So, we are going to reduce the cost of power supply by developing self power generator (SPG) project. The goal of this venture was to decide the electric power creating related with alternator associated with pivoting flywheel turn by engine. The electric power generate on the basis of mechanical energy is converted electrical energy by the generator. The system operated without any fuel and external electric power supply it performs both the motor & alternator functions. It is a vitality effective framework as it offers the advantages. Keyword:SPG, quantum, Nikola Tesla etc. × Vignesh.A, P.Sengottuve, Chandra mohan.M DESIGN AND FABRICATION OF SELF POWER GENERATOR " Volume 5 - Issue 5 (1-3) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP22 |
23 |
A CROWDSOURCING WORKER QUALITY EVALUATION ALGORITHM ON MAPREDUCE FOR BIG DATA APPLICATIONS
-S.GAYATHRI, Mrs.N.VASUNTHIRA 10.29126/23951303/IJET-V5I5P23
Abstract
Crowd sourcing is a up-to-the-minute rising scattered computing and big business model on the surroundings of Internet embryonic. With the enlargement of crowd sourcing systems, the information magnitude of crowdsourcers, contractors and errands grows hastily. The worker quality appraisal based on big data analysis technology has become a critical challenge. This paper first proposes a general worker quality evaluation algorithm with the purpose of is useful to any significant errands such as cataloging, toning, filtering, tagging and many other up-and-coming applications, exclusive of assassination resources. Second, we become conscious the appraisal algorithm in the Hadoop platform using the Map Reduce parallel programming model. Finally, to efficiently verify the accurateness and the effectiveness of the algorithm in a wide multiplicity of big data scenarios, we manner a series of experiments. The trial results exhibit that the proposed algorithm is precise and helpful. It has high computing recital and flat scalability and it is appropriate for significant member of staff value evaluations in a big data atmosphere. Keyword:Map Reduce, big data scenarios, crowdsourcers, Hadoop platform. × S.GAYATHRI, Mrs.N.VASUNTHIRA A CROWDSOURCING WORKER QUALITY EVALUATION ALGORITHM ON MAPREDUCE FOR BIG DATA APPLICATIONS " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP23 |
24 |
INSIDER COLLUSION ATTACK ON PRIVACY-PRESERVING KERNEL-BASED DATA MINING SYSTEMS
-J.JINOVINNARASI , Dr.J.LAVANYA 10.29126/23951303/IJET-V5I5P24
Abstract
In this process we regard as a fresh insider hazard for the seclusion preserving effort of disseminated kernel-based data mining (DKBDM), such as disseminated support vector machine. Surrounded by quite a few known data breaching effort, persons connected with insider attacks have been raising signicantly; manufacture this one of the greatest upward types of safety measures breaches. Some time ago well thought-out a trifling unease, insider attacks enclose risen to be one of the top three vital data violations. Insider-related delve into concerning the circulation of kernel-based data mining is limited, resulting in generous vulnerabilities in manipulative fortification against mutual organizations. Keyword:kernel-based data mining, privacy preserving work, collaborative organizations, insider attacks. × J.JINOVINNARASI , Dr.J.LAVANYA INSIDER COLLUSION ATTACK ON PRIVACY-PRESERVING KERNEL-BASED DATA MINING SYSTEMS " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP24 |
25 |
Experimental works on Concrete by Partial Replacement of Coarse Aggregate with Fly ash Aggregate and Cement with Silica Fume
-Sai Geetha Devi .M, Madhan Gopal.K 10.29126/23951303/IJET-V5I5P25
Abstract
The present research mainly concentrated on replacement of coarse aggregate with Fly Ash aggregate and cement with silica fume in concrete. In present study, a mix design has been done for M30 Grade of concrete by using IS method. By utilization of fly ash aggregate in concrete can make the light weight aggregate concrete. In this investigation we are replacing the coarse aggregate by 20% with fly ash aggregate but cement was replacing by silica fume with 0%,8%, 12% and 16%. In the above mentioned explorations, the concrete cube, cylinder and beams are used to analyze their mechanical properties like Compressive Strength (CS) and Split Tensile Strength (STS) and Flexure strength at 3, 7 and 28 days. The results obtained from the concrete made with 12% replacement of cement with silica fume for using 20% of fly ash aggregate was found to be good performance in all mechanical properties when compared with normal concrete and other proportion mix. Keyword:Fly ash Aggregates; silica fume: Compressive strength; splitting tensile strength; Flexure strength × Sai Geetha Devi .M, Madhan Gopal.K Experimental works on Concrete by Partial Replacement of Coarse Aggregate with Fly ash Aggregate and Cement with Silica Fume " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP25 |
26 |
DESIGN AND FABRICATION OF
SELF BALANCING ROBOT
-Ajith.H,Dr.Sengottuvel.P 10.29126/23951303/IJET-V5I5P26
Abstract
This work describes the design and implementation of a self-balancing two-wheeled robot. The system is similar to the classical unstable, non-linear mechanical control problem of an inverted pendulum on a cart. This project derives the linearized system dynamics equations and approaches the control problem, of stabilizing the robot, using a Arduino system and driving motors. The controller manages to reject disturbances and stabilize the system using only a gyroscope and an accelerometer. Keyword:pid controller,sensor imu board,arduinouno board,l293d driver. × Ajith.H,Dr.Sengottuvel.P DESIGN AND FABRICATION OF SELF BALANCING ROBOT " Volume 5 - Issue 5 (1-4) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5IP26 |
27 |
Mechanical Engineering in Ancient Egypt, Part 86: Diadem Industry
-Galal Ali Hassaan 10.29126/23951303/IJET-V5I5P27
Abstract
This paper is the 86th research paper in a series investigating the evolution of mechanical engineering in ancient Egypt. It investigates the head-diadems industry during a time span from Naqada II to New Kingdom Periods of ancient Egypt. It presents samples and characteristics of diadems from Naqada II, Old Kingdom, Middle Kingdom and New Kingdom. The type, design, ornaments and present location are all investigated Keyword:Mechanical engineering, ancient Egypt, diadem industry, Naqada II to New Kingdom Periods × Galal Ali Hassaan Mechanical Engineering in Ancient Egypt, Part 86: Diadem Industry " Volume 5 - Issue 5 (1-8) September-October 2019, International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org × |
IJET-V5I5P27 |
Under in review process, article will publish soon... |
|