Results in International Research Journal of Engineering & Applied Sciences: 39
(searched for: container_group_id:121188)
Published: 21 February 2023
International Research Journal of Engineering & Applied Sciences, Volume 11, pp 01-11; https://doi.org/10.55083/irjeas.2022.v11i01001
Abstract:
Nanocrystalline Co1+xZrxFe2-2xO4 with different compositions with x = 0.0, 0.1, 0.2, 0.3, 0.4, 0.5 and x = 0.6 were efficiently prepared by sol-gel self-combustion. Citric acid served as fuel and metal nitrates were AR grade. X-ray diffraction results showed that a single-phase cubic spinel structure was produced. The crystallite size, lattice constant, and X-ray density are all within the above limits. The crystallite size supports the nanocrystallinity of the material. Porosity increases because the bulk density is much lower than the X-ray density. The cation distribution results indicate that the cobalt ferrite sample has an inverse spinel structure, with Zr4+ ions occupying [B] positions exclusively and Co2+ and Fe3+ ions occupying tetrahedral (A) and octahedral [B] positions, respectively. indicates possession.
Published: 21 February 2023
International Research Journal of Engineering & Applied Sciences, Volume 11, pp 12-18; https://doi.org/10.55083/irjeas.2022.v11i01002
Abstract:
To fulfill the security criterion of imperceptibility, the secret info is hidden in the cover image using image steganography. To do this, a hidden data bit swaps out the least important part of the cover image. The replacement process produces variability, which has an effect on the imperceptibility parameter. To address this restriction, this research proposes a unique optimal data concealing approach based on the meerkat clan optimization algorithm. This method seeks the best secret data to conceal in the cover image to be able to improve the imperceptibility parameter. The secret data is also divided into 2:4 ratios. The cover image is then divided into smooth and edge regions. A 2-bit LSB technique is utilized to hide data in the smooth area, whereas data hiding in the edge region is accomplished with a 4-bit LSB approach. The simulation is evaluated using multiple performance measures to compare its performance to existing approaches. The suggested technique outperforms the previous method in terms of imperceptibility.
Published: 1 January 2023
International Research Journal of Engineering & Applied Sciences, Volume 11, pp 19-25; https://doi.org/10.55083/irjeas.2023.v11i01003
Abstract:
A thin magnetic oxide layer with composition Ni0.3Cu0.7CoxCrFeO4 (0.0<x<1) is produced by the SILAR process. X-ray diffraction, cation distribution and infrared spectra were investigated as structural features. Permittivity and dissipation factor are properties of interest. Magnetic properties were studied using MOKE. The lamellae have been shown to have spinal structures. As Co grows, the lattice constant also increases. Observed I.R. spectra show tetrahedral and octahedral bonds. Increase in the dielectric properties because enhancement of space charge polarization.
Published: 31 December 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 18-23; https://doi.org/10.55083/irjeas.2022.v10i04009
Abstract:
Micro grids have become popular as a way to reduce carbon emissions and use nonrenewable energy sources to produce power. Microgrids allow users to generate and regulate energy as needed, reducing their reliance on the utility grid. They may also sell excess electricity to the grid and make money. Due to its simple design, fast installation, and easy maintenance, photovoltaic systems are a vital microgrid resource. Microgrids threaten the reliability and optimum functioning of major power grids. It's crucial to discover defects early and fix them before catastrophic system breakdown. This research proposes a unique method based on Discrete wavelet transform and ensemble of Decision tree classifier for detecting and classifying microgrid faults. Once the particular fault type is recognised and categorised, a suitable protective strategy may be used to address it early, enhancing the system's overall safety.
Published: 30 December 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 30-42; https://doi.org/10.55083/irjeas.2022.v10i04006
Abstract:
Cancer, one of the most prevalent causes of death and disease, has a convoluted pathophysiology. Chemotherapy, immunotherapy and radiation therapy are examples of traditional cancer treatments. However, lack of selectivity, restrictions such cytotoxicity, and Drug resistance is a significant barrier to successful cancer treatment. With the development of nanotechnology, the study of cancer treatment has undergone a revolution. For treatment of cancer Nanoparticles can be used because of their special advantages, less toxicity, more good stability, stronger permeability, and exact placement. There are several varieties of nanoparticles. The innovative nanoparticle based drug delivery system makes advantage of characteristics of the tumour and its surroundings. Nanoparticles overcomes the disadvantages of conventional treatment of cancer in addition to avoiding multiple drug resistance. As additional multidrug resistance mechanisms are found and examined, nanoparticle research is also being pursued actively. The therapy includes consequences of Nano formulation have provided fresh perspectives on cancer treatment. The biggest chunk of studies, however, is restricted to in vivo and in vitro experiments, and the number of authorized Nano drugs has not increased significantly over time. This study covers a wide range of nanoparticle kinds, targeting strategies, and authorized Nanotherapy includes use in the cancer treatment. We also provide a summary of the pros, disadvantages, and present state of clinical translation.
Published: 27 December 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 24-29; https://doi.org/10.55083/irjeas.2022.v10i04007
Abstract:
Renewable energy has gained popularity due to depleting natural resources and escalating fossil fuel and nuclear pollution. Power electronic engineers design grid-connected power conversion systems. MLIs provide more power and solutions. Cascaded H-Bridge (CHB) MLIs start with two or more 3L single-phase H-bridge inverters. Each H-bridge may produce three separate voltage levels. Combining the separated dc voltage sources produces a stepped output voltage with a step size equal to the magnitude of the connected sources. The present work develops a method for detecting and resolving switch failures in a three-phase CHB inverter, ensuring system dependability and allowing for system redundancy. The recommended approach uses Wavelet transform to extract features, then Decision Tree classifier to detect and characterise defects. Increased classification accuracy shows the DT-based fault diagnosis system's efficiency in identifying inverter switch faults.
Published: 27 October 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 08-17; https://doi.org/10.55083/irjeas.2022.v10i04002
Abstract:
This work describes a functional, generic, broad-scoped investigative methodology for Windows memory analysis. The methodology applies equally to functional and damaged, or corrupted memory images and relies on Volatility. It is based on the author’s various memory analysis case studies. Summing it up succinctly, the methodology aids the forensic practitioner in squeezing the maximum amount of possible evidence from a memory image. The proposed methodology is suitable for analysts at all levels of investigative capability. It provides guidance in extracting maximum evidence using simple, commonplace tools and techniques familiar to digital forensic practitioners. As with all methodologies, nothing is written in stone; the forensic practitioner must be flexible and agile in responding to ever-changing investigative requirements. To assess the performance of various tools for gaining, analysing, and improving criminal evidence from volatile memory. A comparison of several tools is offered in order to provide a better understanding of the tools used.
Published: 15 October 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 01-07; https://doi.org/10.55083/irjeas.2022.v10i04001
Abstract:
One of the most in demand research topic in today’s technology world is medical area and cancer is one of them. The second main cause of death in the world is cancer. In 2015 about 8.8 million people have died due to cancer [5]. For the early detection of breast cancer several types of research have been done to start the treatment and increase the survivability. Breast cancer affects the women mentally as well as emotionally. The goal of this challenge is to provide a framework that uses a cancer medical dataset as input and then analyses the dataset to produce findings that help medical experts better understand the state of the disease. The majority of studies concentrate on mammography results. However, incorrect detection in mammography pictures can occasionally result, endangering the patient's health. Cancer that forms in the cells of breast is said to be breast cancer. The cancer should be cured if it is diagnosed in early stage. So, with the help of machine learning algorithm the cancer should be diagnosed early. Most of the women lives are affected by the breast cancer in all over the world. There are two types of tumors that can be found in breast cancer i.e. malignant or benign. If a person is having a cancer disease, then it will be categorized as malignant otherwise it is known as benign. In 2020, 685000 deaths and 2.3 million women diagnosed with breast cancer globally, somewhere in world in every 14 seconds, a woman is diagnosed with breast cancer [1]. Patient life from the breast cancer can be saved only if it is found in early stage; if it is diagnosed later then the chances of survival are less. If the cancer is diagnosed early then the patient will get a better treatment. This study will concentrate on a few machine learning methods for identifying if a breast cancer is malignant or benign. The Wisconsin Breast Cancer Dataset, which was acquired via Kaggle, was used in this study. Our goal is to evaluate how accurately various machine learning algorithms can detect breast cancer. These include Random Forest Classifier, Decision Tree Classifier, Support Vector Machine, and K-Nearest Neighbors. All the experiments are conducted on a Jupiter platform. After the analyzing the accuracy of each algorithm the most suitable one is Support Vector Machine that gives the better accuracy among all i.e., 98%.
Published: 4 September 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 42-48; https://doi.org/10.55083/irjeas.2022.v10i03013
Abstract:
Model-based security metrics are an emerging topic of cyber security research that focuses on assessing an information system's risk exposure. We propose an end-to-end solution with the deployment of a zero-trust network utilising Artificial Intelligence in this article to understand the security posture of a system before it is rolled out and as it matures. The major part contains a discussion about the key methods and techniques which was utilized in the development process and simplified operation principles of each developed process. Some developed processes were tested practically to evaluate the problems in the processes. Modules for automatic processing and data analysis were also developed. These modules can be connected in case it is needed. The most important data collection methods were benchmarked to detect problematic situations in the operation in different realistic situations. With the perception from the benchmark test, the problematic parts of the data collection were discovered and proposals for the solution were made which could be developed and tested in the next iterations of the development process. Working Artificial intelligence-based detection and data enrichment methods were created. The results of the article allow multiple continuous research and development projects related to data collection and data analysis with statistical and artificial intelligence-based methods.
Published: 6 August 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 34-41; https://doi.org/10.55083/irjeas.2022.v10i03006
Abstract:
Nowadays e-commerce and online transaction is growing rapidly. For online and offline transaction most of the customer uses credit card. Credit card used globally for online transaction, buy goods, product, and payment. The rising use of credit card can increase the chances of fraud in credit card. Credit card system is at risk now. The effect of this fraudulent transaction is on the bank and institute causing a financial loss to them. For the detection of distinguish frauds, several machine learning models are utilized for better prediction. The major objective of this article is to identify the fraudulent transaction and outlier in credit card transaction. The dataset of credit card is unbalanced. There are various techniques by which fraudulent transaction can be detected and we have used these techniques such as isolation forest method, local outlier factor and support vector machine to determine fraud in credit card. We have used different matrices for enhancing the performance and accuracy. At last comparison analysis is done by using isolation forest, support vector machine, and local outlier which give the better result.
Published: 10 July 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 24-33; https://doi.org/10.55083/irjeas.2022.v10i03003
Abstract:
Internet-based provision of computer resources is known as cloud computing. It is possible to utilise data that is controlled by a third party or some other individual at a distant place through cloud computing. Service Level Agreements (SLAs) are used by the majority of Cloud providers to define the services they provide. As part of the SLA, the service provider promises a certain level of quality of the service. Computing and data clouds are two sorts of clouds in a cloud-based system. In cloud technology, task scheduling is critical to ensuring service quality and SLA. One of the most important aspects of cloud computing is a well-organized work schedule. In this article, we have designed an optimal task scheduling method using RAO approach. The RAO algorithm is simple, required number of parameters, and required no tuning of parameters as compared to the other algorithm. Further, a multi-objective function is designed based on RAO algorithm performs the optimal scheduling. The performance evaluation is done by considering number of tasks such as 50,100,200, 300,400, and 500. Further, number of performance metrics are determined for it. The outcomes represents that the presented technique provides lesser values of AWT, ATT, and make span over the existing method.
Published: 10 July 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 01-09; https://doi.org/10.55083/irjeas.2022.v10i03001
Abstract:
This research work, presents Fuzzy Logic Controller (FLC) based D-STATCOM for power quality (PQ) enhancement in power distribution network. In the power distribution system, PQ is the major issue that is occurring due to non-linearity and dynamic changes in the connected loads. The proposed work utilizes FLC for generating switching Pulses for IGBT switches in the D-STATCOM to enhance quality of power in distribution systems. This research work also shows superior performance over conventional PI controllers in mitigation of harmonics by using proposed FLC topology. The proposed system is simulated with Matlab/Simulink software to ensure effective realization.
Published: 10 July 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 10-23; https://doi.org/10.55083/irjeas.2022.v10i03002
Abstract:
Cloud computing is delivered as a storage service by third party. It gains wide acceptance from various Business organizations & Information Technology (IT) Industries. Cloud computing provides various services to users through the internet; those services are like Applications, computation, and storage etc. In spite of these advantages, cloud technology faces different types of privacy and security related issues. These issues become major barriers to adopt cloud technology into various organizations. This survey paper addresses the cloud architecture, various security and privacy issues, challenges and threats, attacks, and future research directions to overcome the security and privacy related problems in the cloud environment.
Published: 21 June 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 33-41; https://doi.org/10.55083/irjeas.2022.v10i02007
Abstract:
Maximum power point tracking (MPPT) techniques are considered a crucial part in photovoltaic system design to maximise the output power of a photovoltaic array. PID controllers are deployed in the photovoltaic system to track the maximum power point. The performance of the PID controller is influence by controlling parameters. In this paper, we have calculated the optimal parameter values of PID controller using the hybrid combination of GA-PSO algorithm. The proposed method Simulink is designed in MATLAB. After that, various parameters such as settling time, rise time, overshoot, peak time, undershoot, rotor speed, and power generated. The results show that the proposed method provides lower undershoot and settling time as compared to the existing method.
Published: 29 May 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 23-32; https://doi.org/10.55083/irjeas.2022.v10i02006
Abstract:
Users' electricity use may be shared nearly instantly with utilities companies on the smart grid due to Smart Meters (SMs). The data is communicated between individuals in the company, which has prompted privacy issues. In this paper, a privacy-preserving method for smart meter data is designed using a swarm intelligence algorithm. In the swarm intelligence algorithm, JAYA algorithm is taken under consideration and deployed for key generation in the planned method. After that, an XOR operation was performed between the smart meter sensitive data and key generated using a JAYA algorithm for encryption purposes. In MATLAB, numerous performance metrics are computed for the planned technique's performance evaluation. From Simulation results it is clear that the planned method gives better results as compared to the previous methods.
Published: 15 May 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 16-22; https://doi.org/10.55083/irjeas.2022.v10i02005
Abstract:
The most important aspect of all forms of confidential communication is security. Although cryptography can be used to safeguard information, it also reveals the presence of covert communication. As a result, steganography, the art of secret communication, was devised. Steganography conceals the presence of covert communication by putting the secret information in a cover image. The inserting process generates the variability in the cover image that negatively impact the imperceptibility parameter. In this paper, we have designed an optimized data hiding method based on bumble bee optimization algorithm. The bumble bee optimization algorithm searches the optimal secret data order before data hiding. After determining the optimal secret data order, the data hiding is achieved using least significant bit (LSB) method. Besides that, in the proposed method, optimal cover image is also chosen by determining the 0’s and 1’s probability in the LSB of the cover image. The performance evaluation of the proposed method is done on five standard dataset images and performance evaluation is done using mean square error (MSE), peak signal to noise ratio (PSNR), and embedding capacity (EC). The result shows that the proposed method reduces the MSE and enhances the PSNR without impacting the embedding capacity.
Published: 6 May 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 09-15; https://doi.org/10.55083/irjeas.2022.v10i02004
Abstract:
For photovoltaic systems to be more efficient, maximum power point (MPP) tracking of the solar arrays is necessary. The output power of solar arrays is influenced by two factors: temperature and solar irradiation. It is also possible that a traditional MPP tracker would operate incorrectly because to the mismatch effect produced by partial shadow. There are many maximum values for the solar array power–current characteristics when it is partly shaded. For PV systems in partly shadowed conditions, this research provides an MPPT approach with enhanced particle swarm optimization algorithm.
Published: 6 May 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 01-08; https://doi.org/10.55083/irjeas.2022.v10i02003
Abstract:
Increased population results in an increase in travel demand. Greater road length and construction of new roads result in faster and longer travels and increase car ownership, which contributes to increased traffic congestion and pollution. The bus form of travel is a critical component of resolving this issue. A bus can carry 30-40 passenger per trip on the other hand a private car carries 2-3 passengers per trip. So, bus transport could decrease the number of vehicles in road if it can provide better service quality in bus mode. In this experiment, the main objectives are to better understand overall passengers’ satisfaction in bus transport in Uttara-Gazipur route and predict the individual factors contributing to the comfort of the bus modes in this route. To evaluate this result, a questionnaire survey form was created with about 19 service quality parameters such as safe speed, temperature, noise, required time, waiting time for bus, station service, seat comfort service, cleanness, staff behaviour, payment system fare. In this experiment, opinions of 100 passengers were collected regarding the service quality. Data were analyzed using descriptive and multiple linear regression, analyzed by SPSS software. One main finding reported that passengers are not satisfied yet with bus service quality. This study revealed that 75% of feedback was poor or very poor, and 25% of feedback was positive or good regarding the level of satisfaction for bus mode. The regression analysis reported that the overall P-value is less than 0.05 and the regression coefficient, R2 is 0.64, which rejected the null hypothesis and makes the survey significant to assess the overall comfort of passengers traveling with bus in Uttara-Gazipur route. It was also found that three parameters: reliability (ẞ = 0.170, P=0.027), safe speed (ẞ = 0.240, P = 0.021) and travel time (ẞ = 0.320, P = 0.01) are individually contributing to overall satisfaction of passenger in Uttara-Gazipur route.
Published: 21 January 2022
International Research Journal of Engineering & Applied Sciences pp 13-16; https://doi.org/10.55083/irjeas.2022.v10i01003
Abstract:
— The proposed work implements a 8 bit controller based multi-storey car parking system. This work aimed to make the current vehicle parking technique increasingly advantageous, easy to use, programmed and least human mediation. The central part of this system is a 8 bit microcontroller which takes care of parking and exit of vehicles. There are totally 3 floors (floor 0, 1 and 2) each containing 8 slots (slot 0 to slot 7) for parking of cars. Cars are carried to the available free slots in any floor by means of 2 motors controlled by the P89v51rd2(8051 microcontroller). LCD displays the user instructions, messages and status of the system at different conditions. Keypad is provided for entering parking or taking out option. One IR sensor is used to detect the floor number by sensing the IR signal from the IR transmitters located in each floor. The user is provided with the facility of pre-booking or reservation of slots using GSM (Global System for Mobile Communications).
Published: 14 January 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 05-12; https://doi.org/10.55083/irjeas.2022.v10i01002
Abstract:
This thesis addresses the Unified Power Quality Conditioner (UPQC) which is a major custom power solutions capable for load balancing, power factor-correction, voltage regulation, voltage and current harmonics mitigation in a three-phase three-wire distribution system for different combinations of linear, non-linear and dynamic loads. The unit template technique (UTT) is used to get the reference signals for series active power filter and shunt active power filter which utilizes two closed loop PI controllers. The design of three- phase three-wire UPQC includes the design of shunt controller (SHUC) and series controller (SERC).
Published: 10 January 2022
International Research Journal of Engineering & Applied Sciences, Volume 10, pp 01-04; https://doi.org/10.55083/irjeas.2022.v10i01001
Abstract:
The thesis proposes a method for introducing lean manufacturing using string diagram in an operating CNG high pressure storage tank manufacturing job shop at Jayfe Cylinder Ltd. Haryana. By applying lean manufacturing using process layout diagram to produce part families with similar manufacturing processes and stable demand, plants expect to reduce costs and lead-times and improve quality and delivery performance. The thesis outlines a method for assessing, designing, and implementing lean manufacturing using process layout diagram, and illustrates this process with an example. A manufacturing cell that produces high pressure steel tank container for commercial & automobile customers is implemented at cylinder tank Machining Centers. The conclusion of the thesis highlights the key lessons learned from this process.
Published: 31 December 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 20-24; https://doi.org/10.55083/irjeas.2021.v09i04006
Abstract:
An air diffuser while placing in an indoor office space has been the most important consideration for human thermal comfort.To obtain a maximum thermal comfort in an open indoor space the velocity of air and swirl produced by diffuser also has a huge impact.In this thesis we have worked to obtain a better temperature distributed in an indoor space as well as to get a better effect of swirl. We have observed the performance of placing a ceiling swirl diffuser by placing it on a diffuser angle of 9⁰,10⁰,11 in an indoor space. Swirl produce by diffuser depends on it angle and proper swirl mixing with air produce better temperature distribution inside the room to obtain thermal comfort so by this experimental work we just want to evaluate and analysis the proper flow of air by swirl diffuser to design more angle validated ceiling diffusers.
Published: 31 December 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 25-27; https://doi.org/10.55083/irjeas.2021.v09i04005
Abstract:
In the current scenario, wind turbine energy accounts for 70% of total renewable energy used in India. The Indian wind energy sector has a capacity of 20 GW installed (as on 31.5.2017). In terms of installed wind power capacity, India ranks fifth in the world and is regarded as a major player in the global wind energy market. For the current work, a design method based on modelling in Uni-graphics and followed by simulation using the CFD (Computational Fluid Dynamics) star ccm + programme is chosen, so that the expense and time required to find the optimum aerodynamic design of a wind turbine blade by experiment can be minimised.
Published: 31 December 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 25-30; https://doi.org/10.55083/irjeas.2021.v09i04007
Abstract:
Photovoltaic (PV) systems have recieved a lot of attention in recent decades due to their accessibility and advancements in PV technology. The protection of PV systems from faults such as String to String (SS), String to Ground (SG), Open circuit (OC), and partial shading are the key challenges to the realization of cost-effective and environmentally friendly PV systems. Such unusual circumstances reduce the maximum available PV power. Partial shading and breakdowns in a PV array must therefore be noticed quickly for enhanced system efficiency and reliability. The significant fault current in PV systems can be detected using the existing safety devices in PV systems, such as fuses and residual current detectors. The flowing fault current being of low order is not significant enough for current protection devices to detect if the solar and/or fault mismatch is modest and the fault resistance is high. As a result, under cloudy and low irradiance conditions, the traditional protection devices fail to identify problems, resulting in reliability concerns and photovoltaic fire threats. In this context, a fault diagnosis scheme for PV systems is presented in this paper, which includes feature extraction using the Discrete wavelet transform, and classification of various defects on the PV system using Decision tree.
Published: 30 September 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 05-09; https://doi.org/10.55083/irjeas.2021.v09i03002
Abstract:
As per regulation of Public Safety Standards of the Republic of India Transport Engineering regarding automotive vehicle brake lining material Part I and part II Specification and material and their range is made available under IS 2772 to the public under the provisions of the Bureau of Indian Standards Act of 1986 and the Right to Information Act of 2005. In order to promote public education and public safety, a better-informed citizenry, the rule of law. In this work rang and material for development of brake liner composition has been taken as per IS code 2472 applicable on automotive brake liner. Present paper investigate that the selection of brake friction materials is based on as per regulation of Public Safety Standards of the Republic of India code IS 2472.
Published: 30 September 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 01-04; https://doi.org/10.55083/irjeas.2021.v09i03001
Abstract:
The enthusiasm for run resources has extended essentially with the presence of present day remote applications. Range sharing, considered as an essential instrument for 5G frameworks, is envisioned to address extend deficiency issue, achieve high data rate get to, and guaranteed Quality of Service (QoS). From the authorized system's point of view, the obstruction caused by all secondary users (SUs) ought to be limited. From optional systems perspective, there is a need to role out systems to SUs such that general impedance is diminished, empowering the settlement of a developing number of SUs. This paper presents a network and Fast Delivery Handover Route in order to less no of iteration to optimize fitness value and decision weight, in terms of RSSI, Loss, bandwidth, Speed, crossover rate and cost. To solve the optimization problem, Particle swarm optimization and Neural Network are used. At last, the paper is upheld by broad recreation comes about which show the adequacy of the proposed techniques in finding a close ideal arrangement.
Published: 30 September 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 10-15; https://doi.org/10.55083/irjeas.2021.v09i03003
Abstract:
- We all be familiar with two well-known forms of Carbon which are diamond and graphite. Diamond is a one of the toughest and hard material in the earth. Graphite is well-known as most brittle material. But one thing had changed forever, when two physicists A.K.Geim and K.S. Novoselov had got noble prize for “Graphene”. On the basis of his research work published title” The rise of Graphene”. His work shows that Graphene is 200 times stronger than cast iron. It have so many desirable qualities to use in our daily life. Graphene, becoming eminent as a true 2-D material, had got ever-increasing attention due to its unmatched physicochemical properties (excellent conductivity, high surface area, high mechanical strength ,ease of functionalization and mass production). Graphene is a extraordinarily amazing material with countless highest extents to its name. It is the thinnest material in the universe and the strongest yet calculated. Its charge carriers exhibit massive inherent mobility, have the negligible effective mass (it is zero) and can travel micrometer-long distances without scattering at room temperature. Graphene be able to uphold current densities 6 orders higher than copper, shows record thermal conductivity and stiffness, is impermeable to gases and reconciles such contradictory qualities as brittleness and ductility. Electron transport in graphene is described by a Dirac-like equation.
Published: 30 September 2021
International Research Journal of Engineering & Applied Sciences pp 16-21; https://doi.org/10.55083/irjeas.2021.v09i03004
Abstract:
- MANET is one of self-configuring fastest emerging, technology, due to commencement of economical, small & more powerful wireless devices. It is being used in most of applications, ranging from military to civilian, where each node acts as router. To facilitate communication in ADHOC network, a routing protocol is vital whose primary goal is to establish accurate & efficient route between pair of nodes, due to this lot of routing protocols have been proposed for MANET & its success depends on people’s confidence in its security. In this paper we discuss an energy efficient technique of sinkhole analysis on Ad-Hoc networks.
Published: 30 June 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 10-14; https://doi.org/10.55083/irjeas.2021.v09i02006
Abstract:
Event logging and event logs play an important role in modern IT systems criminal investigation which is generated when end user with each other in web environment and stored in various logs like firewall log file at side, network log file at gateway and web log file at server side. But log file is not to be over emphasized as a source of information in systems and network management. Whereas conduct efficient investigation and gathering of use full information need to correlate different log file. Task of analysing event log files with the ever-increasing size and complexity of today’s event logs has become cumbrous to carry out manually. Nowadays latest spotlighted is automatic analysis of these logs files. . This paper presents a bird eye on two basic concepts one is temporal data mining and another is fuzzy association rules. Using log files it is possible to classify the attacker from the normal user.
Published: 30 June 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 19-28; https://doi.org/10.55083/irjeas.2021.v09i02008
Abstract:
In this paper, an optimized model of Shell and Tube Parallel Flow Heat Exchanger of water and oil type is proposed using C++ programming language. Shell and tube heat exchangers are of special importance in boilers, oil coolers, condensers, pre-heaters etc. They are also used in high pressure operations, refrigeration and air conditioning industry and process applications. In this paper, a number of practical cases of shell and tube heat exchangers are taken and the analysis of thermal and constructional design of every case is done. The optimised design is obtained by minimising the pressure drop by maximising the heat exchanger area to reduce pumping and running cost. Also considering that large sizes lead to increased capital cost, heat exchanger area is also optimised to overcome this problem. Effect of design parameters on pressure drop and heat exchanger area is also explained.
Published: 30 June 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 15-18; https://doi.org/10.55083/irjeas.2021.v09i02007
Abstract:
In day today life because of lack energy resources man move towards renewable energy source. When we go towards solar system it can use the sun energy to boil water or to generate electricity. Our aim is to develop a system which uses solar energy in both form thermal and solar form. The Hybrid Solar Solution is able to produce more electricity than PV, more reliable hot water than solar thermal, and heating at a better CoP than most conventional heat pumps - all with little or no CO2 emissions. Current projections suggest that a PV-T will produce sufficient electricity over the course of the year to cover the demand of the heat pump, which will meet a reasonably insulated building's total annual heating and hot water requirements. Further to this the incorporation of a solar thermally charged. The efficiency of the system to a point that it outperforms any thermal system or solar system.
Published: 30 June 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 05-09; https://doi.org/10.55083/irjeas.2021.v09i02005
Abstract:
The selection of smart antenna framework is a guarantee to the arrangements of the remote correspondence debilitations like wasteful use of recurrence range, week signal due to multipath engendering, and so on. The keen reception apparatus works in conjunction with advanced flag processor which is dependable to modify different parameters of the framework keeping in mind the end goal to eliminate obstruction signals and to upgrade gathering in the coveted direction(s). In this paper, an endeavor is made to create different adaptive beamforming calculations that prompt general change in the execution of the smart antenna.
Published: 30 June 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 01-04; https://doi.org/10.55083/irjeas.2021.v09i02001
Abstract:
- Network protection in our everyday lives is becoming increasingly critical today. Since we cannot live without the Internet, it is important to have a good and security environment for networking. Cross site scripting (XSS) does, however, attack millions of websites. We can use XSS to insert malicious scripting code into apps and then return it to the customer side. If users are using the web browser to visit the injecting place of the malicious script code, it is directly run on the customer machine. The main words of XSS are commonly found in the JavaScript browser or on the server component to filter malicious code. However, it is difficult to collect all keywords in the detecting-list in order to prevent XSS attack. However, it is possible to create various forms of malicious scripting. It is also worthwhile for more people to work on XSS and find more ways to prevent XSS attacks.
Published: 31 March 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 15-19; https://doi.org/10.55083/irjeas.2021.v09i01004
Abstract:
Solar energy is abundantly available and its use in various applications has always been of great interest among the common man, designer, engineer and researchers. One of the applications among several is in heating of air. Hot air is of use in domestic and industrial purposes. The efficiency of any solar air heater can be understood as the ability of the solar air heater to transfer the heat from the absorber plate where the solar radiations are absorbed to the air flowing over this. Since the heat transfer is affected by the surface of the absorber plate, study of surface conditions becomes essential for improving the efficiency of the heater. Many researchers have done several studies for the improvement of the heat transfer from the absorber plate to the air. In this paper, the authors have simulated the heat transfer from an absorber plate in which artificial roughness elements are provided. The simulation results show that the heat transfer is improving because of the turbulence development near the surface of the absorber plate. The temperature and velocity contours have been presented in this paper. Temperature, velocity, heat transfer coefficient and Nusselt number plots for the absorber plate are also shown.
Published: 31 March 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 08-11; https://doi.org/10.55083/irjeas.2021.v09i01002
Abstract:
Nowadays, the effective supply chain is one of the important issues in the industrial management context. In today’s world that is confronted with rapid technological changes and high competitiveness, companies are more successful that respond to the customers’ needs effectively, regarding the existing opportunities and threats. Since a supply chain consists of various organizations, it can satisfy customers’ needs, only when the whole of its parties become integrated and coordinated.
Published: 31 March 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 12-14; https://doi.org/10.55083/irjeas.2021.v09i01003
Abstract:
In day today life because of lack energy resources man move towards renewable energy source. When we go towards solar system it can use the sun energy to boil water or to generate electricity. Our aim is to develop a system which uses solar energy in both form thermal and solar form. The Hybrid Solar Solution is able to produce more electricity than PV, more reliable hot water than solar thermal, and heating at a better CoP than most conventional heat pumps - all with little or no CO2 emissions. Current projections suggest that a PV-T will produce sufficient electricity over the course of the year to cover the demand of the heat pump, which will meet a reasonably insulated building's total annual heating and hot water requirements. Further to this the incorporation of a solar thermally charged. The efficiency of the system to a point that it outperforms any thermal system or solar system.
Published: 31 March 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 20-32; https://doi.org/10.55083/irjeas.2021.v09i01005
Abstract:
India is an energy deficient country, where a large fraction of the population still does not have access to modern day energy services such as electricity. This is due to very limited fossil fuel resources and poor economy, which restrains the import of fossil fuels on a large scale. To overcome energy shortage, India needs to develop its indigenous energy resources like hydropower, solar and wind. India lies in an area of one of the highest solar insulation in the world. Accordingly, the status and outlook of solar energy use in India are discussed. It is concluded that the current infrastructure has not been able to advance the status of solar energy in India. Significant efforts are needed to effectively utilize this cheap renewable energy source.
Published: 31 March 2021
International Research Journal of Engineering & Applied Sciences, Volume 9, pp 01-07; https://doi.org/10.55083/irjeas.2021.v09i01001
Abstract:
With the emphasis on reducing carbon footprint and promoting the utilization of non renewable resources of energy in production of electricity, the micro grids have emerged as popular arrangement. Micro grids have empowered the users with flexibility in generating & controling electricity as per their requirements and have reduced their dependence on utility grid. Also they can now transfer surplus electrical energy to utility grid and can earn monetary gains. Photovoltaic systems have emerged as indispensable alternative over other distributed energy resources that can be inetrated in microgrids due to their simple design, easy to install and easy to maintain features. However the deep penetration of microgrid systems is posing threat to reliable & optimal operation of main utility grids.
Published: 31 March 2013
International Research Journal of Engineering & Applied Sciences, Volume 1, pp 21-28; https://doi.org/10.55083/irjeas.2013.v1i01007
Abstract:
Thermoplastic composites have great significance in automotive market due to their recyclables and high performance. PEEK composites actually ‘Polyetheretherketone’ have been extensively studied because of the excellent taluminium spokesological behavior among plastics. PEEK polymer, is increasingly used in many industrial applications as a replacement for metal and other components. In this experiment, attention is given to mechanical properties of PEEK, So as to analyze performance of the prototype components in actual field condition and shows encouraging results by using Finite element methods.