International Journal for Research in Applied Science and Engineering Technology

Journal Information
EISSN : 2321-9653
Total articles ≅ 16,695

Latest articles in this journal

Brijesh M. Chauhan, Keval M. Kunjadiya, Sanjay N. Parekh
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1413-1419;

For effective molecular screening of fungi using polymerase chain reaction, a simple, quick, reliable, and inexpensive DNA extraction technique is always obliged. Because of the low sensitivity of culture-based detection methods, PCRbased techniques have been developed to amplify DNA from fungal infections. In PCR-based assay, pure DNA must be required, as well as an easy-to-follow DNA extraction approach. Due to amount of fungus in a tissue biopsy or clinical sample may be relatively small, extraction efficiency is extremely crucial in PCR-based medical diagnostic applications. In this study, we are comparing four different methods of DNA extraction and compared their efficacy in the extraction of DNA from filamentous fungi commonly isolated in our laboratory. It was found that the effectiveness of cell wall disruption decreasing in the following order: GeNei™ Fungal Genomic DNA Extraction Teaching Kit > SDS containing extraction buffer > CTAB containing extraction buffer and vortex with glass beads > CTAB and SDS containing extraction buffer. Keywords: DNA isolation, DNA extraction methods, Filamentous fungi, Polymerase chain reaction
Kumbhar B B, Panhalkar S R, Korgaonkar G S, T. H. Mohite
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1537-1540;

Laboratory Automation is a unique system that can control and establish communication between nearly all aspects of your lab. Laboratory Automation is a term used to describe the working together of all household amenities and appliances. For example, a centrally microcontroller panel can have the capability to control everything from security system, lighting and overall electrical appliances. Laboratory automation can include controlling aspects of our lab remotely through a computer or any mobile equipment, programming electronics devices to respond automatically to some conditions or scenarios or centralizing the control of a variety of appliances in our lab into a single control center. For example, Control of lights in and around our laboratory from one central location so there is no need to get out of to that place or go to downstairs if we forgot to turn OFF or ON any appliances, just we can control remotely. It is essential that the different controllable appliances be interconnected and communicates with each other. The main purpose of Laboratory automation is to control or monitor signals from different appliances, or basic services. A smart phone or web browser can be used to control or monitor the home automation system. we build a fire alarm using multiple sensors. This project will send an alert whenever it detects fire and smoke. It has also connected with a buzzer and an LED which will act as a audio and visual indication for alert. A fire alarm system to detect and warn people through visual and audio appliances when smoke, fire, carbon monoxide or other emergencies are present. These alarms may be activated automatically from smoke detectors, and heat detectors or may also be activated via manual fire alarm activation devices such as manual call points or pull stations. Alarms can be either motorized bells or wall mountable sounders or horns. They can also be speaker strobes which sound an alarm, followed by a voice evacuation message which warns people inside the building not to use the elevators with the increase in consumption of energy and population, there is a grave need to conserve energy in every way possible. The inability to access and control the appliances from remote locations is one of the major reasons for energy loss. A web or an android application is used by the users to give instructions to these systems. This system can make use of a host of communication methods such as Wi-Fi, GSM, Bluetooth, ZigBee. Different controlling devices and configurations can be found in existing systems. Such systems have been found already in many places for a wide variety of applications. This paper presents a survey of all such systems. Keywords: Laboratory Automation, Android, Wifi module, Energy conservation, Electrical and electronics devices
Abhishek Sawalkar, Mohit Mandlecha, Dnyanesh Kulkarni, Ratnamala S. Paswan
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1512-1518;

Retrieving useful information has become challenging due to the rapid expansion of web material. To improve the retrieval outcomes, efficient clustering methods are required. Document clustering is the process of identifying similarities and differences among given objects and grouping them into clusters with comparable features. We used WordNet lexical as an addition to compare several document clustering techniques in this article. The suggested method employs WordNet to determine the relevance of the concepts in the text, and then clusters the content using several document clustering algorithms (K-means, Agglomerative Clustering, and self-organizing maps). We wish to compare alternative ways for making document clustering algorithms more successful. Keywords: Document clustering, Clustering technique, Self-organizing maps, WordNet, K-means, Hierarchical Clustering.
Sudha K, Umarani C
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1429-1436;

The ongoing headlines or broadcast shows the strong goon, that damages the instruction or details secrecy in obtaining cryptographic keys, through pressure in secure communication programming technique When the instruction key or details is open, one major suitable option is to safeguard the privacy of the details. All things considered, assuming that the data is covered with past facilities, a goon spotted with the encoded key, will think twice about disclosing the ciphertext blocks. The major advantage of implementing key transparency in this paper is to information secrecy over a foe which identifies the encryption key and has an aspiration to get over an enormous part of the ciphertext blocks. Keywords: Cloud Storage, Security, Auditing Mechanism, Key Transparency, Data Confidentiality, MySQL.
Miss. Samradni Deshmukh, K. R. Ingole
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1441-1445;

The recommendation system has growth choices in recent years. The recommendation system is existing in many applications which gives online travel information for individual travel package. A new model named travel recommendation using data mining techniques which extracts the features like locations, travel seasons of various landscapes. Thus, it possesses the material of the travel packages and interests of tourists. Further extending E-TRAST model with the tourist-relation-area season topic model includes relationship with tourists. It includes mining significant tourist locations based on the user search trajectories of users on web and also derives a personalized travel algorithm recommendation system using travelogues and users contributed photos with metadata of this photo by comparing existing different technique. To suggest personalized POI sequence, first famous routes are stratified as per the similarity between user package and route package. Keywords: Travel package, recommender systems, cocktail, topic modeling, and collaborative filtering
Manish Kolambe, Saurabh Sable, Venkatesh Kashivale, Prajkta Khaire
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1426-1428;

Today, in this world of social media there are many applications that enable us to share data between people who are distances apart. These social media applications run a variety of platforms. Our project is about a social media application through which we can chat and share files with other people living in different parts of the world which runs on a Desktop. Python programming language and its modules were used in this project. A client-server model and TCP protocol for communication are used in our project. It has a simple GUI interface implemented. Keywords: Chat application, Client-Server model, Social media app, TCP protocol, Multithreading
Arvind R, Dhanush Gowda S P, Bhaskar Prajapati, Ikram Nawaz Khan, Swaathie V
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1406-1408;

Humans use their facial expressions to communicate their emotions, which is a strong tool in communication. Facial expression identification is one of the most difficult and powerful challenges in social communication, as facial expressions are crucial in nonverbal communication. Facial Expression Recognition (FER) is just an important study topic in Artificial Intelligence, with numerous recent experiments employing Convolutional Neural Networks (CNNs). The emotions that have grown in the face image have a significant impact on judgments and debates on a variety of topics. Surprise, fear, disgust, anger, happiness, and sorrow are the six basic categories in which a person's emotional states can be categorized according to psychological theory. The automated identification of these emotions from facial photos can be useful in human-computer interaction and a variety of other situations. Deep neural networks, in particular, are capable of learning complicated characteristics and classifying the derived patterns. A deep learning-based framework for human emotion recognition is offered in this system. The proposed framework extracts feature with Gabor filters before classifying them with a Convolutional Neural Network (CNN). The suggested technique improves both the speed of CNN training and the recognition accuracy, according to the results of the experiments. Keywords: convolutional neural network (CNN), Gabor filter
Ms. Mrunali Nagesh Sankpal, Ms. Pratiksha Vijay Chinchwade, Ms. Rutuja Rajkumar Kognole, Ms. K. N. Rode
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1508-1511;

Network topologies is various components of network link nodes, link, peripherals are arranged. The way of connecting the computers is called as the depending on the manner of connecting the computers we can have different network topologies. Network topology is links and nodes of a network are arranged to related are arranged to each other. They describe the physical and logical arrangement of network nodes. The way in which different system and node are connect and communicate with each other is determined by topology of the network. Keywords: Star Topology, Bus Topology, Ring Topology, Hybrid Topology, Mesh Topology, Tree Topology
Shubham Khurse, Sreeraj Nair, Suhail Salam, Asst. Prof. Vedanti Hardas
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1391-1394;

The main aim of the paper is to process the time data acquisition under the supervisory physical parameter of a power induction motor. In industries the heavy capacity induction motors are used. Therefore, it has essential to observe all the processes and control the factors affecting them. Adapting a technology like an internet of things one can do the objective effectively, and thus record and the control is obvious than the manpower or existing one. Keywords: Induction motor, Protection system, IOT, Voltage, Current
Shubh Brahmbhatt, Harmish Panchal, Meet Patel, Vikas Thakkar, Krupal Shah, Bharat Dogra
International Journal for Research in Applied Science and Engineering Technology, Volume 10, pp 1553-1559;

This paper focuses on the review of design and working of a microcontroller based Adaptive Headlight System (AHS) for automobiles. The main purpose of this system is to present a cost-effective technique to illuminate blind spots while driving in the night and during the times when the visibility is reduced significantly to make the objects visible in those darkened locations and thereby prevent accidents. The system functions in accordance to the controlled input from microcontroller unit which drives the stepper motors connected to the headlights. The system is also designed to receive input from the indicator switch wherein a full turn is achieved by the headlight mirror when the indicator input is given. Also, the adaptive headlights are automatically switched on when the amount of light measured by a photo diode falls below a threshold, thereby eliminating the need for the driver to switch on the headlights.
Back to Top Top