1. EXPERIMENTAL STUDY ON USAGE OF TYRE SCRAPS AS A STABILIZING MATERIAL FOR SUBGRADE OF FLEXIBLE PAVEMENT

Authors -  Arunita Pal, Ashok Kumar Mandal, RA.B.Depaa

Abstract :  This study throws light on the suitability of waste materials like Marble Dust, Marble Chips and Tyre Scraps as soil stabilizer for use in pavement. The role of marble dust, marble chips, and tyre scraps in improving the characteristics of expansive subgrade material is analyzed. The amount of cost savings for a pavement when it is stabilized separately with marble dust, marble chips and tyre scraps is also studied. Initially, the physical properties of clay and marble dust have been studied by conducting wet sieve analysis, Liquid Limit and Plastic Limit tests. Then, for the purpose of determining the strength of virgin and stabilized materials, California Bearing Ratio (CBR) tests have been conducted. The results of the experimental research show that marble dust, marble chips and tyre scraps can effectively be used as soil stabilizer for subgrade as the CBR value is increased. A considerable amount of cost savings is also possible when the expansive clay soil is stabilized with marble dust, marble chips and tyre scraps.
Keywords : Pavement, Stabilizer, subgrade, expansive

PDF - Download Full Article

2. IS INDIAN COMPUTING ACADEMIC UNITS ARE INTERESTED IN THE AREAS OF IT? A CASE OF CLOUD COMPUTING & VIRTUALIZATION

Authors -  P. K. Paul, P. S. Aithal, A. Bhuimali

Abstract :  Computing is one of the emerging and rapidly changing fields. The field is responsible for the development of diverse areas. Initially within Computing, Computer Science was core and main subject and gradually many other subjects have been originated viz. Computer Engineering, Computing, Computer Applications, Information Technology, Information Systems, Informatics, Information Management etc. Though there is a difference in between Computing related fields and Information related fields. Computer Science is theoretical in nature and mainly deals with the mathematical affairs for the study, evaluation, design and development of computer systems. Though Computer Engineering is mainly focuses on design and development and partially software systems. As far as Computer Application is concerned it is purely concentrated on software technologies. Information Technology whereas concentrated on the information related affairs and allied technologies viz. Networking Technologies, Database Technologies, Communication Technology, Multimedia Technology, Web Technology etc. In India, common academic programs of Computing and IT mainly concentrated on the nomenclature Computer Science, Computer Application, and Information Technology. Among the emerging subjects, few important are Big Data Technologies, Cloud Computing etc and these are rising as an academic program as well in different universities internationally. Though the areas of Information Technology in Indian academics have several disparities compared to international universities. However, in recent past Indian academics, mainly private bodies are moving towards some of the applied areas of IT within the department, programs of Computing. This paper deals with the basics of computing and IT related subjects especially the trend of applied computing emphasizing cloud computing in Indian private universities.
Keywords : Computing, Indian Universities, Higher Education, India, Development, Cloud Computing, Emerging Degree, New Age Program, Private Universitie

PDF - Download Full Article

3.COMPUTING & INFORMATION SCIENCE DEGREES WITH EMERGING FLEXIBILITIES AND ENTRY LEVEL CRITERIA: STUDY OF MSC PROGRAMS IN IT AND COMPUTING FIELDS IN INDIAN PRIVATE UNIVERSITIES

Authors -  P. K. Paul, A. Bhuimali, P. S. Aithal

Abstract :  The world is changing and purely depends on Information rather computer. And for information affairs Computing and similar devices and technologies are very much important in current time. The domain initially started with Computer Science but these days the concept of applied science and interdisciplinary sciences lead various other domains and nomenclatures. The popular programs in the field available with BSc and MSc degree, while in India and few other countries the Computing and Information Sciences related programs also offered as Engineering Degree and thus BTech and MTech programs are also offered. In some countries and universities instead of BE (Bachelor of Engineering) and ME (Master of Engineering) nomenclature are also being offered. In India, the field is available with Science and Engineering in general, however here another discipline is popular with BCA and MCA tag for the candidates of diverse background. In India, Higher Educational Institutes have risen in recent past and among the universities, the categories of Private funded institutions have been increased enormously. The worldwide changes in the academic model, platform, curricula, and eligibility criteria also affect and change the Indian Education System with special reference to Private Universities. Initially, Science programs were open only for science background (except BCA and MCA) but recently non-science candidates are allowed to pursue science based courses. In case of MSc degree in the field of Computing and IT or simply Information Sciences the tradition of science backgrounds become changed; this paper in this respect explores a lot with reference to the initiatives of the private universities in India.
Keywords : Information, IT, Computing, MSc, Masters Degree, Any Degree, Interdisciplinary, India, HEIs, Private Universities, Information Sciences in India.

PDF - Download Full Article

4. GAIT ANALYSIS AND MACHINE LEARNING FOR UNIQUE BIOMETRIC IDENTIFICATION OF INDIVIDUALS (GMLUBI)

Authors - Greshma KP, V Vineet , Rishav Gupta, and P. Mohamed Fathimal

Abstract :  Human identification has become a flourishing area where different techniques are used for identification and verification, each of them having separate and exclusive claims and challenges. Gait analysis refers to the study of animal locomotive behaviour which includes body mechanics, and the activity of muscles. It has applications in various fields such as medical diagnostics and osteopathic utilizations. A unique application of gait analysis is biometrics and identification. This paper describes a representation of gait analysis by identifying people based on their gait patterns. The steps include background modeling, feature extraction, and processing on neural network. The background model is built by getting input from a high-resolution camera which detects the movement. This input in the form of raw RGB video frames which is then passed to a neural network which measures gait biomechanics. This helps in feature extraction of the biometric information such as pace, step angle, height from torso to feet and hand displacement. The created data set will be processed, followed by identifying humans by their unique gait pattern using SVM classifier and neural network. This network consists of two subnet works linked in cascade- Joint identification and tracking (for pose estimation) and Gait recognition and estimation (for gait recognition). Using machine learning in combination with traditional, computer-based gait analysis, one can perform biometric identification while learning the user’s locomotive style.
Keywords : Gait analysis, Feature extraction, Neural Network..

PDF - Download Full Article

5. PROFESSIONAL KEY MANAGEMENT TECHNIQUES AND SECURED MAPPING SCHEMES THROUGH WIRELESS DATA CENTRIC SENSOR NETWORKS

Authors - B. Jareena Banu, D. Sobya, S. Nallusamy

Abstract :  Currently there are many unmanned wireless data centric sensor networks developed for sensing data in different environment conditions facing several security problems, due its unattended nature and its lack of tamper resistance. If the mapping relation between a detector node and a storage node is known to the attacker, the node can be easily compromised. Hence, in this research different data location mapping schemes are utilized to protect against the mapping attack and efficient key management techniques are used to improve the data confidentiality and authentication. Further keyed bloom filter scheme is used to defend against query attack and to optimize the query process. Hashed message authentication code is framed with the established pairwise key and sent several hops down to mobile sink to improve data authentication. Network simulator of NS2 tool is used and from the observed results it was found that, reduced message overhead and message transmission delay and improved privacy level were obtained.
Keywords : WDCS, Security, Mapping Attack, Query Attack, KBF, HMAC

PDF - Download Full Article

6. ENHANCEMENT OF OVERALL EQUIPMENT EFFECTIVENESS THROUGH IMPLEMENTATION OF TOTAL PRODUCTIVE MAINTENANCE

Authors - J. Logeshwaran, RM. Nachiappan

Abstract :  In the present competitive world most of the manufacturing industries are skirmishing by providing their best productivity. In this research article an attempt was made to analyse and implement the total productive maintenance system to improve the overall equipment effectiveness in a manufacturing industry. The details of application of overall equipment effectiveness of the industry are also presented. The current position in the production system, effectiveness of the maintenance system, condition of the machines, workers skill and utilization of the machines can be determined by the calculations of overall equipment effectiveness. Down time of machines which affects the overall productivity have been identified and the results are presented. From the results, after implementation of total productive maintenance cycle time for the identified operation has been decreased from 15 hours to 11 hours. Saving of 4 hours it means by using OEE performance and productivity is improved about 5%. Similarly, the availability of the machines has also been increased up to 90%.
Keywords : OEE, TPM, 5S, Productivity, Cycle Time, Breakdown

PDF - Download Full Article

7. MITIGATING SHOULDER SURFING ATTACK USING GRID AND COLOUR MATRIX

Authors - Deepa R, Vidhya Ashok

Abstract :  In real-time processing, when the user enters the Personal Identification Number (PIN) as a numeric password in mobile or stationary system, including smart phones, tablet computers, Automated Teller Machines (ATM), and Point Of Sale (POS) terminals, a direct observation attack based on shoulder surfing becomes a great concern. The PIN entry can be observed by nearby adversaries, more effectively in a crowded place. The same PIN is usually chosen by a user for various purposes and PIN may cause the user a great risk. To cope with this problem, developing an application which is between the user and the system,  in each round a regular numeric keypad is colored at random, To address this problem, text can be combined with images or colours to generate session passwords for authentication. Session passwords can be used only once and every time a new password is generated. In this proposal, two techniques are proposed to generate session passwords using text and colours which are resistant to shoulder surfing. These methods are suitable for Personal Digital Assistants.
Keywords : Personal Identification Number, Shoulder-surfing attack, User authentication, Grey and Color Matrix

PDF - Download Full Article
ISSN (Online): 2348-3105 | ISSN (Print): 2347-6729
Under the aegis of Pranavam Educational & Scientific Public Charitable Trust®
(An ISO 9001:2015 certified)
INTERNATIONAL JOURNAL ON RECENT RESEARCHES IN SCIENCE, ENGINEERING & TECHNOLOGY (IJRRSET)
Copyright @ Pranavam Publications. All rights reserved.