Showing posts with label IJSRD. Show all posts
Showing posts with label IJSRD. Show all posts

Thursday, September 27, 2018

Monday, February 22, 2016

IJSRD ||“Habitat Conclave 2016” Paper presentation on “Smart & Sustainable City”|| February 2016


Solid Waste Management: A Case Study of Ahmedabad


Author(s):

Jil Tushar Sheth ; Kinara Patel; Prof. Dipsha Shah

Keywords:

Solid Waste Management, AMC, Composition, Green House

Abstract

Due to population upsurge and urbanization, solid waste management is now one of the chief issues to deal with as it affects quality of life. Ahmedabad is the 7th largest city of India and generates about 4000 Metric tons of waste daily. The foremost segments responsible for the emission of GHGs are energy supply with 26% followed by industrial activities with 19%, while the commercial areas including buildings and residential with 8% and waste sector with 3%. Out of the total emissions from waste sector, the solid waste contributes nearly 22 % of total greenhouse gas emission in Indian context which in turn is the 3% of the total sectorial emissions. The studies reveal that this MSW comprises of more than 50% of organic waste in Indian context as it contains vegetable, food waste, animal dung, paper, cloth and other biodegradable components as well.[1] This study aims at providing an overview of the stages of waste management i.e. Prevention, Minimization, Reuse, Recycle, Energy recovery, Disposal and its composition at the Ahmedabad city level. It also provides a further insight of feasibility and aids of adopting segregation at source and decentralisation of swm in order to provide better future. A sample survey of Ghatlodiya that was carried out by JTC Agency which revealed that vast majority of people are willing to segregate as per law (87%+). [2] Decentralization and segregation at source can be beneficial as compared to current cost of INR 1000 per ton for solid waste management, cost can reduce to 418 per ton and also can lead to better standard of living of society. Out of 4000 MT generated daily only 800 MT would be needed to dispose daily which would lead to 80% volume reduction then current scenario. As only 800MT tones would be disposed, it would further lead to reduction in GHGs emission and thus would help lower carbon footprint.



Thursday, February 4, 2016

#ijsrd #Habitat Conclave 2016#Youth Conclave


Habitat Conclave 2016

Youth Conclave

presents

Paper presentation on

Smart & Sustainable City

In association with

IJSRD – International Journal for Scientific Research & Development

Gujarat Institute of Civil Engineers & Architects (GICEA)is organizing 4-dayevent named Habitat Conclave 2016on 18th-21st February 2016.Under Youth Conclave Paper Presentation on Smart & Sustainable city is being managed by IJSRD.This event aims to cover the recent trends of research in the field of "Smart & Sustainable City".

Interested participants/Authors can prepare a paper/article showing their idea in the well managed format. They have to submit their article here. Innovative ideas will be selected and participants will be called for presentation during event.
Researchers working on Smart & Sustainable City development can submit their papers under following themes but not limited to.
  1. Culture &heritage of Smart city                         
  2. Green building and Smart Cities
  3. Sustainable cities issues & solutions
  4. Urban trends in Smart City Planning
  5. Sustainable Smart Tourism
  6. Urban Infrastructure issues and solutions
  7. Sustainable Urban Environmental Design
  8. Smart Urban Transportation Planning
  9. National & Individual needs in smart cities
  10. Smart, Urban, Congestion free Sustainable Mobility

Wednesday, December 30, 2015

National Conference on Technological Advancement Automatization in Engineering (NCTAA 2016) IJSRD


Atharva College of Engineering, Mumbai
Presents 

NCTAA 2016

(National Conference on Technological Advancement & Automatization in Engineering)

in association with

IJSRD – International Journal for Scientific Research & Development


Atharva College of Engineering,Mumbai affiliated to Mumbai University, is organizing 2-days event named “National Conference on Technological Advancement & Automatization in Engineering”on 28-29th January 2016 in association with IJSRD. 

The main objective of NCTAA is to present the research from different areas of science and technology. This conference provides a platform for researchers and scientists across the nation to exchange and share their research results about all aspects of electrical, electronics, computer science and information technology. This conference also provides an opportunity to interact and establish professional relations for future collaboration.

  • Best papers will also be nominated for prizes
For more information about conference please visit conference website

                                                                    Organized by
Atharva College of Engineering,
Charkop Naka, Malad - Marve Rd,
AsmitaJyoti Housing Society
Malad(W), Mumbai - 400095


                                                                  Publication Partner
International Journal for Scientific Research & Development
Website : www.ijsrd.com

Tuesday, December 15, 2015

Mathematical Investigation on Emission of Bio Diesel in Internal Combustion Engine

IJSRD Recently Published Good Article on "Mathematical Investigation on Emission of Bio Diesel in Internal Combustion Engine"


Mathematical Investigation on Emission of Bio Diesel in Internal Combustion Engine

Author(s):

Vijayakumar M , M.KUMARASAMY COLLEGE OF ENGINEERING; P.C.Mukesh Kumar, University College of Engg, Dindigul.Tamilnadu, India; N.Prasanna, M.Kumarasamy college of Engg, Karur, Tamilnadu, India

Keywords:

Bio-diesel, Minitab, regression, method of least squares, emission

Abstract

Energy demand keeps on increasing every year because of the gap between demand and production. Currently biodiesel is introduced to reduce this gap and though the production of biodiesel is limited for commercialized. At present many research work are being carried out for investigating emission of biodiesel in internal combustion engine experimentally. The experimental test run requires more time, money and man power. In this work mathematical model for investigating on emission of biodiesel in internal combustion engine is proposed. It is also compared with the experimental data and the minitab software data. On comparing it is found that this proposed mathematical model gives better result than the software generated mathematical model with accuracy of 85%

Click Here For Full Information about this Research Article :
http://www.ijsrd.com/Article.php?manuscript=IJSRDV3I100289

Monday, November 16, 2015

Wireless AC Supply On-Off System #ijsrd

Paper Title : Wireless AC Supply On-Off System


Author(s):  Abhinav Chauhan , DIT University, Dehradun; Daksh Chawla, DIT University, Dehradun; Vinay Kumar, DIT University, Dehradun; Sandeep Sharma, DIT University, Dehradun

Keywords:Wireless AC Supply On-Off System, Transmitter Section, Receiver Section

Abstract: This work includes the information to develop and fabricate a wireless ac supply on-off system. Our motivation of doing this project is physically differently abled individuals who face the difficulty in on-off of their room appliances like fan, tube light. This project is also being successfully tested and implemented for motion of 60kg robot in Robowars at Techfest, IIT Bombay and Robowars at Cognizance, IIT Roorkee. This is a simple type remote control by using RF communication without microcontroller. In this project a remote has been designed for various home appliances like television, fan, lights, etc. It gives lot of comfort to the user since we can operate it by staying at one place. We can control any of the appliances by using this remote within the range of 400 foots.

Sunday, September 20, 2015

What is Research ? - IJSRD.com

Research comprises "creative work undertaken on a systematic basis in order to increase the stock of knowledge, including knowledge of humans, culture and society, and the use of this stock of knowledge to devise new applications."[1] It is used to establish or confirm facts, reaffirm the results of previous work, solve new or existing problems, support theorems, or develop new theories. A research project may also be an expansion on past work in the field. To test the validity of instruments, procedures, or experiments, research may replicate elements of prior projects, or the project as a whole. The primary purposes of basic research (as opposed to applied research) are documentation, discovery, interpretation, or the research and development (R&D) of methods and systems for the advancement of human knowledge. Approaches to research depend on epistemologies, which vary considerably both within and between humanities and sciences. There are several forms of research: scientific, humanities, artistic, economic, social, business, marketing, practitioner research, etc.

Forms of research

Scientific research is a systematic way of gathering data and harnessing curiosity. This research provides scientific information and theories for the explanation of the nature and the properties of the world. It makes practical applications possible. Scientific research is funded by public authorities, by charitable organizations and by private groups, including many companies. Scientific research can be subdivided into different classifications according to their academic and application disciplines. Scientific research is a widely used criterion for judging the standing of an academic institution, such as business schools, but some argue that such is an inaccurate assessment of the institution, because the quality of research does not tell about the quality of teaching (these do not necessarily correlate totally).

Research in the humanities involves different methods such as for example hermeneutics and semiotics, and a different, more relativist epistemology. Humanities scholars usually do not search for the ultimate correct answer to a question, but instead explore the issues and details that surround it. Context is always important, and context can be social, historical, political, cultural or ethnic. An example of research in the humanities is historical research, which is embodied in historical method. Historians use primary sources and other evidence to systematically investigate a topic, and then to write histories in the form of accounts of the past.

Artistic research, also seen as 'practice-based research', can take form when creative works are considered both the research and the object of research itself. It is the debatable body of thought which offers an alternative to purely scientific methods in research in its search for knowledge and truth.

Source : https://en.wikipedia.org/wiki/Research

Saturday, September 5, 2015

Special Issue For Data Mining #ijsrd

Dear Researchers/Authors,

IJSRD is promoting a new field of this Digital Generation-“Data Mining”. 

In accordance to it IJSRD is inviting research Papers from you on subject of Data Mining. This is under special Issue Publication by IJSRD. In addition to this authors will have a chance to win the Best Paper Award under this category.

To submit your research paper on Data Mining Click here


 IJSRD

What is Data Mining..?

Data mining (the analysis step of the "Knowledge Discovery in Databases" process. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use.

The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown, interesting patterns such as groups of data records, unusual records and dependencies.The Knowledge Discovery in Databases (KDD) process is commonly defined with the stages:

(1) Selection
(2) Pre-processing
(3) Transformation
(4) Data Mining
(5) Interpretation/Evaluation.

To know more…….

Data mining involves six common classes of tasks:

Anomaly detection (Outlier/change/deviation detection) – The identification of unusual data records, that might be interesting or data errors that require further investigation.

Association rule learning (Dependency modelling) – Searches for relationships between variables. For example, a supermarket might gather data on customer purchasing habits. Using association rule learning, the supermarket can determine which products are frequently bought together and use this information for marketing purposes. This is sometimes referred to as market basket analysis.

Clustering – is the task of discovering groups and structures in the data that are in some way or another "similar", without using known structures in the data.

Classification – is the task of generalizing known structure to apply to new data. For example, an e-mail program might attempt to classify an e-mail as "legitimate" or as "spam".

Regression – attempts to find a function which models the data with the least error.

Summarization – providing a more compact representation of the data set, including visualization and report generation.

Application Areas….


Games

            They are used to store human strategies into databases and based on that new tactics are designed by Computer ( in association with Machine Learning, Artificial Intelligence)

Business

            Businesses employing data mining may see a return on investment. In situations where a large number of models need to be maintained, some businesses turn to more automated data mining methodologies.In business, data mining is the analysis of historical business activities, stored as static data in data warehouse databases. The goal is to reveal hidden patterns and trends. Data mining software uses advanced pattern recognition algorithms to sift through large amounts of data to assist in discovering previously unknown strategic business information. Examples of what businesses use data mining for include performing market analysis to identify new product bundles, finding the root cause of manufacturing problems, to prevent customer attrition and acquire new customers, cross-selling to existing customers, and profiling customers with more accuracy.

Science and engineering

            In recent years, data mining has been used widely in the areas of science and engineering, such as bioinformatics, genetics, medicine, education and electrical power engineering.

Human rights

            Data mining of government records – especially records of the justice system (i.e., courts, prisons) – empowers the revelation of systemic human rights infringement in association with era and publication of invalid or deceitful lawful records by different government organizations

Medical data mining

            Some machine learning algorithms can be applied in medical field as second-opinion diagnostic tools and as tools for the knowledge extraction phase in the process of knowledge discovery in databases.

Spatial data mining

            Spatial data mining is the application of data mining methods to spatial data. The end objective of spatial data mining is to find patterns in data with respect to geography. So far, data mining and Geographic Information Systems (GIS) have existed as two separate technologies, each with its own methods, traditions, and approaches to visualization and data analysis. Data mining offers great potential benefits for GIS-based applied decision-making.

Temporal data mining

            Data may contain attributes generated and recorded at different times. In this case finding meaningful relationships in the data may require considering the temporal order of the attributes.

Sensor data mining

            By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms.

Visual data mining

            During the time spent transforming from analogical into computerized, vast datasets have been created, gathered, and stored finding measurable patterns, trends and information which is covered up in real data, with a specific end goal to manufacture prescient formations(patterns).


Friday, September 4, 2015

Now, a dedicated lifetime online space for science research scholars to share their work globally #ijsrd

IJSRD is an India's leading open access e-journal for all kinds of science, engineering & technologies manuscript. We publish original and high quality papers.


International Journal for Scientific Research & Development (IJSRD) is one of the leading e-journals which offers new ideas of current trends in Engineering and Science through published research papers with authentic data and pure knowledge. This online journal in the internet space is made available for all interested research scholars who look forward to showcase and share their work with their peer groups and others working in the same space across the globe.


At IJSRD, an exhaustive list of executive board members is available who were invited from a wide range of colleges, universities and research organizations to supervise the content. This online journal has proven to be extremely helpful for scholars and research students who call for research papers in their undergraduate, post graduate and higher levels of education. The original and supreme quality research papers that are uploaded and submitted in IJSRD are aimed at providing an outstanding all-round development to the students and research scholars in the field of Engineering and Technologies.


IJSRD is a monthly journal, publishes one issue per month. The precise and analytical narration of knowledge given by the reviewers in the journals make them more credible. IJSRD, touted as one of the premium online destinations for Journal of Science, has received about 19,255 papers and has about 27063 authors. The total number of accepted papers is 6473 till date.


IJSRD is easy to use and an open access peer reviewed International Journal wherein the research scholars are given the opportunity of downloading any relevant article or research paper from the website free of cost. These scholars are also allowed to submit their research papers online and generate an e-certificate online at any given point of time. One of the major highlights is that of referring to the statistics for each of the authored articles and papers and checking the status of the paper submitted online. 


For further details call us on +918866191212 or IJSRD can be contacted at info@ijsrd.com.

For more information, visit: http://www.ijsrd.com

Tuesday, September 1, 2015

AODV Routing Protocol in VANETs in Comparison with OLSR and DSR #ijsrd

IJSRD Recently Published Good Article on AODV which shows the comparison with OLSR and DSR


Title : Earthquake Risk Reduction Development and Disaster ManagementProgramme in India

Abstract :- Vehicular Ad hoc Network (VANET) is a new communication paradigm that enables the communication process between these vehicles which acts as nodes in the network. Various methods of data dissemination in VANET are used to inform the vehicles about the dynamic road traffic conditions for achieving safe and efficient transportation. Ad-hoc On-demand Distance Vector (AODV) is a reactive routing protocol designed for the adhoc networks. AODV is an unicast routing protocol which establishes a route only when a node wants to send data packets. AODV involves route discovery and route maintenance process. Due to large delay in the route discovery process and due to route failure which may require a new route discovery process, the data transmission rate decreases and network overhead increases. In this paper we have discussed AODV protocol and its comparison with OLSR and DSR routing protocol. 

Key words: VANET, AODV, OLSR, DSR

Since their arrival in the 1970s, the use of wireless communication technology has increased. An ad hoc wireless network consists of mobile nodes which communicate with each other without any infrastructure. Vehicular Ad hoc Network (VANET) is a new technology integrating ad hoc network, WLAN and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. IEEE formed the IEEE 802.11p task group for Wireless Access in Vehicular Environments (WAVE)[1]. VANET is a new distinctive form of Mobile Ad Hoc Network (MANET). Without having any infrastructure and legacy client and server communication, VANET is a highly autonomous network where each vehicle in it acts as a wireless router or a node to communicate with nearby vehicles and fixed roadside equipment. In VANET the movement of vehicles is affected by the factors like the structure of the road, traffic congestion and traffic rules. VANET involves topology which changes very rapidly and also the network gets disconnected frequently.
 Simulation Parameters


Many routing protocols have been proposed for ad hoc networks. A protocol can perform worse or better than other protocols depending upon scenario of ad hoc networks.After reviewing different approaches we can conclude that AODV is better than OLSR and DSR in terms of packet delivery ratio and end-end delay. Though some improvement needed in AODV routing protocol because the route discovery process on route failure causes a great delay.  




Thursday, August 27, 2015

Real Time Traffic Control using Image Processing #ijsrd

Real Time Traffic Control using Image Processing

Author(s):

Rahul Rane , Rajiv Gandhi Institute Of Technology
S.P.Khachane, Rajiv Gandhi Institute of Technology
Sayali Pathak, Rajiv Gandhi Institute of Technology
Aruta Oak, Rajiv Gandhi Institute of Technology

Keywords:

Traffic control, image processing, edge detection, background subtraction

Abstract

The Idea behind real time traffic control using image processing is due to increase in number of vehicles on road which causes traffic congestion. There are various successful techniques to overcome this problem such as inductive loop detectors, magnetic loop detectors and video based system. We propose a system based on measurement of vehicle density on road using Real Time Image Processing. To control the congestion in traffic signal intelligently by using density information in this paper we are presenting the algorithm with the help of which the congestion in traffic can easily retrieved. The image sequences from camera are analyzed using edge detection and counting methods. Subsequently the number of vehicles at intersection is evaluated due to which traffic can easily be managed moreover determined vehicle density can easily be compared with other direction of traffic in order to control traffic signals efficiently.[1]

For More Details about this paper visit : http://ijsrd.com/Article.php?manuscript=IJSRDV3I30243

Tuesday, August 25, 2015

An Overview and Study of Android 5.0 #IJSRD

An Overview and Study of Android 5.
Author(s):
Ankit Kumar Jain , IET,DAVV Indore(M.P.)
Balram Jatav, IET,DAVV Indore(M.P.)
Er.Arpit Agrwal, IET,DAVV Indore(M.P.)

Keywords:

Android, Lollipop 5.0, Smart phone

Abstract

Android is Linux based mobile OS which is being used by popular smart phone brands like Samsung, LG, HTC, Sony Xperia, and many other. Android 5.0 "Lollipop" is the latest version of the Android mobile operating system developed by Google. Unveiled on June 25, 2014 during Google I/O, it became available through official over-the-air (OTA) updates on November 12, 2014. This paper will contain detailed study of Android 5.0: Lollipop OS. It will cover stepwise development of android OS up to Lollipop. Contrast of Lollipop from old android OS, IOS and Windows Phone OS, details review of technical background of Lollipop OS.

For More information about this paper visit :


For More Paper About Engineering Research visit www.ijsrd.com

Monday, August 24, 2015

Understanding SQL Injection Attack Techniques and Implementation of Various Methods for Attack Detection and Prevention

Author(s):

Shruti Gangan , V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR; 
Tina Gyanchandani, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR; 
Dhanamma Jagli, V.E.S INSTITUTE OF TECHNOLOGY, CHEMBUR

Keywords:

SQL Injection, Website Security, SQL Injection Detection, SQL Injection Prevention, Sanitization

Abstract

Security issues of different database driven web applications are continue to be an important and crucial aspect of the ongoing development of the Internet. In the last several decades, Web applications have brought new classes of computer security vulnerabilities, such as AQL injection. SQL Injection Attacks (SQLIAs) is one of the most severe threats to the security of database driven web applications as it compromises integrity and confidentiality of information in database. In this type of attack, an attacker gain control over the database of an application and consequently, he/she may be able to alter data. In this paper we present different types of SQL injection attacks and also implementation of different types of tools which can be used to detect and prevent these attacks.

Click Here to see Full Length Paper : 
http://www.ijsrd.com/Article.php?manuscript=IJSRDV3I40489

Good Research Journal For Engineering Students.....IJSRD.com

Tuesday, August 4, 2015

Special Issue For Image Processing #IJSRD

Best 25 papers will be published online.Participate in this special issue and get a chance to win the Best Paper Award for Image Processing. Also other authors will have special prizes to be won.



What is Image Processing?
Image processing is a method to convert an image into digital form and perform some operations on it, in order to get an enhanced image or to extract some useful information from it. It is a type of signal dispensation in which input is image, like video frame or photograph and output may be image or characteristics associated with that image. Usually Image Processingsystem includes treating images as two dimensional signals while applying already set signal processing methods to them.
It is among rapidly growing technologies today, with its applications in various aspects of a business. Image Processing forms core research area within engineering and computer science disciplines too.Image processing usually refers to digital image processing, but optical and analog image processing also are possible.
Analog or visual techniques of image processing can be used for the hard copies like printouts and photographs. Image analysts use various fundamentals of interpretation while using these visual techniques. The image processing is not just confined to area that has to be studied but on knowledge of analyst. Association is another important tool in image processing through visual techniques. So analysts apply a combination of personal knowledge and collateral data to image processing.
Digital Processing techniques help in manipulation of the digital images by using computers. As raw data from imaging sensors from satellite platform contains deficiencies. To get over such flaws and to get originality of information, it has to undergo various phases of processing. The three general phases that all types of data have to undergo while using digital technique are Pre- processing, enhancement and display, information extraction.
If you have worked on any part of image processing prepare a research paper and submit to us
Image processing basically includes the following three steps.
  • Importing the image with optical scanner or by digital photography.The acquisition of images (producing the input image in the first place) is referred to as imaging.
  • Analyzing and manipulating the image which includes data compression and image enhancement and spotting patterns that are not to human eyes like satellite photographs.
  • Output is the last stage in which result can be altered image or report that is based on image analysis.

Purpose of Image processing
The purpose of image processing is divided into various groups. They are:
  • Visualization - Observe the objects that are not visible.
  • Image sharpening and restoration - To create a better image.
  • Image retrieval - Seek for the image of interest.
  • Measurement of pattern – Measures various objects in an image.
  • Image Recognition – Distinguish the objects in an image.

Applications of Image processing
Image processing has been an important stream of Research for various fields. Some of the application areas of Image processing are….
Intelligent Transportation Systems – E.g. Automatic Number Plate Recognition, Traffic Sign Recognition
Remote Sensing –E.g.Imaging of earth surfaces using multi Spectral Scanners/Cameras, Techniques to interpret captured images etc.
Object Tracking – E.g. Automated Guided Vehicles, Motion based Tracking, Object Recognition
 Defense surveillance – E.g. Analysis of Spatial Images, Object Distribution Pattern Analysis of Various wings of defense. Earth Imaging using UAV etc.
 Biomedical Imaging & Analysis – E.g. Various Imaging using X- ray, Ultrasound, computer aided tomography (CT) etc. Disease Prediction using acquired images, Digital mammograms.etc.
Automatic Visual Inspection System – E.g.Automatic inspection of incandescent lamp filaments, Automatic surface inspection systems,    Faulty component identification etc.
And many other applications…..
To contribute your research work in Image processing please prepare an article on it and submit to us.

Tuesday, July 21, 2015

#IJSRD.COM

Every great idea comes from a dream and all our dreams can come true, if we have the courage to pursue them. This goes for everything in life, including start-ups and business ideas. They all start the same way but only some make it to the top. 
These posters by Anna Vital on Scuttlebutt will tell you what it takes to be on the top.

Here is why most people choose to be entrepreneurs.


IJSRD JOURNAL
#JOURNAL IJSRD

Friday, February 27, 2015

#IJSRD #New Milestone #Leading E-Journal #India

Thanks 2 all Authors For Making Fastest Growing E-Journal of INDIA.
IJSRD Successfully Completed 24 Issue.
Submission is open For Volume 3 - Issue 1 ,2015
Papers Received - More then 10000
Total Authors- More then 12000
Accepted Papers - More Then 3200

Friday, August 15, 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com