Paper Type |
:: |
Research Paper |
Title |
:: |
Flexural Study on Basalt Rebar Reinforced Concrete Beams |
Country |
:: |
India |
Authors |
:: |
Elamathi E || Priyanka R || Sangeetha V |
Page No. |
:: |
01-05 |
Concrete is the most widely used construction material in civil engineering industry because of its high structural strength and stability. Basalt fiber reinforced polymer (BFRP) application is very effective ways to repair and strengthen structures that have become structurally weak over their life of the span. They are made from basalt rock, are very light and have tensile strength, over twice as high as steel. BFRP Repair systems provide an economically viable alternative to traditional repair systems and materials. BFRP bars have high tensile strength and low elastic modulus compared with steel bars. The bond strength between BFRP bars and concrete is similar to the bond strength of steel bars and concrete and shows good bond performance. The superior properties of polymer composite materials like.......
Keywords: BFRP, Tensile Strength, Bond Strength, Compressive strength.
[1]. Satya M Saad, Dr. Indrajit N Patel, Mrs. Jagruti Shah., "Study of Ductility properties by effective replacement of Steel with Basalt Fibre Reinforced Polymer", International Journal of Engineering Research and General Science, Volume 3, Issue 3, May-June, 2015 ISSN 2091-2730.
[2]. Marek Urbanskia, Andrzej Lapkob, Andrzej Garbaczc., "Investigation on Concrete Beams Reinforced with Basalt Rebars as an Effective Alternative of Conventional R/C Structures", 11th International Conference on Modern Building Materials, Structures and Techniques, MBMST 2013.
[3]. Prasannan.D, Smitha Gopinath, Ramachandra Murthy .A, Nagesh.R.Iyer and Premalatha. J., "Behaviour of Singly Reinforced Concrete Beams Reinforced with Steel and BFRP Bars", International Journal of Scientific & Engineering Research, Volume 5, Issue 6, June-2014 73 ISSN 2229-5518.
[4]. Ahmed El Refai, Mohamed-Amine Ammar, Radhouane Masmoudi., "Bond performance of basalt fiber-reinforced polymer (BFRP) bars to concrete", Article in Journal of Composites for Construction · August 2014.
[5]. Maximus Pearson, Ted Donchev, and Juan Salazar, "Long-Term Behaviour Of Prestressed Basalt Fibre Reinforced Polymer Bars", The 2nd International Conference on Rehabilitation and Maintenance in Civil Engineering, 2013
Paper Type |
:: |
Research Paper |
Title |
:: |
An Experimental Investigation on Pervious Concrete |
Country |
:: |
India |
Authors |
:: |
BHARATHI G || RUBESH M || SANJAY KUMAR S || SATHISH KUMAR S |
Page No. |
:: |
06-18 |
Pervious concrete means high porous concrete used for storm drainage. The curing plays a major role in developing the concrete micro structure. This project deals with the comparative study of atmospheric curing and water curing without any admixture for porous concrete. materials for the study were collected and tested for its properties. mix destination for mixes taken under study was found. special mix design were done and specimens were cast and tested for 7 and 28 days of compressive strength and 28 days for flexural and split tensile strength. the results were compared with atmospheric curing and water curing and conclusion is made
Keywords: Pervious & porous concrete, compressive strength, flexural strength, split tensile strength, atmospheric curing
IS 4031 - (part-5) 1998 for cement
IS 2386- (part-4) 1963 for aggregate test
IS 10262- 2009 for mix design
ASTM 1701 for permeability
IS 4031-(part-1) 1996 for consistency
Paper Type |
:: |
Research Paper |
Title |
:: |
Analysis Based On Customer Satisfaction for Kun Hyundai Auto Co.Pvt. Ltd |
Country |
:: |
India |
Authors |
:: |
Ms. SHARA MINNALKODI.K |
Page No. |
:: |
19-22 |
This paper is reviews the research on the levels of the customer satisfaction. The foremost challenge for organizations is to implement and secure a standardized customer satisfaction process across their procurement field. Customer satisfaction can be addressed as a strategic business development process of an organization and it should have a positive effect on an organization's profitability. Satisfied customers could be able to form the foundation of any successful business as customer satisfaction leads to repeat purchase, brand loyalty, customer loyalty. Customer satisfaction research should be done with greatest care. Measuring customer satisfaction must be a continuous, consistent, timely accurate and reliable process. This is where a new customer satisfaction approach becomes a powerful strategic business development tool for an organization.
Keywords: Customer satisfaction, Business, Organizations, Customers.
[1]. C.R. Kothari Research methodology Methods & Techniques. 2\e Vishwa prakashan. (2006).
[2]. Phillip Kotler Marketing Management 11\e Pearson. (2007).
[3]. Phillip Kotler Marketing Management 12\e & 13\e Pearson. (2008).
[4]. Kerin. Hartley & Rudelius: Marketing the Core. McGraw-Hill, Irwin. (2007).
[5]. Phillip Kotler and Kelvin Lane Marketing Management 12\e Pearson Education
[6]. (2007)..
Paper Type |
:: |
Research Paper |
Title |
:: |
Multi-target Tracking through Occlusions Using Extended Kalman Filter and Network Flows |
Country |
:: |
India |
Authors |
:: |
Mr.N.Gopinath.M.E. || B.Nivedha Lakshmi || P.Mahasankari |
Page No. |
:: |
23-26 |
Multi-target tracking under the condition of occlusions is one of the difficult and attractive field in video tracking. Multi-target tracking has been modelled as network flows (NF) optimization problem recently. It is one of the most popular tracking-by-detection (TBD) algorithm, which links individual detections into trajectories. NF method is particularly effective due to its simple model and optimal solutions. But it is difficult to track multi-target from consecutive frames under long-term occlusions. Therefore, an approach combining extended Kalman filter (EKF) and NF algorithm is proposed in this paper, in which EKF can predict the position of the occluded target. Experimental results show that the proposed tracking method based on EKF and NF (EKF -NF), can enhance the stability of tracking multiple moving targets in complex scenarios
[1]. Bo-Hao Chen and Shih-Chia Huang,(2014), "An Advanced MovingObjectDetection Algorithm for Automatic Traffic Monitoring in RealWorldLimited Bandwidth Networks",IEEE Transactions on Multimedia, vol.16, no. 3, pp. 837-847.
[2]. Buch.N, Velastin.S.A, and Orwell, (2011), "A review of computer visiontechniques for the analysis of urban traffic", IEEE Transaction onIntelligent Transport system, vol. 12, no. 3, pp. 920–939.
[3]. 3.Cheng.F.C, Huang.S.C, and Ruan.S.J, (2011), "Scene analysis for object detection in advanced surveillance systems using Laplacian distribution model",IEEE Transaction on System, Manand Cybernetics Part CApplication Reviews, vol. 41, pp. 589–598.
[4]. Culibrk.D, Marques.O, Socek.D, Kalva.H, and Furht.B.H, (2007), "Neuralnetwork approach to background modelling for video object segmentation",IEEE Transaction on Neural Network, vol. 18, no. 6, pp. 1614–1627.
[5]. Czarlinska A and Kundur.D, (2008), "Reliable event-detection in wirelessvisuals Sensor networks through scalar collaboration and game Theoretic Consideration",IEEE Transaction on Multimedia, vol. 10, no. 5, pp.675–690.
Paper Type |
:: |
Research Paper |
Title |
:: |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
Country |
:: |
India |
Authors |
:: |
A.Kumarideepika,M.E. || Aruna.A || R.Mahalakshmi |
Page No. |
:: |
27-30 |
As an effective and efficient way to provide computing resources and services to customers on demand, cloud computing has become more and more popular. From cloud service providers' perspective, profit is one of the most important considerations, and it is mainly determined by the configuration of a cloud service platform under given market demand. However, a single long-term renting scheme is usually adopted to configure a cloud platform, which cannot guarantee the service quality but leads to serious resource waste. In this paper, a double resource renting scheme is designed firstly in which short-term renting and long-term renting are combined aiming at the existing issues. This double renting scheme can effectively guarantee the quality of service of all requests and reduce the resource........
[1]. K. Hwang, J. Dongarra, and G. C. Fox, Distributed and Cloud Computing. Elsevier/Morgan Kaufmann, 2015.
[2]. J. Cao, K. Hwang, K. Li, and A. Y. Zomaya, "Optimal multiserver configuration for profit maximization in cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1087–1096, 2016.
[3]. A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, "Above the clouds: A berkeley view of cloud computing," Dept. Electrical Eng. and Comput. Sciences, vol. 28, 2017.
[4]. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Gener. Comp. Sy., vol. 25, no. 6, pp. 599– 616, 2016.
[5]. P. Mell and T. Grance, "The NIST definition of cloud computing. national institute of standards and technology," Information Technology Laboratory, vol. 15, p. 2015.
Paper Type |
:: |
Research Paper |
Title |
:: |
Effectiveness in Implementation of 5s at Magnum Clothing Pvt Ltd. |
Country |
:: |
India |
Authors |
:: |
Dr. G. AMUTHA |
Page No. |
:: |
31-35 |
Since many organizations attempt to become the best in their service, a good management system is required and therefore the implementation of 5S is highly recommended.5S is known as the pillars which refer to sort, set in order, shine, standardize and sustain. Magnum clothing pvt. ltd. is a garment manufacturer with production units and head office in Chennai, India and a satellite design and sales office in London, UK. This paper discusses about the effectiveness of implementation of 5S. A systematic way to solve the research problem is research methodology. The descriptive research design is used for analyzing this research problem. The objective of the research is to increase the productivity of the organization by implementing the 5S. The chi-square analysis is used for finding the significant difference between the observed frequency and expected frequency, here the chi-square is used as the statistical tool for analysis. Suggestions are perfectly made matching the finding from data analysis.
Keywords: Seiri, Seiton, Seiso, Seiketsu, Shitsuke.
[1]. Arash Ghodrati, Norzima Zulkifli (2012), A Review on 5S Implementation in industrial and business organisations.
[2]. Becker, John E (2001), Implementing 5S : To promote safety and housekeeping, Professional safety.
[3]. Dilek A.G (2013), A conceptual evaluation of 5S Model in Hotels, African Journal Business Management.
[4]. Gapp, Fischer.R and Kobayashi.K (2008), Implementing 5S within a Japanese Context: An integrated management system.
[5]. Gupta.A, Verma.S, Gupta.S (2015), An Application of 5S concept to organize the workplace at a small scale manufacturing company, International Journal of Advanced Engineering Technology.
Paper Type |
:: |
Research Paper |
Title |
:: |
Game Theory Based Clustering Approach for Wireless Sensor Networks |
Country |
:: |
India |
Authors |
:: |
Mrs.K.MARUTHIKRISHNA || Ms.S.PRIYANKA |
Page No. |
:: |
36-39 |
In view of the wireless sensor network clustering algorithm at home and abroad, an Efficient Dynamic Deputy Cluster Head Selection [EDDCH] technique is used to solve the problem of unreasonable cluster head selection, it may helpful to increase network life time and reduce energy consumption of cluster communication process. For data transmission, dynamic deputy cluster head selection is required to create the network. Efficient dynamic deputy cluster head selection is performed in view of energy level of node. The node with higher energy level can be taken as Cluster Head [CH] and the node with next energy level as Deputy Cluster Head [DCH]. After the selection of Cluster Head and Deputy Cluster Head nodes, the information of each individual node.....
Keywords: Cluster Head [CH], Deputy Cluster Head [CH], Energy consumption
[1]. Design & Implementation of Wireless Transceiver for Data Acquisition in Wireless Sensor Network Dr. R. K. Prasad, Mr. S. R. Madkar Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering
[2]. Haefke.M, Mukhopadhyay S.C and Ewald.H "A Zigbee Based Smart Sensing Platform for Monitoring Environmental Parameters "Proceedings of IEEE International Conference on Instrumentation and Measurement Technology pp1-8 May 2011.
[3]. HoSeong Cho, DaeHeon Park, Chul-Young Park, Hong- Geun Kim, Chang-Sun Shin, Yong-Yun Cho, and Jang-Woo Park "A study on localization based Zigbee and Monitoring system in Greenhouse environment" Proceedings of IEEE 3rd International Conference on Data Mining and Intelligent Information Technology Applications PP190-195 oct 2011.
[4]. Jeong-hwan Hwang and Hyun Yoe "Paprika Greenhouse Management System for Ubiquitous Agriculture"; Proceedings of IEEE International Conference on Information and Communication Technology Convergence pp555-556 Nov 2010.
[5]. Na Pang "Zigbee Mesh Network for Greenhouse Monitoring"; Proceedings of IEEE International Conference on Mechatronic Science, Electric Engineering and Computer PP266-269 Aug 2011.
Paper Type |
:: |
Research Paper |
Title |
:: |
Reversible Watermarking Technique Based On a Time- Stamping In Relational Data |
Country |
:: |
India |
Authors |
:: |
Dr. A.N. Nanda Kumar || Mr. S. Niresh Kumar || Mrs. M. Revathi |
Page No. |
:: |
40-44 |
Watermarking method is to recognizable pattern accustomed identify authenticity. Intentionally introduced pattern within the data is difficult to hunt out and destroy, robust against malicious attack. Watermarking, with none exception, has been used for ownership protection of style of knowledge formats that are utilized in several application domains. The watermark embedding algorithm takes a secret key (Ks) and thus the watermark bits (W) as input and converts a knowledge set D into watermarked data set DW. A cryptographic hash function MD5 is applied on the chosen data set to decide on out only those tuples which have an honest hash value. The proposed algorithm embeds as of a multi bit watermark (generated from date-time) in each selected row (in a numeric attribute) which generates the UTC Date_Time key for authentication with the target of getting maximum robustness whether or not an attacker is somehow able to successfully corrupt the watermark in some selected a component of the data set. The watermark embedding has been tired numeric database instead of alpha numeric database. Security of the database are improved.
[1]. Saman Iftikhar,M.Kamaran and Zahid Anwar,June 2014"RRW- A Robust and Reversible Watermarking Technique for Relational Data.
[2]. R. Agrawal and J. Kiernan,Dec 2002,"Watermarking relational databases," in Proceedings of the 28th international conference on Very Large Data Bases. VLDB Endowment, pp. 155–166.
[3]. J. T. Brassil, S. Low, and N. F. Maxemchuk,Oct 1999 "Copyright protection for the electronic distribution of text documents," Proceedings of the IEEE, vol. 87, no. 7, pp. 1181–1196.
[4]. P. E. Gill, W. Murray, and M. A. Saunders,Jan2005 "Snopt: An sqp algorithm for large-scale constrained optimization," SIAM review, vol. 47, no. 1, pp. 99–131.
[5]. R. Hassan, B. Cohanim, O. De Weck, and G. Venter,Mar 2005 "A Comparison Of Particle Swarm Optimization And The Genetic Algorithm," in 46 th AIAA/ASME/ASCE/AHS/ASC Structures, Structural Dynamics, and Materials Conference. American Institute of Aeronautics and Astronautics, pp. 1–13.
© 2019 All Rights Reserved | Design by iosrjen