Mengyuan Xu, Jingxuan Han, Shangheng Yang, Guiyang Mo, Wen Li |
||||||
Research status and development trend of simulation experiments on the formation of underground crack sealing layer | ||||||
This paper provides an overview of the issue of drilling fluid leakage and strategies to address it. The focus is on
preventing borehole wall collapse and ensuring well wall stability in complex geological environments through
the use of advanced plugging technologies and materials. The research analyses drilling and plugging materials
suitable for high-temperature formations, adaptive leakage prevention and plugging technologies, and
innovative applications of micro and nano technologies to enhance the effectiveness of drilling fluid plugging. It
also examines the unique effects of different plugging technologies in forming a plugging layer. The research
results suggest that numerical simulation is crucial in studying oilfield fracture plugging technology............
plugging technology, drilling fluids, plug layers, plugging particles, wellbore, plugging agents
[1]. XU Tongtai, LIU Yujie, SHIN Wei. Leakage Prevention and Plugging Technology in Drilling Engineering [M]. Beijing: Petroleum Industry Press, 1997. [2]. Sun Jinsheng, Wang Shiguo, Zhang Yi, et al. Research on film-forming technology of water-based drilling fluids[J]. Drilling and Completion Fluids, 2003, 20(6): 6-10. [3]. Al-saba M., Nygaard R., Saasen A., et al. Laboratory evaluation of sealing wide fractures using conventional lost circulation materials[C]. SPE170576, 2014. [4]. Alshubbar G., Nygaard R., Jeennakorn M. The effect of wellbore circulation on building an LCM bridge at the fracture aperture[J]. Journal of Petroleum Science and Engineering, 2018, 165: 550-556. [5]. Jeennakorn M., Nygaard R., Nes O., et al. Testing conditions make a difference when testing LCM[J]. Journal of Natural Gas Science and Engineering, 2017, 46: 375-386.
|
N Manasa, D Sravya, S Rakesh, Mohammed Miskeen Ali |
||||||
Deep Convoluational Neural Networks for Malaria Cell Identification | ||||||
Malaria is one of the deadliest diseases across the globe. This is caused by the bite of female Anopheles mosquito that transmits the Plasmodium parasites. Some current malaria detection techniques include manual microscopic examination and RDT. These approaches are vulnerable to human mistakes. Early detection of malaria can help in reducing the death rates across the globe. Deep Learning can emerge as a highly beneficial solution in the diagnosis of disease. This model gives a faster and cheaper method for detecting plasmodium parasites. The custom convoluational neural network is primarily designed to distinguish between healthy and infected blood samples........
Malaria Erythrocyte, Peripheral blood smear, Digital image processing, Deep learning Convoluational neural networks.
[1]. World malaria report 2019. Geneva: World Health Organization; 2019.
|
Julio Cézar de Almeida, Leomar Gomes Júnior |
||||||
The Cauchy Stress Tensor – Calculation Parameters Via Matlab -A Review | ||||||
The presence of 2nd order tensors in problems in the broad area of Continuum Mechanics corresponds to a very common practice. In a general context, a solid body when subjected to external loads presents corresponding deformations, and the relationship between the acting stresses and the generated deformations depends on the constitutive relationship of the material considered. Metallic materials, in general, can be classified and grouped as isotropic materials. Within this entire context, the Cauchy stress tensor stands out, from which various calculations and analyzes can be developed. The main objective of this work is to present a general review of the calculation parameters that can be carried out using the tensor. Also noteworthy is the development of a simplified computational code, in Matlab language, which allows obtaining and analyzing the main calculation parameters to be considered based on the Cauchy stress tensor.
....
[1]. Boresi, A. P., Chong, K. P., 2000. Elasticity in Engineering Mechanics, Prentice Hall, Inc.
|
Mr. Nilesh D. Mhaiskar, Veeramalla Srikanth, Chattala Teja Varsha, Jambula Archana Reddy |
||||||
Malware Detection Systems on Android Platforms Using Genetic Algorithm | ||||||
This study presents an innovative approach for enhancing Android malware detection through a Genetic Algorithm (GA)-based optimized feature selection coupled with machine learning techniques. Leveraging the evolutionary principles of GA, the proposed method effectively identifies a subset of features from a large pool, maximizing the discriminative power while minimizing computational complexity. By integrating this feature selection mechanism with machine learning classifiers, the system achieves superior performance in distinguishing between, benign and malicious Android applications.......
Genetic Algorithm, Machine Learning, Android Malware, Feature Selection Mechanism, Accuracy.
[1]. H. Rathore, A. Nandanwar, S. K. Sahay, and M. Sewak, ''Adversarialsuperiority in Android malware detection: Lessons from reinforcementlearning based evasion attacks and defenses,'' Forensic Sci. Int., Digit. Invest., vol. 44, Mar. 2023, Art. no. 301511. [2]. H. Wang, W. Zhang, and H. He, ''You are what the permissions told me! Android malware detection based on hybrid tactics,'' J. Inf. Secur. Appl., vol. 66, May 2022, Art. no. 103159. [3]. A. Taha and O. Barukab, ''Android malwareclassification using optimizedensemble learning based on genetic algorithms,'' Sustainability, vol. 14,no. 21, p. 14406, Nov. 2022. [4]. O. N. Elayan and A. M. Mustafa, ''Android malware detectionusing deep learning,'' Proc. Comput. Sci., vol. 184, pp. 847–852,Jan. 2021. [5]. J. Kim, Y. Ban, E. Ko, H. Cho, and J. H. Yi, ''MAPAS: A practical deep learning-based Android malware detection system,'' Int. J. Inf. Secur. Vol. 21, no. 4, pp. 725–738, Aug. 2022
|
Iram Sabha, Dr. Sudhakar Dwivedi, Dr. S.P Singh |
||||||
Output Price Policy in Indian Agriculture: A Review | ||||||
The evolution of India's agricultural price policies, from the establishment of the Agricultural Price Commission in 1965 to the present-day schemes like MSP, MIS, and PM-AASHA, has aimed to ensure fair prices for farmers and affordable food for consumers. MSP, as the cornerstone policy, shields farmers from price volatility, while interventions like MIS stabilize prices for perishable commodities. The recent introduction of PM-AASHA further enhances income security through schemes like PSS, PDPS, and PPPS. Despite these advancements, challenges persist, including the need for a more nuanced approach to policy formulation, the expansion of coverage beyond MSP, and the adoption of direct payments. Incorporating these suggestions can bolster India's agricultural sector, ensuring fair returns to farmers and stable commodity prices.
Price policy, Farmers, Remunerative price, Gross revenue, Food grains, Direct payment, Kharif crops
[1]. Acharya SS. 2016.Policy Analysis- What and How: A Case of Agricultural Price and Marketing Policies in India. Indian Journal of Agricultural Marketing30 (3): 26-47
|
G Pravalika, V Sai Harshith, V Alekhya |
||||||
Early Life Style Disease Prediction Using Ensemble Techniques | ||||||
In order to reduce health risks, there is a need for an effective application, especially in medical services. Currently, patients must contact a doctor and obtain medications to diagnose early lifestyle diseases, which requires multiple services and is time-consuming. There is scope for developing an end-to-end medical service system that covers all the services required by patients. This includes predicting early lifestyle diseases from given symptoms using machine learning, implementing a chatbot application with a question-and-answer system, and integrating a medicine booking system into a single platform. The entire process is designed as a single web application offering multiple services. In this project, we are developing a web application for early lifestyle detection using the Flask framework, Python programming language, and MySQL database.
....
[1]. Talha Mahboob Alam a, Muhammad Atif Iqbal a, Yasir Ali a, Abdul Wahab b, Safdar Ijaz b, Talha Imtiaz Baig b, Ayaz Hussain c, Muhammad Awais Malik b, Muhammad Mehdi Raza b, Salman Ibrar b, Zunish Abbasd,"A model for early prediction of diabetes", vol. 5, no. 1, pp. 8869–8879, 2019
|
Luiz A. D. de Abreu, Rickardo. L. R. Gomes |
||||||
Benefits of Restricted Optimization in Production Engineering: A Case Study in a Plastic Industry | ||||||
This study aims to investigate constrained optimization problems in a plastics company, leveraging existing research data to deepen understanding of constraint theory and linear programming. Additionally, it seeks to construct a problem model within a specific company in this sector. Following a literature review, and with the aid of the Solver/Excel tool, data from COMPANY X was inputted into a spreadsheet to address its issue and thereby enhance profits. The developed mathematical model was applied to an industrial problem involving two types of products (PRODUCT A and PRODUCT B). Through analysis of the problem conducted by the Solver/Excel, it was observed that PRODUCT B would increase profits for the company, highlighting the need for machinery investment in one of its sectors. Consequently, it can be concluded that the application of constraint theory is a vital tool for profit enhancement and decision-making in a company.
Optimization; Constraint Theory; Linear Programming; Decision Making.
[1]. Lopes, J. dos S. (2008). Analysis and Optimization of Production Sequencing in a Medium-sized Plastic Packaging Company. [Undergraduate thesis, Federal University of Juiz de Fora, Department of Production Engineering].
|
Shuo Zhang, Zhangqiao Chen, Zhiying Chen, Erxi Xu |
||||||
A Literature Review on Sustainable Development of New Energy and Oil Substitutes |
||||||
This article aims to provide an in-depth review of the research status of new energy and petroleum substitutes
both domestically and internationally, in order to provide comprehensive reference and guidance for scholars
and practitioners in related fields. By summarizing existing literature, we can better understand the research
achievements and development trends of various countries in the field of new energy, thereby providing more
scientific and reasonable directions and strategies for future research and application work. At the same time,
this article will also focus on exploring the important significance of new energy and oil substitutes for
environmental protection, economic development, and social sustainability. It will replace oil in some fields to
attract more attention and attention to sustainable energy.
new energy, Oil; Substitution, Countermeasures, Trends.
[1]. Lv Chunsheng Japan's New Energy Development and Its Inspiration to China [J] Modern Japanese Economy, 2006 (6): 37-41
|
Antonio Souza Santos Neto, Isabela Carvalho Fortuna Rodrigues, Cesar Fabiano Fioriti |
||||||
Reimagining Intermodal Integration: A Sustainable Development Hub At Presidente Epitácio, Brazil | ||||||
Aiming at intermodal integration: (i) Section III of the Paraná River Waterway – River of Silver Basin, (ii) Raposo Tavares Highway – SP-270 and (iii) Section of the Sorocabana Railway (EFS); the paper categorized as short communication refers to a technical project that proposes the configuration of a complex that rehabilitates existing infrastructures, recognizing their heritage value, in accordance with the 9th Development Objective Sustainable (DOS) of the UN 2030. With this, the project aspires to great potential for regional economic development, with the capacity to generate cross-border impacts.......
structural system, metallic structure, technical design, architecture.
[1]. Estância Turística de Presidente Epitácio. Foundation, the story about President Epitácio. Estância Turística de Presidente Epitácio, [2024]. Available in: https://presidenteepitacio.com.br/presidente-epitacio/fundacao/. Accessed in: April 4, 2024.
|
Kazi Shahariar Hasan, Kazi Md. Mostafizur Rahman, Ayon Biswas, Dr. Sharmin Reza Chowdhury |
||||||
Mechanical Properties of Steel Fiber Reinforced Concrete: A Comprehensive Review | ||||||
Every aspect of civil engineering work revolves around concrete in one way or another. It is one of the most versatile building materials for construction procedures. Concrete has low ductility and is brittle. It takes high compressive stress but is less capable when taking tensile stress. It shows abrupt failure when subjected to tension beyond its strength. With human advancement, construction methods have become more demanding, which requires every building component, such as concrete, to be more resilient than ever before. Various reinforcement techniques are practiced to improve the mechanical properties of concrete. Fiber-Reinforced concrete is a composite material combining concrete and randomly dispersed fiber.......
Concrete, Hairline-cracks, Steel Fiber-Reinforced Concrete (SFRC), Aspect Ratio.
[1]. T. E. T. BUTTIGNOL, J. L. A. O. SOUSA and T. N. BITTENCOURT, "Ultra High-Performance Fiber-Reinforced Concrete(UHPFRC): a review of material properties and designprocedures," IBRACON STRUCTURES AND MATERIALS JOURNAL, vol. 10, no. 4, pp. 957-971, 2017.
|
Chikwe A. O, Nwanwe O. I, Odo J. E, Madubuko T. C, Okereke, N.U. |
||||||
A Model for Predicting the Volume of Sand during Production | ||||||
Due to the current global oil price, the sand production is considered undesirable product and the control of sand production is considered as one of the main concerns of production engineers. It can damage downhole, subsea equipments and surface production facilities, also increasing the risk of catastrophic failure. As a result of that it costs the producers multiple millions of dollars each year. Therefore, there are many different approaches of sand control designed for different reservoir conditions. Selecting an appropriate technique for preventing formation sand production depends on different reservoir parameters. Therefore, choosing the best sand control method is the result of systematic study........
Sand Production, Sand Prediction Model, Sand Control.
[1]. Terzaghi, K., Peck, R. B., &Mesri, G. (1948). Soil Mechanics in Engineering Practice. John Wiley & Sons.
|
OGWU, C., Awowede, M. A., Agbe E., Ogana, J. |
||||||
Determination of The Polycyclic Aromatic Hydrocarbons (Pahs) In Telfairia Occidentalis (Fluted Pumpkin) Cultivated In Okpai Oil Bearing Community For Sustainable Economic Growth In Nigeria | ||||||
This study was an ex-post-facto research that investigated the content of PAHs in T. occidentaliscultivated in Okpai oil producing community for its suitability for human consumption. The study answered 3 research questions and tested a hypothesis. In achieving these T. occidentalist samples were collected from 5 farms/gardens in 5 quarters of Okpai bulked in each case, wrapped in alluminium foil and stored in ice cool boxes for analysis. The analytical standard adopted was EU 1255/2020 and the instrument for determination deployed was HPLC shimadzu LC 2050 series pressure resistance 50 MPa. The results obtained were pyrene; 2.72±0.11μg/kg, chrysere; 2.70±0.12 μg/kg, BaP; 2.74 μg/kg±0.11 μg/kg, BaA; 2.72±0.10 μg/kg and BbF, 2.73±0.12 μg/kg........
oil extraction, PAHs bioavailability, T. occidentalis, Human health,sustainable economic growth.
[1]. Abdulwaheed, B. Q. (2020). Adoption of cage aquaculture in Niger state for sustainable economic growth in Nigeria. Journal of Agriculture 12(2), 102-108.
|
D. Sandhika, R. Chandru, K. Kulathuraan |
||||||
Structural and Optical Properties of Gold Nanoparticles Coated on Porous Silicon Thin film | ||||||
Porous Silicon (PSi) samples were prepared by chemical etching (stain etching) of boron doped p-type silicon wafers. The gold nanoparticles (Au) were deposited on PS surface by Au-sputtered by Physical Vapor Deposition (PVD) technique. The Au/Psi composites get incorporated into the pores of PSi so that Au/PSi composite is formed. The surface morphological studies of PSi and Au/PSi composites were studied by Scanning Electron Microscopy (SEM). Photoluminescence (PL) measurements have been carried out to investigate the surface modification and optical properties of PSi and Au coated samples. In the case of Au/PSi structure, this peak is blue shifted with a reduction in the peak intensity.......
Porous Silicon, Au, SEM, PL, Envelop method and Optical constants.
[1]. ZhechuanFend, Raphael Tsu Porous Silicon . World scientific. NewJesvi. London,Hongkong, 345.
|
Huaxin Liang, Yadong Gong |
||||||
Improving the Energy Efficiency of LEACH Protocol in WSNs | ||||||
Currently, Wireless Sensor Networks (WSNs) have been applied in various domains to collect and monitor comprehensive information about environments or objects. To extend the operational duration of WSNs, a multitude of energy-saving techniques have emerged, with clustering protocols being the most effective. The earliest clustering protocol to appear was the LEACH protocol, which, despite its significant enhancement of network performance, had notable drawbacks. This paper summarizes various methods for optimizing the LEACH protocol, including: techniques for optimizing cluster head selection, advancements in inter-cluster routing, and improvements in clustering strategies.
WSNs, clustering protocol, LEACH, energy efficiency
[1]. W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan. 2000. Energy-efficient communication protocol for wireless microsensor networks, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, pp. 10-20.
|
Francisca A. F. Gadelha, Elizabete S. de M. Aguiar, Jocélia Araújo Costa, Karla A. T. da Silva, Tatiane P. S. da Silva, Francisca de J. G. de Sousa, Ana E. P. de Oliveira, Onete R. da Costa, Rickardo L. R. Gomes |
||||||
The International Education Seminar, October Teacher Festivals, Diversity and Inclusion Seminars, and Teachers Without Borders Program: strategies for teacher training in the municipality of Fortaleza | ||||||
This article discusses strategies for expanding teacher training through events aimed at increasing access to information for municipal employees in Fortaleza. In this sense, we analyze the relevance of the 1st International Education Seminar - "Educational Perspectives for the 21st Century: Towards quality education with equity; 1st Municipal Seminar on Diversity and Inclusion: A welcoming school; 2nd Municipal Seminar on Diversity and Inclusion: Dialogues for education with equity; 1st and 2nd edition of the October Teacher International Festival........
Education, Teacher Training, Improvement of Teaching and Learning.
[1]. Lakatos, E. M., & Marconi, M. de A. Fundamentals of scientific methodology. 8th ed. – São Paulo: Atlas, 2017. Bibliography. ISBN 978-85-970-1076-3.
|
Adeboboye, A. J. Anyadiegwu, P.C. Aroh E.M. |
||||||
Groundwater Potential Modelling In Awka South, Anambra State Using GIS and Remote Sensing | ||||||
Groundwater is the safest and most reliable water source, use in domestic, irrigation, industries, and municipality purposes. In Awka South, groundwater is a source of domestic water in urban and rural areas,
hence the only practical means of meeting rural communities in arid and semi-arid regions. Previous works on
the development of ground water in Awka South were faced with the problem of failed (abortive) hand-dug wells
and boreholes, which are as a result of the poor knowledge of the hydrogeological characteristics of the
basement aquifers. Most of the groundwater investigation in Awka South has been centered on the use of
Electrical resistivity method. None of these studies.......
AHP, Awka, GIS, Groundwater, Remote Sensing
[1]. Abdul-A., Vanum Govindu & Amare Gebre Medhin Nigusse (2016), Evaluation of groundwater potential using geospatial techniques. Applied Water Science 7, 2447-2461.
|
AMGOTH NARESH,Pavani Manaswi,P.V.M Rohan |
||||||
Medicare Hospitality Fraud Detection | ||||||
With the overall increase in the elderly population come additional, necessary medical needs and costs. Medicare is a U.S. healthcare program that provides insurance, primarily to individuals 65 years or older, to offload some of the financial burden associated with medical care. Even so, healthcare costs are high and continue to increase. Fraud is a major contributor to these inflating healthcare expenses. Our paper provides a comprehensive study leveraging machine learning methods to detect fraudulent Medicare providers. We use publicly available......
AMGOTH NARESH, Pavani Manaswi, P.V.M Rohan
[1]. Lakshman Narayana Vejendla and A Peda Gopi, (2019)," Avoiding Interoperability and Delay in Healthcare Monitoring System Using Block Chain Technology", Revue d'Intelligence Artificielle, Vol. 33, No. 1, 2019, pp.45-48. [2]. Gopi, A.P., Jyothi, R.N.S., Narayana, V.L. et al. (2020), "Classification of tweets data based on polarity using improved RBF kernel of www.jespublication.com PageNo:482 SVM". Int. j. inf. tecnol. (2020) [3]. Lakshman Narayana Vejendla and A Peda Gopi, (2017)," Visual cryptography for gray scale images with enhanced security mechanisms", Traitement du Signal, Vol.35, No.3-4, pp.197-208. DOI: 10.3166/ts.34.197-208 [4]. Herland, M., Bauder, R.A. &Khoshgoftaar, T.M. Approaches for identifying U.S. medicare fraud in provider claims data. Health Care Manag Sci 23, 2–19 (2020). https://doi.org/10.1007/s10729-018-9460-8 [5]. Hancock, J.T., Khoshgoftaar, T.M. Hyperparameter Tuning for Medicare Fraud Detection in Big Data. SN COMPUT. SCI. 3, 440 (2022). https://doi.org/10.1007/s42979-022-01348-x.
|
D. A. WENAPERE, KOTINGO KELVIN |
||||||
Structural Modelling of Compressive Strength of Sandcrete Block Walls with Varying Age of Curing | ||||||
Inspite of the wide coverage of masonry structures in technical literature, there appears to exist a serious gap in research on sandcrete blocks, particularly the stress-deformation characteristics and mechanism of failure of sandcrete block walls. And even more particularly, there is little or no such research based on the structural model of prototype block units, which therefore constitutes the major focus of this research paper. The methodology for using small-scale direct model for the experimental investigation of the strength, deformation and failure mechanism of sandcrete masonry structure is presented. The strength evaluation tests for the physical and......
D. A. WENAPERE, KOTINGO KELVIN
[1]. Abbound, B. E, Hamid , A. A , and Harris , H. G. (1960), "Small-Scale Modeling of Concrete Block Masonry Structures,'' ACI Structural Journal, Vol. 87, No.2.
|
Dr.Subba Rao Kolavennu, Mr.G Rakesh Reddy, L.Shreya, K.Vishal, N.Shubha |
||||||
Enhancing Cloud Data Security : Dynamic AES Encryption With Blockchain Key Management | ||||||
This research presents a novel approach to recurrent problems related to sensitive information security in the constantly changing field of cloud computing security. Due to the widespread usage of cloud computing, worries about data security have increased, calling for the development of innovative strategies to strengthen defences against such attacks. The fundamental problem is that data stored in the cloud is vulnerable, which highlights the necessity of sophisticated encryption and key management techniques. Traditional approaches frequently fail to reduce the hazards associated with hacked encryption keys and centrally stored keys. Our suggested solution uses a two-phase strategy to get around these obstacles......
.........
[1]. R. Anandkumar, K. Dinesh, A. J. Obaid, P. Malik, R. Sharma, A. Dumka, R. Singh, andS. Khatak, "Securing e-health application of cloud computing using hyperchaotic image encryptionframework," Computers and Electrical Engineering, vol. 100, p. 107860, 2022.
|
Kiran B.M, G.Sravya, A.Sathwika |
||||||
Malware detection through predictive analytics in cyber supply chain security | ||||||
Given the persistent threat of cyber-attacks targeting the cyber supply chain (CSC) and the widespread repercussions of malware infections, we employ machine learning techniques for attack prediction. With organizations increasingly dependent on CSC systems for business continuity, vulnerabilities and threat landscapes have also surged. While traditional methods like Logistic Regression, Decision Trees, and Random Forest through Majority Voting, we conduct training and testing using 10-fe antivirus software have had some success, the evolving sophistication of threat actors enables them to bypass these defenses......
Machine Learning, Cyber Supply Chain, Predictive Analytics. Cyber Security. Cyberattack
[1]. Adhikari, R., & Xu, K. (2018). Cybersecurity threat prediction and prevention using machine learning algorithms. Journal of Network and Computer Applications, 107, 57-67.
|
MR. T. Manigandhan, Mr.G Rakesh Reddy, B. Hrithika Reddy, E.Srikanth Reddy, A. Chandra Shekar Reddy |
||||||
Robust and Dependable Deep-Learning-Based Cyberattack Detection in Industrial IOT | ||||||
Afundamentalexpectationofthestakeholdersfrom the commercial net of things (IIoT) is its trustworthinessandsustainabilitytokeepawayfrom the lack of human lives in acting a important assignment.AtrustworthyIIoT-enabledcommunity encompasses essential protection characteristics, consisting of trust, privacy, security, reliability, resilience, and protection. The conventional protectionmechanismsandtacticsareinadequateto shield these networks as a result of protocol variations, confined update options, and older diversifications of the safety mechanisms. As a end result, these networks require novel techniques to growth accept as true with degree and beautify security and privacy mechanisms. consequently, in this text, we advocate a unique method to enhance the trustworthiness of IIoT-enabled networks.......
........
[1]. Y.Luo, Y.Duan, W. Li, P. Pace, andG.Fortino, "A novel mobile and Hierarchical data transmission architecture for smart factories," IEEETrans. Ind.Informat.,vol.14,no.8, pp.3534–3546,Aug.2018. [frameworkforepp.3534–3546,Aug.2018.
|
Assistant Prof. Neha Singh, Ms. Sakshi Mishra, Ms. Samistha Patle, Ms. Shrijal Verma, Ms. Shruti Patnaik |
||||||
Plant Monitoring System With Sensor Data And Image Processing | ||||||
Inorganic and manual practices have been prevalent in Indian farming culture for ages. This results in indirect toxin concentration in plants that are consumed by humans, leading to so many health issues . Adapting kitchen gardens in houses can, to some extent, help in the reduction of toxin consumption, but taking care of such gardens is a tedious task . The incorporation of IoT for plant monitoring can make small kitchen gardens' care more feasible for small families, and so they can adapt organic farming practices easily. Also, using image processing for disease detection in plants can also be proven helpful for the growers. The introduction of modern technologies such as IoT.....
.......
[1]. Maurya, M. K., Yadav, V. K., Singh, S. P., Jatoth, R., Singh, H. K., & Singh, D. (2022). Impact of Climate Change on Diseases of Crops and Their Management—A Review. Journal of Agricultural Science and Technology B, 1.
|
I Made Mara, I Made Nuarsa |
||||||
Experimental study of fuel characteristics from plastic waste (HDPE and PP) using the pyrolysis process | ||||||
This research was conducted to determine the effect of the type of plastic (HDPE and PP) and the effect of varying the diameter of the heat exchanger (1/2-inch, ¾-inch, and 1-inch) on the physical properties of fuel using pyrolysis process. Plastic waste is one of the environmental pollution materials on a global scale, especially in Indonesia, because plastic waste is difficult to decompose in the soil. One way to overcome this is by recycling plastic waste. However, this method is not very effective ; only about a few percent can be recycled, and the rest ends up in landfills. Another way to do this is to use plastic waste to process it into fuel using a pyrolysis process.......
fuel, pyrolysis, plastic, waste, physical properties.
[1]. Adoe, Dominggus G.H., Wenseslaus Bunganaen, Ika F. Krisnawi, Ferdyan A., Soekwanto., 2016, Pirolisis Sampah Plastik PP (Polyprophylene) menjadi Minyak Pirolisis sebagai Bahan Bakar Primer, LONTAR Jurnal Teknik Mesin Undana, Vol. 03, No. 01, April 2016, 17-26.
|
MR.Gattu Prasad, Mr.G Rakesh Reddy, D. Sri Harshitha Reddy, B. Devika, G. Vishali |
||||||
Integrated Behavioral Analysis for Detecting Identity Thefts in Online Social Networks | ||||||
On this paintings, we purpose at constructing a bridge from coarse behavioral statistics to an powerful, quick-response, and strong behavioral model for on line identity robbery detection. We give attention to this issue in on line social networks (OSNs) wherein customers generally have composite behavioral statistics, which include multidimensional low-high-quality information, e.G., offline check-ins and on line person-generated content (UGC). As an insightful result, we validate that there's a complementary impact amongst one of a kind dimensions of records for modeling customers' behavioral styles. To deeply make the most this kind of.....
xxx
[1]. Y. Luo, Y. Duan, W. Li, P. Pace, and G. Fortino, "A novel mobile and Hierarchical data transmission architecture for smart factories," IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 3534–3546, Aug. 2018. [framework for e pp. 3534–3546, Aug. 2018.
|
Hong Son Tran, Xuan Tuyen Do, Van Cong Tran, Anh Duong Vu, Van Dung Hoang, Duc Tung Chu |
||||||
Synthesis of an optimal controller for gear transmission systems for aviation equipment | ||||||
Gear transmission systems represent a prevalent type of actuator system found in various machinery sectors, especially within the realm of aerospace engineering. When faced with challenges demanding high precision and the inability to precisely measure frictional forces, shaft torsion, elastic deformations, and gear clearances, alternative mechanical approaches or electronic and electrical control mechanisms become essential. These controllers offer the flexibility to adapt control strategies effectively, compensating for discrepancies beyond the capability of mechanical interventions. In this paper, a novel control technique is proposed to enhance the performance of gear transmission systems by employing an optimal controller. Through simulations conducted using Matlab - Simulink software, the authors aim to showcase the efficacy of the optimization strategy introduced in this study.
xxx
[1]. G.T. Dinh, X.L. Nguyen and D. T Tran, 2010. "The principle of the machine", Vietnam Education Publishing House.
|
Aria Gusti |
||||||
Enhancing Environmental Health Surveillance: A Comprehensive Framework for Improved Public Health Outcomes | ||||||
Environmental health surveillance plays a critical role in safeguarding public health by identifying, assessing, and mitigating risks associated with environmental factors. Despite its significance, the existing surveillance systems often lack integration, real-time data access, and interdisciplinary collaboration, hindering their effectiveness in responding to emerging environmental threats. This article proposes a comprehensive framework for enhancing environmental health surveillance, leveraging advanced technologies and interdisciplinary approaches to achieve more proactive and data-driven public health outcomes. Key components of the framework include data integration....
Environmental health, Surveillance, Public health, Data integration, Interdisciplinary collaboration
[1] Alaimo MG, Varrica D. Global public health and toxicology. Encyclopedia of Toxicology, Elsevier; 2024, p. 987–93. https://doi.org/10.1016/B978-0-12-824315-2.00445-0.
|
Igbokwe, E.C, Oliha A. O. |
||||||
Potential for the Integration of Digital Twin and AI Technology in Gully Mapping and Prediction | ||||||
Gully erosion poses significant challenges to land management and environmental sustainability. Traditional
methods of mapping and predicting gully formation and progression are often labour-intensive and lack realtime
capabilities. The integration of Digital Twin Technology (DTT) and Artificial Intelligence (AI) offers a
transformative approach to addressing these challenges. This paper explores the potential of combining DTT
and AI for gully mapping and prediction, highlighting their synergistic benefits, applications, and future
prospects. By leveraging real-time data, advanced analytics, and predictive modeling, this integration can
enhance the accuracy, efficiency, and effectiveness of gully erosion management.
Artificial Intelligence; Big Data Analytics; Data Integration; Digital Twin Technology; Gully
Erosion; Predictive Modeling
[1] Poesen, J., Nachtergaele, J., Verstraeten, G., & Valentin, C. (2003). Gully erosion and environmental change: importance and research needs. Catena, 50(2-4), 91-133.
|
Shreya Malshikare , Sonali Patil , Kalyani Kawade, Dr.Balasaheb H. Patil |
||||||
Night Patrolling Robot | ||||||
This paper presents the implementation of a Night Patrolling Robot equipped with a monitoring and
control algorithm. The Night Patrolling Robot operates on a Raspberry Pi platform and utilizes Internet of
Things (IoT) technology. Serving as a crucial tool for national security, this robot is employed as a security
solution across various organizations such as banks and hospitals. Comprising a Raspberry Pi, which acts as a
compact single-board computer, a night vision camera, and a sound sensor, the Night Patrolling Robot system,
also known as the spy robot system, is constructed. Users receive real-time information through the sound
sensor's detection capabilities,.....
Internet of Things, Virtual network Computing, Security, Database.
....
|
Dr.kiran B.M, B.Nithya Sree, K.Saikiran, P..Charan Kumar |
||||||
Suspicious Activity Recognition from Video Surveillance System | ||||||
In today's insecure world the video surveillance plays an important role for the security of the indoor as well as outdoor places. With the increasing in the number of anti-social activates that have been taking place, security has been given utmost importance lately. Many Organizations have installed CCTVs for constant Monitoring of people and their interactions. For a developed Country with a population of 64 million, every person is captured by a camera 30 times a day. A lot of video data generated and stored for a certain time duration. A 704x576 resolution image recorded at 25fps will generate roughly 20GB per day. Constant Monitoring of data by humans to judge if the events are abnormal is near impossible task as requires a workforce and their constant attention...... videosurveillance,anti-social activities, Constant Monitoring
[1]. P.Bhagya Divya, S.Shalini, R.Deepa, Baddeli Sravya Reddy,"Inspection of suspicious human activity in the crowdsourced areas
captured in surveillance cameras",International Research Journal of Engineering and Technology (IRJET), December 2017.
|
Shreya Malshikare , Sonali Patil , Kalyani Kawade, Dr.Balasaheb H. Patil |
||||||
Stock Market Prediction Using Deep Learning | ||||||
Addressing Stock Market Forecasting Challenges through Deep Learning: A Systematic Review" In the financial market, predicting stock market movements poses a formidable challenge due to the complex, noisy, and dynamic nature of its time series data. However, with advancements in computing power, intelligent models offer a promising avenue for investors and analysts to mitigate investment risks. Deep Learning models have garnered significant attention in recent years, with numerous studies exploring their efficacy in forecasting stock prices using historical data and technical indicators. Yet, to ensure reliability, it's crucial to validate these models using profitability metrics and performance evaluations tailored to financial markets. This systematic review delves into Deep.....
Neural networks, financial performance measures, risk mitigation, predicting market trends, comprehensive evaluation, market analysis methods, market indicators.
[1] L. A. Teixeira and A. L. I. De Oliveira, ''A method for automatic stock trading combining technical analysis and nearest neighbour
classification,'' Expert Syst. Appl., vol. 37, no. 10, pp. 6885–6890, Oct. 2010.
|
P. Sandhya Rani, K. Akshay Rao, V. Giridhar, B. Aditya |
||||||
Finger shield ATM – ATM Security System using Fingerprint Authentication | ||||||
The proliferation of ATM Fraud case in Indonesia is still the main concern for the society especially bank customers. In March 2017, a total loss of 5 billion rupiah was recorded as a result of ATM Frauds. While the only solution which ensures security of ATM machines is a 6-digit PIN, there are still a lot of security cracks that can be used by the criminals to steal customer data and the 6-digit PIN itself. One of the most frequent method of ATM Fraud is skimming. Therefore, the authors bring the concept of.....
Fingershield ATM, Fingerprint, Minutiae, Smart Card, Database Server, Skimming.
[1]. Bank Indonesia. Statictics on ATM Card Transaction (Online). https://www.bi.go.id/id/statistik/sistem-pembayaran. Accessed 30th of January 2018 20:00
|
Phan Pham Chi Mai, Dao Duy Minh |
||||||
Changes in weather conditions in the near futureon the Cau River basin in Northern Vietnam using a Downscaling Method | ||||||
A complete and appropriate set of historical and future climate data is a necessary condition to research the impacts of climate change on a specific basin. In this study, daily temperature and precipitation data for the near future (up to 2040) were obtained using the BCSD downscaling method based on CMIP6-SSPs global forecast model scenarios. Overall, the results imply that the basin will be hotter and drier in the near term, which could cause potential problems related to agricultural activities and water consumption. At the same time, these findings can provide further information and support for further investigations leading to practical adaptation strategies in the context of the climate emergency.
BCDS Method, CMIP6, SSPs, The Cau River Basin
[1]. IPCC (2013), Climate change 2013: The Physical Science Basis, IPCC Working Group I Contribution to AR5.
|
Mbarga Awoumou clovis, Doua Philémon |
||||||
A Review On Cassava Harvesting Equipments | ||||||
Harvesting is a bottleneck in the cassava production value chain. When done manually and semi-manually, it is tedious. Drudgery is observed through the serial repetition of harvesting operations rather than parallel harvesting approach. This state of things causes loss of time, energy and attacks on the health of farmers like hand blisters; cought due to dust, wind and or rain; and body fatigue. It also leads to low productivity. Transporting the harvesting tool and the harvested products requires supplementary efforts from the farmer. Semi-mechanized and fully mechanized cassava harvesting equipments need less or no human labour force, save time and increase the productivity but in semi-mechanized equipments only the root digging process.........
cassava, harvesting, equipments, labor intensive, mechanization.
[1]. Agbetoye, L. A. S., Ademosun, O. C., Ogunlowo, A. S., Olukunle, O. J., Fapetu, O. P., & Adesina, A. (2003). Engineering challenges in developing indigenous machinery for cassava production and processing. Proc. Ann. Conf.of the Nigerian Soc. Eng. (Lagelu 2003), 80–86.
|
Mr. Mohammad Miskeen Ali, A.Chandana, P.Manisha, M.Vivek |
||||||
Textual Brilliance: Harnessing Generative AI To Convert Video Transcripts Into Detailed Notes Using Chatbot | ||||||
Textual Brilliance is a groundbreaking project aimed at leveraging generative AI technology to revolutionize the
process of converting video transcripts into detailed notes, facilitated by a chatbot interface. In an era of
burgeoning digital content, the need for efficient methods to distill key information from multimedia resources
has become increasingly essential. This project addresses this need by providing users with a seamless and
interactive platform to extract, condense, and comprehend video content effectively. The project's methodology
encompasses several key components. Firstly, it integrates advanced generative AI algorithms capable of
analyzing video transcripts and extracting essential information........
[1] I. Awasthi, K. Gupta, P. S. Bhogal, S. S. Anand and P. K. Soni, "Natural Language Processing (NLP) based Text Summarization - A Survey," 2021 6th International Conference on Inventive Computation Technologies (ICICT), 2021, pp. 1310-1317, doi: 10.1109/ICICT50816.2021.9358703. [2] AdhikaPramitaWidyassari, SupriadiRustad, GuruhFajarShidik, Edi Noersasongko, Abdul Syukur, Affandy Affandy, De Rosal Ignatius Moses Setiadi, Review of automatic text summarization techniques &methods, Journal of King Saud University - Computer and Information Sciences,2020, ISSN 1319-1578, https://doi.org/10.1016/j.jksuci.2020.05.006. [3] P. R. Dedhia, H. P. Pachgade, A. P. Malani, N. Raul, and M. Naik, "Study on Abstractive Text Summarization Techniques," 2020 International Conference on Emerging Trends in Information Technology and Engineering (icETITE), 2020, pp. 1-8, doi: 10.1109/ic-ETITE47903.2020.087. [4] A. Dilawari and M. U. G. Khan, "ASoVS: Abstractive Summarization of Video Sequences," in IEEE Access, vol. 7, pp. 29253- 29263, 2019, doi: 10.1109/ACCESS.2019.2902507. [5] https://huggingface.co/transformers/installation.html [1]. IPCC (2013), Climate change 2013: The Physical Science Basis, IPCC Working Group I Contribution to AR5.
|