ijcesr troindia - Academia.edu (original) (raw)

Uploads

Papers by ijcesr troindia

Research paper thumbnail of A RESEARCH PAPER ON UPGRADED BLACK BOX FOR AUTOMOBILES

The main purpose of the paper is to develop a prototype of Black Box for vehicle diagnosis that c... more The main purpose of the paper is to develop a prototype of Black Box for vehicle diagnosis that can be installed into any vehicle. Like flight data recorders in aircraft, "Black Box " technology plays a key role in vehicle crash investigations. This prototype can be designed with minimum number of circuits. This can contribute to construct safer vehicles, improving the treatment for crash victims, helping insurance companies with their vehicle crash investigations, and enhancing road status in order to decrease the death rate. The prototype provides complete information about the car along with Navigation system in collaboration with Google Earth. The prototype can provide Artificial Intelligence Support by having a communication channel between the user and the car. Car-To-Car Communication for analyzing abruptness in the forthcoming vehicle before it intends to collide is a major field studied in the paper along with live analysis through experiments.

Research paper thumbnail of COMPARATIVE STUDY OF DIFFERENT SENSORS USING ARM CONTROLLER AND BLUETOOTH

Now-a-days , the advantages in wireless communication & electronics has accelerated to develop ma... more Now-a-days , the advantages in wireless communication & electronics has accelerated to develop many wireless network solutions to replace existing wired network. A wireless network solution can support mobility & flexibility of nodes in network. Similarly security is important in wireless sensor network Bluetooth is generally considered as a short range wireless technology because of its less expensive cost, low power consumption and small size. Bluetooth uses short range radio links intended to replace the cable connecting portable and / or fixed electronic devices. It uses 2.4GHZ frequency band &providing security in sensor network is not an easy task. In this paper, we focused on comparative study of different sensors using arm processor and Bluetooth.

Research paper thumbnail of AN EXPERIMENTAL ANALYSIS OF USING MELT PROCESSED PLASTIC PELLETS IN POROUS CONCRETE BY PARTIALLY REPLACENG FINE AGGREGATES

In many developed countries, the use of pervious concrete for the construction of pavements, car ... more In many developed countries, the use of pervious concrete for the construction of pavements, car parks and driveways is becoming popular. In order to develop material specification for pervious concrete, it is necessary to conduct testing to evaluate the performance of this new type of high performance concrete. The pervious concrete is produced by using conventional cementitious materials, aggregates and water. This concrete is tested for its properties, such as density, porosity, compressive strength and water permeability. The most important property of pervious concrete is its water permeability. Currently, there is no standard experimental procedure to determine this property. Pervious concrete having density around 1800kg/m 3 shows the following properties: Porosity 30 % to 35%, 14 days compressive strength between 2 MPa to 5 MPa and water permeability in between 4 cm/s and 7 cm/s.

Research paper thumbnail of SURVEY ON STORAGE AND SECURITY FOR DE DUPLICATION

Data Deduplication provides ton of benefits to security and privacy issues which can arise as use... more Data Deduplication provides ton of benefits to security and privacy issues which can arise as user's sensitive data at risk of within and out of doors attacks.Traditional secret writing that provides knowledge confidentiality is incompatible with knowledge deduplication. It secret writing needs completely different users to encode their knowledge with their own keys. Thus, identical knowledge copies of completely various users can result in different ciphertexts that makes Deduplication not possible.Convergent secret writing has been planned to enforce knowledge confidentiality where as creating Deduplication possible. It encrypts or decrypts a knowledge copy with a confluent key, that is obtained by computing the cryptographical hash price of the content of the information copy. Once generation of key and encryption, the user can retain the keys and send ciphertext to cloud.

Research paper thumbnail of AN EXPERIMENTAL ANALYSIS ON USAGE POTENTIAL OF LATERITIC SOIL AS PART/FULL REPLACEMENT FOR FINE AGGREGATES IN CONCRETE

The provision of affordable housing units from indigenous building materials has been the focus o... more The provision of affordable housing units from indigenous building materials has been the focus of most researchers in recent times. Sand has traditionally been used as fine aggregate in structural concrete. It is usually brought/transported from relatively distant places at high costs, and this increases the overall cost of making concrete. Also, river sand is slowly running out, leading to scarcity and price rise. This study investigates the suitability of lateritic aggregates a s part/full replacement for fine aggregate and evaluate its mechanical performance in laterized concrete. Aprocedure is standardized for obtaining lateritic sand (meeting either zone – II or zone – III) from laterite blocks. To study its performance in concrete, 150 mm cubes were cast and 28 days water cured for cases of 0%, 25%, 50%, 75% and 100% river sand being replaced by lateritic sand. These cubes were later tested to determine compressive strength of laterized concrete. Important results are discussed and presented in this work.

Research paper thumbnail of STABILIZATION OF EXPANSIVE SOIL USING FLYASH AND LIME

Historical changes are evidence for occurring in the world from Egyptian pyramids to the today's ... more Historical changes are evidence for occurring in the world from Egyptian pyramids to the today's world twin tower, for any change in structural development depends on deep study of soil existing by civil engineers.Expansive soil which is one among the problematic soils is a term used for any soil that has a high potential for shrinking or swelling due to any change of moisture content. Understanding this expansive soil and adopting the appropriate remedial measures to modify the soil or to reduce its detrimental effects if expansive soils are identified in a project. The motive of this project is to improve the properties of the expansive soil and to study the effectiveness of the additives on the expansive soil geotechnical characteristics. In this research work the findings of laboratory test performed at CSMRS for stabilization of problematic soil in Subarnarekha main canal are presented. Two additives were elected Flyash from Parichha thermal power station and hydrated lime and mixed with the soil in various percentages. The results highlights that the expansive soil becomes effective mixed with fly ash along lime.

Research paper thumbnail of DETECTING VICTIM SYSTEM IN CLIENT AND CLIENT NETWORKS

Botnets are the principal regular vehicle of digital criminal action. They're utilized for spammi... more Botnets are the principal regular vehicle of digital criminal action. They're utilized for spamming, phishing, disavowal of-administration assaults, savage constrain splitting, taking non-open information, and digital fighting. A botnet (additionally alluded to as a zombie armed force) might be a scope of net PCs that, however their mortgage holders are uninformed of it, are got twist of to forward transmissions (counting spam or infections) to option PCs on the web. Amid this paper, we tend to propose a two-organize approach for botnet recognition. The essential stage recognizes and gathers organize irregularities that are identified with the nearness of a botnet though the second stage distinguishes the bots by dissecting these inconsistencies. Our approach misuses the consequent 2 perceptions: (1) Bot experts or assault targets are simpler to discover therefore of the confer with a few option hubs, and (2) The exercises of contaminated machines are a considerable measure of correlative with each other than those of customary machines.

Research paper thumbnail of 91-99

The goal of data mining is to discover knowledge and reveal new, interesting and previously unkno... more The goal of data mining is to discover knowledge and reveal new, interesting and previously unknown information to the user. Association rule mining forms an important research area in the field of data mining. Association rules discovers patterns and correlations that may be buried deep inside a database. They have therefore become a key data-mining tool and it has been well researched. Many algorithms have been proposed to find association rules in databases with binary and categorical attributes. However many real world databases are in quantitative nature and the current solutions for this kind of databases are so far inadequate. A satisfactory solution would be of great benefit to many fields. This paper is aimed at proposing new algorithms for mining association rules on the quantitative data. We are proposing a new method for deriving the association rules on the quantitative data by using apriori algorithm, Clustering and fuzzy set concepts. The association rules of quantitative data are represented in two independent ways, one is with statistical terms namely Mean and Standard Deviation, and another way is with fuzzy linguistic terms. The Statistical Association rule consists of quantitative attributes along with the corresponding Mean and Standard Deviation. The representation of the rules was done by means of statistical terms as they can describe the behaviour of quantitative attributes better than the existing methods and the theory of fuzzy sets can be used over relational databases to discover useful, meaningful patterns. We proposed a new approach to infer fuzzy association rules from the quantitative data,

Research paper thumbnail of A RESEARCH PAPER ON UPGRADED BLACK BOX FOR AUTOMOBILES

The main purpose of the paper is to develop a prototype of Black Box for vehicle diagnosis that c... more The main purpose of the paper is to develop a prototype of Black Box for vehicle diagnosis that can be installed into any vehicle. Like flight data recorders in aircraft, "Black Box " technology plays a key role in vehicle crash investigations. This prototype can be designed with minimum number of circuits. This can contribute to construct safer vehicles, improving the treatment for crash victims, helping insurance companies with their vehicle crash investigations, and enhancing road status in order to decrease the death rate. The prototype provides complete information about the car along with Navigation system in collaboration with Google Earth. The prototype can provide Artificial Intelligence Support by having a communication channel between the user and the car. Car-To-Car Communication for analyzing abruptness in the forthcoming vehicle before it intends to collide is a major field studied in the paper along with live analysis through experiments.

Research paper thumbnail of COMPARATIVE STUDY OF DIFFERENT SENSORS USING ARM CONTROLLER AND BLUETOOTH

Now-a-days , the advantages in wireless communication & electronics has accelerated to develop ma... more Now-a-days , the advantages in wireless communication & electronics has accelerated to develop many wireless network solutions to replace existing wired network. A wireless network solution can support mobility & flexibility of nodes in network. Similarly security is important in wireless sensor network Bluetooth is generally considered as a short range wireless technology because of its less expensive cost, low power consumption and small size. Bluetooth uses short range radio links intended to replace the cable connecting portable and / or fixed electronic devices. It uses 2.4GHZ frequency band &providing security in sensor network is not an easy task. In this paper, we focused on comparative study of different sensors using arm processor and Bluetooth.

Research paper thumbnail of AN EXPERIMENTAL ANALYSIS OF USING MELT PROCESSED PLASTIC PELLETS IN POROUS CONCRETE BY PARTIALLY REPLACENG FINE AGGREGATES

In many developed countries, the use of pervious concrete for the construction of pavements, car ... more In many developed countries, the use of pervious concrete for the construction of pavements, car parks and driveways is becoming popular. In order to develop material specification for pervious concrete, it is necessary to conduct testing to evaluate the performance of this new type of high performance concrete. The pervious concrete is produced by using conventional cementitious materials, aggregates and water. This concrete is tested for its properties, such as density, porosity, compressive strength and water permeability. The most important property of pervious concrete is its water permeability. Currently, there is no standard experimental procedure to determine this property. Pervious concrete having density around 1800kg/m 3 shows the following properties: Porosity 30 % to 35%, 14 days compressive strength between 2 MPa to 5 MPa and water permeability in between 4 cm/s and 7 cm/s.

Research paper thumbnail of SURVEY ON STORAGE AND SECURITY FOR DE DUPLICATION

Data Deduplication provides ton of benefits to security and privacy issues which can arise as use... more Data Deduplication provides ton of benefits to security and privacy issues which can arise as user's sensitive data at risk of within and out of doors attacks.Traditional secret writing that provides knowledge confidentiality is incompatible with knowledge deduplication. It secret writing needs completely different users to encode their knowledge with their own keys. Thus, identical knowledge copies of completely various users can result in different ciphertexts that makes Deduplication not possible.Convergent secret writing has been planned to enforce knowledge confidentiality where as creating Deduplication possible. It encrypts or decrypts a knowledge copy with a confluent key, that is obtained by computing the cryptographical hash price of the content of the information copy. Once generation of key and encryption, the user can retain the keys and send ciphertext to cloud.

Research paper thumbnail of AN EXPERIMENTAL ANALYSIS ON USAGE POTENTIAL OF LATERITIC SOIL AS PART/FULL REPLACEMENT FOR FINE AGGREGATES IN CONCRETE

The provision of affordable housing units from indigenous building materials has been the focus o... more The provision of affordable housing units from indigenous building materials has been the focus of most researchers in recent times. Sand has traditionally been used as fine aggregate in structural concrete. It is usually brought/transported from relatively distant places at high costs, and this increases the overall cost of making concrete. Also, river sand is slowly running out, leading to scarcity and price rise. This study investigates the suitability of lateritic aggregates a s part/full replacement for fine aggregate and evaluate its mechanical performance in laterized concrete. Aprocedure is standardized for obtaining lateritic sand (meeting either zone – II or zone – III) from laterite blocks. To study its performance in concrete, 150 mm cubes were cast and 28 days water cured for cases of 0%, 25%, 50%, 75% and 100% river sand being replaced by lateritic sand. These cubes were later tested to determine compressive strength of laterized concrete. Important results are discussed and presented in this work.

Research paper thumbnail of STABILIZATION OF EXPANSIVE SOIL USING FLYASH AND LIME

Historical changes are evidence for occurring in the world from Egyptian pyramids to the today's ... more Historical changes are evidence for occurring in the world from Egyptian pyramids to the today's world twin tower, for any change in structural development depends on deep study of soil existing by civil engineers.Expansive soil which is one among the problematic soils is a term used for any soil that has a high potential for shrinking or swelling due to any change of moisture content. Understanding this expansive soil and adopting the appropriate remedial measures to modify the soil or to reduce its detrimental effects if expansive soils are identified in a project. The motive of this project is to improve the properties of the expansive soil and to study the effectiveness of the additives on the expansive soil geotechnical characteristics. In this research work the findings of laboratory test performed at CSMRS for stabilization of problematic soil in Subarnarekha main canal are presented. Two additives were elected Flyash from Parichha thermal power station and hydrated lime and mixed with the soil in various percentages. The results highlights that the expansive soil becomes effective mixed with fly ash along lime.

Research paper thumbnail of DETECTING VICTIM SYSTEM IN CLIENT AND CLIENT NETWORKS

Botnets are the principal regular vehicle of digital criminal action. They're utilized for spammi... more Botnets are the principal regular vehicle of digital criminal action. They're utilized for spamming, phishing, disavowal of-administration assaults, savage constrain splitting, taking non-open information, and digital fighting. A botnet (additionally alluded to as a zombie armed force) might be a scope of net PCs that, however their mortgage holders are uninformed of it, are got twist of to forward transmissions (counting spam or infections) to option PCs on the web. Amid this paper, we tend to propose a two-organize approach for botnet recognition. The essential stage recognizes and gathers organize irregularities that are identified with the nearness of a botnet though the second stage distinguishes the bots by dissecting these inconsistencies. Our approach misuses the consequent 2 perceptions: (1) Bot experts or assault targets are simpler to discover therefore of the confer with a few option hubs, and (2) The exercises of contaminated machines are a considerable measure of correlative with each other than those of customary machines.

Research paper thumbnail of 91-99

The goal of data mining is to discover knowledge and reveal new, interesting and previously unkno... more The goal of data mining is to discover knowledge and reveal new, interesting and previously unknown information to the user. Association rule mining forms an important research area in the field of data mining. Association rules discovers patterns and correlations that may be buried deep inside a database. They have therefore become a key data-mining tool and it has been well researched. Many algorithms have been proposed to find association rules in databases with binary and categorical attributes. However many real world databases are in quantitative nature and the current solutions for this kind of databases are so far inadequate. A satisfactory solution would be of great benefit to many fields. This paper is aimed at proposing new algorithms for mining association rules on the quantitative data. We are proposing a new method for deriving the association rules on the quantitative data by using apriori algorithm, Clustering and fuzzy set concepts. The association rules of quantitative data are represented in two independent ways, one is with statistical terms namely Mean and Standard Deviation, and another way is with fuzzy linguistic terms. The Statistical Association rule consists of quantitative attributes along with the corresponding Mean and Standard Deviation. The representation of the rules was done by means of statistical terms as they can describe the behaviour of quantitative attributes better than the existing methods and the theory of fuzzy sets can be used over relational databases to discover useful, meaningful patterns. We proposed a new approach to infer fuzzy association rules from the quantitative data,