The effect of steel fibre inclusion on the mechanical properties and durability of lightweight foam concrete
Lightweight foam concrete has been an effective building material product for many years due to its lightness and cost saving characteristics. The present study covers the use of steel fibres to produce Lightweight Foam Concrete (LFC) for use in the construction of non-load bearing elements. The LFC with a density of 1000 kg/m3 was cast and tested. Compressive, flexural, tensile split, drying shrinkage and water absorption tests were carried out to evaluate the mechanical properties and durability over 28 days. The cement, sand and water used were in the ratio of 1:1.5:0.45. Two percentages of fibre inclusion, 0.25% and 0.4% by total volume fraction, and 30% replacement of cement by fly ash were implemented. The addition of steel fibres in LFC showed a very good contribution in the compressive strength, flexural strength and tensile split strength test results.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Wavelet based finger print identification for effective biometric security
Fingerprint identification is one the most important biometric technologies since the unchangeable fingerprints during human life span, and the uniqueness of each individual’s fingerprint. This paper is an attempt to design and implement a biometric security system in human fingerprint using the concept of wavelet analysis, and a new scheme for human fingerprint recognition using wavelet packet decomposition is presented. Each human fingerprint is described by a subset of band filtered images containing wavelet coefficients. These coefficients characterize the human fingerprint texture and a set of simple statistical measures allows us to form efficient and meaningful feature vectors. Then, a useful and reliable Bayes classifier is employed in order to classify the human fingerprint feature vectors into person classes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Web Based Design for Academic Management System and E-Learning Portal
The Academic Management System is useful to both students and Faculties for Time table, Lesson Plan, Log Book upkeeping , viewing circulars sent by authorities , on-line assignment submission capability, Internal Marks entry, attendance and Mentoring and prepare the final report to be sent to parents. This system is developed as Web Application in ASP/ASP.Net for front end and MS SQL Server as the backend. Security is achieved by using SQL injections prevention codings and encrypted cookies and sessions. Username and password also given only in encrypted form. This automated implementation in our University environment has eased the work-load and enhanced the work efficiency of faculty members and students also feel happy to receive instantly all their Academic Information.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Elimination of cancer cells by resistive heating method using Comsol multi physics
Localized heating is poised to become an integral part of microfluidic devices in various life-science applications. The elimination of cancer cells are done using resistive heating method. Many methods are adopted for cancer elimination. But this method will be more useful for elimination the cancer cells. By using mems, COMSOL Multiphysics technique by resistive heating method the cancer cells will be get eliminated. This is catalyzed by the scale of economics, the advantageous fluidic behavior at small volumes, and the ever increasing need for rapid and high throughput assays for pharmaceutical industry and other combinatorial based studies. For precision confined heating, thin film resistive heaters have proven to be superior to the conventionally used Peltier elements, which are often a hindrance to miniaturization and functionality integration for thermally sensitive application. The resistivity of certain metals varies predictably with temperature, making them suitable for use as temperature sensors. If a thin film could be designed so that it preserves a uniform temperature distribution during heating, its total resistance would accurately reflect its temperature, allowing it to simultaneously act as both a temperature sensor and a heater.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
SYN Flooding attack detection by fuzzy mechanism
A DoS attack is a type of attack which the attacker waste the resource of system. In DoS attack of the computer system an individual host will send huge number of useless packets to one machine so it makes the crash of the host. Among the different types of DOS attacks, SYN- Flooding attack is more important In the situation of attacking system is in non- linear mode so it seems the fuzzy logic work better other methods. In this paper we propose new hybrid mechanism of filtering and fuzzy for detection of DOS attack Source IP address and port, packet timeline, Number of packets, Entropy of Packet type, rate of request, Entropy of Source IP, and Entropy of Source Port some of the parameters that effect on attack detection. So in our study we infer fuzzy rules based on the value of these parameters. Performance analysis of the proposed approach is done by measure of the four parameters including Precision, Recall, F-measure, and Accuracy in different state of system. To similarity to real situations three modes: normal, LOW DOS Attack, and High DOS Attack for the system is intended. Two set of data e.g. train data and test data are provided to the analysis of the proposed approach. Results showed that for testing data in the situation of attack occurrences in system attack detection has a high degree of accuracy. Its accuracy is approximately 95%.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Correlation Based Grouping and Ranking of Genes in Bipolar Disorder
Bipolar Disorder is a psychiatric disorder in which the core feature is pathological disturbance in mood rearranging from extreme mania to severe depression. Research analysis shows there is no specific genes are analyze which is directly associated with Bipolar Disorder. Diverse data mining technique is used to find out genes responsible for BD. It is found that genes present in orbit frontal cortex are differentially expressed in disease and control subjects. Gene Expression analyses of thousands of genes are studied from the orbit frontal cortex region of brain. Microarray technology is used to study approximately 22,283 mRNA transcripts from Orbit frontal cortex in brain region. Statistical t-tests are applied and 1,172 genes have obtained as significant genes. Correlation based feature selection is used to reduce the large dataset into small dataset.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
RFID Based E-Document Verification Using Cloud
The project named ‘RFID Based E-Document Verification Using Cloud’ proposes to make the E-Document Verification the new technology to reduce the human efforts for getting the documents from certain institutes and even from Government offices. It provides an easy access to the document generation even if the document is lost or misplaced. Radio Frequency Identification is the hardware concept to provide small RFID tags to the user with the electromagnetic waves and produce the signals to it and then access the data. In this project we have implemented the concept of Networking using java and the web application. The project aims at making the document verification and accessing very easy and saving a lot of time and energy and commotion among users.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Speech Recognition for Large Vocabulary
This paper presents an approach to the development of a speaker independent, continuous word Speech Recognition System for a large vocabulary. The feature extraction is based on Mel-scaled Frequency Cepstral Coefficients (MFCC) and template matching employs Dynamic Time Warping (DTW). In general, efficiency of the speech recognition system in noise free environment is impressive. But, in the presence of environmental noise the efficiency of the speech recognition system deteriorates drastically. As an attempt to overcome this drawback, Spectral Subtraction (SS) is used for de-noising the speech signal before feature extraction and Convolutional Noise Removal is performed after feature extraction.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Face recognition : a literature review
As one of the most successful applications of image analysis, face recognition has recently received significant attention, especially in recent years. The reason for this trend is the wide range of commercial, real and law enforcement applications. The availability of feasible technologies for the recognition of face images acquired in an outdoor environment with changes in illumination and/or pose remains a largely unsolved problem. This paper provides an upto date survey of face recognition research. In addition, issues of illumination and pose variation are covered.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Image Data Security Concerns in Cloud Computing: A Review
The significance of Cloud Computing is growing and it is getting an increasing awareness in the technical and industrial community. This paper is mainly focused on the security concerns of cloud computing and techniques to prevail over the data privacy issue. Before studying the security concerns, the definition of cloud computing and brief discussion to under cloud computing is presented, then it surveys the cloud security issues and problem faced by cloud service provider. Thus, defining the authentication, integrity and confidentiality techniques that will be used to overcome the problem of image security.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]