International Journal For Innovative Engineering and Management Research
Latest Publications


TOTAL DOCUMENTS

154
(FIVE YEARS 154)

H-INDEX

1
(FIVE YEARS 1)

Published By Institute For Advanced Studies

2456-5083

This paper consists of the results of an experimental research on the effect of bottom ash as partial replacement of natural sand on the properties of cement mortar. The experimental works were carried out by replacement of fine aggregate with varying percentages of bottom ash i.e. 15%, 20%, 25% and 30%. As the microstructure of mortar matrix changes with varying water cement ratio, the w/c was kept constant i.e. 0.45.Mortar cubes of 70.6mm×70.6mm×70.6mm were casted and vibrated on an electrically operated vibrator. Then various tests including compressive strength, water permeable porosity (apparent porosity), percentage of water absorption, sorptivity were performed on mortar cubes replaced with bottom ash. The results were compared with the results of control mix and all the tests were performed at 3, 7, 28, 56 and 90 days. Based on the results, it is concluded that fine aggregates can be replaced up to 20% with bottom ash in cement mortar.


The industrial units adapt different networks for the management of their units, processes and resources. The industrial sector uses different networks for their smooth functioning which would require accessing various network services by their users, employees and customers. However, the industrial networks arenot exemptions from network threats. Number of threats exist which challenge the functioning of industrial network like DDoS (Distributed Denial of Service), black hole, eavesdrop attack and so on. Most attacks focus towards degrading the QoS performance of industrial network. To handle this, different approaches are available in literature which works based on several features like traffic, hop count, payload, service frequency, retransmission frequency, node behaviors, and location of nodes and so on. Similarly, most threats occur over the routing procedure. Towards maximizing the QoS of industrial network, it is necessary to analyze various routing protocols and their way of handling different threats. This article analyzes various routing protocols and threats towards QoS of Industrial networks.


The issue of career development and how to prepare career skills in educational institutions has become an exciting issue in vocational education. And career adaptability is one of the skills needed in dealing with changes in the world of work. Many studies discuss the vital role of career adaptability skills to drive individual career success and academic success.However, there are still limited studies that discuss how to measure career adaptability skills for polytechnic students. This study aims to examine the measurement model of career adaptability skills of polytechnic students. This study involved 265 polytechnic students at a state polytechnic in Balikpapan, Indonesia. The sampling technique used in this research is using proportional random sampling. Data collection is done using self-report. Students assess their perceptions of their career adaptability skills.Data analysis using Confirmatory Factor Analysis (CFA) using SPSS Amos 21 for Windows.The study results show that career adaptability skills can be explained by indicators of concern, control, curiosity, and confidence. The career adaptability skills questionnaire consists of 23 items consisting of five items of concern, six items of control, six items of curiosity, and six items of confidence. This study has implications for vocational education practitioners and company HRD to make this questionnaire a measuring tool for career adaptability skills of polytechnic students and workers.


The electrocardiogram (ECG) has significant scientific importance for analyzing the majority of cardiovascular diseases. On one side the technologies are growing very fast, on the other side there is a need to check and balance their effect on human health. The activity of the heart ECG voltage vector is well explained by the modeling of the ECG wave. It is one of the essential tools to do so. In the proposed work we tried to elucidate a mathematical model for the ECG wave by presumptuous the human body as a cylindrical complex dielectric and conducting medium. The human heart is considered as a harmonic bio-signal generator positioned in this medium. Nowadays, technologies are enhancing in various aspects as the graph of mobile phone users increasing rapidly day by day. Essentially, it needed to understand its side effects on the human body and especially for the health of the human heart. The electrical equivalent of the heart can be used to develop a mathematical model for the human heart as per its functioning. The ECG parameters which are affecting due to the electromagnetic wave can be analyzed using a proposed mathematical model. If mathematical expressions are available relations can be formed and understand for each part of the human heart. As mobile phone and its, some component gives electromagnetic exposure to the human body. Hence there is a need to develop a model of the human heart using mathematical analysis. Hence, this paper proposes a mathematical model for ECG and variation of parameters due to electromagnetic field- based.


The presence of micro pores in concrete makes the concrete weak and less durable, in this study an ecofriendly attempt has been made to minimize these micro pores by calcite precipitating bacteria i.e. Escherichia Coli, bacillus subtilisand pseudomonas aeruginosa which produce calcium carbonate when they blend with calcium lactate in presence of water and air thus filling up the micro pores, thus comparing their effects on compressive strength of concrete.Various proportions of E. coli, B.subtilisand P. aeruginosa bacterial media were impregnated in concrete viz. 10%,20% and 30% replacing the proportion of mixing water, small proportion of fine aggregate was also replaced by calcium lactate and silica gel. It was observed that concrete with 10% replacement of P. aeruginosa culture media with mixing water showed maximum compressive strength with 79.6% increase in the compressive strength of concrete where as concrete with B.subtilisbacterial media showed 61.1% increase in the compressive strength of concrete and concrete with E.coli bacterial media showed 23.5% increase in the compressive strength of the concrete, keeping 10-6 cells/ml the cell concentration for all bacterial concretes.


This paper consists of the results of an experimental research on the effect of bottom ash as partial replacement of natural sand on the properties of cement mortar. The experimental works were carried out by replacement of fine aggregate with varying percentages of bottom ash i.e. 15%, 20%, 25% and 30%. As the microstructure of mortar matrix changes with varying water cement ratio, the w/c was kept constant i.e. 0.45.Mortar cubes of 70.6mm×70.6mm×70.6mm were casted and vibrated on an electrically operated vibrator. Then various tests including compressive strength, water permeable porosity (apparent porosity), percentage of water absorption, sorptivity were performed on mortar cubes replaced with bottom ash. The results were compared with the results of control mix and all the tests were performed at 3, 7, 28, 56 and 90 days. Based on the results, it is concluded that fine aggregates can be replaced up to 20% with bottom ash in cement mortar.


Protection is one of the key factors to be considered in application development. Every application should follow some security mechanisms to be free from fraudulent users. One of the important criteria to ensure security is Access control. [4]The reliability and security of the cloud and user are assured and effectively guaranteed during its interaction in the cloud computing environment. But these traditional models were unable to determine the vulnerability and ambiguity created by these open conditions. So the main focus throughout the evolution of new access control methods is on creating a mutual trust relationship between both interaction parties. The paper proposes a mutual access control model which is trust-based (MTBAC). Trust relationships between both interaction bodies are secured by mutual trust mechanisms. This model takes both the cloud service node’s trustworthiness and user’s action trust into consideration.


Social media is one of the most influential tool for sharing information across different regions among different users .The people sharing their interests in various aspects in online social networking platforms like Facebook, twitter etc. Therefore the usage of hate text steadily increasing. Nowadays it has been reviled unfair behavior of the users in social networking sites. The existence of abusive text on different online social networking platforms and identification of such text is a big challenging task. To understand the complexity of language constructs in different languages is very difficult .Already lot of research work has completed in English language. This paper gives detail analysis of detecting hate text in various languages Hindi, urdu, Arabic, Bengali, Telugu. We incorporated various kinds of ML and DL based algorithms to identify hate text in OSN’s. A review is done related to different classifiers where a comparison made between different models of ML, DL algorithms. Finally finds the accurate method to classify the text is offensive or not by finding the parameters i.e. accuracy and F1score


Integrating the Mobile Ad-Hoc Network (MANET) with Internet has many advantages. The Data collected from the Mobile nodes can be broadcasted to the world by connecting the Internet to it via Gateway. Clustering is a practical way to enhance the system performance. Security is a significant issue in the Integrated MANETInternet climate in light of the fact that in this climate we need to think about the assaults on Internet availability. So, to overcome this issue, we have proposed Secure and Authenticated routing protocol (SARP) to enhance security performance of the networks. This routing protocol is used to discover a secure route and to transmit data packets securely. In this protocol clusters are formed and security relies on the hardness of the symmetric and asymmetric key algorithms. We show the practicality of this convention as for the security prerequisites and security investigation against different assaults. The estimations and reproductions are given to show the security of the proposed convention. The outcomes show that, the proposed convention have preferred execution over the current secure conventions for Cluster based Internet Integrated with MANETs, in terms of security.


Anomaly detection is an area of video analysis has a great importance in automated surveillance. Although it has been extensively studied, there has been little work started using CNN networks. Hence, in this thesis we presented a novel approach for learning motion features and modeling normal Spatio-temporal dynamics for anomaly detection. In our technique, we capture variations in scale of the patterns of motion in an image object by using optical flow dense estimation technique and train our auto encoder model using convolution long short term memories (ConvLSTM2D) as we are processing video frames and we predict the anomaly in real time using Euclidean distance between the generated and the ground truth frame and we achieved a real time accuracy of nearly 98% for the youtube videos which are not used for either testing or training. Error between the network’s output and the target output is used to classify a video volume as normal or abnormal. In addition to the use of reconstruction error, we also use prediction error for anomaly detection. The prediction models show comparable performance with state of the art methods. In comparison with the proposed method, performance is improved in one dataset. Moreover, running time is significantly faster.


Sign in / Sign up

Export Citation Format

Share Document