INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY
Latest Publications


TOTAL DOCUMENTS

12
(FIVE YEARS 0)

H-INDEX

0
(FIVE YEARS 0)

Published By Institute For Advanced Studies

2457-0362

The two-wheeler chassis consists of the frame, suspension, wheels and brakes. The chassis is what truly sets the overall style of the two-wheeler. Automotive chassis is the main carriage systems of a vehicle. The frame serves as a skeleton upon which parts like gearbox and engine are mounted. It can be made of steel, aluminum or an alloy. It keeps the wheels in line to maintain the handling of the two-wheeler.The frame of a motor vehicle supports all the drive assemblies, i.e. the engine, gearbox and axles (front and rear). In addition the suspension and steering systems and the shock absorbers are attached to it. The appropriate body is fixed to the chassis. It is essential that the frame should not buckle on uneven road surfaces and that any distortions which may occur should not be transmitted to the body. The frame must therefore be torsion−resistant. The frame of a motor vehicle is the load bearing part of the chassis which supports all forces (wheel forces) and weights. It should be as rigid as possible.The main aim of the project is to model a frame of a two wheeler using 3D modeling software Pro/Engineer. Two models of suspension are designed for pipe type and rectangular cross sections.Considering the frame as a beam, calculations are done to determine the displacement and stress by applying loads.To validate the strength of two models, Structural analysis is done by applying the wheel forces. In this analysis ultimate stress limit for the model is determined. Analysis is done for frame using two materials steel and aluminum to verify the best material for frame. Modal analysis is also done to determine natural frequencies of suspension frame. Analysis is done in ANSYS software.Comparison is done mathematically and by FEA analysis. And also we can validate the better cross section and material for suspension frame.



As the world is getting digital there are few things which are used as it is for a long time. The most important thing which we do in our daily life is the transaction of money. Money transaction is a process which should be digitized for more security and the ease of the individual. So, by making a digital wallet the money transaction can be made much simpler and effortless. Using digital wallet we can keep all our important cards such as health card, driving license and other important papers in only one place with much more security. The digital wallet can be our transaction medium which can be used anywhere such as shops, malls or for giving money to someone else. And with such high security, all the information which the wallet is carrying will be safe. In case, if the wallet is lost, GPS will help to detect the location of our device and GSM sends message of the location to the user mobile and that what makes the wallet a digital safe. Digital wallet and user mobile will be connected wirelessly through Bluetooth. If the digital wallet is lost, the Bluetooth connection between the user mobile and digital wallet will be lost and this is identified as Bluetooth connection lost in the mobile. Immediately GPS will track the wallet location and GSM will send the location parameters to the user mobile.



Information honesty, a center security issue in solid distributed storage, has gotten a lot of consideration. Information inspecting conventions empower a verifier to productively check the trustworthiness of the re-appropriated information without downloading the information. A key exploration challenge related with existing plans of information reviewing conventions is the intricacy in key administration. In this paper, we look to address the unpredictable key administration challenge in cloud information uprightness checking by presenting fluffy personality based examining, the first in such a methodology, as far as we could possibly know. All the more explicitly, we present the crude of fluffy character based information examining, where a client's personality can be seen as a lot of spellbinding qualities. We formalize the framework model and the security model for this new crude. We at that point present a solid development of fluffy personality based inspecting convention by using biometrics as the fluffy character. The new convention offers the property of mistake resistance, in particular, it ties with private key to one personality which can be utilized to confirm the rightness of a reaction created with another character, if and just if the two characters are adequately close. We demonstrate the security of our convention dependent on the computational Diffie-Hellman suspicion and the discrete logarithm supposition in the particular ID security model. At long last, we build up a model usage of the convention which shows the common sense of the proposition.



In this work, a novel technique based on second order sequence filter and proportional resonant controller is proposed for control of universal active power filter integrated with PV array system (UAPF-PV). Using a second order sequence filter and sampling it at zero crossing of instant of the load voltage, the active component of distorted load current is estimated which is further used to generate reference signal for shunt active filter. The proposed method has good accuracy in extracting fundamental active component of distorted and unbalanced load currents with reduced mathematical computations. Along with power quality improvement, the system also generates clean energy through the PV array system integrated to its DC-bus. The UAPF-PV system integrates benefits of power quality improvement and distributed generation. The system performance is experimentally evaluated on an experimental prototype in the laboratory under a variety of disturbance conditions such as PCC voltage fall/rise, load unbalancing and variation in solar irradiation



One of the major fillers used in HMA is cement. With the extensive use of cement in mortars/concrete, there have been some environmental concerns in terms of damage caused by the extraction of raw material and Carbon dioxide (CO2) emission during cement manufacture. This has brought pressures to reduce the cement consumption in the industry. This journal outlines the ongoing research on different waste materials partial replacement of cement as filler used in hot mix asphalt mixes. Many studies regarding their effects on bituminous mixes were also analysed in combination with cement filler mastic. This project summarizes the interaction of Waste materials partial replacement of cement with different percentages 0%, 25%, 50%, 75%, 100% and finding out the optimun percenetage of waste material i.e: GGBS, Flyash, Concrete dust, Metakaolin and Marble powder as partial replacment of cement in bituminous mixes. Marshall properties such as stability, flow value, unit weight, air voids, are used to determine optimum waste material content for the used grade of bitumen (100/120).



Protect Cloud is better than protecting your account calculate with internal consumption characteristics assets. In terms of cloud computing, it provides cloud services give an endless storage and file information and creates an abstracts information uploading the data of various clients. It can help customers reduce economic costs of document management by moving with the district administration utility and policies to use on cloud servers. Offer safe statistics The security key can be confiscated Distribute and share information for dynamic groups. Within this task, the existing scheme is able to help Dynamic organizations work effectively when there are new users in case of joining the organization or termination of the user from the organization, the private keys of the opposite party customers do not need to be reimbursed now and do not need to do so date. In addition, the scheme can achieve comfort customer cancellation cannot be a blocked client data files can be retrieved for the first time although they conspired with unbelievers of clouds. To avoid these threats, conspiracies against information are a how to remove a copy of a statistical copy, the cloud has been widely used in garages to reduce storage space, throughput and deployment in cloudy weather information is saved. Recommended compiler The encryption model has been widely followed Convenient anti-conspiracy, correct and reliable control a variety of compiler keys.



Breast Cancer is one of the most dangerous diseases for women. This cancer occurs when some breast cells begin to grow abnormally. Machine learning is the subfield of computer science that studies programs that generalize from past experience. This project looks at classification, where an algorithm tries to predict the label for a sample. The machine learning algorithm takes many of these samples, called the training set, and builds an internal model. This built model is used to classify and predict the data. There are two classes, benign and malignant. Random Forest classifier is used to predict whether the cancer is benign or malignant. Training and testing of the model are done by Wisconsin Diagnosis Breast Cancer dataset.



Information is the contribution for different man-made reasoning (AI) calculations to mine important highlights, yet information in Internet is dissipated all over and constrained by various partners who can't put stock in one another, and use of the information in complex the internet is hard to approve or to approve. Accordingly, it is extremely hard to empower information partaking in the internet for the genuine enormous information, just as a genuine amazing AI. In this paper, we propose the SecNet, a design that can empower secure information putting away, processing, and partaking in the enormous scope Internet climate, focusing on a safer the internet with genuine huge information and hence improved AI with a lot of information source, by incorporating three key segments: 1) blockchain-based information offering to possession ensure, which empowers believed information partaking in the huge scope climate to shape genuine large information; 2) AI-based secure figuring stage to create more insightful security rules, which assists with building a more confided in the internet; 3) confided in esteem trade instrument for buying security administration, giving an approach to members to increase financial prizes when giving out their information or administration, which advances the information sharing and subsequently accomplishes better execution of AI. Besides, we examine the common use situation of SecNet just as its possibly elective approach to convey, just as break down its adequacy from the part of organization security and financial income.



An engineer needs to use mathematics and apply science for engineering solutions to many types of problems pertaining to different disciplines. Proper knowledge of mathematics is the prime requisite requirement for engineering various kinds of applications. An engineer must know general purpose mathematics and mathematics related to a specific discipline. An engineer having clear knowledge of the mathematics will be able to engineer solutions to the problems that are to be solved with least cost and time.



Warm and Happy greetings to all. I am immensely happy that Department of Biotechnology of our K L University is organizing a National Conference on Biotech and Pharma Applications (NCBA-2020) during 12 March, 2020 and is going to discuss on a collection of technical papers in the proceedings. Department of Biotechnology, K L University continues to march on the way of success with confidence. On this occasion, I wish all the very best. I congratulate HOD, staff members, students of Department of Biotechnology, Delegates and Participants from different parts of the country and nations for their efforts in participating in this conference and wish the conference all the success.



Sign in / Sign up

Export Citation Format

Share Document