This document proposes using blockchain technology to create a decentralized and fair performance appraisal system for companies. It discusses some of the common issues with traditional, centralized performance evaluation approaches, such as biases, lack of transparency, and subjectivity. The authors then outline a design for a blockchain-based appraisal and incentive mechanism. Key aspects of the proposed system include storing evaluation data in blockchain blocks, using smart contracts to automate appraisals according to agreed-upon standards, and distributing tokens to employees as incentives for their work and performance. The system aims to introduce transparency, objectivity, and fairness to the appraisal process.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET Journal
The document discusses an approach for cloud coalition formation that considers service level agreement (SLA) requirements. It proposes a three-tier middleware called "ProgNET" to integrate software-defined networking mechanisms into clouds to provide SLA guarantees for virtualized networks. The middleware would enforce SLA requirements within single and federated cloud domains while enabling negotiation of SLAs between clients and providers. However, the proposed solution was not implemented or evaluated and does not address the issue of cloud federation formation. It focuses only on mechanisms for negotiating and enforcing SLAs in cloud environments.
This document proposes an online document verification system to ease the process of verifying certificates and reduce fraud. It would allow users to upload documents which would then be verified by an admin and verifier. The system would use a MySQL database with PHP coding. It would generate tokens for limited-time document access by verifiers. If implemented, this system could save time over manual verification and make documents available online for verification anywhere. It aims to securely store documents and certificates while allowing easy verification.
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
1. The document discusses batch auditing systems for cloud storage security. It provides background on cloud computing and security issues with storing data in the cloud.
2. It describes existing auditing systems like public and private auditing. It also summarizes several key research papers that proposed techniques like provable data possession, proof of retrievability, and using a third party auditor and bilinear aggregate signatures for public auditing.
3. The document proposes a new batch auditing method that uses the MapReduce framework to map signatures to data and reduce them to efficiently verify signatures in parallel when the aggregate signature fails verification. This improves the performance and efficiency of integrity verification for large amounts of cloud data.
CUSTOMER SEGMENTATION IN SHOPPING MALL USING CLUSTERING IN MACHINE LEARNINGIRJET Journal
This document discusses using clustering algorithms in machine learning to segment customers in a shopping mall. It aims to identify groups of customers with similar characteristics like gender, age, spending habits to more effectively market to each group. Specifically, it uses k-means clustering to segment customers and visualize differences in gender and age. It then examines their annual income and proposes that segmentation focuses on improving customer spending scores. The proposed system uses machine learning approaches like k-means clustering which is more accurate and efficient than traditional manual methods for analyzing customer data and finding insights to identify customer segments.
This document proposes a four phase testing lifecycle for block-chain oriented software. Phase 1 involves analyzing the system components and scope. Phase 2 includes designing test cases and models for blocks, transactions, and smart contracts. Phase 3 is test planning, where test volumes, methodologies, and tools are estimated. Phase 4 executes the test cases, analyzes results, and generates bug and test reports. The proposed lifecycle aims to comprehensively test all aspects of block-chain software, unlike existing approaches that focus only on specific functions.
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...IRJET Journal
This document proposes a secure auditing storage scheme with efficient key updates for a cognitive industrial internet of things (IIoT) environment. It discusses how cognitive computing and IIoT can advance manufacturing capabilities. The existing auditing schemes only consider data integrity and elements without key exposure resistance, so the proposed scheme uses techniques like homomorphic verifiable authenticators and proxy recryption to allow third-party auditors to efficiently update keys and authenticators in the cloud without recovering old keys or data. It aims to support data and sub-block auditing to address owners' concerns about data security in the cloud.
The document discusses the objectives, feasibility study, and implementation specifications for an Income Tax Department Management System project. The objectives are to overcome paper-based problems and easily manage records of PAN card holders and employees. A feasibility study assesses the technical, operational, and economic feasibility of the proposed system. The implementation will use ASP.NET on Windows with a SQL Server database. Hardware requirements include a Pentium PC with 512MB RAM and 80GB hard drive.
This document describes an in-house file tracking system designed for large organizations. The system digitalizes the traditional paper-based method of tracking files as they are transferred between departments. It uses barcodes to uniquely identify files and track their status and location. The system is built using web technologies like Python for the backend and has a multi-layer architecture. It includes interfaces for logging in, viewing files, creating new files, and dispatching files between departments. The system aims to automate file tracking to reduce delays and improve workflow across an organization.
IRJET- An Sla-Aware Cloud Coalition Formation Approach for Virtualized Networks.IRJET Journal
The document discusses an approach for cloud coalition formation that considers service level agreement (SLA) requirements. It proposes a three-tier middleware called "ProgNET" to integrate software-defined networking mechanisms into clouds to provide SLA guarantees for virtualized networks. The middleware would enforce SLA requirements within single and federated cloud domains while enabling negotiation of SLAs between clients and providers. However, the proposed solution was not implemented or evaluated and does not address the issue of cloud federation formation. It focuses only on mechanisms for negotiating and enforcing SLAs in cloud environments.
This document proposes an online document verification system to ease the process of verifying certificates and reduce fraud. It would allow users to upload documents which would then be verified by an admin and verifier. The system would use a MySQL database with PHP coding. It would generate tokens for limited-time document access by verifiers. If implemented, this system could save time over manual verification and make documents available online for verification anywhere. It aims to securely store documents and certificates while allowing easy verification.
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
1. The document discusses batch auditing systems for cloud storage security. It provides background on cloud computing and security issues with storing data in the cloud.
2. It describes existing auditing systems like public and private auditing. It also summarizes several key research papers that proposed techniques like provable data possession, proof of retrievability, and using a third party auditor and bilinear aggregate signatures for public auditing.
3. The document proposes a new batch auditing method that uses the MapReduce framework to map signatures to data and reduce them to efficiently verify signatures in parallel when the aggregate signature fails verification. This improves the performance and efficiency of integrity verification for large amounts of cloud data.
CUSTOMER SEGMENTATION IN SHOPPING MALL USING CLUSTERING IN MACHINE LEARNINGIRJET Journal
This document discusses using clustering algorithms in machine learning to segment customers in a shopping mall. It aims to identify groups of customers with similar characteristics like gender, age, spending habits to more effectively market to each group. Specifically, it uses k-means clustering to segment customers and visualize differences in gender and age. It then examines their annual income and proposes that segmentation focuses on improving customer spending scores. The proposed system uses machine learning approaches like k-means clustering which is more accurate and efficient than traditional manual methods for analyzing customer data and finding insights to identify customer segments.
This document proposes a four phase testing lifecycle for block-chain oriented software. Phase 1 involves analyzing the system components and scope. Phase 2 includes designing test cases and models for blocks, transactions, and smart contracts. Phase 3 is test planning, where test volumes, methodologies, and tools are estimated. Phase 4 executes the test cases, analyzes results, and generates bug and test reports. The proposed lifecycle aims to comprehensively test all aspects of block-chain software, unlike existing approaches that focus only on specific functions.
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...IRJET Journal
This document proposes a secure auditing storage scheme with efficient key updates for a cognitive industrial internet of things (IIoT) environment. It discusses how cognitive computing and IIoT can advance manufacturing capabilities. The existing auditing schemes only consider data integrity and elements without key exposure resistance, so the proposed scheme uses techniques like homomorphic verifiable authenticators and proxy recryption to allow third-party auditors to efficiently update keys and authenticators in the cloud without recovering old keys or data. It aims to support data and sub-block auditing to address owners' concerns about data security in the cloud.
The document discusses the objectives, feasibility study, and implementation specifications for an Income Tax Department Management System project. The objectives are to overcome paper-based problems and easily manage records of PAN card holders and employees. A feasibility study assesses the technical, operational, and economic feasibility of the proposed system. The implementation will use ASP.NET on Windows with a SQL Server database. Hardware requirements include a Pentium PC with 512MB RAM and 80GB hard drive.
This document describes an in-house file tracking system designed for large organizations. The system digitalizes the traditional paper-based method of tracking files as they are transferred between departments. It uses barcodes to uniquely identify files and track their status and location. The system is built using web technologies like Python for the backend and has a multi-layer architecture. It includes interfaces for logging in, viewing files, creating new files, and dispatching files between departments. The system aims to automate file tracking to reduce delays and improve workflow across an organization.
Issues of Embedded System Component Based Development in Mesh NetworksIRJET Journal
This document discusses issues related to embedded system component-based development in mesh networks. It begins with an abstract discussing domain engineering and embedded component-based development. It then discusses the embedded component mining process, which involves exploration, excogitation, and exploitation phases. Next, it discusses embedded component-based development and benefits. It introduces the MoteView 3-tier architecture for embedded mesh networks. Finally, it discusses techniques for designing embedded component-based applications and subtle relationships between component-based development and object-oriented methodologies.
IRJET- Automated CV Classification using Clustering TechniqueIRJET Journal
This document proposes an automated resume classification system using clustering techniques. It aims to help HR departments more efficiently sort through large numbers of resumes by calculating a score for each resume based on skills and assigning resumes to clusters. The system would allow employers to customize job postings and weight desired skills. It would provide candidates a portal to upload resumes and receive scores. K-means clustering would then group resumes, giving HR a classified view. This could reduce the time and effort spent on manual resume sorting while increasing accuracy. The document outlines the system architecture, algorithms and benefits of automating and customizing the resume classification process.
Ethereum Decentralized Application for Storing Student ResultsIRJET Journal
This document proposes a decentralized application for securely storing and verifying student results on the Ethereum blockchain. The application would allow an admin to add student data and results, which are then immutable and tamper-proof on the blockchain. Students can view and download their signed results in PDF format. Universities and employers can easily verify results authenticity using the digital signature. The application was implemented using Ethereum smart contracts, Truffle framework, and MetaMask wallet. It provides a low-cost solution to securely store credentials without a single point of failure compared to traditional centralized databases.
Information Systems Capstone
Contents
1.0 Introduction
Singh, Shirah, and Barber Financial Holdings LLC. continues to grow its business, increasing their dependency on information technogy. The firm has reached a point where a more flexible, scalable, straightforward infrastructure, and easily managed applications are required for sucessful business practices. A solution like Amazon Web Services (AWS) can provide the computer power, storage, and other resources needed as the firm expands.
Solution
s of this magnitude do require a considerable amount of upfront investment, but will provide minimal cost for subsequential years reducing overall capital expenses. This solution will also enable minimal effort when moving applications to the cloud, minimizing support, to include administrative cost while retaining performance, security, reliability, and data integrity. 1.1 Company at a Glance
Singh, Shirah, and Barber Financial Holdings LLC., has drastically increased the number of clients and accounts over the past couple of years. This growth prompted the need for more qualified staff, additional offices and space, and newer communication technologies to facilitate services and improved management. The firm has acquired several buildings in various cities which are ready to be outfitted with network infrastructure, user workstations, peripherals and software applications. 1.2 Challenges
With just one present location in XYZ city growth in its industry is challenging, therefore the opening of several branch locations in various cities coupled with the data migration to a cloud service has become its number one project. The firm’s current infrastructure is limited, it does not currently have a full scale WAN and remote access (VPN), only a local LAN through the major local ISP is employed. All backups are stored onsite with tape copies sent to a cold off site location. Databases with all financial information are stored in the local server and there are no true access control restrictions. Additionally, there is only one system administrator performing all major database tasks and network functions.
Financial health is one of the most protected types of digital content. Finding ways to store, secure, and manage such data in this ever changing world of computing is a challenge. In order for the firm to grow and blossom, a large and fast LAN/WAN network is needed. Such network must provide access to internal resources via secure methods of authentication and also from the outside by a secure web interface client. VPN capabilities for traveling and visiting staff should provide a secure connection to internal resources. Access to the network and network shares must be tightly secured based on departmental roles. All databases will be kept in separate servers and backups will be conducted routinely (Weekly, Monthly; incremental/full). Access to database tables will be based on individual approval; single sign on authenti.
IRJET- Development Operations for Continuous DeliveryIRJET Journal
This document discusses development operations (DevOps) and continuous delivery practices. It describes how various automation tools like Git, Gerrit, Jenkins, and SonarQube are used together in a DevOps pipeline. Code is committed to a version control system and reviewed. It is then built, tested, and analyzed for quality using these tools. Machine learning algorithms are used to classify build logs and determine if builds succeeded or failed. This helps automate the testing process. Static code analysis with SonarQube also helps maintain code quality. The document demonstrates how such automation practices in DevOps can save time and reduce errors compared to manual processes.
This document describes an efficient student faculty management system that was developed to streamline processes like personnel management, class scheduling, student results analysis, and communication between faculty and students. The system provides functionalities for viewing and updating staff, student, and course details securely through a web-based interface. It aims to reduce paperwork and allow for easy information sharing compared to traditional manual methods. The system was designed with input, output, and database components following common principles of system design. It was implemented in stages including planning, training, testing and transitioning to production use.
This document proposes a blockchain-based solution for Know Your Customer (KYC) verification that allows for a single verification and shared database across financial institutions. The solution aims to address issues with the traditional KYC process being manual, time-consuming, requiring third-party involvement, and resulting in redundant checks across institutions. The proposed system performs a one-time KYC verification and stores information securely on a blockchain database. Then, with user permission, other financial institutions on the network can access the user's KYC information. This eliminates redundant verifications and saves time, while also giving users control over their personal data.
This document describes a proposed system called the Automatic Quotation Generating System (AQGS) that aims to automate the manual process of generating quotations for generator parts. Currently, salespeople must search through spreadsheets to manually calculate prices for components and generate final quotes, which takes time and is prone to errors. The proposed AQGS system would allow salespeople to easily select needed components and have the application automatically compute and display total pricing. This would speed up the quotation process and increase productivity for the company by enabling them to serve more customers in less time. The system would have a user-friendly web interface and involve designing a database using MySQL to store component price data.
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key UpdatesIRJET Journal
This document proposes a new cloud storage auditing protocol with verifiable outsourcing of key updates. It aims to address the challenge of key exposure in cloud storage auditing by allowing customers to securely outsource secret key updates to a trusted third party auditor. The auditor would then be responsible for storage auditing and safe key updates. Customers only need to download encrypted secret keys from the auditor when uploading new files. The protocol is designed to make the auditing process with key exposure resistance as simple as possible for customers.
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET Journal
The document discusses using fuzzy logic to improve security and trustworthiness in cloud computing. It proposes a cloud services trust model (CSTM) that uses parameters like response time, cost, security, throughput, and speedup ratio to evaluate the trustworthiness of cloud services. The model assesses cloud services from a multidimensional perspective using these quality of cloud service parameters. Practical results show the model can improve quality of cloud services and help customers select services based on their needs and financial constraints.
White paper quality at the speed of digitalrajni singh
Our modern testing practices help speed up the current scope of quality assurance with help of a cognitive approach. Here is the link to download my published whitepaper on "Quality at the Speed of Digital" https://www.nagarro.com/qa-at-the-speed-of-digital #qualityassurance
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmIRJET Journal
This document presents a cloud computing task scheduling algorithm based on a modified genetic algorithm. It begins with an abstract discussing scalable cloud computing and the need for efficient task scheduling and virtual machine allocation. It then discusses the problem of existing scheduling algorithms having high overhead and slow convergence. The proposed methodology uses a heuristic-based prediction model with a logistic normal distribution technique to improve data transmission prediction. Simulation results show the proposed approach has better throughput and computation time than existing algorithms for different data packet sizes. The conclusion discusses overcoming drawbacks of earlier algorithms and future work focusing on algorithms with better tradeoffs between performance characteristics.
Study of Lean construction tools for Workflow Improvement -A ReviewIRJET Journal
This document summarizes several research studies on improving workflow in construction projects using lean tools like value stream mapping (VSM). It discusses how VSM has been used to identify waste and inefficiencies in processes like structural masonry work. The studies found that VSM helps visualize information and material flows to reduce wait times and optimize value-adding activities. Implementing lean principles through tools such as VSM can help construction projects improve workflow and productivity.
This document discusses cloud migration research and concepts. It covers the following key points in 3 sentences:
Cloud computing provides flexibility and cost benefits for businesses looking to migrate applications and data to the cloud. The document outlines the typical 4 stage process for cloud migration - planning, foundation, migration, and reinvention. It also discusses various strategies for migrating applications, such as rehosting, replatforming, repurchasing, retiring, and retaining applications. The goal of the research is to classify frameworks for cloud migration and identify gaps in existing research to help both practitioners and researchers.
The document proposes a Faculty Leave Management System that automates the faculty leave application and approval process. It allows faculty to submit leave requests online and have them automatically routed to approvers like the timetable incharge, head of department, and principal. The system aims to reduce administrative workload, minimize errors, and provide reports on faculty leave data.
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
This document proposes and evaluates a framework for integrating web services. It begins by discussing how users appreciate simple, on-demand access to affordable software services without needing to install or update applications themselves. The document then presents an argument for a web-based architecture that allows users to access and purchase a wide range of software applications as needed. It evaluates this framework through user surveys and examples of simulation software services to demonstrate how the integrated framework can be implemented. The surveys found that the framework reduced costs, simplified processes, and improved the user experience by combining various online components and software services.
IRJET- Comparative Analysis between Sequential and Iterative Project Manageme...IRJET Journal
This document compares sequential and iterative project management approaches. It begins by providing context on the evolution of project management methodologies in IT to meet changing requirements. It then discusses the two main approaches - sequential and iterative. The sequential approach follows phases in a linear fashion where the output of one phase is the input of the next. An example is the waterfall model. Key advantages are its simplicity and structure while disadvantages include inability to adapt to changes and delays propagating between phases. The document aims to analyze the features and drawbacks of both approaches to determine which is better suited for different project types.
This document discusses challenges with quality assurance in agile software development and proposes a solution called "digital testing using cognitive approach". Some key points:
1. Traditional QA faces challenges keeping up with agile development cycles and diverse technologies. QA needs to evolve to facilitate faster delivery.
2. The proposed solution involves automating testing, using predictive analytics, parallel testing across devices, and involving QA earlier in the development cycle.
3. A "cognitive approach" uses machine learning, AI, and predictive analysis to optimize testing efforts and provide insights. This helps address issues like inadequate coverage, performance bottlenecks, and late involvement of users and testers.
The document proposes an online studio management system to help a photography and videography business. The system would allow customers to book photography services online, order customized products with their own photos, and make payments through an integrated payment gateway. It would also help the business track job assignments and orders. The proposed system would be developed using HTML, CSS, JavaScript, PHP and MySQL to create an online storefront that attracts more customers and increases sales while improving the business's operations.
The document describes an online studio management system that was developed to help a photography and videography business. The system allows customers to book photography services online by selecting dates and making payments. It also enables customers to order customized products by uploading their own photos. The system helps the business track job assignments and orders. It was built using HTML, CSS, JavaScript, PHP and MySQL to create an online storefront for the studio. The goal is to attract more customers, increase sales, and improve the business's operations and standards through digitalization.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to Corruption-less Appraisal System using Blockchain
Issues of Embedded System Component Based Development in Mesh NetworksIRJET Journal
This document discusses issues related to embedded system component-based development in mesh networks. It begins with an abstract discussing domain engineering and embedded component-based development. It then discusses the embedded component mining process, which involves exploration, excogitation, and exploitation phases. Next, it discusses embedded component-based development and benefits. It introduces the MoteView 3-tier architecture for embedded mesh networks. Finally, it discusses techniques for designing embedded component-based applications and subtle relationships between component-based development and object-oriented methodologies.
IRJET- Automated CV Classification using Clustering TechniqueIRJET Journal
This document proposes an automated resume classification system using clustering techniques. It aims to help HR departments more efficiently sort through large numbers of resumes by calculating a score for each resume based on skills and assigning resumes to clusters. The system would allow employers to customize job postings and weight desired skills. It would provide candidates a portal to upload resumes and receive scores. K-means clustering would then group resumes, giving HR a classified view. This could reduce the time and effort spent on manual resume sorting while increasing accuracy. The document outlines the system architecture, algorithms and benefits of automating and customizing the resume classification process.
Ethereum Decentralized Application for Storing Student ResultsIRJET Journal
This document proposes a decentralized application for securely storing and verifying student results on the Ethereum blockchain. The application would allow an admin to add student data and results, which are then immutable and tamper-proof on the blockchain. Students can view and download their signed results in PDF format. Universities and employers can easily verify results authenticity using the digital signature. The application was implemented using Ethereum smart contracts, Truffle framework, and MetaMask wallet. It provides a low-cost solution to securely store credentials without a single point of failure compared to traditional centralized databases.
Information Systems Capstone
Contents
1.0 Introduction
Singh, Shirah, and Barber Financial Holdings LLC. continues to grow its business, increasing their dependency on information technogy. The firm has reached a point where a more flexible, scalable, straightforward infrastructure, and easily managed applications are required for sucessful business practices. A solution like Amazon Web Services (AWS) can provide the computer power, storage, and other resources needed as the firm expands.
Solution
s of this magnitude do require a considerable amount of upfront investment, but will provide minimal cost for subsequential years reducing overall capital expenses. This solution will also enable minimal effort when moving applications to the cloud, minimizing support, to include administrative cost while retaining performance, security, reliability, and data integrity. 1.1 Company at a Glance
Singh, Shirah, and Barber Financial Holdings LLC., has drastically increased the number of clients and accounts over the past couple of years. This growth prompted the need for more qualified staff, additional offices and space, and newer communication technologies to facilitate services and improved management. The firm has acquired several buildings in various cities which are ready to be outfitted with network infrastructure, user workstations, peripherals and software applications. 1.2 Challenges
With just one present location in XYZ city growth in its industry is challenging, therefore the opening of several branch locations in various cities coupled with the data migration to a cloud service has become its number one project. The firm’s current infrastructure is limited, it does not currently have a full scale WAN and remote access (VPN), only a local LAN through the major local ISP is employed. All backups are stored onsite with tape copies sent to a cold off site location. Databases with all financial information are stored in the local server and there are no true access control restrictions. Additionally, there is only one system administrator performing all major database tasks and network functions.
Financial health is one of the most protected types of digital content. Finding ways to store, secure, and manage such data in this ever changing world of computing is a challenge. In order for the firm to grow and blossom, a large and fast LAN/WAN network is needed. Such network must provide access to internal resources via secure methods of authentication and also from the outside by a secure web interface client. VPN capabilities for traveling and visiting staff should provide a secure connection to internal resources. Access to the network and network shares must be tightly secured based on departmental roles. All databases will be kept in separate servers and backups will be conducted routinely (Weekly, Monthly; incremental/full). Access to database tables will be based on individual approval; single sign on authenti.
IRJET- Development Operations for Continuous DeliveryIRJET Journal
This document discusses development operations (DevOps) and continuous delivery practices. It describes how various automation tools like Git, Gerrit, Jenkins, and SonarQube are used together in a DevOps pipeline. Code is committed to a version control system and reviewed. It is then built, tested, and analyzed for quality using these tools. Machine learning algorithms are used to classify build logs and determine if builds succeeded or failed. This helps automate the testing process. Static code analysis with SonarQube also helps maintain code quality. The document demonstrates how such automation practices in DevOps can save time and reduce errors compared to manual processes.
This document describes an efficient student faculty management system that was developed to streamline processes like personnel management, class scheduling, student results analysis, and communication between faculty and students. The system provides functionalities for viewing and updating staff, student, and course details securely through a web-based interface. It aims to reduce paperwork and allow for easy information sharing compared to traditional manual methods. The system was designed with input, output, and database components following common principles of system design. It was implemented in stages including planning, training, testing and transitioning to production use.
This document proposes a blockchain-based solution for Know Your Customer (KYC) verification that allows for a single verification and shared database across financial institutions. The solution aims to address issues with the traditional KYC process being manual, time-consuming, requiring third-party involvement, and resulting in redundant checks across institutions. The proposed system performs a one-time KYC verification and stores information securely on a blockchain database. Then, with user permission, other financial institutions on the network can access the user's KYC information. This eliminates redundant verifications and saves time, while also giving users control over their personal data.
This document describes a proposed system called the Automatic Quotation Generating System (AQGS) that aims to automate the manual process of generating quotations for generator parts. Currently, salespeople must search through spreadsheets to manually calculate prices for components and generate final quotes, which takes time and is prone to errors. The proposed AQGS system would allow salespeople to easily select needed components and have the application automatically compute and display total pricing. This would speed up the quotation process and increase productivity for the company by enabling them to serve more customers in less time. The system would have a user-friendly web interface and involve designing a database using MySQL to store component price data.
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key UpdatesIRJET Journal
This document proposes a new cloud storage auditing protocol with verifiable outsourcing of key updates. It aims to address the challenge of key exposure in cloud storage auditing by allowing customers to securely outsource secret key updates to a trusted third party auditor. The auditor would then be responsible for storage auditing and safe key updates. Customers only need to download encrypted secret keys from the auditor when uploading new files. The protocol is designed to make the auditing process with key exposure resistance as simple as possible for customers.
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET Journal
The document discusses using fuzzy logic to improve security and trustworthiness in cloud computing. It proposes a cloud services trust model (CSTM) that uses parameters like response time, cost, security, throughput, and speedup ratio to evaluate the trustworthiness of cloud services. The model assesses cloud services from a multidimensional perspective using these quality of cloud service parameters. Practical results show the model can improve quality of cloud services and help customers select services based on their needs and financial constraints.
White paper quality at the speed of digitalrajni singh
Our modern testing practices help speed up the current scope of quality assurance with help of a cognitive approach. Here is the link to download my published whitepaper on "Quality at the Speed of Digital" https://www.nagarro.com/qa-at-the-speed-of-digital #qualityassurance
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmIRJET Journal
This document presents a cloud computing task scheduling algorithm based on a modified genetic algorithm. It begins with an abstract discussing scalable cloud computing and the need for efficient task scheduling and virtual machine allocation. It then discusses the problem of existing scheduling algorithms having high overhead and slow convergence. The proposed methodology uses a heuristic-based prediction model with a logistic normal distribution technique to improve data transmission prediction. Simulation results show the proposed approach has better throughput and computation time than existing algorithms for different data packet sizes. The conclusion discusses overcoming drawbacks of earlier algorithms and future work focusing on algorithms with better tradeoffs between performance characteristics.
Study of Lean construction tools for Workflow Improvement -A ReviewIRJET Journal
This document summarizes several research studies on improving workflow in construction projects using lean tools like value stream mapping (VSM). It discusses how VSM has been used to identify waste and inefficiencies in processes like structural masonry work. The studies found that VSM helps visualize information and material flows to reduce wait times and optimize value-adding activities. Implementing lean principles through tools such as VSM can help construction projects improve workflow and productivity.
This document discusses cloud migration research and concepts. It covers the following key points in 3 sentences:
Cloud computing provides flexibility and cost benefits for businesses looking to migrate applications and data to the cloud. The document outlines the typical 4 stage process for cloud migration - planning, foundation, migration, and reinvention. It also discusses various strategies for migrating applications, such as rehosting, replatforming, repurchasing, retiring, and retaining applications. The goal of the research is to classify frameworks for cloud migration and identify gaps in existing research to help both practitioners and researchers.
The document proposes a Faculty Leave Management System that automates the faculty leave application and approval process. It allows faculty to submit leave requests online and have them automatically routed to approvers like the timetable incharge, head of department, and principal. The system aims to reduce administrative workload, minimize errors, and provide reports on faculty leave data.
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
This document proposes and evaluates a framework for integrating web services. It begins by discussing how users appreciate simple, on-demand access to affordable software services without needing to install or update applications themselves. The document then presents an argument for a web-based architecture that allows users to access and purchase a wide range of software applications as needed. It evaluates this framework through user surveys and examples of simulation software services to demonstrate how the integrated framework can be implemented. The surveys found that the framework reduced costs, simplified processes, and improved the user experience by combining various online components and software services.
IRJET- Comparative Analysis between Sequential and Iterative Project Manageme...IRJET Journal
This document compares sequential and iterative project management approaches. It begins by providing context on the evolution of project management methodologies in IT to meet changing requirements. It then discusses the two main approaches - sequential and iterative. The sequential approach follows phases in a linear fashion where the output of one phase is the input of the next. An example is the waterfall model. Key advantages are its simplicity and structure while disadvantages include inability to adapt to changes and delays propagating between phases. The document aims to analyze the features and drawbacks of both approaches to determine which is better suited for different project types.
This document discusses challenges with quality assurance in agile software development and proposes a solution called "digital testing using cognitive approach". Some key points:
1. Traditional QA faces challenges keeping up with agile development cycles and diverse technologies. QA needs to evolve to facilitate faster delivery.
2. The proposed solution involves automating testing, using predictive analytics, parallel testing across devices, and involving QA earlier in the development cycle.
3. A "cognitive approach" uses machine learning, AI, and predictive analysis to optimize testing efforts and provide insights. This helps address issues like inadequate coverage, performance bottlenecks, and late involvement of users and testers.
The document proposes an online studio management system to help a photography and videography business. The system would allow customers to book photography services online, order customized products with their own photos, and make payments through an integrated payment gateway. It would also help the business track job assignments and orders. The proposed system would be developed using HTML, CSS, JavaScript, PHP and MySQL to create an online storefront that attracts more customers and increases sales while improving the business's operations.
The document describes an online studio management system that was developed to help a photography and videography business. The system allows customers to book photography services online by selecting dates and making payments. It also enables customers to order customized products by uploading their own photos. The system helps the business track job assignments and orders. It was built using HTML, CSS, JavaScript, PHP and MySQL to create an online storefront for the studio. The goal is to attract more customers, increase sales, and improve the business's operations and standards through digitalization.
Similar to Corruption-less Appraisal System using Blockchain (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.