This document summarizes a research paper that proposes a novel approach to implementing a 1-bit arithmetic logic unit (ALU) using ternary logic. Ternary logic offers potential advantages over binary logic, including reduced transistor count and hardware. The authors designed a 1-bit ALU using ternary logic gates (T-gates) for ternary arithmetic and logic operations. Simulation results showed the ternary logic ALU design achieved a 25% reduction in transistor usage compared to an equivalent binary logic ALU design. The ternary logic ALU design approach could potentially be extended to multi-bit ALUs for applications where reduced transistor count is important.
This document contains a past exam paper for the subject "Design and Analysis of Algorithms". It has 2 parts with a total of 15 questions. Part A covers basic algorithm concepts like recurrence relations, efficiency classes, minimum spanning trees, and more. Part B involves solving algorithm problems using techniques like dynamic programming, Huffman coding, shortest paths, and more. It also tests concepts like P vs NP, approximation algorithms, and analysis of algorithm efficiency.
The document describes a mathematical model and solution method for a generalized fuzzy assignment problem (FGAP) with restrictions on both job costs and person costs. Costs are represented as trapezoidal fuzzy numbers. The problem is to minimize total assignment cost subject to constraints that the cost of assigning a job cannot exceed the job's cost limit and the cost assigned to a person cannot exceed the person's cost limit based on their qualifications. A judging matrix approach and Yager's ranking method are used to determine if a solution exists. If so, a modified extremum difference method is applied to obtain an initial feasible solution, and a modified incremental method is used to find the optimal solution. The method is demonstrated on a numerical example and the optimal solution
An efficient sorting algorithm increcomparision sort 2IAEME Publication
This document presents a new sorting algorithm called Increcomparision Sort (ICS). ICS aims to improve upon other sorting algorithms like selection sort, max-min sort, and double-ended selection sort that have O(n^2) time complexity in their best case by performing unnecessary comparisons and swaps. ICS works by incrementing an index i if adjacent elements are in order, and otherwise swapping elements from the end of the array forward. The document analyzes ICS's time complexity, showing it has O(n) best case complexity and O(n^2) worst case complexity, making it faster than other O(n^2) algorithms in the best case. It then compares ICS to other
Heptagonal Fuzzy Numbers by Max Min MethodYogeshIJTSRD
In this paper, we propose another methodology for the arrangement of fuzzy transportation problem under a fuzzy environment in which transportation costs are taken as fuzzy Heptagonal numbers. The fuzzy numbers and fuzzy values are predominantly used in various fields. Here, we are converting fuzzy Heptagonal numbers into crisp value by using range technique and then solved by the MAX MIN method for the transportation problem. M. Revathi | K. Nithya "Heptagonal Fuzzy Numbers by Max-Min Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38280.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathamatics/38280/heptagonal-fuzzy-numbers-by-maxmin-method/m-revathi
IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...IRJET Journal
This paper proposes a new and efficient reverse converter for converting residue numbers to decimal numbers for the three moduli set {6, 10, 15} which shares the common factor of 5. The proposed converter replaces larger multipliers used in previous converters with smaller multipliers and adders, reducing the hardware requirements. The hardware implementation of the proposed converter is presented and compared to other state-of-the-art converters, showing it performs better with fewer adders and multipliers. The proposed converter efficiently implements reverse conversion for the non-coprime three moduli set while requiring less hardware than previous approaches.
ENTROPY-COST RATIO MAXIMIZATION MODEL FOR EFFICIENT STOCK PORTFOLIO SELECTION...cscpconf
This paper introduces a new stock portfolio selection model in non-stochastic environment.Following the principle of maximum entropy, a new entropy-cost ratio function is introduced as
the objective function. The uncertain returns, risks and ividends of the securities are considered as interval numbers. Along with the objective function, eight different types of constraints are used in the model to convert it into a pragmatic one. Three different models have been proposed by defining the future inancial market optimistically, pessimistically and in hecombined form to model the portfolio selection problem. To illustrate the effectiveness and tractability of the proposed models, these are tested on a set of data from Bombay Stock Exchange (BSE). The solution has been done by genetic algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher.
This document contains a past exam paper for the subject "Design and Analysis of Algorithms". It has 2 parts with a total of 15 questions. Part A covers basic algorithm concepts like recurrence relations, efficiency classes, minimum spanning trees, and more. Part B involves solving algorithm problems using techniques like dynamic programming, Huffman coding, shortest paths, and more. It also tests concepts like P vs NP, approximation algorithms, and analysis of algorithm efficiency.
The document describes a mathematical model and solution method for a generalized fuzzy assignment problem (FGAP) with restrictions on both job costs and person costs. Costs are represented as trapezoidal fuzzy numbers. The problem is to minimize total assignment cost subject to constraints that the cost of assigning a job cannot exceed the job's cost limit and the cost assigned to a person cannot exceed the person's cost limit based on their qualifications. A judging matrix approach and Yager's ranking method are used to determine if a solution exists. If so, a modified extremum difference method is applied to obtain an initial feasible solution, and a modified incremental method is used to find the optimal solution. The method is demonstrated on a numerical example and the optimal solution
An efficient sorting algorithm increcomparision sort 2IAEME Publication
This document presents a new sorting algorithm called Increcomparision Sort (ICS). ICS aims to improve upon other sorting algorithms like selection sort, max-min sort, and double-ended selection sort that have O(n^2) time complexity in their best case by performing unnecessary comparisons and swaps. ICS works by incrementing an index i if adjacent elements are in order, and otherwise swapping elements from the end of the array forward. The document analyzes ICS's time complexity, showing it has O(n) best case complexity and O(n^2) worst case complexity, making it faster than other O(n^2) algorithms in the best case. It then compares ICS to other
Heptagonal Fuzzy Numbers by Max Min MethodYogeshIJTSRD
In this paper, we propose another methodology for the arrangement of fuzzy transportation problem under a fuzzy environment in which transportation costs are taken as fuzzy Heptagonal numbers. The fuzzy numbers and fuzzy values are predominantly used in various fields. Here, we are converting fuzzy Heptagonal numbers into crisp value by using range technique and then solved by the MAX MIN method for the transportation problem. M. Revathi | K. Nithya "Heptagonal Fuzzy Numbers by Max-Min Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38280.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathamatics/38280/heptagonal-fuzzy-numbers-by-maxmin-method/m-revathi
IRJET- An Efficient Reverse Converter for the Three Non-Coprime Moduli Set {4...IRJET Journal
This paper proposes a new and efficient reverse converter for converting residue numbers to decimal numbers for the three moduli set {6, 10, 15} which shares the common factor of 5. The proposed converter replaces larger multipliers used in previous converters with smaller multipliers and adders, reducing the hardware requirements. The hardware implementation of the proposed converter is presented and compared to other state-of-the-art converters, showing it performs better with fewer adders and multipliers. The proposed converter efficiently implements reverse conversion for the non-coprime three moduli set while requiring less hardware than previous approaches.
ENTROPY-COST RATIO MAXIMIZATION MODEL FOR EFFICIENT STOCK PORTFOLIO SELECTION...cscpconf
This paper introduces a new stock portfolio selection model in non-stochastic environment.Following the principle of maximum entropy, a new entropy-cost ratio function is introduced as
the objective function. The uncertain returns, risks and ividends of the securities are considered as interval numbers. Along with the objective function, eight different types of constraints are used in the model to convert it into a pragmatic one. Three different models have been proposed by defining the future inancial market optimistically, pessimistically and in hecombined form to model the portfolio selection problem. To illustrate the effectiveness and tractability of the proposed models, these are tested on a set of data from Bombay Stock Exchange (BSE). The solution has been done by genetic algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher.
This document provides a comparative study of several artificial intelligence algorithms: Heuristics, A* algorithm, K-Nearest Neighbors (KNN), and Linear Regression. It describes each algorithm, provides an example problem that each algorithm could solve, and discusses their applications. The document aims to illustrate the variety of problems that can be solved by these AI algorithms and help readers understand which algorithm may be best suited to different AI problems.
Polynomial regression model of making cost prediction in mixed cost analysisAlexander Decker
This document presents a study comparing different regression models for predicting costs based on production levels. It finds that a cubic polynomial regression model provides a better fit than linear regression or the high-low method. The study uses cost and production data from a company to build linear, quadratic, and cubic regression models. It finds the cubic polynomial regression has the highest R-squared value and lowest p-value, indicating it is the best-fitting model. The study concludes that polynomial regression generally provides a better approach for cost prediction than conventional linear regression or the high-low method.
11.polynomial regression model of making cost prediction in mixed cost analysisAlexander Decker
This document presents a study comparing different regression models for predicting costs based on production levels. It finds that a cubic polynomial regression model provides a better fit than linear regression or the high-low method. The study uses cost and production data from a company to build linear, quadratic, and cubic regression models. It finds the cubic polynomial regression has the highest R-squared value and lowest p-value, indicating it is best able to model the cost patterns in the data. The document concludes the cubic polynomial regression provides a better approach for cost prediction than traditional linear regression or high-low methods.
IRJET- K-SVD: Dictionary Developing Algorithms for Sparse Representation ...IRJET Journal
This document discusses the K-SVD algorithm, which is a dictionary learning method for sparse representations of signals. It alternates between sparse coding to represent signals using the current dictionary, and dictionary updating to learn a new dictionary from the signal representations. The algorithm generalizes the K-means clustering process. The document provides details on the methodology of K-SVD, including its basic steps and application to synthetic and real image signals. It is concluded that K-SVD learns dictionaries that better represent given signal groups compared to alternative methods.
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...ijfls
The aim of this paper is to investigate the trend of the return of a portfolio formed randomly or for any
specific technique. The approach is made using two techniques fuzzy: fuzzy c-means (FCM) algorithm and
the fuzzy transform, where the rules used at fuzzy transform arise from the application of the FCM
algorithm. The results show that the proposed methodology is able to predict the trend of the return of a
stock portfolio, as well as the tendency of the market index. Real data of the financial market are used from
2004 until 2007.
A sat encoding for solving games with energy objectivescsandit
This document presents a reduction from the problem of solving energy games to the satisfiability problem for formulas of propositional logic. Energy games model resource-constrained reactive systems and are equivalent to mean-payoff games. The document proposes encoding winning strategies for energy games using difference logic and propositional logic. It reports tight size bounds for these encodings and argues they could lead to more efficient solving algorithms by leveraging modern SAT solvers.
Linear algebra application in linear programming Lahiru Dilshan
Linear programming is used to maximize or minimize quantities subject to constraints. It can be applied to problems with any number of variables and constraints, as long as the relationships are linear. Key aspects include defining an objective function to optimize, determining the feasible region where all constraints are satisfied, and finding extreme points where the objective function may be maximized or minimized. An example problem involves determining how to allocate candy mixtures to maximize revenue given constraints on available ingredients. The optimal solution is found at an extreme point within the bounded feasible region.
Medical Conferences, Pharma Conferences, Engineering Conferences, Science Conferences, Manufacturing Conferences, Social Science Conferences, Business Conferences, Scientific Conferences Malaysia, Thailand, Singapore, Hong Kong, Dubai, Turkey 2014 2015 2016
Global Research & Development Services (GRDS) is a leading academic event organizer, publishing Open Access Journals and conducting several professionally organized international conferences all over the globe annually. GRDS aims to disseminate knowledge and innovation with the help of its International Conferences and open access publications. GRDS International conferences are world-class events which provide a meaningful platform for researchers, students, academicians, institutions, entrepreneurs, industries and practitioners to create, share and disseminate knowledge and innovation and to develop long-lasting network and collaboration.
GRDS is a blend of Open Access Publications and world-wide International Conferences and Academic events. The prime mission of GRDS is to make continuous efforts in transforming the lives of people around the world through education, application of research and innovative ideas.
Global Research & Development Services (GRDS) is also active in the field of Research Funding, Research Consultancy, Training and Workshops along with International Conferences and Open Access Publications.
International Conferences 2014 – 2015
Malaysia Conferences, Thailand Conferences, Singapore Conferences, Hong Kong Conferences, Dubai Conferences, Turkey Conferences, Conference Listing, Conference Alerts
IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...IRJET Journal
This document presents an analytic evaluation of the Head Injury Criterion (HIC) within the framework of constrained optimization theory. The HIC is a weighted impulse function used to predict the probability of closed head injury based on measured head acceleration. Previous work analyzed the unclipped HIC function, but the clipped HIC formulation used in practice limits the evaluation window duration. The author develops analytic relationships for determining the window initiation and termination points to maximize the clipped HIC function. Example applications illustrate the general solutions for when head acceleration is defined by a single function or composite functions over the evaluation domain.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Message Sequence Chart (MSC) is a graphical trace language for describing the communication
behaviour of distributed systems. In order to build a Petri Net model of a complex system, this
paper introduces a strategy to build a Petri Net model by using MSC. The algorithm of
translating the MSC model to Petri Net model is also given in this paper. We can get the Petri
Net model and improve it by translating the model of MSC. By analyzing the Petri Net model, it is proved to be safe and reliable.
The document contains data and results from a finite element analysis case study involving two cases. MATLAB software was used to solve the cases. The summary includes:
1) Tables of node coordinate and element connectivity data are provided for Cases 1 and 2, along with the results of the finite element analysis showing displacements and stresses.
2) Questions are posed about how renumbering the nodes would affect the structural stiffness matrix and computational efficiency.
3) The algorithm used by the skyline function to calculate half bandwidths is described.
On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...YogeshIJTSRD
In this paper a new method is proposed for finding an optimal solution for Pentagonal intuitionistic fuzzy transportation problems, in which the cost values are Pentagonal intuitionistic fuzzy numbers. The procedure is illustrated with a numerical example. P. Parimala | P. Kamalaveni "On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionistic Fuzzy Numbers Solved by Modi Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd41094.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/41094/on-intuitionistic-fuzzy-transportation-problem-using-pentagonal-intuitionistic-fuzzy-numbers-solved-by-modi-method/p-parimala
11.fuzzy inventory model with shortages in man power planningAlexander Decker
This document presents a fuzzy inventory model to determine the optimal time for an employee to quit their current job based on factors like the declining real wage over time and costs associated with changing jobs. The model extends an existing economic order quantity (EOQ) model to account for uncertainty in costs using fuzzy set theory. Membership functions are defined to represent the fuzziness of parameters like real income, costs, and constraints. A fuzzy nonlinear programming problem is formulated and solved using Lagrange multipliers to obtain the optimal solution under fuzzy conditions. The results are compared to the classical crisp model and sensitivity analysis is performed.
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...Waqas Tariq
Risky asset bid and ask prices “tailored” to the risk-aversion and the gain-propension of the traders are set up. They are calculated through the principle of the Extended Gini premium, a standard method used in non-life insurance. Explicit formulae for the most common stochastic distributions of risky returns, are calculated. Sufficient and necessary conditions for successful trading are also discussed.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document discusses intelligent control using fuzzy logic. It introduces fuzzy logic and its history, then describes the general approach to fuzzy logic control which involves defining inputs/outputs, membership functions, rules, and performing calculations using fuzzy inference. Applications mentioned include traffic management using a fuzzy logic controller to adjust traffic light timing based on vehicle counts at intersections. The controller uses fuzzy rules and membership functions to determine output signals to the microcontroller managing the traffic lights.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document presents a method for solving fuzzy assignment problems where costs are represented by linguistic variables and fuzzy numbers. Linguistic variables are used to convert qualitative cost data into quantitative fuzzy numbers. Yager's ranking method is applied to rank the fuzzy numbers, transforming the fuzzy assignment problem into a crisp one. The resulting crisp problem is then solved using the Hungarian method to find the optimal assignment that minimizes total cost. A numerical example demonstrates the approach, showing a fuzzy cost matrix converted to crisp values and solved. The method allows handling assignment problems with imprecise, qualitative cost data using fuzzy logic concepts.
IRJET- Design of Photovoltaic System using Fuzzy Logic ControllerIRJET Journal
This document describes a study that assesses the use of a fuzzy logic controller in a standalone photovoltaic (PV) system. The PV system was designed and simulated in MATLAB/Simulink. A fuzzy logic controller was used for maximum power point tracking (MPPT) to dynamically adjust the duty cycle of a boost converter connected to the PV panels. The performance of the fuzzy logic controller was evaluated under constant and varying weather conditions in terms of output power efficiency, dynamic response, and output ripples. Results showed the controller was able to efficiently track the maximum power point with output power reaching 98.66% of the target under constant conditions.
Cauchy’s Inequality based study of the Differential Equations and the Simple ...IRJET Journal
1. The paper studies the multivariate generalization of Cauchy's inequality 1 + x ≤ ex, where x is a non-negative real number. This generalization can help solve certain ordinary differential equations (ODEs) and population dynamics problems.
2. The paper proves the multivariate generalization of the inequality and shows it only holds when the values are all equal to 0. It also analyzes some qualitative properties of solutions to ODE Cauchy problems using this generalization.
3. Different approaches are taken to directly prove the multivariate inequality using notions of monotone functions, Beppo Levi theorem, and divided differences mean value theorem. Allowed repetitions in the variables are also considered.
IRJET-Debarred Objects Recognition by PFL OperatorIRJET Journal
This document discusses a method for recognizing debarred objects like pistols, knives, and handguns in x-ray luggage scans using Partial Fuzzy Logic (PFL). PFL is used to estimate the degree of similarity between scanned objects and prohibited items. The method involves segmenting objects from x-ray images, then applying PFL to aggregate information and determine if an object matches prohibited items based on weighted criteria. PFL lies between logical "and" and "or" to provide a parameterized aggregation. The document tests the method on sample x-ray images to recognize knives and other banned objects.
An Algorithm For Vector Quantizer DesignAngie Miller
The document presents an algorithm for designing vector quantizers. The algorithm is efficient, intuitive, and can be used for quantizers with general distortion measures and large block lengths. It is based on Lloyd's approach but does not require differentiation, making it applicable even when the data distribution has discrete components. The algorithm finds quantizers that meet necessary optimality conditions. Examples show it converges well and finds near-optimal quantizers for memoryless Gaussian sources. It is also used successfully to quantize LPC speech parameters with a complicated distortion measure.
This document provides a comparative study of several artificial intelligence algorithms: Heuristics, A* algorithm, K-Nearest Neighbors (KNN), and Linear Regression. It describes each algorithm, provides an example problem that each algorithm could solve, and discusses their applications. The document aims to illustrate the variety of problems that can be solved by these AI algorithms and help readers understand which algorithm may be best suited to different AI problems.
Polynomial regression model of making cost prediction in mixed cost analysisAlexander Decker
This document presents a study comparing different regression models for predicting costs based on production levels. It finds that a cubic polynomial regression model provides a better fit than linear regression or the high-low method. The study uses cost and production data from a company to build linear, quadratic, and cubic regression models. It finds the cubic polynomial regression has the highest R-squared value and lowest p-value, indicating it is the best-fitting model. The study concludes that polynomial regression generally provides a better approach for cost prediction than conventional linear regression or the high-low method.
11.polynomial regression model of making cost prediction in mixed cost analysisAlexander Decker
This document presents a study comparing different regression models for predicting costs based on production levels. It finds that a cubic polynomial regression model provides a better fit than linear regression or the high-low method. The study uses cost and production data from a company to build linear, quadratic, and cubic regression models. It finds the cubic polynomial regression has the highest R-squared value and lowest p-value, indicating it is best able to model the cost patterns in the data. The document concludes the cubic polynomial regression provides a better approach for cost prediction than traditional linear regression or high-low methods.
IRJET- K-SVD: Dictionary Developing Algorithms for Sparse Representation ...IRJET Journal
This document discusses the K-SVD algorithm, which is a dictionary learning method for sparse representations of signals. It alternates between sparse coding to represent signals using the current dictionary, and dictionary updating to learn a new dictionary from the signal representations. The algorithm generalizes the K-means clustering process. The document provides details on the methodology of K-SVD, including its basic steps and application to synthetic and real image signals. It is concluded that K-SVD learns dictionaries that better represent given signal groups compared to alternative methods.
PREDICTIVE EVALUATION OF THE STOCK PORTFOLIO PERFORMANCE USING FUZZY CMEANS A...ijfls
The aim of this paper is to investigate the trend of the return of a portfolio formed randomly or for any
specific technique. The approach is made using two techniques fuzzy: fuzzy c-means (FCM) algorithm and
the fuzzy transform, where the rules used at fuzzy transform arise from the application of the FCM
algorithm. The results show that the proposed methodology is able to predict the trend of the return of a
stock portfolio, as well as the tendency of the market index. Real data of the financial market are used from
2004 until 2007.
A sat encoding for solving games with energy objectivescsandit
This document presents a reduction from the problem of solving energy games to the satisfiability problem for formulas of propositional logic. Energy games model resource-constrained reactive systems and are equivalent to mean-payoff games. The document proposes encoding winning strategies for energy games using difference logic and propositional logic. It reports tight size bounds for these encodings and argues they could lead to more efficient solving algorithms by leveraging modern SAT solvers.
Linear algebra application in linear programming Lahiru Dilshan
Linear programming is used to maximize or minimize quantities subject to constraints. It can be applied to problems with any number of variables and constraints, as long as the relationships are linear. Key aspects include defining an objective function to optimize, determining the feasible region where all constraints are satisfied, and finding extreme points where the objective function may be maximized or minimized. An example problem involves determining how to allocate candy mixtures to maximize revenue given constraints on available ingredients. The optimal solution is found at an extreme point within the bounded feasible region.
Medical Conferences, Pharma Conferences, Engineering Conferences, Science Conferences, Manufacturing Conferences, Social Science Conferences, Business Conferences, Scientific Conferences Malaysia, Thailand, Singapore, Hong Kong, Dubai, Turkey 2014 2015 2016
Global Research & Development Services (GRDS) is a leading academic event organizer, publishing Open Access Journals and conducting several professionally organized international conferences all over the globe annually. GRDS aims to disseminate knowledge and innovation with the help of its International Conferences and open access publications. GRDS International conferences are world-class events which provide a meaningful platform for researchers, students, academicians, institutions, entrepreneurs, industries and practitioners to create, share and disseminate knowledge and innovation and to develop long-lasting network and collaboration.
GRDS is a blend of Open Access Publications and world-wide International Conferences and Academic events. The prime mission of GRDS is to make continuous efforts in transforming the lives of people around the world through education, application of research and innovative ideas.
Global Research & Development Services (GRDS) is also active in the field of Research Funding, Research Consultancy, Training and Workshops along with International Conferences and Open Access Publications.
International Conferences 2014 – 2015
Malaysia Conferences, Thailand Conferences, Singapore Conferences, Hong Kong Conferences, Dubai Conferences, Turkey Conferences, Conference Listing, Conference Alerts
IRJET- Analytic Evaluation of the Head Injury Criterion (HIC) within the Fram...IRJET Journal
This document presents an analytic evaluation of the Head Injury Criterion (HIC) within the framework of constrained optimization theory. The HIC is a weighted impulse function used to predict the probability of closed head injury based on measured head acceleration. Previous work analyzed the unclipped HIC function, but the clipped HIC formulation used in practice limits the evaluation window duration. The author develops analytic relationships for determining the window initiation and termination points to maximize the clipped HIC function. Example applications illustrate the general solutions for when head acceleration is defined by a single function or composite functions over the evaluation domain.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Message Sequence Chart (MSC) is a graphical trace language for describing the communication
behaviour of distributed systems. In order to build a Petri Net model of a complex system, this
paper introduces a strategy to build a Petri Net model by using MSC. The algorithm of
translating the MSC model to Petri Net model is also given in this paper. We can get the Petri
Net model and improve it by translating the model of MSC. By analyzing the Petri Net model, it is proved to be safe and reliable.
The document contains data and results from a finite element analysis case study involving two cases. MATLAB software was used to solve the cases. The summary includes:
1) Tables of node coordinate and element connectivity data are provided for Cases 1 and 2, along with the results of the finite element analysis showing displacements and stresses.
2) Questions are posed about how renumbering the nodes would affect the structural stiffness matrix and computational efficiency.
3) The algorithm used by the skyline function to calculate half bandwidths is described.
On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionisti...YogeshIJTSRD
In this paper a new method is proposed for finding an optimal solution for Pentagonal intuitionistic fuzzy transportation problems, in which the cost values are Pentagonal intuitionistic fuzzy numbers. The procedure is illustrated with a numerical example. P. Parimala | P. Kamalaveni "On Intuitionistic Fuzzy Transportation Problem Using Pentagonal Intuitionistic Fuzzy Numbers Solved by Modi Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd41094.pdf Paper URL: https://www.ijtsrd.com/mathemetics/applied-mathematics/41094/on-intuitionistic-fuzzy-transportation-problem-using-pentagonal-intuitionistic-fuzzy-numbers-solved-by-modi-method/p-parimala
11.fuzzy inventory model with shortages in man power planningAlexander Decker
This document presents a fuzzy inventory model to determine the optimal time for an employee to quit their current job based on factors like the declining real wage over time and costs associated with changing jobs. The model extends an existing economic order quantity (EOQ) model to account for uncertainty in costs using fuzzy set theory. Membership functions are defined to represent the fuzziness of parameters like real income, costs, and constraints. A fuzzy nonlinear programming problem is formulated and solved using Lagrange multipliers to obtain the optimal solution under fuzzy conditions. The results are compared to the classical crisp model and sensitivity analysis is performed.
Bid and Ask Prices Tailored to Traders' Risk Aversion and Gain Propension: a ...Waqas Tariq
Risky asset bid and ask prices “tailored” to the risk-aversion and the gain-propension of the traders are set up. They are calculated through the principle of the Extended Gini premium, a standard method used in non-life insurance. Explicit formulae for the most common stochastic distributions of risky returns, are calculated. Sufficient and necessary conditions for successful trading are also discussed.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document discusses intelligent control using fuzzy logic. It introduces fuzzy logic and its history, then describes the general approach to fuzzy logic control which involves defining inputs/outputs, membership functions, rules, and performing calculations using fuzzy inference. Applications mentioned include traffic management using a fuzzy logic controller to adjust traffic light timing based on vehicle counts at intersections. The controller uses fuzzy rules and membership functions to determine output signals to the microcontroller managing the traffic lights.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document presents a method for solving fuzzy assignment problems where costs are represented by linguistic variables and fuzzy numbers. Linguistic variables are used to convert qualitative cost data into quantitative fuzzy numbers. Yager's ranking method is applied to rank the fuzzy numbers, transforming the fuzzy assignment problem into a crisp one. The resulting crisp problem is then solved using the Hungarian method to find the optimal assignment that minimizes total cost. A numerical example demonstrates the approach, showing a fuzzy cost matrix converted to crisp values and solved. The method allows handling assignment problems with imprecise, qualitative cost data using fuzzy logic concepts.
IRJET- Design of Photovoltaic System using Fuzzy Logic ControllerIRJET Journal
This document describes a study that assesses the use of a fuzzy logic controller in a standalone photovoltaic (PV) system. The PV system was designed and simulated in MATLAB/Simulink. A fuzzy logic controller was used for maximum power point tracking (MPPT) to dynamically adjust the duty cycle of a boost converter connected to the PV panels. The performance of the fuzzy logic controller was evaluated under constant and varying weather conditions in terms of output power efficiency, dynamic response, and output ripples. Results showed the controller was able to efficiently track the maximum power point with output power reaching 98.66% of the target under constant conditions.
Cauchy’s Inequality based study of the Differential Equations and the Simple ...IRJET Journal
1. The paper studies the multivariate generalization of Cauchy's inequality 1 + x ≤ ex, where x is a non-negative real number. This generalization can help solve certain ordinary differential equations (ODEs) and population dynamics problems.
2. The paper proves the multivariate generalization of the inequality and shows it only holds when the values are all equal to 0. It also analyzes some qualitative properties of solutions to ODE Cauchy problems using this generalization.
3. Different approaches are taken to directly prove the multivariate inequality using notions of monotone functions, Beppo Levi theorem, and divided differences mean value theorem. Allowed repetitions in the variables are also considered.
IRJET-Debarred Objects Recognition by PFL OperatorIRJET Journal
This document discusses a method for recognizing debarred objects like pistols, knives, and handguns in x-ray luggage scans using Partial Fuzzy Logic (PFL). PFL is used to estimate the degree of similarity between scanned objects and prohibited items. The method involves segmenting objects from x-ray images, then applying PFL to aggregate information and determine if an object matches prohibited items based on weighted criteria. PFL lies between logical "and" and "or" to provide a parameterized aggregation. The document tests the method on sample x-ray images to recognize knives and other banned objects.
An Algorithm For Vector Quantizer DesignAngie Miller
The document presents an algorithm for designing vector quantizers. The algorithm is efficient, intuitive, and can be used for quantizers with general distortion measures and large block lengths. It is based on Lloyd's approach but does not require differentiation, making it applicable even when the data distribution has discrete components. The algorithm finds quantizers that meet necessary optimality conditions. Examples show it converges well and finds near-optimal quantizers for memoryless Gaussian sources. It is also used successfully to quantize LPC speech parameters with a complicated distortion measure.
Development of deep reinforcement learning for inverted pendulumIJECEIAES
This paper presents a modification of the deep Q-network (DQN) in deep reinforcement learning to control the angle of the inverted pendulum (IP). The original DQN method often uses two actions related to two force states like constant negative and positive force values which apply to the cart of IP to maintain the angle between the pendulum and the Y-axis. Due to the changing of too much value of force, the IP may make some oscillation which makes the performance system could be declined. Thus, a modified DQN algorithm is developed based on neural network structure to make a range of force selections for IP to improve the performance of IP. To prove our algorithm, the OpenAI/Gym and Keras libraries are used to develop DQN. All results showed that our proposed controller has higher performance than the original DQN and could be applied to a nonlinear system.
New Design Architecture of Chaotic Secure Communication System Combined with ...ijtsrd
In this paper, the exponential synchronization of secure communication system is introduced and a novel secure communication design combined with linear receiver is constructed to ensure the global exponential stability of the resulting error signals. Besides, the guaranteed exponential convergence rate of the proposed secure communication system can be correctly calculated. Finally, some numerical simulations are offered to demonstrate the correctness and feasibility of the obtained results. Yeong-Jeu Sun "New Design Architecture of Chaotic Secure Communication System Combined with Linear Receiver" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38214.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/38214/new-design-architecture-of-chaotic-secure-communication-system-combined-with-linear-receiver/yeongjeu-sun
Multivariate Analysis of Cauchy’s InequalityIRJET Journal
This paper investigates the multivariate generalization of Cauchy's inequality 1 + x ≤ ex, where x is any non-negative real number. Specifically, it aims to prove the inequality (1 + x1)(1 + x2)...(1 + xn) ≤ e(x1+x2+...+xn), where x1, x2, ..., xn are pairwise distinct non-negative real numbers. The proof is based on notions from empty product conventions and Beppo Levi's theorem of monotone convergence. This inequality is also extended to simultaneous inequalities and its relationship to ordinary differential equation Cauchy problems and population dynamics is explored. Direct approaches using definitions of monotone functions and mean value theore
A General Framework for Electronic Circuit VerificationIRJET Journal
This document presents a general framework for formally verifying digital electronic circuits. It discusses representing circuits as finite state machines and using Linear Temporal Logic (LTL) to specify properties to verify. Key points:
- Digital circuits and computer programs are similar in nature, so methods used to verify programs can also verify circuits.
- A circuit can be modeled as a finite state machine by creating a state for every combination of inputs to each logic gate.
- LTL allows specifying temporal properties of the circuit to verify, using operators like "Next", "Until", "Eventually", and "Always".
- The framework was tested on sample circuits, proving properties using a symbolic model checker on the LTL specifications
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...IJERA Editor
This paper presents a new algorithm on waveletbased robust and invisible digital image watermarking for multimedia security. The proposed algorithm has been designed, implemented and verified using MATLAB R2014a simulation for both embedding and extraction of the watermark and the results of which shows significant improvement in performance metrics like PSNR, SSIM, Mean Correlation, MSE than the other existing algorithms in the current literature. The cover image considered here in our algorithm is of the size (256x256) and the binary watermark image size is taken as (16x16).
Solving linear equations from an image using anneSAT Journals
Abstract
Optical character recognition has a great impact in image processing application. This paper combines the concept of OCR and feed-forward artificial neural network to solve mathematical linear equations. We implement blob analysis and feature extraction to extract the individual characters to a captured image which having some mathematical equations. We are constructing 39 character set which having some numbers, alphabet and operators. Training of these character set is done by using supervised learning rule. If that image satisfying linear equation condition then our proposed algorithm solve this equation and generate the output. This paper tries to increase the recognition rate more than 87%. The result achieved from the training and testing on the network of the letter recognition is satisfactory.
Keywords: Artificial Neural Network, Linear Equation, Recognized rate, Optical Character Recognition.
Some Engg. Applications of Matrices and Partial DerivativesSanjaySingh011996
This document contains a submission by three students to Dr. Sona Raj Mam regarding partial differentiation, matrices and determinants, and eigenvectors and eigenvalues. It provides examples of how these mathematical concepts are applied in fields like engineering. Partial differentiation is used in economics to analyze demand and in image processing for edge detection. Matrices and determinants allow representing linear transformations in graphics software. Eigenvalues and eigenvectors have applications in areas like computer science, smartphone apps, and modeling structures in civil engineering. The document also provides real-world examples and references textbooks and websites for further information.
Extended Analysis of Cauchy’s InequalityIRJET Journal
This paper provides a multivariate generalization of Cauchy's inequality 1 + x ≤ ex, where x can be any non-negative real number. Specifically, it proves the inequality (2) where x1, x2, ..., xn are pairwise non-negative distinct real numbers. It shows this inequality only holds when the sum of x values is 0. The paper also analyzes this inequality using an ordinary differential equation approach and direct proofs based on concepts like monotone functions, divided differences, and the Beppo Levi theorem.
IRJET- Performance Estimation of FIR Filter using Null Convention LogicIRJET Journal
This document presents a design for a low power, high speed FIR filter using Null Convention Logic (NCL). NCL is an asynchronous logic style that uses dual rail encoding to reduce power consumption by decreasing switching activity. The author designs basic logic gates, adders, multipliers, and a D flip-flop using NCL. An 8-tap FIR filter is then implemented using these NCL components. Simulation results in a 90nm process show the NCL FIR filter has 22% lower power consumption and 2% higher speed compared to a design using conventional CMOS logic. In conclusion, NCL is an effective approach for implementing low power, high performance FIR filters.
IRJET- Design of Memristor based MultiplierIRJET Journal
This document describes the design of a 4-bit multiplier circuit using memristors. It begins with an introduction to memristors and their advantages over CMOS technology. It then discusses different window functions that can be used for memristor models and selects the Biolek window function. The document implements a 2-bit and 4-bit array multiplier circuit using memristor-CMOS hybrid logic gates. It analyzes the results in LTSpice and finds improvements in area and component count compared to traditional CMOS and other memristor-based designs. The document concludes memristors can help reduce area for multiplier circuits.
An Efficient And Safe Framework For Solving Optimization ProblemsLisa Muthukumar
This document describes a new optimization framework called QuadOpt that combines interval analysis techniques with safe linear relaxations to provide rigorous and efficient global optimization. QuadOpt uses consistency techniques from QuadSolver to reduce variable domains and computes a safe lower bound on a linear relaxation of the problem. It performs branch and bound search to rigorously bound the global optimum. Experimental results on test problems show that QuadOpt provides certified solutions with fewer splits than other rigorous methods while being faster than nonsafe solvers.
AMAZON STOCK PRICE PREDICTION BY USING SMLTIRJET Journal
This document discusses predicting stock prices of Amazon (AMZN) stock using machine learning algorithms. It evaluates KNN, SVR, elastic net, and linear regression algorithms and finds that linear regression has the highest accuracy based on precision, recall, and F1 score metrics. The document provides details on each algorithm and compares their performance on this stock price prediction task. Linear regression builds a linear model to predict the dependent variable (stock price) based on independent variables and is shown to outperform the other supervised learning algorithms for this specific prediction problem.
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMijcisjournal
In an increasingly connected world, security is a top concern for Internet of Things (IoT). These IoT devices have to
be inexpensive implying that they will be constrained in storage and computing resources. In order to secure such
devices, highly efficient public key cryptosystems (PKC) are critical. Elliptic Curve Cryptography (ECC) is the most
commonly implemented PKC in use today. In this paper, an alternate and a more efficient PKC, called the PEC (Pells
Equation Cryptography) has been proposed based on Pells equation: x
2 − D ∗ y
2 ≡ 1 (mod p). It is shown that scalar
multiplication in PEC is significantly more efficient compared to ECC. It is also shown that the Discrete Logarithm
Problem - computing the private key from the public key - in PEC is at least as hard as that of ECC.
A Novel Design Architecture of Secure Communication System with Reduced-Order...ijtsrd
In this paper, a new concept about secure communication system is introduced and a novel secure communication design with reduced-order linear receiver is developed to guarantee the global exponential stability of the resulting error signals. Besides, the guaranteed exponential convergence rate of the proposed secure communication system can be correctly calculated. Finally, some numerical simulations are given to demonstrate the feasibility and effectiveness of the obtained results. Yeong-Jeu Sun "A Novel Design Architecture of Secure Communication System with Reduced-Order Linear Receiver" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd20212.pdf
http://www.ijtsrd.com/engineering/electrical-engineering/20212/a-novel-design-architecture-of-secure-communication-system-with-reduced-order-linear-receiver/yeong-jeu-sun
Researchers like Landauer and Bennett have shown that every bit of information lost will generate kTlog2 joules of
energy, whereas the energy dissipation would not occur, if computation is carried out in a reversible way. k is
Boltzmann’s constant and T is absolute temperature at which computation is performed. Thus reversible circuits will be
the most important one of the solutions of heat dissipation in Future circuit design. Reversible computing is motivated
by the Von Neumann Landauer (VNL) principle, a theorem of modern physics telling us that ordinary irreversible logic
operation which destructively overwrite previous outputs)in cur a fundamental physics) that performance on most
applications within realistic power constraints might still continue increasing indefinitely. Reversible logic is also a
core part of the quantum circuit model
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
This document proposes an image encryption technique using histograms and cheat images. It involves permuting the input image and a cheat image using a logistic map and secret key parameters. The encrypted image is generated using the permuted values. For decryption, the same process is applied in reverse using the cheat image and secret key. The technique is analyzed for security through statistical analysis, differential attacks, sensitivity analysis, and entropy measures, showing it effectively encrypts images and is robust against attacks.
Similar to IRJET- Optimization of 1-Bit ALU using Ternary Logic (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.