Manuscripts

Recent Papers

Research Paper

Fabrication and testing of thermal sheet to obtain performance characteristics for both heating and cooling operations

Thermal sheet is a sheet of thickness nearly equal to the real blanket. It has a tremendous advantage in the field of heating and refrigeration. It has the potential to replace the equipment’s that are used in the heating refrigeration devices based on the conventional concept. Just like the conventional heating and refrigeration system where the different devices are used for the above mention process to carried out but with the help of thermal sheet is a single device can achieve. It can also be used with both high and low-temperature condition and its energy consumption as compared to conventional is highly efficient. This apparatuses that maintained a required thermal condition (T.C) of an object for the duration of time and the circulation of the fluid in the pipe are taking place. It can be configured so that it can be connected to different thermal energy reservoir boxes for producing desired heating and cooling effect. It is fully thermally insulated chamber. It has a pump which is used to transfer the fluid in the second pipe that locked in thermally insulated. Two reservoirs are used to maintain the heat. A cold substance (heat sink) it provides a cooling effect and a hot (heat source) storages box provided heating effect thus the thermal sheet are to maintained at the required temperature, so this process flowed and maintained at low and high temperature for deviation of a time period. In the heat flow from a cold body to a hot body from a hot body to cold body occurs through conduction, convection, radiation is required. Basically, its thermal sheet (T.S) is a structure that it can be used extensively for various purpose and in many application heating and cooling process through the sheet is done based on the heat transfer from into the sheet thus its necessary to make the one side sheet as perfectly conducting as possible. The above all are verified through the experiments cooling characteristics curves and heating characteristics curves of a thermal sheet.

Published by: Omprakash Kumar, Nurul Hassan

Author: Omprakash Kumar

Paper ID: V4I4-1179

Paper Status: published

Published: July 4, 2018

Full Details
Research Paper

Threats involved with internet advertisements and attack on botnet network

The research on online advertisement industries, the global committees have identified various threats and risks to consumer’s privacy and security which are hidden by the consumer. Various malicious software(malware) attacks take place through online advertisements without any click or interaction by a user with advertisements contents. The scope of this research is to identify such threats and provide ideas to counter-attack on botnet network to prevent privacy and financial loss.

Published by: Prakash Kumavat, Nikhil B. Khandare

Author: Prakash Kumavat

Paper ID: V4I4-1176

Paper Status: published

Published: July 4, 2018

Full Details
Research Paper

Optical infrared laser communication

In the industry, the Modulated IR laser plays an important role for a lot of gigantic sensor modules and laser communications between the transmitter and receiver. So far the method discussed in this paper is about the modulated IR laser retransmitted wave by the sensor, after sensing the type modulation of the laser and then transmitting the same laser again.

Published by: Hemant Date

Author: Hemant Date

Paper ID: V4I4-1157

Paper Status: published

Published: July 4, 2018

Full Details
Research Paper

Enhancing productivity and consumer value through implementation of lean manufacturing

Lean manufacturing is one of the leading manufacturing systems which are used in reducing non- value-added activities to improve productivity and customer value. Lean is a systematic loom for eliminating waste through continuous improvement. Leading organizations are following this sophisticated technique to realize the huge improvements in production, quality and consumer service. Although few were succeeded because of modern implementation techniques, excellent leadership and employee involvements. A strong association of using the lean tools is to achieve the desired level of result which focuses on continuous improvement in production process. Lean implementation was the basic concept following as Just-In-Time (JIT), total productive maintenance (TPM), cellular manufacturing, lean implementation is a long-term process in which complete contribution of management support and employee commitments are made to attain the objective of the organization. Even though, the lean approach is not the resolution for all manufacturing problem, it proposes an exclusively flexible solution for assembling more complicated products.

Published by: B. Maruthu, J. Dhileep Kumar, S. Manivannan

Author: B. Maruthu

Paper ID: V4I3-2001

Paper Status: published

Published: July 3, 2018

Full Details
Research Paper

Neural network conversational model for small dataset with sequence to sequence model

This Paper We Purpose Conversational Model For Specific Domain which Generates New Text for two-way conservation. Conversational Modeling is an Important Task in Machine Intelligence and Natural Language. In This Paper We Used a Recently Proposed Sequence To Sequence Model for predicting the next sentence and the previous sentence or sentences in a conversation. Conservational Model is able to extract knowledge from specific Domain and noisy DataSet. Main Dataset subtitles. Our Domain for a Conservational model is Movie Conversation Dataset. The Open-Domain Movies transcript are noisy. The expert model can perform Simple forms of common sense reasoning. Our Conversational model can be end-to-end trained and Required Changeable rules. We Expected Our Model Pass the lack of consistency in our model And Conversation Process have been successfully applied in sequence- to-sequence mapping task.

Published by: Mohd Nazeeb Khan, Anurag Yadav

Author: Mohd Nazeeb Khan

Paper ID: V4I3-2010

Paper Status: published

Published: July 3, 2018

Full Details
Research Paper

Exploration on network security with cryptography

The timeframe in history that Uses digital technology became prevalent and of common use in the world through the net applications and social networks, organizations across the world generate a large amount of data daily. So guaranteeing secured and safe transmission of data becomes important as society is moving towards digital information age. Information security is the most extreme basic issue in guaranteeing safe transmission of data through a web. As more and more users connect to the internet it attracts a lot of cyber-attacks. It’s required to protect the computer and network security which forms the critical issues. In this paper, we provide an overview of network security and various techniques through which Network security can. Be enhanced mainly using Cryptography.

Published by: D. Pari Ilamvazhuthi, Dr. Rajasekaran K.

Author: D. Pari Ilamvazhuthi

Paper ID: V4I4-1164

Paper Status: published

Published: July 3, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X