Manuscripts

Recent Papers

Research Paper

Optimization of machining parameters in CNC turning with varying of insert nose radius

The objective of the study is to evaluate the effect of machining parameters on the Material Removal Rate and Surface Roughness in CNC Turning by implementing Taguchi technique. Based on the Taguchi method, turning experiments were designed and conducted on Nylon rods. CNC Turning is a machining process which is used for removing the unwanted material from the cylindrical surfaces of the workpiece. In this era of manufacturing, Material Removal Rate (MRR) and surface roughness qualities are of primary concern. Taguchi method has been employed with an L36 orthogonal array. Four cutting parameters namely cutting speed, feed, depth of cut and Insert Nose Radius is selected. Two different values are selected for insert nose radius and three values are selected for each of the other parameters. Turning operations are performed for maximum Material Removal Rate and minimum surface roughness response values. The material selected for machining is Nylon which is a thermoplastic material and the tools used for machining are of rigid Cast Iron with solid carbide inserts and AP68 servo oil is used as the coolant. Material Removal Rate is calculated for 36 experiments and surface roughness values are measured. Taguchi method in MINITAB software is used for optimization and the optimum values of the four parameters namely cutting speed, feed, depth of cut and insert nose radius to obtain a combination of higher material removal rate and lower surface roughness.

Published by: B. Thaviti Raju, E.Lakshmi Devi, P.Satya Nnarayana Murthy

Author: B. Thaviti Raju

Paper ID: V4I3-1737

Paper Status: published

Published: June 5, 2018

Full Details
Research Paper

Blockchain to monetize retail operations

Data monetization strategy can be defined as a re-engineering of business data to create a measurable and positive impact on business revenue by making efficient use of data. There are mainly two forms to transform data into money. Firstly, provide access to organizational data and get the benefit of supplemental revenue stream which is also called as direct data monetization. Secondly, client data can be used to get insights and enhance customer services and operations which is called as indirect data monetization. As this monetization has become crucial for industries, data creators such as healthcare, retailers etc. are pursuing new and significant ways to monetize their data. At the same time, consumers who are actual contributors of data demands for access control over their public data to get knowledge about usage of their data in the market. A solution is constituted known as Blockchain technology. Even though blockchain is under execution for some business applications, it holds promising transformations in various businesses, the retail market is one of them where data flow continues and sensitive to day to day operations. This paper focuses on the optimization of customer data in retail management by using manually taken customer transactions and applying data analytical techniques along with blockchain. It emphasizes the significant usage of customer data in retail operations.

Published by: Sneha Anil Bhatkar, Sonali Ajankar

Author: Sneha Anil Bhatkar

Paper ID: V4I3-1730

Paper Status: published

Published: June 5, 2018

Full Details
Research Paper

Alternative of retrofitting for ground soft story formation using concrete web stiffeners

Many of the high-rise structures are designed today to have an open base story for multiple reasons like parking, recreational area etc. Since infills are absent at this location the relative stiffness of the story decreases as compared to the above stories, due to which soft story formation may occur. For this purpose, to demonstrate rectification of soft-story formation a G+10 infilled framed structure is considered and 10 models are created, 9 models having different aspect ratios of web stiffener and 1 model without web stiffener. The stiffness of ground story (plinth level), inter-story drift and displacements are calculated and compared for all the 10 stories.

Published by: Tanvesh Dabholkar

Author: Tanvesh Dabholkar

Paper ID: V4I3-1741

Paper Status: published

Published: June 5, 2018

Full Details
Thesis

Effect of IPV6 security vulnerabilities on the future of autonomous car

An autonomous car may be a mystery to many but in real life application it is actually placeable but with the latest internet version protocol (IPV 6) to which automobile companies are running away from due to vulnerabilities it possesses. The autonomous car is generally a self-driven car via the internet a simple car we can talk to, communicate to in real life time domain, without the need for an individual to be in the actual wheel, on the other hand, IPv6 is the latest version of internet protocol that is used for communication via the internet. but due to security concern of IPv6 many organization have slowed their migration to the newest version of this internet protocol. Generally, the autonomous car is driven via the internet and it could have worked best with the help of a well secure internet since IPv6 can accommodate a greater number of host compare to IPv4. This paper covers and reviews some of the fundamental vulnerabilities topics of IPv6 security, considerations, issues, and threats. In the end, it summarizes some of the most common security concerns the new suite of protocols creates.

Published by: Mustapha Mboob, Ousman Manjang

Author: Mustapha Mboob

Paper ID: V4I3-1734

Paper Status: published

Published: June 5, 2018

Full Details
Research Paper

IoT based home security through image processing algorithms

Most doors are controlled by persons with the use of keys, security cards, password or pattern to open the door. The aim of this paper is to help users for improvement of the door security of sensitive locations by using face detection and recognition. The face is a complex multidimensional structure and needs good computing techniques for detection and recognition. This paper is comprised mainly of three subsystems: namely face detection, face recognition and automatic door access control. Face detection is the process of detecting the region of the face in an image. Viola jones method is used for face detection in ‘opencv’ technique and face recognition is employed by using the RANSAC (RANdom SAmple Consensus). Face Recognition based on RANSAC. If a face is recognized i.e., present in the database, it is known, and else is unknown. The door automatically opens for the known person by matching with known database image. On another side, for an unknown person, the image will be sent through Google Cloud Messaging to the owner’s Android app and based on owner command the door will be open or closed. Although many preliminary images are used, probabilistic efficiency cannot be decreased predominantly. Therefore, face recognition using OpenCV using Android can be more useful for door security system than any other face recognition techniques.

Published by: Supritha J Mannapur, Sanjay Raj, Sharath Kumar, Kiran B

Author: Supritha J Mannapur

Paper ID: V4I3-1746

Paper Status: published

Published: June 5, 2018

Full Details
Thesis

Unity power factor correction based on ripple cancellation with predictive controller and fuzzy controller

This thesis proposes a control of single-phase power factor correction. This control is capable of obtaining a unity power factor. In this paper, first, a ripple estimation circuit is used to eliminate the double line frequency component of the sampled output voltage. Then the result of ripple estimation is controlled by the predictive controller and fuzzy logic controller. Here boost converter is used as PFC converter. The duty cycle is calculated based on reference current, inductor current, input voltage and reference output voltage. By the use of this proposed control technique, reduce THD in the input current with the output voltage(vo) regulation. This strategy achieves a fast dynamic response and near unity PF.

Published by: Athira Babu, Muhammedali Shafeeque. K

Author: Athira Babu

Paper ID: V4I3-1682

Paper Status: published

Published: June 5, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X