December 2022 Vol 11 No 2

Author (s) :


1). S. I. Sarsam, Sarsam and Associates Consult Bureau (SACB), Baghdad, Baghdad, IRAQ

Abstract :


Asphalt concrete pavement usually practices load repetitions and environment impacts. The quality of the pavement declines through the service life. However, the asphalt pavement can heal the micro cracks by itself. In the present investigation, slab samples of asphalt concrete were prepared at optimum asphalt cement binder requirement with the aid of roller compaction. Asphalt concrete prism specimens were extracted from the slab samples and subjected to four points flexural fatigue test at 20° C. The test was stopped when the stiffness of asphalt concrete declines to 50 % of its value at the start of the test. The beam specimens were subjected to external heating at 60° C for 120 minutes to enhance the viscoelastic properties through micro cracks healing through heating-induced healing method. Beams were tested under repeated flexural bending after the healing process. The variation in the stiffness, fatigue life, phase angle, dissipated energy and deformation after healing was monitored. It was concluded that the flexural stiffness, the phase angle, and dissipated energy were increased after healing while the deformation declines. The crack healing is recommended as a sustainable process to enhance the pavement quality. Keywords: Asphalt concrete, Healing, Micro cracks, Stiffness, Flexure, Dissipated energy, Phase angle.


No of Downloads : 20

Author (s) :


1). Dr. S. Vijayarani, Bharathiar University, Coimbatore, Tamil Nadu, India
2). Dr. S. Sharmila, Bharathiar University, Coimbatore, Tamil Nadu, India
3). M. Lavanya, Bharathiar University, Coimbatore, Tamil Nadu, India

Abstract :


Privacy-Preserving Data Mining (PPDM) develops algorithms for altering sensitive data. The private knowledge of a person, industry, or business organization remains private after the usage of data from the database. Data modification is one of the prominent privacy-preserving techniques used to alter confidential information available in the database and guarantees high privacy protection. In this paper, a new masking technique is proposed for hiding sensitive numerical attributes that are later analyzed using clustering algorithms, namely k-means, filtered clusters, and density-based clusters. The proposed technique is used to hide confidential numerical attributes. After modification, the proposed algorithm compares the original and the modified data and ensures that all the data items are altered or not. Experimental evaluation is illustrated using the employee dataset. The accuracy is calculated based on the comparison of the original and the modified data set in terms of data items found in the number of clusters. For every clustering technique, both the original and modified at a set are divided into two, three, four, and five, clusters. Based on the performance metrics, the k-means algorithm gives the best result compared to other algorithms. The results obtained from the proposed technique are compared with the existing approach. The experimental result indicates that the newly developed method is more efficient than the existing approaches. Keywords: Data masking, Data swapping, Sensitive data, Privacy-Preserving Data Mining, Clustering, Data hiding.


No of Downloads : 19

Author (s) :


1). Arun Kumar Datta, Central Power Research Institute, Bhopal, MP, India

Abstract :


Static drives are being used invariably in all rotating machines nowadays, in spite of its several ill effects. Other than harmonics generation shaft voltages are also prime concern for bearings in the machines connected with static drives. This paper has done research on a 1500 MVA alternator being used for testing of electrical equipment. Model of this alternator and its drives are simulated with real time parameters. Built model is validated and further analysis is carried out by drawing waveforms and frequency spectrums. High levels of harmonics in power circuits and shaft voltages have been observed in the present system. A multilevel inverter (MLI) has been proposed in the drive of this machine replacing conventional current source inverter to control the harmonics and shaft voltages. Keywords: Alternator, current source inverter, common mode voltage, THD, static frequency converter, multilevel inverter.


No of Downloads : 16

Author (s) :


1). F.O Aranuwa, Adekunle Ajasin University, Akungba Akoko, Ondo State, NIGERIA
2). Fawehinmi, O.B, Adekunle Ajasin University, Akungba Akoko, Ondo State, NIGERIA

Abstract :


Iris image has been adjudicated one of the most reliable biometric traits for authentication as a result of its unique patterns, stringency to spoof attack and reliability. However, studies have revealed that inefficient classification sorts and techniques leading to classification errors and inaccurate matching has characterized its processes in many authentication and identification applications. Additionally, most of the existing works in the domain are based on single image classification, and major drawbacks of these methodologies remains insufficient learning input and classification errors. The current work uses Deep learning neural networks (DLNN), a subset of artificial intelligence that are effective in learning complex features from data, such as images. Majorly, the work is focused at classifying both left and right human iris images. Data for the work was acquired from the CASIA-Iris-lamp dataset (http://biometrics.idealtest.org). The dataset contains 16,163 iris datasets, and 20 iterations were passed on the data during modeling to determine the accuracy of the model. Performance metrics such as sensitivity, specificity and accuracy were used to evaluate the performance of the model. Experimental results show that the model performed well with classification accuracy of 99.57% which is relatively an improvement over the existing model that was used as a benchmark with 93.35%. The model correctly classified and predicted all images belonging to the right category as right irises, while it wrongly predicted 14 images belonging to the left category. Connotionally, the right iris recorded higher accuracy compared to that of the left iris. Keywords: Iris, Classification, Deep Learning, CNN, Accuracy


No of Downloads : 27

Author (s) :


1). Dr. Snehal Mistry, Vidyabharti Trust College of Business, Computer science and Research, Umrakh, Bardoli, Gujarat, India
2). Nikita Agarwal, Gujarat Technological University, Ahmedabad, Gujarat, India

Abstract :


Aim/Purpose: - This paper identifies the antecedents and factors influencing the adoption of self-service technologies in the banking industry. Background: - Rapid technological advancement has changed the banking environment dramatically. These advancements, particularly the Internet, have transformed the way banks operate. Over the last decade, the banking industry has become highly complex and competitive and operates in a highly volatile and unpredictable global economy. With the increasing demand for electronic services, banks are utilizing SSTs to improve their products and services. Contribution: - The study provides insights into the antecedents and factors which influences the adoptions of SSTs for banking transactions. Impact on Society:- This study provides a reference to banks about the antecedents and factors which influences the customers in adoptions of SSTs for banking transactions, provide a clear insight to banks and so that banks can take positive decisions to increase the performance and productivity. Keywords: SSTs, Antecedents, Factors, Influence, Technology, Acceptance, Adoption.


No of Downloads : 8

Author (s) :


1). J. A. Oladunjoye , Federal University, Wukari, Taraba State, NIGERIA
2). T. Moses, Federal University of Lafia, Lafia, Nasarawa, NIGERIA

Abstract :


It is impossible to overstate how much the advancement of technology has impacted our culture and day-to-day activities. Technology is essential for completing tasks quickly, effectively, and efficiently. Its expansion has resulted in widespread dissemination across several disciplines. The development of biometric technology has improved record authenticity, hence enhancing the integrity and uniqueness of individual records. Every organization places a high value on key management. An efficient key management system offers key records on demand, making it simple to maintain track of the university keys and the people who signed them. The Dalhatu Araf Specialist Hospital in Lafia uses a manual approach for key collection with staff members signing up on handwritten forms. The goal of this project is to automate the manual process and include biometric thumb printing as a means to accurately monitor the whereabouts of signed keys. The study uses the structured system analysis and design methodology as a tool to structurally guide the goal of this study in order to construct the targeted system efficiently. The system being targeted is a mobile application that utilized Java with SQLite database technology. Keywords: Key Collection Management, Device Biometric, Mobile Key Collection, Signed Key Records.


No of Downloads : 22

About Us

International Journal of Darshan Institute on Engineering Research and Emerging Technologies (IJDI-ERET) (ISSN 2320-7590) is an open access peer-reviewed international journal publishing high-quality articles related to all domains of engineering.

Contact Us

At Hadala, Near Water Sump, Rajkot - Morbi Highway,
Gujarat-363650, India

editorijdieret@darshan.ac.in
(General queries, Comments or Suggestions)