AIJREAS VOLUME 7, ISSUE 3 (2022, MAR)aerfpublications2022-04-08T06:17:43+00:00
AIJREAS VOLUME 7, ISSUE 3 (2022, MARCH) (ISSN-2455-6300) ONLINE
ANVESHANA’S INTERNATIONAL JOURNAL OF RESEARCH IN ENGINEERING AND APPLIED SCIENCES
1.
A COMPARATIVE STUDY OF LINEAR SCHEDULING TECHNIQUES AND CRITICAL PATH METHOD IN HIGHWAY CONSTRUCTION
Vinod Kumar Sharma & Dr. Sivakumar Ramamoorthy
Page 1-6
| Paper TitleA COMPARATIVE STUDY OF LINEAR SCHEDULING TECHNIQUES AND CRITICAL PATH METHOD IN HIGHWAY CONSTRUCTION AbstractDevelopments of highway, tunneling, water channel, pipe laying, pavements and lying of railway track are the probably the best instances of linear projects. The most taken on strategy of planning in construction field is the CPM and PERT. These methods may likewise be called as the regular methods of planning as these procedures are followed for a long time and generally broadly followed planning procedure. Indeed, even the most following scheduling programming resembles Microsoft office project and Primavera is additionally created based on CPM. Aside from CPM and spunky extraordinary linear, it is additionally accessible to schedule procedures which are seldom followed or inconspicuous. The linear scheduling procedures have many benefits and merits than the CPM and PERT. PC software\'s are likewise evolved on the premise of Linear Scheduling procedure. TILOS is one of the Programming created based on linear scheduling procedure. In this proposition the common timetable of a highway project is created in both CPM and linear scheduling procedure. The upside of CPM over the linear, it is examined to schedule technique. Be that as it may, the linear planning is better reasonable for straightforward direct task and not for confounded various rehashing exercises like multi story building and so on. In such case the timetable might be created on both CPM and LSM for better preparation. KEYWORDS : Linear Scheduling, Highway Construction, Techniques, Critical Path Method
| | viewed : | 133 Downloads |
2.
A STUDY ON DIELECTRIC RESONATOR ANTENNA AND SIW FILTER
NIKHAT FIRDOSE JAHAN DR. DOLA SANJAY & Dr. KASA CHIRANJEEVI
Page 7-14
| Paper TitleA STUDY ON DIELECTRIC RESONATOR ANTENNA AND SIW FILTERAbstractThe Substrate Integrated Waveguide (SIW) filter integration with dielectric resonator antenna (DRA) in millimeter-wave frequency range is presented. SIW is used to design the bandpass filter and serves as the feeding structure for DRA. Design integration with improved radiation efficiency is achieved by replacing the last resonator of the filter with DRA. The synthesis procedure is presented in detail. Equivalent circuit models are developed to facilitate optimizations of the design. In addition, integrated designs of parasitic DRA and DRA arrays with SIW filters are developed. KEYWORDS : SIW, DRA, bandpass dielectric, millimeter wave.
| | viewed : | 0 Downloads |
3.
PYTHAGOREAN THEOREM AN MATHEMATICAL WORLD - A STUDY
| Paper TitlePYTHAGOREAN THEOREM AN MATHEMATICAL WORLD - A STUDYAbstractThe Pythagorean Theorem has been the involving tension for the numerical world on account that its disclosure. It is by and large credited to Pythagoras, a Greek mathematician even albeit archeological evidence has referenced that Babylon, Egyptians, and Chinese people decided it sooner than him. It is because of the reality he was once the principal who uncovered this hypothesis to the world with the guide of referencing it obviously. The Pythagoras Theorem has numerous reasonable elements as it has reinforced numerous hardware and apparatus, all of which have in some shape framed this developing universe of our own. The hypothesis, which offers with the right-calculated triangle, has furthermore been utilized as a quintessential base for the overwhelming majority more regulations. In this query paper, I have composed numerous particular ways, which we can use to show the Pythagorean Theorem. These methodologies comprise of the famous Windmill verification which still up in the air by utilizing Euclid, the confirmation the spot we draw an elevation and use homes of comparability also known as evidence through comparative triangles, Garfield\'s confirmation which used not entirely set in stone by utilizing James Garfield, the 20th US president and the verification utilizing differentials which have been before arduous to show by means of
KEYWORDS : Pythagorean, Euclidean, Triangle, old, Babylon, Angles, Triangle, Windmill.
| | viewed : | 153 Downloads |
4.
COMPARATIVE ANALYSIS OF STEAM TURBINE PERFORMANCE
B. Venkateshwar Reddy Dr. P. C. Krishnamachary Dr. S. Chakradhar Goud
Page 23-28
| Paper TitleCOMPARATIVE ANALYSIS OF STEAM TURBINE PERFORMANCEAbstractThe analysis of performance of the steam turbine has been carried out and the heat rate is calculated to find out the deviation between the design and the trend in the present operation condition so that the losses can be reduced in order to obtain better efficiency. Here we have calculated Gross Heat rate and Turbine cycle rate and also considered the losses in high energy drains. This analysis helped in predicting the turbine efficiency deterioration level and listed out the preliminary cause of deterioration. KEYWORDS : Heat rate, turbine performance, efficiency, Steam turbine, deterioration level
| | viewed : | 114 Downloads |
5.
MARKETING METHODS SUBSTANTIALLY ENHANCED BY USING DATA MINING TECHNIQUES FOR FINANCIAL DATA ANALYSIS
Ritesh N Varma & Dr. Vinod M Vaze
Page 29-35
| Paper TitleMARKETING METHODS SUBSTANTIALLY ENHANCED BY USING DATA MINING TECHNIQUES FOR FINANCIAL DATA ANALYSISAbstractData mining is becoming important area for many corporate firms including banking industry. It is a process of analysing the data from numerous perspectives and finally summarize it into meaningful information, so data mining assists the bankers to take concrete decision. Objective of the project is to predict the fraud and fraud less transaction with respect to the time and amount of the transaction using classification machine learning algorithms and statistics and calculus (differentiation, chain rule etc) and linear algebra in building of the complex machine learning models for prediction and understanding of the data set. we have achieved accuracy of 94.84% using logistic regression and 91.62% using naive Bayes and 92.88% using decision tree and we step into deep learning to the continuous advancements in data mining, which is an interdisciplinary subfield of computer science and statistics, it has become significantly easier for the retail industry to improve customer service, acquire and retain new consumers by developing products in demand, and compete successfully in the marketplace. As a reason, data mining allows retail companies to analyse product sales trends, customer buying habits as well as preferences, delivery performance, customer peak traffic, and supplier lead times.
KEYWORDS : Data mining, Marketing Methods
| | viewed : | 107 Downloads |
6.
CYBER SECURITY MODELS IN CLOUD ENVIRONMENT
Ujenpad Siddeshwar Dr. Vishwajeet Goswami Dr.G.V.Subbarao
Page 36-40
| Paper TitleCYBER SECURITY MODELS IN CLOUD ENVIRONMENTAbstractCloud computing is an emerging paradigm of computing that replaces computing as a personal commodity by computing as a public utility. As such, it offers all the advantages of a public utility system, in terms of economy of scale, flexibility, convenience but it raises major issues, not least of which are: loss of control and loss of security. In cloud computing IT (Information Technology) related resources like infrastructure, platform and software can be utilized using web based tools and application through internet. Here Organizations are moving to the cloud computing some faster than others. However, moving to the cloud presents the organization with a number of risks to assess. Information security is the most critical risk for many organizations. KEYWORDS : Cloud computing, Cyber security
| | viewed : | 109 Downloads |