Browse Items (11810 total)
Sort by:
-
Passive control of four storied reinforced concrete structure subjected to blast loads
In the recent past in major cities all over the world, public structures are vulnerable to blast loads caused by explosions either accidentally or intentionally. The intentional causes are not on hardened military targets but on important civilian structures, like commercial, financial and civic centers. The study of reinforced concrete Ground + 3 Storied structure subjected to blast loads have gained importance, as conventionally the reinforced newlineconcrete structures are not designed for blast loads as many of the loading codes do not mandate for the same and also due to the fact that quantifying the magnitude of the blast load is difficult to estimate. However, the structures are susceptible to damage from the explosion. To protect the life of people and to minimize the damage to the structure, it has become imperative to consider the effect of blast loads too, in addition to newlinethe conventional loads, considered as per the prevailing codes, during the analysis and design of all public buildings. The charge weights of the explosive used on the structure are 8kg, 16 kg and 24kg. The equivalent blast pressure subjected on the structure is determined, to study its corresponding effects for stand-off distances of 3000 mm and 6000mm using surface blast load. The behavior of the structure is newlinestudied by varying the parameters and verified which of these parameters can newlinebe critical to the performance of the structure. The response of the ground floor + 3 upper storied reinforced concrete skeletal structure is studied for understanding the variation of the displacements, strains and stresses for the parameters considered. Using PTC CREO 3.0 the 3D modeling of structure and structural elements were generated. HYPERMESH was used for the discretization (meshing) of structure and its elements. Static analysis and blast load analysis was carried out using ANSYS. -
Comparative analysis of original movies and its remakes in India /
The remake is a phenomenon both well-known and immediately recognizable but in India it is not theoretically analyzed. However, by analyzing these remakes, we can understand how these films reflect some specific cultural differences between one state and other State in India. Here researcher has taken four original and its remake films to understand the phenomena of remake. The highly intensed watching the films has helped researcher to understand the difference of films original and remakes. Researcher took one Tamil Movie and its remake in Hindi and also a Malayalam Movie and its remake in Tamil. Films are Tamil Singam to Hindi Singam and Malayalam Manichithrathazhu to Tamil Chandramukhi. -
Method for face-recognition on the basis of sketch using deep convolution neural network /
Patent Number: 201941045946, Applicant: Dr. Debabrata Samanta.
The present invention relates to method for face- recognition on the basis of sketch using deep convolution neural network. The objective of the present invention is to overcome the inadequacies of the prior art in techniques for face- recognition on the basis of sketches. -
Intelligent deep-well rescue system using ultrasonic sensors /
Patent Number: 201941048191, Applicant: Dr. Debabrata Samanta.
The present invention is related to an intelligent deep-well rescue system using ultrasonic sensors. The system for rescue a human in a narrow diameter deep-well (bore-well) comprises an ultrasonic sensor module, a grappling module, a central computing unit. The objective of the present invention is to solve the problems of the prior arts in solving issues of rescue of human being from the deep-well or bore well. -
Biometrically activated self defense device for women safety /
Patent Number: 20194103621, Applicant: Dr. Debabrata Samanta.
The present invention is related to biometrically activated self-defense device for women safety. The wearable personal self-defense and altering device, comprises a biometric unit, and portable source of electrical energy, an electric discharge unit and a processing unit configured to connect a mobile computing device. -
Novel booster control system for fully automotive driverless vehicle /
Patent Number: 201941039882, Applicant: Dr. Debabrata Samanta.
The present disclosure presents a novel electronic booster control system for fully automotive driverless vehicle. The it discloses a system of vacuum booster with an automotive air compressor system which comprises a compression piston, a power transmission component and a power input part with integrated to plurality of sensors , servo controllers and a central control module of the fully automotive driverless vehicle. -
Fuzzy logic based system of intelligent electric solar dyer for fruits /
Patent Number: 201941032820, Applicant: S Vairachilai.
The present invention is related to a system of intelligent electric solar dyer for fruits using fuzzy logic based algorithm processed by at least one processor of a central processing unit of the system. -
Secured automated voice controller based on security parameters /
Patent Number: 202241001260, Applicant: Jabez samuel F.
A smart home security system (700) comprising: a wearable (701) worn by a family user, wherein the wearable (701) comprises: sensors (711a-711e) configured to sense signals representing security parameters of the registered family user; a location detector (712) configured to detect real-time coordinates the family user. -
Covid monitoring system based on sensed health parameters /
Patent Number: 202141032212, Applicant: Dr. Nimson Rio R.
A covid monitoring system (100), the system (100) comprising: a wearable (102) to be worn by a primary user, wherein the wearable (102) comprises: sensors (122a-122n) configured to sense signals representing health parameters of the primary user; a location detector (124) configured to detect real-time coordinates of the primary user; a controller (130) configured to. -
Artificial Intelligence - Based Steganography Model for Social Media Data Set
Steganography, one of the data security mechanisms under our investigation, shields legitimate messages from hackers and spies by employing data hiding. Data protection is newlinecurrently the top priority due to the signifcant advancements in information technology due to high-security concerns. Traditional techniques for maintaining data confdentiality include steganography and cryptography; the distinction is that steganography does not naturally arouse suspicion, whereas cryptography does. Traditional linguistic steganographic methods suffer from limitations in automation, accuracy, and the volume of concealed text. The robustness and undetectability properties of these approaches also require improvement. Third-party vulnerability is often too high for conventional techniques to handle. Artifcial intelligence is increasingly replacing traditional model creation in steganography. Despite the fact that steganography ensures security, information sent over online social networks (OSN) is plainly not safe. Steganography along newlinewith encryption can make a difference with regard to privacy of information in transit. newlineThe research study aims to build algorithms or models and assess steganography s robustness, security, undetectability, and embedding ability. Two distinct types of data newlineconcealing employed for investigation: text and image. The results were encouraging newlinewhen we initially tested our Laplacian model using image steganography and compared newlinewith benchmark methods. The second experiment, which is based on AI, generates the cover text using secret information, examines the security and robustness of steganography. The study compared suggested text steganography model, 3-bit data concealing, with other existing techniques in order to ascertain the undetectability factor. The frst experiment used MATLAB tools, and the second used the markovify python module, RNN (Recurrent Neural networks), and the Huffman tree. Further format-based steganography methods utilized in the following experiment. -
Web User Access Log Analytics Using Neural Learning, Regression and Logit Boost Clustering Techniques for Accurate User Behavioural Pattern Identification
Web Usage Mining (WUM), is the process of mining user behaviour patterns from huge log fles. Weblogs provide substantial input to learning the identity of an online user. Analysis of these patterns extracted from the weblog datasets is currently being explored by various researchers. Due to the recent advent of automation, mining patterns from weblogs are automated. These automated mining processes focus on browsing habits and usage patterns. To make this process of gathering better, there are many ways to look at how users act and put them into relevant groups.Identifying, detecting, and classifying features that demarcate specifc traits that are related is an important task. Conventional research is designed to discover web usage mining strategies through clustering and classifcation methods. However, there is a need to focus on and improve the accuracy of the prediction systems that classify acquired features to fgure out the patterns of web users. Deep learning methods are used to mine weblog data to improve accuracy and precision. To improve user behaviour pattern mining, a two-level clustering process is introduced as Ensemble Fuzzy K-Means with Logit Boost Clustering (EFK-LBC) technique to extract the weblog. In this technique, a preprocessing step is included to remove redundant data and choose reliable log fles. The Fuzzy-K means clustering technique is used to identify behavioural patterns exhibited by recurrent users. Finally, the Logit Boost Clustering method is introduced to the data,that help in generating a strong cluster. Clustering of web users frequent behavioural patterns using the Logit Boost ensemble technique helps the proposed EFK-LBC method to improve newlinethe accuracy up to 88% and reduce the clustering time by 20% compared with existing approaches. Though the proposed EFK-LBC technique performs better for user identifcation, the different initialization of clusters provides various fnal clustering results. -
Fingerprint based authentication model to protect the sim card of the mobile /
"Patent Number: 201941048500, Applicant: Dr. Gobi R.
Mobile becomes an essential part of our life, and it is also an inevitable medium for communication in the present era. It keeps us connected from mail access, travel booking, etc. The amount of personal information and sensitive information like username, password, and transaction details are routinely stored in the device. There is a possibility of information access when the thief steals the Mobile. It is a massive data loss for the mobile owner, especially private information. -
Agriculture water purifying device /
Patent Number: 363685-001, Applicant: S Nithyananthi. -
A system for regulated distributed deep learning in cloud and smart mobile devices /
Patent Number: 202121025112, Applicant: Supriya Prashant Diwan.
The system in the present invention keeps the private data locally in smartphones, shares trained parameters and builds a global consensus model. The feasibility and usability of the proposed system are evaluated by three experiments and related discussion. The experimental results show that the distributed deep learning system can reconstruct the behavior of centralized training. We also measure the cumulative network traffic in different scenarios and show that the partial parameter sharing strategy does not only preserve the performance of the trained model but also can reduce network traffic. -
Machine learning based EEG signal processing for smart patient monitoring system /
Patent Number: 202141022214, Applicant: Dr. Ganesh Kumar R.
In the current pandemic situation, patients with critical diseases are lacking immediate care which would reduce the mortality rate. This invention focuses on continuous monitoring of patient™s EEG signals for occurrence of any seizures in brain signals. This system is designed using machine learning algorithm for resource optimization thereby implemented using VLSI technology. -
IOT based plant disease detection using support vector machine algorithm /
Patent Number: 202021050705, Applicant: Dr. Chaitanya Singh.
Internet of Things integrated with image processing paves new ways for monitoring plant health and actuating response based on recent development of technologies. Early detection of plant diseases and its classification utilizes image processing along with analysis of environmental data which will help farmers to maximize their yield by producing healthy plants as plant diseases are eradicated at the initial stage. -
Automatic smart attendance management system based on face recognition using deep learning /
Patent Number: 202141025155, Applicant: J Omana.
In this digital era, face recognition system plays a vital role in almost every sector. Face recognition is one of the mostly used biometrics. It can used for security, authentication, identification, and has got many more advantages. Furthermore, face recognition system can also be used for attendance marking in schools, colleges, offices, etc. The conventional method of calling name of each student is time consuming and there is always a chance of proxy attendance. -
Development of an intelligent health monitoring system integrated with mobile application through IOT /
Patent Number: 202041053102, Applicant: Dr.A.Narasima Venkatesh.
An Intelligent health measuring system measures the vital health parameters like blood pressure, heart beat blood sugar, body position and temperature of the user or the patient. The non-invasive sensors are used to measure the health parameters easily without causing any disturbances to the patient or the user. -
Smart tie for monitoring school students to predict from kidnappers /
Patent Number: 202141001076, Applicant: Dr. R Jegadeesan.
Kidnaping is a illegal offense entailing of the unlawful taking and carrying away of a person by force or fraud. More recently, students kidnapping for the purpose of extortion. Parents always try to ensure that their kids are safe and secure. It has challenged various security agencies to maintain law and order in the country. Due to increase in the crime rate since the past few decades, parents are feeling unsafe in an outside environment for their kids.