IJRAR(ISSN 2348 –1269, Print ISSN 2349-5138 ) | UGC Approved Journal | UGC Journal | UGC

International Journal of Research and Analytical Reviews (IJRAR)

International Peer Reviewed, Open Access Journal

E-ISSN 2348-1269, P- ISSN 2349-5138 | ESTD Year: 2014

UGC and ISSN Approved and added in the UGC Approved List of Journals .

Login to Author Home
IJRAR.COM Old Paper
Repository

  IJRAR Search Xplore - Search by Paper id, Published paper id, Paper Name , Author Name, and Paper Title
Search Your Paper Details.

All Published Paper Digital Library Search Through below Search Option.

  IJRAR Search Xplore - Search by Paper Name , Author Name, and Title
All Published Paper Details Search Through Above Search Option.

The INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS (IJRAR) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

INTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS (IJRAR)
E-ISSN 2348-1269, P- ISSN 2349-5138 | Impact factor: 5.75 | ESTD Year: 2014 | UGC and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Publication.
Call For Paper (Volume 6 | Issue 2 | Month- May 2019)

Volume 6 | Issue 2

  Paper Title: STUDY ON FERROCEMENT SLAB WITH DIFFERENT MESHES FOR FLEXURE AND PUNCHING SHEAR

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP049

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP049

  Register Paper ID - 197862

  Title: STUDY ON FERROCEMENT SLAB WITH DIFFERENT MESHES FOR FLEXURE AND PUNCHING SHEAR

  Author Name(s): Mr. Banduke.K.V, Prof. Narule G. N

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 192-195

 Year: May 2019

 Downloads: 100

 Abstract

Ferrocement is a form of reinforced concrete using nearly spaced multiple layer of galvanized iron wire mesh applying on frame of skeletal bar and completely infiltrated in rich cement mortar. It is durable and cheap material. The main objective of this experiment is to behavioural study on ferrocement slab under flexure loading and punching shear strength between chicken and square welded mesh. Also various parameters are effect of volume fraction, effect of panel thickness and load-deflection relationship considered in this study. Test result shows that specimen reinforced with square welded mesh gives high flexural strength and specimen reinforced with chicken mesh exhibit highest punching shear strength. Specimen with high volume fraction has highest stiffness but less ductility and increase in slab thickness leads to decrease in deflection and more stiffness.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Ferrocements,meshes etc

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CORROSION MONITORING OF RCC STRUCTURE BY USING CORROSION EXPANSION SENSOR

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP048

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP048

  Register Paper ID - 197863

  Title: CORROSION MONITORING OF RCC STRUCTURE BY USING CORROSION EXPANSION SENSOR

  Author Name(s): Ms. Aparna Jagtap

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 187-191

 Year: May 2019

 Downloads: 61

 Abstract

Corrosion of embedded reinforcing steel and the complication of concrete structures is a worldwide problem. Damages due to corrosion reduces the service life of structures and can create serious problem. Visual inspections are not effective for knowing the initiation of corrosion because most of the damage remains observed until cracking and spalling of the concrete occur. Traditional techniques for determining the presence and rate of corrosion are expensive and difficult to find out. The sensors would be installed in new construction or in new portions of rehabilitated structures. The positioned of reinforcing steel adjacent before concrete placement. If corrosion is detected, an owner can take action against corrosion and pretend the service life of the structure. In this project, corrosion expansion sensors were used to monitoring the rate of corrosion in reinforced concrete beam with the help of strain calibration experiment, sensitivity measurement, corrosion mass loss rate and material composition with the help of Minitab software. It is not possible to take the long life result from traditional methods of monitoring the corrosion in structure but corrosion monitoring by using embedded sensors is improved the response latency. Experimental and analytical work used in this project gave the good comparative results for corrosion monitoring.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Reinforced concrete structure, reinforcement corrosion, corrosion sensor, sensitivity.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SEISMIC BEHAVIOR OF STEEL PLATE SHEAR WALLS FOR RC STRUCTURES

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP046

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP046

  Register Paper ID - 197865

  Title: SEISMIC BEHAVIOR OF STEEL PLATE SHEAR WALLS FOR RC STRUCTURES

  Author Name(s): Mr. Karande A. T, Mr.Valekar N.S.

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 186-186

 Year: May 2019

 Downloads: 41

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Steel Plate, Concrete Shear Wall, Experimental Study, Seismic Behavior

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FEATURE EXTRACTION TECHNIQUES FOR NUMBER PLATE DETECTION

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP045

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP045

  Register Paper ID - 197866

  Title: FEATURE EXTRACTION TECHNIQUES FOR NUMBER PLATE DETECTION

  Author Name(s): Swati Amol Kadam

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 182-185

 Year: May 2019

 Downloads: 41

 Abstract

Vehicle identification plays important role in Intelligent Transportation System. Vehicle is identified uniquely by its number plate. It is used for applications like identification of authorized vehicles, providing controlled access to restricted areas, and law enforcement.Number plate detection is the most important step of vehicle identification. The result of vehicle identification depends on number plate detection. Feature extraction is the important step in pattern recognition. The performance of the system depends upon feature extraction technique. It is necessary to select and extract relevant features for improving the performance of the whole system.The proposed system will use feature extraction technique using Histogram of Oriented Gradient and Hough Transform. The system will check the performance of these algorithms for number plate detection.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Feature Extraction, Histogram of oriented Gradients, Image Processing, Number Plate Detection, Pattern Recognition.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SURVEY ON SCENE TEXT RECOGNITION BY USING EE-MSER AND OCR FOR NATURAL IMAGES

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP044

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP044

  Register Paper ID - 197867

  Title: SURVEY ON SCENE TEXT RECOGNITION BY USING EE-MSER AND OCR FOR NATURAL IMAGES

  Author Name(s): Prof. Bere Sachin S. , Prof. Rajpure Amol S.

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 178-181

 Year: May 2019

 Downloads: 26

 Abstract

Content in Natural Images contains a significant data about scene, pass on the data about what is really portrayed in the pictures. Content extraction is testing errand as a result of content may be in various style, distinctive text style, light condition, low quality, surface disfigurement, complex foundation and so on. In this paper proposes a two technique one is EE-MSER for Text Detection and OCR for Text Recognition. In EE-MSER, by utilizing geometric and stroke width data the letter applicants are sifted to prohibit non-content area. OCR strategy takes the distinguished content part and gives the perceived content. Investigations on ICDAR 2003 Robust Reading character dataset and CHAR74k dataset demonstrates that proposed system perform very much contrasted and different strategies.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

text detection; text recognition; complex background; edge-enhanced maximally stable extremal regions (EE-MSER), Optical Character Recognition.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: THE SURVEY PAPER ON NETWORK SECURITY WITH ITS THESAURUS ATTACKS AND FEASIBLE SECURITY TECHNOLOGY

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP043

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP043

  Register Paper ID - 197868

  Title: THE SURVEY PAPER ON NETWORK SECURITY WITH ITS THESAURUS ATTACKS AND FEASIBLE SECURITY TECHNOLOGY

  Author Name(s): Amol S.Rajpure, Sachin S. Bere

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 171-177

 Year: May 2019

 Downloads: 27

 Abstract

Security is an essential part in the registering and systems administration innovation. The as a matter of first importance thing of each system structuring, arranging, fabricating, and working a system is the significance of a solid security strategy. System security has turned out to be increasingly essential to PC clients, associations, and the military. With the coming of the web, security turned into a noteworthy concern. The web structure itself took into account numerous security dangers to happen. System security is happening to extraordinary significance on account of protected innovation that can be effectively procured through the web. There are various types of assault that can be when sent over the system. By knowing the assault strategies, takes into account the suitable security to rise. Numerous organizations secure themselves from the web by methods for firewalls and encryption components. There is a lot of individual, business, military, and government data on systems administration foundations worldwide and these required diverse security instruments. In this paper, we are endeavoring to think about most various types of assaults alongside different various types of security instrument that can be connected by the need and design of the system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Network Security, attacks, hackers, Cloud-environment security, zero-trust model (ZTM), Trend Micro internet security.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RECOGNIZE AND EVALUATE SECURITY FRAMEWORK OF CLASSIFIER UNDER ATTACK

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP042

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP042

  Register Paper ID - 197869

  Title: RECOGNIZE AND EVALUATE SECURITY FRAMEWORK OF CLASSIFIER UNDER ATTACK

  Author Name(s): Miss. Kale Tai

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 167-170

 Year: May 2019

 Downloads: 28

 Abstract

Pattern classification is a part of machine learning that focuses on recognition of patterns and Pattern classification system are used for the biometric authentication, spam filtering, and network intrusion detection. The biometric authentication, spam filtering, and network intrusion detection is an adversarial applications. Biometric system is a tool for person identification and verification. The paper proposed, evaluation the security of pattern classifiers that formalizes and generalizes the main ideas proposed in the literature and give examples of its use in three real applications. The paper proposes a framework for evaluation of pattern security, model of adversary for defining any attack scenario. The paper presents a design of a system for identification and design security evaluation framework of classifier under attack using biometric system, biometric authentication System, spam filtering, and network intrusion detection.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Adversarial Classification, Adversarial Scenario, Pattern classification, Security Evaluation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NON-CRYPTOGRAPHIC PRIVACY PRESERVATION IN DATA MINING

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP041

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP041

  Register Paper ID - 197870

  Title: NON-CRYPTOGRAPHIC PRIVACY PRESERVATION IN DATA MINING

  Author Name(s): Miss.Deokate Vasudha Balaso, Mr. Nagare Popat Harishing

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 162-166

 Year: May 2019

 Downloads: 27

 Abstract

Through data mining system can extract knowledge from large amount of data in many large companies and organizations. So from such a large collection of data there generates some problem with related to the privacy. The privacy is main factor used in many large organizations like medical database, business interests and personal interests. The collected data may contain private and sensitive data which should be protected from world .The privacy protection is an important issue of any organization. If any organization release data of outside world for sharing purpose. Privacy preserving data mining approaches allow publishing data for the mining purpose while at that time preserve the private data of the personalize. The proposed system is a very simple and efficient approach for Privacy preserving data mining. Cryptographic techniques protect sensitive data with less information loss. Not only the data usability but also complexity increase and also protect the sensitive data for various types of unauthorized user.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Data mining, Sensitive data, Privacy preserving.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW ON INTELLIGENT WATER QUALITY MANAGEMENT SYSTEM USING IOT

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP040

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP040

  Register Paper ID - 197871

  Title: A REVIEW ON INTELLIGENT WATER QUALITY MANAGEMENT SYSTEM USING IOT

  Author Name(s): Prof.Rajpure A.S, Miss.Salunke Dhanshri, Miss.Bhagat Priyanka, Mr. Rupnawar Abhijeet, Miss.Kshirsagar Poonam

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 159-161

 Year: May 2019

 Downloads: 32

 Abstract

This project focuses on monitoring and control of use of water in a society. Water is an important resource and must be used carefully. To implement this we are using water level sensor, water flow sensor, ph sensor and arduino board. The sensors will sense the flow of water to each pipe which ultimately tells the usage of water at one block ideally. This water usage data would be sent to cloud using the IOT space. This local cloud data would be sent to the concerned persons mobile application reporting the water used and alerting the user to limit the water use if it gets extended to the limit usage set by municipal government or corporation. If the limit gets extended the user have to pay accordingly. This will be real time operation. The objective of doing so is for limiting and minimizing the usage of water for an average of per person. And secondly, the cloud data will be used as statistic data for use of water at every seasons that is winter, summer and monsoon so that measuring steps for water management can be taken with the appropriate statistics, yielding an avenue for predictive measure. Keywords: IOT, Water resources, Water management, limiting use, statistics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

water quality; pH; turbidity; temperature

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: LOAD BALANCING ENERGY EFFICIENT PROTOCOL FOR WIRELESS SENSOR NETWORK

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP039

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP039

  Register Paper ID - 197872

  Title: LOAD BALANCING ENERGY EFFICIENT PROTOCOL FOR WIRELESS SENSOR NETWORK

  Author Name(s): Mrs.Nevase Tanuja S, Mr.Takale Dattatray G, Prof.Dhage Shrikant N

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 153-158

 Year: May 2019

 Downloads: 24

 Abstract

Wireless detector network is energy constraint network. The life of a network is outlined by the life of initial such that proportion of dying nodes. Load leveling may be method to equalize energy consumption of all nodes and this manner all nodes can degrade along. By load leveling, the life of the network doesn't rely solely on the lifetime of weak node but depends on the life all nodes within the network that helps to increase the lifetime of the network. during this paper, we tend to examine the proposed load leveling algorithms for wireless detector networks. Load leveling will be accustomed extend the life of a detector network by reducing energy consumption. Load leveling exploitation clustering also can increase network quantifiability. Wireless detector network with the various energy levels nodes will prolong the lifetime of the network and additionally its liableness. We tend to discuss the improvement to be created for future planned load leveling schemes. This paper provided the reader with the idea for research in load leveling schemes for wireless detector networks


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wireless sensor network, aggregation, data precision, residual energy, network lifetime

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW ON DIGITALIZATION IN INDIA USING RFID TECHNOLOGY WITH INTERNET OF THING

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP038

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP038

  Register Paper ID - 197873

  Title: A REVIEW ON DIGITALIZATION IN INDIA USING RFID TECHNOLOGY WITH INTERNET OF THING

  Author Name(s): Prof.Takale D.G, Miss.Yogita Pardeshi, Miss.Hole Dipali, Mr.Shelar Nilesh

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 149-152

 Year: May 2019

 Downloads: 28

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Digital signature, Access control, RFID, Smart cards

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW ON RETRIEVE WEB FACIAL IMAGES FOR SEARCH-BASED FACE ANNOTATION

  Publisher Journal Name: IJRAR

  DOI Member: 10.6084/m9.doi.one.IJRAR1AIP037

  Your Paper Publication Details:

  Published Paper ID: - IJRAR1AIP037

  Register Paper ID - 197874

  Title: A REVIEW ON RETRIEVE WEB FACIAL IMAGES FOR SEARCH-BASED FACE ANNOTATION

  Author Name(s): Prof.Bere S. S, Miss.Vachkal Tejaswi, Miss.Jagtap Puja, Mr.Pawar Rajesh

 Publisher Journal name: IJRAR

 Volume: 6

 Issue: 2

 Pages: 144-148

 Year: May 2019

 Downloads: 26

 Abstract

This system investigates a framework of search-based face annotation by mining weakly labeled facial images that are freely available on the World Wide Web (WWW). One challenging problem for search-based face annotation scheme is how to effectively per- form annotation by exploiting the list of most similar facial images and their weak labels that are often noisy and incomplete. To tackle this problem, system propose an effective unsupervised label reftnement (ULR) approach for reftning the labels of web facial im- ages using machine learning techniques. This system formulates the learning problem as a convex optimization and develops effective optimization algorithms to solve the large- scale learning task efficiently. To further speed up the proposed scheme, also propose a clustering-based approximation algorithm which can improve the scalability considerably.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Face annotation, Content-based image retrieval, Machine learning, Label re- ftnement, Web facial images, Weak label

  License

Creative Commons Attribution 4.0 and The Open Definition

Visitor Statistics
IJRAR.ORG
ISSN
E-ISSN 2348-1269,
P- ISSN 2349-5138
UGC ISSN APPROVED
Journal Starting Year (ESTD) : 2014
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content