Emperor Journal of Applied Scientific Research最新文献

筛选
英文 中文
A Comparison on Strength Parameters of Different Types of Fibre Reinforced Concrete 不同类型纤维混凝土强度参数的比较
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2021.3801
R. Vijayan, S. Anbumeena, A. Rajeshwaran
{"title":"A Comparison on Strength Parameters of Different Types of Fibre Reinforced Concrete","authors":"R. Vijayan, S. Anbumeena, A. Rajeshwaran","doi":"10.35338/ejasr.2021.3801","DOIUrl":"https://doi.org/10.35338/ejasr.2021.3801","url":null,"abstract":"In this paper an undertaking is made to present the conceded consequences of a test examination did on hairfibre made concrete and Lathe fiber kept up with concrete. We have taken steel fiber from machine studio and hair fiber for this survey. Fiber content was separated from 1%, 2%, 3% and 4% by weight of cement. Effects of the expansion of these strands on the set properties of concrete were examined in M40 grade of concrete. The characteristics considered for assessment are compressive strength, split pliable and flexural strength. States of size 150 mm for compressive strength; light radiations 100 mm x 100 mm x 500 mm for flexural strength; work environments of 150mm width and 300mm length for split determination, were used as express depictions. The aggregate of the models were water diminished for 7, 14 and 28 days and tried as needs be.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129565122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing the Misinformation in Social Networks using Heuristic Greedy Algorithm 利用启发式贪婪算法最小化社交网络中的错误信息
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4703
Dr. M. Jaganathan, Arun Kumar, Keerthana, N.C Santosh Kumar, Shiva Teja
{"title":"Minimizing the Misinformation in Social Networks using Heuristic Greedy Algorithm","authors":"Dr. M. Jaganathan, Arun Kumar, Keerthana, N.C Santosh Kumar, Shiva Teja","doi":"10.35338/ejasr.2022.4703","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4703","url":null,"abstract":"In recent years, online social media has grown in popularity, and a vast volume of information has circulated over social media platforms, altering people's access to information. The credibility of information material is being questioned, and various types of misinformation are using social media to propagate quickly. The importance of network space administration and maintaining a trusted network environment cannot be overstated. In this paper, we look at a new challenge termed the activity minimization of misinformation influence (AMMI) problem, which involves removing a group of nodes from the network in order to reduce the total amount of misinformation interaction between nodes (TAMIN). To put it another way, the AMMI challenge is to choose K nodes from a given social network G to block in order to minimize the TAMIN.We demonstrate that the objective function is neither submodular nor supermodular, and we suggest a heuristic greedy algorithm (HGA) for removing the top K nodes.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131147955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covid-19 Analytics using Novel Method 使用新方法分析Covid-19
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4504
Valipi Ganesh, M. Jayachandra
{"title":"Covid-19 Analytics using Novel Method","authors":"Valipi Ganesh, M. Jayachandra","doi":"10.35338/ejasr.2022.4504","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4504","url":null,"abstract":"The intention of the assignment is to suggest information analysis of covid-19. Through plotting of records, various instances had been studied, like most affected international locations because of this pandemic. Study of facts from numerous international locations is mixed to reveal the boom of instances and restoration graph. In this undertaking, the predictions on various instances were accomplished and sooner or later, the accuracy of the set of rules has been decided. Comparison graphs have moreover been plotted to research how plenty INDIA is getting affected/get higher every day.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117177706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing cyber insurance policies: the role of prescreening and security interdependence 设计网络保险政策:预先筛选和安全相互依赖的作用
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4904
Ms. B. V. Anupama, A. Rani, S. V. Krishna, T. Sujay, P. D. Reddy
{"title":"Designing cyber insurance policies: the role of prescreening and security interdependence","authors":"Ms. B. V. Anupama, A. Rani, S. V. Krishna, T. Sujay, P. D. Reddy","doi":"10.35338/ejasr.2022.4904","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4904","url":null,"abstract":"For cyber hazard transfer, cyber coverage is a ability option. However, it's been proven that it can or might not boom community protection relying at the traits of the underlying surroundings. We're particularly inquisitive about factors of cybersecurity and the way they have an effect on settlement layout. The first is cybersecurity's interconnected individual, wherein one entity's degree of protection is decided now no longer simply through its personal funding and efforts, however additionally through the ones of others withinside the equal eco-machine (i.e., externalities). The 2d is that current breakthroughs in Internet size, paired with gadget gaining knowledge of approaches, now permit us to make specific quantitative tests of protection posture at a enterprise degree. This can be used to behavior a primary protection evaluation, or pre-screening, of a potential client with a purpose to enhance top rate discrimination and coverage formulation. We display that protection interdependency creates a \"earnings possibility\" for insurers, that is fueled through inefficient attempt tiers exerted through interdependent people that fail to account for hazard externalities. Security pre-screening then allows the insurer to take manipulate of this extra earnings possibility through designing the perfect contracts which incentivize marketers to make bigger their attempt tiers, permitting the insurer to “promote dedication” to interdependent marketers, except insuring their risks. We apprehend situations beneathneath which this sort of contracts results in now no longer simplest upward thrust in earnings for the major, however additionally an upgraded nation of community protection. For cyber hazard transfer, cyber coverage is a ability option. However, it's been proven that it can or might not boom community protection relying at the traits of the underlying surroundings. We're particularly inquisitive about factors of cybersecurity and the way they have an effect on settlement layout. The first is cybersecurity's interconnected individual, wherein one entity's degree of protection is decided now no longer simply through its personal funding and efforts, however additionally through the ones of others withinside the equal eco-machine (i.e., externalities). The 2d is that current breakthroughs in Internet size, paired with gadget gaining knowledge of approaches, now permit us to make specific quantitative tests of protection posture at a enterprise degree. This can be used to behavior a primary protection evaluation, or pre-screening, of a potential client with a purpose to enhance top rate discrimination and coverage formulation. We display that protection interdependency creates a \"earnings possibility\" for insurers, that is fueled through inefficient attempt tiers exerted through interdependent people that fail to account for hazard externalities. Security pre-screening then allows the insurer to take manipulate of this extra earnings possibility t","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123036774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image-Based Plant Disease Detection by Comparing Deep Learning and Machine Learning Algorithms 比较深度学习和机器学习算法的基于图像的植物病害检测
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4803
Dr A. Vishwanath, D. Swathi, Y. Srikanya, K. J. Basha, B. Ramanjaneyulu
{"title":"Image-Based Plant Disease Detection by Comparing Deep Learning and Machine Learning Algorithms","authors":"Dr A. Vishwanath, D. Swathi, Y. Srikanya, K. J. Basha, B. Ramanjaneyulu","doi":"10.35338/ejasr.2022.4803","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4803","url":null,"abstract":"Plant diseases area unit the most issue two-faced in agriculture. As population can increase, the assembly of plants in addition can increase and due to plant diseases it's going to have a control on the assembly of food.The traditional methodology used for illness detection is knowledgeable visual observation. but it's very sophisticated to go look out the illness manually as a result of the time interval and knowledge of the plant's diseases. So, it had been necessary to develop a system that detected the illness in less time and value effective manner.We discuss the employment of machine learning and deep learning to sight diseases in plants automatically.Using a public dataset of fifty four,306 photos of pathological and healthy plant leaves collected below controlled conditions, we have a tendency to tend to coach a deep convolutional neural network to identify fourteen crop species and twenty six diseases (or absence thereof). The trained model achieves academic degree accuracy of 9ty nine.35% on a held-out take a glance at set, demonstrating the practicability of this approach. Overall, the approach of coaching job deep learning models on additional and additional large and publicly out there image datasets presents a clear path toward smartphone-assisted illness identification on a huge world scale.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123066353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Fruits and Vegetables Recycling and Reuse System 网上水果和蔬菜回收和再利用系统
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4503
V. Sowjanya, Dr. N. Ramesh Kumar
{"title":"Online Fruits and Vegetables Recycling and Reuse System","authors":"V. Sowjanya, Dr. N. Ramesh Kumar","doi":"10.35338/ejasr.2022.4503","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4503","url":null,"abstract":"This paper pursuits to lessen the Traffic incidents entitled “ONLINE FRUITS AND VEGETABLES RECYCLING AND REUSE SYSTEM” . Online culmination and veggies recycling and reuse gadget refers back to the technique of creating reuse of unsold veggies and culmination.These unsold ones are processed in numerous bureaucracy through grading them in exclusive classes like healthy, 1/2 of spoiled and waste.In this we've got taken a few culmination like mango and custered apple for culmination for veggies, we've got taken Eggplant or brinjal and sour defend through appearing the deep mastering approach. CNN classify it as Grade A or Grade B or Grade C. Grade A kind Fruits are used to sale and vegetable used to make curries, B grade culmination or vegetable are used to make Pickles and ultimate grade used to make herbal fertilizers.The predominant goal of the gadget is to advantage the farmers for the unsold ones.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128342461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block chain Based Accounts Payable Platform For Goods Trade 基于区块链的货物交易应付账款平台
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4508
E. P. Kumar, Mr. Hemanth kumar
{"title":"Block chain Based Accounts Payable Platform For Goods Trade","authors":"E. P. Kumar, Mr. Hemanth kumar","doi":"10.35338/ejasr.2022.4508","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4508","url":null,"abstract":"In the prevailing paper, delivered a fuzzy weakly ordering the use of fuzzy metric area and fuzzy partial metric area.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122660996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Biometric Prediction and cyber-attacks experienced Using Deep Learning Model 使用深度学习模型进行面部生物识别预测和网络攻击
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4301
K. Manikandan
{"title":"Face Biometric Prediction and cyber-attacks experienced Using Deep Learning Model","authors":"K. Manikandan","doi":"10.35338/ejasr.2022.4301","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4301","url":null,"abstract":"Identify the Face biometric prediction by using digital image processing techniques as well as deep learning model. So we introduce image processing and deep learning technique to determine face at initial stage. Initially, the source images are collected from by using the U-Net based technique. And also extract the features from input image. Finally, classify the images as diseases affected or healthy as classify by using Deep Convolution Generative Adversarial Network (DCGAN). In this proposed model, experimentation is conducted using the python Open CV model, and the performance is evaluated using different performance measures, which is designated in the result section. During the feature extraction process, the threshold values are also dynamically modified. The CNN's advantage is clear because of the uncertainty caused by noise. In the proposed method, 97.94 percent of the data was correctly classified.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plan and Implementation of a Secure QR Payment System Based on Visual Cryptography 基于视觉密码的安全QR支付系统的设计与实现
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4402
K. Ganesh, Dr. N. Naveen Kumar
{"title":"Plan and Implementation of a Secure QR Payment System Based on Visual Cryptography","authors":"K. Ganesh, Dr. N. Naveen Kumar","doi":"10.35338/ejasr.2022.4402","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4402","url":null,"abstract":"In this paper, we are able to depict the plan and execution of a secure installment framework in mild of QR codes. These QR codes were widely applied currently in view that they boost up the installment cycle and provide customers with excessive comfort. Nonetheless, as effective as they could sound, QR-primarily based totally net-primarily based totally installment frameworks are defenseless towards diverse types of assaults. Thusly, alternate managing must be accurately stable to shield the trustworthiness and secrecy of every and each installment cycle. Additionally, the net-primarily based totally installment framework must supply validness to each the shipper and collector of each alternate. In this paper, the safety of the proposed QR-primarily based totally device is given the use of visible cryptography. The proposed device consists of a bendy software and a component entryway server that does visible cryptography. The software offers an critical and simple factor of interplay for customers to complete component trades in honest stable environment.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131729177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Based Solution for an Effective Credit Card Fraud Detection 基于机器学习的有效信用卡欺诈检测方法
Emperor Journal of Applied Scientific Research Pub Date : 1900-01-01 DOI: 10.35338/ejasr.2022.4907
M. Kumar
{"title":"Machine Learning Based Solution for an Effective Credit Card Fraud Detection","authors":"M. Kumar","doi":"10.35338/ejasr.2022.4907","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4907","url":null,"abstract":"Credit card utilization has been growing with the emergence of e-trade and different programs that permit bills to be made on-line. However, whilst credit score card is stolen or any fraudulent interest takes place, it effects in monetary issues to the cardboard holders. It additionally reasons problems to the provider of playing cards. Therefore, it's far crucial to have a mechanism to stumble on fraudulent on-line transactions. In this regard, there exists many answers as located withinside the literature. One such technique is to have ancient transactions divided into fraudulent and non-fraudulent transactions. This ought to assist educate classifiers to stumble on or suspect fraud transactions. These answers focused spending conduct of clients so that you can stumble on opportunity of fraud. In the present device, statistics mining method is accompanied with random forests to version the conduct of ordinary and fraudulent transactions for credit score card fraud detection. The trouble with the version is that it really works best with dataset this is best tuned. If dataset isn't always good, its overall performance is deteriorated. To conquer this trouble, on this project, a characteristic choice set of rules is proposed to beautify the overall performance of classifier. The proposed device additionally could have comparative have a look at with more than one classifiers like Random Forests and SVM to assess the characteristic choice technique","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133921730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信