{"title":"Durability Study on Fly Ash Aggregate Concrete with Respect to Carbonation Test","authors":"P. P, S. Gunasekar, Anju .M .J","doi":"10.35338/ejasr.2021.3701","DOIUrl":"https://doi.org/10.35338/ejasr.2021.3701","url":null,"abstract":"In this project, the durability of concrete with fly ash aggregates (FAA) is studied. M20 Grade concrete is selected and designed as per IS method. The project's major goal is to use (FAA) fly ash aggregates to replace traditional fine and coarse aggregates. Cement and fly ash are mixed in proportions of 10:90, 12.5:87.5, 15:85, 17.5:82.5, 20:80, and 22.5:77.5 to make fly ash aggregates. The specimen cubes will be caste and tested for corrosion depth, workability, pull out strength and pH value of concrete at the end of 7, 14 and 28-days curing. Fine aggregate and coarse aggregates were substituted with fly ash aggregates in all of these experiments. From the results, the conclusions were drawn. KeywordsFly Ash Aggregates, Fine Aggregate, Coarse Aggregates, Strength.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131967840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of coconut shell waste based paver blocks and concrete: A Review","authors":"M. R., S. N, P. S, N. S. Rao","doi":"10.35338/ejasr.2021.3901","DOIUrl":"https://doi.org/10.35338/ejasr.2021.3901","url":null,"abstract":"We have a propensity in this article to examine using coconut shell as a coarse aggregate in concrete. Due to increased need for construction materials for infrastructure, we will employ coconut shell as an alternative ingredient inside the concrete paver block mix. This paper looks at how coconut shell waste can be used to make paver blocks. The qualities of concrete that have been combined with coconut shell are examined and associated to related standards. The analysis of literature revealed that waste from coconut shell has a noticeable potential as a partial replacement for conventional materials, as most of the created products meet the specifications. There is little research on durability, low density, and thermal qualities, though. As a result, compressive strength, durability strength, and split tensile strengths were used to summaries the various types of tests depending on days. Cement concrete, which also comprises fine and coarse particles, plays an essential role among low-cost construction materials. Coconut shell is one of the waste materials come from coconut plant that can be utilized in concrete as a rough mix.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114607707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Efficient Biometric-Based Access for Secured Cloud Services","authors":"Mr. G. Vikram, A. Deepak, P. Shekhar, P. Karthik","doi":"10.35338/ejasr.2022.4804","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4804","url":null,"abstract":"In our data-driven culture, the need for remote data storage and computing services has grown exponentially, requiring secure access to such data and services. This study proposes a new biometric-based authentication system for secure access to remote (cloud) servers. The proposed approach treats the user's biometrics as confidential credentials. It then uses the user’s biometric data to generate a unique ID and uses it to generate the user's private key. In addition, we present an efficient way to generate session keys for secure messaging between two interlocutors using two biometric templates. That is, you don't have to store your private and session keys somewhere. The proposed approach follows formal security analysis using detailed RealorRandom (ROR) model-based formal security analysis, informal (unmathematical) security analysis, and widely accepted automated Internet security verification., Can withstand multiple known attacks against (passive / active) attackers. Protocol and application (AVISPA) tools. Finally, numerous and comparative studies have shown the effectiveness and usefulness of the proposed approach.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130758842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing File sharing System in cloud environment using AES Algorithm","authors":"B. Nagesh, K. Kavitha","doi":"10.35338/ejasr.2022.4507","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4507","url":null,"abstract":"In the prevailing paper, delivered a fuzzy weakly ordering the use of fuzzy metric area and fuzzy partial metric area.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129988718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Study of Sugarcane Bagasse Ash and Quarry Dust in Partial Replacement of Brick Material","authors":"P. P, S. Gunasekar, Anju .M .J","doi":"10.35338/ejasr.2021.3802","DOIUrl":"https://doi.org/10.35338/ejasr.2021.3802","url":null,"abstract":"","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":" 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132187718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Partial Ordering","authors":"Kuleep Kandwal","doi":"10.35338/ejasr.2022.4406","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4406","url":null,"abstract":"In the expansive paper, added a cushioned fragmentary outlines and forsakenly demand the usage of warm assessment area and content with lacking assessment locale.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134274597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. S. Kumari, Hemant Kumar, S. Ahmed, J.Subha Sree, Josna Sravani
{"title":"Evaluating Descriptive Answer Using Machine Learning And Natural Language Processing","authors":"T. S. Kumari, Hemant Kumar, S. Ahmed, J.Subha Sree, Josna Sravani","doi":"10.35338/ejasr.2022.4905","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4905","url":null,"abstract":"Assessment of the descriptive paper is a tough challenge. It requires lot of man power. In educational institutions a primary hassle is evaluation of descriptive type questions & answers. Using NLP this descriptive answer assessment proper answers and the pupil answer scripts. More marks is probably awarded, if the similarity withinside the answers is more. There are several advantages of using this automated assessment device as it permits in decreasing the time concerned about the resource of the usage of faculty to correct the descriptive papers. The examinations can be accomplished online, the answers can be evaluated right now and it would be beneficial for universities, schools and schools for academic purpose with the resource of the usage of presenting ease to colleges and the examination evaluation cell.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rough Interval Valued Intuitionistic Fuzzy Ideals in Γ - Semigroups","authors":"V. Subha, P. Dhanalakshmi","doi":"10.35338/ejasr.2021.3501","DOIUrl":"https://doi.org/10.35338/ejasr.2021.3501","url":null,"abstract":"The spot of this paper is to present the opportunity of earth shattering stretch regarded intuitionistic cushioned fixations in ᴦ a few its properties. We other than show the chance of repulsive freedom regarded intuitionistic cushioned left (right, two-sided, bi-,(1,2)) appraisals in ᴦ a couple of properties of these norms..","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128089510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anuradha Reddy, K. Bindu, K. A. Kumar, J. Yashwant, J. Adarsh
{"title":"Future Methods Of Managing Privacy And Data Security At The Technical Age Cashless Society","authors":"Anuradha Reddy, K. Bindu, K. A. Kumar, J. Yashwant, J. Adarsh","doi":"10.35338/ejasr.2022.4906","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4906","url":null,"abstract":"Financial transactions in a cashless global are carried out the usage of virtual statistics in place of real banknotes or coins (commonly an digital illustration of cash). [1] Cashless civilizations have existed for the reason that sunrise of human civilization, primarily based totally on barter and different varieties of exchange, and cashless transactions at the moment are possible utilizing credit score playing cards, debit playing cards, cellular bills, and virtual currencies which include bitcoin. However, this newsletter makes a speciality of the term \"cashless society\" withinside the feel of a motion toward, and implications of, a society wherein coins is changed with the aid of using its virtual equal—in different words, criminal tender (cash) exists, is recorded, and is most effective traded in digital virtual form. A few publications of movement may be coupled to attain a everlasting and applicable result for customers in a cashless society to boom privateness: A new kind of banking carrier that assigns randomised numbers to credit score playing cards, using blockchain to song all man or woman transactions, and a marketing campaign to train and tell key stakeholders approximately safety and privateness dangers so that they have got the gear and historical past expertise to guard their personal statistics earlier than coping with a overseas entity or different 1/3 events (i.e. cybersecurity departments, IT technicians, etc). Both blockchain and card variety randomization are liable to zero-day vulnerabilities, flaws, and ranging ranges of social acceptance. This exploratory observe makes use of a structures evaluation of cashless structures to perceive and have a look at a fixed of social and technical alternatives for a robust cashless gadget that protects customers' privateness even as keeping gadget safety. The statistics amassed and evaluated may be beneficial in uncovering flaws in present day facts integrity and safety procedures. In order to create preemptive countermeasures, it might be useful to study gift and destiny strategies of dealing with privateness and facts safety withinside the contemporary-day age. In a cashless gadget, this studies identifies essential techniques to keep away from the loss of private privateness.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. P. Rao, B. S. sahrudi, G. Srihari, K. K. Chary, S. Mahesh
{"title":"Extracting Features to Classify Students Based on their Academic Performance","authors":"M. P. Rao, B. S. sahrudi, G. Srihari, K. K. Chary, S. Mahesh","doi":"10.35338/ejasr.2022.4601","DOIUrl":"https://doi.org/10.35338/ejasr.2022.4601","url":null,"abstract":"In today's educational climate, developing tools to support students and learning in a traditional or online context is a crucial responsibility. The first stages in employing machine learning techniques to enable such technology centered on forecasting a student's success in terms of marks earned. The disadvantage of these methods is that they are not as effective at predicting low-achieving students. The goal of our efforts is twofold. To begin, we investigate whether badly performing students may be more accurately predicted by recasting the task as a binary classification problem. Second, in order to learn more about the reasons that contribute to bad performance, we created a set of human-interpretable attributes that quantify these aspects. We conduct a study based on these characteristics to identify distinct student groups of interest while also determining their value.","PeriodicalId":112326,"journal":{"name":"Emperor Journal of Applied Scientific Research","volume":"64 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116602596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}