Logo

e-ISSN: 2455-6491 | Published by Global Advanced Research Publication House (GARPH)







Archives of International Journal of Advanced Innovative Technology in Engineering(IJAITE)


Volume 6 Issue 6 November 2021



1. Study of Various Methods of Voltage Stability Analysis

AUTHOR NAME : Atul W. Kale, Prof. M. A. Khan

ABSTRACT : In today’s scenario, as the development is taking place simultaneously the demand for electricity in the world is also increasing. The operation and planning of large interconnected power systems are becoming more and more complex. In a power system, voltage stability plays a very important role. Voltage instability may cause blackouts and collapse of the power system. In the last decade, many countries have experienced the problem of blackouts due to voltage instability. The problem of voltage stability is mainly caused due to stressed loading condition of the system. It is essential to analyze the voltage stability for improvement in the efficiency of the power system. Various authors have conducted research on the analysis of voltage stability and methods to improve it. This paper presents a review of research and development in voltage stability analysis and methods for improving voltage stability.

Download





2. Data Hiding Using Image Steganography Techniques

AUTHOR NAME : Sonali Shevatkar, Dr. C. N. Deshmukh

ABSTRACT : Steganography is the technique of hiding the fact that communication is taking place, by hiding data in other data. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this hidden information, is an inherently difficult problem. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification.

Download





3. Digital Image Processing Based Smart Transportation and Fire Detection in Industrial Environment using Internet of Things

AUTHOR NAME : Neha W. Randhe, Prof. Dr. S. W. Mohod, Prof. S. V. Pattalwar

ABSTRACT : Internet of Things (IoT) allows a massive number of uniquely addressable “things” to communicate with each other and transfer data over existing internet or compatible network protocols. This article proposes a new concept that tackles the issues on industrial transportation to perform tasks of transportation using smart vehicles guided by sensors and IoT. The vehicle will take images of the environment and apply the fire detection DIP algorithm. The vehicle will also note the temperature of the environment and transfer it to the remote operator by IoT. In case of fire detection and temperature rise above the threshold, the vehicle will blow the buzzer. The same information will be reported to the remote operator. The exact simulation arena as that of the physical industrial arena is developed using a python graphical module. The simulation arena and vehicles in the industrial arena will communicate with each other using the internet. By simulation, we can provide a traveling path to a vehicle. The same traveling path will be traced in simulation and in the physical industrial arena. This complete idea is explained with the help of the prototyping module.

Download





4. Study of Designing Intelligent Chatbot and Current Trend

AUTHOR NAME : Monal V. Dahake, Prof. Dr. Neeraj Sahu

ABSTRACT : A chatbot is a conversational device designed to counterfeit smart communication with Humans through speech and text. Chatbot emerged like a machine that interacts with a human by their dialect, spoken/ textual conversation, and response similarly but now there has been a tremendous increase in the development of Assistants and Chatbots with advanced technologies based on Speech. This paper presents a survey of a framework for researchers in identifying the areas of developing methodology of a Chatbot. In this paper, we will discuss how Chatbots are designed, the machine learning and deep learning techniques and algorithms used, compare the technologies, and how the performance of Chatbot is evaluated. This survey concludes with curiosity to know why Chatbots are becoming more friendly to humans than just a communication machine and what are the future aspects of humans from Human-like Chatbots.

Download





5. Multi-Keyword Ranked Searchable Encryption Over Cloud Data

AUTHOR NAME : Tanvi R. Dahake, Prof. Jayant P. Mehare

ABSTRACT : Cloud computing has been considered as a new model of enterprise IT infrastructure, which can organize huge resources of computing, storage, and applications. It enables the users to access the network to a shared pool of configurable computing resources with great efficiency and minimal economic overhead. In the era of big data, a huge amount of data produced worldwide is stored in the cloud. Despite the various advantages of cloud services, outsourcing sensitive information to remote servers brings privacy concerns. The cloud service providers who store users data may access sensitive information without authorization. A general approach to protecting data confidentiality is to encrypt the data before outsourcing. In this study, we presented the proposed system of keyword Based Rank Search Over Encrypted Cloud and also presented the application of searchable encryption over the different areas. We address the problem of privacy-preserving using multiple keywords search over encrypted cloud data. Our approach provides a multi-keyword search based on coordinate matching.

Download