Logo

e-ISSN: 2455-6491 | Published by Global Advanced Research Publication House (GARPH)







Archives of International Journal of Advanced Innovative Technology in Engineering(IJAITE)


Volume 8 Issue 2 March 2023



1. Energy Generation Analysis in Central India, Nagpur

AUTHOR NAME : Satish Pawar, Prof. Pankaj Badgaiyan, Vivek Rahi

ABSTRACT : Electricity in the modern world holds the backbone of humanity and its demand is increasing every day. Due to multiple factors, in developing countries like India, the continuous supply of electricity seems to be far-fetched due to the constant shutting down of grids (because of severe climatic conditions). Among the available renewable energy sources, solar photovoltaic (PV) is mostly used. This study aimed at analysis and monitoring the Photovoltaic solar energy electrification in the livelihood transformation process in the industrial areas, based on Internet of Thing (IoT) at R C Plasto Tanks & Pipes Private Limited, Hingna MIDC, Nagpur, Maharashtra, India. Understanding the industrialist perceptions, attitude and sense of ownership over the project installed in the R C Plasto Tanks & Pipes Private Limited was another aim of this study, together with the reasons or bases of such attitude. It also wanted to take a closure look and understand the real time analysis, monitoring and consumption behavior efficiently in the R C Plasto Tanks & Pipes Private Limited.

Download





2. Study And Simplification of Hydraulic Circuit of Transfer Device

AUTHOR NAME : Dr. Namrata Lotia, Prof Huzaifa Fidvi, Vikash Kumar Yadav, Sheikh Nawaz

ABSTRACT : This paper describes different case studies and simplifications of hydraulic systems and their failures in the Rail & structure mills, the research was conducted to know and understand the components, construction, location, function, circuit diagram, and case studies of different failures in the hydraulic systems. The case study includes all hydraulically operated machines (linear actuator, rotary actuator, punching machine straightening machine, etc.) on-site that has different types, size, and applications. The most problem in this system on site is because of contamination and climate condition (temperature). Also, the usage of old and outdated machines and lack of maintenance are others factors affecting performance. These problems lead to increase downtime and decrease productivity. The transfer bed hydraulic circuit has been simplified by changing the circuit diagram (proportional to the DC valve).

Download





3. Study of Data Security Frameworks Implemented in University Environment

AUTHOR NAME : Anup Ralegaonkar, Dr. Nilesh Ware

ABSTRACT : University information infrastructure is frequently targeted by cyber attackers due to the large volume of critical data being handled by such institutions. University networks are generally designed for open and free access for students and staff with no centralised control. The purpose of this research paper is to study the literature describing different information security frameworks used by various academic institutions. The literature review was conducted in a systematic manner consisting of three important phases: planning, conducting and reporting the review. The process involves identification, interpretation and evaluation of the research that is carried out in to a particular field. The study has brought out that, ISO 27001, COBIT, ITIL and NIST are the most widely used information security standards worldwide. Hence, majority of researchers recommend, designing a customised security strategy for higher educational institution, which is based on one of the international standards. However, it was observed that, the scientific papers analysed for this study are not covering this important aspect in sufficient depth. Effective IT Governance and adhering to strict security policies within the institution, have been identified as effective methods to strengthen the information security. Case studies and surveys have been suggested for validation of the framework, during pre-implementation and post-implementation phases. The field of research has proved to be very interesting and highlighted specific issues about developing a comprehensive and cost-effective info security strategy for higher education institutions.

Download





4. Sentiment Analysis Using Machine Learning Technique

AUTHOR NAME : Shital Shivshankar Durudakar, Prof. Tarun Yengantiwar

ABSTRACT : Various machine learning algorithms for sentiment analysis are discussed in this study. Machine learning classifiers such as Naive Bayes, Decision Tree, Random Forest, Support Vector Machine, KNN, and deep learning classifiers were used to analyze sentiment. We notice some articles in this section that are assisting young investigators in determining the best path for further study. Various social networking sites, E-commerce sites like Amazon and social media like Facebook, Twitter, and Instagram is popular platforms for users to express their views on many topics. Sentiment analysis employs a machine learning approach and provides a precise assessment of peoples feelings without the need for human intervention. The Sentiment analysis divides the text into three categories; positive, negative, and neutral. As a result, any corporation, institution, an examiner can accept the public view and take action based on it.

Download