This document analyzes issues and challenges related to cloud computing assessment. It discusses key features of cloud computing including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also covers different cloud computing deployment models such as public, private, hybrid, and community clouds. The document identifies several issues with cloud computing including security of data, data loss and backups, shared computing services, and system vulnerabilities. It concludes that while cloud computing promises benefits, more research is still needed to address open concerns regarding security and privacy.
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET Journal
This document summarizes a research paper on efficient and secure data storage in cloud computing. It discusses some of the key challenges with cloud data security including confidentiality, integrity and availability. It then proposes a system that allows users to securely audit cloud storage by encrypting data before uploading it. The system also supports secure dynamic operations on outsourced data like deletion, append and security managed control while preserving privacy and efficiency. In under 3 sentences, the document analyzes security issues in cloud data storage and proposes encrypting and auditing data as it is uploaded to the cloud to address privacy and access concerns.
IRJET- Legacy and Privacy Issues in Cloud ComputingIRJET Journal
This document discusses legacy and privacy issues related to cloud computing. It begins with an introduction to cloud computing, including the service models of infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It then discusses the deployment models of private cloud, public cloud, community cloud, and hybrid cloud. The document outlines privacy concerns for data stored in the cloud, including relevant laws and regulations. It also discusses challenges related to legacy systems that existed before cloud adoption and migrating those systems to take advantage of cloud services. Maintaining privacy of user data and properly handling legacy applications are important issues for organizations using cloud computing.
Guddu Kumar. “A Review on Data Protection of Cloud Computing Security, Benefits, Risks and Suggestions” United International Journal for Research & Technology (UIJRT) 1.2 (2019): 26-34.
This document discusses virtualizing private cloud resources to maximize utilization. It begins by introducing cloud computing and its service models of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then explains how virtualizing an existing private cloud using virtualization software like VMware can enable multiple virtual clouds to run on a single physical machine. This "cloud within a cloud" approach significantly improves CPU and memory utilization compared to a single private cloud.
Report on cloud computing by prashant guptaPrashant Gupta
The document is a technical seminar report submitted by Prashant Gupta on cloud computing. It includes an abstract, introduction, table of contents, and initial sections on the concept and history of cloud computing. The introduction provides a definition of cloud computing and discusses the shift from centralized to distributed computing models. It highlights the scalability and on-demand access to computing resources that cloud computing provides.
Closing the gap in your cloud ecosystem capgemini mark skilton v1Mark Skilton
The presentation discusses various gaps that exist between the current state of cloud computing technologies and ecosystems and their potential. It identifies gaps in areas such as standards, portability, integration, security and vertical industry adoption. It argues that closing these gaps will require continued evolution of standards to improve semantics, usability, and data portability across heterogeneous cloud solutions and systems.
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
This document discusses security and privacy issues related to cloud computing. It begins by providing background on cloud computing architectures and infrastructures. It then reviews existing literature on common security issues in cloud computing like confidentiality, authentication, access control, and privacy. It also discusses potential solutions that have been proposed, such as virtualization, encryption, access control frameworks, and risk-adaptable access control models. Finally, it proposes a two-tier authentication scheme within a risk-adaptable access control framework to help address security and privacy challenges in cloud computing.
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
1) The document discusses security issues with storing data on a single cloud and proposes using a multi-cloud approach to increase security. It explores using encryption algorithms like AES and secret sharing to secure data across multiple clouds.
2) The key aspects of the proposed work are to store and operate on data blocks efficiently while preventing unauthorized access through encryption, decryption, and blocking of user IP addresses by the admin.
3) Migrating from a single cloud to a multi-cloud approach helps reduce security risks by distributing data across multiple cloud providers rather than relying on a single provider.
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
This document discusses cloud computing, including its various models and challenges. It begins by defining cloud computing as the delivery of computing services over the internet. It then discusses the three main service models of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The document also outlines the different types of cloud models based on location and service, including public, private, hybrid, community, and federated clouds. Finally, it discusses some of the key challenges of adopting cloud computing such as security, loss of control, vendor lock-in, and lack of skills.
Cloud computing provides many benefits but also poses security risks due to data being stored remotely. This document discusses several key security threats in cloud computing like data leakage, attacks against the cloud infrastructure, and issues regarding access control and data segregation. It proposes some solutions to address these risks, such as access control management, incident response processes, data partitioning, and migration capabilities to improve security in cloud environments.
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
This document discusses cloud computing, its applications, and security issues. It begins by defining cloud computing and describing the three main types of cloud computing services: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses the different types of cloud environments including public clouds, private clouds, and hybrid clouds. The document focuses on the major security challenges in cloud computing applications, describing issues like single sign-on, availability of cloud services, multi-layer inspection, centralized management, virtual desktop protection, data location, and security and privacy concerns.
This document provides an overview of cloud computing, including its key concepts, models, and advantages. The main points are:
- Cloud computing provides on-demand access to computing resources like servers, storage, databases, and applications via the internet. It allows users to avoid upfront infrastructure costs.
- The major cloud service models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS provides access to applications, PaaS provides development platforms, and IaaS provides basic computing resources.
- The key benefits of cloud computing include cost savings, flexibility, scalability, and accessibility of resources from anywhere via
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document provides an overview of cloud computing, including what it is, computing needs it fulfills, perspectives on cloud architecture and types of clouds, drivers and barriers to adoption, and examples of top cloud computing providers. The key points made are that cloud computing provides dynamism, abstraction, and resource sharing; examples include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) models; and factors driving adoption include availability, collaboration, and scalability while barriers include security, reliability and vendor lock-in.
This document discusses cloud computing and provides an overview of key concepts. It begins with definitions of cloud computing and describes the three main models of cloud services: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It then outlines some common applications of cloud computing and benefits such as scalability, simplicity, and security. The document also reviews limitations, design principles, and the future scope of cloud computing. In conclusion, cloud computing provides convenient and cost-effective Internet-based computing services.
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes security issues related to cloud computing. It begins by introducing cloud computing and its benefits like scalability, flexibility and cost savings. However, cloud computing also faces security risks due to its multi-tenant architecture, where resources are shared among multiple users. Specific security risks discussed include data loss and leakage if strong encryption and access controls are not implemented. The open accessibility of cloud services also makes it easier for malicious users to attack innocent users. Finally, proper identity management is needed to securely manage access across different cloud technologies and services.
Addressing the cloud computing security menaceeSAT Journals
This document summarizes security issues related to cloud computing. It begins by introducing cloud computing and its benefits, including scalability, flexibility, and a pay-as-you-go model. However, it notes that security is a major concern for cloud computing. It then analyzes specific security threats like multi-tenancy allowing access to competitors' data, potential for data loss and leakage, easy accessibility opening the cloud to malicious users, and challenges of identity management with multiple technologies. The document provides an overview of cloud computing deployment models and service models to provide context on the discussed security issues.
IRJET- Survey on Security Threats and Remedies in Cloud ComputingIRJET Journal
This document discusses security threats and remedies in cloud computing. It begins by introducing cloud computing and its deployment models including public, private, and hybrid clouds. It then describes the different cloud service models such as SaaS, PaaS, and IaaS. The document proceeds to outline several security threats in cloud computing including backdoor channel attacks, denial-of-service attacks, insecure APIs, and SQL injection attacks. Finally, it discusses some potential improvements and controls for cloud security like strong encryption, activity monitoring, and user authentication.
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
This document discusses security issues related to software-as-a-service (SaaS) applications in cloud computing environments. It first highlights different environments where SaaS is used and then analyzes common SaaS security challenges like data, application, and deployment security. The document then discusses digital forensics investigations of crimes related to cloud environments. It proposes a cloud forensics strategy to help investigators examine cybercrimes in an effective and efficient manner. Finally, the document identifies different types of security attacks on cloud computing and SaaS components, along with associated vulnerabilities and potential countermeasures.
This document provides an overview of cloud computing, including its key characteristics, service models, deployment models, examples, advantages and limitations. Specifically, it defines cloud computing as the delivery of computing resources such as servers, storage, databases and software over the internet. It describes the main service models of software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). It also outlines the deployment models of public, private and hybrid clouds and discusses some advantages like scalability, cost savings and disadvantages like security issues and dependence on internet connectivity.
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
This document discusses content-based retrieval in cloud storage and proposes an effective protection method. It begins with background on cloud computing and discusses traditional encrypted search methods and their limitations, including vulnerabilities to attacks. The proposed system design generates an order-preserving encrypted password and splits files and indexes into encrypted parts. It then splits an uploaded secure image into a source image and key image using a binocular visual cryptography algorithm. The encrypted files, source image, and password are stored in the cloud. When a user requests a file, the cloud verifies and sends the password and key image. To access the file, the user must submit the matching key image. This prevents unauthorized access while allowing efficient encrypted searching and retrieval from the cloud.
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
Cloud computing is an emerging model of business computing. Cloud computing is a service, which offers customers to work over the internet. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer's hard disk. The data can be anything such as music, files, images, documents, and many more. The user can access the data from anywhere just with the help of an internet connection. To access cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as internet speed, the capacity of the server, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and We also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt to cloud computing systems. Yin Myo Kay Khine Thaw | Khin Myat Nwe Win "Understanding the Determinants of Security and Privacy in Cloud Computing Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26452.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/26452/understanding-the-determinants-of-security-and-privacy-in-cloud-computing-architecture/yin-myo-kay-khine-thaw
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.IRJET Journal
This document provides a comprehensive study of deployment models and service models in cloud computing. It discusses the key cloud computing models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). It also examines the major cloud deployment models such as public cloud, private cloud, hybrid cloud, and community cloud. The document analyzes the characteristics, benefits, and limitations of each service and deployment model. It provides comparisons of the different models and concludes that cloud computing delivers scalable services but also faces challenges regarding data security, network security, and lack of user control that need to be addressed.
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
This document discusses multitenancy in cloud computing. It begins with an abstract describing multitenancy as the sharing of computing infrastructure like databases, processors and storage among multiple customers and organizations, providing cost and performance advantages. It then provides background on cloud computing and its advantages over traditional server systems. The document outlines the various components of a multitenant cloud computing system including users, providers and modules. It discusses requirements analysis and describes the system architecture and a multi-cloud system approach. In conclusion, it states that cloud computing will be extremely useful in the future for both testing startup projects and moving existing technology to reduce costs through a pay-per-use model.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
IRJET- Proficient Business Solutions through Cloud ServicesIRJET Journal
This document discusses different cloud computing service models - Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). SaaS provides ready-to-use software applications to customers over the internet. PaaS provides development tools and servers for customers to build their own applications. IaaS provides basic computing and storage infrastructure for customers to build and manage their own systems. The document explores the advantages and disadvantages of each service model and when each would be most suitable for customers based on their needs and capabilities.
Cloud computing a services business application challengesEditor Jacotech
This document discusses challenges related to adopting Software as a Service (SaaS) business applications. It reviews literature that has identified key challenges such as data security, customization, and scalability. The document provides background on cloud computing models including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). It also discusses characteristics of the SaaS cloud computing model and the business value it provides.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IRJET- Nebula and Cloud Computing – Analyzing all Aspects of Both EntitiesIRJET Journal
The document analyzes nebula and cloud computing by comparing their aspects. It discusses how nebula, which uses distributed voluntary resources donated by end users, can address some of the limitations of current cloud services. Nebula aims to provide more adaptable, low cost and distributed alternatives for users with varying needs that are not fully met by existing cloud platforms. The objectives of nebula include leveraging large numbers of existing volunteer resources to provide diverse storage and deployment options while keeping costs negligible. This is described as providing more options for users in terms of speed, data movement costs and other factors compared to rigid plans of major cloud providers.
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
This document provides an overview of mobile cloud computing. It discusses how mobile cloud computing combines mobile computing and cloud computing to address the limited resources of mobile devices. The document outlines three approaches to mobile cloud applications, including extending cloud services to mobile devices and using cloud resources to augment mobile applications. It then describes the architecture of mobile cloud computing and security issues related to confidentiality, integrity, availability, authentication, and accountability. Finally, it discusses some open issues for implementing cloud computing on mobile devices related to limited resources and networking challenges.
Data Security Approach in Cloud computing using SHAIRJET Journal
This document discusses data security approaches in cloud computing using the SHA algorithm. It aims to provide integrity to cloud storage areas. The SHA algorithm is used to provide important security services like key generation, encryption, and decryption in cloud computing systems. A trusted third party (TPA) ensures cloud storage security on behalf of data owners upon request. The main goal is to securely store and manage data so that only authorized users can access it. The document outlines challenges to cloud computing like security, privacy, service delivery and billing issues, and proposes developing schemes to ensure integrity, authentication, and confidentiality of information exchanged between cloud systems.
CLOUD COMPUTING: SECURITY ISSUES AND CHALLENGESP singh
Cloud storage is defined as "the storage of data online in the cloud," wherein a company's data is stored in and accessible from multiple distributed and connected resources that comprise a cloud. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. The following paper deals with the service models of cloud computing along with types of cloud computing & characteristics of cloud. Further challenges and security issues in cloud computing is also discussed and at last conclusion and future demand for research in the field of cloud computing.
This document discusses cloud computing and load balancing. It provides an overview of cloud computing, describing the different types of clouds including public, private, hybrid, and community clouds. It also classifies cloud computing based on the service provided, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). The document then discusses load balancing in cloud computing, describing how load balancers distribute workloads across servers to maximize output and reduce response times. It covers static and dynamic load balancing algorithms and some common load balancing techniques.
Similar to IRJET- An Ample Analysis of Cloud Computing Assessment Issues and Challenges (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.