Pub Date : 2020-12-25DOI: 10.14445/23497157/ijres-v6i6p104
R. S, R. R
{"title":"Design and Development of Communication Salvage upon Encrypted Information in Cloud Computing","authors":"R. S, R. R","doi":"10.14445/23497157/ijres-v6i6p104","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v6i6p104","url":null,"abstract":"","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90963498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-25DOI: 10.14445/23497157/ijres-v6i6p103
R. S, D. M
{"title":"Design and Development of an Internal Refugee Scheme with Jumping Robot as the Scrutiny Workstation","authors":"R. S, D. M","doi":"10.14445/23497157/ijres-v6i6p103","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v6i6p103","url":null,"abstract":"","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"387 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79572333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-25DOI: 10.14445/23497157/ijres-v7i6p104
K. R
{"title":"Fuzzy Tuned PI Controller for Shunt Active Power Filter","authors":"K. R","doi":"10.14445/23497157/ijres-v7i6p104","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v7i6p104","url":null,"abstract":"","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85748616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-25DOI: 10.14445/23497157/ijres-v7i6p102
Ugwu Kenneth Chikwado, O. Ifeanyi, Okafor Gabriel Ifeanyi
There is an inevitable decline in quality value especially the ascorbic acid in preserving cashew apple juice. The maximum shelf life of red sample of cashew apple juice was estimated and the quality value multivariate regression model was developed. Data were drawn from 3 full factorial experiments conducted in three replicates with the order of the replicates randomized. The model developed for the sample of cashew fruit juice revealed that pH and duration of storage with other interactions were the major parameters that govern the shelf-life and characterization qualities of cashew fruit juice. The coefficient of correlation (R) of the dependent variable (ascorbic acid) and independent variables (temperature, total soluble solid, pH and duration of storage) in the model was 0.954. The regression model revealed that temperature of 34.4 C, 11.13 Brix value, pH of 3.99, 16 days storage duration of the sample maintained ascorbic acid levels of 239.59 mg/100 ml at maximum shelf life. The sample of the juice had 31 insignificant regression coefficients at 5 percent probability level after checking the adequacy of the predicted model. Equation 34 expresses the fitted model for predicting the shelf life of red sample of cashew fruit juice which recorded 17 experiments that did not meet minimum quality requirement of ascorbic acid level.
{"title":"Determination of Cashew Juice specie’s Shelf-Life at Natural Storage Using Multivariate Regression Model","authors":"Ugwu Kenneth Chikwado, O. Ifeanyi, Okafor Gabriel Ifeanyi","doi":"10.14445/23497157/ijres-v7i6p102","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v7i6p102","url":null,"abstract":"There is an inevitable decline in quality value especially the ascorbic acid in preserving cashew apple juice. The maximum shelf life of red sample of cashew apple juice was estimated and the quality value multivariate regression model was developed. Data were drawn from 3 full factorial experiments conducted in three replicates with the order of the replicates randomized. The model developed for the sample of cashew fruit juice revealed that pH and duration of storage with other interactions were the major parameters that govern the shelf-life and characterization qualities of cashew fruit juice. The coefficient of correlation (R) of the dependent variable (ascorbic acid) and independent variables (temperature, total soluble solid, pH and duration of storage) in the model was 0.954. The regression model revealed that temperature of 34.4 C, 11.13 Brix value, pH of 3.99, 16 days storage duration of the sample maintained ascorbic acid levels of 239.59 mg/100 ml at maximum shelf life. The sample of the juice had 31 insignificant regression coefficients at 5 percent probability level after checking the adequacy of the predicted model. Equation 34 expresses the fitted model for predicting the shelf life of red sample of cashew fruit juice which recorded 17 experiments that did not meet minimum quality requirement of ascorbic acid level.","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"94 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79428367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-25DOI: 10.14445/23497157/ijres-v7i6p101
Guma T N, Josiah Gana
{"title":"Gloss Evaluation of Autobody Paint Finishes by Some Enterprises in Kaduna Metropolis, Nigeria","authors":"Guma T N, Josiah Gana","doi":"10.14445/23497157/ijres-v7i6p101","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v7i6p101","url":null,"abstract":"","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"144 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76242632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-25DOI: 10.14445/23497157/ijres-v7i6p105
Arunmozhi S A, Benita Esther Jemmima V
{"title":"A High Gain Ultra Wideband Array Antenna For Wireless Communication","authors":"Arunmozhi S A, Benita Esther Jemmima V","doi":"10.14445/23497157/ijres-v7i6p105","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v7i6p105","url":null,"abstract":"","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"28 16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82822533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-25DOI: 10.14445/23497157/ijres-v7i4p103
O. Eseosa, Adesaanu Eunice Ejiroro
{"title":"Challenges and Way Forward Of Renewables In Developing Energy Economy: Today And Tomorrow","authors":"O. Eseosa, Adesaanu Eunice Ejiroro","doi":"10.14445/23497157/ijres-v7i4p103","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v7i4p103","url":null,"abstract":"","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74487287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-25DOI: 10.14445/23497157/ijres-v7i3p115
Pooja Nair, R. Sneha
A facial recognition system can verify or identify a person from a video or a digital image. There are various techniques in which these systems work. Popularly, they work by first matching the facial characteristics picked from the image to the faces stored in the database. It is called a Biometric Identification based application that uniquely identifies each individual by analyzing their voice, facial expression, face, or fingerprint. Even though it was initially used as a computer application, it has gained broader uses in mobile platforms and other technology sectors, such as robotics. It has a vast application in security systems. Although this system's accuracy as biometric technology is lower than that of fingerprint recognition and iris detection, it is broadly used due to its non-invasive and contactless features. It has recently grown in significance as a tool for retail and marketing. Another application is video surveillance to identify missing people or criminals. It is gaining importance in the healthcare sector. Facial recognition technology has become very popular and is being used everywhere from shopping centers, airports, venues, and by law enforcement. This technology can also be used to prevent crimes such as shoplifting by identifying ex-cons. Although this technology is gaining widespread use, there are many concerns about privacy and safety.
{"title":"A Review: Facial Recognition Using Machine Learning","authors":"Pooja Nair, R. Sneha","doi":"10.14445/23497157/ijres-v7i3p115","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v7i3p115","url":null,"abstract":"A facial recognition system can verify or identify a person from a video or a digital image. There are various techniques in which these systems work. Popularly, they work by first matching the facial characteristics picked from the image to the faces stored in the database. It is called a Biometric Identification based application that uniquely identifies each individual by analyzing their voice, facial expression, face, or fingerprint. Even though it was initially used as a computer application, it has gained broader uses in mobile platforms and other technology sectors, such as robotics. It has a vast application in security systems. Although this system's accuracy as biometric technology is lower than that of fingerprint recognition and iris detection, it is broadly used due to its non-invasive and contactless features. It has recently grown in significance as a tool for retail and marketing. Another application is video surveillance to identify missing people or criminals. It is gaining importance in the healthcare sector. Facial recognition technology has become very popular and is being used everywhere from shopping centers, airports, venues, and by law enforcement. This technology can also be used to prevent crimes such as shoplifting by identifying ex-cons. Although this technology is gaining widespread use, there are many concerns about privacy and safety.","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82836688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-25DOI: 10.14445/23497157/ijres-v7i3p106
P. Raikar, Supreeta Anand Byatnal, N. TejaswiniT, K. Rajeshwari
With the rise of internet, internet marketing has become an important issue, for increasing internet business competitiveness. Human life easy with web search engines. But with day to day growth in web, proper information on the user search query is becoming difficult. Any user using internet search information on the web, the search engines results in a large amount of web pages from his database in response of search related queries. For any user not possible to access all web pages. So need of a search engines (SE) that provide relevant information to a user search query. The technique called search engine optimization (SEO), Recently, SEO (search engine optimization) techniques have become one important technique for improving website ranking. Meanwhile, social networking sites are getting more and more popular. Using keywords effectively can secure a higher ranking website, and increase site traffic and popularity. In this paper we present a review on Search Engine Optimization techniques that are helpful for all internet user to make available valuable data
{"title":"Review of Search Engine Optimization","authors":"P. Raikar, Supreeta Anand Byatnal, N. TejaswiniT, K. Rajeshwari","doi":"10.14445/23497157/ijres-v7i3p106","DOIUrl":"https://doi.org/10.14445/23497157/ijres-v7i3p106","url":null,"abstract":"With the rise of internet, internet marketing has become an important issue, for increasing internet business competitiveness. Human life easy with web search engines. But with day to day growth in web, proper information on the user search query is becoming difficult. Any user using internet search information on the web, the search engines results in a large amount of web pages from his database in response of search related queries. For any user not possible to access all web pages. So need of a search engines (SE) that provide relevant information to a user search query. The technique called search engine optimization (SEO), Recently, SEO (search engine optimization) techniques have become one important technique for improving website ranking. Meanwhile, social networking sites are getting more and more popular. Using keywords effectively can secure a higher ranking website, and increase site traffic and popularity. In this paper we present a review on Search Engine Optimization techniques that are helpful for all internet user to make available valuable data","PeriodicalId":14292,"journal":{"name":"International Journal of Recent Engineering Science","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73236983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}