Pub Date : 2022-01-10DOI: 10.32622/ijrat.912202103
Darsha Panwar
This paper presents an experimental study with the objective’s functions of a portfolio optimization problem. This study is done by three optimization problems with a different number of objectives. A hybrid approach has been adopted for this which is a combination of a few methods, such as investor topology, cluster analysis, analytical hierarchy process (AHP), and optimization techniques. Teaching-learning-based optimization (TLBO), biogeography-based optimization (BBO), and fuzzy multi-objective linear programming (FMOLP) are compared in this paper for portfolio optimization. From this research, the conclusion comes that there should not be more options in the objective functions, otherwise the motive of the portfolio becomes misleading, but many more parameters can be used for stock valuation.
{"title":"An Experimental Study with Objectives Functions for Portfolio Optimization Problem","authors":"Darsha Panwar","doi":"10.32622/ijrat.912202103","DOIUrl":"https://doi.org/10.32622/ijrat.912202103","url":null,"abstract":"This paper presents an experimental study with the objective’s functions of a portfolio optimization problem. This study is done by three optimization problems with a different number of objectives. A hybrid approach has been adopted for this which is a combination of a few methods, such as investor topology, cluster analysis, analytical hierarchy process (AHP), and optimization techniques. Teaching-learning-based optimization (TLBO), biogeography-based optimization (BBO), and fuzzy multi-objective linear programming (FMOLP) are compared in this paper for portfolio optimization. From this research, the conclusion comes that there should not be more options in the objective functions, otherwise the motive of the portfolio becomes misleading, but many more parameters can be used for stock valuation.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86633603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-10DOI: 10.32622/ijrat.910202104
A. Raj, P. Deshmukh, Pradeepa. S
This study has been taken to investigate the exact rebound-strength relationship of different grades of concrete, as the curves generated for traditional hammers are outdated. Using the material available in the Nagpur region, cube specimens were cast and tested as per IS:516-1959 [1]. Several sets were cast with varying cement contents, decided by mix design, to give a strength range of 10 to 50 Mpa. However, for this study, the Target Mean Strength Standard Deviation factor is not considered. We tested these sets for compressive strengths; each specimen was checked for rebound value for compressive Strength, each specimen was checked for rebound value on four faces. Thus, for each specimen, data for rebound value and Compressive Strength is available. Using this data, a curve for Compressive Strength and rebound value was plotted. The curve generated indicated that the strengths obtained for the same rebound value are higher than that using the traditional curve. There is an increase of about 47% up to a strength of 21 Mpa. From 21 to 38 Mpa, this increase is almost constant to about 30%. From this point forward, the rate of increased Strength reduces by 25% and 14% at 40 Mpa and 45 Mpa, respectively.
{"title":"A Study to Establish Correlation Between Rebound Value and Compressive Strength of Concrete Using Materials Available Locally in Nagpur","authors":"A. Raj, P. Deshmukh, Pradeepa. S","doi":"10.32622/ijrat.910202104","DOIUrl":"https://doi.org/10.32622/ijrat.910202104","url":null,"abstract":"This study has been taken to investigate the exact rebound-strength relationship of different grades of concrete, as the curves generated for traditional hammers are outdated. Using the material available in the Nagpur region, cube specimens were cast and tested as per IS:516-1959 [1]. Several sets were cast with varying cement contents, decided by mix design, to give a strength range of 10 to 50 Mpa. However, for this study, the Target Mean Strength Standard Deviation factor is not considered. We tested these sets for compressive strengths; each specimen was checked for rebound value for compressive Strength, each specimen was checked for rebound value on four faces. Thus, for each specimen, data for rebound value and Compressive Strength is available. Using this data, a curve for Compressive Strength and rebound value was plotted. The curve generated indicated that the strengths obtained for the same rebound value are higher than that using the traditional curve. There is an increase of about 47% up to a strength of 21 Mpa. From 21 to 38 Mpa, this increase is almost constant to about 30%. From this point forward, the rate of increased Strength reduces by 25% and 14% at 40 Mpa and 45 Mpa, respectively.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87938332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes in-depth the architecture of a Distributed Cellular framework for Secure Drone Delivery Services with an additional security layer. Delivery Drones are Unmanned aerial vehicles (UAV) that are responsible for the transportation of goods from one place to another place. In the modern world, with several e-commerce platforms, everything is traded, promoted, advertised online. This causes the need to deliver the packages rapidly and within a stipulated period of time. Unmanned aerial vehicles or drones come into the picture to retort the above-mentioned issue. Security nowadays has become a major concern where hackers are diverting the network traffic, hijacking, and crashing the drones. In order to prevent these attacks from taking place, this paper proposes a strong security framework to minimize these attacks from taking place. The proposed architecture has an additional layer of security which covers the two-factor and multi-factor authentication at the delivery spot. There exists an integration of different sensors like Obstacle detection, SOS detection, Facial Recognition, etc. Beyond the security framework, a distributed cellular network is applied to the delivery services to scatter the drones cell-wise and largen the scope to all remote areas.
{"title":"Distributed Cellular Framework for Secure Drone Delivery Services","authors":"Maansa Krovvidi, C. Prashanth","doi":"10.32622/ijrat.99202103","DOIUrl":"https://doi.org/10.32622/ijrat.99202103","url":null,"abstract":"This paper describes in-depth the architecture of a Distributed Cellular framework for Secure Drone Delivery Services with an additional security layer. Delivery Drones are Unmanned aerial vehicles (UAV) that are responsible for the transportation of goods from one place to another place. In the modern world, with several e-commerce platforms, everything is traded, promoted, advertised online. This causes the need to deliver the packages rapidly and within a stipulated period of time. Unmanned aerial vehicles or drones come into the picture to retort the above-mentioned issue. Security nowadays has become a major concern where hackers are diverting the network traffic, hijacking, and crashing the drones. In order to prevent these attacks from taking place, this paper proposes a strong security framework to minimize these attacks from taking place. The proposed architecture has an additional layer of security which covers the two-factor and multi-factor authentication at the delivery spot. There exists an integration of different sensors like Obstacle detection, SOS detection, Facial Recognition, etc. Beyond the security framework, a distributed cellular network is applied to the delivery services to scatter the drones cell-wise and largen the scope to all remote areas.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80005755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In applications like location-based services, sensor monitoring systems and data integration diligence the data manipulated is highly ambiguous. mining manifold itemsets from generous ambiguous database illustrated under possible world semantics is a crucial dispute. Mining manifold Itemsets is technically brave because the ambiguous database can accommodate a fractional number of possible worlds. The mining process can be formed as a Poisson binomial distribution, by noticing that an Approximated algorithm is established to ascertain manifold Itemsets from generous ambiguous database exceedingly. Preserving the mining result of scaling a database is a substantial dispute when a new dataset is inserted in an existing database. In this paper, an incremental mining algorithm is adduced to retain the mining consequence. The cost and time are reduced by renovating the mining result rather than revising the whole algorithm on the new database from the scrap. We criticize the support for incremental mining and ascertainment of manifold Itemsets. Two common ambiguity models in the mining process are Tuple and Attribute ambiguity. Our approach reinforced both the tuple and attribute uncertainty. Our accession is authorized by interpreting both real and synthetic datasets.
{"title":"Efficient Mining of Frequent Item Sets on Large Uncertain Databases","authors":"Ms. Madhuri K. Waghchore, Prof. S. A. Sanap","doi":"10.32622/ijrat.99202107","DOIUrl":"https://doi.org/10.32622/ijrat.99202107","url":null,"abstract":"In applications like location-based services, sensor monitoring systems and data integration diligence the data manipulated is highly ambiguous. mining manifold itemsets from generous ambiguous database illustrated under possible world semantics is a crucial dispute. Mining manifold Itemsets is technically brave because the ambiguous database can accommodate a fractional number of possible worlds. The mining process can be formed as a Poisson binomial distribution, by noticing that an Approximated algorithm is established to ascertain manifold Itemsets from generous ambiguous database exceedingly. Preserving the mining result of scaling a database is a substantial dispute when a new dataset is inserted in an existing database. In this paper, an incremental mining algorithm is adduced to retain the mining consequence. The cost and time are reduced by renovating the mining result rather than revising the whole algorithm on the new database from the scrap. We criticize the support for incremental mining and ascertainment of manifold Itemsets. Two common ambiguity models in the mining process are Tuple and Attribute ambiguity. Our approach reinforced both the tuple and attribute uncertainty. Our accession is authorized by interpreting both real and synthetic datasets.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79631843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study illustrates inventory associated with deteriorating items. Nowadays the incident deterioration has a major impact on the preservation of goods in terms of handling inventory. The significant effect of deterioration has been observed on volatile liquids, fish, vegetables, etc. Here a mathematical model is presented incorporating the effect of deterioration. The model has been developed on an infinite time horizon. The shortage is allowed and backlogged partially. We aim to find out lot-size and back-ordered quantities in order to minimize the total average cost. In support of the proposed model, a numerical example has been provided. The stability of the solution of that example has been confirmed by performing a sensitivity analysis of key parameters. A graphical representation of cost function regarding decision variables has been displayed.
{"title":"An Inventory Model for Perishable Goods with Partial Backlogging of Shortages","authors":"Subhankar Adhikari","doi":"10.32622/ijrat.98202102","DOIUrl":"https://doi.org/10.32622/ijrat.98202102","url":null,"abstract":"This study illustrates inventory associated with deteriorating items. Nowadays the incident deterioration has a major impact on the preservation of goods in terms of handling inventory. The significant effect of deterioration has been observed on volatile liquids, fish, vegetables, etc. Here a mathematical model is presented incorporating the effect of deterioration. The model has been developed on an infinite time horizon. The shortage is allowed and backlogged partially. We aim to find out lot-size and back-ordered quantities in order to minimize the total average cost. In support of the proposed model, a numerical example has been provided. The stability of the solution of that example has been confirmed by performing a sensitivity analysis of key parameters. A graphical representation of cost function regarding decision variables has been displayed.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76305848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The requirement to serve more users and provide more data at more incredible data speeds drives demand for wireless wideband communications. The Ultra-Wide Band (UWB) technology uses nanosecond-long pulses to span an extensive frequency range. The high bandwidth, low power consumption, and less fading due to multipath are attained in UWB communication technologies. This paper explains a hexagonal monopole antenna design using a high-frequency structure simulator (HFSS) and is further optimized for c better bandwidth. A hexagonal monopole antenna is designed using FR-4 epoxy metamaterial substrate. The optimum hexagonal bandwidth is attained at a span of 6.13 to 7.34 GHz frequency, and the polar gain is 1.2 dB. This paper provides the UWB antenna design; an optimized bandwidth is achieved as expected, the applications of smart marketing and a discussion of all relevant literature are carried out.
{"title":"HFSS Design of Hexagonal Monopole Antenna with FR4 Epoxy substrate – 7.34 GHz Ultra-Wide Band Antenna for Smart Shopping Application","authors":"D. Chaudhary, A. K. Mishra","doi":"10.32622/ijrat.98202107","DOIUrl":"https://doi.org/10.32622/ijrat.98202107","url":null,"abstract":"The requirement to serve more users and provide more data at more incredible data speeds drives demand for wireless wideband communications. The Ultra-Wide Band (UWB) technology uses nanosecond-long pulses to span an extensive frequency range. The high bandwidth, low power consumption, and less fading due to multipath are attained in UWB communication technologies. This paper explains a hexagonal monopole antenna design using a high-frequency structure simulator (HFSS) and is further optimized for c better bandwidth. A hexagonal monopole antenna is designed using FR-4 epoxy metamaterial substrate. The optimum hexagonal bandwidth is attained at a span of 6.13 to 7.34 GHz frequency, and the polar gain is 1.2 dB. This paper provides the UWB antenna design; an optimized bandwidth is achieved as expected, the applications of smart marketing and a discussion of all relevant literature are carried out.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77052338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work examines the effect of pricing strategy in a supply chain consists of two members namely supplier and retailer. The supplier provides a credit period to the retailer. The retailer also provides a trade credit period to the customer within cycle length. A collaborative approach between two members is considered. The ultimate objective is to find maximum profit for the integrated system.
{"title":"Pricing Policy in an Integrated Two-echelon Supply Chain under Permissible Delay of Payment","authors":"Subhankar Adhikari","doi":"10.32622/ijrat.96202108","DOIUrl":"https://doi.org/10.32622/ijrat.96202108","url":null,"abstract":"This work examines the effect of pricing strategy in a supply chain consists of two members namely supplier and retailer. The supplier provides a credit period to the retailer. The retailer also provides a trade credit period to the customer within cycle length. A collaborative approach between two members is considered. The ultimate objective is to find maximum profit for the integrated system.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86738541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we will consider the problem of optimal control of a fed batch reactor. Our objective is to simulate the fed batch reactor under specified conditions in order to find an optimal control policy. Thus, for any specified initial conditions and parameter values the optimal policy for reactor operation can be obtained from simulation. We have an example system of nosiheptide [1] and used gradient method to find optimal policy. Although the convergence is slow, an optimal solution is obtained and various plots are prepared that illustrate the applicability of the method well.
{"title":"Optimal Control of fed batch bioreactor","authors":"Durgesh Bonde, Dr. Satish Inamdar","doi":"10.32622/ijrat.94202104","DOIUrl":"https://doi.org/10.32622/ijrat.94202104","url":null,"abstract":"In this paper, we will consider the problem of optimal control of a fed batch reactor. Our objective is to simulate the fed batch reactor under specified conditions in order to find an optimal control policy. Thus, for any specified initial conditions and parameter values the optimal policy for reactor operation can be obtained from simulation. We have an example system of nosiheptide [1] and used gradient method to find optimal policy. Although the convergence is slow, an optimal solution is obtained and various plots are prepared that illustrate the applicability of the method well.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79722928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mr. Rupesh Mahajan, Dr. Purushottam R. Patil, Dr. Amol Potgantwar, Dr.P.R. Bhaladhare
Cloud computing relies heavily on load balancing, which ensures that all of the resources, such as servers, network interfaces, hard drives (storage), and virtual machines (VMs), stored on physical servers, are working at full capacity at all times. A typical problem in the cloud is load balancing, which makes it difficult to keep the performance of the applications in line with the Quality of Service (QoS) measurement and the Service Level Agreement (SLA) contract that cloud providers are obligated to give to organizations. It's difficult for cloud providers to fairly divide the work between their servers. Multi-objective optimization (MOO) algorithms, ant colony optimization (ACO) algorithms, honey bee (HB) algorithms, and evolutionary algorithms are all examples of this type of method. The foraging activity of insects like ants and bees served as inspiration for the ACO and HB algorithms. The single-objective optimization problems can be solved by these two techniques, though. ACO and HB need revisions to work with MOPs. This paper summarizes the surveyed optimization methods and describes the modifications made to three specific algorithms.
{"title":"Load balancing-based Optimization Techniques in Cloud Computing: A Review","authors":"Mr. Rupesh Mahajan, Dr. Purushottam R. Patil, Dr. Amol Potgantwar, Dr.P.R. Bhaladhare","doi":"10.32622/ijrat.91202107","DOIUrl":"https://doi.org/10.32622/ijrat.91202107","url":null,"abstract":"Cloud computing relies heavily on load balancing, which ensures that all of the resources, such as servers, network interfaces, hard drives (storage), and virtual machines (VMs), stored on physical servers, are working at full capacity at all times. A typical problem in the cloud is load balancing, which makes it difficult to keep the performance of the applications in line with the Quality of Service (QoS) measurement and the Service Level Agreement (SLA) contract that cloud providers are obligated to give to organizations. It's difficult for cloud providers to fairly divide the work between their servers. Multi-objective optimization (MOO) algorithms, ant colony optimization (ACO) algorithms, honey bee (HB) algorithms, and evolutionary algorithms are all examples of this type of method. The foraging activity of insects like ants and bees served as inspiration for the ACO and HB algorithms. The single-objective optimization problems can be solved by these two techniques, though. ACO and HB need revisions to work with MOPs. This paper summarizes the surveyed optimization methods and describes the modifications made to three specific algorithms.","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85854950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of Demolished Material in Concrete","authors":"M. Deshmukh","doi":"10.32622/ijrat.85202030","DOIUrl":"https://doi.org/10.32622/ijrat.85202030","url":null,"abstract":"","PeriodicalId":14303,"journal":{"name":"International Journal of Research in Advent Technology","volume":"262 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79673916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}