Asian Journal of Engineering and Applied Technology <p>Asian Journal of Engineering and Applied Technology (AJEAT) is a half-yearly international journal devoted to the publication of peer-reviewed original high-quality research papers and review papers in all disciplines of engineering and applied technology.</p> en-US (Dr.M.Ramya) (Ms.Sukanya) Sat, 15 May 2021 00:00:00 +0530 OJS 60 Mechanical Properties for Elephant Dung and its Utilization as a Raw Material Composites Sheet: A Study <p>Elephant dung is an excellent source of cellulosic fiber that is a basic requirement for paper making. But they contributed to very small percentage production of elephant dung. So, researchers are trying to find a new area of utilization of elephant dung fiber pulp as in reinforcement’s polymer composite. In this experiment element dung fiber pulp in the natural fiber component chemically treated with alkaline and soda AQ solution in this study, it has been aimed to use elephant dung fiber pulp in composite material and to study mechanical properties of the produced material. The produced composite samples were then characterized using tensile test, Izod impact test, thickness test. The fracture surface of the polymer composite sample was also inspected with the help of SEM. The content of elephant dung fiber pulp is varied (35%, 45%, 55%) weight percentage whereas the epoxy resin is varied (50%, 40%, 30%) percentage is kept constant 15% in hardener. The entire sample has been tested in a universal testing machine as per ASTM standard for tensile strength and impact strength. It is observed that composite with 35% fiber pulp is having the highest tensile strength of 4mm 6.445 Mpa and 8mm 11.80 Mpa. The impact strength of composite with 35% fiber pulp washes highest than 45% to 55% dung fiber pulp. This produces composite sheet will be used for the surfboards, sporting goods, building panel this not only reduces the cost but also save from environmental pollution.&nbsp;</p> Rohit Kumar, Ramratan, Anupam Kumar, Rajinder Singh Smagh Copyright (c) 2021 Wed, 05 May 2021 00:00:00 +0530 Performance Analysis of Smart Stick Designed for Visually Impaired People Using GSM and GPS <p>Visual impairment burdens the people heavily in today’s fast-moving culture. Although there are several measures for this impairment, many people skip such chances in fear of their economic condition. In view of helping those people, a sophisticated stick is designed using sensors like ultrasonic sensor, IR sensor and Arduino ICs. Electronically designed walking stick helps to trace the locations using GPS module and to avoid collisions through detection of objects at a certain range of distance from the person in all directions. Sensor placed beneath the bottom of the stick enables the identification of pits/hindrances on the ground. The visually impaired person will be alerted with a voice message generated using the voice recorder which records the response of all the sensors operating in different tracks. In this paper, GSM and sensors together have initiated the role of smart walking stick in the life of several human kinds.</p> N. Amutha Priya, S. Sahaya Sathesh Raj, K. Siva, R. Vetha Jebarson, P. Vignesh Copyright (c) 2021 Wed, 05 May 2021 00:00:00 +0530 Zero Cement Concrete with Self-Curing Technology: An Overview <p>Geopolymer concrete is the concept of environmental friendly construction material which helps in reducing the greenhouse gas emission, however it cannot be applied directly on field due to its steam curing process. To overcome this defect various researcher have found self-curing or ambient curing process to achieve same strength as in steam curing process for geopolymer. This paper presents an over review about self-cured or ambient cured geopolymer concrete produced by various methods.</p> N. Anuja, A. Mohammed Yasar Copyright (c) 2021 Wed, 05 May 2021 00:00:00 +0530 Person Re-Identification Using Deep Learning Approach: A Survey <p>Person Re-identification proof crosswise over various observation cameras with disjoint fields of view has turned out to be one of the most intriguing and testing subjects in the zone of wise video observation. Albeit a few techniques have been created, what's more, proposed, certain confinements and uncertain issues remain. In the majority of the current Re-identification proof approaches, highlight vectors are separated from sectioned still pictures or video outlines. Distinctive similitude or disparity measures have been applied to these vectors. A few strategies have utilized basic consistent measurements, while others have used models to acquire streamlined measurements. Some have made models dependent on neighborhood shading or surface data, and others have constructed models dependent on the stride of individuals. When all is said in done, the primary goal of every one of these methodologies is to accomplish a higher-exactness rate and lower computational costs.</p> R. Mallika Pandeeswari, S. Shargunam, G. Rajakumar Copyright (c) 2021 Wed, 05 May 2021 00:00:00 +0530 Image Compression Techniques Using Linear Algebra with SVD Algorithm <p>In recent days, the data are transformed in the form of multimedia data such as images, graphics, audio and video. Multimedia data require a huge amount of storage capacity and transmission bandwidth. Consequently, data compression is used for reducing the data redundancy and serves more storage of data. In this paper, addresses the problem (demerits) of the lossy compression of images. This proposed method is deals on SVD Power Method that overcomes the demerits of Python SVD function. In our experimental result shows superiority of proposed compression method over those of Python SVD function and some various compression techniques. In addition, the proposed method also provides different degrees of error flexibility, which give minimum of execution of time and a better image compression.</p> S. Karthigai Selvam, S. Selvam Copyright (c) 2021 Wed, 05 May 2021 00:00:00 +0530 A Study on Novel Corona Virus Disease (COVID-19) <p>COVID-19 is a global pandemic and life threatening virus that mainly influences the respiratory tract of mammals, consisting humans being. It was 1st isolated in 1937 from an infectious bronchitis virus in birds. Many years ago, scientists have investigated that corona virus can infect mice, horses, dogs, pigs, rats, cats, cattle and turkeys. This zoonotic virus was first identified from Wuhan City, China and presently increasing very rapidly. The world has confirmed 141,057,106 cases, which includes 3,015,043 deaths and 793,484,083 vaccine doses administered as per the WHO till 20th April, 2021. Hence the aim of this paper is to provide a detailed review of COVID-19 including their history, origin, characteristics, symptoms and impacts along with preventive measures to be taken to restrict the outbreak of this evil virus of on human life.</p> Harsimran Singh, Santosh Kumar, Rakesh Kumar Copyright (c) 2021 Wed, 05 May 2021 00:00:00 +0530 Attack in SDN Based Distributed Denial of Service <p>DOS assaults are executed with the aid of using assault tools, worms and botnets the usage of exclusive packet-transmission techniques and diverse types of assault packets to conquer protection structures. These issues cause protection structures requiring diverse detection techniques to be able to discover assaults. Moreover, DOS assaults can blend their traffics for the duration of flash crowds. By doing this, the complicated protection machine cannot locate the assault site visitors in time. In this challenge a conduct primarily based totally detection the usage of Crowd Correlation Analysis which can discriminate DOS assault site visitors from site visitors generated with the aid of using actual customers. In the Euclidean area to specific as a diagonal matrix proposed can grasp the potential of community machine towards every assault manner and the protection functionality of community machine. Cyber-assault consisting of DDOS assault continues to be the maximum effective assault that disrupts the real customers from having access to the crucial offerings. In software layer-primarily based totally DDOS assault, attacker makes use of different gadget in preference to the usage of his very own IP cope with to flood the focused machine and disrupts the offerings SDN (software program described networks) for value performance and community Application layer allotted denial of provider (DDOS) assaults have turn out to be a extreme hazard to the safety of net servers. These assaults avoid maximum intrusion prevention structures with the aid of using sending several HTTP requests flexibility, however DDOS is one of the maximum released assault on SDN layer. DDOS assault on this kind of surroundings results in machine failure DDoS is one of the maximum released assault on SDN layer. DDOS assault on this kind of surroundings results in machine failure monetary loss, facts theft, and overall performance degradation massive survey has been made to locate and save you DDOS primarily based totally assault in software layer and SDN primarily based totally surroundings. We suggest an powerful protection machine, named Sky Shield, which leverages the caricature facts shape to fast locate and mitigate software layer DDOS assaults. Novel calculation of the divergence among sketches, which alleviates the effect of community dynamics and improves the detection accuracy.</p> S. Selvakani, K. Vasumathi, T. Vijayalakshmi, A. Kavitha Copyright (c) 2021 Wed, 05 May 2021 00:00:00 +0530