View ijsrd journal's profile on LinkedIn
Showing posts with label e- Journal. Show all posts
Showing posts with label e- Journal. Show all posts

Saturday, December 19, 2015

Conference On Mechanical Engineering & Technology | #COMET2016

IIT(BHU), Varanasi 
Mechanical Engineering Society
COMET 2016
(Conference On Mechanical Engineering & Technology)

in association with
IJSRD – International Journal for Scientific Research & Development

Conference On Mechanical Engineering and Technology (COMET) was commenced with the aim of promoting excellence in the field of mechanical engineering and to provide a platform for bringing out the best among the department’s students. What started as a simple initiative soon spiralled into a conclave. Needless to say it has experienced exponential growth in the sheer number of participants, both internal and external alike, augmented by the quality alongside. The events in its fold have enthused engineers from colleges nationwide thus increasing its domain of influence over the years. Attracting almost 1000 odd external participants in its previous edition, we are confident that these will be more than double positively for the upcoming edition.


Colloquium,the paper presentation contest, offers a platform to the participants to present & exchange their ideas, innovations and solutions to engineering problems in front of a very scholarly audience. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world. COLLOQUIUM is the premier forum for the presentation of new advances and research results in the fields of theoretical and experimental mechanical engineering. Students (B.E/B.Tech./M.Tech./Ph.D.), researchers and qualified personnel interested in the field of mechanical engineering are invited to present papers.
We hope that conference results will lead to significant contributions to the knowledge in these up-to-date engineering and scientific fields. 

  1. Topics of interest for submission include, but are not limited to:
  2. Advanced Manufacturing System.
  3. Applications of Aerospace Technology.
  4. Automation and Robotics.
  5. Automobile engineering.
  6. Biomechanics and Bioinstrumentation.
  7. Concurrent Design of Vibration System.
  8. Fluid Mechanics.
  9. Human Values and Professional ethics.
  10. Industrial Management.
  11. Material Science.
  12. Nanotechnology.
  13. Non-Conventional Sources of Energy.
  14. Thermal Engineering

Organized by

Mechanical Engineering Society,
Mechanical Engineering Department, 

Publication Partner

International Journal for Scientific Research & Development
Website :

Monday, September 21, 2015


Nine Laws of Data Mining

Data mining is the creation of new knowledge in natural or artificial form, by using business knowledge to discover and interpret patterns in data.
In its current form, data mining as a field of practise came into existence in the 1990s, aided by the emergence of data mining algorithms packaged within workbenches so as to be suitable for business analysts.  Perhaps because of its origins in practice rather than in theory, relatively little attention has been paid to understanding the nature of the data mining process.  The development of the CRISP-DM(#ijsrd) methodology in the late 1990s was a substantial step towards a standardised description of the process that had already been found successful and was (and is) followed by most practising data miners.
 Although CRISP-DM(#ijsrd) describes how data mining is performed, it does not explain what data mining is or why the process has the properties that it does.  In this paper I propose nine maxims or “laws” of data mining (most of which are well-known to practitioners), together with explanations where known.  This provides the start of a theory to explain (and not merely describe) the data mining process.
 It is not my purpose to criticise CRISP-DM(#ijsrd); many of the concepts introduced by CRISP-DM(#ijsrd) are crucial to the understanding of data mining outlined here, and I also depend on CRISP-DM’s(#ijsrd) common terminology.  This is merely the next step in the process that started with CRISP-DM(#ijsrd).
1st Law of Data Mining – “Business Goals Law”:
Business objectives are the origin of every data mining solution
2nd Law of Data Mining – “Business Knowledge Law”:
Business knowledge is central to every step of the data mining process
3rd Law of Data Mining – “Data Preparation Law”:
Data preparation is more than half of every data mining process
4th Law of Data Mining – “NFL-DM”:
The right model for a given application can only be discovered by experiment or“There is No Free Lunch for the Data Miner”
5th Law of Data Mining – “Watkins’ Law”:
There are always patterns
6th Law of Data Mining – “Insight Law”:
Data mining amplifies perception in the business domain
7th Law of Data Mining – “Prediction Law”: 
Prediction increases information locally by generalization
8th Law of Data Mining – “Value Law”:
The value of data mining results is not determined by the accuracy or stability of predictive models
9th Law of Data Mining – “Law of Change”:
All patterns are subject to change
For more such useful information about data mining and other latest research topics please visit

Friday, August 15, 2014

#IJSRD advanced persistent threat (APT)

Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on

Wednesday, August 13, 2014

#IJSRD Cost effective and innovative housing technology

Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser FUNDS, without compromising with the quality control and structural stability of the structure.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on