Removal of waste dyes from water by organic wastes
Dyes are colored compounds that are used in cosmetics, clothing, plastics, textile, and many more industries. Dyes attach themselves to the surfaces to give them color. Dyes are soluble in water and also make the water acidic. Organics dyes are toxic in nature and are one of the major contributing factors to water pollution because waste dyes are released into water bodies causing adverse effects on the aquatic environment. The dyes contain metal ions and other colored compounds. Since dyes are organic compounds they are aromatic rings and hence also have nitro, sulfo, chloro, and amidocyanogen chains which can be hazardous. Releasing organic dyes can also cause inhibit aquatic plant growth, it can also be consumed by a human and cause diarrhea and it can also make the water carcinogenic. ‘One way to remove waste dyes from water is adsorption. Adsorption is when molecules of a liquid, gas, or solution stick together to the surface of a solid, coating the solid (adhesion). The solid surfaces that they stick to are called sorbents. Sorbents are insoluble materials that are used to collect liquids by either absorption or adsorption. The three types of sorbents are Natural organic sorbents, Natural inorganic sorbents, and Synthetic sorbents (man-made materials).’5 In some places, dyes are removed from water using activated carbon but it is expensive and preparing it with the optimum conditions consumes a lot of energy, which prevents it from being used on a larger scale. The goal of this research is to show that Natural organic sorbents can be used to remove dyes from water as this is a more efficient, cheap, and most importantly environment-friendly method by measuring the turbidity of a solution.
Published by: Netra Patadia
Author: Netra Patadia
Paper ID: V8I4-1178
Paper Status: published
Published: July 18, 2022
Confidential data protection using a multi-level security approach in the cloud
Cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale. This exciting computing model depends on data traffic and is controlled by a third party. Despite the expected savings in infrastructure and the development cost for business flexibility, security is still the biggest challenge for the implementation of computing for many service-based companies. Security in cloud computing is mainly focused on the protection and guaranteeing data security. This paper discusses challenges related to data security and privacy implementation in a cloud computing environment. A multiple-level approach is proposed to accommodate the protection of confidential data in a cloud computing environment. This framework consists of different levels application security level, keyword-based file search, public key, and fingerprint verification level. The main objective of this paper is to discuss the framework implementation and its architecture verification. It is expected from the research a verified framework to protect private and confidential data in a cloud environment.
Published by: Sagar Bagale, Sudhir Shinde
Author: Sagar Bagale
Paper ID: V8I4-1165
Paper Status: published
Published: July 18, 2022
Intelligent security response system
Secure product development is the mantra for having lesser vulnerabilities during the life cycle of a product. There are many well-known frameworks and policies companies have been following to ensure the same. E.g. Shift left security. While this is a proactive measure in ensuring security, the reactive support from the security response team also plays an equal role. The mission of any Security Response Team is to protect confidentiality, integrity, and availability of companies’ & customers' data by ensuring a responsible disclosure of security vulnerabilities reported by external/internal sources in the product portfolio and in the services portfolio. Through this study, an attempt is made to find out and list down the risks involved if there is a deviation from responsible disclosures by external researchers and along with that explore a technical solution that could help companies have the details of the risk, at first hand. The very reason to name this solution an “Intelligent Security Response System” is that it brings in that extra intelligence that sometimes slips out from normal proactive monitoring solutions. The solution also has the capability to intelligently identify risk ratings and filtering logic, from the historic data which gives it an upper hand in terms of quickly identifying and notifying a threat with a false positive. With the onset of the latest technological disruptions, and the bad actors using all means to exploit the product vulnerabilities, this study also intends to identify the possible shortfalls and opportunities for improvement.
Published by: Suresh K. P.
Author: Suresh K. P.
Paper ID: V8I3-1449
Paper Status: published
Published: July 18, 2022
Messenger service using AWS and sprinboot framework
Cloud computing is a technology for delivering pervasive, appropriate, sought-after networking access to shared computing resources such as storage, networks, servers, applications, and services that can be quickly equipped and supplied with minimal maintenance or service provider engagement. Most organizations have chosen cloud computing because it is believed to be safer and more trustworthy, especially in inventory tracking. Amazon, with its Amazon Web Services (AWS) business, is at the forefront when it comes to providing cloud computing services around the world. The cloud-based email service uses a serverless an architecture which is the microservice type which will be enacted using Springboot Framework and Amazon Web Services including AWS Lambda, Simple Notification Service, Simple Queue Service (SQS), Simple Email Service (SES), Simple Storage Service (S3), Elastic Compute Cloud (EC2) and CloudWatch. The proposed work is to implement a cloud-based email service using AWS to send bulk emails with less time using email templates and configure services to monitor the email sends deliveries, failures, and complaints
Published by: Shivani, Rekha B. S.
Author: Shivani
Paper ID: V8I4-1162
Paper Status: published
Published: July 18, 2022
Manual and software-based design of RCC g+1 building and its comparison
Civil Engineering is an ever-changing industry. With advancements in technology, we have seen the civil engineering field evolve from working solely with concrete to now designing and building with the help of computer technology. The project deals with different software used in civil engineering like AUTO CAD, REVIT, ETABS, and STAAD PRO which are useful for project completion in various ways. Auto CAD helps with detailed drawings of 2D floor plans. After that for obtaining more details 3D model of the building can be made with help of Revit then design and analysis are done with STAAD PRO.
Published by: Shraddha Pawar, Kamlesh Chaudhari, Om Zakarde, Shweta Giram, Tejal Borkar, Sanjana Pawar, Balram Lagad, Dr. S. R. Bhagat
Author: Shraddha Pawar
Paper ID: V8I4-1177
Paper Status: published
Published: July 15, 2022
Traffic Density Analysis
Congestion in activity is a serious issue these days. From city streets to roadways, a ton of traffic issues happen every day. Terrible traffic administration prompts the wastage of parts of labor hours. These continuous issues like congested driving conditions have forced the requirement for a proficient traffic administration technique. Current activity control procedures including attractive circle finders covered inside the street, infra-red and radar sensors as an afterthought give constrained movement data and require isolate frameworks for traffic checking and for activity reconnaissance. Conversely, video-based frameworks offer many points of interest in thinking about the existing advancements. There can be many purposes behind activities like inadequate limits, excessive requests, huge red-light deferrals, and so on. This paper outlines an audit of different strategies for building up a wise movement recognition calculation in view of various research papers alluded. It additionally demonstrates a survey on various techniques under picture handling for building up a clever movement framework. Different strategies on this point have been investigated on this such as, savvy activity controller utilizing constant picture preparation, utilizing DSP and NIOS II, utilizing the implanted framework, and utilizing a remote sensor network. Various creators utilize diverse systems like identifying the resulting quantities of vehicles identified from the video caught utilizing the cameras introduced at the paths or utilizing live encourage from cameras at movement intersection for ongoing traffic thickness figuring utilizing picture and video handling or making utilization of remote sensors to detect the nearness of movement on streets. Correlation and overview of each of these strategies are analyzed in this paper which presumed that utilization of picture preparation makes investigation of traffic nearly effective.
Published by: Gaurav Thakur
Author: Gaurav Thakur
Paper ID: V8I4-1173
Paper Status: published
Published: July 14, 2022