Development of Secure Image Transposal Algorithm Using 16 *16 Quantization Table
Authors: Vijay Bhandari, Dr. Sitendra Tamrakar, Dr. Piyush Shukla, Arpana Bhandari
Abstract:–Computerized picture scrambling can make an picture into a totally diverse good for nothing picture amid modification,and it is a preprocessing amid stowing away data of the computerized picture, which too known as data camouflage.Picture scrambling innovation depends on data cover up innovation which permits non-password protection computation for data cover up.Data stowing away innovation driven to a insurgency in the fighting of organize data,since it brought a arrangement of unemployed combat computations,and a part of nations pay a part of considerations on this zone. Organize data fighting is an imperative portion of data fighting, and its center thought is to utilize open organize for private data transference.The picture after scrambling encryption computations is chaotic,so aggressor cannot disentangle it.A few made strides advanced tidemarking innovation can apply scrambling method to alter the dispersion of the mistake snippet in the picture to move forward the strength of computerized tidemarking innovation.Arnold scrambling computation has the highlight of effortlessness and periodicity, so it is utilized broadly in the computerized tidemarking technology.
Enhancement of Thermal Plant Efficiency by Using Double Pipe Heat Exchanger
Authors: M. Tech. Scholar Indrajit Patidar, Asst. Prof. Nilesh Sharma
Abstract:–The heat exchanger section of a thermal power plant uses water as a coolant, which is incapable of extracting the low grade heat input in the heat exchanger section. This results in loss of a major chunk of heat energy from the thermal power plant. However, with the use of a proper coolant in the heat exchanger section, it is possible to utilize the heat available in the heat exchanger. This can be done by introducing a secondary cycle for energy generation along with the conventional primary cycle. Isobutane, with its appropriate physical properties, proves to be a good coolant in the secondary cycle for energy extraction from the low grade heat available in the heat exchanger section. The efficiency of a conventional thermal power plant can be improved from 80% to around 87 – 87.65% by incorporating this change. Although, the paper details the improvement of efficiency in a thermal power plant, same methodology can be used in any steam operated power plant, such as in nuclear power plants, in geothermal power plants, or in solar thermal electric power plants. The improvement in efficiency leads to lesser burden on non-renewable resources, such as coal and nuclear fuel, and also lowers the pollution effects on the environment. Proper practical implementation of the proposed model has the potential to revolutionize the energy generation paradigm of the world.
A Study of Customer Satisfaction with Business-To-Business Customers Model
Authors: Shashanka. B. K
Abstract:– Most benefit looking for associations are at last kept running by cash and the specific retail stores are the same in that. In retail markets the customers are the hotspot for benefits and organizations trying to procure them are continually growing new techniques keeping in mind the end goal to get the aggressive edge that baits the customers in to their stores. At the point when a company offers products and services that satisfies the requirements of the customer and produces extra esteem, satisfaction and saw quality appropriately then the company has the best possibilities for progress. High customer satisfaction is one focused edge a company can have and one reason why it is such a critical piece of a company’s methodology and has seen such a large number of researches and concentrates after some time is its association with gainfulness. The customers for the situation company X comprise of ordinary family unit purchasers and business-to-business customers. X conducts periodical studies that measure the satisfaction of the ordinary family unit buyers yet no research have yet been done to quantify the satisfaction of the business customers. This research will in this manner give new information to X and the aftereffects of this study can be valuable to the company for increasing better outcomes. As per this study the B2B customers are somewhat happy with the services and products of X. The desires for the customers were likewise met great. The most noteworthy factor for the B2B customers to visit in X was observed to be the area of the company, which had a definitive impact to the expenses for the customers.
Comparison Study of Flash & Fire Point of Bio-diesel Produced by Mustard and Soya Bean Oil
Authors: Asst. Prof. Mahesh Chand Saini, Mayank Sharma, Manoj Bhandari, Md. Nazwazish
Abstract:–Consumption of fossil fuel is increasing day by day that results decrease in amount of fossil fuels present on earth. After 30-40 years these sources are in danger of extinction so as to meet the requirement of human beings there is a need of using the alternative source of fuels. One of them which cause as alternative fuel that is derived from the vegetable oils and fatty acids. It is a key source as an alternative fuel. The process of biodiesel production is completed by the trans-etherification process and it is the chemical reaction between oil and alcohol in the presence of catalyst which results separating bio-diesel and glycerin. The process is completed in 2-4 hours and also depends upon the type of vegetable oil. Properties of Bio-diesel are also depends on the used oil. This paper illustrates the comparison between Soya bean and mustard oil Bio-diesel which is followed by different parameter such as Flash & Fire Point. Various ratios of blends of Bio-diesel (5%, 10%, 15%and 20%) are taken. Both edible and non-edible oil are used for producing the bio-diesel.
A Review of Methods of Analysis and Mitigation of Landslide
Authors: Emmanuel Arinze, Paul Chibundu Enyinnia, Aju Daniel Ekan, Anthony Chibuzo Ekeleme
Abstract:–Cities around the world that are located on a hilly and mountainous areas are always faced with the challenge of landslide, which can be disastrous and always result to loss of life and properties when it happens, and large expenditures are being incurred by Governments on the investigation, design and implementation of mitigation and preventive measures to reduce the likelihood of the loss of life and economic losses due to landslides. Landslide analysis can be based on hazard or susceptible. The formal is based on evaluation of probability of a landslide failure within a specified period of time and within a given region, while the later is based on classifying the region into several successive classes with different potentials of landslide. Based on the forgoing this paper is focused on the review of landslide hazard analysis and mitigation. There are four ways to a modern landslide hazard analysis which include Inventory approach, Heuristic approach, Statistical approach and Deterministic approach. Mitigation of landslide is based on the type of landslide, the different types of landslide has its own mitigation method which was discuss in this paper type by type. The four approaches can be applied for regional landslide hazard mapping. All the approaches have their shortcomings. The inventory analysis require a lot of maps which require interpretation, the heuristic analysis require a long- period landslide data, which may be insufficient in length of historical records, incompleteness in inventory and a possible mixing of extreme events, the statistical approach looks better as comparing with the weakness of the other three approach, but there still are some further development needed to predict landslide.
Reversible Image Data Embedding using Modified Histogram Feature
Authors: M. Tech. Scholar Kanchan Sahu, Asst.Prof. Pravin Malviya
Abstract:–With the increase in the digital media transfer and modification of data is very easy. So this work focus on transferring data by hiding in image. In this work carrier image was used to hide data where Low Frequency Region was utilized. Here whole data hiding is done by modified by using histogram feature shifting method. This approach was utilized to the point that hiding information and image can be effectively recovered. Investigation is done on genuine dataset image. Assessment parameter esteems and demonstrates that proposed work has keep up the SNR, PSNR values with high security of the information.
An Improved Approach for Tracking in Maneuvering Target Environment
Authors: M. Tech. Scholar Umesh Kumar Ahirwar, Asst. Prof. Nitin Choudhary
Abstract:–A Modern sensor networks, we need most important parameter is Self-organizing capacity for tracking maneuvering (non-constant) targets. for performance gained lot of attention to point out the control and coordination problem in self-organizing sensor network environment used flocking based methods. In this paper we are these type two well-known algorithms, namely, the Flocking and the Semi-Flocking algorithms. Although these two algorithms have demonstrated promising performance in tracking linear target(s), they have deficiencies in tracking maneuvering targets. Flocking algorithm is applied for tracking the target in maneuvering environment. In this paper we are analyzing the performances of flocking-based algorithms, both with and without the proposed approach, are examined in tracking both linear and maneuvering targets. Experimental results demonstrate how flocking algorithm yields better tracking of maneuvering targets, and how applying flocking concept on the target tracking process to improves the quality of tracking and increases the speed of convergence.
A Review on Different Algorithms for Tracking in Maneuvering Target Environment
Authors: M. Tech. Scholar Umesh Kumar Ahirwar, Asst. Prof. Nitin Choudhary
Abstract:–Self-organizing capacity is the most important need of modern sensor networks; particularly for tracing or tracking maneuvering (non-constant) targets. In this paper we presented the different technique of maneuvering Tracking algorithm & also we are proposing which technique is best for this tracking system. In this research brief literature review of different existing algorithm for maneuvering tracking system and proposed a system for maneuvering tracking system for modern sensor network.
Digital Image Retrieval Using Annotation, CCM and Histogram Features
Authors: M. Tech. Scholar Shalinee Jain, Asst. Prof. Sachin Malviya
Abstract:– As the quantity of web clients are expanding every day. This work concentrate on the retrieval of pictures by using the visual and annotation characteristics of the images. In this work two kind of features are utilized for the bunching of the picture dataset. So Based on the comparability of annotation, CCM and histogram components of the picture bunches are made. For bunching here genetic approach was utilized. Here client pass two kind of queries first was content while other is image, this assistance in choosing suitable cluster for retrieval of picture. Analysis was done on genuine and artificial set of pictures. Result demonstrates that proposed work is better on various assessment parameters as contrast with existing strategies.
Development of Safety and Productivity Correlation for A Rolling and Wire Drawing Factory
Authors: M. Tech. Scholar Kamal Shukla, Asst. Prof. Vijay Shankul
Abstract:– The work productivity of workers in a company is affected by several factors, one of which is occupational safety and health program and there is a significant effect of safety and health program on work productivity of workers either simultaneously or partially. A poor safety standard primarily originates from the belief that safety and productivity are mutually exclusive objectives, one eating away the other. But in practice they are correlated. The knowledge of exact nature of dependence of productivity with safety and health in industry is `therefore highly significant in the context of production. In this project safety and productivity are the two parameters have been focused and the mutual correlation between the two has been analyzed on the basis of the data obtained from the industries various department of safety and productivity and has been presented in the tabulated form by using the data with respect to safety and productivity. The developed correlation is a functional relation between total factor productivity and safety elements and cost of production. Hence, the developed correlation can be used to predict total factor productivity (TFP) from the knowledge of the values of input safety elements and planned cost of production.
Garbage Management for Smart Cities Using Internet of Things
Authors: M. Tech. Scholar Anjali Urmaliya, Dr. Neeraj Shukla
Abstract:– Garbage Management of smart city using “Internet of Things”. In our daily life we produce a lot of waste or garbage as last few years witnessed a tremendous rate of population, and it’s also important to manage that garbage properly generated by peoples. By using Internet of things it will easy to manage all the garbage. I will use some IOT devices for the management of garbage of smart city, smartly. The Devices that will make it complete are “Arduino Uno, Raspberry Pi, ESP8266, MQTT Protocol. It Is will also support the “Swachha Bharat Abiyan” campaign by Prime Minister Of India. The purpose of the mission is to cover all the rural and urban areas of the country to present our country as an ideal country to the world. Waste Management is one of the primary things to solve the problem that the world faces to developing country. The main aim of the work is to develop a smart intelligent garbage alert system to for proper management of garbage.
Controller Analysis of Reaction Wheel System for Counter Torque
Authors: Ye Min Htay, Thu Thu Aung
Abstract:– This work addresses the reaction wheel system (RWS) for a Nano satellite and simulator which shows the function of it. The object is to design flywheels that counteract the disturbance torques experienced by satellite in the harsh space environment and to stabilize the platform of simulator. The performance of reaction wheels is analyzed to achieve the stable for system. The satellite and simulator utilizes three reaction wheels as actuators. The controller is designed to change the rotational speed of reaction wheels to adjust the satellite and simulator in the desired position. The mathematical model of reaction wheel system using angular kinetic equation is developed. Control theory is then applied for a required response that deals with both non linarites in equations and disturbance sources. Simulation of closed loop system shows that all desired specification of closed loop (rising time, settling time and steady state error) are robustly satisfied.
Probing the Effect of Parameters of Wire-EDM on Cutting Speed and Surface Integrity for D2 Steel
Authors: Nitin Kumar, Dinesh Panchal, Naveen Gaur
Abstract:– The indent of alloy steel of high toughness, hardness and strength is proliferating in present era of materials .These materials are used for typical Purpose. As difficulty is encountered in machining of these materials by traditional methods of machining. Wire cut EDM is used to machine them. It has been become an important machining process because it avails an effective way out for generating components made of materials like titanium, zirconium and complex shapes , which are rather difficult to attain by other machining methods. Due to large number of process parameters and responses, a lot of researches have tried to optimize this process. A remarkable amelioration in process efficiency may be obtained by optimization of parameters which recognize the region of censorious process control factors which leads to required response ensuring a lower cost of production.
A Survey on various Techniques of Energy Management in Wireless Sensor Network
Authors: M.Tech.Scholar Prakash Kumar Singh
Abstract:– The availability of sensor devices allow a wide variety of applications to emerge. However, the resource constrained nature of sensors raises the problem of energy: how to maximize network lifetime despite a very limited energy budget. This paper gives a concise study of WSN (Wireless Sensor Network) energy balancing methods proposed by different researchers. Different sorts of requirement of protocols for managing WSN was additionally talked with their significance and limitations. In this study as per working steps of techniques are categorized, so a comprehensive and comparative understanding of existing literature was detailed.
A Survey on Online Social Network Based User Community Identification Techniques and Features
Authors: Asst.Prof.Raju Sharma
Abstract:– As the amount of web customers are extending each day. Presently a user connecting the social personality over the distinctive web-based social networking stages is of basic significance to business intelligence. In this paper, a survey of similarity based user community detection methodologies were discussed for finding the exceptional arrangement of users. Here different features of the social user profiles were identified as per there requirement. So current issues are summarized in the paper for the solution of the work.
GSM Based Gas Leakage Detection System
Authors: Mohit Nankani, Vinay Nagrani, Ajay Mandliya, Jemila Rani
Abstract:– Gas leakage is a major problem with industrial sector, residential premises and gas powered vehicles like CNG (compressed natural gas) buses, cars. One of the preventive methods to stop accident associated with the gas leakage is to install gas leakage detection kit at vulnerable places. The aim of this paper is to present such a design that can automatically detect and stop gas leakage in vulnerable premises. In particular gas sensor has been used which has high sensitivity for propane (C3H8) and butane (C4H10). Gas leakage system consists of GSM (Global System for mobile communications) module, which warns by sending SMS. However, the former gas leakage system cannot react in time. This paper provides the design approach on both software and hardware.
A Study of the Learning Curve of the Japanese Keyboard on Smartphone
Authors: Muhammad Suhaib
Abstract:– Japanese (Nihongo) is an east Asian Language, extensive use of Chinese character called KANJI and Phonetic Characters called KANA (hiragana and katakana). Many people assume Japanese Keyboard on smartphone is difficult to use that’s why I decide to conduct study to determine how easy to learn Japanese Keyboard for new users. Two user with no experience with Japanese keyboard on smart phone were asked to enter some Japanese sentences as fast as they can at least 20 times and same thing was asked to experienced users as well.
Dominance of Artemisia community and Stragalus community in arid area of Iran:True or not?
Authors: Reza E. Owfi
Abstract:– As mentioned in the most of the relevant sources, in other parts of the arid regions of Iran the dominance of theArtemisiaand Astragaluscomunity may vary from an Astragalus species to another species of it, whether individually or in combination. Here are two previous researches on vegetation coverage in two regions of Iran which are located in a group of arid areas and on the other hand, have a large distance from each other: Catchment area of farm Haj Hassan in Yazd province and Maharloo Lake in Fars Province. After examining the two researches, the results of these studies were evaluated and, in the end, analyzed the information obtained from the above studies, which indicates the validity of the aforementioned claim.
Social Security’s Allowances in Nepal and Its Impact on Rural Economy Evidence From Chandrapur Municipality Rautahat
Authors: PhD. Scholar Kirti Raj Subedi
Abstract:– Social security’s allowances program (SSAP) is being popular day by day in Nepal. Nepal’s national social protection program (SPP) aims to control multidimensional deprivations, life cycle risks, and providing people with a basic minimum livelihood. Nepal has launches many social protection program. Nepal have five social security’s allowances program (SSAP) include five schemes targeting: Children of Dalit under-five years of age , Widows and single women over 60 years of age , People with disabilities , Senior citizens over 70 years of age (over 60 years of age in the case of Dalit) , Highly marginalized indigenous ethnic groups (Janajatis). Theses SSAP schemes are managed by the Department of Civil Registration (DoCR) under the Ministry of Federal Affairs and General administration (MoFAGA), and delivered through local governments.The UN has proposed in Sustainable Development goal (SDG) to provide social security’s for all by 2030. (world Bank, 2015).The developing countries are introducing social security’s allowances program with large range with different modalities. Nepal has expending on social security’s 2.3 % of its Gross domestic Product (GDP). Nepal governmenthas providing more than 89 social security’s allowances schemes to the citizens through the various ministry.
Social protection is inevitable for the better lifestyle to the pro poor and the political support also highly acceptable in Nepal but the economic condition and the paying capacity of the government is very low so here is a matter to diabetes how much , to hum should pay by the government. Nepal has just successfully complete the election of three tier government. The social security’s allowances only manage by the federal government and some social protection scheme lunched by the local government. Nepal has several social protection schemes but they have not adequate in term of cash transfer. Lack of integrated social protection policy the cost of government is growing up to manage the social protection program.
Improvement in Cloud Storage Auditing with Verifiable Outsourcing of Secure Key
Authors:M.Tech.Scholar Tanuj Sharma, Asst.Prof. Lakhan Singh, Asst.Prof. Ankur Taneja
Abstract:– Presentation Cloud registering is a current mechanical advancement in the processing field in which for the most part centered around outlining of administrations which can be given to the clients in the same route as the fundamental utilities like nourishment, water, gas, power, and communication. Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. In Existing system, there are following associate problems which are worked on our proposed work AES-256 is quite common and easily available for hacker activity in case it desire to break. Highly indexed data structure is not taken in the Existing system. In this paper we are using a stander SHA-2 algorithm for message key generation and for data encryption used optimized Bluefish algorithm after the completed of these process we also find the proxy server in cloud system. For simulation we used cloudsim a java based simulator.
Analysis of Tuberculosis Surveillance Tools at the Ministry of Health:The Case for Computerise/Mobile Surveillance Systems
Authors:Bernard Rotich
Abstract:– Tuberculosis (TB) is a major global health concern, causing nearly ten million new cases and over one million deaths every year. In Kenya, it remains a major cause of morbidity and mortality affecting a substantial percentage of the population. Early detection of TB through surveillance is an effective intervention measure against Tuberculosis. [The general objective of the study was to investigate how TB Surveillance is done in Kenya. The specific objectives of the study were to: establish the current challenges facing TB Surveillance system, review current state of TB surveillance systems, identify the requirements for TB surveillance system, design and develop a mobile integrated prototype system for TB surveillance Qualitative data was analysed to provide a deeper understanding of user requirements of the system which then were used to design and develop a TB surveillance system using Prometheus agent design methodology. The system was implemented on PHP, MySQL for database and Java Agent Development Framework for multi-agent platform. The designed TB surveillance system enabled the medical practitioner to interact with the patient. The tests included the use of mobile phones to capture data from the remote centres. Usability and functionality tests were performed which indicated that the application was an effective surveillance and responsive tool. Finally the study concluded by pointing out the keys areas of future improvements on the existing system and recommendations for future research.
Digital Energy Meter and Fuel Theft Detection Using PIC Microcontroller
Authors:A Jemila Rani
Abstract:– Today’s world haveso many techniques for measurement of any quantity al fuel.Fuel meter areanalog so that we trying to make it digitized to show the fuel value digitally. In our project we show the amount of fuel present in fuel tank digitally .Also fuel theft is a problem in all over world. In our undertaking we demonstrate the measure of fuel present in fuel tank carefully .Also fuel burglary is an issue in all over world. In our venture if fuel gets robbery then instant message will send to proprietor of bicycle likewise ringer influences commotion so proprietor of bicycle to get mindful. In conventional vehicle framework fuel burglary of bicycle can be maintained a strategic distance from.
Power Generating Low Cost Green Electric Vehicle
Authors:Riddik Adhikari, Subrata Mondal
Abstract:– It is low cost much more efficient than present electric cars. We took the concept of Tesla cars and hybrid car concept for our low cost electric vehicle. We have used the motor generator concept. The vehicle will run on green energy and will emit no harmful gases. Moreover it is an eco-friendly concept. It has no complicated machinery so that the maintained cost is less compared to other ICE (Internal combustion Engine) vehicle. We will replace ICE with Motor generator concept which will help in propulsion of car. Hybrid car are popular in these days but the main drawback is that Hybrid are not eco-friendly as it has ICE along with electric motor, battery and several other electrical components. This concept will be more efficient as compared to other electric, ICE and Hybrid vehicles. Having more millage it will be more efficient than present electric cars which will make this concept the best. Last but not the least the importance of the car is that efficiency will not much more difference with respected to loaded and unloaded condition of the car.
Image Optimization and Segmentation by Selective Fusion in K-Means Clustering
Authors: D. Malathi M.E., Asst.Prof.A.Mathan Gopi
Abstract:– We present a simple, reduced-complexity and efficient image segmentation and fusion approach. It optimizes the segmentation process of colored images by fusion of K-means clusters in various color spaces, in order to finally get a more reliable, accurate and a non-overlapped image. The initial segmentation maps are produced by taking a local histogram of each pixel and allocating it to a bin in the re-quantized color space. The pixels in the re-quantized color spaces are clustered into classes using the K-means (Euclidean Distance) technique. K-means clustering tends to find clusters of comparable spatial extent, while the expectation-maximization mechanism allows clusters to have different shapes and a selective fusion procedure is followed to reduce the computational complexity and achieve a better-segmented image. The parameters considered for selection of initial segmentation maps include entropy, standard deviation, and spatial frequency etc. The performance of the proposed method is analyzed by applying on various images from the Berkeley image database. The result aims at developing an accurate and more reliable image as compared to other methods along with reduced complexity, processing time and hardware resources required for real-time implementation
Image Optimization and Segmentation by Selective Fusion in K-Means Clustering
Authors: M.Tech.Scholar Sonam Shrivastava, Asst.Prof. Priya Jha
Abstract:– As the digital world is growing with various kind of data like text file, image, video. Out of those image plays an important role in different field such as remote sensing, social media, etc. The degradation in image quality may be attributed to absorption and back-scattering of light by suspended underwater particles. Moreover, as the depth increases, different colors are absorbed by the surrounding medium depending on the wavelengths. So maintain the image quality is done by Digital image processing on various issues. This paper give a brief survey of haze and underwater image enhancement techniques for various condition. As environment condition vary from time to time by the presence of fog, dust, water. Image analysis features are describe in this paper with there requirements.
Synthesis Characterization and application of Resins Obtained from Agricultural Waste to Remove Cu (II) from Waste Water
Authors: Mohammad Azam, Dr.Gulrez Nizami, Nida Tanveer,Mohammad Arshad, Sheela
Abstract:– The objective of the work is to a removal of the heavy metal ion of Cu(II) from the wastewater of different industries such as mining and, smelting, plating, brass manufacture, petroleum refining, electroplating industries and Cu- based agrichemicals. In this work, some waste agriculture materials are used as the adsorbent for the elimination of copper particle from the wastewater of Copper plants. Some agricultural materials like rice straw, rice bran, rice husk, rice hyacinth roots, coconut shell and, neem leaves were crushed in roll crusher and then grinded to prepare powdered material and then dried in an oven, then it was used as a copper adsorbent in different pH solutions of copper wastewater. Their resulted solutions were measured by FTIR and some other techniques.
A Review of Factors of Cost Overrun in Developing Countries
Authors: Ijaz Ahmad Khan
Abstract:– The accomplishment of any improvement activities is as well as its convenient fruition within the targeted on funds, with the simplest attainable fine and setting is of great concern. Price invades are perceived as leading confinement in varied development enterprises of developing nations. To take a look at price overwhelm in development endeavor is commonplace worldwide and therefore the development venture in developing nations is not any exemption. Price overwhelm is while not question one in all the most problems in building ventures. The explanations of improvement rate overwhelm might vary from nation to country due to the truth of the amendment in political, cash connected, social, and ecological conditions. This example is extra serious in developing nations wherever these overwhelm a moment surpasses (100%) of the wander planned expense. To dodge price overwhelm, the essential and very central advance is to acknowledge and build up the explanations and factors up to speed for price invades. Thus, this paper is planned to make up the various factors up to speed for improvement rate overwhelm in making international areas which is able to fill in because the manner by that ahead for future add adapting to those invades. This work could be a diagram of the clarifications of the speed invade in several building countries because it has been seen that {each} one in all the clarifications aren’t like each trip in developing worldwide are as albeit a number of them are regular like terrible administration, vacillation of texture prices incorrect texture gauges and monetary fame of the temp.
Total Factor Productivity and Gross Value Addition In Services Sector of India From 2000 To 2010
Authors: Dr. Manish Tongo
Abstract:– Service sector of India has lately played a role of igniter so far as growth rate of GDP is concerned. Post globalization, Service sector alone emerged as a largest contributor to the GDP of India. Earlier by default an agrarian economy of India took a drastic turn and service sector today has occupied a driver’s seat in steering the growth of India economy. This divergence from a product economy to service economy has not only accelerated the growth of India but it certainly has elevated the brand image of India across the world. It won’t be out of place to mention here that before globalization of Indian economy the image of India in the eyes of the developed nation was far more negative than one could conceive of.
A Survey on Frequent Pattern Rules Techniques for Privacy Preserving mining
Authors: M.Tech. Scholar Shivani Pandey, Asst.Prof. Monali sahoo
Abstract:– Information sharing among the organizations is a general movement in a few zones like business advancement and showcasing. As portion of the sensitive rules that should be kept private might be revealed and such revelation of sensitive patterns may impacts the benefits of the organization that possess the information. Consequently the principles which are sensitive must be covered before sharing the information. In this paper to provide secure data sharing sensitive rules are perturbed first which was found various techniques are discussed. Here techniques of privacy data mining was also detailed.
Automatic Irrigation System on Sensing Soil Moisture Content Using PV and GSM
Authors:Rohith Chilumula, Rahul Peddibhotla
Abstract:-Agriculture and Gardening works are not trivial. There is a wide range of crops and plants and many varieties of each plant or crop. Various plants and crops have different requirements for water, fertilizers and sun. Soil ripeness for any strain or planting society is for the most part made a decision by the level of supplements and dampness in it. Various occasions and nursery workers are not ready to sustain the dirt with enough compost or water, while ordinarily just you do it.This undertaking is to encourage ranchers and nursery workers keep up control of the dirt dampness level
Speed Synchronization of DC Motors by Using Microcontroller
Authors: Karthik Reddy Solipuram, Nennuru Gopala Krishna Reddy
Abstract:-In this venture, another control approach for ongoing pace synchronization of numerous enlistment motors amid speed increasing speed and load changes is produced. The control technique is to settle speed following of every motor while synchronizing its movement with other motors’ movements so differential speed blunders among various motors merge to zero. In industry many procedures required speed synchronization of more than one motors required all the while. Speed control of motor is imperative particularly in the fields including mechanical applications, apply autonomy, material factories, and so on. In all these application motor speed synchronization is animate in transport line driven by different motors. Sudden changes in load cause chasing and oscillatory conduct in DC machine. This conduct can be unsafe to the procedure. There are such a variety of strategies which is utilized for controlling the DC machines. Among all these strategy ace slave synchronization is a broadly utilized method. The ADC is accessible in microcontroller chip which make criticism circle. A driver circuit is utilized to drive the motor. In this strategy, the direction of motor’s speed is accomplished by changing the voltage of the motor which is balanced by the obligation cycle of PWM.
Facial Detection Based on K-means and Local Binary Patterns
Authors: M.Tech. M. Muralidhar Reddy, Asst.Prof. G.Varaprasad, Asst.Prof. Karamala Suresh
Abstract:– Face detection and recognition are challenging research topics in the field of computer vision. Several algorithms have been proposed to solve lot of problems related to changes in environment and lighting conditions. In this research, we introduce a new algorithm for face identification or detection. The proposed method uses the well-known local binary patterns (LBP) algorithm and K-means clustering for face segmentation and maximum likelihood to classify output data. This method can be summarized as a process of detecting and recognizing faces on the basis of the distribution of feature vector amplitudes on six levels that is, three for positive vector amplitudes and three for negative amplitudes. Detection is conducted by classifying distribution values and deciding whether or not these values compose a face.
Security and Privacy Issues in EHR Systems Towards Trusted Services
Authors:M.E. G.Kavita, Asst.Prof. K.Bala
Abstract:-As of late saw an across the board accessibility of electronic medicinal services information record (EHR) frameworks. EHR were produced during the time spent treatment in therapeutic focuses, for example, healing facilities, centers, different establishments. With the end goal to enhance the nature of social insurance benefit, EHR could be shared by an assortment of clients, so noteworthy security ought to be delivering to make EHR commonsense. EHR framework not totally settled out the protection challenges. In this paper an orderly writing survey was led the protection issue in EHR and make sense of the utilized security models. Additionally a novel Context-mindful Access Control Security Model (CARE) is proposed to catch the situation of information interoperability and bolster the security basics of human services frameworks alongside the capacity of giving fine-grained get to control.
Reverse Logistic Management in Construction
Authors:Mr. Anish Kanti Bera
Abstract:-Reverse logistics in construction refers to the movement of products and materials from rescued buildings at a new construction site. Given the various facets of the reverse logistics series, there is a large number of studies, but there is no systematic review of literature on this important topic applicable to the construction industry. Therefore, the purpose of this study is to integrate the fragmented body of knowledge on reverse logistics in the construction, with the aim of promoting the concept among the stakeholders of the industry and the wider construction community. Through qualitative meta-analysis, the study synthesizes the findings of previous studies and presents some of the tasks required by industry stakeholders to promote this concept in the context of real interest. First, the research and terminology tendency for reverse logistics has been introduced. Second, it detects the main advantages and constraints of reverse logistics in construction, while providing some tips for using these benefits and reducing these constraints. Finally, it provides future research direction based on the review. Unlike the manufacturing context, due to inadequate RL literature in the construction sector, this could be one of the reasons. Consequently, the knowledge of RL and its applications in the construction sector is limited. To solve this issue, this study attempts to identify and highlight the fundamental aspects of the RL concept, which dramatically affects its adoption and implementation through an integrated review of literature.
Relationship between Stock Prices and Rupee Dollar Parity in India
Authors:Prof. Anchit Jhamb, Ms. Swati Aggarwal
Abstract:-The dynamic linkage between rate of exchange and stock costs has been subjected to extensive analysis for over a decade and attracted goodly attention from researchers worldwide throughout the Asian crisis of 1997-98. The difficulty is additionally necessary from the perspective of recent massive cross-border movement of funds. In Bharat the difficulty is additionally gaining importance within the liberalization era. With this background, the current study examines the causative relationship between returns available market and forex market in Bharat. victimization daily knowledge from March 1993 to December 2002, so to found that causative link is mostly absent although in recent years there has been sturdy causative influence from exchange come back to forex market come back. The results, however, are tentative and that is the needfor any in-depth analysis to spot the causes and consequences of the findings.
Intelligent Spam Detection Microservice with Serverless Computing
Authors:Prachi Mahajan, Snehal Bhoite, Asst.Prof.Abhijit Karve
Abstract:-Today for personal and business purpose most of the users uses email as one of the most important source for communication. The use of email is increasing day by day without being affected by alternative ways of communication such as social networking sites, SMS, mobile applications, electronic messages. As frauds using email classification is increasing due to extensive use of emails, it becomes very important issue to classify mails as fraud or normal mails. The Intelligent Spam Detection System (ISDS) provide automatic way to classify emails as SPAM i.e. fraud mail and HAM i.e. normal mail using multiple machine learning algorithms.
An Analysis of Land Use & Land Cover Mapping Using Geo- Spatial technology A case study of Pat watershed in Jhabua District, Madhya Pradesh, India
Authors:Chetan Singh Hada, Bahul Kumar Vyas, Jyoti Sarup, Dr.D.C. Gupta
Abstract:-Remote Sensing (RS) as an immediate assistant to field, as of late assuming an essential job in the examination and assessed the regular asset in any piece of the world. Quickly changes in land utilize and arrive cover, arrive utilize are regularly thought to be indistinguishable, they are fairly very unique. Land cover might be characterized as the biophysical earth surface, while arrive utilize is frequently formed by human, financial and political effects on the land. Remote Sensing, coordinated with Geographical Information System (GIS), give and helpful instrument to examination of land utilize and arrive cover changes at a territorial level. The geospatial innovation of RS and GIS holds the potential for opportune and cost compelling assessment5 of common assets. The systems have been utilized extensively in the tropics for creating valuable data on backwoods cover, vegetation compose and arrive utilize changes. Accordingly, we have been utilized RS and GIS to contemplate arrive utilize arrive cover changes in Pat watershed, Jhabua region, Madhya Pradesh, India covering a region of around 817.93sq/km. In this view the present work has been taken up to contemplate and evaluate a portion of the regular assets and ecological capability of study territory which is falling in the Survey of India toposheets No: 46I/8, 46I/12, 46J/5 and 46J/9. Under this investigation three topical maps, for example, area delineate, guide, and land utilize and arrive cover maps were readied. The land utilize and arrive cover examination on the investigation region has been endeavored dependent on topical mapping of the zone comprising of developed land, Agricultural land, Forest, Waste land and Water bodies utilizing the satellite picture. The examination presumes that there is a fast development of developed region. Land utilize and arrive cover data, when utilized alongside data on other normal assets, similar to water, soil, hydro-geomorphology, and so on. will help in the best land utilize arranging at the full scale and small scale level.
A Review Article of Micro Grid Power Boosting Technique
Authors: M.Tech.Scholar Chandra Kant Sharma, Prof. Pragati Priya
Abstract:-Energy, especially alternative source of energy is vital for the development of a country. In future, the world anticipates developing more of its solar resource potential as an alternative energy source to overcome the persistent shortages and unreliability of power supply. In order to maximize the power output the system components of the photovoltaic system should be optimized. For the optimization maximum power point tracking (MPPT) is a Promising technique that grid tie inverters, solar battery chargers and similar devices use to get the maximum possible power from one or more solar panels. Among the different methods used to track the maximum power point, Perturb and Observe method is a type of strategy to optimize the power output of an array. In this method, the controller adjusts the voltage by a small amount from the array and measures power, if the power increases, further adjustments in that direction are tried until power no longer increases. In this research paper the system performance is optimized by perturbs and observes method using buck boost converter. By varying the duty cycle of the buck boost converter, the source impedance can be matched to adjust the load impedance to improve the efficiency of the system. The Performance has been studied by the MATLAB/Simulink.
Water Quality mapping using Remote Sensing and GIS- a case study of Pampawa Watershed in Jhabua Dist, Madhya Pradesh, India
Authors:Chetan Singh Hada, Bahul Kumar Vyas, Jyoti Sarup, Dr.D.C. Gupta
Abstract:-Groundwater serves as the main sources of water in the urban environment, which is used for drinking, industrial and domestic purposes and often, it is over exploited. Now these days, the groundwater is facing terrorization due to anthropogenic activities. In this study, groundwater sample collects in pre and post monsoon seasons for total 56 villages from 61 predetermined bore wells and open wells representing Pampawa Watershed in Jhabua District, Madhya Pradesh, India. The water samples analyzed for physico-chemical parameters like TDS, Chloride, Fluoride, pH, Hardness and Turbidity using standard techniques in the laboratory. Also, geographic information system-based groundwater quality mapping in the form of visually communicating contour maps was developed using ArcGIS-version 10.1 software to delineate spatial distribution in physicochemical characteristics of groundwater samples.
Removal of Calcium and Magnesium ions from Ground Water in the Jaffna Peninsula, Sri Lanka by using Chemically Modified RiceHusk
Authors:Anushkkaran. P, Asharp Sharmec. G, Mazenod Denorth .V.A
Abstract:-Water hardness due to the calcium and magnesium ions in groundwater have been a devastating effect to the freshwater in the dry zone in Sri Lanka, mainly in the Jaffna peninsula. Jaffna peninsula depends on ground water as there are no other freshwater sources and the rain fall is not sufficient. Study on the removal of calcium and magnesium ions using rice husk (RH) as a low-cost adsorbent was investigated in groundwater of calcium and magnesium ions in the Jaffna peninsula, Sri Lanka. This study was conducted to evaluate the ground water quality and removal of hardness. Fifteen wells were selected in different regions in Jaffna peninsula for ground water samplings. Impact of operational conditions, such as the dosage amount of rice husk and contact time were analyzed for chemically modified rice husk. Here we used HCl and NaOH to modifying the rich husk by chemically at pH 4 and pH 8 respectively. Statistical analysis revealed that the highest removal of Ca2+ and Mg2+ ions are at pH 4, adsorbent dosage 10 g/L water and 30 minutes of settling time.
Solar PV – Battery Storage with DVR for Power Quality Enhancement
Authors:K.Venkatrami Reddy, P. Chinnaiah, V.Sunil Kumar Reddy
Abstract:-The consumption of electric power is very high due to high invention and more number of non-linear loads. The most of the loads are nonlinear loads, causes the harmonic electric currents in the system. These harmonic currents in turn create system resonance, capacitor overloading, decrease in efficiency, voltage magnitude changes. Power quality has become an increasing concern to utilities and consumers. The power transmitting in a distribution line is needed to be of very high quality. One of the major power quality issues is considered in the distribution system called Voltage sag and it can mitigate with the help of dynamic voltage restorer (DVR). In this paper, Focusing on the new integration of solar PV-Battery based Dynamic Voltage Restorer is implementing in the distribution system to meet the required power and for power quality enhancement. Solar photovoltaic with boost converter is implemented by incremental conductance method to track the Maximum power. The performance of solar photovoltaic, Battery with Dynamic Voltage restorer is simulated under dynamic conditions of the load in MATLAB-SIMULINK software.