Job of Technology in Indian Education
Authors:- Asst.Prof. Anuj Kumar Shah
Abstract:- There is a developing expansive accord the world over about the advantages that can be conveyed to training framework through the fitting utilization of advancing data and correspondence advancements. The scope of conceivable advantages infested essentially all territories of movement in which learning and correspondence assume a crucial job. It is included from enhanced instructing and learning procedures to better understudy result, expanded understudy commitment and consistent correspondence with educators and guardians. Today there is a noteworthy hole among information and aptitudes understudies learn in school and the learning and abilities that laborers require in work environments and networks. Businesses report that they require understudies who are proficient, having great good and hard working attitudes, can cooperatively work in group, have basic reasoning and critical thinking capacity, can lead a gathering of individuals and are talented in verbal and composed correspondence. This paper is to think about job of Education Technology in India.
Survey of Load Balancing Algorithms in Cloud Computing
Authors:- M.Tech. Scholar Arun Pratap Singh, Prof. Pritesh Jain
Abstract:- Load acclimation in the surge growth mood has a vital appulse on the accomplishment of surge. Great sum acclimation makes surge growth included capable and enhances client fulfillment. Capable task booking and capacity organization is a burdensome botheration of communicated gradual addition yet it is still in its infant date in ill will of widely inclusive examination in disdain years. Hereditary calculations can be use to upgrade the accomplishment of sum acclimation approaches. Traditional booking calculations, for example, Round Robin, First Come First Serve, Ant Colony Optimization and so on acknowledge been extensively adjusted in proliferating surge gradual addition frameworks. Surge gets gathering of people errands in a quickened sum and portion of advantages for these undertakings ought to be dealt with in a capable way. Aside the capturing surge issues in the zones of planning, resources designation and security, surge gradual addition currently features included intense issues greedy for assimilation in the broadness of responsibility selflessness in dynamic assignments and too essential machines (VM) disappointment. These sorts of issues in a sufficient layout are asserted NP-hard (non-deterministic polynomial time), which organization that there is no correct bandage and no brisk bandage to it.
Micro structural and Mechanical Characterization of AA2024/(SiC+B4C) Hybrid Composites
Authors:- Vishal Sharma, Mr. Dharmendra Kumar
Abstract:- Aluminium-based metal matrix composites (AMMCs) are generally preferred for their low density, wide alloying range, high strength to weight ratio, intrinsic flexibility and response to heat treatment hence they are widely used in aerospace, automobile, marine industries. The various methods for manufacturing MMCs are Spray decomposition, powder metallurgy, liquid metal infiltration, mechanical alloying, squeeze casting and compo casting. By adding reinforcements to aluminium alloy matrix, the properties have improved. Hence, this paper presents a review on the effects of Al2O3, B4c, Gr, Y2O3 and SIC reinforcements on the tribological and mechanical behaviour of a AMMCs fabricated by various methods such as powder metallurgy, stir casting etc.
Influence Of (Sic+Al2O3) Hybrid Reinforcement on the Microstructure and Mechanical Properties of AA6101
Authors:- Jagmohan, Mr. Dharmendra Kumar
Abstract:- The demand for aluminum hybrid metal matrix composites has increased in recent times due to their enhanced mechanical properties for satisfying the requirements of advance engineering applications. The performance of these materials is greatly influenced by the selection ofan appropriate combination of reinforcement materials. The reinforcement materials include carbides, nitrides, and oxides. The ceramic particles, such as silicon carbide and aluminum oxide, are themost widely used reinforcement materials for preparing these composites. In this paper, an attempt has been made to prepare an AA6101 hybrid metal matrix composite (HAMMC) reinforced with Particulates with different weight fractions of SiC and Al2O3 and by a stir-casting process. The experimental study has been carried out on the prepared composite to investigate the mechanical properties due to the addition of multiple reinfor cement materials. The density and mechanical properties, such as ultimate tensile strength, yield strength, impact strength, and the hardness and wear characteristics of the proposed composite, are compared with those of unreinforced AA6101. The experimental investigation is also aimed at observing the variation of properties with a varying weight percentage of the reinforcement materials SiC andAl2O3 simultaneously with the fly ash content maintained constant. The outcome of the experimentalinvestigation revealed that the proposed hybrid composite with 20% of total reinforcement material exhibits high hardness, high yield strength, and low wear rate but no considerable improvement in impact strength.
Improving Bank Call Center Operations Using Six Sigma
Authors:- Rahul Gautam
Abstract:- -First riches bank had redistributed its client intelligent administrations tasks to include client calling administrations around five years back. In this exploration paper we show the utilization of lean six sigma in a call focus of bank industry and this investigation dependent on essential information from genuine undertaking. This examination paper depicts enhancement in the activities of the call focus owing to lean six sigma increment in first call goals proportion, decrease in administrator turnover and streamlining of procedures. The reasonable ramifications of lean six sigma into the call focus day by day activities the board. Albeit Lean Six Sigma has been to an incredible degree compelling over the latest two decades in the collecting part, its relevance to the organization division has been a questionable topic. This examination speaks to its application to a rapidly creating region of the organization part, helping associations in recognizing districts of progression for their Call Centres.
Fire Detection & Alarm System in Oil & Gas Refinery
Authors:- M. Tech. Scholar Nitish Shrivastava, Asst. Prof. Mr. Vivek Shukla
Abstract:- -Cultural property management is entrusted with the responsibility of protecting and preserving an industry’s building, collections, operations and occupants. Constant attention is required to minimize adverse impact due to climate, pollution, theft, vandalism, insects, mold and fire. Because of the speed and totality of the destructive forces of fire, it constitutes one of the more serious threats. Vandalized or environmentally damaged structures can be repaired and stolen objects could be recovered but items destroyed by fire, however, are gone forever. An uncontrolled fire can obliterate an industry within a few span of time and may completely burn out with-in a couple hours.
The first step toward halting a fire is to properly identify the incident is to detect & raise the alarm, and then notify emergency response professionals. This is often the function of the fire detection and alarm system. Several system types and options are available, depending on the specific characteristics of the protected space.
To minimize fire risk and its impact, heritage organizations should develop and implement comprehensive and objective fire protection programs. Program elements should include fire prevention efforts, building construction improvements, methods to detect a developing fire and alert emergency personnel, and means to effectively extinguish a fire.
Loss Minimization of Distribution System Using Three Phase Three Leg Topology
Authors:- PG Student Yogesh Yadav, Professor Arvind Jain
Abstract:- This thesis proposes novel methods and comprehensive analysis for power loss calculation, DC-link current and voltage ripple estimation, and bus bar design in two-level three-phase voltage source inverters (VSIs). A novel method of MOSFET voltage rise- and fall-time estimations for the switching power loss calculation is developed. The estimation accuracy is significantly improved by the proposed method. In order to provide a reference for thermal management design, inverter power loss analysis is presented. Using the parameters obtained from the semiconductor device datasheets and inverter operating conditions, power loss calculations of three types of devices, namely IGBT, MOSFET, and diode, are discussed. The conduction power loss calculations for these three devices are straight- forward; and, the switching power loss of IGBTs and diodes can be obtained from the energy losses given by datasheets.
The Effect of Socialization on Students Learning: A Case Study of Northern East School of Kathmandu Valley
Authors:- Anil Parajuli
Abstract:- Socialization is a functional prerequisite for the society essential to any social life , as well as to the cultural and social reproduction of both general and particular social forms. Socialization help learning students to cooperate with the social norms and values which later changes into culture of them. The culture of learning of students through the home environment and external school culture also affects. The Case study involves the simple random method of sampling of 10 private school , 2 government schools of Northern East of Kathmandu Valley and 5-6 students of each school randomly. The teachers of 9 schools who teachers maths and science are interviewed for conformation of their children’s academic achievements.The data collected is analyzed through SPSS. The tabulated data is presented in chronology , histogram and pie charts are presented . Both qualitative and quantitative data’s goes through descriptive analysis. The agents of primary socialization’s in home and outer environment except school culture agents are considered. Like home environment , peers , best friends , leisure time , assignments completion in home , mobile , T.V , Internets, Games and sports are considered as affecting variables which is compared with the academic achievement through the results of 1st terminal examination and 2nd terminal examination-2075 (2018 A.D) , with reference of subject teachers observation. The study showed that students performing their homework them self has no support and guidance from their parents. Mostly migrant parents are abroad. The home environment don’t let them study in separate room for their privacy and academic achievement. Students engaged in sports and games are active physically and moderately learning. Their respect to their parents is maximum,where as combined study and eagerness to engage time with friend shows their kinship can assist on their study. Students are found maximum engaged in mobile and T.V at their home at least an hour per day. Mostly sports channels and the wildlife discovery channels are on their preferable shows in television ,where as the Fb, Youtube , music players and social sites of chatting are only preference of students . It proves that they are not engaged on the internet and search engines that help them completing their academic searches and enhancement of knowledge. But their terminal examination result shows aggregation enhanced from first term to second term. They are likely tobe in home more than previous. The have started showing their interest on searching their assignments given by their teachers. Finally not only school but even the external school cultures as primary agents of socialization also affect the students learning and achievement.
The cram of Network Security with Its stabbing Attacks and likely Security Mechanisms
Authors:- Asst. Prof. J Kishore Kumar
Abstract:- Security is a fundamental component in the computing and networking technology. The first and foremost thing of every network designing, planning, building, and operating a network is the importance of a strong security policy. Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern. The internet structure itself allowed for many security threats to occur. Network security is becoming of great importance because of intellectual property that can be easily acquired through the internet. There are different kinds of attack that can be when sent across the network. By knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. There is a large amount of personal, commercial, military, and government information on networking infrastructures worldwide and all of these required different security mechanisms. In this paper, we are trying to study most different kinds of attacks along with various different kinds of security mechanism that can be applied according to the need and architecture of the network.
A Cram on the Compass of Cloud Computing In Management Culture
Authors:- Asst. Prof. Pallavi T. L
Abstract:- the cloud computing is a swiftly mounting technology, which has brought significant changes and opportunities to various sector in India. It is a pervasive computing paradigm that has revolutionized how Information Technology infrastructure and services can be delivered. There is a growing interest around the exploitation of cloud computing in the education sector. Present study is an attempt to provide an overview of the cloud computing model and its applications for partnership between academia and student. In this paper we proposed cloud computing to e-learning from the following aspects: its work mode, services, benefits and issues .This paper is an analytical study on the role of cloud computing in education with reference to management institutions. Primary study was carried out with major stakeholder’s of technical education infrastructures which are implemented for academic use. The state of the art on the use and research of cloud computing in education was conducted via qualitative methodology. After a comprehensive analysis of the available literature, approx. 8 research works have been identified and discussed to highlight the importance and probable usage of cloud in the education domain. The survey identifies and analyses the advantages and risks that the use of cloud computing may have for the main stakeholders in education. The extensive analysis suggests that the introduction of cloud computing to management education is feasible to bring greater clarity landscape about its benefits.
A Collaborative approach for segmentation of probe image for efficient texture recognition
Authors:- Divya Mathur, Sandeep Upadhyay
Abstract:- Image processing methodologies and domain is quite wide and really efficient now days for real time applications. Our work primarily deals with the domain of image segmentation and using segmentation concept, texture recognition has been performed with comparative results and simulations performed over a particular image dataset. The initial work in our proposed work is to perform segmentation on each part image then performing extraction .We have focused on segmentation followed by extraction so that the classification result may not contain much error. The conventional approach has been implemented in this regard first and then the main problem that has been formulated is patch up data pixels together which provide error in getting right and appropriate texture .In order to deal with the problem formulated in the existing work we have proposed a new commuted method in which the extraction and segmentation of image depends on the dynamic threshold set by user.
The K-Svd Algorithm: Application to Parsimonious Dictionary Learning System in Digital Image Processing
Authors:- Ramafiarisona Hajasoa Malalatiana
Abstract:- There is a quest for learning that would allow signal analysis systems a parsimonious representation such as K-SVD analysis. This involves breaking down the image into a parsimonious representation via the orthogonal adaptive tracking method, then initializing the learning dictionary and updating the atoms of that own dictionary.
Survey on Arm Controller and DTMF Tech. Based Solar Grass Cutter
Authors:- Ankit S.Janbandhu, Ankush S. Khangar, Nayan S. Meshram, Mayur S.Dhawade, Dr. P.B. Pokle
Abstract:- A Solar Powered Automatic Grass Cutting and Pesticide Spreading robot project is mainly proposal for reducing the manpower and usage of electricity. Solar plate is employed to produce the supply to the battery charging, Which is less complicated to use, additional advantageous compared to alternative energy supply particularly for gas based mostly supply of power But our solar grass cutter is based on solar power because this energy is a renewable source of energy and it is easy to work. So we made a solar powered grass cutter. Our main aim in pollution management is earned through this. An unskilled operation will operate simply and maintain the field terribly fine and uniform surface look. In our project, “Solar grass cutter” is employed to chop the various grasses for the various applications.
Security Transfect of Image Numeric by Cryptotattoing With Vernam Multiresolution Analysis Combinate
Authors:- Ramafiarisona Hajasoa Malalatiana, Randriamitantsoa Paul Auguste
Abstract:- Crypto-tattooing consists in associating once the encryption and tattooing to protect and perform a better secure transfer of image data. We used a mask generated randomly using a private key and the tattoo method by DWT. In this paper, we compared the encrypted tattoo and the crypto-tattoo by breaking down the image at the first and second levels and then subjecting it to different types of attacks. From the results obtained, we were able to determine that the crypto-tattooing that is to say encrypt the original bathroom image make a decomposition of the image at the second level and insert the mark in the LL1 underlayment better robustness against different attacks.
A Theoretical Concept on Opinion Mining Process and Sentiment Analysis in Data Mining
Authors:- Akrati Shrivastava, Satish Pawar
Abstract:- The review of any product is beneficiary for both the Customer and the Companies. Review always help to know about the market value of any product and companies can actually determine their space of improvement .An essential part of our information-gathering behavior has constantly been to discover ―what other people think‖. With the explosion of Web 2.0 platforms such as blogs, discussion forums, peer-to-peer networks, and various other types of social media and actively use information technologies to find and appreciate the opinions of others This paper covers techniques that ability to directly facilitate opinion-oriented information-seeking systems and complete workflow of Opinion mining and sentiment analysis in which those techniques can be implement and also discusses about the application of opinion mining and sentiment analysis and discuss about tools through which are used to track the opinion or polarity from the user generated contents.
Role of Packaging in the Purchase Behavior of Youth in FMCG Sector
Authors:- PG. Scholar Shubham Kumar, Asst.Prof. Savdeep Vasudeva
Abstract:- This research study deals with understanding the role of packaging in the buying behavior of consumers in FMCG sector. Packaging is generally considered as Fifth ‘P’ in marketing and this study helps to find out the importance of effective and innovative packaging in purchase of goods in FMCG sector. The study is based on primary data collection and uses convenience sampling technique for gathering the related data. This research study is conducted in the city of Jalandhar with a sample size of 100 respondents. In this study, the awareness of innovative packaging of different types of product among the youth in FMCG sector is checked. In addition to it, the role of packaging in the purchase of a product is also tested. The findings of the .study have important inferences for the academicians and marketing professionals.
A Comparative Study on Strengthened Beam Using Various Types of Fibers
Abstract:- One of the major problems currently faced by the building and construction industry is the deterioration of performance of various forms of concrete structures. It is estimated that in most of the developed and developing countries, the infrastructure / built environment represents around 50% of the national wealth. It is economical to rehabilitate the structures in distress instead of construction of new one. In recent years, the construction industry has seen an increasing demand to rehabilitate/strengthen and upgrade existing concrete structures. This may be attributed to various causes such as environment degradation, design inadequacies, reinforcement corrosion, lack of maintenance, poor construction practices, increase in loads etc. Common conventional techniques for strengthening include jacketing, shot creting, plate bonding etc. These techniques are time consuming, labour intensive, and require skilled labour. To overcome the listed disadvantages, a composite fiber system is studied here. Glass FIBRE sheets and Basalt fiber have been used exclusively in recent years for strengthening/rehabilitation due to their cost-effectiveness and versatility. This research work primarily deals with effectiveness of Glass fibre Reinforced Polymer (GFRP) and Basalt fiber to rehabilitate the reinforced concrete elements. The behaviour and performance of reinforced concrete members, rehabilitated with externally bonded GFRP sheets Basalt fibre are studied. The variables considered in this experimental study include the fiber type, a number of layers of GFRP sheets and Basalt fibre are also considered. For strengthening works, rectangular beams of size 150mm x 200mm x 2200mm are selected. Five beams are cast and tested for each group. The second group is rehabilitated with GFRP sheets and Basalt fibre. From this experimental investigation the behaviour of control beam and rehabilitated beam are studied. Also, optimum use of number of layers is analysed and checked with analytical calculations. From this investigation the following parameters are studied like Ultimate load, Deflection, Moment, Curvature, Stress, Strain, Stiffness, Ductility, Crack width. By increasing more than two layers of fibre, the load carrying capacity of the elements increases up to 50 percentages, but after attaining the maximum load carrying capacity, the layers peel off (de-bond) or delamination occurs.
Facial Expression Recognition Using Three Step Recognition Approach
Authors:- M. Tech Scholar Bhawana Choubey, Asst. Prof. Shiva Bhatnagar
Abstract:- – People are attack of producing numerous facial exercises all through correspondence that change done multifaceted nature, power, and Furthermore significance. This paper reason might be will recall humankind’s sentiments As far as glad, dismal, disturb, and shock, unprejudiced. In this paper, A framework for limitation And extraction about faces Also trademark facial highlights for instance, to such an extent that eyes, mouth Furthermore confront limits beginning with shade picture data will be proposed. This methodology abuses shade properties from guaranteeing human skin with keep picture areas confront hopefuls. Those facial Characteristics extraction might be performed best for preselected confront competitor regions. Moreover, for eyes and mouth confinement shade information and close-by contrast keeping around eyes would use. In Existing work Represent the ability of distinguishing the false acknowledgment rate is 18% while the false dismissal rate is simply 5% and my methodology has the capacity of recognizing the false acknowledgment rate is 14.5% while the false dismissal rate is simply 7.66%. In above outcome creator figure result physically.
Scheduling Of Integrated Thermal Energy Storage with Cogeneration System by Using Firefly Technique
Authors:- M.Tech. Scholar Jaspal Singh , Asst. Prof. Maninder
Abstract:- The use of Combined Heat and Power (CHP) with an overall effectiveness from 70 to 90% is one of the most effective solutions to minimize the energy utilization. Mainly caused by interdependence of the power as well as heat in these systems, the optimal operation of CHP systems is a composite optimization issue that requires powerful solutions. This paper discourse the optimal day-ahead scheduling of CHP units with Thermal Storage Systems (TSSs). Fundamentally, the optimal scheduling of CHP units problem is a complex optimization problem with innumerable stochastic besides deterministic variables. The initial stage models behavior of operating parameters and to minimizes the operation costs or price meantime the second stage examine the system’s Thermal Storage Systems scenarios. The fruitfulness of the proposed algorithm has been examined. This paper illustrates Firefly algorithm (FA) to probe CHPED with Thermal Storage Systems with bounded feasible operating region. The main prospective of this technique is that it proper the fairness between local and global search. A comparative investigation of the FA with (RCGA), (NSGAII), (SPEA2) is introduced.
Comparative Study on the Effect of River Sand and M-Sand on the Properties of Clayey Soil
Authors:- Anjana L.R., Riya Roy
Abstract:- Stabilization of soil is important in the construction of foundations and highways as it improves the Engineering properties of soil like compressibility, permeability and shear strength. Sub grade strength of clayey soil can be improved by use of inert materials like sand. Sand have many other applications such as contaminant remediation, liner, Filtration etc. The natural river sand is a source of inert sand but nowadays the availability of river sand is low, so suitable alternatives to river sand are essential. Manufactured Sand (M-Sand) is found to be a suitable alternative to river sand for construction purpose. This study aims to find out the suitability of M-Sand in soil stabilization.
Artificial Intelligence Using DBS-QOS In Banking Organizations
Authors:- Sravanthi Palle
Abstract:- Quality of service, that is, the waiting time that customers must endure in order to receive a service, is a critical performance aspect in private and public service organizations. Providing good service quality is particularly important in highly competitive sectors where similar services exist. In this paper, focusing on banking sector, we propose an artificial intelligence system for building a model for the prediction of service quality. While the traditional approach used for building analytical models relies on theories and assumptions about the problem at hand, we propose a novel approach for learning models from actual data. Thus, the proposed approach is not biased by the knowledge that experts may have about the problem, but it is completely based on the available data. The system is based on a recently defined variant of genetic programming that allows practitioners to include the concept of semantics in the search process. This will have beneficial effects on the search process and will produce analytical models that are based only on the data and not on domain-dependent knowledge.
Audit of Electricity Generation in Samuel Adegboyega University,Nigeria
Authors:- Omojoyegbe Michael Oluwatosin
Abstract:- Electricity is indispensable to a nation’s economic development. In this paper, analysis of energy sources was carried out to ascertain their costs. The selected energy alternatives are PHCN 33kV Substation and Captive Cummings Diesel generator. The case study-site was Samuel Adegboyega located within Ogwa in Edo State. Practical surveys and data collection were carried out from the power house coupled with their load estimation to obtain the total cost of electricity consumed. The results indicate that, on a monthly basis, the university spends about $5,104 on diesel generator and $3,099 on PHCN. The results also show that other alternative energy sources should be included in the overall energy mix in order to minimize the total power cost of the university.
GREENDROID: Energy Efficient Mobile Application Processor Using Android System
Authors:- M.Tech. Scholar Kavitha S, Prof. Girish B.G
Abstract:- Mobile application processors will soon replace desktop processors as the focus of innovations in microprocessor technology. Already, these processors have largely reached their most power-hungry cousins, supporting out-of-order execution and multi-core processing. In the near future, the problem of the exponential worsening of dark silicon will be the main force dictating the evolution of these designs. In a recent paper, we have argued that the natural evolution of mobile application processors is to use this dark silicon to create hundreds of automatically generated energy saving cores, called conservation cores(c-cores), that can reduce energy consumption in an order of magnitude. This article describes Greendroid, a research prototype that demonstrates the use of such cores to save energy through the access points in the Android mobile phone software stack.
Zigbee on Wireless Sensor Network for patient monitoring and Home Automation Application
Authors:- M. Tech. Scholar Ashish Nagar, Asst. Prof. Shiva Bhatnagar
Abstract:- Mobile application processors will soon replace desktop processors as the focus of innovations in microprocessor technology. Already, these processors have largely reached their most power-hungry cousins, supporting out-of-order execution and multi-core processing. In the near future, the problem of the exponential worsening of dark silicon will be the main force Remote patient observing is an eHealth administration, which is utilized to gather and exchange bio flag information from the patients to the eHealth specialist organization (e.g., human services focus). Having timestamps that are vigorous and dependable is fundamental for remote patient checking all together for patient information to have setting and to be connected with other information. The utilization of WSNs will defeat the need of patients to be stationery for their essential parameters to be estimated. In this paper the system execution is examined and dissected dependent on different execution parameters like sensor hub thickness, correspondence length, Packet Delivery Ratio (PDR), throughput, normal system postponement and vitality expended and so on. By contrasting acquired execution and required execution, pick proper hub thickness, information transmission rate and correspondence term for foundation of Zigbee based WSN for patient checking.
L – Lane Message Authentication Code Using Three Hop Routing Protocol in Ad hoc Network
Authors:- M Jagatheeswari, J Srinivasan
Abstract:- Generally Ad Hoc Networks consist of the Public Key Infrastructure and Certificate Revocation Lists for their security. The authentication of a received message under checking process if the certificate of the sender is included with the CRL, and verifying the authentication of the certificate and signature of the sender. In this paper we replace the time consuming Certificate Verification List (CRL) checking process by an efficient Revocation Checking Process using a secure and efficient L – Lane Hash Message Protocol using Three Hop Routing Protocol. The Three Hop Routing Protocol is used to increase the wireless capacity and highly performing wireless network. It quickly distributes the information around the sender and no single point of failure. In our proposed system, we describe Message authentication in ad hoc network using Three Hop Routing Protocol. That can significantly decrease the message loss ratio with the conventional authentication methods. This will help to improve the security and performance evaluation.
Effect of fine-grained Additives on Geotechnical Properties of Clay
Authors:- Arya S.P. , Aswathy SasiKumar
Abstract:-The uses of by product such as copper slag has long been established in a number of applications in the civil engineering industry. However, the use of copper slag fines in the area of soil stabilization has not been fully investigated and developed despite having similar chemical composition and mineralogy to that of Portland cement. This paper investigates the improvement in the properties of copper slag stabilized clayey soil with fly ash. In order to improve the properties of copper slag stabilized soil certain industrial wastes such as fly ash, cement, lime etc are added. Fly ash has been used for several decades as stabilizing agent in deep stabilization of soft soil and it is used to improve the strength parameters. The results shown that, the strength properties of copper slag stabilized clayey soil improved with increase in percentage of fly ash.
A Review on Smart Garbage Dustbin
Authors:- Shreya Ghavghave, Shephali Rakhunde , Shraddha Jagtap, Priyanka Chimegaokar, Asst. Prof. J.Y. Hande
Abstract:- This project smart garbage dustbin system is a very smart system which will help to keep our cities clean. This project can reduce their time and effort in an efficient manner. Automation is that the most demand able feature currently daily. For this purpose, smart dustbins are a much suitable approach. It will be helpful to develop a green and smart city. For this, we have to develop an automatic smart dustbin which will first be able to detect the current status of the garbage bin send the information to the garbage collection vehicle employee. They can immediately take action to empty. It ultimate helps to keeping cleanness in the society and hence the expansion of diseases caused by waste material is reduced. This paper gives an inclusive and detailed survey of waste management models. Entirely, this paper suggests the topology of the waste management system which is the smart procedure as key enabling expertise in existing waste management system.
A Survey on Robust Intrusion Detection System Methodology and Features
Authors:- M. Tech. Scholar Jyotsna Purohit, Asst. Prof. Jayshree Boaddh, Asst. Prof. Akrati Shrivastava
Abstract:- – To improve network security different steps has been taken as size and importance of the network has increases day by day. In order to find intrusion in the network IDS (Intrusion detection system) systems were developed which were broadly classified into two category first was anomaly based and other was misuse based. In this paper survey was done on the various techniques of intrusion detection system where some of supervised and unsupervised intrusion detection techniques are discussed. Here methodology of various researchers are explained with their steps of working. Different types of attacks done by the intruders were also discussed.
Survey on Design of “Bus Boarding Assist System
For Blind Using IOT Technology
Authors:- Associate Prof. Sharavana .K, Associate Prof. Reshma Shebbar, Pavithra V, Rismen Mina A, Saneyyah Seemeen, Farsana Banu M
Abstract: – This paper outlines the design of bus detection mechanism to help blind in travelling from one place to another. Navigation in outdoor environments is highly difficult for those who have congenital blindness or blindness from a very young age. Eye vision is the most important part of human physiology as 83% of information human being gets from the environment is via sight. For visually impaired people, outdoor pedestrian the ability to move is very difficult and often dangerous. WHO (World Health Organization) has a goal of reducing the blindness prevalence of India to 0.3% of the total population by 2020 Buses play a vital role for the transportation. Public transport is the only viable mobility option to seek social connectivity for a majority of blind and visually impaired persons. This project aims in implementing a bus boarding assist system for blind people with the help of Internet of Things, wireless communications and android technology. This design and implementation of bus detection and navigation mechanism is to help blind in travelling from one place to another using GPS, google API’s and IOT technology. Navigation in outdoor environments is highly difficult for those who have congenital blindness or blindness from a very young age. The Blind people on the Bus Station are provided with a Blind Unit. The blind speaks his destination on the microphone provided on the Android supported mobile device. When the desired bus stops at the station, camera captures bus number and these bus details are already stored in raspberry pi’s database. Users input destination is checked in the database and matched with the details of the bus arrived. Blind will be notified via speaker through the recorded voice. Now when bus reaches at any station, it will check at every station for blind person’s destination and the person will be notified when the destination spot is arrived. Android app helps the blind person for navigating by giving directions as audio output.
A Survey on Visual Properties and Techniques Of Digital Image Data Hiding
Authors:- M. Tech. Scholar Syed Ibtihaj Hasan, Asst. Prof. Jayshree Boaddh, Asst. Prof. Akrati Shrivastava
Abstract: – The transmission of confidential data over the network requires more security. So, for improving security in data transmission, researcher can hide the data inside an encrypted image. Hence the confidentiality of the image and the data embedded in the image is maintained. Image Visual Cryptography is used to keep the data private from unauthorized users. Here detail surveys of different image data mining techniques used by various researchers are detailed. Various properties of the image data hiding was explained.
Authors:- Akash Pate, Harsharaj Shisodiya, Rushikesh More, Vishal Ohal
Abstract: – In this digital world, payments are also evolving with the technology. At first there was only single payment method ‘cash’. After that electronic card like debit card and credit card were introduced. Nowadays mobile wallets are getting popular. But all these conventional payment methods have problems. Cash payment have problem of change. Debit and credit cards are not for everyone. Only literate people can use these cards properly. In case of cards one has to remember about the pin of the card. If one forgets the pin of card the none has to follow along procedure to reset the pin. Also, cash credit/debit cards and mobile phones can get stolen. So, to solve all these problems we came with a solution for payment using fingerprint. In this method to perform a payment one has to just tap the finger on fingerprint scanner and within seconds’ payment will be done. The scanned fingerprint will be sent to server for matching and if it is matched payment will be done or else payment will fail. This solution will allow even illiterate people to use digital payments as they will have to set up account only once. And later on, they can perform payments with just touch of finger. This will also reduce the time consumed for payment.
Privacy Preserving Ranked Keyword Search Over Cloud Computing
Authors:- M.Tech. Scholar Ashwini S, Prof. Dr. T N Anitha
Abstract: – Cloud computing is one of the emerging technologies in today’s world (trend).Cloud computing has envisioned as the next generation architecture of IT enterprise. The flip side to this coin is that cloud storage emerges the security issues of confidentiality, data integrity and data availability. The concept of Third Party Auditor(TPA) is to eliminate the involvement of client through the auditing of whether his data stored in the cloud are indeed intact, which can be important in achieving economies of scale for cloud computing. The task of TPA, on behalf of cloud client is to verify the integrity of the dynamic data stored in cloud. The motive of this paper is to provide data security of cloud in cloud computing using digital signature and elliptic curve cryptography. The Provable data possession scheme is implemented to support the dynamic operation on data. An improvement over the conventional technique is done by allowing the user to search their files in the encrypted database with the help of Ranked keyword search.
A Novel Hybrid Attribute Based Encryption Along With Location Based Encryption
Authors:- A. Saranya, Assistant Professor K. Mythili
Abstract: – The cloud is a term referring to accessing Computer, Servers, Storage, Databases, Networking, Software’s and more through a network connection using Wide Area Networking (WAN) or Internet Connectivity (Cloud). Remote users can access the cloud resource from wherever they have connection rather than physical location. The top most benefits of cloud computing are Cost Effective, High Productivity, High Speed, Performance and Security. In the existing system CP-ABE schemes, the size of the cipher text increases line nearly with an increase in a number of attributes. The size of the cipher text is larger and it as contain Boolean access policy. To avoid these issues, we propose a novel Hybrid – Attribute Based Encryption (H-ABE) along with location information. It is hybrid method, which combines Cipher text Policy attribute-based encryption (CP-ABE) with location-based encryption (LBE) on the level of symmetric keys. It supports encryption using expressive policies; this can efficiently handle dynamic attributes with continuous values (i.e. location). It allows encrypting and logical combination of attributes. It contains CP-ABE with location information’s that are encrypted in the data packet. This may helpful to identify the exact location and also retrieve the data securely. In feature it can effectively handle dynamic attributes.
A Study On The Different Dimensions Of Asur Community In Jobhipat Village, Bisnupur Block Of Gumla District In Jharkhand, India
Authors:- Arpan Mondal , Saswatik Tripathy
Abstract: – India is the country of diversity. The villages are its soul. There are around 833.1 million people live in 640,867 different villages in India. Among them 104 million people which is 8.6% of the total Indian population is belonging from the tribal community. Asur is one of among them. The study was conducted in the Jobhipat village, Bisnupur block of Gumla district in Jharkhand. The place is located 55 Km towards North from District headquarters Gumla. 9 Km from Bishunpur. 122 KM from State capital Ranchi. It is from the age of mythology they are deprived and absconded from the so called mainstream society. They make their own system which is substantial and was sustainable once. But now for the modernization of so called civilized civilians the environment and climate is changing. Which effecting their life also. They have the knowledge to fight with the problems what they know but not those what are recently crated. May be they are not responsible for those problems but they are also in a very vulnerable situation. Their fear of losing their assets and prestige in the hills and forests hold them back to come in the main stream. Still they are thinking that Aryans will employed them again if they got chance. This fear and misunderstandings can erase the whole community from the history of the world due to lack of knowledge and fighting skill against new enemies like epidemic diseases or changing climate. We should make a better relation with them so that they come to the main stream with no fear or hesitation.
Smart Home Using Google Assistant
Authors:- S. Nivedhan, R. Eranyan, S. Nitish Khanna
Abstract: – The smart home movement is gaining steam and is going to be the next big thing in the field of technological brilliance. our innovative project is themed on voice activated home automation using google assistant .in this particular paper we have voice signal as the input which is the basic crux of our project .the project works on three steps. the voice signal is being cursed on as the input the first step which is then processed by a revolution software called google assistant , an one stop app for all needs . we have changed this ever earthly blessing according to our needs. Skilled programming is required to feed the input to the module.
Secure Based Data Sharing and Report Matching For Healthcare in Cloud Computing
Authors:- M.Tech.Scholar K. Priyanka, Asst.Prof.T.Sujilatha
Abstract: – Online social networks have become popular around the world due to its openness. While cryptographic technique can provide privacy in Online Social Networks for customers. Cloud computing and social networks are modifying the way of healthcare by providing real-time data sharing in a cost-effective manner. Still, data security issue is one of the major goal to the wide application of mobile healthcare social networks (MHSN), since health information is considered to be particularly sensitive. In this paper, we introduce a secure based data sharing and report matching scheme for MHSN in cloud computing. The patients can outsource their encrypted health records to cloud storage with identity-based broadcast encryption (IBBE) technique, and allocate them with a group of doctors in a safe and professional manner. We then present an attribute-based conditional information re-encryption construction, which permits the doctors to convert a cipher-text into a new cipher-text of an identity-based encryption scheme for specialist without leaking any sensitive information. Additional, we provide a report matching mechanism in MHSN based on identity-based encryption with equality test, which helps patients to find friends or other users in a privacy-preserving way, and achieve flexible authorization on the encrypted health. Likewise, this mechanism reduces the computation cost on patient face.
Smart Car Parking Using QR Code
Authors:- Pranav Jadhav, Ujjwal Mishra, Bhagesh Khatri, Suraj Pawar, Ganesh Gaikwad
Abstract: – We approach a special system for smart parking reservation and security maintenance in a commercial car parking area in an urban environment. This system mainly designed to avoid unnecessary time conception to find an empty lot in a car parking area. By the same case we can also save more than 80% of fuel wastage in a car parking area to finds the empty parking slot. The reservation process is happening only by user. Hence the user finds the empty parking slot and makes the action of reservation through an internet access by an embedded process control unit (EPCU) with driver’s own knowledge. Here we give the major response to user’s reservation action and hence the driver can reserve his own likely parking slot based on the cost function. We have proposed a system with multi-processing queuing mechanism (MPQM) to avoid multi-user approach problem (MUAP) during reservation process in our smart car parking system.
We Safe(Anti-Crime Application)
Authors:- Prof. Bushan Chaudhary, Tejas Rajput, Sneha Yadav, Kalyani Thete, Poonam Rajput
Abstract: – Inevitably, incidents happen everywhere at any time. Incidents vary based on the level of complication and severity. Most incidents are not reported to authorities to protect their identity, the high rate of unreported crimes could affect the society in decision making and due to this situation, half of the crimes are not reported. In the proposed system, users can register to this application and can give the detailed report of crimes that happened. In the modification part, there will be three logins 1.User 2.Police 3.Admin. User can give the crime report along with the initiation of current GPS or can give location details manually with crime details with Photos, Audio, Video, Description of crime & category etc. date are sent to the server. Actions taken by police can be viewed by the admin and user. User can also transfer their files from the android to the remote server, which is split into several blocks and can be retrieved whenever it is required.
College Informative Application Using Android Device
Authors:-Prof. Bushan Chaudhary, Omkar Khute, Praful Wagh, Saurabh Lahamae, Imran Shaikh
Abstract: – The Era of Mobile Technology is increasing day by day and the opens the windows to Android App. Mobile applications can be one of the best ways to keep consumers engaged with a brand as they are on the move. With the increase in demand of mobile phone and efficiency of wireless network. The main aim of this project is that the user can know about college and campus. Recently the notice, hand written manual, verbal message was spread among student by clerk that’s why we are making the college informative app. In this app the student can see the college notice,events,placement requirements and physics, chemistry math notes,MCQ’s and all notes of diploma student. The application will be used by stduents,teachers and parents. The core idea of project is to make for institution and educational system. The users can write a review, see the reviews and invite a friend/colleague to share this application. Google Calendar where the user can mark an event.
A Survey on Various Techniques of Image Data Cryptography Techniques and Features
Authors:-M. Tech. Scholar Arzoo Singh, Prof. Abhishek Sharma
Abstract: – With the increase in the digital media transfer and modification of data is very easy. So these works focus on transferring data by hiding in image. So maintain the image quality is done by Digital image processing on various issues. This paper gives a brief survey of image data cryptography techniques for various environmental scenes. Image analysis features are described in this paper with these requirements. As hiding data is small but it goes under some kind of attacks which are also cover in this paper as they are the best measure for comparing different techniques of data hiding.
Design of Data Acquisition System Using Fpga
Authors:-M. Tech. Scholar Ajazuddin Shaikh, Asst. Prof. K. K. Sharma
Abstract: – An exact and quick Data Acquisitions framework is the need of the cutting edge Autonomous Navigation System. An information procurement framework on a minimal effort Field-programmable Gate Arrays (FPGA) was structured, which will do the separating in the equipment while the more unpredictable task like route and control can be performed on the delicate center of the processor sitting on the FPGA. This will give adaptability in the plan to execute new sifting strategies, which is basic amid the testing and the reproduction stage. An adaptable committed readout framework is one of the vital pieces of any sort of devoted discovery framework, particularly for its testing stage just as when the last framework is prepared for usage. An undeniable decision is to utilize a FPGA (aside from devoted front-end gadgets) as the main phase of information stockpiling and a preparing component. Moreover, the FPGA needs to get ready and exchange the approaching or prepared information to the host PC. The execution of the information switchover can be an issue, particularly for little gatherings of designers, who have an alternative to purchase a general arrangement with its limits and esteem or to do tedious advancement of their own framework for all intents and purposes without any preparation. This venture shows a FPGA based universally useful readout arrangement. Thinking about a case of biomedical imaging, where countless focuses are taken and are handled in a framework having FPGA so as to make a picture with the best quality. Here, if the yield of the FPGA is appeared and put away in the PC, at that point that information can be utilized for the improvement of the procedure. Thus correspondence among PC and FPGA is vital. Required program is scorched in FPGA utilizing PC however obtaining information from FPGA and putting away in PC is troublesome. In the event that information from FPGA can be put away in PC, at that point the information can be broke down for different applications. Thus it is trying to take a shot at this issue.
A Review of Home Automation Systems
Authors:- Divyang Modi
Abstract: – A considerable amount of advances utilized in smart homes can be adjusted to meet various necessities. By realising and implementing these innovations in homes can dispense the need of care and allow freedom to the individuals who may struggle coping up with everyday exercises or in conditions of visual deficiency, dumbness or motionlessness. This paper means to talk about home automation frameworks for the physically impaired by the means of speech recognition and device control with inserted frameworks. An idea of machine learning is examined which is a technique for information investigation that computerizes scientific model structures. Machine learning trains PCs to perform undertakings and gives yield without being expressly programmed. The framework utilizes machine learning procedures by watching conduct of an individual at a specific time, condition, climate and daily routine tasks and provides output. Ant colony optimization and decision tree algorithm are assessed for surmised solutions in troublesome advanced issues which make the framework more brilliant with the terms of accurate decisions and feature selection.
Protected Geographical Rules to Set Different Path Routing In Manets
Authors:- M.Tech.Scholar Divya Shree M, Asst.Prof. Srinivasa Murthy H
Abstract: – Portability and convenient nature of Mobile Ad hoc Networks (MANET) has expanded its prominence by two overlap. MANETs have turned into a usually utilized system for different applications. However, this favorable position endures with genuine security concerns, fundamentally a remote transmission medium viewpoint where such systems might be liable to parcel dropping. Portability and versatile nature of Mobile Ad hoc Network may likewise prompt connection disappointment. Impromptu on interest separate vector (AODV) is a mainstream directing convention however is presented to understood parcel dropping assault. Proposed framework presents another convention named Secured Geographic Routing (SGR), which can honestly identify parcel dropping assault in MANET. SGR can distinguish noxious hubs by recognizing dropping of directing and information bundle. Bundle dropping because of both connection mistake and nearness of malignant hubs can recognize. It additionally gives significance to protect security of information.
Survey on Energy Efficient Clustering and Routing Protocols of Wireless Sensor Network
Authors:- Priyanka Dubey, Dr. S. Veenadhar, Dr. Sanjeev Gupta
Abstract: – The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in a wide range of applications and it has become a hot research area. However, the resource constrained nature of sensors raises the problem of energy. This paper focus on the detailed survey on major clustering techniques LEACH, PEGASIS, and TEEN. This article strongly examines about the advantages and limitations of different routing protocol with its recent research issues. Here research work carried out by different researcher in this field of WSN is also detailed. This paper summarizes all set of routing algorithms with comparison of on the basis advantage and disadvantages of each algorithm.
An Iot Based Bridge Monitoring System
Authors:- Jadhav Deepti, Karad Prajakta, Gangatire Poonam, Prof. V.B. Ohol
Abstract: – Many of the bridges in cities built on the river are subject to deterioration as their lifetime is expired but they are still in use. They are dangerous to bridge users. Due to heavy load of vehicles, high water level or pressure, heavy rains these bridges may get collapse which in turn leads to disaster. So, these bridges require continuous monitoring. So we are proposing a system which consists of a weight sensor, water level point contact sensor, Wi-Fi module, and Arduino microcontroller. This system detects the load of vehicles, water level, and pressure. If the water level, water pressure and vehicle load on the bridge cross its threshold value then it generates the alert through buzzer and auto barrier. If it is necessary, then the admin assign the task to the employees for maintenance.
Smart Solar Bench
Authors:- Kirti Parde, Mahesh Kamble, Vishal Ohal
Abstract: – This is not just a bench, but a Smart Bench. A Smart Bench that is smart in technology and will help the future digital world to be more advanced. Idea of Smart Bench is to provide the user with facilities that are need of time and the user’s want. Many smart bench implementations are made recently these days, they have their different- structure, design, make, facilities, pricing and so on. Since, then we students also have our own idea of making a smart bench in our different way (aspects as listed above).It also supports barcode reading that sends live location of any person if he wants to seek help, or is in trouble. This idea of Smart Solar Bench revolves around some seating benches that we generally see at parks, gardens, bus stops, airports, entertainment places like outside and inside cinemas, theatres, college campuses, beach boulevards, etc. including metro cities. This project idea is an IoT based and we are curious and willing to make it. Not only this project will support our PM’s vision of Digital India, but will also contribute to the Smart City Project of our Maharashtra state.
Pid Based Monitoring System With Home Automatic
Authors:- Surbhi Joshi
Abstract: – There are a unit totally different ways in wireless technology like Bluetooth, WIFI, and GSM. during this paper, new style and totally different home appliances area unit given. Bluetooth based mostly Home Automation System mistreatment Arduino UNO Microcontroller is style and enforced. PWM technique on Arduino is employed to manage the DC motor speed reckoning on the dimension of the Pulses and H-Bridge driver circuit is employed to manage the direction of the motor. the house automation applications that has given during this paper is that the ability to manage the DC motor speed and its direction, bulb, fan and heater employing a good phone application with Bluetooth wireless technology. The relays is employed to attach these appliances to the input/ output ports of the board The design could be a low price, versatile and employing a trendy technology and devices for this application. Application of wireless Bluetooth association on top of things board permits a simplified thanks to system installation. The system has been designed and operated with success.
Design and Implementation of Upper-Limb Rehab equipment Based on Embedded System
Authors:- Mr.J. Navarajan, K. Naveen, K.S. Venkat Manoj, S. Sheik Dawood
Abstract: – For the past decades, portable equipment has been invented for human limbs due to the progress of robotics. By using modern robotic technology, these devices are used in military, industrial and medical disciplines to increase the weight-bearing capacity and assist long-term activities and medical rehabilitation. Aging society is a normal and irreversible process of human life. Increasing the aging population will necessitate more healthcare workers. Not only the problem of aging, but also the high proportion of people suffering from neurological and musculoskeletal injuries like BEH with accidents through the medical care staff and equipment to assist treatment by using IoT and Wi-Fi, Nowadays, many scholars have already set their sights on the development of medical rehabilitation devices. In particular, wearable devices are an important development for rehabilitation device. However, patients need a long time to recover their body. There is basically two main steps: The first is the scientific interest trying to understand the human behavior in computational scientific ways and the second is the “simply” to develop a humanoid in order to use it practically.
Nano Totally Continuous Functions in Nano Topological Space
Authors:- P. Karthik Sankar
Abstract: – The properties of new class of functions, namely nano totally continuous function in nano topological space are analyzed in this paper. The relation of these functions with already existing well known functions are studied.
Wireless Communication Based Detecting of Mobile Phones and Information Report Systems Via Sms
Authors:- Kranthi Kumar, Asst. Prof. Ravi Kumar
Abstract: – The work presents a new approach to establish a wireless technology for the locality of people location, and continuously track locations of these moving (people). Track the people continuously it transmits people and along with location information will passed to transceiver and then transceiver passed to control monitoring place receiver. And in the second application if the person was required to admin room means can give the corresponding voice ID ask him to come to admin room with the help of voice alert. In this system we maintain information of the people activities. And the People can be monitored from the remote Places also through GPRS technology and the announcement also given through voice kit The project describes a radio frequency-based and zigbee based system for location identification and tracking. The basic design of the system consists of transmitters in the environment, transceivers on the person or object for which location information is desired, and a receiver in the environment. Each of these three pieces of hardware and their associated software are designed.
Evaluation of Centrifugal Blower Impeller for Enhanced Performance: A Conceptual Review
Authors:- PG Scholar Pratik Dhatrak, Associate Prof. Jagdish Saini
Abstract: – Centrifugal blowers are used extensively in industries and heating, ventilation and air conditioning applications due to their simplicity and low costs. The blowers are mainly used for air or gas handling, cooling and exhaust purpose. This type of turbo machine has small chord line length, high width and blades that are joined together with shroud and hub. Due to versatility of use of blower, a detailed research work is still needed in this direction. Considering this fact present research work is devoted to academic contributions in the field of blowers and investigates gaps in the research and objectives of new research.
Medication Reminder and Healthcare An Android Application Medibox
Authors:- D. Badrinarayan, A. Akash, P. Harihara Sudhan, K.Keerthivasan
Abstract: – Medicine non-adherence is a squeezing worry among seniors, prompting a lower personal satisfaction and higher human services costs. While portable applications give a suitable medium to drug the board, their utility can be constrained without handling the specific needs of seniors and encouraging the dynamic association of consideration suppliers. To address these restrictions, we are building up a tablet-based application planned specifically for seniors to follow their prescriptions and an online interface for their consideration suppliers to follow drug adherence. In a joint effort with a neighborhood Maturing Set up program, we directed a three-month think about with sixteen members from an autonomous living office. Our examination found that the application helped members to successfully follow their meds and improved their feeling of prosperity. Our findings feature the significance of taking into account the requirements of seniors and of including care suppliers in this procedure, with specific suggestions for the advancement of future prescription administration applications.