IJSRET » November 11, 2019

Daily Archives: November 11, 2019

Uncategorized

IJSRET Volume 5 Issue 6, Nov-Dec-2019

Optimizing Profit with the Linear Programming Model in a Manufacturing Industry
Authors:- M.Tech. Scholar Shrikant Desai, Professor Y.P. Ladhe

Abstract:- The study has successfully determined the product mix of Bansal Pipe Industry, Indore. In the process, the optimal quantities of the various PVC pipes to be produced within the study period in order to maximize profit were established. Also the status of the resources and the unit worth of each resource to the objective function were known with respect to varying budget resources and labor time. This is the advantage of going beyond mere knowledge of existing decision making tools to actual practical proof of its workability. The study has shown that linear programming model can be applicable in BIL, Indore. The researcher, through observation, noted that decision making regarding the quantity of shoes to be produced was based on trial and error method which yielded sub-optimal results. Hence, an attempt was made to fill this gap, has demonstrated practical means of developing a working linear programming model to find solution to the problem of sub-optimal results often realized by BIL. Also, the literature reviews in this work have – further affirmed that linear programming model is workable.

A Review on Organic Rankine Cycle (Orc) for Waste Heat Recovery with Different Refrigerant
Authors:- M.Tech. Scholar Rajeev Kumar, Prof. Brijendra Yadav

Abstract:- Rising energy demand due to industrial development, population growth, is pushing the mankind for utilizing more and more conventional energy sources such as coal, oil and gas. There is a need to minimize the use of such types of resources because; it contributes to the global warming, pollution and climate change. Use of alternative sources of energy such as solar, hydro, wind, tidal, geothermal, biofuel, and nuclear are preferable and are

A Survey on Different Adiabatic Logic Circuits for Low Power in Dsm Technology
Authors:- Priya Kumari, Ashish Chouhan, MD Naushad Akhtar

Abstract:- The term ‘adiabatic’ is coined from thermodynamics in which a method where no energy exchange takes place with environment results no dissipation of energy loss. On the other hand in short circuit devices in energy exchange process charge has been transfer between different nodes. Practically, with the use of partial adiabatic operation in the circuit results for the improvement of overall performance of the circuit with complexity. The result is represented in tabular and graphical form. And a comparison is done among all the simulation. After a detailed examination a conclusion has been drawn based on the entire work done and also from the simulation and the result is evaluated. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100 MHz frequency, for fair comparison of results W/L ratio of all the circuit is same.

Analysis of Embedded Network Security by Intrusion Detection System
Authors:- Research Scholar Mr. Suresh .B, Associate Prof. & Head Dr. M. Venkatachalam

Abstract:- The term ‘adiabatic’ is coined from thermodynamics in which a method where no energy exchange takes place with environment results no dissipation of energy loss. On the other hand in short circuit devices in energy exchange process charge has been transfer between different nodes. Practically, with the use of partial adiabatic operation in the circuit results for the improvement of overall performance of the circuit with complexity. The result is represented in tabular and graphical form. And a comparison is done among all the simulation. After a detailed examination a conclusion has been drawn based on the entire work done and also from the simulation and the result is evaluated. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100 MHz frequency, for fair comparison of results W/L ratio of all the circuit is same.

A Survey on Low Power High Speed Domino Circuit in Low Power VLSI Design
Authors:- MD Naushad Akhtar, Ashish Chouhan, Priya Kumari

Abstract:- Increased number of transistor count and reduced device size is main reason behind scaling and this incorporates leakage current also in other hand battery technology is growing very slowly hence we need low power circuit so that we can enhance overall performance of device. After evolution of CMOS circuit the scientist moved on static and dynamic circuit design. In static CMOS there are various limitations like no. of transistor count, power dissipation, slow speed, hence to overcome these limitation a new circuit pseudo NMOS is used. It exist somewhere between static and dynamic circuit. We have seen that FinFET technology is simulated by BISM4 model using HSPICE at 32nm process technology at 250C with CL=1pF at 100MHz frequency. When CMOS is compared with FinFET for 8 and 16 input OR gate we save average power 15.46%, 21.34% SFLD, 57.37%, 20.12% HSD, 30.90%, 42.46% CKD respectively.

The Effect of Radial Swirl Generator on Reducing Emissions from Bio-Fuel Burner System
Authors:-M.Tech. Scholar Amaresh prasad Sinha, Prof. Poonam Wankhede, Dr. Mohit Gangwar

Abstract:- A liquid bio-fuel burner system with various radial air swirlers attached to combustion chamber of 280 mm inside diameter and 1000 mm length has been investigated. All tests were conducted using crude palm oil as fuel. A radial flow air swirler with curved blades having 50 mm outlet diameter was inserted at the inlet plane of the combustor to produce swirling flow. Fuel was injected at the back plate of the swirler outlet using central fuel injector with single fuel nozzle pointing axially outwards. The swirler vane angles and equivalence ratios were varied. Tests were carried out using four different air swirlers having 45°, 50°, 60°and 70° vane angles. NOx emissions reduction of about 12 percent was obtained at swirl number of 1.911 as compared to 0.780 at the same equivalence ratio of 0.83. In addition, emission of carbon monoxide decreased as the swirl number increased. The results shows that a proper design of air swirler has great effect on mixing process and hence the combustion and emission.

CFD Analysis of Heat transfer in Tube Inserted with Centrally Hollow Narrow Twisted Tapes
Authors:- M.Tech. Scholar Ajay Kumar Roy, Prof. Suresh Kumar Badholiya, Rohit Choudhary

Abstract:- In this study, a new tube insert, named centrally hollow narrow twisted tape, is developed and its effect on the heat transfer enhancement performance of a tube under laminar flow conditions is numerically simulated. The model defines two study variables—hollow width and clearance—and then incorporates the concept of a unilateral twisted tape; the effect of the number of unilateral twisted tapes on the tube heat transfer performance is then examined. The results show that the tube with cross hollow twisted tape inserts has the best overall heat transfer performance for different hollow widths of the tape.

A Review on Heat Transfer Enhancement Analysis of Tube Inserted with Centrally Hollow Narrow Twisted Tapes
Authors:- M.Tech. Scholar Ajay Kumar Roy, Prof. Suresh Kumar Badholiya, Rohit Choudhary

Abstract:- In this study, a new tube insert, named centrally hollow narrow twisted tape, is developed and its effect on the heat transfer enhancement performance of a tube under laminar flow conditions is numerically simulated. The model defines two study variables—hollow width and clearance—and then incorporates the concept of a unilateral twisted tape; the effect of the number of unilateral twisted tapes on the tube heat transfer performance is then examined. The results show that the tube with cross hollow twisted tape inserts has the best overall heat transfer performance for different hollow widths of the tape.

Design and Implementation of Sensor Less Voltage Control Technique for Power Quality in Telecom
Authors:- M.Tech. Student Tamba Rajeswari, Assistant Prof. B.Jagan Narayana, Assistant Professor& Hod V. Sunil Kumar Reddy

Abstract:- In this paper, a three-phase three-switch three-level boost (Vienna) type PWM rectifier is proposed as an active front-end power factor correction (PFC) rectifier for power quality improvement in telecom load. The sensor less voltage control technique is proposed and it does not rely on any input voltage information results in reliable and robust operation. A brief description on the principle of operation and the most advantageous modulation method of the proposed system is discussed. The feasible switching states are identified for the proposed active front-end converter resulting in reduced switching stress and DC ripples. A triangular carrier based control logic is applied and the input current reaches sinusoidal shape without the need of sensing the input voltage. The detailed analysis of front-end PFC converter is carried out by equivalent circuit analysis. Also, the complete loss and efficiency calculation of the converter is explicitly carried out with the help of hardware design guidelines. The performance of the proposed system and its capability to operate satisfactorily in the event of failure of one-phase of the mains is verified through MATLAB Simulation and results obtained are presented. The experimental setup rated for 9 kW is developed in the laboratory to validate the simulation results. From the simulation and hardware results, it is observed and recorded that the power quality parameters are improved and are well within the IEEE, IEC standards.

A Comparison of Tcsc Fact Device Performance and Long Distance Transmission
Authors:- Maneesha Kushwaha, Arun Pachori

Abstract:- The prudent point of view of Flexible AC Transmission System (FACTS) establishment and execution has been an essential issue since origin and expanding each day because of vital, specialized and showcase requirements. The advancement of these issues assumes a significant job in the achievement of any utility and at last minimal effort accessibility of intensity at the client end. This paper exhibits the ideal area of Thruster Controlled Series Capacitor (TCSC) in control framework to limit the transmission misfortune utilizing Particle Swarm Optimization procedure. The reenactments are performed on the IEEE-14 transport framework, IEEE 30 transport framework and Indian 75 transport framework with Newton Raphsonload flow calculation including TCSC.

Review of Image Retrieval using Color Text and Shape Techniques
Authors:- ME Scholar Roshani Yadav, HOD Mr. Kamlesh Patidar

Abstract:- The big digital image databases are yielded by the widespread of smart devices along with the exponential growth of virtual societies. If not fused with efficient Content-Based Image Retrieval (CBIR) tools, these databases can be counter-productive. The introduction of promising CBIR systems had been witnessed last decade which promoted applications in various fields. In this editorial, an analysis on state of the art content-based image retrieval which includes theoretical and empirical work is propounded. This work comprises of publications that cover aspects of research relevant to CBIR area. That is to say, unsupervised and supervised education and combination techniques along with which the low-level image visual descriptors have been reported. Furthermore, challenges and applications that appeared to carry CBIR research have been discussed in this work.

Object Recognition Based on MATLAB
Authors:- Assistant Prof. Vishal V. Mehtre, UG Scholar Shivani Jitendra Khare

Abstract:- This paper describes image processing and its applications using MATLAB. Prime objective of image processing involves extraction of important information from the processed images. By use of this data, description and interpretations can be provided by the machine. Image processing modifies the original image in the desired format (image). And this system provides the users with the hard copy of the image using printer and also allows them to save the file in the desired format with extensions. In our practical life, we find many applications of image processing. One of the best examples in our day to day life is our brain in coordination with our eye which views a lot of images and helps the brain to sense and process information at higher rates and less time. Hence such operations carried out using image processing will help us in greater understanding and vision by development and implementation of image processing. In this paper image processing, object detection, applications of image processing using MATLAB and prospects are discussed.

Design and Implementation Optimization Algorithm for Underwater Acoustic Sensor Network
Authors:- Neha Jamrey, K K Sharma

Abstract:- Underwater Wireless Sensor Networks (UWSNs) contain several components such as vehicles and sensors that are deployed in a specific acoustic area to perform collaborative monitoring and data collection tasks. Tese networks are used interactively between different nodes and ground-based stations. Presently, UWSNs face issues and challenges regarding limited bandwidth, high propagation delay, 3D topology, media access control, routing, resource utilization, and power constraints. In the last few decades, research community provided different methodologies to overcome these issues and challenges; however, some of them are still open for research due to variable characteristics of underwater environment. In this paper, a survey of UWSN regarding underwater communication channel, environmental factors, localization, media access control, routing protocols, and effect of packet size on communication is conducted. We compared presently available methodologies and discussed their pros and cons to highlight new directions of research for further improvement in underwater sensor networks.

Prediction of Compressive Strength of Concrete Using Artificial Neural Network Model
Authors:- M.Tech. Student Sandeep Solanki, Asst. Prof. Mr. Sambhav Gangwal

Abstract:- This study proposes to build a concrete compressive strength development over time (CCSDOT) model by using conventional method combined with the artificial intelligence method. The CCSDOT model performed well in predicting and fitting the compressive strength development in green concrete containing cement, slag, fly ash, and limestone flour. It is concluded that the CCSDOT model is stable through the use of sensitivity analysis. To evaluate the precision of this model, the prediction results of the proposed model were compared to that of the model based on the BP neural network. The results verify that the recommended model enjoys better flexibility, capability, and accuracy in predicting the compressive strength development in concrete than the other models.

Brain Stimulation Game application for children
Authors:- P.S.M Alawatta

Abstract:- Most of the new generation children nowadays are using their parent’s electronic devices as a habit. Addict on to new technologies lead the children away from educational activities. This is affect to the child’s future and main problem is this that the early childhood does not develop on correct way. Considering about this problem the research implemented an educational gaming application based on how to use technologies toward to better future by navigate children to educational activities and reducing time wasting for useless things through the new technologies. Smart Kids is an Unity based gaming application for children of 6 to 10 age category. Prototype methodology used for implement the application. The developed gaming application based on Mathematics and includes many features. The application developed to improve child’s cognitive skills in mathematics and memory development areas. Different game categories used to develop child’s different kind of skills and each category included different levels. The variation of gaming categories will be motivating child to do different sides. When considering about parents, within the busy life style some parents have not time to check child’s skills improvements. As a solution, developed application calculates child’s performance.

Implementation of Queuing Theory Along with Lean Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Bharat, Professor Vipul Upadhayay, Yogesh P Ladhe

Abstract:- This research provides a context for investigating the integration of queuing theory and scheduling approaches with the goal of more effectively solving scheduling problems arising in dynamic environments. In this thesis main objective of research are applied queuing theories in a production line by using an analytical model, using a queuing model to examine performance of a production line, To give information about the studied production line in this case study and To improve both efficiency and performance of workstations. This research work is carried out in Pressroom Industries limited, Bhopal. This industry produces variety of products such as sprocket, spur gear, helical gear and gear housing etc. In this work spur gear manufacturing is taken for study. At first different manufacturing processes (cutting the bar stock, OD turning, center drilling followed by boring, CNC machining, gear hobbling, debarring, keyway slotting and gear grinding) are identified. It is found the cutting, hobbling, drilling and slotting process are bottle neck processes. From the analysis it is found that the setup time of keyway slotting consumes more time. Using SMED concept single pallet is converted to two pallets.

Fem Analysis of Structural Response of Sandwich Beam
Authors:- M.Tech. Scholar Himanshu Kumar Gupta, Asst. Prof. Rakesh Patel, Prof. Vikas S Pagey

Abstract:- Sandwich plate are composite systems having high stiffness-to-weight and Strength-to weight ratios and are used as light weight load bearing components. The use of thin, strong skin sheets adhered to thicker, lightweight core materials has allowed industry to build strong, stiff, light, and durable structures. Due to the use of viscoelastic polymer constituents, sandwich beams can exhibit time-dependent behavior. This study examines the behavior of sandwich plate driven by the varying core thickness and different core stiffness. Finite element (FE) method is used to analyze the overall transient responses, harmonic responses and the static responses of the sandwich systems subject to a concentrated point load at the mid span of the beam. In this study the skin, i.e. the top and bottom layers are made up of aluminum while the core is made up of foam family. The stress and deformation fields are analyzed. The core thickness and core material stiffness was varied keeping the skin thickness constant and the behavior of the sandwich beam is studied under static and dynamic conditions.

Car Damage Detection and Analysis Using Deep Learning Algorithm For Automotive
Authors:- Rakshata P, Padma H V, Pooja M , Yashaswini H V, Karthik V

Abstract:- Images and its processing form a vital part of understanding of the world around us. Therefore incomplete images make it unable for us to detect and analyze the premise of the picture. This is of no use to us, but today’s machine learning platforms are capable of restoring the lost or corrupted parts of such images, making it easier to understand the context behind the scenes and efficiently analyze the pictures taken. In painting Extrapolation can be done by propagation of local structures into the unknown parts, in order to construct the missing part’s one pixel (or patch) at a time, while maintaining consistency with the neighborhood pixels. This application of deep learning is used in the car damage detection and extraction of original features before the incident for timely insurance claims.

Thermal Analysis of Organic Rankine Cycle Based on Different Fluid Type
Authors:- M. Tech Scholar Sanjay Rahangdale, Prof. Kashiram Kadwe

Abstract:- The ORC works with a high molecular mass organic working fluid with the characteristic of having a phase change of liquid to vapour occurring at a temperature which is lower than the phase change of water to steam for a given pressure. The recovery of low grade heat can be achieved using organic fluids. These low grade heat sources can be from biomass energy, solar energy, geothermal energy and industrial waste. This work presents an analysis of organic Rankine cycle (ORC) using R143a, R600a, R134a and RC318 as working fluids under constant external conditions. An EES program has been developed to parametrically compare the first and second law efficiencies and turbine size factor with increase in turbine entry temperature, heat source temperature, and turbine efficiency and pinch point temperature difference.

A Review Article of Composite Drive Shaft Vibration Effects and Methodology
Authors:- M.Tech. Scholar Govind Solanki, H.O.D. Mr. Ganesh Kesheorey

Abstract:- Almost all automobiles (at least those which correspond to design with rear wheel drive and front engine installation) have transmission shafts. The weight reduction of the drive shaft can have a certain role in the general weight reduction of the vehicle and is a highly desirable goal, if it can be achieved without increase in cost and decrease in quality and reliability. It is possible to achieve design of composite drive shaft with less weight to increase the first natural frequency of the shaft and to decrease the bending stresses using various stacking sequences. By doing the same, maximize the torque transmission and tensional buckling capabilities are also maximized. This work deals with the replacement of a conventional steel drive shaft with High Strength Carbon drive shafts for an automobile application.

Quality and Productivity Improvement in Gear Manufacturing Process by using Quality Control Chart and Capability Analysis Including Sampling
Authors:- M.Tech. Scholar Hari Krishnadas Raut, Asst. Prof. Yogesh Ladhe

Abstract:- Increasing productivity and profitability are main objectives of any organization. Many tools and techniques are used to reduce rejections and defects of product. Most of the rejections and defects are occurred due to improper control of quality of product. So use of 7 Quality control tools is best way to reduce rejections and defects of product after analyzing of manufacturing process. Another advantage is increasing customer satisfaction by use of 7 Quality control tools in today competitive market. Based on application of these tools will increase the level of standard products which they require as vision of an organization. The purpose of this work is to discuss the effect of implementation of Total Quality Management (TQM) in manufacturing industry (Shree Gears Pvt. Ltd, Indore). Very few service companies have been able to reap full benefits of TQM. One major reason for its inadequate success is that of trying to implement in service companies techniques that have been successful in manufacturing. In manufacturing, emphasis of TQM is on “zero defects”. Control charts and sampling are the major tools of quality control. However, in services, emphasis is on “zero defections”. Focus is on customer satisfaction and team approach. TQM can boost profits and improve customer satisfaction by reducing defects.

Road Construction in Hilly Region and Their Problem and Solution
Authors:- M.Tech. Scholar Techi Takar, Jitender Kumar

Abstract:- Construction of road is very much important for the transportation of goods and services from one place to another by the mean of roadway network. Road transportation is one of the primary modes of transportation since from the earlier time. The mode of road construction is varies with the geographical feature of the earth such as plain land, mountain terrain, steep and hilly region. It is more easy and accessible to construct a road in plain region as compare to the hilly region.This paper presents the road construction mode in the hilly region as well as their problem and solution with reference to the segment of NH-13 from Sagalee to Midpu (Doimukh). Hilly region comprises of steep mountain terrain, naturally hard rock strata and various turning points which made the road construction very difficult. As the development take place so it is necessary to connect the every corner of the country in order to have a transportation facility easy and accessible in terms of commercial purpose ,business purpose ,health and medical services , education sector etc. Therefore construction of serviceable road in hilly region is very much important for the overall Nation growth. The review study of this paper is to bring the knowledge of road construction problem and their solution of particular hilly region road stretch from Sagalee to Midpu (Doimukh) which is the capital region of Arunachal Pradesh, having stretch length of 74 km.

Implementation of Water Tank Design using Staad Pro Software
Authors:- Sunita Ahuja, Sourabh Dashore

Abstract:- Intensity of the wind is the principal reason for wind caused disaster. Hence constructed structures must be prepared by constructor to fight the impending disaster due to wind by understanding the performance of the structure under wind load. In this study a computational analysis of water tank has been carried to evaluate the performance of elevated water tank under the action wind forces. Since these types of tanks have high mass concentrated at the top height of slender supporting structure and that’s why this type of structures are mainly susceptible to horizontal forces induced by wind. Elevated water tanks have been investigated to analyze the actions of this structure due to wind force by changing different parameters such as capacity, height of stage, terrain category and wind zone. The results presented in this paper will be useful to the designer to understand the effect of various factors as mentioned above on the magnitude of wind force acting on the elevated water tank. Overhead Intze type tank is a form of expanded water tank resting on staging. Bottom part of tank of Intze tank is abounding in flat structure, thus in flat bottom, the thickness and reinforcement is set up to be high. This work aims to study the performance of the Overhead water tank of Intze type having different configuration of staging under the action of basic wind loads in different terrain category.

Review on Nano Particle Based Li Ion Batteries
Authors:- Y. V. Aravind Kumar

Abstract:- Li ion batteries have applications in nanotechnology .Here in this paper we were mainly focused on nonmaterial’s such as CNTs, silicon thinflims, coaxial MnO2/carbon annotate array electrodes ,self assembled TiO2 grapheme and li paper batteries to improve the performance of nanobatteries and storage.

Movie Recommendation Using Principle Component Analysis
Authors:- M.Tech. Scholar Bharti Vishwakarma, Prof. Ashish Tiwari

Abstract:-Recommendation system uses different types of algorithms to make any type of recommendations to user. Collaborative filtering recommendation algorithm is most popular algorithm, which uses the similar types of user with similar likings, but somewhere it is not that much efficient while working on big data. As the size of dataset becomes larger then some improvements in this algorithm must be made. Here in our proposed approach we are applying an additional hierarchical clustering technique with the collaborative filtering recommendation algorithm also the Principle Component Analysis (PCA) method is applied for reducing the dimensions of data to get more accuracy in the results. The hierarchical clustering will provide additional benefits of the clustering technique over the dataset and the PCA will help to redefine the dataset by decreasing the dimensionality of the dataset as required. By implementing the major features of these two techniques on the traditional collaborative filtering recommendation algorithm the major components used for recommendations can be improved. The proposed approach will surely enhance the accuracy of the results obtained from the traditional CFRA and will enhance the efficiency of the recommendation system in an extreme manner. The overall results will be carried out on the combined dataset of TMDB and Movie lens, which is used for making recommendations of the movies to the user according to the ratings patterns created by the particular user.

Review of Worm Hole Attack in WSN
Authors:- M.Tech. Scholar Bharti Yadav, Prof. Shailendra Tiwari

Abstract:-Wormhole attacks can undermine or put out of action wireless sensor networks. In a typical wormhole attack, the attacker be given packets at one point in the network, forwards through a wired or wireless network with take away latency than the network links, and transmits them to a different point in the network. This paper describes a give out wormhole recognition algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a network. Since wormhole attacks are passive in nature, a hop count technique is used by the algorithm as a explore procedure, renovates local maps in each node, and then uses a diameter element to detect abnormalities reason by wormholes. It can provide the approximate location of wormholes, which is useful in implementing countermeasures this is the main advantage of algorithms.

Predication and Root Selection of Worm Hole Attack in WSN
Authors:- M.Tech. Scholar Bharti Yadav, Prof. Shailendra Tiwari

Abstract:- Sensor Networks (WSN) are often vulnerable to several types of attacks due to its open space deployment and large area of applications. Wormhole is one of such attack, which falls under the category of Denial of Service (DoS). In this attack, an attacker takes control of the network services by developing an overlay tunnel called wormhole channel. In this paper, a mechanism has been proposed by appending extra four-bit information to RREP packets which is known to both sender and receiver; thus, reducing chances of wormhole tunnel. The work is based on AODV protocol and simulated in NS2, which effectively detect illegitimate attack carriers.

Design & Development of Electromagnetic Dynamometer for Testing of FHP Motor: A Review
Authors:- PG Student Rajgonda Shivgonda Patil, Principal S.H.Sawant

Abstract:- Ensuring any kind of Motor Performance as a part of Design Validation of FHP Motor is necessary to know against actual theoretical design of motor verses real test results obtained only through motor testing .Electromagnetic Brake Dynamometer (Eddy Brake Dynamometer ) is best suitable for Testing the Motor as a part of Loading & knowing the results at different torque values which enable us to know various characteristics parameters like Speed verses Torque, Current verses Torque, Input watt verses Torque & efficiency verses Torque as these are Key Motor parameters which should know to Designer or Motor manufacturer before releasing the product to customer cum market . This New Test Rig consisting of Designing, Development & validation of Motor.

Enhancement of PAPR Reduction Using Pso Based Optimization Technique
Authors:- M.E. Scholar Rati Ranjan Kumar , Asst. Prof. Komal Kanojia

Abstract:- A non-constant envelope with high peaks is a main disadvantage of Orthogonal Frequency Division Multiplexing (OFDM). These high peaks produce signal excursions into non-linear region of operation of the Power Amplifier (PA) at the transmitter, thereby leading to non-linear distortions and spectral spreading. Many Peak to Average Power Ration (PAPR) reductions methods have been proposed in the literature. The objective of this review is to give a clear understanding of different techniques to reduce PAPR of the signal.

Gaze PIN entry for Password Authentication
Authors:- Mr.Raghavendrachar S, Soumya Dattatreya Hegde, Varsha Purushotham, VennalaKN, Vidyashree S

Abstract:- Secret identification numbers are widely used for user authentication and security. Authentication of password using PINs requires users to input the PIN physically, which could be vulnerable to password knowing via shoulder surfing or thermal tracking. Authentication of PIN with hands-off gaze based (by closing the eye) PIN entry techniques, on the other hand, there is no physical footprints behind and therefore offer a more secure password entry option, Gaze -based authentication refers to finding the eye location across sequential image frames, and tracking over eye center over time. This paper presents a real-time application for gaze-based PIN entry, and eye detection and tracking for PIN identification using a smart camera.

Social BOT Detection for Twitter Dataset Using GBC Technique
Authors:- M.Tech. Scholar Roshani Singh, Prof. Sumit Sharma

Abstract:- Today, peoples are devoting large amount of time in social networks. As social media network popularity increases day by day, content writer are spamming on these platform for potential benefits of some organizations. Here graph based clustering algorithm was proposed to develop a binary cluster on the basis of serial or sequential action perform by the user. As per series of action social network graph is reduce into spanning tree where highly distance nodes are identified as abnormal behavior. So group of highly distance nodes are consider as the social bots while other are real users. Experiment was perform on real social sequential dataset of twitter. Results were compared on various evaluation parameters and it was obtained that proposed approach has improved all such parameter values as compared to previous approach adopt by researcher.

Survey on Stress Analysis and Design Optimization of A Pressure Vessel using Ansys
Authors:- M.Tech. Scholar Nitesh Katiyar, Assistant Professor Ranjeet Kumar

Abstract:- Pressure vessels are a commonly used device in marine engineering. Until recently the primary analysis method had been hand calculations and empirical curves. New computer advances have made finite element analysis (FEA) a practical tool in the study of pressure vessels, especially in determining stresses in local areas such as penetrations, O-ring grooves and other areas difficult to analyze by hand. This project set out to explore applicable methods using finite element analysis in pressure vessel analysis.

Stress Analysis and Design Optimization of a Pressure Vessel using Ansys
Authors:- M.Tech. Scholar Nitesh Katiyar, Assistant Professor Ranjeet Kumar

Abstract:- Pressure vessel is used to carry liquids such as petrol, kerosene; aviation fuel etc and these fuel tanks are used to transport fuel. Finite element method is a mathematical technique used to design a fuel carrying vessel and performing the stress analysis. The main objective of this paper is to design and analysis of pressure vessel. The designing various parameters of Pressure Vessel checked and designed according to the principles specified in American Society of Mechanical Engineers (A.S.M.E).

Review: Trust in VANET
Authors:- M.Tech. Scholar Divyam Singh, Prof. Shiva Bhatnagar

Abstract:- Vehicular ad-hoc networks(VANETs) expedite those probability change those way individuals experience the readiness of a secured interoperable remote correspondences a that consolidates cars, transports, activity signals, convenient telephones, Furthermore unmistakable contraptions. An opportunity to in any case, VANETs need help exposed against security perils because of developing dependence ahead correspondence, preparing, and control advancements. The surprising security Also security tests acted by VANETs in-enlightened decency data place stock in, mystery, no renouncement, get the opportunity to control, constant operational necessities/demands, availability, What’s greater security confirmation. The enduring quality for VANETs Might an opportunity to be improved Eventually Tom’s scrutinizing tending on completely those two dominant part of the information trust, which is depicted Likewise those examination from asserting regardless for if Furthermore what precisely degree those low down activity information would reliable, Furthermore focus trust, which is depicted Likewise how dependable those center points Previously, VANETs show up with make. In this paper, an assault safe trust association devise might be suggested for VANETs that could recollect What’s more acclimate to malevolent attacks what’s more review those relentless nature of the two information and versant centers On VANETs. Exceptionally, greater part of the information trust might be assessed done light of the information recognized Also gathered beginning with different vehicles; focus trust is reviewed On two estimations, I. E., helpful trust and suggestive trust, which show how at risk a middle cam wood satisfy its comfort what’s more door reliable those proposition beginning with an inside to isolate center points will be, freely. The adequacy Also capability of the recommended symbolization plot might be authorize through far reaching examinations. Those prescribed trust association subject might be relevant with a wide arrangement about VANET demands should overhaul development prosperity, flexibility, and trademark security with pushed ahead unflinching quality.

A Review: Speech Recognition
Authors:- Sunil, Shweta, Tanya Gulati, Asst.Prof.Garima Singh

Abstract:- Speech recognition is the capability of a program to identify words and expression in spoken language and convert them to a binary language so computer system can understand. Each spoken word is split into discontinuous division which include many tones. This paper brief about the speech recognition system and how it’s work and application in day to day life.

Energy Preserve using LEACH protocol in Wireless Sensor Networks
Authors:- M.Tech. Scholar Om Patel, Prof. Shiva Bhatnagar

Abstract:- In the time of new invention Networks many rising and future empower advancements achieve the prerequisites of pervasive correspondence systems. Remote Sensor Networks is a fundamental classification of these best in class advances, the gigantic worries of these systems are vitality proficient and efficient information accumulation. Bunch based directing in WSNs is a colossal answer for upgrade the vitality productivity of the hubs and creative information gathering. Many examinations on organize lifetime and information accumulation have been proposed by the (LEACH) Low Energy Adaptive Clustering Hierarchy conspire that permits the part of the group head turned among the sensor hubs and endeavors to disseminate the vitality utilization through every one of the hubs. The lifespan of WSNs are influenced by the Cluster Head choice; this is often on the grounds that a CH expends additional power than a Cluster (non-CH) hub. Inthis examination think about, a vitality effective bunch head choice in Mobile WSN is proposed, investigated and approved on the premise of remaining vitality and randomized determination of the hub, which is not doled out as a group head in past round. Additionally, the proposed approach demonstrates the noteworthy changes when contrasted and LEACH and a unique Application Specific Network Protocol for Wireless detector Networks conventions regarding vitality utilization of sensor hubs, improved system lifetime and proficient information assembling because of less vitality utilization amid information transmission.

Study of Different Types of Mixer Topologies
Authors:- M.Tech. Scholar Ranjan Patel, Asst. Prof. Priyanshu Pandey

Abstract:- In this paper, a comparative study of different types of mixer topologies is presented. Gilbert cell is widely used as core of the mixer because it provides high conversion gain, good port-to-port isolation and low even-order distortion. It is found that the linearity of mixer is very good for Multi-Tanh technique by incorporating multiple differential trans-conductance stage but it reaches to very low conversion gain whereas, use of current bleeding technique increase linearity and conversion gain of the mixer by adding current source to increase the bias current at the expense of power consumption. A very low value of noise figure can be achieved with the switched biasing technique by replacing current source with parallel connected nMOS transistors but due to use of the transistor in place of tail current source, linearity is degraded and more power is consumed. Folded Cascode Technique is used to reduce DC supply voltage by folding the LO switching stage with pMOS transistors in switching stage but it degrades the noise figure. Bulk-driven technique can be employed to lower down the power consumption by providing the switching action via the gate of LO (RF) and amplification by the bulk of LO (RF) transistors, however it reduces the linearity. High linearity is obtained by using CCPD (Cross coupled post distortion) technique by cancelling of third order derivatives but it decreases the conversion gain and consume more power due to increase in the number of auxiliary transistors. MGTR enables to achieve high linearity by incorporating auxiliary transistor but it decreases the overall conversion gain and increases noise figure of the mixer. So it is observed that there is a trade-off among the performance metrics, i.e., conversion gain, noise figure linearity, and power consumption of the mixer.

Review of Wide Bandwidth Low Power Low Noise Amplifier
Authors:- M.Tech. Scholar Shradha Chouhan, Asst. Prof. Priyanshu Pandey

Abstract:- Recently, Low noise amplifier versatile used in modern wireless communication like Wi-Max, WLAN, GSM, Bluetooth and satellite communication. Low Noise amplifier have important feature like amplify the signal with rejection of noise. Low noise amplifier in modern communication used as filter with amplifier. In recent scenario low noise amplifier available in wide band, single band, multi-band frequency of application. In present days low noise amplifier the also reduces the reflection of signal exist by elements and connecting interface inside the amplifier. Low noise amplifier available with high gain, noise rejection and with less power consumption. In this paper review the work of past decades done in low noise amplifier. Low Noise Amplifier (LNA) is versatile used as a broadband mixer, low noise amplifier, power amplifier and Darlington amplifier, active balunes, multiband amplifier. Today technology required high speed of transmission efficiency with small power consumption and less utilization of elements in proposed amplifier, Low Noise Amplifier (LNA) products full fill all requirement of modern wireless communications, so that review and discussion, future requirement of technology is needed to discuss. In this paper discusses issues of low noise amplifier, its application, issues and recent trends. In this paper review some techniques of Low Noise Amplifier (LNA) to improve perform and surveyed almost all the Possible Work of Past Decades.

Image Encryption using Steganography
Authors:- Srinvas Nishant, Sarath Dasari, Anisha M Lal

Abstract:- steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are digital images. Due to recent developments in steganalysis, providing security to personal contents, messages, or digital images using steganography has become difficult. His paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good stenographic algorithm and briefly reflects on which stenographic techniques are more suitable for which applications.

Image Retrieval using Hybrid Technique
Authors:- M.Tech. Scholar Deeksha Waghale, Prof. Ashish Tiwari

Abstract:- To retrieve important images from a dissimilar collection by using visual queries as search arguments are the arduous and substantial open problems. In this paper the writers have mentioned the designs and implementations of a simple yet very effective Content-Based Image Retrieval (CBIR) system. The colors, textures and the shapes features are the vital parts of this system. With the three main consequent searching steps the searching becomes multilevel. Such propounded systems are very unique as they consider one feature at each step and use the results of the previous step as the input for the next coming step in multilevel pattern whereas in the earlier methods all the features are combined at once for the single-level search of an average CBIR system. The propounded method is very simple and comfortable to adopt. The retrieval grade of the propounded method is valuated using bi-benchmark datasets for an image classification. The above system of methods shows very good results in terms of amelioration in retrieval qualities, when compared with the literature. In proposed work we get accuracy like between 68.15 % to 94.86% in used different features.

Review of Intrusion Detection system
Authors:-M.Tech. Scholar Purnesh Tiwari, Assistant Professor Prakash Mishra

Abstract:- The Internet of Things (IoT) is a new model that integrates physical objects and Internet and became one of the principal technological evolutions of computing. It is estimated that a trillion of physical objects will be connected to the Internet until 2022. The low accessibility and the lack of interoperability of many of these devices in a vast heterogenous landscape will make it very hard to design specific security measures and apply specific security mechanism. Moreover, IoT networks still exposed and vulnerable to attacks aimed to disrupt the network. Therefore, additional security tools specific to IoT are needed. Intrusion Detection System (IDS) could fulfill this purpose. In this paper, we present a literature review on the IDS in IoT topic, mainly focusing on the current state of research by examining the literature, identifying current trends and presenting open issues and future directions.

Iot Based Intelligent Trolley for Shopping Malls
Authors:- Ragini Raiyani

Abstract:- The project is based on the development of a project with the aim to reduce the time spent in the store and to make shopping of day to day items an experience instead of a headache. This cart uses modern and cheap technology like RFID and minicomputers to make it intelligent and timesaving. It helps the consumers to utilize the time saved in other fruitful activities instead of wasting their time by standing in long queues at the checkout counter.

A Review: Rumors Detection on Twitter using Machine Learning Techniques
Authors:- M.Tech. Scholar Kavita Khalotiya, Prof. Ashish Tiwari

Abstract:- In this period, web based life stage are progressively utilized by individuals to pursue newsworthy occasions since it is quick, simple to get to and modest similarly. In spite of the expanding utilization of web based life for data and news assembling, its tendency prompts the development and spread of gossipy tidbits i.e., data that are unconfirmed at the season of posting, which may makes genuine harm government, markets and society. Along these lines, there is need of compelling framework for distinguishing bits of gossip as ahead of schedule as conceivable before they generally spread. Viable framework should comprise of four parts: Rumor location, gossip following, position grouping, and veracity arrangement. Loads of work has been done in later segment while less work in segment talk identification. In this way, presently we should take a shot at gossip location. In this paper, we will condense endeavors done till now around there. A large portion of existing techniques identifies from the earlier bits of gossip, i.e., predefined gossipy tidbits. So it is required to have robotized gossip discovery strategy which recognizes new developing gossipy tidbits viably and as ahead of schedule as could reasonably be expected.

Survey Paper of Wireless Sensor Network
Authors:- M .Tech. Scholar Kamakshi Gupta, Asst. Prof. Shailendra Tiwari

Abstract:- In recent years there is a quick advancement in the field of Wireless sensor network. This paper gives brief introduction of Wireless sensor associate with its applications in the field of condition, structure checking, keen home watching, Industrial application, prosperity, military, vehicle recognizable proof, blockage control and RFID tag. With movement in WSN, little and simplicity sensor centers end up available, which have limits of Wireless correspondence, recognizing diverse sorts of biological conditions and data getting ready. There are different sorts of coordinating traditions depending on application and framework designing. Guiding traditions give route in the framework and capable multi-skip correspondence. WSNs can be found in various applications like normal native and military by and large which get a handle on enemy interference area, challenge following, calm watching, living space checking, fire acknowledgment and cutting edge.

Phone Security on Android Device
Authors:- M.Tech. Scholar Rajeshwari Yogi, Prof. Ashish Tiwari

Abstract:- Android is a savvy versatile terminal working stage center on Linux. Be that as it may, because of its open-source programming and programmable structure character, it drives the Android framework helpless against get infection assaults. This paper has profoundly inquired about from the Linux framework security system, Android-explicit security instruments and other assurance components. Also, on this premise, Android gadgets have accomplished firmly watched on ordinary state. With the goal that aggressors cannot utilize the portion module or center library to get most elevated access consent and be assaulted. In the mean time, to additionally reinforce the security of Android gadgets, it empowers them to appropriately deal with the high-hazard danger. This paper likewise fortified interruption identification framework (HIDS) in light of the host so as to identify noxious programming and reinforce the Android framework level access control.

Digital Water Marking Technique using Decision Tree
Authors:- M. Tech. Scholar Nikhil Shrivastava, Assistant Professor Prakash Mishra

Abstract:- The quick development of the Internet in the previous years has quickly expanded the accessibility of advanced information, for example, sound, pictures and recordings to general society. As we have seen in the previous couple of months, the issue of ensuring sight and sound data turns out to be increasingly essential and a great deal of copyright proprietors are worried about securing any unlawful duplication of their information or work. Some genuine work should be done so as to keep up the accessibility of mixed media data. Highlight extraction and order based computerized water checking is new territory of research in flow security assurance and copyright strategy. Around there of research different creators utilized element extraction method, for example, wavelet change work and for arrangement reason utilized help vector machine. During the time spent element based water checking strategy include extraction is most critical part and the characterization relies upon chosen highlight. In this paper proposed novel computerized water checking strategy dependent on whole number wavelet change with quality based order procedure. For the choice of highlight quality utilized RBF work. The determination of quality relies upon separated element by whole number wavelet change. The proposed technique recreates in MATLAB programming and tried some rumored assault, for example, commotion assault, share assault and interpretation assault. Our observational assessment result indicates better execution in pressure of DWT water stamping system.

Conservation of Water in Drought Areas
Authors:- Prof. Madhuri S. Bore, Prof. Monali G. Ingle

Abstract:- India is one of the agricultural economy based country. Despite, the share of agriculture sector to GDP of the country is only about 24%, 70% of Indians are dependent on farm incomes, and about 60% of farm cultivation depends on rains. In past few years there has been increase in extreme weather events such as drought, flood, heat and cold waves, strong wind etc. India suffered of drought in 2002 with seasonal June – September all India rainfall 19% below normal after all India drought occurred during June – September, 1987. Droughts have severe economic, environmental and social impacts. Areas having poor rain could be detected in advance. It is possible to reduce agricultural losses by advanced prediction of poor or no rain situations, timely dissemination of weather based agro-advisories to planners and farmers.

Hospital Waste Management and its Impact on a local Community in Indore City
Authors:- M.Tech. Scholar Anant Tare, Asst. Prof. Vijay Kahar

Abstract:- Hospital waste management in the world is a formal discipline and does occupy a critical place in the management of health care sector. The management of hospital waste requires its removal and disposal from the health care establishments as hygienically and economically as possible by methods that all stages minimizes the risk to public health and to environment. To analyze the present situation analysis of medical waste management systems was performed to understand the various handling and disposal procedures, the knowledge and awareness of individuals involved in medical waste generation, handling and disposal, and the potential impacts of the waste stream on both human health and the natural environment. The method adapted for present study was literature review and survey method. The data collection was done through questionnaire (data collection form), informal interviews and site visits. It was found that a variety of methods were used by the medical facilities to dispose their wastes including burning burial, entombing, selling, dumping, and removal by municipal bins. The waste disposal practice was found to be quite unsafe, and both clinical and non-clinical wastes were found to be thrown together. There was insufficient awareness of the magnitude of the medical wastes issue by concerned individuals at different levels from director or divisional head to waste pickers. There was no safety measure observed in dealing with waste disposal or laboratory analysis of infectious diseases. Medical waste incineration is identified as the most preferred disposal method.

Review of Under Water Communication on Wsn
Authors:- M.Tech. Scholar Priyanka Patwari, Asst. Prof. Madhvi Singh Bhanwar

Abstract:- This paper explains briefly our research directions in the field underwater sensor networks. We explain potential applications to off-shore oil fields for equipment monitoring, seismic monitoring and underwater robotics. We describe research directions in MAC, short-range acoustic communications, localization protocols and time synchronization for high latency acoustic networks, application level time scheduling and long-duration network sleeping.

Online Video Game Streaming using Cloud Gaming
Authors:- Pravin R. Thokal, Omkar D. Kshirsagar, Shubham R. Hadake, Muktesh T. Bobade

Abstract:- The present paper mainly focuses on review of cloud gaming. In cloud gaming, sophisticated game runs on powerful servers in data centers, rendered game scenes are streamed to gamers over the Internet in real-time, and gamers use light-weight software executed on devices to interact with the games. Computer games used to take more time to get installed on Computer systems as games are too complicated and the computer hardware has low specifications. Gamers have to repeatedly upgrade their computers to play latest computer games. Cloud gaming is a system that has the potential to make virtually any video game, regardless of system requirements, to be played on almost any system.

A Survey on Data Storage, Maintenance and Accessing Challenges in Cloud Computing
Authors:- Thilagavathy Sakthivel, Vijayalakshmi Saravanan

Abstract:- Cloud computing holds the possibility to dispense with the prerequisites for setting up of high cost figuring foundation for the IT-based arrangements and administrations that the business employments. It vows to give an adaptable IT design, open through web for lightweight convenient gadgets. This would permit many-crease increment in the limit or capacities of the current and new programming. In a distributed computing condition, the whole information dwell over a lot of organized assets, empowering the information to be gotten to through virtual machines. Since these server farms may lie in any side of the world past the range and control of clients, there are diverse security and protection provokes that should be comprehended and dealt with. Likewise, one can never prevent the likelihood from securing a server breakdown that has been seen, rather frequently in the on-going occasions. There are different issues that should be managed regard to security and protection in a distributed computing situation. This broad overview paper intends to expound and investigate the various uncertain issues compromising the Cloud processing selection and dissemination influencing the different partners connected to it.

What is Image Recognition?
Authors:- Justin Devassy, Abhishek Bharadwaj (Student MCA), Prof. LatikaKharb

Abstract:- In recent years, Image recognition has become a buzzword in the tech world. Deep learning has changed the entire world over the past few years image recognition is one of the striking features of deep learning. Every day, more applications depend on neural networks which are the core component of deep learning in fields of object detection, identification, and classification. In the paper, we have discussed about what is image recognition, some real world examples, image recognition tools, opportunities, uses and problems in image processing.

Experimental Evaluation of Super plasticizers used in M20 & M25 Grades Concrete
Authors:- Sc. B Pankaj Joshi, Sc. C Raj Kumar, Sc. E Rajeev Kumar

Abstract:- Chemical admixtures are one of the important ingredients in concrete other than Portland cement, water and aggregate added to the mix before or during mixing. Admixtures are primarily used to reduce the water-cement ratio to enhance workability and compressive strength of concrete along with other properties. Successful use of admixtures depends on the use of appropriate methods of batching and concreting. Most admixtures are supplied in ready-to-use liquid form and are added to the concrete at the plant or at the jobsite. Certain admixtures, such as pigments, expansive agents, and pumping aids are used only in extremely small amounts. The effectiveness of an admixture depends on several factors including: type and amount of cement, water content, mixing time, slump and temperature. The paper presents the experimental results for comparison of two super plasticizers (Naphthelene based and Poly-carboxi late based) used in M20 & M25 grade concrete mixes to achieve economical concrete mix.

Real Time Enhanced Speech Recognition Technique to Operate Computer System Using SVM:Review
Authors:- Jadhav Sayali, Kadam Madhuri, Talreja Khushboo, Khatake Sujata

Abstract:- Speech is unique human characteristic used as tool to communicate. Speech Recognition technology is one most of the fast growing engineering technologies. It has a number of applications in different areas and provides potential benefits. Nearly 20% people of the world are suffering from various disabilities, the speech recognition system in those particular cases provide a significant help to them, so that they can share information with people by operating computer through voice input. The main objective is to recognize the spoken word by same speaker using multi-class support vector machine. Because of their limitations and high cost, voice recognition systems have traditionally been used only in a few specialized situations. For example, such systems are useful in instances when the user is unable to use a keyboard to enter data because his or her hands are occupied or disabled. Instead of typing commands, the user can simply speak into a microphone. The performance of system gives better result with reducing the work of human in terms through input device or touch screen. This work is proposed to operate the computer system through the voice commands like open or close file or any computer operations.

Review of Cooling Load Calculation of New Academic Building of Asansol Engineering College
Authors:- UG Sourabh Choudhary, UG Shantnu Sharma, UG Sayak Saha, UG Sanu Kumar, UG Sanjeev Kumar, UG Rohit Vishwas, Asst. Prof. Kaushal Kishore

Abstract:- Day by day due to increasing global temperature of the environment the demand of Air Conditioning Systems is increasing so it’s very important that the right amount of Air Conditioning System is selected. This process of selecting the right amount of Air Conditioning System is done by calculating the heat loads from the various sources in the room. The calculation of Heat Load is very complex process and required a lot of complex mathematical calculation. So to simplify it various software such as HAP 4.0 etc. are used for the above said purpose. These software’s though are simple for the professionals but appear to be very complex for common people. So this projects develops a alternate excel sheet which does the same work as that of the professional software’s but in a very simple manner. This project contains a detailed cooling load calculation of “New Academic Building” of Asansol Engineering College, Asansol, West Bengal. Its covers all the aspects of solar heat gain through glass, walls, partition walls, ceilings, equipment etc. All the calculations are done in an excel sheets with all the data collected from ASHRAE and ISHRAE handbooks. The project also describes the different heat load parameters such as refrigeration, air conditioning, etc. The various assumptions and design parameters are also considered for the development of this project. The detailed calculation and the mathematics running behind the working of the excel sheet is also described in the 2nd half portion of the project.

Evaluation on Temperature Distribution Effect in Internal Combustion Engine Fin withDifferent Profile
Authors:- A. Gautam, R. Mohan

Abstract:- The fins used in internal combustion engine plays a vital role in thermal distribution of engine during its operating condition which is used to dissipate the heat gained from combustion inside the cylinder. It is mounted above the engine to extract maximum amount of heat flux generated inside it. In present study, the UNI-GRAPHICS NX-8.0 has been used to develop the CAD model of IC engine fin. The ANSYS workbench 15.0 software is used for steady state thermal analysis of IC engine fin in order to assess the parameters affecting their thermal performances. Here, the present model is validated with the previous literatures and it is observed to be in good agreement. The performance of various fin profile such as concave fin, convex fin, convex with perforation, elliptical fin, elliptical with fillet fin, elliptical fin with perforation are assessed. The simulation of the optimized model i.e. elliptical fin with perforation gives higher value of temperature distribution with respect to distance in fin profiles. It has also been observed that thermal resistance was reduced at constant temperature of 495K inside the cylinder. The maximum convergence is observed for elliptical fin profile with perforation irrespective of parameters and configurations employed in the analysis.

A Survey of Deep-Learning Model using Intrusion Detection for the Internet of Things
Authors:- Ms.S.Vinitha, Prof. M.Ganesan, Ms.S.Arabindhu

Abstract:- Cyber-attacks on the Internet of Things (IoT) are developing at a disturbing rate as gadgets, applications, and correspondence systems are winding up progressively associated and coordinated. At the point when assaults on IoT systems go undetected for longer periods, it influences accessibility of basic frameworks for end clients, expands the quantity of information breaks and wholesale fraud, drives up the expenses and affects the income. It is basic to recognize assaults on IoT frameworks in close ongoing to give powerful security and guard. In this paper, we build up a wise interruption discovery framework custom fitted to the IoT condition. Specifically, we utilize a profound learning calculation to identify pernicious traffic in IoT systems. The location arrangement gives security as an administration and encourages interoperability between different system correspondence conventions utilized in IoT. We assess our proposed recognition system utilizing both genuine system follows for giving a proof of idea, and utilizing recreation for giving proof of its adaptability. Our exploratory outcomes confirm that the proposed interruption recognition framework can recognize true interruptions adequately.

A Critical Review of Recent Nuclear Plant Accidents and Disasters
Authors:- M.Tech. Scholar Sourabh Verma, Prof. S. N. Varma

Abstract:- Present day safety levels are achieved by learning from past accidents. We learn to use a knife by analyzing at the incidents which caused injury and harm .As per HSA (Health Science Association) report “Incident investigation are intended to determine the cause of an incident, to identify unsafe conditions or acts and to recommend corrective actions so that similar incidents don’t occur in the future. The purpose is prevention, not blame. After an investigation, employers are required without any undue delay to take corrective actions and then report on the actions taken”.

Eye Can Help – An Assistive Eye Wearable for the Blind Designed Using Real-Time Object Detection
Authors:- Hrituja Khatavkar

Abstract:- It is a big challenge for the visually impaired to access the surrounding with ease. Given paper presents a tool, an assistive device for the blind that will aid them navigate the surroundings. This device uses real-time object detection to identify the objects in nearby environment and then the is processed to convert to speech to make the understand.

A Survey on Security Attacks in Vehicular Adhoc Networks (Vanets)
Authors:- S.Arabindhu, Prof K. Prem Kumar, S. Vinitha

Abstract:- VANETs have turned into a major part of numerous savvy transportation frameworks. Security is a significant yearning for VANET in perspective on the actualities that improved security which diminishes mishaps and subsequently improves traffic conditions but then spare lives. Creating secure VANET foundations stays most noteworthy test. As verification permits confiding in both client and information, it requires significant consideration in the security structure of VANETs. A large portion of the examination purposeful endeavors’ in scholastics and industry are engaged to give productive security engineering to VANET to shield the system from foe hubs and assaults. The issue of VANET is transmitting data to address goal without impact in that data. Bringing up security holes with respect to particular dangers, the arrangement will permit to structured new secure system control strategies. This paper gives different assaults in VANET and potential arrangements by utilizing cryptographic tasks.

A Survey on Internet of Things Based Water and Energy Management Open Research Issues
Authors:- Ms. Vijayalakshmi Saravanan, Ms. Thilagavathy Sakthivel

Abstract:- The quick progressions in correspondence advances and the hazardous development of Internet of Things (IoT) have empowered the physical world to imperceptibly entwine with actuators, sensors, and other computational components while keeping up persistent system network. The persistently associated physical world with computational components frames a keen domain. A brilliant domain plans to help and improve the capacities of its tenants in executing their errands, for example, exploring through new space and moving substantial items for the older, to give some examples. Specialists have directed various endeavors to utilize IoT to encourage our lives and to examine the impact of IoT based keen situations on human life. This paper studies the cutting edge examine endeavors to empower the IoT based brilliant situations. We sort and group the writing by concocting a scientific classification dependent on correspondence empowering influences, arrange types, advancements, neighborhood models, targets, and attributes. Besides, the paper features the uncommon open doors achieved by IoT based brilliant conditions and their impact on human life. Some announced contextual analyses from various endeavors are additionally displayed. At long last, we talk about open research difficulties for empowering IoT based savvy situations.

A Research of Dealing with Sinkhole Attacks To Prevent Security in WSN
Authors:-Ms. K. Prasannadevi, Prof P.Karthikeyan, Ms.A.Swathy

Abstract:- Wireless Sensor Network (WSN) is rising as a common innovation because of its wide scope of utilizations in military and regular citizen areas. These systems are effectively inclined to security assaults. Unattended establishment of sensor hubs in the earth causes numerous security dangers in the remote sensor systems. There are numerous potential assaults on sensor system, for example, specific sending, sticking, sinkhole, wormhole, Sybil and hi flood assaults. Sinkhole assault is among the most damaging steering assaults for these systems. It might make the interloper draw all or a large portion of the information stream that must be caught at the base station. When sinkhole assault has been actualized and the enemy hub has begun to fill in as system part in the information directing, it can apply some more dangers, for example, dark opening or dim gap. Eventually this drop of some significant information bundles can upset the sensor organizes totally. This paper centres around the different techniques that can be actualized to beat this assault like Location Based Compromise Tolerant Hop Count Monitoring Scheme and through Non Cryptographic Security Mechanism, Method of Sinkhole Attack Detection.

A Survey on Security Attacks in Vehicular Adhoc Networks (Vanets)
Authors:- S.Arabindhu, Prof K. Prem Kumar, S. Vinitha

Abstract:- VANETs have turned into a major part of numerous savvy transportation frameworks. Security is a significant yearning for VANET in perspective on the actualities that improved security which diminishes mishaps and subsequently improves traffic conditions but then spare lives. Creating secure VANET foundations stays most noteworthy test. As verification permits confiding in both client and information, it requires significant consideration in the security structure of VANETs. A large portion of the examination purposeful endeavors’ in scholastics and industry are engaged to give productive security engineering to VANET to shield the system from foe hubs and assaults. The issue of VANET is transmitting data to address goal without impact in that data. Bringing up security holes with respect to particular dangers, the arrangement will permit to structured new secure system control strategies. This paper gives different assaults in VANET and potential arrangements by utilizing cryptographic tasks.

A Survey on Internet of Things Based Water and Energy Management Open Research Issues
Authors:- Ms. Vijayalakshmi Saravanan, Ms. Thilagavathy Sakthivel

Abstract:- The quick progressions in correspondence advances and the hazardous development of Internet of Things (IoT) have empowered the physical world to imperceptibly entwine with actuators, sensors, and other computational components while keeping up persistent system network. The persistently associated physical world with computational components frames a keen domain. A brilliant domain plans to help and improve the capacities of its tenants in executing their errands, for example, exploring through new space and moving substantial items for the older, to give some examples. Specialists have directed various endeavors to utilize IoT to encourage our lives and to examine the impact of IoT based keen situations on human life. This paper studies the cutting edge examine endeavors to empower the IoT based brilliant situations. We sort and group the writing by concocting a scientific classification dependent on correspondence empowering influences, arrange types, advancements, neighborhood models, targets, and attributes. Besides, the paper features the uncommon open doors achieved by IoT based brilliant conditions and their impact on human life. Some announced contextual analyses from various endeavors are additionally displayed. At long last, we talk about open research difficulties for empowering IoT based savvy situations.

Tree Species Identification and It’s Diseases using Machine Learning
Authors:- Satish V. Kendre, Prof. J. N. Nandimath

Abstract:- Tree species identification is crucial for forest management. From the perspective of plant taxonomy, leaves, flowers, roots, and fruits all carry important information to distinguish different species. Roots, however, are buried in the ground and not easy to obtain. When the leaf image is uploaded to PC and then its essential features are identified and recorded And it’s diseases using image processing methods. Feature extraction is a critical stage because the ability of a system to discriminate various types of leaves depends on the features extracted. The features have to be stable in order to make the identification system robust. Subsequently the plant leaf is recognized using techniques of machine learning. We will provide an effective approach to automatically identify tree Species and its diseases machine Learning. The convolution neural network is a widely-used classifier, and provides an alternative for the traditional image recognition approach. The work will identifies tree species by analyzing tree leaves, which have multi-dimensional features such as color, shape, and leaf vein signatures. Since it is difficult to find a single leaf feature to accurately identify tree species and it’s diseases, convolution neural networks are employed to integrate multi-dimensional leaf features.

Survey on Prediction of Heart Disease using Machine Learning
Authors:- M.Tech. Scholar Yashita Agarwal, Asst. Prof. Deepak Singh Tomar, Hod Dr. Bhupesh Gour

Abstract:- Machine Learning algorithms provide the facility to find new facts in the form of patterns from the history of records stored in databases. Predicting the diseases in earlier stages is a major task of data mining algorithms. The number of costly tests is required for patients to analyze the symptoms and causes for effective disease diagnosis. On the other hand, this number of tests on patients can be eliminated using data mining machine learning algorithms. This minimizes number of tests which plays considerable outcomes in time and accuracy level of prediction. Heart disease prediction is essential since it permits healthcare professionals to analyze the attributes important for diagnosis like blood pressure, diabetes, age, height, weight, etc., effectively.

Use of Artificial Intelligence in Sales and Marketing
Authors:- MBA Student Atul Karale , Prof. Raghvendra Sandhane

Abstract:- Artificial intelligence is impacting the sales and marketing in an unparalleled way. AI is expected to grow performance across all sectors, especially those with a high proportion of predictable tasks. Companies like Walmart, Amazon are heavily investing in AI because of which Sales and marketing reps are facing a grim future. In this paper, a literature review of how artificial intelligence-based systems is used for sales and marketing purpose, how AI has evolved from time to time with special focus on organization which are presently using this for industrial marketing is covered. This paper also includes a survey which is aimed at gathering information from organizations on how they are using artificial intelligence. This paper therefore tries to address the use of AI cases in sales and marketing and also aims to determine the future scope of artificial intelligence in different marketing activities.

A Survey on Searching Mechanism for Encrypted Cloud Storage
Authors:- M.Tech. Scholar Mintu Kumar, Professor Niresh Sharma

Abstract:- The basic advantage of cloud computing is giving of data benefit, by which the data proprietors stores their information in general data server farms by financially sparing their capital venture towards data management. Distributed cloud storage gives clients enormous storage room and makes it easy to use for prompt necessity of data, which is the establishment of a wide range of cloud based applications. Data giving in the business open cloud additionally raises the issue for unapproved data get to and the distributed cloud storage would not be commendable if the outsourced data isn’t viably used. The challenge is on the most proficient method to influence successful data to access in the public cloud storage aiming at change of different searching procedures for expanding the data usage. In this paper, an endeavour is made to review different searching procedures for the powerful data use in cloud storage and is talked about in detail.

Analysis of A Fatigue Life Prediction for Safe and Economical Machine Shaft
Authors:- M.Tech. Scholar Gaurav Kumar, Asst. Prof. Ranjeet Kumar, Asst. Prof. R.S. Sikarwar

Abstract:- High-strength bolts are widely used in wind turbines and play a significant role in their operation. In this paper, in order to study the ultimate strength of high-strength bolts in the connection between the hub and main shaft in wind turbine with pretension effects, two kinds of finite element models are presented: a solid bolt model and a simplified bolt model. In this proposed study the numerically simulation analysis of the fatigue behavior of stepped shaft made of Carbon steel SAE 1045_390_QT under a biaxial loading (torsion-bending moment). This work will include the complete analysis of stepped shaft by using Ansys workbench 15.

Identification of Plant Leaf Diseases using Deep Convolutional Neural Networks
Authors:- M.Tech. Scholar Tirupati Murali Mohan, Asst. Prof. & Hod P. Bhanu Prakash Reddy

Abstract:- – Agriculture is the most important part of the global economy as it presents food safety. However, in modern years, it has been noted that plants are broadly infected by various infections. The manual examination of plant, fruit and leaf diseases is a complicated process which can be reduced by using automated processes for detection of plant diseases at the first stage. In the field of horticultural information, the automatic identification moreover diagnosis of maize leaf diseases are extremely desired. For increasing growth and productivity of the crop field, farmers need automatic monitoring of disease of plants instead of manual. Standard monitoring of disease do not produce a satisfactory outcome as natural eye observation is the old process needs more extra time for disease identification also need specialist hence it is not effective. Curvularia leaf spot, Brown spot, Mosaic, Grey spot, and Rust are five popular types of leaf diseases. To overcome the drawbacks of regular eye observing procedure, we used digital image processing method for active and accurate disease detection of the plant. To develop the identification accuracy of leaf diseases and decrease the number of parameters, the improved GoogLeNet and Cifar10 models based upon deep learning are proposed for leaf disease identification in this paper. Two improved standards that are employed to train and test nine varieties of maize leaf images are obtained by changing the parameters, adjusting the pooling combinations, combining dropout operations and rectified linear unit functions, and decreasing the number of classifiers. The enhanced processes have probably improved the accuracy of leaf disease and decreased the convergence repetitions, which can efficiently increase the model training and identification capability.

Online Parking Booking System
Authors:- Nidhi Sharma, Ruchita Bhoye, Anuja Deokar, Shrishti Nayak

Abstract:- With the increasing number of vehicles, finding a parking space in most areas is difficult for drivers. The common method of finding a free space is manual. This method takes time and effort. Hence, this project offers an online reservation system where the users can view various parking areas and select the available space. If the booking space is available then he/she can book it for specific time slot. The booked space will be marked red and will not be available for anyone else for that specified time. This system provides an additional feature of cancelling the bookings. User can remove their booked space anytime. Online payment can be done. After making payment, user will get a notification on his/her phone with unique parking number.

Traffic Sign Recognition and Boundary Estimation Using Convolutional Neural Network
Authors:- M.Tech. Scholar M. Hanumesh Raja, Asst. Prof. & Hod P. Bhanu Prakash Reddy

Abstract:- Now a days, a large number of vehicles is quickly increasing. In parallel, the number of routes and traffic signs has developed. As an outcome of developed traffic signs, the drivers are required to learn all the traffic signs and to pay attention to them while driving. A method that can automatically identify the traffic signs has been required to decrease traffic accidents and to drive more easily. Recognition and Detection of texts in traffic signs have been extensively studied and with the advance in image capture technology has accommodated to develop or to produce new methods to resolve this issue. In this work, we introduced a method for detection, segmentation and recognition of text-based traffic signs from images analyzing and processing techniques. We introduce a unique traffic sign detection system that concurrently estimates the location and precise boundary of traffic signs using convolution neural network (CNN). Estimating the precise boundary of traffic signs is very important in navigation systems for smart vehicles where traffic signs can be used as 3-D landmarks for the road environment. In this paper, the boundary view of a traffic sign is formulated as 2- D pose and shape class prediction problem, and this is completely solved by a single CNN. With the predicted 2-D pose and the shape class of a targeted traffic sign in the input, we determine the actual boundary of the destination sign by projecting the boundary of a corresponding template sign image into the input image plane.

Automated Payroll with Gps Tracking and Image Capture
Authors:- Shinde Reshma U.

Abstract:- This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 30 minutes .When user logout the system again the image will be captured as well as GPS location will be send to the admin. In order to keep track of the attendance as well as payroll of the field work people, this system plays a major role.

A Review on Heat Transfer Analysis of Internal Combustion Engine Fins at Different Profile
Authors:- A. Gautam, R. Mohan

Abstract:- The part or component which faces high temperature variation and thermal stress is engine cylinder and also the core automobile component of engine is cylinder. So there has to need of slowdown the high temperature variation and thermal stress of cylinder by using the fins. To increase the heat transfer by convection fins have provided on the surface of cylinder. Internal combustion engine fins plays an important role in thermal distribution in engine during its operating condition which is used to dissipate the heat gained from combustion inside the cylinder. It is mounted above the engine to extract maximum amount of heat flux generated in it. This paper presents a review of different fin profile to reduce thermal resistance and get maximum convergence.

Wearable Polymer Optical Fiber Sensors in Healthcare using Iot
Authors:- C.Premanantha Madhavan, K.Jebastin

Abstract:- Sleep disordered breathing is an increasingly common condition among the general population. Life expectancy in most countries has been increasing continually over the several few decades thanks to significant improvements in medicine, public health, as well as personal and environmental hygiene. However, increased life expectancy combined with falling birth rates are expected to engender a large aging demographic in the near future that would impose significant burdens on the socio-economic structure of these countries. Therefore, it is essential to develop cost-effective, easy-to-use systems for the sake of elderly healthcare and well-being. Remote health monitoring, based on non-invasive and wearable sensors, actuators and modern communication and information technologies offers an efficient and cost-effective solution that allows the elderly to continue to live in their comfortable home environment instead of expensive healthcare facilities. These systems will also allow healthcare personnel to monitor important physiological signs of their patients in real time, assess health conditions and provide feedback from distant facilities. In this paper, we have presented and compared several low-cost and non-invasive health and activity monitoring systems that were reported in recent years. A survey on textile-based sensors that can potentially be used in wearable systems is also presented. Finally, compatibility of several communication technologies as well as future perspectives and research challenges in remote monitoring systems will be discussed.

Material Characteristics of Geopolymer Concrete for Different Strength
Authors:- Ph.D Research Scholar G.Jayarajan, Prof. & Dean Dr.S.Arivalagan

Abstract:-Every year 87 to 100 million tonne of fly ash is generated from coal based thermal power stations in India and power is the key to the prosperity and development of a nation and the power generation in India consumes 70% of country’s coal production and generates 100 million tonnes ash per tear. The ash generation is projected to increase at least to 175 million tonne per year by 2012. Now, having seen that fly ash is such a wonderful and useful material that it can be used for large number of gainful applications like in building components, cement, construction of embankments, raising, dykes, agriculture and mine fill material, it is successfully accepted for large scale utilization instead of disposing at high handling costs. This article deals with the management of fly ash in utilization based on its quality and value, Quarry dust, 12.5mm coarse aggregate with geoploymer concrete.

Perception of Business Education Teachers on The Need for Adoption of E-Learning Approach In Teaching and Learning
Authors:- Bamidele Vincent Olawale, Ayibiowu Stephen Idowu, Murtala Muhammed Yusuf

Abstract:- This paper examines the perception of business educators on the need for adoption of e-learning approach of teaching and learning in tertiary institutions. Two (2) research questions as well as hypotheses were raised for this study. The study made use of 500 Business education teachers who participated voluntarily in the study. The business educators used for the study were recruited from the six states of the North western region of the country, namely; Kano, Kaduna, Kastina, Zamfara, Sokoto and kebbi. A well structured questionnaire was used to collect the data used in this research. SPSS statistical tool was used to analyze the data, hypotheses were tested using t-test. And the finding of the study depicts that the perception of business educators with long teaching experience and those with shorter teaching experience on implementation of E-learning Approach in Teaching and learning of Business education differs. The finding of the study also shows that there is no significant difference between the perceptions of business education teachers who are first Degree holder (BSc/Bed) and those who are second degree holder (M.sc) on implementation of E-learning Approach in Teaching and learning of Business education. The study among others recommends that optimal attention should be given to improved software and appropriate policies that will favour e-learning approach of teaching and learning at all level of education in Nigeria.

A Survey: Possibility of using Building Material Waste and Waste Tyre as a Construction Material
Authors:- Ankit Chand Mishra, Assitant Prof. Dr. Sneha Gupta

Abstract:- The main objective of this study is to investigate the potential use of various solid wastes for producing construction materials. This paper is based on the review of available literature on the construction materials including different kind of solid waste. The traditional method for producing construction material is using the valuable natural resources. Besides the industrial and urban management system are generating solid waste and most probable dumping them in open fields. This activity poses serious detrimental effects on the environment. To protect the environment many efforts are being made for the reutilization of various types of solid waste with a view to utilize them in the production of various construction materials. This paper is about the environmental implications caused by the generation of various solid wastes. In addition, this paper shows the application of building material waste and solid waste based construction materials.

Past Studies on Thermodynamic Analysis of A Novel Combined Cycle Comprised of Vapor-Compression Refrigeration And Organic Rankine Cycles
Authors:- M.Tech. Scholar Prashant Kumar, Professor Sujeet Kumar Singh

Abstract:- The world is facing energy and environmental challenges due to population growth and economy development. The utilization of renewable energy can significantly contribute to reduction in consumption of conventional energy and environmental pollution. Low grade thermal energy can be utilized in organic Rankine cycle driven vapour compression refrigeration system (combined ORC-VCR) to produce refrigeration effect. Low grade renewable energy can be obtain from the source such as solar, geothermal and waste heat of industries.

Implementing Dynamic Shrew Attack Protection (Sap) to Defend Against Shrew Attack on Edges
Authors:- Asst. Prof. Agath Martin, Asst. Prof. Nidhin Sani, Asst. Prof. Nidhin Sani, Asst. Prof. Nishanth R.

Abstract:- Today’s world is ruled by Internet which is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It consists of different type of routers and components to connect between various sources. We have both inner router which connects similar topology and outer router which connects different topology. One of the error types in communication is packet loss by any means which may leads to attacks in TCP connection. Shrew Attack leads to packet drops which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. We have so many reasons for packet dropping in edges; one of such reason is due to service level agreement (SLA) enforcement where it is a negotiated agreement between two parties (e.g., customer and service provider). In this paper we propose SAP (Shrew Attack Protection) which is an architectural model that used to defend against the shrew attack rather than attempting to detect and isolate. Basic concept which used here is differential tagging & drop rate collector to identify the victims Till now research have been shown mitigating the attack in inner router where the loss is very less. But we implement SAP in edges to reduce the packet-loss (where theoretically more drops in edges) and further stop the TCP connection from closing. SAP is a destination-port-based mechanism and requires only a small number of counters to find potential victims, which makes SAP readily implement able on top of existing router mechanisms.

Study of Forced Convection Nanofluid Heat Transfer in The Automotive Cooling System
Authors:- M.Tech. Scholar Atulya Agrawal, Professor Deo Kumar Singh

Abstract:-The development of high performance thermal systems for heat transfer enhancement has become popular nowadays. A number of works has been performed to gain an understanding of the heat transfer performance for their practical application to heat transfer enhancement. Thus the advent of high heat flow processes has created significant demand for new technologies to enhance heat transfer. Heat transfer performance of liquids is limited by their low thermo-physical properties compared with those of solids. Dispersing solid metallic or non-metallic materials in a base fluid (liquid), such as water, ethylene glycol or glycerol, has become an interesting topic recently. In this paper, the friction factor and forced convection heat transfer of different nano particles dispersed in water in a car radiator was numerically determined. Four different nano fluid volume concentrations (1%, 2%, 3% and 4%) were used, and the resulting thermal properties were evaluated. The Reynolds number and inlet temperature ranged from 10000 to 100000 and from 60 to 90 °C, respectively.

Comparative Study of ILS and MLS Systems and Proposed MLS Prototype on Runway 27 of Bangalore International Airport
Authors:- M.Tech. Scholar Niyonsaba Jeremie, Professor Samuel Vivek

Abstract:-This paper discusses how the instrument landing system (ILS) and microwave landing system (MLS) operate, their subsystems and how to convert Bangalore’s international airport ILS system into MLS system. The need of MLS system over ILS system is also covered in this paper.

Comprehensive Study of Cast Iron Welding by using Different Electrode, with the Help of Destructive Testing
Authors:-Prof. Aamir Sayed, Akash S.Kogade, Akash S.Lilhare, Bablu P.Bhimte, Akshay Wankhede

Abstract:-The problematic welding characteristics of the cast iron originate majorly from the high carbon content of the material. On welding and cooling, the carbon makes formation of various undesired microstructures possible, reducing the weld ability a great deal in all regions related to welding. For welding cast iron material by using hot welding process according to the preheating temperatures ranges. the lower preheating temperatures are nonsufficient for lowering the cooling rate to the desired values and hence formation of brittle phases as martens tic and carbides are encountered.For these cases generally Ni based electrodes are used. Ni based fillers are weaker than steel alloys and yields higher ductility. Increased ductility suspends crack formation especially in case of martens tic transformation and additionally Nickel bonds with Carbon preventing formation of iron carbide. Despite these superior properties, Ni electrodes provide relatively lower mechanical properties with respect to steel.

Survey on Secure Routing Method in Wireless Sensor Networks Based Pso
Authors:- M.Tech. Scholar Anamika Kumari, Asst. Professor Niresh Sharma, Dr. Varsha Namdeo

Abstract:-Some trust-based methods have been proposed for consideration by guaranteeing the security routing of wireless sensor networks (WSN) recently. However, Most of the current research work usually consumes a lot of energy resources and computing resources or only performs well for specific types of attacks. Nowadays, most of current research works are only targeted at specific types of attacks, so they cannot cope with dynamically changing security environments. Therefore, it is extremely important to design an effective security routing algorithm to ensure data security.

Image Colorization Using Deep Learning
Authors:-Abhishek Thakur, Sumit Pandey, Priyanka Dusane, Nidhi Sharma

Abstract:-The idea of colorizing black and white films and pictures is a very old notion dating back to 1902. Today it is accepted as enrichment to the art form. Today, colorization is usually done by hand in Photoshop and other software. This takes a lot of time and proficiency. In short, an image can take up to one month to colorize. It requires considerable research. A face alone requires up to 20 layers of pink, green and blue shades to get it just right. In this project we are attempting to recolor B/W or Grayscale images using Convolution Neural Networks. This survey paper covers a few techniques that automate the task of recoloring desaturated images. These techniques employ the use of image processing and machine learning to achieve the desired outputs.

Crowd Monitoring System using Artificial Neural Networks
Authors:- Shreyash Pimpalshende, Barsha Koley, Shubham Patil, Supriya Kudale, Dr. Archana Chaugule

Abstract:- Detection of objects and their analysis into useful data has always been the core concern throughout the human evolution. From the introduction of computers, to providing those human like capabilities, to the upcoming trends in computer vision and natural language processing, these abilities are now been started to replicate by the computers. Use of Artificial Intelligence is currently the prime focus of industry in development of such core abilities for computers. Our Project involves the use of Artificial Neural Networks to determine, analyze and classify the objects been given to the feed input of it and generate useful insights, resulting in the determination of person head count in particular place, thereby monitoring the crowd and taking appropriate actions.

Study of use of Artificial Intelligence as an Enabler for Startup Success
Authors:- Ph.D Research Scholar Saumendra Mohanty

Abstract:- Artificial Intelligence is turning out to be a godsend for startups. Funding of artificial intelligence-focused companies reached approximately $9.3 billion in the U.S. in 2018, an amount that will continue to rise as the transformative impact of AI is realized. AI-based analysis is used by these Startups to make data-driven decisions. AI in business analytics can play a very crucial role in the overall success of startup organization. Advanced computing tools, machine learning, predictive Artificial Intelligence is turning out to be a great enabler to Startups to gain early traction, Big Corporation interest & investor funding over other non AI based technology Startups. As business leaders and innovators race to reach the promise of artificial intelligence to deliver a competitive advantage as well as cost and time savings, the technology is altering industries from finance to manufacturing with new products, processes and capabilities. Startups are taking advantage of AI because it enables them to provide their customers with personalized marketing, which in turn increases engagement, helps to enhance customer loyalty and improve sales, saves time and money by automating and optimizing routine processes and tasks. Increase productivity and operational efficiencies and make faster business decisions based on outputs analysis and AI have fueled the growth of new-age business intelligence tools.A recent study of Artificial Intelligence firms from three continents and 18 industries, picked show a clear trend in this regard .Many large companies have invested or acquired those Startups which have used AI /ML Algorithms.

Vehicle Crash Alert System
Authors:- Prof. M.B.Yelpale, Shubham Sanjay More, Sahil Anis Pathan, Amogh Satish Kumathekar, Priyadarshan Sanjay Deshmukh

Abstract:- At the start the GPS continuously takes computer file from the satellite and stores the latitude and line values in AT89s52 microcontroller’s buffer. If we have got to trace the vehicle, we’d prefer to send a message to GSM device, by that it gets activated. It jointly gets activated by police work accident on the shock detector connected to vehicle. Parallely deactivates GPS with the help of relay .Once GSM gets activated it takes the last received latitude and line positions values from the buffer and sends a message to the particular vary or PC that’s predefined at intervals the program. Once message has been sent to the predefined device the GSM gets deactivated and GPS gets activated.

A Review To Improvement Power Quality To Grid Connectedwindenergy System by Statcom
Authors:- Lallan Kumar, Astha Dixit

Abstract:- This paper a review of power quality improvement of wind energy system by using of STATCOM to the grid system. It shows how power electronic devices and Flexible AC Transmission Systems play a role to mitigate the power quality problems. But in the transmission system of wind energy system is affected voltage variation, flicker, harmonics and switching operation .Hence the power system losses stability and lagging power factor to connect the load. In this paper researched by using of static compensator (STATCOM) with using the battery stored system (BESS) at the common point coupling to power factor improvement and minimize total harmonic distortion of the grid system. To improve power quality by using STATCOM to connect the grid of wind energy system of a scheme of simulated of the power system of block set. The required power system maintain voltage stability and phase difference is zero, minimize distortion, harmonics to power system according to the guidelines specified in IEC-61400 standard (International Electro-technical Commission) provides some norms and measurement parameter.

Friend Recommendation System Using Location-based Social Networks : A Review
Authors:- M.Tech. Scholar Ravi Kumar Sahu, Assistant Professor Abhilasha Vyas

Abstract:- Nowadays use of social networking site is increasing exponentially. Almost 90 to 95 percent of the young generation (especially students) are using social networking services. Every social networking site is using different factors for recommending friends. These factors may include social graph, tastes, moral standards, habits, attitudes, profession, etc. Two decades ago, people typically made friends with others who live or work surrounding to themselves like neighbors or colleagues. With the rapid advances in social networks, services such as Facebook, Twitter, Google+ have provided us new ways of making friends. So there is a big challenge with the social networking services which is how to recommend a good friend to a user.

Published by: