IJSRET Volume 6 Issue 1, Jan-Feb-2020



Comparative Investigation of Aerodynamic Effects on Geometrically Twisted Wing using CFD
Authors:- Moaz Hussain

Abstract:- The main intent of this work is to simulate the aerodynamic effects on different configuration of commercial and delta wing at different angle of twist. This investigation aims to suggest a better aerodynamic configuration for wing to reduce the induced drag formed on wing during flight operation and in-turn improves the efficiency of the UAV. Simulation processes of computational fluid dynamic (CFD) on wing models for medium size high speed UAV, using typical section as NACA 2412 airfoil is been carried out at 1⁰, 2⁰ and 4⁰ twist angle. The twist is provided to adjust pressure distribution henceforth lift distribution along the wing. ANSYS Fluent is used to analyze the pressure distribution on the surface of wing at speed of 0.6 Mach. The lift and drag forces are also determined which were used for calculating the coefficients of lift and drag. The obtained results were used to establish a comparison between aerodynamic performances of all provided models.

Optimization of ART and DC for Scalable MANET
Authors:- M.Tech. Student Nisha Kaithwas, Asst. Prof.Dr.Mehajabeen Fatima, Asst. Prof. Nitesh Kumar

Abstract:- Now days, Ad-hoc network play an important role in our daily lives because of their extensive capability of uses in various fields. Mobile Ad-hoc Networks (MANETs) are very popular network with large number of users and due to development of large scale ad-hoc network; scalability has been one of the issue we need to concentrate. MANETs has a various types of routing protocols. One of the popular routing protocols is AODV (Ad-hoc On-demand Distance Vector) which provide route for communication between nodes. Route maintenance parameters such as ART (Active Route Timeout) and DC (Delete Period Constant) are stores in routing table of nodes. This paper is optimized the value of ART and DC for scalable MANET.

Survey of Force Convection Nanofluid Heat Transfer in The Automotive Cooling System
Authors:- M.Tech. Scholar Subhash Chandra Sah, Asst. Prof. Suresh Kumar Badholiya, Prof. Rohit Choudhary

Abstract:- Now days, Ad-hoc network play an important role in our daily lives because of their extensive capability of uses in various fields. Mobile Ad-hoc Networks (MANETs) are very popular network with large number of users and due to development of large scale ad-hoc network; scalability has been one of the issue we need to concentrate.A wide variety of industrial processes involve the transfer of heat energy. Throughout any industrial facility, heat must be added, removed, or moved from one process stream to another and it has become a major task for industrial necessity. Heat transfer performance of liquids is limited by their low thermo-physical properties compared with those of solids. The primary reason behind adding solid particles less type of fluid is called a Nano fluid. Dispersing solid metallic or non-metallic materials in a base fluid (liquid), such as water, ethylene glycol or glycerol, has become an interesting topic.

Study of Force Convection Nanofluid Heat Transfer in The Automotive Cooling System
Authors:- M.Tech. Scholar Subhash Chandra Sah, Asst. Prof. Suresh Kumar Badholiya, Prof. Rohit Choudhary

Abstract:- The results revealed that the nano fluid (Ag/HEG) with highest concentration of volume 4% has the highest friction factor at all Reynolds numbers. This solution provides promising ways for engineers to develop highly compact heat exchangers and automobile radiators. When adding nano particles to the base fluid, such as water, the potential enhancement of car engine cooling rates could entail more engine heat being removed or a reduction in size of the cooling system. Smaller cooling systems would lead to smaller and lighter radiators, which would benefit almost every aspect of car performance and increase fuel economy.

Secured University Result System using Block Chain Features
Authors:- Patel Zeel Vijaybhai, Golait Shubham Nitin, Birendra Pratap Singh, Prof. S. B. Ahire

Abstract:- Building a system for security of university results that satisfies the transparency of results has been a challenge for a long time. Distributed ledger technologies are an exciting technological advancement in the information technology world. Block chain technologies offer an infinite range of applications benefiting from sharing economies. This paper aims to evaluate the application of block chain as service to implement distributed database systems. The paper felicitates the requirements of building secure system and identifies the technological limitations of using block chain as a service for realizing such systems. The paper starts by evaluating some of the popular block chain frameworks that offer block chain as a service. We then propose a novel database system currently used by universities based on block chain that addresses all limitations we discovered. More generally this paper evaluates the potential of distributed ledger technologies through the description of a case study, namely the process of an election and implementing a block chain-based application which improves the security and decreases the cost of hosting a worldwide application for universities.

A Review on Thermal Performance Analysis of Steam Surface Condenser
Authors:- M.Tech. Scholar Kamlesh Amrute, Prof. Brijendra Kumar Yadav

Abstract:- The steam condenser is one of the important components in a power plant which significantly affect the power generation and performance of unit in terms of heat rate. Deterioration in thermal performance of condenser not only affects the power generation but also thermal performance of unit as a whole. The parameters that are responsible for condenser thermal performance are cooling water (CW) mass flow rate, temperature, heat transfer area, velocity, tube fouling, partially filled water box and air leakage.CW flow rate and condenser pressure changes according to the variation in unit load. The CW temperature at condenser inlet varies according to change in annual temperature cycle of the intake system. During operating condition, the condenser performance is subject to change with variation in exhaust steam and CW parameters. The operating conditions of steam surface condenser are of the great influence on the power generation and the turbine cycle heat rate. At the same time, the operating conditions of the CW system determine the operating condition of the condenser.

Digital Transactions Through BTC
Authors:- Rhytham Negi, Paramjeet Singh, Prof. Latika Kharb

Abstract:- Bitcoin is a digital currency like other digital currency, virtual currency, or electronic money which use to transact the amount (Digital currency) from one person to another. Bitcoin is a peer to peer payment system developed by “Satoshi Nakamoto” in the year 2009. Bitcoin is the decentralized currency, which means there is no middle organization or company keep the log of the transactions. According to the google.com, the current rate 1 BTC is 7,77,671.14 (INR) at time of (September,3,2019 08:27 PM). In the paper, before starting anything about the bitcoin, we need to know that “What the bitcoins are and how they come in existence?”. Then we will study how digital transactions can be done through bitcoin.

A Review on CFD Analysis of Effects of Convergence and Divergence Angles on the Performance of a Nozzle
Authors:- M.Tech. Scholar Vishwajeet Yadav, Prof. Pawan Kumar Tiwari

Abstract:- The convergent – divergent nozzle is the most common type used in rocketry and it works by converting pressure energy from the fuel flow and heat energy from the combustion of fuel into kinetic energy in the form of high exhaust velocity. In the converging section of a rocket nozzle, the exhaust is travelling at relatively low speed (sub-sonic) and it becomes sonic at throat. The compressible exhaust increases until it reaches the exit and it is supersonic in the divergent section. Size and shape of a rocket nozzle is also very important. the converging section starts at the combustion chamber is usually shaped in a way to make sure that flow is not disrupted in any way i.e., the convergence is not too steep and has no harsh edges. Therefore in this paper a review will be done based on research work conducted by scholars.

Traditional Properties Analysis in High Strength Cement Concrete with Intermediate Replacements of Brickbats Powder, Clay Mineral and Calcite in Concrete
Authors:- M. Tech. Scholar- Koritipati Murali, Asst. Prof.M.Venkata Narasaiah, Asst. Prof. L.Gopi Chand

Abstract:- The processing of plain and reinforced cement concrete and utilizing it is sustainable concrete has become an important requirement in the construction industry. To improve environmental properties, several of supplementary cementing and pozzolonic materials are introduced and they are partial replacement of cement in the concrete. In this work we are using blending of three useful materials in this work namely brick bats grind powder, calcite is nothing but marble powder and important mineral of clay that is meta kaolin as partially replacing with cement. The adopted materials are very cheap in nature easily available in construction market using cementing materials are very prone to environment in these days. This dissertation reports the results of fresh and hardened properties of the concrete with partial replacement of these materials, at contrast percentages at different curing periods, various traditional methods and tests are conducted on concrete in fresh stage and hardened stage. Based on the previous citations we expected to get positive results from these partials replacements.

A Comparative Study of Physical and Mechanical Properties of Glass Fiber /Polyester Composite Materials with Natural Fillers
Authors:- M.Tech. Scholar Aamir Gaur, Prof. Amit Kr. Tanwar, Prof. Pankaj Singh

Abstract:- Now-a-days, the natural fibers and fillers from renewable natural resources offer the potential to act as a reinforcing material for polymer composites alternative to the use of glass, carbon and other man-made fibers. Among various natural fibers and fillers like banana, wheat straw, rice husk, wood powder, sisal, jute, hemp etc. are the most widely used natural fibers and fillers due to its advantages like easy availability, low density, low production cost and satisfactory mechanical properties. For a composite material, its mechanical, physical, wear and water absorption behaviour depends on many factors such as fiber content, orientation, types, length etc. Attempts have been made in this research work to study the effect of different natural fillers loading on the physical, mechanical, wear and water absorption behaviour of glass fiber/natural fillers reinforced polyester based hybrid composites. A hybrid composite is a combination of two or more different types of fibre in which one type of fibre balance the deficiency of another fibre or filler. Composites of various compositions with four different fillers loading (5 wt%, 10wt% and 15wt%) and glass fiber loading is constant (20 wt%) with constant matrix material (polyester resin) are fabricated using simple hand lay-up technique. Different natural fillers which used in present research work are chopped banana, rice husk, wheat straw, and wood powder fillers. It has been observed that there is a significant effect of filler loading on the performance of glass fiber/natural fillers reinforced polyester based hybrid composites. TOPSIS a multi-criteria decision making approach is also used to select the best alternative from a set of alternatives.

Deep Reinforcement Learning and Image Processing for AdaptiveTraffic Signal Control
Authors:- Prof. Jameer Kotwal, Harshal Thakare, Dhanashri Wani, Dhiraj Sangale, Abhijeet Walunj

Abstract:- In this paper, a traffic control system is build which can easily keep traffic in control using image processing techniques and deep reinforcement learning is presented. In this method, a camera is used in each stage of the traffic light in order to capture the roads where traffic is bound to occur. Number of vehicles in these images is calculated using image processing tools and different timings are allocated according to the count and based on the model trained using deep reinforcement learning along with a green signal for vehicles to pass. In this paper, we implement an intelligent traffic model that controls the amount of time a for which light runs green, based on the density of cars standing.

Power Efficient and Area Efficient Shift Register using Plused Latches
Authors:- M.Tech. Scholar M.Bharathi, Asst. Prof. Ms. K. Monica, Asst. Prof. Mr. Degala. Dhana Sekhar

Abstract:-This paper introduces a less power and powerful area shift register utilising pulsed latches. The range and power loss are decreased by interchanging flip-flops by pulsed latches. This technique determines the timing problem among pulsed latches by the advantage of many non-extension limited pulsed clock signals instead of the usual single pulsed clock signal. The shift register (SR) applies a little number of the pulsed clock signals by classifying the latches to many sub-shifter registers and applying additional volatile storage latches. A 128-bit shift register (SR) applying pulsed latches was invented utilising a 65nm CMOS method with VDD = 1.0V. The advanced shift register reserved area and power related to the standard shift register with flip flops.

Credi-Crypt: An Unpremeditated Anti-Counterfeiting Method For Credit Card Transaction System
Authors:- M.Tech. Scholar Shaik Fouziya, Asst. Prof. Mr. A.M. Shafeeulla, Asst. Prof. Mr. D. Dhana Sekhar

Abstract:-Data encryption is essential for e-commerce. Here we propose a method for covering sensible credit card data in a random backdrop picture externally the sensible data going presented in unrestricted areas. This paper also proposed to merge the Cryptographic and Steganography technique to implement a good protection solution for credit card transactions. The advanced method appropriates a cryptographic cipher and Arithmetic Coding method to protect data inside a covered picture and later transfer it to the target across the web network. This paper also presents an extra cover for improved protection through the use of the Hamming Code. A complete examination is done to differentiate our method among other famous techniques like DCT and DWT.

Delay Less Process To Over Power Transient Noise by Design Optimal Wavelets
Authors:- M.Tech. Scholar Rajasekhar G, Asst. Prof. Mr. K. Balachandra, Asst. Prof. Mr. Degala. Dhana Sekhar

Abstract:- Expulsion of inspiration upheaval from talk in the wavelet region has been seen to be very convincing due to the multi-assurance property of the wavelet change and the straightforwardness of emptying the main impetuses in that space. An essential factor that impacts the execution of the drive departure structure is the suitability of the inspiration detection computation. To this end, we propose another procedure for sketching out symmetrical wavelets that are progressed for recognizing inspiration uproar in talk. In the procedure, the characteristics of the drive uproar and the concealed talk banner are considered and a raised activity optimization issue is figured for deriving the perfect wavelet for a given assistance measure. Execution assessment with other without a doubt comprehended wavelets exhibit that the wavelets illustrated using proposed method have much better inspiration area properties.

Low Switching Power and Ultra Low Rbl Leakage I0t Sram using Half-Vdd Pre-Charge
Authors:- M.Tech. Scholar Siddavatam Sailaja, Asst. Prof. Mr. M.P. Chennaiah

Abstract:- We offer, in this paper, a novel 10T static RAM block should be a single-ended decoupled read bit line with a 4Transistors read port for reduced power maintenance and leakage reduction. The Read Bit Line is pre-charged at half the block supply voltage and is allowed to load and discharge according to the cached information bit. An inverter, operated by the corresponding data node, i.e QB and combines the RBL to the practical power rails to a transmission way when the read method. Read Bit Line extends to the VDD stage for a read -1 and discharges to the earth level for a read-0. Practical power rails should the equivalent value of the Read Bit Line pre-charging level when the write and the hold mode and are combined to pure supply levels simply while the read method. Dynamic control of virtual rails extensively decreases the Read Bit Line leakage. The advanced 10T block in a commercial 75 nm technology is 2.47× the extent of 6T with β = 2, provides 2.3 x read inactive noise margin and reduces the read power distribution by 60% than that of 6T. The amount of Read Bit Line leakage is reduced by more than three orders of magnitude and ON / OFF is hugely improved compared with the 6Transistors Bit Line leakage. The overall leakage features of 6Transistors and 10Transistors are similar, and aggressive performance is completed.

A Vigorous Image Watermarking using 2 level Dct and Wavelet Packets Denoising
Authors:- M.Tech. Scholar Shaik Shahinthaj, Asst. Prof. Mr. K. Narendra, Asst. Prof. Mr. Degala. Dhana Sekhar

Abstract:- In this paper we present a blind low recurrence watermarking plan on dark level pictures, which depends on DCT change and spread spectrum interchanges strategy. We process the DCT of non covering 8×8 squares of the host picture; at that point utilizing the DC coefficients of each square we develop a low-goals estimate picture. We apply square put together DCT with respect to this estimation picture, at that point a pseudo irregular clamor arrangement is included into its high frequencies. For recognition, we extricate the estimation picture from the watermarked picture, at that point a similar pseudo arbitrary commotion grouping is created, and its connection is processed with high frequencies of the watermarked guess picture. In our technique, higher strength is gotten due to implanting the watermark in low recurrence. What’s more, higher intangibility is picked up by dispersing the watermark’s bit in various squares. We assessed the power of the proposed system against numerous basic assaults, for example, JPEG compression, added substance Gaussian commotion and middle channel. Contrasted and related works, our strategy end up being profoundly safe in instances of compression and added substance commotion, while protecting high PSNR for the watermarked pictures.

Contrivance Management using Arduino and Motion Detector
Authors:- G.Vikram Assistant Professor, Assistant Prof. M.Narendra Prasad

Abstract:- Gadget Control Framework utilizing Arduino and PIR (Inactive Infrared) Sensor can be utilized to turn ON and OFF the lighting framework of domestic naturally or any other framework by identifying the nearness of human. This framework can be utilized in carports, classrooms, staircases, lavatories, etc. where there’s no require of nonstop light but only when there’s a human. Moreover, there’s no have to be stress approximately power bills as the lights get OFF when there’s no human and thus one got to pay the bills as per utilize. This paper proposed as almost programmed contraption control framework which consequently controls the room lights utilizing Arduino and PIR sensor. The most components utilized in this framework are Arduino Uno, PIR sensor and Hand-off Module. Out of these components, the operation of framework primarily depends on PIR sensor which makes a difference in recognizing human nearness.

Optimisation of Machining Parameters in Electrochemical Machining (Ecm) of Aluminium 6082 T87
Authors:- Kailashbalan P, Prof. Sivasubramanian R, Ajith Kumar K, Guru Prasath M, Ranjith S

Abstract:- The main objective is to find the optimal machining condition at which the electrochemical machining of Aluminium 6082 T87 will be done in an highly economical, efficient and in an effective way. The effect of process parameters such as electrolytic concentration and voltage on performance characteristics such as material removal rate (MRR) and surface roughness (SR) during Electro Chemical Machining of Al 6082 T87 was investigated. The microstructure of machined surfaces which reflects the performance of electrochemical machining at various machining parameters was also studied. ANOVA was used to investigate the influence of process parameters on performance characteristics during machining. It was observed that MRR increased with increase in voltage whereas SR decreased.

A Robust Model for Unreliable Cloud by Evaluating Trust Values
Authors:- M. Tech. Scholar Sonanchal Singh, Prof. Sumit Sharma

Abstract:-Trust plays a crucial role in cloud environment to offer reliable services to the cloud customers. It is the main reason for the popularity of services among the cloud consumers. To achieve this, trust should be established between cloud service provider and cloud consumer. Trust management is widely used in online services, E-commerce and social networks. This paper focus on a model that can identify real nodes by its behavior in cloud. Here fuzzy max interval values were evaluate from the transactional behavior of the node in fix interval. By increase in transaction count real node trust value get increase and macilous nodes trust value get decreases. Experiment was done on ideal and attacked environment. Evaluation parameters values shows that proposed model of fuzzy interval trust is better as compared to other existing model of unreliable clouds, for identification of malicious nodes.

A Survey on Various Techniques and Features of Digital Image Data Watermarking
Authors:- Phd Scholar Shweta Singh, Dr. Laxmi Singh

Abstract:-As the computerized world is developing with different sort of information like content record, picture, video. Out of those picture assumes a significant job in various field, for example, remote detecting, internet based life, and so on. So keep up the picture quality is finished by Digital image processing on different issues. This paper gives a concise study of image proprietorship maintenance by information concealing procedures for different type of images. Picture investigation features are portray in this paper with their fundamentals. As watermark information is invisible yet it has to maintain some properties of watermarking which are likewise explain in this paper as they are the best measure for comparing various procedures of watermarking work. Detail discussion of various researcher works was also brief in this paper.

Mental Health
Authors:- Arpan Godiyal, Ashish Choudhary, Puneet Garg, Rishabh Rawat, Mr. Dhyanendra Jain

Abstract:-Background: Mental disorder is one of the most important diseases of which is predicted to increase from 10.5% to 15% until 2020. This study aims to determine various factors influencing the mental health of employees of an organisation.
Methods: We have studied a dataset from 2014 survey which measures attitudes towards mental health and frequency of mental health disorders in the tech workplace.We have applied regression models to analyse that data and draw conclusions.
Results: How mental health of an employee depends on factors like age, gender, family history, leaves etc. Conclusion: In order to improve people’s mental health, it is recommended that healthcare officials may more attention to this matter through implementation of programs such as life skills’ training, stress resistance skills training, and helping individuals to be able to adapt themselves to their life environment.

Bioelectricity generation from agro-industrial waste water using dual-chambered microbial fuel cell
Authors:- Mostafa Abdelshafy Ramadan, Mohamed Hemida Abd-Alla, Usama M. Abdul-Raouf

Abstract:- Bioelectricity production from wastewater beside treatment is the main goal offered by microbial fuel cells (MFCs) technology. This study was demonstrated to evaluating the electricity generated by the double-chamber air-cathodic MFC while reducing pollutants from sugar industry wastewater (SIW). A simple double-chamber MFC was configured with Nafion 117 membrane, and operated without adding any chemical mediators. SIW used as an electron donor and was fed in batch-mode into the MFC for three consecutive operational cycles. While the maximum MFC output voltage in open circuit (OCV) mode was 890 mV after 24 operational days, the closed circuit voltage (CCV) was 340 mV when 550 ohm as external load was applied. From the polarization curve, the maximum power density of 160.16 mW/m2 as power output was observed at a current density of 320.9 mA/m2. The efficiency of the MFC was measured based on columbic efficiency (CE) and chemical oxygen demand (COD) removal rate. While the CE was 46%, the COD removal efficiency reached 85.4%. The anodic biofilm was observed through scanning electron microscopy (SEM). The current study results indicated that SIW microbial communities in the anodic biofilm have the ability to produce bioelectricity using MFC in parallel with the SIW substrate treatment.

Cancer Risk Prediction Models using Svm and Decision Tree
Authors:- M. Tech. Scholar Priya Bharti, Prof. & H.O.D. Ashish Tiwari

Abstract:-Cervical blight and the anticipation of analytic aftereffect are a part of the lot of important arising applications of gene announcement microarray technology with affection sequencing of microRNA. By application reliable and dependable allocation of apparatus acquirements algorithms accessible for microarray gene announcement profiling Data is the key in adjustment to advance the lot of acceptable and accessible predictive archetypal to be acclimated by patient. In this paper, two-machine acquirements algorithms accept been acclimated which are Support Vector Machine (SVM) and Decision Tree for the predictive models of cervical cancer. We analyze and appraise the achievement of these two algorithms in adjustment to apperceive which algorithm has bigger performance. In this study, 714 appearance and 58 samples are acclimated to advance predictive archetypal for cervical blight and our computational after-effects appearance that Decision Tree algorithm beat SVM algorithm with the accurateness of 99.42%. Our Data aswell accentuate the accent of variables, which accord the cogent role in admiration the accident of cervical cancer.

Healthcare Prediction using Hybrid Algorithm
Authors:- ME Scholar Vaishnvee Upadhyay, Assistant Prof. Mahesh Lokhande

Abstract:-In medicinal sciences forecast of Heart sickness is most troublesome undertaking. In India, fundamental driver of Death are because of Heart Diseases. The passings because of coronary illness in numerous nations happen because of work over-burden, mental pressure and numerous different issues. It is found as fundamental reason in grown-ups is because of coronary illness. Along these lines, for distinguishing coronary illness of a patient, there emerges a need to build up a choice emotionally supportive network. Information mining order systems, to be specific Modified K-means and SVM are broke down on Heart Disease is proposed in this Paper.

Implementation of Java Frameworks for Web Applications
Authors:- Saksham Gupta

Abstract:- In this paper represents the web design frameworks as a conceptual methodology to expend the probabilities reuse in Web applications. Firstly I have presented the importance for construction abstract and reusable directional design structures, demonstrating with different kinds of Web information Systems. Hibernate Framework Technology as unique and well-organized resources to take immeasurable databases and also on how to implement persistent features in object-oriented system finished it. It provides a denotation of design patterns and frameworks and discovers the confederation between design patterns and Frame works. Java accepts N-tier framework of MVC Model in platform and uses EJB, Struts WEB Framework and Hibernate technology.

Nfc Based Dual Authentication Access Control System With Biometric
Authors:- M.Tech. Scholar Naresh Kumar Masurkar, Asst. Prof. Priyanshu Pandey

Abstract:-This paper introduces readers to the world of information technology and data security as a part of it. It talks about access control, its components, and levels and types of access control. The paper recognizes the importance of identifying and authenticating any given user in the business areas. Therefore, it gives full attention to biometrics as one of the access control technology and discusses variety and performance of other known techniques; points out the advantages and disadvantages of using them. The paper also presents some real life examples of companies, implementing biometric solutions in their businesses. In this article show how Near Field Communication with biometric authentication with the more security of Server authentication. , it can be connected to the internet using the Ethernet port or by Wi-Fi connectivity. It results in convenience, energy efficiency, and safety benefits leading to improved quality of life. Its futurity, energy efficiency, control over the appliances from any location makes it very handy to use. So, concerning size, power, and price of the Raspberry Pi is qualified for a house-controller.

Magnetic Levitation and its Application on Magnetic Suspension System
Authors:- Kailashbalan P, Asst. Prof. Manivannan C, Ajith Kumar K, Guru Prasath M, Mohammed Muthahar R

Abstract:- The main objective is to study the concept of magnetic levitation and to develop a prototype model of magnetic suspension system using ceramic magnets and to calculate its total energy consumption, total energy reserved as resistive force. The efficiency of magnetic suspension system and hydraulic suspension system were calculated using a standard formula. Comparison was made between the magnetic suspension system and the hydraulic suspension system in terms of their efficiency and energy. The results were proved to be almost similar.

Review Of Cancer Risk Prediction Models
Authors:- M. Tech. Scholar Priya Bharti, Prof. & H.O.D. Ashish Tiwari

Abstract:- We review development, validation, and adaptation of Risk anticipation models to analytic and citizenry practices. We focus on issues in anniversary of these accomplish and the gaps in the acreage beyond the continuum of Risk anticipation archetypal development (many models published); validation (few validated); and accomplishing (even beneath implemented in analytic settings, abundant accomplishing on web sites). Design of models for end users and analytical issues in implementing and evaluating models are addressed with examples from contiguous experience.

Survey Paper on E-Voting System using Blockchain
Authors:- Ayushi Pusadkar, Dhanshri Sawant, Sharvari Prasade, Jay Meshram, Prof. A.S. Kalaskar

Abstract:- To develop an E-voting system in order to achieve privacy, security, transparency by replacing the traditional e-voting system has the potential to minimize the fraud voting. The system will increase convenience for voters. It will make very easy for people with disabilities or who have trouble moving around to vote. It is very quick and private way to vote. This will increase the number of voters since the process does not take up too much of their time of the day. It will help to increase the trust of the people in the government since it is more transparent than the current system. To explore the design of currently available voting protocols, the entities involved in the election, the features they contain, and how secure they are. To examine and understand how block chain technology works as a distributed append- only ledger and show how this aspect of the block chain makes it suitable for electronic voting. To determine the best front-end languages to build this project. To run a comparison of different available technologies that are suited for back-end security work, a database, and a block chain ledger.

A Review: Rumors Detection on Twitter Using Machine Learning Techniques
Authors:- ME Scholar Akanshu Patidar, Assistant Prof. Kapil Shah

Abstract:- In this period, web based life stage are progressively utilized by individuals to pursue newsworthy occasions since it is quick, simple to get to and modest similarly. In spite of the expanding utilization of web based life for data and news assembling, its tendency prompts the development and spread of gossipy tidbits i.e., data that are unconfirmed at the season of posting, which may makes genuine harm government, markets and society. Along these lines, there is need of compelling framework for distinguishing bits of gossip as ahead of schedule as conceivable before they generally spread. Viable framework should comprise of four parts: Rumor location, gossip following, position grouping, and veracity arrangement. Loads of work has been done in later segment while less work in segment talk identification. In this way, presently we should take a shot at gossip location. In this paper, we will condense endeavors done till now around there. A large portion of existing techniques identifies from the earlier bits of gossip, i.e., predefined gossipy tidbits. So it is required to have robotized gossip discovery strategy which recognizes new developing gossipy tidbits viably and as ahead of schedule as could reasonably be expected.

A Review on Impact of Roadway Conditions, Traffic and Manmade Features of Road Safety
Authors:- M.Tech. Scholar Ritu Shingloo, Prof. Shashikant Dhobale

Abstract:- The problem of accident is a very acute in highway transportation due to complex flow pattern of vehicular traffic, presence of mixed traffic along with pedestrians. Traffic accident leads to loss of life and property. Thus the traffic engineers have to undertake a big responsibility of providing safe traffic movements to the road users and ensure their safety. Road accidents cannot be totally prevented but by suitable traffic engineering and management the accident rate can be reduced to a certain extent. For this reason systematic study of traffic accidents are required to be carried out. Proper investigation of the cause of accident will help to propose preventive measures in terms of design and control.

A Review on Effect of Highway Geometric Elemnets on Accident Modeling
Authors:- M.Tech. Scholar Neha Gangwa, Prof. Vinay Deulkar

Abstract:- Road safety is an issue of prime importance in all motorized countries. The road accident results a serious social and economic problems. Studies focused on geometric design and safety aim to improve highway design and to eliminate hazardous locations. The effects of design elements such as horizontal and vertical curves, lane width, shoulder width, super elevation, median width, curve radius, sight distance, etc. on safety have been studied. The relationship between geometric design elements and accident rates is complex and not fully understood. Relatively little information is available on relationships between geometric design elements and accident rates. Although it has been clearly shown that very restrictive geometric elements such as very short sight distances or sharp horizontal curve result a considerably higher accident rates and that certain combinations of elements cause an unusually severe accident problem. In this paper, road geometric design elements and characteristics are taken into consideration, and explanations are given on how to which extent they affect highway safety.

A Review: Text to Speech Conversion
Authors:- Udisha Gupta, Uzma Badar, Mansi Varshney, Shivam, Guided By Ms. Jyoti Verma

Abstract:- Text-To-Speech (TTS) is a computer based system that can be able to read any text aloud. There are many systems which convert text to speech. The main aim of this paper is to study TTS which helped us in making our project. This project consist the solution for the problem that differently able person, old age people and illiterate people face while using social media. Our application is user friendly voice based chat application in which it can verbally respond on the basis of predefined commands in “Text” format and also take voice inputs then convert them into text. This paper consist design, implementation of our application. This application consist two modules voice to text and text to voice.

Analysis and Evaluation of Gravel Pack in Horizontal Wells
Authors:- Bestman Tamunodiyepiriye, Dr. Wopara Fidelis

Abstract:- In this research, gravel packing in horizontal wells are being analyzed to get the total pack efficiency of the gravel pack job. A model is developed for the gravel pack process using the basic laws of physics during the placement of the gravel in the horizontal well bore presuming some conditions are followed. The model developed is simulated using a Horizontal Gravel Pack SIMulator (HGPSIM), the results are now analyzed to determine the effectiveness and pack efficiency of the gravel pack job. The results gotten from the simulation process done in this research indicates that the settling effects of the slurry has to be considered when determining the pack efficiency of the gravel pack process. Some parameters where isolated, varied and analyzed to get the best gravel pack in terms of various injection rates to get their pack efficiencies. It was observed that low viscosity carrier fluid, low gravel concentration at low injection rates would give the most effective and efficient gravel pack process in horizontal wells. These results coincide with the general practices of gravel pack in horizontal wells.

Recommendation System Using Sentiment Analysis
Authors:- Supriya Manglekar, Shrutika Kakde, Pragati Kumar, JSS Krishnakanth

Abstract:- In this quickly developing period of advances, clients or customers assume an exceptionally essential job in basic leadership then it is possible that it will be for business associations, corporate associations or other individual shoppers. Consequently for business development or shopper fulfillment it is important to make strategies or systems that naturally takes a shot at characterization about any items. This technique can be accomplished by building a proposal framework utilizing an ebb and flow look into point in the field of content mining known as slant examination. An effective suggestion framework can be characterized as a framework which encourages client to settle on choice in numerous viewpoints. In actuality, building such a framework will be an extremely troublesome methodology. In this venture, we will attempt to discover the answer for conclusion in various areas, Sentiments of clients with respect to the items gave by sites like Twitter, Amazon, Flipkart, Oyo, Zomato, Olx are considered. Assessments of the clients are as appraisals and surveys. The principle objective of this work is to consolidate suggestion framework and feeling examination to get a progressively precise framework for clients.

A Review Article of Ptc Based Higher Efficient Hybrid Plants
Authors:- M.Tech. Scholar Sandeep Kumar, Associate Professor Suresh Kumar Badholiya

Abstract:- Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy resources is takes place i.e. PTC, wind and thermal energy. This process reviles the sustainable energy resources without damaging the nature. We can give uninterrupted power by using hybrid energy system. Basically this system involves the integration of two energy system that will give continuous power. Solar panels are used for converting solar energy and wind turbines are used for converting wind energy into electricity. This electrical power can utilize for various purpose. Generation of electricity will be takes place at affordable cost. This work deals with the generation of electricity by using two sources combine which leads to generate electricity with affordable cost without damaging the nature balance.

Hybrid Teacher Learning and Particle Swarm Optimization Based Dynamic Load Balancing
Authors:- Vinod Patidar, Dr. Shiv Sakti Shrivastava

Abstract:- A digital platform objective is to split information, estimation, and service evidently over a scalable system of nodes. While Cloud computing a service accumulates the information and dispersed resources in the release atmosphere. Consequently load balancing in this atmosphere is a key problem. This paper has resolve this issue by developing a dynamic algorithm which generate job sequence as per available resources. This paper has proposed a hybrid genetic algorithm where Particle Swarm Optimization PSO and Teacher Learning Optimization TLO algorithms operation were combined to generate low cost job sequences. Experiment was done on real dataset job sequences. Results were compared with existing algorithm on different evaluation parameters and it was obtained that proposed TLPSO algorithm values are better.

Document Class Identification using Fire-Fly Genetic Algorithm and Normalized Text Features
Authors:- Vinod Patidar, Dr. Shiv Sakti Shrivastava

Abstract:- Increase of digital platform resources ultimately raises the text content on different platform, so organization of this unstructured data is highly required. Researcher has proposed number of techniques to filter relevant data inform of feature so enhancing the understanding of work. This paper has work on clustering the document of research filed into respected class. Here paper has proposed an modified firefly genetic algorithm for clustering of document into respected cluster. Fire fly crossover operation was modified in this paper where best chromosome update rest of population. Pattern based features were evaluate from the text content. Normalized content feature were used for the work. Experiment was done on real set of research paper taken fro various research domain. Results were compared on different evaluation parameters with exsisting model and it was obtained that proposed model of FFDC( Fire Fly Document Classification) was better than other.

Robust Intrusion Detection System using SVM and Artificial Neural Network
Authors:- Raj Kumar Panday, Dr. Shiv Shakti Shrivastava

Abstract:- With large increase of internet user’s network security is important issues in today era. As variety of users have different requirement, so proper identification of safe network is required. This work focus on the network intrusion detection using SVM and neural network. Here SVM classify network behavior into two class first is safe and other is unsafe. Once unsafe network is identified then trained neural network identified attack type of the input sessions. So Whole work is divide into two modules, first is separation of safe and unsafe session from the dataset using SVM. Then in second module identification of type of intrusion is done in unsafe network by EBPNN. Experiment is done on real dataset and obtained results are better than previous works on different parameters.

Statement Analysis using NLP
Authors:- M.S.Vinu, P.Mohan, S.Ganesh Moorthy, M.Gobinath

Abstract:- We aim to draw on an important overlooked poten- tial of affective dialogue systems—their application to promote positive emotional states, similar to that of emotional support be- tween humans. This can be achieved by eliciting a more positive emotional valence throughout a dialogue system interaction, i.e., positive emotion elicitation. Existing works on emotion elicitation have not yet paid attention to the emotional benefit for the users. Moreover, a positive emotion elicitation corpus does not yet exist despite the growing number of emotion-rich corpora. Towards this goal, first, we propose a response retrieval approach for positive emotion elicitation by utilizing examples of emotion appraisal from a dialogue corpus. Second, we efficiently construct a corpus using the proposed retrieval method, by replacing responses in a dialogue with those that elicit a more positive emotion. We validate the cor- pus through crowdsourcing to ensure its quality. Finally, we pro- pose a novel neural network architecture for an emotion-sensitive neural chat-based dialogue system, optimized on the constructed corpus to elicit positive emotion. Objective and subjective evalua- tions show that the proposed methods result in dialogue responses that are more natural and elicit a more positive emotional response. Further analyses of the results are discussed in this paper.

Optimization of Parameters To Reduce The Surface Roughness in Face Milling Operation on Stainless Steel and Mild Steel Work Piece Applying Taguchi Method
Authors:- Research Scholar Yogesh Raut, Associate Prof. Dr. Amit Bahekar

Abstract:- This experimental study is based on the optimization of milling parameters to reduce the surface roughness in face milling operation using Stainless Steel (SS) and Mild Steel (MS) Work Piece. This experimental study will conduct under the three varying parameters depth of cut, spindle speed and feed rate. The settings of milling parameters will determine by using the Taguchi experimental design of L9 Orthogonal array method. All the nine experiments have conducted using a Stainless Steel and Mild Steel work piece and the roughness was checked using the surface roughness tester. Minitab 19 software has used to find out the combination of the optimum milling parameters by using the analysis of Signal-to-Noise (S/N) ratio. This experimental study will help in decreasing the surface roughness using the optimal combination of the milling parameters.

Traffic Management Through Roundabout at Major Intersections in Khargone City
Authors:- PG Student Mohd Rehman Sheikh, Asst. Prof. Vinay Deulkar

Abstract:-The traffic clogs are the serious issue in any creating city. Khargone city being a creating city having traffic issue in a few crossing points that is the reason, Traffic Rotary at street convergences is unique type of level difference in paths to channelize development of vehicles a single way around a focal traffic island. With quick development of traffic it is encountered that enlarging of streets and giving flyovers have gotten basic to conquer significant clashes at crossing points, for example, impact among through and right turn developments. Along these lines, significant clashes are changed over into milder clashes like combining and wandering. The vehicles entering the turning are delicately compelled to move a clockwise way. They at that point weave out of the revolving to the ideal course.

Smart Ambulance with Traffic Control
Authors:- Mr.Prashanth H S , Sandhya D, Shalini V, Sheela, Vydehi Bhat

Abstract:- Road traffic jam becomes a serious issue for extremely huddled metropolitan cities. Ambulance service is one in all the main services that gets delayed by traffic jams. An ambulance or any emergency vehicle stuck in traffic is unable to cross the signal due to poor traffic signal controller. This project aims at providing a solution by alerting the traffic controller before the ambulance reaches the traffic pole using the concept of Internet of Things (IoT).

Vibration Signal Denoising And Fault Diagnosis Of Rotating Machine: A Review
Authors:- M.Tech. Scholar Virendra Singh Rajput, Assistant Prof. Seema Shukla

Abstract:- Vibration signal plays very important role in fault diagnosis of machine because it carries dynamic information of the machine. Signal processing is essentially needed to process and analyse signal but it is difficult to process and analyse the noisy signal. In many cases the noise signal is even stronger than the actual vibration signal, so it is important to have some mechanism in which noise elimination can be effectively done without affecting the actual vibration signal. This paper presents two robust techniques for denoising of vibration signals corrupted by Additive White Gaussian Noise. The proposed method uses the Stationary Wavelet Transform (SWT) and the Dual Tree Complex Wavelet Transform (DTCWT). The proposed methods are very efficient due to their shift invariance property and have reduced aliasing effect than other methods such as Discrete Wavelet Transform (DWT), Continuous Wavelet Transform (CWT), Short Time Fourier Transform(STFT) etc.

A Review on Designing of Photovoltaic System Based on The Enhanced P&O Algorithm
Authors:- M.Tech. Scholar Shrangarika Dehariya, Associate Professor Dr. Dolly Thankachan

Abstract:- In this paper a structure of the photovoltaic system with MPP algorithm and function is generated which is the combination of structures of discovering solar module and DC-DC buck-boost converter along with algorithms of observation and perturbation P&O. The system stimulates inside the different conditions of climate and MPPT algorithms. By comparing the results of the simulation it is found that the tracking of the power accurately in the photovoltaic simulation system is done by using the MPPT algorithm. MPPT and P&O algorithm gives fast and quick output and it regulates PV output voltage. The major part in this process is played by the renewable energy which is solar energy.

World-Wide Manufacturing Overview: A Discussion On The Future
Authors:- Graduate Student and Review Fellow Nuzhat Fatima

Abstract:- This paper is describing about the manufacturing situation in the world. Today’s era is of industry, machine and continuously developing technology. The present world has been developed unexpectedly than the past. Now a days, without manufacturing technology, survival is in-imaginable. The author wants to highlight an overview of present condition and a corresponding analysis of the future.

Literature Survey on Current Public Bus Transportation
Authors:- Snehal Jose, Daniel Anto, Robin K M, Associate Prof. & Dr. R. Satheesh Kumar

Abstract:- Now days lots of passengers struggling to find correct bus which they supposed to enter.The fare collection system which currently in bus transportation is not efficient and corrupted. The conductors collect different amount of money from different persons also they will not give balance also.In this paper we are mainly focusing about different technologies that are available for smart use of bus transportation. Now all around the globe there are many new technologies that make bus transportation smart. The main technologies like BRTS, Rav Kav card etc.The system will help passengers to track each bus.that is the main advantage of our system. Also it helps to anti-corruption and efficient use of bus transportation system.

A Survey on Big Data Analytics: Challenges Of Big Data Integration, Open Research Issues And Tools
Authors:- GeyaSudha Singanamalla, Sree Devi E

Abstract:- Data has evolved in the last 5 years like never before. Lots of data is being generated each day in every sector such as social media, E-Commerce, Tech giants Organizations have slowly started realizing that they would be interested in working on all the data. Organizations are interested in doing precise analysis and they want to work on different formats of data such as structured, unstructured and semi structured data. Organization are trying to gain the inside data or to find the hidden treasure in so called Big Data. Now, any Organization would want to have a solution which allows them to store huge amount of data, capture it, process it, analyze it and also look into the data to give more value to the data. So, Big Data analysis is a current area of research and development. The basic objective of this survey paper is to give an idea on the potential impact of big data challenges, open research issues and various tools associated with big data. As a result, this article provides a platform to explore and provides the organizations and the researchers to develop the solution to big data based on the challenges and open research issues.

Secure Data Sharing in Mobile Cloud Computing
Authors:- Arshad Azmi, Associate Aarti Gautam Dinkar

Abstract:- Mobile cloud computing (MCC) is one of the technologies essential in today’s mobile environment run by using mobile devices in cloud environment. MCC has been imagined as the cutting-edge technology of IT enterprise. It combines both the features of mobile computing and cloud computing. It moves the application programming and databases to the unified datacenters, where the administration of the information and administrations may not be completely reliable. With the advancements in the field of MCC, security is a major issue. Some of the common security issues regarding data are like- risk of data theft, violation of privacy rights and loss of physical security, handling of encryption and decryption keys, data storage security. In this paper we provide a solution for data storage security and handling of encryption and decryption keys issues. In this paper we proposed a method which is implemented by combining the concepts of Diffie- Hellman Key Exchange (DHKE) algorithm and Blowfish algorithm. In this proposed scheme, at first a computer user will encrypt a file using a secret key generated by blowfish algorithm. Then using DHKE protocol a shared private key will be generated for two users who are trying to communicate. Presently if the subsequent user needs to decrypt the document encoded by the primary user, he/she needs to use the mutual key for authorization. When the permission is granted, the document can be decrypted by using blowfish algorithm. These proposed mechanisms can securely share and store data in cloud environment.

Cancer Detection Using Minimum spanning tree with Hyperspectral Images
Authors:- Asst. Prof. M.Gowtham Raj, Prof. P. Geetha

Abstract:- Cancer remains a major cause of mortality around the world. Survival and life quality of the patients connect straightforwardly to the measure of the essential tumor early discovery of dangerous tissue might move forward both the frequency and the survival. Rather than conventional biopsy, it’ll be perfect to put forward the cancer location utilizing intrusive procedures, it can make the treatment more viable and basic Here a self-sufficient classification strategy has been presented that combines both spectral and spatial data on hyperspectral images of a tissue in recognizing cancerous by means of an automatic calculation based on Minimum Spanning Forest (MSF) and Optimal band has been proposed to classify cancerous tissue on hyperspectral images. A support vector machine classifier is prepared to form a pixel-wise classification likelihood outline of cancerous and solid tissue. This outline is at that point used to distinguish markers that are used to compute common data for a run of groups within the hyperspectral image and in this way select the optimal groups. An MSF is at last developed to section the image utilizing spatial and spectral data. The SVM classifier is used to recognize between the typical or irregular tissue based on the MSF Marked region.

Disinfectant Efficacy Testing of Imago & Getter Disinfectant on non-porous surfaces using Surface Challenge Test
Authors:- Sachin D. Joshi, Dr. Imran Memon, Dr. Tahur Shaikh, Idris Khan, Surjeet Samanta, Komal Kumari, Romil Dagha

Abstract:- Disinfectants are used to maintain the bioburden of any facility under limits and making them free from any external or internal pathogenic intervention.The cleanroom area of any pharmaceutical facility comprises of different surface, these surfaces are easier to disinfect and so the cleaning and disinfection programs complement each other. The Disinfection efficacy and validation studies are carried in consistent with the United State Pharmacopeia <1072> Disinfectants and Antiseptics protocol. This study was aimed to generate data to provide a high degree of assurance that the disinfection program will consistently yield results that meet pre-determined specification by using different types of Imagard brand disinfectant. The recommended concentration of all the disinfectant at precise time i.e., 10 minutes showed excellent log reduction against the standard test organisms. The results proved that Disinfectant Imagard HD, Imagard IG PRO 401, Imagard IL 15, Imagard AS 10, Imagard SF 25 and Imagard Plus are effective against the standard test organisms. These data add a layer of product safety and generate confidence in the customer’s ability to deal with an unexpected contamination event.

Printing Solution: Online Printing with The Help of Android Mobile Application
Authors:- Mohammad Arsalan Adil, Vaibhav Daf, Rohit Kelzarkar, Karan Potdukhe, Ashish Pardhi

Abstract:- This paper presents the “printing solution” android mobile application for printing, which helps customers to print their printing stuff online without going to a different printing press. Now a day’s printing has become the part of everyone’s life, whether it is businessman, commercial dealer, wholesale dealer, shopkeeper, teacher, student, etc all are connected to printing. Today customers are visiting printing press to print their printing stuff, but with the help of printing solution mobile application customer are no longer need to go to the printing press, by sitting at their home they can print number of things at any time. The “printing solution” mobile application consists of printing options such as visiting cards, wedding cards, bill books, letterheads, banners, pamphlets, etc. All these options are available to a customer for printing. The android studio software is used to make this application, xml language is used for designing the front end and java language is used for backend connectivity and firebase is used as a database.

Improved RSA Algorithm Based on Cloud Database using Proth Number and Mersenne Prime Number
Authors:- Aditya Kumar

Abstract:- The purpose of this study is to improve the strength of RSA Algorithm and at the same time improving the speed of encryption and decryption. RSA algorithm or Rivest-Shamir- Adleman algorithm is named after Ron Rivest, Adi Shamir and Len Adleman, who invented it in 1977-78. The RSA crypto-system is the most widely-used public key cryptography algorithm in the world. Its security is based on the difficulty of factoring large integers. This paper presents an improved RSA algorithm which is superior to the original RSA algorithm in terms of strength of encryption and speed of encryption and decryption. This includes the strengthened form of RSA algorithm along with the architecture of the proposed algorithm. A cloud based database is used store the keys in advance. The modified RSA algorithm is compared on various aspects with the original RSA algorithm and the proposed algorithm certainly improve the strength and speed of computation. The experimental result shows that the encryption time remains more or less similar to the original RSA even though the complexity of calculation is increased. The decryption time is reduced considerably as compared to the original algorithm.

Survey on A New Controller for Bi-Directional Wireless Power Transfer Systems
Authors:- M.Tech. Scholar Manish Kumar, Assistant Professor Poonam Khatarkar

Abstract:- Wireless power transfer (WPT), which transmits power by an electromagnetic field across an intervening space, provides the prospect of new opportunities for electric vehicles (EVs) to enhance sustainable mobility. This review article evaluates WPT technology for EV applications from both technical and sustainability perspectives. The distinct research on, efficient WPT design for low power applications encompasses on designing proper coupling circuit by considering application constraint and addressing different issues in the resonant coupled circuit. This section analyzes the technical literature related to WPT links, capacitive power transfer, power transfer to multiple receivers, interference-free simultaneous power transfer, spatial misalignment mitigation technique and navigational force generation using magnetic circuits.

Result Analysis on New Controller for Bi-Directional Wireless Power Transfer Systems
Authors:- M.Tech. Scholar Manish Kumar, Assistant Professor Poonam Khatarkar

Abstract:- Challenges and opportunities remain in the design and deployment of WPT EV systems. Dynamic wireless charging offers opportunities for sustaining the battery charge while driving so that the large battery pack that represents a bottleneck for deploying EVs can be eliminated and range anxiety will be reduced. The environmental, economic and societal impacts of large scale infrastructure deployment and performance in terms of energy efficiency, durability, and reliability must be carefully evaluated for prospective real-world deployment of dynamic WPT EVs. Stationary WPT for residential and commercial charging is expected to have earlier wide spread adoption than dynamic charging given its technical maturity and economic feasibility, while dynamic WPT could be implemented gradually if the market develops enough to significantly lower the high initial infrastructure cost.

An Excess Food Redistribution Framework Using Smart Container
Authors:- Mrs.Sougandhika Narayan, Shreelekha R N, Shrividya N, Varshitha K, Rashmi Hegade

Abstract:- A trusted and active community aided and supported by the Internet of Things (IoT) is a key factor in food waste reduction and management. This paper proposes an IoT based context aware framework which can capture real-time dynamic requirements of both vendors and consumers and perform real-time match-making based on captured data. We describe our proposed reference framework and the notion of smart food sharing containers as enabling technology in our framework. A prototype system demonstrates the feasibility of a proposed approach using a smart container with embedded sensors..

A Literature Review on Study of Silica Fume as Partial Replacement of Cement in Concrete
Authors:- Kausthibh A. Pashankar, Lecturer A. S. Patil, Asst. Prof. P. M. Thorat

Abstract:- India is a developing country. Many construction projects are going on and many projects are proposed in near future. If we evaluate some of the projects in past, we find that they cannot sustained due to lack of enough considerations towards the sustainability of these projects during the planning stage. This is about the sustainability of individual projects. In broad context the construction sector consumes lot of natural resources in the form of material and fuel. This has adverse effect on the environment and ecology. The emission of CO2 in production processes contributes to global warming. Use of alternative materials, production processes, reuse and recycling of waste materials will help in preserving the natural resources. In recent study, there has been a considerableattempts for improving the properties of a concrete with respect to a strength and durability, especially in aggressive environments. High performance concrete is appears to be a better choice for the strong and durable structure. A large amount of the by-product or a wastes such as fly-ash, copper slag& silica fume etc. are generated by industries, which causes environmental as well as health problems due to dumping and disposal.Proper introduction of the silica fume in the concrete improves both the mechanical and durability characteristics of the concrete.

Review of Under Water Communication
Authors:- ME Scholar Rajju Jambekar, Assistant Professor Nilesh Parmar

Abstract:- This paper explains briefly our research directions in the field underwater sensor networks. We explain potential applications to off-shore oil fields for equipment monitoring, seismic monitoring and underwater robotics. We describe research directions in MAC, short-range acoustic communications, localization protocols and time synchronization for high latency acoustic networks, application level time scheduling and long-duration network sleeping.

Analysis of a method of Video Preprocessing with the help of Optical Character Recognition And Natural Language Processing
Authors:- B.Tech. Scholar Samarth Bajaj, Assistant Professor Viplove Divyasheesh

Abstract:- This research paper mainly focuses on the algorithm of searching for videos on YouTube, Daily Motion, Crackle, etc. At present whenever we want to search a video on any platform we search it by the name of the video and the contents that are given by the video maker, we are not able to search a video on the basis of the theoretical contents in that video. Though we can easily search a video if it is not based on theoretical content but if the video is purely theoretical and we are searching it for the first time then at present we cannot search that video by the content shown in that video. So, in this paper, we will understand how it is possible to search a video on the basis of the theoretical content in that video.

Sheet Metal Forming Processes Recent Technological Advances
Authors:- Saket Kumar Singh

Abstract:- The sheet metal industry has seen more technological advances than any other since the last century. Right from hand-forming processes to finite element based simulation, the transformation is very significant. They have prominent industrial applications especially in automotive industries. This may be attributed to the ease with which the final component with desired shape and appearance can be produced using simple tools. Due to wide range of applications, the process of forming the sheet metal into various shapes leads to classification of the forming processes based on specific operation. This classification involves bending, blanking, stretch forming and deep drawing. Each process has some parameters that define the quality of the work achieved. This paper aims at scattering light on the recent research and developments in the sheet metal forming processes over the last two decades. Most of the literature available on sheet metal forming focuses on the parameters that influence the quality and economic factor of the final product. The influence of process parameters based on geometry such as punch nose radius, blank temperature, and blank holding force, tooling dimensions, blank thickness and punch depth is significant. Similarly, the parameters based on the material properties like elastic strength, yield strength, plasticity and anisotropy have as much influence as the geometry based parameters. The literature raises the issue of defects in the formed parts. Defects such as wrinkling, tearing, springback, local necking and buckling in regions of compressive stresses have been analysed using both experimental and simulation techniques. Springback, the most predominant defect, has been researched thoroughly while considering sheet thickness, punch force, nose radius, binder force, die opening, punch velocity, punch height, sheet anisotropy, clearance, elastic limit and yield strength of the blank material as input parameters. Lastly, this paper also aims at reviewing the finite element based tool design, experimental and numerical investigations into sheet metal for ming processes.

Internet of Things: Survey on Future and Challenges
Authors:- Research Scholar Ahmed Mohamed Maher, Mca, Ph.D, Asst. Prof. S.Suganya

Abstract:- The computer science growth vary fast , and thanks to growing technology continuously One such concept is IoT (Internet of things) with which automation is no longer a virtual reality, IoT connects various non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the evaluation study of IoT,such as the technical challenges (connectivity , compatibility and longevity , standards , intelligent analysis and actions , security),the IoT architecture mainly requires two types of technologies: data acquisition technologies and networking technologies. Many technologies are currently present that aim to serve as components to the IoT paradigm. This paper aims to categorize the various technologies and challenges present that are commonly used by Internet of Things.

Contrivance Management using Arduino and Motion Detector
Authors:- Assistant Professor G.Vikram, Assistant Professor M. Narendra Prasad

Abstract:- Gadget Control Framework utilizing Arduino and PIR (Inactive Infrared) Sensor can be utilized to turn ON and OFF the lighting framework of domestic naturally or any other framework by identifying the nearness of human. This framework can be utilized in carports, classrooms, staircases, lavatories, etc. where there’s no require of nonstop light but only when there’s a human. Moreover, there’s no have to be stress approximately power bills as the lights get OFF when there’s no human and thus one got to pay the bills as per utilize. This paper proposed as almost programmed contraption control framework which consequently controls the room lights utilizing Arduino and PIR sensor. The most components utilized in this framework are Arduino Uno, PIR sensor and Hand-off Module. Out of these components, the operation of framework primarily depends on PIR sensor which makes a difference in recognizing human nearness.

Ultrasonic Technique for Physco-Mechanical Evaluation of Tungsten Alloys by Taguchi Technique
Authors:- A A Rabee, A M Abdelhay, M A Bahlol, Arafa S Sobh, A H Elsayed

Abstract:- Nine versions of the basic Tungsten heavy alloy “90W–7Ni–3Co “were investigated for optimal characteristics. These versions of the WHAs were manufacturing via powder metallurgy (P/M) technique. Involved PM preparation parameters together with the additions of specific percent of the Nano-particles of graphene were nondestructively evaluated. Study showed the effectiveness of using Taguchi Technique in representing and analyzing experimental results. Each alloy version has its own specific chracteristics, where influential primary affective parameter was ranked.

Web Application Vulnerability Exploitation using Penetration Testing scripts
Authors:- Shubham Rawat , Tushar Bhatia, Eklavaya Chopra, Asst. Prof. Akanksha Dhamija

Abstract:- Now a days many Webapps are being developed which on the one hand are beneficial but on the same part contains a lot of vulnerabilities. Most of the work which remains untouched is web security. Online shopping and web services are increasing at rapid rate. Cross Site Request forgery(CSRF) and Cross side scripting(XSS) are some of the top vulnerabilities. Going through this paper, we will cover a lot of vulnerabilities that are present in webapps and will be presenting some real world threats to the web apps. The vulnerabilities will be found out by the help of penetration testing. Various threat models for the vulnerabilities are also mentioned to give a good understanding about them.

Sentimental Analysis on Amazon Fine Food Reviews
Authors:- Kartikay Thakkar, Sidharth Sharma, Ujjwal Chhabra, Asst. Prof. Ms Charu Gupta

Abstract:- In the era of social media and internet, sentimental analysis is extremely useful in social media monitoring as it allows us to gain an overview of the wider public opinion behind certain topics. Our research is focused on to make prediction model where we will be able to predict whether a recommendation is positive or negative. in this analysis , we will focus on score as well as positive/negative sentiment of the recommendation. The analysis proves that logistic algorithm provides the best sentimental analysis result. Our results were further verified by the amazing accuracy of the Logistic regression classifier as well.

A Survey of Attacker Identification and Security Schemes in MANET
Authors:- M. Tech. Scholar Alok Gupta, Nikhil Ranjan

Abstract:- Security has become a crucial issue between the mobile nodes in Mobile Ad hoc Network (MANET). MANET is usually a lot of liable to physical security attacks and threats than the fixed- cable networks. The inherent characteristics of MANET like wireless medium, highly dynamic topology, distributed cooperation, resource strained capability, and restricted physical security poses variety of nontrivial security challenges to the network. Hence, social control of security through secure routing protocol becomes a very crucial task. Non-optimal routes are results of malicious modification through offender and inconsistent routing data exchange by offender during packet forwarding. The dynamic nature of MANET causes link breaks and new path ought to be search which cannot be optimum. In this paper, a trial has been created to think about the malicious varied attacks and security schemes proposed by various researchers and also proposed the some new approach against wormhole attack in MANET. In this paper we highlight the overview of MANET with description of routing protocols, security issue and attacks in MANET. Actually we focus on different types of attack and also present the some security scheme against attacks.

A High Sequence Value and Packet Dropping based Security Scheme in MANET
Authors:- M. Tech. Scholar Alok Gupta, Nikhil Ranjan

Abstract:- The malicious nodes are always stump intermediate nodes in routing procedure because these nodes are only receive and forward respond of surrounding neighbour. The intermediate nodes work is very responsible in routing procedure with continuous movement. In this research we proposed Malicious Sequence Number Identification (MSNI) security algorithm against malicious blackhole attack in MANET. The blackhole nodes The proposed security method of finding attacker is based on the identified the fake information of route in the network. The proposed scheme is detect the attacker presence and also estimate total number of packets is dropped by Blackhole attacker in network. The packet dropping on link through node is detected and prevented by security system. The blackhole presence is makeable in different node density scenarios and the single as well as multiple presences is detected by MSNI scheme. This method not only identified the balckhole nodes but also prevent from routing misbehaviour of attacker nodes. security is less effective on attacker/s. The performance of existing security scheme is compare with proposed MSNI and the performance of existing scheme is pitiable. The proposed secure MSNI is securing the MANET and improves the network performance after blocking malicious nodes in network. The network performance in presence of attack and secure MSNI is measures through performance metrics like throughput, routing packets flooding and proposed secures routing is improves data receiving and minimizes dropping data network as compare to existing security scheme.

Design & Analysis of Intake Manifold for SAE SUPRA
Authors:- Shubham Karkar , Omkar Kamble

Abstract:- This research paper aims to optimize the intake manifold of a formula SAE car competition. We are going to discuss about design & manufacturing of intake system for 390CC engine. We have used the 3-D printing technology to manufacture the following parts: -Restrictor, Plenum, Runner As a result, in this approach the geometry has been redesigned to result in reduction of weight. Analytical calculations are done to get maximum mass flow rate and minimum pressure drop across the restrictor. The intake manifold is designed with accordance to the SAE rule book which requires a restrictor of 20mm to be fitted in the intake manifold.

Satellite Image Fusion Based on Improved Wavelet Transform
Authors:- E.Gopi Krishna

Abstract:- The images captured by various satellites are high resolution images will also provide some distortion compared with original image. To avoid this problem we have number of basic transformations of image. Out of those, some frequently used fusion techniques namely IHS, PCA and Wavelet are discussed in this paper. Out of these three fusion methods, wavelet method is compared with two different fused rules. Improved DWT methods are, DWT using spatial frequency and DWT using mean max standard deviation. The proposed method (Improved DWT) performs better quality of fused image with good spatial and spectral resolution. This work addresses the increase in spectral distortion, entropy, mean, mutual information and standard deviation of fused image.

Deep Web and Cyber Crime
Authors:- Soham Mehta

Abstract:- The phrase “DEEP WEB” is used to denote content on the Internet which is not indexed by search engines.Among the different strategies in place to bypass search engine crawlers, the most efficient for malicious performers are so called “darknets”. I have analysed and researched on how malicious performers use these networks to trade goods and other services and examined how the deep web works, along with the goods and services offered. Due to a large variety of goods and services available in these marketplaces, I have focused on those that sparked the most interest from cyber crooks.

A Review on Grid-Connected PV Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel, Professor Pragati Priya, Professor Manju Gupta

Abstract:-The need for cleaner surroundings and also the continuous increase in energy desires makes localized renewable energy production more and additional necessary. This continuously-increasing energy consumption overloads the distribution grids in addition because the power stations, so having a negative impact on power availability, security and quality [1]. One among the solutions for overcoming this can be the Distributed Generation (DG) system. dg systems using renewable energy sources like solar, wind or hydro, have the advantage that the ability is made in shut proximity to wherever it’s consumed. This manner the losses because of transmission lines aren’t present.

Grid-Connected PV Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel, Professor Pragati Priya, Professor Manju Gupta

Abstract:- In the last decade solar power technologies became less costly and additional efficient, that have created it to an attractive resolution, being cleaner and additional environmentally friendly energy resource than traditional ones like fossil fuels, coal or nuclear. yet, a PV system continues to be rather more expensive than traditional ones, because of the high producing prices of PV panels, however the energy that drives them -the lightweight from the sun- is free, offered nearly everyplace and can still be present for many years, long in spite of everything non-renewable energy sources are depleted. One in every of the main benefits of PV technology is that it’s no moving components. Therefore, the hardware is very robust; it’s a long time period and low maintenance necessities. And, most significantly, it’s one resolution that gives environmentally friendly power generation. The efficiency of economic PV panels is around 15-20%. Therefore, it’s important that the power created by these panels isn’t wasted, by using inefficient power electronics systems. The efficiency and reliability of each single-phase and 3 part PV inverter systems is improved using transformer less topologies, however new issues related to escape current and safety need to be dealt with.

Supply Chain Management System Using Blockchain and IOT
Authors:- Saish Shah, Manas Maheshwari, Ayush Singh

Abstract:- The more traditional strategy to the supply chain was always a website that had to be set up or hosted by a supplier on a server. The supply chain data is centralized here, which means that the company only gets the information provided to it by the hosting company, and most of the important data is not received by the company in some cases which results in a conflict between the company and the customer on the hosting’s expense. So, our idea is to implement the supply chain using block chain technology along with IOT, this idea will enable the company to share the necessary data with the manufacturers, suppliers and the customers, hence, inducing transparency of data within the company. IOT also plays an important role in this, IOT ensures that there are no inconsistencies during the process and enables automation. So, our basic idea is to implement supply chain management using block chain to reduce complexity and induce transparency by hosting a server of its own and IOT for automation.

Vertical Jump Height and Sprint Performance In State Level Soccer Players
Authors:- Research Student Atri Nitin, Assistant Professor Kadyan Gaurav

Abstract:- Plyometric training (PT) is a widely used method to improve muscles’ ability to generate explosive power. Plyometric is a type of exercise training designed to produce fast, powerful movements, and improve the functions of the nervous system, generally for the purpose of improving performance in a specific sport. Purpose of study: To find out the better plyometric training protocol for Soccer players to improve their vertical jump height performance on headed the ball and to improve their sprint performance. Methodology Sixty healthy soccer players (forty females and twenty males ) within a age group of 18-22 years were randomly selected after testing the inclusive and exclusive criteria and divided into group A (n= 30, females= 20, males= 10) and group B (n= 30, females= 20 and males= 10). Both groups underwent two different plyometric protocols; each for 6 weeks, 2 times per week. The pre and post testing of Sargent jump test and 40- meter maximal sprint test were taken 0 week and 6 week for measuring the vertical jump height performance and sprint performance respectively. Result Both groups showed significant improvement in vertical jump height performance and sprint performance but there was no significant difference in both groups on vertical jump height performance and sprint performance. Both types of plyometric training are equally effective in improving the vertical jump height performance and sprint performance state level soccer players.

System Design for Natural Circulation Of Heat Exchanger
Authors:- Research Scholar Mohd Attalique Rabbani, Prof. Supervision Registrar Dr.G.R.Selokar

Abstract:- The primary function of a Natural Circulation Loop (NCL) is to transport heat from a source to a sink. The stabilization of loop fluid is achieved with the introduction of nano particles. The fluctuations in the velocity vs time curve would be decrease order and almost become linear with time. The main advantage of the natural circulation system is that the heat transport function is achieved without the aid of any pump.Also the enhancement of flow rate in the loop may be record with the increase of temperature of heat source and also with the increase of volume fraction of Al2O3 in nano fluid. Ultrasonic velocity of a liquid is identified with the coupling powers between the iotas or the molecules.The accurate estimation of thickness, viscosity, ultrasonic velocity and subsequently the determined parameters, free volume and related parameters will give noteworthy data with respect to the state of affairs in an answer.

Analysis of Non-Orthogonal Random Access for 5G Networks using MATLAB
Authors:- Damaraju Sri Sai Satyanarayana, Bejgum Sai Phanindra, Biruduraju Aditya Hruday, Gunda Sai Preethi, Kunapareddy Gowri Shashank

Abstract:- For the next generation of Cellular and Wireless communication systems, the key requirements are to efficiently support a massive amount of User Equipment’s. In this paper, to reduce the access congestion problem, the Non-Orthogonal Random Access (NORA) scheme based on SIC is proposed. This scheme identifies multiple user equipment’s with an identical preamble by utilizing the time of travel difference which thus enables power domain multiplexing. On Simulation, Results show that the number of user equipment’s can be improved by 30% and the access delay is also reduced significantly.

Document Class Identification using Fire-Fly Genetic Algorithm and Normalized Text Features
Authors:- Jitendra Yadav, Prof. Sumit Sharma, Prof. Pranjali Malviya

Abstract:- Increase of digital platform resources ultimately raises the text content on different platform, so organization of this unstructured data is highly required. Researcher has proposed number of techniques to filter relevant data inform of feature so enhancing the understanding of work. This paper has work on clustering the document of research filed into respected class. Here paper has proposed a modified firefly genetic algorithm for clustering of document into respected cluster. Fire fly crossover operation was modified in this paper where best chromosome update rest of population. Pattern based features were evaluate from the text content. Normalized content feature were used for the work. Experiment was done on real set of research paper taken fro various research domains. Results were compared on different evaluation parameters with exsisting model and it was obtained that proposed model of FFDC (Fire Fly Document Classification) was better than other.

Smart Adaptive Machine Learning Based Laptop Stand (Workbit)
Authors:- Reetu Jain, Shekhar Jain, Pratham Papneja, Atharva Nihalani, Nischal Patel, Radha Krishna,

Abstract:- White-collar workers who sit at desks all day face different risks than a delivery driver who wrangles boxes all day. Sitting in the same position working at a computer terminal which can increase the potential for herniated discs. Office workers also suffer from poor posture, tending to slump their shoulders inward as they sit and type, which can lead to muscle atrophy and increased strain on musculoskeletal joints. To prevent this, we have created an intelligent stand called “WorkBit” objective is to provide an interactive work health trainer on every desk that can monitor your daily work health and help you take preventive measure such that, person productivity increases, overall wellness increases, less stress, improved posture, less strain on the eyes, improved sleep patterns thus maintaining “WORK HEALTH BALANCE”. Our proposed solution is a highly sophisticated laptop stand mounted on wheels. It detects how far away the user’s face is from the laptop and can accordingly move in the four directions on the plane it rests on. It can even raise the laptop by 12 cm thus if the user’s table is too short, the laptop can still be raised to eye-level to avoid putting a strain on the neck.

A Review Article of Monitoring of Interconnecting Transformer using Ann
Authors:- Monika Patel, Associate Prof. Arun Pachori

Abstract:- Increase of digital platform resources ultimately raises the text content on different platform, so organization of this unstructured data is highly required. Researcher has proposed number of techniques to filter relevant data inform of feature so enhancing the understanding of work. This paper has work on clustering the document of research filed into respected class. Here paper has proposed a modified firefly genetic algorithm for clustering of document into respected cluster. Fire fly crossover operation was modified in this paper where best chromosome update rest of population. Pattern based features were evaluate from the text content. Normalized content feature were used for the work. Experiment was done on real set of research paper taken fro various research domains. Results were compared on different evaluation parameters with exsisting model and it was obtained that proposed model of FFDC (Fire Fly Document Classification) was better than other.

A Review Article Optimization of Electric Field Stress on High Voltage Insulator
Authors:- Satyam Parashar, Associate Professor Arun Pachori

Abstract:- To reviewstudy the effect of contamination on the insulator upon the tangential field, the simulation charges is replaced by complex charges. The contamination layer is simulated by a uniform surface resistivity along the insulator. The magnitudes of the simulation charges (real and imaginary components) are determined by a fore mentioned concept of error-function minimization. First, the algorithm is developed for calculating the tangential field is explained. Then the method of optimization is discussed, and the effect of contamination on the calculated tangential field distribution is investigated showing how the developed algorithm will accommodate this effect. Finally, the results obtained are discussed.

Real Time Video Fog Dehazer for Automobiles
Authors:- Nishal P A, Vaisakh Anil, Sivaprasad V B, Asst. Prof. Linnet Tomy

Abstract:- Driving vehicles in foggy climatic conditions may end in serious accidents, and makes it difficult for the driving force to envision the objects and other obstacles. Therefore traffic in foggy weather conditions is a very important issue and has been widely researched within the field of computer vision. The video dehazing software will get rid of the influence of weather factors and boost the visuals of the driving force.Previous techniques of image dehazing that are developed over the past decade are reviewed and analyzed.At first,the techniques are innovatively categorized into three categories: image enhance- ment based methods, image fusion based methods and image restoration based methods. Every methods are analysed and sub-categorized based on principles and characteristics. Various quality evaluation methods are implemented to make sure our project is capable of removing haze or fog. Finally, extensive experiments determine the performance of proposed system.

Wave and Tidal Studies off Kanyakumari Coast, Bay of Bengal, India
Authors:- A. H. Nabisa Begum, R.Venkatachalapathy, K. Gurumoorthi, M.Srinivasan

Abstract:- Ocean dynamic studies on the variability of the tides and wave characteristics have been studied in relation to the wind condition along the Kanyakumari Coast, Bay of Bengal during the NE and SW monsoon period of 2011. The maximum tidal height (1.13 m) was found in Kanyakumari tip during the Northeast monsoon period with the tidal pattern of mixed mainly semidiurnal tides. Wind speed varied from 0.1 – 9.5 m/s and 1.4 – 7.2 m/s with the average wind speed of 5.8 m/s and 4.4 m/s in NE and SW monsoon respectively wind blows (direction) predominantly with the average direction of the Northeast (550) and Southwest (1990) in NE and SW monsoon. The relationship between wave height and wind speed shows that they are weakly correlated with a significant level of 0.01.

Comparision of Strength Behaviour of M-40 Grade with Ordinary Concrete by Replacing the Fine Aggregate with Geopolymers
Authors:- M.Tech. Scholar Cherukuri Naga Lakshmi, Assistant Professor B.Anjana Devi

Abstract:- OPC is a major building material on this earth. Cement manufacturing is the major carbon dioxide emitting source and other hand besides deforestation and burning of fossil sources. The global warming and heating effect is caused by the emission of greenhouse gases, such as Carbon monoxide , CO2, into the atmosphere. Among the greenhouse gases, CO2 contribute about major amount is 65 % of global warming. The global cement industry contributes about 7-10% of greenhouse gas emission to the earth’s open area. In order to impact on surrounding environmental effects associated with Portland cement, there is a need to develop alternative binders to make concrete.One of the efforts to produce more eco -friendly concrete is the development of organic inorganic polymers like aluminium silicate, called geopolymer, synthesized from materials of geological origin or by-product materials such as fly ash that are rich in silicon and aluminium.In this paper work, low-calcium fly ash-based geopolymer from Chennai Thermal power stations has been used for the production of geo-polymer concrete. The combination of silicates of sodium solution and hydroxide of sodium solution was used as alkaline solution for fly ash activation. Alkaline solution to fly ash ratio was varied as upto .45.The concentration of sodium hydroxide solution was maintained upto 8M (Molars).The curing condition of geopolymer concrete was varied as ambient curing and oven curing at and 100°C. The strength of the GPC was tested at various ages like normal conditions 7,14,28 days.

Identification of Medical Diseases using Deep Learning
Authors:- Rituja Pardhi, Saumya Purwar, Pragati Patil, Aniket Nichat

Abstract:- The implementation of clinical-decision support algorithms for medical imaging faces challenges with reliability and interpretability. Here, we establish a diagnostic tool based on a deep-learning framework for the screening of patients with common treatable blinding retinal diseases. Our framework utilizes transfer learning, which trains a neural network with a fraction of the data of conventional approaches. Applying this approach to a dataset of optical coherence tomography images, we demonstrate performance comparable to that of human experts in classifying agerelated macular degeneration and diabetic macular edema. We also provide a more transparent and interpretable diagnosis by highlighting the regions recognized by the neural network. We further demonstrate the general applicability of our AI system for diagnosis of pediatric pneumonia using chest X-ray images. This tool may ultimately aid in expediting the diagnosis and referral of these treatable conditions, thereby facilitating earlier treatment, resulting in improved clinical outcomes.

Survey on Sustainable Energy Resources Prediction using Different Technologies
Authors:- Sumana Kuppannagari, Sree Devi E

Abstract:- Solar energy and the wind power are the environment friendly, sustainable sources of energy which are constantly being restored like sunlight and water. There are some non-renewable sources of energy available in the world like coal, Petroleum, natural gas etc. which can forms Fossil Fuels. In this world, it is important to predict the solar energy, in order to know how much the amount of energy can be consumed by different locations. Depending on different meteorological parameters like temperature, wind direction, velocity and humidity, wind power and solar energy forecasting can be done at regular intervals, so that it can balance the supply and demand of energy. In numerous applications in meteorology to understand phenomenon like humidity and rainfall, the statistical method has become a major tool and it is known as Time Series Analysis. Including time series analysis, regression analysis there are so many models like Autoregressive Integration Moving Average (ARIMA), Neural Network, Simple Moving Average (SMA) which are used to find the randomness of Solar Energy and wind power. Various Approaches has various disadvantages. This Paper can shows and can give a brief review on the theoretical forecasting methodologies and can provides the pros and cons of different methods. The study of Time Series Prediction of Solar Power is to know the advantage of using Exponential Smoothing (SES), Long-Short Term Memory (LSTM) and the suitability of Recurrent Neural Networks (RNN).

The Management of Project Conflicts Through Effective Negotiation
Authors:- Lecturer Crispin George

Abstract:- Abstract – In project management, conflicts should be treated with utmost seriousness in order to save the project from delay and resultant deadlock. There are several causes of conflicts in project management but conflicts arising from people with somewhat different ideas to reach project objectives are becoming more prominent. When people develop project plans, there is always the tendency for such to happen. There are lots of conflicts raised due to the following reasons: Different units working on the project might have different expectations about project costs, rewards and priorities, Confusion in the project team as a result of decision makin, Uncertainty on who has authority to make decision on resource allocation, Project manager setting cost and time restrictions that the functional manager cannot cope with, are also a recipe for conflict.
However, the most appropriate means of resolving conflicts is negotiation. In negotiating, the project manager should seek for a win-win situation unless in cases where such is not applicable or it cannot yield the desired outcome. This style of negotiation helps the project manager to improve his relationship with colleagues and thus achieve project objectives. In essence, the project manager should ensure that the interest of the project supersedes that of his personal feelings and ego during the negotiation process in order to get a better deal.

Design Chairless Chair-Exoskeleton System
Authors:- Mr. Ankush Borse Mr. Shubham Sonawane Mr. Rushikesh Hushar Mr. Sumit Salvi Prof. N. V. Dhumal. (Guide) Prof.M.A.Mane. (Co-ordinate)

Abstract:- The ‘chairless chair exoskeleton system’ is a hydraulic based exoskeletal support which is basically a ‘chair’ that is like an exoskeleton, allowing users to walk or move at certain speed with the device while they work. It is a mechanical ergonomics device that is designed around the shape and function of the human body, with segments and joints corresponding to those of the person it is externally coupled with. This support helps users to rest their leg muscles by directing their body weight towards a variable damper attached to the frame and directs the weight to the ground. This exoskeleton system is designed to be appropriate mechanism with human lower extremity and it operates synchronously with the human realizes. It consists of two identical ‘supports’, one strapped to each of the wearer’s legs. Simply bend the knees to a comfortable stance to activate its damper that supports the body weight. The overall weight of this exoskeleton chair is less so it doesn’t burden the wearer. The exoskeletal support not just provides a comfort lower body support, but also has several other purposes with this being a skeleton for newer products.

A Study on Artificial Intelligence in Reinventing Human Resources
Authors:-Dr. Purvi Shah, Management

Abstract:- This paper first make a point about terminology as there are lots of concepts that touch upon AI which might strictly be limited to ‘intelligent agents’ that mimic ‘cognitive’ behaviour. We are taking a broad approach to include expert decision-making systems, simulation and modelling, robotics, natural language processing, use of technologically-driven algorithms etc in this paper. Thus, we are including assisted, augmented and autonomous intelligence in the various ways that humans are supported, or replaced, by AI. Many technologies which were once seen as ‘cutting edge’ have become routinized and so no longer noticed as part of the change process. The chat boxes and cobots (robots collaborating with humans) we discuss here will, at some point, be mainstreamed.

A Survey on Text Content Sentiment Analysis Levels and Techniques
Authors:-Mahesh Patidar, Dr. V.B. Gupta, Seema Patidar

Abstract:- As Individual convey their thoughts on social media by discussing personal life events or other issues related to politics, science, environment, etc. So this produce large amount of opinion data which can be further mine by utilizing some techniques of pattern, classification, etc. So researcher works on this profitable data, and consequently, semantic annotation of online digital content into respected sentiment was done by utilizing various techniques. Hence this paper gives a detail investigation of different level of sentiment analysis with necessary pre-processing steps. Sentiment analysis techniques adopt by different researcher like supervised, unsupervised, lexion, etc. were also discuss with their desired outcome. A deep survey of social content sentiment analysis work done by different researcher was also discussed for improving the knowledge of methods used.

Analysis on an Online Social Network Based Question and Answer
Authors:-Hans Raj Pal, Professor Ritesh Yadav

Abstract:- Question and Answer (Q&A) systems play a vital role in our daily life for information and knowledge sharing. Users post questions and pick questions to answer in the system. Due to the rapidly growing user population and the number of questions, it is unlikely for a user to stumble upon a question by chance that (s)he can answer. Also, altruism does not encourage all users to provide answers, not to mention high quality answers with a short answer wait time. The primary objective of the system is to improve the performance of Q&A systems by actively forwarding questions to users who are capable and willing to answer the questions. Also improve Social Network Based Question and Answer system with security and efficiency enhancements by protecting user privacy and identifies, and retrieving answers automatically for recurrent questions.

A Survey on Data Visualization for Visualizing the Large Data Sets Using Visualization Techniques
Authors:- Harsha Vardhan G, Sree Devi E

Abstract:- Knowledge image involves presenting knowledge in graphical or pictorial kind that makes the knowledge simple to know. It helps to clarify facts and confirm courses of action. it’ll profit any field of study that needs innovative ways in which of presenting massive, advanced data. the appearance of tricks has formed trendy image. This paper presents a quick introduction to knowledge image. Data visual image could be a quite new and promising field in computing. In this paper, we have a tendency to initial get accustomed to knowledge visual image and its connected ideas, then we will surf some general algorithms to try to the information visual image. To get deeper regarding it, we’ll have some discussion regarding third dimensional knowledge visualization. With the mixture of some far-famed ways, we have a tendency to gift a replacement algorithm to try to four dimensional knowledge visual images. We have a tendency to conjointly gift a program project plan regarding it (optional), and a few problems and explanations around it.

A Qualitative Study of Devops Usage and Automation Tools in Practice
Authors:- Ishaq Shaik Mohammed, Masthan Baba B

Abstract:- DevOps could be an abstract framework for reintegrating development and operations of data Systems. We tend to perform a scientific Mapping Study to explore DevOps. Twenty six articles out of 139 were designated, studied and summarized. Supported this idea table was created. We tend to discovered that DevOps has not been adequately studied in scientific literature. There’s comparatively very little analysis out there on DevOps and also the studies ar typically of inferiority. We tend to conjointly found that DevOps is supported by a culture of collaboration, automation, mensuration, and data sharing and net service usage. DevOps advantages IS development and operations performance. It conjointly has positive effects on net service development and quality assurance performance. Finally, our mapping study suggests that additional analysis is required to quantify these effects.

A Survey on Cloud Computing Architecture Characteristics Deployment Models and Challenges
Authors:- Venkaiah Ramaiahgari, Masthan Baba B

Abstract:- Cloud computing is the process of storing and accessing of information and applications with the help of internet or web instead of your own hard disk. Cloud computing is a distributed resource pooling where anyone can access a particular resource from anywhere i.e. a single resource can be used by multiple people at different locations. This resource are like software, hardware, infrastructure, platform, networks, servers, storage spaces etc. it provides the services to the users based on their requirement and these services are easy and low cost to use. This paper is for everyone who are willing to take a study on cloud computing here we are going to see the architecture , characteristics , deployment & service models of cloud computing.

Supply Chain, Logistics and Technology in Agriculture
Authors:- Aakash Nar Singh Rout, Monika, Gourav Kumar Yadav, Arpit Barodiya

Abstract:- This paper addresses the issues pertaining to agriculture supply chain along with the effective role played by supply chain & logistics for timely delivery of produce to markets, along with other dimensions such as cold storage, access to market, government schemes.

Smart Customer-Realtime Customer Relationship Management System – A Survey
Authors:- Harshitha Deshpande, Shruthi V, Sushma J, Vasundhara Rajyalaxmi K, Hod.Dr. Sumithra Devi K A

Abstract:- Customer Relationship Management (CRM) is overall process of building and retaining profitable customers with an organization and directed towards improving business relationship with customers. It is a management philosophy and strategy which enables a company to optimize revenue and increases customer value and service quality by recognizing customer needs. it’s a procedure of business that is able to facilitate or meet out requirements of users and each and every component to be measured deliberately and should look of as all the requirements are met. A CRM strategy aims to create a comprehensive customer centric strategy that contributes to durable relationships with customers and makes a profit for owners.

Emotion Recognition using Human Activity From Smartphone Data
Authors:- Shahistha Sultana K

Abstract:- Social interaction has become an important concern in our daily activities. The social interactions tell us about the emotion and the mental state of a person. Both the body movements and the facial expression of a person can be used to analyses the emotion of a person. Numerous researches have been conducted for analyzing the emotion of a person with the help of face reaction. The proposed project focuses on analyzing the emotion of a person with the help of body movements. These movements will help to find the underlying emotion of a person whenever the face isunclear/occluded. Recognition of human activity is performed first with the help of the data recorded from a smartphone’s sensor such as accelerometer and gyroscope. The data is recorded when the smartphone is attached to the waist of the subject, as this provides accurate results. The human activity recognition is done using the UCI HAR Smartphone dataset which has data recorded from 30 volunteers at age difference of 19-48 years and with 561 measurements variable. After the human activity are identified it is compared with the 2-D stimuli from the dataset and features are extracted from the dataset frame which are preprocessed and matched against the same human activity identified from the smartphone dataset and the extracted features are fed to the KNN and Support Vector Machine (SVM) classifiers to classify the emotion of the human. In this way, a human emotion can be found from the activity recognized from the smart phone data.

Leave a Reply

Your email address will not be published. Required fields are marked *