IJSRET Volume 6 Issue 4, July-Aug-2020

Comment

The Future of Urban Surveillance using IOT Based 4th Gen Parking Systems
Authors:- Valentine B

Abstract:-Vehicle parking occurs at the intersection of urban space system and mobile management. The first gen or era, or Parking 1.0, hardly had any service offerings except for a simple space-renting model that was managed and operated manually. Then Parking 2.0 offered electronic services such as parking meters that partially automated the fee collection and auditing systems. The present generation, Parking 3.0, provides basic automation that allows users to independently navigate the complete parking life cycle – from knowing the parking occupancy status to ticketing, parking, and fee settlement. In this we are focusing on an eco-friendly system called Automated Valet Parking along with Pollution based parking fees, wireless charging slots and parking lifts provides additional weightage to this system, which uses hybrid robotic valets in smart parking and helps optimizing parking space.

A Review on Support Vector Machine Based Classification of Alzheimer’s disease from Brain MRI
Authors:- M.Tech. Scholar Ekta yadav , Associate Prof. & Head Dr. Jitendra Singh Chauhan

Abstract:-Alzheimer’s disease (AD) is important source of dementia and can cause serious health or socio-economic problems. Alzheimer’s disease is a progressive neurodegenerative ailment that causes changes in brain structure that affect behavior, thought, mood, or memory. Various multivariate analysis algorithms have been used to classify AD to distinguish it from healthy controls (HC). Effective early classification of AD or mild cognitive impairment (MCI) caused by HC are imperative because early preventative care can help reduce the risk factors reported in Alzheimer’s disease. The loss of cognitive ability has only a minor impact on a person’s daily life. The middle stage is the middle stage of AD. In severe AD, a person can no longer operate individually but depends entirely on others for care. In this article, support vector machines SVM and CNN will be used to diagnose Alzheimer’s brain MRI or classify it into definite stages. The algorithm was trained or tested using MRI data from Alzheimer’s disease. The data used included MRI scans of ca. 300 AD patients and 20 regular controls. And evaluate a new automated technique based on support vector machine (SVM) which classifies whole brain anatomical magnetic resonance imaging to distinguish patients by Alzheimer’s disease (AD).

A Review on Heart Disease Prediction by Machine Learning Techniques
Authors:- M.Tech. Scholar Shivangi Agrawal, Asst. Prof. & Hod Ashish Tiwari

Abstract:-We discussing data mining healthcare generation based predicting human diseases in biomedical and healthcare communities, accurate analysis of medical data benefits early disease detection, patient care and community services. We propose a novel methodology for disease predictions in different machine learning algorithms using find the user behaviors.We streamline machine learning algorithms for effective prediction of chronic disease outbreak in disease-frequent communities. The Main focus of this process is to implement a simple, reliable and easily applicable deep learning technique for the classification of the selected two different cardiac categories conditions to the best of our knowledge, none of the existing work focused on both data types in the area of medical big data analytics. Finally finding user behaviour based on given dataset.

Real Time Video Fog Dehazer for Automobiles
Authors:- Nishal P A, Vaisakh Anil, Sivaprasad V B, Linnet Tomy

Abstract:-Drivers know to take it slow and keep their distance from other cars during snow, ice and rainstorms. When it comes to different types of inclement weather, fog often gets overlooked as a serious hazard.Fog is a large cloud of water droplets that forms when air comes in contact with the ground and then cools. This phenomenon is responsible for 38,000 crashes, 15,000 injuries and 600 fatalities every year. These clouds greatly decrease visibility, frequently in the morning and evening.Fog may distort your perception of speed, as you cannot see other objects moving in relation to your vehicle. Therefore traffic in foggy weather conditions is a very important issue and has been widely researched within the field of computer vision. A Video Dehazing software is introduced to counter these problems and thereby reduce the number of accidents. For the project previous image dehazing that are developed over the past decade are reviewed and analyzed. At first,the techniques are categorized into three categories: image enhancement based methods, image fusion based methods and image restoration based methods. Various quality evaluation methods are implemented to make sure the project is capable of removing haze or fog. Finally, extensive experiments determine the performance of proposed system.

A Review on Brain Tumour Classification Using Support Vector Machine and Principle Component Analysis
Authors:- M.Tech. Scholar Nisha Tomar, Asst. Prof. & Hod Ashish Tiwari

Abstract:-Over the years, the enlargement in medical image processing is mounting in a marvellous manner. The rate of increasing diseases through deference to a compilation of category of cancer and other related human problems paves the way for the development in biomedical research. Consequently processing and analyzing these medical images is of high consequence for clinical diagnosis. This work focus on the stage successful classification of brain tumour images and segmentation of brain tumour data set images formulate use of the proposed hybrid logical technique the face up to and objectives on be going to of attribute extraction, image classification and segmentation for medical images will be discussed. The experimental results of proposed technique will be evaluate and validated for presentation and advantage analysis on magnetic resonance brain images, based on accuracy, sensitivity, specificity demonstrating the effectiveness of the proposed method there will be SVM , classifiers Used for identify normal and abnormal tissues from brain MR images.

A Review on Person Recognition using Support Vector Machine and Local Binary Pattern
Authors:- M.Tech. Scholar Priyanka Bhate , Asst. Prof. & Hod Ashish Tiwari

Abstract:-This paper discusses the concept of speech recognition with deep learning methods. Introduction of speech recognition, deep learning and deep learning methods is discussed in this review paper. Models of deep learning that are used in speech recognition is also described in this paper. This paper defines the related work on speech recognition using deep learning methods and about the sphinx, software allow the implementation of speech recognition in java language. The main motive of this review is to define the use of sphinx and eclipse to recognize speech. we will proposed We proposed new technique for human identification using fusion of both face and speech which can substantially improve the rate of recognition as compared to the single biometric identification for security system development. Our system using Viola Jones Algorithm for face detection. The proposed system uses Local Binary Pattern (LBP) as feature extraction techniques which calculate the local features. The Extracted features given as input SVM classifier to used to recognize the person and then display the result. This new system can be applied in various different fields such as identity verification and other potential commercial applications.

Genome Sequencing and Analysis of Cancer Codons
Authors:-Shailesh.D, Anooja Ali, Vishwanath R Hulipalled, Harshitha KB, Swetha Sivakumar, Manjunath C

Abstract:-Genome sequencing helps to identify the variation in genomic structure or to detect the new genomic sequences over the population. This sequence alignment detects the preserved interactome unit among organism. It evaluates the phylogenetic distance among organism of same species or different species and thereby detecting the functional domains, polymorphisms, and mutations. Sequence alignment is the arrangement of the sequences of deoxyribonucleic acid (DNA), ribonucleic acid (RNA) or macromolecule to spot regions of similarity which will be a consequence of practical, structural or organic process relationships between the sequences. In this paper, we detect mutation and the presence of cancer codon using pattern matching and sequence alignment. The sequences are preprocessed using Boyer Moore and k-mer indexing algorithms. Mutations present in the sequence is detected with local and global alignment with Naive approximation. Gene sequencing helps to understand and evaluate the genomic characteristics of an organism at a lesser cost and with great coverage.

A Review on Brain Tumor Segmentation and Classification Using Machine Learning Technique
Authors:- M.Tech. Scholar Nayan Pure , Assistant Professor & Head Ashish Tiwari

Abstract:-The successful early diagnosis of brain tumors plays a major role in improving the treatment outcomes and thus improving patient survival. Manually evaluating the numerous magnetic resonance imaging (MRI) images produced routinely in the clinic is a difficult process. Thus, there is a crucial need for computer-aided methods with better accuracy for early tumor diagnosis. Computer-aided brain tumor diagnosis from MRI images consists of tumor detection, segmentation, and classification processes. Over the past few years, many studies have focused on traditional or classical machine learning techniques for brain tumor diagnosis. Recently, interest has developed in using deep learning techniques for diagnosing brain tumors with better accuracy and robustness. these detection and segmentation approaches are reviewed with an importance placed on enlightening the advantages and drawbacks of these methods for brain tumor detection and segmentation. The use of MRI image detection and segmentation in different procedures are also described. Here a brief review of different segmentation for detection of brain tumor from MRI of brain has been discussed.

A Review on Energy Efficient Sensor Network Routing Protocol for Underwater Sensor Networks
Authors:- M.Tech. Scholar Surbhi Rathore , Assistant Professor & Head Ashish Tiwari

Abstract:- Underwater sensor networks (USN) are a collection of sensor nodes and vehicles for performing the cooperative task in the specified region. In autonomous networks, the sensors and the vehicles are self-organized. The network can alter itself for achieving this goal to the features of the marine environment the water covers 75% of the earth’s surface. Many resources lie underwater. Those are to be investigated. The current advances in technology have prompted the opportunities to try and do underwater explorations by using sensors at all stages. USN is the combination of wireless technology with a very tiny micro mechanical sensor technology that has an intelligent computing, smart sensing, and communication capabilities.

Third Eye for Blind Ultrasonic Vibrator Gloves
Authors:- Asst. Prof. Rakesh Narvey, Asst. Prof. Rahul Sagwal, Harshita Shakya , Nupur Bhardwaj, Pooja Mandre, Neha Rajpoot

Abstract:- In this paper we have researched on the ultrasonic vibrator gloves. This technology is implemented to help visually impaired in indentify the objects that may come in their path within 1.5m in any direction of the glove. When the user of this gloves encounters an object within the range of 1.5m, the glove alerts the user with a beeping sound and vibrations. As soon as the user goes towards the object, intensity of beeping sound will increase. Advantage of this glove is its highly low manufacturing cost which is almost ten times lower than the other technologies are being made of the same purpose. The use of ultrasonic sensors and Arduino lilypad have heavy communications on the gloves, but with the help of other components effect of ultrasonic radiations can be reduced easily. By this, this project can be easy to wearable with less harms and economical in price can lighten up the markets by its features. The main aim was economizing this project so that even the financially weaker may use it.

A Review on Facial Expressions Recognition Based on LBP & SVM
Authors:- M.Tech. Scholar Nagesh Patel, Assistant Professor & Head Ashish Tiwari

Abstract:- Face Expression plays an important role in human communication. Facial Expression Recognition (FER) is process performed by computers which consist of detect the face in the image and preprocess the face region, extracting facial expression features from image by analyzing the motion of facial features or change in the appearance of facial features. Then classifying this information into facial expression categories like prototypic facial expression such as fear, happy, sad or Action Units (AU) such as eye open or mouth stretched concatenated into single feature vector. This feature vector outlines a well-organized representation of face and is helpful in determining the resemblance among images.LBP features which are effectual and competent for facial expression recognition are generally used Firstly, face area is divided in small regions, by which histograms, Local Binary Patterns (LBP) are extracted and then Cohn Kanade is the database will be used for this work and the programming language used MATLAB.

Drunk Driving Prevention and Automatic Bus Pass Tracking by using Image Processing
Authors:- Assistant Professor Malarselvam V, James Ashish A, Peranban D, Arun S, Arulmani P

Abstract:- Now a days manual bus pass checking is done in schools and colleges, and many accidents occurs due to drunk and driving. Due to manual bus pass checking it leads to more time consumption and misusage of bus pass occurs. Our proposed product performs Image processing and finds the unauthorized person entering into the bus. Camera will take a snap of the unauthorized person and it will send the snap to the authority by using IoT. Alcoholic sensor [MQ3] will sense whether the driver is drunk or not, suppose if the driver is drunken the camera will take a snap of the drunken driver and it will send the snap to the person in in-charge by using IoT.

Sentiment Analysis using Deep Learning: A Review
Authors:- Digvijay Singh

Abstract:- Deep learning has evolved as a powerful technique that learns from the features present in multiple layers of the data and produces futuristic predictions. Deep Learning has been impacting many domains such as Computer Vision, Natural Language Processing and many more. As a part of Natural Language Processing, Deep Learning has been being used for the Sentiment Analysis, either to identify the purchase behavior of customers or in recommendation engine to provide them completely amazing user experience. Under this smart internet era World Wide Web such as Social media networks, Survey Forums, Review Sites generate huge amounts of data in the form of user-views, emotions, opinions and arguments about different social events, products, brands, and politics. Sentiments of users that are expressed on the web has great influence on the readers, product vendors and politicians. This unstructured data from the online resources is converted into well-structured meaningful data for Sentiment Analysis, Sentiment Analysis has recognized significant attention and has great impact on the industries. Sentiment analysis is referred to as identifying the feeling of people around us in the form of negative, positive, favorable, unfavorable, thumbs up, thumbs down, etc. One of the challenges in Sentiment Analysis is the lack of labelled data. And to rectify this issue, the sentiment analysis and deep learning techniques have been merged because deep learning models are very effective due to their automatic learning capability. This paper gives an overview of deep learning and then provides a comprehensive overview of its current applications in sentiment analysis.

Sentiment Analysis using Deep Learning: A Review
Authors:- Anushka Yadav, Kalyani Daharwal, Ashwini Kale, Priti Tayade, Asst. Prof. Akbar Nagani

Abstract:-Traffic congestion could be a severe problem in many major cities across the planet and it’s become a nightmare for the commuters in these cities. Traffic are often controlled in several main junctions by incorporating either automatic traffic signal control or traffic police. But conventional traffic signal system is predicted on fixed time concept allotted to every side of the junction which can’t be varied as per varying traffic density. At some times, a priority of traffic light needs to be changed based on more number of vehicles waiting in same road, VIPs vehicles and Ambulance vehicles etc. We propose to style and develop a density based traffic light system. The signal changes and sensing the traffic density . The algorithm design and encoded on Arduino based system, due to its simplicity and economy. IR sensors are used to measure the traffic density on a particular road. IR senser have limitations that it has light intensity issues. In future, it with the improvement in IR sensor technology light issue can be resolved. IR sensors are arranged on all junction point on square to detect traffic density properly, these sensors always sense the traffic on that particular road. All these sensors are interfaced to the Arduino. By these sensors, Arduino detects the traffic and controls the traffic system. The controls of traffic light depend on number of vehicles available on the road. This method also focuses on providing a free pathway for emergency services like ambulances and fire brigadevehicle that are arriving towards the signal by sensing the siren frequency in range 700Hz-900H.

Road Safety Audit In Indian Road With Improvement Of Capacity In Intelligence Transportation System
Authors:- ME Student Yogesh Bhagwan Rathore, Asst.Prof. & HOD Vinay Devualkar

Abstract:-Transportation plays a key role in the development of an area, but it happens only when the transportation is safe, rapid, comfortable and economy. A road is considered safe when only a few, or no accidents occur. Road and its surroundings, road users and vehicles are the elements contributing to road accidents. Pedestrians, bicyclists and two-wheeler motorized riders are the vulnerable road users. The loss of human life due to accident is to be avoided. Road safety audit (RSA) is a formal procedure for assessing accident potential and safety performance in the provision of new road schemes and schemes for the improvement and maintenance of existing roads. These Audit studies or analysis give scope for the reduction of accidents and helps us to provide safe, self-explaining and forgiving roads. By this we can save the precious human life as well as the nation‟s economy. The selected for this study is part of Hyderabad Outer and Inner Ring Roads, HMDA Roads. Knowledge of accidents that have occurred on roads helps us to improve the design of the roads or to influence the behavior of road users, so that similar accidents do not occur again. Literature review will be done for the safe movement of the Road safety audit and will check the merits and demerits of the techniques used previously.

Does Technology Plays A Key Role in Selling A Car?
Authors:- Krishna Innani

Abstract:-A car which is a luxury good in india, but still the demand for the car is increasing day by day. From past few years the automobile market has many new entries which are affecting the indian automobile market largely. This companies are more based on technologies i.e with the common features of a car it is also giving technologies which are attracting more and more customers towards it. This is the research on how the new entries effected indian car companies and few ideas which if indian companies use them, they could acquire the indian market and could give a very tough competition to the new companies. This article also includes the comparison of sales before and after the new companies’ entry in the indian market. This research would help many indian companies to increase the amount of sales of there manufactured car by using the ideas which are presented in the given article. The article is more for Tata Motors as it is my favourite brand in india. If Tata Motors acquire something from this research, I would be very grateful.

A Review Article of Maximum Power Point Tracking Based Transient Analysis of Wind Power Plant
Authors:- Raj Roushan , Professor Anil kumar Kori

Abstract:- This paper reviews and studies the state-of the-art of available maximum power point tracking (MPPT) algorithms. Due to the nature of the wind that is instantaneously changing, hence, there is only one optimal generator speed is desirable at one time that ensures the maximum energy is harvested from the available wind. Therefore, it is essential to include a controller that is able to track the maximum peak regardless of any wind speed. The available maximum power point tracking (MPPT) algorithms can be classified according to the control variable, namely with and without sensor, and also the technique used to locate the maximum peak. A comparison has been made on the performance of the selected MPPT algorithms on the basis of various speed responses and the ability to achieve the maximum energy yield. The tracking performance is performed by simulating wind energy system using MATLAB/Simulink simulation package. Besides that, a brief and critical discussion is made on the differences of available MPPT algorithms for wind energy system. Finally, a conclusion is drawn.

Condition Monitoring of Transformers Based on Sound Signals- A Review
Authors:- Imtiyaz Ahmad, Dr. Yaduvir Singh, Mr. Jameel Ahamad

Abstract:- Power transformers are important and expensive components in the electric power system. The de-regulation of electric power requires a reduction of the service and maintenance cost of the power utilities. Monitoring systems can help to decrease the transformer life cycle cost and to increase the high level of availability and reliability. On line monitoring is the record of relevant data of a transformer. Diagnosis is the interpretation of these monitored data including the history of the transformer and the statistical judgement of the failure rate. The importance of the monitored transformer and the economic consequences are the basis for the asset management of power transformer together with the risk evaluation. This paper attempts to present the different methodologies adopted for on line monitoring of power transformers..

A Review Article Of Enhancement Of Statcom Performance Using Srf Based Shunt Filter Power Transmission
Authors:- M.Tech.Student Chandra Kant Singh, Asst.Prof. Durgesh Vishwakarma2

Abstract:- Power transformers are important and expensive components in the electric power system. The de-regulation of electric power requires a reduction of the service and maintenance cost of the power utilities. Monitoring systems can help to decrease the transformer life cycle cost and to increase the high level of availability and reliability. On line monitoring is the record of relevant data of a transformer. Diagnosis is the interpretation of these monitored data including the history of the transformer and the statistical judgement of the failure rate. The importance of the monitored transformer and the economic consequences are the basis for the asset management of power transformer together with the risk evaluation. This paper attempts to present the different methodologies adopted for on line monitoring of power transformers..

Experimental Study of Pervious Concrete
Authors:- PG Student T. Gowri

Abstract:- Pervious concrete is a special type of concrete with a high porosity used for concrete flat work applications that allows water from precipitation and other source stop as directly through. By this, the runoff from the site is minimized and groundwater is enhanced. It is also called porous concrete, permeable concrete, no fines concrete and porous pavement fines. Pervious concrete can be made with little to no fine aggregates utilizing large aggregates. The concrete paste then covers the aggregates and helps the water to move through the concrete slab. A form of concrete with a high void content of about 30 percent is now becoming common due to its ability to minimize the runoff to drainage systems that can provide a water flow rate of about 0.34 cm / second. It is an important sustainable building technology and is one of the low-impact production techniques used by builders to protect water quality. Pervious concrete often finds its successful use in pavements, footpaths, walkways and highways for low loading intensity parking. The Environmental Protection Agency (EPA) has stated that the pervious concrete is considered to provide pollution control, storm management, and adequate growth. It is a composite substance that is created by combining cement, inert sand and gravel matrix or crushed stone. This concrete has a light color and open-cell structure which prevents them from absorbing heat from the sun; they also do not radiate the heat back into the atmosphere, which reduces heating in the environment. The pervious concrete has low cost of construction. It removes the storm water while reducing the number of contaminants that reach the rivers and ponds. Also, pervious concrete improves tree growth. The action of pervious concrete has been examined experimentally in the present research. The water-cement ratio was maintained at various ratios 0.35, 0.40, and 0.45. Different properties of pervious concrete were experimentally tested, e.g. work ability, compressive strength, split tensile strength, flexural strength at 7, 14 & 28 days. Mixing proportions with aggregate sizes (4.75 mm to 10 mm) give greater strength compared to mixes with aggregate sizes (10 mm to 20 mm) and (4.75 mm to 20 mm), respectively.

Traffic Light Monitoring System using IOT
Authors:- Ayush Kr. Chauhan, Asst. Prof. Saurabh Saxena, Astha Saini, Aakash Singh

Abstract:- To improve the traffic light configuration, this paper proposed monitoring system to be as an additional component to the intelligent traffic light system. This will be able to determine the location of the emergency vehicle and provide the smooth way at the crossroad where the traffic light is placed. On the wide roads a reserve path will be provide for the emergency vehicle so that they can reach their destination as soon as possible. If there is no emergency vehicle on the road that path can be used by normal vehicles. On the traffic light an emergency light added which will indicates the traffic whether there is an ambulance or any rescue wagon is on the road or not. If there is an emergency vehicle on road, the traffic will not use that reserve path. Where roads are narrow there the traffic will be controlled through the traffic light by the controller.

Wi-Fi Based Garbage Monitoring System
Authors:- Jiby Sara James, Nikita Kanojiya, Ruchi Gedam, Bushra Ayesha , Asst. Prof.Tirupati. M. Goskula

Abstract:-Collecting waste is important in order to keep the cities clean for a better environment to live in. Thus, the smarter techniques are used in the surroundings to overview and collect the important information. We have proposed a Wi-Fi based garbage monitoring system which is used to keep the cities clean. The system evaluates and shows the level of garbage collected in the bins through an android app. The android application made to support the project sends all the important information to a person in administrative department. In this way the waste management is automated.

Renewable Energy for Sustainable Development in India: Current Status And Future Prospects
Authors:-M.Tech. Student Poonam Kumari, Asst.Prof. Manish Kurre

Abstract:-Renewable energy sources and technologies have potential to provide solutions to the long-standing energy problems being faced by the developing countries. The renewable energy sources like wind energy, solar energy, geothermal energy, ocean energy, biomass energy and fuel cell technology can be used to overcome energy shortage in India. To meet the energy requirement for such a fast-growing economy, India will require an assured supply of 3–4 times more energy than the total energy consumed today. The renewable energy is one of the options to meet this requirement. Today, renewable account for about 33% of India’s primary energy consumptions. India is increasingly adopting responsible renewable energy techniques and taking positive steps towards carbon emissions, cleaning the air and ensuring a more sustainable future.

A Review Article on Comparison Between Rcc And Composite Materials In Multi Storey G+2 Building
Authors:- Ms. Sangeeta Malakar, Associate Professor Komal Bedi

Abstract:-In India Concrete Is Very Popular Material of Construction Especially In Case Of Medium And Low Rise Buildings. And In Case Of High Rise Buildings Steel Is Generally Used And The Composite Construction Is Not Such Popular But It Is Possible That Composite Construction Can Be More Beneficial In Case Of Medium And High Rise Buildings. Concrete Composite Construction Can Be Built In Place Of RCC Structures To Get Maximum Advantage Of Steel And Concrete And To Produce Efficient And Economic Structures. It Is the Decision Of Contractor Or Owner That Which Type Of Properties They Require In The Field And According To Those Properties The Type Of Material Can Be Chosen. This Paper Shows Comparison Of Various Aspects Of Building Construction For Steel, RCC As Well As Composite Buildings Considering Various Researches Acted On This Topic.

Heat Transfer through Water in Ground Air Heat Exchanger
Authors:- M.Tech. Scholar Swastik Kumar Agarwal, Dr.Shailendra Dwivedi(HOD)

Abstract:- Ground-air heat exchangers have become one of the important topics into consideration when HVAC industry is talked about. It is capable of transferring heat without liberation of any carbon compounds because of which it has edge over other heat transfer mediums. This paper shows the study of water to air heat transfer considering the material of the pipe and the optimal design of the pipe. Earth air heat exchangers are widely used in agricultural and industrial sectors for the past few decades in other parts of the world. The vise-versa is applied in the cooler parts to preheat the air reaching the room for comfort.

Teaching Learning Methods to Enhance Learners Learning Capability
Authors:- Asst. Prof. G. Ramani, Asst. Prof. B. Deepthi, Asst. Prof. R. Deepika

Abstract:- Learning is an art of enhancing the skills with knowledge. The learners are not like previous students to listen the lecture, instead they learn more by involving in the active learning process. We must step forward with the adoption of the changes in today’s learning and encourage and guide the learners for more self-learning which not only increases the learnings but also a raise in their potential of confidence. In this paper We discuss our own experiences the various active learnings and various tools for virtual learning, which makes the learning effective, reachable and outcome.

Embedded Web Client on Arduino Due
Authors:- PG Student Ashwini Pathade, Assistant Professor Poonam Soni

Abstract:- Nowadays, monitoring and controlling is important aspect in industry and home automation. On that basis many systems are measuring and controlling parameters like temperature, humidity, voltage, gas leakage etc. and result displays on different format. Embedded web client is the system which is used to monitor and control parameters like temperature and humidity. Embedded web client gives output in the form of offline mode as well as online mode. On the result basis on two systems are available in embedded web client one is online system and other is offline system. In Embedded web client controller receives data from sensors and transmit it to server periodically as well as perform certain useful functions like to display ADC value and controlling increased temperature. In embedded web client AT SAM 3X8E and NODE MCU used as a controller and display output on LCD as well as web page using XAMPP server. Embedded web client uses wi-fi module instead of router or Ethernet. Embedded web client is easy in construction, robust and gives real time application.

Utilization of Granite Saw Powder Waste in Brick
Authors:- Iswarya E

Abstract:- Nowadays, monitoring and controlling is important aspect in industry and home automation. On that basis many systems are measuring and controlling parameters like temperature, humidity, voltage, gas leakage etc. and result displays on different format. Embedded web client is the system which is used to monitor and control parameters like temperature and humidity. Embedded web client gives output in the form of offline mode as well as online mode. On the result basis on two systems are available in embedded web client one is online system and other is offline system. In Embedded web client controller receives data from sensors and transmit it to server periodically as well as perform certain useful functions like to display ADC value and controlling increased temperature. In embedded web client AT SAM 3X8E and NODE MCU used as a controller and display output on LCD as well as web page using XAMPP server. Embedded web client uses wi-fi module instead of router or Ethernet. Embedded web client is easy in construction, robust and gives real time application.The block is a building material, which is used to build up the structures. The aim of this project is to determine the compressive strength and other characteristic of the blocks. The blocks with clay and granite sawing powder waste, which will give a better understanding on the properties of blocks like compressive strength, water absorption and size and shape of block was good while comparing the other kind of blocks.The scope of this project is to determine and compare the strength of the blocks by using different percentage of clay and granite sawing powder waste. The investigation was carried out by various mix ratios using the laboratory test likes compression test, water absorption test. For strength characteristics, the results showed that a gradually increase in compressive strength, water absorption values in blocks was good while comparing the characteristics compressive strength of bocks.

Fabrication of Abrasive Jet Machine
Authors:- Assistant Professor K Prashanth, D H Pachchinavar,
Students, Mohammed ZaminUlhaq, Owais Ali Khan, Mohammed Azmathullah Shareef, Mohammed Rehan, Habeeb Abdul Rouf.

Abstract:- Abrasive Jet Machining (AJM) is the process of material removal from a work piece by the application of a high-speed stream of abrasive particles suspended in a gas medium from a nozzle. The material removal process is mainly caused by brittle fracture by impingement and then by erosion. The Abrasive Jet Machining will chiefly be used to cut shapes, drill holes and de-burr in hard and brittle materials like glass, ceramics etc. In this project, a model of the Abrasive Jet Machine was designed using CAD packages like AutoCAD and CATIA. Care was taken to efficiently use the available material and space. The machine was fabricated in the institute workshop with convectional machine tools like arc welding machine, hand drill, grinding machine using commonly available materials like mild steel sheet and rod, aluminum sheet, glue, polythene sheet, glass fiber which are commonly available in the local market. Care has been taken to use less fabricated components, because, the lack of accuracy in fabricated components would lead to a reduced performance of the machine.The different functional components of AJM are the machining chamber, work holding device, abrasive drainage system, compressor, air filter and regulator, abrasive nozzle, and mixing chamber with cam motor arrangement. The different components are selected after appropriate design calculations.

Reuse of Hazardous Waste as Alternative Building Materials–A Review
Authors:- UG Student Harshith. M, Masters Student Aditi Parmar Chitharanjan

Abstract:- Waste materials are a major environmental problem, among them the most dangerous are hazardous wastes that are substantial or potential threats to public health or the environment. Waste can be used in the construction industry in two ways: by reusing and recycling. This article presents a review of the literature on changes in the composition of traditional building materials with the addition of certain wastes without compromising on its durability and efficiency. This article mainly concentrates on the use of Polystyrene (PS), and formaldehyde resin which are some wastes attained from construction industries and their by-products. Some physical and mechanical properties are studied when these mixtures are partially replaced in cement with sand in experimental ratios to receive efficient ratios and to study its properties. This article is a review of major work done in this field.

Design and Analysys of Twin Cell Box Culvert
Authors:- Ramyasri.V, Assistant Professor Mr.P. Satheesh Kumar

Abstract:-Box Culverts are required to be provided under earth embankment for crossing of water course like streams, Nallas across the embankment as road embankment cannot be allowed to obstruct the natural water way. The culverts are also required to balance the flood water on both sides of earth embankment to reduce flood level on one side of road thereby decreasing the water head consequently reducing the flood menace. Culverts can be of different shapes such as arch, slab and box. These can be constructed with different material such as masonry (brick, stone etc) or reinforced cement concrete. Since culvert pass through the earthen embankment, these are subjected to same traffic loads as the road carries and therefore, required to be designed for such loads. The size, invert level, layout etc. are decided by hydraulic considerations and site conditions. The cushion depends on road profile at the culvert location. The structural design involves consideration of load cases (box empty, full, surcharge loads etc.) and factors like live load, effective width, braking force, dispersal of load through fill, impact factor, co-efficient of earth pressure etc. Relevant IRC Codes are required to be referred in the analysis and design of box culverts. The aim of this project is to model and analyze the box culvert using STAAD PRO software. This software is an effective and user friendly tool for three dimensional model generation, analysis and multi material design. The results obtained from STAAD PRO are compared with the manual calculations obtained using Excel. The structural elements of box culvert are designed to withstand maximum bending moment and shear force. The results obtained from STAAD are almost similar to manual calculations.

Indian Sign Language Recognition
Authors:- Mohit Patil, Pranay Pathole, Hrishikesh Patil, Ashutosh Raut, Prof. S S Jadhav

Abstract:-This paper introduces a system that can recognize poses and hand gestures of Indian Sign Language in real time using grid-based features. This system tries to reduce the communication gap between listening and speaking disabled and the rest of society. Existing solutions either provide relatively low precision or do not work in real time. The system provides good results in both parameters. Sign Language is captured from a smartphone camera and its frames are sent to a remote server for further processing. Techniques such as Face detection, object stabilization and skin color are used. Segmentation is also used for hand detection and tracking. The image undergoes a gridbased function extraction technique representing the placement of the hand in the form of Function Vector, Hand postures are classified using the k-Nearest Neighbors algorithm. However, by gesture classification, movement and intermediate positions of the hand observation sequences are entered into the chains of the hidden Markov model corresponding to the pre-selected gestures defined in Indian Sign Language.

A Clustering Algorithm Based on Topology Adaptive Distributed: A Comparative Study
Authors:- Dr. Akhilendra Kumar Khare, Prof. Chandra Kumar Jha

Abstract:- This Paper measure the performance a TACA (Topology Adaptive Clustering) Algorithm that aim to choose least integer of group heads to play down the numerals of hubs within the essential back bone.To memorize its one-hop neighbors algorithm uses the Neighbor Detection Protocol (NDP) . The algorithm which is dispersed in environment that reviews only the confined topology to choose a group head. Specifically, hub having the maximum weight between its one-hop neighbor is chooses as the group head. Average mobility and its available battery power is assuming only by calculated node weight. This paper moreover bargains with the vitality utilization of the distinctive portable hubs in different working modes. The cluster support techniques to back the hub portability in addition to hold the cluster control structure are too incorporated in this paper.

Deep Convolutional Neural Network Based Knee Injury Classification Using Magnetic Resonance Imaging
Authors:- Rishi Pandey , Soumya Mitra

Abstract:- Radiologists tend to possess human error during pathologies scans for any abnormalities, thus the introduction of automation shall have a great impact on accurately detecting injuries and more musculoskeletal examinations. Magnetic Resonance Imaging (MRI) scans are an effective method to detect injured sections but the process tends to be time-consuming and prone to human error. Therefore, our paper highlights the automation impact on knee MRI for abnormal, anterior cruciate ligament (ACL), meniscal damages using deep learning. Deep learning model such as Convolutional Neural Network (CNN) can infer the representation of images due to its properties: local connection and shared weights. We have explored two deep CNN models (VGG16 and VGG19) with transfer learning approach to predict knee injury on MRNet dataset collected by Stanford University. The classification accuracy obtained for abnormal, ACL tear and meniscal tear are 85.83%, 70% and 76.67% respectively using VGG16 whereas 83.33%, 67.50% and 68.33% respectively using VGG19 model.

Evaluation of Physical and Chemical Properties Concrete Incorporating Silica Fume and Nano-Sio2
Authors:- M.Tech. Scholar Vaibhav Saxena, Assistant Professor Anuj Verma

Abstract:- Silica fume concrete (SFC) is used for concrete mixtures, which possess workability, strength, high density, low permeability and resistance to chemical attack. The addition of Silica fume (SF) has proved to improve both the compressive strength and durability of concrete. From the earlier research, they found the optimum percentage of silica fumes to replace cement is 13% which used in this work. Silica fume is one of the by-products of silicon metal (or) it also knows as silicon alloy metal factories. The silica fume was considered as the waste industrial materials. Silica fume is also called as the condensed silica fume, micro silica and Volatilized silica. Due to its very active and high pozzolanic property it became the most valuable by-product among the pozzolanic materials. It is used in the concrete to improve its properties and it also increases the compressive strength. The color of silica fume is either premium white (or) premium grey. Silica fume (SF) is generated by the silicon metal or by ferrosilicon that which producing by industry. The compressive strength of each concrete decreases water– cement material ratio increases.

Autonomous Ocean Garbage Collector
Authors:- Sagar Gavade , Ghanashyam Phadke, Shrikant Somal, Praful Gaikwad, Mahesh Mane

Abstract:- This paper describes an automatic ocean garbage collector robot for collecting garbage floating in the ocean. Debris and plastic built-up everywhere on the water surface can be cleaned using this robot. The Automatic Ocean Garbage Collector is designed by implementing the concepts of various fields such as Embedded, Electric and Mechanical system as well as IOT cloud. Apart from cleaning it also alerts the system about the polluted water area depending on temperature, humidity and conductivity of water. The core idea behind the project is to build a reliable and cost-efficient robot.

An Investigation Report on Strength Charecteristics of Steel and Glass Fibers Insteed of Reinforcement In Concrete
Authors:- Post Graduate, D. Mounika, Assistant Professor G. Teja

Abstract:- – The Concrete preparation can do with Portland cement. This Ordinary Portland Cement having different types if characteristics: The concrete is strong in compression but is weak in tension. The concrete having the general structural weakness like cracks that are start to form as soon as concrete is placed and before it has properly hardened. These cracks are major cause of weakness in concrete particularly in large on-site applications leading to subsequent fracture and failure and general lack of durability. The weakness in tension can be overcome by the use of conventional rod reinforcement and to some extent by the inclusion of a sufficient volume of certain fibres.Fibre reinforced concrete (FRC) may be defined as a composite material made with Portland cement, aggregate, and incorporating discrete discontinuous fibres.Fibre- reinforced concrete (FRC) is concrete containing fibrous material which increases its structural integrity. It contains short discrete fibres that are uniformly distributed and randomly oriented – each of which lend varying properties to the concrete. In addition, the character of fibre-reinforced concrete changes with varying concretes, fibre materials, geometries, distribution, orientation, and densities. Steel Fibre reinforced concrete is a composite material consisting of cement paste, mortar or concrete with closely spaced and uniformly dispersed fibres It is also known as FRC. In this experimental investigation, an attempt has made to find out strength related tests like Compressive Strength, Split Tensile Strength, Flexural Strength using Pure concrete, steel fibres and Glass Fibres with to volume fraction of 0.0%,0.25%,0.5%, 0.75% and 1% and for aspect ratio and considered for M40 Grade of concrete. A total No. of 81 specimens were casted, cured and tested. The real contribution of the fibres is to increase the toughness of the concrete, under any type of loading and permit the fibre reinforced concrete to carry significant stress over a relatively large strain capacity in the post cracking stage. The results of the tests showed that the strength properties are enhanced due to addition of glass fibres.

The Characterization and Evaluation of Some Edible Oils for Their Frying Stability
Authors:- Abhilash Babu G

Abstract:- The oils and fats are used for frying foods which are a staple of the fast food industry in India.Such foods are very popular because of their desirable flavour,attractive colour and crispy texture.But eating too much of these foods can leads to serious health problems.The frying also cause substantial changes to physio-chemical-sensory-nutritional qualities of cooking oils.In this study,the most commonly and frequently used edible oils in India viz.,sunflower oil,palmolein oil and coconut oil, are analysed before and after frying to evaluate their quality during frying purposes.

Smart Agriculture Monitoring System Using Iot
Authors:- Assistant Professor D. Betteena Sheryl Fernando, UG Students M. Sabarishwaran
R. Ramya Priya, S. Santhoshini

Abstract:- Climate changes and rainfall has been erratic over the past decade. Due to this in recent era, climate-smart methods called as smart agriculture is adopted by many Indian farmers. One of the important applications of IOT is Smart Agriculture. It reduces wastage of water, fertilizers and increases the crop yield. Smart agriculture is an automated and directed information technology implemented with the IOT (Internet of Things). IOT is developing rapidly and widely applied in all wireless environments. In this project, sensor technology and wireless networks integration of IOT technology has been studied and reviewed based on the actual situation of agricultural system. Temperature sensor, Moisture sensor and pH sensor which senses the temperature, moisture content and pH in the soil. A combined approach with internet and wireless communications, Remote Monitoring System (RMS) is proposed. Major objective is to collect real time data of agriculture production environment that provides easy access for cultivation and increases the crop yield. By monitoring the field using the IP address Nutrient deficiency in the soil are detected and rectified.

A Review on Three-Dimensional Performance Analysis of Circular Fin Tube Heat Exchanger
Authors:- M.Tech. Scholar Abhishek Mishra, Prof. D.K.Mudaiya, Prof. Nitin Tenguria

Abstract:- In recent years, thousands of numerical and experimental studies have been performed on heat exchangers with different configurations. Mainly heat transfer and frictional characteristics have been studied in detail with respect to different geometrical parameters in various ranges of Reynolds number. Further these studies have been cross verified with researches already performed in this field. With the advent of new tools like CFD for the study of thermo-hydraulic characteristics, it has becomes easier to understand flow phenomena around the tubes for different rows and also in rest of flow regions. These studies also bring about some correlations so as to easily find the values ofcolburn and friction factor for various different geometrical parameters so as to suit to the different industrial conditions and requirements. An overview of the work already done on plate fin heat exchangers is presented in this paper.

A Study on Partial Replacement of Course And Fine Aggregate by Coconut Shell and Quarry Dust Mix
Authors:- Post Graduate, G. Teja Sree, Assistant professor, Mr. G. Teja,

Abstract:- In developing countries where concrete is commonly used, increase in cost of concrete made construction extremely pricey. The production of concrete require a choice of materials like Cement, Fine aggregate and Coarse Aggregate. Due to wide usage of concrete cost of materials is being increased. So another material is used for partial replacement of Fine aggregate and coarse aggregate in concrete. Main aim of this project is to decrease the cost of concrete. Research work have been conducted with gathering of materials required, the data required for mix design are obtained by sieve analysis and specific gravity test. Sieve analysis is carried out from a variety of fine aggregates (FA) and coarse aggregates (CA) samples and the sample which suit the condition is selected. Specific gravity tests are carried out for fine and coarse aggregate. FA is replaced by Quarry dust of 30 % along with the partial replacement of CA with coconut shell. Coarse aggregate is replaced with 10 %, 20%, 30% and 40 % by coconut shell. Design Mix used is M20 grade (1:1.5:3) with W/C Ratio 0.5.The Conventional concrete and Coconut shell with quarry dust concrete specimens were casted and tested for compressive strength and split tensile strength for 7 and 28 days. The compressive strength of the CS10%+QD30% and CS20%+QD30% was 24.35N/mm2 and 24.98 N/mm2, Split tensile strength is 3.45N/mm2 and 3.500N/mm2 respectively at 28days.A Study On Partial Replacement Of Coarse And Fine Aggregate By Coconut Shell And Quarry Dust Mix.

Vertex Edge and Equitable Vertex Edge Domination of Topologically Indexable Graphs
Authors:- Assistant Professor (Sl. G) Dr. S. Chitra, Assistant Professor (O. G) Ms. N. Prabhavathi

Abstract:- Let G = (V, E) be a simple graph. Let τ be a topology on V(G).We define a topology on V(G) and given a topology on a non-empty finite set V, and graph G(T) with vertex set V is called topological graph. In this paper we have identified the Perfect domination number, Vertex – Edge domination number, Equitable vertex-edge domination number Maximal vertex-edge domination number of graph G(T), also an attempt is made to identify the topologically indexable total Hamiltonian line graph.

Optimisation of Process Parameters for MIG Welding byUsing Grey Relational Analysis
Authors:- M. Tech. Scholar Benazir Aftab, Prof. Yogesh Mishra

Abstract:- The welding of Aluminium is a big challenge by conventional arc welding process and repeatability of welding depends on its control on welding speed and other processing parameters. In this study, GMAW welding of 5 mm thick mild steel was done by changing the welding current, gas flow rate and nozzle to plate distance to get a high strength joint. To get better strength welding of the MS plate is done from both side. The main aim of the study was to analyse the Effect of welding current, gas flow rate and nozzle to plate distance on the tensile strength of weld joint, micro hardness of the weld pool and macrostructure of the joint. The mechanical properties under consideration for present work were the Tensile Strength and Hardness. Tensile Strength and Hardness were determined using UTE100, with capacity of 100kN and Rockwell hardness tester respectively. It was found that preheat temperature has the most significant effect on the tensile strength and hardness. The maximum tensile strength and hardness achieved was welding current 124 A, gas flow rate 15 l/min and preheat temperature 275°C.

Experimental Investigation on Strength and Flexural Strength of Concrete by Partially Replacement of Cement by Coconut Endocarp Ash
Authors:- PG Student Aravind G , Asst. Prof. C. Gurumoorthy

Abstract:- Conservation of natural resources and prevention of environment should be considered predominant along with any kind of continuous technological and industrial development by minimizing quantity of waste disposal. If some of the waste materials are found suitable in concrete making, the cost of construction can be cut down, but also safe disposal of waste materials can be achieved. So, an attempt has been made to access the suitability of different replacement materials in the concrete production. The project is implemented by using coconut endocarp ash as a partial replacement material for cement. The experimental investigation is done on M30 grade concrete and its engineering properties were analysed using OPC cement along with coconut endocarp ash following standard mix design procedure. The compressive strength and tensile strength at 7 days ,14 days and 28 days of conventional concrete and concrete prepared using cement replaced in ranges of 5% with coconut endocarp ash to be measured. Finally, the results and graphs to be plotted. The flexural strength on beams using conventional concrete and concrete with partial replacement has to be studied and results will be compared.

Content-Based Retrieval in Cloud Image Repositories
Authors:- M.Tech. Student Krishna S.S., Professor Asha A.S.

Abstract:-Multimedia visual data have been increasing to store the cloud computing in recent years, following the emergence of many high interactive multimedia services and applications for mobile devices in both personal and corporate scenarios.This has been a key driving factor for the adoption of cloud-based data outsourcing solutions. Framework may fully supported in multi media data ex(images,video,audio)the main activity on this framework it may chunk the large amount of the data and using the Encryption for each chunks. The security process may high at this frame work high interactive multimedia
services and applications for mobile devices in both personal and corporate scenarios. This has been a key driving factor for the adoption of cloud-based data out sourcing solutions.

A Population Model with Stochastic Processes and a Fitness Mechanic
Authors:- Parth Adhia, Raj Joshi, Aditya Agashe, Mihir Rastogi, Gil Shteyman

Abstract:-We create a simulation modeling population growth, building upon the work of D J Aldous. Aldous creates an elementary model of city growth, akin to the “Chinese restaurant process”. His two determinants of growth are and, which are two constants which influence the behavior of the simulation. However, the real world is the result of a myriad of factors, and we wish to better illustrate that. Thus, we add further parameters to Aldous’s paper to represent a more accurate depiction of real-world behaviors. Added features include “fitness”, representing age and health, which influence tendencies for individuals to migrate based on preference and conditions. In addition, we have six inputs that dictate the behavior of the model’s growth. In addition to Aldous’s and , we utilize B, birthrate, C0, a constant of influence, c, the rate of immigration, and m, an indication of when people migrate. Together, these inputs and factors create a more realistic sample of real-world city growth phenomena. An analysis of the resulting data yields many patterns regarding total population, expected number of cities, the emergence of an infinite population, and critical points.

Investigation The Impact of Inorganic Fillers on The Electrical and Physical Properties of Resin Epoxy
Authors:- Shaimaa Mohamed Sayed Khodary, Loai Nasrat, Ahmed Abdel-Aziz , Anke Klingner

Abstract:-Epoxy micro composites with high loading of micro (silicon dioxide, magnesium hydroxide and mica) were fabricated and their electrical and physical properties were characterized .The main aim of this research is to enhance the performance of resin epoxy as an insulation materials. The micro and nano silicon dioxide are used as inorganic fillers to support the resin epoxy. The flashover voltage test was carried out to investigate the difference between the two fillers. The contact angle measurement was carried out to investigate the hydrophobicity among three types of micro fillers (silicon dioxide, magnesium hydroxide and mica).

Predicting the Post Covid-19 Trend of Indian GDP and Its Main Contributors
Authors:- Namrata Weling, Manasi Desai

Abstract:-Forecasting is the process of estimating the future predictions based on the historical data. However, due to global pandemic it has become difficult to predict the GDP of India in the coming years based on the past data. This study has attempted to shed light on predicting the future GDP of India and has considered the factors that contribute to the Indian GDP like Unemployment Rate, Population and Labour Force Participation Rate. This paper also focuses on the individual sector contribution to the Indian GDP. These sectors include Agriculture, Industry and Service. Data on GDP has been collected from year 2008 to 2019 from various research websites such as statistics times and trading economics. Data on state-wise GDP of India has been collected from various publications of the Reserve Bank of India. The unemployment rate, Population and labour force participation rate data has been collected from the world bank. A multiple linear regression model has been fitted on data to determine the relationship between unemployment rate, population and labour force participation rate with Indian GDP. Results suggest that as the unemployment rate increases the Indian GDP decreases and as the population increases GDP also increases. Based on this model, further values of Indian GDP were forecasted for the coming years. A linear regression model was used to predict the contribution of three sectors i.e. agriculture, industry and service sector, and the state-wise GDP of top nine contributing states in India was predicted. We hope to assist the policy makers and businesses to formulate economic and business strategies in turn more precisely through the findings of our research. It will also help investors in decision making, as to whether or not to invest in a particular sector, and which sector needs investment to be stabilized or prevented from a drastic fall.

SMARTUS
Authors:- Varsha Babu, Sandra Mariya M Anil, Neha P, Liya C George, Reshma K V

Abstract:- Forecasting is the process of estimating the future predictions based on the historical data. However, due to global pandemic it has become difficult to predict the GDP of India in the coming years based on the past data. This study has attempted to shed light on predicting the future GDP of India and has considered the factors that contribute to the Indian GDP like Unemployment Rate, Population and Labour Force Participation Rate. This paper also focuses on the individual sector contribution to the Indian GDP. These sectors include Agriculture, Industry and Service. Data on GDP has been collected from year 2008 to 2019 from various research websites such as statistics times and trading economics. Data on state-wise GDP of India has been collected from various publications of the Reserve Bank of India. The unemployment rate, Population and labour force participation rate data has been collected from the world bank. A multiple linear regression model has been fitted on data to determine the relationship between unemployment rate, population and labour force participation rate with Indian GDP. Results suggest that as the unemployment rate increases the Indian GDP decreases and as the population increases GDP also increases. Based on this model, further values of Indian GDP were forecasted for the coming years. A linear regression model was used to predict the contribution of three sectors i.e. agriculture, industry and service sector, and the state-wise GDP of top nine contributing states in India was predicted. We hope to assist the policy makers and businesses to formulate economic and business strategies in turn more precisely through the findings of our research. It will also help investors in decision making, as Purpose of this project to monitor the growth of multiple crops in the farm as well as providing the water to the particular crop as much it is required. It uses two sensors namely Soil Moisture Sensor(YL-69) and humidity and temperature sensor(DHT11). Soil moisture sensor it sense moisture of soil and DHT11 senses the humidity and temperature. By providing all these information it provides water to the plant. Apart from these image is captured through the pi-camera by which we compared the growth of plant by camera to the data saved on server. For daily water supply if there is rain outside then water is already absorbed by soil then water requirement of plant is change, then according to the need we provide the water to plant. The data of previous water supplied to the plant is stored on server also requirement of water for crop is determined through the information recorded on the server.to whether or not to invest in a particular sector, and which sector needs investment to be stabilized or prevented from a drastic fall.

Preparation and Characterization of Magnetite (Fe3O4) Nanoparticles with and Without Surfactant
Authors:-Saranya G. M.Sc, M.Phil.

Abstract:- Magnetite nanoparticles (Fe3O4) represent the most promising materials in medical applications. They have attracted extensive interest due to their super paramagnetic properties and their potential applications in many fields. Magnetite (Fe3O4) nanoparticles have found to be a potential material in several areas, such as biomedical [1–2], target drug delivery [3], tumor, cancer diagnosis and treatment [4] and as a magnetic resonance imaging (MRI) contrasting agent [5]. There are several techniques such as Chemical Bath Deposition, Hydrothermal method, Solvothermal, Co-precipitation method, Chemical Vapour Deposition and Sol-Gel method, Emulsion method, Arc discharge used for the preparation of Magnetite (Fe3O4) Nanoparticles. Among these methods, solvothermal method has been selected for the present work as it is simple, economic and non-polluting. This has been employed to synthesis Magnetite nanoparticles (Fe3O4) with and without the aid of surfactants, because there are several obvious advantages of the solvothermal technique over the traditional solid-state reactions. Also made investigate on structural, morphological and optical properties of the materials.

A Survey on Sales force and AI
Authors:-Sarthak Ghosh

Abstract:- Salesforce is very demanding cloud computing technology in IT industry, which is available on cloud, no need install any software as well as no hardware required. Salesforce.com (SFDC) is currently number one on demand CRM, which runs on force.com platform, as well as CRM is a model used to manage organization interactions like phone calls, Emails, Meetings, issues, Social media with customers and also prospects penetrating to Sales, Marketing and Support. In this paper, we are discussing about Introduction to Cloud Computing, Service models in Cloud Computing, Types of Cloud Computing, Architecture of Cloud Computing and Introduction to MVC as well as SFDC MVC. Further discussing about Introduction to Salesforce, SOQL,Apex and Its Comparison Operators and at last covering Force.com IDE and CRM. The aim of this paper is to show mainly importance of Salesforce.com which is a software giant that manages to give the buyer a easy to use as well as extremely effective CRM solution.Salesforce Research has made significant progress in deep learning and natural language processing (NLP) over the course of the last year that address these challenges and also make good spot in AI. We’ve built faster, more scalable model architectures and stable model, developed a reinforcement learning agent that programs new neural network architectures, and improved training methods in order to take full advantage of the huge of data currently available and to increase model performance for each individual NLP task. Today, Salesforce excited to announce new breakthroughs that bring us closer to a unified approach to tackling the many facets of natural language, paving the way for humans and machines to communicate more effectively and work side-by-side.

An Automated Intrusion Detection System by Using Artificial Immune System
Authors:- Assistant Professor Anjul Rai , M. Tech. Scholar Kalyani Takpure

Abstract:- In recent years, this area has seen significant advancesinwith the increasing network attacks worldwide, intrusion detection (ID) has become a hot research topic in last decade. Technologies such as neural networks and fuzzy logic have been applied in ID. The results are varied. Intrusion detection accuracy is the main focus for intrusion detection systems (IDS). Most research activities in the area aim to improve the ID accuracy. This paper focuses on an artificial advanced immune system (AIMS) based network intrusion detection scheme is proposed. An optimal feature selection and parameter quantization algorithms are defined. The difficult subject is addressed in the design of the algorithms. The scheme is tested on the widely used KDD CUP 99 dataset. We found good agreement when comparing our method with results from previous scheme outperforms other schemes in detection accuracy. In our experiments, a number of feature sets have been tried and compared. Compromise between complexity and detection accuracy has been discussed in the paper.

DC Power System with Super Capacitor &Sepic Converter Monitoring Using IOT
Authors:- P. Anushya, R. Brindha Devi, R. Deepika, P. Jayanthi, Assitant Professor A. Pradeep

Abstract:- As the conventional energy resources are depleting there is an urgent need for switching to renewable energy resources as well as increasing its functionality. This project proposes a design of solar power system fed by a photovoltaic source with a super capacitor storage system and sepic converter. The super capacitor has the fastest charging time compared to all other storage devices and also guarantees a longer lifetime in terms of charge cycles and has a large range of operating temperatures, but has the drawback of having low energy density. The lithium battery has higher energy density but requires an accurate charge profile to increase its lifetime. Combining the two storages is possible to obtain good compromise in terms of energy density. Sepic converters allow output from converters to be higher or lower than its input and allow the output to be non-inverted state with respect to input. It also reduces the amount of harmonics present in the output. A Controller is added between the solar panel and the battery to improve the system performance. The solar power system is controlled and monitored using Arduino microcontroller.

Analysis on Performance and Emission Characteristics of Extended Expansion Lean Burn Spark Ignition Engine
Authors:- Research Scholar D. Damodara Reddy, Professor G. R. Selokar (Supervision)

Abstract:- A thermodynamic modelling of extended expansion lean burn has been developed to predict the performance and emission characteristics. Experimentally a single cylinder four-stroke water-cooled diesel engine has been converted to operate as SI engine. To achieve lean combustion thefollowing modification were done, combustion chamber was modified to enhance and swirl and squish, copper as a catalyst was coated on the cylinder head and piston crown, and high energy transistorized coil ignition (TCI)system was used to ignite lean mixture.The top dwell of the intake cam were increased to delay intake valve closing. Four different top dwell were formed in the camshaft to achieve the intake valve closing timing 93º 113º 125º, 134º after BDC corresponding to the ER/CR ratio of 1.25, 1.5, 1.75 and 2 respectively. A side draught carburetor was used in the modified engine. Since delay of IVC increases, the quantity of charge pushed back also increases, thus lesser amount of charge will be retained inside the engine cylinder. Considering the maximum brake thermal efficiency and minimum BSFC, ER/CR ratio 1.5 and air-fuel ratio about 20 is found to be optimum. When the lean limit extend from an air-fuel ratio 17 to 20, EEE with ER/CR ratio 1.5 shows about 16.55% improvement in brake thermal efficiency, 21.45% decrease in BSFC, 53% reduction in NOX emission, 15.39% increase in UBHC emission, 45.38% reduction in CO emission. The maximum brake thermal efficiency and volumetric efficiency was observed at 1400 rpm.

Digital Marketing Stratergy and Role of SEO
Authors:- Research Scholar Chinmay Kapoor, Assistant Professor Dr. Manisha Raj

Abstract:- This study examines the digital marketing and role of search engine optimization. As the world has progressed into era of digitalization and technology is playing an integral part in everyone’s life. Digital Marketing has become a backbone for all the business houses to promote their market through online means with the help of internet. The overall purpose to study and writes on this topic is to broaden my knowledge about the concept of SEO which has become very important for every online business firm and how big role it plays while digital marketing. The basic design of study is to focus on the term digital marketing which has impacted all the business firms who wants to take their business online and how SEO has assisted them in doing that. The paper is based on the primary tools and in the end paper present various data about the current as well as the future trends of topic with graphs and charts collected from various sources alongside the Review of Literature. JEL Classification Code: M310, O35, O36

Inventory Management System in Construction of Buildings
Authors:- PG Student S. Kavin Prabu, Assistant Professor C. Gurumoorthy

Abstract:- The concept of inventory management system has been one of analytical aspects of management establishing control over purchase, storing and to keep track of the materials , workforce, equipment and production units involved for construction projects. The proper management of this component can improve the productivity and cost efficiency of a project. One of the major problem in delaying construction projects is poor managing systems. The inventory management system for construction industry involves procurement, identification, transport and storage of materials in construction projects. The main objective of our study is to investigate the efficiency and its impact in application of inventory management system in construction of small scale projects. Identification of impacts and risk influence of inventory management systems in a small-scaleprojects. The lack of proper handling and storage of material in construction site has made it difficult to track and locate the material availability and suggestion about inventory management system and its control over efficiency construction projects will be analysed and the outcome of the effective utilization of inventory at construction site of small scale project to overcome the difficulties by giving best the possible recommendations. ABC analysis is one of the most conventionally inventory management system suited for construction infrastructure.

Development of Aluminium Metal Matrix Composite and Its Characterization
Authors:- Research Scholar Pavan Balappa Bagali, Registrar Professor Dr G. R. Selokar (Supervision)

Abstract:- The hardness of the composites increments with expanding the measure of fortification. Change in wear conduct of the rutile molecule fortified composites was checked with sliding separation at various stacking conditions. It was seen that wear pace of the all composites increments with expanding the connected burden from 9.8N to 49N. Delamination wear is unmistakable at higher burden as a result of the discontinuity of oxide layer which covers the surface because of the quickened oxidation of the metal surface layers in contact.The composites fortified with fine particles displayed better wear conduct when contrasted with composites strengthened with coarse particles. Fine size rutile particles have less molecule to molecule separation in the matrix which builds the ability to move the heap from matrix to molecule and henceforth decreases the wear pace of the composite. The postponed change in wear from gentle to extreme at temperature from 200ºC to 250ºC is seen in the 20wt.% rutile fortified composites at 9.8N burden. The composite with 20 wt.% of fine size particles shows better wear opposition at low loads and temperature conditions in contrast with other creted composites.

Diagnosis of Brain Tumor Identification Based on a Deep Learning Model
Authors:- M.Tech. Student S. Naveen Kumar, Assistant Professor & Hod P. Bhanu Prakash Reddy

Abstract:- A brain tumour is a dangerous problem and its categorization is a difficult work for radiologists because of the complex scenery of the tumour cells. Freshly, computer-aided diagnosis-based systems have confirmed as assistive tools, to diagnose the brain tumour, by MRI (magnetic resonance imaging). In modern applications of pre-trained designs, generally, features are removed from bottom layers which are separate from general pictures to medical check-up images. To conquer this difficulty, this research suggests a process of multi-level characteristics removal and concatenation for the early identification of a brain tumour. Two pre trained deep learning models i.e. Inception-v3 and DensNet201 obtain this model validly. With the guidance of these two models, two distinct summaries of brain tumour recognition and its categorization were evaluated. First, the characteristics from various Inception modules were removed from the pre-trained Inception-v3 model and concatenated these characteristics for brain tumour categorization. Then, these characteristics were transferred to the softmax classifier to analyze the brain tumour. Second, pre trained DensNet201 was use to eliminate characteristics from various Dens Net blocks. Then, these features were concatenated and distributed to the softmax classifier to analyze the brain tumour. Both summaries were evaluated with the help of a three class’s brain tumour dataset that is possible publicly. The advanced mode contributed 99.34 %, and 99.51% testing efficiencies individually through Inception-v3 and DensNet201 on testing examples and achieved the most powerful performance in the identity of brain tumour. As outcomes indicates, the introduced technique based on features concatenation utilizing pre-trained models outperformed as related to current state-of-the-art deep learning and machine learning-based techniques for brain tumour classification.

Agricultural Disease Identification Based on Feature Enhancement and Datfgan
Authors:- M.Tech. Student S. Naga Raju, Assistant Professor & Hod P. Bhanu Prakash Reddy

Abstract:- The agricultural economy needs to identify farming diseases. For farming disease image identification, collected imagery are usually blurred, which can be reach to poor identification results in original invention environments. The quality of picture has a notable impact on the identification efficiency of pre-trained picture classifiers. To eliminate this difficulty, the proposed scheme can generative adversarial network with dual-attention and topology-fusion mechanisms called DATFGAN. This system can efficiently convert unclear images into bright and high-resolution images. In addition to this, the weight sharing plan in our advanced network can significantly decrease the number of parameters. Laboratory results explain that DATFGAN yields extra visually satisfying results than state-of-the-art methods. Furthermore, managed images are estimated based on identification tasks. Detection of plant leaf disease through some electronic procedure is beneficial as it reduces an extra effort of monitoring in large fields of crops, and at the very early stage itself it identifies the marks of diseases i.e. when they arrive on plant leaves.

Manufacturing Of Bimetallic Pistons and Its Surface Integrity
Authors:- Research Scholar Sumeet Hangargi, Prof. G. R. Selokar

Abstract:- To ensure better bonding, the insert is dipped in the molten aluminium bath, this dipping time playing a vital role. Achieving the near net shape of the bimetallic pistons without damaging the bonding between the aluminium and cast iron is the major challenge. Weight reduction and wear resistance, bimetallic pistons are used. Aluminum alloy is reinforced with cast iron insert to realize the bimetallic pistons. Nevertheless, as far as machinability is concerned, achieving the near net shape of the bimetallic pistons without damaging the bonding between the aluminum and cast iron is the major crisis. The bond integrity after machining is primarily related to the magnitude of the cutting forces during machining and thus the objective of the paper is to obtain optimal cutting parameters in turning of such pistons. In addition, any machining process should also satisfy surface finish requirements. A Taguchi analysis of the influence of cutting speed, feed, and depth of cut on cutting force were conducted and the extent of debonding and the surface finish was measured.

A Review Article of Reduction Power Loss with Optimization of 33 Bus Load Flow System
Authors:- M.Tech. Scholar Bharat Shakya, Assistant Professor Durgesh Vishwakarma

Abstract:- Power flow analysis stands out as the foundation of power system preliminary research as well as design. They are really essential for planning, operation, economic scheduling and interchange of power between utilities. The primary facts concerning power flow analysis are to identify the magnitude and phase angle of the voltage at every single bus and the real and reactive power flowing in each transmission system lines. The load flow study in a power system comprises a study of extremely important significance. The analysis uncovers the electrical performance and power flows (real and reactive) for stipulated circumstances whenever the system is functioning under the consistent state. This paper gives an overview of various techniques useful for load flow study under distinctive stipulated conditions.

Packing Automation in a High Variety Conveyor line via Image Classification
Authors:-B. Arjun, Vidhu Hari, Dileep Chandran, Assistant Professor Ajay Basil Varghese

Abstract:- Due to the rise in computational power available, there has been a steady increase of interest in fields such as image recognition and machine learning. Consequently, one of the best areas for its application is in the field of factory automation since it requires processing of large amounts of image data within strict time constraints. Implementing such systems has become much easier due to the rise of machine learning frameworks such as Tensorflow. Hence implementing a Machine learning based inference model to do routine tasks such as object identification and verification can greatly increase the overall efficiency and offer great monetary returns by minimizing human labor. An SSD Mobilenet based model was used for this purpose for its speed and accuracy.

A Review Article of Improvement of Grid Connected Photovoltaic System Using Artificial Neural Network
Authors:-M.Tech. Scholar Soni Roy, Assistant Professor Durgesh Vishwakarma

Abstract:- Nowadays in order to meet the increase in power demands and to reduce the global warming, renewable energy sources based system is used. Out of the various renewable energy sources, solar energy is the main alternative. But, compared to other sources, the solar panel system converts only 30–40% of solar irradiation into electrical energy. In order to get maximum output from a PV panel system, an extensive research has been underway for long time so as to access the performance of PV system and to investigate the various issues related to the use of solar PV system effectively. This paper therefore presents different types of PV panel systems, maximum power point tracking control algorithms, power electronic converters usage with control aspects, various controllers, filters to reduce harmonic content, and usage of battery system for PV system. Attempts have been made to highlight the current and future issues involved in the development of PV system with improved performance.

Image Forgery Detection Using Convolutional Neural Network
Authors:-Alvina Aslam, Ankita Saxena, Sonali Saxena, Vaishnavi Raman Dwivedi
Assistant Professor Manish Gupta, Assistant Professor. Priyanka Goel

Abstract:- With the advancement of high-resolution digital cameras and photo editing software featuring new and advanced features, the chances of image forgery have increased. The images can now be altered and manipulated easily. Image trustworthiness is now more in demand. Images in courtrooms for evidence, images in newspapers and magazines, and digital images used by doctors are few cases that demands for images with no manipulation. In this paper we discuss some of the types of image forgery and techniques to fight against these forgeries. he revolution in the digital world is changing the way in which we share and manipulate data, but this revolution has introduced many critical security issues that hampers the integrity of digital media. Many sophisticated digital technologies and photo-editing software like Adobe Photoshop have made the manipulation of images a fair practice. As a result, digital images are becoming prone to forgeries and hence trust in digital images has been eroded. Digital forgery is now a nightmare to individuals (e.g. fake images of celebrities and public figures), societies (fake images targeting religion or race), journalism, scientific publication etc. The existing image forgery detection techniques are widely divided into two categories-Active Approach and Passive (blind) Approach. Active approaches rely on pre-registration or pre-embedded information. A shield is produced for the images to protect them from being manipulated. It is mainly based on digital watermarking. The main disadvantage of this approach is that the protection against manipulation must precede any attempt of forgery which means the pre-existing digital images and data cannot gain any profit using the approach. Passive approach overcomes this disadvantage; the pre-existing images can also be catered using this approach. In this project, we propose the use of Discrete Cosine Transform and a deep learning approach to learn features in order to detect tampered images. Among different types of image forgery, copy-move forgery is the most popular to forge the digital imaged where a part of the original image is copied and pasted at another position in the same image. Different methods have been developed to detect the image forgery in digital images. To address this issue, we present a pixel-based copy-move forgery detection method to check the genuineness of digital images.In this project we detect region duplication forgery by applying Discrete Cosine Transform. We divide the image into overlapping blocks and then search for the duplicated blocks in the image. Proposed method includes the following steps: (1) convert the color image into gray-scale image, (2) divide the gray-scale image into overlapping blocks of size 8 × 8, (3) feature extraction using DCT on the basis of different feature sets,(4) Implementation of Convolutional Neural Network.

Utilizing Cloud Computing for Stronger Healthcare Data Security
Authors:- Ashish Gupta, Akhilesh Bansiya

Abstract:- The main objective of this project is securely store and maintains the patient records in the healthcare. HealthCare is a data-intensive domain where a large amount of data is created, disseminated, stored, and accessed daily. The block chain technology is used to protect the healthcare data hosted within the cloud. Healthcare data contain personal and sensitive information that may be attractive to cybercriminals. Cybercriminals seeking to benefit financially from the theft of such data may sell the data to a third-party provider,. Such data would be of interest to certain organizations or industries. The block that contain the medical data and the timestamp. Cloud computing will connect different healthcare providers. It allows healthcare provider to access the patient details more securely from anywhere. It preserves data from attackers. The data is encrypted prior to outsourcing to the cloud. The healthcare provider has to decrypt the data prior to download.

Analysis of Channel Sensing Technique: A New Approach to Channel Estimating in Mobile OFDM System
Authors:- Atul Kumar , Akhilesh Bansiya

Abstract:-To analyse the performance of orthogonal matching pursuit (OMP)-based compressed channel estimation (CCE) with deterministic pilot patterns, we propose a mathematical framework by defining four normalized mean-square-errors (NMSEs): the total NMSE (NMSET), the NMSE on dominant channel components (NMSED), the NMSE caused by ‘lost errors’ (NMSEL) and the NMSE caused by ‘false alarms’ (NMSE F).Then, we derive a formula with a closed form for evaluating the upper-bound of NMSED in the ideal case (NMSED;UB). Using the proposed analytical framework, the main findings include the NMSE D;UB is determined by the following four parameters: the deterministic pilot pattern, the maximum Doppler shift, the number of dominant multipath components and the SNR the NMSE D;UB can be viewed as an approximation of practical NMSE T in case that the probability of the successes of OMP exceeds a certain threshold, in which both NMSE L and NMSEF are neglect able; using linear regression models, the practical bit-error-rate performance also can be predicted well based on the proposed NMSED,UB. We believe that the proposed framework provides a useful tool for adaptively optimizing pilot parameters according to rapidly time-varying channel conditions when using OMP based CCEs in mobile OFDM systems.

How Joyful Winds Turned to Turbulent Storm – Downfall of Jet Airways
Authors:- Vaibhav Jain, Namya Jain

Abstract:-After 25 years of soaring and raising standards of flying in domestic skies, India’s premium full service airline, Jet Airways completely halted it’s operations on 17 April, 2019. Founded in 1993 Jet Airways truly changed the flying experience and turned out to be first successful full service airline of the country. The airline enjoyed huge market share and strengthen it’s brand in early years of it’s commencement but the Indian environment is not conducive for the aviation industry. The industry faced certain challenges and with the rise in competition the situation got worse. This is not the first downfall of airline that the country has witnessed. Another full service flamboyant carrier, Kingfisher Airlines was also drowned in the similar fashion as Jet Airways in 2012. Two of India’s full service international airlines completely got shut in a decade raises questions on the scenario in which Indian airlines are operating, challenges the industry is facing and what measures government is taking to protect aviation industry. India, the second most populous country, is fastest growing aviation market and is currently world’s fourth biggest aviation market which shows the potential to jump to third spot in the coming years. Despite the fact airlines struggle to operate and failed to earn healthy profits essential to sustain in the market. Jet is not the only example of how an airline couldn’t sustain in the market, earlier Kingfisher also faced its doomsday back in 2012 and national carrier Air India is also at the mercy of the government where every year it sanctions special funds to keep airline flying. This sheds light that full service carriers have had faced troubles and still the airlines are operating on thin margins. New business model launched by budget carriers Indigo and Spicejet have made life even more difficult for full service carriers and people’s price sensitive nature and habits gave low cost carriers an edge over the full service airlines.

A Review on CFD Analysis for Erosion Effects on Elbows Containing Water Particles
Authors:- M.Tech. Scholar Harsh Singh Gurjar, Prof.Sujeet Kumar Singh

Abstract:-Erosion due to particulate impingement is the key factor responsible for damage of industrial pipeline. Sulfur particles carried by high-speed flow impact pipelines, which may cause equipment malfunctions and even failure. In recent years, Computational Fluid Dynamics (CFD) technology has been widely used in many industrial fields. Afterwards, multiphase flow simulation with the discrete phase model of CFD software had been extensively explored in various fields, including the effects of parameters of the continuous phase on erosion scars, simulation of erosion rate, and modification of the erosion model. In this study, a review work has been performed in the context of erosion effects on elbows containing water particles.

Android Malware Detection by Using Random Forest Algorithm
Authors:- Prof. Yogesh Pawar, Yash Gudhka, Manish Sutar, Pavan Godhani

Abstract:-Android is one of the biggest Operating System platforms in the world. By the end of 2019, Android has much advancement in its Operating System. Android is widely used due to its openness and the backup provided by Google. Google has launched its Google Playstore where Android users find applications for every need. Since Android is open to applications from other sources apart from Google Playstore, attackers find it easy to insert malicious code inside the Android application package file which can further harm the users. Hence to protect users from malicious applications Malware detectors are developed to find the malicious code within the APK file.

Multi-Grid Phase Field Skin Tumor Segmentation in 3D Ultrasound Images
Authors:-Lochan Gowda M, Poorvika Achar V, Madhushree C R, Likitha S, P Nanditha

Abstract:- The aim of this paper is to present a new method for skin tumor segmentation in 3D ultrasound images. We consider a variational formulation the energy of which combines a diffuse interface phase field model (regularization term) and a loglikelihood computed using non parametric estimates (data attachment term). We propose a multi-grid implementation with exact solutions that has the advantage to avoid space discretization and numerical instabilities. The resulting algorithm is simple and is easy to implement in multi-dimensions. Concerning applications, we focus on skin tumor segmentation. The clinical dataset used or experiments is composed of 12 images with ground truth given by a dermatologist. Comparisons with reference methods show that the proposed method is more robust to the choice of the volume initialization. Moreover, thanks to the flexibility introduced by the diffuse interface, the sensitivity increases by 12% if the initialization is inside the lesion, and the Dice index increases by 59%, if the initialization covers the entire lesion. These results show that this new method is well-designed to tackle the problem of underestimation of tumor volumes.

Smart Energy Meter Surveillance and Billing Using IOT
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Mohd Owais Khan, Syed Omer, Mohd Asif Uddin

Abstract:- Electricity plays a cordial role in a day to day life. The electrical energy consumption inIndia is the third biggest after china and USA with 5.5% global share in 2016. The per person energy use rate in India is closer to 0.7 kw. India share with global energy demand will rise to 9% by 2035. Internet of things is an emerging field and IOT based devices have created a revolution in electronics and IT. The foremost objective of this project is to create awareness manual work, our existing electricity billing system has major has major drawbacks. This system gives the information on meter reading, power cut and the alert system for producing an alarm when energy consumption exceeds beyond the specified limit using IOT. This idea is being implemented to reduce the human dependency to collect the monthly reading and minimize the technical problems regarding billing process. This paper extends the design and implementation of an energy monitoring system with pre-intimation of power agenda using Arduino micro controller and GSM module. The advantage of this system is that a user can understand the power consumed by electrical devices on the daily basis and can take a further step to control them and thus help in energy conversation. From the electricity board section, the information regarding the bill amount, payment and the pre -planned power shut down details are communicated to the consumer. If the customer does not pay the bill in time, the user is informed through a message. If still the customer does not pay a bill, then as per designated consideration on, one alert message will be sent automatically power connection is disconnected from the remote server.

Energy Saving and Safety System Automation
Authors:- Asst. Prof. Sandeep Sheelwant, Mohd Gulzar, Md Sadeq, Tajammul Ahmed Khan

Abstract:- The main aim of this project is to save energy,Wastage of electricity is one of the main problems which we are facing now-a-days.Manytmes we leave the room and hall without switching of lights and fans,thus electricity is wasted.In this work we have presented a system in which energy will be saved based on number of people entering in or leaving out of the room.If there is no person in the room,then light and fan will be switched OFF.On the other hand as soon as any person enters the room,light and fan will be switched ON. On the basis of the intensity of sunlight we can increase or decrease the intensity of light.

Driver Assistant Systems Applied by Deep Learning Technology : A survey
Authors:-Zainab A. M. Al-Bassam, Intisar Al-Mejibli, Nazhat Saeed Abdul-Razaq

Abstract:- Increasing the number of vehicles and the tremendous development in the used techniques in the vehicles. In addition to, the increase in traffic accidents, which led to the rising of systems’ invention ofDriver Assistance Systems (DAS)that assist the driver in driving safely and discovery the ways by warning the driver about the dangerous situation in real time.This paper presents a study that highlighted the main approaches, methods, algorithms used to make smart assistant systems in the vehicles which used different architectures, tools, and sensors: GPS, Camera, Stereo camera, LIDAR, and Radar, Based on Deep learning algorithms, Computer vision, combined with deep learning and sensor fusion for years from (2011-2020).

Estimation of Erosion Rate on Elbows Containing Water Particles Using CFD
Authors:-M.Tech. Scholar Harsh Singh Gurjar, Prof. Sujeet Kumar Singh

Abstract:- Erosion due to particulate impingement is the key factor responsible for damage of industrial pipeline. In this study, the simulation work has been performed by using the combination of CFD code ANSYS Fluent along standard k-є turbulent model. The schematic model consists of a 90 degree bend pipe in which R/D ratio were set to be 10 mm and 1.5, respectively. Considering the influence of inlet flow field on simulation, a 100-mm (10D) vertical downstream straight pipeline and a 100-mm (10D) horizontal upstream straight pipeline of elbow were used.Erosion rates for particles of different R/D ratio are investigated at different inlet particle velocity. The Taguchi method was applied to find which of the three parameters among R/D ratio, Velocity of fluid, and Inner diameter of the pipe has the most effect on erosion rate and hence the optimum solution is obtained. It was find that Erosion is serious at the extrados of elbow and the junction between downstream pipeline and the intrados of elbow and The R/D ratio of the pipes has the biggest impact on the erosion rate compared to the other two variable.

Study of Hybrid Annuity Model ( HAM) Contract in Highway Construction Contractor and Owner Aspect
Authors:- Assistant Professor Shakti Singh

Abstract:-Following the policy change in the mid-1990s India has embarked on a brisk pace of highway development that gave a high priority to highway development in country. In 1997 to develop a large highway network in a relatively short period of time the National Highway Development Programme (NHDP) was launched. In India, road projects are awarded via : Build-Operate- Transfer (BOT)-Annuity, BOT-Toll,Design, Build, Finance, Operate and Transfer (DBFOT) model and EPC (engineering, procurement and construction) contract. After the BOT model of Public Private Partnership (PPP), an advanced version of the Model Concession Agreement (MCA), presently called as Hybrid Annuity Model (HAM) is paving way for road projects. Now National Highway Authority of India (NHAI) has adopted Hybrid Annuity Model (HAM) for highway development . The hybrid model is supposed to be a win-win situation for the government and developers. The government is expected to fund up to 40 percent of the project cost while the remaining 60 per cent to be funded by the private player, and thus easing the financial burden on the exchequer as well. This paper discuss the various features of HAM in road sector of India, later it compares the Hybrid Annuity Model (HAM) with the conventional DBFOT model of road construction so as to find out the benefit and risk associated with HAM both for owner & contractor prospective.

Question Answering Schemes: A Review
Authors:- M. Tech. Scholar Machhirke Vinod Kumar Sadhuram, Asst.Prof. Aparna Soni

Abstract:-Question Answering Systems (QAS) are turning into a model for the eventual fate of web search. In this paper we present an investigation of the most recent examination around there. We gathered distributions from top gatherings and diaries on data recovery, information the executives, computerized reasoning, web knowledge, characteristic language handling and the semantic web. We recognized and characterized the subjects of Question Answering (QA) being investigated on and the arrangements that are being proposed. In this investigation we likewise recognized the issues being most explored on, the most mainstream arrangements being proposed and the freshest patterns to assist specialists with increasing an understanding on the most recent turns of events and patterns of the exploration being done in the zone of inquiry replying.

Data Safety on Android Devices
Authors:- M. Tech. Scholar Rumana Nigar Ansari, Prof. Lakshita Landge

Abstract:- Today, everybody fundamentally requires an advanced cell. There are enormous measure of conceivable outcomes and various degrees saw in various zones of the portable world. With this fast development in portable administrations the analysts are frightened about the security dangers and are working upon it by making sure about the foundations which bolster the online-interface and other conveyed administrations. In this paper, we examine about utilizing AES calculation for dealing with the information of Android cell phones. The goal is to offer such types of assistance which can make sure about clients’ information. This information security procedure of PDAs is very novel.

Alcohol Drunk and Drive Accident Prevention System
Authors:- G. Adarsh, Rahul P.R, Vishnu Santhosh, Assistant Professor Prof. Simi M.S

Abstract:- Every year, people are injured or killed on the road because of drunk driving. In this prototype, we are making an attempt to prevent users from starting the car if they have consumed any alcohol and if they haven’t worn their seat belt. This system will take advantage of an MQ3 alcohol sensor, which is mounted on the seat belt of the driver seat. The reading from the sensor unit is compared with the allowed threshold value by the Raspberry Pi, if the driver is found drunk, the ignition locking system will prevent the driver from starting the car. The system is also mounted with a camera (Raspberry Pi Camera) to detect the driver’s presence so that the user may be prevented from trying to compromise it. The engine is started only when the user clears the alcohol test and the seat belt is engaged. The project is aimed to be implemented in real life to reduce the number of accidents caused by drunk driving and the carelessness of the driver to engage the seat belt.

A Study of Routing Protocol in Manet
Authors:- M.Tech. Student Muni, Rupali Malhotra

Abstract:- A mobile and ad-hoc network (MANET) is set of mobile nodes which communicate over radio and do not need any infrastructure. This kind of networks is very flexible and suitable for several situations and applications. Nodes not only have to fulfill the functionality of hosts, but each node has also to serve as a router, forwarding packets for other nodes. However, the performance of such networks has to be improved before this can be realized. Here in this paper I have proposed 2 step improvements in Ant Based Routing Protocol for enhancing improvement in the network and to reduce overburden of the network.

Neural Network Training by Genetic Algorithm Selected Feature for Intrusion Detection
Authors:- M.Tech. Scholar Pakija Sehar, HOD Dr. Avinash Sharma

Abstract:- With large increase of internet users network security is important issues in today era. As variety of users have different requirement, so proper identification of safe network is required.

Substation Automation Using PLCand SCADA
Authors:- Mohd Mansoor Ali, Ahmed Abdul Fatha, Md Uzairuddin, MA Hameed

Abstract:- The role is of substation is become more important in power system. The generating stations, transmission lines and distribution systems are the main components in substation system transmission lines switching, parameter measurement, fault detection and storing of historical data are carried out in each of the substation. Previously these activities was carried out manually, as complexity of system increase the role of substation become crucial and we need to move towards the use of IEDs and Automation. Activities carried out at substation are categorized in to three terms. supervision, control and Data acquisition. In an automated substation these are will be done using Programmable Logic controller and SCADA. For system monitoring or supervision data is given to controllers from RTU. Control command according to system parameter is produced by PLC and SCADA provide human machine interference. Substation automation systems make their control and monitoring possible in real time control and availability, reliability and security of the system.

Energy Efficient Integrated Protection System for Photovoltaic Microgrids
Authors:- M.Tech. Scholar Rajneesh Kumar Patel, Prof. Aaradhna Soni

Abstract:- Microgrids have proven to be a promising solution for the integration and management of intermittent renewable energy production. This article focuses on the main issues surrounding microgrid management and protection. It proposes an integrated control and protection system with a hierarchically coordinated control strategy. The strategy includes independent operating mode, grid-connected operating mode and microgrid conversion between these two modes. To improve the system’s faulty operating capacity, a comprehensive three – tier hierarchical protection system is also proposed, which fully adopts various protection schemes, such as relay protection, hybrid energy storage system (HESS) rules and emergency control. . The efficiency, feasibility and applicability of the proposed system are verified on the actual photovoltaic (PV) microgrid. It is expected that the research will provide general theoretical guidance and technical design experience for microgrids.

Security on Wireless Sensor Network
Authors:- Rajesh Rekwal, Asst. Prof. Lokesh Parashar

Abstract:-The dispersed nature and vibrant topology of wireless sensor network have some basic requirements that include reduced energy utilization and extended network’s lifetime. In this paper, we have focused on hierarchical protocols. In such protocol the nodes are arranged in clusters. To synchronize action and route data, cluster head are selected one per cluster. We have introduced a new approach in wireless sensor network for selecting the cluster-head by making use of artificial neural network in order to increase network’s lifetime. We have used residual energy as a factor to make cluster-head. Radial basis function network model is used for cluster-head selection problem. The simulation results provide network’s performance on the basis of some factors including number of dead nodes, total energy consumption, cluster head formation, number of nodes dying and the number of packets transferred to base station and cluster head. The performance of the proposed algorithm is compared with LEACH and LEACH-C based on energy efficiency and improved network lifetime.

Power Saving Using Variable Frequency Drive
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Mujahed Hussain Khan, Syed Faizan, Mohammed Khaled Siddiqi

Abstract:- As the demands of industrial needs varying the more outputs of the precise control of our basic electrical prime movers i.e. motor. As compared to AC motors the DC motors are easy to control but with increase in capacity they have their own limitations. Conversely AC motors particularly the Squirrel Cage induction motors are more economical but the speed control of these motor are quiet difficult because alteration of supply frequency is require. Nowadays with technological advance mentin drives system,the control of AC motors is more economically,easy to use and the control the range of speed both below and above the basespeed.According to the requirement, these drives can fundamentally alter the voltage and the frequency which is being fed to the motor using the technique called Pulse Width Modulation (PWM). Because of user friendly feature and reasonable cost these devices are gaining more popularity.As the Variable Frequency Device use the embedded system they can be programmed for automatic control reducing the manual intervention and interfaced to thecomputer.In the field of HVAC application the usage of Variable Frequency Drive have gained its number. Air handler, chiller, pumps and tower fans are the common application of VFD. A better understanding of Variable Frequency Drives with leads to improve in usage and determining of some appliances and High Voltage AC systems.A basic knowledge of operations, its terms, energy savings,and about the power factorsisma in aimof his dissertation also Harmonics mitigation by VFD and a simulation project to show how VFD is beneficial for energy savings. In addition to this paper will discuss the comparison between Variable Frequency Drives and of the technologies with respect to industrial standards.

Trust Based Authentication for Vehicular Ad Hoc Networks
Authors:- Rajendra Thakur , Assistant Prof. Lokesh Parashar

Abstract:- Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is pro- posed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is a combination of direct trust degree and indirect trust degree. Based on this estimated trust degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a trusted authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less over head and delay.

Using Raspberry PI IOT Home Automation
Authors:- Assistant Prof. Asra Sultana, MD Irshad Ali, Syed Mahaboob Jamaiz, Mirza Mahboob Ali

Abstract:- Internet of things is a technology of the future that has already started to touch our homes.The proposed system consists of a microcontroller-based circuit that has lights and fan connected to it along with Wi-Fi connector interfaced with our system. The user gives input commands through the smart phone which is interfaced with Wi-Fi connector in the circuit which is interconnected to microcontroller and Loads are operated remotely. This microcontoller is raspberry pi which is programmed to do switching operation of load. Thus we automate home appliances over internet using raspberry pi.

RO-PUF Delay Path Sensor
Authors:- PG Students T. Usha, Dr.V.J. Arulkarthick,

Abstract:- There are different factors that one would like to optimize when designing a VLSI circuit. Often they cannot be optimized simultaneously, only improve one factor at the expense of one or more others. The design of an efficient integrated circuit in terms of Power, Area and Speed has become a very challenging problem. To quickly perform measurements and evaluate the test results Automatic test equipment or automated test equipment (ATE) is used to performs test on a device, device (DUT), equipment under test (EUT) or unit under test (UUT).Though it was efficient in calculating characteristic of internal circuit, but the cost in computing the calculation an timing efficiency is very high. To address these issues, delay sensors are more and more frequently implemented on hardware and embedded into the System-Under-Test (SUT).It decreases the cost of testing and implementation. The Existing technique can be used for delay estimation, delay characterization and on-demand, real-time, estimation of the delay of cell-based array logic units such as multipliers. In chip manufacturing technology, reduction in chip size possesses great concern for power dissipation. Low power testing has become an important issue as power dissipation during testing mode is very high as compare to normal mode. PUF is used in testing of ASIC chips by generating pseudo random patterns. Instead of RO in existing method has been replaced by PUF circuit.

Real Time Attendance Marking System Using Face Recognition Approach
Authors:- Aparna K S, Ashwini Shirali, Bhoomika S, Gagana T S, Asst. Prof. M. Pavan

Abstract:- In real time taking the attendance in the classroom is a time-consuming task. Faculties face many problems in taking attendance manually. Manual attendance system is time consuming; it takes about 10 minutes to just mark attendance.In the present paper a real time automatic Attendance marking system using face recognition approach has been discussed. Face recognition has wider application and it is a good approach as compared to Biometric methods. Here Face recognition system is developed based on different machine learning concepts. We used HOG feature extraction technique in order to extract features of the face. We have planned to recognize multiple faces in the video which is taken in the classrooms.

Smart Waste Monitoring System Using IoT
Authors:-Chithkala H S, Deeksha S, Kavyashree Olekar, S Sujitha, Akshay M J

Abstract:- Waste management plays a major role in the country whose population grows exponentially. It is a systematic process consisting of collecting, transporting and disposing of garbage, sewage and other waste materials. One of the major problems in the current scenario is the unhealthy status of the dustbins. The monitoring can be done smartly by using the Internet of Things for transmission of the dustbin status. Arduino UNO is used to interface different sensors. The ultrasonic sensor is used to detect the user and automatically opens the dustbin lid. IR sensor will show the level of garbage filled in dustbin. Soil moisture sensor and IR sensor are used for segregating the dry and wet waste. Flame sensor is used for giving flame alert. The authority can get the status of the bin using Blynk app and notification is sent to both user and municipal authority when the dustbin is full.

Smart Waste Monitoring System Using IoT
Authors:-Chithkala H S, Deeksha S, Kavyashree Olekar, S Sujitha, Akshay M J

Abstract:- Waste management plays a major role in the country whose population grows exponentially. It is a systematic process consisting of collecting, transporting and disposing of garbage, sewage and other waste materials. One of the major problems in the current scenario is the unhealthy status of the dustbins. The monitoring can be done smartly by using the Internet of Things for transmission of the dustbin status. Arduino UNO is used to interface different sensors. The ultrasonic sensor is used to detect the user and automatically opens the dustbin lid. IR sensor will show the level of garbage filled in dustbin. Soil moisture sensor and IR sensor are used for segregating the dry and wet waste. Flame sensor is used for giving flame alert. The authority can get the status of the bin using Blynk app and notification is sent to both user and municipal authority when the dustbin is full.

Accident Detection and Messaging System using GSM and GPS Module
Authors:- K. Tejesh, Assistant Professor Priya

Abstract:- With the growing population the use of cars has emerge as superfluous and this has brought about growth in the range of injuries at an alarming price. This project objectives at detecting the accident and reporting the location of coincidence to the previously coded numbers. This facilitates in a fast carrier from the ambulance and the involved individual. The GPS and GSM era is used to find the position of the car in the shape of latitude and longitude coordinates and sends it thru SMS. Piezoelectric and alcohol sensors when prompted, help in detecting the twist of fate and sending the sign to the micro controller of the system. This similarly enables in sending the message to the involved individual. This device can help groups in the condo car enterprise to keep a track of the vehicular activity through sending message at normal intervals to the authorized numbers.

Fraud Detection: In Airline Loyalty Program UsingMachine Learning
Authors:- Cherian P Bright, Prof. Kuttyamma A J

Abstract:- almost all the airlines within the world have currently designed frequent-flyer programs that enable airline customers to be a neighbourhood of the program to accrue points or miles which can then be redeemed for aviation or the other rewards designed by the airline. Points earned under Frequent Flyer Programs could also be supported the category of fare, distance flew thereon airline or its partners, or the quantity paid. There are other ways to earn points. For instance, in recent years, more points are earned by using co-branded Loyalty and debit cards than by aviation. Differently to earn points is by pocket money at partner shops, car hire companies, hotels, or other co-partner businesses. Points are often redeemed for air and non-air travel, other services, or for increased benefits, like class upgrades, airport lounge access, means access, or priority bookings. Loyalty points are like currency! The increase of loyalty programs amongst airlines over the years has offered more options to monetize air miles’ balances built up by their customers. But this has spawned an increase of fraudsters too. During this age of digital transformation, airlines have a fundamental duty in fixing flexible and well-layered defines systems which will keep off the thrate of cyber criminals.The matter of monetary Fraud has increased abruptly nowadays. Losses thanks to the fraud transactions are costing billions of dollars per annum to the Airline Industry. To tackle this problem, decision systems that use efficient fraud detection algorithms should be invented. With the support of recent technologies, these systems can manage to research the knowledge and to make a prediction feature model. However, the invention of those systems isn’t a simple but quite challenging task thanks to the large amount of various and unbalanced data. Moreover, it’s tough to make a decision on which machine learning algorithm should be implemented for various business use cases.

A Systematic Review on Block chain Technology in Cloud Computing
Authors:- M. Tech. Scholar Shashi Kumar, Professor Dr. Varsha Namdeo

Abstract:- A health care cloud is a cloud computing service used by health care providers for storing, maintaining and backing up personal heath information (PHI) . Transforming healthcare via the cloud is about more than just the delivery of medical information from multiple computers at anytime, anywhere, and on any mobile device. It’s also about the benefits of being able to connect medical centers and cloud users for the purpose of sharing patients’ health data over the Internet. In this paper a blockchain based concept used to maintain healthcare data Blockchain can help protect the healthcare network.Cloud computing is the delivery of computing and storage space as a service to a distributed community of end users.The schema/model of Cloud computing is, all the servers, networks, applications and other elements related to data centers are made available to end users. Cloud computing is growing now-a-days in the interest of technical and business organizations but this can also be beneficial for solving social issues. Cloud computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.

Hybrid Power Generation by Using Solar and Wind Energy
Authors:- Assistant Professor Aqsa Fatima, Mohd Ibrahim, Rehan Ahmad, Imran Khan

Abstract:- Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy resources takes place i.e. wind and solar energy. This process reviles the sustainable energy resources without damaging the nature. We can give uninterrupted power by using hybrid energy system.Basically this system involves the integration of two energy system that will give continuous power.Solar panels are used for converting solar energy and wind turbines are used for converting wind energy into electricity. This electrical power system can be utilize for various purpose. Generation of electricity will takeplace at affordable cost. This paper deals with the generation of electricity by using two sources combine which leads to generate electricity with affordable cost without damaging the nature balance.

A Review of Ggbs and Steel Fibre Performance in High Performance Concrete
Authors:- M.Tech. Scholar Naincy Gupta, M.Tech. Scholar Mohd Rashid, Assistant Professor Nitish Jauhari

Abstract:- India is producing enormous amounts of industrial by-products out of which 150 million tonnes of GGBS itself. Apart from disposal of this solid waste, engineers strive for its value addition through its use as a construction material for achieving better economy, eco-friendliness without compromising on technical aspects. Varieties of concrete are mixed with GGBS as a replacement material for cement to understand its compressive strength and long term behaviour. It is seen from literature that the fibers enhance the performance of concrete. Accordingly, six trials were made with GGBS replacement along with variation of cement content, water cement ratio and steel fibers with aspect ratio 60 and variation in reinforcing indices. The workability of concrete increased with increasing the GGBS content and also observed there is a reduction in workability in fiber reinforced concrete. The results indicated that the concrete made with GGBS indicates the strength comparable to the concrete made with OPC for all replacement levels. There is a substantial decrease in strength at 80% replacement. While there is a substantial increase in long-term strength. The compressive strength of GGBS concrete was increased up to 19% than that of OPC concrete and also observed 5 to 12% strength increased in fiber reinforced concrete than GGBS concrete. For this purpose studied the compressive strength of concrete at the ages of 3, 7,28,56,90 and 180 days.

Event Handling in Java
Authors:- M. Amitha Reddy

Abstract:- This paper explores the definition and importance of event handling in Java with focus on different event handling classes. We will aslo see that we cannot write a GUI program without event handlers. Most events to which the program will respond are generated when the user interacts with a GUI-based program. These are the types of events examined in this paper. They are passed into the program in a variety of ways, with the specific method dependent upon the actual event. There are several types of events, including those generated by the mouse, the keyboard and various GUI controls, such as a push button, scroll bar or check box. This paper begins with an overview of Java’s event handling mechanism. It then examines the main event classes and interfaces used by the AWT and develops several examples that demonstrate the fundamentals of event processing.

Reinforcement Learning for Wireless Sensor Networks based on ISVM
Authors:- Palaghat Hariharan Lakshmi

Abstract:- Application performance and energy consumption deep exposed to task scheduling of nodes in wireless sensor networks (WSNs). Unreasonable task scheduling of nodes leads to excessive network energy consumption. Thus, a Q-learning algorithm for task scheduling based on Improved Support Vector Machine (ISVM) in WSNs, called ISVM-Q, is proposed to optimize the application performance and energy consumption of networks. Energy consumption of task scheduling is associated with a reward of nodes in the learning process. To solve the “dimensionality disaster” problem of Q-learning, SVM is introduced as a value function approximation. Parameterizations of SVM function can strengthen the interpretation characteristics by using experience knowledge. Experiments show that ISVM-Q has the ability to make nodes perform tasks reasonably in a dynamic environment. Compared with classic task scheduling algorithms, ISVM-Q achieves better application performance with less energy consumption and keeps the learning system stable.

Heat Transfer Augmentation Techniques for Double Pipe Heat Exchanger
Authors:- M.Tech. Scholar Arshad Kamal, Professor Rohit Kumar Choudhary

Abstract:- Nowadays for enhancing the convective heat transfer in various industries such as thermal power plants, chemical processing plants, air conditioning equipment, refrigerators, petrochemical, biomedical and food processing plants heat exchangers are employed with twisted-tape inserts have widely been applied. By employing, twisted tape insert bring together swirl into the fluid flow which subsequently interrupts a thermal boundary layer on the tube surface. The thermal performance of heat exchangers can be improved by heat transfer augmentation techniques. Tape insert is one of the passive heat transfer augmentation technique and used in utmost heat transfer application, for example, air conditioning and refrigeration systems food processes. Therefore, various enhancement techniques have been reviewed.

A Review on Application of Statistical Quality Control Tools in the Manufacturing Industry
Authors:-M.Tech. Scholar Shubham Madke, Professor Dr. P.L. Verma, Associate Professor Sanjay Jain

Abstract:- In this paper, a review of the systematic use of statistical quality control tools is presented. The main aim of this paper is to provide an easy introduction of statistical quality control tools and to improve the quality level of manufacturing processes by applying it. Quality control tools are the means for collecting data, analysing data, identifying root causes, and measuring the results. These tools are related to numerical data processing. All of these tools together can provide great process tracking and analysis that can be very helpful for quality improvements. These tools make quality improvements easier to see, implement, and track. The work shows continuous use of these tools upgrades the personnel characteristics of the people involved. It enhances their ability to think generate ideas, solve problems, and do proper planning. The development of people improves the internal environment of the organization, which plays a major role in the total Quality Culture.

Dynamic Analysis of Laminated Composite using ANSYS
Authors:-M.Tech. Scholar Mukesh Kumar Mandal, Professor Nitesh Kushwaha

Abstract:- In this investigation free vibration analysis of a composite plate is presented. An orthotropic plate with symmetric fibre orientation was considered for this study. The material properties were fixed. The natural frequencies were computed for different boundary conditions, hole-shape, aspect ratio, and fibre orientation. The effect of these variables on the nature of vibration is analysed and discussed. Also, the natural frequencies of a laminated composite plate with holes of various sizes were considered in order to examine the effect on the fundamental natural frequency. The eight noded shell 281 was used throughout the analysis. ANSYS 15.0 is used for modelling and analysis of the laminated plates. The Natural frequencies of the finite element (FE) were analysed by the ANSYS software.

The Limitations of RFID Implementation inRetailSupply Chain in IndiaA Case Study of the Hyderabad Region
Authors:-Rekha Gulle

Abstract:- – Efficient management of Supply Chain is increasingly becoming the most important method of attaching sustainable competitive advantage for the retail industry globally. However, supply chain management itself is challenged by several issues. These include product flow, out of stock and out of store phenomenon, data and inventory inaccuracies, the bullwhip effect is few of them. The manual routines adopted in most supply chain functions are seen to be the main cause of these issues and automation is considered to be a most effective remedy. While automation through bar code has achieved a fair degree of success, RFID’s are proving to be a more effective complement and alternate to bar coding. The business and operational efficiencies that accrue through RFID’s have already been proved in the countries of Europe and America. However, despite this their proliferation is still limited in India. That they be adopted more widely particularly in the retail industry in India is fast becoming an imperative in light of the fact that retail is one of the fastest growing and most important industry verticals within the country. This research attempts to ascertain what are the barriers to the incorporation of RFID into the supply chains of Indian companies and to posit possible solutions to the same. The empirical study was conducted in that region most representative of industry in India, Hyderabad. It was found that the main reasons inhibiting the spread and use of RFID in India were cost, labour, privacy issues, lack of government support and technical issues. Hence the proliferation of RFID in India will depend on the extent to which these issues are solved or sorted out. The possible solutions to these issues have also been identified in this research. The author believes that the implementation of solutions will greatly aid in the proliferation of RFID in industries throughout the country.

Natural Radioactivity Levels of Nile Water in Qena Governorate
Authors:- N. K. Ahmed, A. Abbady, K. Salaheldin, F. M. Abdallah

Abstract:-Total of 53 water samples were collected from Nile River at three different locations, Southern area (Qus region), Central area (Qena region), and Northern area (Nagi-Hamadi region), within Qena governorate, south of Egypt. 226Ra, 232Th, and 40K – were measured by low-level gamma-ray spectrometer NaI (Tl). The average values of 226Ra, 232Th and 40K were 0.44±0.009, 0.22± 0.001 and 4.73±0.10Bq/L, for Qus region respectively, but for Qena region the values were 0.50±0.0039, 0.45±0.0035 and 5.46±001Bq/L. – In Nagi-Hamadi region the activity concentration was 0.29±0.0019, 0.19±0.001 and 4.12±0.08 for 226Ra, 232Th and 40K respectively. The radium equivalent activity (Raeq) and absorbed dose rate (D) for all samples under studying were agree with the world average value. These values present no hazards tohuman.

Investigation of Radium Content and Radon Exhalation Rates in Archeological Areas in Luxor Governorate
Authors:- H. H. Negm, N. K. Ahmed, A. Abbady, M. M. Reda

Abstract:- In this study, long –term technique for alpha guard have been used to count radium content and radon exhalation rate in archaeological specimens.Specimens collected from Elkebash street, west bank, Luxor and Elkarnak temples. The values of radium contents were ranged from 181.12 to 236.04 with average value 207.919,from 89.41 to 151.84 with average value 122.42 , from 121.68 to 217.856 with average value 167.89and from 66.46 to 106.75 with average value82.26 for Elkebash, luxor temple ,west bank and ELkarnak temple respectively .In the other hand the Mass Exhalation Rate (EM)were from 0.99 to 1.78 with average value 1.5 ,from 0.67 to 1.14 with average 0.92 from 0.91 to 1.64 with average value 1.27 and from 0.50 to 0.80 with average value 0.62 for Elkebash, Luxor temple ,west bank and ELkarnak temple archaeological specimens while the Area Exhalation Rate (EX)for Elkebash, Luxor temple ,west bank and ELkarnak temple were from 8.39 to 15.04 with average value 12.65 ,from 8.39 to 14.04 with average 11.77 , from 7.4 to 13.3 with average value 10.23 and from 5.48 to 6.9 with average value 6.2 respectively.

Online Gas (LPG) Booking System (A Case Study of LPG Stations in Ghana)
Authors:- Dr. Egho-Promise Ehigiator Iyobor, Michael Ofosu-Appiah, Sandra Osei Somuah, Sarah Asabea Addo

Abstract:- Liquefied Petroleum, Gas (LPG) has become the cleanest, effective and efficient petroleum for domestic and commercial use. It is used in vehicles, for cooking, baking, etc. Although LPG is the most patronized and cost effective fuel for households and commercial use yet there is a major challenge associated with buying the gas at the stations. There is always long queue of people at the LGP stations especially during scarcity and this has become a persistent problem for several years in Ghana. In this study, an efficient web-based system will be designed and developed to avoid this unnecessary long queue and wasting of time at the gas stations.

A Survey on Features and Techniques for Student Data Analysis Performance Prediction
Authors:- Research Scholar Smt. Rhicha Tiwari, Dr. Prabhat Pandey

Abstract:- Large amount educational data is available in educational institute which can be utilized for analysis of improvement in academic performance. Number of academic activities work store in in educational data with some other feel like student locality, family e background. So researcher perform mining activity in such kind of data further enhance the capabilities of good scholar and find reason for Scholars who are not scoring good marks in their academic performance. This paper is collection of research activity performed by other scholars to analyse educational data and extract fruitful information. Paper has detailed some of of data analyzing techniques for prediction of student performance as per the academic activities or student involvement. Some of basic features related to academic data set analysis were also summarize in paper where combination of different features were also shown which help to extract good information for improvement of student performance. At last sum of evaluation parameters were also detail for comparison of different methods proposed for student performance prediction.

Exploring Earth and Moon in Virtual Reality
Authors:- Dr. Archana Ajit Chaugule, Shripad Agashe, Ashutosh Rane,
Parth Borate, Kunal Bhalekar

Abstract:- The principles of virtual assembly and the process of general assembly are analysed and conversed in this thesis. Meanwhile, parts parametric model creation and assembly, as well as component parts of assembly interference analysis are analysed in Unity .Virtual Assembly, the key to application of virtual reality technology in design and manufacturing, has drawn much courtesies of corporation and investigator. The exact design flow of virtual we assembly was given on the theory of virtual assembly included its gears of diesel engine was acted as an object to as assemble practically. By assembly inspecting and modifying, the assembly of the machine in virtual environment was available. Our VR system has three features; (a) it synthesizes highly realistic VR video from the data captured in actual assembly, (b) it estimates the reaction of the user to the VR spur by capturing the 3D locations of full body parts, and (c) it consists of off-the-shelf devices and is easy to use. Our demonstration provides users with a chance to experience our VR system and give them some quick feedback by visualizing the estimated 3D positions of their body parts.

Educational Data Mining in Education System
Authors:-M. Tech. Scholar Nandini Sahu, Head of the DepartmentProf. Lakshita Landge

Abstract:– The capacity to screen the advancement for students’ academic execution is an essential issue of the educational Group from claiming higher Taking in. An arrangement to dissecting students’ comes about dependent upon group dissection and utilization standard measurable calculations with organize their scores information as stated by the level about their execution may be portrayed. In this paper, we also actualized the k-mean grouping algorithm for examining students’ consequence information. Those model might have been consolidated for those deterministic model should dissect those students’ effects of a private foundation clinched alongside % Iberia which is a great benchmark with screen the progression of academic execution about people for higher institutional to the reason for making an successful choice by those academic organizers.

Question Answering Schemes: A Review
Authors:- M. Tech. Scholar Mohini Malviya, Assistant Prof. Manoj Soni

Abstract:- Question Answering Systems (QAS) are turning into a model for the eventual fate of web search. In this paper we present an investigation of the most recent examination around there. We gathered distributions from top gatherings and diaries on data recovery, information the executives, computerized reasoning, web knowledge, characteristic language handling and the semantic web. We recognized and characterized the subjects of Question Answering (QA) being investigated on and the arrangements that are being proposed. In this investigation we likewise recognized the issues being most explored on, the most mainstream arrangements being proposed and the freshest patterns to assist specialists with increasing an understanding on the most recent turns of events and patterns of the exploration being done in the zone of inquiry replying.

Reinforcement Learning for Wireless Sensor Networks based on ISVM
Authors:- Palaghat Hariharan Lakshmi

Abstract:- Application performance and energy consumption deep exposed to task scheduling of nodes in wireless sensor networks (WSNs). Unreasonable task scheduling of nodes leads to excessive network energy consumption. Thus, a Q-learning algorithm for task scheduling based on Improved Support Vector Machine (ISVM) in WSNs, called ISVM-Q, is proposed to optimize the application performance and energy consumption of networks. Energy consumption of task scheduling is associated with a reward of nodes in the learning process. To solve the “dimensionality disaster” problem of Q-learning, SVM is introduced as a value function approximation. Parameterizations of SVM function can strengthen the interpretation characteristics by using experience knowledge. Experiments show that ISVM-Q has the ability to make nodes perform tasks reasonably in a dynamic environment. Compared with classic task scheduling algorithms, ISVM-Q achieves better application performance with less energy consumption and keeps the learning system stable.

Preparation and evaluation of wine from Sugarcane and
carrot juice

Authors:- Dhilip KumarM., RagaventhiraV., PreethiG., SowmiyaP.,
BalasubramaniV., Soundhara Pandiyan R.

Abstract:- Wine is one of the functional fermented food that have many nutritional benefits. Wine is produced by the fermentation of yeast which involves the conversion of sugar to alcohol. It can acts as a nutritional supplement for many fruits and vegetables. In the present project, sugarcane and carrot juice was used for the preparation of wine. Fermentation is carried out with Saccharomyces cervisiae. It is commonly known as bakers yeast. Sugarcane ( Saccharum officinarum) juice which contains high amount of sugar and so it is used as a raw material. It is rich in calcium, magnesium , iron and other electrolytes. Carrot ( Daucus carotasubsp.sativus) juice is rich in vitamin A and C and it is a good source of antioxidants also. The main purpose of study is to develop the wine by adding sugarcane and carrot juice. Among the sugarcane blended with carrot juice non-pasteurized blended at 48.7% and PH 4.3 during the time of fermentation was observed. After five months of storage, alcohol content in the wine was increased. Therefore, the storage improves the quality of wine.

A Game Based Implementation of Minimax Algorithm Using AI Agents
Authors:- Ishank Lakhmani, Vartika Punjabi

Abstract:- This paper reports our analysis of results obtained after applying minimax algorithm for the implementation of an ultimate tic-tac-toe. We use a heuristic function to obtain the best possible move and, as soon as the game ends, then the updated method is propogated from the final move to the first move using backward chaining. That is how the agent learns. The performance of the agent is assessed by taking full-board and partial board representations. The game developed allows agent to play against other AI agents and human players also hum players to play against other human players.

IOT Based Light Monitoring System in Shopping Malls Parking
Authors:- M.P. Geetha, Asst. Prof. Sonali R, Nivetha V, UG Students Suriya S

Abstract:- This project aims for designing and executing the advanced development in embedded systems for the energy saving of smart lights. Currently, we have a manual system where the lights will be switched ON in the shopping malls parking. This project gives a solution for electrical power wastage. The proposed system provides a solution for energy saving. This is achieved by sensing and approaching a vehicle using an ultrasonic sensor. Upon sensing the movement, the sensor transmitted the data to the Arduino which makes the light switch bright. Similarly, as soon as the vehicle or an obstacle goes away the Light gets switched dim as the sensor senses any object at the same time, the status (Bright/Dim) of the smart light can be accessed from anywhere and anytime through the internet. This project is implemented with a smart embedded system that controls the smart lights based on the detection of vehicles or any other obstacles on the shopping malls parking. Using wi-fi , Whenever the obstacle is detected on the parking within the required time the lights will get automatically Bright/ Dim consistent and therefore the same information can be accessed through the internet. The real-time information of the smart light (Bright/Dim) status can be accessed from anytime, anywhere through the internet within the specified range.

Design and Fabrication of Automatic Grass Cutter
Authors:- Asst. Prof. S.Sumathi, S.Vimal Gomathy Sankar, K.Priyangapriya, AR Nilanchala

Abstract:- In today’s world ,Automation is very important part for invention.The present technology commonly used for cutting the grass over the field which creates pollution and loss of energy. The old grass cutter need to be replaced by automated one where system will work for guidance Automatic grass cutter will reduce the effort required for cutting grass in the lawns. Powersupply is used to run the motor and various sensors will be used to detect and avoid the unnecessary objects in the field during operation.This device show that how technology can be used to reduce human effort. so we are trying to make a daily purpose machine which is able to cut the grasses in lawn.Itwill project the operation aand obstacle detection.The grass cutting machine is available in various type like reel (cylinder), mower, rotary and mulching mower, professional mower. But these are very costly and unaffordable.Eventually,the improvement of redesign grass cutting machine finally will able to meet user requirement andsatisfactions.

Social Distancing Protocol Using Arduino
Authors:- Panthangi Sai Lohith

Abstract:- In view of the current situation the COVID-19 has become ubiquitous in every corner of the world. We must aim at preventing the community spread of the virus. To achieve this we must make sure a proper social distance is maintained from individual to individual. To make sure that a proper social distance is maintained from individual to individual I came up with the idea of social distancing device using Arduino uno.The main aim of this is to make sure a proper distance is maintained among individuals so that community spread of virus can be diminished. Here ultrasonic sensors are installed on three sides of the cap so it that measure the min imumdistance to be maintained by the individual in 360 degrees. Alsoa buzzer is installed which alerts the individual by giving a buzzer upon not maintaining a minimum distance.I used Arduinouno along with ultra sonicsensors and buzzer to indicatealerts.

Exact Series Solution for Vibration of Restrained Composite Plate
Authors:- Ahmed M. Farag El Sheikh

Abstract:- The main objective of the present paper is to derive an exact series solution to derive the egin values and eigen functions of the fourth order homogeneous partial differential equations PDES of composite plate. The plates are studied under various types of classical and restrained boundary conditions BCS. Due to the additional terms in the governing PDES and the complex substations of BCS, the deduced mathematical complexity makes the publications of this type in literature very few. Although a huge amount of publications are concerned with the vibration of composite plate, the analytic and closed form solutions have a little attention from the publishers. The previous review of publications shows that the method of separation of variables is one of the most universal powerful techniques for solving the linear PDE. The present paper offers an accurate analytical solution which reduces the labor may be needed for carrying out the alternative numerical solutions. The effectiveness of the derived method shows the capability to provide an explicit closed form solution for higher order linear PDE incorporating mixed derivatives under complex boundary conditions. The present approach is utilized to create the closed form solution of composite plates with many types of boundary conditions. Many numerical cases are demonstrated by calculating the eigen values and mode shapes for a different modes of anisotropic plates with different edges of supports.

Review: Healthcare Data Manage using BlockchainTechnology
Authors:-ME Scholar Shradha Paliwal, Assistant Professor Yunus Khan

Abstract:- Healthcare has been the industry with the highest boom in terms of both revenue and data. With so much of electronic health records, the security has been the need of the hour. To make this critical information more secure, there has been an urge to use the blockchain technology. Therefore, researches came up with a solution of blockchain technology in medical healthcare that will not only protect data from being tampered but will also ensure that the data leakage is stopped. This technology could preserve data and thus guarantee reliability. And if this technology is used along with cloud computing technology, problems related to storage can also be vanished, because cloud is trusted for storing and managing data. Also, the blockchain can address the security issues of the cloud. Indeed, medical data sharing and storing with Blockchain-based cloud can address a lot of issues of medical data. The main aim of this paper is to present the current state-of-the-art on blockchain-based medical healthcare system. We have clearly discussed several existing works on the same domain and also presented a comparative study among the published works.

Simulink Simulation of PV, Wind and Fuel Cell Based Hybrid Power Generation System
Authors:-M.Tech. Scholar Ravindra Kumar , Asst. Prof. Deman Kosale

Abstract:- Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy resources is takes place i.e. Fuel cell wind and solar energy. This process reviles the sustainable energy resources without damaging the nature. We can give uninterrupted power by using hybrid energy system. Basically this system involves the integration of two energy system that will give continuous power. Solar panels are used for converting solar energy and wind turbines are used for converting wind energy into electricity. This electrical power can utilize for various purpose. Generation of electricity will be takes place at affordable cost. This paper deals with the generation of electricity by using two sources combine which leads to generate electricity with affordable cost without damaging the nature balance.

Light Weight Secure Auditing Scheme for Shared Data in Cloud Storage
Authors:-M.Tech. Student Vempala. Sravani, Assistant Prof. V. Kasthuraiah

Abstract:- A cloud platform presents data users with shared information storehouse services, Data users can remotely save the information to the cloud and complete the information distributing with others. An inspection scheme that permits assembly members to alter information handles the integrity of the distributed information and verification of the distributed information. This outcome is in the complicated predictions for the organization members who distributed the information in the cloud databases. It neglects the safety and security risks among the organization members and the cloud agents. A less weight safe auditing system can be employed to protect the distributed information. To begin a powerful Third-Party Auditor, the auditing manner of the distributed information is simple towards data user privacy and proposes no supplementary duty to data users in the cloud databases. The third-party auditor can be used to protect the information on behalf of the data users. It promotes the privacy-preserving public auditing. The safety examination and the special review evaluation demonstrate that the suggested method is extremely secured and effective to hope in the cloud assistance platform.

A Lternative Energy Efficiency Design for The Laboratories
Authors:- Suhasini Pyarasani, P.E

Abstract:- Research labs HVAC design needs not only to provide the demands of indoor air quality, safe environment for research workers but also needs to offer comfort and protection for other occupants in the laboratory building. As research labs has different types of spaces there is a potential opportunity in energy wastage, if not designed with advanced design strategies.Designer needs to assess the load profile of the labs based on discussion with client on different factors such as hours usage in a day, hours usage in a semester/quarter, class size, occupied hours, unoccupied hours, etc. Research laboratories load profile vary hourly, daily, seasonally, diurnally, annually, and life-cycle bases where occupancy varies during certain periods of time and during extended periods of time.Research labs can represent a relatively high share of total costs, with energy intensities of up to~1000 kWh/sq. ft-year.The importance of minimizing the air volume in research laboratories is well known; as the labs require at least ten times air volume than in an office building. Few ways to minimize the load in the lab facilities includes decrease heating and cooling loads, decrease in dehumidification and humidification loads, decrease in fan and motor energy usage, and decrease in pumps and motors usage.Advance design strategies that help to design energy efficient HVAC design are modular boiler plants, DDC systems, 4- pipe VAV systems, tum-down ratios for chillers, indirect-direct evaporative cooling, heat recovery, and Active Chilled beams.Current paper discusses the pros and cons for active chilled beams and 4- pipe VAV’s advanceddesign measures including their first costs and life-cycle costs are discussed.

A Review on Feasibility Analysis of Single Effect Vapour Absorption System in Milk Processing Plant
Authors:- M.Tech. Student Rahul Kumar Mehra, Prof. Sujeet Kumar Singh

Abstract:- Milk is one of the best food available due to its nutrition values. For production of processed milk and other dairy products, quality Milk processing plants are required. Milk processing includes pasteurization, homogenization, evaporation, drying etc. In this study, system of a milk pasteurization process assisted by VAR is thermodynamically modelled. The whole energy requirement of the pasteurization system was supplied from Single Stage Libr VAR was used for both heating and cooling purposes. The heat exchangers were modelled with energy balances, based on the streams inlet and outlet enthalpies and mass flow rates. Therefrigerationunitwasbasedonasimplevapourcompressioncycleusing LiBr as a refrigerant. The energy analysis of the model was based on the 1st law of thermodynamics. An EES code has been developed using computer simulation program for simulating the cycle and validation of results with experimental one. This paper presents the review of the past studies done in the similar topic.

Enhancement and Suggestion System using NLP and ML for Response Classification
Authors:-Mr. Abhijit Uttam Shelake, Mrs. Hetal V. Gandhi

Abstract:- -This paper offers the architecture and layoutspecification for a campus assistant software on an Android platform. While taking clearance, students need to approachthe respective sta member and have to face diffculty in case they are unavailable. In this proposed system, students need not go to every sta for clearance.Instead, they can send request directly to respective staff members and if the sta does not have any issue with that student, they accept request. And when all such requests are are accepted by the staff and also higher authorities in some hierarchical order,the clearance form will be submitted. This procedure will save lots of time and efforts of the students. The other problem in an institute which we address is related to Feedback. We collect feedback from stakeholders related to any of the concerned issues and classify them so that they can be forwarded only to the appropriate sta members and incharge of respective department to take cognizance of it and also take corrective action if required. The system enables trackingthe status of each feedback and also provides facility to each of the concerned to track and update the actions undertaken with status. For implementing this feedback system, we make useof Natural Language Processingand Machine Learning tools and techniques.Our system also provides the facility for naïve people of find location within the institute.

Research and reviews in Question Answering System
Authors:- Ragini Patil, Asst. Prof. Shailendra Tiwari

Abstract:- Question Answering (QA) Systems is an automated approach to retrieve correct responses to the questions asked by human in natural language. The fundamental thought behind QA system is to assist man-machine interaction. In this paper, we propose taxonomy for characterizing Question Answer (QA) systems, briefly survey major QA systems described in literature and provide a qualitative analysis of them. Finally, a comparison between these approaches based on certain features of QA system found critical in our study has been done, in order to bring an insight to research scope in this direction.

Resolve the Worm hole Problem using Trust based Machanism
Authors:- M.E. Scholar Rupanshi Patidar, Assistant Prof. Sachin Mahajan

Abstract:- A Mobile Ad-hoc Network (MANET) is a lot of nodes that impart together agreeably utilizing the remote medium, and with no focal organization. Because of its inborn open nature and the absence of framework, security is a convoluted issue contrasted with different systems. That is, these systems are powerless against a wide scope of attack at various system layers. At the system level, malignant nodes can play out a few attacks going from detached spying to dynamic meddling. Wormhole is a case of serious assault that has pulled in much consideration as of late. It includes the redirection of traffic between two end-nodes through a Wormhole burrow, and controls the directing calculation to give figment that nodes situated a long way from one another are neighbours. To deal with this issue, we propose a novel location model to enable a node to check whether an assumed most limited way contains a Wormhole burrow or not. Our methodology depends on the way that the Wormhole burrow diminishes essentially the length of the ways going through it. To keep the black hole, worm opening, community oriented black hole and flooding attack, the counter measure which Trust esteem is figured on the premise of course ask for, course answer and information parcels. After count get put stock in values between 0 to 1. In the event that trust esteem is more prominent than 0.5 at that point marks node is solid and permit on a system generally piece. System execution of proposed convention trusted secure AODV steering convention (TAODV) is assessed. The outcome demonstrates execution change when contrasted with standard AODV convention.

Load Balancing in Cloud Computing Using Modified Round Robin Algorithm
Authors:-M.E. Scholar Srushti Patidar, Assistant Prof. Amit Saraf

Abstract:- Cloud computing utilizes the ideas of planning and load adjusting to relocate undertakings to underutilized VMs for adequately sharing the assets. The booking of the no preemptive errands in the Cloud computing condition is an irretrievable restriction and thus it must be relegated to the most fitting VMs at the underlying arrangement itself. For all intents and purposes, they arrived employments comprise of numerous related undertakings and they may execute the free errands in various VMs or in the same VM’ different centers. Likewise, the occupations touch base amid the run time of the server in fluctuating irregular interims under different load conditions. The taking part heterogeneous assets are overseen by apportioning the undertakings to suitable assets by static or dynamic booking to make the Cloud computing more productive and consequently it enhances the client fulfillment. Target of this work is to present and assess the proposed booking and load adjusting calculation by thinking about the abilities of each virtual machine (VM), the undertaking length of each asked for work, and the interdependency of different errands. Execution of the proposed calculation is considered by contrasting and the current strategies.

Advanced Footsteps Power Generation
Authors:- Assistant Prof. Jim Mathew Philip A, Soundar S, Vignesh V, Vishaly

Abstract:-The need for energy efficient and eco-friendly fuel is making its headway within the civilization for reducing pollution, emission of green house gases, mining tragedies and degradation of environment, fossil fuel end is proposed to create a transition beyond fossil fuels. The idea includes use of electrical transport, decommissioning of existing fueled powerhouse and prevention of further construction of recent fossil fueled power station and divestment within the fossil fuel industry. We are considering piezo electric crystals to reap industry. Electricity produced is stored in a LA battery. The battery acts as a source for the local (Bulb and the Fan).The Arduino employed is managed to control the bulb and fan with wireless Bluetooth connection with the help of Bluetooth connection. In this paper wireless connection is employed to efficiently use the energy produced by the piezoelectric effect and stored in lead acid battery for further and efficient use.

Review of Information Protection on Android Application Devices
Authors:- ME Scholar Priyanka Patidar, Assistant Prof. Devendra Singh Kaushal

Abstract:- Right now, Smart-telephones and other Mobile gadgets have ended up being amazingly fundamental in all aspects of our life. Since they have comparative capacities as contrasted and work area furthermore, they end up being amazing as far as CPU (Central handling Unit), Storage and introducing a few applications. Therefore, in remote correspondence advances, security is considered as a significant factor, dominatingly in remote specially appointed systems and portable working frameworks. Besides, in view of increasing the scope of versatile applications contained by assortment of stages, security is considered as one of the most important and generous discussion as far as issues, accuracy, trustees and reliabilities. This paper presents a consolidated report of flourishing security on versatile application dais and offering data of indispensable dangers to the clients and the ventures. In addition, this paper presents an assortment of strategies just as techniques for security estimations, the examination and prioritization inside the peak of portable stages. Moreover, it builds mindfulness and comprehension of security on versatile application stages so as to maintain a strategic distance from legal sciences, discovery and countermeasures which are utilized by the working frameworks. At last, this investigation additionally contends about the security wings for popular versatile stages and examination for an assessment inside a most recent exploration in the field of portable stage security.

Leave a Reply

Your email address will not be published. Required fields are marked *