IJSRET Volume 6 Issue 5, Sep-Oct-2020

Comment

Uncategorized

A Design and Performance Analysis of 64-bit Multiplier based on Rounding Based Approximation Technique
Authors:-M.Tech. Scholar Md Dilnawaz Hansala , Assistant Professor Dr. Neetesh Raghuwanshi

Abstract:- Multipliers play a vital job in the present digital signal handling and different applications. With advances in innovation, numerous scientists have attempted and are endeavoring to structure multipliers which offer both of the following plan targets – high speed, low power utilization, consistency of design and henceforth less zone or even mix of them in one multiplier in this way making them appropriate for different high speed, low power and minimal VLSI usage.

Power Efficient Radix-2 DIT FFT using Folding Technique and DKG Reversible Gate
Authors:- M.Tech. Scholar Shashi Shekhar Singh, Dr. Bharti Chourasia

Abstract:- FFT is normally utilized in computerized flag preparing algorithms. 4G correspondence and different remote framework-based correspondence are directly hotly debated issues of innovative work in the remote correspondence and organizing field. FFT is a calculation that speeds up the count of DFT. In the main stage, low multifaceted nature Radix-2 Multi-way Delay Commutator (R2MDC) FFT recurrence change method is created through Exceptionally Large-Scale Integration System structure condition. Low power utilization, less zone and rapid are the VLSI primary parameters. Customary R2MDC FFT structure has more equipment multifaceted nature because of its escalated computational components. Two strategies are utilized to plan radix-2 FFT calculation. In firest strategy is plan radix-2 FFT with the help of reversible Peres gate and TR gate. Second method is design radix-2 FFT with the help of reversible DKG Gate. The all structure are usage vertex-4 device family Xilinx programming and looked at past calculation.

Power Quality Improvement at Grid Using Virtual Synchronous Machine in Solar Power Plant
Authors:-Rahul R. Bhende, Dr. S.P. Muley, Prof. S.C. Suke

Abstract:- Renewable power primarily based dispensed power mills are getting an crucial a part of the destiny electricity structures. Power electronic converters are commonly used an interface between the renewable energy supply and the software grid. Since the strength virtual converters do not possess any rotating inertia like a synchronous generator, fast fluctuations in strength supply and call for purpose unexpected deviations inside the grid frequency in electricity virtual converter ruled weak grids. A virtual synchronous machine (VSM) approach for controlling the inverters related to the grid tries to mimic the behaviour of a synchronous system and offers virtual inertia to the grid via distinctive feature of the electrical garage. In this paper a simple virtual synchronous machine control strategy based totally on swing equation is proposed for 3 phase grid linked inverters. The proposed manage strategy is implemented in desk bound reference body and does not need a section locked loop for grid synchronization unlike a few of the existing strategies. The virtual synchronous device unit consists of a DC-link linked thru a three-section voltage supply converter with an LCL-clear out into the grid and the corresponding local manipulate machine. A check setup of the virtual synchronous system unit with the specification of 200 V, 50 Hz, 1 kW is evolved within the laboratory environment to validate the control scheme. Different performance research together with actual and reactive power manipulate of VSM, effect of variation within the value of inertia of VSM at the electricity reaction, response of VSM for the grid frequency variant have been performed. The overall performance of VSM control is in comparison with the conventional stoop control approach for the grid connectedc onverters.

High Speed Multi-Level Discrete Wavelet Transform Using Canonic Signed Digit Technique
Authors:- Kumar Anuj Sinha, Dr. Neetesh Raghuwanshi, Dr. Bharti Chourasia

Abstract:-A few designs have been proposed for productive VLSI usage of 2-D DWT for continuous applications. It is discovered that multipliers expend more chip zone and builds unpredictability of the DWT engineering. Multiplier-less (M-less) equipment usage approach gives an answer for lessen chip zone, bring down equipment unpredictability and higher throughput of calculation of the DWT architecture. The proposed design outline is (i) priority must be given for memory complexity optimization over the arithmetic complexity optimization or reduction of cycle period and (ii) memory utilization efficiency to be considered ahead of memory reduction due to design complexity of memory optimization method. Based on the proposed design outline four separate design approaches and concurrent architectures are presented in this thesis for area-delay and power efficient realization of multilevel 2-D DWT. In this theory a M-less VLSI engineering is proposed utilizing new circulated math calculation named CSD. We show that CSD is an exceptionally effective design with adders as the primary part and free of ROM, duplication, and subtraction. The proposed engineering utilizing CSD gives less deferral and least number of cut looked at the current design. The simulation was performed using XILINX 14.1i and ModelSim simulator.

Implementation of Power Area Efficient 32-Bit Approximate Multiplier with Improved Accuracy
Authors:- M.Tech. Scholar Priti Shrivastava, Dr.Bharti Chourasia

Abstract:- Approximate computing has received significant attention as a promising strategy to enhance performance of multiplication. Various arithmetic operations such as multiplication addition, subtraction are important part of digital circuit to speed up the computation speed of processor. This paper presents 32 bit approximate multiplier for high speed and low delay for advance digital signal processing. Previous it is designed at 16 bit for various applications. Research work is focus on hardware-level approximation by introducing the partial product perforation technique and dadda multiplier for designing approximate multiplication circuits. Xilinx 14.7 is used to implementation with verilog programming language.

Blockchain-Based Access Control Framework in Patient-Centered Interoperability
Authors:- Qingsong Zhao, Rodney Thompson

Abstract:- Interoperability is one of the most critical functions in Health Information System (HIS), which is shifting from Hospital-Centered Interoperability (HCI) to Patient-Centered interoperability (PCI). However, in HIS there isn’t a framework that supports patient to protect their information’s confidentiality and integrity, and to audit data usage. In this paper, we look at Blockchain and Smart Contract technologies and their key features that make blockchain the technology to solve the problem. We then propose a Blockchain-based access control framework in patient-centered interoperability and its implementation.

Enhanced Performance Reversible ALU Design Using Reversible HNG Gate
Authors:- M.Tech. Scholar Mohini Mehra, Dr. Bharti Chourasia

Abstract:- ALU is the most essential block of any computer, microprocessor and digital signal processors DSPs. All the arithmetic and logical operations are performed inside the arithmetical and logic unit of the processor. The processing speed of the CPU is relying upon the complexity of the logics inside.Programmable reversible logic is developing as a prospective logic configuration style for execution in present day nanotechnology and quantum computing application with insignificant effect on generation of circuit heat. Late advancement in reversible logic utilizing and quantum computation algorithms take into account to enhance computers architecture and arithmetic logic unit architecture. The proposed ALU control unit configuration is made up from three Feynman reversible logic gates, three R-I reversible logic gates and one Fredkin reversible logic gate which is synthesized and simulated on Xilinx.14.7 ISE design suite. The simulation of proposed design has been done on Vertex-7 device family using Xilinx Isim HDL simulator. The obtained results are comparatively better as compared to existing results. The proposed design has quantum cost efficient. The quantum cost evaluated is “26n”, has minimum garbage output evaluated “5n” and ancilla-input evaluated “3n+2” where “n” is the number of bits. With respect of device utilization, proposed design occupies less area reduced about to 12.86% and minimum aggregate evaluated delay is 5.96ns to achieve high- speed.

Design and Analysis of Low Power Consumption I0T Full Adder Circuit
Authors:- M.Tech.Scholar Sheetal Sahani, Dr. Bharti Chourasia

Abstract:- This paper presents a design methodology using CMOS transistor for the architecture of full adder design with minimum number of transistor i.e. reduced size and reduced area for low power consumption in CMOS 90nm technology. This is used to implement low power full adder design for carrying out summation of three different input bits. The circuit of low power full adder is designed by using DSCH tool 2.7 & analysis of the low power full adder design is done at room temperature in CMOS 90 nm technology by using Micro wind tool 2.6.The result shows the comparison in CMOS technology at 90 nm rule on the design in regards of power dissipation, signal propagation delay, transistor counts and power delay product. A comparison is also carried out by some of the parameters taking into consideration like delay of the low power full adder circuit design with the base paper full adder design, which shows the advantage of the proposed low power full adder design. We are using two different simulation tools such as DSCH 2.7 for circuit design and Micro-wind 2.6 for waveform simulation. Firstly the low power full adder circuit will be designed using DSCH tool 2.7 using 10 transistor maintaining W/L ratio 3:1. Then the Verilog code of the design is made and the layout will be made in CMOS 90 nm technology using microwind tool 2.6. The low power full adder circuit using 10T design will be simulated at room temperature in CMOS 90 nm technology to compare different parameters like power consumption, delay, PDP & transistor counts.

Phytorid Technology
Authors:- Madhavi Sawant, Kalpesh Aware, Yogesh Honrao

Abstract:- – Demand for water is increasing day by day, we need to develop various low-cost technologies which could be implemented at point source as well as at individual houses so that wastewater could be treated and reused at house-hold levels and hence reducing the loads on sewage treatment plants. Also, at various places treated wastewater from sewage treatment plants is disposed in natural waterways such as rivers, lakes and hence they are polluted and increases risk of hygiene. Hence in order to reduce pollution and to make smart use of wastewater for future purposes one technology which is used is Phytorid Technology. This technology is a patented technology and is dependent on various plant species. The aim of this project is providing a system which is low-cost, low-maintenance, and which works without disturbing ecosystem. To improve the quality to water without causing ground-pollution is done by considering various water parameters which should be satisfied for reusing the water for various purposes with reference of IS 3025 code books.

Performance Analysis of Low Power high speed 1-Bit CMOS Full Adder Cell
Authors:- M. Tech. Scholar Ayushi Katiyar, Dr. Bharti Chourasia

Abstract:- This paper presents a design methodology using CMOS transistor for the architecture of full adder design with minimum number of transistor i.e. reduced size and reduced area for low power consumption in CMOS 90nm technology. This is used to implement low power full adder design for carrying out summation of three different input bits. The circuit of low power full adder is designed by using DSCH tool 2.7 & analysis of the low power full adder design is done at room temperature in CMOS 90 nm technology by using Micro wind tool 2.6.The result shows the comparison in CMOS technology at 90 nm rule on the design in regards of power dissipation, signal propagation delay, transistor counts and power delay product. A comparison is also carried out by some of the parameters taking into consideration like delay of the low power full adder circuit design with the base paper full adder design, which shows the advantage of the proposed low power full adder design. We are using two different simulation tools such as DSCH 2.7 for circuit design and Micro-wind 2.6 for waveform simulation. Firstly the low power full adder circuit will be designed using DSCH tool 2.7 using 10 transistor maintaining W/L ratio 3:1. Then the Verilog code of the design is made and the layout will be made in CMOS 90 nm technology using microwind tool 2.6. The low power full adder circuit using 10T design will be simulated at room temperature in CMOS 90 nm technology to compare different parameters like power consumption, delay, PDP & transistor counts.

Clothes Hanging System
Authors:- Rajalakshmi, Sangeetha, Yaswini, Mathivathana oviya pavai T

Abstract:- The unstable weather condition can make difficulty in drying clothes and the situation will become worse if it is raining. For people who are working, surely they worried about their clothes that left dry outside. This project introduces smart outdoor clothes hanging system that can automatically detect the atmosphere conditions and the presence of rain and the sunlight and provide the shelter for the clothes to protect them rain and also automatically retrieve out the clothes when it is the sunny day and oppositely retrieve in the clothes when it is a rainy day.The dry-time of the clothes will be counted and it will automatically retrieve-in the clothes when the dried-time is finished. This project will make use of various sensors such as rain sensor, LDR sensor and moisture sensor for detecting rain,light intensity and dryness respectively. Day conditions will display sunny, cloud or rainy.Soft iron plate is placed for placing the wet clothes and their movements are controlled by gear motors which are placed on either side. This hanger system can be used in hospitals, hostels and home.

A Review on Image Object Segmentation Features on Various Techniques and Limitations
Authors:- Neha Agrawal, Dr.Mrs. Farah Haneef

Abstract:- Image segmentation is defined as a partition realized to an image into homogeneous regions to modify it into something that is more meaningful and softer to examine. Although several segmentation approaches have been proposed recent years. As amount of data increases so manual segmentation and identification is tough. So there is a need of mechanized procedure for precise segmentation of image. Distinctive programmed strategies have been produced till date to expand the precision for segmentation finding. In this paper distinctive techniques for object segmentation done by various researchers with benefits and drawbacks of these prior proposed work.

Image Restoration Using Sparse Dictionary Matrix Learning K-Svd Algorithm
Authors:- Rahul Joshi R, Saranyu P, Vijay R E, Associate Prof. J. Deepa

Abstract:- Images captured in smoky weather conditions causes the poor visibility, which will create a more impacts on the outdoor computer vision systems, such as video surveillance, intelligent transportation assistance system, remote sensing space cameras and so on. In certain situations, actual visibility restoration approaches cannot able to restore images due to poor evaluation of haze thickness and the determination of color cast problems. In our work, we propose a visibility restoration approach to effectively solve inadequate haze thickness estimation and alleviate color cast problems. By doing so, a high-quality image with clear visibility and color can be generated to improve the visibility of single input image (with fog or haze), as well as the image’s details. Our approach process from two important statistical observations about haze-free images and the haze itself. First, Wavelet decomposition is applied and LUM Filter is applied on the decomposed image. Finally, we can get the dehazed output.

Prevention of Food Wastage Using Mobile Application
Authors:-Associate Professor V Gokula Krishnan(M.Tech., Phd), V Dhathanamoorthy, P Karan, N J Kishore

Abstract:- According to different sources, 25% to 40% of food products are wasted in the world. There is something that we still don’t see: food wasted by restaurants, shops or industries. There is also something we can see: food wasted by ourselves. This is the range focus of communities, through the management of wasted products of catering firms. Now a days People are aware of importance of food but there are no platform to share information about the excess of food available in the particular restaurants, shops and even in our homes for non-profitable organizations to offer food to the needy. We propose an android application in which the registered user can post the extra available food in their community for other users to come and get use of it by taking the extra food to the people in need.

Social BOT Detection for Twitter Dataset by User Action and Genetic Algorithm
Authors:- Sanjay Soni , Dr. Ritu Shrivastava

Abstract:- Digital platform dependency of today era attract promoters to brand product services. So unwanted posting was done by some programs known as bot. Number of researchers have proposed different techniques to identify these bots which was post by bot programs. This paper has developed a model to identify bots from real user. User action were analyze as features for classification of bots and real user. Whole processes adopt graph based clustering and teacher learning based optimization genetic algorithm. Graph based clustering classify user into two class and genetic algorithm find the class representative action sequence in form of features. Experiment was done on real twitter dataset and result shows that proposed model has increase the detection accuracy of work.

Twitter Fake News Analysis using Classification Techniques
Authors:- Khushbu Tomar, Prof. Manoj Kumar Nagar

Abstract:- Sentiment analysis is the computational study of opinions, sentiments, evaluations, attitudes, views and emotions expressed in text. It refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive or negative sentiment. Sentiment analysis over Twitter offers people a fast and effective way to measure the public’s feelings towards their party and politicians. The primary issue in previous sentiment analysis techniques is the determination of the most appropriate classifier for a given classification problem. If one classifier is chosen from the available classifiers, then there is no surety in the best performance on unseen data. So, to reduce the risk of selecting an inappropriate classifier, we are combining the outputs of a set of classifiers. Thus, in this paper, we use an approach that automatically classifies the sentiment of tweets by combining machine learning classifiers with lexicon-based classifier. We physically mark a broad Twitter data set of 100,000 tweets and perform low quality content discovery continuously dependent on the described noteworthy highlights and word level investigation. The consequences of our exploration demonstrate that our technique has a high precision of 0.9170 and a decent F1 of 0.9460 dependent on an irregular woodland classifier with continuous execution in the discovery of low-quality substance in tweets. Our work in this manner accomplishes a positive effect in improving client involvement in perusing internet-based life content.

Power Quality Improvement Using Istatcom (Improved Statcom) With DFIG
Authors:-M.Tech. Student Kuldeep Singh, Assistant Professor Dr. Bhupendra Kumar

Abstract:- In tradition power compensation devices and controlling techniques many disadvantage like only analyzing lower stability citeraia.one other hand our proposed ISTATCOM (Improved STATCOM) provide higher stability and lower losses. These are simulating MATLAB2015A software using Simulink. In this research work also gives a more stabilize DFIG system to controlling of power compensation ISTATCOM.

A Review of Power Quality Improvement Using Istatcom (Improved Statcom) With DFIG
Authors:- M.Tech. Student Kuldeep Singh, Assistant Professor Dr. Bhupendra Kumar

Abstract:- Along with the increasing of electricity load type and capacity, the problems of the power quality, especially reactive power and harmonic, are a serious threat to the safe operation of power grid. Static synchronous compensator (STATCOM), as an important member of the FACT, has been widely used as the state-of the-art dynamic shunt compensator for controlling reactive power in transmission and distribution. It has attracted an extensive attention in domestic and foreign scientific and engineering fields with excellent performances of its smooth reactive power regulation and fast dynamic characteristics. Comparing with the traditional synchronous condenser. Static var compensator SVC, STATCOM which has a small size, a faster speed, a wide operation range has a great advantage in performance and can effectively compensate the reactive power, suppress harmonic current and provide voltage support for transmission system, it will be more and more widely used. This paper introduces the background, application status, challenges and development trend of STATCOM, pointing out that with the development of new technology and new power electronic devices and STATCOM in distribution network, STATCOM will occupy a very important position in the grid.

Review on Kinetic Energy Recovery System for Bicycle
Authors:- Khushbu Tomar, Prof. Manoj Kumar Nagar

Abstract:- This paper is a literature review on KERS for bicycle. Kinetic Energy Recovery System, commonly abbreviated KERS, is a system to recover the Kinetic energy of a moving vehicle under braking. This system stores the kinetic energy in the form of potential energy and converts it back to kinetic energy when needed. When riding a bicycle it becomes too tiresome to start the bicycle again after braking. If the bicycle is provided with a kinetic energy recovery system then the rider will have two power sources that he can use at his will. When brakes are applied kinetic energy is wasted because the kinetic energy converts into heat energy due to friction at the contact surface and the heat energy dissipates into the atmosphere due to thermal radiation. Vehicles equipped with KERS devices are able to take some of its kinetic energy out slowing down the vehicle. This is a form of braking in which energy is not wasted, instead gets stored in some device. Using a proper mechanism, this energy that is stored in terms of potential energy can be converted back into kinetic energy to give the vehicle an extra boost of power. In the literature review different types of available KERS systems are compared and a mechanical based KERS system is found to be the best suitable for a bicycle.

Student Information System
Authors:- Professor Apeksha Gopale, Kharmale Akshay Kans, Khan Nayaab Moiz Ahmed, Siddiqui Shamshad Hussain

Abstract:- (SIS) Student Information System enables us to access all of the necessary forms of information required by the users or the teachers to manage their own or others authorized record, let’s say students records in an automated manner over the internet at any point in time [1]. The information or the documents of the c and date sor students are manipulated in such a way that it provides an alliance with the system to balance the student’s information. The organizations such as big universities make use of or recycle the records of the students very effectively and efficiently [5]. All the data available in the form of digital documents which are updated, modernize and renovated time to time by the department or the administration, which in this case is the faculties and the higher authorities in an organization, are most likely to be treated as sensitive data for every section [2]. The college details as well as the student’s details along with the course and batch details followed by curriculum and placement details and more importantly academic-related records and reports with all the necessary resources are taken care of or handheld by the (SIS) Student Information System [3]. The Student information system allows us to examine and analyses all the interest,affairs and transactions in the college, Different ambiguity and uncertainties can be produced and established on various substitute or preferences related to the student’s semester including the courses and the examination[2].

Design and Development of Refrigeration and Air Conditioning Instructional Trainer
Authors:- Orlando D. Sumalpong, Jr. , Dr. Alenogines L. San Diego

Abstract:- The study aims to infuse advanced educational technology in classroom instruction or training on refrigeration and air conditioning. Specifically, the focus of the study includes designing, developing, fabricating, and evaluating the instructional trainer. Through simulations, end-users experiences the actual function of the refrigeration and air conditioning system that could help enhance students learning capabilities and skills in basic troubleshooting on both electrical and the mechanical system. This trainer was evaluated by twenty-five (25) respondents composed of two (2) faculty and twenty-three (23) students to determine its level of quality in terms of functionality, reliability, portability, aesthetics, economy, safety, and academic impact using a descriptive survey questionnaire. Based on the result of the study, the trainer’s functionality, reliability, portability, safety, and academic impact are Excellent while the aesthetics and the economy are Very Good. This implies that the trainer serves its purpose in providing comprehensive teaching-learning capabilities to equip the users with thorough knowledge and skills. It is recommended for further research studies to use Programmable Logic Controller (PLC) in monitoring and in detecting the pressure and temperature of the refrigeration system; to inject more faults in the trainer to enhance the troubleshooting skills of the students, and to mount a whiteboard for lecture purposes at the back of the trainer.

Predicting and Managing Data using Cloud Computing
Authors:- S.Kaviarasan, E.Venkatesh, S.Shrinivasan, E.L.Sarath Pranev

Abstract:- Stock value forecast has been an inclining yet mystifying topic for quite a long period of time. These days developing of information become essential effort to store and maintain information. On the other hand due to availability of large number of data in all fields, it helps to manipulate the available data and makes that data to get useful by required way. Because of increased data volume information become significant job in all spots. By considering an under-used information source client can assume a job, for example, forecast of future investigation. Using corporate to analyze and build the predictor for future visit volume and for corporate predicts the stock price for product get falls up and down. By utilizing information sources we exhibiting the extravagance of the information source, shows how the information can be utilized to improve stock cost in corporate, finds intriguing patterns and conduct, gives stock cost to item finds a workable pace. The aftereffect of these examination are made utilizing KNN and mix calculation. This assists with understanding the upside of investigation of information and forecast report shows the information in visual diagram which makes the client to improve understanding.

Performance of Total Quality Management in Manufacturing Industry to Increase Production Rate
Authors:- M.Tech. Scholar Gaurav Awadhiya, Professor Trilok Mishra

Abstract:- The main objectives in implementing Total Quality Management (TQM) in any organizations are to ensure their products manufactured or services provided shall satisfy their customers’ requirements and needs. Therefore, the level of awareness of TQM has increased considerably over the past few years. Due to this reason, the objectives of this research are carried out to investigate the level of TQM implementation and to pinpoint areas lacking in implementation in a manufacturing industry.A case study on a TQM project in a manufacturing industry is formulated and presented. The objective of this thesis is to study the application of some important TQM tools and techniques subsequently study the benefits gained through implementation of these tools. The analysis will be carried out on the basis of research on TQM in the practice, pointed out in literature by different authors in this field. The finding shows that productivity of RPS assembly line YAD model improves by increasing the production rate from 77% to 99 %. The evidence presented shows that companies that do adopt quality cost model are successful in reducing quality costs and improving quality for their customers.

Twitter Data Analysis using Machine Learning Classification Techniques
Authors:- M. Tech. Scholar Nisha Kumawat, Assistant Professor P. Kumar Choure

Abstract:- Sentiment analysis is the computational study of opinions, sentiments, evaluations, attitudes, views and emotions expressed in text. It refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive or negative sentiment. Sentiment analysis over Twitter offers people a fast and effective way to measure the public’s feelings towards their party and politicians. The primary issue in previous sentiment analysis techniques is the determination of the most appropriate classifier for a given classification problem. If one classifier is chosen from the available classifiers, then there is no surety in the best performance on unseen data. So, to reduce the risk of selecting an inappropriate classifier, we are combining the outputs of a set of classifiers. Thus, in this paper, we use an approach that automatically classifies the sentiment of tweets by combining machine learning classifiers with lexicon-based classifier. We physically mark a broad Twitter dataset of 100,000 tweets and perform low quality content discovery continuously dependent on the described noteworthy highlights and word level investigation. The consequences of our exploration demonstrate that our technique has a high precision of 0.9170 and a decent F1 of 0.9460 dependent on an irregular woodland classifier with continuous execution in the discovery of low-quality substance in tweets. Our work in this manner accomplishes a positive effect in improving client involvement in perusing internet-based life content.

Review of The Optimal Coordination of Directional Overcurrent Relay Using Moth Flame Optimization
Authors:- Shobha Goswami, Assistant Professor Tikeshwar Gajpal

Abstract:- A comprehensive review of different optimal coordination methods like seekers algorithm, fire fly algorithm, hybrid genetic algorithm, hybrid PSO, artificial bees colony, flower polliation ,CMA-ES algorithm, GANLP for mitigate the relay problem. Relay coordination is essential to ensure quick operation of relays in order to avoid the excessive damage to the equipment’s and end users consumers. As the probability of shunt fault occurring in the network is higher comparatively so protection is done accordingly. Relay coordination means coordination of proper relaying operation with certain insight between primary and back-up relays pair connected in the network.

Cargo Management System Using Ethereum Blockchain
Authors:- Rensen S., HeadSajeev J., Principal Dr. Mahalakshmi T.

Abstract:- The Cargo management system is developed in truffle framework, Solidity, Php and has the MySql database. The objective of this product is to deal with all the cargo business. The product stores the subtle elements of the packages the client need to dispatch. The name of the package, weight, number of packages or compartments, starting point port, and the destination port. During shipping as indicated by the data given by various clients, every one of the bundles is loaded and shipped. The quantity of packages is noted down in the product and the same report is given to the clients of the destination port. At the point when the packages achieve the destination place, the client of the destination place verifies whether every one of the packages is available and are come to securely. If so bundles of clients are partitioned again and they are sent to their goal put either through train or through street transport. At the point when the packages have achieved their last address, a notice is sent to the client of the cause place. The client must pay the transportation to add up to the freight administration.

Reciting Chatbot for Image Recognition in Goal-Driven Training
Authors:- S. Kaviarasan, M.Arun Prakash, S. Arun Raj, K. Ram Kumar

Abstract:- In the age of Chatbots, they’re assisting us to locate merchandise, places, food or even clear up customer service problems with increasing in AI technology. Chatbot will educate you concerning noteworthy matters just like the need to click a hyperlink or they are human, no longer robots. Especially, given an image, a discourse history, and a picture issue, the specialist must ground the photo question, result in records placing, and solution the inquiry precisely. User photos may be uploaded to the chatbot API and then the photo can be processed. After that API displays remark approximately the image which we uploaded. In that grounded records can be degraded to bot by consumer over a long chat. To enhance this, we generally tend to devise an honest auxiliary goal that encourages Q-BOT to raise diverse queries, accordingly decreasing repetitions and subsequently optional A-BOT to explore a bigger kingdom residence all through RL i.e. To be exposed to quite a few visible ideas to speak about, and varied inquiries to reply. This may be performed by way of aim pushed training to customers query to get a greater precise solution to the consumer.

Sentimental Analysis on Social Data Using Machine Learning and Supervised Learning Techniques
Authors:- Pillala Sri Harsha Devi

Abstract:- Social Website provides a convenient platform, on which users can share information with their friends and post their timely status or attitude. There exits the most up to date and heterogeneous data of users, different social websites provide various functions that users can upload, comment and repost messages with different media types. Sentiment analysis aims at computationally identifying people’s opinion or attitude towards entities such as events, topics or product features. This work is also known as opinion mining or subjectivity analysisSentimental analysis on social data i.e., sentiment analysis can apply to almost all possible domains like products, services for social events and political elections, market research, social media, advertising, recommendation systems, email filtering, stock market prediction, upcoming movie reviews sentiment prediction, book reviews sentiment, etc In the existing system sentiment orientation from review text documents using machine learning and supervised learning algorithm techniques. The algorithms that are projected and implemented are Naive Bayes (NB), Support vector Machine (SVM) and K-means clustering algorithmic methods. We enhanced these techniques to develop more accurate results using Neural network and deep learning algorithms and features.

Heist Tracking and Prevention in ATM Utilizing IOT and Blynk Server
Authors:- M. Sugapriya

Abstract:- In the digitalization, everybody needs cash without cooperation with bank whenever along these lines the ATM (Automotive Teller Machines) are introduced wherever inside the localities. Because the measure of ATMs expanded, anticipation of robbery and security of client is that the prime goal. at this, security frameworks aren’t profoundly made sure about as they’re just given alert. This venture manages plan and usage of ATM security framework utilizing NODEMCU. The prime target of this undertaking is, to make sure about the ATM framework utilizing IOT and vibration sensor. When a hoodlum enters and attempted to hurt the machine, the vibration sensor which is appended to the machine get vibrated and imparts the sign to the NODEMCU microcontroller. When the regulator gets signal, it bolts the entryway of ATM room by imparting sign to the dc engine and sprinkler sprinkles the chloroform to shape the hoodlum oblivious. The ringer additionally will be getting initiated simultaneously to alarm the close by individuals of ATM framework. All the while, the regulator will make an impression on an authorized individual of the bank through GPS modem and subsequently the entryway is made to open simply in the wake of entering the secret phrase by the bank staff.

Effect of Infill parameters on Time, Material Length, Weight and Price in 3d Printing
Authors:- Vishal Vijay Gholkar

Abstract:- As we know that 3D printing is new emerging technology that growing fast and lots of research carried out on this topic. This paper show that effects of three different infill patterns on printing time, length, weight of material and price in 3D printing. Standard 3D printers use 13 different types of infill patterns. We tested infill patterns of lines, zigzag and cubic with different layer thickness, speed, infill percentage to calculate length and weight printing time and price using Cura software. An orthogonal array was used for the experimental design. Optimum process parameters were determined by the gray relational grade obtained from the gray relational analysis. The results showed that the layer thickness 0.4mm, speed 80mm/sec, infill percentage 40%, and infill pattern cubic had the fastest printing time as compared to others.

Determinants of Members’ Participation in Maize Marketing through Cooperative: The Case of Boreda District of Gamo Zone, Ethiopia
Authors:- Tariku Wobete M.sc., Tekle Leza, Ph.D.

Abstract:- Cooperative, as economic enterprises, play a meaningful role in uplifting the socio-economic conditions of their members and their local communities. Reducing the challenges the agricultural cooperatives are facing, and using their potentials can support to have tenth agricultural sector and economic growth of the country. The objective of this study is therefore to identify determinants of members’ participation in maize marketing through cooperatives at Boreda District of Gamo Zone, Ethiopia. Primary and secondary data were collected for this study. Multi-stage sampling procedure was employed to select three Multi-Purpose Primary cooperatives and out of 733 cooperative members, 129 sample respondents were selected. Primary data to the year 2019 was collected from selected respondents through the interview Schedule. Out of the total sampled households, 73.64%, and 26.36% participants and non- participants were selected through maize marketing cooperative respectively. Descriptive statistics were used to compare the socio-economic and institutional characteristics of the participants and non-participants households of maize marketing through cooperative. The T-test was used to determine whether there is a significant difference between the means of two groups and Chi-square test was used to see the relationship between the two groups. Heckman two-stage selection models were employed to identify the participation decision and level of participation of cooperative members in the maize market. A total of fifteen explanatory variables were included in the descriptive analysis, off which eight variables influenced the members’ participation in maize marketing through cooperative. Whereas thirteen explanatory variables were incorporated in the Heckman two stage model and eight variables such sex, education status, farm size, farm experience, non-farm income, market distance, cooperative members satisfaction and maize production significantly affects the participation decision in maize market through cooperative. And four variables such as, farm size, training, market distance and members’ satisfaction significantly influence the level of participation in maize marketing through cooperative. The policy implication of this study is that continuous training, and education, improved maize production with diversification of income sources has to be maintained.

Leave a Reply

Your email address will not be published. Required fields are marked *