IJSRET Volume 7 Issue 1,Jan-Feb-2021


A Review of Intrusion Detection Systems
Authors:- Subhash Waskle, Associate Prof. Avinash Pal

Abstract:- An intrusion detection system (IDS) is devices or software’s that are used to monitors networks for any unkind activities that bridge the normal functionality of systems hence causing some policy violation. This paper reviews some of the intrusion detection systems and software’s highlighting their main classifications and their performance evaluations and measure.

Tapping into Geothermal Technology to Boost Electricity Supply in Nigeria
Authors:- Alabi A.A., Adeleke B.S. , Adekanmbi, A.O., Fawole T.G.

Abstract:- It is no more news that attention of humanity has shifted to the generation of energy through renewable energy sources. This paper is based on how Nigeria can tap into the use of geothermal technology other than other renewable energy sources to generate electricity using of the two available geothermal resources (hydrothermal and petrothermal) in available locations. Through hydrothermal plants the heat received from geothermal resources are converted to electricity. This is a technology that if efficiently utilized, can go a long way to make Nigeria electricity challenge a thing of the past.

Segregating Spammers from Social Digital Platform by Genetic Algorithm
Authors:- Rahul Kumar, Dr. Avinash Sharma

Abstract:- Presence of online Social digital platform in human life from past few decade influence advertiser to place their product in different style. Some of digital marketing companies plays a giant role for promoting a product, service, thought, etc. to social digital users. Digital platform do not want to lose their control so spammer who work professionally to promote a brand need to identify ad remove from the platform. This paper has work in this field of online social spammer detection by developing a unsupervised algorithm which identify the user class (Spammer or real) as per sequential behavior done. Proposed work utilized a intelligent water drop genetic algorithm for segregating the users into desired class. Some of digital platform inherent features of the user profile were used for finding the fitness class of the user to the corresponding class of user. Experimental work was done on real twitter dataset and comparison of proposed model was done with existing method of spammer detection. Results shows that proposed model has increased the accuracy of spammer detection.

An Evaluation of the Role Played By The Head Of School In The Delivery Of Quality Education In Zimbabwean Day Secondary Schools: A Case Study Of Guruve District
Authors:- Laison Jairus Kavumbura

Abstract:- Quality education is a critical phenomenon for the provision of quality human resources in any country. Quality education focuses on learning which strengthens the capacity of children to act progressively on their own behalf through the acquisition of knowledge in useful skills. Quality in terms of school products implies school graduates who are not just literate or numerate, but graduates who add value to their families, communities as well as nation through the knowledge, skills and morals they acquired from the school system. In Zimbabwe the parents, government and employers place a very high premium on the quality of education that schools provide to their learners. Certain schools are shunned because of their perceived low standards and yet others are sought after by many parents and students due to the quality of learning perceived to obtain in them. Quality therefore is about high standards of achievement by pupils in all spheres. Quality does not come about like manna from heaven. It is brought about in an organisation deliberately through the leadership process. This article draws on a quantitative enquiry on the role played by heads in the delivery of quality education in Zimbabwean Secondary schools. The study adopted the descriptive survey design. The target population included all secondary school teachers in Guruve district which has a teacher population of plus minus 18000 teachers. Random sampling was used to arrive at a sample of 200 respondents who were made up of 120 males and 80 females. All the information was collected through a questionnaire which had both close-ended and open-ended questions. Descriptive statistical analysis was used to interpret the data. The study revealed that heads did not encourage attendance by pupils to all lessons, there was inadequate provision of stationary and learning equipment and that supervision of learning was not adequately done by the heads. The study also reveals that heads were not results focused in their operations. The study recommends that heads of schools should be equipped with skills and knowledge in the field of leadership and management so that they promote quality education in their schools. Heads should also prioritise supervision of instruction and provision of adequate teaching/learning materials.

A Glass Fiber Compressive Strength Prediction Using Artificial Intelligence (ANN)
Authors:- Madhav Shrivastav, Prof. Sourabh Dashore

Abstract:- Concrete, being widely used, is the most important building material in civil engineering. Concrete is a highly complex material, which makes modeling its behavior a very difficult task. Many attempts were taken earlier to develop suitable mathematical models for the prediction of compressive strength and flexural strength of different concretes. Those traditional methods have failed to map non-linear behavior of concrete ingredients. The present study has used artificial neural networks (ANN) to predict the compressive strength and flexural strength of glass powder concrete. The ANN model has been developed and validated in this research using experimental strength data of different mixes. The artificial neural networks (ANN) model is constructed trained and tested (in MATLAB. For study models were developed. Strength was modeled in ANN model as a function of input data collected by the experimental result in laboratory. In this study, an attempt was also made to develop a multiple regression model for predicting strength (in EXCEL) as it is being used largely by researches in prediction. Finally, this model was used to predict the strength of concrete for different different days.

A Review of Glaucoma Detection Techniques
Authors:- Arkaja Saxena, Associate Prof. Avinash Pal

Abstract:- Glaucoma is one of the main causes of blindness today. It is basically a group of eye diseases that leads to the optic nerve damage and arises mostly due to the increases in the Intraocular Pressure (IOP) within the eyes. The early detection as well as diagnosis of this disorder is very important as at the later stages it leads to complete loss of vision.In this paper we reviewed different glaucoma detection procedures by digital image processing of fundus of eye. This paper also proposes a very simple method for the screening of glaucoma.

Concept Maps: Let’s Organize Your Speech
Authors:- Nirumala Rothinam, Hadidah Abdul Rahman

Abstract:- This research was to observe the effectiveness of concept maps in enhancing Matriculation students’ speaking ability in terms of organization and content. The specific objective of this research is to identify if concept maps could be an effective educational tool to improve students’ speaking scores according to the Malaysian University English Test (MUET) speaking scoring guideline. Participants of this research consist of 24 one-year Science program students. Data collections were done through pre-test and post-test. Data were analysed using descriptive analysis. Results of the analysis established that all the 24 participants showed an increase in the speaking scores after the intervention using concept maps. The research indicated that concept mapping is effective in supporting the organization of thoughts and content to produce verbal output thus producing a positive correlation between the use of concept maps and scores for participants’ speaking assessment.

A Review of Recommendation Techniques
Authors:- M. Tech. Scholar Pooja Relan, Asst. Prof. Avinash Pal

Abstract:- On the Internet, the place the number about
Decisions may be overwhelming, there will be necessity will filter, prioritize Also effectively convey important data so as on allay those issue of majority of the data overload, which need made an possibility issue will huge numbers Internet user. Recommenders techniques work out this issue by looking through huge volume for rapidly created majority of the data on furnish user with customize content and services. This paper investigates the separate aspects and potentials for distinctive prediction techniques clinched alongside recommendation techniques in place with serve concerning illustration a compass to Scrutinize and act in the field of recommendation techniques.

Digital Social Platform BOT User Detection Features and Techniques
Authors:- M.Tech. Scholar Kritya Gorowara, Asst. Prof. Jayshree Boaddh, Asst. Prof. Jashwant Samar

Abstract:- Digital platforms in these days has its own place as a tool for getting more social. This attract many publisher to push there content to relevant audience. As time and labor were optimize by computer programs, so this posting of content is done by BOTs which are program. Many of social platform schedule some programs which detect those BOT user and remove from the network. This paper has summarized BOT detection techniques proposed by various researchers as per different social media platforms, users. As per type of social media platform features were also change and various common features were list in the paper for increasing the understanding of BOTs in the network. Some of evaluation parameters were also formulize which help to compare different BOT detection algorithms.

A Survey on Digital Image Retrieval Technique and Visual Features
Authors:- M.Tech. Scholar Astha Singh, Asst. Prof. Jayshree Boaddh, Asst. Prof. Jashwant Samar

Abstract:- Digital platform based services increases content on servers and retrieval of relevant information depends on data matching algorithms. Out of different type of data image plays an crucial role for various document proof, study, analysis, diagnosis. Hence retrieval of relevant image as per requirement is very important. This paper has summarized various image retrieval techniques proposed by authors for reducing the execution time and improving the relevance of the indexed image as per user query. Paper has list image features used by different scholars for finding the visual similarity between images. Content based image retrieval was done by two type of query first was visual and other was text, paper has list all type of retrieval techniques.

Variables Influencing Food Wastage and Rapid Composting Techniques of Food Waste in Malaysia
Authors:- Nurafiqah Izzati Zafriakma, Faeiza Buyong

Abstract:- – Rapid generation of food waste has become a major concern in municipal solid waste management (MSW) in Malaysia that are practically poor and unstructured. Food waste has significant adverse effects on food security, the environment and the economy, making it a significant problem that needs critical response. The current method in disposing of the waste in a landfill negatively impact human being and environmental safety. Food waste is a material produced when food is purchased, prepared and consumed. Based on the previous studies, it was found that there were variables that influence the number of food waste produced from each individual. Meanwhile, the current treatments used to treat food waste is time-consuming and unable to cope with the amount of incoming waste generated daily. Therefore, this study intended to identify the factors that influence the generation of food waste in Malaysia with the aim of analysing methods to reduce the amount of current or future food waste produced by rapid reduction techniques of composting.

Melanoma classification on Dermoscopy images using Transfer learning with CNN architectures
Authors:- Aaron Hill, Robert Collins, Joseph Morgan

Abstract:- Incidence rate of malignant melanoma has increased from the past two decades but the mortality that comes with it has stabilized. Early detection of melanoma was critical in the past as we do not have effective therapies and detection methodologies. State of the art classifiers based on CNNs are proved efficient to classify images of skin cancer more better than dermatologists and has provided more effective lifesavingdiagnosis, as now a days skin cancers can be detected in early stages. In this paper we will talk about classification of skin cancer using convolutional neural networks and transfer learning. We looked out for papers in Google scholar, PubMed, Google Scholar, Research Gate, Web of Science databases for original research papers and review papers. The papers that has sufficient reports with proofs has been taken into consideration.

Speech Recognition
Authors:- Bhuvan Taneja, Jones C J, Rohan Tanwar

Abstract:-Speech is a simple and effort less approach of communication amongst humans, but in this day and age humans are not restricted to connecting to one another but even to the various machines in their lives. The most essential being the computer. So, this communication approach or technique can be used for connecting humans and computers. This inter play is done by interfaces, this area being titled the Human Computer Interaction (HCI). The following paper gives an general outline of the principal meaning of Automatic Speech Recognition (ASR) which consists an essentialarea of artificial intelligence and it ought to be taken into consideration in course of any connected research (Categoryof vocabulary size ,speech, etc.). It also offers synopsis of essential research applicable to speech processing in the pastfew years, along side the overall scheme of our project that should be taken into account as aaddition of data in this field of study and to finish it off by mentioning about certain improvements that as it may be in further works.

The Efficacy of Risk-Assessment Score for Early Screening of Diabetes Mellitus Among Bangladeshi Adults
Authors:- Zaher Ahmed, Dr. Iftekhar Hasan

Abstract:-The chronic metabolic disorder diabetes mellitus (DM) is a fast-growing global problem with huge social, health, and economic consequences. Studies support the utilization of risk-assessment scoring systems in quantifying individual’s risk for developing T2DM. Thus, using a simple risk-assessment scoring system for early screening of T2DM among Bangladeshi adults will be beneficial to identify the high-risk adults and thus taking adequate preventive measures in combating diabetes. The aim of the study is to evaluate the efficacy of a risk-assessment scoring system for early screening among Bangladeshi adults for developing T2DM. A cross-sectional observational study was carried out to evaluate the efficacy of risk-assessment scoring system in the outpatient department (OPD) of Medicine, Barishal Medical College & Hospital, Barishal, Bangladesh from June 2020 to November 2020 among randomly sampled 323 adult Bangladeshi male and female subjects. With written informed consent, the Finnish Diabetes Risk Score (FINDRISC) questionnaire was used to collect the data including demographic characteristics and different risk factors. In this study, both non-modifiable and modifiable risk factors showed statistically significant association with the FINDRISC among Bangladeshi adults(p<0.05). Among 323 subjects, a total of 28.12% had slightly elevated diabetes risk score (DRS). A total of 16.05% had moderate DRS and 8.48% had very high DRS. There was a significant association among FINDRISC with history of previous high blood glucose, and treated hypertensive Bangladeshi adults. This study predicts that 24.53% of the Bangladeshi adults may develop moderate to high risk T2DM within the consecutive 10 years. This study clearly demonstrates that FINDRISC scoring system can work reasonably well as screening tool, detecting undiagnosed T2DM in the general population. People with high risk of DM should be referred for early intervention and changes to a healthy lifestyle and primary prevention to prevent or delay the onset of T2DM.The findings may help the health care professionals to substantiate the possible improvement in glucose metabolism and lifestyle changes, and better convince people at high risk of T2D to take action towards healthier lifestyle habits.

Big Data Security Challenges and Prevention Mechanisms in Business
Authors:- Anusha Dissanayake

Abstract:-Sensitive data analytics have reached gradually a smart area in the business world over the past few years. Various research has emphasized the importance of this field in augmenting the business performance in the industry. Excessive collection of data is making harmful effects on human beings. These data are extremely vulnerable for outsiders thanks to their hidden value. Big data gives us more advantages to make progress in many fields including business. It improves the competitive advantage of companies and to add value for many social and economic sectors. Sensitive data sharing brings new information security and privacy challenges. Earlier technologies and methods are no longer appropriate and lack performance when applied in a big data context. This research focuses on investigating the challenges and providing viable solutions to minimize the risk of the threats of user data.

Assessment of Waste Management Techniques from Palm Oil Producing Industry: A Case Study of Nigerian Institute for Oil Palm Research (Nifor) Benin City
Authors:- Olawepo B. B., Smart Bello, Diamond Blessing, Ajayi A. S., Eriakha E. C.

Abstract:- Oil palm (Elaeisguineensis) is one of the most important economic oil crops in Nigeria. As of early 1900, Nigeria was producing all palm oil sold in the world market. Nigerian Institute for Oil Palm Research (NIFOR) is an International Center of Excellence in Palms and Shea Research and Development. It is a common sight to see decayed and overflowing solid and liquid waste dumps all over most palm oil producing industries. The objective of this study is to assess the technique for waste management in NIFOR. Primary data through interview and secondary data from literatures and periodicals were used. The survey reveals that most wastes generated are converted into useful means. The POME (Palm oil mill effluent) is converted into organic fertilizer through the process of composting, the EFB (Empty fruit bunch) is used for erosion control and for increasing soil water retention capacity, and the PKS (Palm kernel shell) is used as a source of fuel for boilers and sterilizers. It is therefore recommended that the government and management of NIFOR should increase environment awareness programme for all staff to save cost and create less environmental degradation while vigorously involving the people in all facets of environmental management.

Design, Fabrication and Testing of a Cocoa Depodding Machine
Authors:- Smart Bello, Olawepo B. B., Diamond Blessing, Suleiman A. I.

Abstract:- The project involves the design of a cocoa depodding machine, to eliminate drudgery experienced by local farmers using manual method of pod breaking. The basic features of the machine are the frame, feeding trough, shaft, stationary blade, rotating blade, rotating drum, chain, and electric motor. The machine operates on the principle of compressing the pods against the stationary blade to break it and separate the pods from the beans. As the blade rotates, it pushes the pods towards the stationary blade, which cuts the pods and transfers it to the separation chamber. As the drum rotates the beans are separated from the pods through the rotating sieve while the pod goes out through the discharge outlet. The machine is powered by 1hp three phase electric motor. The machine has an efficiency of 36%, a capacity of 500kg/hr. The depodding machine can be used by local farmers in rural areas for small scale cocoa processing.

Martial Arts and Combative Program of the Philippine Military Academy Cadet Corps Armed Forces of the Philippines: An Assessment
Authors:- Jayson L. Vicente

Abstract:- The young men and women of PMA CCAFP are bred to be front liners and last line of defenseduring war and times of peace as such, they must be equipped with the most practical and most effective combat ready Martial Arts and Combative skills to effectively fulfil their duty,as well as to protect and safeguard themselves to continue serving the people and their country. This study shall assess the current Martial Arts and Combative Program of the PMA CCAFP using descriptive methodology by interviews and floating questionnaires. The current Martial Arts and Combative Program of the PMA CCAFP with all of the subjects involved are more sports inclined rather than combat equipped. Picking the best from each subject used in the program, this study seeks to recommend improvements or create a better Martial Arts and Combative Program that will satisfy the objective of producing Martial Arts combatant graduates. A good Martial Arts and Combative Program for PMA is essential to prepare them on what lies ahead which is unforgiving and no rules to pacify threat.

Identification of New Cloud Computing Approach for User Authentication and Protection
Authors:- Research Scholar Nipun Sharma, Prof. Dr. Rohit Kumar Singhal

Abstract:- Cloud computing is the very attractive technology area in the current era due to its cost effective, flexible and portable services. Cloud computing is basically a business model which provides services related to Information Technology on demand over network. It offers on demand network access to the pool of shared resources with minimal management effort and service provider interaction. When the services of Cloud Computing are used, the major issue arises, that is security. To tackle with these kinds of issues, Cloud Provider must have sufficient control to provide security. There are different-different provisions available with service provider to handle such kinds of above security issues. Intruders can affect files stored in the cloud or messages of users by intercepting. There is required to provide security to files or messages by means of encryption techniques.To prevent attacks like chosen plain text attack, chosen cipher text attack, denial of service attack.

Determination of Seat Design Prameters Based on Ergonomics
Authors:- Shubham Kadam, Amit Nagarkar, Siddhesh Sawant, Pratik Khopade, Prof. Dhiraj Kumar K. More

Abstract:- Automotive seat design has been always challenge for engineers because design parameters for automotive seats are complex. Three design objectives comfort, safety, and health need to be satisfied simultaneously and measurement of this objectives are difficult because of such factors as user subjectivity, seat geometry, occupant anthropometry and amount of time spent sitting. This paper describes various methods of comfort analysis of off-road car vehicle seat which is based on different criteria like fit parameters related to anthropometric measurements, feel parameters and support parameters defined with respect to seated posture.

Current Issues and Challenges of Online Learning Approach due to Pandemic Outbreak of Coronavirus (Covid-19)
Authors:- Hosalya DeviA/P Doraisamy

Abstract:- The pandemic outbreak of novel coronavirus (COVID-19) recently since March 2020 has constrained many people in the world to opt for a different lifestyle, a new way of work as well as an alternative way to learn. Before the COVID-19 pandemic, the face-to-face traditional class is the most common and favorable learning approach among the students, teachers, parents, academic institutions, and the Ministry of Education. However, online learning has become a famous and well-known resolution around the world after the movement control order is enforced. The online mode of learning has many issues and challenges. Both students and teachers require more time to adapt to online learning because the majority of them are still trying to explore the new technological innovation and techniques to use in the online learning process. In the future, a mixture of the mode of learning would be one of the selections for the academic institution, especially a higher learning institution.

Production of Bioplastics from Banana Peels
Authors:-Jaikishan Chandarana, P. L.V. N Sai Chandra

Abstract:- Plastic offers a variety of benefits, in a variety of shapes, such as sheets, panels, film, which can all be flexible as the application requires. However, use of too many plastics results in massive harmful effects. It takes longer time to degrade which is estimated about 500 years to degrade and will become toxic after decomposed. The objective of this study is to produce biodegradable plastic from banana peels as a substitute for the conventional plastic and to prove that the starch in the banana peel could be used in the production of the biodegradable plastic. The strength of the film was determined using the elongation test by comparing the biodegradable film with a control film and a synthetic plastic. In the soil burial degradation test, the intensity of degradation was tested for all three types of film and the biodegradable film degraded at a rapid rate compared to control film while the synthetic plastic did not degrade at all. Based on all the testing that was carried out, the biodegradable film from banana peel is the best and ideal overall compared to the control and synthetic plastic. The tensile strength for sample keeps increasing when the residence times are increased from 5 minutes to 15 minutes and reaches a maximum at 15minutes and then starts decreasing when the time is increased to 20 minutes. This suggests that the optimum hydrolysis time is 15 minutes for this sample set Bioplastic film can sustain the weight near about 2 kg and which have enough tensile strength. The bioplastic prepared from banana peels that can be used as packaging material or as a carrying bag. Glycerol is added as plasticizer that increases its flexibility.

A Genetic Algorithm Approach for the Solution of Economic Load Dispatch Problem
Authors:- M.Tech. Scholar Siddhartha Tiwari, Prof. Dr. Dwarka Prasad

Abstract:- In this paper, comparative study of two approaches, Genetic Algorithm (GA) and Lambda Iteration method (LIM) have been used to provide the solution of the economic load dispatch (ELD) problem. The ELD problem is defined as to minimize the total operating cost of a power system while meeting the total load plus transmission losses within generation limits. The application of Genetic algorithm (GA) is to solve the economic load dispatch problem of the power system. The effectiveness of the proposed algorithm has been demonstrated on two different test systems considering the transmission losses. GA and LIM have been used individually for solving two cases, first is three generator test system and second is ten generator test system. The results are compared which reveals that GA can provide more accurate results with fast convergence characteristics and is superior to LIM.

Expansion in Kernel PCA Approach for Face Recognition
Authors:-Asst. Prof. Ritu Nagila, Asst. Prof. Ashish Nagila

Abstract:- Principle component analysis (PCA) technique is most populating technique of statistics in field of face recognition. Today, numerous extension of PCA is exiting like improved PCA, Fuzzy PCA, Incremental PCA, and Kernel PCA. Kernel PCA (KPCA) is most popular techniques in face recognition in non liner categories. Till date not desirable extensions are accessible. This paper is proposed a novel approach of KPCA. Experiments have been done on ORL database. Proposed method obtained highest recognition rate as 98.6%.

A Review on Lossless Data Compression Techniques
Authors:- Rahul Barman, Sharvari Deshpande, Prof. Dr. Nilima Kulkarni, Shruti Agarwal, Sayali Badade

Abstract:- Data is being generated at an exponential rate in every sector of the world. This much amount of data can prove to be very costly in terms of data storage, transfer speed and infrastructure. Due to this many industries have shifted their focus on cloud-based storage technology. Lossless data compression is one of the important approaches to solve the problem of excessive storage consumption, maintaining data integrity, transfer efficiency and achieving higher streaming speed. Lossless data compression refers to the process of modifying and converting the bit structure of data such that it consumes less storage space and provides near loss of original data. There exists different algorithms and techniques for performing the compression on different types of data formats. This paper identifies different lossless data compression techniques in existence and a conclusion is drawn based on these identified methods. Comparative analysis has been made of different algorithms used in various referenced papers. It describes the future scope and application of compression algorithms in several fields.

Experimental Study on Strength and Durability of Concrete By Partial Replacement of Cement, Fine And Coarse Aggregate using Corn Cob Ash, C&D Waste Recycled Sand and Bethamcherla Stone with Addition of Steel Fibers
Authors:- M.Tech.Scholar Badiga Siva Bhavyank, Asst. Prof. K V Madhav

Abstract:- Main objective of this project is to reduce the usage of cement, fine aggregate and coarse aggregate and improve the strength of concrete by using steel fibers. In this study we will investigate on the strength characteristics and durability properties of concrete with CORN COB ASH (CCA), CONSTRUCTION & DEMOLISION (C&D) WASTE RECYCLED SAND and BHETAMCHERLA STONE (BS) and addition of STEEL FIBERS. Replacement of CCA, C&D Sand and BS are about 0%, 5%, 10%, 15% and 20% respectively by weight of Cement, Fine Aggregate and Coarse Aggregate. The obtained optimum % of CCA, C&D Sand and BS are investigated. Then with that optimum % of CCA, C&D Sand and BS obtained are used to produce concrete.. Then the steel fibers will be added to the optimum % of CCA, C&D Sand and BS concrete and to conventional concrete in the % of 0%, 1%, 1.5%, and 2% by the weight of cement. Mechanical properties at 7,14,28 days will be investigated. Then investigations will be carried out for Percentage loss in compressive, split tensile and flexural strengths, Percentage loss of weights by considering the Durability tests such as acid attack test and alkaline attack test at the age of 28 and 90 days. The grade of concrete is M25.

A Review Study on Theoretical Investigation of Hydrogen Production Methods
Authors:- Pramod Panta, Mohit Pandita, Nitin Kumar, Sudhir Singh

Abstract:- This paper present the sustainable, green and zero-carbon emission method of hydrogen production. Depending upon the source of energy used to generate the hydrogen the methods are classified like solar energy, thermal energy, photo-electric. The different process to generate the hydrogen are analyzed and compared in it which give the brief and important description of green and zero-carbon emission method.

Realizing the Benefits of RPA in the Legal Field
Authors:- Shital Gopal Shetkar

Abstract:-Robotic Process Automation (RPA) is finding many valuable uses in the legal field. Legal work is often repetitive and document-intensive, which makes it suited to RPA. Automation enables law firms and legal departments to speed up routine processes, saving time and reducing errors. As a result, attorneys and other staff members can focus on more critical tasks. RPA also helps with compliance. This paper examines how legal organizations are realizing the benefits of RPA, based on reviews of Ui Path by members of IT Central Station.

Sentiment Analysis of Twitter Data by Making use of Machine Learning Algorithm
Authors:- ME Scholar Kratika Patidar, HOD. Kamlesh Patidar

Abstract:- Individuals utilize online media for amusement, bringing data, news, business, correspondence and some more. Not many such online media applications are Facebook, Twitter,WhatsApp, Snapchat, etc. Twitter is one among the miniature publishing content to a blog site. We are utilizing Twitter predominantly because it has acquired a great deal of media consideration. The content composed is alluded to tweets, where an average person can tweet or compose their hearts out. We would be bringing immediate reactions from the general population also. Thus, the information is all the more ongoing. The initial step is to get the tweets on a specific plan utilizing python language code, followed by the cleaning cycle; at that point comes the making of the sack of words. Later these packs of terms are given as a contribution to the calculations. Finally, after preparing the estimates, we will be getting the sentiment of general society on that system.

Pectin Extraction from Orange Peels by Using Organic Clay
Authors:- Dr. Supriya Pratap Babar

Abstract:- The present work addressed to the development of the method which is the part of the process needed for the extraction of biopolymer like pectin from the orange peel, which is the waste of orange juice processing industry. Pectin is used by pharmaceutical industry, food industry and also widely used in cosmetics, herbal medicines, manufacturing of soaps. In this method we have used the organic clay as mineral acid instead of strong concentrated acid. These results demonstrated, that the pectin yield was affected by pH. At the low pH for red clay (4.3) maximum yield (4%) of pectin was obtained.

Customer Churn Prediction in Telecommunication
Authors:- Pooja Mahanth Bhagat

Abstract:- Procurement and the maintenance of customers/clients are the top most concerns in the present business world. The quick increment of market in each business is prompting higher endorser base. Therefore, organizations have understood the significance of holding the close by clients. It has gotten compulsory for the specialist co-ops to diminish beat rate on the grounds that the carelessness could be come about as productivity decrease in significant viewpoint. Agitate expectation helps in recognizing those clients who are probably going to leave an organization. Media transmission is adapting to the issue of truly expanding agitate rate. Data mining procedures empower these media transmission organizations to be furnished with viable strategies for lessening stir rate. The paper audits 61 diary articles to study the upsides and downsides of prestigious Data mining procedures used to assemble prescient client beat models in the field of media transmission and in this manner giving a guide to scientists to information amassing about Data mining strategies in telecom.

A Review of an Extensive Survey on Audio Steganography Based on LSB Method
Authors:-Hariom Dudhwal, Asst. Prof. Jayshree Boaddh, Asst.Prof. Jashwant Samar

Abstract:- There is issues and challenges regarding the security of information in transit from senders to receivers. The major issue is the protection of digital data against any form of intrusion, penetration, and theft. The major challenge is developing a solution to protect information and ensure their security during transmission. In audio steganography, the cover is an audio and the secret information can be a text file, an image, or an audio. In this work, some audio steganography techniques are explored taking cover audio in WAV and MP3 format. WAV files produce integer samples and MP3 files give floating point numbers as samples. The secret information considered is the text file, the image, and the audio. The embedding and extracting algorithms of the different audio steganography techniques are discussed in this examination. This work presents a survey of literature on MP3 Steganography Based on Modified LSB Method.

A Review Study on Neuro Evolution
Authors:- Reeba Mehmood Khan

Abstract:- With the steady improvement in the field of artificial intelligence and information technology, the part of evolutionary algorithms is likewise booming. There is a need to raise these ideas in-order to broaden the sky-lines amongst newbies. Neuro Evolution is an integral part of artificial intelligence and machine learning wherein it centers around evolutionary algorithms in order to create artificial neural networks. This is a procedure that utilizes the entire parcel of biology and assists with developing and constructing artificial intelligence-based evolutionary algorithms. It is a branch which takes motivation from the evolution of the biological nervous system and attempts to incorporate it with the innovation ace “artificial intelligence”. This paper focuses on the fundamental understanding of what neuro evolution is and what is it doing here, how can it work and get implemented, how are neuro evolution and artificial intelligence working inseparably and furthermore it attempts to raise the algorithmic working alongside the significant applications that neuro evolution presents.

Study on Quality of School Life of Working Students
Authors:- Manit B. Dapadap, Jhon Edcel Calites

Abstract:- This study aims to contribute to developing knowledge and understanding of the phenomenon of school life quality for working students by taking the students’ perspective on what they perceive as positive or/and negative about their school life. The study was conducted among working students at Tacloban National Agricultural School. A semi-structured interview guide was used to get information about students’ experiences as working students. The main study is qualitative, using a phenomenological approach. Five students from junior and senior high were selected for in-depth interviews. Parents of the students, as well as the advisers, were interviewed for triangulation. The collected data were analyzed according to the phenomenological thematic analysis. Findings revealed that students are involved in many activities, and most of them work to assist their families and finance their education. How work influences, their education seems to depend on their perception of their work, whether they like it or not, and to what extent it is an obligation. One strategy to lift the quality of the school life of working students is to listen to the students’ voice. The study emphasizes the teacher as the leading resource contributing to the quality of school life for the students. Positive communication must be encouraged between students and teachers to raise awareness of the conditions of working students. To secure the quality of the school life of the working students, the school should come up with strategies that offer education within special needs, particularly in the delivery and assessment of competencies. Further, a strong partnership between the school and the community should be established to increase understanding of the working students’ condition and contribute to improved quality of school life.

A Survey of Real Time Deep Learning Based Object Detection
Authors:- Ahmad Ismail

Abstract:- The importance of artificial intelligence manifests in all of our life’s aspects, robotics, self-driving, surveillance, agriculture, transportation, medicine, space, and military. Deep learning is the paramount core for AI applications; especially object detection, localization, and tracking. The convolutional neural networks make momentum regarding the aforementioned topics. The architecture in this field varied from the fine-grained to the real-time models. Meanwhile, the fine grained models produce the maximum possible accuracy; it consumes time on the other side, real-time models are featured with speed, but it provides less accuracy.In this paper, we will review start-of-the-art models being used for near real-time object detection and tracking, then introduce our approach; an accurate real-time object detector and tracker.

A Review Article of Image Fusion Technique Using Wavelet Transform
Authors:- P.G. Scholar Pushpa Yadav, Asst. Prof. Hemant Amhia

Abstract:- In this thesis various methods for lossless Image fusion of source image data are analyzed and Discussed. The main focus in this work is lossless Image fusion algorithms based on context modeling using tree structure. The central aspect in context modeling is different context templates, which are based on discrete Cosine transform coefficients, local gradients and intensity of samples in the image. This work includes research on how to use DDCT context tree structure, prediction modeling and probability assignment in lossless image fusion based on context modeling technique. The main advantage over current methods is increasing effectiveness of image fusion and developing new lossless Image fusion methods based on context modeling for different type grayscale images: medical, astronomical, noisy natural images.Due to the increasing requirements for transmission of images in computer, mobile environments, the research in the field of image fusion has increased significantly. Image fusion plays a crucial role in digital image processing, it is also very important for efficient transmission and storage of images. When we compute the number of bits per image resulting from typical sampling rates and quantization methods, we find that Image fusion is needed. Therefore development of efficient techniques for image fusion has become necessary .This paper is a survey for lossy image fusion using Discrete Cosine Transform, it covers JPEG all format of image fusion algorithm which is used for full-color still image applications and describes all the components of it.

Diabetes Prediction Technique Using Ensemble Classification
Authors:- Research Scholar Akanksha Mishra, Dr. Prof. Rohit Kumar Singhal

Abstract:- Data Mining can be defined as a technology using which valuable knowledge can be fetched out from the massive volume of data. The big patterns can be explored and analyzed using statistical and Artificial Intelligence in big databases. Many researchers are implementing data mining techniques in the field of bioinformatics. Bioinformatics can be defined as a science of storing, fetching, arranging, interpreting and using information obtained from biological series and molecules. Prediction can be defined as a statement about future event on the basis of present situation. This work focusses on diabetic prediction with machine learning algorithms. The diabetic prediction has various steps. A voting-based classifier is devised in this research to predict diabetes. The performance for the diabetic prediction is optimized up to 2 percent using proposed algorithm.

Modeling and Simulation of Inverter Based Photovoltaic Power Generation System for Various Applications
Authors:- Aasha Rahangdale, Santosh Kumar

Abstract:- The use of new efficient photovoltaic solar cells (PVSCs) has emerged as an alternative measure of renewable power. Owing to their initial high costs, PVSCs have not yet been a fully attractive alternative for electricity users who are able to buy cheaper electrical energy from the utility grid. A photovoltaic array (PVA) simulation model is developed in Mat lab-Simulink GUI environment. The model is developed using basic circuit equation of the photovoltaic (PV) solar cells including the effects of solar irradiation and temperature changes. The new model was tested using a directly coupled ac load via an inverter. Test and validation studies with proper load matching circuits are simulated and result are presented. The Total harmonic distortion in output voltage with filter is 2.16 % which is under the IEEE standard.

A Review on Energy Efficiency of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:- M.Tech. Scholar Deepak Kumar Dhote , Dr. Samina Elyas Mubeen (HOD)

Abstract:- The aim of the article is to study of the operating modes basis of distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local microgrid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low-power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve two key tasks – performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. To meet the demand of the next generation power system, renewable energy resources can be the fuel of choice because it is easily available, free of cost, environment-friendly, and the renewable energy-based generation is cost effective in all manners. There are several types of renewable energy resources such as solar, wind, geothermal, tides, and biomass. In this paper, the concentration is limited to the solar energy resources, solar plants, and storage system to provide required power support.

A Vehicles for Open-Pit Mining with Smart Scheduling System for Transportation Based on 5G
Authors:- Atianashie Miracle Atianashie., Michael Opoku

Abstract:- 5G connectivity, big data, and artificial intelligence, open-pit intelligent transport systems based on autonomous cars have become a trend in the construction of smart mines with the advancement of IoT technology. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. In an open-pit mine, several sensors are used to operate unmanned cars. We enhance vehicle tracks and, using big sensor data, build an efficient, intelligent transport system. Based on large amounts of data, such as vehicle information, vehicle GPS data, production plan data, etc., a multi-object, intelligent scheduling model of open-pit mine unmanned vehicles were developed to reduce transportation costs, total unmanned vehicle time, and the rate of content fluctuation. The current output of the open-floor mine is reliable. The next thing we use to solve our planning problem is artificial intelligence algorithms. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multiobjective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

Energy Efficiency of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:-M.Tech. Scholar Deepak Kumar Dhote , Dr. Samina Elyas Mubeen (HOD)

Abstract:- The utilization of solar energy as a solar power plant can be a potential power plant to be developed. One of the problems in the solar power plant system is the power instability generated by the solar panels because it relies heavily on irradiance and relatively low energy conversion efficiency. To solve this problem, the Maximum control of Power Point Tracking (MPPT) is required by the Perturb and Observe (P&O) methods. This P&O MPPT control makes solar PV operate at the MPP point so that the solar PV output power is maximized. However, the MPPT P&O control that works at the MPP point makes the output voltage to the load is also maximum that causes overvoltage. The MPPT mode works when the solar PV output power is smaller than the reference power to maximize solar PV output power The aim of the work to design the distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local micro grid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. The implementation of these functions, combined with the installation of power active filters will minimize losses in the line and elements of ESS and it will be perform on MATLAB simulation.

A Comprehensive Overview of WLAN Security Attacks
Authors:-Yeshwanth Valaboju

Abstract:- Wireless communication has broken the constraint individuals utilized to have also in addition to wired innovation. The right to gain access to provider network without being bound, versatility while accessing the Internet, boosted consistency, as well as adaptability, are an amount of the variables steering the wireless LAN modern-day technology. Different other variables that contribute to the impressive development of Wireless Area Networks(WLANs) are lessened setup time, enduring cost discount rates, and likewise instalment in difficult-to-wire areas. Wireless LANs level of popularity has performed the growth as a result of the fostering of the IEEE 802.11 b spec in 1999. Over the last couple of years, wireless LANs are widely set up in a location like company, federal authorities bodies, health care centres, colleges and also building atmosphere.

Risk Analysis of Putting Attacks into Perspective and Conducting a Vulnerability Assessment
Authors:- Bhagya Rekha Kalukurthi

Abstract:-In various other to prevent unauthorized use risk set up via vulnerable wireless accessibility areas, Wired Matching Personal privacy – a low-level files shield of encryption physical body– was developed for wireless security purposes. WEP protocol protects link-level information throughout wireless transmission in between consumers along with access to aspects. It carries out indeed certainly not give end-to-end security, nevertheless merely for the wireless area of the link. Wireless security is an authentic barrier for network managers and also particulars security managers similar. Unlike the wired Ethernet LANs, 802.11-based wireless LANs broadcast radio-frequency (RF) records for the customer terminals to pay attention to. As a result, anybody along with the right resources can quickly take hold of and also move wireless signs if he is in fact within a selection.

VLSI Architecture for 8-bit Reversible Arithmetic Logic Unit based on Programmable Gate
Authors:- M.Tech.Scholar Sameer Suman, Dr. Anshuj Jain(HOD)

Abstract:- Reversible computing spans computational models that are both forward and backward deterministic. These models have applications in program inversion and bidirectional computing, and are also interesting as a study of theoretical properties. A reversible computation does, thus, not have to use energy, though this is impossible to avoid in practice, due to the way computers are build. It is, however, not always obvious how to implement reversible computing systems. The restriction to avoid information loss imposes new design criteria that need to be incorporated into the design; criteria that do not follow directly from conventional models.In this paper, investigate garbage-free reversible central processing unit computing systems to physical gate-level implementation. Arithmetic operations are a basis for many computing systems, so a proposed the design of adder, sub tractor, multiplexer, encoder and work towards a reversible circuit for general circuit are important new circuits. In all design implemented Xilinx software and simulated VHDL text bench.

Artificial Hand using Embedded System Involve Arm Processor and Sensors
Authors:- Nishanth B

Abstract:- In this work, Many of the people misfortune their hand, for example, mishap, the aid of the amputee, and incapacitated people their life. The artificial hand is low weight and simple compact smaller confined and includes a connection force framework. Artificial hands, which consolidate mechanical plan and established framework multi-modular sensor framework are blanketed detecting everyday and sheer strength. A human hand shape and the capacity of having a take care of utilizing getting a cope with on and grasping items. The artificial hand is a fabricated acrylic cloth that has produced the usage of aluminum and iron respectively. The microcontroller is generally essential in synthetic palms.EMG sensor is interfaced with the top appendage receive the signal from people The palm stayed void and gives sufficient space to a miniature siphon. Due to oneself adjusting highlights of the hand’s several items can be gotten a manage close by. This empowers the improvement of a less weight prosthetic hand with high usefulness Embedded system is a mixture of hardware using a microprocessor and an appropriate software program in conjunction with additional mechanical or different digital components designed to perform a selected assignment. Embedded gadget locations a vital role in this prosthetic hand additionally called an artificial hand Microcontroller and microprocessor places an important role in all types of control applications in prosthetic hand we are using an adhesive substance to deal with light-weight materials It supports weight up to 4kg.

Criminal Activities Predictive Analysis Using Data Mining Techniques
Authors:- Meenu Rai, Bhawana Pillai

Abstract:- Data mining is the extraction of knowledge from large databases. One of the popular data mining techniques is Classification in which different objects are classified into different classes depending on the common properties among them. Machine learning are widely used in Classification. This paper proposes a data mining technique which applies an enhanced existing machine learning Algorithm to detect the suspicious criminal activities. An improved decision tree Algorithm with enhanced feature selection method and attribute- importance factor is applied to generate a better and faster Decision Tree. The objective is to detect the suspicious criminal activities and minimize them. This paper aims at highlighting the importance of data mining technology to design proactive application to detect the suspicious criminal activities.

A Review on Fiber Reinforced Concrete Using Glass Fiber Reinforced Concrete (GFRC)
Authors:- Abdul Rasheed, Asst. Prof. Anuj Verma, Asst. Prof. Mohd Rashid

Abstract:- Plain concrete possess very low tensile strength, limited ductility and little resistance to cracking. Internal micro cracks are inherently present in concrete and its poor tensile strength is due to propagation of such micro cracks. Fibers when added in certain percentage in the concrete improve the strain properties well as crack resistance, ductility, as flexure strength and toughness. Mainly the studies and research in fiber reinforced concrete has been devoted to steel fibers. In recent times, glass fibers have also become available, which are free from corrosion problem associated with steel fibers. The present paper outlines the experimental investigation conducts on the use of glass fibers with structural concrete. CEM-FILL anti crack, high dispersion, alkali resistance glass fiber of diameter 14 micron, having an aspect ratio 857 was employed in percentages , varying from 0.33 to1 percentage by weight in concrete and the properties of this FRC (fiber reinforced concrete) like compressive strength, flexure strength, toughness, modulus of elasticity were studied.

Foot over Bridge Random Vibrational Analysis for Diffrent Slab Material
Authors:- PG Student J. P. Pawar, Prof. R. S. Patil, Dr. G. R. Gandhe (H.O.D)

Abstract:- Damping performs essential function in format of vibrational resistant structures, which lower the changeof the shape when they are subjected to lateral loads or vibrational load. In the existing study the deck of bridge is check for various materials like MS steel plate, RCC slab, and aluminum and MS plate composite deck. The important challenge of a structure is to endure the vibrationalloads on deck slab. In order to reduce structuralvibration has been used. The bridge is modeled in ANSYS 2019 and modeled with different material of deck. After the study results show foot over bridge having 100 mm thick slab shows better result than having composite sheet or having MS sheet as deck slab.

A Comparative Analysis of Optimization Techniques
Authors:- M. Tech.Scholar Palac Gupta

Abstract:- Regression testing is an important process during software development. For the purpose of reducing the number of test cases and detecting faults of programs early, this paper proposed to combine test case selection with test case prioritization. Regression testing process has been designed and optimization of testing scheme has been implemented. The criterion of test case selection is modify impact of programs, finding programs which are impacted by program modification according to modify information of programs and dependencies between programs. Test cases would be selected during test case selection. The criterion of test case prioritization is coverage ability and troubleshooting capabilities of test case. There are various optimization techniques available. This review explains about the different optimization techniques on the basis of their evolution, methodology, performance and applications.

Literature Review on Pharmaceutical Industry in India Comparison of Post Reform and Pre Reform Period and Policy
Authors:- Ph.D. Scholar Vinod Kumar Gupta, Professor Dr. Rajesh Gupta

Abstract:- The extant literature dealing with the impact of TRIPS agreement on Indian pharmaceutical industry takes the whole country as a unit of analysis, but the present study is unique in the sense that it takes into account the regional aspects of Indian pharmaceutical industry, based on various reports and unit-level data of Annual Survey of Industries since 1991 to 2011. In the year 2005, Indian pharmaceutical industry came under the obligation of Trade-Related Aspects of Intellectual Property Rights (TRIPS); Simultaneously, Indian pharmaceutical firms were also required to comply with Good Manufacturing Practices of World Health Organisation (WHO-GMP). The descriptive evidences depicted that with the introduction of TRIPS and WHO-GMP number of firms and man-days employed declined across the states during the introductory period of TRIPS; whereas net value added and gross capital formation remained constant for the same period. But in the post-TRIPS period most of the states reported greater performance, especially in terms of net value added and gross capital formation.

Review on Management of Hospital Waste in an Efficient Manner
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Professor Dr. Sandeep Kumar

Abstract:- This is a review paper which is prepared from the surveys of hospitals and research studies. Hospital waste management in the world is a strict discipline and does occupy a serious place in the management of health care sector. The management of hospital remaining requires its removal and disposal from the health care establishments as hygienically and economically as possible by methods that all stages minimizes the risk to public health and to environment. Health care waste can be dangerous, if not done properly. Poor management of healthcare waste exposes health labors, waste handlers, and the community to the toxic effects of wastes generated from health activity. The disposal of these wastes could also lead to environmental problems. This article intends to describe various health care wastes and its controlling, as creating good practices for proper handling and disposal of health care waste is an important part of the health care delivery system. The aim of this paper is to highlight the present condition of medical waste and a review on scientific method of hospital waste management. Biomedical waste is identified under many terminologies like hospital waste, healthcare waste etc., which are generated due to long or short term care of persons. Various health care establishments are the minor and major source of these types of wastes. Biomedical waste may be primarily classified as Hazardous and Non Hazardous wastes. Further, the biomedical waste is categorized by WHO and also under The Biomedical Waste (Management & Handling) Rules, 1998, India. According to previous studies the quantum of waste generated in a health care establishment depends on the Income of the country, type of Hospital, Region etc. Biomedical wastes are highly infectious and can be a potential source for transmission of diseases if not properly managed. Hence, a proper management procedure has to be adopted to safely dispose the wastes to safe guard the public health and Environment and a stringent regulation have to be imposed on the health care establishments before and after it is approved for execution. Further, the hospital staffs are at high risk of being infected by these biomedical wastes, therefore, the occupational health and safety can be recommended to be a component of biomedical management plans with qualified personnel in Hospitals.

A Project Report on Risk Return Portfolio Analysis with Reference to Securities Market
Authors:- Shaik Asif Basha, Asst.Prof. Dr. C. Mallesha

Abstract:- Successful investment requires a careful assessment of the investment’s potential returns and its risk of loss. A firm’s risk and expected returns directly affect its share price. In real-world situations, the risk of any single investment would not be viewed independently of other assets. New investment must be considered in light of their impact on the risk and return of the portfolio of assets. In traditional financial analysis, investment management tools allow investors to evaluate the return and risk of individual investments and portfolios. Usually, higher the risk, higher the returns and lower the risk, lower the returns. However, a general understanding of this phenomenon is not sufficient to make appropriate decisions relating to investments. A more quantifiable analysis is required to understand the investment.Thus the following study discusses the analysis of portfolio risk and returns.

Energy Saving System
Authors:- Shivpujan Yadav, Mrs. Rupali Shekokar

Abstract:- In todays the basic problems in any country is wastage of electricity. If we change our behavior and try to avoid the wastage of electricity then we can save more electricity. By saving electricity we can earn money by selling those electricity to our surrounding countries. And by efficient way of using electricity we can bring down the cost of our electricity bill. In this paper, I have design a system which is saving energy. I have design this system for schools, colleges etc. Only authorized person can enter into the classroom. There are two options present for students and teachers to use lights and fans in the classroom. First one is manually by switch and second one is automatically by detecting the position of person in the room lights and fans will be on.. When there is nobody present inside the classroom then automatically all electrical appliances will be off.

Awareness and Practice of Biomedical Waste Management
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Prof. Dr. Sandeep Kumar

Abstract:- Healthcare is an important area of human care. The very process of modern healthcare is also ridden with risk and unhealthy practices. One of this is Bio Medical Waste generation in treatment of human beings; apart from other species. This Bio Medical Waste generation warrants proper Bio Medical Waste management. Bio Medical Waste is defined as waste that is generated during the diagnosis, treatment or immunization of human beings and is contaminated with patients body fluids such as syringes, needles, dressings, disposables, plastics and microbiological wastes. Proper disposal of hospital waste is of paramount importance because of its infectious and hazardous characteristics. Therefore the Government of India promulgated the Bio Medical Waste Rules in 1998 and it became mandatory for all the hospitals to follow the above rules and the standards laid down under the statutory regulations. Healthcare is vital and hospitals are considered to be healers and protectors of health and wellbeing. But the waste generated from treatment and diagnosis can be hazardous, toxic and even lethal because of their high potential for disease transmission. The present study consists of BMW management practices like Segregation, Treatment and Disposal, Waste Handling Safety Measures and Waste Administration that are followed in healthcare facilities. It focuses on the waste management practices of the respondent healthcare facilities on the basis of type of hospital, bed capacity, bed occupancy, amount of waste generation and number of waste handling workers. Besides, the study extends to see the impact of demographical factors on waste management practices. From the related questions regarding `segregation practices`, ‘treatment and disposal practices, ‘waste handling safety measures’ and ‘waste administration’ scores were calculated. Further, based on quartiles, scores are categorized into 3 components viz., Low, Moderate, High for assessing the respondent HCFs view on the waste management practices in the HCFs. The data collected for this study was processed by using SPSS Version 19.0. Descriptive statistical tools like percentages, means and standard deviation and analytical tools like Chi-square, t-test, one way ANOVA, Correlation and Regression are used to test the significant association and impact between characteristics of HCFs and Waste Management Practices.

Awareness and Practice of Biomedical Waste Management
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Prof. Dr. Sandeep Kumar

Abstract:- Healthcare is an important area of human care. The very process of modern healthcare is also ridden with risk and unhealthy practices. One of this is Bio Medical Waste generation in treatment of human beings; apart from other species. This Bio Medical Waste generation warrants proper Bio Medical Waste management. Bio Medical Waste is defined as waste that is generated during the diagnosis, treatment or immunization of human beings and is contaminated with patients body fluids such as syringes, needles, dressings, disposables, plastics and microbiological wastes. Proper disposal of hospital waste is of paramount importance because of its infectious and hazardous characteristics. Therefore the Government of India promulgated the Bio Medical Waste Rules in 1998 and it became mandatory for all the hospitals to follow the above rules and the standards laid down under the statutory regulations. Healthcare is vital and hospitals are considered to be healers and protectors of health and wellbeing. But the waste generated from treatment and diagnosis can be hazardous, toxic and even lethal because of their high potential for disease transmission. The present study consists of BMW management practices like Segregation, Treatment and Disposal, Waste Handling Safety Measures and Waste Administration that are followed in healthcare facilities. It focuses on the waste management practices of the respondent healthcare facilities on the basis of type of hospital, bed capacity, bed occupancy, amount of waste generation and number of waste handling workers. Besides, the study extends to see the impact of demographical factors on waste management practices. From the related questions regarding `segregation practices`, ‘treatment and disposal practices, ‘waste handling safety measures’ and ‘waste administration’ scores were calculated. Further, based on quartiles, scores are categorized into 3 components viz., Low, Moderate, High for assessing the respondent HCFs view on the waste management practices in the HCFs. The data collected for this study was processed by using SPSS Version 19.0. Descriptive statistical tools like percentages, means and standard deviation and analytical tools like Chi-square, t-test, one way ANOVA, Correlation and Regression are used to test the significant association and impact between characteristics of HCFs and Waste Management Practices.

Indian Pharmaceutical Industry, Strategies and Challenges in India, Comparison of Post Reform and Pre-Reform Period
Authors:- Ph.D. Scholar Vinod Kumar Gupta, Professor Dr. Rajesh Gupta

Abstract:- The pharmaceutical manufacturing, especially in countries like India, is in addition to playing an important economic and social role directly related to many health related issues. It is a science-based industry, a symbol of development of science, technology or information, provides service chance for different population levels and has supply significantly to the overall growth of the Indian industryThe principle of this study is to examine presentation and future trends of the Indian pharmaceutical industry in the period before and after the reform. By analyzing data from the pharmaceutical industry, you can understand market trends, the new and emerging companies in the industry and the industry’s expenses and profitability. The analysis of such data provides guidance for monitoring market environment, which in turn can help future investment decisions. In addition, it also helps to track different developments related to certain diseases (such as cardiovascular, anti allergic, etc.).In addition, psychiatry also highlights the legal aspects (patent law) or rations related to the commerce. The study also suggests discussing a specific area within the pharmaceutical industry, the therapeutic area. Therefore, the proposed research includes recognized pharmaceutical manufacturing activities currently in use, including the API industry, formulations, and important therapeutic areas. The researchers outlined the Indian pharmaceutical industry and its evolution from almost non-existent to one of the global generic drug suppliers.

Movie Recommendation using Clustring Technique
Authors:- M. Tech Scholar Pooja Relan, Asst. Prof. Avinash Pal (HOD)

Abstract:- Recommendation system uses different types of algorithms to make any type of recommendations to user.Collaborative filtering recommendation algorithm is most popular algorithm, which uses the similar types of user with similar likings, but somewhere it is not that much efficient while working on big data. As the size of dataset becomes larger than some improvements in this algorithm must be made. Here in our proposed approach, we are applying an additional hierarchical clustering technique with the collaborative filtering recommendation algorithm also the Principal Component Analysis (PCA) method is applied for reducing the dimensions of data to get more accuracy in the results. The hierarchical clustering will provide additional benefits of the clustering technique over the dataset and the PCA will help to redefine the dataset by decreasing the dimensionality of the dataset as required. By implementing the major features of these two techniques on the traditional collaborative filtering recommendation algorithm the major components used for recommendations can be improved. The proposed approach will surely enhance the accuracy of the results obtained from the traditional CFRA and will
enhance the efficiency of the recommendation system in an extreme manner. The overall results will be carried out on the combined dataset of TMDB and Movielens, which is used for making recommendations of the movies to the user according to the ratings patterns created by the particular user.

Modeling of a Hybrid Energy System Connected System
Authors:- M.Tech. Scholar Sumit Kumar Mehta, Asst. Professor Mithilesh Gautam

Abstract:- In integrated micro-grid, PV system is usually controlled to operate in the maximum power point tracking (MPPT) mode. The battery energy storage system is operated in constant power charging or discharging mode. In order to provide an integrated energy system connected to grid Depending on individual energy requirements, the Integrated Energy System can be an add-on to an existing energy source (an integrated solution) to reduce fossil-fuel consumption or a stand-alone for complete fossil fuel displacement. Through extensive integration of energy infrastructures it is possible to enhance the sustainability, flexibility, stability, and efficiency of the overall energy system. This concept together with the cost reduction, technology development, environmental awareness, and the right incentives and regulations has unleashed the power of the sun. And all system result will be carried out by matlab simulation is proposed for isolated micro grids with renewable sources.In the presented technique, the pitch angle controller is designed for wind turbine generator (WTG) system to smooth wind power output. The proposed strategy is tested in a typical isolated integrated micro-grid with both PV and wind turbine generator.

Review on Diagnosis of COVID-19 from Chest CT and X-Ray Images Using Deep Learning Algorithms
Authors:- Vishwas V (M.Tech.), Dr. Kiran Gupta Professor

Abstract:- As we all know , the world has been in a cocoon this whole year, and we have only now begun to step back into normalcy. COVID-19 outbreak was announced as a Global Pandemic by WHO on 11 March 2020 by which time the Global tally of infected people was at 114,243 and the deaths at around 4302. Due to the absence of specific therapeutic drugs or vaccines for the novel COVID-19, it is essential to detect the disease at its early stage and immediately isolate the infected person from the healthy population. Recent findings obtained using radiology imaging techniques suggest that such images contain salient information about the COVID-19 virus. Application of advanced artificial intelligence (AI) techniques coupled with radio-logical imaging can be helpful for the accurate detection of this disease. The objective of this paper is study the diagnostic value of CT and x-ray images and compare their efficiency against RT-PCR and also, to compare and analyse existing deep learning models for classification of Covid pneumonia from regular pneumonia and no pneumonia.

Enhanced the Security through Asymmetric Based RSA Algorithm
Authors:- Mahendra Kumar Choudhary, Ravinder Singh

Abstract:- In the last some decades we are using the internet in our daily communication. We are sending our non-secret as well as secret data using internet. So there is a chance that our data can be leaked of hacked by someone or some unauthorized person or party. So we can try to secure our data with the help of cryptography.The proposed work is using an old symmetric algorithm that is play fair with some modification and RSA that is asymmetric algorithm also. As we know the symmetric key algorithm is using the same time for encryption and decryption.The problem of key exchange problem I used here RSA algorithm.

Heart Disease Prediction using Data Mining Technique
Authors:- Shivangi Agrawal, Asst.Prof. Ashish Tiwari(HOD)

Abstract:- ECG is the most common and basic test performed on patients to detect anomalies in the heart. As a result of the ECG, 10 to 20 minutes of continuous patient heart data were collected and printed as a 1D plot. We have developed a program that extracts a continuous data set from the ECG machine and analyzes the data and extracts various ECG wave functions. First we divide the data by Wavelet decomposition. Then the data is reconstructed to 4 levels, removing noise from the signal. At the same time we detect important components of ECG wave, which are P wave, QRS complex and T wave. Electrocardiogram (ECG) is an important diagnostic tool for assessing cardiac arrhythmias in clinical practice. In this process, we present a deep learning-based convolutional neural network structure that was previously trained in a general data set of signals transmitted to perform automatic diagnosis of ECG arrhythmias by classifying ECG patients under similar cardiac conditions. The main goal of this process is to implement a simple, reliable and easy to use deep learning technique to classify two different selected conditions in the heart category. The results showed that cascading deep learning with conventional SVM was able to achieve very high performance. All this work is done by MATLAB simulation.

Movie Stats: Sentiment Analysis of IMDB Reviews and Tweets of a Movie Using Naïve Bayes Classifier
Authors:- Deep Rahul Shah

Abstract:- Sentiment analysis, also referred to as opinion mining or emotion extraction is the classification of emotions within textual data. This technique has been widely used over the years to determine the sentiments, emotions within a particular textual data. I have designed a way where we as a user can view the real time sentiment analysis of movie reviews and tweets regarding a certain movie. I built a Sentiment Analysis model with an accuracy of 98.7 % and an F1 score of 0.99, which means the model is nearly 99% as accurate as a human in analyzing the Sentiment of the text. Many websites are providing you lengthy reviews, which makes it quite boring to read it, so the proposed system shows the real-time chart and sentiment analysis of the tweets and movie reviews in a user- friendly way. This is what makes MovieStats unique.

IOT based Air and Sound Pollution Monitoring System
Authors:- Roja K, C. Santhosh Kumar, P. Anlet Pamila Suhi

Abstract:- The pollution of air and sound is increasing abruptly. To bring it under control its monitoring is majorly recommended. To overcome this issue, we are introducing a system through which the level of sound and the existence of the harmful gases in the surroundings can be detected. The growing pollution at such an alarming rate has started creating trouble for the living beings, may it be high decibels or toxic gases present in the environment leaves a harmful effect on human’s health and thus needs a special attention.

Survey on “Laxmanrekha-Woman Safety And Alert System
Authors:- Samruddhi Kute, Jayshree Gupta, Pratiksha Sonawane,
Surabhi Sonawane, Girija Chiddarwar

Abstract:- Every day, every woman, young girls, mothers and ladies from all walks of life are struggling to be safe and protect themselves from the roving gaze of the horribly insensitive men who molest assault and violate the dignity of women on a daily basis. The streets, public transport, public places in particular have become the dominion of the hunters. Due to these atrocities that women are subjected to in the present scenario, a smart security wearable device for women based on Internet of Things is proposed. This device is extremely portable and can be activated by the victim on being assaulted just by the click of a button that will fetch her current location and also capture the image of the attacker via camera. The location will be sent to predefined emergency contact numbers or police via smart phone of the victim thus preventing the use of additional hardware devices/modules and making the device compact. Crime against women lately has become problem of each nation round the globe many countries try to curb this problem. Preventive are taken to scale back the increasing number of cases of crime against women. A huge amount of knowledge set is generated per annum on the idea of reporting of crime. This data can prove very useful in analyzing and predicting crime and help us prevent the crime to some extent. Crime analysis is a neighborhood of importance in local department. Study of crime data can help us analyze crime pattern, inter-related clues and important hidden relations between the crimes.

Review and Analysis on Behaviour Based Safety in Renewable (Wind) Energy Project
Authors:- Rajendra Singh Gour, Ms. Nisha Kushwaha

Abstract:- It is projected that in up to 82 per cent of Work-related accidents, workers, Behaviour in the form of acts or comissions is a major contributory factor. Such behaviour can lead for many pre-existing factors to come together in a Potential Severe or Lost Time event. There are several reasons why workers engage in at-risk‟ behaviour at work. Health and safety in the workplace is influenced by a number of factors, from the organisational atmosphere through management attitude and commitment to the nature of the work or task and the personal attributes of the individual. Safety- related behaviour in the workplace can be improved by addressing these major influences. One way to improve safety performance is to introduce a behavioural based safety process that identifies and strengthens safe behavior and reduces unsafe behaviour. Behaviour-based safety is the “application of science of behaviour change to real world safety problems” or “A process that creates a safety partnership between management and employees that continually focuses people’s attentions and actions on theirs, and others, daily safety behaviour.” Behavioural safety processes are not a „quick fix‟ and it is important not to overlook fundamental elements. Organisations should start by concentrating on strategies and systems –assessing and improving management and operational aspects, training, design and so on. First researched in the 1970s in the US, the behaviour-based safety approach emerged in UK organisations in the late 1980s and is now widely used in a variety of sectors in the UK. IOSH has produced this guidance to introduce the background and basic principles of implementing a process which systematically addresses behavioural safety. The methods described are based primarily on observation, intervention and response as ways of changing behaviour.

A Literature Review of Supplier Selection for Construction Project
Authors:- M. Tech. Scholar Sanket D. Alone

Abstract:- This paper is about the selection of supplier for materials required in a construction project. Apart from making a proper schedule of the project for marking the start and completion dates of the project, for optimizing the cost of the project, material supplier is very important from the quantitative as well as quantitative point of view. In order to make an adequate suppliers selection use different criteria depending on the specific case. The supplier selection process deploys an enormous amount of a firm’s financial resources and plays crucial role for the success of any organization. The main objective of supplier selection process is to reduce purchase risk, maximize overall value to the purchaser, and develop closeness and long-term relationships between buyers and suppliers.

Optimising Headway using Communication Based Train Control system
Authors:- Student Amit Shrivastava, Prof. Anshuj Jain, Prof. Ankit Tripathi

Abstract:- In most of the previous researches the grade of automation 3 i.e. (GOA 3) has been analyzed for Direct Train Operation i.e. DTO mode while the focus of this proposed is to analyze the feasibility for the Grade of Automation 4 i.e GOA 4 which implements the Unattended train operation i.e. UTO Mode. In this specification the current Headway used by most of the Metro Rails is 120 sec. The comparison of signaling system of conventional Railways and the CBTC system in Metro Railways is also been included in this work and how the upgraded version have affected the capacity and efficiency of the mass transit system.

Analysis of Fly Ash and Hypo-Sludge Combination for Brick Manufacturing
Authors:- M. Tech. Scholar Prateek Chourawar, Dr. Raviraj Singh Gabbi

Abstract:- Hypo sludge is one of the waste from the paper industries which cannot be recycled hence a subsequent solution has to be found out to dispose these waste. Previous research work suggests that hypo-sludge can be used as replacement for the cement in concrete. So this work planned to use hypo sludge as an ingredient for bricks manufacturing and performing tests. Experiment is done on various set of mixing proportion of the material where different number of days samples are utilize for the examination of various properties of the brick. Results shows that proposed work has achieved good set of strength with increase in percentage of Fly-Ash and Hypo-Sludge. It was obtained that density of dry compacts decreases with increase in weight percentage of Fly-Ash and Hypo-Sludge. As the dry compacts are immersed in water at 1100C -1800C, then through capillary action voids are filled and it becomes hard and the porosity is eliminated. As a result of which the compacts become dense and finally the density increases with increase in Fly-Ash and Hypo-Sludge content. it is clear from SEM micrographs that 75 wt. % FA blend composite has splits which prompt decrement in compressive quality.

Study of Horse Manure with Fly Ash Ingredients in Brick Fabrication
Authors:- M. Tech. Scholar Neelesh Kumar Deshmukh, Dr. Raviraj Singh Gabbi

Abstract:- Research works are not directed on manufacturing of the bricks from natural waste however the current pattern of reusing organic waste has extraordinary effect on building material industry. A few research works have done to discover the substitution of bond in concrete. This examination work is on an arrangement to utilize one such natural waste i.e. horse manure into the bricks fabricating. Fly-ash bricks have officially demonstrated their significance as the ordinary bricks gives hardness to the ground water. This gives a rule that the horse manure can likewise be utilized as a part of bricks fabricating if its quality is satisfactory with in the farthest point. Five diverse weight rates of Fly ash and horse manure with (70%, 60%, half, 40% and 30%) and (10%, 15%, 20%, 25% and 30%) were taken individually. These syntheses were mixed completely by hand mixing, to get a homogenous mix. Distinctive pieces of Fly ash remains alongside horse manure were kept in three diverse little size containers.

A Survey on Security of Clouds and Trust Model Techniques
Authors:- Sidharth Mohan, Asst. Prof. Jayshree Boaddh , Asst.Prof. Jashwant Samar

Abstract:- Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. However, this sole feature of the cloud computing introduce many security challenges which need to be resolved and understood clearly. This paper gives a detailed survey on IAAS security issues. As virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of cloud. Paper has list some of trust techniques developed by researchers for identifying any malicious machine.

MRI Image Segmentation and Classification Using KFCM and Convolution Neural Networks
Authors:- M.Tech. Scholar Nayan Pure, Asst. Prof. Ashish Tiwari

Abstract:- The unlimited and uncontrollable growth of cells can cause human brain tumors. Correct treatment and early diagnosis of brain tumors are essential to avoid permanent damage to the brain. In medical image diagnosis, tumor segmentation and classification schemes are used to identify tumor and non-tumor cells in the brain. The automatic classification is a challenging task which utilizes the traditional methods due to its more execution time and ineffective decision making. To overcome this problem, this research proposes an automatic tumour classification method named as Hybrid Kernel based Fuzzy C-Means clustering – Convolution Neural Network (Hybrid KFCM-CNN) method. The algorithm identifies the position of tumor in brain MRI as they are mostly preferred for tumor diagnosis in clinic. The proposed method also crops tumor region from segmented image and way growth of tumor and help in treatment planning. It also provides important information about location, dimension and shape of brain tumor region with no exposing the enduring to a high ionization radiation. The size of tumor is calculated in term of number of pixels. Similarly the primary brain tumor is considered into Benign and malignant type on MRI brain images, based on accuracy, sensitivity, specificity in MATLAB simulation.

Distribution Planning Model for Water from Different Sources
Authors:- PhD Student Tichaona Goto, Lecturer Iris Shiripinda, Endowed Chair Prof.Fanuel Tagwira, Anthony Phiri (Director)

Abstract:- Urbanization in Africa is characterized by insufficient basic infrastructure, particularly in high density areas. There is need to come up with a model which takes a comprehensive approach to urban water services and viewing water supply as a component of integrated physical system. The purpose of this study is to critically look at demand based planning model for the distribution of water from different locally available sources in the high density suburb of Budiriro as an option of supplying water for gardening, sewage system, drinking and other domestic uses to the residents. This model provides a method of integrating different sources of water to supply water according to use. The model will bring relief on water demand since the use of water from hand dug wells and Rainwater harvesting is another virgin source of water which can be exploited fully. The blending of water from different sources to come up with quality water is one of the thrusts of the model. The model provides future forecasts and scenario planning, but effective water demand should have a planning for integrated water management of the different water sources.

A Review on Low Power and Delay of Ripple Carry and Carry Look Ahead Adders
Authors:- Amit Chaturvedi, Dr.Vikash Gupta

Abstract:- Now a days in the world of VLSI Technology, the word low power consumption is only possible with the concept of Reversible logic design. Reversible concepts will attain more attraction of researchers in the past two decades, mainly due to low-power dissipation and high reliability. It has received great importance due to because of there is no loss of information, while we are processing the data from input to output. Moreover, the power dissipation is also very less and ideally it should be zero. So the concept of reversible design will become more dominant in the low power VLSI design. This paper focuses on the implementation of 4, 8, 16 and 32 bits of highly optimized area efficient Ripple carry adder (RCA) and Carry look ahead (CLA) adders. Finally, we can prove that the Carry look ahead adders are so fastest among all the previously existing designs. All these processes will be Simulated & Synthesized on the ISE Xilinx 14.7 software.

Role of Emotional Intelligence on Our Immune System during Pandemic Situations
Authors:- Research Scholar Mrs. Padmashree G.S, Asst. Prof. Dr. Mamatha.H.K

Abstract:- COVID 19, a global pandemic, which first started in Wuhan city of China in December 2019, spread to different countries across the globe. The effect of the disease in terms of mortality and morbidity are manifold like death, depression, loss of income, anxiety, and migration. Vaccine has been formalized and life is getting normalized, but we are left with questions on what makes human beings susceptible and how can we build our immunity not only physically but also mentally. One such attempt is improving the Emotional Intelligence of people. This article is an attempt to understand the impact of Emotional Intelligence on the Immune System of the human body and how emotional intelligence, if understood and developed properly can help ward off many of the negative consequences of these type of pandemics. In this article, a review has been done on how the domain of Emotional Intelligence (EI) can help tackle this pandemic on an individual as well on the collective level. This is shown by discussing the relationship that EI has on the Immune System. Beginning the discussion from the interaction of Immune system with the environment, this article speaks about the influence of EI on Genes and Placebos which in turn impact the immune system.

Solar Connected Igbt Switch to Enhance Superconducting Magnetic Energy Storage System (Smes) for High Power Dc Application
Authors:- Iqrar Ahmed Ansari, Deepak Pandey, Rahul Singh

Abstract:- A superconducting magnetic energy storage (SMES) system includes a high induction coil that can act as a constant source of direct current. A high temperature SMES (HTS) unit connected to an energy system can absorb and store active and reactive energy from this system and release these powers in this system during demand periods.

A Review on Generation of Electricity from Solar Power Plant
Authors:- M. Tech. Scholar Amar Pratap, Prof. Madhu Upadhyay, Sagar Tomar

Abstract:- The aim of the article is to study of the operating modes basis of distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local microgrid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low-power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve two key tasks – performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. The implementation of these functions, combined with the installation of power active filters will minimize losses in the line and elements of ESS and it will be perform on MATLAB simulation.

Designing and analysis of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:- M. Tech. Scholar Amar Pratap, Prof. Madhu Upadhyay, Sagar Tomar

Abstract:- Solar energy is a renewable energy that is found abundantly in nature. It is green energy that can be utilized throughout day, therefore maximum energy has to capture from the panel. MPPT algorithm is incorporated to capture maximum energy. A multilevel inverter is a power electronic converter that synthesizes a desired output voltage from several levels of dc voltages of dc voltages as inputs. With an increasing number of dc voltage source, the sinusoidal waveform is obtained by the output voltage, while using a fundamental frequency-switching scheme. The advantage of multilevel inverter is very small output voltage, results in higher output quality and lower switching losses. This paper proposes a MPPT controller based solar power generation system, which consist of dc/dc converter and multilevel level inverter. In solar photovoltaic power generation systems, photovoltaic panels take a large amount of cost, if improve the use of photovoltaic battery and transform the solar battery plate absorption power into alternating current for use by the user as much as possible, will save a lot of money. Based on the equivalent circuit of solar cells, this paper analyzed the characteristic curve of solar cells through the MATLAB simulink model.

Detection of Brain Tumor
Authors:- Jigisha Kamal, Raunak Kolle, Varshini P

Abstract:- A study conducted by the “New England Journal of Medicine” for brain tumor revealed that more than half the cases diagnosed were delayed for a year or longer. This low percentage of correct diagnosis by physical practitioners was astonishing with an average pre-diagnostic symptomatic interval (PSI) being 60 days with a parental delay of 14 days and a doctor’s delay of 30 days. This meant, there existed a delay of almost 104 days in the diagnosis. Among the diagnosed brain tumors only 33% of them were diagnosed by the end of the 1st month after the onset of first signs and symptoms. Physical segmentation of the MRIs by a radiologist is often a monotonous and prolonged process. A viable solution is a Deep Learning aided brain tumor detection and segmentation from brain MRIs. The detection of brain tumor from the magnetic resonance images is an extremely important process for deciding the right therapy at the right time.

Literature Survey on Power Quality and Voltage Flicker Reduction using D-STATCOM
Authors:- Dharmendra Kumar, Prof. Abhishek Dubey

Abstract:- Now-a-days, the most important discussing topic in the world of powersystems is maintenance of power quality The power quality improvement is one of the interesting topics among researchers groups. And they all focused on power quality improvement in power system. In this literature survey paper we are study so many papers written by different researchers. Study and analysis of DSTATCOM and its uses and advantages in power system. .

Smart Dustbin Application Using IOT with GSM
Authors:- Student Jaya Priya. A, Asst. Prof. Dr. N.Shunmuga Karpagam

Abstract:- With increase of population, the scenario of cleanliness with respect to garbage management is degrading tremendously. In city, there are many public places where we see that garbage bins or dustbins are placed but are overflowing. This creates unhygienic condition in the nearby surrounding. Also creates ugliness and some serious diseases, at the same time bad smell is also spread and it degrades the valuation of that area. To avoid such situation we come up with a project called “Smart Dustbin” which is a GSM based Garbage and waste collection bins overflow indicator system for Smart Cities. Over main motivation behind this project is the ongoing campaign Swachh Bharat Abhiyan (Clean India Movement) launched on October 02, 2014 at Rajghat, New Delhi, by the Prime Minister of India Narendra Modi which is India’s largest ever cleanliness drive to clean the streets, roads and infrastructure of the country’s 4,041 statutory cities and towns. In this paper, smart bin constructed on a microcontroller-based platform, which is interfaced with GSM modem, and ultrasonic sensor that detects the presence of human on a particular distance. Once the garbage reaches the threshold level, ultrasonic sensor will trigger the GSM Modem, which will continuously alert the required authority until the garbage in the dustbin is squashed. Once the dustbin is squashed, people can reuse the dustbin. At regular intervals dustbin will be squashed. Once these smart bins are implemented on a large scale, by replacing our traditional bins present today, waste can be managed efficiently as it avoids unnecessary lumping of wastes on roadside. Foul smell from the rotten wastes that remain untreated for a longer time, due to negligence of authorities and carelessness of public may lead to long-term problems. Breeding of insects and mosquitoes can create nuisance around promoting unclean environment. This may even cause dreadful diseases.

Propeller Hub Repair With Cold Spray Technology (CST Process)
Authors:- Dupally Naval Venkata, Narasimha Kishore Yadav

Abstract:-The current process of the repair by Cold Spray Technology is the restoration of the Aircraft Propeller components and Hub is one of the dynamically stressed components containing aluminum and its alloys and these are the perfect components for the cold spray applications. This application is based on the material of the component that is manufactured and can be repaired with. Most of these cold spray repairing materials are pretreated according to the manufactured material or alloys. Most of the material or metals selected for the cold spray application are compared with the physical, chemical, and mechanical properties of the manufactured components. To optimize the perfect spray bond the closest parameters are subsequently selected, the spay material is applied, and the component is repaired with help of Helium and nitrogen to replace the affected area with spraying powder. Then after the spray, the component is machined in the way it was new and according to OEM standards. This process can be worked on not only Aircraft components, but also any metals used in mechanical, automotive, aerospace, oil and gas, and many other industries where metals need repair and restoration of the damaged area.

E-Waste Management
Authors:- Prof. Kharde Ashwini Ganpat, Prof. Prashant Sanpat Kale, Prof. N. M. Garad, Prof. A. S. Shirsath

Abstract:-Electronic waste, e-waste, e-scrap, or waste Electrical and Electronic Equipment (WEEE) describes discarded electrical devices. There is a lack of consensus as to whether the term should apply to resale, reuse, and refurbishing industries, or only to product that cannot be used for its intended purpose. Informal processing of electronic waste in developing countries may cause serious health and pollution problems, though these countries are also most likely to reuse and repair electronics. Some electronic scrap components, Such as CRTs (Cathode Ray Tubes), may contain contaminants such as lead, cadmium, beryllium, or brominated flame retardants. Even in developed countries recycling and disposal of e-waste may involve significant risk to workers and communities and great care must be taken to avoid unsafe exposure in recycling operations and leaching of material such as heavy metals from landfills and incinerator ashes. Scrap industry and USA EPA (United States Environmental Protection Agency) officials agree that materials should be managed with caution, but many believe that environmental dangers of used electronics have been exaggerated.

Challenges at the Time of Covid-19, and Innovation to Combat with Situation
Authors:- Sandeep Kumar, Unsa Fatima, Ranju Shah, Upma Gupta

Abstract:-21st century was moving ahead in a pleasant way. Suddenly it was hit by the pandemic, Covid-19, which changed the life of everybody. Offline mode was transformed by the online mode. The platforms such as Google Meet, Webex, Zoom helped in a tremendous way to connect people and also to complete their work from the available resources at home.E- commerce was atits boom during this period and those who grabbed the opportunities initial- ly were awardedconsequently. On thecontrary,those who were operating in physical mode were severely hit. Foronline education,Courser,Byjus are working to help the students in their respected fields ofwork. This paper will cover the technological aspects during COVID-19.

Aadhar Based Fingerprint Electronic Voting Machine
Authors:- Bhakti Salvi, Mrs. Rupali Shekokar

Abstract:- The main aim of the voting is to express their thoughts related to choose your government, political leader, citizen initiatives and so on. It is an important task for the election team to conduct fair voting in respective country. Every country spent lot of money to make election without any fraud and rampage free. But, in current situation it has become very normal for some sources to make illegal voting that may lead to a result contrary to the actual judgment of the people [2]. We refer some paper and design one machine to solve the above problem. By taking help of biometric system (finger print scanning) will make this project more secure and trustable. Biometric system has been increase speed of the system and accuracy. It also provide the security to system, avoid fake and duplicate voting etc. System uses to identify the user is thumb impression and Aadhar card number. Because as we know that Aadhar card is government trusted identification card and thumb impression of every person on the earth (human being) has unique pattern. Thumb impression increase security in the system, and that is the main task of this system, increase security. In this, as a pre-polling step create database consisting of the Aadhar card number and thumb impressions of all the eligible voters. At the time of elections, the thumb impression and Aadhar card number of a voter is entered as input to the system [1]. And then, that database records compared with the entered thumb impression and Aadhar card number. If that entered pattern and Aadhar card number matches with the database of the thumb impression and Aadhar card number respectively, grant permission to cast a vote. And in case any repetition in vote and if pattern doesn’t match with the records of the database present in system, for that particular person permission to cast a vote is denied and system not go for next step, it come out from processes. And in other case the pattern match but Aadhar card number doesn’t match with the records present in system, for that particular person also permission to cast a vote is denied and system not go for next step, it come out from processes. To cast a vote must is to match both Aadhar card number and finger print of that particular person, than and than only system allow for next step (For voting). As per voting going on counting has been done paralleled. This system maintenance cost is less and overall cost for complete election process is very less.

Underground Fault Cable Detection Using Wireless Technology
Authors:- P.G. Scholar Manjula V, Asst. Prof. P. Sumathi, HOD. P. Anlet Pamila Suhi

Abstract:- Detecting fault cable system proposes fault location model for underground power cable using microcontroller. Fault location models are to determine the distance of underground cable fault from base station in kilometers. This project uses the simple concept of ohm’s law. When any fault like short circuit occurs, voltage drop will vary depending on the length of fault in cable, since the current varies. A set of resistors are therefore used to represent the cable and a dc voltage is fed at one end and the fault is detected by detecting the change in voltage using a analog to voltage converter and a microcontroller is used to make the necessary calculations so that the fault distance is displayed on the LCD display.

Determination of Unsaturated Hydraulic Conductivity and Diffusivity as a Function of Moisture Contents and Soil Suctions
Authors:- ADAMU Cornelius Smah, UDOJI Braveson Obiefo, EKOJA Omeyi Faith, SALIHU Buhari Salam, IKYAPA Tertese Peter, BELLO Sikiti Garba

Abstract:- This study on unsaturated hydraulic conductivity and diffusivity of a soil was conducted at Agricultural engineering experimental plot, Ahmadu Bello University, Zaria. Experimental conductivity was carried out from five profile pits with samples taken from (15, 30, 45 and 60cm) depths. The saturated conductivity (Ks) was first determined in the laboratory using the constant head method, the gravimetric moisture contents were estimated in the laboratory using the pressure plate extractor by applying the required suctions at (0, 0.1, 0.3,1,5,10 and 15) bars. The bulk densities of the samples collected were also estimated. The volumetric moisture contents were determined by multiplying the gravimetric moisture contents with their corresponding bulk densities. Jackson’s model of 1973 was applied to determine the unsaturated hydraulic conductivity at each moisture content using the formula Ki =Ks(θi/θs) (∑_(j=i)m⌊(2j+1)-2i)φj-2⌋)/(∑_(j=1)m⌊(2j-1)φj-2⌋). The soil suction and the volumetric moisture contents were related to K(φ)=〖aφ〗mm and K(θ)=bθm . Where K is the degree of saturation or unsaturation. φ is the volumetric moisture content and θ is the soil suction head, a, b are the empirical constants while m and n are constants for the measure of the steepness. Mualem Van Gunatchen model of 1976 predicted a formula which was used in determining the hydraulic diffusivity by multiplying the conductivity to the differential of this relationφ=aθm. Major findings of this study revealed that the value of the diffusivity as a function of volumetric moisture content decreases down the profile pit, this could be as a result of the existence of materials in the soil with increase in the suction. The coefficient of determinant (R²) decreases down the profile, it was also observed that the bulk density (B) and Porosity affect the hydraulic conductivity (Ks) and diffusivity (D) of the soil on site.

A Review Article of PV Based Power Generation and Power Quality Improvement Using SSSC Power Compensation
Authors:- Amarkant Shukla, Dr. Arvind Kumar Sharma

Abstract:-In this paper we investigate the controlling and enhancing power flow in a transmission line using a Static Synchronous Series Compensator (SSSC). The Static Synchronous Series Compensator is used to investigate the device in controlling active and reactive power as well as damping power system oscillations in transient mode. The SSSC device is equipped with SOURCE ENERGY to absorb or supply the active and reactive power to or from the line. Various IEEE bus systems have been stabilized using this FACTS device. The results are obtained by simulating the various power systems in MATLAB/SIMULINK.

Railway Track Crack Detection System Using Arduino Microcontroller and Gps Notification
Authors:- P.G. Student Aruna A, Asst. Prof. P. Anlet Pamila Suhi (HOD)

Abstract:- The Indian Railways has one of the largest railway networks in the world, criss- crossing over 1,15,000 km in distance, all over India. However, with regard to reliability and passenger safety Indian Railways is not up to global standards. Among other factors, cracks developed on the rails due to absence of timely detection and the associated maintenance pose serious questions on the security of operation of rail transport. A recent study revealed that over 25% of the track length is in need of replacement due to the development of cracks on it. Manual detection of tracks is cumbersome and not fully effective owing to much time consumption and requirement of skilled technicians. This project work is aimed towards addressing the issue by developing an automatic railway track crack detection system. This work introduces a project that aims in designing robust railway crack detection scheme (RRCDS) using TSOP IR RECEIVER SENSOR assembly system which avoids the train accidents by detecting the cracks on railway tracks. And also capable of alerting the authorities in the form of SMS messages along with location by using GPS and GSM modules. The system also includes distance measuring sensor which displays the track deviation distance between the railway tracks.

A Review on Thermal Design Analysis of Piston Using RSM Method
Authors:- M.Tech Scholar Rajat Singh, Prof. Brijendra Kumar Yadav

Abstract:- A piston is a component of reciprocating IC-engines. Piston is the component which is moving that is contained by a cylinder and was made gas-tight by piston rings.A mathematical model is formulated based on the simulation result values of total deformation, stress and first ring groove temperature. The Piston during the working condition exposed to the high gas pressure and high temperature gas because of combustion. At the same time it is supported by the small end of the connecting rod with the help of piston pin (Gudgeon pin). The gas pressure given 20 Mpa is applied uniformly over top surface of piston (crown) and arrested all degrees of freedom for nodes at upper half of piston pin boss in which piston pin is going to fix. The statistical ‘‘Design-Expert” software has been usedto study the regression analysis of simulation data and to drawthe response surface plot. The statistical parameters were estimatedby using ANOVA. The objective of the study is to minimize the mass. The optimum combination of the influencing parameters for the mass can be found using Response Surface Method.

Thermal Design Analysis OF Piston Using Rsm Method
Authors:- M. Tech. Scholar Rajat Singh, Prof. Brijendra Kumar Yadav

Abstract:- A piston is a component of reciprocating IC-engines. Piston is the component which is moving that is contained by a cylinder and was made gas-tight by piston rings. A mathematical model is formulated based on the simulation result values of total deformation, stress and first ring groove temperature. The Piston during the working condition exposed to the high gas pressure and high temperature gas because of combustion. At the same time it is supported by the small end of the connecting rod with the help of piston pin (Gudgeon pin). The gas pressure given 20 Mpa is applied uniformly over top surface of piston (crown) and arrested all degrees of freedom for nodes at upper half of piston pin boss in which piston pin is going to fix. The statistical ‘‘Design-Expert” software has been used to study the regression analysis of simulation data and to draw the response surface plot. The statistical parameters were estimated by using ANOVA. The objective of the study is to minimize the mass. The optimum combination of the influencing parameters for the mass can be found using Response Surface Method. It is found that Height of top land and crown thickness has a dominant effect on total deformation, stress, mass and first ring temperature and The optimal piston mass is determined at height of top land = 2 mm and Crown thickness= 10 mm is 174.43 g.

Renewable Energy Based Power Generation Systems
Authors:- M.Tech. Pooja Vaishya, Prof. Barkha Khambra

Abstract:- The microgrid has shown to be a promising solution for the integration and management of intermittent renewable energy generation. This paper looks at critical issues surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a stand-alone operation mode, a grid-connected operation mode, and transitions between these two modes for a microgrid. To enhance the fault ride-through capability of the system, a comprehensive three-layer hierarchical protection system is also proposed, which fully adopts different protection schemes, such as relay protection, a hybrid energy storage system (HESS) regulation, and an emergency control. The effectiveness, feasibility, and practicality of the proposed systems are validated on a practical photovoltaic (PV) microgrid. This study is expected to provide some theoretical guidance and engineering construction experience for microgrids in general.

A Review Article of Power Management in Pv-Battery-Hydro Based Stand Alone Microgrid
Authors:- Sumit Singh, Vivek Anand

Abstract:- This works mainly on a Power Management System for a micro-grid system powered by a hybrid power generation system consisting of frequency control, power control, power management and solar photovoltaic (PV)- battery-hydro based micro-grid (MG) load. Therefore, power and frequency control allows for the balance of active energy and auxiliary services such as active energy support, source of current harmonics reduction and voltage reduction harmonics where common encounters.

× How can I help you?