IJSRET Volume 7 Issue 4, July-Aug-2021

Uncategorized

Prediction of Rainfall Using Machine Learning Algorithms
Authors:- Ishwarya G, Santhrupthi M B, Shanthi B, Asst. Prof. Varsha N

Abstract-Prediction of rainfall using precipitation forecast is significant as substantial precipitation can prompt numerous debacles. The expectation assists individuals with taking preventive measures and besides the forecast ought to be exact. There are two sorts of expectation transient precipitation forecast and long haul precipitation. Forecast generally transient expectation can gives us the precise outcome. The fundamental test is to construct a model for long haul precipitation forecast. Substantial precipitation expectation could be a significant disadvantage for geology division since it is firmly connected with the economy and lifetime of human. It is a reason for cataclysmic events like flood and dry spell that square measure experienced by people across the world every year. Precision of precipitation articulation has decent significance for nations like India whose economy is fundamentally reliant upon horticulture. The powerful idea of air, applied math procedures neglect to give reasonable precision to precipitation proclamation. The forecast of precipitation utilizing AI methods may utilize relapse. Expectation of this undertaking is to offer non-specialists simple admittance to the methods, approaches used in the area of precipitation forecast and give a near report among the different AI strategies.

Contingency Analysis
Authors:- Asst. Prof. Vishal V. Mehtre, Shubham Saket, Siddharth Gautam

Abstract- A dependable, continuous supply of electrical energy is a necessary component of today’s advanced societies. Hence to maintain the power system security and reliablity is one of the inmportant tasks for system engineers. The security assessment is an important task because it provides information related the state of the system in the case of a contingency. Contingency like sudden loss of line or generator or increase/decreased in power demandcause voilation of bus voltage or transmission line overloading. Hence to keep the system safe and continuity of supply contingency analysis is important. Different terms related to contingency including FDLF is reviewed in this paper.

Safety Perception Survey as a Tool for Improving the Safety Climate in a Manufacturing Industry
Authors:- S Vashishta

Abstract- Safety in the Steel industry has always been an area of concern. Though significant improvements in safety awareness of the employees have been achieved along with deployment of safer equipment & technology, incidents still continue to occur and the industry still continues to lag behind most other high risk industries as far as level of safety climate is concerned.A safety climate survey aims to measure employee’s perceptions on the status of safety at their workplace & can help in identifying the gaps in various Safety Management System elements, thereby providing management with useful insights to plan their strategies.The paper aims to measure the Safety Climate of a Steel manufacturing Plant through a Safety perception survey. A questionnaire-based survey was considered as it is one of the most frequently used and widely accepted methods for measuring safety climate. A questionnaire was developed consisting of 5 safety climate components with 44 questions and was administered to 102 employees (Supervisors, technicians, workers, etc.). Various Statistical tools like mean, SD, Variance, Cronbach’s alpha & Split half correlation, and one-way ANOVA test were applied for doing various types of analysis and arriving at conclusion.

Automatic Questionnaire Generator
Authors:- Asst. Prof. G.Vijaya Lakshmi, P. H Saraswathi, B.Reshmi, T. Sai Santoshi, P. Sunith Kumar

Abstract- This Project is based on the work carried out on bulk amount of text. Learning through the internet becomes popular that facilitates learners to learn anything, anytime, anywhere from the web resources. This system can find the self-learning gaps of learners and improve the progress of learning. The manual question generation takes much time and labor. Therefore, automatic question generation from learning resources is the primary task of an automated questionnaire generator. Stop words and unwanted words are identified by NLP techniques. In order to perform machine learning on text, the data is transformed into vector representations such that we can apply numeric machine learning. Representing data numerically gives us the ability to perform meaningful analytics and also creates the instances on which machine learning algorithms operate. Hence feature extraction is done by using Spacy module and performing One-Hot-Encoding. Naïve Bayes Classifier is used to train the data and the model performance is evaluated on the basis of metrics such as accuracy, precision, f1 score, recall, confusion matrix. The purpose of this project is to generate and assess the questions automatically in 3 formats (True/False, Choose the correct answers, Cloze Questions) when given text as an input.

The Operation of the “Quiz Test Application Using Python Studio
Authors:- UG Student Amar Bansode, UG Student Rakesh Navghan, UG Student Santosh Birajdar, UG Student Anil Nivargi, UG Student VikasBhadkumbe, Lecturer Snehal Shinde

Abstract- Purpose: This paper shows the working of python App this quiz application. Also, it gives the processes which happen in the supply quiz industry.The main aim of this research paper is quiz app software and technology. The analysis should include market and users need in order to be able to fabricate the quiz application and make it available for users as a helpful utility and entertaining application. This research paper is mainly motivated to solve certain problems related, for example, to disable student and in general to collaborative learning. In general the Project & Title will be selected from various sources and send it. to the top like the Project Title along with a bud ese new of the Project in a document called Project Abstract The HOD will accepts the Project and allows the student to proceed and start working on the Project In the middle of the Project designing the HOD also makes a proudest to the Student in and the Sample Code of any medal as well. And at the final the Studies has porcine the cells Documents like Project Final Document. Source Code and all the content in a Compact Dock (CD) and to the HOD along with printed and copy The HOD will see all these documents and finishes the Project Review and enters the Marks to the College records Thus we selected e-Project Submission as our Project to reduce.

Coupled Inductor Based Single-Stage Boost Inverter
Authors:- M. Tech. Scholar Mr. Ravikumar Wakade, Prof. R. M. Bhombe, Prof. Yogesh Likhar

Abstract- Renewable power systems as distributed generation units often experience big changes in the inverter input voltage due to fluctuations of energy resources. Often, a front-end boost converter is added to step up the dc voltage when the energy re- sources are at a weak point. However, when a very high boost gain is demanded, the duty cycle may come to its extreme and large duty cycles causes serious reverse-recovery problems. This paper proposes a novel single-stage boost-type inverter with coupled inductor. By introducing impedance network, including coupled inductor, into the three-phase bridge inverter, and adjusting the previously forbidden shoot-through zero state, the converter can realize a high boost gain and output a stable ac voltage. The single-stage operation of the converter may lead to improved reli-ability and higher efficiency. Theoretical analysis, simulation, and experimental results are presented to verify good performance.

Covid 19 Detection from Chest X-Ray Images Using Deep Learning
Authors:- Sanket Dhobale, Aniket Kandrikar, Sumeet Manapure, Aniket Zullarwar

Abstract-The Covid-19 first occurs in Wuhan, China in December 2019. After that the virus spread all around the world and at the time of writing this paper the total number of confirmed cases are above 170 million with over 3.8 million deaths. Machine learning algorithms built on radiography images can be used as a decision support mechanism to aid radiologists to speed up the diagnostic process. CNN is a Deep Learning algorithm, we are using Convolution Neural Network(CNN) to identify the different features of the x ray images or we can say to visualize the most discriminating regions of the input images. We are taking images of chest x-rays from github. The application of deep learning in the field of COVID-19 radiologic image processing reduces false-positive and negative errors in the detection and diagnosis of this disease and offers a unique opportunity to provide fast, cheap, and safe diagnostic services to patients.

Handwritten Equation Solver Using Convolutional Neural Network
Authors:- Shweta V. Patil, Apurva S. Patil, Harshada C. Mokal, Asst. Prof. Mr. Swapnil Waghmare

Abstract-At present, there is advancement in every sector of technology. Machine learning and deep learning technologies are important parts nowadays. Many fields such as artificial intelligence, handwritten recognition, robotics, and many uses these techniques. Convolution Neural Network is used for classification, image processing, and segmentation. In our project, we had developed a web application that solves handwritten equations. It captures handwritten equations via camera and the character recognition takes place through preprocessing of image. Segmentation along with the character classification is the most difficult part. Convolution Neural Network is used for classification of character that makes the equations as a string. String operations performed on each recognized equation for the solution. As based on earlier modules of equation solver, we have added a module that provides a link for each solution. Hence, our implemented model is easy to access to solve complicated equations, and get precise output.

A Review Article NR Image Quality Assessment of Satellite Image Enhancement
Authors:- Harshil Jain, Asst. Prof. Hemant Amhia

Abstract- Satellite image enhancement is the technique which is most widely required in the field of satellite image processing to improve the visualization of the features. Satellite images are captured from a very long distance, so they contain too much noise and distortion because of atmospheric barriers. After capturing the image, some radiometric and geometric corrections are carried out on it but they are not sufficient for all the applications. It is very important to enhance the restored image before using it. In this paper, different methods for satellite image enhancement viz. contrast enhancement, resolution enhancement, edge enhancement, density slicing, digital mosaics and synthetic stereo images are discussed in detail, as well as experimental results of two techniques viz. contrast enhancement of multispectral color composite and IHS (Intensity, Hue, Saturation) transformation are shown.

MATLAB Simulation Based Reasonable Investigation of MPPT Methods for Cuk Converter Established Solar PV System to Connect to Utility Grid
Authors:- M. Tech. Scholar Dasharath Moyade, Asst. Prof. Dr. J. S. Shakya, Asst. Prof. S.S. Thakur, Associate Prof. C.S. Sharma

Abstract- In this paper presents a reasonable investigation of Maximum power point tracking system(MPPT) using a perturb and observe algorithm for Cuk DC-DC power converter based solar photovoltaic (PV) system to supply power to on grid.Cuk converter delivers an output voltage that may be less than or greater than input voltage. An imperativeimprovement of Cuk converter is a constant current at both the input and the output of the converter. Drawbacks of the Cuk converter are a high number of reactive components and high current stresses on the switch. The Cuk converter delivers a batter output voltage with reduced ripples and increase efficiency. MPPT methods are used in solar PV systems to extract the maximum power from the PV array under dynamic atmospheric circumstances. The electric power generated by solar panel, this power is regulated and it is required to constant power through the Cuk converter is used for improve to desirable voltage at solar panel. These methods are stimulated by MATLAB/Simulink program.

GASBE: A Graded Attribute-Based Solution for Access Control in Cloud Computing
Authors:- Piyush Kumar Jain, Prof. Rupali Bhartiya

Abstract- Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against un-trusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to un-trusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re- encryption, and lazy re-encryption.

Covid-19 Mask Detection
Authors:- Zuveriya, Ummehabeeba R, Asst. Prof. K B Drakshayini

Abstract- The COVID-19 epidemic has forced governments around the world to set limits on the transmission of the virus. A report shows that wearing the right face mask when in a public place and at work clearly reduces the risk of transmission. An effective and economical way to use learning tools to create a safe place to set up a device. With the ongoing epidemic, it is very important to have high quality applications and services designed to reduce risk. The COVID-19 epidemic is a catastrophe for mankind regardless of race, religion, gender and religion. The COVID-19 face mask detector uses in-depth reading techniques to effectively assess whether a person is wearing a face mask or not. Using a deep learning approach called the Convolutional Neural Network; you have found 98.6% accuracy. Cases where the mask is worn improperly are where the nose and mouth are partially covered as the mask is not worn.

IOT Based Disinfection and Sterilization using Temperature and Humidity
Authors:- Asst. Prof. Ms. M. Nalina Sangaviya, S. Lakshmanan, M. Pavithra, G. Sasireka, G. Vahini

Abstract- The Project is developed based on the Guideline for Disinfection and Sterilization in Healthcare Facilities, University of North Carolina Health Care System. Extrapolates quantitative data for ozone virucidal activity on the basis of the available scientific literature data for a safe and effective use of ozone in the appropriate cases and to explore the safety measures developed under the stimulus of the current emergency situation. Ozone is a powerful oxidant reacting with organic molecules, and therefore has bactericidal, virucidal, and fungicidal actions. At the same time it is a toxic substance, having abverse effects on health and safety. Instead of Ozone system, here we are proposed Temperature and Humidity based Disinfection and Sterilization system. Proposed system maintaining 37OC and 85% of Relative humidity at Disinfection and Sterilization area. Its use is being proposed for the disinfection of workplaces, public placeswith particular reference to the COVID-19 pandemic outbreak. Water mist is generated by Ultrasonic based mist maker and Temperature of the room is increased by heater attached with proposed system. It should be injected into the room that is to be disinfected until the desired Humidity and Temperature concentration is reached. After the time needed for the disinfection, its concentrations must be reduced to the levels required for the public safety. Here we are using Node MCU Esp8266 module to transfer status of the system to remote location. Electromagnetic relay is used to turn on and off the Ultrasonic humidifier and Heater.16*2 LCD display is used to display the notification to user side. The developed system improves the reliability and stability of Disinfection and Sterilization.

Performance of Telecommunications Tower During Seismic and Wind Loading Condition
Authors:- M. Tech. Scholar Shubham P Patel, Asst. Prof. Nirmal S. Mehta, Asst. Prof. Hiral V. Patel

Abstract- Four-legged self-supporting towers are commonly used in telecommunications around the world. In recent years, the communication industry has experienced considerable growth, resulting in the construction of a large number of towers to improve coverage area and network consistency. These towers play an important part in wireless communication networks, so their collapse in the event of a crisis is a big concern. As a result, when building these towers, harsh situations should be taken into account to the fullest extent possible. The effect of wind on four-legged self-supporting towers has been studied extensively in most studies. A study on models at differing heights with various bracing for earthquake and wind effects was carried out in this dissertation. Gust factor method is used to investigate the wind effect on the structure, and the modal analysis and response spectrum analysis are used to investigate the seismic effect on the structure. The results obtained from the above analysis are tabulated, compared and conclusions are drawn.

V.I.S- Vehicle Information App
Authors:-Sushant Gangwar, Siddhant Chaudhary, Swapnil Tyagi, Asst. Prof. Mr. Praveen Mishra

Abstract- With the ascent of populace and vehicles utilizations, it’s getting hard to keep up and distinguish vehicles in brief timeframe. Thus, such close to home data is accessible just to government access and a few organizations who pay government to share that information. To add straightforwardness numerous organizations unveiled such information with government instruments, for example, SMS administration partnered to government for data or by utilizing cloud served information. Such applications or instruments are named as Vehicle Information Systems which are utilized to discover data with respect to any vehicle either enlisted or is obscure to information on use and spot. Such frameworks are gainful in dealing with the information base of vehicle enrolled effectively. These frameworks are broadly utilized by enormous organizations to keep up the information of vehicles left in their place. Likewise utilized by Police and other protection association to find dubious things. Large numbers of openly accessible such administrations or virtual products got obsolete or beaded with the ascent of OS refreshes. IOS has just scarcely any such applications coming up and generally individuals who use IOS need to depend on SMS administration or government sites. Despite the fact that administration give data on solicitation however it doesn’t share entire information of the specific vehicles. That data is sub-separated in divisions of individuals who are mentioning them which implies any authority like Police can have entire subtleties improbable ordinary individuals because of protection and security reasons. With concentrating of different devices and thoughts that exposed in this framework, we get some answers concerning deserted devices, for example, OCR, Credential Recognition and so on These instruments were great however didn’t functioned admirably over various OS and subsequently Hybrid Variants were presented in investigation which fairly adjusted the exhibition to a degree. In 2019, Indian Government made the stride of digitalization and reported API of such information which was simply accessible to confided in specialists of India. Programming interface apparatus took the large jump in optimizing and accessibility of information with no security break. With the writing and articles, we presumed that distinctive OS administrations are there yet just a couple of administrations act in each OS. To fill the gap of administrations we choose to make a help that will safely and productively work cross-stages.With the ascent of populace and vehicles utilizations, it’s getting hard to keep up and distinguish vehicles in brief timeframe. Thus, such close to home data is accessible just to government access and a few organizations who pay government to share that information. To add straightforwardness numerous organizations unveiled such information with government instruments, for example, SMS administration partnered to government for data or by utilizing cloud served information. Such applications or instruments are named as Vehicle Information Systems which are utilized to discover data with respect to any vehicle either enlisted or is obscure to information on use and spot. Such frameworks are gainful in dealing with the information base of vehicle enrolled effectively. These frameworks are broadly utilized by enormous organizations to keep up the information of vehicles left in their place. Likewise utilized by Police and other protection association to find dubious things. Large numbers of openly accessible such administrations or virtual products got obsolete or beaded with the ascent of OS refreshes. IOS has just scarcely any such applications coming up and generally individuals who use IOS need to depend on SMS administration or government sites. Despite the fact that administration give data on solicitation however it doesn’t share entire information of the specific vehicles. That data is sub-separated in divisions of individuals who are mentioning them which implies any authority like Police can have entire subtleties improbable ordinary individuals because of protection and security reasons. With concentrating of different devices and thoughts that exposed in this framework, we get some answers concerning deserted devices, for example, OCR, Credential Recognition and so on These instruments were great however didn’t functioned admirably over various OS and subsequently Hybrid Variants were presented in investigation which fairly adjusted the exhibition to a degree. In 2019, Indian Government made the stride of digitalization and reported API of such information which was simply accessible to confided in specialists of India. Programming interface apparatus took the large jump in optimizing and accessibility of information with no security break. With the writing and articles, we presumed that distinctive OS administrations are there yet just a couple of administrations act in each OS. To fill the gap of administrations we choose to make a help that will safely and productively work cross-stages.

Solar Power Inverters
Authors:- Meghana S

Abstract- An inverter converts the DC generated by the solar panels to AC which is used by the electrical grids. Inverters are the example of a class of devices called power electronics that regulate the flow of electrical power.

Concentrated Solar Power
Authors:- Nisarga MR

Abstract- Integration technology has become important due to the world’s energy requirements which imposed significant need for different methods by which energy can be produced or integrated, in addition to the fact that integration of solar energy into non-renewable sources is important as it reduces the rates of consuming of non-renewable resources hence reduce dependence of fossil fuels. Basically, there are two types of solar power generation used in integration with grid power – concentrated solar power (CSP) and photovoltaic (PV) power. CSP generation, sometimes known as solar thermal power generation, is much like conventional thermal power generation that converts thermal energy (steam) into electricity.The direct current is then converted to alternating current, usually using inverters and other components, in order to be distributed onto the power grid network.

A Study of HRM and Digital Transformation in Organization’s Strategy and Policies: Reshaping HR Space
Authors:- Phd. Scholar Miss. Sunakshi Verma, Dr. Neeti Rana

Abstract- A digital strategy is essential for “Future-proofing” a Company That wants to stay ahead of the competition.This research paper emphasized the importance of artificial intelligence and digital technologies in HR management: Its review three areas related to Digital Transformation in Organization” Digital workforce”, ”Digital Workplace” and “Digital Management & employee”, its showing most important issues at present are cloud Computing, Internet of things (IoT), exabytes of data and artificial intelligence(AI).The objective of this study “Digitalisation + Transformation = Productivity” this everyone can agree that under pressure and confusion, digital transformation involves a number of important changes, time-saving, opportunity, reshape and reinforce their roles within their organization. The paper illuminates to explore the use of technology-driven tools in HR professionals to use these innovations in positive ways. In this study I worked primary and secondary data has been collected through structured Questionnaire and Secondary data was collected from business magazines, Case study, Published data, books, e-journals, newspapers- the novelty of this study consists in exploring the HRM digitalization process in the organization.

Plant Disease Detection Using Neural Network
Authors:- Ms. Harsha Gupta, Aakash Bhatt, Adarsh Verma, Anshu Kr. Singh, Tushar Bhatt

Abstract- When plants and crops are suffering from pests it affects the agricultural production of the country. Usually, farmers or experts observe the plants with an eye for the detection and identification of disease. But this method is often time processing, expensive and inaccurate. Automatic detection using image processing techniques provide fast and accurate results. This paper cares with a replacement approach to the development of a disease recognition model, supported leaf image classification, by the utilization of deep convolutional networks. Advances in computer vision present a chance to expand and enhance the practice of precise plant protection and extend the market of computer vision applications within the field of precision agriculture. a unique way of training and therefore the methodology used to facilitate a fast and straightforward system implementation in practice. All essential steps required for implementing this disease recognition model are fully described throughout the paper, starting from gathering images to make a database, assessed by agricultural experts, a deep learning framework to perform the deep CNN training. This method paper may be a new approach in detecting plant diseases using the deep convolutional neural network trained and finetuned to suit accurately the database of a plant’s leaves that was gathered independently for diverse plant diseases. The advance and novelty of the developed model dwell its simplicity; healthy leaves and background images are in line with other classes, enabling the model to distinguish between diseased leaves and healthy ones or from the environment by using CNN. Plants are the source of food on earth. Infections and diseases in plants are therefore a big threat, while the foremost common diagnosis is primarily performed by examining the plant body for the presence of visual symptoms [1]. As an alternative to the traditionally time-consuming process, different research works plan to find feasible approaches towards protecting plants. In recent years, growth in technology has engendered several alternatives to traditional arduous methods [2]. Deep learning techniques are very successful in image classification problems.

A Implementation of Digital Image Forgery using DWT and SIFT Features
Authors:- Research Scholar Chavi Rana, Asst. Prof. Gyanendra Kumar Singh

Abstract- The use of digital photography has increased over the last few years and this trend has opened the door for image forgery. Image forgery has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving images) Existing systems integrate block-based and key point-based forged detection in this work methods DWT extraction and SIFT Features with SLIC super pixel segmentation algorithms is proposed to detect the forgery area from the dataset. Existingwork can roughly indicate suspicious, forged areas. The proposed system approach reduces image debugging increase the accuracy and detects copy-moving image forgery region. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image forgery is proposed. This simulation executed in MATLAB simulation.

Detection of Digital Forgery Image using Discrete Wavelet Transform and SIFT Features Extraction
Authors:- M.Tech Scholar Deepali Pal, Prof. Amit Shrivastav

Abstract- Digital images have a very significant role in various fields like medical imaging, journalism, criminal and forensic investigations. Because of the widespread availability of photo editing software and tools, it becomes problematic to use the digital images in applications where their genuineness is of prime importance. Therefore, it is necessary to create forensic techniques which are capable of detecting the tampering in image. Most common operations that are involved in the creation of forged images are contrast enhancement, copy-paste forgery etc. In this paper, we present different techniques for detecting global contrast enhancement and copy-paste forgery. The proposed technique for the detection of contrast-enhanced image is based on contrast calculation. The use of digital photography has increased over the last few years and this trend has opened the door for image forgery. Image forgery has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving images) Existing systems integrate block-based and key point-based forged detection in this work methods DWT extraction and SIFT Features with SLIC super pixel segmentation algorithms is proposed to detect the forgery area from the dataset. Existing work can roughly indicate suspicious, forged areas. The proposed system approach reduces image debugging increase the accuracy and detects copy-moving image forgery region. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image forgery is proposed. This simulation executed in MATLAB simulation.

Design and Experimental Investigation of Thermal Performance of Different Heat Sink for High Power Led Lights
Authors:- Ravindra.H. Raut , Ass. Prof. S.S Jaware

Abstract- LEDs have been used in many products due to their longevity, more power saving, and higher lumens per watt. About 80% of the electrical power is wasted as heat or reductant heat, which increases the junction temperature of the LED’s. This increase in the temperature in the LED’S decreases the longevity and color of LED’S. Proper thermal management is required to remove this heat effectively. The heat sink design and usage of proper thermal interface materials for increasing the heat removal is required. In this paper, temperature increase in a LED fixture during a time interval with and without thermal interface material is measured and tabulated to find the effectiveness of the thermal interface material in removing more heat is studied. In addition, a simulation using Solidworks thermal simulation is done to validate the analytical thermal-time study results. The entire study provides a guideline for the design of LED high bays in the future and demonstrates the importance of the thermal interface materials in the design studied.

PSO and Automatic Finite Deterministic Algorithm for Secured Energy Efficient Routing in Wireless Sensor Network
Authors:- M.Tech. Scholar Diksha Jharbade, Prof. Amit Shrivastav

Abstract- 5G wireless sensor network (WSN) is a network of autonomous nodes used to monitor the environment. Energy competence or secure data transmission are measured as mainly imperative devise goals for WSN. With the increase in difficulty of workstation networks, the increase in network-based attacks has attracted consideration of different researchers from several fields. Therefore, many intrusion detection systems (IDS) have been implemented to address various aspects of complex safety, such as DoS, worms, viruses, malware, etc. IDS automation has been planned to recover realization of energy resourceful routing in wireless sensor networks in a secure manner. Automatic finite deterministic and particle swarm optimization (PSO) solutions for intrusion detection and data transmission performed in a secure manner by determining and following an optimized path Routing through the best path can recover overall presentation of sensor network in wireless technology and has been controlled through various indicators (such as power expenditure, capacity, network life, active nodes and dead nodes). In this work, threat model and safety objectives for secure routing in wireless network. This simulation executed in MATLAB simulation platform.

Consumer-Service Provider Connect
Authors:- Shrestha Sharma, Nabhya Jha, Nimal Nainan, Shweta Tripathi

Abstract- We have created an online portal that helps the users using it to either provide services or seek services.The main aim of this project is to create a system which connects consumers and service providers. The consumers and service providers can both post their targeted requirements and seek out each other. The jobs may include short or long term services. Consumers can browse for services and send requests to the service providers by filling the required details. The service provider who finds the details of the service in accordance with his/her schedule and is ready to provide the service will accept the request and will be assigned to the consumer. This will open a new window of opportunities for several people in situations where they cannot actively go out to seek jobs or cannot work consistently.

A Study of HRM and Digital Transformation in Organization’s Strategy and Policies: Reshaping HR Space
Authors:-Phd. Scholar Sunakshi Verma, Dr. Neeti Rana

Abstract-A Digital strategy is essential for “Future-proofing” a Company that wants to stay ahead of the competition.This research paper emphasized the importance of artificial intelligence and digital technologies in HR management: Its review three areas related to Digital Transformation in Organization” Digital workforce”, ”Digital Workplace” and “Digital Management & employee”, its showing most important issues at present are cloud Computing, Internet of things (IoT), exabytes of data and artificial intelligence(AI).The objective of this study “Digitalisation + Transformation = Productivity” this everyone can agree that under pressure and confusion, digital transformation involves a number of important changes, time-saving, opportunity, reshape and reinforce their roles within their organization. The paper illuminates to explore the use of technology-driven tools in HR professionals to use these innovations in positive ways. In this study I worked primary and secondary data has been collected through structured Questionnaire and Secondary data was collected from business magazines, Case study, Published data, books, e-journals, newspapers- the novelty of this study consists in exploring the HRM digitalization process in the organization.

Optimization of Functional Beverages made from Ginger Cumin and Honey
Authors:- Rasik R.Thkur, Nitish V Khanvilkar, Sayli N Kale, S.M. Lokhande, Amol Prakash Sonone

Abstract- Ginger and honey both have an excellent nutritional and medicinal property that is why the combination of both in the right proportion makes highly nutraceutical as well refreshing drinks. Energy drinks are widely consumed by adolescents as these claim to improve performance, endurance, and alertness. Looking at the contents in the energy drinks and their benefits, the industry may like to relook at what the consumers really need. We are developing the functional drink by using ginger, Cummins, honey with the addition of water to rehydrate. The present investigation was undertaken with the objective of standardizing the process for the preparation of the functional beverage product was evaluated for proximate analysis, sensory analysis, and storage condition. Beverage contain 13% Brix, 0.20 % Acidity, these parameters remain constant at cold storage for more than 30 days. We used honey in the product instead of sugar, jaggery, or any other artificial sweetener for better consumption for diabetic patients. Increased urbanization, rising disposable income, and growing health consciousness among the youth have increased the demand for non-carbonated drinks called energy drinks.

Using GIS to Assess the Hydropower Potential of a Run-of-River Small Hydropower Plant in Chamkhar River, Bhutan
Authors:- Dorji Letho, Leki Dorji, PhuntshoTashi, Jamyang Seldon

Abstract- Bhutan is a considered as a carbon negative country as forested sequestered more amount of CO2 as compared to the CO2 emission through variety of activities. Being the world’s only carbon negative economy, hydropower development continues to play a major role in Bhutan’s sustainable economic development.Clean energy sources such as hydropower, are crucial in combating global warming and the effects of it. Bhutan is blessed with one of the highest per capita hydropower potentials in the world and has only harnessed around 6.3% of its total hydropower potential so far. It also has numerous potential sites for small scale run-of-river hydropower, which have minimal adverse environmental impacts, in contrast to large scale hydropower plants. The limitations fostered to such development have been imposed by the inaccessibility physically to these locations, owing to the rugged terrain making a difficult to select an appropriate location, thus it could be partially solved and boosted by the use of GIS technology of ArcGIS tools. In using such tools, enable us to explore hydropower potentials in faster, cost effective and precise ways. This paper studies the location of the run-of-river small scale hydropower potential along the Chamkhar River in Bhutan. Ninety-eight potential locations were found under the criteria of the head, discharge and slope criteria out of which twenty-seven locations lied outside protected bounds. Of these only ten of them are further taken to get the most optimized location and this result can be refined by field studies to select the most optimized location among the potential ones.

Design & Fabrication of Sugar Globules Making Machine
Authors:- Associate Prof. N. H. Chahande, Amit H. Pall, Pranjali P. Zade, Akshay V. Nimje, Tushar K. Karwade

Abstract- As progress of Medical Science increasing day by day likewise the side effect of allopathic medicines are also being seen in the world. Looking to the adverse effect of allopathic medicines population of this era is moving towards the Ayurveda & Homeopathic Medicines because it is well known that adverse effect of homeopathic & Ayurveda medicines are quite low. Homeopathic globules are commonly used in clinical practice, while research focuses on liquid potencies. Sequential dilution and succession in their production process has been proposed to change the physico-chemical properties of the solvent(s).Various machines have been used over the years to prepare homeopathic medicines. Although these machines follow the same principles, i.e. energetically mixing the medicines and diluting them significantly, their mode of operation is different from each other.

Detection of Autism Spectrum Disorder Using Machine Learning
Authors:- Kruthi C H, Tejashwini H N , Poojitha G S, Shreelakshmi H S, Asst. Prof. Shobha Chandra K

Abstract- Autism spectrum Disorder (ASD) also known as Neuro-developmental disorder that affects people’s interaction, learning and communication skills. Despite the fact that identification of this syndrome can be done at any age, its symptoms typically appear in the first 2 years of life. Determining the autism traits through screening tests is extravagant and extensive. With the improvement of artificial intelligence and machine learning, autism can be detected at quite an early stage. However a number of studies have been done using different techniques, these studies did not provide any final conclusion about detecting autism traits among the people of age group 3 years and below. Hence the paper aims to present an autism prediction model using machine learning techniques and to develop a web application that could successfully predict autism traits of a person. In other words, this paper focuses on developing an autism screening application for detecting the autism spectrum disorder traits among the people of age 3 years and below. This project model was evaluated with AQ 10 dataset (1054 datasets) and 50 actual dataset collected from people with and without autism traits. The Analysis results showed that the proposed prediction model gives better results in terms of specificity, precision, sensitivity, accuracy and f1 score for both datasets.

IoT Based Air Pollution Monitoring System
Authors:- Ashwini, Anvitha Poojary, Anvitha U, Akshata Hedge, Prof. Dr. Mohideen Badhusha S

Abstract- Internet of Things (IoT) is a worldwide system of “smart devices” that can sense and connect with their surroundings and interact with users and other systems. Global air pollution is one of the major concerns of our era. Existing monitoring systems have inferior precision, low sensitivity, and require laboratory analysis. Therefore, improved monitoring systems are needed. To overcome the problems of existing systems, we propose a three-phase air pollution monitoring system. An IoT kit was prepared using gas sensors, Arduino IDE (Integrated Development Environment), and a Wi-Fi module. This kit can be physically placed in various cities to monitoring air pollution. The gas sensors gather data from air and forward the data to the Arduino IDE. The Arduino IDE transmits the data to the cloud via the Wi-Fi module. We also developed a Web front-end so that users can view and access relevant air quality data from the cloud.

The Multi-Phase Spatial Meta-Heuristic Algorithm for Public Health Emergency Transportation
Authors:- Fariba Afrin Irany, Arnav Iyer, Armin R. Mikler, Rubenia Borge Flores

Abstract- The delivery of Medical Countermeasures -MCMs for mass prophylaxis in the case of a bio- terrorist attack is an active research topic that has interested the research community over the past decades. The objective of this study is to design an efficient algorithm for the Receive Reload and Store Problem –RSS in which we aim to find feasible routes to deliver MCMs to a target population considering time, physical, and human resources and capacity limitations. For doing this, we adapt the p-median problem to the POD-based emergency response planning procedures and propose an efficient algorithm solution to perform the p-median in reasonable computational time. We present RE-PLAN, the Response PLan Analyzer system that contains some RSS solutions developed at The Center for Computational Epidemiology and Response Analysis (CeCERA) at the University of North Texas. Finally, we analyze a study case where we show how the computational performance of the algorithm can impact the process of decision making and emergency planning in the short and long terms.

A Review Article Hybrid Power System with Integration of Wind, Battery and Solar PV System
Authors:- Vijay Patre, Associate Prof. Dr. Manju Gupta

Abstract- As the race for global industrialization begin late in 18th century, the developing technology made humans to depend on energy, so as the energy crisis begins, in this modern era, electricity become a most essential need of human beings, from household to industrial work. So, the purpose of the project is to generate electricity without using non-renewable resources and pollution. Since, renewable standalone energy generation systems have disadvantages, which need to be overcame by hybrid systems. Wind and solar energy have being popular ones owing to abundant, ease of availability and convertibility to the electric energy. This work covers realization of hybrid energy system for multiple applications, which runs under a designed circuitry to utilize the solar and wind power. And a designed circuitry for more efficient results, and inverters to convert the electrical energy as per demand.

Face Mask Detector
Authors:- Keerthi Yaramala, Jamula Keerthi Sameera, Harshitha Yarlagadda, Bommina Naga Pranathi

Abstract- In this new era where we are experiencing a pandemic and people all around the world are advised to wear masks, some people are not used to it and are avoiding to wear masks. The motivation behind this projects is that if we can take help of AI to detect people wearing or not wearing masks in public places, it would be helpful to increase our safety. If deployed correctly, the mask detector could potentially be used to help ensure our safety.

Automation and Monitoring of Greenhouse
Authors:- Asst. Prof. Seema G.Bavachkar, Rutuja Upadhye, Mauyri Shinde, Sukanya Swami

Abstract-In traditional agriculture, farmers must regularly visit their farmland to measure various environmental parameters such as temperature, humidity, light intensity and soil moisture in order to grow the right crops on the right soil at the right time.Greenhouse cultivation, on the other hand, is a system in which a farmer grows crops in an ecological environment where all ecological parameters are adjusted according to the plant species. Greenhouse automation is a way for farmers to automatically monitor and control the greenhouse environment anytime, anywhere. In this article, the authors propose an automated greenhouse monitoring and control system that includes various sensors such as temperature sensors, moisture sensors, light sensors, and soil moisture sensors for harvesting.

Review Paper on Harsh Environmental Structural Health Monitoring
Authors:- Hossain Ahmed, Seifollah Nasrazadani, Shuai Ju

Abstract- Proper maintenance and continuous monitoring are essential for ensuring the safety of the structure. Many types of sensors are developed to monitor the degradations of the structure, especially in a harsh environment, to identify the structural defect at a preliminary stage. To consider the material as a sensor in a harsh environment should have the ability to withstand high temperatures or at a high vibration, electromagnetic interference, high strain, etc. The data acquisition technique and an optimum number of the sensor to get accurate data are a significant factor for SHM, especially at the harsh environment. This review will describe the different types of harsh environments and the suitable and application of reliable, high-efficiency sensors based on the harsh environment.

Geospatial Mapping of Flood Susceptibility via Multi-Criteria Analysis AHP and GIS: La Paz Basin, Baja California Sur., Mexico
Authors:- Prof. Joel Hirales-Rochin

Abstract- The research presents the multi-criteria analysis approach (MCA) to describe the effective use of geospatial techniques for the reduction of geohydrological risk and its relationship with urban territorial development at the local level, in the case of the La Paz Basin, Baja California Sur., Mexico. In addition, Geology is presented as a tool to identify areas of geohydrological risk, useful to determine the close relationship between the geological space and the sustainable urban development of a city. From this interaction, it is possible to respond to the growing demand for environmental and urban solutions. Today’s cities are characterized by rapid and poorly planned urbanization, which, together with climate change, has exacerbated the risk of flooding in urban and rural areas globally, resulting in devastating loss of human life and property.At the national, regional and local level where the study area is located, floods are one of the most susceptible geohydrological hazards. The objective of this research is to identify these areas of risk of susceptibility to flooding and to make known the factors that influence it, such as the growing number of new urban areas, which are not linked to an adequate analysis of the hydrological geographic environment and little knowledge of the main factors that control these risk conditions.The methodology was based on a characterization of the geological and hydrogeological conditions of the basin of the city of La Paz; Mexico. The methodology of the Analytical Hierarchy Process (AHP) applied to generate the flood susceptibility map was built based on thirteen influencing parameters, that is, elevation, slope, distance from the drainage network, geomorphology, drainage density, flow accumulation, rainfall, land use / vegetation, geology, stream power index, topographic moisture index, and topography curvature. All this, through geographic information systems (Arcgis). The results represent the first stage of a larger-scale project with the purpose of updating the knowledge of vulnerability and geo-hydrological risks of the study area. Therefore, it is possible to contribute new knowledge to be used in a sustainable growth of the city’s population, the improvement of current construction standards and the corresponding zoning to anticipate its development in an orderly manner. Finally, it is considered that this type of zoning of areas susceptible to risks (urban settlement scale) provides an analysis of the risk conditions where the citizen of any city can be located in his own community and know his own conditions of civil protection. Knowledge that currently most risk studies only offer large-scale results and a broader vision.

Structural Analysis of I-Girder Bridge and Comparison for Various Loading
Authors:- Mr. Abhijeet Fopase, Asst. Prof. Ishant Dahat

Abstract- I-beams and plate design in terms of the simple capital value of the superstructure, the advantages of the shape of the boxing beam, such as better appearance and reduced maintenance, may well deserve the evaluation of the boxing beam as an alternative for any bridge in the span range from 45 m to 100 m. For bridges with a significant curvature of the plan, box beams should always be considered. In particular, if more websites are introduced (than would be used with straps), thinner web panels will need more rigidity. Nevertheless, they may still have a lower shear stress limit and be less effective in bending. Wide compression flanges can also be less than fully effective due to bending considerations (plate beam flanges are usually fully effective). In this paper, various bridges of I-brothers are analyzed using BRIDGELINK software.

Effect of Depression on Functional Recovery – A Correlational Study
Authors:- Md. Zahir Uddin Akanda

Abstract- Study design and purpose: A quantitative and non experimental, correlational study was conducted in order to investigate the relationship between the Beck Depression Inventory (BDI) score and the Functional Independent Measure (FIM) score of the patients with Spinal Cord Injury. Objective: To find out Is there a relationship between BDI and FIM score? How strong is that relationship? What is the direction of the relationship (positive or negative)? Setting: Centre for the Rehabilitation of the paralysed (CRP) Spinal Cord Injury hospital indoor department: Chapain, Savar, Dhaka. Methods: Stratified – systematic random sampling was used to select the participants. Participants were individually interviewed using a semi structured questionnaire, the Functional Independent measure (FIM) and the Beck Depression Inventory (BDI). Results:The data were subjected to statistical analysis. Using a parametric Pearson test, a significant negative correlation (r=-0.3586, p<0.02, for two tailed hypothesis) between the FIM score and BDI score was found. The descriptive data calculated as percentages. Among the patients studied 20% had mild mood disturbance, 7% had borderline clinical depression, 33% had moderate depression, 20% had severe depression, and another 20% had extreme depression. Conclusion: Our results have important implications for the treatment of patients with SCI. the findings indicate that the patients BDI score were negatively related with FIM scores. In our opinion these data justify the provision of a psychological service in every hospital where patients with SCI are treated. Further research is required to explore the reason behind this correlation.

A Study of Setback Effect on Multi-Storied Building with Mass and Stiffness Irregularity
Authors:- M. Tech. Scholar Nimant N Chopada, Asst. Prof. Arjun M Butala

Abstract- This research concerned with the compare to regular building with setback building with consider various irregularities on the seismic response of structure. Architects typically suggest irregular structures for the sake of the structure’s architectural elegance. As a result, seismic responses of buildings with unusual configurations must be determined. The structural configuration of a multi-story building affects its actions during a strong earthquake. One of the most common causes of failure during earthquakes is an irregular plan or elevation configuration. As a result, irregular structures, especially those in seismic zones, are a source of concern. Since, structures normally have a combination of irregularities, predicting the seismic response based on a single irregularity cannot be accurate. It is critical to choose the form, degree, and position of irregularities in the design of structures because this contributes to the structure’s usefulness and aesthetics. Therefore, the study the seismic behaviour of regular building with compare to setback building with different irregularities. we have considered 7th floor model consider with provide mass irregularity and stiffness irregularity. All frames are subjected to seismic loads and the response of the structures is analysis in ETABS software with different parameter e.g., displacement, storey drift, storey shear, storey stiffness.

Wireless Sensor Node Energy Optimization by Packet Routing and Clustering
Authors:- Dr. Shweta Singh, Jamvant Omkar

Abstract- Wireless network depends on life of battery as communication depends on calculation. Many of data collection activity depend on sensors continuous information collection. Hence energy optimization required for the long life of network. So nodes communications need some intelligence for sending data to the base station. This paper has developed a clustering approach for nodes energy optimization as genetic algorithm adopts dynamic situation without any guidance. Paper has developed invasive weed optimization algorithm which select cluster center from the available nodes and reduce energy losses. It was obtained that proposed model has utilized node node energy and position in fitness function for cluster center selection. Experiment was done on different number of nodes and network area size. Result shows that proposed model has increase the life span of WSN.

Performance Evaluation of Interference Cancellation methods in Cognitive Radio for Aeronautical Communication System
Authors:- Santhiya Lakshmi, Vineetha Mathai, Prof. Indumathi

Abstract-The Very High Frequency band (VHF) currently used for aeronautical communications is becoming congested, and hence L band is used for meeting the future capacity requirements in aeronautical communications which will require much greater use of data communications. Due to air traffic, cognitive radio based air to ground communication is introduced which provides dynamic spectrum access to airplanes to overcome the spectrum scarcity problem and in that spectrum sensing is done to find vacant place for effective communication. In the spectrum sensing, the DME and LDACS is the primary and secondary system. When the secondary system access the primary’s vacant place, the DME interference exist in the LDACS signal. This affects the effective communication from air to ground. Thus we propose three new approaches to mitigate the interference, one of which is a space time block coding method and the another two types are Pulse blanking algorithm and Decision directed noise estimation. In this work, we analyse and remove the interference in LDACS signal and compare the performance of these interference reducing algorithms.

Border Security System for Intrusion Detection Using Robotic System, Thermal Imaging Camera, Computer Vision and Machine Learning
Authors:- Vastav Bharambe, Om Gaikwad, Mohan Kshirsagar

Abstract- Border Security is a very crucial issue for every country, nowadays handling terrorisom and security breach is the biggest challenge for every country, terrorists generally use multiple on and off terrain ways to breach the border lines. As per the BBC NEWS report every year 70+ intrusions happen in border areas, Also as per the report of The New Indian Express 111 terrorist infiltrates j&k border since 2019. These intrusions are very dangerous for the country in terms of GDP growth. The novelty of our research is we are developing a system which has capability of detection and identification for human presenase, with the same we are trying to achieve detection and recognition for weapons if the same person is carrying. This system can be used at multiple places such as Government Private Sectors, Research facilities, National and International Banks, Military Facilities. Some Secrete Private Factories. The Design aspect of this system we came up with a novel idea where we are using a Thermal Imaging Camera and a Normal CCTV camera, we are processing both the images at the same time towards finding the Presence of Human living beings. As per the study Times of India border line breach happens in the form of animals means Territories wear such costumes.

Fruit Counting For Automated Inventory Management System Using Neural Networks
Authors:- Athira Mahesh, Nagaraja Hebbar N, Preethika

Abstract- In agricultural sector the problem of identification and counting the number of fruits on trees plays an important role in crop estimation works. At present manual counting of fruits is carried out at many places. Manual counting has many drawbacks as it is time consuming and requires plenty of labors. The automated fruit counting approach can help crop management system by providing valuable information of forecasting yields or by planning harvesting schedule to attain more productivity. This work presents an automated and efficient fruit counting system using computer vision techniques and neural network object detection methods. Neural networks have the capability of recognizing complex patterns and they shows better accuracy when compared with other techniques.

College Feedback System
Authors:- Mr. Sourabh C Bal, Mr.Rushikesh S Kadam, Prof. Mr.Kartik Nikam, Mr. Muzamil M Shaikh

Abstract- Nowadays, Nowadays, instructive Institutions are paying expanding regard for the perspectives on Student’s on the inclusion in learning and educating through surveys or inputs. Online Feedback System is a web application which gives base to the schools/universities to lead understudy’s input on the web. The objective of the investigation was to foster an all-in-one input framework serving the two understudies and educators. The framework includes age and examination of educator’s criticism pages, synopsis, and a conveyance of input. The framework is created for the all-undergrads and staff individuals Also Students can offer input about their workforce individuals. The understudy needs to look over phenomenal, generally excellent, great, agreeable, poor. Then, at that point subsequent to endeavoring each question needs to present his input with the framework. This on the web input framework is the ideal spot to discover criticism assessed as per the prerequisites and it is the effective one to get criticism examination of understudies and staffs.

Plumbing Pool Website
Authors:- Dr. Deepica Dom Iac, Abhishek Bagwari, Anas Khan

Abstract- The main purpose of doing the project at plumbing pool Website for plumbers to get us aquaintedwith make a particular project look good.Customer has it becomesa concern for many around the market, , this project helps toprovide plumbers through our site a purpose of this project to show how the plumbing system works. The main purpose of this study is to improve the plumbing industry and convinent way to provide plumber, which can help customer to find plumber and all necessary information online plateform.

A Review on IOT Based Irrigation System by Using AES Algorithm
Authors:- Miss. Dipali Kaluse, Prof. Jayant Rohankar, Prof. Mukul Pande

Abstract- India is mainly an agriculture country. Agriculture is the most important occupation for the most of the Indian families. This system have sensors for soil moisture, temperature sensor and humidity sensor, rain sensor, day night sensor, microcontroller, Wi-Fi controller, motor, rechargeable battery, and AC adaptor. The microcontroller of the control unit is programmed with threshold values of the temperature and moisture content. This sensor senses the various parameters of soil moisture and gets automatically ON/OFF the motor according to these parameters. These sensed parameter and status of the motor will be shown on mobile phone, and laptop.

Automation in LPG Cylinder Monitoring System
Authors:- A.R.Telepatil, Tejal Bhosale, Rutuja Sutar, Dipti Vardhamane

Abstract- The image processing is used to detect, recognize and calculate the number of objects. The proposal of this system is to develop the electronic solution using the image processing technique to reduce human error and also human efforts. In this solution we are going to target problems relevant to LPG like leakage of LPG gas. For counting the number of cylinders in godown, camera will capture the image of cylinders from top side. Using image processing, the number of particular size circles (uppermost circle of cylinder) will detect and from the number of circles, we will get the number of cylinder count. The LPG gas may lead to explosion and suffocation also. Using gas sensor which detects the leakage of LPG and the message of alertness through Arduino will give on the LCD display as well as the buzzer will turn on.

A Micro Crack Detection & Condition Monitoring of Bearing Using DWT Method in Catia
Authors:- M. Tech. Scholar Ketan Patil, Asst. Prof. G. R. Kesheorey

Abstract- Nowadays, fault detection in induction motors has gained importance. Motor health monitoring is performed to diagnose their operating condition using vibration signals. These signals are processed using different signal processing methods to extract the characteristic parameters permitting localization of the fault. In this paper, we propose a diagnostic method based on Hilbert and Discrete Wavelet Transforms for the detection of bearing faults in asynchronous machines. The discrete wavelet transform (DWT) is intended to provide the detail coefficients while the Hilbert transform (HT) is used to obtain the temporal envelope then the envelope spectrum of the detail. The kurtosis value indicates the optimum decomposition wavelet level containing the significant frequencies corresponding to faults for early detection. The result obtained by HT-DWT is more suitable for the analysis of emergency signals. This technique is effective for either stationary or non-stationary signals. Healthy case is compared to faulty case in order to extract frequencies characterizing different faults. The validation of this approach is evaluated by comparing theoretical with experimental results.

A Mutidisk Clutch Design & Performance Optimization Using Anova Method
Authors:-M. Tech. Scholar Shubham Verma, Asst. Prof. G. R. Kesheorey

Abstract-Multi plate clutch is one of the important part in the power transmission systems. Good design of clutch provides better engine performance. Multi plate clutch is most widely used in racing cars and heavy duty vehicle where high torque transmission required and limited space is available. In this project, we have designed a multi plate clutch by using empirical formulae. A model of multi plate clutch has been generated in CATIA V5 and then imported in workbench for Structural Applications. We have conducted structural analysis by varying the friction surfaces material and keeping base material as Steel. By observing the results, comparison is done for materials to validate.

Temperature Monitoring System Using Bolt IOT
Authors:- Ms. Megha Yadav, Ms. Neha Bargale, Ms. RutujaKadole, Ms. Aasiya Chaus, Asst. Prof. Mrs. Seema.G. Bavachkar

Abstract- Temperature assumes a major half during this day and age, even temporary amendment in temperature at enterprises could cause blasts that prompts debacles and loss of valuable existence of individuals. To defend people from these calamities we’ve planned this enterprise that alarms people by causing messages, messages and tweets once temperature passes boundary esteem or if any irregularity is known. Through these tweets the individual will inform the specialists concerning the temperature passing boundary esteem, then, at that time there is a probability of taking preventive measures to forestall catastrophes at completely different enterprises like drug organizations, and then forth In drug organization’s certain temperature ought to be preserved, forward temperature surpasses, the medication created around then cannot bear item utilized for medication since they may be unsafe whenever utilized for prescription as temperature wasn’t steady, transfer concerning an unbelievable misfortune for the company. Our item can likewise be helpful to minimize these sorts of misfortunes.

Optimization of the WSN Network Based on the EAMMH and OLIN Algorithm
Authors:- Atul Asija, Asst. Prof. Aashish Kumar Sharma

Abstract- Wireless Sensor Network (WSN) is a network type that consists of several sensor nodes used for particular functions in a specific area. These nodes forward the data to their nearest base station (BS). For the transmission of data, nodes with restricted energy can be used. A big challenge in WSN is the high quantity of energy needed for the little volume of data. Monitored processes that provide time-stamped data may alter significantly over time in real-world sensor networks. The OLIN (online information network), an online data mining approach, automatically accommodates the drift rate of the idea in a non-stationary data stream by continually generating a classification model from each sliding training example window. This paper presents a new IOLIN (incremental online information network) data mining algorithm in real-time, which saves a substantial amount of calculation effort by updating an existing model as long as no major idea drift is observed. The suggested technique relies on the overlooked “Information Network” (IN) decision-tree classification model and provides three different sorts of model updates. No statistically significant distinction between precision of the incremental algorithm (IOLIN) vs. renewable algorithm (OLIN) was discovered in studies with multi- year streams of traffic sensor data.

Arduino Based Solar Tracker
Authors:- Asst. Prof. Rupalee S. Ambekar, Shubham Saket

Abstract- A solar photovoltaic (SPV) cells based dual axis tracking system on Arduino Uno platform is implemented in this project for achieving maximum power during a day. The key idea of this article is implementing an automatic dual axis solar tracking system. Alignment of solar panel with the Sunlight for getting maximum solar radiation is experimented. This system tracks the maximum intensity of light in terms of maximum power point (MPP). When the light intensity decreases, its alignment changed automatically for catching maximum light intensity. This project shows implementation and analysis of dual axis solar tracker.

A Review Article In Distribution System Minimum Loss Reconfiguration Using Ant Colony Optimization Algorithm
Authors:- PG Schoar Mrs. Prabha Uikey, Prof. Dr. Anil Kori (HOD)

Abstract-This paper presents a comparative study of three Ant Colony Optimization (ACO) algorithms applied to Distribution Network Reconfiguration Problem. The original ACO algorithm called the Ant System (AS) and two of its variants viz. MAX-MIN Ant System (MMAS) and Ant Colony System (ACS) were used to minimize active power loss in distribution systems. The algorithms were coded in MATLAB and numerical experiments were conducted on two benchmark systems. The results indicate that even though all the three algorithms are capable of solving distribution network reconfiguration problem, ACS is found to perform better for larger systems.

Automation And Monitoring of Greenhouse
Authors:- Asst. Prof. Seema G.Bavachkar, Rutuja Upadhye, Mauyri Shinde, Sukanya Swami

Abstract-In traditional agriculture, farmers must regularly visit their farmland to measure various environmental parameters such as temperature, humidity, light intensity and soil moisture in order to grow the right crops on the right soil at the right time.Greenhouse cultivation, on the other hand, is a system in which a farmer grows crops in an ecological environment where all ecological parameters are adjusted according to the plant species. Greenhouse automation is a way for farmers to automatically monitor and control the greenhouse environment anytime, anywhere. In this article, the authors propose an automated greenhouse monitoring and control system that includes various sensors such as temperature sensors, moisture sensors, light sensors, and soil moisture sensors for harvesting.

Electron Orbit’s Shape for Hydrogen and Helium Atoms
Authors:- Refah Saad Alkhaldi

Abstract- This paper is a continuous work of some facts about the electrons in the first orbit of H and He atoms. Position of electron according to angle around the nucleus, the shapes of the first orbit, as well as the electron intensity from De Broglie equation are all illustrated.

A Review on Three Wheeler Electric Vehicle
Authors:- Pramod K N, Prashant D H, Akash Shetty, Karthik K, Abhishek B

Abstract- Electric vehicles are believed to be an effective solution for reducing greenhouse gas emissions. Despite extensive study on the attributes and characteristics of electric vehicles and their charging infrastructure design, the development and network modelling of electric vehicles are still evolving and limited. This article provides a comprehensive review of electric vehicle studies and identifies existing research gaps in the aspects of theories, modelling approaches, solution algorithms and applications.

Self-Driving Car: Autonomous Driving Using Lane Detection
Authors:- Mr. Mohd.Aafeen H Shaikh, Mr. Shivdatta D Bapat, Mr. Saifali S Rangrej, Prof. Mrs. S G Bavachkar

Abstract- Self-ruling Cars are the eventual fate of driving extravagance, a fantasy about sitting in a vehicle and giving your objective as an information and it takes you to your ideal spot. To make this little glimpse of heaven engineer and automakers from one side of the planet to the other have only one objective of their life, that is a completely settled Autonomous vehicle. Albeit this is as yet a fantasy however we have been very near accomplishing the last objective. This accompanies difficulties, challenges that come helpful while making something fantastic, and the Autonomous vehicle is no not exactly an outlandish game. It requires soaking up new innovations with the auto, make it work splendidly together, in light of the fact that wellbeing of the traveler will depend on oneself driving vehicle. Throughout the decade the Auto business has progressed fundamentally towards a future without a human driver. Specialists are right now attempting to beat the mechanical, political and social difficulties associated with making self-ruling vehicles standard. These vehicles should be protected, dependable and cost-proficient. Interfacing them and making coordination components could help accomplishing these objectives. This undertaking proposes a vehicle-to- everything (V2X) coordination convention for independent vehicles (AVCP: Autonomous Vehicle Coordination Protocol) and a testing climate where it will be assessed. The AVCP plans to fundamentally lessen travel time and increment security for self-governing vehicles by empowering them to trade detecting and directing data with one another and with side of the road units (RSUs).

Investigations on Various Concrete Properties by Replacement of Fine Aggregate with Stone (Quarry) Dust
Authors:- Y.Anand Babu, Asst. Prof. Modi Musalaiah, Asst. Prof. B.Srikanth

Abstract- The global consumption of natural sand is very high, due to the extensive use of concrete. In general, the demand of natural sand is quite high in developing countries to satisfy the rapid infrastructural growth, in this situation developing country like India facing shortage in good quality natural sand. Particularly in India, natural sand deposits are being depleted and causing serious threat to environment as well as the society. Increasing extraction of natural sand from river beds causing many problems, loosing water retaining sand strata, deepening of the river courses and causing bank slides, loss of vegetation on the bank of rivers, exposing the intake well of water supply schemes, disturbs the aquatic life as well as affecting agriculture due to lowering the underground water table etc are few examples. The study employed case study design of generation and utilization of quarry dust at chimakurthy quarry. The quarry dust was tested experimentally for technical viability in the production of quarry dust building blocks; an impact assessment was conducted and finally a cost benefit analysis was carried out to determine the commercial viability as well as social cost benefit of utilizing the quarry dust as a raw material in the manufacture of building blocks. All the experimental data shows that the addition of the industrial wastes improves the physical and mechanical properties. Here we will conclude that the strength should be increased at 25% of stone dust. So by this we will say that from 25% on wards we have to use stone dust. But it should not exceed to 50%.

Cad Modelling and Analysis of Axle Shaft of Rice Planting Machine
Authors:- Prof. A.V.Desai, Digambar S. Powar, Mr. Omkar B. Yadav, Rahul T. Patil, Rupesh R. Shinde, Swarup A. Kamble

Abstract- A rice transplanter is a specialized machine fitted with a transplanter mechanism (usually having some form of reciprocating motion) driven by the power from the live axle, in order to the transplant rice seedlings onto paddy field. Rice is a major food grain crop of world. Unlike upland row crops, cultivation of low land rice crop is a labour intensive process. In spite of the common belief of availability of surplus agricultural labour in India, there actually exists a scarcity of skilled agricultural workers during the peak transplanting seasons. If this operation is not done in time the yield goes down. In view of this, there is an urgent need to mechanize this operation. The rice translation process is generally manual which involves number of labour. The process of manual rice transplantation is not so efficient as compared to the mechanical rice transplantation. Machine transplanting using rice transplanter requires considerably less time and labour than manual transplanting. It increases the approximate area that a person can plant.

A Comparative Review of CPU Scheduling Algorithms
Authors:- Muskaan Pirani, Denish Ranpariya, Mihir Vaishnav

Abstract-Multiple programmes can run in memory at the same time, allowing for CPU and I/O overlap. The problem of selecting a process from the ready queue to be performed by the CPU is addressed by CPU scheduling. Because of the need to adjust and evaluate the operating system as well as assess the performance of actual applications, developing a CPU scheduling algorithm and understanding its effect is challenging and time consuming. Since the processor is such a valuable resource, CPU scheduling is critical for achieving the operating system (OS) design goals. The aim of CPU scheduling is to reduce average turnaround time and average waiting time so that as many processes as possible can run at any given time, maximising CPU utilisation. This paper aims to compile a list of the most common CPU scheduling algorithms that have been proposed so far. FCFS, SJF, SRTF, Round Robin, Priority scheduling, HRRN, and LJF are some of the algorithms we look at.

Factors Involved in the Assessment of Durability of Concrete
Authors:- Deepika Srivastava, Md. Tasleem, Ashraf Hussain

Abstract- In this study, the factors involved for accessing the durability of the concrete structures, now the day’s construction field has grown up with lots of advancement of techniques & technologies. We are making structures touching the height of the sky as well as achieved the success to build the structures beneath the ground. While constructing these structures, the durability of the structure is an important phenomenon that we have to keep in mind while adopting the construction method. We should have to be aware of the Structure’s durability or the life of the structure, some important parameters to be considered before its construction that the structure should be ecofriendly, economic & durable, So many researches were done on the durability of concrete structures, SEM testing is one of the methods to get any information about the deterioration stage in a particular structure as it provides us the information of pore structures of the concrete specimen in image form which is helpful for us to study the necessary details of structures durability.

IOT Based Industrial Automation Using Google Assistant
Authors:- Asst. Prof. Ms.G.Indhuja, A.Jaromepeter, R.Sushma, D.Kamali, N.Lavanya Sri

Abstract- The proposed project focussed with the rapid development of the field of industrial control, industrial control in network applications, intelligent and distributed monitoring system requirements are also rising, and based on SN (Sensor Network) of various application systems also appear in large numbers. The intention of SN is to integrate the sensed environment parameters with the traditional network by means of a large number of sensor nodes, and the intelligent environment monitoring can be realized through the convenience of network connectivity. And the application of SN based on Arduino Environmental is development platform has become the current hot spot, which benefits from its innate advantages in hardware open source, operation performance, reliability, volume, energy consumption, cost and scalability. The Voltage, Current and Environmental temperature monitoring system based on Arduino development platform, through the use of sensors, pyrotechnic detection sensors, gas detection sensors, the corresponding characteristics of the communication system parameters monitoring, through the network monitoring parameters are transmitted to the remote server timely processed (remote data recording, remote alarm and real-time control processing), can achieve the basic security protection of communication system, improve the state of the environment monitoring and management efficiency, in order to improve the maintenance level of communication system. The entire system is controlled through Google Assist to enhance the control operations.

Detection and Prevention of Wormhole Attack using the Trust-Based Routing System
Authors:- M. Tech. Scholar Rachna Pandey, Prof. Pradeep Tripathi

Abstract- Mobile Ad Hoc Network (MANET) is a rising spot of concentrate in the correspondence framework world. As the MANET is with without foundation, it is having dynamic nature of self-assertive system topology. The extent of this proposition is to do the investigation of wormhole attack and flooding attack set up its counteractive action system by applying it on responsive directing convention AODV, NS-2 organize test system is utilized for execution examination and reproduction. The extent of this postulation is to roll out improvements in the AODV steering convention by including a noxious node in the current AODV directing convention and in every one of the records identified with it. At that point to check the execution of system in view of a few parameters like PDR, throughput and End to end delay, TCP and UDP parcel examination and so on the outcome is being shown in NAM. A gathering of worm hole node effortlessly utilized against directing in mobile promotion sells systems. These sorts of attack are called communitarian attack. Two malevolent nodes are making a passage is called nodeholeattack. An assailant causes the clog in organize by producing an extreme measure of activity. The aggressor node always sends the gigantic amount of pointless information bundles into the system. This causes a tremendous clog of undesirable parcel into the system. Because of the hindering the information parcels, RREQ, RREP or RERR bundle send by the genuine node. To keep the wormhole, node opening, community-oriented wormhole and flooding attack, the counter measure which Trust esteem is figured on the premise of course ask for, course answer and information parcels. After count get put stock in values between 0 to 1. In the event that trust esteem is more prominent than 0.5 at that point marks node is solid and permit on a system generally piece. System execution of proposed convention trusted AODV steering convention is assessed. The outcome demonstrates execution change when contrasted with standard AODV convention.

Rumor Detection from Social Media
Authors:- Pragya Gaur, Vasu Verma, Vaibhav Bhardwaj, Utkarsh Kashyap

Abstract- We know that now a days the rumours around the world in every filed has become a major concern for everyone that we cannot neglect. Whether you are at home, college, work, or anywhere in the world and you came across something that is known to be a rumour going on around the city, state or country, you start developing that feeling of anxiety and desperation unless you are not clarified on the statement. In order to ensure the right or wrong we go through Internet and search across it to find more and more about it, but sometimes even if we try with multiple search through the google we are not given a clarity about the situation going on around. Hence to overcome this problem we have come up with an Idea of Rumour detection Web App. In this Web App we have designed an app which will give you the result on the basis of an algorithm which will provide you the most releveant content regarding the situation going on around with the exact clarity and verified resources that are available all over the globe.

Design & Fabrication of Axial Noodle Making Machine
Authors:- Prof. V. S. Nikam, Mr. Nilesh Bule, Mr. Pratik Konde, Mr. Nikhil Ghongade, Mr. Zuber Shaikh

Abstract- Noodles are of the staple food consumed in many Asian countries .Instant noodles have become internationally recognized food and word wide consumption is one rise. Whenever, we think about noodles we remember our part experience where our mother making had been noodle (savage) by their hand in long strips and strings. Now in modern era we have proposed automation and giving relief to those hand practice making noodle by taking lot of efforts .we have “Design and Fabrication of Axial noodle making machine” this machine will help us to makes noodles and its similar product like pasta ,akki savage with different diameter with greater quantity and accuracy with the underestimation of labor cost, space, time, effort and cotton of wastage. The proposed Noodles making machine will forced out work through the well-shaped dice in the axial direction by the extruder which held and rotates in barrel or cylinder. Here the work will produce parallel to base of machine hence its named “Axial Noodle making machine”. The working of this similar to the squeezing the toothpaste from paste pack. On the bed rock on this principle the dough will be squeezed chronologically by the extruder which rotates with uniform speed. This whole mechanism will be drive by the heavy duty D.C. Motor. The main feature of the proposed model is to start drawing work by feeding 400gm of dough which is itself a proof of its compactness.

Demand Side Management on Microgrids
Authors:-Dr. R.M. Holmukhe, Anjali, Sagar Saroj, Sanju Raj

Abstract- Energy demand and expectations of high supply reliability is surging up on a daily basis. Due to this, renewable resources are in great demand which has escalated the use of Microgrids extensively . In a Microgrid environment, economic operation signifies economic scheduling of power generation as well as scheduling of the load. Not only reducing the cost of generation but also reducing the inconvenience caused due to shifting of loads is a multi-objective optimization problem.Thus, Demand Side Management can prove to be useful for such problems as the primary focus of this work is to optimize the load curves, cut down the tariff cost and provide 24×7 electricity to each and every corner. Patna medical college Hostel is considered as residential Microgrid, Balewadi feeder as commercial Microgrid and Yamuna Nagar feeder as industrial Microgrid on which Demand Side Management programs are implemented to enhance the performance and lower the cost of investment. The methodology used here will be based on four terms: California Standard Test, DSM indices, Flowchart for DSM Analysis. These are used to design and evaluate the technical feasibility and economic viability of off-grid and on-grid Microgrids.

Gesture Recognition for User Interaction
Authors:- Srija Nagabhyru, Anshul Joshi

Abstract- With the massive influx and advancement of technologies there is a scope for us to interact with our systems in the best possible way. One such technology would be Gesture based Human Computer Interaction. So our system makes use of HCI which would help us interact without touching the screen. It is a well known fact that two dimensional user interfaces are everywhere, but with the increasing popularity of Extended Reality(XR) we require a better, more sophisticated three dimensional user interface.

A Novel Wavy-Tape Insert Configuration for Pipe Heat Transfer Augmentation
Authors:- M.Tech. Scholar Yogesh Chouhan, Prof. Rohit Kumar Choudhary

Abstract- Various techniques have been tested on heat transfer enhancement to upgrade the involving equipment, mainly in thermal transport devices. These techniques unveiled significant effects when utilized in heat exchangers. One of the most essential techniques used is the passive heat transfer technique. Corrugations represent a passive technique. In addition, it provides effective heat transfer enhancement because it combined the features of extended surfaces, turbulators and artificial roughness.The effect of wavy strip turbulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied. The configuration, gain in heat transfer augmentation, cost in pressure loss, generated swirl flow character, heat transfer enhancement mechanism, optimal geometric parameters and overall thermal hydraulic performance of wavy-tape are successively expounded in this work.

A Review on Fundamentals of Engineered Cementitious Composite (Bendable Concrete)
Authors:-PG Scholar Modugu Naveen Kumar, Asst. Prof. K.Sampath Kumar

Abstract- This paper provides an overview of the various properties of engineered cementitious composites (ECCs) that are used in a variety of structural applications. Different properties of engineered cementitious composites are investigated in this paper, including tensile, flexural, compressive, tensile strain capacity, shear strength, toughness, fibre matrix interaction, drying shrinkage, water permeability, sorptivity, cracking, impact and frost resistance, and beam-column connection behavior. According to the study, ECC has a much greater strain capacity than conventional concrete, as well as a higher energy absorption capacity, defection capacity, and impact resistance, as well as a crack width of less than 100 m. The use of mineral admixtures improves tensile strain capacity with multiple fine cracks, while compressive strength and carbon dioxide emissions decrease, according to the findings of various studies. Fiber hybridization can increase ECC’s strain hardening with various fine cracking, flexural and toughness properties, impact resistance, and crack width resistance.

Automatic Number Plate Recognition System
Authors:-Asst. Prof. S. A. Shinde, Miss. Shital S. Hadimani, Miss. Sayali S. Jamdade, Miss. Pragati R. Bhise

Abstract- Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from the moving vehicle because of the speed of the vehicle. Therefore, there is a need to develop Automatic Number Plate Recognition (ANPR) system as a one of the solutions to this problem. Automatic Number Plate Recognition (ANPR) is an image processing technology which uses number (license) plate to identify the vehicle. The objective is to design an efficient automatic authorized vehicle identification system by using the vehicle number plate. The developed system first detects the vehicle and then captures the vehicle image. Vehicle number plate region is extracted using the image segmentation in an image. Optical character recognition technique is used for the character recognition. The resulting data is then used to compare with the records on a database so as to come up with the specific information like the vehicle’s owner, place of registration, address, etc.

Improved Security for Online Exams Using Group Cryptography
Authors:- K. Usha Rani, Ch. Varsha, B. Priyanka, P. Neeharika, Associate Prof. Dr. S.Venkatramulu

Abstract- Online examination system is a internet-based system. Exam is conducted using the internet. The basic aim is to conduct the online exams more securely. For high security we used group based cryptography. Mail authentication is provided so that user gets username and password. In the database the user credentials and user answers are stored in the form of encrypted format. Only admin have the access to the database. The encrypted form of data in the database cannot hacked by the hacker.

Performance Optimization of Absorption Refrigeration Systems Using Box-Behnken Design
Authors:- M.Tech. Scholar Roushan Kumar Shashi, Asst. Prof. Neetesh Kumar Gupta

Abstract- Nonetheless, a detailed study analyzing all these parameters and determining their contribution ratios on the system’s performance with a statistical approach has not been encountered in the literature. For this reason, the purpose of this study is to examine the parameters that present the most significant effect on the ARS’s COP values and determine the importance order of these parameters by utilizing Taguchi and ANOVA methods. Moreover, the best and worst working conditions are determined by different statistical analysis methods and the results are compared.

A Review on Implementation of Inventory Management Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Priyank Jain, Prof. Trilok Mishra

Abstract- To achieve optimum inventory replenishment is significantly difficult due inherent uncertainties in demands and supply which resulting in loss of sales or keeping excessive inventories. An unkempt inventory can take up to one-third of an organization’s annual investment. Therefore, in order to compete with invariably erratic demands, it is not only challenging to develop an intelligent system to maintain and control an optimum level of inventory but has also become mandatory.

Automobile Black Box System for Accident and Crime Analysis
Authors:- Narendra Tallapaneni, Gudapati Krishna Hemanth, K. Venkatesh

Abstract- Automobiles and computing technologies are creating a new level of data services in vehicles. The Automobile Black Box has functions similar to an airplane black box. It is used to analyze the cause of vehicular accidents and prevent the loss of life and property arising from vehicle accidents. This paper proposes a prototype of an Automobile Black Box System that can be installed into vehicles. The system aims to achieve accident analysis by objectively tracking what occurs in vehicles. The system also involves enhancement of security by preventing tampering of the Black Box data. In addition, the Black Box sends an alert message to a pre-stored mobile number via Short Message Service (SMS) in the case of occurrence of an accident.

Evecurate – A Smart Event Management App Using Flutter and Firebase
Authors:- HOD. Dr R Juliana, Naveen Kumar VG, Richard G, Shivadarshini P

Abstract- Event management is a process that entails a great deal of communication, careful planning, scheduling, advertising, and audience outreach. The core aim of our project is to apply modern technologies and develop a Mobile application to ease out the complex process of traditional event management approaches and thus transforming it into a smart event management system. In specific, our project focuses on the Events conducted by many Colleges and universities which follows the traditional event management approaches. Every time an event is conducted in a college/ university there are more things to be done like planning of events, keeping track of the plan, following a strict budget, share out crystal clear details of the event for the students, sharing of invitations, conduct registration, advertise among other colleges and even sometimes there will be lack of live interaction with the audience. The Mobile Application “Evecurate” developed wraps all the essential services for planning and conducting the events in the colleges and Universities. The application includes QR technology which generates QR code to the event audience which is used for easy Check-in process that is during the registration process. The QR code technology is also used for the Event audience interaction in which audience can provide reviews for the events conducted and can take part in the polls or Q/A session that can be conducted using the application. The application constitutes an event sharing module where the event organizer can enter the details of the event and share them on the application itself. From the project the mobile application “Evecurate” will reduce all the difficulties in the traditional event management approach and pave way for an alternate system that is the smart event management.

A Experimental Investigation on Performance of Concrete with Partial Replacement of Coarse Aggregate and Fine Aggregate with EPS and Iron Slag
Authors:- K .Mohan Sai, B.Tejaswi, D.Manaswi, Ch. Lakshmi Narayana, G.Kumar Sai, M.Heanth Kumar, P.S.V Anudeep, Associate Prof. Ch.Veerottham Kumar

Abstract- A rice transplanter is a specialized machine fitted with a transplanter mechanism (usually having some form of reciprocating motion) driven by the power from the live axle, in order to the transplant rice seedlings onto paddy field. Rice is a major food grain crop of world. Unlike upland row crops, cultivation of low land rice crop is a labour intensive process. In spite of the common belief of availability of surplus agricultural labour in India, there actually exists a scarcity of skilled agricultural workers during the peak transplanting seasons. If this operation is not done in time the yield goes down. In view of this, there is an urgent need to mechanize this operation. The rice translation process is generally manual which involves number of labour. The process of manual rice transplantation is not so efficient as compared to the mechanical rice transplantation. Machine transplanting using rice transplanter requires considerably less time and labour than manual transplanting. It increases the approximate area that a person can plant.

Disease Prediction Using Machine Learning Algorithms
Authors:-Pranav Kumar, Subash Kumar Shah

Abstract- Health care has become a major problem in the world. Disease cases are increasing rapidly among humans, especially among the younger generation. The healthcare sector is one of the leading research areas in the current context with the rapid development of technology and data. The latest technological advances allow for the automatic use of machine learning techniques. These machine learning methods can be used to diagnose ‘or predict diseases’ in advance. The healthcare industry produces a vast amount of information in its infancy in an unstructured format that a computer cannot understand. Thanks to the development of modern technology, the healthcare industry also manages information in a systematic way that can be understood through machine learning technology. In this case if we use machine learning technology to predict disease, then there is a chance of getting the disease in the early stages and informing the patient that they have received the best treatment to treat the disease. This paper uses seven controlled algorithms namely KNN, Decision Tree, Random Forest, Naive bayes to predict disease. In this paper among those seven algorithms, Neural Networks provided the best accuracy as 98.30% and this program provides results to test model accuracy in predicting diseases. The accuracy of the algorithm is determined by the performance of the data provided. The expected outcome and scope of this project is that if disease is not predicted rather than given in advance treatment that can be given to patients which can reduce health risks and save patients’ lives and the cost of accessing treatment can be reduced to a minimum.

Design & Implementation of IOT Based Firefighting System to Protecting Farm
Authors:-Ms. Aditi A. Kulkarni, Ms. Sweety A. Nargunde, Ms. Ruksana A. Mulla, Ms. Karishma D. Kate, Prof . K. K. Nikam

Abstract-Agriculture plays a crucial role in the economy of developing countries, and provides the main source of food, income and employment to their rural populations.Farmers hold the backbone of the agricultural system. Agriculture is the world’s leading source of food items.In summer season many of farms are dry and plants also dry there is lots of probability to occurring farm fire in farm due to man-made like, short circuit in electricity distribution line, firing stubble by humans.Because of that action farms are affected badly. This can make affect on further cultivation season. We are building a smart system which is powered by IOT based which will protect our farm from fire. When fire is occurs in surrounding farms then our system will sense the fire and start water sprinklers to put out the fire and share this data on IOT to know the status of farm to farmer.We also doing automation using IOT based irrigation system. We achieving this controlling system world-wide by using IOT based technology.

Obstacle Detection using LIDAR
Authors:- Sangam Kamble, Prof. Dr. Shilpa Kharche

Abstract- For Autonomous Vehicle, Obstacle Detection is one of the primary tasks. A number of sensor systems are available for obstacle detection. One kind of such sensor system is LIDAR (Light Detection and Ranging) system known for its high accuracy in measuring distances. LIDAR is commonly used to make high-resolution 2D/3D map of the environment. This project uses RPLIDAR A1 Sensor is mounted on the top of the vehicle. RPLIDAR A1 Sensor is 360 degree 2D Laser Scanner (LIDAR) Sensor detects the obstacles within 6 meter range. Point cloud output from the RPLIDAR sensor provides the necessary data for robot software to determine where obstacles exist in the environment and where the robot is located related to those obstacles. Hector_slam contains ROS (Robot Operating System) packages related to performing real-time SLAM (Simultaneous Localization and Mapping). In other words using information from RPLIDAR A1, hector_slam built a map of environment and show detected obstacles and where vehicle is located related to the map. Also, this vehicle uses two Laser Sensors for its movements. Laser sensors are attached in front of the vehicle. One is on Left side and another is on Right side of the vehicle. Laser Sensors detect obstacles and they avoid collision with the obstacles.

Fine-Grained Facial Expression Recognition using Machine Learning
Authors:- Prof. Pallavi Patil, Kalyani Limkar, Samruddhi Waghmare, Siddhi Bokil, Bhakti Vispute

Abstract- A face emotion detection system that cans analyses basic human facial expressions is being developed in this project. The proposed method analyses a person’s face to determine his or her mood, and then plays an audio file that is related to that person’s emotion based on the information obtained from the face. The system will first recognize a human face and then proceed to the next step in the process, and so on. The process of face detection is carried out. Following that, the technique of feature extraction is used to recognize the human face.. This method aids in the recognition of the human’s emotion by utilizing features of the face image. Those feature points are discovered through the feature extraction of the lip, mouth, and eyes, as well as the brow. If the input face matches exactly to the face in the emotions base dataset, we can determine the exact emotion of the human and play the audio file that corresponds to the exact emotion of the human. In addition, we recommend music based on the mood that has been detected. Recognition under a variety of environmental conditions can be achieved through training on a small number of distinguishing characteristics of different faces. A straightforward, efficient, and accurate approach is proposed here. In the field of recognition and detection, systems play a critical role in achieving success.

Development of Economical and Environment Friendly Landfill Liners for Tier II Cities
Authors:-Sachiket Mungarawadi

Abstract- Rapid industrialization and population explosion in India has led to the migration of people from villages to cities, which generate thousands of tonnes of Municipal Solid Waste (MSW) daily. Municipal solid waste management has become a serious problem because of rapid urbanization and improved economic activities. The insufficient collection and inappropriate disposal of solid wastes represent a source of water, land and air pollution and pose risks to human health and environment. Municipal Solid Waste (MSW) is a complex refuse consisting of various materials with different properties.Leachate resulting from this is a hazardous pollutant to the soil and groundwater underlying. Entering of leachate and heavy metals into the soil leads to the contamination of both soil and groundwater. The fill material, decayed organic soils and soils having continuous contact with sanitary fill environment alter the desired geotechnical properties as well as chemical properties. In an engineered landfill, bottom liner and top cover play an important role in controlling the pollution of groundwater, air and soil. Hence utmost care is required in designing and constructing the liner and cover. But cost of the liner/cover material used for the construction of the liner and covers govern the design philosophy of the liner and cover for waste impoundments, as material required is of very huge quantity. In order to better utilize the locally available materials as landfill liners and covers in countries like India, to make the landfill construction cheaper, a systematic study was needed in the form of geotechnical and geoenvironmental characterization of these locally available soils and other materials.Therefore, the present study is aimed to design eco-friendly and economical single-liner system by replacing some percentages of bentonite clay with with baggase ash or straw fibers to avoid entering of harmful liquids into groundwater. As a part of the present investigation, Karnataka state, in India was chosen and tier II cities are identified across the Karnataka state. In all tier II cities, huballi city is selected for our study. The locally available Halumannu is collected from Unakal village, Hubballi. Specific gravity, Natural moisture content, Consistency limits, Sieve analysis, Hydrometer, Compaction, Consolidation and Unconfined compressive strength tests are conducted on collected soil sample. From the results of the extensive experimental investigations Halumannu is silty soil with low degree of expansion. And the strength of soil is less and it can be increased by adding suitable soil stabilizers like cement, lime.

Multifunctional Wireless Hand Sanitisation Based Service Robot Cart
Authors:- Saurabh M. Jambhle, Shubham R. Bawane, Saurabh Chakole

Abstract-There ie new broad health crisis which is known to all of us that is novel coronavirus covid 19. It has spread to world wide and many people get infected by it. The virus is get spread by getting physical contact, by touching and by gathering at social places. To stop the spreading of corona virus some methods is mentioned by the “WORLD HEALTH ORGANISATION” i.e WHO is to- wear a mask, social distancing, and hand sanitization, work from home, avoide gathering at social places and to avoide croud places. This is because of virus get spread by touching a object at local places and due to physical contact with others. We have seen that at public places like shopping malls, hospitals, railway stations, bus stops, petrol pump, utility stores etc there is still gathering of people and croud is there. Because all such places providing essensial services which has to be permitted by govt. And at such places there are chances of get contact with the covid +ve patient. At such places there is no social distancing and hand sanitization is there. One person at a time at such places can not handle the croud and can not be able to give instruction to people. In order to treat and reduce the spread of corona virus circumstances, to maintain a social distancing and constant hand sanitisation and disinfection of our hand at public places become a neccessity. So the aim of this study is to design, develop and fabricate a smart contactless hand sanitizer dispensing system which is mounted on wireless bluetooth control service robot cart. These cart is develop for making contactless human to human interaction in public places where it can controlled by smartphone and having inbuilt contactless sensor based hand sanitisation system. The presented system has ability to work contactlessly to interact with patient in hospitals, to provide services at various industries and trolly provider in shopping mall, railway station for automatic hand sanitisation and at various public places as hospatility service provider.There ie new broad health crisis which is known to all of us that is novel coronavirus covid 19. It has spread to world wide and many people get infected by it. The virus is get spread by getting physical contact, by touching and by gathering at social places. To stop the spreading of corona virus some methods is mentioned by the “WORLD HEALTH ORGANISATION” i.e WHO is to- wear a mask, social distancing, and hand sanitization, work from home, avoide gathering at social places and to avoide croud places. This is because of virus get spread by touching a object at local places and due to physical contact with others. We have seen that at public places like shopping malls, hospitals, railway stations, bus stops, petrol pump, utility stores etc there is still gathering of people and croud is there. Because all such places providing essensial services which has to be permitted by govt. And at such places there are chances of get contact with the covid +ve patient. At such places there is no social distancing and hand sanitization is there. One person at a time at such places can not handle the croud and can not be able to give instruction to people. In order to treat and reduce the spread of corona virus circumstances, to maintain a social distancing and constant hand sanitisation and disinfection of our hand at public places become a neccessity. So the aim of this study is to design, develop and fabricate a smart contactless hand sanitizer dispensing system which is mounted on wireless bluetooth control service robot cart. These cart is develop for making contactless human to human interaction in public places where it can controlled by smartphone and having inbuilt contactless sensor based hand sanitisation system. The presented system has ability to work contactlessly to interact with patient in hospitals, to provide services at various industries and trolly provider in shopping mall, railway station for automatic hand sanitisation and at various public places as hospatility service provider.

A Review on Conformal Cooling of an Injection Moulded Part through Mouldx 3D
Authors:- M.Tech. Scholar Snehil Kumar Tripathi, Prof. Ritu Srivastva

Abstract- Cooling time is a key element in. Typically, it is used to determine the total cycle time. As a result, in injection moulding, reducing cooling time can assist minimise production costs while also shortening the manufacturing process time. significant factors in reducing cooling time is the design of the cooling system. The cooling system architecture is limited in traditional moulding manufacturing methods. The distance between cooling channels and cavity may vary across the component for cavities with higher curvature. As a result of the low heat buildup, the product quality is poor. The cooling channels can be closer to the exterior of the depression by using traditional technologies 3D printing than by using traditional procedures. This test makes use of a real three-dimensional test system to predict the infusion forming process and item twisting.

Glass Identification Using Extreme Gradient Boosting Algorithm
Authors:- Pulkit Dhingra

Abstract- The Discovery of important information from criminal evidence is essential to make an effective criminological investigation. It is necessary to analyze this data of evidence and get answers that will help in the study. Machine learning techniques provide a bundle of state-of-the-art algorithms to analyze the data to get results efficiently. Extreme Gradient Boosting (XG-Boost) is one of the most successful machine learning algorithms used in classification problems. This paper applies the XG-Boost technique to help criminological investigators identifying the type of glass gathered as evidence while undergoing an investigation. The method can also be beneficial for other use cases that include the segregation of glass based on the materials incorporated in it.

Face Recognition Based Media Player
Authors:- Abhishek Rathi, Siddharth Ahluwalia, Suryansh Rana, Asst. Prof. Mrs. Vaishali Malik

Abstract- In this project, we aim to provide a high-level media player which plays and pauses the audio by recognizing the user’s face if the user isn’t near to the machine, it quickly stops the audio. We are attempting to add a component of controlling different highlights of the media player.

Smart Maintains and Monitoring of Agricultural Field
Authors:- M.Tech. Scholar Hemanth Kumar D T, Associate Ravi Kumar M N

Abstract- The proposed system smart maintenance and monitoring of agriculture Field the using the modern technology like in an Internet of things (IoT), mechanic learning (ML), artificial intelligence (AI).It solves the major problem of water wastage in irrigation system, The main approach of our system is to solve the time money energy of a former for smart control of water management. A sensor network proposed by our project deals with basic parameters of the agriculture Field or PH value of soil moisture temperature and humidity of the agriculture Field. In our system we proposed camera for an agricultural field to monitoring the agriculture Field, the data are used to analyze the status of crop cultivation, Manual fencing as some default the thieves over come to field the fencing are now electrical fencing that can harm the people and animals which have an approach to death by current, the smart fencing by laser or infra red rays are used to overcome this difficulty in an intruder passed through Lazar the sensor camera instantly capture the image of that field and send this Image to the respective mail address.

Secure Data Transmission Using Image Steganography- A LabVIEW Approach
Authors:- PG Scholar I. C. Narasimha, Associate Prof. D. Anuradha, Prof. Dr. G. Lakshmi Narayana, Associate Prof. S. Mohan Das

Abstract- Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like image, audio, video. image Steganography is a technique used to transmit hidden information by modifying an image signal in to imperceptible manner. In this proposed method, secret message in form of image or text is embedded within another original image. In the transmitter end the output will be similar to the original with secret message embedded inside. The hacker will be blinded by the transmitted signal. At the receiver end the original message can be retrieved without any loss. The entire proposed system is simulated and their corresponding waveforms prove the effectiveness of this method.

Design and Development of Multipurpose Agricultural Machine
Authors:- Dhairyasheel Patil, Ruturaj Khot, Saikrishn Gajula, Tamajid Shaikh, Asst. Prof. Hrishikesh Jadhav

Abstract- The scope of this project is to design and development of a portable multipurpose agricultural machine; focuses on shredding of sugarcane leavings, coconut leaves, Areca leaves and paddy straw, later this chopped powder is a source to prepare the vermin compost. The task started with the accumulation of information and data, through survey in agricultural and literature studies. Existing models are hand wheel operated, vertical and horizontal electric chopping shredder is prone to have problems like large space requirement, uneven cutting, and manpower requirement. Hence traditional methods are not sufficient and satisfactory for chopping the crop residues. Considering the user’s needs and buying capacity a prototype was designed and constructed. The proposed prototype is so designed to guide materials in different compartments by power driven transmission through chain, belt, pulley and spur gear attachment to have a chopped and powder materials. The overall operation of the proposed shredder, running at a cutting speed of 700 RPM nearly has a cutting efficiency up to 90%.

Development and Analysis of Noise Map of Pune Region Using Arc-GIS
Authors:- Rohan Raut, Sajal Sinha, Swaraj Meshram, Chaitanya Ingale, Pro. Shree Kambale

Abstract-We present our analysis report on Noise Pollution Level in different areas of Pune region and ways to minimize the problem as much we can. In this paper, we have analyzed the data which we collected from various online websites related to Noise Pollution survey in different regions of Pune and used that data to identify possible trends and factors. We used normal distribution or Gaussian distribution to get the values and those values were used to plot the maps and graphs. Furthermore, various techniques in order to minimize noise pollution have been discussed.

Indian Currency Recognition System
Authors:- Dr. Dayanand Jamkhandikar, Kaveri, Sahana, Sudharani, V Pooja shree

Abstract- Counterfeit notes are one of the biggest problem occurring in cash transactions. For country like India, it is becoming big hurdle. Because of the advances in printing, scanning technologies it is easily possible for a person to print fake notes with use of latest hardware tools. Detecting fake notes manually becomes time-consuming and untidy process hence there is need of automation techniques with which currency recognition process can be efficiently done. This work Extraction of different features in fake and real currency notes and through comparing with each other we can able to differentiate the fake note from the real note. In this approach, feature extracted dataset is used and for detection of the genuineness currency. Security feature of Indian currency note available on front and back side of the notes are used as features. This work uses ORB (Oriented FAST and Rotated BRIEF) and Brute-Force matcher approach to extract the feature of currency. The identification mark, optical variable ink, and extracted currency features decides the currency recognition. The features extraction is performed on the image of the currency and it is compared with the features of genuine currency. The desired result will indicate whether the note is genuine or fake.

Design and Development of Chassis, Braking And Steering System of Pedal
Assisted Electric Car

Authors:- Prathmesh Khaladkar, Varad Joshi, Prathamesh Joshi, Indrajit Shinde, Sourabh Patil, Asst. Prof. Hrishikesh Jadhav

Abstract- During the revolution for the eco-friendly technologies bicycles were the most depended modes of transportation, along with this the consideration of the increase in fuel price and the environmental factors. We must admit that it is far better to use a bicycle over a motor vehicle for short distance travelling. Imagine how useful would the bicycle be if even the small effort applied by man for climbing slopes and riding on rough terrain is reduced in it. “The e-Bike”. Our idea of implementation of the project was mainly based towards providing a tribute to the “GREEN ENERGY”.

Utilization of Coconut Fiber and Marble Slurry in Concrete
Authors:- Ajaz Ahmad Mallah , Basit Idrees Tak , Nasir Manzoor ,Asst. Prof. Mahendra Kumar

Abstract- Concrete is a composite material made out of fine and coarse total reinforced along with liquid concrete that solidifies over the long run. Concrete is most ordinarily utilized man made material on the planet. It is form capable, versatile, moderately fireproof, for the most part accessible, and reasonable. Unfortunately, the production of Portland cement releases large amounts of carbon dioxide, into the atmosphere, which causes enormous impact on the environment. Worldwide, the cement industry alone is estimated to be responsible for about 7% of all CO2 generated. 1.25 tones of co2 is emitted for production of 1 tone cement. Simultaneously enormous measure of characteristic assets are needed to deliver huge loads of cement each year which causes over misuse of normal assets. Consequently, the development business is constrained to search for other financial and supportable substitutes.

Land Use Change Detection Using Remote Sensing Technology
Authors:- Anshuman Kumar Yadav, Deepika Yadav, Ishant Choudhary, Mini Singh, Mr. Yogendra Sharma

Abstract- Land use land cover of any areas highly dynamic in nature and is highly prone to ongoing socio-economic and demographic changes in spatial perspective in this context the role of urbanization and consequent urban development in a fast urbanization country like India is crucial in bringing about rapid changes in rate of conversion of natural landscape into built-up landscape which finally is leading to a number of environmental problems. Therefore, an effort has been made in this paper to examine the land use land cover change of the district Gautam Budh Nagar, Uttar Pradesh, India over two different time periods of 2011 and 2021 in response to ongoing urbanization process and its impact on natural vegetation cover. For this purpose, the present study has identified the role of geospatial techniques to examine the change detected in land use land cover and associated changes in natural environments. The paper is based on remote sensing data of LANDSAT 8 for analyzing the LULC and its differential impacts on environment due to urbanization in Gautam Budh Nagar, Uttar Pradesh, India. Supervised classification of all the satellite images have been done to show various land use type on the study area.

Artificial Intelligence Powered Medical Expert
Authors:- Sagar Mallapur, Ravishankara K, Tejprakash C V

Abstract- Artificial Intelligence (AI) predictive techniques enables auto diagnosis and reduces detection errors compared to exclusive human expertise. Disease diagnosis is the identification of an health issue, disease, disorder, or other condition that a person may have. The study considered most frequently used databases, in which We further discuss various diseases along with corresponding techniques of AI, Machine Learning, and Natural Language Processing. Expert System using Artificial Intelligence interacts with the patients with the help of the Natural Language Processing (NLP) and takes the required information or data regarding the disease. Then calculates the possible outputs or diseases and their root causes and says those predictions back to the patient. . Finally, the paper also provides some avenues for future research on AI-based diagnostics systems based on a set of open problems and challenges.

Patient Health Monitoring System Using IoT
Authors:- Prof. U. P. Shinde, Asst. Prof. Anil B. Patil, Mr. Ajay R. Gaikwad , Asst. Prof. Umesh J. Tupe

Abstract- This paper depicts a method for using IoT to monitor a patient’s body 24 hours a day, seven days a week. Patient monitoring systems are becoming increasingly popular among researchers and patient guardians these days. Caregiving duties are increasing as the older population grows. As a result, patient health monitoring systems are becoming increasingly popular. The monitoring of patients is the basis for this paper. We created a patient monitoring device that is both dependable and energy efficient. It has the capability of sending real-time patient parameters. It allows clinicians to track the patient’s health parameters in real time. The proposed federal system continuously monitors the patient’s health utilizing several sensors attached to the Arduino board. The data is then sent to the server using the Arduino Ethernet shield. An alarm is sent to the doctor via an Android application loaded on the doctor’s smartphone if any of the parameter values exceed the specified threshold.

Optimal Design of Water Plumbing System in Multistoreyed Building
Authors:- Alina Nazim, Aman Yadav, Piyush Pandey

Abstract- Multistoreyed buildings are inevitable in today’s modern living. For plumbing purposes, the term “multi-storey” is applied to buildings that are too tall to be supplied throughout by the normal pressure in public water mains. Water main supply pressure of 8-12 meter (25-40 feet) can supply a typical two-storey building, but higher buildings may need pressure booster systems. The main aim of the study is to develop optimization model for designing down feed piping system in multistoreyed building by minimizing the cost of piping. The specific objectives of this study are: To develop linear programming-based methodology for the design of water plumbing system in multistoreyed building. To demonstrate the applicability of the developed optimal design method for example problem. To compare the performance of the developed optimal design method with traditional method of design.

IoT Based Smart Mirror
Authors:- Himakanksha Singh, Mayank Gupta, Kunal Khatri, Khushboo Shrivastav, Rabia Akhtar, Kamil Khan

Abstract- Smartamirrors are thought to be the way of the future. It’s a community of a connected world where we may check the news, temperature, weather, and other information while grooming ourselves infront of the mirror every morning. As a result, in suggested system, these quiet mirrors enable for internet news to be received and shown on the mirror screen. Additionally, it shows the present temperature, time, and schedule. As a result, system combines a Raspberry Pi 3 CPU with display for viewing the information, IOT-based electronics, and a temperature sensor. We used carefully modelled panels to construct the exterior frame. The outside frame is made from a perfectly sculpted panel. The system is then encased in customised glass with a rear frame. The mirror’s frame cavity now has precisely positioned amounts for the display housing to be installed. This is required in order to obtain the deliberate result.

Financial Instruments Fraud Detection Using Machine Learning
Authors:-Dr. Priti. Subramanium, Bhusawal Evangel Denis Rodrigues

Abstract- The rapid growth in industries mainly in the e-commerce sector has led to massive use of credit cards for online purchases and consequent surge in the fraud related to it which makes it necessary for banks to keep updating their fraud detection methods. Machine learning approaches are mostly being used to analyze and detect the increasing serious problem of credit card fraud. For discovering these fraud transactions banks make use of various machine learning methodologies. The performance of fraud detection in credit card transactions greatly depends upon the sampling approaches being carried out on the data-sets, selection of variables and detection techniques used in finding out the unauthorized activities. In this project the methods that have been used are logistic regression, neural networks, k-nearest neighbor are used for credit card fraud detection. I have also done oversampling to balance the data set. These techniques are applied on the dataset and output is generated .The performance of the techniques is evaluated for different variables based on sensitivity, accuracy and error rate.

Review on Electrical Transmission Technology
Authors:- B.Tech. Scholar Shivam

Abstract- I have put all the content in this research paper in such a way that after reading it all the doubt clear related to the electrical transmission technology. I have tried to give importance to most wireless transmission system in this particular system. Moreover, in this research paper the process of improving the power factor of the transmission line and I have also tried to find out how to transport electricity from one place to another by wire.

Design and Development of Regenerative Braking System
Authors:- Pranav R. Khot, Shubham V. Sonawane, Manish A. Atyalkar, Girdhar S. Gavali, Vaibhavraj S. Desai, Prof. Dr. Anantkumar J. Gujar

Abstract-The brakes are commonly use friction between two surfaces pressed together to convert the kinetic energy of the moving object into heat, though other methods of energy conversion may be employed as all the energy here is being distributed in the form of heat. Regenerative braking converts much of the energy to electrical energy, which may be stored for later use. We are also going to make a working model of regenerative braking to illustrate the process of conversion of energy from one form to another. Regenerative braking converts a fraction amount of total kinetic energy into mechanical or electrical energy but with further study and research in near future it can play a vital role in saving the non-renewable sources of energy.

Electronic Differential System Control Strategy for Electric Vehicles
Authors:- Prashant Vinayak Kadam, Prof. Nilesh Alone

Abstract- This paper presents a control strategy that is applied in turning control for decentralizedelectric vehicles known as the electronic differential system. The conventional mechanical differentialhas drawbacks, such as bulkiness and slow response. The electric system response is not only tentimes faster than its mechanical counterpart, but its accurate control even reduces the loss of powerfrom the motor to the wheel. Through the turning radius from the steering angle command thatthe driver gives, the controller can distribute torque to each wheel. After controlling each wheel’srotation, the vehicle can turn in neutral steering. The results show that this strategy can be effectivelyemployed on urban roads.

Physical, Chemical and Morphology Characteristics of the Malaysian Coconut Shell Powders (CSP)
Authors:- Hussin N., Ngalim A., Govindasamy S.A., Wan Ali W.K.A,
Othman Z., Zainol R., Abd Rahman Z., Abu Samah. A.H., Md. Radzi M.F., Ibrahim B.H, Ahmad@Ramli A.A., Md. Zailani N. , Osman A.G., Mohd Nawi M.R.

Abstract- Coconut shell (CS) raw materials used in this project were obtained from our previous by-products of copra processing. The methodologies involved are (i). Collection of CS materials, cleaned, air dried and kept in a proper container prior to production of coconut shell powder (CSP). CSP is a potential industry material and it has been reported by several industries as natural raw materials for production of repellent fillers, adhesives, composites and other high value added of non-food products. In this research, CS was further processed into powder form (CSP) by several steps of processing that will be discussed further in this finding; and the second methodology – (ii). A detailed evaluation of CSP was conducted for its chemical and physical properties. These analyses covered the determinations of: i. Color profiles; ii. Bulk density; iii. Screening on the morphology of CSP using a Scanning electron microscope (SEM); iv. Evaluation of fiber characterizations and v. Measurement of oil residual in the CSP. The aims of this research are to produce specialty CSP materials, identified the physical and chemical characteristics of the CSP; and highlighted CSP as high potential value-added products for non-food uses as an extra income for coconut farmers and related industries.

New Customer Acquisition in Retail Industry
Authors:- Asst. Prof. Dr. Anuradha Yadav, Research Scholar Noor Mohammed Faraz

Abstract- The Indian retail market is rising and so is the challenge to attract new customers has also transformed into new ways. A customer has unlimited retail options to look for his/her desired product and make the purchase decision. Getting a new customer or a potential buyer is certainly to enhance the profitability. Consequently, there is need to understand the efforts employed by the retailer to acquire new customer. This manuscript was written with purpose to understand retailer’s efforts toward new customer acquisition through a secondary data review of past research work. Based on the review of various variable have been identified to determine the perception of a retailer towards new customer acquisition. The impact of these concepts on new customer acquisition and customer satisfaction needs further deliberation and research. The study proposes a model that would through an empirical deliberation find the gap between dimensions of retailer’s and customer satisfaction of new customer acquisition and consumer’s dimension of store choice. However, the future research needs to test the model and know the customer’s response towards these efforts made by the retailers and to ascertain the success of these efforts from the point of view from the retailer.

Productivity Improvement in Manufacturing Industry Using Industrial Engineering Technique
Authors:-M. Tech. Scholar Shailendra Yadav, Prof. Trilok Mishra, Prof. Sachin Jain

Abstract- In today’s increasingly competitive world, it is important to constantly improve, be it amanufacturing or service industry. Quality with quantity is a main characteristic which helps a company stay in the competition. Technology has taken leaps of development lately and this has brought about an increase in the customer demands. The main aim is to studythe current capacity, analyze it to find areas of improvement and make an improvementproposal tomeettheforecasted increasein demand. This thesis presents the current performance of outputs and capacity of the plant calculated using continuous data collected in shop floor. In each workstation the processing time is different and the longest time consumption workstation will be identified as a bottleneck workstation. The identified bottle neck station will be analyzed to reduce the processing time which increases production rate.

Hypoglycemic Encephalopathy
Authors:- Ayouche Othman, El Bakkari Asaad, Nabil Motassim Billah, Ittimad Nassar

Abstract- We report the case of 23-year-old man without medical history who intentionally ingested a high dose of biguanide. He was found lying in a coma state with low blood glucose, transferred to the emergency department for non resolved biguanide intoxication.

Current Scenario of Breastfeeding in India
Authors:- Associate Prof. Dr. Ritu Pradhan, Anupreet Kaur Sobti

Abstract-Breastfeeding is an unparalleled universally recommended intervention for the promotion of health and nutrition of children and reduction of mortality. In spite of the WHO recommendations and baby-friendly hospital initiative, breastfeeding practices are inappropriate due to maternal, infant, socioeconomic, and cultural factors. WHO recommends the use of various Infant and Young Child (IYC) indicators for assessing infant and young child feeding practices. Unlike in 2008, no distinction is made between core and optional indicators in this set of recommendations (2021). To support programme assessment, planning and monitoring, national-level reporting on estimates for IYCF indicators should take place approximately every three to five years. NFHS-5 findings show a worrying trend in child feeding practices. Despite the importance of breastfeeding practices for the healthy growth and development of infants and young children and health of mothers, data is not so encouraging. Necessary action is therefore the need of the hour. Breastfeeding is not only a mother’s responsibility. To enable all mothers and children to be breastfed, it requires support from governments, healthcare systems, families, communities, employers and work places to actually make it work. We need to leverage all sectors of society to make breastfeeding successful for mothers and babies. Appropriate individual and group counseling for families and community is required. Adequate funding and implementation of policies and programmes is also necessary.

A Color Image Steganography Method to Hide Multiple Images with LSB Coding
Authors:- Research Scholar Palac Gupta, Deepinder Kaur (HOD)

Abstract- Data and information security is one of the crucial tasks in the digital and data communication. In the ancient time there are various ways to hide data into various objects. In modern day the data security is also very important. Data can be of various types like text, image, audio or any other form. In image steganography image acts as cover image and it can hide text, image and other form of data. In case of multiple image steganography various image can be hidden in a single image. Benefit of this approach is that those hidden images can hide the data also. So it becomes very difficult to access those hidden data. Steganography can be classified into two categories namely spatial domain and transform domain. Both have different advantages. In this paper a novel technique for hiding multiple digital images in a colored digital image with the help of LSB encoding is proposed. 8-bit LSB technique will be used for the embedding of data into the cover image which is also known as stego digital image. The proposed technique will be able to hide various images with the encrypted method and then with the help of decoding method images can be recovered. The proposed technique will be compared with the already existing multiple image hidden steganography technique. Various objective parameters like hiding capacity, file size before steganography and after steganography, mean square error and peak signal to noise ratio will be taken as objective parameters. All the implementation will be performed in the Matalb software.

Voltage and Other Parameters Monitoring System Using Android Mobile Application
Authors:- B.Rajalakshmi, S.Surya

Abstract- In this paper,have proposed android mobile displaytoeasy voltage, current monitoringin a transformer. When testing and troubleshooting the electrical works/PCB, the person face issues while placing probes on 2 points on the electric lines and simultaneously noting the value in multi-meter . As the conventional model consumes more time as well as it also leads to faulty/improper measurements and also causes accidents when in contact with live wire. To overcome the issue, have proposed to integrate voltage display through the user application for a virtual voltage display while trouble shooting/testing the system. An arduino is used in the circuit for processing and displaying output. The Arduino Nano V3.0 controller and Bluetooth HC-05 are a cheap microcontroller and wireless device, respectively. The new Android smartphone application that monitors the voltage and current measurements uses the open source MIT App Inventor 2 software. The voltage and current measured, system is designed smartly.

Studies on Development of Process Technology for Preparation of Multigrain Extruded Snacks
Authors:- Kokani Ranjeet Chunilal (Pricipal), Shinde Gaurav Sanjay

Abstract- The aim to prepare Extruded snacks as a nutritional point of view and to provide convenience to the consumer. The main ingredients which were used for preparation of crackers were Soyabean flour, Ragi, Rice and Corn flours. All ingredients contain Energy, Protein, Carbohydrates, Fat and Vitamins such as vitamin A, Thiamin (B1), B3, vitamin C, Folate (B9) and Minerals such as Ca, K, Zn, Ph, Mg, etc. A snack was a good tea time snacks typically made from grain & flour and mixing of multi flours. Snacks are usually crispy, crunchy in taste, small in size. For preparation of multigrain extruded snacks ingredient used like Soya flour, Ragi Flour, Corn Flour and Rice Flour were mixed together with other ingredient. Then make a smooth dough after that filling it in hand extruder and frying at 120°C for 10 to 15min till golden brownish colour than cool it and packed it for further study. For standardization of recipe 3 trials had done T1, T2, T3, and from that trial T2 has selected according to sensory evaluation, among all the levels of Extruded snacks prepared trials T2 recorded highest score in all the quality attributes and good storage ability. Proximate composition of extruded multigrain snacks were Moisture content (12.75%), Ash (4.2%), Fat (4.6%), and Protein (16.9%), Carbohydrate (60.8%), Energy (352.65kcal) etc. It was concluded that the Extruded Snacks made from Multigrain can be store for three months in Low density polyethylene pouches at room temperature. So the Extruded Snacks made from Multigrain can be satisfy the consumer in acceptable.

Data Balancing and Apply Machine Learning Approach for Unbalanced Cancer Dataset
Authors:- M. Tech. Scholar Kamal Singh Baghel, Asst. Prof. Avinash Pal

Abstract- In medical sciences and biomedical domain, prediction of cancer disease is most difficult task since the machine learning techniques making computer aided diagnosis. In world, main causes of death are due to cancer diseases. Thus, for detecting and diagnosis of cancer diseases of a patient, there is a need to develop a decision support system. Data mining arrangement systems, the main aim of our project is to predict more accurately and precisely the presence of cancer disease in more efficient manner. With high dimensional unbalanced dataset with huge number of attributes, it is a challenging task in Data Mining and Machine Learning of Cancer based diseases. The imbalanced class distribution is one of the most frequently occurred phenomenons in the real-world health & biomedical datasets, which significantly causes the overall and con siderable loss of many essential pathological information and crucial details from an abnormal class. Indeed, Many of the times the misdiagnosis of these abnormal classes is very severe than the normal classes in biomedical disease diagnosis and cancer diagnosis. These are some main and important factors that further results in a lower rate of classification accuracy and precision of an abnormal class and incorrect diagnosis results with less sensitivity. Therefore, there is a need to establish a significantly effective classification machine learning model approach for limited and imbalanced health & biomedical cancer dataset and other biomedical datasets. The proposed approach will surely increase the accuracy and the precision of the output rather than that of the traditional SMOTE Algorithm with increase in the F-Score and Recall which also known as sensitivity. The proposed customized approach with addition to the Centroid method replacing the Euclidean Distance method will increase the efficiency and predictability of the system at very comparable levels. The overall results will be carried out effectively over the Cervical Cancer Dataset used in this study are taken out from the database repository which is UCI Machine Learning Repository and other Bio-Medical Imbalanced Datasets such as Diabetes, Heart Diseases can be used from Github & data world repositories, The Cervical Cancer Imbalanced Dataset is The dataset which is comprises habits, demofigureic information, and historic medical records of total 858 patients having.

Multipath Congestion Control and Predication and Detection of Attacks in MANET
Authors:- M. Tech. Scholar Vinita Kashid, Asst. Prof. Dr. Mukesh Patidar, Hod. Mr. K. K. Sharma

Abstract- Manet is self-configuring and self-organizing network; it doesn’t rely on pre-existing infrastructure. Manet or mobile ad-hoc network is capable of forming proxy network without the necessity of a central administration or any standard support devices. It is a wireless network that can communicate to each other. Since it’s a wireless network therefore its biggest problem is Congestion. This congestion occurs due to the presence of heavy traffic (packets) in the network. The controlling of the congestion is important within the manet, the quality congestion control mechanism isn’t ready to handle the complex or any hardcore congestion, if this congestion couldn’t be control it will collapse the whole network. We have proposed the congestion control by performing the default network nodes using Network Simulator NS2.35 with the Routing Technique of AODV and DSR, along with them we perform our routing technique called CCAODV (Congestion Control AODV) thus after final result one can see the workability and enhanced performance in packet delivery ratio and throughput from our proposed work.

Detection and Mitigation of Mitigate Denial of Service (Dos) Attacks Using Trust-Based Mechanism
Authors:- M. Tech. Scholar Deepak Chouhan, Asst. Prof. Avinash Pal

Abstract-The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envaisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in computation, storage, and network capacity, which makes them easy to hack and compromise. To achieve secure development of IoT, it is necessary to engineer scalable security solutions optimized for the IoT ecosystem. To this end, Software Defined Networking (SDN) is a promising paradigm that serves as a pillar in the fifth generation of mobile systems (5G) that could help to detect and mitigate Denial of Service (DoS) and Distributed DoS (DDoS) threats. In this work, we propose to experimentally evaluate an entropy-based solution to detect and mitigate DoS and DDoS attacks in IoT scenarios using a stateful SDN data plane. The obtained results demonstrate for the first time the effectiveness of this technique targeting real IoT data traffic.

Review of Uses Cassia Sophera Linn Plant Belonging to Family Caesalpinieae
Authors:- V.K. Dwivedi, D. Thakur

Abstract- Nothing existed in the world of thought matter and experience which is not a medicine” Disease, decay and death have always co-existed with life. The study of diseases and their treatment must have been contemporaneous with the down of human intellect. Man’s existence on this earth has been made possible only because of the vital role played by the plant kingdom in sustaining his life. The wealth of India is stored in natural flora India is virtually a herbarium of the world. India possesses all type of climate conditions varying from temperate to tropical and dry to humid and wet. There are about 2060 higher plant species being used in Indian system of medicine and nearly 600 species ayurvedic system, 50 in Unani system and 550 species in phytopharmaceutical industries. Besides these, many more are being used in folklore and traditional remedial systems. This article aims to provide a comprehensive review on the therapeutic and pharmacological as well as phytochemical aspects of Cassia Sophera plant. It is widely used in traditional medicinal system of India has been reported to possess Antioxidant, cytotoxic, and Hemorrhoideic activity etc. The medicinal potential of flora has been exploited to isolate and achieve various constituents like steroids, terponoids, essential oils,polyacetylen, hydrocarbon, Alkaloids, peptides, Carbohydrates, flavanoids etc. It is clear that the medicinal properties and therapeutic uses of Cassia Sophera as well as its phytochemical investigations prove its significance as a valuable medicinal plant [1].

Secure MANET using Curve-Based Cryptography
Authors:- M. Tech. Scholar Lalita Mandloi, Asst. Prof. Avinash Pal

Abstract- Mobile Ad hoc Network (MANET) is a mobile and infrastructure less network, widely used in various applications. In this paper, we study the major security issues in MANET to reduce the malicious activity at the nodes. To reduce theunsecured network, Enhanced Adaptive Acknowledgement Scheme (EAACK) is proposed and it involves Acknowledgement (ACK), Secure Acknowledgement (SACK), and Misbehavior Report Authentication (MRA) schemes. In EAACK scheme, the 2b (2-Bit) packet header is used and it overcomes some of the disadvantages of Watchdog behavior. In this work, the sender has to digitally sign the ACK packets and the receiver has to verify it. The proposed Scheme is applied to 40% of malicious nodes and Routing overhead (Ro) hits the value 0.6. The Network performance is better when the value of Ro is 0. In order to secure more, Credibility Based Sequence Distance Vector Routing (CBSDV) and Curve based cryptographic technique is used. Simulation results show that proposed scheme provides better secure network and CBSDV, hop count, time duration, energy values and trust scores play a deciding factor between the source and destination in the network.

Facial Expression Recognition: A Review
Authors:- M.Tech Scholar Shivani Patidar, Asst. Prof. P. Kumar Choure

Abstract-Facial expressions are the fastest means of communication while conveying any type of information. These are not only exposing the sensitivity or feelings of any person but can also be used to judge his/her mental views. This paper includes the introduction of the face recognition and facial expression recognition and an investigation on the recent previous researches for extracting the effective and efficient method for facial expression recognition.

Review Articles of Piston Designing Methodology and Optimization of its Performance
Authors:-M. Tech. Scholar Rajesh Jamra, Asst. Prof. Dheeraj Shriwas, Associate Prof. Devendra Singh Sikarwar

Abstract- In this paper gives a review of various piston design approach and provide a summary of conceptual design method previous research articles. For purpose of paper to collection of Literature review of related to piston designing contrast to designing drawback and different type of material optimization problem. To identification and observation of piston design method, Materials optimization suitable to piston designing with its performance evaluation see paper section-II summaries of algorithm of piston design.

Advanced Approach for CORDIC Architecture Using Carry Select Adder
Authors:- Harsit Tiwari, Tarun Verma

Abstract- We have developed an efficient CORDIC algorithm in this research, which uses many rotations to reduce the CORDIC rotation angle. Instead of employing a regular adder, this innovative CORDIC method employs an area efficient carry select adder (CSLA). In many data processing techniques, this adder can do quick arithmetic operations. Finally, several parameters such as area, power, and latency are evaluated, and the proposed approach reduces these when compared to the existing method.

A Descriptive Study to Assess the Level of Awareness on Covid 19 Precaution among Home Makers at Selected Areas of Chengelpet District
Authors:- Associate Prof. S.Kavitha, Associate Prof.P. Sangeetha, Dr. N. Kokilavani (Principal)

Abstract-The Covid-19 pandemic worldwide caused by severe loss of health and life of many people. Covid appropriate behaviours were entrusted by government of India to reduce the covid-19 spread across the nation. This article reveals the level of awareness on covid-19 preventive measures among the home makers, it is a Non- experimental design – Descriptive research design was adopted to selected 50 clients from selected areas of chengelpet district by purposive sampling technique, assessed by the structured multiple choice questionnaire and analysed by using descriptive statistics.The findings of this study suggests 61.2% of clients are having inadequate awareness, 28.4% of them having moderately adequate awareness and only10.4% falls in category of adequate the level of awareness on tuberculosis. This study concludes that around 61% of the clients are having inadequate awareness on covid19 appropriate behaviour. The researcher also suggests that an educational intervention can help the clients to improve their awareness thereby it reduces the spreading rates of Covid 19 in forth coming months.

A Review on Wireless Sensor Network for Energy Consumptions
Authors:- M. Tech. Scholar Amit Garg, Asst. Prof. Mukesh Kumar Gupta

Abstract- WSNs have made conceivable ongoing information total and investigation on an extraordinary scale. Normally, they have stood out and accumulated across the board claim towards applications in different regions including calamity cautioning frameworks, condition checking, human services, wellbeing and key zones, for example, guard observation, reconnaissance, and interloper recognition. If there should arise an occurrence of atomic force plant if any little deferral happens for information sending because of any hub disappointment may brings about serious catastrophe. Thus successful Topology Control is required to acquire a vitality productive sensor organize regardless of whether any hub comes up short. A vitality proficient topology control utilizing crossover bio enlivened calculation based group head choice is introduced in this work.

Newfangled Approach for Analyzing the Impact of Artificial Intelligence in E- Commerce
Authors:- M.Tech. Scholar Shriya Asati, Associate Prof. Dr. Sunil Phulre, Prof. Dr. Bhupesh Gour (Hod)

Abstract- During the last decade of the twentieth century and among the first one and half decades of the third millennium-up to the best knowledge of the author of this thesis, the issue of Business Intelligence and its involvement in business environment and in Electronic Commerce environment in particular for better achievement, has ‘often’ been dealt with as several individual unidirectional problems, or quite seldom as bidirectional problem. This thesis presents however a research project that has differently handled the said issue as a ‘single’ multidirectional problem. The general trend to utilize the concept of Business Intelligence was through considering it as a tool or a means that is actively reliable in decision making concerning business organizations with respect to their partial activates besides their strategic and executive planning.

Intrusion Prevention for Covid-19 Using IOT Devices
Authors:- Asst. Prof. Guru Prasad, Abhijeet

Abstract- This COVID-19 pandemic caused by novel corona virus is continuously spreading until now all over the world. Many precautionary measures have been taken to reduce the spread of this disease where wearing a mask is one of them. We propose a Raspberry Pi based system that restricts the growth of COVID-19 by finding out people who are not wearing any facial mask. While a person without a mask is detected. As we know fever is also a symptom of COVID-19, so our system will check body temperature of the person and also it will check if that person is maintaining proper social distancing or not. If the person follows all standard operating procedures then the automated door is opened he/she can enter. If the person is not following any one among three Standard Operating Procedures then the person will not be allowed to enter into the office / school / college. It alerts through buzzer.

A Comprehensive Review on the Various Steganography Methods Based on Encryption and Data Hiding
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- As the technology is advancing day by data and with the same pace information and its secure transmission is also crucial in the process of information transmission. Images are usually the simplest digital data which is used in multiple applications. From satellite to whatsapp applications all around and there are billions of images that are transmitted through digital communication channel. To solve the problem of safest delivery of message to the receiver encryption with the steganography method can be used simultaneously. Various researchers had proposed various ways of hiding data into digital images either by using encryption and steganography and some has combined both these methods to make data more secure. In this review paper a deep literature survey is performed on the steganography of digital images where encryption and data hiding are used for making the data safer.

IoT based Smart Mirror using Raspberry Pi
Authors:- Anubha Jain, Diwakar Kumar, Kirti Agrawal, Assistant Professor Shruti Sharma

Abstract- This project represents the development and designs of a mirror that Shows a graceful interface for glancing information, and it is also used for setting the To-Do list. And in this android facilities can also be added. The Smart mirror is such kind of device that functions as a mirror with many advanced capabilities of displaying multimedia data i.e. Videotext and images.

Implementation of Rank Positional Weight Technique Inbalancing of Production Line in a Manufacturing Industry
Authors:- M. Tech. Scholar Vivek Barenge, Prof. Trilok Mishra, Prof. Sachin Jain, Prof. Harimohan Soni

Abstract- This work mainly focuses on application of line balancing to minimise idle time of work station in production line. The methodology adopted includes calculation of cycle time of process, identifying the non –value-added activities, calculation of total work load on station and distribution of work load on each workstation by line balancing, in order to improve the efficiency of line. A production line of a shaft manufactured by K.K. Engineering Works, Govindpura, Bhopal (M.P) is considered for this research work and time study is performed in order to determine the standard time for each process. Then, rank positional weighted method (RPW) is evaluated with the help of standardized data to solve the assembly line problem and defines the line efficiency which provides a better productivity in the existing flow line by reducing the idle time.

A Review on Block Chain in Cloud Computing Healthcare Data Security
Authors:- M.Tech. Student Atul Soni, Asst. Prof. Manoj Kumar Gupta

Abstract- This work mainly focuses on application of line balancing to minimise idle time of work station in production line. The methodology adopted includes calculation of cycle time of process, identifying the non –value-added activities, calculation of total work load on station and distribution of work load on each workstation by line balancing, in order to improve the efficiency of line. A production line of a shaft manufactured by K.K. Engineering Works, Govindpura, Bhopal (M.P) is considered for this research work and time study is performed in order to determine the standard time for each process. Then, rank positional weighted method (RPW) is evaluated with the help of standardized data to solve the assembly line problem and defines the line efficiency which provides a better productivity in the existing flow line by reducing the idle time.

College Experience of Students in a Faith-Based Institution
Authors:- Vo Truong Giang

Abstract- This paper aimed to understand the experience of college students who studied under a faith-based institution, especially in Thailand. By using a one-on-one interview form, the researcher collected data of eighteen participants who regularly studied in a faith-based institution. Each interviewee was asked a list of ten questions focused on their personal demonography, feeling, thinking, and experience about four major aspects of the topic – physical, mental, spiritual, and social. All participants completed providing the answers under the normal condition. Through reading the transcribed texts several times, the data were formed into different categories and themes for analysis. The result showed that students had positive perspectives about faith-based institutions. Health educations that applied religious’ principles were taught both direct – lessons and indirect – encouraged programs. Moreover, these institutions provided healthy environments and mental support systems for students to grow their mental health and spiritual life. Both religious and non-religious students reported the effective teachings of faith-based institutions which changed their perceptions and behaviors positively in terms of social interaction development.

Iot Based Smart Farming System
Authors:- Aniket Chande, Ayush Kumar Chaudhary, Govind Gurme, Prof. Mrunalini Bhandarkar

Abstract- In India over 60% population is relied on agriculture as the basic source of their income. As a result, it contributes to 1/3rd of Indian economy. That is the reason agriculture is integral part of Indian economy. Also, it plays crucial role in development of country. And traditional farming degrading the development in agriculture, there is necessity of technological intervention in agricultural practices to increase overall grade of farming. There are various methods in farming that demands automation and reduced human efforts. Hence, agriculture can be made smart using IoT and other smart automation tools & technologies. Smart agriculture increases crop yield, quality, decreases water wastage etc. Internet of Things (IoT), Machine Learning (ML), and automation technology has brought revolution in every field, making everything smart and intelligent. The main objective of this project is to propose IoT based Smart Farming System supporting farmers in getting Livestock Data, Temperature, Soil Moisture, Humidity, PH measures and fire detection for efficient monitoring of environment which will empower them to increase their overall grade of service and their product quality. This will increase mainly the income of farmers and reduce the unnecessary expenses. The IoT based Smart Farming System being recommended is assimilated with Arduino, Sensors and a Wi-Fi module producing live data feed.

Low Power Adiabatic Logic Design for VLSI Applications
Authors:- Sanjay Kumar, Prof. Sher Singh, Asst. Prof. Suresh S.Gawande

Abstract- The ever-increasing transistor integration in VLSI have augmented the power dissipation due to transistor switching in a massive amount. Power reduction and low power circuits have become a major research topic now a days. Adiabatic logic style is found to be an effective solution in achieving low power. In this paper, various adiabatic logic approaches have studied and compared with a proposed adiabatic logic based on PFAL logic circuit. Adiabatic logic styles such as 2N-2P, 2N2N-2P, DCPAL and PFAL are considered and their average power dissipation and delay at different frequencies are compared with the proposed circuit. the proposed circuit has achieved the average power consumption of 1.649nw, 1.938nw, 1.932nw, 2.596nw for BUFFER, NAND, NOR and XOR circuits respectively at 10MHz. At 32nm technology the average power consumption of 0.842nw, 0.942nw, 0.957nw, 1.038nw for the same logic at 10 MHz. From the results it is concluded that proposed ON OFF DCDB-PFAL based circuit performed very well and achieved lowest power consumption among all other adiabatic logic circuits.

Adiabatic Logic Circuits Designfor Low Power in Applications in Digital Circuits
Authors:- Sanjay Kumar, Prof. Sher Singh, Asst. Prof. Suresh S.Gawande

Abstract- With the continuous scaling down of device technology in the field of VLSI circuit design, low power dissipation has become one of the primary concern of the research field. With the increasing demand of low power portable devices, adiabatic logic gates prove to be an effective solution. This paper presents different types of adiabatic logic families such as 2N-2N2P, PFAL (Positive Feedback Adiabatic Logic), DCPAL (Differential Cascode and Pre-resolved Adiabatic Logic) and a proposed circuit based on the PFAL logic circuit. This paper investigates different adiabatic logic families such as ECRL, 2N-2N2P and PFAL. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100MHz frequency, for fair comparison of results W/L ratio of all the circuit is same. Finally average power dissipation characteristics are plotted with the help of a graph and comparisons are made between different logic families.

A Descriptive Study to Assess the Level of Awareness on Covid 19 Precaution among Home Makers at Selected Areas of Chengelpet District
Authors:- Associate Prof. Ms.S.Kavitha, Associate Prof. Ms.P. Sangeetha, Dr. N. Kokilavani (Principal)

Abstract- The Covid-19 pandemic worldwide caused by severe loss of health and life of many people. Covid appropriate behaviours were entrusted by government of India to reduce the covid-19 spread across the nation. This article reveals the level of awareness on covid-19 preventive measures among the home makers, it is a Non- experimental design – Descriptive research design was adopted to selected 50 clients from selected areas of chengelpet district by purposive sampling technique, assessed by the structured multiple choice questionnaire and analysed by using descriptive statistics.The findings of this study suggests 61.2% of clients are having inadequate awareness, 28.4% of them having moderately adequate awareness and only10.4% falls in category of adequate the level of awareness on tuberculosis. This study concludes that around 61% of the clients are having inadequate awareness on covid19 appropriate behaviour. The researcher also suggests that an educational intervention can help the clients to improve their awareness thereby it reduces the spreading rates of Covid 19 in forth coming months.

A Review of Welding Process on Microstructure & Mechanical Properties of Zinc Brass
Authors:- M. Tech. Scholar Jatin Dalal, Asst. Prof. Manoj

Abstract-One of a kind lapping welding joints of Cu & metal conductors are made by grinding blend weld process methodology at a no. of welded heating i/ps. The impact of welded heating i/ps on nano-design & m/c properties of get over welding combinations at 2 assorted joining plans (for instance Propelling side & Retreating side joint courses of action) was analyzed. In dual combination plans, Cu & metal plating are arranged on the topped & base plates, independently.

IoT based Smart Mirror using Raspberry Pi
Authors:- Anubha Jain,Diwakar Kumar,KirtiAgrawal, Asst. Prof.Shruti Sharma

Abstract- This project represents the development and designs of a mirror that Shows a graceful interface for glancing information, and it is also used for setting the To-Do list. And in this android facilities can also be added. The Smart mirror is such kind of device that functions as a mirror with many advanced capabilities of displaying multimedia data i.e. Videotext and images.

Feasibility Analysis of Single Effect Vapour Absorption Systemin Dairy Industry
Authors:- M. Tech. Scholar Arvind Kumar, Prof. Suresh Bhadoriya

Abstract- Today’s world is facing two most important environmental problems. They are the energy crisis and the greenhouse effect. Scientists are working on how to eradicate these problems. Most of the today’s innovations are based on this fact. Lithium-Bromide and water driven absorption refrigeration cycle is a burning example of this concept, which not only helps in minimizing the fossil fuel usage, hence the reduced CO2 gas emission but also utilizes the low-grade heat from various industries and data centres.Energy, exergy and advanced exergy methods are used to analyse a milk powder production facility. In this study, feasibility analysis of single effect vapour absorption systemin dairy industry has been evaluated.

IoT Based Anti-Poaching Alarm System for Trees in Forest
Authors:- Pankil Chhabra, Teerth Jain, Harshvardhan Kalaskar, Prof. A. V. Bhamare

Abstract- All around the world there are numerous occurrence about stealing of trees like sandal, sagwan, timber etc. These trees are expensive and pitiful. They are utilized in medicine, beautifying agent, furniture etc. To limit their sneaking and to spare woodland around the world some preventive estimates should be conveyed and sometimes in forest, fire broke out which cause destruction to wildlife animal and also tree so it is necessary to control fire as soon as possible. For this we have built up a framework which can be utilized to limit sneaking. The structure framework utilizes three sensor i.e. tilt sensor, vibration sensor, flame sensor to recognize the tendency of tree when its being cut, to detect unlawful logging and to detect fire in forest respectively. And with the help of IOT model information being sent to Forest authorities.

Smart Grid Management by Genetic Algorithm and Renewable Resources
Authors:- M.Tech. Scholar Mahesh Nair, Prof. Lavkesh Patidar

Abstract- As power requests are expanding day by day causing unbalance in the present grid framework which brings about different causes like load shedding, unbalance voltage and so on which at last influences the end users. Presently to stay away from every such circumstance the main alternative is to take care of the demand by generation but, world are additionally slacking with the conventional sources so producing more power is not helpful by traditional ways. The power industry has adopted “smart” grids that use information and communication technologies, which may make electric power systems more reliable and efficient. This paper has proposed a grid load balancing by modified genetic algorithm and renewable resources. Genetic algorithm provides a combination of renewable resource with non-renewable power resources. Experiment was done on different environmental condition to get better comparisons.

Feature Extraction and Classification Techniques for Analysis Stress Using EEG Signals with Web Application
Authors:- Sowmya H D, DR. Girisha GS

Abstract- The biological response to stress originates in brain that involves different biochemical and physiological effects. Numerous basic clinical strategies to survey pressure depend on the nearness of explicit hormones and on highlights separated from various signs, including electrocardiogram circulatory strain, skin temperature, or galvanic skin reaction. To screen pressure various strategies can be utilised. In this task for an anxiety acknowledgment, Electroencephalogram (EEG) signal is utilised. Electroencephalogram (EEG) signal is a neuro-signal that is produced due to diverse electrical exercises in the mind. Various sorts of electrical exercises related to various conditions of the mind. These signs can be caught and handled to get the helpful data that can be utilised in early location of some physiological state. In this proposed system, EEG signal database is pre-processed and features are extracted. Classification of stress level is done by implementing machine learning algorithms. In which Random Forest will provide the better accuracy.

A Review Article of ANN and Adaboost Based Effective Face Recognition and Improvement of Classification Training
Authors:- P.G. Scholar Priyanshu Tamrakar, Assistant Professor Hemant Amhia

Abstract-The Face Recognition (FR) is growing as a major research area because of the broad choice of applications in the fields of commercial and law enforcement. Traditional FR methods based on Visible Spectrum (VS) are facing challenges like object illumination, pose variation, expression changes, and facial disguises. Unfortunately these limitations decrease the performance in object identification and verification. To overcome all these limitations, the Infrared Spectrum (IRS) may be used in human FR. So it leads and encourages the researchers for continuous research in this area of FR. Simultaneously, the present study emphasizes the use of three dimensional cubic dataset i.e. Multi/ Hyperspectral Imagery Data in FR. The IR based Multi/ Hyperspectral Imaging System can minimize the several limitations arise in the existing and classical FR system because the skin spectra derived with cubic dataset depicts the unique features for an individual. Multi/ Hyperspectral Imaging System provides valuable discriminants for individual appearance that cannot be obtained by additional imaging system that’s why this may be the future of human FR. This paper also presents a detailed and time to time review of the literature on FR in IRS.

Design and Analysis of Compatibility of Crash Box with Trigger and Thickness Variation for Vehicle Frontal Part During Low Velocity Collision
Authors:- M. Tech. Student Harikrishna.S, Prof. Nilesh A Sakle

Abstract- The frontal impact as per the statistics is the most common means of phenomena when it comes to collision and thereby results in several injuries and fatalities. Therefore the design of crashbox has become an important area of focus for vehicle structure to deform and absorb the impact energy during collsion. The crash box deforms by absorbing the force and reduces the force acted on the longitudinal members there by preventing the collision force intrusion to passenger cabin. Triggers can be implemented in the design of crash box to help in achieving sequential deformation pattern. The crashbox is tested at 15 kmph based on RCAR (Research Council for Automobile Repairs) regulation. A crashbox of a Sedan has been measured and designed to been taken as a benchmark. A hexagonal crashbox has been designed with trigger holes and trigger thickness variations and is compared with the benchmark Sedan crashbox to determine its deformation characterisitcs. The main objective is to design a crash box with trigger and thickness variation to aid the longitudinal members using Creo 2.0 software and analyse the overall behaviour & characteristics using the ANSYS software.

Development of Web Server Using AI
Authors:- Bhavana.B Sunanda Bhargavi Devika.B

Abstract- Website: A collection of web pages which are grouped together and usually connected together in various ways. Web server: A project hosts a website of twitter management system. Artificial intelligence (AI) is the ability of a computer program or a machine to think and learn. Study of social network platforms such as twitter.

Android Based Smart Shopping System
Authors:- Raji Bokade, Prof. Nitin Deotale

Abstract- E-commerce has taken the world by surge due to its limitless advantages. Even so, many customers find themselves getting stuck in chicanery and receive trite products. They tend to incline towards the traditional or off-line shopping which is more trustworthy. But traditional shopping seems too time consuming and includes a lot of labor. In an attempt to bridge this gap between the extant traditional shopping and the burgeoning online shopping, this paper discusses an application wherein people can exploit the advantages of both off-line and on-line shopping. This system can be implemented by any shop and can be used at internet and smartphone friendly places. The application mentioned here would read the barcode of the product and add it to the cart in application with methods to change or edit the list. Payment gateway is provided to make payments. Shops can provide an online portal, which would avoid losing customers. Since the application is available on the smartphone it is easily accessible and readily available.

A Comprehensive Review on the Various Steganography Methods Based on Encryption and Data Hiding
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- As the technology is advancing day by data and with the same pace information and its secure transmission is also crucial in the process of information transmission. Images are usually the simplest digital data which is used in multiple applications. From satellite to whatsapp applications all around and there are billions of images that are transmitted through digital communication channel. To solve the problem of safest delivery of message to the receiver encryption with the steganography method can be used simultaneously. Various researchers had proposed various ways of hiding data into digital images either by using encryption and steganography and some has combined both these methods to make data more secure. In this review paper a deep literature survey is performed on the steganography of digital images where encryption and data hiding are used for making the data safer.

Smart Automation Attendance System using Neural Networks
Authors:- Satwik Ram Kodandaram, Kushal Honnappa, Rishab Darshan S

Abstract- A Traditional Attendance system will be a huge burden on teachers. After marking down, it manually, they have to upload it to some database to maintain the student’s records. When there is a batch of students more than 500, doing it manually is imaginary. To resolve this problem, a smart and auto attendance management system is utilized. But authentication is a very important issue in this system. The smart attendance system is generally done with the help of biometrics. Face recognition is one of the best biometric methods to improve this attendance system. Being a prime feature of biometric verification, facial recognition is used in several applications like video monitoring. By utilizing this system, the problem of proxies and students being marked present even though they are not physically present in the class can be easily solved. The main implementation step used in this system is face detection and recognizing the detected face. This paper proposes a model for implementing an automated attendance management system using ANN and CNN. After this, the student’s faces are mapped to their USN (University serial number) or ID. When the student’s face is recognized and if they are present in the current location of the teacher, automatically the USN mapped to that student is marked as present in the database. In this model, the teacher needs to hosts the system through a web application or android application. While hosting the teacher’s current location is taken. This model will be a successful technique to manage the attendance and records of students.

To Design and Analysis of Staad Based Chimney Design and Air Flow Observation
Authors:- M. Tech. Scholar Shivraj Patidar, Prof. Sourabh Dashore

Abstract- It has been observed that most of the existing studies have focused on the load considerations for design of tall chimneys. To make a further contribution to this study, this paper presents the load parameters considered for the design of RCC chimney and focuses on one of the structural parameters of RCC chimneys viz. the effects of number of supports to the flue. A brief review on the types of supports is presented in this paper and analysis is carried out for different kinds of supports to the flue. The comparison of results is plotted. The software STAAD Pro and MS Excel sheets have been used for design.

Importance of Smart Sensor Technology in IoT Based Applications
Authors:- Ankita S Sawalkar

Abstract- Nowadays , there is a large requirement of Smart Sensors as recent technologies are developing with high speed electronic circuits with low cost. These collaborative interactions need higher quality, reliability, and economic efficiency of technical products. In this article, there will be an overview about Smart Sensors and Sensor Technology in today’s IoT based applications with structures, types and example.

A Comprehensive Review of Various Face Detection and Recognition Techniques
Authors:- Research Scholar Amritpal Kaur, Asst. Prof. Shaveta Bala

Abstract-From the last decade the computer vision and the machine learning fields has various applications in almost every field of artificial intelligence. From object detection to recognition, bar code reading to biometric data matching, from vegetable classification to vehicle information extraction in almost every area both of these fields are dominating. For the identity verification face detection and recognition are one of the prime steps. Various researchers have developed various algorithms for face detection and recognition. All of these methods have some pros and cons. Some are fast in execution and some have high accuracy. In this review paper a comprehensive review is performed on the face detection and recognition techniques so that various researchers could find the insight of the various researches performed on this field of artificial intelligence.

Evaluation of Spectrum Sharing in Cognitive Radio Networks Using Fuzzy Logic
Authors:- Anooja.B, Princy Merin Jose

Abstract- Cognitive radio (CR) network is the footstep and essential need of the new wireless emerging technologies like the Wireless Sensor Network (WSN), Internet of Things (IoT), Bluetooth, and Vehicular Ad Hoc Network (VANET). Due to tremendous progress in the number of wireless devices and their traffic, large scale use of these technologies may soon cause a shortage of spectrum as all these technologies use unlicensed bands. So, CR is a vital choice for their survival.The proliferation of mobile devices and the heterogeneous environment of wireless communications has increased the need for additional spectrum for data transmission. It is not possible to altogether allocate a new band to all networks, which is why fully efficient use of the already available spectrum is the demand of the day. Cognitive radio (CR) technology is a promising solution for efficient spectrum utilization, where CR devices, or secondary users (SUs), can opportunistically exploit white spaces available in the licensed channels. SUs have to immediately vacate the licensed channel and switch to another available channel when they detect the arrival of the incumbent primary user. However, performance for the SU severely degrades if successive channel switching happens. Moreover, taking the channel-switching decisions based on crisp logic is not a suitable approach in the brain-empowered CR networks (CRNs) where sensing information is not only imprecise and inaccurate but also involves a major uncertainty factor. In this paper, I propose a fuzzy logic-based decision support system (FLB-DSS) that jointly deals with channel selection and channel switching to enhance the overall throughput of CRNs. The proposed scheme reduces the SU channel switching rate and makes channel selection more adaptable. The performance of the proposed scheme is evaluated using a fuzzy logic, and a comprehensive comparison study with a baseline scheme is presented. The simulation results are promising in terms of the throughput and the number of hand-offs and making our proposed FLB-DSS a good candidate mechanism for SUs while making judicious decisions in the CR environment.

Impact of Social Media on Stock Market
Authors:- Prabhav Sharma

Abstract- This research shows the impact of various social media sites which directly and indirectly influence today’s stock market and made possible to manipulate for personal as well as community gains. This research shows the subsequent rise and fall in the prices of shares after the tweets of CEO’s and wealthy entrepreneurs having a strong social media presence in various platforms. It also discusses an analysis of the Gamestop surge event where some users on Reddit invested heavily on that share and massively increased the price which was dying because of short selling done by hedge funds.

A Novel Approach of Data Hiding in Encrypted Digital Images using Hybrid Steganography
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- This research shows the impact of various social media sites which directly and indirectly influence today’s stock market and made possible to manipulate for personal as well as community gains. This research shows the subsequent rise and fall in the prices of shares after the tweets of CEO’s and wealthy entrepreneurs having a strong social media presence in various platforms. It also discusses an analysis of the Gamestop surge event where some users on Reddit invested heavily on that share and massively increased the price which was dying because of short selling done by hedge funds.

Prediction of Breast Cancer using Deep Learning
Authors:- Asst. Prof. Anandajayam.P, Abhishree.P, Rashmi.C.U, Keerthana.M

Abstract- The recent developments in the information technology have generated a volatile growth of data. In this paper we cover the problem of breast cancer prediction using Machine Learning. We considered two types of datasets, namely, Gene Expression (GE) andDNA Methylation (DM). The main objective of this paper is to predict the breast cancer using Deep Learning. We have developed a deep learning model to detect Breast cancer in CSV files. Benign and Malignant will be the two detections of the model. We use PyCharm as the platformto train and test our datasets.

Comparative Analysis of Machine Learning Algorithms To Perform Customer Segmentation
Authors:- Stuti Arora, Sunanda Mandal, Sasi Rekha Sankarl

Abstract- TConsidering the current pandemic, companies are finding it difficult to reach out to their customers and target them. Given a dataset of customer details pertaining to any company, it would be possible to come up with a generalized machine learning algorithm (by comparing K-Means Clustering, Principal Component Analysis and DBSCAN) keeping in mind the factors – age, gender, annual income and spending score. Using this, we can identify the most profitable segment of customers, hence ensuring efficient utilization of funds, workforce and time and adding to the overall brand value of the company. Using the age group of the most profitable segment of customers, the concept of generational marketing can be applied in order to narrow down which marketing channel would be the most effective to target customers on the basis of their age.

Morphological Study of Discarded Polyurethane Hybrid Composites
Authors:- Mr. J. Starlin Deva Prince, Godfrey Mohan R, Milan Chand J S, Mohammed Shabeen J

Abstract- Hybrid materials are composites consisting of two constituents at the nanometer or molecular level. Commonly one of these compounds is inorganic and the other one organic in nature. Thus, they differ from traditional composites where the constituents are macroscopic. Mixing at the microscopic scale leads to a more homogeneous material that either shows characteristics in between the two original phases. Polyurethane is a plastic material, which exists in various forms. It can be tailored to be either rigid or flexible, and is the material of choice for a broad range of end-user applications such as: insulation of refrigerators and freezers, building insulation, High abrasion resistance Thick section molding , Colorability ,Oil resistance, Ozone resistance, Radiation resistance. Other advantages are castable nature and Low pressure tooling. This investigation helps to know about the morphological study of discarded polyurethane hybrid composite. Layout method is used for combining both polyurethane and nylon fibres. By using the following combination, we have prepared six samples with different samples as S1- S6. The percentage proportions as follows;
S1- 100% polyurethane
S2- 80% polyurethane + 20% nylon
S3- 60% polyurethane + 40% nylon S4-100% nylon
S5-80% nylon + 20% polyurethane S6-60% nylon + 40% polyurethane

DOI: 10.61137/ijsret.vol.7.issue4.646

Dynamic Mechanical Analysis of Discarded Polyurethane with Polyester Hybrid Composites
Authors:- E. Bravin Daniel, Ajin B S, Ajun Jijo S, Berin J

Abstract- A composite material is a combination of two materials with different physical and chemical properties. When they are combined they create a material which is specialised to do a certain job, for instance to become stronger, lighter or resistant to electricity. They can also improve strength and stiffness. Polymer matrix composites (PMCs) are the most widely used composite type. Just as is the case for polymers, the environment typically needs to be controlled to obtain consistent test results for PMCs Polymer matrix composites (PMCs) have gained considerable interest mainly due to their low cost and higher specific strength and stiffness compared to conventional metallic alloys. This prepared composites were evaluated by dynamic mechanical analysis method such as dynamic mechanical analysis, X-Ray diffraction, Fourier transform infrared. The aim is to conduct the dynamic mechanical analysis of polyurethane and polyester composite. Polyurethane is the thermosetting polymer composite which can withstand high temperature. On the other hand polyester is the fiber material with ductile nature. After the preparation of the composites ,mechanical analysis of the specimen is to be analyzed.

DOI: 10.61137/ijsret.vol.7.issue4.647

Investigation of Co-Pyrolysis of Plastic and Cocos Nocifera
Authors:- S. Ajith kumar, Janobin S, Halin Heijal A, Bisel M

Abstract- Generally all over the world, the usage of fossil fuels in the day to day life as liquid, gas and the solid have been highly increased. Nowadays the population is getting highly increased and at the same time, the usage of biomass is also increasing. Biomass is an alternate fuel from the starting era of biotic organism. The usage of plastic also increased. The disposal and recycling of plastic is facing a challenging task. The researchers are facing high tedious problem in destroying plastic. Since the decomposition of plastic is highly dangerous to the soil. Pyrolysis process is the most promising for the waste to useful form of energy conversion techniques. While destroying biomass and plastic, more carbon footprints are seen. End product of plastic and biomass pyrolysis has its own deficiency in its characterization. In order to overcome these drawbacks, biomass and plastic is combined together as mass quantity and undergoes pyrolysis process for finding the better result. The pyrolysis end product properties like ash content, moisture content, kinematic viscosity, density, flash point, fire point, cloud point, pour point, gross calorific value and specific gravity are determined.

DOI: 10.61137/ijsret.vol.7.issue4.648

IoT-Driven Personalized Healthcare

Authors: Nithin Nanchari

Abstract: With the rise of the web of things in the health sector, the personalized treatment of people in real-time using real data has evolved into shape. Through IoT and personalized healthcare, individual medical interventions are delivered so that patients can monitor themselves and gain better treatment effectiveness. The contribution of this paper consists of how IoT enables custom healthcare solutions through AI-driven health assistants, real-time data analytics, a patient-centric approach, and wearable technology. Also, the study highlights the utility of IoT in improving the accuracy of precision medicine and improving healthcare services. Such a personalized healthcare solution could progress by integrating IoT and AI.

DOI: http://doi.org/10.5281/zenodo.15796148

 

The Introduction of Multi-Tenant Solaris Environments for Research Institutions

Authors: Harini Samarasinghe, Dilan Madushanka, Ruwani Gamage, Amila Wickramasinghe

Abstract: Research institutions are increasingly challenged to support a diverse array of computing workloads ranging from high-throughput bioinformatics to high-performance simulations within constrained physical infrastructure. Multi-tenant architectures offer a cost-effective and scalable solution, enabling multiple research groups to securely share resources while maintaining strong boundaries of isolation, performance, and compliance. This review explores the architectural, operational, and security dimensions of building multi-tenant environments using Oracle Solaris. It covers foundational technologies such as zones and Logical Domains (LDOMs), details approaches to resource allocation, identity management, and audit logging, and addresses the specific needs of research computing environments including regulatory compliance (HIPAA, GDPR, FERPA), data reproducibility, and access governance. The article further discusses automation, orchestration, and monitoring strategies, including integration with DevOps tools and SIEM platforms. Real-world use cases from genomics labs, physics departments, and engineering faculties illustrate the practical applications of Solaris-based tenancy. Challenges such as kernel-sharing risks, resource contention, and cloud scalability limitations are critically examined. Finally, the paper outlines future directions including hybrid cloud integration, AI-optimized zone support, and policy-as-code templates for rapid, compliant deployments. This comprehensive review serves as a technical and strategic guide for research institutions seeking to modernize and secure their multi-tenant UNIX infrastructure using Solaris.

DOI: https://doi.org/10.5281/zenodo.15847545

A Telemetry-Centric Approach To Identifying Recurrent Defect Structures In Software Systems

Authors: Hema Latha Boddupally

Abstract: This study examines how telemetry driven code analytics can be systematically leveraged to identify recurrent defect structures in complex software systems, addressing a persistent challenge in software quality engineering where failures reappear across releases despite localized fixes. The research focuses on the problem of distinguishing isolated faults from structurally recurring defects by using runtime telemetry as a primary analytical signal rather than relying solely on static inspection or post-incident reports. The study adopts a mixed methodological approach combining empirical analysis of telemetry artifacts, structured feature engineering, and quantitative pattern detection techniques to uncover repeatable defect signatures that span code, configuration, and execution behavior. Findings demonstrate that telemetry-informed analysis enables earlier recognition of defect recurrence, improves diagnostic consistency, and strengthens the linkage between observed failures and underlying code structures. The proposed approach introduces a coherent analytical framework that integrates telemetry normalization, defect signature extraction, and code level attribution, offering a novel contribution to defect analysis practices. From a strategic perspective, the study contributes to software engineering research by reframing defect detection as a signal driven, evidence based process grounded in runtime behavior. Practically, it provides guidance for engineering teams seeking to enhance reliability, reduce diagnostic effort, and institutionalize learning from recurring failures. The work holds significance for both academic inquiry and industrial practice by advancing a scalable, analytically rigorous pathway for improving long term software quality.

DOI: http://doi.org/10.5281/zenodo.18125283

Intelligent Automation Of Financial Compliance And Reporting Processes Using SAP And Machine Learning

Authors: Ira Chaturvedi

Abstract: The rapid digitization of corporate finance and the increasing complexity of global regulatory frameworks have necessitated a shift from manual oversight to intelligent automation. This review article investigates the integration of Machine Learning algorithms within the SAP S/4HANA ecosystem to enhance financial compliance and reporting efficiency. By leveraging the SAP Business Technology Platform, organizations can move beyond traditional rule-based systems to implement real-time anomaly detection, automated intercompany reconciliations, and predictive financial closing processes. The analysis explores the technical architecture required to bridge the gap between transactional data and autonomous governance, highlighting the role of the Universal Journal as a single source of truth. Furthermore, the article addresses the strategic challenges of data orchestration, the necessity of Explainable AI for auditability, and the emerging role of Natural Language Processing in interpreting unstructured regulatory documents. As financial reporting transitions toward a continuous monitoring model, the synergy between ERP robustness and machine intelligence becomes a critical factor in reducing operational risk and ensuring transparency. The findings suggest that while intelligent automation significantly reduces the manual burden of compliance, a human-in-the-loop approach remains essential for maintaining ethical oversight and professional judgment. Ultimately, this review provides a comprehensive framework for organizations seeking to leverage SAP and machine learning to transform the finance function into a proactive strategic asset.

DOI: http://doi.org/10.5281/zenodo.18159753

Designing Scalable And Adaptive Cloud–IoT Ecosystems For Wireless Networks

Authors: Mehar Bediya

Abstract: The rapid expansion of the Internet of Things (IoT) and the increasing reliance on wireless connectivity have driven the integration of cloud computing into large-scale IoT ecosystems. While cloud-based solutions offer elastic resources and centralized management, the growing number of connected devices, heterogeneous workloads, and dynamic wireless conditions pose significant challenges in terms of scalability and adaptability. Traditional Cloud–IoT architectures often struggle to efficiently accommodate massive device connectivity, fluctuating data rates, and varying quality-of-service requirements. Consequently, there is a growing need for architectural designs that can dynamically scale resources and adapt system behavior in response to changing network and application conditions. This review paper provides a comprehensive analysis of scalable and adaptive Cloud–IoT ecosystem design for wireless networks. It examines foundational architectural models, wireless communication technologies, and cloud computing paradigms that support IoT deployments. The paper further investigates scalability challenges related to device density, data volume, network capacity, and resource provisioning, as well as adaptability mechanisms that enable context-aware, autonomous, and mobility-aware system operation. Key architectural approaches, including edge and fog computing, microservices, containerization, and serverless computing, are reviewed and compared. In addition, the paper discusses resource management, orchestration strategies, and critical considerations related to security, privacy, and reliability. Through a comparative analysis of existing solutions and an exploration of application domains, the review identifies current limitations, trade-offs, and open research challenges. The paper aims to guide researchers and practitioners in designing resilient, efficient, and future-ready Cloud–IoT ecosystems for dynamic wireless environments.

DOI: http://doi.org/10.5281/zenodo.18159755

Intelligent Financial Governance In SAP ERP Using Hybrid Machine Learning Models

Authors: Aarvik Bhatnagar

Abstract: Effective financial governance is critical for ensuring accuracy, transparency, compliance, and risk mitigation in enterprise resource planning (ERP) systems. SAP ERP provides robust financial and control functionalities; however, traditional governance mechanisms largely depend on static rule-based controls and manual audits, which are increasingly insufficient in handling high-volume, complex, and dynamic financial transactions. This paper proposes an intelligent financial governance approach for SAP ERP systems using hybrid machine learning models that combine rule-based logic, statistical methods, and advanced machine learning techniques. The proposed framework integrates seamlessly with SAP financial modules to enable real-time monitoring, anomaly detection, predictive risk assessment, and continuous compliance management. By leveraging hybrid model architectures, the approach balances adaptability and learning capability with transparency and regulatory interpretability. Practical use cases, including fraud detection, compliance monitoring, and predictive financial controls, demonstrate the effectiveness of the proposed solution. Experimental evaluation highlights the superiority of hybrid models over traditional rule-based and standalone machine learning approaches in terms of detection accuracy, false-positive reduction, and operational scalability. The findings indicate that hybrid machine learning models can transform financial governance in SAP ERP from a reactive control function into a proactive, intelligent, and strategic capability.

DOI: http://doi.org/10.5281/zenodo.18159759

Revisiting Factor Models After 2020: Machine Learning, Factor Stability, and Investment Performance

Authors: Oksana Anatolyevna Malysheva

Abstract: The new financial market environment after 2020, due to the COVID-19 shock, unprecedented monetary interventions, and increased macroeconomic uncertainty has cast new doubt on the reliability and persistence of the traditional models of asset pricing factors. Although classical factor models have traditionally been the basis of portfolio construction and the management of risk, there has been mounting evidence that factor stability can be lost in the face of structural regime changes. The paper reexamines previous post-2020 period factor models with specific focus on occupation of factor permanency and incremental importance of machine learning methods in explaining and predicting investment outcomes. The main aim of this paper is to evaluate whether the traditional risk factors hold their values and are economically significant beyond 2020 and to test the possibility of machine learning-based methods to predict better than traditional linear models to forecast the portfolio performance and results. The study builds standard factor portfolios with a wide equity universe over the post-2020 time sample, and it compares their performance to machine learning-based models that help to identify the nonlinear links and time-varying interactions between firm characteristics. The analysis methodology will be a combination of benchmark linear factor regressions with supervised machine learning algorithms, such as ensemble-based algorithms, applying consistent training and validation to these algorithms. Factor stability is determined with the help of rolling-window estimation and structural change analysis and investment performance with the help of risk-adjusted returns measures and transaction cost-adjusted portfolio performance. The results show that the stability and persistence of a number of conventional factors significantly decreased after 2020 and became more sensitive to market regimes. The models of machine learning have shown greater out-of-sample, and risk-adjusted returns, and the returns are not uniform across factors. The research provides empirical data on post-crisis factor behavior and provides a practical direction of applying machine learning in the integration of factored investment strategies in changing market conditions.

End-to-End Lifecycle Management Of Distributed Cloud-Native Systems

Authors: Ananya Iyer

Abstract: The rapid evolution of cloud computing paradigms has significantly accelerated the adoption of distributed, cloud-native systems grounded in microservices architecture, containerization, dynamic orchestration, and continuous delivery pipelines. Unlike traditional monolithic systems that rely on tightly coupled components and static infrastructure, cloud-native applications are deliberately engineered to leverage elastic scalability, resource abstraction, and automated infrastructure provisioning within highly dynamic cloud environments. Foundational platforms such as Docker and Kubernetes have enabled the development of portable, resilient, and self-healing workloads capable of operating consistently across heterogeneous infrastructures. These technologies facilitate container image standardization, declarative orchestration, automated scaling, and fault recovery. However, as deployments extend to multi-cluster, hybrid-cloud, and multi-cloud ecosystems, system complexity increases exponentially, making comprehensive lifecycle governance a significant technical and organizational challenge. End-to-end lifecycle management therefore encompasses not only architectural design and containerized development but also automated CI/CD pipelines, runtime orchestration, observability engineering, security integration, performance tuning, cost governance (FinOps), and systematic service decommissioning. This review synthesizes contemporary methodologies, architectural patterns, and operational frameworks that support lifecycle governance within large-scale cloud-native ecosystems. It critically examines cross-cutting paradigms including DevSecOps integration, Infrastructure as Code (IaC), GitOps workflows, service mesh architectures, policy-as-code enforcement, FinOps optimization, and AI-driven operations (AIOps). These paradigms collectively emphasize automation, declarative configuration management, continuous validation, and compliance-aware deployment strategies. Particular attention is devoted to runtime observability engineering, integrating metrics, logs, and distributed tracing to enable proactive monitoring and rapid fault isolation. Additionally, the review addresses emerging security imperatives such as software supply chain integrity, container image signing, zero-trust networking models, and runtime threat detection. By embedding governance mechanisms directly into CI/CD and orchestration pipelines, organizations can mitigate configuration drift, reduce operational risk, and enhance resilience in highly dynamic distributed environments. Furthermore, emerging directions such as platform engineering, internal developer platforms (IDPs), serverless-native orchestration models, eBPF-based deep observability, and autonomous remediation frameworks are analyzed as transformative drivers of next-generation lifecycle management. These innovations aim to abstract operational complexity, improve developer productivity, and enable predictive, self-optimizing infrastructure behavior. The study concludes that holistic lifecycle integration—rather than isolated adoption of discrete tools—is essential for achieving sustained operational resilience, regulatory compliance, energy-efficient infrastructure utilization, and continuous innovation in large-scale distributed ecosystems. By consolidating architectural principles, operational best practices, and forward-looking research trajectories, this review provides a comprehensive conceptual and practical framework for researchers and practitioners seeking to advance end-to-end lifecycle management strategies in modern cloud-native systems.

DOI: http://doi.org/10.5281/zenodo.18670338

Cloud-Native System Engineering For High Availability And Performance

Authors: Arjun Rao

Abstract: Cloud-native system engineering has fundamentally transformed the way modern software applications are architected, deployed, and managed across distributed computing environments. Unlike traditional monolithic models that rely on tightly coupled components and static infrastructure, cloud-native approaches embrace modularity, elasticity, and automation as core design principles. Built around technologies such as containerization, microservices architecture, declarative infrastructure, and automated orchestration, cloud-native systems are specifically engineered to operate efficiently in dynamic public, private, and hybrid cloud ecosystems. These systems are designed not only to scale horizontally in response to fluctuating workloads but also to maintain operational continuity in the presence of hardware failures, network disruptions, and unpredictable traffic surges. A primary objective of cloud-native engineering is to achieve high availability (HA)—ensuring minimal service downtime—and high performance (HP)—delivering low latency, high throughput, and efficient resource utilization. High availability is accomplished through architectural strategies such as redundancy, replication, self-healing mechanisms, intelligent load balancing, and fault isolation. High performance, on the other hand, is supported by horizontal scalability, caching strategies, observability-driven optimization, and automated resource management. Together, these characteristics enable resilient and adaptive distributed systems capable of sustaining mission-critical workloads. This review provides a comprehensive examination of the foundational architectural principles, including microservices decomposition and container orchestration; the enabling technologies that support scalability and resilience; and the operational frameworks that integrate continuous integration and continuous deployment (CI/CD). It further explores advanced performance optimization techniques, such as predictive auto-scaling and edge computing, alongside established resilience strategies, including circuit breaker patterns, chaos engineering, and service mesh architectures. Emphasis is placed on practical design patterns, reliability engineering practices, and the cultural integration of DevOps methodologies to achieve sustained operational excellence. By synthesizing current advancements and emerging trends, this review highlights how cloud-native system engineering is evolving toward autonomous, self-optimizing infrastructures. These infrastructures combine intelligent automation, real-time observability, and predictive resilience to meet the growing demands of large-scale, distributed applications.

DOI: http://doi.org/10.5281/zenodo.18670345

× How can I help you?