IJSRET » Blog Archives

Author Archives: vikaspatanker

IJSRET Volume 7 Issue 1,Jan-Feb-2021

Uncategorized

A Review of Intrusion Detection Systems
Authors:- Subhash Waskle, Associate Prof. Avinash Pal

Abstract:- An intrusion detection system (IDS) is devices or software’s that are used to monitors networks for any unkind activities that bridge the normal functionality of systems hence causing some policy violation. This paper reviews some of the intrusion detection systems and software’s highlighting their main classifications and their performance evaluations and measure.

Tapping into Geothermal Technology to Boost Electricity Supply in Nigeria
Authors:- Alabi A.A., Adeleke B.S. , Adekanmbi, A.O., Fawole T.G.

Abstract:- It is no more news that attention of humanity has shifted to the generation of energy through renewable energy sources. This paper is based on how Nigeria can tap into the use of geothermal technology other than other renewable energy sources to generate electricity using of the two available geothermal resources (hydrothermal and petrothermal) in available locations. Through hydrothermal plants the heat received from geothermal resources are converted to electricity. This is a technology that if efficiently utilized, can go a long way to make Nigeria electricity challenge a thing of the past.

Segregating Spammers from Social Digital Platform by Genetic Algorithm
Authors:- Rahul Kumar, Dr. Avinash Sharma

Abstract:- Presence of online Social digital platform in human life from past few decade influence advertiser to place their product in different style. Some of digital marketing companies plays a giant role for promoting a product, service, thought, etc. to social digital users. Digital platform do not want to lose their control so spammer who work professionally to promote a brand need to identify ad remove from the platform. This paper has work in this field of online social spammer detection by developing a unsupervised algorithm which identify the user class (Spammer or real) as per sequential behavior done. Proposed work utilized a intelligent water drop genetic algorithm for segregating the users into desired class. Some of digital platform inherent features of the user profile were used for finding the fitness class of the user to the corresponding class of user. Experimental work was done on real twitter dataset and comparison of proposed model was done with existing method of spammer detection. Results shows that proposed model has increased the accuracy of spammer detection.

An Evaluation of the Role Played By The Head Of School In The Delivery Of Quality Education In Zimbabwean Day Secondary Schools: A Case Study Of Guruve District
Authors:- Laison Jairus Kavumbura

Abstract:- Quality education is a critical phenomenon for the provision of quality human resources in any country. Quality education focuses on learning which strengthens the capacity of children to act progressively on their own behalf through the acquisition of knowledge in useful skills. Quality in terms of school products implies school graduates who are not just literate or numerate, but graduates who add value to their families, communities as well as nation through the knowledge, skills and morals they acquired from the school system. In Zimbabwe the parents, government and employers place a very high premium on the quality of education that schools provide to their learners. Certain schools are shunned because of their perceived low standards and yet others are sought after by many parents and students due to the quality of learning perceived to obtain in them. Quality therefore is about high standards of achievement by pupils in all spheres. Quality does not come about like manna from heaven. It is brought about in an organisation deliberately through the leadership process. This article draws on a quantitative enquiry on the role played by heads in the delivery of quality education in Zimbabwean Secondary schools. The study adopted the descriptive survey design. The target population included all secondary school teachers in Guruve district which has a teacher population of plus minus 18000 teachers. Random sampling was used to arrive at a sample of 200 respondents who were made up of 120 males and 80 females. All the information was collected through a questionnaire which had both close-ended and open-ended questions. Descriptive statistical analysis was used to interpret the data. The study revealed that heads did not encourage attendance by pupils to all lessons, there was inadequate provision of stationary and learning equipment and that supervision of learning was not adequately done by the heads. The study also reveals that heads were not results focused in their operations. The study recommends that heads of schools should be equipped with skills and knowledge in the field of leadership and management so that they promote quality education in their schools. Heads should also prioritise supervision of instruction and provision of adequate teaching/learning materials.

A Glass Fiber Compressive Strength Prediction Using Artificial Intelligence (ANN)
Authors:- Madhav Shrivastav, Prof. Sourabh Dashore

Abstract:- Concrete, being widely used, is the most important building material in civil engineering. Concrete is a highly complex material, which makes modeling its behavior a very difficult task. Many attempts were taken earlier to develop suitable mathematical models for the prediction of compressive strength and flexural strength of different concretes. Those traditional methods have failed to map non-linear behavior of concrete ingredients. The present study has used artificial neural networks (ANN) to predict the compressive strength and flexural strength of glass powder concrete. The ANN model has been developed and validated in this research using experimental strength data of different mixes. The artificial neural networks (ANN) model is constructed trained and tested (in MATLAB. For study models were developed. Strength was modeled in ANN model as a function of input data collected by the experimental result in laboratory. In this study, an attempt was also made to develop a multiple regression model for predicting strength (in EXCEL) as it is being used largely by researches in prediction. Finally, this model was used to predict the strength of concrete for different different days.

A Review of Glaucoma Detection Techniques
Authors:- Arkaja Saxena, Associate Prof. Avinash Pal

Abstract:- Glaucoma is one of the main causes of blindness today. It is basically a group of eye diseases that leads to the optic nerve damage and arises mostly due to the increases in the Intraocular Pressure (IOP) within the eyes. The early detection as well as diagnosis of this disorder is very important as at the later stages it leads to complete loss of vision.In this paper we reviewed different glaucoma detection procedures by digital image processing of fundus of eye. This paper also proposes a very simple method for the screening of glaucoma.

Concept Maps: Let’s Organize Your Speech
Authors:- Nirumala Rothinam, Hadidah Abdul Rahman

Abstract:- This research was to observe the effectiveness of concept maps in enhancing Matriculation students’ speaking ability in terms of organization and content. The specific objective of this research is to identify if concept maps could be an effective educational tool to improve students’ speaking scores according to the Malaysian University English Test (MUET) speaking scoring guideline. Participants of this research consist of 24 one-year Science program students. Data collections were done through pre-test and post-test. Data were analysed using descriptive analysis. Results of the analysis established that all the 24 participants showed an increase in the speaking scores after the intervention using concept maps. The research indicated that concept mapping is effective in supporting the organization of thoughts and content to produce verbal output thus producing a positive correlation between the use of concept maps and scores for participants’ speaking assessment.

A Review of Recommendation Techniques
Authors:- M. Tech. Scholar Pooja Relan, Asst. Prof. Avinash Pal

Abstract:- On the Internet, the place the number about
Decisions may be overwhelming, there will be necessity will filter, prioritize Also effectively convey important data so as on allay those issue of majority of the data overload, which need made an possibility issue will huge numbers Internet user. Recommenders techniques work out this issue by looking through huge volume for rapidly created majority of the data on furnish user with customize content and services. This paper investigates the separate aspects and potentials for distinctive prediction techniques clinched alongside recommendation techniques in place with serve concerning illustration a compass to Scrutinize and act in the field of recommendation techniques.

Published by:

Phd Paper Publication

Uncategorized

Research in any field need validation and publication in a reputed Journal does the same work. A scholar who is looking for Phd Paper Publication can submit in good impact factor journal having indexing in a reputed index provider as well. As per university/college requirement scholars should check criteria of journal scope of publication with language and cost of publication. This article further elaborates Phd Paper Publication Help under the following points:

  1. Check college / University requirement.
  2. Check ISSN number of the portal of ISSN.
  3. Website domain life / year should match date of registration.
  4. Each issue of the journal should have a good number of papers.
  5. Publication ethics should clearly mention the guideline of charges of paper, pages, authors, etc.
  6. Good journal should have a strong reviewer team to provide fast publication.
  7. People should inform their guide/mentor before submission in a journal.
  8. It was desired that the paper should be plagiarism free. So always check plagiarism before final submission of paper.
  9. Author name, designation department name, college name should be check as some time corrections need lot of time as journal avoid author name editing after acceptance.
  10. We suggest Phd Scholar to validate journal from different means by email, chat, virtual monitor for final selection of journal for publication.

Phd Journal Paper is important and plays important role in order to complete or earn a doctorate degree. I again suggest authors to take a review in front of mentor before submission as scholars. A number of issues rises for a phd journal paper once it gets publish like journal not matching the university or college requirement. Sometimes journals do not match the indexing requirement of college or Phd ordinance for the university. Hence to increase a number of publications in the initial phases of doctorate scholar can go with a light journal having a valid ISSN number but later they can approach to the good impact factor and good indexing journal. Publication fees of the journal also need to be check by the author before submission as cost of one paper may range from 30 USD to 1000 USD as per the type of journal. Once paper get submit then reviewer team check plagiarism of the paper which can keep a copy of the paper and failing a journal publication may harm you for rewriting a complete paper. Therefore scholars should always write a paper by its own thought as this never put one in plagiarism trouble. Writing a good paper as per Phd level is always full of valuable content like have an abstract describing the whole content, in short, a relevant introduction matching your paper problem, issues, good literature survey relevant to your objective work, good experimental section which justifies your proposed methodology. Finally conclude with words that scholars who search for how to publish a thesis paper should know that Phd work is hard, so select journal wisely as fees, time, indexing, the impact factor of journal helps you to justify your work.

Published by:

How to Publish A Review Paper

Uncategorized

Budding engineers of the nation or worldwide researchers need the journal that can evaluate their hard work of research and manuscript specifically based on their field. As a research starts from the survey so scholar wants to know how to publish a review paper in a good journal. As the point clarifies that, each for the judging and checking the research direction their evaluator. International journal of science and engineering that can select those review articles for publication need to be filtered as per college requirement. Review paper journal selection is a tough task as a variety of journals are found but the specific journal having all the qualities of high impact factor, low publication cost, open access publication, low article processing charges are hard to find.

Submit Your Paper  / Check Publication Charges

While selecting the article review journal for the publishing of the manuscript specially, the paper must be checked by the reviewer team. As the team must be constituted of experts, master or doctorates in the relevant domain f science and engineering with sufficient experience of the evaluation. With all these, there are few more points one should check to know resolve question regarding how to publish a review paper

  • Authorization: the first is to check whether the journal is authorized or not, for this, there must have a unique identification number present to that journal as every specific journal has. Also, this must be old enough to have an identity.
  • Fees: the journal should not charge extra fees for the processes after the registration, that is the publishing fees, accessing fees, certificates cost, extra pages, and extra authors charge.
  • Facilities: the journal must provide the facility of the open-access publication and the printing of the article or in case editing.
  • Certificates: the journal must provide certificates to each author or online certificates to the distant authors.

Releasing: the issuing of the journal must not be quarterly or yearly or half yearly, as the author had to wait too long.

Published by:

IJSRET Volume 6 Issue 6, Nov-Dec-2020

Uncategorized

Face Expression Recognition: A Review
Authors:- M.Tech. Student Palak Jain, Assistant professor Anamika Pyasi

Abstract:- Recognition of outward appearances assumes a significant job in many mechanized framework applications like mechanical technology, instruction, man-made brainpower, and security. Perceiving outward appearances precisely is testing. Approaches for explaining FERi(Facial Expression Recognition) issue can be ordered into 1) Static single pictures and 2) Image successions. Customarily, various procedures like Multi-layer Perceptron Model, k-Nearest Neighbors, Support Vector Machines were utilized by scientists for fathoming FER. These techniques removed highlights like Local Binary Patterns, Eigenfaces, Face-milestone highlights, and Texture highlights. Among every one of these techniques, Neural Networks have increased especially ubiquity and they are broadly utilized for FER. As of late, CNNsi(Convolutional Neural Networks) have picked up notoriety in field of profound learning in view of their easygoing engineering and capacity to give great outcomes without prerequisite of manual component extraction from crude picture information. This paper centers around review of different face demeanor acknowledgment methods dependent on CNN. It incorporates cutting edge techniques proposed by various scientists. The paper additionally shows steps required for utilization of CNN for FER. This paper additionally incorporates examination of CNN based methodologies and issues requiring consideration while picking CNN for unraveling FER.

Income Analysis of Census Database Using Pyspark
Authors:- Abhishek R., Pavan Dutt, Sahana S. R., Assistant Professor Dr.M.Sujithra M.C.A,M.Phil,Ph.D, Assistant Professor Dr.P.Velvadivu M.C.A.,M.Phil.,Ph.D.

Abstract:-The data set contains information about every individual’s age, education level and various other features from the census along with the income . The income feature is a categorical feature with two classes i.e., less than 50k dollars or greater than 50k dollars. The problem is to build a machine learning model that could effectively predict the income of people given the input features. Considering the size of the data and the dimension of the data, the model is built using Big Data Techniques.

Review of Machine Learning Algorithm on Cancer DataSet
Authors:- M. Tech. Scholar Animesh Urgiriye, Assistant Professor Rupali Bhartiya

Abstract:-Cancer is a basic disease from numerous years. This prompts demise in the event that it isn’t analyzed at beginning phase. It is a subject of concern on the grounds that genuine treatment of this infection isn’t found till date. Patients having this sickness must be spared if and just in the event that it is found in beginning phase (I and II). On the off chance that it is recognized in last stage (III and IV) at that point possibility of endurance is extremely less. AI and information mining strategy is exceptionally useful method to deal with this issue. AI is exhibiting the guarantee of creating reliably precise appraisals. AI framework successfully “realizes” how to assess from preparing dataset of finished activities. There are different procedures accessible in Machine Learning to foresee the Cancer based on gathered standard datasets. The datasets may have been recorded by web-based media, medical care sites and some different vaults. We have to apply a few classifiers of Machine Learning Techniques on these dataset to recognize the disease in a human. The primary point of the audit is to help the exploration on exact assessment, for example to ease different specialists for pertinent right assessment examines utilizing AI procedures. Our survey recommends that these procedures are serious with conventional assessors on datasets and furthermore show that these strategies are touchy to the information on which they are prepared.

Application of the Analytical Hierarchy Process (AHP) for Geo-Hazards Susceptibility Mapping:Urban Settlement Marquez De León, La Paz.,Mexico.
Authors:-Joel Hirales-Rochin

Abstract:- Geology as a tool to identify areas of geological risk is useful to determine the close relationship between thegeological Space and the sustain able urban development ofacity. Atthenational, regional and local level where the study are a is located, there is a growing need to create new urban areas, but these are not linked to an adequate analys is of the geological environment and the knowledge of the main factors that control risk conditions. The methodology was based on a characterization of the geological, hydro geological and geo mechanical conditions of one of the main urban settlements of the city of La Paz, capital of the state of Baja California Sur., Mexico. Therefore, using the Analytic Hierarchy Process (AHP) methodology it was generateda risk susceptibility map-related in local areas to flood events and landslides. The results represent the first stage of a larger scale project and with this; it is possible to contribute new knowledgeto be used in the most precisezoning of geographic risks, which will allow the state capital a sustainable growth of the population of the city. The improvement of current constructionst and ards and the corresponding zoning to anticipate their development in anorderlymanner.Finally, it is considered that this research´s type (urban settlementscale) provides ananalysis of the risk conditions where the citizen can locate in their community and know their conditions of civil protection, all the opposite of most risk studies that offer large- scale results and only offer a broaderview.

Website Development of Mudis Cooling
Authors:-Professor Jadhav P.D, Akshay Gade, Piyush Pipriye, Pranav Bansod,
Soham Badjate, Mohammed Mustafa

Abstract:- A website or web site is a collection of related network web resources, such as web pages, multimedia content, which are typically identified with a common domain name, and published on at least one web server. Notable examples are wikipedia.org, google.com, and amazon.com. Websites can have many functions and can be used in various fashions; a website can be a personal website, a corporate website for a company, a government website, an organization website, etc. A static website is one that has web pages stored on the server in the format that is sent to a client web browser. It is primarily coded in Hypertext Markup Language (HTML); Cascading Style Sheets (CSS) are used to control appearance beyond basic HTML. Images are commonly used to effect the desired appearance and as part of the main content. Audio or video might also be considered “static” content if it plays automatically or is generally non-interactive. A dynamic website is one that changes or customizes itself frequently and automatically. Server-side dynamic pages are generated “on the fly” by computer code that produces the HTML (CSS are responsible for appearance and thus, are static files). There are a wide range of software systems, such as CGI, Java Servlets and Java Server Pages (JSP), Active Server Pages and ColdFusion (CFML) that are available to generate dynamic web systems and dynamic sites The objective of this project is to prepare the static web site for Modi’s cooling, a dealer of cooling electronic appliances such as Air conditioning units, deep freezer, fruit freezer etc. The function of a web site to provide online information to the customer about the product available, the prices address and contact number of the dealer. For design of this web page HTML is used whereas for database and uploading SQL, MYSQL

Seismic Response Study of Multi-Storied Reinforced Concrete Building With Accordion Mass Dampers
Authors:-Mr. P. G. Kadwade, Prof. Zubair Shaikh, Dr G. R. Gandhe

Abstract:- Damping plays important role in design of earthquake resistant structures, which reduces the response of the structure when they are susceptible to lateral loads. There are many different types of dampers in use. In the present study accordion mass dampers (AMD) are used to evaluate the response of RCC buildings. The main task of a structure is to bear the lateral loads and transfer them to the foundation. In order to have earthquake resistant structures, accordion mass dampers (AMD) have been used. The building is modeled in ETAB 2018 and modeled with different location of AMD. After the study results show building having AMD on outer side shows better performance than building having other location of accordion mass damper.

Development of a Healthy Noodles Enriched with the Flavors of Coleus Aromaticus, Mentha, Erythrina Indica
Authors:- Suruthi B., Amutha A.

Abstract:- Noodles have been the staple foods for Asian countries since ancient time. They can be made from wheat, rice and other raw materials such as buckwheat and starches derived from potato, sweet potato and pulses. Normally, wheat noodles is enriched with protein, carbohydrates and fibre content. This study was conducted to add additional nutrients content to the wheat noodles by incorporating the powders of Coleus amboinicus (Omavalli leaves), Mentha (mint leaves) and Erythrina Indica (Kalyana murungai leaves). Omavalli leaves is used in curing cough, cold, stomach problems, indigestion etc. Mint leaves is used for easing queasy stomach, calming stress and anxiety etc. Kalyana murungai leaves is useful for treating cough, cold and is very good for women as it treats many ailments that women regularly face. People use to crush these leaves and eat in the normal mouth or boiled these leaves in the water and from cold, cough or fever. But not everyone like to have this. As we know, noodles is a food, with zero haters. So we have incorporated these flavours in noodles. This noodles is prepared with the composition of 55% wheat flour, 15% omavalli powder, 15% mint powder and 15% kalyana murugai powder.

Upfc Power Compensation with Power Generation Smart Grid
Authors:- Suresh Waskle, Mr. Lavkesh Patidar

Abstract:- The problem of power system to face many problem like as power quality, THD and stabailuty.in modern technology to use of FACT Devices, The FACT Device are many types these paper are present of UPFC power stability device oriented. For recent used many technique to improvement of UPFC performance and reduction of THD. We proposed Machine learning technique like as Fuzzy logic and shunt filter with transformer work as controller to controlling of power transient conditions.

A Review: Air Pollution Analysis System Using IOT
Authors:- KulprakashSingh Avatarsingh Mistry, Balaji Khansole Sir

Abstract:- In this paper we are getting to make an IOT Based pollution Monitoring System during which we’ll monitor the Air Quality over a webserver using internet and can display on webpage when the air quality goes down beyond a particular level, means when there are sufficient amount of harmful gases are present within the air like CO2, smoke, alcohol, benzene and NH3. It will show the air quality on webpage so that we can monitor it very easily. The main reason for increasing of pollution level are crop’s remaining burning, emission from the automobile, open defecation of smoke in atmosphere from the industries and burning of garbage openly. Internet of Things (IoT) based pollution system is employed to detect the present level of hazardous gases in the atmosphere. The IoT based pollution system will help us to fetch the info from any location where device is installed. By using the concept of IoT we can use multiple pollution devices at different locations and fetch the data to the web server.

Design and Analysis Of A Upqc Power Flow Control Using Distribution Transformer
Authors:- Bhavsingh Ajnare, Mr. Deepak Bhataniya

Abstract:- Unified power quality conditioners (UPQCs) allow the mitigation of voltage and current disturbances that could affect sensitive electrical loads while compensating the load reactive power. Diverse control techniques have been proposed to evaluate the instantaneous output voltage of the series active power filter of the UPQC but, in most cases, these controllers only can compensate a kind of voltage disturbance.

Construction of Runways by Soil Stabilisation/Recycling Technology Gmr Airport Hyderabad
Authors:- K.Hima Vamsi, K.V Prabhakar Rao

Abstract:- Rajiv Gandhi international airport servers as a important international Airport in south India.The RITES has done a comprehensive study of the Existing Pavement and identified the weak areas. Stabilization has been taken up in those areas. The total area of stabilization work is 7 Lakh Sqm which includes main runway, secondary runway and taxiway. Out of this 7 Lakhs Sqm Approximately 33(2,30,000 Sqm) Approximately 67% (4.70,000 Sqm) for relaying works.

Credit Card Fraud Detection using Autoencoders
Authors:- Saatwik Bisaria, Aryan Aditya Singh, Sarita Yadav

Abstract:- There are certain characteristics of fraudulent transactions that differentiate them from legitimate ones. Machine Learning algorithms recognize patterns in the data points which allow them to detect fraud transactions from legitimate ones, based on thousands of pieces of information, that sometimes may seem completely unrelated to a human being. In Machine Learning, problems like fraud detection are usually framed as classification problems —predicting a discrete class label output given a data observation. Autoencoders are special type of neural network architectures in which the output is same as the input. Autoencoders are trained in an unsupervised manner in order to learn the extremely low-level representations of the input data. These low-level features are then deformed back to project the actual data. An autoencoder is a regression task where the network is asked to predict its input (in other words, model the identity function). These networks have a tight bottleneck of a few neurons in the middle, forcing them to create effective representations that compress the input into a low-dimensional code that can be used by the decoder to reproduce the original input.

Enhanced MalJPEG: A Novel Approachfor the Detection of Malicious JPEG Images
Authors:- Nasla K, Shabna M

Abstract:- In recent year cyber-attacks are increased.The attackers targeting individuals, businesses and organizations. Such attacks usually result in critical harm to the organization, such as the loss and or leakage of sensitive and confidential information. Some non-executable files allow an attacker to run arbitrary malicious code on the targeted victim machine when the file is opened. Millions of people are used images for daily purpose. In some cases, some types of images can contain a malware codes and perform harmful actions. JPEG images are used by almost everyone, from individuals to large enterprises, and on various platforms;Because cyber criminals misuse JPEG image for malicious purpose. In this paper, we design a new method is named as Enhanced MalJPEG. Our system can to detect malicious JPEG images using CNN and machine learning techniques. This method extracts different features from the JPEG file structure and CNN based features from JPEG file and leverages them with a machine learning classifier, in order to discriminate between benign and malicious JPEG images.

RPL: IPv6 Routing Protocol for Low Power and Lossy Networks
Authors:- Shubham Saini

Abstract:- Today, LLn represent most important (interesting) research areas in wireless sensor networks. In which we study about wireless personal area, networks and wireless sensor network these network use to save energy high performance, support traffic network (Pattern). it run on a routing over link layer with restricted frame size and many other. this paper represent protocol performance in smart grid applications based on it.which is design for overcome routing issues in llns.it implements to reduces of energy consumptions such as dynamics sending rate of control messages and addressing topologies which is send packets.it support not only of traffic pattern but also support traffic following from a gateway node to all other network. this paper focus on Rpl and wireless sensor networks of brief overviews.

A Survey of Adaptive Steganographic Methods
Authors:- Amina S, Mubeena A K

Abstract:- Image steganography is a method used to hide data within an image.The most common image steganographic methods can be divided into three categories namely naive steganography,adaptive and deep learning based embedding.Among these adaptive steganography is the most commonly used practical method naw days.This method not only improves the security of embedding message in an image but also uses efficient steganographic codes.In this paper,we compare various adadptive steganographic method that are currently used and also compare them with the deep learning based methods using various convolutional neural networks.

Study of Hardness and Wear Analysis in AL-SI Alloy (AL-5%SI, AL-11% SI and AL-17%SI) Along With Microstructural Analysis
Authors:- Kajal Shakya, Prof. Krishana Bhushan Patel

Abstract:- In this study, there is an alloying element named as silicon is studied with its effect when varied through Al composition. As silicon is used for making alloy harder and it evident since the last few years there has been a rapid increase in the uses of aluminum-silicon alloys, particularly in the automobile industries, because it has the high strength to weight ratio, high wear resistance along with low density and low coefficient of thermal expansion. Hence, advancements in the field of application make the study of their wear and tensile behavior of utmost importance in this present investigation, Al-based alloys containing5%, 11% and 17% weight of Silicon were synthesized using casting method. Compositional analysis and hardness along with wear analysis performed for different samples of same composition have shown near uniform distribution of Si in the prepared alloys. Study of microstructure has showed the presence of primary silicon. Wear tests were carried out to check whether there will be any change in mechanical property as well as strength ie high hardness with increase in silicon percentage. Wear behavior was studied by using computerized pin on disc wear testing machine. Resistance to wear has increased with increase in silicon amount.

Practical approach for energy audit in Residential building
Authors:-Saurabh Bansal, Asst. Prof. Neeraj Kumar Kumawat

Abstract:- Energy consumption increasing day by day and energy production using conventional sources becomes limited. To reduce this energy consumption and for maximum utilization of energy, energy audit for residential building is playing vital role these days. By adopting this energy audit survey we can minimize the use of energy consumption. The energy audit surveys are mainly done for industries. But now a day’s energy consumption is also increasing in residential building. So it is essential to adopt energy audit surveys for residential buildings too. This paper suggests the ways how we can minimize the losses and reduce the electricity bill for residential building. The paper is also useful for consumers as electrical energy audit survey is explained with procedure.

A Review of Fatigue Detection Techniques
Authors:- Shalu, Nahan Rahman M K

Abstract:- Road accidents are increasing tremendously and accident causing factors include over speeding, violating traffic rules, fatigue driving etc. Fatigue driving is due to inadequate sleep or physical state of driver is not good. Many researches have been taken place for detecting fatigue while driving. This paper describes the methods that already implemented and analyse the best method that is much accurate compared to others. The methods include machine learning, deep learning algorithms. In the algorithms single facial features, multiple facial features, physiological features are used for detection.

Comparative Study Evaluating METEONORM Estimates of Sunshine Duration and air Temperature in Major Cities of Mali
Authors:- Moussa Ibrahim MAIGA, Cheick Oumar SANOGO, Souleymane SANOGO

Abstract:- The successful implementation of renewable energy project relies on the climatic data available in the site. Due to the scarcity of climatic station data, various estimation databases are proposed as an alternative. In this work, we performed an evaluation of METEONORM estimations of sunshine duration and air temperature by comparing them with stations records for some selected cities in the semi-arid zone of Mali, which are Bamako, Nara, Sikasso, Segou and Mopti. The results from the comparative study reveal that the METEONORM estimate of temperature has a very good correlation coefficient with the station record for all the cities. The bias and the root mean square error are very weak and do not exceed 1.5% of the reference values. The results of the sunshine duration show some difference between the two datasets with a maximum bias of 24.73 hours per month and a correlation coefficient that oscillates between 0.76 and 0.98. The semi-arid zone of West Africa being a region with less meteorological data records, it is advisable that METEONORM dataset could be used as an alternative for study energy systems.

LSTM Based Personality Prediction from Social Media
Authors:- Thahira M, Shafna K P

Abstract:- The usage of social media networks are increasing rapidly. Which are used as a platform to share People’s feelings, emotions and experiences etc. This Proposed method predict the person’s behaviour from social media networks. Personality prediction from social media networks are become a challenging task. This method follow the big-five-factor model (OCEAN) namely, openness to experience (O), conscientiousness (C), extraversion (E), agreeableness (A), neuroticism (N) for defining personality. Here the mathematical regular expression operation is used for the data preprocessing. There are three feature selection algorithms such as Pearson correlation coefficient (PCC), information gain(IG) and chi-squared (CHI) method are used for the relevant features. Deep learning neural network such as LSTM is used as a classifier for predicting personality of a person. This Proposed method improves the accuracy of personality prediction compare to other existing system.

Reduction of Iron Oxide using Microwave Irradiation
Authors:- Ravindra Kumar Verma, Prof. Krishana Bhushan Patel

Abstract:- The reduction of iron ore with carbon was investigated using a microwave heating techniques. The heat generated by the reaction mixtures while interacting with microwave, percentage, chemical composition and microstructure of iron produced were studied in detail. The experiments were carried out using 2.45 GHz microwave processor and reaction rates were analyzed at different power ratings: 540, 720 and 900 watts. The maximum reduction in weight obtained was 50.47% at 900 W power supply. The effect of varying the concentration of binders was also studied. Unlike conventional processing the microwave heating was found to be through the absorption of microwaves by reaction mixtures. The microwave processing showed considerable reduction in reaction time increases the yield and also reduces unwanted side reactions. However it showed uneven heating as the heating is due to the distribution of microwave absorbers present in the reaction mixture. Solid state reduction was observed at initial 10-40 minutes and molten iron produced above 40 minutes and the temperature attained was around 8000C. The microwave reduced mixture were characterized using SEM, EDS and XRD technique to find out the reduction of hematite. After the EDS analysis, it was found out that the iron content formed after the reduction process was 46.23 wt %.

An Intelligent Recommendations on Mobile Pose Identification
Authors:- Fahisa Pallikkattil, Asst. Prof. Shabna.M

Abstract:- These days MEMS sensors like accelerometer, gyroscope, and magnetometers are spreading in a wide range of applications due to its smaller size, cheapness and expanding execution. For occasion, smartphones are right now prepared with these kind of sensors. Which may well be utilized to make strides the client involvement of the phone itself or the route functionalities. In this work, these sensor measurements are exploited to provide advanced information about the user bringing the phone. Here proposed an intelligent concept is applying on the mobile web browser. Depending upon the state of the user detected by sensor, the intelligent web browser offer assistance to associate the client and can consequently recognize the textual size estimate and brightness. Light alteration is according to the brightness. These are the applications that we will perform by utilizing our proposed strategy. For the proposed framework a web application is utilized in both server side and user side. The intelligent mobile browser concept offer assistance to associate the recognized information that collected by sensor.

Solvent Extraction Study of Injection Moulded M2 High Speed Steel Using Palm Stearin/Waste Rubber Based Binder
Authors:- M.A.Omar, N. Wahab

Abstract:- Metal Injection Moulding (MIM) has undergone development of various binder systems with the aims of shortening the overall debinding time duration. In the present work, a novel binder system based on waste rubber has been utilised in injection moulding of Molybdenum High Speed Steel (M2 HSS). The feedstock consisted of M2 HSS powder with mean diameter particle size of 16µm and binder which comprised of palm stearin, polyethylene, waste rubber and stearic acid. The moulded part was immersed into n-heptane at 60°C in order to remove the paraffin wax and stearic acid, followed by sintering in a controlled vacuum atmosphere. Results showed that solvent extraction debinding technique allowed complete removal of paraffin wax and stearic acid from the injection moulded part within 2 hours without swelling or distortion of the debound part. Scanning Electron Microscopy observation showed that large pores were formed from the surface to the interior of the debound part during the process. In addition, this technique was found to be suitable to shorten the debinding time, which consequently resulted in a debound part.

Collation: Features Extraction in Text Classification
Authors:- Shireen MT, Nahan Rahaman MK

Abstract:- In the last few years, a difference of deep learning models has been applied to natural language processing (NLP) to improve the ability of computers to understand human speech as it is spoken. NLP helps to analyse, understand, and derive meaning from human language in a smart and useful way. For impressive performance of deep learning methods on challenging NLP processing problems we use some text classification features extraction technique.it means that distribution representation for text or words that allows the words with same meaning to have similar representation as real valued vectors in a predefined vector space. In this paper we are comparing the learning technique like Bag of words (BOW), Term frequency-inverse document frequency(tf-idf), word2vec, Glove in word embedding and also explaining the advantage and disadvantage.

Enhanced QR: Approaches for QR Code Embedding Techniques
Authors:- Swathi Krishna P S, Meera K

Abstract:- In recent years, QR codes have grown more widespread in facilitating digital-based commercial scenarios like product promotion, mobile payment, and product information management. These 2D barcodes are square-shaped matrices of dark or light pixels employed to encode and promptly retrieve data utilizing computer devices. According to the international standards, quick response (QR) codes are considered an advancement from older, unidimensional barcodes. Traditional QR codes are reliable and fast to decode but lack aesthetic appearance to demonstrate customers’ visual information. This paper explains various methods of data to embed data QR codes. In order to minimize processing time, the optimization technique considers the mechanics of a standard binarization method, genetic algorithm, etc. These embeddings are suitable with standard decoding and can be applied to any color images with full area coverage.

Design of College Chatbot using Amazon Web Services
Authors:- Dhanush Pakanati , Gourav Thanner , R. Ravinder Reddy

Abstract:- As the mobile and web-based applications have increased rapidly there is a growing need for chatbots. A chatbot helps in easy navigation through a website, simplifies the process of searching information and helps in understanding the needs of the customer. Over the years, the world has seen multiple uses of chatbots implemented in banking and e-commerce platforms. Inspired by these examples, a chatbot for college website can provide various functionalities to the students, lecturers, and visitors. This chatbot can provide information like announcements, quick links to various subjects in the site, account related information for registered users. Students and lecturers can mostly use this to access their college portals to check numerous things like attendance, examination results, assignments deadlines and timetables etc. This deviation from traditional search capabilities through a website can reduce the search time and can make accessing information easier. It also provides an engaging user interaction and imitate real life conversations for the users. Also, such functionalities implemented via cloud are economical and easy to update.

Review Article Improvement Of Power Flow And Voltagestability Using Upfc With Artificial Neural Network In Matlab
Authors:- Bipul vats Khurana. Dr.L.S.Titare

Abstract:- The increasing pressure on the power system increases the complexity that is becoming a concern for the stability of the power system and mainly for transitory stability. To operate the system in the event of faults, Flexible AC Transmission System (FACTS) devices that provide opportunities to control the power and damping oscillations are used. This paper presents the enhancement transient stability of the Multi-Machine power system (MMPS) with Unified Power Flow Controller (UPFC) by using Artificial Neural Network (ANN) controller. Performance the power system under event of fault is investigating by utilizes the proposed the strategy to simulate the operational characteristics of power system by the UPFC using Artificial Neural Network (ANN) controller. The simulation results show the behavior of power system with and without UPFC, that the proposed (ANN) technicality has enhanced response the system, that since it gives undershoot and over-shoot previously existence minimized in the transitions, it has a ripple lower. The use (MATLAB R2014a) in all simulations carried out.

Online Toxic Speech: Automatic Detection Methods and Techniques
Authors:- Asmi P, Sanaj M S

Abstract:- Nowadays, due to the increase of social media individuals are freely to communicate and also to express their thoughts of viewspublicly.It may be a text including blog post, updated status or comments posted on the social media. Some of them misuse the freedom of speech by harass in got hers. With the exponential growth of online communication, the hate speech behavior also goes unchecked to alarming proportion. Speech may be normal, hate or offensive. Hate speech or toxic speech is an antisocial behavior. Thus, it is important to detect and remove the toxic or hate speech from the social media. Which is also a challenging problem. This paper gives a brief explanation about different toxic speech detection methods.

Review: Methods of Steganalysis Of Digital Images
Authors:- Muhsina Jasmin Parapparambil, Haseena P.V

Abstract:- Nowadays cybercriminals excavate malicious data to your devices in different ways. In such cybercrime, the use of steganography needs an effective technique. Cryptography consists of a scrambled message that is not easily understandable. The main aim of steganography is to hide the data or information, by embedding it into an image, audio, video, or text files. So, unauthorized users cannot access the hidden information. The study of steganography is called steganalysis, which is used to detect hidden messages. So, this paper gives a comparative study between different methods used for the steganalysis process. The comparison network is based on digital images. This method is the best challenge for digital forensic investigation.

Reduction of Iron Oxide using Microwave Irradiation
Authors:- Ravindra Kumar Verma, Prof. Krishana Bhushan Patel

Abstract:- The reduction of iron ore with carbon was investigated using a microwave heating techniques. The heat generated by the reaction mixtures while interacting with microwave, percentage, chemical composition and microstructure of iron produced were studied in detail. The experiments were carried out using 2.45 GHz microwave processor and reaction rates were analyzed at different power ratings: 540, 720 and 900 watts. The maximum reduction in weight obtained was 50.47% at 900 W power supply. The effect of varying the concentration of binders was also studied. Unlike conventional processing the microwave heating was found to be through the absorption of microwaves by reaction mixtures. The microwave processing showed considerable reduction in reaction time increases the yield and also reduces unwanted side reactions. However it showed uneven heating as the heating is due to the distribution of microwave absorbers present in the reaction mixture. Solid state reduction was observed at initial 10-40 minutes and molten iron produced above 40 minutes and the temperature attained was around 8000C. The microwave reduced mixture were characterized using SEM, EDS and XRD technique to find out the reduction of hematite. After the EDS analysis, it was found out that the iron content formed after the reduction process was 46.23 wt %.

Impact of Online learning during Covid-19 – An Empirical Investigation
Authors:- Mateen Yousuf

Abstract:- Online education changes the pedagogy and components of conventional teaching. Research conducted on the issues and challenges faced in online teaching learning process have raised many issues in online education. Covid-19 has enabled access to online education to masses which gave rise to new challenges previously unknown to researchers. Review of literature has identified many issues but the research seems to be incomplete. This research aims at identifying the trends, issues and challenges faced by students and teaching instructors during Covid-19 during their access to online education. Issues faced by students and teaching instructors include technical issues, psychological issues, sociological issues, health issues, time management, lack of training, issues related to content and interface of electronic gadgets and educational applications. To mitigate these problems, schools need to provide training to the instructors, rope in psychologists, doctors, health experts and private players to address various genuine concerns. Technical support to instructors must be provided as well help in content development.

Non Orthogonal Multiple Access: A Survey
Authors:- Reshma Ramachandran , Radhika P

Abstract:- The densification of portable organizations should empower the fifth generation (5G) versatile organizations to adapt to the regularly expanding interest for higher rate traffic, improved reliability and reduced latency. Non-Orthogonal Multiple Access (NOMA) has as of late arose as a potential access conspire for the fifth era of portable frameworks. It comprises in exploiting another domain for power domain, user multiplexing, by exploiting the channel gain difference between paired clients on the equivalent subcarrier. User partition is done at the recipient side, utilizing Successive Interference Cancellation (SIC). Thusly, NOMA can expand normal framework throughput by over 30% compared to orthogonal signalling, while additionally improving cell-edge user experience. Additionally, NOMA verifiably fortifies the reasonableness between clients situated in a similar cell, and evades the underutilization of subcarriers experienced when a cell-edge client is planned alone utilizing OFDM. In this paper we are discussing techniques, features of NOMA.

RPL:IPv6 Routing Protocol for Low Power and Lossy Networks
Authors:- Shubham Saini, Tarun Dhiman

Abstract:- Today, LLn represent most important (interesting) research areas in wireless sensor networks. In which we study about wireless personal area, networks and wireless sensor network these network use to save energy high performance, support traffic network (Pattern). it run on a routing over link layer with restricted frame size and many other. this paper represent protocol performance in smart grid applications based on it.which is design for overcome routing issues in llns.it implements to reduces of energy consumptions such as dynamics sending rate of control messages and addressing topologies which is send packets.it support not only of traffic pattern but also support traffic following from a gateway node to all other network. this paper focus on Rpl and wireless sensor networks of brief overviews.

Analytical Study on Automobile Engine Line Work Stations and Analyze Their Working
Authors:- Anupam Pandey, Prof. Krishana Bhushan Patel

Abstract:- In an automobile assembly line, a series of stations are arranged along a conveyor belt and an automated guided vehicle performs on tasks at each station. Parallel assembly lines can provide improving line balance, productivity and so on. Combining robotic and parallel assembly lines ensure increasing flexibility of system, capacity and decreasing breakdown sensitivity. Although afore mentioned benefits, balancing of robotic parallel assembly lines is lacking – to the best knowledge of the authors- in the literature. Therefore, an observed study is proposed to define/solve the problem of automobile assembly line. The automobile assembly line also tested on the generated benchmark problems for automated guided vehicle/robotic parallel assembly line balancing problem. The superior performances of the proposed algorithms are verified by using a statistical test. The results show that the algorithms are very competitive and promising tool for further researches in the literature.

Use of Open Source Applications in Higher Learning by Prospective Computer Science Teachers in Abubakar Tafawa Balewa University, Bauchi-Nigeria
Authors:- Sadiq Adamu , Jonathan Johnson Kuba

Abstract:- This study investigated the use of open source application in higher learning by prospective computer teachers. Colleges and universities are increasingly aware of the necessity to use technology to meet both the business and academic mission of the institution. Often, open source software (OSS) and Free Source Software (FSS) are seen as viable options for meeting these challenges. Many Institutions are recognizing the importance of the interplay or overlap between FSS and OSS as an important feature for providing high quality teaching and educational experiences. Descriptive survey research design was used, which typically employs the use of questionnaire, sampling random sampling was adopted, where 79 respondents were as the sample size of the study. The finding of the research shows that the prospective teachers of computer education in ATBU are aware of the open source application, but lack of awareness about the uses and benefits of open source software, is a large factor towards less use of open source software. Factors inhibiting the optimal utilization of open source Application by prospective computer science teachers are: Unfamiliarity, Complex licensing situation, backward compatibility issues, Component and architecture incompatibilities and Migration and usage. The Findings of this study serves as the basis for making the following recommendations: Educational institutions should not spend huge money on proprietary software and Universities should replace the proprietary software by open source software for saving the money of license renewal fee, up gradation charges etc. to encourage the use, accessibility and benefits of Open Source Software by student, The school website should be linked to Datamation which highlights a list of open source software related to a particular category such as security, cloud computing, small businesses, big data, games, etc.

Machine Learning Based Defensive Alerting System in a Vehicular Network: A Survey
Authors:- Raseela.KP, Sreevarsha.V

Abstract:- Reckless driving accounts for most of the road accidents, consistent monitoring of reckless maneuver and timely activation of corrective feedback are the best remedial here comes the significance of a defensive alerting system in a vehicular network ,which examines the vehicle throughout whether it showing any reckless behavior in driving ,this timely monitoring duty is reserved for its neighbor vehicle and the neighbor vehicle sends the reckless alert to the road side unit which in turn sends to the cloud server. This cloud server generates warning alerts to approaching neighboring vehicles in that road segment .machine learning algorithms like support vector machine and decision tree are used to classify vehicular datasets .this server client based system implemented in a traffic simulator for evaluation.

Channel Estimation and Beam Squint For Wideband Mmwave Massive Mimo-Ofdm Systems A Survey
Authors:- Vishnu Priya P, Vipin Krishnan C V

Abstract:- Millimeter-wave (mmW) frequencies somewhere in the range of 30 and 300 GHz are another wilderness for cell correspondence that offers the guarantee of significant degrees more noteworthy data transmissions joined with additional increases by means of beamforming and spatial multiplexing from multi component reception. The mix of millimeter-wave interchanges, exhibits with a large number of recieving wires, and little cell calculations is a assembly together of advances that can possibly improve remote access and throughput. The exhibition of multiple input multiple output (MIMO) frameworks is vigorously influenced by pilot contamination. A low-unpredictability channel assessment for mixture millimeter wave (mmWave) frameworks, where the quantity of radio frequency (RF) chains is considerably less than the quantity of reception signal prepared at each handset. The attainable spectral efficiency (SE) of MIMO transmission frameworks with spatial wide band effect structures dependent on discrete fourier transform (DFT) handling, where the base station (BS) has amazing channel state data and baseband preparing is performed by zero-forcing precoding. Transmission plot that abuses the spatial levels of independence from enormous reception apparatus exhibits to amplify the downlink whole pace of user in a heterogeneous organization. With the expanding size of recieving clusters in wideband millimeter-wave (mmWave) interchanges, the actual engendering deferrals of electromagnetic waves bridging the entire exhibit will turn out to be huge and equivalent to the time-domain test period and update channels with a fundamentally limited quantity of preparing and user input in FDD frameworks.

Synthesis, Characterization and Wear Behavior of Co0.5 CrCu0.5 Fe Ni1.5 Al Ti0.4 and Co Cr Fe Ni Al0.25 Ti0.75 High Entropy Alloy (Hea) Prepared by Mechanical Alloying
Authors:- Rajeev Kumar, Prof. Krishana Bhushan Patel

Abstract:- Structure-tribological property relations have been studied for two high entropy alloys (HEAs). Microhardness, room temperature sliding friction coefficients and wear rates were determined for two HEAs: Co0.5CrCu0.5Fe Ni1.5AlTi0.4 and Co Cr Fe Ni Al0.25 Ti0.75. Wear surfaces were characterized with scanning electron microscopy and micro-Raman spectroscopy to determine the wear mechanisms and tribochemical phases, respectively. It was determined that the both HEAs exhibit an excellent balance of high hardness and lower wear rates compared to 440C stainless steel, a currently used bearing steel. This was attributed to their more ductile body centered cubic (BCC) solid solution phase along with the formation of tribochemical Cr oxide and Ti oxide phases, respectively, in the wear surfaces. This study provides guidelines for fabricating novel, low-friction, and wear-resistant HEAs for potential use at room and elevated temperatures, which will help reduce energy and material losses in friction and wear applications.

Study of Microstructure and Hardness Along With Compression Test of Heat Treated Aluminium 2014 Alloy
Authors:- Dharmendra Kumar Kumhar, Prof. Krishana Bhushan Patel

Abstract:- Microstructures, hardness and true stress strain through compression test have been studied for for Aluminium 2014 alloy. Heat treated surfaces were characterized with scanning electron microscopy (SEM) and optical microscopy to determine the mechanisms and phases. It was determined that the heat treated alloy with aging of 3 hours and 6 hours shows an excellent balance of high hardness and lower strain rates compared to non heat treated Al alloy. This was attributed to their more ductile body centered cubic (BCC) solid solution phase along with the formation of Mg2Si phases. The XRD analysis of non heat treated 2014 alloy shows the distribution of Mg2Si in Alloy as a measure element for strengthen the alloy. This study provides guidelines for fabricating novel, high compressive strength, and high hardness Al 2014 alloy for potential use where low weight high strength required.

Online Task Allocation and Flying Control in Fog-Aided Internet of Drones: A Survey
Authors:- Jobin Mathew , Deepa T

Abstract:- Internet of Drones (IoD) networks utilize mist hubs to give processing assets to the postponement touchy assignments offloaded from drones. In IoD networks, drones are dispatched to finish an excursion wherein a few areas of interest are visited. At every area, a robot gathers the ground data, creates figuring assignments and offloads them to the haze hubs for preparing. In our work, we think about both the errand designation (which conveys undertakings to various mist hubs) and the flying control (which changes the robot’s flying velocity) to limit the robot’s excursion fruition time obliged by the robot’s battery limit and assignment consummation cutoff times. We detail this joint streamlining issue as a blended number non-direct programming (MINLP) issue. Regarding the handy situation that the future undertaking data is hard to acquire, we plan an online calculation to give techniques to task assignment and flying control when the robot visits every area without knowing what’s to come. The exhibitions of our proposed online calculation are shown by means of broad recreations.

Electro Chemical Machining Of Micropin Tool by Using Ultrasonic Vibration PolishingAluminium 2014 Alloy
Authors:- Vivek Mishra, Prof. Krishana Bhushan Patel

Abstract:-Micro Electric chemical Machining (MECM) is one of the most efficiently employed non-traditional machining process for cutting hard-to-cut materials & to cut geometrically complex shapes that are difficult to machine by conventional machines. In the present paper reviews is conducted of experimental investigations carried out to study the effect of Electric chemical Machining parameters on material removal rate (MRR), electrode wear (EWR), surface roughness (Ra) and diameteral overcut n corrosion resistant stainless steels. The non-contact machining technique has been continuously evolving from a mere tool and die making process to a microscale application machining alternative attracting a significant amount of research nterests and Electrochemical machining offers several special advantages including higher machining rate, better precision and control, and a wider range of materials that can be machined.

Utilization of Fly Ash in Bitumen And In Flexible Pavements
Authors:- M.Tech. Scholar Asif Ahmad Lone , Assistant Professor Chitranjan Kumar

Abstract:- Flexible pavements with bituminous surfacing are widely used in India. Exponential increase in traffic, overloading of commercial vehicles and significant variations in daily and seasonal temperatures have shown some limitations of conventional bitumen performance.Early developments of distress symptoms like cracking, rutting, raveling, undulations, shoving and potholing of bituminous surfacing have been reported for flexible pavements.A bituminous mixture needs to be flexible enough at low service temperatures to prevent pavement cracking and to be stiff enough at high service temperature to prevent rutting. Bitumen modified with fly ash offers a combination of performance related benefits as the physical properties of the bitumen is improved without changing the chemical nature of it.This paper presents the experimental study carried out conventional bitumen and fly ash modified binder. It has been shown that marshal stability, flow value, ductility, rutting resistance, indirect tensile strength and resilient modulus of the bituminous concrete mix with fly ash modified bitumen is significantly improved.The advantage with fly ash is it is easily available and their cost low and it is a waste material.These additives increase the elasticity, decrease the brittle point and increase the softening point of the bitumen. This, in turn, will alter the properties of the mix in which such modified bitumen is used and these mixes will exhibit greater stiffness at higher temperature and high flexibility at low temperatures.

Product Development Hand Rail Assisting Walking Cane for Physically Aid
Authors:- Bankapalli Vamsi, MD Affan, Kancharana Sohith, Sasubilli Rakesh Rao

Abstract:- One of the basic problems of the user with conventional walking cane is overcoming the balancing problems in congested areas (i.e. Non-spacious regions such as bathrooms, offices, Indian middle class houses, etc.). Even though many research studies have been reported in different fields to increase the independence of users, the question of overcoming these problems always remains a topic of discussion for many researchers. Our project mainly concentrates on the difficulties encountered during walking and to lay for a support to hold on something in non-spacious regions. This idea is truly based on capital involvement to buy different kind of things many a times. Ending up with one tool that can solve our basic needs is better concern. Some time was spent on the project to fix the metrology regarding the dimension, and having a tough sketch the CAD models is done Autodesk fusion 360 and Dassault CATIA software. This structure and mechanism will analyze in Ansys software. All the design parameters of the product were based on the standard design of the walking cane in India. The major part of the project focuses on the proposed design concept and concludes by discussing the physical working model of the proposed design.

A Student Network Model for Image Classification
Authors:- Saleema N P, Sruthy K G

Abstract:- – Nowadays, Convolutional Neural Network achieved remarkable changes in image classification. To obtain the demanding precision of the categorized image we need a high-performance GPU and Huge datasets are necessary for training images. Image classification is computationally very expensive since it requires high-performance hardware devices and memory storage. So to tackle this issue we propose a student network model by utilizing the Knowledge Distillation technique, Let small networks learn from big teacher networks with accuracy compete with teacher networks.There exist many methods for trimming the convolutional neural network and designing a small network. But all these techniques are very expensive and have not achieved great results. The proposed model addresses the aforementioned issues effectively.

Face Expression Recognition : A Review
Authors:- M.Tech. Scholar Vaishali Sharma, Asst. Prof. Vijay Yadav

Abstract:- Recognition of out ward appearances assumes a significant job in many mechanized frame work applications like mechanical technology, instruction, man-made brainpower, and security. Perceiving outward appearances precisely is testing. Approaches for explaining FER (Facial Expression Recognition) issue can be ordered nto 1) Static single pictures and 2) Image successions. Customarily, various procedures like Multi- layer Perceptron Model, k-Nearest Neighbors, Support Vector Machines were utilized by scientists for fathoming FER. These techniques removed highlights like Local Binary Patterns, Eigenfaces, Face-milestone highlights, and Texture highlights. Among every one of these techniques, Neural Networks have increased especially iubiquity and they are broadly utilized ifor FER. As of late, CNNs (Convolutional Neural Networks) have picked up inotoriety in field of profound learning in view of their easygoing engineering and capacity to give great outcomes without prerequisite of manual component extraction from crude ipicture information. This paper centers around review of different face demeanor acknowledgment methods dependent on CNN. It incorporates cutting edge techniques proposed by various scientists. The paper additionally shows steps required for utilization of CNN for FER. This paper additionally incorporates examination of CNN based methodologies and issues requiring consideration while picking CNN for unraveling FER.

Comparative Study on Environmental Pollution through Software Techniques
Authors:-Assistant Professor C.Brintha Malar, Associate Professor K.Siva Sankar

Abstract:- Water pollution is one of the serious threats to the society, as water is the primary need of every organism thriving on earth. It is necessary to control and detect water pollution by assessing the quality of water. However, the production of wastewater is always there and is inevitable. Hence, it is equally important to treat the wastewater in a better way, such that the environment is not affected. The pollution control board has formulated certain standards, which provides the range of values for each pollutant and the feasible discharge locations. Taking these standards as the input for training the system, this work extracts basic statistical features such as mean, standard deviation, entropy and variance for training the classification system. The ensemble classification is incorporated, which includes k-Nearest Neighbour (k-NN), Support Vector Machine (SVM) and Extreme Learning Machine (ELM). The performance of the proposed approach is evaluated in terms of accuracy, sensitivity and specificity. The results of the proposed approach are found to be satisfactory.

A Review : Cyber Warfare
Authors:- Phd Scholar Col Bhim Sen, Dr. F. R. Khan, Dr. S.M. Salim (HOD)

Abstract:- The paper defines that cyber Warfare s a vast topic with various subtopics receiving attention from the research community. It’s a new type of warfare, merely a new weapon that is merged with the traditional conflict. In this generation of mankind, the arrival and the global expansion of the internet is being proved as the fastest and the most powerful technological revolution. Today we are in the situation where we have to decide which governing laws apply to cyber warfare and how much it really applied. Cyber warfare. During research it seemed critical to understand the current situation and the boundaries that are crossed and cyber warfare.

A Review Article ofAnalysis of Islanding Phenomenon in PV Connected System with Protection of Its Effects
Authors:- Manish Kumar, Arun Pachori

Abstract:- The investiture in Distributed Generations (DGs) technologies have begun to monopolies transmission system’s architecture instantaneously after announcing its liberation and deregulation of the energy market to the public. Such movement has propelled vicious competitions among power generation companies to initiate superior innovations in meeting consumers’ needs, administering high power quality yet economical. With the integration of DG technologies, power grid operations have dynamically benefited from such commendable services which apprehend power failures from transpiring; securing power quality, accommodating capricious demand curve, fault compensatory applications and other auxiliary services. Subsequently, the presence of DGs have re-volutionised power grid management to conceive off-grid and self-sustaining criterion where grid/islanding topology adaptations are commonly affiliated.

Prediction of Colon Cancer Using Region Seed Growing Segmentation and Dnn Classifier
Authors:- Asst. Prof. M.V.Crispin, Asst. Prof. T. Anandhan, Asst. Prof. Kpv Pinkey Roshan

Abstract:- To determine the clinical manifestations and optimal management of patients with colorectal cancer (CRC) metastasis advanced malignancy we propose a new predictive modelling by using region seed growing segmentation and classification for predicting the colon cancer disease through continuous monitoring. Here, the region seed growing is used and which is based on transition region extraction for effective image segmentation. Moreover, region seed growing algorithm is used to categorize the transitional region features from the colon cancer image. Inaddition, We used to establish the deep neural network concept for training the image and testing the image with the help of weight estimating classifier.The experiments have been conducted by using the standard images that are collected from database and the current health data which are collected from patient. The results proved that the performance of the proposed prediction model which is able to achieve the better accuracy when it is compared with other existing prediction model.

IOT Based Disease Monitoring System for Apple Orchardin Himachal Pradesh
Authors:- Karuna Sheel, Dr. Anil Sharma

Abstract:- IoT is the technology which has a huge contribution now a days in the diverse application areas. Apple, a cash crop, is one of the fruits which is high in demand throughout the year. Himachal Pradesh secured second largest placein India for apple production. The economy of this state is predominantly dependent on apple cultivation.Fluctuation in climate and weather conditionshave a huge impact on production and quality of apple and plant as well. The success of apple production highly depends on climatic and environmental factor like temperature and humidity. The present study is focusing to design an IoT based system to predict the various diseases and their impact on the apple during the different whether conditions. For this, some popular IoT boards with sensors, and Wi-Fi transreceiver will be used to monitor the data which can be evaluated for further recommendations.

A Review Article of Improvement of Solid Oxide Fuel Power Plant Efficiency Using Power System Topology
Authors:- Raunak Kumar Jha, Dr.L.S.Titare

Abstract:- Fuel cell technology is a relatively new energy-saving technology that has the potential to compete with the conventional existing generation facilities. Among the various Distributed Generation or onsite generation or localized generation technologies available, fuel cells are being considered as a potential source of electricity because they have no geographic limitations and can be placed anywhere on a distribution system. Fuel cells have numerous benefits which make them superior compared to the other technologies. The integration of the fuel cell system is to provide the continuous power supply to the load as per the demand. In this paper, design and modeling of Solid Oxide Fuel cell (SOFC) is discussed for the distributed generation applications. Modeling and simulations are carried out in MATLAB Simulink platform. Solid oxide fuel cells operate at temperatures near these are highly efficient combined heat and electric power. Modeling of SOFC is done by using by using Nernst equation. In that the output power of the fuel cell can be controlled by controlling the flow rate of the fuels used in the process.

Modeling and Optimization of Self-Organizing Energy- Saving Mechanism for Het Nets
Authors:- Mohit Kumar Soni, Prof. Ratan Singh

Abstract:- Smart and versatile wireless devices brings with them, an ever continuing challenge of finding efficient means for resource usage. Scope and avenues for capacity and coverage improvement in cellular networks are constantly explored. Deployment of small cells such as microcells, Pico cells, hotspots, and relays proved an effective solution to improve network coverage and capacity. However, this increase in performance occurs with the cost of deployment and maintenance of additional base stations. Another interesting solution to improve coverage and network capacity is the use of user equipment with relaying support. Currently, mobile devices are equipped with higher processing power and battery life and hence can act as relay nodes in idle slots for nearby users which have lower coverage. This project explores the possibility of user equipment deployed as relays node in heterogeneous networks and analyses the performance improvement for the same. And also analyses the energy efficiency aspect of such communication and show that using user equipment’s as relay helps improving energy efficiency too. Obtained results are verified using extensive simulations.

The Potentiality Examination of Mixture Imitative Resistive System for Infringement Quested Based On Hybrid Belief Function
Authors:- Rajesh Kumar, Prof. Ratan Singh

Abstract:- – The aim of this analysis is the creation and associate build up the system to forestall an organism against each well-known and new attacks, and functions as an adaptive distributed defense system or adaptive artificial system. Artificial Immune Systems abstract the structure of immune systems to include memory, fault detection and adaptive learning. We tend to propose associate system primarily based real time intrusion detection system exploitation supervised learning algorithmic rule. Basically that system or model consists of two layers.
A probabilistic model primarily based T-cell formula that identifies potential attacks, and
A call tree primarily based B-cell model that uses the output from T-cellsalong with feature info to verify true attacks.
The formula is tested on the KDD 99 information, wherever it achieves an occasionalwarning rate whereas maintaining a high detection rate. This can be true even just in case of novel attacks, that may be an important improvement over alternative algorithms.

A Review on effect of positioning of RCC shear walls of different shapes on seismic performance of building resting on sloping ground using STAAD-Pro
Authors:- M.Tech Scholar Ayush Kumar Agrawal, Prof.Nitesh Kushwaha

Abstract:- Reinforced concrete (RC) buildings often have vertical plate-like RC walls called Shear Walls in addition to slabs, beams and columns. These walls generally start at foundation level and are continuous throughout the building height. Their thickness can be as low as 150mm, or as high as 400mm in high rise buildings. Shear walls are usually provided along both length and width of buildings. Shear walls are like vertically-oriented wide beams that carry earthquake loads downwards to the foundation.Properly designed and detailed buildings with shear walls have shown very good performance in past earthquakes. Shear walls provide large strength and stiffness to buildings in the direction of their orientation, which significantly reduces lateral sway of the building and thereby reduces damage to structure and its contents. Shear walls in high seismic regions require special detailing. However, in past earthquakes, even buildings with sufficient amount of walls that were not specially detailed for seismic performance (but had enough welldistributed reinforcement) were saved from collapse. Shear wall buildings are a popular choice in many earthquake prone countries, like Chile, New Zealand and USA.
Keywords: RCC, shear wall, building, earthquake loads

Review of Structural Diagrid in Tall Building
Authors:- M. Tech. Scholar Naveen Rewapati, Asst. Prof. Priyanka Dubey

Abstract:- In the modern world due to overpopulation and decrease in the landmass in the cities the need to make high rise structure is now more prevalent than ever before and hence many solutions like outrigger, shear wall and diagrid are available in the structural stability of high rise. This paper deals with the previous research of on diagrids as an emerging alternative to control the lateral displacement in high rise.

Review of Structural Diagrid in Tall Building
Authors:- M. Tech. Scholar Deepak Birla, Asst. Prof. Ashwin Hardiya

Abstract:- Fiber-reinforced polymer (FRP) materials are used in different configration and techniques for strengthening of Reinforced concrete (RC) elements to ensure their longer service life. Use of FRP material as Externally bonded surface is one of the popular strengthening techniques that consists of bond in FRP material using primer and saturant.

Review of GRPF Strengthen Column
Authors:- M. Tech. Scholar Farooq Khan, Asst. Prof. Ashwin Hardiya

Abstract:- Multiplication in hardware can be implemented in two ways either by using more hardware for achieving fast execution or by using less hardware and end up with slow execution. The area and speed of the multiplier is an important issue, increment in speed results in large area consumption and vice versa. Multipliers play vital role in most of the high performance systems. Performances of a system depend to a great extent on the performance of multiplier thus multipliers should be fast and consume less area and hardware. This idea forced us to study and review about the Booth’s Algorithm, modified Booth’s algorithm and its radix-2, radix-4, radix-8 forms.

RE Wall: A Review On An Innovation In Construction Industry
Authors:- M. Tech. Scholar Salman Shaikh, Assistant Prof. Priyanka Dubey

Abstract:- Retaining Wall has been a structure that has been used from ancient times in order to provide stability to slope of soil and prevent the downhill or mound from landslide. The current thesis gives an insight about the usage of conventional cantilever retaining wall and cantilever Wall with shelf relief. The comparison and analysis has been done manually and in Standard analysis package STAAD – Pro. The difference in results of staad and manual calculation were less than 10%. The moment and the deflection at top of cantilever were observed and noted. The FEM element used to perform the analysis in Staad Pro is Shell element. All the lateral and vertical loads were calculated and assigned to the model with corresponding grade of concrete and Steel.

Study of Different Types of Mixer Topologies
Authors:- M. Tech. Scholar Rohit Kumar Sonkar, Assistant Professor K. K. Sharma

Abstract:- In this paper, a comparative study of different types of mixer topologies is presented. Gilbert cell is widely used as core of the mixer because it provides high conversion gain, good port-to-port isolation and low even-order distortion. It is found that the linearity of mixer is very good for Multi-Tanh technique by incorporating multiple differential trans-conductance stage but it reaches to very low conversion gain whereas, use of current bleeding technique increase linearity and conversion gain of the mixer by adding current source to increase the bias current at the expense of power consumption. A very low value of noise figure can be achieved with the switched biasing technique by replacing current source with parallel connected nMOS transistors but due to use of the transistor in place of tail current source, linearity is degraded and more power is consumed. Folded Cascode Technique is used to reduce DC supply voltage by folding the LO switching stage with pMOS transistors in switching stage but it degrades the noise figure. Bulk-driven technique can be employed to lower down the power consumption by providing the switching action via the gate of LO (RF) and amplification by the bulk of LO (RF) transistors, however it reduces the linearity. High linearity is obtained by using CCPD (Cross coupled post distortion) technique by cancelling of third order derivatives but it decreases the conversion gain and consume more power due to increase in the number of auxiliary transistors. MGTR enables to achieve high linearity by incorporating auxiliary transistor but it decreases the overall conversion gain and increases noise figure of the mixer. So, it is observed that there is a trade-off among the performance metrics, i.e., conversion gain, noise figure linearity, and power consumption of the mixer.

Review of Shear wall in High Rise
Authors:- M.Tech.Scholar Dilip Varvaniya, Asst. Prof. Ashwin Hardiya

Abstract:- In current world scenario with ongoing research for new methodology and techniques to improve the stability of building against seismic and other lateral forces. This paper reviews the effect of frames with and without the shear wall system of simulation conducted by various researchers. Comparison of response of shear wall and RC framed structure will have to be done in future scope of this research work. In order to minimize the damages due to earthquake, shear wall are efficient in terms of cost and effectiveness. On the other hand bracings can absorb great degree of energy which is exerted by earthquake.

Coconut: A Review on a Plentiful Farming Produce
Authors:- M.Tech. Scholar Sandeep Patil, Asst. Prof.Ashwin Hardiya

Abstract:- As there is an economic boom there is an increasing demand for infrastructure in order to accommodate the requirement. As this will lead to high demand for natural construction material and this will deplete them quickly. This paper has been presented in order to give the developers an insight about the usage of alternate material and how it make the whole project structurally and economically feasible. A number of literatures has been reviewed and ultimately the coconut shell has been highlighted for a variety of function such as landfill, light weight concrete and structural concrete. This paper contains a thorough investigation on the application of coconut shell in structural concrete with the percentage of replacement of coconut shell as partially so that natural aggregates usage can be minimized. The experiment has been done in this project has considered 7 days and 28 compressive strength of concrete with no replacement 5%, 10%, 15%, 20% and 25%. The coconut shells are widely available natural material and can be helpful to contribute to the sustainability of the construction.

Review : Important Element in Building: Shear wall vs Brace
Authors:- M.Tech. Scholar Sameer Khan, Asst. Prof. Priyanka Dubey

Abstract:- As new technology are becoming more versatile and commercially available, their usage is also becoming popular in improving the seismic resistance. This paper reviews the effect of shear wall and brace independently on a building for simulation conducted by various researchers.In order to minimize the damages due to earthquake, shear wall are efficient in terms of cost and effectiveness. On the other hand bracings can absorb great degree of energy which is exerted by earthquake.

Challenges of 5G Wireless Technologies
Authors:- M. Tech. Scholar Garima Jain, Dr. Sudhir Agrawal(Dean academics), Prof. Ankit Shrivastava

Abstract:- With the evaluation and simulation of long-term evolution/4G cellular network and hot discussion about new technologies or network architecture for 5G, the appearance of simulation and evaluation guidelines for 5G is in urgent need. This paper analyzes the challenges of building a simulation platform for 5G considering the emerging new technologies and network architectures. Based on the overview of evaluation methodologies issued for 4G candidates, challenges in 5G evaluation are formulated. Additionally, a cloud-based two-level framework of system-level simulator is proposed to validate the candidate technologies and fulfill the promising technology performance identified for 5G.

Implementation and Design of Xilinx Based Booth multiplier
Authors:-M.Tech.Scholar Vinod Kumar Balhar, Asst. Prof. Shiva Bhatnagar

Abstract:- Multiplication in hardware can be implemented in two ways either by using more hardware for achieving fast execution or by using less hardware and end up with slow execution. The area and speed of the multiplier is an important issue, increment in speed results in large area consumption and vice versa. Multipliers play vital role in most of the high performance systems. Performances of a system depend to a great extent on the performance of multiplier thus multipliers should be fast and consume less area and hardware. This idea forced us to study and review about the Booth’s Algorithm, modified Booth’s algorithm and its radix-2, radix-4, radix-8 forms.

Silicon on Insulator Technology Review
Authors:- M.Tech. Scholar Abhishek Soni, Asst.Prof. Shiva Bhatnagar(HOD)

Abstract:- An effort to reduce the power consumption of the circuit, the supply voltage can be reduced leading to reduction of dynamic and static power consumption. This paper introduces one of the greatest future technologies of this decade and that is SOI technology. Silicon-On-Insulator transistors are fabricated in a small (~100 nm) layer of silicon, located on top of a silicon dioxide layer, called buried oxide. This oxide layer provides full dielectric isolation of the transistor and thus most of the parasitic effects present in bulk silicon transistors are eliminated. The structure of the SOI transistor is depicted and is very similar to that of the bulk transistor. The main difference is the presence of the buried oxide it provides attractive properties to the SOI transistor. Power has become one of the most important paradigms of design convergence for multi gigahertz communication such as optical data links wireless products and microprocessor ASIC/SOC designs. POWER consumption has become a bottleneck in microprocessor design. For more than three decades, scientists have been searching for a way to enhance existing silicon technology to speed up the computer performance. This new success in harnessing SOI technology will result in faster computer chips that also require less power a key requirement for extending the battery life of small, hand-held devices that will be pervasive in the future. SOI is a major breakthrough because it advances chip manufacturing one to two years ahead of conventional bulk silicon. The following provides a step-by-step look at the developments leading up to the development of SOI technology.

SVD Based Gesture Detection using Cultural Algorithm for Spectrum Sensing
Authors:- M.Tech. Scholar Rakesh Parmar, Asst.Prof. Shiva Bhatnagar (HOD)

Abstract:- Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. Recent research studied spectrum sensing using energy detection and network cooperation via modeling and simulations. However, there is a lack of experimental study that shows the feasibility and practical performance limits of this approach under real noise and interference sources in wireless channels. This paper presents the development of efficient and reliable spectrum sensing algorithm for cognitive radio network with the help of soft computing techniques. A Cultural Algorithm (CA) optimized model for conventional SVD based spectrum sensing algorithm has been presented.

Review of Wide Bandwidth Low Power Low NOISE Amplifier
Authors:- M.Tech. Scholar Surendra Ningwal, Asst.Prof. K. K. Sharma

Abstract:- Recently, Low noise amplifier versatile used in modern wireless communication like Wi-Max, WLAN, GSM, Bluetooth and satellite communication. Low Noise amplifier have important feature like amplify the signal with rejection of noise. Low noise amplifier in modern communication used as filter with amplifier. In recent scenario low noise amplifier available in wide band, single band, multi-band frequency of application. In present days low noise amplifier, the also reduces the reflection of signal exist by elements and connecting interface inside the amplifier. Low noise amplifier available with high gain, noise rejection and with less power consumption. In this paper review the work of past decades done in low noise amplifier. Low Noise Amplifier (LNA) is versatile used as a broadband mixer, low noise amplifier, power amplifier and Darlington amplifier, active balunes, multiband amplifier. Today technology required high speed of transmission efficiency with small power consumption and less utilization of elements in proposed amplifier, Low Noise Amplifier (LNA) products full fill all requirement of modern wireless communications, so that review and discussion, future requirement of technology is needed to discuss. In this paper discusses issues of low noise amplifier, its application, issues and recent trends. In this paper review some techniques of Low Noise Amplifier (LNA) to improve perform and surveyed almost all the Possible Work of Past Decades.

An Assessment Of Set Back And Step Back Building
Authors:- M.Tech. Scholar Rohit Karoda , Asst.Prof. Priyanka Dubey

Abstract:- India consists of great arc of mountains which consists of Himalayas in its northern part which was formed by on-going tectonic collision of plates Hill buildings are different from those in plains; they are very irregular and unsymmetrical in horizontal and vertical planes, and torsionally coupled. Hence, they are susceptible to severe damage when affected by earthquake ground motion. Such buildings have mass and stiffness varying along the vertical and horizontal planes, resulting the center of mass and center of rigidity do not coincide on various floors.

Numerical Analysis of Air Cooled Condenser using Cfd
Authors:- Research Scholar Pramod Kumar, Assistant Professor Jagdish Saini

Abstract:- In frameworks including heat move, a condenser is a gadget or unit used to gather a substance from its vaporous to its fluid state, reliably by cooling it. thusly, the lethargic warmth will move to the coolant in the condenser. condensers are regularly heat exchangers which have different structures and come in different sizes running from somewhat little to incredibly gigantic present-day scale units utilized in plant structures. air-cooled condensers are utilized in little units like family refrigerators, huge coolers, water coolers, window obliged air structures, split air control systems, minimal bundled compelled air structures, and so forth these are utilized in plants where the cooling load is almost nothing and the rigid proportion of the refrigerant for the pattern of refrigeration is basically nothing. air-cooled condensers are in like way called hover condensers as they are typically made of copper or aluminum contort. air-cooled condensers eat up a practically more noteworthy space than water-cooled condensers.

Tensorflow Based Automatic Personality Recognition Based On Facial, Tone and Resume Analysis
Authors:- Divya Gharaniye, Tejasvini Kale, Gauri Suryavanshi, Prof. Sanjay Jadhav

Abstract:- With the development of artificial intelligence (AI), the automatic analysis of video interviews to recognize individual personality traits has become an active area of research and has applications in personality computing, human-computer interaction, and psychological assessment. Machine learning techniques have led to the establishment of convolutional neural network (CNN) models that can successfully recognize human their personality traits with the use of a camera. In this an end-to-end AI interviewing system was developed using asynchronous video interview (AVI) processing and a TensorFlow AI engine to perform automatic personality recognition (APR) based on the features extracted from the AVIs and the true personality scores from the facial expressions. The main task of this study is to predict the big-five traits personality dimensions from video images by using machine learning techniques and artificial neural networks. In this study, video images and the emotional states of the person obtained from videos were utilized and an artificial intelligence based system was developed to be able to predict automatically the personality traits of a person from videos.

Face Recognition Using PNN Classifier and SIFT Feature Extraction
Authors:- Research Scholar Chitransh Popli, Asst. Prof. Priyanshu Dhameniya

Abstract:- The main motive to design to recognize Automatic Face Recognition is the ability of person’s and identity based on facial characteristics. One of the ways to do this is by comparing selected facial features from the test image and a facial database. Usually, the face image of a test subject is matched to the gallery data using a one-to-one or one-to-many scheme. The one-to-one and one-to-many matching are called verification and identification, the feature extraction on the other hand is usually applied to obtain the relevant facial features such as face regions, variations, angles or measures etc. from the data. The system proposes new approach in extension with local binary pattern called DRLBP and PNN classifier used for classification . By using these methods, the category recognition system has developed for application to image retrieval. The category recognition is to classify an object into one of several predefined categories. The discriminative robust local binary pattern (DRLBP) is used for different object texture and edge contour feature extraction process. It is robust to illumination and contrast variations as it only considers the signs of the pixel differences. The proposed features retain the contrast information of image patterns. They contain both edge and texture information which is desirable for object recognition, the simulated results will be shown that used discriminative robust local binary pattern has better discriminatory power and recognition accuracy compared with prior approaches.

A Review on “Energy-Efficient Spectrum Access in Cognitive Radio
Authors:- M.Tech. Scholar Anita Pandey, Assistant Professor Dr. Shivangini Saxena

Abstract:- In cognitive radio sensor networks (CRSNs), the sensor devices which are enabled to perform dynamic spectrum access have to frequently sense the licensed channel to find idle channels. The behavior of spectrum sensing will consume a lot of battery power of sensor devices and reduce the network lifetime In the next-generation cognitive radio networks, numerous secondary users will share the spectrum resource with the primary users. As it may not be possible to support all the communication rate requirements, there are many supporting sets for the secondary users as long as the communication rates of the primary users are guaranteed? In this paper, we study the maximum feasible set problem to access as many secondary users as possible, under the constraints of power budgets and communication rates in cognitive radio networks. In this interesting issue, the existing literature generally removes a subset of the secondary users so that the remaining users achieve the thresholds with communication rates and power budgets. However, the removal algorithms cause more interference when there are plenty of unsupported secondary users. In this work leverage the spectral radius of the network characteristic matrix as the admission price to access the new secondary user. Then, will design a hybrid access control algorithm to reduce the interference time and approximate the maximum network capacity. Moreover, different supported sets produce the different energy efficiency, even having the same network capacity, while all users require the high communication rates. Numerical results demonstrate that our algorithms will provide the decent energy efficiency under the communication rate constraint the simulation will be perform on MATLAB simulation.

Intrastate Student Migration and Trends: Impact On Urbanisation And Subsequent Migration Behavior
Authors:- Mateen Yousuf

Abstract:-Capital cities in J&K have emerged as hub of education activities and as such students from all over the state migrate to the places seasonally. Srinagar as well as Jammu have emerged as the hub of education where students and aspirants flock to enroll themselves in the institutes of their choice. The availability of large number of teachers, enhanced investment, safety reasons, choice and competition, easily available supplementary and complementary facilities are some of the main reasons why students preferred the urban areas as their ideal choice of education. The objective of this research is to find out the trends of migration of students and teachers from rural to urban places in Kashmir. Various changes that have taken place in time have been observed. The research process involved setting up of focus groups of various stakeholders and discussing the research objectives. The inferences drawn were compared to the hypothesis and compared with the data which was collected through open ended questionnaire. It was found out that parents prefer to send their wards to urban areas to avail various facilities but over the years efforts have been made to setup the same facilities in native towns and villages which was found to have a significant negative impact of growth of educational infrastructure in the urban areas. The trend of shifting to urban areas was found to be positive over the past 30 years. It is recommended that the stakeholders collaborate with government to develop the twin cities in the state of J&K as the hub for education not only among intra-state but inter-state as well.

A Review Articleanalysis of Distribution Grid, Power Loss Reduction and Fault Detection In 33 Bus System Using Optimization
Authors:- Vinay Kumar Gupta, Arun Pachori

Abstract:- Power flow is nothing but the flow of active and reactive power. Power flow analysis is used to determine the steady state operating condition of a power system. In short it is to find the approximate values of various bus voltages, their phase angle, active and reactive power flows through different branches, generators and loads under steady state condition. Newton Raphson methods are generally referred as experience based techniques for solving problem, learning and discovery. Heuristics are simple and efficient rules coded by evolutionary processes. In this Work, ANN, one of such GS have been used to do the power flow analysis in a simple three bus system.

Design and Implementation Low Power Consumption Level Shifter
Authors:- M.Tech. Scholar Kishan Bandil, Professor K. K. Sharma

Abstract:- A voltage level shifter is a circuit which converts low level input voltages to a desired higher level voltage or vice versa as desired, depending upon the system requirements. The major application of a voltage level shifter is in resolving mixed voltage incompatibility. The integrated circuits which are widely used nowadays may have different parts within, which operate at different voltage levels. Most of these circuits were provided with different supply voltage levels which prove to be difficult when the number of supply voltages increases within a single circuit increasing its complexity. Energy efficiency is a primary concern in modern CMOS circuits. Thus level shifters which are capable of converting a single low level voltage to other voltage levels have become useful in circuits having parts operating in multiple voltage domains. In the proposed design, the major aim is to lower the power dissipation and make the circuit faster.

Deep Semantic Image Segmentation using Convolutional Neural Networks for Multi Modal Data
Authors:-Asst.Prof. P Jaganmohan , Asst. Prof. R Suneel Kumar

Abstract:- In this paper, a deep semantic segmentation of aerial imagery based on multi-modal data is discussed. given multi-modal data composed of true orthophotos and the corresponding digital surface models (dsms), we extract a variety of handcrafted radiometric and geometric features which are provided separately and in different combinations as input to a modern deep learning framework. the latter is represented by a residual shuffling convolutional neural network (rscnn) combining the characteristics of a residual network with the advantages of atrous convolution and a shuffling operator to achieve a dense semantic labeling. via performance evaluation on a benchmark dataset, we analyze the value of different feature sets for the semantic segmentation task. the derived results reveal that the use of radiometric features yields better classification results than the use of geometric features for the considered dataset. furthermore, the consideration of data on both modalities leads to an improvement of the classification results. however, the derived results also indicate that the use of all defined features is less favorable than the use of selected features. consequently, data representations derived via feature extraction and feature selection techniques still provide a gain if used as the basis for deep semantic segmentation.

Free Energy Generator Neodium Magnets Repulsion
Authors:- M.Tech. Student Shubham Khatri, Professor Dr. Shailesh Gupta

Abstract:- This thesis is devoted to the design and optimization of magnetic system ,More than 90% world’s power is being generated using electromagnets based on the faraday’s law of electro-magnetic induction. Many new technologies were discovered with time which led a drastic change in the perception of electric energy. But at the same time there is misconception of free energy. Energy becomes free only at a point after which we don’t have to pay for power generation after commissioning the unit. By using the magnetic force of magnets continuous motion (Energy) is generated. We used Neodymium magnets are placed on the outer drum and an inner drum by placing same poles for maximum repultion. Rectangle shaped magnets are placed in such a way that all the north poles or north poles are facing opposite direction.

Artificial Intelligence Based MPPT Algorithm For Grid Connected Solar PV System
Authors:- M. Tech. Student Darshil N Shah, Asst.Prof.Dr. Manisha Shah

Abstract:- On going investigates situated to photovoltaic (pv) frameworks highlight blasting enthusiasm for current decade. for productivity improvement, greatest force point following (mppt) of pv exhibit yield power is obligatory. herein the article, different analytical strategies has been discussed based on ai (artificial intelligence). Conventional mppt techniques provide abridged assembly and execution; also its routine is dishonored after associated through reproduction reasoning techniques are uncertain sense regulator (fl), artificial neuronic grid (ang), flexible nerves- uncertain border structure (fnubs). one of farcical ai based technique which name is flexible nerves uncertain border structure get closer and extra accurate outcome against all the ai based technique and also ordinary systems. likewise, this article demonstrates that the anfis strategy is better in all the ai-based mppt power following plans for low overshoot, high dependability with the higher consistent state condition, and less tedious in yield. as, per this proposed technique to the pv array and applying all kind of conditions to it, effective and enhanced outcome has been arrived.

A Review: Uses of Additives in the Development of Water Treatment Plant Sludge Bricks
Authors:- Nurul Farah Syaheyra Rahmat, Nurul Nadiah Mohd Firdaus Hum

Abstract:- Water treatment plant sludge generation and management has becoming a global problem, leading to increased concern for the environment. Sludge management and recycling into safe building materials have proven as an alternative to waste disposal to reduce environmental and economic pollution. Reused of sludge with additives in brick making industry is a sustainable solution due to increasing demand for bricks in construction works nowadays. This study reviews development of water treatment plant sludge bricks and different additives implemented in brick making process. The study addressed the characteristics of water treatment sludge, the advantages of natural and chemically made additives, as well as the compressive strength and water absorption properties of bricks.

Under Water Imaging by Signal Processing Techniques
Authors:- M.Tech. Nagabathula Ramya, Asst. Prof. Akurathi Gangadhar

Abstract:- SONAR is an acronym for sound Navigation And Ranging. The basic principle of sonar is to use sound to detect or locate objects, typically in the ocean. Sonar technology is similar to other technology such as RADAR (radio Detection And Ranging).Basic radar systems use electromagnetic wave reflections from targets to determine the characteristics of the targets. Synthetic Aperture Radar (SAR) systems use the reflections to produce target images as well. SAR and SAS are an imaging system that produces high resolution images of a scene or target by using motion to synthesize the antenna aperture. While Synthetic Aperture Sonar(SAS) is closely resembles to SAR.In this paper we are demonstrating Synthetic Aperture Sonar (SAS) processing for a point target case. The input raw SAS data is generated and the SAS processing is simulated in Matlab.

Control Strategy for Bidirectional AC-DC Interlinking Converter in AC-DC Hybrid Microgrid Using PV System
Authors:- M.Tech. Scholar Nimesh Upadhyaya, Prof. Madhu Upadhyay

Abstract:- This paper presents optimize energy extraction in photovoltaic (PV) energy systems. The maximum power of the photovoltaic module will change due to changes in temperature, solar radiation and load. To maximize efficiency, the photovoltaic system uses a maximum power point tracker (MPPT) to continuously extract the most power that the solar panel can generate and then pass it on to the load. The overall structure of the MPPT system consists of a DC-DC converter (an electronic device that converts DC energy from one voltage level to another) and a controller. During changes in weather conditions, MPPT uses a tracking algorithm to find and maintain operation at the point of maximum power. Many different algorithms for MPPT have been proposed and discussed in the literature, but most of these methods have disadvantages in terms of efficiency, precision, and flexibility. Due to the non-linear behavior of the current voltage characteristics of the PV module and the non-linearity of the DC-DC converter due to switching, conventional controllers cannot provide an optimal response, especially when dealing with a wide range of shifting line parameters and transients. The purpose of this work is to design and implement a maximum power point tracker using fuzzy logic control algorithms. Fuzzy logic naturally provides an excellent controller for such nonlinear applications. This method also benefits from artificial intelligence methods that can overcome the complexity of modeling nonlinear systems. To make this work a success, Simulink designed and simulated an MPPT system consisting of photovoltaic modules, DC-DC converters, batteries, and fuzzy logic controllers. Perform the characterization of the buck, boost and buck-boost converter to find the most suitable topology for the PV system used. The integrated model of the PV module with the identified converter and battery was simulated in MATLAB to gain the necessary experience to formulate and adjust the fuzzy logic controller. The simulation results show that fuzzy logic.

A Review on Fuzzy Logic Control Based PV Module and Bidirectional Dc-Dc Converter Design
Authors:- M.Tech.Scholar Nimesh Upadhyaya, Prof. Madhu Upadhyaya

Abstract:- This work presents a optimize energy extraction in photovoltaic (PV) energy systems. The maximum power of the photovoltaic module will change due to changes in temperature, solar radiation and load. To maximize efficiency, the photovoltaic system uses a maximum power point tracker (MPPT) to continuously extract the most power that the solar panel can generate and then pass it on to the load. The overall structure of the MPPT system consists of a DC-DC converter (an electronic device that converts DC energy from one voltage level to another) and a controller. During changes in weather conditions, MPPT uses a tracking algorithm to find and maintain operation at the point of maximum power. Many different algorithms for MPPT have been proposed and discussed in the literature, but most of these methods have disadvantages in terms of efficiency, precision, and flexibility. Due to the non-linear behavior of the current voltage characteristics of the PV module and the non-linearity of the DC-DC converter due to switching, conventional controllers cannot provide an optimal response, especially when dealing with a wide range of shifting line parameters and transients. The purpose of this work is to design and implement a maximum power point tracker using fuzzy logic control algorithms. Fuzzy logic naturally provides an excellent controller for such nonlinear applications. This method also benefits from artificial intelligence methods that can overcome the complexity of modeling nonlinear systems. To make this work a success, Simulink designed and simulated an MPPT system consisting of photovoltaic modules, DC-DC converters, batteries, and fuzzy logic controllers. Perform the characterization of the buck, boost and buck-boost converter to find the most suitable topology for the PV system used. The integrated model of the PV module with the identified converter and battery was simulated in MATLAB to gain the necessary experience to formulate and adjust the fuzzy logic controller. The simulation results show that fuzzy logic.

Internet of Thing Based Air Pollution Analysis System Using Sensors
Authors:-ME Student Mistri KulprakashSingh AvatarSingh , Associate Prof. Khansole Balaji

Abstract:- The level of pollution has increased with times by lot of things just like the increase in population, increased vehicle use, industrialization and urbanization which ends up in harmful effects on human wellbeing by directly affecting health of population exposed thereto. so as to watch during this project we are getting to make an IOT Based pollution Monitoring System during which we’ll monitor the Air Quality over an internet server using internet and can trigger a alarm when the air quality goes down beyond a particular level, means when there are sufficient amount of harmful gases are present within air like CO2, smoke, alcohol, benzene and NH3. it’ll show the air quality in PPM and also as on webpage so that we will monitor it very easily. During this IOT project, you can monitor the pollution level from anywhere using your computer or mobile.

Review of Microalgae for Intensified CO2 Fixation & Sustainable Bio-Fuel Production
Authors:- PhD Scholar Manish Sutradhar

Abstract:- Microalgae are the convincing oxygenic photoautotrophic organisms furnished with tremendous potential of performing environmental services and energy recovery to promote carbon neutral bio-economy. There is a major challenge to the global sustainability due to unbalanced production of the CO2. The concentration of CO2 is rising gradually primarily due to human activities such as burning of fossil fuels leads to increase the level of carbon dioxide and has a different ratio of heavy-to-light carbon atoms, so it leaves prominent footprints that instruments can measure. Technologies have thus been developed for enhanced biological carbon fixation. This review briefly examines the current technologies available for enhanced micro algal CO2 fixation and specifically explores eventual production of bio fuels and/or added-value products, with an emphasis on its productivity.

Smart Door Lock Using IOT
Authors:- Student Nirmit Shah, Student Tejas Potekar, Student Shrey Mistry, Asst. Prof. Manish Bhelande

Abstract:- Security has always been a major concern for the households and the office environment. With this consideration, a design and prototype of a keypad-based door lock system has been presented in this paper. This provides tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. Passwords of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. It is an Arduino UNO device based flexible working device that provides physical security.

The Application of Weather Forecast using Time Series Analysis
Authors:- Vidhya Vasantrao Sambare, Prof. Arvind Jain

Abstract:- Weather forecasting has been an important application in meteorology and one of the most scientifically and technologically challenging problem around the world. In my study, we have analyzed the use of data mining techniques in forecasting weather. This paper proposes a modern method to develop a service oriented architecture for the weather information systems which forecast weather using these data mining techniques. This can be carried out by using Artificial Neural Network and Decision tree Algorithms and meteorological data collected in Specific time. Algorithm has presented the best results to generate classification rules for the mean weather variables. The results showed that these data mining techniques can be enough for weather forecasting.

Review on Microplastics Abundance in Malaysian Marine Environment
Authors:- Nurul Nadiah Binti Mohd Firdaus Hum, Siti Anisah Binti Zainal Abidin

Abstract:- Microplastics in marine environment posed an alarming threat to aquatic lifeforms, and to human consumers. They are characterized according to their physical appearance (size, shape, colour) and its chemical composition through the types of polymers. However, the study on microplastics in Malaysian marine environment still limited due to few studies conducted. Hence, this study aims to visualize, assess and characterize the microplastics abundance in Malaysian marine environment. Ten years’ duration of literature review (2010 until 2020) was used in this study. For water sample study, the highest microplastics abundance is from coastal area of Pulau Pinang and Langkawi meanwhile, in sediment sample study is from coastal zone at Straits of Johor. Tourisms and industrial are huge contributor on microplastics abundance in Malaysia. Fragment and fiber, dark colours (black, grey) and white showed the most dominant physical characterization of microplastics analyzed. The dominant polymer’s composition is originated from the industry and consumer products.

Wireless Sensor Networks for Distributed Access Control using Priccess Method
Authors:- Asst. Prof. A. Rajiv, Asst. Prof. C. Lakshmi

Abstract:- The Distributed access control allows the network to authorize and grant the permission to user to access the data in Wireless Sensor Network. In terms of providing security and authentication to the Wireless sensor network, our project is created. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical conditions and to cooperatively pass their data through the network to a main location. The more modern networks are bi- directional, also enabling control of sensor activity. Hence the wireless sensor network is especially creating a high secure environment. Our paper mainly focuses on designing such access control modules for WSNs. It focuses on group sharing too. That is a distributed access control will share the data to all the users in that network whereas it will provide security to the WSN by avoiding a new user to unaccess the data. Sometimes a user does not want to associate his identity to data which he request. Only the data he needs. Because it might helps a new user to know his details while sharing the data. To avoid such issues here in our project we are introducing a query for a group to access the data. Here a single person will act as a leader in a group and he can create a query to sign in. So that the identity of the users will not known by anyone and also the whole group can get the data via this process.

Automatic Glaucoma Detection Using Sobel Edge Detection & Svm Classifier
Authors:-M.Tech.Scholar Akansha Sharma, Asst.Prof.Jayshree Boaddh, Asst.Prof.Jashwant Samar

Abstract:- It is hard to diagnose the glaucoma from single routine test that is why it is supposed as one of the most complex disease for diagnosis. Glaucoma may affect the eyes that reach the deficiency towards either partial blindness or complete blindness. It cannot be treated once it occurred but it can be cured by routine examination. Diagnosing glaucoma on time may save the rest vision but it does not improve the eyesight by treating by any medical experts. An OCT scan is an important test in diagnosing and monitoring glaucoma. Here the system is based on Sobel Edge Detection and Support image processing and classification methods to detect glaucoma by comparing and measuring various parameters of the fundus images of glaucoma patients and general patients.Vector Machine (SVM) Classifier. Sobel can highlight the nerves or blood vessels and segment the fundus optic disc that may or may not affect by glaucoma. On the other hand SVM can classify the affected area or impaired cells that can resulted a better diagnostic system. It is an irregular or polynomial data classification that can work for Iris based fundus images. System acquired 94.45 % of accuracy with minimal false alarm rate and obtains less processing time.

Digital Signature Server Using Elliptic Curve Cryptograpic Algorithm
Authors:- S.B.Sangeetha, Jasmine Sait Mohmmad, Praba.M

Abstract:- Application servers are heavily loaded by performing signature computation Instead of using Application server which act as the tenant to more dedicated proxy called Signature servers called GUESSThus to improve the performance of the GUESS comprehensive implementation of the EDSA is tested against network trafficDigital signatures are encrypted and decrypted using Elliptical curve cryptographic algorithm

A Review of Automatic Glaucoma Detection from Fundus Imaging
Authors:- M.Tech.Scholar Akansha Sharma Asst.Prof. Jayshree Boaddh Asst.Prof. Jashwant Samar

Abstract:- To mographical imaging is a technique through which diagnosis and monitoring can happen with an effective manner. If a disease can be diagnosed in an early stage always been a preference in the field of medical science. Glaucoma is one of the chronical disorder of optic discs in which fluid pressure increases and if it is remain untreated; the patients may lose their vision and even they may pertain total blindness. This disease cannot be cured, early recognition and precautions may protect fundus nerve against serious vision loss. It does not affect instantly, the loss of vision may occurs gradually over a long period. Glaucoma detection involves some measurements like shape and size of optic disc. Here this paper reviewed various researches and concluded that most of the researches are intended to classify the blood vessels for broken vessels detection that signifies the Glaucoma in a better way. Accuracy may degrade due to incorrect or inappropriate masking. An IRIS has some sensitive information that has not to be tampered any how.

Matriculation College Students Evaluation of English Program using the Process Component of CIPP Model
Authors:- R.Nirumala Rothinam

Abstract:- This study aimed to evaluate the Matriculation College English Program using Stufflebeam’sCIPP (context, input, process, and product) evaluation model focusing on the process component. Data was collected through a cippsurvey from42 matriculation students and correlated with their Malaysian University English Test (MUET)trial exam. The CIPP survey sent to students, which had a response rate of 100%, helped to identify the needs of a focus group to obtain better results in MUET. Accordingly, teaching methodology was redesigned to include more visual-audio based learning, student-instructor interaction was increased through face-to-face meetings together with more reinforcement exercises .The results indicated thatwith the new methodology based on the student feedback through the survey, students performed well in the MUET.

Study Report on Failure Analysis of TMT Bar Due to Steel Defects
Authors:- Pramod Kumar

Abstract:- Thermo-mechanical treated (TMT) rebar is used as material for reinforcing concrete structures due to its unique Properties of thermal expansion, ability to bond well with concrete and resist the tensile stress acting on the structure and also steel manufacturing industry has successfully developed a corrosion- resistant variety of rebar for the construction industry. By controlling the proper rolling parameters and water quenching box is required to achieve adequate property. Water quenching box & used billets plays an important role for achieving the final structure and property of the rebars as well the bend properties. Steel quality of the rolled billets are for the production of good surface finish quality TMT bar & also passed in bending of bar. The present paper highlights failure investigation of a failed rebar during bending operations. From micro structural analysis & study of fracture surface it is confirmed that the rebar sample failed in ductile manner due to the steel defects like sub surface blow holes inside the rolled billets originating from thecaster.

Published by:

Journal Publication Fees Rs 500

Uncategorized

Targeting an international journal is a tough to process with demanding low-cost publishing charges. While international journal publication fees rs 500 is difficult to find as most of them have high paid charges. The journal having the low publishing charges is in very demand due to students who can’t afford to pay high charges or due to a lack of resources available of funds in India. As the more technology colleges are having funds more research work inns being carried out by the budding authors. Thus, increases the scope of the international journal and more research international journal are establishing.

Submit Paper Now

Article Processing Charges

International journal fee 500 has found all the features in every ideal journal like high impact factor, one-time cost, low publishing charges etc. now students expect to publish their research work in the specific branch-wise journal so that the journal can be reviewed more precisely. While below mentioned some of the points to find the suitable journal:

  • The authorisation of any journal is very necessary and it must have the unique identification number given by the international authority of the national institutes.
  • The journal must has a high impact factor and the potential too.
  • Select the journal as per the standards of the research work so as to not reject the work and not low potential also that work would be underrated.
  • They should not demand extra expenses fees and fees must be one-time pay method.
  • The journals must be monthly and bi-monthly issuing volume, so as to save the students time in the publication process.
  • The journal should not issue the copywriting and editing expenses.

The journal must provide online certificates to remote students without any delay.

Published by:

International Journal Publication Fee 500

Uncategorized

Nowadays every budding researcher aspires to publish their research work manuscript in an international journal. But as the standards of the publication increase so as to increase the fees structure of the journal. Very few have found international journal publication fee 500. That type of journal usually has a high impact factor that’s why they are in that much demand. International journal publication fee 500 posses the free charges for the article processing fees and the other processes. While the few reputed research journals issue so many expenses in in the publication process in name of registration, acceptance, resources accessing, and many more.

Submit Research / Survey Paper

Paper Publication Charges

International journal publication fee 500 has given concession in the fees for the students and fellows to whose sponsorship didn’t get available. While some of them aren’t financially liable to paid such a high charge. These are the research journal mostly have a high potential and experienced peer-reviewed team. Thinking about such criteria, candidates unable to find the right journal for their publishing research manuscript. Below represent some of the points of finding the right journal:

  • The journal must be authorized journal and has the right to published the research papers.
  • The journal must be at least five years experienced and has an identity in the market.
  • The research journal doesn’t demand extra charges of registration fees and resources accessing fees.
  • The journal must be monthly or bi-monthly volume issuing otherwise time gets wasted.
  • The journal must have a high impact factor and a strong peer-reviewed team.

The journal should not demand the following fees separately that is the pre-acceptance and post-acceptance fees, registration fees, resource accessing charges, certificate fees, editing charges, etc.

Published by:

IJSRET Volume 6 Issue 5, Sep-Oct-2020

Uncategorized

A Design and Performance Analysis of 64-bit Multiplier based on Rounding Based Approximation Technique
Authors:-M.Tech. Scholar Md Dilnawaz Hansala , Assistant Professor Dr. Neetesh Raghuwanshi

Abstract:- Multipliers play a vital job in the present digital signal handling and different applications. With advances in innovation, numerous scientists have attempted and are endeavoring to structure multipliers which offer both of the following plan targets – high speed, low power utilization, consistency of design and henceforth less zone or even mix of them in one multiplier in this way making them appropriate for different high speed, low power and minimal VLSI usage.

Power Efficient Radix-2 DIT FFT using Folding Technique and DKG Reversible Gate
Authors:- M.Tech. Scholar Shashi Shekhar Singh, Dr. Bharti Chourasia

Abstract:- FFT is normally utilized in computerized flag preparing algorithms. 4G correspondence and different remote framework-based correspondence are directly hotly debated issues of innovative work in the remote correspondence and organizing field. FFT is a calculation that speeds up the count of DFT. In the main stage, low multifaceted nature Radix-2 Multi-way Delay Commutator (R2MDC) FFT recurrence change method is created through Exceptionally Large-Scale Integration System structure condition. Low power utilization, less zone and rapid are the VLSI primary parameters. Customary R2MDC FFT structure has more equipment multifaceted nature because of its escalated computational components. Two strategies are utilized to plan radix-2 FFT calculation. In firest strategy is plan radix-2 FFT with the help of reversible Peres gate and TR gate. Second method is design radix-2 FFT with the help of reversible DKG Gate. The all structure are usage vertex-4 device family Xilinx programming and looked at past calculation.

Power Quality Improvement at Grid Using Virtual Synchronous Machine in Solar Power Plant
Authors:-Rahul R. Bhende, Dr. S.P. Muley, Prof. S.C. Suke

Abstract:- Renewable power primarily based dispensed power mills are getting an crucial a part of the destiny electricity structures. Power electronic converters are commonly used an interface between the renewable energy supply and the software grid. Since the strength virtual converters do not possess any rotating inertia like a synchronous generator, fast fluctuations in strength supply and call for purpose unexpected deviations inside the grid frequency in electricity virtual converter ruled weak grids. A virtual synchronous machine (VSM) approach for controlling the inverters related to the grid tries to mimic the behaviour of a synchronous system and offers virtual inertia to the grid via distinctive feature of the electrical garage. In this paper a simple virtual synchronous machine control strategy based totally on swing equation is proposed for 3 phase grid linked inverters. The proposed manage strategy is implemented in desk bound reference body and does not need a section locked loop for grid synchronization unlike a few of the existing strategies. The virtual synchronous device unit consists of a DC-link linked thru a three-section voltage supply converter with an LCL-clear out into the grid and the corresponding local manipulate machine. A check setup of the virtual synchronous system unit with the specification of 200 V, 50 Hz, 1 kW is evolved within the laboratory environment to validate the control scheme. Different performance research together with actual and reactive power manipulate of VSM, effect of variation within the value of inertia of VSM at the electricity reaction, response of VSM for the grid frequency variant have been performed. The overall performance of VSM control is in comparison with the conventional stoop control approach for the grid connectedc onverters.

High Speed Multi-Level Discrete Wavelet Transform Using Canonic Signed Digit Technique
Authors:- Kumar Anuj Sinha, Dr. Neetesh Raghuwanshi, Dr. Bharti Chourasia

Abstract:-A few designs have been proposed for productive VLSI usage of 2-D DWT for continuous applications. It is discovered that multipliers expend more chip zone and builds unpredictability of the DWT engineering. Multiplier-less (M-less) equipment usage approach gives an answer for lessen chip zone, bring down equipment unpredictability and higher throughput of calculation of the DWT architecture. The proposed design outline is (i) priority must be given for memory complexity optimization over the arithmetic complexity optimization or reduction of cycle period and (ii) memory utilization efficiency to be considered ahead of memory reduction due to design complexity of memory optimization method. Based on the proposed design outline four separate design approaches and concurrent architectures are presented in this thesis for area-delay and power efficient realization of multilevel 2-D DWT. In this theory a M-less VLSI engineering is proposed utilizing new circulated math calculation named CSD. We show that CSD is an exceptionally effective design with adders as the primary part and free of ROM, duplication, and subtraction. The proposed engineering utilizing CSD gives less deferral and least number of cut looked at the current design. The simulation was performed using XILINX 14.1i and ModelSim simulator.

Implementation of Power Area Efficient 32-Bit Approximate Multiplier with Improved Accuracy
Authors:- M.Tech. Scholar Priti Shrivastava, Dr.Bharti Chourasia

Abstract:- Approximate computing has received significant attention as a promising strategy to enhance performance of multiplication. Various arithmetic operations such as multiplication addition, subtraction are important part of digital circuit to speed up the computation speed of processor. This paper presents 32 bit approximate multiplier for high speed and low delay for advance digital signal processing. Previous it is designed at 16 bit for various applications. Research work is focus on hardware-level approximation by introducing the partial product perforation technique and dadda multiplier for designing approximate multiplication circuits. Xilinx 14.7 is used to implementation with verilog programming language.

Blockchain-Based Access Control Framework in Patient-Centered Interoperability
Authors:- Qingsong Zhao, Rodney Thompson

Abstract:- Interoperability is one of the most critical functions in Health Information System (HIS), which is shifting from Hospital-Centered Interoperability (HCI) to Patient-Centered interoperability (PCI). However, in HIS there isn’t a framework that supports patient to protect their information’s confidentiality and integrity, and to audit data usage. In this paper, we look at Blockchain and Smart Contract technologies and their key features that make blockchain the technology to solve the problem. We then propose a Blockchain-based access control framework in patient-centered interoperability and its implementation.

Enhanced Performance Reversible ALU Design Using Reversible HNG Gate
Authors:- M.Tech. Scholar Mohini Mehra, Dr. Bharti Chourasia

Abstract:- ALU is the most essential block of any computer, microprocessor and digital signal processors DSPs. All the arithmetic and logical operations are performed inside the arithmetical and logic unit of the processor. The processing speed of the CPU is relying upon the complexity of the logics inside.Programmable reversible logic is developing as a prospective logic configuration style for execution in present day nanotechnology and quantum computing application with insignificant effect on generation of circuit heat. Late advancement in reversible logic utilizing and quantum computation algorithms take into account to enhance computers architecture and arithmetic logic unit architecture. The proposed ALU control unit configuration is made up from three Feynman reversible logic gates, three R-I reversible logic gates and one Fredkin reversible logic gate which is synthesized and simulated on Xilinx.14.7 ISE design suite. The simulation of proposed design has been done on Vertex-7 device family using Xilinx Isim HDL simulator. The obtained results are comparatively better as compared to existing results. The proposed design has quantum cost efficient. The quantum cost evaluated is “26n”, has minimum garbage output evaluated “5n” and ancilla-input evaluated “3n+2” where “n” is the number of bits. With respect of device utilization, proposed design occupies less area reduced about to 12.86% and minimum aggregate evaluated delay is 5.96ns to achieve high- speed.

Design and Analysis of Low Power Consumption I0T Full Adder Circuit
Authors:- M.Tech.Scholar Sheetal Sahani, Dr. Bharti Chourasia

Abstract:- This paper presents a design methodology using CMOS transistor for the architecture of full adder design with minimum number of transistor i.e. reduced size and reduced area for low power consumption in CMOS 90nm technology. This is used to implement low power full adder design for carrying out summation of three different input bits. The circuit of low power full adder is designed by using DSCH tool 2.7 & analysis of the low power full adder design is done at room temperature in CMOS 90 nm technology by using Micro wind tool 2.6.The result shows the comparison in CMOS technology at 90 nm rule on the design in regards of power dissipation, signal propagation delay, transistor counts and power delay product. A comparison is also carried out by some of the parameters taking into consideration like delay of the low power full adder circuit design with the base paper full adder design, which shows the advantage of the proposed low power full adder design. We are using two different simulation tools such as DSCH 2.7 for circuit design and Micro-wind 2.6 for waveform simulation. Firstly the low power full adder circuit will be designed using DSCH tool 2.7 using 10 transistor maintaining W/L ratio 3:1. Then the Verilog code of the design is made and the layout will be made in CMOS 90 nm technology using microwind tool 2.6. The low power full adder circuit using 10T design will be simulated at room temperature in CMOS 90 nm technology to compare different parameters like power consumption, delay, PDP & transistor counts.

Phytorid Technology
Authors:- Madhavi Sawant, Kalpesh Aware, Yogesh Honrao

Abstract:- – Demand for water is increasing day by day, we need to develop various low-cost technologies which could be implemented at point source as well as at individual houses so that wastewater could be treated and reused at house-hold levels and hence reducing the loads on sewage treatment plants. Also, at various places treated wastewater from sewage treatment plants is disposed in natural waterways such as rivers, lakes and hence they are polluted and increases risk of hygiene. Hence in order to reduce pollution and to make smart use of wastewater for future purposes one technology which is used is Phytorid Technology. This technology is a patented technology and is dependent on various plant species. The aim of this project is providing a system which is low-cost, low-maintenance, and which works without disturbing ecosystem. To improve the quality to water without causing ground-pollution is done by considering various water parameters which should be satisfied for reusing the water for various purposes with reference of IS 3025 code books.

Performance Analysis of Low Power high speed 1-Bit CMOS Full Adder Cell
Authors:- M. Tech. Scholar Ayushi Katiyar, Dr. Bharti Chourasia

Abstract:- This paper presents a design methodology using CMOS transistor for the architecture of full adder design with minimum number of transistor i.e. reduced size and reduced area for low power consumption in CMOS 90nm technology. This is used to implement low power full adder design for carrying out summation of three different input bits. The circuit of low power full adder is designed by using DSCH tool 2.7 & analysis of the low power full adder design is done at room temperature in CMOS 90 nm technology by using Micro wind tool 2.6.The result shows the comparison in CMOS technology at 90 nm rule on the design in regards of power dissipation, signal propagation delay, transistor counts and power delay product. A comparison is also carried out by some of the parameters taking into consideration like delay of the low power full adder circuit design with the base paper full adder design, which shows the advantage of the proposed low power full adder design. We are using two different simulation tools such as DSCH 2.7 for circuit design and Micro-wind 2.6 for waveform simulation. Firstly the low power full adder circuit will be designed using DSCH tool 2.7 using 10 transistor maintaining W/L ratio 3:1. Then the Verilog code of the design is made and the layout will be made in CMOS 90 nm technology using microwind tool 2.6. The low power full adder circuit using 10T design will be simulated at room temperature in CMOS 90 nm technology to compare different parameters like power consumption, delay, PDP & transistor counts.

Clothes Hanging System
Authors:- Rajalakshmi, Sangeetha, Yaswini, Mathivathana oviya pavai T

Abstract:- The unstable weather condition can make difficulty in drying clothes and the situation will become worse if it is raining. For people who are working, surely they worried about their clothes that left dry outside. This project introduces smart outdoor clothes hanging system that can automatically detect the atmosphere conditions and the presence of rain and the sunlight and provide the shelter for the clothes to protect them rain and also automatically retrieve out the clothes when it is the sunny day and oppositely retrieve in the clothes when it is a rainy day.The dry-time of the clothes will be counted and it will automatically retrieve-in the clothes when the dried-time is finished. This project will make use of various sensors such as rain sensor, LDR sensor and moisture sensor for detecting rain,light intensity and dryness respectively. Day conditions will display sunny, cloud or rainy.Soft iron plate is placed for placing the wet clothes and their movements are controlled by gear motors which are placed on either side. This hanger system can be used in hospitals, hostels and home.

A Review on Image Object Segmentation Features on Various Techniques and Limitations
Authors:- Neha Agrawal, Dr. Farha Haneef

Abstract:- Image segmentation is defined as a partition realized to an image into homogeneous regions to modify it into something that is more meaningful and softer to examine. Although several segmentation approaches have been proposed recent years. As amount of data increases so manual segmentation and identification is tough. So there is a need of mechanized procedure for precise segmentation of image. Distinctive programmed strategies have been produced till date to expand the precision for segmentation finding. In this paper distinctive techniques for object segmentation done by various researchers with benefits and drawbacks of these prior proposed work.

Image Restoration Using Sparse Dictionary Matrix Learning K-Svd Algorithm
Authors:- Rahul Joshi R, Saranyu P, Vijay R E, Associate Prof. J. Deepa

Abstract:- Images captured in smoky weather conditions causes the poor visibility, which will create a more impacts on the outdoor computer vision systems, such as video surveillance, intelligent transportation assistance system, remote sensing space cameras and so on. In certain situations, actual visibility restoration approaches cannot able to restore images due to poor evaluation of haze thickness and the determination of color cast problems. In our work, we propose a visibility restoration approach to effectively solve inadequate haze thickness estimation and alleviate color cast problems. By doing so, a high-quality image with clear visibility and color can be generated to improve the visibility of single input image (with fog or haze), as well as the image’s details. Our approach process from two important statistical observations about haze-free images and the haze itself. First, Wavelet decomposition is applied and LUM Filter is applied on the decomposed image. Finally, we can get the dehazed output.

Prevention of Food Wastage Using Mobile Application
Authors:-Associate Professor V Gokula Krishnan(M.Tech., Phd), V Dhathanamoorthy, P Karan, N J Kishore

Abstract:- According to different sources, 25% to 40% of food products are wasted in the world. There is something that we still don’t see: food wasted by restaurants, shops or industries. There is also something we can see: food wasted by ourselves. This is the range focus of communities, through the management of wasted products of catering firms. Now a days People are aware of importance of food but there are no platform to share information about the excess of food available in the particular restaurants, shops and even in our homes for non-profitable organizations to offer food to the needy. We propose an android application in which the registered user can post the extra available food in their community for other users to come and get use of it by taking the extra food to the people in need.

Social BOT Detection for Twitter Dataset by User Action and Genetic Algorithm
Authors:- Sanjay Soni , Dr. Ritu Shrivastava

Abstract:- Digital platform dependency of today era attract promoters to brand product services. So unwanted posting was done by some programs known as bot. Number of researchers have proposed different techniques to identify these bots which was post by bot programs. This paper has developed a model to identify bots from real user. User action were analyze as features for classification of bots and real user. Whole processes adopt graph based clustering and teacher learning based optimization genetic algorithm. Graph based clustering classify user into two class and genetic algorithm find the class representative action sequence in form of features. Experiment was done on real twitter dataset and result shows that proposed model has increase the detection accuracy of work.

Twitter Fake News Analysis using Classification Techniques
Authors:- Khushbu Tomar, Prof. Manoj Kumar Nagar

Abstract:- Sentiment analysis is the computational study of opinions, sentiments, evaluations, attitudes, views and emotions expressed in text. It refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive or negative sentiment. Sentiment analysis over Twitter offers people a fast and effective way to measure the public’s feelings towards their party and politicians. The primary issue in previous sentiment analysis techniques is the determination of the most appropriate classifier for a given classification problem. If one classifier is chosen from the available classifiers, then there is no surety in the best performance on unseen data. So, to reduce the risk of selecting an inappropriate classifier, we are combining the outputs of a set of classifiers. Thus, in this paper, we use an approach that automatically classifies the sentiment of tweets by combining machine learning classifiers with lexicon-based classifier. We physically mark a broad Twitter data set of 100,000 tweets and perform low quality content discovery continuously dependent on the described noteworthy highlights and word level investigation. The consequences of our exploration demonstrate that our technique has a high precision of 0.9170 and a decent F1 of 0.9460 dependent on an irregular woodland classifier with continuous execution in the discovery of low-quality substance in tweets. Our work in this manner accomplishes a positive effect in improving client involvement in perusing internet-based life content.

Power Quality Improvement Using Istatcom (Improved Statcom) With DFIG
Authors:-M.Tech. Student Kuldeep Singh, Assistant Professor Dr. Bhupendra Kumar

Abstract:- In tradition power compensation devices and controlling techniques many disadvantage like only analyzing lower stability citeraia.one other hand our proposed ISTATCOM (Improved STATCOM) provide higher stability and lower losses. These are simulating MATLAB2015A software using Simulink. In this research work also gives a more stabilize DFIG system to controlling of power compensation ISTATCOM.

A Review of Power Quality Improvement Using Istatcom (Improved Statcom) With DFIG
Authors:- M.Tech. Student Kuldeep Singh, Assistant Professor Dr. Bhupendra Kumar

Abstract:- Along with the increasing of electricity load type and capacity, the problems of the power quality, especially reactive power and harmonic, are a serious threat to the safe operation of power grid. Static synchronous compensator (STATCOM), as an important member of the FACT, has been widely used as the state-of the-art dynamic shunt compensator for controlling reactive power in transmission and distribution. It has attracted an extensive attention in domestic and foreign scientific and engineering fields with excellent performances of its smooth reactive power regulation and fast dynamic characteristics. Comparing with the traditional synchronous condenser. Static var compensator SVC, STATCOM which has a small size, a faster speed, a wide operation range has a great advantage in performance and can effectively compensate the reactive power, suppress harmonic current and provide voltage support for transmission system, it will be more and more widely used. This paper introduces the background, application status, challenges and development trend of STATCOM, pointing out that with the development of new technology and new power electronic devices and STATCOM in distribution network, STATCOM will occupy a very important position in the grid.

Review on Kinetic Energy Recovery System for Bicycle
Authors:- Khushbu Tomar, Prof. Manoj Kumar Nagar

Abstract:- This paper is a literature review on KERS for bicycle. Kinetic Energy Recovery System, commonly abbreviated KERS, is a system to recover the Kinetic energy of a moving vehicle under braking. This system stores the kinetic energy in the form of potential energy and converts it back to kinetic energy when needed. When riding a bicycle it becomes too tiresome to start the bicycle again after braking. If the bicycle is provided with a kinetic energy recovery system then the rider will have two power sources that he can use at his will. When brakes are applied kinetic energy is wasted because the kinetic energy converts into heat energy due to friction at the contact surface and the heat energy dissipates into the atmosphere due to thermal radiation. Vehicles equipped with KERS devices are able to take some of its kinetic energy out slowing down the vehicle. This is a form of braking in which energy is not wasted, instead gets stored in some device. Using a proper mechanism, this energy that is stored in terms of potential energy can be converted back into kinetic energy to give the vehicle an extra boost of power. In the literature review different types of available KERS systems are compared and a mechanical based KERS system is found to be the best suitable for a bicycle.

Student Information System
Authors:- Professor Apeksha Gopale, Kharmale Akshay Kans, Khan Nayaab Moiz Ahmed, Siddiqui Shamshad Hussain

Abstract:- (SIS) Student Information System enables us to access all of the necessary forms of information required by the users or the teachers to manage their own or others authorized record, let’s say students records in an automated manner over the internet at any point in time [1]. The information or the documents of the c and date sor students are manipulated in such a way that it provides an alliance with the system to balance the student’s information. The organizations such as big universities make use of or recycle the records of the students very effectively and efficiently [5]. All the data available in the form of digital documents which are updated, modernize and renovated time to time by the department or the administration, which in this case is the faculties and the higher authorities in an organization, are most likely to be treated as sensitive data for every section [2]. The college details as well as the student’s details along with the course and batch details followed by curriculum and placement details and more importantly academic-related records and reports with all the necessary resources are taken care of or handheld by the (SIS) Student Information System [3]. The Student information system allows us to examine and analyses all the interest,affairs and transactions in the college, Different ambiguity and uncertainties can be produced and established on various substitute or preferences related to the student’s semester including the courses and the examination[2].

Design and Development of Refrigeration and Air Conditioning Instructional Trainer
Authors:- Orlando D. Sumalpong, Jr. , Dr. Alenogines L. San Diego

Abstract:- The study aims to infuse advanced educational technology in classroom instruction or training on refrigeration and air conditioning. Specifically, the focus of the study includes designing, developing, fabricating, and evaluating the instructional trainer. Through simulations, end-users experiences the actual function of the refrigeration and air conditioning system that could help enhance students learning capabilities and skills in basic troubleshooting on both electrical and the mechanical system. This trainer was evaluated by twenty-five (25) respondents composed of two (2) faculty and twenty-three (23) students to determine its level of quality in terms of functionality, reliability, portability, aesthetics, economy, safety, and academic impact using a descriptive survey questionnaire. Based on the result of the study, the trainer’s functionality, reliability, portability, safety, and academic impact are Excellent while the aesthetics and the economy are Very Good. This implies that the trainer serves its purpose in providing comprehensive teaching-learning capabilities to equip the users with thorough knowledge and skills. It is recommended for further research studies to use Programmable Logic Controller (PLC) in monitoring and in detecting the pressure and temperature of the refrigeration system; to inject more faults in the trainer to enhance the troubleshooting skills of the students, and to mount a whiteboard for lecture purposes at the back of the trainer.

Predicting and Managing Data using Cloud Computing
Authors:- S.Kaviarasan, E.Venkatesh, S.Shrinivasan, E.L.Sarath Pranev

Abstract:- Stock value forecast has been an inclining yet mystifying topic for quite a long period of time. These days developing of information become essential effort to store and maintain information. On the other hand due to availability of large number of data in all fields, it helps to manipulate the available data and makes that data to get useful by required way. Because of increased data volume information become significant job in all spots. By considering an under-used information source client can assume a job, for example, forecast of future investigation. Using corporate to analyze and build the predictor for future visit volume and for corporate predicts the stock price for product get falls up and down. By utilizing information sources we exhibiting the extravagance of the information source, shows how the information can be utilized to improve stock cost in corporate, finds intriguing patterns and conduct, gives stock cost to item finds a workable pace. The aftereffect of these examination are made utilizing KNN and mix calculation. This assists with understanding the upside of investigation of information and forecast report shows the information in visual diagram which makes the client to improve understanding.

Performance of Total Quality Management in Manufacturing Industry to Increase Production Rate
Authors:- M.Tech. Scholar Gaurav Awadhiya, Professor Trilok Mishra

Abstract:- The main objectives in implementing Total Quality Management (TQM) in any organizations are to ensure their products manufactured or services provided shall satisfy their customers’ requirements and needs. Therefore, the level of awareness of TQM has increased considerably over the past few years. Due to this reason, the objectives of this research are carried out to investigate the level of TQM implementation and to pinpoint areas lacking in implementation in a manufacturing industry.A case study on a TQM project in a manufacturing industry is formulated and presented. The objective of this thesis is to study the application of some important TQM tools and techniques subsequently study the benefits gained through implementation of these tools. The analysis will be carried out on the basis of research on TQM in the practice, pointed out in literature by different authors in this field. The finding shows that productivity of RPS assembly line YAD model improves by increasing the production rate from 77% to 99 %. The evidence presented shows that companies that do adopt quality cost model are successful in reducing quality costs and improving quality for their customers.

Twitter Data Analysis using Machine Learning Classification Techniques
Authors:- M. Tech. Scholar Nisha Kumawat, Assistant Professor P. Kumar Choure

Abstract:- Sentiment analysis is the computational study of opinions, sentiments, evaluations, attitudes, views and emotions expressed in text. It refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive or negative sentiment. Sentiment analysis over Twitter offers people a fast and effective way to measure the public’s feelings towards their party and politicians. The primary issue in previous sentiment analysis techniques is the determination of the most appropriate classifier for a given classification problem. If one classifier is chosen from the available classifiers, then there is no surety in the best performance on unseen data. So, to reduce the risk of selecting an inappropriate classifier, we are combining the outputs of a set of classifiers. Thus, in this paper, we use an approach that automatically classifies the sentiment of tweets by combining machine learning classifiers with lexicon-based classifier. We physically mark a broad Twitter dataset of 100,000 tweets and perform low quality content discovery continuously dependent on the described noteworthy highlights and word level investigation. The consequences of our exploration demonstrate that our technique has a high precision of 0.9170 and a decent F1 of 0.9460 dependent on an irregular woodland classifier with continuous execution in the discovery of low-quality substance in tweets. Our work in this manner accomplishes a positive effect in improving client involvement in perusing internet-based life content.

Review of The Optimal Coordination of Directional Overcurrent Relay Using Moth Flame Optimization
Authors:- Shobha Goswami, Assistant Professor Tikeshwar Gajpal

Abstract:- A comprehensive review of different optimal coordination methods like seekers algorithm, fire fly algorithm, hybrid genetic algorithm, hybrid PSO, artificial bees colony, flower polliation ,CMA-ES algorithm, GANLP for mitigate the relay problem. Relay coordination is essential to ensure quick operation of relays in order to avoid the excessive damage to the equipment’s and end users consumers. As the probability of shunt fault occurring in the network is higher comparatively so protection is done accordingly. Relay coordination means coordination of proper relaying operation with certain insight between primary and back-up relays pair connected in the network.

Cargo Management System Using Ethereum Blockchain
Authors:- Rensen S., HeadSajeev J., Principal Dr. Mahalakshmi T.

Abstract:- The Cargo management system is developed in truffle framework, Solidity, Php and has the MySql database. The objective of this product is to deal with all the cargo business. The product stores the subtle elements of the packages the client need to dispatch. The name of the package, weight, number of packages or compartments, starting point port, and the destination port. During shipping as indicated by the data given by various clients, every one of the bundles is loaded and shipped. The quantity of packages is noted down in the product and the same report is given to the clients of the destination port. At the point when the packages achieve the destination place, the client of the destination place verifies whether every one of the packages is available and are come to securely. If so bundles of clients are partitioned again and they are sent to their goal put either through train or through street transport. At the point when the packages have achieved their last address, a notice is sent to the client of the cause place. The client must pay the transportation to add up to the freight administration.

Reciting Chatbot for Image Recognition in Goal-Driven Training
Authors:- S. Kaviarasan, M.Arun Prakash, S. Arun Raj, K. Ram Kumar

Abstract:- In the age of Chatbots, they’re assisting us to locate merchandise, places, food or even clear up customer service problems with increasing in AI technology. Chatbot will educate you concerning noteworthy matters just like the need to click a hyperlink or they are human, no longer robots. Especially, given an image, a discourse history, and a picture issue, the specialist must ground the photo question, result in records placing, and solution the inquiry precisely. User photos may be uploaded to the chatbot API and then the photo can be processed. After that API displays remark approximately the image which we uploaded. In that grounded records can be degraded to bot by consumer over a long chat. To enhance this, we generally tend to devise an honest auxiliary goal that encourages Q-BOT to raise diverse queries, accordingly decreasing repetitions and subsequently optional A-BOT to explore a bigger kingdom residence all through RL i.e. To be exposed to quite a few visible ideas to speak about, and varied inquiries to reply. This may be performed by way of aim pushed training to customers query to get a greater precise solution to the consumer.

Sentimental Analysis on Social Data Using Machine Learning and Supervised Learning Techniques
Authors:- Pillala Sri Harsha Devi

Abstract:- Social Website provides a convenient platform, on which users can share information with their friends and post their timely status or attitude. There exits the most up to date and heterogeneous data of users, different social websites provide various functions that users can upload, comment and repost messages with different media types. Sentiment analysis aims at computationally identifying people’s opinion or attitude towards entities such as events, topics or product features. This work is also known as opinion mining or subjectivity analysisSentimental analysis on social data i.e., sentiment analysis can apply to almost all possible domains like products, services for social events and political elections, market research, social media, advertising, recommendation systems, email filtering, stock market prediction, upcoming movie reviews sentiment prediction, book reviews sentiment, etc In the existing system sentiment orientation from review text documents using machine learning and supervised learning algorithm techniques. The algorithms that are projected and implemented are Naive Bayes (NB), Support vector Machine (SVM) and K-means clustering algorithmic methods. We enhanced these techniques to develop more accurate results using Neural network and deep learning algorithms and features.

Heist Tracking and Prevention in ATM Utilizing IOT and Blynk Server
Authors:- M. Sugapriya

Abstract:- In the digitalization, everybody needs cash without cooperation with bank whenever along these lines the ATM (Automotive Teller Machines) are introduced wherever inside the localities. Because the measure of ATMs expanded, anticipation of robbery and security of client is that the prime goal. at this, security frameworks aren’t profoundly made sure about as they’re just given alert. This venture manages plan and usage of ATM security framework utilizing NODEMCU. The prime target of this undertaking is, to make sure about the ATM framework utilizing IOT and vibration sensor. When a hoodlum enters and attempted to hurt the machine, the vibration sensor which is appended to the machine get vibrated and imparts the sign to the NODEMCU microcontroller. When the regulator gets signal, it bolts the entryway of ATM room by imparting sign to the dc engine and sprinkler sprinkles the chloroform to shape the hoodlum oblivious. The ringer additionally will be getting initiated simultaneously to alarm the close by individuals of ATM framework. All the while, the regulator will make an impression on an authorized individual of the bank through GPS modem and subsequently the entryway is made to open simply in the wake of entering the secret phrase by the bank staff.

Effect of Infill parameters on Time, Material Length, Weight and Price in 3d Printing
Authors:- Vishal Vijay Gholkar

Abstract:- As we know that 3D printing is new emerging technology that growing fast and lots of research carried out on this topic. This paper show that effects of three different infill patterns on printing time, length, weight of material and price in 3D printing. Standard 3D printers use 13 different types of infill patterns. We tested infill patterns of lines, zigzag and cubic with different layer thickness, speed, infill percentage to calculate length and weight printing time and price using Cura software. An orthogonal array was used for the experimental design. Optimum process parameters were determined by the gray relational grade obtained from the gray relational analysis. The results showed that the layer thickness 0.4mm, speed 80mm/sec, infill percentage 40%, and infill pattern cubic had the fastest printing time as compared to others.

Determinants of Members’ Participation in Maize Marketing through Cooperative: The Case of Boreda District of Gamo Zone, Ethiopia
Authors:- Tariku Wobete M.sc., Tekle Leza, Ph.D.

Abstract:- Cooperative, as economic enterprises, play a meaningful role in uplifting the socio-economic conditions of their members and their local communities. Reducing the challenges the agricultural cooperatives are facing, and using their potentials can support to have tenth agricultural sector and economic growth of the country. The objective of this study is therefore to identify determinants of members’ participation in maize marketing through cooperatives at Boreda District of Gamo Zone, Ethiopia. Primary and secondary data were collected for this study. Multi-stage sampling procedure was employed to select three Multi-Purpose Primary cooperatives and out of 733 cooperative members, 129 sample respondents were selected. Primary data to the year 2019 was collected from selected respondents through the interview Schedule. Out of the total sampled households, 73.64%, and 26.36% participants and non- participants were selected through maize marketing cooperative respectively. Descriptive statistics were used to compare the socio-economic and institutional characteristics of the participants and non-participants households of maize marketing through cooperative. The T-test was used to determine whether there is a significant difference between the means of two groups and Chi-square test was used to see the relationship between the two groups. Heckman two-stage selection models were employed to identify the participation decision and level of participation of cooperative members in the maize market. A total of fifteen explanatory variables were included in the descriptive analysis, off which eight variables influenced the members’ participation in maize marketing through cooperative. Whereas thirteen explanatory variables were incorporated in the Heckman two stage model and eight variables such sex, education status, farm size, farm experience, non-farm income, market distance, cooperative members satisfaction and maize production significantly affects the participation decision in maize market through cooperative. And four variables such as, farm size, training, market distance and members’ satisfaction significantly influence the level of participation in maize marketing through cooperative. The policy implication of this study is that continuous training, and education, improved maize production with diversification of income sources has to be maintained.

Pushover Analysis of Steel Structures
Authors:- Narla Sai Krishna, Assistant Professor P.Hanuma

Abstract:- In a decades ago Steel structure has assumed a significant job in development Industry. It is important to plan a structure to perform well under seismic burdens. The seismic presentation of a multi-story steel outline building is planned by the arrangements of the current Indian code (IS 800 – 2007). The shear limit of the structure can be expanded by presenting Steel bracings in the basic framework. Bracings can be utilized as retrofit also. There are „n‟ quantities of conceivable outcomes to organize Steel bracings, for example, D, K, and V type erratic bracings. A regular six-story steel outline building is intended for different kinds of offbeat bracings according to the IS 800-2007. D, K, and V are the various sorts of flighty bracings considered for the current examination. Execution of each edge is concentrated through Non-linear static analysis.

Alternative Strengths to Concrete by Stone Dust and Ceramic Scrap and Effective Utilisationof Solid Waste
Authors:- Kiran Niveditha

Abstract:-The compressive strengths of concrete using natural sand and quarry dust were measured in the laboratory. Compressive strength was found to increase with ages for normal concrete. Results show that with partial replacement of stone dust with 05% and 05% Ceramic waste coarse aggregate, flexural strength increased by 20, 48 and 40% at the age of 28 days as compared to referral concrete. Compressive strength of concrete made using 05 % ceramic waste aggregate and 05 % stone dust as replacement of coarse aggregate and fine aggregate respectively, is about 20% more than that of referral concrete at 28 days. However, compressive strength at 05% recycled aggregate and 05% stone dust is marginally than that of conventional concrete. The compressive strength of 05% stone dust and ceramic waste sample is in close proximity of the referral concrete. Thus, it can be concluded that stone dust up to 05% with 05% ceramic waste aggregate is satisfactory for use. Observing the above results, strength aspects of ceramic waste aggregate concrete is well within the permissible limits and ideal replacement level of ceramic waste is 20% and 40%.Water absorption of ceramic waste aggregate was 0.18% higher than that of natural aggregate (0.10%), due to the opening of pore structure during crushing and chiselling. Even after crushing and chiselling, few cracks were observed on surface of ceramic waste. For these reasons water absorption was little more than that of the natural aggregate. Both compressive and split tensile strengths decrease as the quantity of ceramic waste aggregate increases.

Robot Assisted Brain Wave Sensor Network in Smart Home Environment for Elderly Persons
Authors:- S.Ravi Teja, S.Alekhya, Prof. Dr. P. Rama Koteswara Rao, Prof. & Hod Dr. K. V.Sambasiva Rao

Abstract:-Human brain consists of millions of interconnected neurons. The patterns of interaction between these neurons are represented as thoughts and emotion-al states. According to the human thoughts, this pattern will be changing which in turn produce different electrical waves. A muscle contraction will also generate a unique electrical signal. All these electrical waves will be sensed by the brain wave sensor and it will convert the data into packets and transmit through Bluetooth medium. Level analyzer unit (LAU) will receive the brain wave raw data and it will extract and process the signal using MATLAB platform which is shown in data processing unit. Then the control commands will be transmitted to the robot which is the assistive robot. With this entire system, we can move a robot according to the giving instructions to the robot and it can be turned by blink thoughts and it can be turned by blink muscle contraction. Electroencephalography (EEG) is the measurement of electrical activity in the living brain. In this project we used a brainwave sensor to analyze the EEG signals . This design discuss about processing and recording the raw EEG signal from the Mind Wave sensor in the MATLAB environ-ment and through WIFI transmission control commands will be passed to the Robot section. Mind wave sensors are not used in clinical use, but are used in the Brain Control Interface (BCI). The BCI is a direct communication pathway between the brain and an external device to provide direct communi-cation and control between the human brain and physical devices by translating different patterns of brain activity into commands in real time . This project work consists of a Processor using brain wave sensor and alert unit obstacle detection unit as hardware parts and an effective brain signal system using Matlab platform. Now, the owner has to check whether the robot move or not. If he is a not walking then the robot will automatically start. But if he is normal mode then the vehicle will run and there is no alert. Once the car received blinking command it will stop regardless the place. Further, if the owner wants to move the vehicle he has a need to come normal mode. This will help to avoid the movement during in person. The existing system is not having any remote control operation. Depend on others to operate and No muscle contraction sensing and the proposed system is having the Brain wave analysis for the signal which are taken from the human brain as shown in the block diagram, is having controlling of the robot using Human thoughts, Self controlled and operating facility for not to depend on others to operate. This project at Matlab, explains that silent speaking in the sense of this platform is “conscious effort to say a word, characterised by subtle movements of internal speech organs without actually voicing it.” The process cap-tures signals from the brain to the muscles when the user intentionally vocalizes internally. The device later connects such signals with an external compu-ting device. Similar to speech recognition systems, it allows the user to make orders to such devices, but without saying anything.

An Analysis of Alternative Water Sources in BudiriroSuburb Harare
Authors:- Tichaona Goto, Iris Shiripinda, Anthony Phiri, Fanuel Tagwira

Abstract:- The quality of water being used by residents in Budiriro is a major health issue. Water system in Budiriro suburb is centralised through the reticulated water system which is not enough for the residents. The serious water shortage in Budiriro has forced residents to rely on unsafe water sources resulting in the area being endemic to waterborne diseases. This study sought to determine the impact of the quality of the water being used by residents in Budiriro. An analytical cross-sectional study was conducted that combined quantitative and qualitative methods. A structured questionnaire was used to obtain information on alternative water sources A total of 72 samples were collected over a period of four months. Twenty-five (25) borehole water samples, 41 well water samples and 8 from the City of Harare tap water. Data from the questionnaires was captured and analyzed using SPSS (statistical package for social science) in line with the objective Sixteen percent (16%) of the boreholes and 56% of wells sampled did not meet the WHO total and faecal coliform standards of zero per 100ml. Thirty-eight percent (38%) of residents use the water without any form of treatment. Results show that residents are potentially exposed to waterborne diseases. This study concludes that water from alternative sources in Budiriro is of poor quality. The study ascertains the relative importance of the use of different sources of water leading to the development of a distribution planning model for different sources of water to Budiriro residents.

Paper on Aituc Database Software
Authors:- Prasenjeet Bansode, Rohan Khaire

Abstract:- AITUC (All India Trade Union Congress) is organization in India, who looks after the workers, employees, and many individuals needs and welfare of them and their employers. They needed an application as they need to track of the members all over sectors. The application is a step up from paper work.

Modern Printer
Authors:- Associate Professor Mr. Parthiban, Ms. Ramya, Ms. Harinevalli, Ms. Kausalya, Ms. Arisha

Abstract:- The main aim is to explore the theories and techniques behind procedures of developing a high precision cost-effective Portable android printer. This newly designed tool may be widely employed in electrical industry and graphics to enhance the standard of printing which has additional benefits like desired font size and magnificence. Various structures were explored and compared during the planning stage. as in Ref.7 Different components for the development of prototype were carefully selected and purchased from the market. Stepper motor and servo motor drives was used because the motion controller. A newly designed motion controller using Arduino and CNC V3 shield a4988 which is accessed using ben-box software or the self developed application was also tested and implemented as a replacement of ordinary CNC to cut back the price. as in Ref.1 This developed prototype machine was tested under various conditions and procedures to satisfy the economic standard. Analysis of product and profit estimation was conducted after development of the product.

Thermodynamic Analysis of Triple Effect LiBr-H2O Vapour Absorption Refrigeration System
Authors:- M.Tech. Scholar Gagan Pashine, Assistant Professor Roopanshi Tomar

Abstract:- The absorption refrigeration system (ARS) is becoming more important because it can produce higher cooling capacity than vapor compression systems, and it can be powered by other sources of energy (like waste heat from gas and steam turbines, sun, geothermal, biomass) other than electricity. In the recent years, the interest in absorption refrigeration system is growing because these systems have environmentally friendly refrigerant and absorbent pairs. In this study, a detail energetic analysis of triple stage LiBr-H20 absorption system using First law of thermodynamics is done. A EES code using computer simulation program is developed for simulating the cycle and the validation of results with past studies is also done. Mass, energy and exergy balance equations and the various complementary relations constitute the simulation model of the triple effect refrigeration system.Further, the effect of exit temperature of generator, absorber, condenser and evaporator on COP, solution concentration and other parameters are studied. It was found in the study that COP increases with increasing the generator exit temperature keeping the absorber exit temperature constant but when the absorber exit temperature is increased COP tends to decrease and the concentration of weak solution leaving HP generator (Xw3), MP generator (Xw2) and LP generator (Xw1) also increases with increase in generator exit temperature, while it decreases with increase in condenser exit temperature.

nvestigation of Radium Content and Radon Exhalation Rates in Archeological Areas in Luxor Governorate
Authors:- H. H. Negm,N. K. Ahmed, A.Abbady, M. M. Reda

Abstract:- In this study, long –term technique for alpha guard have been used to count radium content and radon exhalation rate in archaeological specimens.Specimens collected from Elkebash street, west bank, Luxor and Elkarnak temples. The values of radium contents were ranged from 181.12 to 236.04 with average value 207.919,from 89.41 to 151.84 with average value 122.42, from 121.68 to 217.856 with average value 167.89and from 66.46 to 106.75 with average value82.26 for Elkebash, luxor temple,west bank and ELkarnak temple respectively.In the other hand the Mass Exhalation Rate (EM)were from 0.99 to 1.78 with average value 1.5 ,from 0.67 to 1.14 with average 0.92 from 0.91 to 1.64 with average value 1.27 and from 0.50 to 0.80 with average value 0.62 for Elkebash, Luxor temple ,west bank and ELkarnak temple archaeological specimens while the Area Exhalation Rate (EX)for Elkebash, Luxor temple ,west bank and ELkarnak temple were from 8.39 to 15.04 with average value 12.65 ,from 8.39 to 14.04 with average 11.77 , from 7.4 to 13.3 with average value 10.23 and from 5.48 to 6.9 with average value 6.2 respectively.

Autonomous UV Sanitization Robot with Social Distancing, Body Temperature and Mask Detection Using Automatic Path Planning and Multi-Terrain Capabilities
Authors:- Aryan Mehta, Mohan Kshirsagar, Reetu Jain, Shekhar Jain

Abstract:- With the outbreak of the infectious coronavirus disease development of new norms and rules in every country have been taken. Wearing a mask and implementing social distancing along with frequent sanitization of public areas is of utmost necessity during this worldwide health crisis. Subsequently, officials have been appointed roles to monitor the extent and ensure the effective compliance of the new guidelines by the general public. However, it would be very difficult for humans to correctly administer this for a prolonged period of time. Moreover, this would not only pose a threat to the public, but also affect the person conducting the screening process. In an attempt to find a solution to this issue, the proposed autonomous UV sanitization robot has a complete utility based design which helps in detecting social distancing and the wearing of masks using image processing. Thermal imaging is also utilised to detect whether a person is suffering from a fever. The main feature of this design is to provide complete sanitization using ultraviolet light as a disinfectant by a process known as ultraviolet germicidal irradiation (UVGI). Special rotating outward flaps containing UV tube lights increase the range of disinfection to higher areas on walls and even extend to ceilings. A bell drive mechanism forms the locomotive basis defining the mobility of the robot. Rotating flippers have been connected to the shafts of the main wheels which help dynamically manoeuvre the robot. Its multi-terrain capabilities make it versatile enough to be deployed in various public places including hospitals, malls, shopping centres, parks, and even on the road. With thorough simulative experimentation, impressive results have been obtained which help achieve the main aim of this study.

A Review on Audio Video Based Person Authentication System Using Multi SVM
Authors:- M.Tech.Scholar Ranjana Patel ,Krishna Kumar Vishwakarma

Abstract:- Object detection and tracking is often the first step in applications such as video surveillance. We propose a general moving object detection and tracking based on vision system using image difference algorithm. Then the speech of the person is recognized to get the feedback from the corresponding person. This process focuses on detection of human in a scene and then speech signal processing was done..We proposed new technique for human identification using fusion of both face and speech which can substantially improve the rate of recognition as compared to the single biometric identification for security system development. Our system using Viola Jones Algorithm for face detection. The proposed system uses Local Binary Pattern (LBP) as feature extraction techniques which calculate the local features. The Mel-Frequency cestrum coefficients feature extraction techniques are used for speech recognition in our project. The Extracted features given as input multi-SVM classifier to used to recognize the person and then display the result. This new system can be applied in various different fields such as identity verification and other potential commercial applications.

Performance Analysis of Audio and Video Based Person Authentication Using Machine Learning Technique
Authors:- M.Tech.Scholar Ranjana Patel ,Krishna Kumar Vishwakarma

Abstract:- Object detection and tracking is usually the first step in applications such as video surveillance. The main purpose of the static camera’s face recognition and tracking system is designed to estimate speed and distance parameters. We propose a general use of detection and tracking method that moves object based on a visual system and using an image difference algorithm. Then recognize the person’s voice to get the corresponding person’s feedback .This process focuses on detecting people in the scene and then performing voice signal processing the first approach is the use of the video structures to extract scene boundary candidates from shot boundaries. Then using the MCMC method to select the true scene boundaries from these candidates, highly-accurate scene segmentation becomes possible. It should be noted that when the prior probability concerning the number of scenes in a target video sequence is given correctly, the MCMC method can provide a more accurate scene segmentation result This approach based on the classification person authentication using multi SVM approach to improve classification accuracy this simulation has performed on matlab simulation.

Performance Black Hole Attack Detection in MANETs Using Secure Based Technique
Authors:- M. Tech. Student Nitiksha Sharma, Assistant Professor Sujeet Mishra

Abstract:- A Mobile Ad-hoc Network (MANET) is a lot of nodes that impart together agreeably utilizing the remote medium, and with no focal organization. Because of its inborn open nature and the absence of framework, security is a convoluted issue contrasted with different systems. That is, these systems are powerless against a wide scope of attacks at various system layers. At the system level, malignant nodes can play out a few attacks going from detached spying to dynamic meddling. Wormhole is a case of serious attack that has pulled in much consideration as of late. It includes the redirection of traffic between two end-nodes through a Wormhole burrow, and controls the directing calculation to give figment that nodes situated a long way from one another are neighbours. To deal with this issue, we propose a novel location model to enable a node to check whether an assumed most limited way contains a Wormhole burrow or not. Our methodology depends on the way that the Wormhole burrow diminishes essentially the length of the ways going through it. To keep the black hole, worm opening, community oriented black hole and flooding attacks, the counter measure which Secure esteem is figured on the premise of course ask for, course answer and information parcels. After count get put stock in values between 0 to 1. In the event that secure esteem is more prominent than 0.5 at that point marks node is solid and permit on a system generally piece. System execution of proposed convention secureed secure AODV steering convention (SAODV) is assessed. The outcome demonstrates execution change when contrasted with standard AODV convention.

Friend Recommendation System Using Machine Learning Method
Authors:- M.Tech. Student Shweta Soni, Assistant Professor Pratiksha Singhai

Abstract:- Friend recommendation is one of the most popular characteristics of social network platforms, which recommends similar or familiar people to users. The concept of friend recommendation originates from social networks such as Twitter and Facebook, which uses friends-of-friends method to recommend people. We can say users do not make friends from random people but end up making friends with their friends’ friends. The existing methods have narrow scope of recommendation and are less efficient. We put forward a new friend recommendation model to overpower the defects of existing system. For better friend recommendation system with high accuracy, we will use collaborative filtering method to compare similar, dissimilar data of users and will make a recommendation system which gives user to user recommendation based on their similar choices, activities and preferences. Location based friend recommendation system are becoming popular because it brings physical world to digital platform and gives better insight of user’s preferences or interest This recommendation system will increase the scope of recommendation from one user to other with similar set of interest and their location.

CFD Analysis of Finned Tube Heat Exchanger Using Nano Fluid
Authors:- Bhagwan Khande, Assistant Prof. Aditya Singh Lodhi, Prof. Dr. Atul Thakkar

Abstract:-Nano fluids consist of nanoparticles suspended in a liquid medium and the particle size is smaller than 100 nm. Nanofluids have great thermo-physical properties such as thermal conductivity, thermal diffusivity, viscosity and heat transfer coefficient as compared to their base fluids. The current research investigates the application of ZnO/water nanofluid on compact heat exchanger with circular tubes using techniques of Computational Fluid Dynamics (CFD). The CAD model is developed in Creo design software and CFD analysis is conducted using ANSYS CFX. The volume concentration of nanoparticles used for analysis are .02,.04 and .07. The CFD analysis is conducted for both laminar and turbulent flow regime using k-epsilon turbulence model. The temperature distribution, Nusselt number and pressure plots are generated to determine heat transfer characteristics. The results are encouraging and significant enhancement of heat transfer is achieved using ZnO/water nanofluid. However, the pumping power requirement also increased with increase in nanoparticle concentration.

Erosion and Sedimentation Impact on Storage Volume of Lom Pangar Hydroelectric Dam, Cameroon
Authors:- Ousmanou NJOYA, AKO Andrew AKO, Shengxin Zhao

Abstract:- For many purposes such as hydropower production, irrigation, flood control, many reservoirs are built throughout the planet. Because of the processes of erosion and sedimentation, these infrastructures generally face a big problem of accelerated reduction of their storage capacity. Consequently, a good knowledge of the change of storage for proper planning and management is very important. This work is carried out in order to determine the sediment transport into the Lom Pangar reservoir to check the decrease in the active storage volume. The RUSLA equation has been used for the determination of soil erosion in the catchment because of its ease of use and less data demande. The gross erosion was evaluated to be 19.7 million tons of soil per year with an average of 2.75 million tons per year that effectively reach the outlet. On that quantity that reach the outlet, the Brune′s sediment trap efficiency was applied and it was found that 0.04% of Lom Pangar reservoir decreases per year, an amount smaller than the 1% of annual worldwide reduction of water reservoir. That result obtained, shows that the soil erosion and then the sedimentation do not affect significantly the active storage of the Lom Pangar reservoir. But the region is experiencing an important land cover change with impact on erosion rate.

Smart Agriculture System Using Raspberry PI
Authors:- M.E.Ph.D. Ms.R.Deivanai, D.Archana, G.Gayathri, G.Joychristy, P.Nivetha

Abstract:- In olden Days Farmers used to figure the ripeness of soil and influenced suspicions to develop which to kind of yield. They didn’t think about the humidity, level of water and especially climate condition which terrible a farmer increasingly The Internet of things (IOT) is remodeling the agribusiness empowering the agriculturists through the extensive range of strategies, for example, accuracy as well as practical farming to deal with challenges in the field. IOT modernization helps in assembly information on circumstances like climate, dampness, temperature and fruitfulness of soil, Crop web based examination empowers discovery of wild plant, level of water, bug location, creature interruption in to the field, trim development, horticulture. IOT utilize farmers to get related with his residence from wherever and at whatever point. Remote sensor structures are utilized for watching the homestead conditions and tinier scale controllers are utilized to control and mechanize the home shapes. To see remotely the conditions as picture and video, remote cameras have been used. IOT development can diminish the cost and update the productivity of standard developing.

A Review on Design and Analysis of a UPQC Power Flow Control Using Distribution Transformer
Authors:- BhavSingh Ajnare, Mr. Deepak Bhtaniya

Abstract:- The current power sector is dealing with the poor power quality issues and the reason behind this poor power quality is voltage fluctuations, harmonics, transients and reactive power demands and these problems arises due to changing trend of our demand. Nowadays in our demand the share of power from power electronic devices has increase a lot and also coupling of grids to wind farms and solar farms has raised the problem of poor power quality.[25] No doubt series and shunt compensations are effective but if they are used simultaneously as a unified unit, this enhances the effectiveness of the device and becomes more beneficiary for power sector and they are used together as UPQC. So the main task of UPQC is to improve the power quality and it proves out to be quite good at that by compensating the above mentioned problems. Hence UPQC is considered as the efficient solution of the power quality problems. As the UPQC serves purpose of both series and shunt compensators, hence to provide this it contains two inverters, which are voltage source inverters with common DC link. These are called series and shunt converters. These controllers can be controlled by various techniques such as PI controllers, FUZZY controllers, Neural Networks etc .Shunt converter compensates the distortion in load current and the series converter is responsible for smoothening of voltage.

A Review article of Enhancement of Solid Oxide Fuel Cell Performance and Efficiency Using Power System Topology
Authors:- Deepshikha Nayak, Associate Professor Ritesh Diwan

Abstract:- The climate changes that are becoming visible today are a challenge for the global research community. The stationary applications sector is one of the most important energy consumers. Harnessing the potential of renewable energy worldwide is currently being considered to find alternatives for obtaining energy by using technologies that offer maximum efficiency and minimum pollution. In this context, new energy generation technologies are needed to both generate low carbon emissions, as well as identifying, planning and implementing the directions for harnessing the potential of renewable energy sources. Hydrogen fuel cell technology represents one of the alternative solutions for future clean energy systems. This article reviews the specific characteristics of hydrogen energy, which recommends it as a clean energy to power stationary applications. The aim of review was to provide an overview of the sustainability elements and the potential of using hydrogen as an alternative energy source for stationary applications, and for identifying the possibilities of increasing the share of hydrogen energy in stationary applications, respectively.

A Review onUPFC Power Compensation with Power Generation Smart Grid
Authors:- Suresh Waskle, Mr. Lavkesh Patidar

Abstract:- In this study a comprehensive review on unified power flow controller, which is a FACTS device, is presents. The essential features of UPFC controller and mathematical & simulation model was discussed The opportunities arise through the ability of this controller to control the interrelated parameters including series impedance, shunt impedance, current, voltage, phase angle and the damping of oscillations at various frequencies below the rated frequency are addressed. By providing added flexibility, FACTS controllers can enable a line to carry power closer to its thermal rating.

Implementation of a New Fourth Order Kutta’s Formula for Solving Initial Value Problems in Ordinary Differential Equations
Authors:- Ononogbo Chibuike Benjamin, Airemen Ikhuoria Edward, EzurikeUgochi Julia, Ugbolo Cletus

Abstract:- In this paper, we modified Kutta’s Formula for solving initial value problems (IVPs) in Ordinary Differential Equation to a geometric Mean other than the conventional Arithmetic mean. Due to the vital role played by the method in the field of computation and applied science/engineering, we simplify and further reduce the complexity of its derivation and analysis by exploring some possibly well-know works and proposed a step by step derivation of the method. The new Algorithm was further implemented and compared with other existing methods, and the results indicated that the new method is of high degree of accuracy in comparison with other existing methods, this shows that the new method can be use to solve real life problem, that can possibly be reduced to first order ordinary differential equations. Errors involved in the new method and other existing methods, were plotted with MATLAB to obtain their trajectories. We called this formula OCB4 method.

Design of Multistorey Building using Lead Rubber Bearing (LRB) in sap 2000
Authors:- Rayees Ahmad Wani, Prof. Mirza Amir Beigh

Abstract:- Base isolation has become a traditional concept for structural design of buildings and bridges in high risk areas. By introducing flexible isolation system between the foundation and the structure the system will absorb the shock impact effects of earthquake with the help of its flexibility. This way the seismic energy transmitted to the structure will be reduced to greater extent and the structure will remain stable for a relative period. Elastomeric bearings are widely used by structural engineers, but their behaviour is not well understood. The paper provides a brief description of the state of knowledge throughout the world with respect to these bearings and process of base isolation. It summarizes the material behaviour of elastomers and the theoretical and experimental research on bearings. It notes the various modes of failure, and the major design methods are described and compared. There are wide variations in standard practice throughout the world, and the contradictions and reasons behind the variations are noted. The objective of the paper is to help the structural engineer get a better understanding of the design and selection of base isolators.This study is about 7 storied building and is analysed for two cases. First case is fixed base and second case is base isolated (lead rubber bearing). for this study Sap 2000 along with various standard codes is taken into consideration. For base isolator parameters F.Naeim and J.M. Kelly is used.

Comparative Analysis of Types of Generators Uesd in Wind Energy Conversion System
Authors:-Nidhi Mathur, Ravi Jangid, Assistant Professor Raj Kumar Yadav

Abstract:- Wind is a form of solar energy caused by the combination of three concurrent events-The sun unevenly heating the atmosphere, Irregularities of the earth’s surface, rotation of the earth. Wind flow patterns and speeds vary greatly across the India and are modified by bodies of water, vegetation etc. Humans use this wind flow, or motion energy, for many purposes: sailing, flying kite and most important generating electricity.Wind turbine is an energy converter, which converts wind energy into electrical energy. It is manufactured n wide range for huge wind farms. The objective of this paper is to compare various generators used in wind farms.

A Review to Improve Self Managerial Skills of Engineering Students Using ICT Tools
Authors:- Ms. P. Stephy Christy, Mr. L. Sudarshan, Mr. M. Aakash Sam Leoj

Abstract:-In present times, the role of employing ICT tools in one’s daily life is inevitable. This research paper aims to insist the engineering students that they can improvise their self-managerial skills using ICT tools. The researches of this paper firmly believe that any individual is in need of improvising self-managerial skill ,as it paves way to attain their targeted goals doubtlessly and easily. This study explains about ten useful ICT tools, which highly facilitate the engineering students order to improve the most required self-managerial skills which help them to reduce their stress and enhance their motor skills and productivity skills. This review is based on selected ten ICT tools namely iEnginner-engineering text book, graphing calculator, engineering professional, technical terms,B.Techlibrary,voxit,Reference Generator, Resume builder 2019,Smart receipts, Digi locker. The main purpose of their review is to create awareness among the young engineers for improving themselves. Despite, it illustrates the scope and significance of the ICT tools discussed, their special features and limitations.Finally, this results asserts that any individual can improve their self-managerial skills using ICT tools that are relevant to manage their daily tasks personally, academically, professionally and socially..

Data Classification for Improvement of Product Recommendation System Using Hybrid Algorithm
Authors:- Saim Ahmed, Assistent Professor Anand Singh Rajavat

Abstract:-Recommender systems have made significant utility in daily routing life. Online shopping and Social networking sites are playing crucial role in routine life. Over 3.5 billion people uses internet for various purpose. Online shopping retail sales are predicted to grow steadily in upcoming years. Product recommendation is one of the major requirements of e-commerce portals. This feature can help to increase shopping value with minimum shopping time. Logical recommendation not only helps to customer for purchasing but also increases total sales value. Generally, consumers need to search a lot to find a product of interest. Consequently, conventional recommender service systems often suffer from lack of scalability and efficiency problems when processing or analysis of this data on a large scale. To avoid these problems, a novel recommendations system using collaborative filtering algorithm and customer behavior is proposed to implement with Apache Hadoop server for BigData Processing. Proposed solution will attempt to recommend product based on similarity and popularity index of each product with respect to customer review. This project will attempt to develop own customer behavior analysis and classification algorithm to provide more perfect results. Amazon dataset will be used recommendation and evaluation purpose. Computation time for single and multimode cluster will be primary concern for performance measurement.

Knowledge, Attitudes and Practices of Budiriro Residents Towards the use of Unsafe Water Sources
Authors:- Tichaona Goto, Anthony Phiri, FanuelTagwira, Iris Shiripinda

Abstract:- The global problem of access to safe water and sanitation continues to plague the poor countries of the world. This study attempts to determine the impact of different water sources on the residents of Budiriro high density area in Zimbabwe. The knowledge of residents about safe water chain maintenance interventions and the extent to which they are practiced is important in planning practical and operational interventions on improving the quality of unsafe water. An observational and cross-sectional study was conducted from October 2018 to June 2019. Semi structured questionnaires, focus group discussions, key informant interviews, and observation checklist were used to obtain information from 237 households which were systematically sampled. The majority of residents 77% were well informed about the different water sources. Most of the residents 86% (n=198) preferred using these sources than piped water which they believed was unsafe. Almost half (52%) of the residents knew that unsafe water sources caused waterborne diseases which are endemic in the suburb. Budiriro residents are quiet aware that the water they use is unsafe for human consumption due to the recurrence of waterborne diseases. Development of a planning model on the distribution of different water sources is the only solution not for Budiriro residents only but for other suburbs and cities regionally and globally.

Website Development of E Web Digital
Authors:- Professor Jadhav A.K, Krishna Dayma, Priytosh Bairagi, Atharva Khopade, Ajinkya Hapse, Rutik Wagh

Abstract:- A website helps to boosts many businesses it, improves advertising effectively, saves money on printing and distribution cost, effortless access and increased productivity .The motive of this study is concerned with coming up with a website that is easily understood by the visitors, and can lure them to become customers. We found in our analysis that developing a responsive website is not as comfortable as it sounds, it requires more focus and precision to do so.

Blockchain Smart Contracts for EfficientDisaster/Pandemic Relief & Recovery
Authors:- Pranshu Gupta

Abstract:- Disasters and Pandemics kill thousands of people every year globally. Many people die because of the direct impact of the disasters but many more die because of indirect causes. Some of the indirect causes are: inadequate funds, delay in making resources available to affected communities because of inefficient disaster relief supply-chain.Trust and corruption are few factors behind inadequate funds. Many people willing to help, don’t know or don’t trust the organisations providing relief efforts. Trust is a very genuine concern as corruption in the supply chain is very prevalent.Lack of central communication between various organisations, volunteers and governments is the reason behind inefficient supply-chain. This adds delay in making resources available to the needy and hence leads to greater loss of life.This paper illustrates some of the problems in the light of the recent covid19 pandemic and presents an approach which could fix the trust issue and also optimizes disaster relief supply chain with the help of blockchain technology.

A Review Article of E Waste Management by Prediction Method in Jabalpur City
Authors:- Shyam Patidar, Dr. Shailza Verma

Abstract:- Environmental deterioration and health risk due to improper e-waste management has become a serious issue in India. The major portion of e-waste reaches an unorganized e-waste recycling sector and is then treated by using crude methods. This review article presents a brief highlight on e-waste management status, legislation, and technology uses in India. The present e-waste management needs to be more focused on environmentally sound management, by more active support from all the participants involved in the e-waste flow chain in India.

A Review Article of Solid Waste Management and Sampling Methods in Jabalpur City
Authors:- Sumit kumar, Prof. R.K. Bhatia

Abstract:- It is known that the waste which is thrown away can be used in many different ways. This paper deals with the solid waste management methods and practices in India. The solid waste management consists of various types of wastes like industrial, agricultural, transport, municipal etc. Although all types of wastes are harmful but municipal solid waste ‘now known as Solid Waste’ is the type of waste which can be managed properly without causing any pollution and harm to other species. In this paper the main focus is on municipal solid waste. Various methods have been described to manage the solid waste from organic compost making to energy generation.

Experimental Investigation on Rotary EDM of Stainless Steel Alloy Material Using Pentagon Copper Electrode for Improving Geometrical Errors
Authors:- R. Raja, M. Ravi, S. Saran, C. Sarathkumar, S. Soundarpandiyan S,

Abstract:- In this research, an investigation and experimental work were carried out on Electric Discharge Machining of stainless steel alloy using copper electrode. Considering the input parameters such as current, pulse on time, pulse off time, Di electric pressure for machining the effect of these following input parameters on output characteristics like material removal rate (MRR), Electrode wear rate (EWR), Wear ratio (WR), Angularity, Parallelism and Perpendicularity (PER). The investigation was carried on with L18 orthogonal array. The effect of each input parameters on output characteristics was studied independently using trend analysis. Form results, Parallelism have been minimized with decrease of current and increase of dielectric pressure. Perpendicularity has been minimized with decrease of current and increase of dielectric pressure. Angularity has been minimized with increase of current and decrease of dielectric pressure.

Safety and Hazards in Petroleum Industries: Research, Studies and Surveys
Authors:- Mukul Dhariwal

Abstract:- Environmental friendly and safe operations and processes are always desired from health perspectives. Due to properties of chemicals in petroleum sector, the chances of accidents are high. Material, substances, processes or circumstances which pose threat to health and well being of workers in any occupation are termed as occupational hazards. The health and safety of worker is most important. Operations and processes in petroleum industries are hazardous, due to properties of the petroleum products and raw materials. Various investigations and studies are reported on the safety and hazards in petroleum and refining industries. It is necessary to identify occupational health hazard in addition to occupational safety hazard.

A Survey on XML Data Processing Using Data Mining Techniques
Authors:- Twinkle Gurjar, Arjun Parihar

Abstract:- The text classification is a classical research domain and used in a number of real world applications i.e. information retrieval, reviews analysis and others. It is complex task to manage different structure or unstructured nature of data in text mining. Additionally the different size of text documents and their feature extraction and accurate classification of document is also a complicated task. In this paper, the key issues in XML based document classification technique are addressed and an improved XML based text classification technique is proposed to classifying the semi-structured data i.e. XML documents, according to their subjects. Therefore, in order to analyze and recognize the XML based document patterns a hybrid classifier is proposed using Bay’s classifier and fuzzy logic. This classifier organizes the decisions of fuzzy based classifier and Bays classifier in terms of weights to improve the classification reliability. This paper includes a survey on different recent contributions and offers a data model for future implementation and experimental study.

Surface Wear Study of the IC Engine Components for the Blend of Rice Bran Biodiesel
Authors:- Dr. Venkata Sundar Rao K. ( Post Doctoral Fellow), Professor & Head Dr. Shreeprakash B.

Abstract:- Driven by oil price and consumption, engine emissions and climate change, along with the lack of sustainable fossil fuels, transportation sector has generated an interest in alternative, renewable sources of fuel for internal combustion engines. Bio fuels are chemical fuels as the fossil fuels and generate heat to perform mechanical work, hence, are the most desirable alternative to the fossil fuels. But the existing design of the combustion engines must sustain the same operating parameters, material strength of the different components and emission of the engine as that of the fossil fuel run engine. The surface roughness (Ra) values for piston, piston ring and cylinder liner of the engine is measured for both diesel (fossil fuel) and alternative fuel (blended 20% Rice bran oil + 80% Diesel).The use of diesel as a fuel has better tribological properties of the IC Engine components as compared to the blend of 80% diesel+ 20% Rice bran oil.

Assesement of Interaction Between Bituminous Asphalt Layers
Authors:- Mallela Srinivasa Rao, Assistant Professor B. Ramesh

Abstract:- The interlayer holding of present day multi-layered asphalt framework assumes a significant job to accomplish long haul execution of an adaptable asphalt. It has been seen that helpless holding between bituminous asphalt layers adds to significant asphalt overlay troubles, for example, untimely exhaustion, top down breaking, potholes, and surface layer delamination. One of the most widely recognized upsets because of helpless holding between bituminous layers is a slippage disappointment, which for the most part happens where overwhelming vehicles are regularly quickening, decelerating, or turning. To upgrade the holding between layers, a tack coat is showered in the middle of the bituminous asphalt layers. A tack coat is an utilization of a bituminous emulsion or bituminous folio between a current bituminous/solid surface and a recently developed bituminous overlay. Regularly, hot bituminous folios, reduction bitumens or bituminous emulsions are utilized as tack coat materials. This investigation is expected to assess the bond quality at the interface between asphalt layers by performing research facility tests. To do this goal, three unique connections are manufactured for use in Marshall Loading Frame for finding the presentation of tack coat laid at the interface between Bituminous Concrete (BC) and Dense Bituminous Macadam (DBM) layers in the research facility. In this examination, the aftereffects of the examples arranged with 100 mm and 150 mm measurement examples utilizing two sorts of regularly utilized emulsions, in particular CMS-2 and CRS-1 as tack coat at application rates fluctuating at 0.20 kg/m2, 0.25 kg/m2 and 0.30 kg/m2 made at 250C temperature are introduced. It is seen that CRS-1 as tack coat gives higher interface bond quality worth contrasted with CMS-2. Also, independent of the kinds of emulsions utilized as tack coat, the ideal pace of use is seen as 0.25 kg/m2 as suggested in MORT&H’s particulars.

Metal Additive Manufacturing: A road to Future
Authors:- Vigneshwaran T.

Abstract:- Metal Additive Manufacturing, also known as metal 3D printing, offers unrivalled design freedom with the ability to manufacture parts from a wide range of materials. Components that would not have even been possible just a few years ago can now be made to high standards using a wide range of metal powders. No longer solely a prototyping technology, Additive Manufacturing is now being used for the production of series components for the most demanding applications.

Novel Crawler for Recovery of Things from Unmanned Pit Using Micro Electro Mechanical System
Authors:- Associate Prof. Dr. Sheryl Radley, Assistant Prof. N. Mohana Priya, Assistant Prof. B. Vennilapriya, Dinesh Kumar R., Pawaneshwar A., Supratha Devi S.R., Iswariya R.

Abstract:- The research is based on the recovery of things/human being that have fallen into deep pit such as the unmanned borewell or an unnoticed deep pit. Due to the drought and depletion of underground water a greater number of bore wells are drilled on the surface of the earth. When the ground water gets dried or polluted by industries, the motor along with casing pipes are removed and the outer surface of the bore is not insulated properly. As the result of this, children who were playing near the bore, accidently fallen into it, which has drunk their lives. Even some of the things have fallen into it. This aids to monitor the children from the borewell without any danger of the victim. The sensor system is interfaced with the microprocessor. A camera along with an LED light is used to visualize the victims well as it helps to operate the system by control unit. The main aim of the project is to monitor the victim who were playing near the borewell, accidently fallen into it, by using Micro Electro Mechanical System (MEMS), and the stimulation result are obtained by using Embedded C.

Blockchain and Its Applications: A Systematic Review
Authors:- Basundhara Chakrabarty, Harish Krishnamoorthy, Karan Shahani

Abstract:- Blockchain has crept into all facets of technology and have brought about an upheaval in existing systems. This work provides a systematic review of blockchain technology and its applications, elaborating on the benefits and shortcomings of each. It details on the salient features of blockchain, the current themes, trends, and emerging areas of research in blockchain, and highlights how it revolutionizes the financial, industrial, political, and socio-economic sectors. Based on a thorough analysis of prevailing research, we classify blockchain-based applications across various spheres like Smart Industries, Governance, Healthcare, Supply Chain, etc. The paper, thus, juxtaposes the major highlights and the research gaps in the field of blockchain technology.

Design of Machine Element by using Auto LISP Programming in Auto CAD
Authors:- Chaitanya Yadure, Saharsh Shah, Pravin Powar, Lecturer A.B.Khot

Abstract:- AutoLISP is a dialect of the LISP programming language built specially to use with AutoCAD and its derivatives. It is a subset of the LISP (List Processor) programming language, which is used in bids of artificial intelligence and expert systems. Many functions have been added to the LISP program in order to interface AutoLISP directly to AutoCAD, and you will see that same AutoCAD commands have been retained as AutoLISP functions .Key is the simple component in Mechanical design than others. Key is a machine element which is used to connect the transmission shaft to rotating machine elements like pulley, gear, sprocket or flywheel. Keys provide a positive means of transmitting torque between shaft and hub of the mating element. In this thesis a key model is designed with simple programming language. Initially stresses depending on the application is taken as the input for the generating various dimensions of the key.

A Review of DDoS Attacking Methods
Authors:- M. Tech. Student Deepak Chouhan, Assistant Professor Lokesh Parashar

Abstract:- Internet-of-things has emerged out as an important invention towards employing the tremendous power of wireless media in the real world. We can control our surroundings by interacting with numerous smart applications running independently on different platforms, almost everywhere in the world. IoT, with such a ubiquitous popularity often serve itself as a potential platform for escalating malicious entities. These entities get an access to the legitimate devices by exploiting IoT vulnerabilities which results from several constraints like limited resources, weaker security, etc. and can further take form of various attacks. Distributed Denial-of-service (DDoS) in IoT network is an attack which targets the availability of the servers by flooding the communication channel with impersonated requests coming from distributed IoT devices. Defending DDoS in IoT has now become an exigent area of research due to the recent incidents of demolishment of some renowned servers, reported in previous few years. In this paper, we discuss the concept of malware and botnets working behind ‘Distributed’ DoS in IoT. The various DDoS defence techniques are broadly described and compared in order to identify the security gaps present in them. Moreover, we list out the open research issues and challenges that need to be addressed for a stronger as well as smarter DDoS defence.

A Review of DDoS Attacking Methods
Authors:- M. Tech. Student Deepak Chouhan, Assistant Professor Lokesh Parashar

Abstract:- Internet-of-things has emerged out as an important invention towards employing the tremendous power of wireless media in the real world. We can control our surroundings by interacting with numerous smart applications running independently on different platforms, almost everywhere in the world. IoT, with such a ubiquitous popularity often serve itself as a potential platform for escalating malicious entities. These entities get an access to the legitimate devices by exploiting IoT vulnerabilities which results from several constraints like limited resources, weaker security, etc. and can further take form of various attacks. Distributed Denial-of-service (DDoS) in IoT network is an attack which targets the availability of the servers by flooding the communication channel with impersonated requests coming from distributed IoT devices. Defending DDoS in IoT has now become an exigent area of research due to the recent incidents of demolishment of some renowned servers, reported in previous few years. In this paper, we discuss the concept of malware and botnets working behind ‘Distributed’ DoS in IoT. The various DDoS defence techniques are broadly described and compared in order to identify the security gaps present in them. Moreover, we list out the open research issues and challenges that need to be addressed for a stronger as well as smarter DDoS defence.

A Review of DDoS Attacking Methods

Authors:- M. Tech. Student Deepak Chouhan, Assistant Professor Lokesh Parashar

Abstract:- Internet-of-things has emerged out as an important invention towards employing the tremendous power of wireless media in the real world. We can control our surroundings by interacting with numerous smart applications running independently on different platforms, almost everywhere in the world. IoT, with such a ubiquitous popularity often serve itself as a potential platform for escalating malicious entities. These entities get an access to the legitimate devices by exploiting IoT vulnerabilities which results from several constraints like limited resources, weaker security, etc. and can further take form of various attacks. Distributed Denial-of-service (DDoS) in IoT network is an attack which targets the availability of the servers by flooding the communication channel with impersonated requests coming from distributed IoT devices. Defending DDoS in IoT has now become an exigent area of research due to the recent incidents of demolishment of some renowned servers, reported in previous few years. In this paper, we discuss the concept of malware and botnets working behind ‘Distributed’ DoS in IoT. The various DDoS defence techniques are broadly described and compared in order to identify the security gaps present in them. Moreover, we list out the open research issues and challenges that need to be addressed for a stronger as well as smarter DDoS defence.

Vehicle Tracing and Counting Structure
Authors:-M. Tech. Student Aashish Meena, Assistant Professor Megha Jat

Abstract:- Traffic surveillance systems are interesting tomany researchers to improve the traffic control and reduce the risk caused by accidents. In this area, many published works are only concerned about vehicle detection in normal conditions. The camera may vibrate due to wind or bridge movement. Detection and tracking of vehicles are a very difficult task when we have bad weather conditions in winter (snowy, rainy, windy, etc.) or dusty weather in arid and semiarid regions or at night, among others. In this paper, we proposed a method to track and count vehicles in dusty weather with a vibrating camera. For this purpose, we used a background subtraction-based strategy mixed with extra processing to segment vehicles. In this paper, the extra processing included the analysis of the headlight size, location, and area. In our work, tracking was done between consecutive frames via a particle filter to detect the vehicle and pair the headlights using the connected component analysis. So, vehicle counting was performed based on the pairing result. Our proposed method was tested on several video surveillance records in different conditions such as in dusty or foggy weather, with a vibrating camera, and on roads with medium-level traffic volumes. The results showed that the proposed method performed better than other previously published methods, including the Kalman filter or Gaussian model, in different traffic conditions.

Customer Segmentation Using Clustering and Data Mining Techniques
Authors:- M. Tech. Student Kamal Singh Baghel, Assistant Professor Lokesh Parashar

Abstract:- Clustering technique is critically important step in data mining process. It is a multivariate procedure quite suitable for segmentation applications in the market forecasting and planning research. This research paper is a comprehensive report of k-means clustering technique and SPSS Tool to develop a real time and online system for a particular super market to predict sales in various annual seasonal cycles. The model developed was an intelligent tool which received inputs directly from sales data records and automatically updated segmentation statistics at the end of day’s business. The model was successfully implemented and tested over a period of three months. A total of n = 2138, customer, were tested for observations which were then divided into k = 4 similar groups. The classification was based on nearest mean. An ANOVA analysis was also carried out to test the stability of the clusters. The actual day to day sales statistics were compared with predicted statistics by the model. Results were quite encouraging and had shown high accuracy.

Realtor Mobile Application
Authors:- Shiva Yenikepalli, Namburi Naga Sameer, P. Vamshi Krishna

Abstract:- The real estate is a cyclical industry, reacting to macroeconomic trends such as interest rates , population growth, and economic strength. the real estate industry consists of three primary fields: brokerages, leasing, and management.This study examines the buyer’s search duration with and without the assistance of real estate brokers.it is found that first-time buyers and out of town buyers search longer than more experienced and local land buyers.The real estate broker makes it easy for the customers in negotiate sales agreement and manage the documentation required for closing real estate transactions.The main aim of the research is to provide a digital platform for the investors to find a proficient broker in a particular locality.It’s basically an android application that piles the information about real estate brokers of a province, which also reduces the search time of the buyer.This application requires a database to store the info of the brokers.GPS services to locate the broker’s office.

Secure MANET using Curve-Based Cryptography
Authors:- M. Tech. Student Lalita Mandloi, Assistant Professor Lokesh Parashar

Abstract:-Mobile Ad hoc Network (MANET) is a mobile and infrastructure less network, widely used in various applications. In this paper, we study the major security issues in MANET to reduce the malicious activity at the nodes. To reduce the unsecured network, Enhanced Adaptive Acknowledgement Scheme (EAACK) is proposed and it involves Acknowledgement (ACK), Secure Acknowledgement (SACK), and Misbehavior Report Authentication (MRA) schemes. In EAACK scheme, the 2b (2-Bit) packet header is used and it overcomes some of the disadvantages of Watchdog behavior. In this work, the sender has to digitally sign the ACK packets and the receiver has to verify it. The proposed Scheme is applied to 40% of malicious nodes and Routing overhead (Ro) hits the value 0.6. The Network performance is better when the value of Ro is 0. In order to secure more, Credibility Based Sequence Distance Vector Routing (CBSDV) and Curve based cryptographic technique is used. Simulation results show that proposed scheme provides better secure network and CBSDV, hop count, time duration, energy values and trust scores play a deciding factor between the source and destination in the network.

A People Counting Method Based on Head Detection and Tracking
Authors:- M. Tech. Student Vinay Kaithwas, Assistant Professor Lokesh Parashar

Abstract:- This paper presents a technical approach related to the video computer analysis, to detect people and control the behaviour of people. Control the behaviour of people in public place can be a benefit for understanding the share of overall traffic your area is attracting. Find out what, encourage customers to buy products are most crucial for big companies to increase the sales rate and to improve the quality of customer service. We use surveillance cameras, which located in the museum. We offered two methods, the first method for detecting people in a closed space and second method finding density areas which people more spend time to visit. The YOLO model makes predictions with a single network evaluation. Systems like R-CNN and Faster R -CNN, on the other hand, make multiple assessments for a single image, making YOLO extremely fast, running in real- time with a capable GPU. For detect people used YOLOv3 algorithm which is published by [18] and shows that it has high accuracy to identify people, also we compared the proposed method with other detectors, HOG, SSD and YOLO-tiny which shows the proposed algorithm has better performance in this point. And for finding density areas, we utilized a background subtraction with Gaussian Mixture algorithms and heatmap colour technique to analysis each frame and figure out, where are the density areas which shows people like to spend more time to visit. The experimental results have shown that the accuracy and the performance of both algorithms are quite good.

Prediction of Crop Yardsticks to Evaluate Crop Proliferation Using a Continual Data Mining Solution
Authors:- Abishek B., Akash Eswar, Dheeban K., Barani Rajendran

Abstract:- Quantifying crop growth at various stages of its life cycle is a daunting task that has to be done by farmers in order to get an idea about how the end yield will manifest. This task has been haunting farmers for more than centuries and analysts all over the world are trying to find out new methods to quantify crop yield and demystify the evaluation of various crop yardsticks. Helping farmers to take effective decisions in order to help them increase crop yield is the main focus of many current methodologies. The quality of the crops, however, has not been suitably quantified and this has resulted in low crop sales in certain places. In India, crop quality is of utmost importance and many buyers refrain from purchasing low-quality crops directly from farmers thus resulting in an inadequate food supply at various places. The proposed system looks to analyze various parameters affecting crop yield and quality and evaluate the end quality and yield with the currently available data. Various factors are considered for an accurate estimation which includes climatic factors such as temperature, light usage efficiency, effective rainfall, and wind speed along with soil, groundwater, and various other factors. It is unprecedented in the fact it is intended to be applied as a continual solution which when implemented as a real-time system can collect real-time data and make predictions while continuously learning and improving its accuracy over time. It is also an integrated solution which aims to try and evaluate how the resulting crop yield and quality might be with the help of data mining techniques that work upon datasets which can contain historical and real-time data as the situation demands.

An Integrated Control and Protection System for Photovoltaic Application
Authors:- Kasheeram Yadav, Seema Shukla

Abstract:- The microgrid has shown to be a promising solution for the integration and management of intermittent renewable energy generation. This paper looks at critical issues surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a stand-alone operation mode, a grid-connected operation mode, and transitions between these two modes for a microgrid. To enhance the fault ride-through capability of the system, a comprehensive three-layer hierarchical protection system is also proposed, which fully adopts different protection schemes, such as relay protection, a hybrid energy storage system (HESS) regulation, and an emergency control. The effectiveness, feasibility, and practicality of the proposed systems are validated on a practical photovoltaic (PV) microgrid. This study is expected to provide some theoretical guidance and engineering construction experience for microgrids in general.

Structural Behaviour of Hexagrid and Diagrid Comparison System in Staadpro
Authors:- Rahul Birla, H.O.D. Sourabh Dashore

Abstract:- Development of tall buildings have been rapidly increasing in number worldwide. The trends in tall building design is now towards the integration of optimal building form with the structure to produce an efficient design. Diagrid system is an innovative technology that is widely used now a days which promise better lateral load efficiency. Hexagrid system is an extension to the diagrid structural system which also efficient in lateral load resisting system. In these systems, the lateral loads are resisted by the axial action of diagonal columns compared to bending of vertical columns. Analysis of 48 storied Steel building with diagrid system and hexagrid system is presented. Modelling and analysis of structural member is done using finite element software ETABS. Loads, load combinations and seismic data are provided according to IS 875:1987and IS 1893:2002 respectively. Comparison of analysis results with conventional system is done in terms storey displacement, storey shear, storey drift and time period. We also find the durability of 98.5% for per day analysys.

Vibration Analysis of Multi Storey Buildings In Staad Pro
Authors:- Saket Litoriya, H.O.D. Sourabh Dashore

Abstract:-A major trust of modal parameters identification (MPI) research in recent years has been based on using artificial and natural vibrations sources because vibration measurements can reflect the true dynamic behavior of a structure while analytical prediction methods, such as finite element models, are less accurate due to the numerous structural idealizations and uncertainties involved in the simulations. This paper presents a state-of-the-art review of the time-frequency techniques for modal parameters identification of civil structures from acquired dynamic signals as well as the factors that affect the estimation accuracy. Further, the latest signal processing techniques proposed since 2012 are also reviewed. These algorithms are worth being researched for MPI of large real-life structures because they provide good time-frequency resolution and noise-immunity.

A Review Paper on Application of Artificial Intelligence using Machine Learning Techniques
Authors:- Saket Kumar Singh

Abstract:- Diseases ought to be dealt with well and on schedule. In the event that they are most certainly not treated on schedule, they can prompt numerous medical issues and these issues may turn into the reason for death. These issues are winding up more awful because of the shortage of pros, experts and wellbeing offices. With an end goal to address such issues, ponders made endeavors to structure and create master frameworks that can give counsel to doctors and patients to encourage the finding and suggest treatment of patients. This survey paper presents a far-reaching investigation of restorative master frameworks for the determination of different infections. It gives a concise review of restorative symptomatic master frameworks and presents an investigation of previously existing investigations. Conceptual Respiratory ailments like Asthma and chronic obstructive pulmonary diseases, region unit piercing a colossal portion of the total populace with death rates monstrous those of carcinoma and bosom malignancy consolidated. the key test is that the scope of patients United Nations office region unit mistakenly analyzed. With the progression of innovation in registering, stockpiling, and systems administration, and rapid calculation on the information accessible crosswise over different server farms is conceivable today. The measure of information produced by different undertaking applications and interpersonal interaction is colossal and expected to develop enormously in the coming years. Inferring helpful furthermore, insightful data out of this information is absolutely critical to upgrade business worth and increment human centricity. AI calculations accessible as a sub-field of Artificial Intelligence help get the knowledge from plenty of information accessible crosswise over different application spaces. Computerized reasoning and Machine learning are slanting advancements in the business to empower business suggestions, anticipate the future markets, and so forth. The field of medication isn’t any exemption to help specialists determine the malady quicker to have high precision and give customized drugs to the benefactors. In this paper, an inside and out dialog are completed on diagnosing respiratory maladies precisely utilizing AI calculations.

Optimization in Cutting Parameters for Milling Operation for the Material Mild Steel JRC-235J+C
Authors:- M. Tech. Scholar Anish Kumar, Associated Professor Onkar Mal

Abstract:- The objective of this research work is to provide statistical evidence for optimizing parameters to improve the surface roughness. For that an experimental investigation is done by producing a workpiece of Stainless steel on a CNC milling machine tool. The cutting material used for it is made of carbide which is generally used in production. Taguchi method and ANOVA were used for enhancing the machining performance and optimizing the machining parameters for CNC Milling. The Minitab-19 is employed to analyze the Taguchi and ANOVA methods. An array-L9 was generated to obtain the combination of parameters for the experiment. The parameters investigated were Feed rate, Cutting speed and Depth of cut. The optimised factors identified as Cutting Speed 35 m/minute, Feed rate 200 mm/minute and depth of cut 1 mm. These parameters are worked out to improve the surface roughness of the stainless steel.

Design of Aluminum Alloy Channel Section Beams
Authors:- Post Graduation Student Ajay Kumar T. A., Associate Professor A. Thangadurai

Abstract:- Aluminum alloy members of channel sections are widely used in lightweight structures, especially as pillars of curtain wall systems and brace and chord members in roof trusses. This paper presents both experimental and numerical studies on the behavior of aluminum alloy channel section beams. In this study, four-point bending tests under minor-axis and major-axis bending were carried out. The test specimens included plain and lipped channel sections of both 6063-T5 and 6061-T6 aluminum alloys. A finite-element (FE) model of the channel section beam was developed by using the FE package ABAQUS. The ultimate bending resistances and failure modes of the FE model were compared with the results from the bending tests. The validated model was employed for the parametric study to generate numerical simulation results. A total of 55 new experimental and numerical beam results were compared with predictions from existing aluminum alloy design specifications from the United States, Australia/New Zealand, Europe, and China. Additionally, two commonly used design approaches—the continuous strength method (CSM) and the direct strength method (DSM)—were applied to predict bending capacities for comparisons. A modified DSM approach for aluminum alloy channel section beams is proposed herein. Finally, reliability analyses were conducted to evaluate the aforementioned design methods. The results show that, in comparison with other considered design methods, the CSM provides more accurate and consistent results for aluminum alloy plain and lipped channel section beams.

Literature Review on Utilization of Waste EPS in Paver Blocks
Authors:- Post Graduation Student Anupama U, Assistant Professor Sadhasivam

Abstract:- Plastic is one of the critical issues that the world is facing. Over 300 million metric tons of plastics are produced every year. Among those expanded polystyrene is the fourth largest solid waste produced in the world. Polystyrene is an active contributor occupying more space in the landfill. 14 million tons of EPS is produced every year. These like any other plastics are non biodegradable hence they take centuries to decay. Nowadays EPS is being used in numerous applications due to its different properties.EPS is also being used in the construction industry due to its properties like lightweight,inert, thermal insulation and binding. The project focuses on using waste EPS to make paverblocks. The use of waste EPS in pavement block is a partial solution to the environmental and ecological challenges associated with the use of EPS. The aim of this project is to reduce environmental pollution by using waste EPS to produce pavement blocks. The EPS material is first shredded and melted by using limonene. Hence the project is helpful in reducing EPS waste in a useful way. This paper includes review of various studies conducted on utility of waste EPS material used in the construction industry. Moreover this paper will draw our focus toward the impingement on the various properties of concrete when partially replacing with waste expanded polystyrene.

Literature Review on E-Waste Compounds and its Impact of using in Landfillings and Concrete Structures
Authors:- Post Graduate Student Hari G. S., Associate Professor Dr. V. Venugopal

Abstract:-Widespread use of digital devices, including mobile phones, tablets, computers, smart watches has made electronic waste a new environmental problem. Discarded gadgets result in massive piles of e-waste, which contaminates soil and groundwater in the world. Electronic waste or e-waste is one of the emerging problems in developed and developing countries worldwide. It comprises of a multitude of components with valuable materials, some containing toxic substances, that can have an adverse impact on human health and the environment. Previous studies show that India has generated 0.4 million tons of e-waste in 2010 which may increase to 0.9 to 1 million tons by 2019–2020. Coupled with lack of appropriate infrastructural facilities and procedures for its disposal and recycling have posed significant importance for e-waste management in India. In general, e-waste is generated through recycling of e-waste and also from dumping of these wastes from other countries. More of these wastes are ending up in dumping yards, recycling canters and e waste mixing in landfill and in concrete structures posing a new challenge to the environment, soil strata, underground water table and policy makers as well. In general electronic gadgets are meant to make our lives happier and simpler, but the toxicity it contains, their disposal and recycling becomes a health and nature nightmare. Most of the users are unaware of the potential negative impact of rapidly increasing use of computers, monitors, and televisions. This review article provides a concise overview of how the e-waste affects the environment and human health by the techniques currently using as landfills and in concrete structures as management of e waste.

Literature Review on Analysis of Modular Building Using E-Tabs Software
Authors:- Post Graduate Safeek A., Assistant Professor Balachandran

Abstract:- Modular building with advantages of quick installation, good comfort,beautiful appearance and convenient turnover, is widely used in construction of temporary construction, business services, holiday villas and other projects.The paper aims an analysis of modular buildings by using E-tabs software. It focusesupon basic design assumptions that are accepted for modular buildings.There are so many software. using now a days to analyse a s structural buildings but in the case of modular buildings the analysis by using E-TABS is an innovative solution.And also to steel is better than an ordinary construction based on their strength and also regarding with other factors. The software is using here to analyse the modular construction. Different models were developed in the E-TABSSoftware to research the analyticalperformance of ordinary structures.Current project E-TABS is used to calculate the overall structural strengthand stiffness, and the stress and displacement calculation results under the control of verticalload and horizontal wind load.

Literature Review on Creep and Shrinkage Analysis and Comparison of High Strength Concrete
Authors:- Post Graduate Student Hiba Basheer, Professor Dr. A. Thirumurugan

Abstract:-High strength concrete (HSC) has revolutionized the construction industry in the 1980’s and Australian researchers, consultants and contractors have been very active in this area. However, most major codes for design and construction with concrete are applicable only to normal strength concrete (f’c < 50 MPa) and are based on research on normal strength concrete (NSC). In order to investigate the creep and shrinkage behavior of HSC, creep and shrinkage specimens were cast using concrete of strengths namely 110 MPa and creep and shrinkage strains measured. Presented herein are the experimental details and the test results. The obtained results are also compared with five published creep and shrinkage models most of which are meant for NSC. The preliminary findings indicate that they are not quite applicable to HSC and there is need for the development of new models for the prediction of creep and shrinkage in HSC.

Literature Survey and Study on Steel-Fibred Lime Brick and Their Application on Environment
Authors:- Post Graduate Student Reshma P. D., Associate Professor V. Murugesh

Abstract:-Short and randomly distributed steel fibres are often used for making bricks &concrete reinforcement since they offer resistance to crack initiation and, mainly, to crack propogation.In steel fibre reinforced concrete of low fibre volume content, the fibre reinforcement effectiveness is only significant after matrix cracking, since fibres crossing the crack guarantee a certain level of stress transfer between the faces of the crack, providing to the concrete a residual strength, the magnitude of which depends on the fibre, matrix and fibre-matrix properties.Lime brick is a product that uses lime instead of cement. It is usually a white brick made of lime and selected quarry dust, cast in molds and cured. These bricks are good acoustic insulation, good heat and & humidity as well as excellent fire resistance.

Analysis of Sound Absorbing Panel Using Agro Waste Products
Authors:- Post Graduate Student Sruthi, Professor Dr. Kumar A.

Abstract:-Sound pollution, is the propagation of noise with ranging impacts on the activity of human or animal life, most of them harmful to a degree. The source of outdoor noise worldwide is mainly caused by machines, transport, and propagation systems. poor urban planning may give rise to noise disintegration or pollution, side-by-side industrial and residential buildings can result in noise pollution in the residential areas. Some of the main sources of noise in residential areas include loud music, transportation (traffic, rail, airplanes, etc.), lawn care maintenance, construction, electrical generators, explosions, and people. As an alternative in our research project we are concerned with maximum utilization of agro-waste Material Such as Rice straw to develop Noise absorbing Composite with bamboo as reinforcing material and study of acoustical and flammability properties of Composites.

Assessment of ICT Skills of Science Teachers for Online Instruction
Authors:- Cyril Francisco Forro

Abstract:-This study was conducted to assess the level of ICT skills of science teachers for online instruction and employed a qualitative-descriptive research design. This was conducted in the school year 2020-2021. This study utilized a survey questionnaire, which was adapted from National ICT Competency Standards for Teachers, in gathering the data from 37 science teachers of Koronadal National Comprehensive High School-Junior High School (KNCHS-JHS). All science teachers of KNCHS-JHS were considered as respondents of this study. The method used in the collection of data was face to face administration of survey. Frequency counting and mean were utilized to analyze the demographic profile of the respondents. In analyzing and interpreting the level of ICT skill of science teachers, mean was utilized. The findings of the study revealed that the level of ICT skills of science teachers in all standards of Domain A (Technology Operations and Concepts), Domain B (Social and Ethical), and Domain C (Pedagogical) is proficient. This is shown by the means of Domains A, B, and C which are 2.87, 2.79, and 2.84 respectively. In proficient level, teachers here can perform ICT skills independently but require guidance at times. On the other hand, the level of ICT skill of science teachers in all standards of domain D (Professional) is basic with a mean of 2.42. This means that teachers can perform ICT skills with the guidance of an ICT expert. There are also some indicators in domains A, B, and C where the level of ICT skills of science teachers is basic. Generally, the level of ICT skills science teachers is proficient. Meaning, they can perform ICT skills independently but require guidance at times. Based on the results of this study there is a need to conduct an ICT training for science teachers to further enhance some of their ICT skills/competencies. Thus, the author of this action research recommends that the proposed ICT training be conducted to the science teachers of KNCHS-JHS. The ICT training shall include all indicators which was rated basic by the respondents.

Performance Analysis of Single phase 7 level CHBMLI for Various Applications
Authors:-Mritunjay Prasad Singh, Santosh Kumar

Abstract:-Inverter is a device which is used for converting DC power into AC. Due to harmonic issue in conventional inverter researcher work in the field of multi-level inverter. A multi-level inverter starts from 3 level to n level. In the recent year due to increasing in renewable generation the scope of work in the field of multi-level increases day by day. The main work in this paper is to develop the easy topology for 7 level generations with the help of multilevel inverter. The proposed scheme is used for implementation for the different load which is used in domestic purpose. The multi carrier PWM technique is used for switching action. Finally the performance is verified by the use of MATLAB software by the experimental result. The THD is calculated for different load on proposed work.

Published by:

Journals With Publication Fees

Uncategorized

Research journal are important part of any budding author and their research work, as they desire to be published in good journal. Research journal are available in different varieties as according to the prices of publication, specific field, or area wise, national, or international journals, accessibility based and so on. So, one of most popular categories is the paid journals or unpaid journals, as in case of paid mostly journals with publication fees are preferred by authors. Because there may be some delays occurred in the publishing process for the free journal with publication fees negligible.

Submit Paper Now

Review Article Processing Charges

But the scenario is some research journals can’t be targeted due to delays in the publishing manuscript due to no charges and some journals with the high impact factor demands more fees for the publication. so, students get in the doubt which journal to choose, so targeting the journal having the good impact factor with journals with publication fees minimum. There are some points that help the budding authors to choose the journal effortlessly:

  • Authorization: the main thing in choosing any journal is to check whether the journal is authorized or not. For this there is a need of to check the identity ISSN number that every international journal is allotted.
  • Impact factor: check whether the journal targeted has the potential or not, with that do clear about the impact factor of the journal.
  • Evaluation: then have the look at the committee, which is doing the valuation of the papers, they must have that much experienced in the field they are doing their work.
  • Publication: start checking the year of the publication started and volume issued, which must be old enough and have the long-term journey.
  • Certificates: as soon as the publication process ends the certificates must be delivered to the authors. If distant candidates, they do send them online certificates.
  • Fees: they didn’t issue the lot of fees in name of editing, copyright, publishing, online certifications, etc. the journal must be open access and with less publication charges.
Published by:

Impact Factor For Journals

Uncategorized

Impact factor of the journal is the important parameter for any research or academic journal to measure its standard, quality, and the potential. Thus, the impact factor for journal is important and need to be maintained. Any budding author before targeting any journal check the impact factor of the journal and the price of the journal for the publication. As talking about the price demanded by the publication must be low and in budget of authors, otherwise though having the high impact factor for journal they refused to publish.

Submit Paper Now

Review Article Processing Charges

Impact factor for journal, is index that are cited by the average published articles in the journal. This states that journals having the high impact factor are good and reputed journal. But apart from the impact there are also some points which need to be in mind before selecting a journal. These are mentioned as:

  • Checking the volumes and issued published in the journal, papers published in the journal.
  • Looking for the committee or finding information about them who can evaluate the paper and the publication work.
  • The fees issuing for the accessing charges or the free open source publication.
  • The year of the publication started in the duration, must be at-least five years.
  • The important point is to check the impact factor of any journal for knowing its potential.

Any research journal that are targeted must mentioned all the details of the registration, paper acceptance, fees, paper standard, accessibility etc in the portfolio or brochure. As some of the students can’t afford the fees of the journals that are reputed because of having high impact factor. So, try to choose the journal having the minimum fees of publication with no extra expenses and only publication fees.

Published by:

Highest Impact Factor Of Journals

Uncategorized

The impact factor of any journal or the journal impact factor of any academic or research is the index that reflects the yearly average number of citations that articles published in the last two years in each journal. So, the measure of the good journal is the impact factor or highest impact factor of journals is the term denoted to reputed one. But there are certain points other than the impact factor to be noted down:

Submit Paper Now

Review Article Processing Charges

  • Number of papers published in the various volumes of the issues of the monthly or bi-monthly of each of the volume.
  • Reviewing team and evaluation committee for the publication of paper and acceptance also.
  • Article processing charges and the extra fees demand by the publication.
  • The year of the journal started to publish and to copyright the research work.

Thus other than the highest impact factor of journals, it is not sufficient for choosing any journal for the research work, above points need to be followed also. The standard journal needs the proper format of the research paper whether its IEEE format paper or general or they mentioned their own. Following are major headings one format include abstract, keyword, introduction, objectives, literature survey, diagrams, figures, charts, tables, readings, pictures, applications, conclusion, observation, output, future work, references etc.

Followed by the highest impact factor of the journals some other sources are also required for the successful and effortless publishing. The publication of the journal must be done by doing work of publishing on time without delays, as this causes loss for the budding authors. The next is the publisher must support the author and the team with full guidance and query solving. After that they do have the chat support open for the publishers to contact, ask help and doubts in the process of registering, end to end process. There must be full fee structure mentioned in the brochure or the portfolio of the publication journal, to avoid misconceptions. There must be clarifications done with the authors about the paper formatting and the research work improvement.

Published by: