IJSRET » Blog Archives

Author Archives: vikaspatanker

Harnessing AI Dashboards in Oracle Cloud HCM: Advancing Predictive Workforce Intelligence and Managerial Agility

Uncategorized

Authors: Kranthi Kumar Routhu

Abstract: The digital transformation of Human Resource Management (HRM) has entered a new phase with the convergence of Artificial Intelligence (AI), advanced analytics, and cloud-based Human Capital Management (HCM) systems. This evolution reflects a global shift from administrative HR operations to data-driven workforce intelligence. Among the leading solutions, Oracle Cloud HCM stands out for its integration of AI-powered analytics, predictive modeling, and configurable dashboards that deliver actionable insights to managers across all levels of the organization. By embedding analytics within HR workflows, Oracle’s HCM platform enables enterprises to automate decision processes, identify workforce trends, and enhance compliance through real-time monitoring and intelligent recommendations. AI-driven dashboards transform traditional HR reporting into a dynamic, interactive decision-support environment, where key performance indicators (KPIs) are continuously analyzed to reveal emerging risks, opportunities, and performance gaps. These systems not only consolidate complex datasets from payroll, recruitment, and performance management modules but also apply machine learning algorithms to predict employee attrition, engagement levels, and talent acquisition efficiency. This paper explores the evolution, architecture, and strategic importance of AI-augmented dashboards in Oracle Cloud HCM, emphasizing their role in enhancing managerial decision-making. It develops a conceptual framework for AI-enabled decision support, detailing how predictive analytics and visualization work together to improve accuracy, transparency, and responsiveness in HR operations. Furthermore, the study discusses practical implementation challenges including data quality, explainability, and user adoption and evaluates the tangible benefits of integrating AI-driven dashboards within enterprise HCM systems. The findings highlight how Oracle Cloud HCM serves as a model for intelligent HR transformation, aligning technology, analytics, and human expertise to support sustainable organizational growth.

DOI: http://doi.org/10.5281/zenodo.17670797

Published by:

Websites For Peer Reviewed Articles

Uncategorized

The review team of a journal decides whether the submitted article is good enough for publication or not. So the list of such websites that have peer-reviewed teams for scrutiny of a research paper is highly desired. Websites for peer reviewed articles are considered as good international journals that can follow the ethics of publication, as some of the journals accept all sets of articles for publication just for money. Peer revied journals are also of three type:

  1. Single Blind
  2. Double Blind
  3. Collaborative
  4. Open Peer Review

Submit Paper Now

Paper Publication Charges

Websites having single blind strategy for paper review are considered as journals that share author details to the reviewer but the author is not aware of reviewer information like name, organization, department, etc.

Similarly, in case of double-blind strategy journals hide information of both parties author and reviewer for each other. This kind of work is mostly adopted by big journals, but in review, some of reviewers ask questions by email that opens his identity to the author.

The collaborative peer review process has more than one reviewer to comment on the submitted paper. It is desired by the editor that all of the reviewer suggestions should be positive for publication. This strategy is the time taken to process and review time increases if the reviewer takes a long time to respond the paper.

The Open Peer review method is vice versa of the double blind method. In this author and reviewer details are shared to each other for the paper justification. This process is fast for publication as some time author briefs its work directly and the reviewer asks its queries directly. This kind of direct communication reduces communication cost (time) of review process.

Many good websites openly specify their peer review process to the visitor of the site, as this increases the author’s understanding of how long the paper takes to publish or review period. Sometimes it is ask by the authors to specify the time duration of reviewing a paper, few of journals specify that they publish paper in one day they do not have any team of review paper content. Publishing in such journals is useless. This article helps scholars to filter journals on the following points and decide that journal has a review committee or not.

  1. Check editor details
  2. Check editorial board member details
  3. Does the journal has a similar paper set as per the domain of journal if es then its ok otherwise journal is misleading the publication ethics.
  4. Check contact details of the journal as many of journal hide all such information.

In case of scholar who have very less experience they can consult there mentor about the journal and submit paper as per his / her suggestion only.

Published by:

Publish Research Paper Online

Uncategorized

Researchers who are looking for International publication for completion of courses like masters, Doctorates degree, etc.  So publish a research paper online in a reputed journal is the first desire of the scholar. In order to achieve this as per guide/ mentor guidance scholar do work in a specific research domain with an objective to resolve an identified issue. As research work performed by the scholar by doing survey of existing techniques/ methods adopted by other researchers, the experiment was done with different varying parameters, analyze the output of work, etc.  So paper writing work is also performed by the scholar.

Submit Paper Now

Paper Publication Charges

This article helps scholars to refine its paper under the following points before submission to the journal:

  1. Paper Title: Specify Technique Name, Implementing Area.
  2. Abstract: Include problem identified with broad steps of solutions proposed by the paper, specify the experimental setup.
  3. Introduction: Introduce research domain with the requirement of the work to the society. This part should include content as per the current research direction in the research domain.
  4. Survey: Research work done by other scholars of the same research domain using some techniques to resolve same issue is explained in this section of the paper.
  5. Proposed Work: As per the proposed solution steps were detailed in the paper for the understanding of reviewer / readers. Try to include some flow charts, diagrams, graphics to increase the understanding of the work. If work needs some mathematics then specify same by an example.
  6. Experiment: As the proposed model need some more justification hence experimental values give such support for the paper to justify the work. It was found from different papers that researcher include graphs, tables by means of different comparing parameters.
  7. Conclusion: Whole work outcome is summarized in the paragraph with some numeric values that specify the improvement in parameters.

 

Article having above points have a very high chance to select in the good journal. Lacking paper have low chance to go under review process. This article help scholars to publish research paper online with some tricks that can increase the chance of publication of paper apart from research area and work done. Writing skill of the mentor plays an important role to improve the paper quality and presenting work. I suggest scholars to read more related articles related to research area and increase the knowledge of the work, as this exercise give more set of technical words / terms to express similar sentence with high impact. Submit in a journal that fairly specify publication fees, review process time, publication time. As per research select journal, always consult your mentor to select journal.

Published by:

Assessing The Impact Of COVID-19 On Renewable Energy Project Finance In The US: Challenges And Opportunities

Uncategorized

Authors: Funmilayo Fenwa

Abstract: The COVID-19 pandemic represents an unprecedented global crisis that has fundamentally altered economic landscapes across all sectors, with particular significance for renewable energy project finance in the United States. This study examines the multifaceted impacts of the pandemic on renewable energy investment patterns, policy responses, and market dynamics during 2020. Through comprehensive analysis of industry data, policy documents, and market indicators, this research reveals a complex narrative of resilience and vulnerability within the renewable energy finance sector. While overall renewable capacity additions nearly doubled in the first half of 2020, driven primarily by tax credit deadline pressures, total renewable energy investment declined by 20% to $49.3 billion. The pandemic exposed critical dependencies on supply chains, policy incentives, and financing mechanisms while simultaneously demonstrating the sector's inherent stability advantages. This analysis contributes to understanding crisis resilience in clean energy markets and provides insights for policy development in future emergency scenarios.

DOI: http://doi.org/10.5281/zenodo.16994016

Published by:

IJSRET Volume 7 Issue 6, Nov-Dec-2021

Uncategorized

Performance Analysis of Hybrid Solar Dryer (Review Paper)
Authors:- M. Tech. Scholar Manoj Kumar Mishra, Prof. C S Koli, Prof. Amit Agrawal

Abstract-Solar crop drying is an inexpensive and effective way to preserve food ingredients, especially in developing countries where fuel and electricity are expensive or unavailable. Some tropical fruits are difficult to transport and store, which increases their chances of spoilage. Without access to fuel and large drying systems, preserving fruit for later use is challenging or not possible for the rural farmer. Developing a low-cost, easily assembled locally and low-maintenance fruit drying system will improve access to the off-season and distant markets. A mathematical model of a hybrid solar drying system was developed and validated through experimental testing to design and optimize drying systems for use in developing countries. The prototype drying system consisted of a transpired solar absorber, drying chamber and blower. In this research paper, we are reviewing various solar dryers.

DVR to Mitigate Power Quality and Reduce the Harmonics Distortion of Sensitive Load
Authors:- Suhail Rafiq , Priya Sharma

Abstract- Power quality has been an issue that is becoming increasingly pivotal in modern industrial and commercial applications. Voltage disturbances especially the voltage sag and swell are the most common power quality problems due to increased use of a large numbers of sophisticated and sensitive electronic equipment in industrial systems. To overcome this problem, custom power devices are used. One of the devices is the Dynamic Voltage Restorer (DVR), which is the most efficient and effective modern custom power device used in power distribution networks. It is a series connected power electronic based device that can quickly mitigate the voltage sags in the system and restore the load voltage to the pre-fault value. The primary advantage of the DVR is keeping the users always on-line with high quality constant voltage maintaining the continuity of production. In this paper, a PI controller and a fuzzy logic controller method for DVR that protects a sensitive load, to counter voltage sag under unbalanced loading conditions (linear and non-linear) is presented. DVR along with other parts of the distribution system are simulated using MATLAB/ SIMULINK.

Applications of Green Chemistry in Daily Life: A Review
Authors:- Dr. Pushpraj Singh

Abstract- Green chemistry, also called sustainable chemistry, is an area of chemistry and chemical engineering focused on the design of products and processes that minimize or eliminate the use and generation of hazardous substances. It is a modern science that deals with the application of environmental friendly chemical compounds and materials in the various areas of our life such as industrial uses and many others. The beginning of green chemistry is considered as a response to the need to reduce the damage of the environment by man-made materials and the processes used to produce them. Green chemistry could include anything from reducing waste to even disposing of waste in the correct manner. Chemistry plays a pivotal role in determining the quality of life. The chemicals industry and other related industries supply us a huge variety of essential products, from plastics to pharmaceuticals. However, these industries have the potential to seriously damage our environment. Green chemistry therefore serves to promote the design and efficient use of environmentally benign chemicals and chemical processes. All these points will be discussed in this article.

Improving Productivity in a Duct Fabricating Industry Using Industrial Engineering Tools and Techniques
Authors:- M. Tech. Scholar Shradha Agnihotri, Prof. Hari Mohan Soni

Abstract- Productivity improvement is one of the core strategies closer to production excellence and it is also necessary to achieve correct monetary and operational performance. It enhances client delight and decrease time and cost to expand, produce and deliver merchandise and carrier. Productivity has a positive and big relationship to performance measurement for manner utilization, system output, product costs, and work-in-process stock tiers and on-time shipping. development can be in the form of elimination, correction (restore) of ineffective processing, simplifying the procedure, optimizing the machine, decreasing variant, maximizing throughput, reducing fee, enhancing high-quality or responsiveness and lowering set-up time.

Biomedical Applications of Polysaccharides
Authors:- Dr. Pushpraj Singh

Abstract- Polysaccharides are the most complex carbohydrates, composed of monosaccharide units bound together by glycosidic linkages. They are obtained from renewable sources such as plants, algae and microorganisms like fungi and bacteria. They are getting more attention because they exhibit a wide range of biological activities, such as anti-tumor, immunomodulatory, antimicrobial, antioxidant, anticoagulant, antidiabetic, antiviral, and hypoglycemia activities, making them one of the most promising candidates in biomedical and pharmaceutical fields. In this review, we will give insight into the most recent updated applications of polysaccharides.

Adaptive Video Streaming over HTTP Through Wireless High Speed Network
Authors:- M. Tech. Scholar Monu Kumar Saini, Assistant Professor Mr. Rahul Pandey

Abstract- “The adaptive bitrate streaming works on the principle of rapidly changing bitrate based on available resources, which is usually a bandwidth, resource limit and user query. The selection of bitrates is controlled usually by client and not by server. The adaptive HTTP video streaming is similar to progressive download streaming. In adaptive HTTP video streaming, the multimedia segments are split into same length segments. On other hand, the segments are split into video GoP that initiates with key frame. The initiation of key frame in video segments represents the past or future dependencies. Finally, the entire video segments are encoded and it is then hosted over a HTTP streaming server. Recently, the online video streaming traffic is growing massively. It is estimated that traffic in online video streaming services accounts for more than 80% of traffic in internet by 2020. Hence, the design of next generation video streaming services is driven by internet traffic.

Survey Paper on Security against Dynamic Routing in Wireless Sensor Networks and Internet
Authors:- M. Tech. Scholar Md Abid Hussain, Assistant Professor Mr. Manish Sahu

Abstract- Wireless sensor networks (WSNs) have been identified as one of the most innovative application of technologies in the 21stcentury. The small sized, low cost and low power sensors nodes are designed to communicate within a short range and work together to form a sensor network to gather data from a field.Cluster-based routing protocol is well known for enhancing the lifetime in WSN. Low Energy Adaptive Cluster Hierarchy (LEACH) protocol is one of the foremost and prominent protocols in the category of hierarchical protocols that enhanced the network lifetime by reducing and distributing the energy consumption among the nodes in a network. In this paper is studied of wireless sensor network based on fuzzy system. To improvement is lifetime of network with the help of fuzzy system.

Survey Survey Paper on Performance Evaluation of 5G System using Filter Bank Multicarrier Technique
Authors:- M. Tech. Scholar Roshni Patle, Associate Professor Mrs. Deepti Agrawal

Abstract- In this paper, the review of the multiple input multiple output using space time block code on IEEE 802.16 system. The Worldwide Interoperability for Microwaves Access technology which can offer high speed voice, image, and video and data service up to base on standard 802-16 wireless MAN is configured in the same way as a traditional cellular network. The range of WiMAX makes the system very attractive for users, but there will be slightly higher BER at low SNR. In this paper the study of different types of 4G and 5G technique and explain the advantage and disadvantage of the system.

Fatigue Analysis of Welded Joint Using Ansys: A Review Study
Authors:- M.Tech. Scholar Mohammad Imran, Prof. Dr. Ram Gopal Verma

Abstract- Fatigue failures in welded structures result in fatalities and significant financial losses. The adoption of different standards and fatigue design rules has been proposed as a solution to this problem. The foundations of such codes, in some instances, are based on outdated ideas that are difficult to convert to the output of current computer programmes and are also restricted to relatively simple structures.The purpose of this article is to investigate the fatigue strength of welded joints using a fracture mechanics method that takes into consideration welded joint fatigue behaviour. The technique assists in determining the fatigue crack propagation rate as a function of the difference between the applied driving force and the material crack propagation threshold, which is a function of fracture length. Failure of welded structures or machine components results in a variety of direct losses, including the cost of repair, the cost of effort to prevent future failure, accident compensation, and a reduction in output. Because joints are the weakest component of any building or machine, they are likely to fail first. As a result, it’s critical to investigate why certain joints are failing. Understanding the causes of failure and how they spread can help you appreciate welded joints from a reliability standpoint. Some purpose activities or failure causes may be essential, and they may be reduced at the layout or manufacturing stage, resulting in combined failure minimization.

A Review on Quality Improvement in Shaft Manufacturing Industry Usingseven Quality Tools
Authors:- M. Tech. Scholar Anand Kumar, Prof. Hari Mohan Soni

Abstract-In today highly competitive scenario the markets are becoming global and economic conditions are changing fast. Customers are more quality conscious and demand for high quality product at competitive prices with product variety and reduced lead time. It is a data-driven quality strategy used to improve processes. It is an integral part of a Six Sigma initiative, but in general can be implemented as a standalone quality improvement procedure or as part of other process improvement initiatives such as lean.Any enterprises that cannot manage the quality of its methods and products have a tendency to fall apart. Quality is crucial to sales, price control, productivity, risk control and compliance. As essential as quality is, there’s little agreement as to its definition. Therefore, in this study, seven quality tools have been reviewed.

A Review on Thermal Performance Analysis of Single Effect Vapour Absorption System
Authors:- M. Tech. Scholar Sanjay Sharma, Prof. Deenoo Pawar

Abstract- Cooling and refrigeration demand accounts for a significant portion of global energy consumption. Alternative cooling systems, including absorption and adsorption cooling systems, received more attention than before because mechanical vapour compression systems demand high-grade energy to operate. Conventional cooling methods outperform absorption and adsorption cooling systems it terms of overall performance. Today’s world is confronted with two major environmental issues. The energy problem and the greenhouse impact are indeed the two issues at hand. Scientists were attempting to find a solution to this issue. That fact underpins the majority of today’s inventions. The lithium-bromide and water-driven absorption refrigeration cycle is indeed an excellent illustration of just this idea since it often reduces fossil fuel use and hence CO2 emissions. Still, it also makes use of the low-grade heat of various businesses and data centers. Accordingly, in this paper, a review on thermal performance analysis of single effect vapour absorption system has been done.

Study and Analysis of Effect of Online Education Due to Covid-19 on Student Performance and Evaluation
Authors:-PG Scholar S. Shravya Geethika, PG Scholar Dy. Kiran Kumar

Abstract- It was the goal of this study to conduct an online survey to get information about the experiences of teachers and students in online classes. In light of the present pandemic crisis, the Indian school system has recently implemented an internet delivery method for classes. As a result of COVID19, online lessons have been made mandatory for college and university teachers and students. This poll, therefore, provides an overview of their impressions and concerns. More than 400 students from local colleges and universities were included in the study’s sample. The data was gathered using an online survey. For both teachers and students, the following areas are critical: high-quality and timely interaction between the professor and student, availability of technological support, structured online class modules and adjustments to fit practical classes.

Smart Home Energy Management System with Hybrid Energy Supply System
Authors:-M. Tech. Scholar Pratik Kumar Sharma

Abstract- The constant rise in household energy demand necessitates an effective energy management strategy. The development of smart houses that build interaction between users and their home appliances, as well as the adoption of hydride energy, has resulted in an effective home energy management system (HEMS) idea that operates automatically, multi-functionally, adaptably, and efficiently. Household applicants are encouraged to utilize in-home energy management devices by utility companies. The utility’s principal purpose is to lower peak load demand on the system, while the consumer wants to save money on their electricity bills. Renewable energy sources (RESs), a backup battery storage system (BBSS), and optimal power-sharing mechanisms can all improve the benefits of HEMS. Typically, the residential customer deals with a plethora of smart home gadgets, each of which has a different working time priority based on the consumer’s preferences. In this research, a cost-effective power-sharing technique based on power availability is created using an effective home energy management system idea and a hybrid energy storage system. The BBSS is charged and discharged using energy from grid communities, real-time energy pricing, and renewable energy sources.

Blockchain in Healthcare
Authors:- Yash Dave, Ansh Dalwadi

Abstract- The fourth industrial revolution, which will alter the globe, is commonly referred to as Blockchain technology. Blockchain technology provides a decentralized, distributed, and central authority-free environment. Since Bitcoin launched Blockchain, research has been continuing on non-financial use cases to extend their applicability. Healthcare is an industry with a significant influence on the Blockchain. Healthcare has penetrated the enthusiasm for the changing nature of Blockchain technology. Blockchain is frequently viewed as the most necessary and optimal healthcare technology to handle sophisticated and complex security and interoperability concerns. More significantly, the “value” and trust-based system’s smart contract mechanism can offer automatic action and reaction. Healthcare, on the other hand, is a complex system. In this paper, we introduce the blockchain and its properties, as well as the significance of the blockchain in healthcare. It also provides blockchain administration, adjudication of claims, interoperability, and application. While in several situations, we observed blockchain technology, the use of blockchain in health care was highly addressed in this paper and the reason why blockchain should be utilized. We introduce the advantages of blockchain as well. Furthermore, we examined the difficulties and prospects for the future and how they may be implemented in more healthcare industries. The paper also discusses the current level of Blockchain application development for healthcare and its limits and topics for further research. This paper aims to demonstrate how Blockchain technologies may be utilized in healthcare and what problems this technology may face in the future and what the Blockchain’s prospects are.

A Study on Consumer Behaviour towards Big Bazaar in Kozhikode
Authors:- Dr.S. Elango Ph.D, Dr.P.Gowthaman Ph.D

Abstract- The study on consumer behaviour towards big bazzar in Kozhikode was carried out in with an objective of knowing satisfaction level of customer at Big Bazaar and do customers are aware about the different types of products and Services and different offers provide at Big Bazaar. The total sample size taken was seventy five (75) from various customers of Calicut at Big Bazaar. The research shows that the customer satisfaction at Big Bazaar is very good. Many customers are not aware of the product and services provided by the Big Bazaar which are not provided by other Retail stores. On the other hand they have also the existing customers of Big Bazaar who are satisfied with the working style of retail store and customer support systems t big bazaar. They want that Big Bazaar should do promotional activity as – Advertising in social Medias so that they can attract more customers. The researcher used questionnaire method to carry out the study.

A Review Article of Power Load Flow Analysis for Active Islanding Mode
Authors:- Keshav Kumar,Dr. Anil Kumar Kori

Abstract- Power flow studies are very important in the planning or expansion of power system. With the integration of distributed generation (DG), micro-grids are becoming attractive. So, it is important to study the power flow of micro-grids. In grid connected mode, the power flow of the system can be solved in a conventional manner. In islanded mode, the conventional method (like Gauss Seidel) cannot be applied to solve power flow analysis. Hence some modifications are required to implement the conventional Gauss Seidel method to islanded micro-grids.

Dermoscopic Image Classification using Resnet 50 in MATLAB
Authors:- V. Rajmohan

Abstract- Now a days, cancer is one of the most complex disease for diagnostics. It means cells in the body grow out of control. Due to skin exposes in sun, it may cause the abnormal growth of skin cells level in a human body. Among the skin cancer, it has some types such as basal, squamous cell carcinoma and melanoma among those skin cancer types melanoma is can’t able to predict for dermatologist. If we detect the melanoma on earlier stage, it’s easy to cure it. Computer vision and Image processing toolboxes plays a pivotal portion in medical imaging and its diagnosis field and also it’s already proved on several methods. In our work, we represent the computer aided manner for skin cancer detection (i. e melanoma) using MATLAB-Image Processing toolbox. The input dermoscopic skin cancer image is used in the system, further applied to the system using new schemes. By using the image analysis tool segment the skin cancer region, its features are extracted. Based on features will be applied to classifier, it will predict the skin cancer segmented region and it’s belong to either melanoma or not melanoma type.

Technical and Economic Feasibility of Using Steel Fibers Reinforced Concrete (SFRC) in Slap line of Subways and Rail Roads
Authors:- Seyedmohammad Fatemi

Abstract- Utilization of steel fiber in railroad is under consideration in some countries around the world. The purposes of using these materials are, increase of freightage and crack control in the slap of the subway and railroad line. Fibers are commercially available and manufactured from steel, plastic, glass, and other natural materials. In many situations it is prudent to combine fiber reinforcement with conventional steel reinforcement to improve performance. The model of concrete can be used for analysis of failure mechanism of reinforced concrete structural elements. Although most of the current railway tracks are still of a traditional ballasted type and recent applications tend more and more towards non-ballasted track. Slab track designs have significant advantages comparing to ballasted tracks. The most significant are the high stability of the track. Their disadvantages against the ballasted tracks are mainly summarized in their higher construction costs. In order to select the most suitable concrete for the construction of high-rise buildings, method of analytic hierarchy process based on expert knowledge has been used. In this study conducted a series of laboratory works, to compare the effect of steel fibers used in various categories of resistance on concrete behavior parameters. Mixing the samples is set for the three categories of resistance 25, 35 and 45 MPa. Strength parameters that are chosen to identify concrete actions are tensile strength, impact strength, compressive strength, and flexural strength. Also, the samples in each resistance category are made with four fibers quantity: without fibers, 15, 25 and 35 kg fibers per cubic meter. The results suggest that using of steel fibers, increases the impact resistance, time of the first crack and ultimate strength of concrete significantly. Also, the addition of this type of fibers, increases tensile strength and flexural strength but doesn’t have significant effect on the compressive strength of concrete

Performance Analysis of Shell and Tube Heat Exchanger: Parametric Study
Authors:- M. Tech. Scholar Manu Mishra, Prof. Maneesh Dubey

Abstract- Refrigeration, air conditioning, and chemical plants all use heat exchangers. It’s utilised for a variety of things, including transferring heat from a hot to a cold fluid. They’re commonly employed in a variety of industrial settings.Researchers had worked on a variety of projects in attempt to increase performanceIn this study shell and tube heat exchanger with 10 different baffles are placed along the shell in alternating orientations with cut facing up, cut facing down, etc., in order to create flow paths across tube bundle. The geometric modelling is done using CAD software called CATIA V5R21 because it is easy to model Heat exchanger in 3D modelling software.

Design & Thermal Analysis of Double Pipe Heat Exchanger by Changing the Mass Flow Rate
Authors:- M. Tech. Scholar Rahul Vishwakarma, Prof. Maneesh Dubey

Abstract- The project is based on Voice Personal Assistant (VPA) it is a digital assistant that uses voice recognition, natural language processing and speech synthesis to provide aid to users through voice recognition applications. One of the most studied and popular was the direction of interaction, based on the understanding of the machine by the machine of the natural human language. It is no longer a human who learns to communicate with a machine, but a machine learns to communicate with a human, exploring his actions, habits, behavior and trying to become his personalized assistant.

A Review on Design & Development of a Solar Pond and CFD Modeling
Authors:- M. Tech. Scholar Ravil Khateek, Prof. Maneesh Dubey

Abstract- Evaporation condensation process for converting saline water to fresh water is the widespread and the oldest technology used for desalination. In this process, the saline water is heated using a heat source to the evaporating point (here the solar pond) and thus this steam that is evaporated leaves behind the salt content present in the saline water. The evaporated fresh steam is then collected and then condensed to give us the fresh water. This fresh water is then again distilled to lose the remaining ppm thus making it drinkable. This technology is cheaper than the others since it doesn’t have any other energy costing elements other than the heat source and condenser. Thus, by using a solar pond as the heat source we are reducing the cost of the desalination process. Accordingly, a review on design & development of a solar pond and CFD modeling has been done.

Performance Evaluation of Geosynthetics Geotextile Based Pavement Using CBR Test
Authors:- Lecturer Ritu Mewade

Abstract- Two design methods were used to quantify the improvements of using geotextiles in pavements. In this study, a comprehensive life cycle cost analysis framework was developed and used to quantify the initial and the future cost of 25 representative low volume road design alternatives. A 50 year analysis cycle was used to compute the cost-effectiveness ratio when geotextiled is used for the design methods. The effects of three flexible pavement design parameters were evaluated; and their impact on the CBR results was investigated.

Exploratory Research Using Bacteria as a Self-Healing Concrete: Review
Authors:- Research Scholar Teena Chandnani, Associate Professor Dr. N.K. Dhapekar

Abstract- This study illustrates that the utilization of microorganisms-Bacillus Subtlis is productive for development of a tough framework and put forth a concentrated effort mending concrete as strategy for break control to upgrade administration life in solid structure. Crack formation is very common occurrence in concrete structure which allows the water and different type of chemical into the concrete through the cracks and reduces their durability, strength and which also affect the reinforcement when it comes in contact with water, carbon-di-oxide and other chemicals. It is expensive to maintain or repair concrete-based structures every now and again. For resolving this issue self-healing concrete mechanism is introduced in the concrete which helps to repair the cracks by producing calcium carbonate crystals which close up the micro cracks and pores in the concrete The investigation illustrates that there is a remarkable increase in the quality of cement added with bacteria or bacterial concrete contrasted with conventional concrete.

Voice Assistant
Authors:- Ritik Porwal, Ujjawal Tomar, Vishakha Dubey, Asst. Prof. Akshita Mishra, Asst. Prof. Gourav Mandloi

Abstract- The project is based on Voice Personal Assistant (VPA) it is a digital assistant that uses voice recognition, natural language processing and speech synthesis to provide aid to users through voice recognition applications. One of the most studied and popular was the direction of interaction, based on the understanding of the machine by the machine of the natural human language. It is no longer a human who learns to communicate with a machine, but a machine learns to communicate with a human, exploring his actions, habits, behavior and trying to become his personalized assistant.

Digital Badging Platform
Authors:- Shubham Singla, Asst. Prof. Ajay Kaushik

Abstract- During current days if we saw due to Covid most of things specially if we talk about education, it becomes online and students & teachers both found it difficult to cop up with this situation. It’s a sudden change and no one expected that education would become online and no-one is prepared for the same and now we are facing some real issues. Considering student’s cases, they lose the motivation to study, there is no competition among peers, classes seem boring to them and they start skipping classes. If we mention the teacher’s case, then they won’t ready to pay much attention to every student, they still don’t know where they’re lacking and neither they’re ready to deliver the proper system to them. After analyzing this problem, it seems quite big, it becomes important to unravel it. Introducing you to the Digital badges which are truly becoming an appropriate, easy and efficient way for educators, community groups and other professional organizations, to exhibit and reward participants for skills obtained in any professional development or formal and informal learning. I have proposed a web- portal based solution for the above problems, which aims to solve the problem of motivation among students and also helps teacher to know their students in a perfect way.

A Survey on Wireless Network Optimization by Attack Prevention and Detection Techniques
Authors:- Lipi Sharma, Dr.Vivek Richariya

Abstract-Wireless sensor network are acting as a important portion for implementation, maintains of many application and services. Open network for communication increases its flexibility and vulnerability of attacks as well. It is critical challenge to develop the effective and lightweight security mechanism to detect and prevent various attacks for WSN Attacks were list in the paper and classified as per nature of the activity performed by malicious nodes. This paper has summarized energy dependency of the WSN, paper has list some of techniques to expand life of the WSN network. Many of researcher has proposed different techniques of network attack detection were detailed in the paper. Some of energy optimization papers were also introduced to increase the life span of network.

Bus Notification System with Alarm
Authors:- T. Jahnavi Lakshmi, K. Sri Lakshmi, G. Naga Sai Teja, J. Harika, Associate Prof. G. Kalyani

Abstract- Now a day’s, an individual can’t determine which bus is coming to the bus depot. They’re always reliant on somebody to assist them out on an equivalent issue. So we’ve come up with a project which might allow the person to work out the buses which are coming at the bus depot and also give them information about the route through which they’re going. During this system, there’s a requirement to put a GPS device on all the buses. This can help the person to work out which bus is coming to the bus depot and what its route alongside the stops is without counting on anybody.

Processing of M2 High Speed Steel Powder Using Waste Rubber Based BinderBy Metal Injection Moulding Technique
Authors:- Mohd Afian Omar, Norhaslina Johari

Abstract- This paper presents the compatiblity of waste rubber as one of the binder components in producing powder injection moulding feedstock. M2 High Speed Steel powder with mean diameter particle size 16µm has been used for this study. The metal powder with the powder loading of 65 vol.% were mixed with paraffin wax, polyethylene, waste rubber and stearic acid using z-blade mixer for two hours at 160°C in order to produce the feedstock. The feedstock was injection moulded by using vertical injection moulding machine with a nozzle temperature of 180°C and pressure of 350Bar. The moulded part was immersed into n-heptane at 60°C for five hours in order to remove the paraffin wax and stearic acid. The specimens were then sintered at a temperature range of 1200°C-1260°C in a controlled vacuum atmosphere. The properties of the sintered specimen such as physical, mechanical and microstructure were studied and discussed.

Artificial Intelligence in Heart Disease Treatment
Authors:- Research Scholar Anirban Chakraborty

Abstract- Cardiovascular disease (CVD), despite the significant advances in the diagnosis and treatments, still represents the leading cause of morbidity and mortality worldwide. In order to improve and optimize CVD outcomes, artificial intelligence techniques have the potential to radically change the way we practice cardiology, especially in imaging, offering us novel tools to interpret data and make clinical decisions. AI techniques such as machine learning and deep learning can also improve medical knowledge due to the increase of the volume and complexity of the data, unlocking clinically relevant information. Likewise, the use of emerging communication and information technologies is becoming pivotal to create a pervasive healthcare service through which elderly and chronic disease patients can receive medical care at their home, reducing hospitalizations and improving quality of life. The aim of this review is to describe the contemporary state of artificial intelligence and digital health applied to cardiovascular medicine as well as to provide physicians with their potential not only in cardiac imaging but most of all in clinical practice.

Strategic Framework for Managing Transformational Change towards Sustainability in Ethiopian Banking Industry
Authors:- Dr. Abreham Tesfaye Abebe

Abstract- The study aims at developing strategic framework for managing transformational change towards sustainability in Ethiopian banking industry. The study was guided by five critical research questions so that it can be aligned to the core points of the study. To make it representative, the researcher made an attempt to include three private commercial banks in Ethiopia that entered to the industry in various periods. The samples were taken from the selected banks, most importantly, the senior executive leadership, middle level management and senior experts in the area. Following the development of the framework using the environmental, social and economic dimensions of sustainability, it was validated with fifteen professionals who have over 20 years of work experience in Ethiopia banking industry. Questionnaires and interview methodologies were employed in the study and it is recommended as sustainability shall be understood in a more holistic perspective having the three dimensions (environmental, economic and social) in to consideration. Besides, continuous training shall be conducted on the concept of sustainability in relation to banking business, performance management in that regard shall also be conducted, and the Bank’s community shall clearly know that where can they contribute towards the management of change initiatives towards sustainability.

Impact of Aircraft Noise Generation on Residential Neighbourhoods near Port- Harcourt International Airport Omuagwa, Ikwerre Local Government Area, Rivers State, Nigeria
Authors:- Ogbonna VA, Ebubeoniso JJ, Weli VE

Abstract- This study examined Aircraft noise impact on residential neighborhoods near Port Harcourt International Airport Omuagwa, Nigeria. Medical health record data for the acoustic report was obtained from the Omuagwa health center. Field noise measurement was taken from sensitive noise receptors in the airport and the host community using a précised sound level meter model 2310 SL, IEC 651. Seven years’ acoustic health records from 2013, 2014, 2015, 2016, 2017, 2018, and 2019 were obtained and calculated. Field noise data was sample within and outside the Airport terminal. The points include terminal1(95.6 dBA), terminal 2(94.0 dBA), Airport junction (94.4 dBA), Igwuruta Stadium (88.0 dBA), Omuagwa Village1(92.7 dBA), Omuagwa Village (91.7 dBA), and Omuagwa village market (92.3dBA). The result shows two health diseases such as hypertension and hearing impairment caused by aircraft noise, with 2,990 cases. Hearing impairment is prevalent among adults above 18 years, with 2,248 disease cases and 742 cases of hypertension in the study area. The relationship between aircraft noise and residents’ health was determined using regression analysis, and the statistical result revealed a significant relationship. To mitigate the effect of noise on people residing around airports, the Aviation Industry should ensure noise metrics measurement are deployed to ascertain noise level of different aircrafts on daytime, nighttime, and frequencies of takeoff and landing within and outside the airport terminal. The Federal Ministry of Aviation should monitor and restrict the host communities’ land development encroachment near airport, to help curb the risk of noise pollution.

A Study on Consumer Attitude towards Online Shopping With Special Reference to Nilgiri District
Authors:- M. Mahesh Kumar, Sobha.P.G, Asst. Prof. N.Jemila Dani, Andrew J.R, Vanitha S., Cuneyt, K. Gautam B., Dr.S. Elango Ph.D, Dr.P.Gowthaman Ph.D

Abstract- In the present era of globalization electronic marketing is playing a great revolution. Over the last few decades most of the business organizations are running with adoption of technology and technological change. Online shopping or marketing is the use of technology (i.e., computer) for better marketing performance and reaching a large amount of customer’s in spite of the boundaries and territories. And retailers are devising strategies to meet the demand of online customers. They are busy in studying consumer taste, preference and behaviour in the field of online shopping and understand the consumer attitudes towards online shopping and making necessary changes in their strategies and plans. The aim of present study is also to know about the consumer’s attitudes towards online shopping and specifically studying the factors influencing consumers to shop online.

Prediction of Heart Disease Using Machine Learning Techniques
Authors:- M. Tech. Student Chetana Patil, Asst.Prof. Dr. Priti Subramanium, Head & Asst. Prof. Dr .Dinesh. D .Patil

Abstract- In the today’s world Heart disease prediction is a critical challenge. Machine learning (ML) is effective in making some predictions from the huge quantity of data created by the healthcare industry and decisions. The health care industry contains large amount of medical data, therefore machine learning algorithms are necessary to make decisions effectively in the prediction of heart diseases. Various hybrid Machine learning techniques are using in some recent developments in various areas of the Internet of Things (IoT). Introduction of prediction model is with different combinations of features and some known classification techniques. Data pre-processing uses various techniques like the removal of classification of attributes, missing data, noisy data and default values filling for decision making and prediction at different levels.

Digital Badging Platform
Authors:- Shubham Singla, Asst. Prof. Ajay Kaushik

Abstract- During current days if we saw due to Covid most of things specially if we talk about education, it becomes online and students & teachers both found it difficult to cop up with this situation. It’s a sudden change and no one expected that education would become online and no-one is prepared for the same and now we are facing some real issues. Considering student’s cases, they lose the motivation to study, there is no competition among peers, classes seem boring to them and they start skipping classes. If we mention the teacher’s case, then they won’t ready to pay much attention to every student, they still don’t know where they’re lacking and neither they’re ready to deliver the proper system to them. After analyzing this problem, it seems quite big, it becomes important to unravel it. Introducing you to the Digital badges which are truly becoming an appropriate, easy and efficient way for educators, community groups and other professional organizations, to exhibit and reward participants for skills obtained in any professional development or formal and informal learning. I have proposed a web- portal based solution for the above problems, which aims to solve the problem of motivation among students and also helps teacher to know their students in a perfect way.

The Effects on Rate of Change of Thermal Behavior of Auto Muffler with Thermo Electric Module
Authors:- M. Tech. Scholar Rajat Kumar Sahoo, Prof. C S Koli, Prof. Amit Agrawal

Abstract- Thermal quantity and external insulation to exhaust system is main factor which affects the inlet gas temperature of catalytic converters. Under normal operating conditions, catalytic converters are most effective to reduce air pollution from internal combustion engines. The exhaust gases flowing through the exhaust system need to be cooled before reaching the catalytic converter to increase performance of catalytic converter. The heat transfer analysis in automotive exhaust system is necessary because their importance in the design and optimization phases of exhaust aftertreatment system. Heat loss between the engine out and before the catalyst converter will determine the energy gain of the catalyst thus affect the temperature rise of the catalyst which affect catalyst life time. A significant number of researches have been done for exhaust manifold, exhaust piping and catalytic converter packaging design for automotive exhaust system to improve performance based on heat transfer analysis of exhaust system. The resulting heat transfer expression based on experiments and mathematical modeling used in computational models for the design of exhaust system parts and optimization phases to facilitate the selection of suitable material and designed system for better performance.

Thermal Performance Analysis Of Active Type Solar Dryer
Authors:-M.Tech .Scholar Bibhuti Bhusan Panda, Prof. C S Koli, Prof. Amit Agrawal

Abstract- Basiccrops drying by sunlight based vitality is of incredible financial significance the world over particularly in India where the greater part of the yields grain are lost to parasitic and microbial assaults Appropriate drying could without much of a stretch forestall these wastages which upgrades stockpiling of yields and grains over significant stretches India is honored with plentiful sunlight based vitality all the all year removal of moisture significant and most vitality expending forms in the food preparing concoction printing texture biting the dust ventures and so forth In rancher level drying is being benefited on open yards without in any way sterile conditions For the most part warm vitality kept up between 40oC to 25oC relying upon the items and creation strategies An ordinary fuel like power kindling diesel heater oil lamp fuel and so on is creating that vitality The target of this task is to adjust plan of a constrained convection roundabout sun based dryer and its exhibition test on The framework comprises of an air warming segment The sun oriented dryer comprises of various segments for example sun based board battery warming component and blower The blower is accustomed to passing the hot air to the necessary spot with the goal that the dampness substance in the spot was expelled It offers a superior authority over drying and the item got is of preferable quality over sun drying Sunlight based dryer can be worked at higher temperature suggested for profound layer drying.

The Importance of Artificial Intelligence on Recruitment Industry
Authors:- Asst. Prof. Roopa U, Savita Hosamani

Abstract-The talent procurement team defines the role talent acquisition team of the HR who oversee discovering, procuring, evaluating, and hiring candidates who fit the roles that are required to meet company goals and fulfill project requirements. Many challenges faced in the recruitment industry and for any organization to achieve its goals, a committed workforce is a must. The traditional method of recruitment was time consuming, cost ineffective. Through Artificial Intelligence (AI) we will figure out which are the factors to be concentrated more so that we can hire a skilled employee with less sourcing time and making it cost effective even to the organization as well.

Bus Notification System with Alarm
Authors:- T. Jahnavi Lakshmi, K. Sri Lakshmi, G. Naga Sai Teja, J. Harika, Associate Prof. G. Kalyani

Abstract- Now a day’s, an individual can’t determine which bus is coming to the bus depot. They’re always reliant on somebody to assist them out on an equivalent issue. So we’ve come up with a project which might allow the person to work out the buses which are coming at the bus depot and also give them information about the route through which they’re going. During this system, there’s a requirement to put a GPS device on all the buses. This can help the person to work out which bus is coming to the bus depot and what its route alongside the stops is without counting on anybody.

Comparative Study of springs of Almora and Model Generated Values for Selected Stations of Spring Fed River Kosi in Uttarakhand with Reference to Nitrate
Authors:- Research Associte Pooja Rani Sinha, Kireet Kumar Scientist G , V.P Uniyal Scientist G

Abstract-The current study is to comparative study the nitrate contamination of springs of Almora and the spring fed river at the selected stations of the stretch. The contaminations levels of Almora springs are ranged between 30mg/l-48mg/l which is above the permissible limit as suggested by BIS is 40-45mg/l whereas the contamination levels of the nitrate in the spring fed river Kosi ranged from 2mg/l-15mg/l. The current study focuses on the dilution of the springs and its contamination after these springs feed the river Kosi. The current study incorporates the nitrate contamination of the springs selected for study and the nitrate contaminations of the selected stations of the river Kosi.The statistical model WASP generated values of nitrate contamination for the river Kosi compares the simulated and observed values and signifies probable contamination level of nitrate in near future of the river.

Comparative Study of springs of Almora and Model Generated Values for Selected Stations of Spring Fed River Kosi in Uttarakhand with Reference to Nitrate
Authors:- Research Associte Pooja Rani Sinha, Kireet Kumar Scientist G , V.P Uniyal Scientist G

Abstract-The current study is to comparative study the nitrate contamination of springs of Almora and the spring fed river at the selected stations of the stretch. The contaminations levels of Almora springs are ranged between 30mg/l-48mg/l which is above the permissible limit as suggested by BIS is 40-45mg/l whereas the contamination levels of the nitrate in the spring fed river Kosi ranged from 2mg/l-15mg/l. The current study focuses on the dilution of the springs and its contamination after these springs feed the river Kosi. The current study incorporates the nitrate contamination of the springs selected for study and the nitrate contaminations of the selected stations of the river Kosi.The statistical model WASP generated values of nitrate contamination for the river Kosi compares the simulated and observed values and signifies probable contamination level of nitrate in near future of the river.

Prediction of Heart Disease Using Machine Learning Techniques
Authors:- M. Tech. Student Chetana Patil, Dr. Dinesh. D .Patil, Asst. Prof. Dr. Priti Subramanium

Abstract- In the today’s world Heart disease prediction is a critical challenge. Machine learning (ML) is effective in making some predictions from the huge quantity of data created by the healthcare industry and decisions. The health care industry contains large amount of medical data, therefore machine learning algorithms are necessary to make decisions effectively in the prediction of heart diseases. Various hybrid Machine learning techniques are using in some recent developments in various areas of the Internet of Things (IoT). Introduction of prediction model is with different combinations of features and some known classification techniques. Data pre-processing uses various techniques like the removal of classification of attributes, missing data, noisy data and default values filling for decision making and prediction at different levels.

Acceptance Criteria of Concrete as per IS: 456-2000, 4th Revision, Amendment No. 4
Authors:- Posannapeta Y Ganga Ram

Abstract- In the amendment no. 4 of IS:456-2000, the acceptance criteria of concrete slightly modified. It made very simple and common for M15 and above grade for concrete works. Still most of cases there are lot of confusions on acceptance and finalization of strength of the concreate.It is clearly mentioned in IS code, even though various interpretations on understanding the same. To overcome this issue here it is clearly described the acceptance and finalization of the concreate strength.In this paper, it is described based on IS: 456-2000, 4th revision, amendment no. 4.

A Review on Power Quality Based on UPFC
Authors:- Research Scholar Yamunadhari Kumar, Prof. Mamta Sood, Dr. Manju Gupta, Dr.Anuprita Mishra

Abstract- Power electronic controllers for a flexible ac transmission system (FACTS) can offer a greater control of power flow, secure loading and damping of power system oscillations. A unified power flow controller (UPFC) is a one of FACTS elements that can provide VAR compensation, line impedance control and phase angle shifting. The UPFC consist of two fully controlled inverters, series inverter is connected in series with the transmission line by series transformer, whereas parallel inverter is connected in parallel with the transmission line by parallel transformer. The real and reactive power flow in the transmission line can be controlled by changing the magnitude and phase angle of the injected voltage produced by the series inverter. The basic function of the parallel inverter is to supply the real power demanded by series inverter through the common dc link. The parallel inverter can also generate or absorb controllable reactive power. This paper offers and discusses most papers that used a UPFC to improving the active and reactive power flow of the power systems the unified power flow controller (UPFC) is an advanced member of flexible AC transmission systems (FACTS) group. This paper is focused on three techniques for inclusion of the steady state models of the UPFC in power flow programs. This paper also presents a review of various benefits and applications of UPFC in power flow studies such as minimization of loss, enhancement of load ability, voltage stability etc. using various optimization techniques. A case study is also shown to analysis effect of UPFC using comprehensive NR method based power flow.

A Review on Hybrid Renewable Energy System Using Dynamic Voltage Restorer
Authors:- Research Scholar Nilesh Kumar Choudhary, Asst. Prof. Amarnath Mukherjee,Asst. Prof. Parikshit Bajpai

Abstract- This paper presents a new system for integration of a grid-connected photovoltaic (PV) system together with a self-supported dynamic voltage restorer (DVR).Power quality (PQ) is gaining a great deal of importance as more sensitive loads are introduced into the utility grid. The degradation of product quality, damage of equipment and temporary shutdowns are the general issues associated with PQ problems in industries. Any mal-operation or damage of the industrial sensitive loads results in monetary losses disproportionately higher than the severity of the PQ issues. The evolution of power electronics technology replaced the traditional power quality mitigation methods with the introduction of Custom Power System devices (CUPS). The major power electronic controller based CUPS are DSTATCOM, DVR and UPQC. DVR is a pertinent solution for the economic losses caused by the PQ issues in the industries. Among the CUPS, DVR is the most cost-effective one. In the published literature, only a few papers correspond to the review of DVR technology. In this paper, a systematic review of published literature is conducted and a description is given on the design, standards and challenges in the DVR technology. In addition to the energy variability of renewable energy sources, random voltage sags, swells and disruptions are already a major issue in power systems. Recent advances in power electronic devices have provided a platform for new solutions to the voltage support problem in power systems.

Review Article of Heat exchanger performances comparison using Two variance ANOVA Method
Authors:- Kamlesh Ravat, Asst. Prof. Saumitra Kumar Sharma

Abstract- Heat exchangers are one of the most important heat transfer apparatus that find its use in industries like oil refining, chemical engineering, electric power generation etc. Shell-and-tube type of heat exchangers have been commonly and most effectively used in Industries over the years. In this paper we see a review of Outline and Types of Heat exchangers , Thermal Design and Mechanical Design by the use of ASME,TEMA standard take a case study of Modern Shell & Tube type Heat exchanger.

A Review Article Of Hv Relay Based Protection And Power Stabilization Using Scheduling Switching Time
Authors:- Neha yadav, Dr. A. K. Kori

Abstract- Due to the increasing demand of energy and the need for nonconventional energy sources, distributed generation (DG) has come into play. The trend of unidirectional power flow has been gradually shifting. With new technology comes new challenges, the introduction of DG into the conventional power system brings various challenges; one of the major challenges is system protection under DG sources. These sources pose a significant challenge due to bidirectional flows from DGs as well as lower fault current contribution from inverter interfaced DGs. This paper reviews existing protection schemes that have been suggested for active distribution networks. Most of these protection strategies apply only to smaller distribution systems implying that they may need to be extended to larger systems with a much higher penetration of distributed generation. In the end, a potential protection scheme has also been recommended as a future work.

A Review Article of Power System Fact Controller Implementation Using Deep Learning Techniques
Authors:- M. Tech. Scholar Princy Singh, Dr. A K Kori

Abstract- The recent advances in computing technologies and the increasing availability of large amounts of data in smart grids and smart cities are generating new research opportunities in the application of Machine Learning (ML) for improving the observability and efficiency of modern power grids. However, as the number and diversity of ML techniques increase, questions arise about their performance and applicability, and on the most suitable ML method depending on the specific application. Trying to answer these questions, this manuscript presents a systematic review of the state-of-the-art studies implementing ML techniques in the context of power systems, with a specific focus on the analysis of power flows, power quality, photovoltaic systems, intelligent transportation, and load forecasting. The survey investigates, for each of the selected topics, the most recent and promising ML techniques proposed by the literature, by highlighting their main characteristics and relevant results. The review revealed that, when compared to traditional approaches, ML algorithms can handle massive quantities of data with high dimensionality, by allowing the identification of hidden characteristics of (even) complex systems. In particular, even though very different techniques can be used for each application, hybrid models generally show better performances when compared to single ML-based models.

A Review Article Enhancement of Image Forgery and Improvement of Image Parameters Using DWT Algorithm
Authors:- Rajni Soni, Asst. Prof. Hemant Amhia

Abstract- This paper presents a new system for integration of a grid-connected photovoltaic (PV) system together with a self-supported dynamic voltage restorer (DVR).Power quality (PQ) is gaining a great deal of importance as more sensitive loads are introduced into the utility grid. The degradation of product quality, damage of equipment and temporary shutdowns are the general issues associated with PQ problems in industries. Any mal-operation or damage of the industrial sensitive loads results in monetary losses disproportionately higher than the severity of the PQ issues. The evolution of power electronics technology replaced the traditional power quality mitigation methods with the introduction of Custom Power System devices (CUPS). The major power electronic controller based CUPS are DSTATCOM, DVR and UPQC. DVR is a pertinent solution for the economic losses caused by the PQ issues in the industries. Among the CUPS, DVR is the most cost-effective one. In the published literature, only a few papers correspond to the review of DVR technology. In this paper, a systematic review of published literature is conducted and a description is given on the design, standards and challenges in the DVR technology. In addition to the energy variability of renewable energy sources, random voltage sags, swells and disruptions are already a major issue in power systems. Recent advances in power electronic devices have provided a platform for new solutions to the voltage support problem in power systems.

Review Article Of hybrid System – Framework Which Prompts Produce Power With Reasonable Expense Without Harming The Nature Balance
Authors:- Student of ME Shashi Bala Masram, Dr. Anil Kumar Kori, Asst. Prof. Pawan Kumar Pandey

Abstract- Due to the fact that solar and wind power is intermittent and unpredictable in nature, higher penetration of their types in existing power system could cause and create high technical challenges especially to weak grids or stand-alone systems without proper and enough storage capacity. By integrating the two renewable resources into an optimum combination, the impact of the variable nature of solar and wind resources can be partially resolved and the overall system becomes more reliable and economical to run. This paper provides a review of challenges and opportunities / solutions of hybrid solar PV and wind energy integration systems. Voltage and frequency fluctuation, and harmonics are major power quality issues for both grid-connected and stand-alone systems with bigger impact in case of weak grid. This can be resolved to a large extent by having proper design, advanced fast response control facilities, and good optimization of the hybrid systems. The paper gives a review of the main research work reported in the literature with regard to optimal sizing design, power electronics topologies and control. The paper presents a review of the state of the art of both grid-connected and stand-alone hybrid solar and wind systems.

Computer Aided Modeling and Simulation of Engine Block Fins with Various Fin Materials
Authors:- Research Scholar Anukaran Jalonha, Asst. Prof. Nilesh Sharma, Asst. Prof. Divyadarshani Dhakre

Abstract- Internal combustion engines are using the chemical energy of the fuel to convert it into the mechanical work. As the fuel is ignited in power stroke either it is spark ignition engine as in case of petrol engine or compression ignition engine as in case of diesel engine the power is produced and piston moves continuously between the top dead centre and bottom dead centre. In internal combustion engine this piston movements are very fast and as the engine speed increases it is even faster. This movement together with the fuel burning creates lot of heat inside the cylinder and ultimately results in poor engine performance in terms of operation and durability. So one need to think about the heat dissipation from the engine cylinder. As far as the heat dissipation is concerned we need to increase the surface area of the cylinder outer body for this reason the fins are used as extended surfaces and the rate of heat transfer to the atmosphere can be increased. In this work we are focusing on the various fin materials for optimum performance of engine. For this we have modeled an IC engine cylinder and then we have applied various fin materials to the cylinder block and we have analysed the block using at actual operating conditions that is maximum internal temperature at the inner side of the cylinder taken as 920 C and convection parameters obtained theoretically for different materials. We will be using CATIA software for the modeling purpose and ANSYS software tool for analysis work. Once we obtain the results we will do a comparative study and will conclude our analysis

A Review Article Enhancement of Image Forgery and Improvement of Image Parameters Using DWT Algorithm
Authors:- Rajni Soni, Asst. Prof. Hemant Amhia

Abstract- This paper presents a new system for integration of a grid-connected photovoltaic (PV) system together with a self-supported dynamic voltage restorer (DVR).Power quality (PQ) is gaining a great deal of importance as more sensitive loads are introduced into the utility grid. The degradation of product quality, damage of equipment and temporary shutdowns are the general issues associated with PQ problems in industries. Any mal-operation or damage of the industrial sensitive loads results in monetary losses disproportionately higher than the severity of the PQ issues. The evolution of power electronics technology replaced the traditional power quality mitigation methods with the introduction of Custom Power System devices (CUPS). The major power electronic controller based CUPS are DSTATCOM, DVR and UPQC. DVR is a pertinent solution for the economic losses caused by the PQ issues in the industries. Among the CUPS, DVR is the most cost-effective one. In the published literature, only a few papers correspond to the review of DVR technology. In this paper, a systematic review of published literature is conducted and a description is given on the design, standards and challenges in the DVR technology. In addition to the energy variability of renewable energy sources, random voltage sags, swells and disruptions are already a major issue in power systems. Recent advances in power electronic devices have provided a platform for new solutions to the voltage support problem in power systems.

A Review On Power Quality Based On Upfc
Authors:- Research Scholar Renu Kesharwani, Asst. Prof. Parikshit Bajpai

Abstract- Power electronic controllers for a flexible ac transmission system (FACTS) can offer a greater control of power flow, secure loading and damping of power system oscillations. A unified power flow controller (UPFC) is a one of FACTS elements that can provide VAR compensation, line impedance control and phase angle shifting. The UPFC consist of two fully controlled inverters, series inverter is connected in series with the transmission line by series transformer, whereas parallel inverter is connected in parallel with the transmission line by parallel transformer. The real and reactive power flow in the transmission line can be controlled by changing the magnitude and phase angle of the injected voltage produced by the series inverter. The basic function of the parallel inverter is to supply the real power demanded by series inverter through the common dc link. The parallel inverter can also generate or absorb controllable reactive power. This paper offers and discusses most papers that used a UPFC to improving the active and reactive power flow of the power systems the unified power flow controller (UPFC) is an advanced member of flexible AC transmission systems (FACTS) group. This paper is focused on three techniques for inclusion of the steady state models of the UPFC in power flow programs. This paper also presents a review of various benefits and applications of UPFC in power flow studies such as minimization of loss, enhancement of load ability, voltage stability etc. using various optimization techniques. A case study is also shown to analysis effect of UPFC using comprehensive NR method based power flow.

Research on Online Crime Server and Management
Authors:- Madhuri Babar, Pranjal Sahare, Rahul Katre, Pankaj Ganvir, Badal Sakharwade, Rani Chikate

Abstract- Nowadays, much of the crimes committed were unreported to the authorities. Given this fact, the study presents the development of Online Crime Server through idea draws its motivation from the inconvenience of going to the police station and personal belief of the weak investigative capabilities of the authorities to resolve petty crimes and limited spreading of crime information to the community. The project specifically looks into the crime detection and prevention. This study aims to provide an overview of the investigative process and, in doing so, identify effective and efficient approaches to the investigation and detection of the volume of crimes. The review is particularly aimed to highlight the research evidence those investigative practices and actions that are likely to lead to a positive outcome. The development of software includes system architecture, flow chart, project module formulation, modules and many more. This also shows that distance is also a factor that influences greatly how crimes are being handled with many crimes going unreported as a result. Crime Server would really help the complainant and the authority to communicate privately and easily with regards to the reported issue. In addition, it would be easier for the complainant to report a witnessed crime without the fear of getting involved in the problems because of the security that the only authorized user can see the report..

COVID-19 Infodemic and the Media in Times of Crisis
Authors:- Dr.Neetu Anand, Yash Pandey, Shyam Sharma

Abstract- The purpose of this research is to evaluate the crucial role of media in information distribution, much as it did in the earlier pandemics of SARS, MERS, and H1N1. The rapid spread of this sickness worldwide caused public concern, and various unknowns about this new pathogen prompted a panic. As a result, the news media became an essential source of knowledge about the new coronavirus; yet, there are numerous benefits and drawbacks to consider. For the first time in history, responsible use of these tools may help quickly distribute crucial information, relevant scientific results, share the diagnosis, cure, and follow-up protocols, and evaluate different techniques globally, reducing geographic borders. We describe the most considerable information on the impact, benefits, and drawbacks of using media networks during the COVID-19 epidemic in this study.

Survey on Cloud Attack Types and Detection Techniques
Authors:- M.Tech. Scholar Rakesh Jat, Asst. Prof. Sumit Sharma

Abstract- Cloud environment gives flexibility to different service and products for easy access. This liability of access increases the vulnerability of attack as well. Many of researchers are working in this field of attack prevention and detection. This paper has detailed a survey on various types of attacks present in the cloud. Attacks are classified into few categories as per nature of intrusion and affects. Such attack detection techniques developed by different scholars are also summarized in the paper for lcear understanding of attack detection features. In oreder to compare twoor more detection algorithms evaluation parameters were also in the paper..

A Method for Privacy-Preserving Authentication Based on Hybrid Cryptography for Vanet
Authors:- M.Tech. Scholar Kumar Manish, Asst.Prof. Dr. Neetesh Raghuwanshi , Asst. Prof. Dr. Bharti Chourasia

Abstract- The Internet of Things (IoT) is a novel system interfacing things, for example, clients, vehicles, and home gadgets, through electronic labels, sensors, actuators, and intuitive programming. IoT guarantees the association and correspondence between the articles by advanced methods. Situations, for example, clever vehicle framework and keen home framework can be progressively advantageous, exhaustive, and wise with the help of IoT innovation.Secure communication between vehicle and Infrastructure/Road side unit (V to I/R) over VANET and identifying accurate attacker vehicle is a major challenge over VANET in modern age. In this thesis, implementing hybrid encryption techniques i.e. AES and RSA algorithm and comparison their performance with previous method based on the analysis of its stimulation time at the time of encryption and decryption process, throughput and also its buffer size experimentally.

Smart Pollution Monitoring System
Authors:-Ayush Kumar Tiwari, Aman Goyal, Akshita Sharma, Pragya Tewari

Abstract- Over the top development in the modern and foundation structure that establishes ecological issues, for example, environmental change, shortcoming and land contamination. Contamination has turned into a significant issue so there is a need to assemble a prosperous framework that conquers the issues and screens the effects of contamination. The arrangement fuses Internet of Things (IoT) innovation which is a connect for PC and gadgets science. It can give ways of checking the nature of ecological boundaries like air, clamor, temperature, stickiness and light. To screen the degrees of contamination of the modern climate or a specific space of interest, a remote inserted PC framework is suggested. The framework utilizes a model execution that incorporates portable hearing assistants, Arduino has a board, ESP8266 as a wi-fi module. These portable hearing assistants are incorporated with a remote implanted PC program to screen the decrease in boundary levels from their typical levels. The point is to make a strong framework for observing ecological limits.

A Review of Glaucoma Detection using Machine Learning
Authors:- PG Scholar Madhup Pandey, Asst. Prof. Dilip Singh Solanki

Abstract- Glaucoma is an infection wherein the optic nerve of the eye gets annihilated. Accordingly, it causes vision misfortune or visual deficiency. Nonetheless, with prior analysis and treatment, eyes can be secured against serious vision misfortune. Most vision misfortune cases because of Glaucoma are preventable if the illness treatment is begun in the beginning phases. More often than not fringe vision can be harmed sooner than a person’s focal vision by Glaucoma since it doesn’t give any indications and side effects. The current systems to recognize Glaucoma are tedious and questionable at the center. We propose a minimal expense Glaucoma discovery framework which is a PC-based innovation and in this way, it utilizes calculations to promptly identify and order solid and Glaucoma eyes. It does this by investigating the region of interest (ROI) of pictures through the execution of different picture extraction highlights like GLCM grid; Wavelet-based Texture highlights like Multiscale Linear Binary example. For the Classification of solid and Glaucoma eyes, we propose a Supervised Machine Learning approach.

Intrusion Detection System using Machine Learning Approach
Authors:- Jyoti Ahirwar , Dr. Mukesh Yadav

Abstract-Random destructive acts for a single computer or for the complete network may be noticed on the internet from time to time. As computer connection continues to expand at an unprecedented rate, it is becoming more difficult to keep up. Security concerns may be noticed on the internet, just as they can be seen in person. The intrusion detection system (IDS) is intended to recognise and examine such hostile behaviours happening throughout a network. The intrusion detection system (IDS) assists in the detection of attacks on the system and the identification of intruders. Various machine learning (ML) approaches have been introduced to intrusion detection systems in the past, with the objective of improving the results for intruder detection and raising the accuracy of the IDS. In this work, we offer a strategy for creating an efficient IDS that takes use of the principle component analysis (PCA) and the CNN classification algorithm. PCA may be used to organise data by lowering its dimensionality, whilst random forest may be used to categorise data. The tests will be carried out using the suggested system over the KDD Knowledge Discovery Dataset Knowledge Discovery Dataset. When compared to other approaches such as SVM, Naive Bayes, and Decision Tree, it is clear that the recommended methodology will perform more efficiently in terms of accuracy. We received the following results utilising our proposed method: performance time (min) is 3.24 minutes, accuracy rate percentage is 96.78 percent, and mistake rate (percentage) is 0.21 percent.

Investigation Of Solar Water Heater Designed Model Using CFD Fluent
Authors:- Konark Tripathi, Asst.Prof. Deepak Solanki

Abstract- Non-renewable energy sources are useful in a crisis situation, when there are problems with energy consumption and the environment. At first, the usage of solar energy was restricted, as was the choice to use it. And this is meant to be a breakthrough in the way that technology interacts with nature, as well as a fresh way to use renewable energy and to make it the main energy source in the future. This project’s goal is to use computational fluid dynamics (CFD) models of various tubes to compare heating methods for solar water heaters. There are three kinds of design for tube form water heaters such straight, ‘S’ pattern, and ‘U’ pattern; the first one has water flow in a straight line, the second has the water moving in a ‘S’ shape, and the third has water moving in a ‘U’ shape. When testing the design, we gathered information on how well it would work. the findings were compared to the CFD results.

A Review On Performance Of Power Quality Improvement Of Hybrid Energy In Grid Connected System
Authors:- Research Scholar Sweta Kumari, Prof.Dr. Manju Gupta, Asst. Prof. MamtaSood, Prof. Dr.Anuprita Mishra

Abstract- This paper presents a review on grid Integration and power quality issues associated with the integration of renewable energy systems in to grid and Role of power electronic devices and Flexible AC Transmission Systems related to these Issues. In this paper, recent trends in power electronics for the integration of wind and photovoltaic (PV) power generators are presented. Discussions about common and future trends in renewable energy systems based on reliability and maturity of each technology are presented. Classification of various Power Quality Issues used by different researchers has been done and put for reference. Application of various techniques as applied to mitigate the different Power Quality problems is also presented for consideration. Power Electronics interface not only plays a very important role in efficient integration of Wind and Solar energy system but also to its effects on the power-system operation especially where the renewable energy source constitutes a significant part of the total system capacity. However there are various issues related to grid integration of RES keeping in the view of aforesaid trends it becomes necessary to investigate the possible solutions for these issues and Power Quality is the main problem in Renewable energy sources. Nowadays there were Scarcity of non-renewable resources and the requirement of consumers was fulfilled by the renewable energy resources. The usage of renewable energy sources are less compared to other energy sources and the renewable energy also causes PQ issues in grid. Some of the issues may be sag, swell, flicker, harmonic, interruptions and voltage imbalance .This review shows what else the issues are caused due to the solar and wind energy while connected to grid and how it can be improved.

Breast Cancer prediction using Machine Learning
Authors:- Naireen Arshad

Abstract- The technology is evolving day by day and it has majorly affected the healthcare sector. A lot of advancements have been made in the healthcare sector which are beneficial for the human beings. All these discoveries and inventions made so far are being done to provide better services to humans and make their life comfortable. Due to the heavy burden that doctors have to face, the IT field has stepped forward to ease up the task of these doctors. People get affected with various different types of diseases and one such disease is Cancer. It is a deadly disease and if not treated at the right time,it might result in the loss of a life. Various tests are carried out to detect its presence but the reports might take time and can lead to the death of the patient.In this paper, we have triedto use Machine learning to detect the cancer found in the breasts of a human being so that the appropriate measures and medications can be started as soon as possible.

Rover Sieth
Authors:- Durgesh Nikam, Priti Yadav, Archana Ramesh, Prof. Sushma Patwardha

Abstract- The main objective behind this paper is to develop a robot to perform the act of surveillance in domestic areas. Nowadays robot plays a vital role in our day to day life activities thus reducing human labor and human error. Robots can be manually controlled or can be automatic based on the requirement. The purpose of this robot is to roam around and provide audio and video information from the given environment and to send that obtained information to the user. In this project, one can control the robot with the help of mobile or laptop through Internet of Things and also can get the live streaming of video both in daytime as well as at night with the help of wireless camera from the robot. The robot can be controlled both in manual as well as in automated mode with the help of Arduino microcontroller. This robot also uses various sensors that collects data and sends it to the Arduino microcontroller which controls the robot .Thus the action of surveillance can be performed. Further advancement in our project can provide surveillance even in defense areas.

Detection & Solution for Out of Step Problem Based on Optimal Location of PMU
Authors:-Mohamed Reda Elshahat, Dr. Adel Ali Emery
,Prof. Dr. Saady Abd El Hameed El Sayed

Abstract- Power swing is disturbance done at small part of real grid and case a totally/partial black out of the electrical systems. This paper introduces a real case study for a big power swing event that detected by conventional method of out of step. The relay disconnects the most linewhich has suffered from oscillation but oscillation was moved to rest of power system and did complete black out. A new proposed technique was introduced in this paper to solve the problem of transfer the oscillation to the rest of power network. This technique is based on a developed program usingpower system simulator for engineering (PSSE), power measurement units (PMUs), and artificial intelligence (AI). The technique succeeds to solve the problem without transfer to the rest of the system. The paper also introduced the optimal number and locations of PMUs. in addition, PMUs’s are applied to AI system to determine which buses or lines responsible on generate the first oscillation condition.

Air Canvas :Draw in Air Using AI
Authors:- Prof.Hemlata, A Shinde, Shravani M. Jagtap, Anushka A.Kalpund, Pranita B. More, Ayushi A. Parkale

Abstract- Drawing in Air has been one of the most fascinating and interesting research areas in the field of visual pattern recognition. Here, visual pattern recognition means to recognize movement of finger tips. It improves the interaction between man and computer in various application. This idea will help in achieving the naturalness desired for Human Computer Interaction(HCI). Proposed method have two main tasks: first it tracks the fingers tip and second it plots the co-ordinates of finger-tipon the screen in any desired colour. It does not require any keypad, pen or glove rather than a camera. This idea of Air Canvas is beyond the traditional empty(white), rectangular and flat-dimensional canvas seen in traditional artworks. We are applying the techniques of computer vision in OpenCV to build this project. To achieve the goal of this project, the finger-tip tracking and detection process are used.Air canvas refers to virtually drawing through hand gesture on the air without touching anything which is recommended during COVID-19. This project will be a powerful means of communication for the deaf,specially abled, senior citizens and children’s for educational purposes.

Research Paper: The Study on Impact of Artificial Intelligence on Innovation
Authors:- Alka Sharma

Abstract- This research paper draws a conclusion on the impact of artificial intelligence on innovation. For this purpose, a secondary research work has been done within which the ideas presented by different researchers through their relevant research works has been referred by the researcher to draw a conclusion in the support of research topic. The conclusion presented suggests that there is a significant impact of artificial intelligence on innovation that enables the modern business organizations to present themselves in a different light than their competitors in terms of uniqueness.

A Review Article Modelling of CMOS based Highly Sensitive Mems Designing and Reducing Noise Signal and Also Enhancement Its Performance
Authors:- Bipin Singh, Asst. Prof. Hemant Amhia

Abstract- This review article through light on a highly promising & demanding technology, which is set to revolutionize nearly every product category in present era, while discussing the Concept, Design & Development, Fabrication techniques and applications of micro electro-mechanical systems (MEMS) based Devices or systems. Microelectromechanical system discloses outstanding flexibility and adaptability in miniaturization devices followed by their compact dimension, low power consumption, and fine performance. The MEMS devices have numerous and very high potentials of creating a new field of applications for mobile equipment’s with increased flexibility & more reliability. This work deals with research carried out for the development of MEMS based sensors & Actuators and appropriate uses of MEMS. This work carries information’s regarding subsequent commercial and real life applications of MEMS and discusses various recent technological innovations carried out with their advantages & disadvantages. This work also describes the historical development of micro-electromechanical system (MEMS) sensor technology.

A Review ArticlePower Scheduling and Utility of Grid Demand Side Management Using Fact Power Controller
Authors:- Preeti Kourav, Dr. Anil Kumar Kori

Abstract- Grids are considered as the basic and fundamental technology through which environmental pollution and the user’s energy cost is reduced. The management of smart grids is done by various demands Side management (DSM) techniques to ensure that there is an efficient flow of power. But it is a complex task in real time as energy demands of consumers rise continuously in an unpredicted manner. A literature survey is conducted to get an overview about the role of heuristic techniques in demand side management. The review states that such algorithms are able to schedule the power cuts in an effective way which in turn minimizes the load on the power grids. But as there are number of heuristic algorithms available it will be a challenge to select the efficient approach using Bus system. Moreover, the important factors such as load, cost etc. are also drawn out from the survey to help the future research to give an efficient DSM system.

Mental Workload Detection from WESAD dataset Using Machine and Deep Learning Model : A Review
Authors:- Yashvant Dev, Mayank Namdev, Dr. Ritu Shrivastava, Dr. Rajiv Srivastava

Abstract- Mental stress is one of the major contributors to a variety of health issues. Various measures have been created by scientists and medics to determine the intensity of mental stress in its early phases. To assess mental stress in the workplace, several neuroimaging methods have been developed. One key candidate is the electroencephalogram (EEG) signal, which offers a wealth of information regarding mental states and conditions. We analyse trustworthy heart rate variability (HRV) metrics in order to detect stress in this study.We refer WESAD dataset, an experiment protocol was established including two different sensors which correspond to a range of everyday life conditions.We present our work on the development of a stress detection system based on heart rate by calculating and comparing HRV features from time and frequency domain analysis and classifying these features with the machine learning and deep learning algorithms.

A Review on Thermal Analysis of Shell and Tube Heat Exchanger with Different Design of Baffle Plate
Authors:- M.Tech. Scholar Sonu Kumar, Prof. Neetesh Gupta

Abstract- A heat exchanger may be defined as a device that transmits thermal energy between two or more fluids of varying temperatures. Several industrial processes would indeed be impossible to complete without this equipment.Refrigeration, air conditioning, and chemical plants all use heat exchangers. It’s utilised for a variety of things, including transferring heat from a hot to a cold fluid. They’re commonly employed in a variety of industrial settings.Researchers had worked on a variety of projects in attempt to increase performance. The velocity and temperature contour fields upon that shell side, on the other hand, are much more complicated, and their performance is influenced by baffle elements such as their arrangement the spacing scheme.

Numerical Analysis of Flow and Heat Transfer Enhancement in a Pipe with Twisted Tape
Authors:- M. Tech Scholar Kanhaiya Kumar, Prof. Neetesh Gupta

Abstract- This work aims to present a numerical model for heat transfer intensification in a heat exchanger tube equipped with novel V-cut twisted tape. The effects of different cut ratios (0.6<b/c<1.25) on the turbulent flow characteristics and thermal performance of the system will be investigated over the Reynolds number range from 4000 to 12000. All the simulation will be performed for fully developed turbulent flux in the Reynolds number range with uniform heat flux of 5000 W/m2. The numerical results of heat transfer (Nusselt number, Nu), pressure drop (friction factor, f) and enhancement Performance Factor in a tube with twisted tapes (V-Cut) were reported in the study.

A Review Article of ANN Based Combined Transformer Error Identification in Primary Load Imbalance Conditioning
Authors:- Neelam Katare, Dr. Anil Kumar Kori

Abstract- The review of Combine transformer is an electrical equipment that needs continuous monitoring and fast protection since it is very expensive and essential element for power system to perform effectively. Various methods for the protection are available. Most of the methods should be known for the protection of the transformer before practically protecting the same. Here a review is presented for various methods available for the protection of transformer. The most common protection technique used is the percentage differential logic, which provides discrimination between different operating conditions and internal fault. Some condition as, inrush current and CT saturation can cause mis-operation of differential protection.

A Review Article Classification and Recognition of Soybean Leaf Disease Detection Using Convolutional Neural Network (CNN)
Authors:- Bhanu Pratap Singh, Dr. Shailja Shukla

Abstract- Agriculture is the backbone of every economy on the planet. Crop output is one of the most important aspects influencing a country’s domestic market situation. Agricultural output is also a critical component of economic development in any country. It is vital because it offers raw materials, jobs, and food to a variety of citizens. Many factors contribute to the disparity in crop production estimates across the globe. Overuse of chemical fertilizers, the presence of chemicals in water supplies, irregular rainfall distribution, varying soil fertility, and other factors are among them. Aside from these concerns, one of the most common challenges around the world is the destruction of a large portion of production due to diseases.

An Efficient Approach for Reversible Realization of 8- Bit Adder-Subtractor Circuit
Authors:- Research Scholar Sabiha Fatima, Associate Prof. Dr. Bharti Chourasia

Abstract- Full Adder is the heart of any central processing unit that is a core component employed in all the processors. The approach to minimize power loss from digital devices made researchers to focus on reversible logic. This paper presents design approaches for reversible realization of 8-bit adder-subtractor circuit with optimized quantum cost. This design is compared with existing designs on some selected performance parameters such as total number of reversible gates, garbage outputs and quantum cost. The proposed design for 8-bit adder-subtractor circuit using reversible approach simulated using Modelsim tool and synthesised for Xilinx ISE 14.7.

Mnist Handwritten Digit’s Recognition
Authors:- Ms.Pragya Tewari, Yogesh Devtulla, Sumit Baroniya, Rishika Raj

Abstract- As we know that our country has a huge population and thus, we have different varieties in handwriting. Therefore handwritten digits recognition is one of the difficult tasks for intelligent systems like computer. Thus, we implementing handwritten digits recognition which recognise the handwritten digits with the help of Artificial & Machine learning Algorithm and database likes MNIST (modified national institute of standard technology). The main Aim of “Handwritten digits recognition” is to recognise the human handwritten digits from different sources like Image, Paper, Touchscreen and such like, and classify them into 10 pre-defined classes like (9 – 0). The objective of this paper is to notice the variety of correctness’s of CNN for fetching digits written by hand utilizing different hidden layers approach to be exactness, and the main use of this is to help in recognising digits in doughnut-like software where we use input from scanning picture like sources.

Automated Mental Illness Analysis Using Voice Samples
Authors:- Sowhardh Honnappa Gowda

Abstract- One in 24 suffers from critical mental illness like Schizophrenia, Psychosis, Clinical Depression, Anxiety Disorder,Obsessive Compulsion Disorder (OCD), Autism, Bipolar Disorder, Attention Deficit Hyperactivity Disorder (ADHD) etc. found that the average Vector Similarity between adjacent sentences in free speech, along with other variables like Number of words/phrases, pauses, tone, intensity, frequency and other Low- Level Descriptors form the raw audio recording could be used to identify clinically high-risk patients with great accuracy. Audio visual hallucination and thought insertion appear to be the top side effects in case of patients suffering from Schizophrenia [3]. Acoustic studies between healthy and depressed individuals [4] shows us that the top audio features which help identify depression in mental illnesses are Loudness, MFCC5 and MFCC7. One of the studies dealing with “Automated Depression detection using Audio features” [5], suggests that the lacking objective Clinical depression assessment methods is the key reason that several patients can’t be treated appropriately on time. This study aims to find an optimal approach to calculate depression scores amongst people suffering from mental illnesses using Artificial Intelligence techniques.

Design and Analysis of L Band Microstrip Patch Antenna for Global Navigation Satellite System
Authors:- M. Tech. Scholar Shashi Mishra, Associate Prof. Dr Bharti Chourasia

Abstract- In this paper the design consideration for the rectangular micro-strip antenna has been presented. In modern wireless communication systems, the micro-strip patch antennas are commonly used in the wireless devices. Therefore, the miniaturization of the antenna has become an important issue in reducing the volume of entire communication system. The various parameters of rectangular micro-strip antenna, input impedance, VSWR, return loss, radiation pattern have been investigated as a function of frequency for proper matching and radiations. It uses L band, X band, C band, Ku band, Ka band for global navigation satellite system (GNSS) communication application. L band frequency range is 1- 2GHz so it can be used in lower frequency range communication. It is proved that this proposed method has better than traditional methods.

Design and Implementation of Solar Powered BLDC Motor Driven Electric Vehicle
Authors:- Jaysingh Prajapati, Devendra Dohare

Abstract- The solar energy is used to feed the Brushless DC motor which is operated using four switch models instead of conventional six switches using PID fuzzy logic controller to have better speed accuracy Any equipment without power is an idle bunch of components. It is very prominent with those dependable upon the non-renewable sources. It’s a pro-active approach to shift our source of energy to renewable source. This paper details the study of designing a Solar Powered BLDC Motor Driven Electric Vehicle which is one of the solutions for the oncoming crisis.The approach of selecting the appropriate components for this application is studied and each of them are simulated and subjected to various tests in real time environment. The integrated system consisting of the solar module, charge controllers, batteries, boost converter and BLDC motor, henceforth developed into the Solar Powered Electric Vehicle. The charge controllers direct this power acquired from the solar panel to the batteries. According to the state of the battery, the charging is done, so as to avoid overcharging and deep discharge. Primarily trying to increase the range of the electric vehicle.

Bio-Geography Based Page Prediction Using Web Mining Feature
Authors:- Trivene Khede, Dr. Avinash Sharma

Abstract-Website is god place to reach the audience of any field. Many of companies are using these platform for different business. Retaining a web visitor on website depends on available content and intelligence of site. This paper has developed a intelligent model that can predict the web page by understanding the behavior of the user. Biogeography optimization genetic algorithm was used to predict the web page as per past user visits. This work uses web content and web log feature of the website for evaluating the fitness value of genetic algorithm chromosomes. Experiment was done on real dataset with different size. Result shows that proposed model has improved values of different evaluation parameters.

Analysis of students’ critical thinking skills using Data Mining approaches (Survey based research)
Authors:-Dr. M. Pushpalatha (Prof. And HOD), Raya Bandyopadhyay

Abstract- Our aim in this project, will be to identify Key Performance Indexes that can define a student’s level of comprehension after studying certain classes and how we can apply those Key Performance Indexes in classification or even use them to calculate the success rate of skills, in universities or even place specific students in areas where they can succeed. We can also analyse which data mining algorithm gives us the highest accuracy based on our data and, address some of the open problems we may encounter as we go along, based on existing research literature. Understanding the learner’s in-depth thinking process after a lesson or series of lessons, will give us more information about where the student is lacking or whether the skills are lacking, in the event that most students seem to lack a certain pattern. This shall enable more fluid methods for students and academics to be classified into a system, we can categorize them based on class performances or regular assignments, and find a system which shall give us an understanding about the grasp of a particular student in a certain subject and eventually, the group of students performing well in certain subjects can be placed in opportunities which shall enhance their skill sets and help them pick a customized career for them. The use of multi-phase analysis and cluster analysis is intended to be based on data on which Key Performance Indexes will be determined at the end. Based on these determining Key Performance Indexes, we can access important information and, if possible, present it on a working dashboard.

A Review on Plant Disease Detection Techniques
Authors:- Samvedya Jedhe deshmukh, Sahil Kachole , Nishant Parakh , Umesh Chaudhari

Abstract- Agricultural production is one of the most important sources of revenue for the economy. Agriculture is regarded as one of the most important pillars of the Indian economy. Agriculture contributes significantly to the country’s GDP and gives employment to a huge number of individuals in the farming industry. Plant disease disrupts normal plant growth and is one of the leading causes of lower production, which leads to economic losses. Early detection of disease aids in the development of treatments that can slow the spread of disease in plants. One of the reasons why plant leaf disease detection is so crucial in agriculture is because of this. Leaf inspection is regarded as one of the most effective methods for diagnosing plant diseases. Computer vision and machine learning techniques are extremely beneficial for identifying and comprehending data from digital photographs. The main focus of the research is on different algorithms for detecting plant illness. This research will assist researchers and students in selecting the optimum algorithm based on previous research.

Survey on Medical Image Diagnosis Techniques and Features
Authors:- Samvedya Jedhe deshmukh, Sahil Kachole , Nishant Parakh , Umesh Chaudhari

Abstract- The ability to acquire images from inside a patient has revolutionized the way doctors diagnose and treat diseases, with almost all clinical pipelines now involving imaging to some degree. The development of these imaging methods has led to the field of medical image computing, where a multitude of tools and techniques have been proposed to aid clinicians and researchers in interpreting and analyzing these images. Most of researcher has proposed various techniques on single disease type either tumor, covid, malaria, heart attack, etc. This paper has summarized some of image features used for the medical report diagnosis. Techniques proposed by various scholars are also detailed in the paper. Various types of medical imaging techniques were also brief. Evaluation parameters used for comparison of methods were also mention in the paper.

Integrating Risk Management: Technology’s Role in Bridging FinTech and Traditional Banks
Authors:- Chintamani Bagwe

Abstract- This article overviews risk management strategies details in the financial industry landscape, comparing the practices of risk management between FinTech companies and traditional banking taking into account the regulatory landscape that embraces technological changes. Risk management has always been central to the financial sector, ensuring the stability and safety of all stakeholders involved. FinTech companies, enabling most traditional banking services through technology, introduce unique offerings that come with new risk types such as cybersecurity and regulatory risk that require widely different mitigation measures. Some of the risk’s responses include automation, flexible ecosystem formation, and creating customer-focused entities. Traditional banks, in contrast, have developed time-proven risk management schemas that focus on enterprise risk management to regulatory compliance to risk aversion. However, they face their own complexity with the immense burden of maintaining compliance and integrating existing technology with emerging tech. The collaboration with Fintech is a way out through the cross-role processes. Furthermore, the regulatory space will also see change regulations on FinTech firms and traditional banks that will have to adapt to continue operations. In the future, existing and new technologies will be integrated into the space, resulting in better risk management schemas. Successful partnerships between a bank and a traditional bank are shared at the end. The collaboration between FinTech companies and traditional banks will be essential to survive the current revolution.

DOI: 10.61137/ijsret.vol.10.issue5.793

Data Warehouse Modernization for Insurance: Integrating AI and Cloud Technologies
Authors:- Srinivasa Chakravarthy Seethala

Abstract- The insurance sector faces mounting challenges from regulatory changes, competitive pressures, and the demand for real-time data insights. Traditional data warehouses, essential for data storage and retrieval, often lack the flexibility, speed, and scalability required by modern insurance operations. This article examines how integrating Artificial Intelligence (AI) and cloud technologies can drive data warehouse modernization for insurers, delivering real-time decision-making capabilities, optimized data management, and enhanced operational efficiency. We explore methodologies, technologies, and case studies that demonstrate the transformative impact of AI and cloud in modernizing legacy data warehouses in the insurance sector.

DOI: 10.61137/ijsret.vol.10.issue5.794

Future of Supply Chains: Trends in Automation, Globalization, and Sustainability
Authors:- Lakshmi Kalyani Chinthala

Abstract- The future of supply chains is being reshaped by a combination of technological advancements, globalization, and an increasing focus on sustainability. This paper examines the current trends that are influencing supply chain management and how businesses are adapting to these changes to remain competitive. Automation is playing a pivotal role in enhancing the efficiency and flexibility of supply chains, reducing costs, and improving accuracy. The integration of technologies such as artificial intelligence (AI), robotics, and the Internet of Things (IoT) is transforming traditional supply chain models, enabling real-time tracking, predictive analytics, and autonomous operations. At the same time, globalization has led to more complex supply chains, with companies sourcing materials and products from across the globe. While this has resulted in cost efficiencies, it has also introduced new challenges related to supply chain visibility, risk management, and geopolitical factors. Sustainability is another key trend, as businesses are under increasing pressure to reduce their environmental impact, adopt responsible sourcing practices, and promote ethical labor standards. The paper explores how companies are navigating these trends and highlights the importance of integrating automation, globalization, and sustainability into supply chain strategies to build resilience and achieve long-term success.

DOI: 10.61137/ijsret.vol.10.issue5.795

Disaster Recovery Planning For Hybrid Solaris And Linux Infrastructures

Authors: Sambasiva Rao Madamanchi

Abstract: Disaster recovery (DR) planning for hybrid infrastructures that combine Solaris and Linux poses unique challenges due to differences in tooling, system architecture, and operational practices. Solaris often supports legacy, mission-critical applications, while Linux drives modern, scalable workloads. This document provides a comprehensive guide to building a resilient DR strategy across both platforms. Key areas include risk assessment, backup and recovery tooling, system state preservation, and application/database restoration. Emphasis is placed on automation through Ansible, shell, and Python scripts, as well as configuration management and monitoring integration. The guide also highlights best practices such as maintaining consistent time and user IDs, isolating recovery zones, and leveraging enterprise backup solutions. Through clear documentation, defined team roles, and routine testing, organizations can achieve a DR framework that is platform-aware, repeatable, and aligned with evolving operational and compliance requirements.

DOI: https://doi.org/10.5281/zenodo.15771601

 

Predictive Maintenance Modeling in Solaris and Red Hat Platforms

Authors: Albert Joshep

Abstract: Predictive maintenance is an emerging discipline that combines system telemetry, machine learning, and automation to preemptively identify and resolve failures in complex computing environments. This review explores the implementation of predictive maintenance in Solaris and Red Hat Enterprise Linux (RHEL) platforms two prominent Unix-based systems widely deployed across enterprise IT landscapes. By comparing architectural features, telemetry sources, and modeling techniques, the study highlights both the unique capabilities and challenges presented by each operating system. Solaris benefits from a robust fault management architecture (FMA), advanced diagnostics like DTrace, and SPARC hardware optimization, making it well-suited for hardware-level monitoring. Red Hat, on the other hand, excels in automation, scalability, and hybrid cloud compatibility through tools such as Red Hat Insights, Ansible, and Performance Co-Pilot. The article delves into key predictive modeling strategies including time-series forecasting, anomaly detection, and classification, utilizing methods ranging from ARIMA and Isolation Forests to neural networks. Integration and automation workflows are examined, showcasing how Unix-native tools and open-source frameworks are used to train, deploy, and act upon model predictions. Through case studies, the review quantifies the benefits of predictive maintenance, including reduced mean time to recovery (MTTR), enhanced SLA adherence, and cost savings. Finally, it discusses limitations such as data inconsistency, model drift, and cross-platform transferability, while outlining future directions including AI co-pilots, self-learning systems, and Predictive Maintenance-as-a-Service (PMaaS). By offering a detailed comparative analysis and strategic recommendations, this review serves as a practical guide for enterprises aiming to implement or enhance predictive maintenance in mixed Unix environments.

DOI: https://doi.org/10.5281/zenodo.15798515

The Use Of Scalable Disaster Recovery Architectures For Hybrid UNIX Systems

Authors: Hamid Ansari

Abstract: In today’s digital landscape, enterprise IT environments demand resilient and scalable disaster recovery (DR) solutions, especially in hybrid UNIX systems where Solaris, AIX, HP-UX, and Linux coexist. These systems often run critical workloads in sectors like finance, healthcare, telecommunications, and government, necessitating DR architectures that ensure high availability, data integrity, and business continuity across heterogeneous platforms. This review provides a comprehensive analysis of scalable DR architectures tailored for hybrid UNIX environments, addressing the complex interplay between storage replication, backup strategies, orchestration tools, and operating system-level recovery mechanisms. Key architectural patterns such as active-active and multi-site replication models are examined alongside file system-level and block-level replication technologies including ZFS send/receive, Veritas Volume Replicator, and SAN mirroring solutions. The paper compares OS-specific recovery tools like Ignite-UX, mksysb, and Solaris Unified Archives, and assesses their interoperability in multi-vendor environments. Further, the study explores the orchestration layer of disaster recovery, highlighting the role of configuration management and automation tools like Ansible, Puppet, and scripting frameworks. Monitoring, testing, and policy-driven recovery are addressed as essential pillars of a sustainable DR strategy. Real-world case studies are analyzed to illustrate practical implementations, performance outcomes, and lessons learned in deploying scalable DR across diverse UNIX infrastructures. Challenges such as format incompatibility, network reconfiguration, and security hardening are critically discussed. Finally, the review anticipates emerging trends, including the use of AI/ML for proactive fault prediction and the integration of DR into continuous compliance and observability pipelines. This article serves as a reference for system architects, disaster recovery planners, and enterprise IT professionals seeking to build resilient, automated, and cross-platform DR frameworks for UNIX-centric infrastructures.

DOI: http://doi.org/10.5281/zenodo.15798539

The Recent Automating System Patching Via Satellite And Puppet Integration

Authors: Usha Rani

Abstract: – In today’s dynamic enterprise IT landscape, system patching is a critical operation that ensures security, compliance, and performance. Manual patching processes are often fraught with delays, configuration drift, and inconsistencies, leading to potential security breaches and downtime. Automating this process using integrated tools like Red Hat Satellite and Puppet significantly enhances lifecycle management by aligning system states with organizational policies. Red Hat Satellite offers a centralized platform for managing Linux content, lifecycle environments, and host registration, while Puppet provides robust configuration management capabilities for enforcing desired system states. Together, they enable enterprises to deploy, audit, and maintain patches consistently across vast infrastructure landscapes. This review explores the symbiotic relationship between Satellite and Puppet, focusing on how their integration delivers operational efficiency and compliance. It discusses the underlying architecture of each tool, the mechanics of their integration, and the workflow that governs automated patching. The study highlights key functionalities such as content views, CVE mapping, node classification, and patch window orchestration. Additionally, the review presents real-world case studies from financial services, healthcare, and telecom sectors that have adopted this integration for scalable and secure patch management. The article also identifies challenges in implementation, including integration complexity, legacy system compatibility, and potential risks from misclassification or dependency conflicts. Future trends are examined, including the use of AI/ML for predictive patching, ChatOps for collaborative operations, and declarative frameworks for Patch as Code strategies. In conclusion, the integrated use of Satellite and Puppet forms a cornerstone for secure, compliant, and cost-effective system maintenance, empowering IT organizations to proactively manage vulnerabilities while reducing operational overhead.

DOI: https://doi.org/10.5281/zenodo.15798673

 

The Recent Concept Of LDOM And GDOM Automation Strategies In Oracle Solaris

Authors: Dhanush Aradhya

Abstract: In enterprise IT environments, efficient server virtualization and domain management are crucial to optimizing hardware utilization, operational agility, and high availability. Oracle Solaris, a flagship Unix operating system renowned for its scalability and security, introduces virtualization constructs such as Logical Domains (LDOMs) and Guest Domains (GDOMs) through its Oracle VM Server for SPARC architecture. These constructs enable fine-grained partitioning of system resources on SPARC hardware, allowing multiple independent OS instances to coexist on a single physical server. However, as the number of domains increases in enterprise deployments, manual provisioning and management become unsustainable. This has led to a growing need for robust automation strategies that can orchestrate domain lifecycle operations with consistency, speed, and minimal administrative overhead.This review article comprehensively examines the architectural principles, automation tools, and orchestration strategies used to manage LDOMs and GDOMs in Oracle Solaris environments. It begins with a detailed explanation of the virtualization framework in Solaris, followed by an exploration of domain architecture and the challenges posed by manual administration. Native tools such as ldm, SMF (Service Management Facility), FMA (Fault Management Architecture), and ZFS are discussed alongside automation methods using Bash and Python scripting. Further, the article evaluates how Oracle tools like Oracle Enterprise Manager and external platforms like Ansible are used to automate provisioning, monitoring, backup, and fault handling for LDOM and GDOM configurations.Real-world case studies illustrate the implementation of these strategies in telecom and financial sectors, highlighting time savings, improved uptime, and reduced human error. The article also discusses the challenges faced during automation, including compatibility issues, security risks, and integration bottlenecks. Looking ahead, it explores the future of AI-driven domain orchestration, RESTful automation interfaces, and hybrid cloud integration. This review provides a strategic and technical foundation for IT architects, system administrators, and automation engineers aiming to optimize their Solaris virtualization environments through effective LDOM and GDOM automation strategies.

DOI: http://doi.org/10.5281/zenodo.15798687

 

 

Linux & Unix System Administration AI-Augmented Troubleshooting In Multi-OS Unix Environments

Authors: Ganapathi Basu

Abstract: The increasing operational complexity of multi-OS Unix environments comprising legacy and modern systems such as Solaris, AIX, HP-UX, Linux, and BSD poses significant challenges for traditional system troubleshooting methodologies. These environments demand high availability, rapid diagnostics, and platform-agnostic observability, which are difficult to achieve using manual scripting and OS-specific tools alone. This review examines how Artificial Intelligence (AI) augments system administration by enabling intelligent diagnostics, predictive monitoring, and automated remediation across heterogeneous Unix infrastructures.Beginning with an overview of Unix's architectural evolution and the interoperability challenges in multi-OS deployments, the article outlines the limitations of conventional troubleshooting practices, including shell-based diagnostics, tribal knowledge, and siloed toolsets. It then explores the application of AI techniques such as machine learning for anomaly detection, natural language processing for log interpretation, and reinforcement learning for adaptive, self-healing responses. AI enables powerful capabilities in log normalization, root cause analysis (RCA), and event correlation especially critical in reducing alert fatigue and accelerating fault isolation. Advanced use cases such as predictive failure detection, behavior modeling, and AI-enhanced capacity planning illustrate the potential of intelligent monitoring. The review further evaluates unified diagnostic platforms like Splunk and Dynatrace, cross-platform frameworks, and real-world AI deployments in multi-OS settings. Key deployment challenges such as data silos, model generalization, and explainability are addressed alongside recommendations for integration with ITSM and DevSecOps pipelines. Emerging trends including AI co-pilots for system administrators, AIOps automation, and observability-as-a-service reflect a future where AI transforms Unix operations from reactive maintenance to autonomous infrastructure resilience. The paper concludes by emphasizing the importance of augmented intelligence where human expertise is amplified, not replaced offering a practical roadmap for AI-driven modernization in Unix ecosystems

DOI: http://doi.org/

 

 

Cloud Migration Strategies For Hybrid Enterprises: Lessons From AWS And GCP Infrastructure Transitions

Authors: Harish Govinda Gowda

Abstract: Hybrid enterprises are increasingly adopting cloud computing to modernize legacy systems, enhance scalability, and improve operational agility. However, transitioning to platforms like AWS and GCP involves more than simply shifting workloads—it requires strategic planning, robust security practices, and effective operational models that can support both on-premise and cloud-native systems. This article explores a comprehensive framework for successful cloud migration within hybrid environments, drawing from real-world case studies and best practices. Topics covered include cloud readiness assessment, phased workload migration strategies, network integration patterns, identity and access management, security and compliance alignment, and cloud-native operations. We also examine the unique hybrid capabilities offered by AWS and GCP, including Direct Connect, Interconnect, Anthos, and Outposts, and how these can be leveraged for seamless application continuity. Real enterprise case studies highlight key lessons learned, such as the importance of governance through Cloud Centers of Excellence, the role of infrastructure as code, and the value of unified observability.

DOI: https://doi.org/10.5281/zenodo.15916724

 

Multi-Fact Table Modeling in Power BI: Enhancing Analytical Depth in Complex Pharma Dashboards

Authors: Ajay Kumar Kota

Abstract: In the pharmaceutical industry, data complexity and fragmentation pose significant challenges to delivering unified, actionable insights. Traditional single-fact table models in Power BI often fall short when integrating data from multiple domains such as sales, prescriptions, marketing, and clinical operations. This article explores the strategy and implementation of multi-fact table modeling in Power BI, a powerful approach to unify diverse datasets while preserving analytical integrity and granularity. We examine the architecture of multi-fact models, the challenges of schema design and granularity alignment, and the importance of shared dimensions and bridge tables. The article also delves into advanced DAX techniques for managing filter contexts, optimizing performance, and delivering accurate KPIs across disparate data sources. A real-world pharmaceutical case study is included to illustrate practical applications and business impact.

DOI: https://doi.org/10.5281/zenodo.16024582

Integrating AI Workflows with Health Informatics Pipelines: Opportunities and Challenges

Authors: Guram Shalvovich Danelia, Nino Giorgievna Kalandadze, Levan Besarionovich Mchedlidze, Salome Iraklievna Tsereteli

Abstract: The convergence of artificial intelligence (AI) and health informatics has the potential to revolutionize clinical decision-making, disease surveillance, and personalized medicine. This study explores the integration of AI workflows with existing health informatics pipelines, examining both the transformative opportunities and the critical challenges associated with such integration. By analyzing case studies from electronic health record (EHR) systems, bioinformatics pipelines, and radiological imaging networks, we identify architectural patterns that enable seamless AI integration. Additionally, the research addresses the barriers posed by data heterogeneity, workflow fragmentation, regulatory compliance, and algorithm interpretability. The findings suggest that while AI offers immense benefits in improving healthcare outcomes and operational efficiency, a strategic, interoperable, and ethically grounded approach is necessary for scalable implementation in health informatics infrastructures.

DOI: https://doi.org/10.5281/zenodo.16315871

Edge-AI and Myobioscan Devices: Towards Real-Time Clinical Insights

Authors: Oleh Mykhailovych Hrytsenko, Iryna Volodymyrivna Lysenko, Denys Ivanovych Sydorenko, Viktoriia Andriivna Kravets

Abstract: The integration of Edge-AI with wearable biomedical devices like Myobioscan is reshaping the landscape of real-time clinical diagnostics and patient monitoring. This paper explores how embedding artificial intelligence at the device edge enables low-latency, high-frequency processing of biosignals such as electromyography (EMG), electrocardiography (ECG), and motion patterns. The combination of Myobioscan’s compact sensor technology with on-device AI accelerators facilitates proactive health assessments, early anomaly detection, and decentralized clinical interventions. By reviewing recent deployments and experimental models, this study identifies key performance metrics, data handling architectures, and regulatory considerations in deploying Edge-AI for mobile health. The findings point toward a scalable and responsive healthcare ecosystem driven by distributed intelligence at the physiological interface.

DOI: https://doi.org/10.5281/zenodo.16352134

Machine Learning Models on LDOM-Enhanced Biomedical Server Environments

Authors: Zamira Sadullaevna Rajabova, Otabek Abduvohidovich Madrahimov, Dilshod Jamolovich Saidov, Malika Rasulovna Kadirova

Abstract: The evolution of biomedical data analytics has been closely tied to the scalability and reliability of server infrastructure. Logical Domains (LDOMs), a virtualization technology native to Oracle Solaris, offer hardware-level isolation and performance efficiency that align well with the computational demands of machine learning (ML) in biomedical applications. This research investigates the deployment, optimization, and execution of various ML models within LDOM-enhanced server environments specifically tailored for high-throughput biomedical workloads. It evaluates the architectural benefits, virtualization overhead, and performance stability when applying ML algorithms for genomics, diagnostics, and health informatics. The findings suggest that LDOM-based infrastructures not only support secure multitenancy for ML pipelines but also enable tunable resource allocation strategies for precision performance in real-time medical contexts.

DOI: https://doi.org/10.5281/zenodo.16352646

Unified Architecture for Genomic Data Analytics in Hybrid Cloud Systems

Authors: Artur Eduardovich Karapetyan, Lusine Rafikovna Minasyan, Hovhannes Grigorievich Manukyan, Ani Serobovna Avetisyan, Vardan Levonovich Sahakyan

Abstract: The exponential growth of genomic data presents immense challenges in terms of storage, processing, and analytics. Hybrid cloud systems—combining on-premises resources with scalable cloud services—offer a compelling solution for addressing these computational demands. This paper presents a unified architectural model designed to optimize genomic data analytics in hybrid cloud environments. By integrating containerized bioinformatics workflows, secure data orchestration mechanisms, and AI-driven scheduling, the proposed framework ensures agility, scalability, and compliance. We explore the role of cloud bursting for peak genomic analysis workloads, address data residency and regulatory concerns, and demonstrate performance improvements across typical use cases such as variant calling and gene expression analysis. This architecture supports real-time analytics, secure collaboration, and cross-institutional data sharing in the genomics domain.

DOI: https://doi.org/10.5281/zenodo.16354292

Nanoparticle-Induced Stress In Environmental Microbiomes: Ecotoxicological Perspectives

Authors: Basant Kumar Sahu, Lata Pradhan

Abstract: The increasing use of engineered nanoparticles (NPs) across consumer products, medicine, and industrial applications has led to their unintended release into natural ecosystems, sparking ecotoxicological concerns. Due to their small size, high surface area, and reactivity, nanoparticles interact uniquely with microorganisms in soil, water, and sediment ecosystems. These environmental microbiomes—complex networks of bacteria, archaea, fungi, and protozoa—play essential roles in nutrient cycling, decomposition, and pollutant degradation. However, exposure to nanoparticles often results in oxidative stress, disruption of cellular membranes, genotoxicity, and changes in metabolic functions. Such stress responses can reduce microbial diversity, impair ecosystem processes, and destabilize trophic networks. Despite these critical risks, traditional environmental risk assessments fail to incorporate microbial endpoints, focusing instead on higher organisms. This review explores the pathways through which nanoparticles induce stress in microbiomes, the ecological consequences of such interactions, and the current limitations in detection and regulation. Emphasis is placed on using omics tools and community-level bioindicators to assess sub-lethal effects. Addressing nanoparticle impacts at the microbial level is vital for maintaining ecological balance and sustainability. The paper concludes by recommending policy frameworks and green nanotechnologies that prioritize microbiome integrity in environmental safety assessments.

DOI: https://doi.org/10.5281/zenodo.16835383

 

Nanoscale Microbial Interactions In Soil-Water Systems: A New Paradigm

Authors: Arun Kumar Patidar, Bhavana Chauhan

Abstract: Microbial life in soil-water systems operates at a scale far more intricate than previously understood. With the emergence of nanoscale imaging and molecular tools, researchers have begun to uncover a new paradigm in microbial ecology—one where microbial interactions, community behavior, and environmental feedbacks occur at the nanometer level. These interactions encompass molecular exchanges, quorum sensing, and nanostructure-based adhesion mechanisms that shape the functionality and resilience of soil ecosystems. At these scales, microbial dynamics dictate nutrient flux, pollutant transformation, and plant-microbe symbiosis in ways not observable through conventional microbiological techniques. This article provides a comprehensive exploration of these nanoscale phenomena, examining how environmental pressures and nanoscale physical forces drive microbial behavior. The implications for sustainable land use, biogeochemical cycling, and soil rehabilitation are profound, as understanding microbial processes at this resolution can lead to breakthroughs in bioremediation, precision agriculture, and climate-resilient farming. The review also presents advances in methodologies such as atomic force microscopy, nanoSIMS, and cryo-electron tomography that have facilitated the visualization and quantification of microbial interactions at the nanoscale. Overall, this paradigm shift emphasizes the importance of considering nanoscale microbial interactions as fundamental units in soil-water system functioning.

DOI: https://doi.org/10.5281/zenodo.16835268

 

Comparative Genomics Of Microbial Populations In Agroecosystems

Authors: Harish Kumar Rathore, Monika Gupta

Abstract: The microbial communities inhabiting agroecosystems play critical roles in soil health, nutrient cycling, and crop productivity. With advancements in high-throughput sequencing technologies, comparative genomics has emerged as a powerful tool to analyze the diversity and functional capabilities of these microbial populations. This study explores how comparative genomics can illuminate the evolutionary relationships, functional gene repertoire, and adaptive traits among microbial taxa in various agricultural environments. By analyzing metagenomic datasets from different soil types and farming practices, we identify patterns of gene distribution related to nitrogen fixation, phosphorus solubilization, and pathogen resistance. The study also examines how horizontal gene transfer contributes to microbial resilience in disturbed agroecosystems. Insights from comparative genomic studies enhance our understanding of the impact of agricultural practices—such as crop rotation, fertilization, and pesticide use—on microbial diversity and ecosystem function. Case studies from organic and conventional farms reveal significant differences in microbial gene expression and evolutionary adaptation. This article underscores the importance of integrating genomic data into sustainable agriculture strategies and offers future directions for using microbial genomics in crop management and soil restoration efforts.

DOI:

 

 

Microbial Biosensors: Genetic Tools For Monitoring Soil Health

Authors: Pradeep Kumar Netam, Meena Porte

Abstract: Soil health is an integral determinant of agricultural productivity, ecosystem balance, and environmental sustainability. Microbial biosensors, leveraging genetically engineered microbial strains, offer a novel approach to real-time, in situ monitoring of soil contaminants and nutrient dynamics. These biosensors are designed to detect specific chemical signals—ranging from heavy metals and pesticides to changes in pH and nitrogen content—by producing measurable outputs such as fluorescence, bioluminescence, or electrochemical signals. This article reviews the development and deployment of microbial biosensors as tools for assessing soil health. It explores their underlying biological principles, integration into environmental monitoring frameworks, and potential to overcome the limitations of conventional soil assessment techniques. The paper emphasizes the importance of synthetic biology and CRISPR-based modulation in enhancing biosensor specificity and stability. Furthermore, it highlights successful case studies from agriculture, bioremediation, and land reclamation projects. Finally, the article discusses current challenges—such as environmental variability and regulatory hurdles—and future directions, including field-deployable biosensor platforms and wireless data integration. The findings underscore microbial biosensors’ transformative potential in advancing precision agriculture and soil restoration practices through continuous and targeted ecological surveillance.

DOI: https://doi.org/10.5281/zenodo.16834975

 

Nano-Enabled Microbial Bioreactors for Sustainable Water Purification

Authors: Ajay Kumar Dash, Ipsita Pradhan

Abstract: Nano-enabled microbial bioreactors are emerging as an innovative approach for sustainable water purification, combining the catalytic versatility of microbes with the high surface area, reactivity, and functional properties of nanomaterials. These hybrid systems are designed to enhance the degradation, adsorption, and transformation of organic pollutants, heavy metals, and pathogens in contaminated water sources. Nanoparticles act as catalysts, redox mediators, or structural supports, accelerating microbial metabolic processes and facilitating electron transfer in bioreactors. This synergistic relationship significantly improves pollutant removal efficiency, reduces treatment time, and enhances system stability. As global freshwater resources face escalating pollution and scarcity, nano-enabled microbial bioreactors offer a scalable and eco-friendly solution that bridges the gap between advanced nanotechnology and traditional biological wastewater treatment. This article explores their working principles, applications, environmental benefits, and future prospects

DOI: https://doi.org/10.5281/zenodo.16842310

 

Integrating Nanobio Interfaces For Real-Time Environmental Monitoring

Authors: Manoj Kumar Pradhan, Anjali Swain

Abstract: The integration of nanotechnology and biological sensing elements has paved the way for advanced nanobio interfaces that can revolutionize environmental monitoring. These hybrid systems offer real-time, highly sensitive detection capabilities for a wide range of environmental pollutants, including heavy metals, organic contaminants, and microbial toxins. By combining the specificity of biological recognition elements with the signal-enhancing properties of nanomaterials, nanobio interfaces provide a dynamic solution for continuous and in-situ environmental diagnostics. This paper explores the design, mechanisms, applications, and challenges associated with deploying nanobio interfaces in environmental settings, and outlines their potential as scalable, adaptable, and cost-effective monitoring tools.

DOI: https://doi.org/10.5281/zenodo.16842578

 

Functional Diversity Of Microbial Enzymes In Acidic Mine Drainage Sites

Authors: Akhilesh Kumar Mandal, Savita Patra

Abstract: Acidic mine drainage (AMD) environments are characterized by extreme acidity and elevated concentrations of heavy metals, making them inhospitable to most life forms. Yet, microbial life thrives in these ecosystems through unique metabolic adaptations, particularly enzyme systems that function under such harsh conditions. This study explores the functional diversity of microbial enzymes in AMD sites, with a focus on their ecological roles, biogeochemical contributions, and potential applications in bioremediation. Through metagenomic analyses, microbial communities are examined for genes encoding enzymes involved in sulfur and iron oxidation, heavy metal resistance, and acid tolerance. The findings reveal a complex microbial network dominated by acidophilic chemolithoautotrophs such as Acidithiobacillus ferrooxidans and Leptospirillum ferrooxidans, which orchestrate critical oxidation-reduction processes. The presence of specialized enzymes like rusticyanin, cytochrome c oxidase, and ATPases adapted for low pH indicates functional specialization. Furthermore, these enzymes facilitate biogeochemical cycling and influence AMD chemistry, contributing to both environmental degradation and potential restoration when harnessed correctly. This study underscores the value of microbial enzyme diversity in understanding AMD ecology and leveraging it for sustainable environmental cleanup strategies.

DOI: http://doi.org/10.5281/zenodo.16870814

Metatranscriptomic Profiling Of Microbial Stress Responses To Soil Contaminants

Authors: Lalit Kumar Sen, Madhvi Chourasiya

Abstract: Soil contamination by heavy metals, pesticides, hydrocarbons, and industrial pollutants disrupts microbial ecology, affecting soil health and plant productivity. Metatranscriptomics, the large-scale sequencing of environmental RNA, offers an advanced approach to decipher real-time microbial responses to such stressors. This study investigates the functional gene expression profiles of soil microbiomes under contaminant stress using metatranscriptomic analysis. By examining transcripts linked to oxidative stress, metal resistance, and pollutant degradation, we identify key microbial pathways that mediate adaptation and survival. Our findings highlight the upregulation of genes involved in efflux pumps, antioxidative enzymes like catalases and peroxidases, and biodegradative enzymes including monooxygenases and dioxygenases. Community-level expression patterns reveal taxonomic shifts favoring resilient genera such as Pseudomonas, Acinetobacter, and Rhodococcus. The data suggest that contaminated environments exert strong selective pressures, driving microbial communities toward functional redundancy and niche specialization. This study underscores the potential of metatranscriptomics as a tool to monitor ecological risk, assess bioremediation capacity, and develop precision strategies for soil restoration. Our work provides a foundational framework for future research aiming to optimize microbial functions for environmental detoxification and sustainable land management.

DOI: http://doi.org/10.5281/zenodo.16870960

CRISPR Applications In Studying Microbial Resistance In Contaminated Ecosystems

Authors: Raghavendra Kumar, Smita Tiwari

Abstract: Microbial communities inhabiting contaminated ecosystems often develop complex resistance mechanisms to survive toxic environmental stressors. Understanding the molecular basis of this resistance is essential for ecological risk assessment and the development of bioremediation strategies. CRISPR (Clustered Regularly Interspaced Short Palindromic Repeats) technology, originally discovered as an adaptive immune system in bacteria and archaea, has emerged as a transformative tool for functional genomics and microbial ecology. This study explores how CRISPR-based approaches can elucidate microbial resistance mechanisms in polluted habitats, including heavy metal-rich soils, industrial effluents, and pesticide-contaminated farmlands. Using CRISPR interference (CRISPRi) and activation (CRISPRa), researchers can selectively knock down or upregulate microbial genes linked to metal ion transport, oxidative stress response, and efflux pump regulation. Metagenome-assembled genomes (MAGs) in tandem with CRISPR screens provide a robust framework to map resistance pathways at the community level. This article presents an overview of current CRISPR applications in microbial resistance research, evaluates their ecological implications, and highlights their potential to inform biotechnological interventions for ecosystem restoration. By integrating gene-editing precision with metagenomic profiling, CRISPR tools open new avenues to monitor, model, and modulate microbial responses to contamination.

DOI: http://doi.org/10.5281/zenodo.16871016

Metagenomic Analysis Of Microbial Communities In E-Waste Bioreactors

Authors: Vivek Kumar Ghosh, Kusum Singh

Abstract: Electronic waste (e-waste) bioremediation has emerged as a sustainable approach to manage the growing burden of discarded electronics. This study investigates microbial communities in e-waste bioreactors using metagenomic techniques to identify key species and functional pathways involved in metal recovery and detoxification. By deploying next-generation sequencing (NGS) and shotgun metagenomic approaches, we uncovered taxonomic diversity and biochemical functions encoded in the resident microbiota. Our results revealed a predominance of metal-resistant bacteria, including Pseudomonas, Cupriavidus, and Desulfovibrio species, which possess genes for metal reduction, transport, and biofilm formation. Functional annotation indicated the prevalence of resistance-nodulation-division (RND) transporters, metallothioneins, and oxidoreductases crucial for heavy metal sequestration. This study underscores the utility of metagenomics in unraveling complex microbial interactions and their adaptive strategies in hostile e-waste environments. Insights from this research can facilitate the engineering of microbial consortia tailored for enhanced metal recovery and minimal ecological impact. The findings also establish a foundational knowledge base for bioaugmentation practices in electronic waste treatment systems. Ultimately, the integration of omics-based techniques into environmental biotechnology can accelerate the development of efficient and eco-friendly waste valorization platforms.

DOI: http://doi.org/10.5281/zenodo.16871064

Biosurfactant-Producing Microbes In Environmental Cleaning Applications

Authors: Pankaj Kumar Yadav, Rashmi Dubey

Abstract: Biosurfactant-producing microbes have emerged as crucial agents in eco-friendly environmental remediation, particularly for cleaning up oil spills, heavy metal contaminants, and industrial pollutants. These naturally derived surface-active compounds, produced by bacteria such as Pseudomonas aeruginosa, Bacillus subtilis, and Rhodococcus erythropolis, exhibit high emulsifying activity, low toxicity, and exceptional biodegradability. The focus of this research is to evaluate how microbial biosurfactants contribute to environmental cleaning through mechanisms of emulsification, desorption, and biostimulation. Emphasis is placed on their structural diversity, metabolic pathways, and potential applications in oil spill mitigation, soil washing, and heavy metal recovery. Through a review of current studies, laboratory findings, and emerging field applications, this article investigates the comparative performance of biosurfactants against synthetic surfactants. It also explores genetic and process engineering strategies to enhance biosurfactant yields. The results point toward biosurfactant-driven bioremediation as a promising frontier for sustainable environmental management. The article concludes with future research directions, highlighting bioreactor scalability and regulatory considerations necessary for large-scale deployment. These insights underscore the transformative role of biosurfactant-producing microbes in redefining the future of green technology and environmental restoration.

DOI: http://doi.org/10.5281/zenodo.16871248

Assessing The Impact Of COVID-19 On Renewable Energy Project Finance In The US: Challenges And Opportunities

Authors: Funmilayo Fenwa

Abstract: The COVID-19 pandemic represents an unprecedented global crisis that has fundamentally altered economic landscapes across all sectors, with particular significance for renewable energy project finance in the United States. This study examines the multifaceted impacts of the pandemic on renewable energy investment patterns, policy responses, and market dynamics during 2020. Through comprehensive analysis of industry data, policy documents, and market indicators, this research reveals a complex narrative of resilience and vulnerability within the renewable energy finance sector. While overall renewable capacity additions nearly doubled in the first half of 2020, driven primarily by tax credit deadline pressures, total renewable energy investment declined by 20% to $49.3 billion. The pandemic exposed critical dependencies on supply chains, policy incentives, and financing mechanisms while simultaneously demonstrating the sector's inherent stability advantages. This analysis contributes to understanding crisis resilience in clean energy markets and provides insights for policy development in future emergency scenarios.

DOI: http://doi.org/10.5281/zenodo.16994016

Implementing Disaster Recovery With Commvault And TSM While Maintaining CRM Continuity Across Salesforce Experience Cloud

Authors: Deepika Sirohi

Abstract: In modern enterprise ecosystems, maintaining continuous operations of Customer Relationship Management (CRM) platforms like Salesforce Experience Cloud is critical for revenue, customer engagement, and regulatory compliance. Disaster recovery (DR) strategies are essential to ensure uninterrupted CRM services across hybrid IT environments, encompassing UNIX, Linux, Windows, and cloud platforms. This review examines the implementation of DR frameworks using Commvault and IBM TSM (Spectrum Protect), highlighting their capabilities, integration approaches, and complementary strengths. Commvault offers hybrid cloud replication, orchestration, and automated failover, while TSM provides efficient incremental backups, long-term retention, and reliable on-premises support. By combining these solutions in a hybrid DR model, enterprises can achieve defined Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) for Salesforce workloads. The review further explores risk assessment, backup strategies, multi-platform integration, DR testing, monitoring, and continuous improvement processes, emphasizing practical approaches for preserving CRM continuity. Additionally, emerging trends such as AI-driven automation and cloud-native DR strategies are discussed, illustrating how predictive and adaptive technologies can enhance operational resilience. This comprehensive analysis provides IT architects, administrators, and decision-makers with actionable insights to design, implement, and optimize disaster recovery frameworks that safeguard Salesforce Experience Cloud operations while maintaining business continuity, data integrity, and compliance.

DOI: https://doi.org/10.5281/zenodo.17520456

 

From Bare-Metal Servers To Einstein Copilot: Bridging Legacy Unix Systems With AI-Powered CRM Transformation

Authors: Kamlesh Jangra

Abstract: The convergence of legacy Unix systems with AI-powered Customer Relationship Management (CRM) platforms, such as Salesforce Einstein Copilot, represents a critical strategy for modern enterprises seeking operational continuity and enhanced customer engagement. Legacy Unix servers, including AIX, Solaris, and older Linux distributions, continue to support mission-critical CRM workloads, storing historical data and managing transactional processes with high reliability. At the same time, AI-driven CRM introduces predictive analytics, automated workflows, and intelligent insights that enable personalized customer interactions and strategic decision-making. This review examines methodologies, architectures, and best practices for bridging legacy Unix infrastructure with AI-enhanced CRM, highlighting middleware solutions, API frameworks, hybrid deployment models, and automated data pipelines. It explores challenges related to data compatibility, infrastructure limitations, security, compliance, and organizational change management. Case studies from financial and healthcare sectors illustrate practical implementations and lessons learned, emphasizing phased migration, continuous monitoring, and performance optimization. By synthesizing technical strategies and industry examples, this review provides actionable guidance for IT architects, administrators, and decision-makers to modernize CRM operations, maintain data integrity, and ensure seamless integration of AI capabilities while leveraging the reliability of existing Unix environments. The discussion concludes with insights on emerging trends, including predictive analytics enhancements, cloud-first strategies, edge computing, and automation-driven Unix modernization, framing a future-ready approach to enterprise AI CRM adoption.

DOI: https://doi.org/10.5281/zenodo.17520771

 

Harnessing AI Dashboards in Oracle Cloud HCM: Advancing Predictive Workforce Intelligence and Managerial Agility

Authors: Kranthi Kumar Routhu

Abstract: The digital transformation of Human Resource Management (HRM) has entered a new phase with the convergence of Artificial Intelligence (AI), advanced analytics, and cloud-based Human Capital Management (HCM) systems. This evolution reflects a global shift from administrative HR operations to data-driven workforce intelligence. Among the leading solutions, Oracle Cloud HCM stands out for its integration of AI-powered analytics, predictive modeling, and configurable dashboards that deliver actionable insights to managers across all levels of the organization. By embedding analytics within HR workflows, Oracle’s HCM platform enables enterprises to automate decision processes, identify workforce trends, and enhance compliance through real-time monitoring and intelligent recommendations. AI-driven dashboards transform traditional HR reporting into a dynamic, interactive decision-support environment, where key performance indicators (KPIs) are continuously analyzed to reveal emerging risks, opportunities, and performance gaps. These systems not only consolidate complex datasets from payroll, recruitment, and performance management modules but also apply machine learning algorithms to predict employee attrition, engagement levels, and talent acquisition efficiency. This paper explores the evolution, architecture, and strategic importance of AI-augmented dashboards in Oracle Cloud HCM, emphasizing their role in enhancing managerial decision-making. It develops a conceptual framework for AI-enabled decision support, detailing how predictive analytics and visualization work together to improve accuracy, transparency, and responsiveness in HR operations. Furthermore, the study discusses practical implementation challenges including data quality, explainability, and user adoption and evaluates the tangible benefits of integrating AI-driven dashboards within enterprise HCM systems. The findings highlight how Oracle Cloud HCM serves as a model for intelligent HR transformation, aligning technology, analytics, and human expertise to support sustainable organizational growth.

DOI: http://doi.org/10.5281/zenodo.17670797

Invisible Risks In Connected Worlds An IT Risk Management Framework For Cloud Enabled IoT Systems

Authors: Sasikanth Reddy Mandati

Abstract: The rapid proliferation of cloud-enabled Internet of Things (IoT) systems has transformed modern infrastructure, enabling real-time data collection, intelligent automation, and interconnected services across domains such as smart cities, healthcare, and industrial IoT. However, the increasing complexity and interdependence of these systems also expose them to invisible risks latent, cascading, and systemic vulnerabilities that are often overlooked by conventional risk management approaches. This paper presents a comprehensive IT risk management framework designed to detect, assess, and mitigate such hidden risks in cloud-enabled IoT environments. The framework integrates real-time data analytics, anomaly detection, and proactive mitigation strategies to improve system resilience and operational reliability. A case study in a smart city scenario demonstrates the framework’s effectiveness, showing significant improvements in risk coverage, mitigation efficiency, and stakeholder confidence compared to baseline methods. The results highlight the critical importance of addressing invisible risks to ensure secure, reliable, and resilient IoT-enabled systems.

DOI: https://doi.org/10.5281/zenodo.17999954

An Analytical Study Of Multi-Cloud Strategies For Enhancing Scalability, Reliability, And Data Security

Authors: Anvi Saxena

Abstract: The rapid growth of cloud computing has transformed the way organizations deploy, manage, and scale their IT infrastructure. Traditional single-cloud deployments often face limitations such as vendor lock-in, scalability bottlenecks, reliability issues, and security vulnerabilities. To address these challenges, multi-cloud strategies have emerged as a viable solution, enabling organizations to leverage multiple cloud service providers simultaneously. This review article presents an analytical study of multi-cloud strategies, emphasizing their impact on scalability, reliability, and data security. Scalability is a critical requirement in modern IT ecosystems, allowing dynamic resource allocation based on workload demands. Multi-cloud strategies enhance scalability by distributing workloads across several providers, enabling organizations to optimize performance and reduce latency. Reliability, or the ability of a system to maintain continuous service despite failures, is also improved in multi-cloud environments. By implementing redundancy and failover mechanisms across multiple clouds, organizations can achieve high availability and disaster recovery capabilities that are difficult with single-cloud architectures. Data security is another crucial consideration, as storing sensitive information across multiple platforms introduces potential vulnerabilities. Multi-cloud strategies can mitigate security risks through encryption, identity and access management, compliance adherence, and robust monitoring practices. This review systematically examines recent literature and case studies, highlighting different multi-cloud approaches, their benefits, and associated challenges. Additionally, it identifies gaps in current research, particularly in areas such as interoperability, orchestration, and automated management. The article also explores emerging trends, including AI-assisted cloud management, edge computing integration, and serverless architectures, which can further enhance multi-cloud effectiveness. Ultimately, this review provides a holistic understanding of how multi-cloud strategies contribute to improved scalability, reliability, and data security, offering valuable insights for researchers, IT architects, and organizational decision-makers aiming to optimize cloud infrastructure for the evolving digital landscape.

DOI: http://doi.org/10.5281/zenodo.18159410

Integrating AI And Machine Learning Into SAP HANA For High-Velocity Healthcare And Financial Data Analytics

Authors: Rudra Narayan

Abstract: The exponential growth of data in healthcare and financial sectors presents unique challenges in storage, processing, and real-time analytics. High-velocity data streams—originating from electronic health records (EHRs), IoT medical devices, stock trading systems, and payment networks require sophisticated frameworks capable of handling large volumes with minimal latency. SAP HANA, an in-memory, columnar database platform, offers real-time processing capabilities that allow organizations to integrate advanced analytics and machine learning (ML) directly into transactional and operational data environments. By leveraging AI and ML, healthcare institutions can predict patient outcomes, optimize treatment plans, and enhance diagnostic accuracy, while financial organizations can detect fraud, assess risk, and execute high-frequency trading strategies efficiently. This review article explores the convergence of AI/ML techniques with SAP HANA for high-velocity data analytics, emphasizing both technical implementation and domain-specific applications. We provide an overview of SAP HANA’s architecture, predictive analytics libraries, and integration approaches with external ML frameworks such as Python, R, TensorFlow, and PyTorch. The article also examines real-time data pipelines, model deployment strategies, and key challenges, including data privacy, scalability, and model interpretability. Case studies in healthcare demonstrate predictive modeling for patient management, disease diagnosis, and imaging analytics, while financial applications highlight fraud detection, real-time risk assessment, and market analytics. Furthermore, the review discusses benefits such as reduced latency, improved decision-making, and operational efficiency, alongside limitations that include heterogeneous data integration, regulatory compliance, and model transparency. Finally, future research directions are outlined, including deep learning integration, edge computing for real-time analytics, hybrid cloud deployments, and explainable AI methodologies. This review serves as a comprehensive resource for researchers, practitioners, and decision-makers seeking to understand the potential of AI and ML integration within SAP HANA for processing and analyzing high-velocity healthcare and financial data efficiently and effectively.

DOI: http://doi.org/10.5281/zenodo.18159474

Risk-Aware Cloud Computing Frameworks For Secure IoT Communication Over Wireless Network Infrastructures

Authors: Prisha Malviya

Abstract: The rapid proliferation of Internet of Things (IoT) devices, coupled with the high-performance analytical capabilities of Cloud Computing, has created an interdependent ecosystem that relies heavily on wireless network infrastructures. However, this integration introduces significant security vulnerabilities, as the broadcast nature of wireless communication leaves data susceptible to jamming, eavesdropping, and sophisticated man-in-the-middle attacks. This review article systematically investigates the current landscape of Risk-Aware Cloud Computing Frameworks designed to secure IoT communications. We propose a multi-dimensional taxonomy that categorizes these frameworks based on their architectural distribution (Cloud-to-Edge), their risk-assessment methodologies (Probabilistic vs. AI-driven), and their decision-making logic (Reactive vs. Proactive). The article provides a deep dive into the "Resource-Security Paradox," analyzing how risk-aware models optimize the trade-off between cryptographic overhead and device longevity. Furthermore, we provide a comparative analysis of state-of-the-art frameworks, evaluating them against key performance metrics such as detection accuracy, latency, and energy efficiency. Significant attention is given to the role of Software-Defined Networking (SDN) and Trust Management Systems in providing real-time mitigation of wireless threats. Finally, the article identifies critical research gaps and discusses emerging trends, including Zero Trust Architectures (ZTA), Quantum-Resistant Cryptography, and the impact of 6G on IoT security. This review aims to provide a comprehensive reference for researchers and practitioners working to build resilient, self-adaptive security infrastructures for the future of the interconnected world.

DOI: http://doi.org/10.5281/zenodo.18159497

Continuous Integration and Continuous Deployment Tools of Enterprise Practices

Authors: Vinod Kumar Jangala

Abstract: Continuous Integration (CI) and Continuous Deployment (CD) have become essential practices in enterprise software engineering, enabling organizations to deliver high-quality software at an accelerated pace while maintaining reliability and scalability. CI focuses on the frequent integration of code changes into shared repositories with automated builds and testing, whereas CD extends this process by automating application deployment across environments, including production. Together, CI/CD pipelines support DevOps principles by fostering collaboration among development, operations, and quality assurance teams, reducing manual intervention, and enabling rapid feedback loops. This paper presents a comprehensive review of CI/CD tools and enterprise practices, examining how organizations adopt and operationalize these technologies to address the growing complexity of modern software systems. It analyzes widely used CI tools such as Jenkins, GitLab CI, TeamCity, Bamboo, and Travis CI, alongside CD and delivery platforms including Spinnaker, Argo CD, Harness, and GitOps-based frameworks. The review highlights key enterprise adoption practices, performance metrics, and comparative tool capabilities, with particular attention to scalability, security, compliance, and integration with cloud-native technologies such as containers, Kubernetes, and infrastructure-as-code. Challenges related to heterogeneous toolchains, cultural transformation, pipeline performance, and regulatory requirements are critically discussed. Furthermore, the paper explores emerging trends shaping the future of CI/CD, including AI-driven pipeline optimization, DevSecOps, GitOps, multi-cloud orchestration, and edge deployments. By synthesizing existing literature and industry practices, this work provides actionable insights for software engineers, DevOps practitioners, and IT managers, while identifying research gaps and future directions to advance reliable, efficient, and secure enterprise-scale CI/CD implementations.

DOI: https://doi.org/10.5281/zenodo.18464806

 

Hybrid Knowledge Graph And Vector Similarity Architectures For End-to-End Financial Transaction Journey Analysis

Authors: Ramani Teegala

Abstract: By December 2021, financial institutions were operating transaction platforms whose end to end behavior increasingly resembled distributed journeys rather than single system events. A single customer initiated action, such as a card purchase, an account to account transfer, or a cross border remittance, could traverse channels, risk engines, limits services, payment rails, settlement systems, dispute workflows, and compliance controls across both internal and external counterparties. This fragmentation created persistent challenges in observability, auditability, and root cause analysis because the underlying data was split across event logs, relational ledgers, message queues, fraud features, and case management systems, each with different identifiers and retention policies. Knowledge graphs matured as a practical representation for integrating heterogeneous entities and relationships, enabling banks to model accounts, customers, devices, merchants, authorizations, postings, reversals, chargebacks, and compliance decisions as a coherent linked structure. In parallel, vector similarity search and embedding based retrieval became increasingly accessible due to open source libraries and emerging vector store implementations, providing a complementary mechanism for approximate matching over high dimensional representations of transactions, sequences, and behavioral signatures. This paper examines how knowledge graphs and vector stores can be combined to represent and analyze financial transaction journeys as understood and practicable by December 2021. The analysis frames the problem through regulated banking constraints, including PCI DSS requirements for cardholder data protection, GLBA expectations for safeguarding customer information, SOX oriented control evidence, Basel Committee guidance on operational risk, and FFIEC style expectations for resilient operations and audit readiness. The paper proposes a conceptual model in which a graph centric system of record captures identity resolution and explicit relationships, while a vector retrieval layer supports similarity based enrichment, anomaly surfacing, and candidate linking for incomplete or ambiguous journey traces. It evaluates architectural trade offs related to consistency, latency, governance, and explainability, emphasizing that approximate methods must be bounded by deterministic controls when outcomes influence fraud actions, customer impact, or regulatory reporting.

DOI: https://doi.org/10.5281/zenodo.19100103

Explainable AI For Cybersecurity Decision-Making

Authors: Farah Syazwani

Abstract: Explainable Artificial Intelligence (XAI) has emerged as a critical paradigm in enhancing trust, transparency, and accountability in cybersecurity systems. As cyber threats become increasingly sophisticated, traditional black-box machine learning models often fail to provide interpretable insights into their decision-making processes, thereby limiting their adoption in high-stakes environments. This review explores the integration of explainable AI techniques within cybersecurity frameworks, focusing on how interpretability improves threat detection, incident response, and risk assessment. The article highlights key methodologies such as feature attribution, model-agnostic explanations, and rule-based learning that enable analysts to understand and validate model outputs. Additionally, the role of XAI in regulatory compliance and ethical AI deployment is examined, emphasizing the need for transparency in automated decision systems. Challenges such as trade-offs between accuracy and interpretability, adversarial manipulation of explanations, and scalability issues are also discussed. Emerging trends, including hybrid explainability approaches and human-in-the-loop systems, are presented as promising directions for future research. By bridging the gap between complex machine learning models and human understanding, XAI holds significant potential to transform cybersecurity decision-making into a more reliable and interpretable process. This review provides a comprehensive overview of current advancements and outlines future pathways for integrating explainable intelligence into cybersecurity infrastructures.

DOI: https://doi.org/10.5281/zenodo.19492116



Intelligent SD-WAN Management Using AI

Authors: Siti Rahmawati

 

 

Abstract: The rapid proliferation of cloud-native applications, hybrid work models, and bandwidth-intensive services has fundamentally challenged the static nature of traditional Wide Area Networks (WAN). Software-Defined WAN (SD-WAN) introduced a centralized control plane to decouple network software from hardware, yet the manual definition of steering policies often fails to account for the highly volatile nature of internet transport circuits. This review examines the paradigm shift toward Intelligent SD-WAN Management powered by Artificial Intelligence (AI) and Machine Learning (ML). By leveraging deep learning architectures and reinforcement learning agents, SD-WAN controllers can now transition from reactive, threshold-based switching to proactive, intent-driven optimization. This article explores the core methodologies of AI-integrated management, focusing on predictive traffic engineering, automated root cause analysis, and self-healing infrastructure. We analyze how AI models optimize Quality of Experience (QoE) for mission-critical applications—such as VoIP and real-time video—by analyzing multi-dimensional telemetry including jitter, latency, and packet loss in real-time. Furthermore, the review addresses the critical challenges of model interpretability in network operations, the "cold start" problem in new deployments, and the necessity for federated learning to ensure data privacy across multi-tenant SD-WAN environments. By synthesizing recent academic breakthroughs and industrial implementations, this paper provides a strategic roadmap for building "Self-Driving WANs." The findings suggest that AI-integrated management not only reduces operational expenditure by automating complex routing decisions but also provides the cognitive intelligence required to manage the unpredictable performance of commodity internet underlays in a global digital economy.

DOI:

 

 

Published by:

IJSRET Volume 7 Issue 5, Sept-Oct-2021

Uncategorized

Comparative Analysis of Balancing Methods for Classifying Imbalanced Data
Authors:- Himani Tiwari, Dr. Sheetal Rathi

Abstract- The classification of data with unbalanced class distribution encounters the significant shortcomings of the performance that most standard classification learning algorithms can achieve. These algorithms assume that the class distribution is relatively balanced and the cost of pre-classification is the same. This article reviews the classification of unbalanced data: areas of application; the nature of the problem; learning difficulties with standard classification learning algorithms; learning objectives and evaluation measures; reported research solutions and class imbalance problems when there are multiple classes.

Enhancement of Hybrid Power Generation System with VSC Based Power Compensation in Faulty Conditioning
Authors:- Shailendra lodhi, Chandra Shekhar Sharma

Abstract- In today’s technological world, electricity is one of the most important aspects of our daily life. Since we are all unaware of the fact that renewable energy sources are depleting as fast as lightning. It is therefore time for us to remove the common focus from unconventional energy sources to generate electricity. The output of electricity generated by non-standard sources is less than their counterparts. Renewable sources have no negative effects on the environment. The Solar-wind hybrid system is basically a combination of a solar plant and a wind power plant. It will help to provide uninterrupted electricity supply. As in bad weather the product can be moved from one plant to another with the help of a VSC power compensator. The VSC power compensator ensures efficient use of resources and increases the power Quality of the integrated system compared to each generation mode. It helps to reduce reliance on a single source and makes the system more reliable. The hybrid system can be used for both industrial and domestic applications.

Designing Of Power and Delay Efficient 10T and 14T SRAM Cell
Authors:- M.Tech. Scholar Sanjay Mongiya, Prof. Pratha Mishra, Prof. Sandip Nemade, Prof. Dr. Vikas Gupta

Abstract-This work presents an analysis of popular 1-bit full adder circuits. The analysis metrics comprised of power, delay, power-delay-product, area, and threshold loss. As an important unit of various hardware computational blocks, the transistor level design of the full adder circuit has been evolving for decades. In this comparative study, we focus on the highly cited designs of last two decades. This paper presents design of a new stable and 14T full power efficient adder circuit. The proposed circuit is designed based on Pass Transistor Logic (PTL) network using NMOS transistor only. The proposed circuit is simulated at layout level using LTSpice tools technology in terms of power and voltage level at the sum and carries nodes. The proposed circuit performance is compared with a similar 14T adder circuits and found the proposed adder circuit consumes lower power due to smaller load capacitance and parasitic resistance. The logic level at the sum and carry nodes maintains at strong 1 or strong 0 due to proposed circuit’s design architecture.This paper we introduced 10T one-bit full adders, and 14T including the most motivating of those are analyzed and compared for speed, leakage power, and leakage current. The analysis has been performed on various process and circuits techniques, the analysis with minimum transistor size to minimize leakage power, the latter with simulate transistor dimension to minimize leakage current. The simulation has been carried out on a LTSPICE tool using a .065nm technology. 10T adder and 14T adder.

Attribute-Based Temporary Keyword Search Scheme in Cloud Storage Server
Authors:- M. Tech. Scholar Sindhu Mathuku, Asst. Prof. V Dakshayani, Asst. Prof. V Subhasini

Abstract- Attribute-based keyword search (ABKS), as an important type of searchable encryption, has been widely utilized for secure cloud storage. In a key-policy attribute-based temporary keyword search (KP-ABTKS) scheme, a private key is associated with an access policy that controls the search ability of the user, while a search token is associated with a time interval that controls the search time of the cloud server. However, after a careful study, we uncover that the only existing KP-ABTKS construction [1] is not secure. Through two carefully designed attacks, we first show that the cloud server can search the cipher-text in any time. As a result, their scheme cannot support temporary keyword search. To address this problem, we present an enhanced KP-ABTKS scheme and prove that it is selectively secure against chosen-keyword attack in the random oracle model. The proposed scheme achieves both fine-grained search control and temporary keyword search simultaneously. In addition, the performance evaluation indicates that our scheme is practical.

Desing and Implement of IOT Based Four Way Womens Safety Device
Authors:- Asst. Prof. Dr. M. Dhinesh Kumar, A. Arunmozhi, L. Geetha, R. Sandhiya, S. Subalakshmi

Abstract-As we know the present era is with equal rights, where in both men and women are taking equal responsibility in their respective works. Hence women are giving equal competition next to men in all fields, they are assigned works in both the even and odd shift. Every single day women and young girls from all walks of life are being assaulted, molested, and raped. The streets, public transport, public spaces in particular have become the territory of the hunters’. Because of these reasons women can’t step out of their house. We propose to have a device which is the integration of multiple devices, hardware comprises of a wearable “Smart gadget” which continuously communicates with Smart phone that has access to the internet. The complete gadget also ensures to provide self-defense application which helps her to escape critical situations. This system can be used at places like bus stops, railway stations, offices, footpaths, shopping malls, markets, etc. The implementation of the smart gadget is basically split into two sections the first part ensures to capture the image of the Culprit the device get automatically triggered when there is a suspected motion in front of the camera, the device captures the image of the culprit and send it as an attachment to the concerned E-mail Id along with the location of the Victim. The captured image serves as the valid proof against the one who has committed the crime. By making self- defence as the first priority we make sure that occurrence of the critical situations are eliminated. The self-defence feature is capable of working in any of the circumstances either it may be with Internet as a Smart Pendant with LED flash that makes an alert call to the family, relatives via the cloud and also glows the led flash on the eyes of the culprit to make the vision blur when the attacker is at the shorter distance. Whereas Self- defence without Internet consists of Electric shock gloves, that is used to provide the electric shocks that diverts the mind of the culprit and reduce his excited state to commit the crime on women. These two factors form the combined self-defence application and help the victim to escape from the danger.

Four-Switch Three-Phase Inverter-Fed Im Drives-Literature Review
Authors:- M.Tech. Scholar Yatin Kumar, , Dr. Shweta Chourasia, Dr. E.Vijay Kumar

Abstract- Three phase induction motors have been considered one of the most commonly used electric machines in industrial applications due to their low cost, simple and robust construction. Three-phase inverters are considered an essential part in the variable speed AC motor drives. The new speed estimation adaptation law, which ensures estimation stability and fast error dynamics, is derived based on Lyapunov theory. Furthermore, a Fuzzy Logic Controller (FLC) is present as another nonlinear optimizer to minimize the speed tuning signal used for the rotor speed estimation. This paper provides a detailed survey of the past work in the inverter field. The theoretical and experimental works from different types of DC/AC or AC/DC inverter techniques are discussed.

Performance Analysis of Bidirectional Grid-Connected Single-Power-Conversion
Authors:- Pankaj Madheshiy, Dr. Shweta Chourasia, Dr. E.Vijay Kumar

Abstract- Power converter configuration targets improving the effectiveness. Yet, in a first approach and to characterize fundamental topologies, it is fascinating to expect that no misfortune happens in the converter procedure of an influence converter. With this theory, the fundamental components are of two kinds: – non-direct components, for the most part electronic switches: semiconductors utilized in substitution mode; – straight responsive components: capacitors, inductances and common inductances or transformers. These responsive parts are utilized for middle of the road vitality stockpiling for voltage and current shifting. They by and large speak to a significant piece of the size, weight, and cost of the hardware. This starting work audits and gives an exact meaning of fundamental ideas basic for the comprehension and the structure of converter topologies. Above all the sources and the switches are characterized. At that point, the key association controls between these fundamental components are checked on. From that point, converter topologies are determined. A few instances of topology combination are given. At last, the idea of hard and delicate compensation is presented. Simulation is done using MATLAB simulink software.

Performance and Selection of Thermoelectric Module for Given Temperature Range
Authors:- Prajyot Chavan, Azeem Peerjade, Shahid Jamadar, Sushant Sutar, Asst. Prof. Dipak Patil

Abstract- Experimental investigations on several commercially available TEC and TEG are conducted in industries to evaluate performance trends. Experimental setups are analyzed and the parameters determining the performance and working of thermoelectric modules. It is found that how we use thermoelectric modules with different application in industrial sector with different works. Finally, the thermoelectric module has much more applications and in the paper work also shows analysis for easily used in engineering sector.

A Review on Design and Analysis of Ladder Chassis
Authors:- M.Tech. Scholar Shubham Agrawal, Prof. Arun Patel

Abstract- One of the major challenges is of designing of the chassis. Design of chassis is begins with analysis of load cases. There are four loads acting on chassis to be considered. These loads are important considerations in design of chassis because of ride safety and comfort of passengers. The magnitude of stress arises from these loads can be used to predict the performance of chassis. Automotive chassis is made of a steel frame, aluminum or composite. In this study past literature has been done.

Survey on Privacy Preserving Mining Techniques And Application
Authors:- Phd Scholar Jayshree Boaddh, Dr.Shailja Sharma,

Abstract- Digital platform increase the easiness of data organization and utility. Extraction of information from raw data was performed by data mining algorithms. This information has many applications but few of miners extract knowledge which might affect the privacy of individual, organization, community, etc. So this paper focuses on finding the techniques which provide privacy of data against data mining algorithms. Paper has performed a survey on recent methodology proposed by different researcher. Some of data mining methods were also describe in the paper which help in information extraction. Evaluation parameters were detailed for comparison of privacy preserving methods.

A Review On Thermal Performance Optimization And Cfd Analysis Of Double Pipe Heat Exchanger
Authors:- M.Tech Scholar Rahul Sahu, Assistant Professor N.V. Saxena

Abstract- One of the most simple and applicable heat exchangers is double pipe heat exchanger (DPHE). This kind of heat exchanger is widely used in chemical, food, oil and gas industries. Upon having a relatively small diameter, many precise researches have also hold firmly the belief that this type of heat exchanger is used in high-pressure applications. They are also of great importance where a wide range of temperature is needed. It is also well documented that this kind of heat exchanger makes a significant contribution to pasteurizing, reheating, preheating, digester heating and effluent heating processes. Many of small industries also use DPHEs due to their low cost of design and maintenance. As a result, we came to conclusion that the previous researches carried out on this type of heat exchanger should be categorized in order to overcome the perplexities of choosing the most appropriate methods of interest.

Improvement Of Statcom With Grid Connected Flicker Minimization And Power Quality Improvement
Authors:- Deepesh Patel, Asst. Prof. Shivendra Singh Thakur

Abstract- The injection of the PV Grid power into an electric grid affects the power quality. The influence of the PV Grid in the grid system concerning the power quality measurements and the norms followed according to the guidelines specified in the International Electro technical Commission standard, are the active and reactive power variations, variation of voltages, flicker, harmonics and electrical behavior of switching operations. The work study demonstrates has overall good functional characteristics, better performance and faster response than existing systems. The proposed system of having STATCOM is smaller in size and less costly when compared to the existing system. In this proposed system static compensator (STATCOM) is connected at a point with a battery energy storage system to reduce the power quality issues. The effectiveness of the proposed scheme gives the reactive power demand of load and the induction generator. Simulation is done by using MATLAB / SIMULINK-Sim power system software.

Enhancement Of Hybrid Power Generation System With Vsc Based Power Compensation In Faulty Conditioning
Authors:- Shailendra Lodhi, Asst.Prof. Chandra Shekhar Sharma

Abstract- In today’s technological world, electricity is one of the most important aspects of our daily life. Since we are all unaware of the fact that renewable energy sources are depleting as fast as lightning. It is therefore time for us to remove the common focus from unconventional energy sources to generate electricity. The output of electricity generated by non-standard sources is less than their counterparts. Renewable sources have no negative effects on the environment. The Solar-wind hybrid system is basically a combination of a solar plant and a wind power plant. It will help to provide uninterrupted electricity supply. As in bad weather the product can be moved from one plant to another with the help of a VSC power compensator. The VSC power compensator ensures efficient use of resources and increases the power Quality of the integrated system compared to each generation mode. It helps to reduce reliance on a single source and makes the system more reliable. The hybrid system can be used for both industrial and domestic applications.

A Review On Hybrid Energy Based On Mppt Techniques
Authors:- M.Tech. Scholar Anshu Bala, Professor Vinay Pathak

Abstract-This Paper provides a succinct and well-organized overview of different maximum power point tracking (MPPT) algorithms used in photovoltaic (PV) generating systems that may operate in partial shade. To far, a broad range of algorithms, PV modelling methods, PV array designs, and controller topologies have been investigated. However, every method has both benefits and drawbacks; as a consequence, while building a PV generating system (PGS) under partial shade conditions, a thorough literature study is required. The thorough review of MPPT algorithms has been done in this article. The review of MPPT methods has been divided into four major categories. The first group consists of entirely new MPPT optimization algorithms, the second group consists of hybrid MPPT algorithms, the third group consists of novel modelling approaches, and the fourth group consists of different converter topologies. This article offers an accessible reference for doing large-scale research in PV systems under partial shadowing conditions in the near future.

Thermal Analysis of Heat Sink with Perforation Techniques Using Ansys
Authors:-M.Tech.Scholar Umesh Badode, Asst.Prof. Deepak Solanki

Abstract-The engine chamber is one of the essential engine components that is subjected to high temperatures and heat stress. Particles on the cylinder surface enhance convection heat exchange. The heat produced by gasoline burning inside a vehicle engine. The friction between moving components often generates more heat. The air-cooled I.C. engine has fins in the shape of expanded surfaces surrounding the motor cylinders to improve heat transfer. Fin analysis is an important endeavour in order to increase the heat transfer rate. This study looks at past work on fine heat transfer rate enhancements, looking at changes in the form and composition of cylinder fins. The ANSYS programme was utilised in this study to examine the impact of fin shape and size on heat exchange within various fin geometries, including pin fin morphologies, tube fin geometries, hole geometries, and plate fin geometries. Temperature changes in fins have been investigated utilizing experiments. One of the studies was to assess temperature changes in exact field performance models and compare them to experimental data in Ansys. We’re looking at methods to make the most of the wind to help with heat dissipation. The study’s goal is to improve thermal properties via modifications in form, material, and small-scale design.

Image Processing: An Application of Machine Learning
Authors:- Duggineni Srinivasa Rao

Abstract- In the current scenario of the data world, the data holds significant information if processed correctly. The data can be in the form of images which can prove to be a boon in deriving the useful insights from it in order to get the knowledge of things at an early stage itself. But the matter of concern is deriving the information from the images will be a tedious task for human beings and would incur a heavy cost and time. So, an easy and cheaper technique is to teach a machine efficiently to do the task for us. The concept of using Machines to do human tasks is known as Machine Learning. In this paper, I present various literature reviews regarding image processing in Machine learning and how image processing has helped in identifying the issues at early stages so that they can be resolved easily without causing much harm. Also, image processing has been a helpful tool in computer vision.

DC Microgrid for Solar and Wind Power Integration
Authors:- Ashok Singh Bhauryal, Nisha Kaintura, Tanya, Yash Pratap Singh

Abstract-Micro-grid systems are presently considered a reliable solution for the expected deficiency in the power required from future power systems. Renewable power sources such as wind, solar offer high potential of benign power for future micro-grid systems. Micro-Grid (MG) is basically a low voltage (LV) or medium voltage (MV) distribution network which consists of a number of called distributed generators (DG’s); micro-sources such as photovoltaic array, wind turbine etc. energy storage systems and loads; operating as a single controllable system, that could be operated in both grid-connected and islanded mode. The capacity of the DG’s is sufficient to support all; or most, of the load connected to the micro-grid. This paper presents a micro-grid system based on wind and solar power sources and addresses issues related to operation, control, and stability of the system. Using Matlab/Simulink, the system is modeled and simulated to identify the relevant technical issues involved in the operation ofwa micro-grid system based on renewable power generation units.

Face Recognition using Deep Neural Network
Authors:- Research Student Amritpal Kaur, Asst.Prof. Shaveta Bala

Abstract- Face recognition is one of the fundamental challenges in the various application of computer vision and in the pattern recognition. First step of this process is to detect the facial feature in a video or in digital images. Next step is to recognize the person present in the frame by comparing its facial features with the features present in the database. For this step various types of classifiers are used for extraction and reducing the number of facial features. Various types of learning techniques were built in last two decades for face detection and recognition. Holistic learning, local handcraft learning and shallow learning are few examples of these techniques. In the last decade deep learning has shown the great improvement in the field of face recognition. Here convolutional neural network is used to learn the features of the object. In this paper a novel deep neural network technique with back propagation is proposed to identify and recognize the faces of various famous persons. Various objective parameters like precision, recall and F1 score is used to evaluate the performance of the proposed technique.

A Study On Anti Ramsey Coloring Problems
Authors:- M.Phil Scholar M. Susila, Asst.Prof. A. Mallika

Abstract- Let ar(G, H) be the maximum number of colors such that there exists an edgecoloring of G with ar(G, H) colors such that each subgraph isomorphic to H has atleast two edges in the same color. We call ar(G, H) the Anti-Ramsey number for a pair of graphs ar(G, H). In this paper, we determine the Anti-Ramsey number for special graphs.

Inter-laminar Fracture of Composites Materials for Aerospace Structures
Authors:- Research Scholar Imran Abdul Munaf Saundatti, Prof. Dr G. R. Selokar (Supervision)

Abstract- The point of the present research is to pick up a superior comprehension of inter-laminar facture of polymer framework composites in various modes, and to create scientific model to anticipate the critical strain energy discharge rates. Accentuation has been set on the root revolution at the crack tip which was accepted to be a critical factor which influences the delaminating fracture toughness, and critical burden. A joined experimental and hypothetical investigation has been directed to decide the job of root revolution on critical burden. The objective of anticipating the reliance of root pivot on critical strain energy discharge rate under mode I is accomplished. The initial segment of the present examination analyzes inter-laminar fracture toughness of Double Cantilever Beam (DCB) examples dependent on a changed Timoshenko beam model.

Grid connected Solar Powered Water Pumping System Utilizing Improved Control Technique
Authors:- Suvek Kumar, Prof. Vinay Pathak

Abstract- Present paper aims to discuss scope and limitations of photovoltaic solar water pumping system. Components and functioning of PV solar pumping system are described. In addition, review of research works of previous noteworthy researchers has also been done. Irrigation is well established procedure on many farms in world and is practiced on various levels around the world. It allows diversification of crops, while increasing crop yields. However, typical irrigation systems consume a great amount of conventional energy through the use of electric motors and generators powered by fuel. Photovoltaic energy can find many applications in agriculture, providing electrical energy in various cases, particularly in areas without an electric grid. This paper proposes a single stage grid interactive solar powered switched reluctance motor (SRM) driven water pumping system with an efficient control technique. The control of proposed system provides the proficient maximum power point technique (MPPT) tracking and motor drive control with bidirectional power flow between the photovoltaic (PV) array and single phase grid. It has harmonics components elimination, improved dynamic performance and a DC offset rejection capability compared to other control. A PV feedforward term is also incorporated in developed control to enhance the dynamic performance of the system and to minimize the size of DC link capacitor with improved MPPT performance. The novel scheme of fundamental switching of SRM drive over its maximum operational time (when the grid is present) makes system efficient and reliable. An improved perturb and observe (P&O) based maximum power point tracking (MPPT) algorithm is used in this system to minimize the undesirable losses in a PV array specially under varying insolation levels. The proposed control is tested on a developed prototype and its suitability is authenticated through simulated and test results under various conditions.

A Review on Grid Connected Hybrid Renewable Energy System Using Dynamic Voltage Restorer
Authors:- Gyanoday Kumar, Prof. Vinay Pathak

Abstract- This paper presents a new system for integration of a grid-connected photovoltaic (PV) system together with a self supported dynamic voltage restorer (DVR). Power quality (PQ) is gaining a great deal of importance as more sensitive loads are introduced into the utility grid. The degradation of product quality, damage of equipment and temporary shutdowns are the general issues associated with PQ problems in industries. Any mal-operation or damage of the industrial sensitive loads results in monetary losses disproportionately higher than the severity of the PQ issues. The evolution of power electronics technology replaced the traditional power quality mitigation methods with the introduction of Custom Power System devices (CUPS). The major power electronic controller based CUPS are DSTATCOM, DVR and UPQC. DVR is a pertinent solution for the economic losses caused by the PQ issues in the industries. Among the CUPS, DVR is the most cost-effective one. In the published literature, only a few papers correspond to the review of DVR technology. In this paper, a systematic review of published literature is conducted and a description is given on the design, standards and challenges in the DVR technology. In addition to the energy variability of renewable energy sources, random voltage sags, swells and disruptions are already a major issue in power systems. Recent advances in power electronic devices have provided a platform for new solutions to the voltage support problem in power systems.

Modelling of Solar and Grid Connected System Based on Bidirectional DC to DC Converter
Authors:- M.Tech Scholar Vikas Kumar, Prof. Vinay Pathak

Abstract- The goal of this paper is to create and build a maximum power point tracker that uses fuzzy logic control methods. For such nonlinear situations, fuzzy logic makes an ideal controller. This method also takes advantage of artificial intelligence techniques that can help model nonlinear systems despite their complexity. To make this project a success, I created and simulated an MPPT system made up of photovoltaic modules. MPPT works by using a tracking algorithm to discover and sustain operation at the greatest power point. Due to changes in temperature, solar radiation, and load, the photovoltaic module’s maximum power will fluctuate. A maximum power point tracker (MPPT) is used in the photovoltaic system to continually harvest the highest power from the solar panel and then transfer it on to the load in order to maximize efficiency. A DC-DC converter (an electrical device that transforms DC energy from one voltage level to another) and a controller, as well as DC converters, batteries, and fuzzy logic controllers, make up the general structure of the MPPT system. To determine the best topology for the PV system, characterise the buck, boost, and buck-boost converters. In the MATLAB Simulink system, the integrated model of the PV module with the indicated converter and battery will be simulated.

Performances of Hybrid Renewable Energy Based Electrical Charging Station
Authors:- M.Tech Scholar Pooja Tiwari, Prof. Vinay Pathak

Abstract- Electric vehicles (EVS) represent one of the most promising technologies to green the transportation systems. An important issue is that high penetration of evs brings heavy electricity demand to the power grid systems became an important solution to reach the remote area and maximizing the economic, technological, and environmental benefits. In this thesis, A combination of solar energy, diesel generator, and electric vehicle gave an excellent result to ensure an uninterruptible power supply in case of low irradiance of PV solar energy. The main element is a photovoltaic system that is designed to satisfy the daily load energy requirement. A three-phase active filter is used to improve the power quality, manage the power, and corrected the unbalance. Backup energy storage systems including plug-in hybrid electric vehicles and the diesel generator are used to ensure an uninterruptible power supply in case of low solar irradiation. An effective way to reduce the impact is to integrate local power generation such as renewable energy (RES) into the charging infrastructure. Due to the intermittent and indivisible nature of RES, it has become very challenging to coordinate the charging of electric cars with other grid loads and renewable energy. This studies the charging of electric vehicles with smart grid technology and reviews its interaction with renewable energy. First introduces electric cars and renewable energy, which mainly introduces the main types of electric vehicles and the estimation method for renewable energy. In line with the objectives, the existing research work is divided into three categories: cost awareness, efficiency awareness and emission awareness of the interaction between electric cars and renewable energy. Each discussion category contains a description of the core idea, an overview of the solution and a comparison between different works. Finally, some important open-ended questions related to the interaction between electric cars and RES are given, and some possible solutions are discussed. To take care of the battery life, the PHEV supplies power to the load only during emergencies. This motivates the development of this work to the used robust algorithm, sizing, and energy management to balance the load consumption and electricity production this simulation has performed on MATLAB Simulink.

Implementation of Heuristic Methods in Manufacturing Industry
Authors:- M. Tech. Scholar Shashank Mishra, Prof. Hari Mohan Soni

Abstract- The Assembly Line Balance (ALB) is known as the classic problem of AL balancing, consisting in the allocation of tasks on a workstation in a way that downtime is minimized, and the precedence constraints are met. The ALB allows achieve the best use of available resources so that satisfactory production rates are reached at a minimum cost. The balancing is necessary when there are process changes, such as adding or deleting tasks, change of components, changes in processing time and also in the implementation of new processes.

Review of Design multiplexer using QCA
Authors:- M.Tech. Scholar Rajesh Kumar, Asst. Prof. Mr. K. K. Sharma

Abstract-A novel design of a quantum-dot cellular automata (QCA) 2 to 1 multiplexer is presented. The objective is the development of a modular design methodology which can be used to design 2n to 1 multiplexers using building blocks. For the QCA implementation a careful consideration is taken into account concerning the design in order to increase the device stability. The proposed multiplexer is designed and simulated using the QCADesigner tool.

Improving the Performance of Neural Networks
Authors:- Satwik Ram Kodandaram

Abstract- Deep Learning is a sub-part of Machine Learning where we exactly mimic the human brain neural network system. Deep Learning models are nonlinear models. They offer increased flexibility and can scale in proportion to the available training dataset. The downside of this flexibility is weights are calculated and updated via a stochastic training algorithm which means that they are sensitive to the training data and may have a different set of weights upon each time they are trained and produce different predictions. Generally, this case is referred to as neural networks with high variance and it will be very difficult to produce a final model for predictions. Deep Learning models often take too much time to train which means we require high computation resources like GPU or TPU. After investing so much time and resources, there is no guarantee that the final model will have low generalization error when performing on the unseen dataset. To overcome this, we need to reduce the variance of the model. A successful approach to reduce the variance is to go for “ensemble learning”. In this paper, we will discuss different methods of “ensemble learning” to improve the accuracy of the deep learning model by reducing the variance.

A Review on Experimental Investigation of Surface Roughness & Material Removal Rate of EN-31 Alloy Steel
Authors:- M.Tech. Scholar Rahul Singh, Asst. Prof. Abhishek Singh Roha

Abstract- This paper investigates the influence of machining parameters on MRR and surface roughness during CNC turning of EN-31 Steel using tungsten carbide inserts. Three machining parameters were taken. Taguchi robust design of technique is used. L9 orthogonal array was used. S/N ratio and ANOVA method were used to find mean response and percentage contribution. From the experimental result it is concluded that cutting speed is most significant effect on surface roughness and MRR.

A Review on Errors Caused in Infrared Thermography Measurements
Authors:- M.Tech Scholar Neeraj Kumar Dubey, Prof. Nitin Jaiswal

Abstract- Infrared thermography in its process uses thermal imager to detect radiation and then further converting it to get object temperature and temperature distribution. The results of thermography measurement get affected by various parameters say emissivity, ambient temperature, atmospheric temperature, transmittance, relative humidity, distance and view factor between object and sensor. Parameters such as emissivity, ambient temperature, transmittance, relative humidity, distance between object and sensor are user-specified to the measurement software. The present work focuses on review of errors caused in infrared thermography measurements.

Implementation of Greenhouse Service Control Protocol using Raspberry-Pi
Authors:- Mohammed Ameen Uddin, Shanila Mahreen, Mohd Anas Ali

Abstract- – The term “greenhouse” refers to a controlled atmosphere in which plants are cultivated. To achieve optimal plant development, greenhouse systems must continuously monitor and regulate environmental factors such as temperature, soil moisture, light intensity, humidity, and others. A greenhouse provides a year-round climate for growing plants, even on cold, gloomy days. This project’s major goal is to develop a basic, low-cost system that continually updates and controls the value of environmental parameters in order to ensure optimal plant development. Precision agriculture uses a variety of approaches to monitor and regulate the environment for the growth of numerous crops. It is difficult to meet the needs of farmers to manage water evenly due to the unequal distribution of rain water. This necessitates various irrigation methods that are suited for every weather condition, soil type, and diversity of crops. Finding a strategy that provides flawless analysing and regulating in order to build a proper atmosphere is more vital. Agriculture is one of the many areas where ICT technology is frequently used. The majority of equipment and greenhouses in the agriculture industry still rely on outdated serial connection methods. Several technical implementations of communications and information, such as internet and Bluetooth are becoming more widely used, yet they are still incompatible. Korea is working on a set of standards to ensure that various vendors can communicate with one another. For Protocol of Link-Control to be standardized, which is not dependent on infrastructure of network underlying, may be used to offer fundamental interoperability. We created a protocol of controlling the service on basis of protocol of Link-Control and implemented it using Python in this article.

Improving the Performance of Neural Networks
Authors:- Satwik Ram Kodandaram

Abstract- Deep Learning is a sub-part of Machine Learning where we exactly mimic the human brain neural network system. Deep Learning models are nonlinear models. They offer increased flexibility and can scale in proportion to the available training dataset. The downside of this flexibility is weights are calculated and updated via a stochastic training algorithm which means that they are sensitive to the training data and may have a different set of weights upon each time they are trained and produce different predictions. Generally, this case is referred to as neural networks with high variance and it will be very difficult to produce a final model for predictions. Deep Learning models often take too much time to train which means we require high computation resources like GPU or TPU. After investing so much time and resources, there is no guarantee that the final model will have low generalization error when performing on the unseen dataset. To overcome this, we need to reduce the variance of the model. A successful approach to reduce the variance is to go for “ensemble learning”. In this paper, we will discuss different methods of “ensemble learning” to improve the accuracy of the deep learning model by reducing the variance.

Survey of Dc-Dc Converters for Dc Nano-Grid with Solar PV Generation
Authors:- PG Scholar Poonam Singh, Asst. Prof. Abhijeet Patil, Associate Prof. Dr E.Vijay Kumar

Abstract- The wide use of DC characterized loads and more distributed power generation sources (DERs), the DC Nanogrid becomes more and more popular and seen as an alternative to the AC grid system in future. Therefore for safety considerations, DC Nano grid provides reliable grounding for residential loads like low voltage AC power system. Nano grid is a self-controlled entity and operated in either grid connection or island mode which connects local distributed energy sources and local distributed system. In this paper the review of performance analysis of DC-DC converters used in Nano grid is proposed. DC-DC converters are used for maintaining the voltage level of the system according to load demand.

Review Paper on Design of Vortex Tube Refrigeration
Authors:-Prof. E. L. Manjerekar, Faizan Girkar, Prakash More, Hanish Parab, Siddharth Parab

Abstract- The Ranque-Hilsch vortex tube has been used for many decades in various engineering applications. Because of its compact design and little maintenance requirements, it is very popular in heating and cooling processes. Despite its simple geometry, the mechanism that produces the temperature separation inside the tube is fairly complicated. A number of observations and theories have been explored by different investigators concerning this phenomenon. This report goes over some of the major conclusions found from experimental and numerical studies since the vortex tube’s invention. One of these studies showed that acoustic streaming caused by vortex whistle plays a large part in the Ranque-Hilsch effect.

Performance Evaluation of a Self-Excited Induction Generator for Stand-Alone Wind Energy Conversion System
Authors:-Ruqaya Mohiudin, Priya Sharma

Abstract- This paper presents the performance characteristics of a self-excited induction generator (SEIG) under various operating conditions. This also explains the modeling of parallel equivalent circuit to evaluate the reactive power required for SEIG. The variation of terminal voltage has been studied by varying the shaft speed, capacitance value and load. The simulations are carried through MATLAB/SIMULINK environment, and the validation of the simulation results are established through an experimental set-up.

Deep Learning Approach for the Detection of Breast Cancer
Authors:-Research Scholar Sapna Bansal, Professor Dr. Rohit Kumar Singhal

Abstract- About 2.1 million women are diagnosed with breast cancer annually, making it the most frequent sort of cancer among women. The aim is to raise the percentage of early breast cancers, enabling more effective treatment and a reduced risk of breast cancer death as a result of the disease. We use a number of machine learning approaches to assess whether a tumor’s traits are benign or malignant. Digital biomedical photos, such as histopathological photographs, are utilized in large sections by doctors to diagnosis cancer since they are so accurate. The analysis of histological pictures is a time- consuming technique that demands practically always the employment of expertise. Conversely, computer-aided diagnostic (CAD) systems can assist clinicians establish more accurate diagnoses. The Deep Neural Network (DNN) for biological image processing has lately demonstrated to be at the forefront of technology. In general, each image consists of a mix of structural and statistical information. The current work contained a collection of biological breast cancer photos and used DNN approaches to categorize photographs on the basis of structural & numerical data from imaging shots. SVM, RF and CNN approaches are compared for categorizing photos of breast cancer. The purpose of this investigation is to find out if the hypothesis is accurate or not. The degree of accuracy for this investigation was 98.00 percent.

Impacts of Bullying on students
Authors:-Kuenga Dendup

Abstract- This research was carried out in one of the primary schools in Tsirang involving 30 students, 15 boys and 15 girls, from Classes IV-VI. Participants were aged between 11 and 15 years of age, mean age of 13 years. Besides the quantitative, the study uses qualitative data from a focus group discussion (FGD), attended by 15 students, seven girls and eight boys, whose ages range from 11 to 16 years. A total of 45 students contributed to this study. This study aimed to review, understand and analyze the literature about bullying behaviours of school children and to find out the effect of bullying on students and gauge how that would affect their interest in coming to school every day. It was also to find out how bullying can sometimes lead to low self-esteem and underperformance academically at school and to identify what educators can do to create a bully-free school.

Seismic Analysis of Multistorey Building with Floating Column
Authors:-M.Tech. Scholar Adnan Ahmed, Dr. P.K. Singhai

Abstract- Structural planning and design is an art and science of designing with economy and elegance and durable structures. In present scenario buildings with floating column is a typical feature in the modern multistory construction in urban India. Such features are highly undesirable in building built in seismically active areas. Tremendous increase in the use floating column can be seen these days cause of spacious and aesthetic appearance but that could not be achieved on the risk of failure of building. This study highlights the importance of explicitly recognizing the presence of the floating column in the analysis of building. The study is carried out to analyze the building with floating columns and to find out its comparison with the building without floating column in terms of storey drift, base shear and time period frequency using designing software.

Seismic Retrofitting of Reinforced Concrete Structures
Authors:-M.Tech Scholar Md Aamir Sohail, Prof.Vijay Kumar Meshram

Abstract-Earthquake around the world is one of the reasons responsible for the destruction to life and property in large numbers. In order to mitigate such hazards, it is important to incorporate norms that will enhance the seismic performance of the structures. Earthquake loads are required to be carefully modeled so as to assess the real behavior of structure with a clear understanding that damage is expected but it should be regulated. Seismic Retrofitting is the modification of existing structures to make them more resistant to seismic activity, ground motion, or soil failure due to earthquakes. In this project our aim is to analyze an existing building using STAAD Pro v8i, with and without the provision of seismic retrofitting. The structure is analyzed in STAAD Pro v8i and the bending moment was chosen as the criteria for selecting the weak member. RC jacketing was selected as the retrofitting technique employed to the weak member andlater the member in the structure was compared with the bending moment value before and after providing retrofitting. It was determined that RC jacketing strengthened the structure, which was vulnerable to seismic activity.

Analysis of Major Elements of Elevated Metro Bridge
Authors:-M.Tech Scholar Mohammad Ammar, Prof. Vijay Kumar Meshram

Abstract-An elevated metro system is more preferred type of metro system due to ease of construction and also it makes urban areas more accessible without any construction difficulty. An elevated metro system has two major elements pier and box girder. This research concentrates only on the design of pier and its performance. Conventionally the pier of a metro bridge is designed using a force based approach. During a seismic loading, the behaviour of a single pier elevated bridge relies mostly on the ductility and the displacement capacity. It is important to check the ductility of such single piers. Force based methods do not explicitly check the displacement capacity during the design. Conventionally the pier of a metro bridge is designed using a force based approach. During a seismic loading, the behavior of a single pier elevated bridge relies mostly on the ductility and the displacement capacity. It is important to check the ductility of such single piers. Force based methods do not explicitly check the displacement capacity during the design. The codes are now moving towards a performance-based (displacement-based) design approach, which consider the design as per the target performances at the design stage. Performance of a pier designed by a Direct Displacement Based Design is compared with that of a force-based designed one. , performance of a pier designed by a Direct Displacement Based Design is compared with that of a force-based designed one. The design of a pier is done by both force based seismic design method and direct displacement based seismic design method and performance assessment is done based on both the methods.

Vibration and Buckling Analysis of Cracked Composite Beam

Authors:-M.Tech. Scholar Abuzar Khan, Dr. P.K. Singhai

Abstract-Cracks in structural members lead to local changes in their stiffness and consequently their static and dynamic behaviour is altered. The influence of cracks on dynamic characteristics like natural frequencies, modes of vibration of structures has been the subject of many investigations. However studies related to behavior of composite cracked structures subject to in-plane loads are scarce in literature. Present work deals with the vibration and buckling analysis of a cantilever beam made from graphite fiber reinforced polyimide with a transverse one-edge non-propagating open crack using the finite element method. The undamaged parts of the beam are modeled by beam finite elements with three nodes and three degrees of freedom at the node. Anoverall additional flexibility matrix‟ is added to the flexibility matrix of the corresponding non-cracked composite beam element to obtain the total flexibility matrix, and therefore the stiffness matrix in line with previous studies. The vibration of cracked composite beam is computed using the present formulation and is compared with the previous results. The effects of various parameters like crack location, crack depth, volume fraction of fibers and fibers orientations upon the changes of the natural frequencies of the beam are studied. It is found that, presence of crack in a beam decreases the natural frequency which is more pronounced when the crack is near the fixed support and the crack depth is more. The natural frequency of the cracked beam is found to be maximum at about 45% of volume fraction of fibres and the frequency for any depth of crack increases with the increase of angle of fibres. The static buckling load of a cracked composite beam is found to be decreasing with the presence of a crack and the decrease is more severe with increase in crack depthfor any location of the crack. Furthermore, the buckling load of the beam decreased with increase in angle of the fibres and is maximum at 0 degree orientation.

Seismic Risk Assessment of RCC Framed Structure with Vertically Irregular Buildings Shaped
Authors:-M.Tech. Scholar MD Arif Mansoori,Prof.Vijay Kumar Meshram

Abstract-The area of vertically irregular type of building isnow having a lot of interest in seismic research field. Many structures are designed with vertical irregularity for architectural views. Vertical irregularity arises in the buildings due to the significant change instiffness and strength. Open ground storey (OGS) is an example of anextreme case of vertically irregularity. The typical OGS andstepped types of irregularities are considered in the present study.

Experimental Investigation on Al-6061 for MRR and Surface Roughness Using MAFM Technique
Authors:-M. Tech Scholar Mohit, Assistant Professor Manoj

Abstract-MAFM is an innovative expansion in AFM. By means of magnetically fielding in the region of the work portion in AFM, we can amplify the material removal rate in addition to the plate finishing. MAFM is a dug in refined finishing up technique capability of meted the changed closing necessities via a different sections of use like aviation, wellbeing and vehicle. It is commonly helpful to end composite figures for improved surface unevenness esteems and unbending abstinences. Be that as it may, the principal disadvantage of this methodology is short closing rate. The unrivalled introduction is practiced if the system is controlled on the web. Thus, sound related discharge technique is tried to investigate the exterior complete and material rejection. A variety of demonstrating techniques are likewise practiced to display the methodology and to connect with investigational results. Yet, pros guess that there is still extension for an arrangement of flawlessness in the close-by MAFM review. In the current effortAl-6061 is punctured & exhausted by customary machined capacity & surface finishing up was made by methods for rough stream machining. Testing was grasped for information requirements like rough pondering, grating system degree and no of cycles.

Biometrics Authentication Systems
Authors:-Gita Roy

Abstract-Biometrics are body estimations and computations identified with human attributes. Biometric confirmation (or sensible verification) is utilized in software engineering as a type of recognizable proof and access control. It is additionally used to recognize people in bunches that are under observation. Biometric identifiers are the particular, quantifiable qualities used to name and depict people. Biometric identifiers are regularly sorted as physiological qualities, which are identified with the state of the body. Models incorporate, yet are not restricted to finger impression, palm veins, face acknowledgment, DNA, palm print, hand calculation, iris acknowledgment, retina and smell/aroma. Social qualities are identified with the example of conduct of an individual, including however not restricted to composing musicality, stride, keystroke, signature, conduct profiling, and voice. A few scientists have instituted the term ‘biometrics’ to depict the last class of biometrics.

Study on Torsional Behavior of RCT- Beams Strengthened with Glass FRP
Authors:-M.Tech Students Mohd Ahzam Imran, Asst. Prof.Vijay Kumar Meshram

Abstract-Environmental degradation, increased service loads, reduced capacity due to aging, degradation owing to poor construction materials and workmanships and conditional need for seismic retrofitting have demanded the necessity for repair and rehabilitation of existing structures. Fibre reinforced polymers has been used successfully in many such applications for reasons like low weight, high strength and durability. In the present work experimental study was conducted in order to have a better understanding the behavior of torsional strengthening of solid RC flanged T-beams. An RC T-beam is analyzed and designed for torsion like an RC rectangular beam; the effect of concrete on flange is neglected by codes. In the present study effect of flange part in resisting torsion is studied by changing flange width of controlled beams. The other parameters studied are strengthening configurations and fiber orientations. The aim of present work is to determine quantitatively the effectiveness of GFRP to be used as external lateral reinforcements to flanged T-beams subjected to torsion. Experimental results obtained from GFRP strengthen beams are compared with un-strengthen control beams. The study shows remarkable improvement in torsional behavior of all the GFRP strengthens T-beams. The experimentally obtained results are validated with analytical model presented by A. Deifalla and A. Ghobarah and found in good agreement.

Well Productivity Optimization
Authors:-MBA. Jorge Vargas

Abstract-Determine, optimize, implement, and follow up operational strategies, designs and engineering, to obtain efficient and maximized well intervention programs and their artificial lifting systems through the acquisition of information related with fluids, bottom hole pressures, pressure restoration factors, and optimum well operating conditions.

Productivity-Collaboration and Integration of Functional Processes in Companies of the Oil and Gas Sector
Authors:-MBA.Jorge Vargas

Abstract-Productivity Collaboration and Integration of Functional Processes in Companies in the Oil and Gas Sector, to develop and professionalize the “Collaboration Centers” to follow up and manage factors, scenarios, current and future operating conditions of the operation and its processes and workflows (exploration, exploitation design, reservoirs, drilling, completion, production, workover, surface facilities, construction, logistics, transport, maintenance, safety, occupational health and the environment).

Application of Double Ribbed Twisted Tapes in Heat Transfer Enhancement of Tubular Heat Exchanger
Authors:-M. Tech. Scholar Umesh Kumar Yadav, Asst. Prof. Saumitra Kumar Sharma

Abstract-Nowadays, heat exchangers with twisted-tape inserts have widely been applied for enhancing the convective heat transfer in various industries such as thermal power plants, chemical processing plants, air conditioning equipment, refrigerators, petrochemical, biomedical and food processing plants. In general, twisted tape insert introduces swirl into the bulk flow which consequently disrupts a thermal boundary layer on the tube surface. Recently, the use of twisted tape with cuts and holes becomes popular due to their thermal performance improvement in comparison with other types of twisted tape and several studies have been carried out on these types of modified twisted tape. This work aims to present a numerical model for heat transfer intensification in a heat exchanger tube equipped with novel V-cut twisted tape. The effects of different cut ratios (0.6<b/c<1.25) on the turbulent flow characteristics and thermal performance of the system will be investigated over the Reynolds number range from 4000 to 12000. All the simulation will be performed for fully developed turbulent flux in the Reynolds number range with uniform heat flux of 5000 W/m2.The numerical results of heat transfer (Nusselt number, Nu), pressure drop (friction factor, f) and enhancement Performance Factor in a tube with twisted tapes (V-Cut) were reported in the study.

Study and Optimization of Defects in Casting Used in Foundry with the Use of Six Sigma Methodology
Authors:-M. Tech. Scholar Shubham Verma, Asst. Prof. Vivek Singh, Prof. Rajesh Rathore, Asst. Prof. Virendra Dashore

Abstract-Casting industries play an important part in the manufacturing industry. Complex form and size goods are created in a single procedure that cannot be produced in other manufacturing methods. Because the other method requires more than one step to transform a raw material into a finished product. The casting’s quality should be maintained without flaws throughout production. This is not feasible since we cannot achieve a 100% accuracy rate. However, some quality control instruments and methods may assist to decrease the proportion of faults. The primary goal of this study is to minimize the shrinkage fault that occurs in the External Bearing Ring of ductile cast iron manufactured in Pithampur, Indore’s premier casting Renuka factory. From the industry we collect the four months data of production and production defects data in product casting. The data was gathered from the industry over a six-month period, and the flaws were discovered using the Six-Sigma DMAIC (Define, Measure, Analyse, Improve, Control) method. Quality control tools are used at various phases of the DMAIC method to detect and control problems. In addition, the Taguchi method is used to generate the L9 orthogonal array from the Minitab programme. Finally, the optimum solution is developed and recommended to the industry for defect reduction.

Blockchain in the KYC Process – A Case Study
Authors:-Abhishek Oberoi, Bhargav Patel, Anas Mansuri

Abstract-This paper deals with the appropriateness of the blockchain technology to improve existing KYC procedures, which are often described as lengthy, costly and cumbersome. Moreover, similar identification processes need to be carried out repeatedly for several institutions, which creates considerable inefficiencies and avoidable costs. The use of a blockchain design with smart contracts offers the possibility to avoid redundant workflows and entails several benefits such as enhanced security, trust and flexibility. This illustrates that the blockchain technology, which is still in a maturing phase, has the potential to play an important role in streamlining and (to some extent) automating current KYC processes. In terms of security, trustworthiness or customer satisfaction, the technology may offer game changing opportunities (not only) in the realm of authenticated user identification or digital identity management.

A Review on Heavy Metal Pollution of Holy River Ganga
Authors:-Dr. Pushpraj Singh

Abstract– The Ganga, is one of the most sacred and worshipped river of India, is regarded as the cradle of Indian civilization. Ganga River is a source of life but contamination of water is the major threat in today’s India. The industrial, municipal and agricultural wastes contain large amount of organic and inorganic materials and itleads to water pollution, which contains, variable amounts of heavy metals, some of them are potentially toxic and may affect human health and health of aquatic system. Many natural and anthropogenic sources caused heavy metal pollution into water. The concentrations of heavy metals determined were more than the maximum admissible and desirable limit when compared with the National and International organizations like CPCB (Central Pollution Control Board), ISI (Indian Standard Institution), ICMR (Indian Council of Medical Research), WHO (World Health Organization) and USEPA (United States Environmental Protection Agency). Exposure to heavy metals has been linked to chronic & acute toxicity developing retardation, neurotoxicity, kidney damage, various cancers, liver damage, lung damage, fragile bones and even death in instances of very high exposure. The major objective of this review paper is the finding of the work carried out by the many scientists, environmentalists and researchers in the past on the heavy metal pollution of holy river Ganga.

Autonomous Energy-Efficient Wireless Sensor Network Platform for Home/Office Automation
Authors:-Syed Ghouse Mohiuddin, Mr. Dargah Akbar Hussain, Mohd Anas Ali

Abstract- The Self-driving car is an autonomous robot that navigates to its destination without human operator. The aim of this project is to make an efficient LIDAR sensing system for Self-driving cars that is capable of mapping its surroundings, navigating through the path, and reaches the destination automatically. Through scan matching, the robot detects a previously visited location and creates one or more loop closures along its path. To plan a path through an environment effectively a probabilistic roadmap (PRM) identify an obstacle-free path from a start to an end point, the PRM method employs a network of connected nodes. The obstacle locations given in the Map are used to link the nodes. The findings are shown on a low-cost Autonomous RC Robot that runs on the ROS Kinetic running on a Raspberry Pi and YDLIDAR X2 in the front top part. This low-cost autonomous bot is equipped with capabilities such as Simultaneous Localization and Mapping, Path Planning and Following, allowing it to autonomously reach its destination once it is marked on the map.

Crop Infection Detection Using Yolo
Authors:-Satwik Ram Kodandaram, Kushal Honnappa, Parikshith H, Sandesh, 5 Kushal C

Abstract-Agriculture is the backbone of a country. It is important to note that without agriculture, there is no economic growth in the country. As Technology has improved a lot and improving a lot day by day, these technologies can be utilized in farming and agriculture so that there will be maximum utilization of crops and less wastage of crops. To achieve this, we need to come across a few challenges. Which crops can be grown depending on certain weather conditions? Identification of disease in crops so that we can prevent it and maximum yield of crops. Prevention is better than cure the famous quote says. Artificial Intelligence is one of the greatest inventions, using AI we can train the machine with images to detect disease in crops. The problem of the underutilization of crops can be achieved. This paper proposes a model for implementing crop infection detection and maximum yield of crops using Convolution Neural Networks (CNN) and You Look Only Once(YOLO).

Detection of Sickle Cell Anemiafromblood Smeared Images Using CNN Algorithmin Image Processing
Authors:-Lecturer Dinesh kumar S.

Abstract-Human blood consists of 3 kinds of major cells: Red blood cells, White blood cells and blood platelets. Erythrocyte malady could be a cluster of disorders that affects hemoglobin, the molecules in red blood cells that delivers element to cells throughout the body. This is known as sickle cell anemia. In sickle cell anemia, the blood contains unusual hemoglobin molecules referred to as hemoglobin S, which misshapes red blood cells into a reaping hook, or crescent shape. Sickle cell anemia is a hereditary form of anemia in which mutated hemoglobin distorts the red blood cell into sickle shaped cells due to low oxygen levels. Signs and symptoms of erythrocyte malady i.e., sickle cell disease typically begin in infancy. Detection of sickle cell anemia emphasizes the analysis for accurate disease diagnosis. It is being done using CNN algorithm in image processing.To perform the segmentation of the images, techniques such as Plane Extraction, Arithmetic operations, Linear distinction Stretching, bar graph feat and world Thresholding and Gray Level Co-occurrence Matrix employed for classification.

An Efficient Lidar Sensing System for Self-Driving Cars
Authors:-Syed Ghouse Mohiuddin, Mr. Dargah Akbar Hussain, Mohd Anas Ali

Abstract-The Self-driving car is an autonomous robot that navigates to its destination without human operator. The aim of this project is to make an efficient LIDAR sensing system for Self-driving cars that is capable of mapping its surroundings, navigating through the path, and reaches the destination automatically. Through scan matching, the robot detects a previously visited location and creates one or more loop closures along its path. To plan a path through an environment effectively a probabilistic roadmap (PRM) identify an obstacle-free path from a start to an end point, the PRM method employs a network of connected nodes. The obstacle locations given in the Map are used to link the nodes. The findings are shown on a low-cost Autonomous RC Robot that runs on the ROS Kinetic running on a Raspberry Pi and YDLIDAR X2 in the front top part. This low-cost autonomous bot is equipped with capabilities such as Simultaneous Localization and Mapping, Path Planning and Following, allowing it to autonomously reach its destination once it is marked on the map.

Autonomous Energy-Efficient Wireless Sensor Network Platform for Home/Office Automation
Authors:-Shaik Mohammed Shahed, Mohd Abdul Sattar, MohdAnas Ali

Abstract-Smart homes and workplaces can aid people in living and working more comfortably with WSNs. Sensors, microcontroller, radio, and antenna are used in these applications to regularly detect, data from a dispersed network of low-power, low-cost, highly energy-efficient electronic platforms to a distant host station for pre-processing and transmission. To address future Internet-of-things (IoT) application requirements, an integrated photovoltaic panel with a rechargeable battery and a power-efficient architecture is provided, which necessitates a large number of interconnected wireless networks being designed and implemented to be energetically self-sufficient.

Bio-Geography Based Page Prediction Using Web Mining Feature
Authors:-Trivene Khede, Dr. Avinash Sharma

Abstract-Website is god place to reach the audience of any field. Many of companies are using this platform for different business. Retaining a web visitor on website depends on available content and intelligence of site. This paper has developed a intelligent model that can predict the web page by understanding the behavior of the user. Biogeography optimization genetic algorithm was used to predict the web page as per past user visits. This work uses web content and web log feature of the website for evaluating the fitness value of genetic algorithm chromosomes. Experiment was done on real dataset with different size. Result shows that proposed model has improved values of different evaluation parameters.

Optimization of Hybrid Renewable Energy Systems (HRES) Using PSO
Authors:-M.Tech. Scholar Anit Kumar Vaishya, Prof. Vinay Pathak

Abstract-Present paper aims to discuss scope and limitations of photovoltaic solar water pumping system. Components and functioning of PV solar pumping system are described. In addition, review of research works of previous noteworthy researchers has also been done. Irrigation is well established procedure on many farms in world and is practiced on various levels around the world. It allows diversification of crops, while increasing crop yields. However, typical irrigation systems consume a great amount of conventional energy through the use of electric motors and generators powered by fuel. Photovoltaic energy can find many applications in agriculture, providing electrical energy in various cases, particularly in areas without an electric grid. This thesis proposes a single stage grid interactive solar powered switched reluctance motor (SRM) driven water pumping system with an efficient control technique. The control of proposed system provides the proficient maximum power point technique (MPPT) tracking and motor drive control with bidirectional power flow between the photovoltaic (PV) array and single phase grid. It has harmonics components elimination, improved dynamic performance and a DC offset rejection capability compared to other control. A PV feedforward term is also incorporated in developed control to enhance the dynamic performance of the system and to minimize the size of DC link capacitor with improved MPPT performance. The novel scheme of fundamental switching of SRM drive over its maximum operational time (when the grid is present) makes system efficient and reliable. An improved perturb and observe (P&O) based maximum power point tracking (MPPT) algorithm is used in this system to minimize the undesirable losses in a PV array specially under varying insolation levels. The proposed control is tested on a developed prototype and its suitability is authenticated through simulated and test results under various conditions.

Home Automation Based on IOT
Authors:-Ankita Jaiswal, Mr. Shailendra Singh Bhalla

Abstract- Home automation in order to help maintain comfortable living conditions within a home. One can achieve home automation by simply connecting home appliance electrical devices to the internet or cloud storage. The reason for this surge demand of network enabled home automation is reaching the zenith in recent days for its simplicity and comparable affordability. Platforms based on Internet of Things help to connect to the things surroundings everyone so that one can find it easy to access anything and everything at any time and place in a user friendly manner using custom defined portals. The most significant ones are the thermal comfort, which is related to temperature and humidity, followed by the visual comfort, associated with air quality. The proposed design uses the platform for collecting and visualizing monitored data and remote controlling of home appliances and devices. The selected platform is very flexible and user-friendly. The most significant ones are the thermal comfort, which is related to temperature and humidity, followed by the visual comfort, associated with air quality.

Security Issues in Internet of Things
Authors:-Hardika Juneja

Abstract- Internet of things is used everywhere in every place today be it home, office or a company at large. Our whole lives are becoming dependant on this emerging technology and we are developing and progressing due to such great advancements in this field. Scientists thought that year 2015 would be an important year marked in the history for the development of IOT but then the increased issues in the security issues of IOT caused this pause in this advancement. Media was already ready to expose the real picture of the security issues behind IOT out in the public, but they were proved wrong. IOT security is a big issue today but at the same time it should not stop you from building your IOT applications, although testing and security has an important role but then we can always look out for feasible solutions rather than stopping the people and ourselves from launching new IOT applications. Security related problems in IOT are an important issue that needs to be solved, we need to find out properly what the problem is and then apply the most effective solution to solve the issue. Here an attempt is made to find out all such problems and then identify their particular solutions. Some security issues that are discussed here are Encrypting the data, Authentication of information, Side-channel Attacks, Hardware Issues, Public Perception and Vulnerability to Hacking.

A Comparative Study on Maximum Power Point Tracking Techniques for Utility Grid Connected Photovoltaic Systems using ANFIS and INC Method
Authors:-M. Tech. Scholar Mr. Aravind Khote, Asst. Prof. Ms.Shalini Goad

Abstract- It is a well-known fact that the dependency of non-renewables sources needs to be reduce to deal with global warming. Solar energy is one such option which is in abundance in India. Solar PV cell are utilised to trap this energy and convert it to electrical energy. The PV cell has the ability to convert near about of 20 % of solar energy to electrical energy. The output of PV cell depends on solar irradiation and panel temperature and panel terminal voltage, based on which MPP can be attained. Hence work is to be done to achieve that point operation for MPPT.This work presents a comparative study between two maximum power point tracking (MPPT) methods in MATLAB/Simulink program that are incremental conductance method and genetic algorithm-based method. The study is performed with variable irradiation and temperature. On simulation, the results obtained are found to give boost converted output voltage of 502.13 V for ANFIS MPPT method and 501.50 V for INC MPPT method. In addition, the output power of boost converter for variable irradiation is found out to be 92.26 KW for ANFIS and 90.41 KW for INC respective only comparison results, ANFIS has clear upper hand over P&O method in terms of performance.

Brain Tumor Detection and Segmentation Using Nobel Approach of Soft Computing
Authors:-Research Scholar Asif Manzoor Qadri, Asst. Prof. Shaveta Bala

Abstract- These days one of the major concerns for human life is the disease of cancer. The growth of cancer patients is increasing day by day. There are many reasons behind the cause. There are two different kinds of brain tumors which are benign type and malignant type. Benign tumor feature is that it increase in size very slowly and do not spread to neighboring tissues while malignant tumors increase is size very fast and possibly spread to other nearby organs. For treatment of brain tumors different methods are used like radiotherapy, chemotherapy and many more. Treatment of brain tumor is dependent on accurate detection, type, age, location, size and experience of physician. In the present proposed work an intelligent system is designed with the use of soft computing techniques to automatically detect brain tumor present in the human brain. The proposed technique will filter the input image and then segments the image. After this process different features are extracted to find whether the tumor is present or not in this image. The proposed technique will be compared with other well known technique to find the worthiness of proposed brain tumor detection technique.

Cloud Computing in Banking Sector – A Case Study
Authors:-Abhishek Oberoi, Yash Dave, Bhargav Patel, Mohammed Anas

Abstract- The advent of cloud computing has changed the way it meets the requirements of IT. Cloud Computing has emerged as a new era in IT and is high on the agenda of all CIOs. Many banks now use cloud technology to achieve their various goals. Cloud technology provides business models that deliver new customer experience, efficient collaboration, improved marketing speed and improved IT efficiency. Using cloud computing banks can create a flexible and fast banking environment that can respond quickly to the needs of a new business. This article provides a useful insight into how cloud computing can be used in the banking industry, the various business models associated with it, and the challenges the banking industry faces in adopting this technology.

Review Article to Road Ways Pavements Design and Soil Penetration Analysis Using FEM
Authors:-M. Tech. Scholar Ritu Bhalavi, Asst. Prof. Mohit Verma

Abstract- Because of a substantial volume of commercial vehicles likely to use facility, the pavement structure has to receive careful consideration in design and choice of materials forming the pavement. Pavement costs constitute a significant proportion of total cost of highway facility. Hence, great care is needed in selecting right type of pavement and specification for the various courses that make up the pavement. The choice of pavement type, whether flexible or cement concrete, therefore, has to be very carefully exercised. Pavement associated traffic safety factors include skid resistance, drainability against hydroplaning, and night visibility. Cement concrete pavement has distinct initial advantage over bitumen pavement in this regard, as surface texturing forms integral part of the normal construction practice for such pavements. They also have superior night visibility by virtue of their lighter colour. Poorly designed and constructed concrete pavements are known to have very long service life. The cement concrete road constructed in the country in the past, though extremely limited in length, have an excellent service track, having given good service under condition much sever than those for which they are originally intended.

Review Paper on Solar Seawater Desalination by Using Reverse Osmosis
Authors:-Prof. K. S. Kamble, Shivam Pawar, Shubham Sawant, Siddhant Narkar, Prathamesh Rane

Abstract- Desalination plants are providing very effective solution to meet the required demand of drinking water from saline water. It focuses on design and modelling of portable solar based Reverse Osmosis (RO) desalination plant. The proposed plant is run by a stand-alone Solar system with battery storage. The total energy requirement of the plant is estimated to predict the capacity of solar panel, sizing the charge controller, power supply, and storage system. Purification of saline water using solar powered desalination methods is an efficient solution to the water scarcity at ships, which represents a promising sustainable solution of desalination plants.

Cloud-Agnostic Solutions for Multi-Biometric Systems: A Java-Based Approach
Authors:-Dr. Vinayak Ashok Bharadi

Abstract- This paper presents a cloud-agnostic architecture for managing multi-biometric systems, focusing on scalability, modularity, and interoperability. Building on Manchana’s 2020 research, the framework leverages Java-based design patterns, including Singleton and Factory, to enable seamless deployment across multiple cloud platforms. The proposed solution facilitates dynamic workload distribution and device management, addressing the challenges of real-time biometric processing in resource-constrained environments. The results demonstrate enhanced scalability and adaptability, with the framework supporting up to 100,000 biometric records and ensuring efficient system performance under high loads.

DOI: 10.61137/ijsret.vol.7.issue5.712

The Concept of ZFS for Long-Term Biomedical Imaging Data Storage

Authors: Chathurika Ranasinghe, Dineth Weerakoon, Malsha Bandara, Thivanka Gunawardana

Abstract: Biomedical imaging systems generate large volumes of sensitive data that must be securely stored, reliably retrieved, and retained for long durations to meet regulatory, clinical, and research demands. ZFS, a high-integrity, copy-on-write file system with integrated volume management, has emerged as a viable solution for long-term imaging storage in healthcare and biomedical research institutions. This review explores the suitability of ZFS for managing medical imaging archives highlighting its built-in features such as end-to-end checksumming, atomic snapshots, native encryption, and tiered storage capabilities. The paper examines ZFS's alignment with regulatory requirements like HIPAA, GDPR, and FDA 21 CFR Part 11, and discusses how its auditability, snapshot lifecycle management, and disaster recovery features help ensure compliance and data integrity. We delve into ZFS performance tuning for imaging workloads, including optimizations using ARC, L2ARC, SLOG, and record size configuration, which are critical for high-throughput radiology and pathology systems. Integration with PACS, RIS, and AI processing pipelines is reviewed, along with real-world deployments in clinical and research environments. Operational challenges such as resource overhead, secure deletion limitations, and administrative complexity are addressed, alongside emerging trends like object storage extensions, support for storage-class memory, and container-native workflows. Through this comprehensive review, ZFS is positioned not only as a technically robust and scalable imaging storage platform, but also as a strategic foundation for future-proof, compliant biomedical data management.

DOI: https://doi.org/10.5281/zenodo.15847617

Evaluating The Impact Of Remote Product Teams On Software Delivery Timelines: A Case Study Of U.S. SaaS Companies Post-2020

Authors: Omon ENI, Arun K Menon

Abstract: The COVID-19 pandemic fundamentally transformed the operational landscape of U.S. Software-as-a-Service (SaaS) companies, forcing rapid adoption of remote-first product management practices. This study examines the impact of distributed product teams on software delivery timelines through a comprehensive analysis of 127 U.S.-based SaaS companies that transitioned to remote operations between March 2020 and December 2021. Using mixed-methods research combining quantitative performance metrics and qualitative interviews with product managers, this investigation reveals significant variations in delivery performance based on organizational adaptation strategies, communication frameworks, and asynchronous workflow implementations. Key findings indicate that companies implementing structured asynchronous decision-making processes experienced 23% faster feature delivery times, while organizations lacking formal remote collaboration frameworks saw 31% longer development cycles. These results contribute to the growing body of literature on distributed software development and provide actionable insights for product management practitioners navigating the post-pandemic digital workplace.

DOI: http://doi.org/10.5281/zenodo.17044243

Optimizing Hybrid Unix CRM Infrastructure Using Salesforce Flows, Omni-Channel Automation, And AI-Driven Service Intelligence

Authors: Gurpal Mann

Abstract: Hybrid Customer Relationship Management (CRM) infrastructures are increasingly critical in enterprises that balance cloud agility with on-premise reliability. This review examines the role of Salesforce Flows, Omni-Channel automation, and AI-driven service intelligence in optimizing CRM operations within hybrid Unix/Linux environments. It highlights how Salesforce Flows streamline cross-platform workflows, how Omni-Channel automation enables unified and consistent customer engagement, and how AI enhances decision-making through predictive analytics and autonomous orchestration. Integration frameworks, performance optimization strategies, and real-world industry applications in finance, healthcare, retail, and telecommunications are explored in depth. A comparative analysis of Salesforce against other CRM platforms such as Microsoft Dynamics 365, Oracle CX Cloud, and SAP Customer Experience underscores Salesforce’s flexibility and forward-looking AI capabilities. The review also discusses future trends, including self-healing systems, zero-trust security, and generative AI, which will further shape the evolution of hybrid CRM environments. Ultimately, the study demonstrates that enterprises leveraging Salesforce’s automation and AI capabilities alongside Unix/Linux reliability can achieve secure, scalable, and customer-centric CRM infrastructures.

DOI: https://doi.org/10.5281/zenodo.17368364

 

AI-Powered CTI And Salesforce Omni-Channel Integrated With Hybrid Unix Systems For Seamless Enterprise Communication Flows

Authors: Balvinder Deol

Abstract: In today’s enterprise landscape, seamless and intelligent communication flows are critical for delivering superior customer experiences. This review examines the integration of AI-powered Computer Telephony Integration (CTI) and Salesforce Omni-Channel with hybrid Unix/Linux infrastructures to achieve secure, scalable, and context-aware customer engagement. It highlights how CTI has evolved from basic telephony management to AI-driven workflows incorporating speech recognition, sentiment analysis, and predictive routing. Salesforce Omni-Channel is explored as a unified engagement hub that orchestrates voice and digital interactions across multiple channels, ensuring consistency and efficiency. The role of Unix/Linux systems as reliable, secure backends supporting telephony services and middleware integration is emphasized, particularly in hybrid architectures.The article discusses middleware and API-driven frameworks as enablers for interoperability, while addressing performance optimization strategies such as load balancing, elastic scaling, and AI-driven orchestration. Industry applications in finance, healthcare, retail, and telecommunications are examined, illustrating real-world benefits of these integrations. Comparative analysis with other CRM platforms—Microsoft Dynamics 365, Oracle CX Cloud, and SAP Customer Experience—underscores Salesforce’s strengths in flexibility, AI capabilities, and hybrid adaptability. Future research directions include the adoption of generative AI, autonomous self-healing communication systems, edge computing for real-time optimization, and security-first communication models. By combining Salesforce’s cloud-native intelligence with Unix/Linux reliability, enterprises can deliver customer-centric communication flows that are resilient, secure, and adaptive to evolving business needs.

DOI: https://doi.org/10.5281/zenodo.17368515

 

Implementing Apache Tomcat And JBoss Middleware For Salesforce AI Agents Across Hybrid Multi-Cloud Enterprise Environments

Authors: Tejinder Sandhu

Abstract: The integration of Salesforce AI agents across hybrid multi-cloud environments is redefining the enterprise Customer Relationship Management (CRM) landscape. Middleware solutions, particularly Apache Tomcat and JBoss, play a critical role in enabling seamless interoperability between Salesforce’s AI-driven services and diverse enterprise systems hosted on Unix/Linux and cloud infrastructures. This review explores how Tomcat’s lightweight architecture and JBoss’s enterprise-grade features collectively support API management, workflow orchestration, transaction integrity, and scalability. It also examines performance optimization strategies, industry-specific applications, and comparative insights with alternative middleware platforms such as MuleSoft, WebSphere, and Apache Kafka. Furthermore, the study highlights future directions, including AI-driven orchestration, edge computing integration, generative AI for middleware automation, and security-first architectural models. By providing a comprehensive analysis, this review underscores how middleware technologies are foundational for deploying Salesforce AI agents in complex enterprise ecosystems, ultimately enabling organizations to achieve resilience, compliance, and customer-centric innovation in the digital age.

DOI: https://doi.org/10.5281/zenodo.17368656

 

Unlocking Synergies Between AI-Powered Salesforce CRM Engineering And Traditional Unix/Linux Hybrid Infrastructure For Enterprise Growth

Authors: Gopal Sehrawat

Abstract: The rapid evolution of enterprise IT demands solutions that combine innovation with stability, intelligence with security, and customer engagement with operational efficiency. This review explores the convergence of AI-powered Salesforce Customer Relationship Management (CRM) platforms with traditional Unix/Linux hybrid infrastructures, highlighting how enterprises can unlock synergies to drive sustainable growth. Salesforce CRM, augmented by artificial intelligence, provides predictive analytics, intelligent automation, and personalized customer experiences. Unix/Linux, long valued for its reliability, scalability, and compliance-ready frameworks, continues to power mission-critical systems across industries such as finance, healthcare, retail, and manufacturing. The integration of these two domains creates a hybrid ecosystem where Salesforce delivers intelligent front-end capabilities while Unix/Linux ensures robust back-end processing and governance. The article examines technical challenges including legacy compatibility, data synchronization, and regulatory compliance, before presenting strategic frameworks such as architectural blueprints, governance models, automation-driven orchestration, and cloud–on-premises balance. Case studies illustrate how different industries leverage this synergy for measurable business value. Future trends—edge computing, quantum-safe cryptography, AI-driven automation, and containerized microservices—are identified as critical enablers for next-generation hybrid ecosystems. By aligning AI-powered Salesforce CRM with Unix/Linux infrastructures, enterprises can enhance customer engagement, optimize operations, and maintain compliance while future-proofing their digital strategies.

DOI: https://doi.org/10.5281/zenodo.17519957

 

Leveraging Red Hat Satellite And Salesforce Einstein Copilot For Secure, Scalable Hybrid Cloud CRM Automation Environments

Authors: Anjali Kathuria

Abstract: The convergence of Red Hat Satellite and Salesforce Einstein Copilot offers enterprises a transformative approach to hybrid cloud CRM environments, combining robust infrastructure management with AI-driven customer engagement. Red Hat Satellite provides centralized provisioning, configuration, patching, and lifecycle management for Linux-based servers, ensuring security, compliance, and operational resilience across on-premises and cloud platforms. Salesforce Einstein Copilot delivers predictive analytics, workflow automation, and personalized CRM insights, enabling proactive and intelligent customer engagement. This review explores architectural synergies, automation frameworks, security considerations, and performance optimization strategies necessary for integrating these technologies within hybrid cloud ecosystems. Real-world applications across finance, healthcare, retail, and manufacturing illustrate measurable improvements in operational efficiency, regulatory compliance, and customer satisfaction. Challenges such as legacy system integration, data synchronization, multi-cloud security risks, and AI workload management are analyzed alongside strategic frameworks for seamless integration, governance, and orchestration. The findings highlight that hybrid CRM environments leveraging Red Hat Satellite and Salesforce Copilot can achieve scalable, secure, and automated operations while maintaining high availability and cost-efficiency. Emerging trends in AI, edge computing, and self-healing infrastructure are expected to further enhance these ecosystems, providing enterprises with a blueprint for sustainable digital transformation, innovation, and growth.

DOI: https://doi.org/10.5281/zenodo.17520055

 

AIX, Solaris, And Modern Linux: Building Future-Ready Infrastructure For Salesforce LWC And AI-Enhanced Cloud Experiences

Authors: Rajat Bhardwaj

Abstract: – Enterprises are increasingly adopting hybrid IT architectures that combine legacy UNIX/Linux systems with cloud-based CRM platforms and AI-driven workflows. AIX, Solaris, and modern Linux distributions provide reliability, scalability, and security for mission-critical applications, while Salesforce Lightning Web Components (LWC) and AI-enhanced services such as Salesforce Einstein enable intelligent customer engagement, predictive analytics, and workflow automation. This review explores strategies for integrating these technologies, focusing on architectural models, performance optimization, security, compliance, and automation frameworks. Case studies across finance, healthcare, retail, and manufacturing illustrate practical applications, highlighting both operational benefits and technical challenges. Emerging trends, including edge computing, self-healing systems, AI-driven infrastructure optimization, and quantum-safe security, are examined to provide future-ready guidance. The review emphasizes how enterprises can leverage hybrid integration to achieve scalable, secure, and intelligent CRM environments, fostering innovation, operational resilience, and enhanced customer experiences.

AI-Powered Clinical Decision Support Systems Using Physiological Data From Connected Medical Devices

Authors: Shaurya Tomar

Abstract: The integration of Artificial Intelligence (AI) with the Internet of Medical Things (IoMT) has birthed a new generation of Clinical Decision Support Systems (CDSS) capable of real-time physiological monitoring. This review article examines the architectural and methodological shift from rule-based alerts to predictive AI engines that process high-frequency data from connected medical devices. We investigate the core pipeline of these systems—from signal denoising at the Edge to deep learning-based feature extraction in the Cloud—and evaluate how these technologies address the "data deluge" currently overwhelming clinical staff. The article provides a detailed taxonomy of AI methodologies, including Supervised Learning for diagnosis, Reinforcement Learning for treatment optimization, and the rising role of Explainable AI (XAI) in fostering clinician trust. Key clinical use cases are explored, ranging from early sepsis detection in the ICU to the management of chronic conditions like diabetes through closed-loop artificial pancreas systems. Furthermore, we address the critical barriers to adoption, specifically focusing on data quality, clinical alarm fatigue, and the "interoperability gap" between siloed medical systems. Finally, the review analyzes the 2025 regulatory landscape, including the impact of the EU AI Act and the FDA's evolving SaMD guidelines. We conclude that while AI-powered CDSS offers unprecedented potential for proactive care, its success depends on maintaining a "Human-in-the-Loop" approach, ensuring that AI augments rather than replaces clinical expertise.

DOI: http://doi.org/10.5281/zenodo.18159591

Optimizing Enterprise Resource Planning Performance Through Machine Learning–Based Predictive Maintenance Models

Authors: Navya Kulshreshtha

Abstract: The rapid evolution of Industry 4.0 has necessitated a transition from traditional administrative Enterprise Resource Planning (ERP) to "Intelligent ERP" systems that leverage real-time operational data. This review article investigates the optimization of ERP performance through the integration of Machine Learning (ML)–based Predictive Maintenance (PdM) models. While traditional maintenance strategies within ERP namely reactive and preventive often lead to unplanned downtime or resource wastage, ML-based PdM offers a data-driven alternative that predicts equipment failure before it occurs. This study synthesizes current literature regarding the architectural integration of Industrial Internet of Things (IIoT) sensors with ERP modules, such as Asset Management, Production Planning, and Materials Management. We categorize the predominant ML methodologies including Supervised Learning for fault classification, Deep Learning (LSTM and GRU) for Remaining Useful Life (RUL) estimation, and Unsupervised Anomaly Detection evaluating their specific contributions to enterprise-level efficiency. The review highlights how PdM-driven insights directly optimize ERP Key Performance Indicators (KPIs) by reducing maintenance costs, streamlining spare parts inventory through Just-in-Time (JIT) procurement, and enhancing Overall Equipment Effectiveness (OEE). Furthermore, the article addresses critical implementation challenges, such as data silos, scalability, and the "black box" nature of AI models. By analyzing the synergy between predictive analytics and resource orchestration, this review provides a roadmap for researchers and practitioners to build resilient, self-optimizing industrial ecosystems. The findings suggest that the integration of ML-PdM is no longer a peripheral technical upgrade but a core strategic necessity for modern enterprise resource management, enabling a shift from descriptive reporting to prescriptive action.

DOI: http://doi.org/10.5281/zenodo.18159637

A Conceptual Framework For Managing Invisible Risks In Cloud-Enabled Internet Of Things Environments

Authors: Kabir Sehgal

Abstract: The seamless integration of the Internet of Things (IoT) with Cloud Computing has revolutionized data-driven ecosystems, yet it has simultaneously birthed a sophisticated class of "Invisible Risks." Unlike traditional cyber threats that target known software vulnerabilities or hardware weaknesses, invisible risks emerge from the systemic complexity, algorithmic opacity, and "gray-zone" interactions inherent in distributed architectures. These risks including data shadowing, logic flaws in cross-protocol interoperability, and the silent propagation of algorithmic bias—often bypass conventional signature-based detection systems, remaining latent until they manifest as catastrophic failures. This review article proposes a comprehensive Conceptual Framework for Managing Invisible Risks by synthesizing multi-disciplinary research across cybersecurity, system engineering, and cognitive psychology. We categorize these risks across a four-tier architecture: the Perception, Network, Cloud, and Application layers. Each layer is analyzed to identify the "invisibility triggers" that obscure threat vectors from administrative oversight. Furthermore, the paper evaluates contemporary risk assessment methodologies, advocating for a transition from static monitoring to dynamic observability through the use of Bayesian Networks, Digital Twins, and Chaos Engineering. We propose a proactive management strategy anchored by three pillars: Zero Trust Architecture (ZTA), AI-driven Automated Governance, and Edge Intelligence. The framework aims to bridge the "transparency gap" in Cloud-IoT environments, providing researchers and practitioners with a structured roadmap to identify, quantify, and mitigate hidden threats. Finally, the article discusses future directions, including the role of blockchain for provenance and quantum-resistant cryptography, emphasizing that the future of Cloud-IoT security depends on our ability to make the invisible visible.

DOI: http://doi.org/10.5281/zenodo.18159648

Implementing High-Performance Data Integration Pipelines For Analytics And Reporting In Complex Enterprise Landscapes

Authors: Nagender Yamsani

Abstract: High-performance analytics and reporting within large enterprises depend on data integration pipelines that can operate reliably across fragmented operational systems, governance boundaries, and performance constraints. As organizations expand their digital footprints, analytical workloads increasingly rely on structured data access mechanisms that balance scalability, control, and responsiveness. This study examines the design and implementation of enterprise data integration pipelines that support analytics and reporting in complex operational environments. It focuses on the interaction between API-mediated data access, SQL-based service layers, and transformation workflows that mediate between transactional systems and analytical consumers. The paper argues that sustainable analytics capability emerges from architectural coherence rather than isolated tooling choices. Evidence from large-scale enterprise environments suggests that pipelines emphasizing modular integration layers, performance-aware data transformations, and governed access models achieve higher analytical reliability and operational resilience. Empirical patterns indicate that separating data exposure concerns from transformation logic improves system adaptability while reducing downstream reporting volatility. The study introduces a conceptual framework that aligns integration architecture, operational performance controls, and governance enforcement into a unified model for enterprise analytics enablement. By articulating practical design trade-offs and architectural patterns grounded in real operational constraints, this work contributes a structured perspective that supports both applied implementation and future academic inquiry. The findings provide a foundation for understanding how disciplined integration engineering can enhance analytical trust, scalability, and long-term maintainability in enterprise reporting systems.

Automated Classification of Large-Scale Network Configurations Using Machine Learning and Semantic Vectorization

Authors: Narendra Reddy Burramukku

Abstract: The rapid expansion of large-scale computer networks has introduced significant complexity in managing diverse network configurations. Manual classification and analysis of configurations are time-consuming, error-prone, and increasingly infeasible in dynamic environments. This paper presents a novel framework for automated classification of large-scale network configurations using machine learning combined with semantic vectorization. Network configuration files are first pre-processed and transformed into high-dimensional vector representations that capture both semantic and hierarchical relationships among configuration commands, protocols, and policies. These embeddings serve as input to supervised machine learning models, including Random Forest, Support Vector Machines, and Neural Networks, enabling accurate classification of network devices, roles, and compliance profiles. Experiments are conducted on real-world enterprise, cloud, and synthetic network datasets, comprising thousands of configuration files with diverse structures and device types. Results demonstrate that the proposed framework significantly outperforms traditional rule-based and feature-based approaches, achieving up to 94.5% F1-score with graph-based embeddings. Scalability analysis indicates the method can efficiently handle large volumes of configurations while maintaining high accuracy. The study highlights the effectiveness of semantic vectorization in capturing complex configuration semantics and facilitating robust automated classification. This framework provides a foundation for intelligent, scalable network management, supporting proactive policy enforcement, misconfiguration detection, and operational efficiency. Future work explores real-time classification, integration with network orchestration systems, and transformer-based embeddings for richer semantic representation.

DOI: https://doi.org/10.5281/zenodo.18383730

 

Cloud-Native Network Monitoring: Tools, Architectures, And Best Practices

Authors: Narendra Reddy Burramukku

Abstract: Cloud-native networking has transformed modern enterprise and service provider infrastructures by enabling highly dynamic, scalable, and distributed environments based on microservices, containers, and multi-cloud deployments. While these architectures improve agility and resource efficiency, they also introduce significant challenges in maintaining visibility, performance assurance, and security. Traditional network monitoring approaches are inadequate for handling ephemeral workloads, high-velocity telemetry, and complex inter-service communications. This paper presents a comprehensive review of cloud-native network monitoring, focusing on monitoring tools, architectural frameworks, and operational best practices suitable for modern cloud-native ecosystems. It systematically analyzes open-source and commercial monitoring solutions, including Prometheus, Grafana, OpenTelemetry, ELK Stack, and cloud-provider-native platforms, highlighting their roles in metrics collection, logging, and distributed tracing. The study further examines key architectural models such as centralized, distributed, and hybrid monitoring frameworks, as well as agent-based and agentless approaches, emphasizing scalability, fault tolerance, and integration with orchestration platforms like Kubernetes. Best practices for observability design, metric selection, alerting, and automated incident management are discussed in the context of DevOps and Site Reliability Engineering (SRE). Additionally, the paper identifies critical challenges related to scalability, hybrid and multi-cloud observability, security, and privacy, while outlining emerging research directions including AI/ML-driven monitoring, autonomous remediation, and edge observability. By consolidating tools, architectures, and operational strategies, this paper provides a structured reference for researchers and practitioners seeking to design, deploy, and optimize effective cloud-native network monitoring systems.

 

 

Distributed System Automation Using Infrastructure-As-Code And CI/CD

Authors: Meera Krishnan

Abstract: Distributed systems have evolved into the foundational infrastructure supporting modern digital services, enabling cloud-native applications, microservices-based architectures, big data platforms, and globally distributed enterprise ecosystems. By leveraging geographically dispersed computing resources, distributed systems provide scalability, high availability, and fault tolerance. However, as system scale and architectural complexity increase, operational management becomes significantly more challenging. Organizations must address issues related to dynamic resource provisioning, configuration consistency, dependency management, automated scaling, continuous updates, and security enforcement across heterogeneous environments. Traditional manual administration approaches are insufficient for handling such complexity, often leading to configuration drift, deployment failures, environment inconsistencies, and increased operational risk. To overcome these limitations, automation-driven paradigms such as Infrastructure-as-Code (IaC) and Continuous Integration/Continuous Deployment (CI/CD) have emerged as essential components of modern distributed system management. Infrastructure-as-Code transforms infrastructure provisioning and configuration into machine-readable, version-controlled definitions, enabling reproducibility, consistency, and rapid environment replication. Simultaneously, CI/CD frameworks automate application build, testing, validation, and deployment processes, ensuring continuous delivery of reliable software updates across distributed architectures. The integration of IaC and CI/CD establishes a unified automation pipeline in which infrastructure and application lifecycles are managed cohesively, promoting operational efficiency, traceability, and resilience. This review comprehensively examines the conceptual foundations, architectural frameworks, and practical implementations of integrating IaC with CI/CD for distributed system automation. It analyzes declarative and imperative infrastructure models, automated deployment strategies, immutable infrastructure principles, and cloud-native orchestration practices. Furthermore, the paper evaluates the operational benefits of automation—including scalability optimization, reduced configuration drift, accelerated recovery, enhanced collaboration, and improved compliance management—while critically assessing associated challenges such as state management complexity, security vulnerabilities in automation scripts, pipeline debugging difficulties, and cost governance concerns. In addition, emerging paradigms such as GitOps, policy-as-code, DevSecOps, AI-driven pipeline optimization, and self-healing infrastructure mechanisms are discussed to highlight the ongoing evolution toward intelligent and autonomous system management. By synthesizing current practices and research directions, this review provides a structured perspective on how integrated automation frameworks enhance reliability, scalability, and security in distributed environments, while outlining future research opportunities aimed at achieving more adaptive, predictive, and cost-efficient distributed system operations.

DOI: http://doi.org/10.5281/zenodo.18677076

Enterprise-Scale Application And Network Modernization Strategies

Authors: Vivek Menon

Abstract: Enterprise-scale modernization has evolved from a strategic option to an operational imperative in the contemporary digital economy. Organizations that continue to rely on legacy applications and rigid, hardware-centric network infrastructures face mounting challenges in sustaining competitiveness, operational efficiency, and security resilience. Rapid technological innovation, evolving customer expectations, intensifying cloud-native competition, and increasingly sophisticated cyber threats are collectively reshaping the enterprise IT landscape. Systems originally designed for stability and centralized control now struggle to support modern requirements such as real-time analytics, elastic scalability, distributed workforce enablement, continuous deployment cycles, and AI-driven automation. As a result, modernization initiatives are becoming foundational to long-term enterprise sustainability and growth.This review provides a comprehensive examination of enterprise modernization strategies across both application and network domains. On the application side, modernization approaches such as cloud migration, microservices adoption, API-first design, containerization, DevOps integration, and Infrastructure as Code (IaC) are analyzed for their impact on scalability, agility, and maintainability. Transitioning from monolithic architectures to modular, loosely coupled systems enables organizations to accelerate innovation cycles, improve fault isolation, and enhance operational efficiency. Simultaneously, adopting cloud-native frameworks facilitates resource elasticity, cost optimization, and global service delivery.From a networking perspective, the paper explores the transformation from traditional perimeter-based infrastructures to software-defined networking (SDN), software-defined wide area networking (SD-WAN), and Zero Trust security architectures. These paradigms introduce centralized control, programmable network policies, identity-based access enforcement, and continuous monitoring capabilities. By decoupling control and data planes and embedding security mechanisms directly into network layers, enterprises can enhance visibility, reduce lateral threat movement, and support distributed cloud environments.Furthermore, the review evaluates automation-driven infrastructure and AI-enabled operations (AIOps) as critical enablers of modernization at scale. Automated provisioning, predictive monitoring, anomaly detection, and self-healing systems reduce operational complexity while improving service reliability. Governance frameworks, compliance integration, risk mitigation strategies, and cultural transformation are also discussed as essential components of successful modernization initiatives.The paper highlights both the tangible benefits—such as improved agility, cost reduction, resilience, and competitive advantage—and the inherent technical and organizational challenges associated with modernization, including data migration complexity, legacy integration risks, skill gaps, and change resistance. Finally, emerging trends such as AI-native architectures, edge computing integration, 5G-enabled connectivity, platform engineering, and sustainable green IT practices are examined as shaping forces of next-generation enterprise IT ecosystems.Overall, enterprise-scale modernization is framed not merely as a technological transition but as a strategic, organizational transformation that redefines how enterprises design, secure, deploy, and manage digital systems in an increasingly complex and interconnected world.

DOI: http://doi.org/10.5281/zenodo.18677080

AI-Powered Identity And Access Management Systems

Authors: Elena Volkova

Abstract: In the modern era of decentralized workforces and cloud-native architectures, the traditional perimeter-based security model has collapsed, giving way to identity as the new primary security boundary. Identity and Access Management (IAM) systems are now the gatekeepers of enterprise resources, yet they face an unprecedented volume of sophisticated attacks, ranging from credential stuffing to advanced social engineering. This review examines the paradigm shift toward AI-Powered Identity and Access Management Systems. By integrating Machine Learning (ML) and Deep Learning (DL) algorithms, modern IAM frameworks have transitioned from static, rule-based engines to dynamic, risk-aware ecosystems. These systems leverage User and Entity Behavior Analytics (UEBA) to establish granular baselines of normal activity, allowing for the real-time detection of anomalies that signal compromised credentials or insider threats. This article categorizes current AI methodologies, including the use of neural networks for biometric authentication and reinforcement learning for adaptive access control policies. We explore how AI mitigates "entitlement creep" and automates the complex lifecycle of identity governance. Furthermore, the review addresses the integration of AI within Zero Trust Architectures (ZTA), where continuous authentication replaces the "authenticate once, access forever" model. By synthesizing recent research and industrial deployments, this paper provides a strategic roadmap for the next generation of identity security. The findings suggest that while AI significantly enhances the precision of access decisions, its success depends on data privacy, model transparency, and resilience against adversarial manipulation.

DOI: https://doi.org/10.5281/zenodo.19491983

AI-Augmented Zero Trust Security Architectures

Authors: Tharushi Silva

Abstract: The rapid evolution of cyber threats, coupled with the increasing complexity of distributed computing environments, has necessitated a paradigm shift in enterprise security strategies. Zero Trust Security Architecture (ZTSA), which operates on the principle of “never trust, always verify,” has emerged as a robust framework to mitigate modern attack vectors. However, traditional Zero Trust implementations often struggle with scalability, dynamic policy enforcement, and real-time threat adaptation. The integration of Artificial Intelligence (AI) into Zero Trust frameworks introduces a transformative approach by enabling adaptive, context-aware, and predictive security mechanisms. AI-augmented Zero Trust architectures leverage machine learning, behavioral analytics, and automation to continuously evaluate trust levels, detect anomalies, and enforce granular access controls. This review explores the convergence of AI and Zero Trust, highlighting architectural components, implementation strategies, and challenges. It further examines how AI enhances identity verification, network segmentation, and threat intelligence, while addressing issues such as data privacy, model bias, and operational complexity. By synthesizing current research and industry practices, this article presents a comprehensive overview of AI-driven Zero Trust systems and their role in securing next-generation digital infrastructures.

DOI: https://zenodo.org/records/19491997

Published by:

Revisiting Factor Models After 2020: Machine Learning, Factor Stability, and Investment Performance

Uncategorized

Authors: Oksana Anatolyevna Malysheva

Abstract: The new financial market environment after 2020, due to the COVID-19 shock, unprecedented monetary interventions, and increased macroeconomic uncertainty has cast new doubt on the reliability and persistence of the traditional models of asset pricing factors. Although classical factor models have traditionally been the basis of portfolio construction and the management of risk, there has been mounting evidence that factor stability can be lost in the face of structural regime changes. The paper reexamines previous post-2020 period factor models with specific focus on occupation of factor permanency and incremental importance of machine learning methods in explaining and predicting investment outcomes. The main aim of this paper is to evaluate whether the traditional risk factors hold their values and are economically significant beyond 2020 and to test the possibility of machine learning-based methods to predict better than traditional linear models to forecast the portfolio performance and results. The study builds standard factor portfolios with a wide equity universe over the post-2020 time sample, and it compares their performance to machine learning-based models that help to identify the nonlinear links and time-varying interactions between firm characteristics. The analysis methodology will be a combination of benchmark linear factor regressions with supervised machine learning algorithms, such as ensemble-based algorithms, applying consistent training and validation to these algorithms. Factor stability is determined with the help of rolling-window estimation and structural change analysis and investment performance with the help of risk-adjusted returns measures and transaction cost-adjusted portfolio performance. The results show that the stability and persistence of a number of conventional factors significantly decreased after 2020 and became more sensitive to market regimes. The models of machine learning have shown greater out-of-sample, and risk-adjusted returns, and the returns are not uniform across factors. The research provides empirical data on post-crisis factor behavior and provides a practical direction of applying machine learning in the integration of factored investment strategies in changing market conditions.

Published by:

How much does it cost to publish a paper in a journal

Uncategorized

Research scholars pursuing master’s or doctorates degree have to publish their research work in some reputed international journal. But most scholars have no funds from college or universities to complete their degree work, hence worried for How much does it cost to publish a paper in a journal. To resolve such doubts this article help to understand few of below question-related to the publication.

How much does it cost to publish a research paper in India ?

Normal International journals cost 1000 to 2500 Rs, as per indexing journal charges get increases to 10,000Rs to 25,000 Rs. Although some journals are free but publishing a paper for beginners is tough.

Cost of publishing a research paper in India ?

Submit Paper Now

Paper Publication Charges

So cost of publication range from zero rupees to 30,000 Rs as per indexing of sites.

How much does it cost to submit a paper to a journal?

Submitting a paper in almost all journals is free, but some journals charge nominal fees of 300Rs to 1500Rs. Paid submission journals just wants to restrict authors to submit good content only.

How much does it cost to publish a paper?

Publishing a paper includes publication charges or article processing charges, certificate charges (if applicable), hard copy charges (Optional), formatting or language improvement charges. So the sum of all types of charges is the total cost of the paper publication.

How much does it cost to publish a research paper?

Publishing a research paper or review paper is not vary. It totally depends on where you want to publish a paper.

How much does it cost to publish a scientific paper?

Any kind of research material has some comparison in terms of a scientific paper, publication of such kind of content is also depend on publisher policy. The cost normally varies from zero USD to 2200 USD.

I hope this article help scholar to answers of how much it cost to publish a research paper in the journal, before submitting a paper consult your guide/mentor so his experience helps you to get the good publication in less price and time. Scholars should prepare a good paper with abstract having clear understanding of work with conclusion showing output of paper or research. People need low publication journal can directly submit paper at ijsret.com@gmail.com.

Published by:

IJSRET Volume 7 Issue 4, July-Aug-2021

Uncategorized

Prediction of Rainfall Using Machine Learning Algorithms
Authors:- Ishwarya G, Santhrupthi M B, Shanthi B, Asst. Prof. Varsha N

Abstract-Prediction of rainfall using precipitation forecast is significant as substantial precipitation can prompt numerous debacles. The expectation assists individuals with taking preventive measures and besides the forecast ought to be exact. There are two sorts of expectation transient precipitation forecast and long haul precipitation. Forecast generally transient expectation can gives us the precise outcome. The fundamental test is to construct a model for long haul precipitation forecast. Substantial precipitation expectation could be a significant disadvantage for geology division since it is firmly connected with the economy and lifetime of human. It is a reason for cataclysmic events like flood and dry spell that square measure experienced by people across the world every year. Precision of precipitation articulation has decent significance for nations like India whose economy is fundamentally reliant upon horticulture. The powerful idea of air, applied math procedures neglect to give reasonable precision to precipitation proclamation. The forecast of precipitation utilizing AI methods may utilize relapse. Expectation of this undertaking is to offer non-specialists simple admittance to the methods, approaches used in the area of precipitation forecast and give a near report among the different AI strategies.

Contingency Analysis
Authors:- Asst. Prof. Vishal V. Mehtre, Shubham Saket, Siddharth Gautam

Abstract- A dependable, continuous supply of electrical energy is a necessary component of today’s advanced societies. Hence to maintain the power system security and reliablity is one of the inmportant tasks for system engineers. The security assessment is an important task because it provides information related the state of the system in the case of a contingency. Contingency like sudden loss of line or generator or increase/decreased in power demandcause voilation of bus voltage or transmission line overloading. Hence to keep the system safe and continuity of supply contingency analysis is important. Different terms related to contingency including FDLF is reviewed in this paper.

Safety Perception Survey as a Tool for Improving the Safety Climate in a Manufacturing Industry
Authors:- S Vashishta

Abstract- Safety in the Steel industry has always been an area of concern. Though significant improvements in safety awareness of the employees have been achieved along with deployment of safer equipment & technology, incidents still continue to occur and the industry still continues to lag behind most other high risk industries as far as level of safety climate is concerned.A safety climate survey aims to measure employee’s perceptions on the status of safety at their workplace & can help in identifying the gaps in various Safety Management System elements, thereby providing management with useful insights to plan their strategies.The paper aims to measure the Safety Climate of a Steel manufacturing Plant through a Safety perception survey. A questionnaire-based survey was considered as it is one of the most frequently used and widely accepted methods for measuring safety climate. A questionnaire was developed consisting of 5 safety climate components with 44 questions and was administered to 102 employees (Supervisors, technicians, workers, etc.). Various Statistical tools like mean, SD, Variance, Cronbach’s alpha & Split half correlation, and one-way ANOVA test were applied for doing various types of analysis and arriving at conclusion.

Automatic Questionnaire Generator
Authors:- Asst. Prof. G.Vijaya Lakshmi, P. H Saraswathi, B.Reshmi, T. Sai Santoshi, P. Sunith Kumar

Abstract- This Project is based on the work carried out on bulk amount of text. Learning through the internet becomes popular that facilitates learners to learn anything, anytime, anywhere from the web resources. This system can find the self-learning gaps of learners and improve the progress of learning. The manual question generation takes much time and labor. Therefore, automatic question generation from learning resources is the primary task of an automated questionnaire generator. Stop words and unwanted words are identified by NLP techniques. In order to perform machine learning on text, the data is transformed into vector representations such that we can apply numeric machine learning. Representing data numerically gives us the ability to perform meaningful analytics and also creates the instances on which machine learning algorithms operate. Hence feature extraction is done by using Spacy module and performing One-Hot-Encoding. Naïve Bayes Classifier is used to train the data and the model performance is evaluated on the basis of metrics such as accuracy, precision, f1 score, recall, confusion matrix. The purpose of this project is to generate and assess the questions automatically in 3 formats (True/False, Choose the correct answers, Cloze Questions) when given text as an input.

The Operation of the “Quiz Test Application Using Python Studio
Authors:- UG Student Amar Bansode, UG Student Rakesh Navghan, UG Student Santosh Birajdar, UG Student Anil Nivargi, UG Student VikasBhadkumbe, Lecturer Snehal Shinde

Abstract- Purpose: This paper shows the working of python App this quiz application. Also, it gives the processes which happen in the supply quiz industry.The main aim of this research paper is quiz app software and technology. The analysis should include market and users need in order to be able to fabricate the quiz application and make it available for users as a helpful utility and entertaining application. This research paper is mainly motivated to solve certain problems related, for example, to disable student and in general to collaborative learning. In general the Project & Title will be selected from various sources and send it. to the top like the Project Title along with a bud ese new of the Project in a document called Project Abstract The HOD will accepts the Project and allows the student to proceed and start working on the Project In the middle of the Project designing the HOD also makes a proudest to the Student in and the Sample Code of any medal as well. And at the final the Studies has porcine the cells Documents like Project Final Document. Source Code and all the content in a Compact Dock (CD) and to the HOD along with printed and copy The HOD will see all these documents and finishes the Project Review and enters the Marks to the College records Thus we selected e-Project Submission as our Project to reduce.

Coupled Inductor Based Single-Stage Boost Inverter
Authors:- M. Tech. Scholar Mr. Ravikumar Wakade, Prof. R. M. Bhombe, Prof. Yogesh Likhar

Abstract- Renewable power systems as distributed generation units often experience big changes in the inverter input voltage due to fluctuations of energy resources. Often, a front-end boost converter is added to step up the dc voltage when the energy re- sources are at a weak point. However, when a very high boost gain is demanded, the duty cycle may come to its extreme and large duty cycles causes serious reverse-recovery problems. This paper proposes a novel single-stage boost-type inverter with coupled inductor. By introducing impedance network, including coupled inductor, into the three-phase bridge inverter, and adjusting the previously forbidden shoot-through zero state, the converter can realize a high boost gain and output a stable ac voltage. The single-stage operation of the converter may lead to improved reli-ability and higher efficiency. Theoretical analysis, simulation, and experimental results are presented to verify good performance.

Covid 19 Detection from Chest X-Ray Images Using Deep Learning
Authors:- Sanket Dhobale, Aniket Kandrikar, Sumeet Manapure, Aniket Zullarwar

Abstract-The Covid-19 first occurs in Wuhan, China in December 2019. After that the virus spread all around the world and at the time of writing this paper the total number of confirmed cases are above 170 million with over 3.8 million deaths. Machine learning algorithms built on radiography images can be used as a decision support mechanism to aid radiologists to speed up the diagnostic process. CNN is a Deep Learning algorithm, we are using Convolution Neural Network(CNN) to identify the different features of the x ray images or we can say to visualize the most discriminating regions of the input images. We are taking images of chest x-rays from github. The application of deep learning in the field of COVID-19 radiologic image processing reduces false-positive and negative errors in the detection and diagnosis of this disease and offers a unique opportunity to provide fast, cheap, and safe diagnostic services to patients.

Handwritten Equation Solver Using Convolutional Neural Network
Authors:- Shweta V. Patil, Apurva S. Patil, Harshada C. Mokal, Asst. Prof. Mr. Swapnil Waghmare

Abstract-At present, there is advancement in every sector of technology. Machine learning and deep learning technologies are important parts nowadays. Many fields such as artificial intelligence, handwritten recognition, robotics, and many uses these techniques. Convolution Neural Network is used for classification, image processing, and segmentation. In our project, we had developed a web application that solves handwritten equations. It captures handwritten equations via camera and the character recognition takes place through preprocessing of image. Segmentation along with the character classification is the most difficult part. Convolution Neural Network is used for classification of character that makes the equations as a string. String operations performed on each recognized equation for the solution. As based on earlier modules of equation solver, we have added a module that provides a link for each solution. Hence, our implemented model is easy to access to solve complicated equations, and get precise output.

A Review Article NR Image Quality Assessment of Satellite Image Enhancement
Authors:- Harshil Jain, Asst. Prof. Hemant Amhia

Abstract- Satellite image enhancement is the technique which is most widely required in the field of satellite image processing to improve the visualization of the features. Satellite images are captured from a very long distance, so they contain too much noise and distortion because of atmospheric barriers. After capturing the image, some radiometric and geometric corrections are carried out on it but they are not sufficient for all the applications. It is very important to enhance the restored image before using it. In this paper, different methods for satellite image enhancement viz. contrast enhancement, resolution enhancement, edge enhancement, density slicing, digital mosaics and synthetic stereo images are discussed in detail, as well as experimental results of two techniques viz. contrast enhancement of multispectral color composite and IHS (Intensity, Hue, Saturation) transformation are shown.

MATLAB Simulation Based Reasonable Investigation of MPPT Methods for Cuk Converter Established Solar PV System to Connect to Utility Grid
Authors:- M. Tech. Scholar Dasharath Moyade, Asst. Prof. Dr. J. S. Shakya, Asst. Prof. S.S. Thakur, Associate Prof. C.S. Sharma

Abstract- In this paper presents a reasonable investigation of Maximum power point tracking system(MPPT) using a perturb and observe algorithm for Cuk DC-DC power converter based solar photovoltaic (PV) system to supply power to on grid.Cuk converter delivers an output voltage that may be less than or greater than input voltage. An imperativeimprovement of Cuk converter is a constant current at both the input and the output of the converter. Drawbacks of the Cuk converter are a high number of reactive components and high current stresses on the switch. The Cuk converter delivers a batter output voltage with reduced ripples and increase efficiency. MPPT methods are used in solar PV systems to extract the maximum power from the PV array under dynamic atmospheric circumstances. The electric power generated by solar panel, this power is regulated and it is required to constant power through the Cuk converter is used for improve to desirable voltage at solar panel. These methods are stimulated by MATLAB/Simulink program.

GASBE: A Graded Attribute-Based Solution for Access Control in Cloud Computing
Authors:- Piyush Kumar Jain, Prof. Rupali Bhartiya

Abstract- Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against un-trusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to un-trusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re- encryption, and lazy re-encryption.

Covid-19 Mask Detection
Authors:- Zuveriya, Ummehabeeba R, Asst. Prof. K B Drakshayini

Abstract- The COVID-19 epidemic has forced governments around the world to set limits on the transmission of the virus. A report shows that wearing the right face mask when in a public place and at work clearly reduces the risk of transmission. An effective and economical way to use learning tools to create a safe place to set up a device. With the ongoing epidemic, it is very important to have high quality applications and services designed to reduce risk. The COVID-19 epidemic is a catastrophe for mankind regardless of race, religion, gender and religion. The COVID-19 face mask detector uses in-depth reading techniques to effectively assess whether a person is wearing a face mask or not. Using a deep learning approach called the Convolutional Neural Network; you have found 98.6% accuracy. Cases where the mask is worn improperly are where the nose and mouth are partially covered as the mask is not worn.

IOT Based Disinfection and Sterilization using Temperature and Humidity
Authors:- Asst. Prof. Ms. M. Nalina Sangaviya, S. Lakshmanan, M. Pavithra, G. Sasireka, G. Vahini

Abstract- The Project is developed based on the Guideline for Disinfection and Sterilization in Healthcare Facilities, University of North Carolina Health Care System. Extrapolates quantitative data for ozone virucidal activity on the basis of the available scientific literature data for a safe and effective use of ozone in the appropriate cases and to explore the safety measures developed under the stimulus of the current emergency situation. Ozone is a powerful oxidant reacting with organic molecules, and therefore has bactericidal, virucidal, and fungicidal actions. At the same time it is a toxic substance, having abverse effects on health and safety. Instead of Ozone system, here we are proposed Temperature and Humidity based Disinfection and Sterilization system. Proposed system maintaining 37OC and 85% of Relative humidity at Disinfection and Sterilization area. Its use is being proposed for the disinfection of workplaces, public placeswith particular reference to the COVID-19 pandemic outbreak. Water mist is generated by Ultrasonic based mist maker and Temperature of the room is increased by heater attached with proposed system. It should be injected into the room that is to be disinfected until the desired Humidity and Temperature concentration is reached. After the time needed for the disinfection, its concentrations must be reduced to the levels required for the public safety. Here we are using Node MCU Esp8266 module to transfer status of the system to remote location. Electromagnetic relay is used to turn on and off the Ultrasonic humidifier and Heater.16*2 LCD display is used to display the notification to user side. The developed system improves the reliability and stability of Disinfection and Sterilization.

Performance of Telecommunications Tower During Seismic and Wind Loading Condition
Authors:- M. Tech. Scholar Shubham P Patel, Asst. Prof. Nirmal S. Mehta, Asst. Prof. Hiral V. Patel

Abstract- Four-legged self-supporting towers are commonly used in telecommunications around the world. In recent years, the communication industry has experienced considerable growth, resulting in the construction of a large number of towers to improve coverage area and network consistency. These towers play an important part in wireless communication networks, so their collapse in the event of a crisis is a big concern. As a result, when building these towers, harsh situations should be taken into account to the fullest extent possible. The effect of wind on four-legged self-supporting towers has been studied extensively in most studies. A study on models at differing heights with various bracing for earthquake and wind effects was carried out in this dissertation. Gust factor method is used to investigate the wind effect on the structure, and the modal analysis and response spectrum analysis are used to investigate the seismic effect on the structure. The results obtained from the above analysis are tabulated, compared and conclusions are drawn.

V.I.S- Vehicle Information App
Authors:-Sushant Gangwar, Siddhant Chaudhary, Swapnil Tyagi, Asst. Prof. Mr. Praveen Mishra

Abstract- With the ascent of populace and vehicles utilizations, it’s getting hard to keep up and distinguish vehicles in brief timeframe. Thus, such close to home data is accessible just to government access and a few organizations who pay government to share that information. To add straightforwardness numerous organizations unveiled such information with government instruments, for example, SMS administration partnered to government for data or by utilizing cloud served information. Such applications or instruments are named as Vehicle Information Systems which are utilized to discover data with respect to any vehicle either enlisted or is obscure to information on use and spot. Such frameworks are gainful in dealing with the information base of vehicle enrolled effectively. These frameworks are broadly utilized by enormous organizations to keep up the information of vehicles left in their place. Likewise utilized by Police and other protection association to find dubious things. Large numbers of openly accessible such administrations or virtual products got obsolete or beaded with the ascent of OS refreshes. IOS has just scarcely any such applications coming up and generally individuals who use IOS need to depend on SMS administration or government sites. Despite the fact that administration give data on solicitation however it doesn’t share entire information of the specific vehicles. That data is sub-separated in divisions of individuals who are mentioning them which implies any authority like Police can have entire subtleties improbable ordinary individuals because of protection and security reasons. With concentrating of different devices and thoughts that exposed in this framework, we get some answers concerning deserted devices, for example, OCR, Credential Recognition and so on These instruments were great however didn’t functioned admirably over various OS and subsequently Hybrid Variants were presented in investigation which fairly adjusted the exhibition to a degree. In 2019, Indian Government made the stride of digitalization and reported API of such information which was simply accessible to confided in specialists of India. Programming interface apparatus took the large jump in optimizing and accessibility of information with no security break. With the writing and articles, we presumed that distinctive OS administrations are there yet just a couple of administrations act in each OS. To fill the gap of administrations we choose to make a help that will safely and productively work cross-stages.With the ascent of populace and vehicles utilizations, it’s getting hard to keep up and distinguish vehicles in brief timeframe. Thus, such close to home data is accessible just to government access and a few organizations who pay government to share that information. To add straightforwardness numerous organizations unveiled such information with government instruments, for example, SMS administration partnered to government for data or by utilizing cloud served information. Such applications or instruments are named as Vehicle Information Systems which are utilized to discover data with respect to any vehicle either enlisted or is obscure to information on use and spot. Such frameworks are gainful in dealing with the information base of vehicle enrolled effectively. These frameworks are broadly utilized by enormous organizations to keep up the information of vehicles left in their place. Likewise utilized by Police and other protection association to find dubious things. Large numbers of openly accessible such administrations or virtual products got obsolete or beaded with the ascent of OS refreshes. IOS has just scarcely any such applications coming up and generally individuals who use IOS need to depend on SMS administration or government sites. Despite the fact that administration give data on solicitation however it doesn’t share entire information of the specific vehicles. That data is sub-separated in divisions of individuals who are mentioning them which implies any authority like Police can have entire subtleties improbable ordinary individuals because of protection and security reasons. With concentrating of different devices and thoughts that exposed in this framework, we get some answers concerning deserted devices, for example, OCR, Credential Recognition and so on These instruments were great however didn’t functioned admirably over various OS and subsequently Hybrid Variants were presented in investigation which fairly adjusted the exhibition to a degree. In 2019, Indian Government made the stride of digitalization and reported API of such information which was simply accessible to confided in specialists of India. Programming interface apparatus took the large jump in optimizing and accessibility of information with no security break. With the writing and articles, we presumed that distinctive OS administrations are there yet just a couple of administrations act in each OS. To fill the gap of administrations we choose to make a help that will safely and productively work cross-stages.

Solar Power Inverters
Authors:- Meghana S

Abstract- An inverter converts the DC generated by the solar panels to AC which is used by the electrical grids. Inverters are the example of a class of devices called power electronics that regulate the flow of electrical power.

Concentrated Solar Power
Authors:- Nisarga MR

Abstract- Integration technology has become important due to the world’s energy requirements which imposed significant need for different methods by which energy can be produced or integrated, in addition to the fact that integration of solar energy into non-renewable sources is important as it reduces the rates of consuming of non-renewable resources hence reduce dependence of fossil fuels. Basically, there are two types of solar power generation used in integration with grid power – concentrated solar power (CSP) and photovoltaic (PV) power. CSP generation, sometimes known as solar thermal power generation, is much like conventional thermal power generation that converts thermal energy (steam) into electricity.The direct current is then converted to alternating current, usually using inverters and other components, in order to be distributed onto the power grid network.

A Study of HRM and Digital Transformation in Organization’s Strategy and Policies: Reshaping HR Space
Authors:- Phd. Scholar Miss. Sunakshi Verma, Dr. Neeti Rana

Abstract- A digital strategy is essential for “Future-proofing” a Company That wants to stay ahead of the competition.This research paper emphasized the importance of artificial intelligence and digital technologies in HR management: Its review three areas related to Digital Transformation in Organization” Digital workforce”, ”Digital Workplace” and “Digital Management & employee”, its showing most important issues at present are cloud Computing, Internet of things (IoT), exabytes of data and artificial intelligence(AI).The objective of this study “Digitalisation + Transformation = Productivity” this everyone can agree that under pressure and confusion, digital transformation involves a number of important changes, time-saving, opportunity, reshape and reinforce their roles within their organization. The paper illuminates to explore the use of technology-driven tools in HR professionals to use these innovations in positive ways. In this study I worked primary and secondary data has been collected through structured Questionnaire and Secondary data was collected from business magazines, Case study, Published data, books, e-journals, newspapers- the novelty of this study consists in exploring the HRM digitalization process in the organization.

Plant Disease Detection Using Neural Network
Authors:- Ms. Harsha Gupta, Aakash Bhatt, Adarsh Verma, Anshu Kr. Singh, Tushar Bhatt

Abstract- When plants and crops are suffering from pests it affects the agricultural production of the country. Usually, farmers or experts observe the plants with an eye for the detection and identification of disease. But this method is often time processing, expensive and inaccurate. Automatic detection using image processing techniques provide fast and accurate results. This paper cares with a replacement approach to the development of a disease recognition model, supported leaf image classification, by the utilization of deep convolutional networks. Advances in computer vision present a chance to expand and enhance the practice of precise plant protection and extend the market of computer vision applications within the field of precision agriculture. a unique way of training and therefore the methodology used to facilitate a fast and straightforward system implementation in practice. All essential steps required for implementing this disease recognition model are fully described throughout the paper, starting from gathering images to make a database, assessed by agricultural experts, a deep learning framework to perform the deep CNN training. This method paper may be a new approach in detecting plant diseases using the deep convolutional neural network trained and finetuned to suit accurately the database of a plant’s leaves that was gathered independently for diverse plant diseases. The advance and novelty of the developed model dwell its simplicity; healthy leaves and background images are in line with other classes, enabling the model to distinguish between diseased leaves and healthy ones or from the environment by using CNN. Plants are the source of food on earth. Infections and diseases in plants are therefore a big threat, while the foremost common diagnosis is primarily performed by examining the plant body for the presence of visual symptoms [1]. As an alternative to the traditionally time-consuming process, different research works plan to find feasible approaches towards protecting plants. In recent years, growth in technology has engendered several alternatives to traditional arduous methods [2]. Deep learning techniques are very successful in image classification problems.

A Implementation of Digital Image Forgery using DWT and SIFT Features
Authors:- Research Scholar Chavi Rana, Asst. Prof. Gyanendra Kumar Singh

Abstract- The use of digital photography has increased over the last few years and this trend has opened the door for image forgery. Image forgery has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving images) Existing systems integrate block-based and key point-based forged detection in this work methods DWT extraction and SIFT Features with SLIC super pixel segmentation algorithms is proposed to detect the forgery area from the dataset. Existingwork can roughly indicate suspicious, forged areas. The proposed system approach reduces image debugging increase the accuracy and detects copy-moving image forgery region. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image forgery is proposed. This simulation executed in MATLAB simulation.

Detection of Digital Forgery Image using Discrete Wavelet Transform and SIFT Features Extraction
Authors:- M.Tech Scholar Deepali Pal, Prof. Amit Shrivastav

Abstract- Digital images have a very significant role in various fields like medical imaging, journalism, criminal and forensic investigations. Because of the widespread availability of photo editing software and tools, it becomes problematic to use the digital images in applications where their genuineness is of prime importance. Therefore, it is necessary to create forensic techniques which are capable of detecting the tampering in image. Most common operations that are involved in the creation of forged images are contrast enhancement, copy-paste forgery etc. In this paper, we present different techniques for detecting global contrast enhancement and copy-paste forgery. The proposed technique for the detection of contrast-enhanced image is based on contrast calculation. The use of digital photography has increased over the last few years and this trend has opened the door for image forgery. Image forgery has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving images) Existing systems integrate block-based and key point-based forged detection in this work methods DWT extraction and SIFT Features with SLIC super pixel segmentation algorithms is proposed to detect the forgery area from the dataset. Existing work can roughly indicate suspicious, forged areas. The proposed system approach reduces image debugging increase the accuracy and detects copy-moving image forgery region. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image forgery is proposed. This simulation executed in MATLAB simulation.

Design and Experimental Investigation of Thermal Performance of Different Heat Sink for High Power Led Lights
Authors:- Ravindra.H. Raut , Ass. Prof. S.S Jaware

Abstract- LEDs have been used in many products due to their longevity, more power saving, and higher lumens per watt. About 80% of the electrical power is wasted as heat or reductant heat, which increases the junction temperature of the LED’s. This increase in the temperature in the LED’S decreases the longevity and color of LED’S. Proper thermal management is required to remove this heat effectively. The heat sink design and usage of proper thermal interface materials for increasing the heat removal is required. In this paper, temperature increase in a LED fixture during a time interval with and without thermal interface material is measured and tabulated to find the effectiveness of the thermal interface material in removing more heat is studied. In addition, a simulation using Solidworks thermal simulation is done to validate the analytical thermal-time study results. The entire study provides a guideline for the design of LED high bays in the future and demonstrates the importance of the thermal interface materials in the design studied.

PSO and Automatic Finite Deterministic Algorithm for Secured Energy Efficient Routing in Wireless Sensor Network
Authors:- M.Tech. Scholar Diksha Jharbade, Prof. Amit Shrivastav

Abstract- 5G wireless sensor network (WSN) is a network of autonomous nodes used to monitor the environment. Energy competence or secure data transmission are measured as mainly imperative devise goals for WSN. With the increase in difficulty of workstation networks, the increase in network-based attacks has attracted consideration of different researchers from several fields. Therefore, many intrusion detection systems (IDS) have been implemented to address various aspects of complex safety, such as DoS, worms, viruses, malware, etc. IDS automation has been planned to recover realization of energy resourceful routing in wireless sensor networks in a secure manner. Automatic finite deterministic and particle swarm optimization (PSO) solutions for intrusion detection and data transmission performed in a secure manner by determining and following an optimized path Routing through the best path can recover overall presentation of sensor network in wireless technology and has been controlled through various indicators (such as power expenditure, capacity, network life, active nodes and dead nodes). In this work, threat model and safety objectives for secure routing in wireless network. This simulation executed in MATLAB simulation platform.

Consumer-Service Provider Connect
Authors:- Shrestha Sharma, Nabhya Jha, Nimal Nainan, Shweta Tripathi

Abstract- We have created an online portal that helps the users using it to either provide services or seek services.The main aim of this project is to create a system which connects consumers and service providers. The consumers and service providers can both post their targeted requirements and seek out each other. The jobs may include short or long term services. Consumers can browse for services and send requests to the service providers by filling the required details. The service provider who finds the details of the service in accordance with his/her schedule and is ready to provide the service will accept the request and will be assigned to the consumer. This will open a new window of opportunities for several people in situations where they cannot actively go out to seek jobs or cannot work consistently.

A Study of HRM and Digital Transformation in Organization’s Strategy and Policies: Reshaping HR Space
Authors:-Phd. Scholar Sunakshi Verma, Dr. Neeti Rana

Abstract-A Digital strategy is essential for “Future-proofing” a Company that wants to stay ahead of the competition.This research paper emphasized the importance of artificial intelligence and digital technologies in HR management: Its review three areas related to Digital Transformation in Organization” Digital workforce”, ”Digital Workplace” and “Digital Management & employee”, its showing most important issues at present are cloud Computing, Internet of things (IoT), exabytes of data and artificial intelligence(AI).The objective of this study “Digitalisation + Transformation = Productivity” this everyone can agree that under pressure and confusion, digital transformation involves a number of important changes, time-saving, opportunity, reshape and reinforce their roles within their organization. The paper illuminates to explore the use of technology-driven tools in HR professionals to use these innovations in positive ways. In this study I worked primary and secondary data has been collected through structured Questionnaire and Secondary data was collected from business magazines, Case study, Published data, books, e-journals, newspapers- the novelty of this study consists in exploring the HRM digitalization process in the organization.

Optimization of Functional Beverages made from Ginger Cumin and Honey
Authors:- Rasik R.Thkur, Nitish V Khanvilkar, Sayli N Kale, S.M. Lokhande, Amol Prakash Sonone

Abstract- Ginger and honey both have an excellent nutritional and medicinal property that is why the combination of both in the right proportion makes highly nutraceutical as well refreshing drinks. Energy drinks are widely consumed by adolescents as these claim to improve performance, endurance, and alertness. Looking at the contents in the energy drinks and their benefits, the industry may like to relook at what the consumers really need. We are developing the functional drink by using ginger, Cummins, honey with the addition of water to rehydrate. The present investigation was undertaken with the objective of standardizing the process for the preparation of the functional beverage product was evaluated for proximate analysis, sensory analysis, and storage condition. Beverage contain 13% Brix, 0.20 % Acidity, these parameters remain constant at cold storage for more than 30 days. We used honey in the product instead of sugar, jaggery, or any other artificial sweetener for better consumption for diabetic patients. Increased urbanization, rising disposable income, and growing health consciousness among the youth have increased the demand for non-carbonated drinks called energy drinks.

Using GIS to Assess the Hydropower Potential of a Run-of-River Small Hydropower Plant in Chamkhar River, Bhutan
Authors:- Dorji Letho, Leki Dorji, PhuntshoTashi, Jamyang Seldon

Abstract- Bhutan is a considered as a carbon negative country as forested sequestered more amount of CO2 as compared to the CO2 emission through variety of activities. Being the world’s only carbon negative economy, hydropower development continues to play a major role in Bhutan’s sustainable economic development.Clean energy sources such as hydropower, are crucial in combating global warming and the effects of it. Bhutan is blessed with one of the highest per capita hydropower potentials in the world and has only harnessed around 6.3% of its total hydropower potential so far. It also has numerous potential sites for small scale run-of-river hydropower, which have minimal adverse environmental impacts, in contrast to large scale hydropower plants. The limitations fostered to such development have been imposed by the inaccessibility physically to these locations, owing to the rugged terrain making a difficult to select an appropriate location, thus it could be partially solved and boosted by the use of GIS technology of ArcGIS tools. In using such tools, enable us to explore hydropower potentials in faster, cost effective and precise ways. This paper studies the location of the run-of-river small scale hydropower potential along the Chamkhar River in Bhutan. Ninety-eight potential locations were found under the criteria of the head, discharge and slope criteria out of which twenty-seven locations lied outside protected bounds. Of these only ten of them are further taken to get the most optimized location and this result can be refined by field studies to select the most optimized location among the potential ones.

Design & Fabrication of Sugar Globules Making Machine
Authors:- Associate Prof. N. H. Chahande, Amit H. Pall, Pranjali P. Zade, Akshay V. Nimje, Tushar K. Karwade

Abstract- As progress of Medical Science increasing day by day likewise the side effect of allopathic medicines are also being seen in the world. Looking to the adverse effect of allopathic medicines population of this era is moving towards the Ayurveda & Homeopathic Medicines because it is well known that adverse effect of homeopathic & Ayurveda medicines are quite low. Homeopathic globules are commonly used in clinical practice, while research focuses on liquid potencies. Sequential dilution and succession in their production process has been proposed to change the physico-chemical properties of the solvent(s).Various machines have been used over the years to prepare homeopathic medicines. Although these machines follow the same principles, i.e. energetically mixing the medicines and diluting them significantly, their mode of operation is different from each other.

Detection of Autism Spectrum Disorder Using Machine Learning
Authors:- Kruthi C H, Tejashwini H N , Poojitha G S, Shreelakshmi H S, Asst. Prof. Shobha Chandra K

Abstract- Autism spectrum Disorder (ASD) also known as Neuro-developmental disorder that affects people’s interaction, learning and communication skills. Despite the fact that identification of this syndrome can be done at any age, its symptoms typically appear in the first 2 years of life. Determining the autism traits through screening tests is extravagant and extensive. With the improvement of artificial intelligence and machine learning, autism can be detected at quite an early stage. However a number of studies have been done using different techniques, these studies did not provide any final conclusion about detecting autism traits among the people of age group 3 years and below. Hence the paper aims to present an autism prediction model using machine learning techniques and to develop a web application that could successfully predict autism traits of a person. In other words, this paper focuses on developing an autism screening application for detecting the autism spectrum disorder traits among the people of age 3 years and below. This project model was evaluated with AQ 10 dataset (1054 datasets) and 50 actual dataset collected from people with and without autism traits. The Analysis results showed that the proposed prediction model gives better results in terms of specificity, precision, sensitivity, accuracy and f1 score for both datasets.

IoT Based Air Pollution Monitoring System
Authors:- Ashwini, Anvitha Poojary, Anvitha U, Akshata Hedge, Prof. Dr. Mohideen Badhusha S

Abstract- Internet of Things (IoT) is a worldwide system of “smart devices” that can sense and connect with their surroundings and interact with users and other systems. Global air pollution is one of the major concerns of our era. Existing monitoring systems have inferior precision, low sensitivity, and require laboratory analysis. Therefore, improved monitoring systems are needed. To overcome the problems of existing systems, we propose a three-phase air pollution monitoring system. An IoT kit was prepared using gas sensors, Arduino IDE (Integrated Development Environment), and a Wi-Fi module. This kit can be physically placed in various cities to monitoring air pollution. The gas sensors gather data from air and forward the data to the Arduino IDE. The Arduino IDE transmits the data to the cloud via the Wi-Fi module. We also developed a Web front-end so that users can view and access relevant air quality data from the cloud.

The Multi-Phase Spatial Meta-Heuristic Algorithm for Public Health Emergency Transportation
Authors:- Fariba Afrin Irany, Arnav Iyer, Armin R. Mikler, Rubenia Borge Flores

Abstract- The delivery of Medical Countermeasures -MCMs for mass prophylaxis in the case of a bio- terrorist attack is an active research topic that has interested the research community over the past decades. The objective of this study is to design an efficient algorithm for the Receive Reload and Store Problem –RSS in which we aim to find feasible routes to deliver MCMs to a target population considering time, physical, and human resources and capacity limitations. For doing this, we adapt the p-median problem to the POD-based emergency response planning procedures and propose an efficient algorithm solution to perform the p-median in reasonable computational time. We present RE-PLAN, the Response PLan Analyzer system that contains some RSS solutions developed at The Center for Computational Epidemiology and Response Analysis (CeCERA) at the University of North Texas. Finally, we analyze a study case where we show how the computational performance of the algorithm can impact the process of decision making and emergency planning in the short and long terms.

A Review Article Hybrid Power System with Integration of Wind, Battery and Solar PV System
Authors:- Vijay Patre, Associate Prof. Dr. Manju Gupta

Abstract- As the race for global industrialization begin late in 18th century, the developing technology made humans to depend on energy, so as the energy crisis begins, in this modern era, electricity become a most essential need of human beings, from household to industrial work. So, the purpose of the project is to generate electricity without using non-renewable resources and pollution. Since, renewable standalone energy generation systems have disadvantages, which need to be overcame by hybrid systems. Wind and solar energy have being popular ones owing to abundant, ease of availability and convertibility to the electric energy. This work covers realization of hybrid energy system for multiple applications, which runs under a designed circuitry to utilize the solar and wind power. And a designed circuitry for more efficient results, and inverters to convert the electrical energy as per demand.

Face Mask Detector
Authors:- Keerthi Yaramala, Jamula Keerthi Sameera, Harshitha Yarlagadda, Bommina Naga Pranathi

Abstract- In this new era where we are experiencing a pandemic and people all around the world are advised to wear masks, some people are not used to it and are avoiding to wear masks. The motivation behind this projects is that if we can take help of AI to detect people wearing or not wearing masks in public places, it would be helpful to increase our safety. If deployed correctly, the mask detector could potentially be used to help ensure our safety.

Automation and Monitoring of Greenhouse
Authors:- Asst. Prof. Seema G.Bavachkar, Rutuja Upadhye, Mauyri Shinde, Sukanya Swami

Abstract-In traditional agriculture, farmers must regularly visit their farmland to measure various environmental parameters such as temperature, humidity, light intensity and soil moisture in order to grow the right crops on the right soil at the right time.Greenhouse cultivation, on the other hand, is a system in which a farmer grows crops in an ecological environment where all ecological parameters are adjusted according to the plant species. Greenhouse automation is a way for farmers to automatically monitor and control the greenhouse environment anytime, anywhere. In this article, the authors propose an automated greenhouse monitoring and control system that includes various sensors such as temperature sensors, moisture sensors, light sensors, and soil moisture sensors for harvesting.

Review Paper on Harsh Environmental Structural Health Monitoring
Authors:- Hossain Ahmed, Seifollah Nasrazadani, Shuai Ju

Abstract- Proper maintenance and continuous monitoring are essential for ensuring the safety of the structure. Many types of sensors are developed to monitor the degradations of the structure, especially in a harsh environment, to identify the structural defect at a preliminary stage. To consider the material as a sensor in a harsh environment should have the ability to withstand high temperatures or at a high vibration, electromagnetic interference, high strain, etc. The data acquisition technique and an optimum number of the sensor to get accurate data are a significant factor for SHM, especially at the harsh environment. This review will describe the different types of harsh environments and the suitable and application of reliable, high-efficiency sensors based on the harsh environment.

Geospatial Mapping of Flood Susceptibility via Multi-Criteria Analysis AHP and GIS: La Paz Basin, Baja California Sur., Mexico
Authors:- Prof. Joel Hirales-Rochin

Abstract- The research presents the multi-criteria analysis approach (MCA) to describe the effective use of geospatial techniques for the reduction of geohydrological risk and its relationship with urban territorial development at the local level, in the case of the La Paz Basin, Baja California Sur., Mexico. In addition, Geology is presented as a tool to identify areas of geohydrological risk, useful to determine the close relationship between the geological space and the sustainable urban development of a city. From this interaction, it is possible to respond to the growing demand for environmental and urban solutions. Today’s cities are characterized by rapid and poorly planned urbanization, which, together with climate change, has exacerbated the risk of flooding in urban and rural areas globally, resulting in devastating loss of human life and property.At the national, regional and local level where the study area is located, floods are one of the most susceptible geohydrological hazards. The objective of this research is to identify these areas of risk of susceptibility to flooding and to make known the factors that influence it, such as the growing number of new urban areas, which are not linked to an adequate analysis of the hydrological geographic environment and little knowledge of the main factors that control these risk conditions.The methodology was based on a characterization of the geological and hydrogeological conditions of the basin of the city of La Paz; Mexico. The methodology of the Analytical Hierarchy Process (AHP) applied to generate the flood susceptibility map was built based on thirteen influencing parameters, that is, elevation, slope, distance from the drainage network, geomorphology, drainage density, flow accumulation, rainfall, land use / vegetation, geology, stream power index, topographic moisture index, and topography curvature. All this, through geographic information systems (Arcgis). The results represent the first stage of a larger-scale project with the purpose of updating the knowledge of vulnerability and geo-hydrological risks of the study area. Therefore, it is possible to contribute new knowledge to be used in a sustainable growth of the city’s population, the improvement of current construction standards and the corresponding zoning to anticipate its development in an orderly manner. Finally, it is considered that this type of zoning of areas susceptible to risks (urban settlement scale) provides an analysis of the risk conditions where the citizen of any city can be located in his own community and know his own conditions of civil protection. Knowledge that currently most risk studies only offer large-scale results and a broader vision.

Structural Analysis of I-Girder Bridge and Comparison for Various Loading
Authors:- Mr. Abhijeet Fopase, Asst. Prof. Ishant Dahat

Abstract- I-beams and plate design in terms of the simple capital value of the superstructure, the advantages of the shape of the boxing beam, such as better appearance and reduced maintenance, may well deserve the evaluation of the boxing beam as an alternative for any bridge in the span range from 45 m to 100 m. For bridges with a significant curvature of the plan, box beams should always be considered. In particular, if more websites are introduced (than would be used with straps), thinner web panels will need more rigidity. Nevertheless, they may still have a lower shear stress limit and be less effective in bending. Wide compression flanges can also be less than fully effective due to bending considerations (plate beam flanges are usually fully effective). In this paper, various bridges of I-brothers are analyzed using BRIDGELINK software.

Effect of Depression on Functional Recovery – A Correlational Study
Authors:- Md. Zahir Uddin Akanda

Abstract- Study design and purpose: A quantitative and non experimental, correlational study was conducted in order to investigate the relationship between the Beck Depression Inventory (BDI) score and the Functional Independent Measure (FIM) score of the patients with Spinal Cord Injury. Objective: To find out Is there a relationship between BDI and FIM score? How strong is that relationship? What is the direction of the relationship (positive or negative)? Setting: Centre for the Rehabilitation of the paralysed (CRP) Spinal Cord Injury hospital indoor department: Chapain, Savar, Dhaka. Methods: Stratified – systematic random sampling was used to select the participants. Participants were individually interviewed using a semi structured questionnaire, the Functional Independent measure (FIM) and the Beck Depression Inventory (BDI). Results:The data were subjected to statistical analysis. Using a parametric Pearson test, a significant negative correlation (r=-0.3586, p<0.02, for two tailed hypothesis) between the FIM score and BDI score was found. The descriptive data calculated as percentages. Among the patients studied 20% had mild mood disturbance, 7% had borderline clinical depression, 33% had moderate depression, 20% had severe depression, and another 20% had extreme depression. Conclusion: Our results have important implications for the treatment of patients with SCI. the findings indicate that the patients BDI score were negatively related with FIM scores. In our opinion these data justify the provision of a psychological service in every hospital where patients with SCI are treated. Further research is required to explore the reason behind this correlation.

A Study of Setback Effect on Multi-Storied Building with Mass and Stiffness Irregularity
Authors:- M. Tech. Scholar Nimant N Chopada, Asst. Prof. Arjun M Butala

Abstract- This research concerned with the compare to regular building with setback building with consider various irregularities on the seismic response of structure. Architects typically suggest irregular structures for the sake of the structure’s architectural elegance. As a result, seismic responses of buildings with unusual configurations must be determined. The structural configuration of a multi-story building affects its actions during a strong earthquake. One of the most common causes of failure during earthquakes is an irregular plan or elevation configuration. As a result, irregular structures, especially those in seismic zones, are a source of concern. Since, structures normally have a combination of irregularities, predicting the seismic response based on a single irregularity cannot be accurate. It is critical to choose the form, degree, and position of irregularities in the design of structures because this contributes to the structure’s usefulness and aesthetics. Therefore, the study the seismic behaviour of regular building with compare to setback building with different irregularities. we have considered 7th floor model consider with provide mass irregularity and stiffness irregularity. All frames are subjected to seismic loads and the response of the structures is analysis in ETABS software with different parameter e.g., displacement, storey drift, storey shear, storey stiffness.

Wireless Sensor Node Energy Optimization by Packet Routing and Clustering
Authors:- Dr. Shweta Singh, Jamvant Omkar

Abstract- Wireless network depends on life of battery as communication depends on calculation. Many of data collection activity depend on sensors continuous information collection. Hence energy optimization required for the long life of network. So nodes communications need some intelligence for sending data to the base station. This paper has developed a clustering approach for nodes energy optimization as genetic algorithm adopts dynamic situation without any guidance. Paper has developed invasive weed optimization algorithm which select cluster center from the available nodes and reduce energy losses. It was obtained that proposed model has utilized node node energy and position in fitness function for cluster center selection. Experiment was done on different number of nodes and network area size. Result shows that proposed model has increase the life span of WSN.

Performance Evaluation of Interference Cancellation methods in Cognitive Radio for Aeronautical Communication System
Authors:- Santhiya Lakshmi, Vineetha Mathai, Prof. Indumathi

Abstract-The Very High Frequency band (VHF) currently used for aeronautical communications is becoming congested, and hence L band is used for meeting the future capacity requirements in aeronautical communications which will require much greater use of data communications. Due to air traffic, cognitive radio based air to ground communication is introduced which provides dynamic spectrum access to airplanes to overcome the spectrum scarcity problem and in that spectrum sensing is done to find vacant place for effective communication. In the spectrum sensing, the DME and LDACS is the primary and secondary system. When the secondary system access the primary’s vacant place, the DME interference exist in the LDACS signal. This affects the effective communication from air to ground. Thus we propose three new approaches to mitigate the interference, one of which is a space time block coding method and the another two types are Pulse blanking algorithm and Decision directed noise estimation. In this work, we analyse and remove the interference in LDACS signal and compare the performance of these interference reducing algorithms.

Border Security System for Intrusion Detection Using Robotic System, Thermal Imaging Camera, Computer Vision and Machine Learning
Authors:- Vastav Bharambe, Om Gaikwad, Mohan Kshirsagar

Abstract- Border Security is a very crucial issue for every country, nowadays handling terrorisom and security breach is the biggest challenge for every country, terrorists generally use multiple on and off terrain ways to breach the border lines. As per the BBC NEWS report every year 70+ intrusions happen in border areas, Also as per the report of The New Indian Express 111 terrorist infiltrates j&k border since 2019. These intrusions are very dangerous for the country in terms of GDP growth. The novelty of our research is we are developing a system which has capability of detection and identification for human presenase, with the same we are trying to achieve detection and recognition for weapons if the same person is carrying. This system can be used at multiple places such as Government Private Sectors, Research facilities, National and International Banks, Military Facilities. Some Secrete Private Factories. The Design aspect of this system we came up with a novel idea where we are using a Thermal Imaging Camera and a Normal CCTV camera, we are processing both the images at the same time towards finding the Presence of Human living beings. As per the study Times of India border line breach happens in the form of animals means Territories wear such costumes.

Fruit Counting For Automated Inventory Management System Using Neural Networks
Authors:- Athira Mahesh, Nagaraja Hebbar N, Preethika

Abstract- In agricultural sector the problem of identification and counting the number of fruits on trees plays an important role in crop estimation works. At present manual counting of fruits is carried out at many places. Manual counting has many drawbacks as it is time consuming and requires plenty of labors. The automated fruit counting approach can help crop management system by providing valuable information of forecasting yields or by planning harvesting schedule to attain more productivity. This work presents an automated and efficient fruit counting system using computer vision techniques and neural network object detection methods. Neural networks have the capability of recognizing complex patterns and they shows better accuracy when compared with other techniques.

College Feedback System
Authors:- Mr. Sourabh C Bal, Mr.Rushikesh S Kadam, Prof. Mr.Kartik Nikam, Mr. Muzamil M Shaikh

Abstract- Nowadays, Nowadays, instructive Institutions are paying expanding regard for the perspectives on Student’s on the inclusion in learning and educating through surveys or inputs. Online Feedback System is a web application which gives base to the schools/universities to lead understudy’s input on the web. The objective of the investigation was to foster an all-in-one input framework serving the two understudies and educators. The framework includes age and examination of educator’s criticism pages, synopsis, and a conveyance of input. The framework is created for the all-undergrads and staff individuals Also Students can offer input about their workforce individuals. The understudy needs to look over phenomenal, generally excellent, great, agreeable, poor. Then, at that point subsequent to endeavoring each question needs to present his input with the framework. This on the web input framework is the ideal spot to discover criticism assessed as per the prerequisites and it is the effective one to get criticism examination of understudies and staffs.

Plumbing Pool Website
Authors:- Dr. Deepica Dom Iac, Abhishek Bagwari, Anas Khan

Abstract- The main purpose of doing the project at plumbing pool Website for plumbers to get us aquaintedwith make a particular project look good.Customer has it becomesa concern for many around the market, , this project helps toprovide plumbers through our site a purpose of this project to show how the plumbing system works. The main purpose of this study is to improve the plumbing industry and convinent way to provide plumber, which can help customer to find plumber and all necessary information online plateform.

A Review on IOT Based Irrigation System by Using AES Algorithm
Authors:- Miss. Dipali Kaluse, Prof. Jayant Rohankar, Prof. Mukul Pande

Abstract- India is mainly an agriculture country. Agriculture is the most important occupation for the most of the Indian families. This system have sensors for soil moisture, temperature sensor and humidity sensor, rain sensor, day night sensor, microcontroller, Wi-Fi controller, motor, rechargeable battery, and AC adaptor. The microcontroller of the control unit is programmed with threshold values of the temperature and moisture content. This sensor senses the various parameters of soil moisture and gets automatically ON/OFF the motor according to these parameters. These sensed parameter and status of the motor will be shown on mobile phone, and laptop.

Automation in LPG Cylinder Monitoring System
Authors:- A.R.Telepatil, Tejal Bhosale, Rutuja Sutar, Dipti Vardhamane

Abstract- The image processing is used to detect, recognize and calculate the number of objects. The proposal of this system is to develop the electronic solution using the image processing technique to reduce human error and also human efforts. In this solution we are going to target problems relevant to LPG like leakage of LPG gas. For counting the number of cylinders in godown, camera will capture the image of cylinders from top side. Using image processing, the number of particular size circles (uppermost circle of cylinder) will detect and from the number of circles, we will get the number of cylinder count. The LPG gas may lead to explosion and suffocation also. Using gas sensor which detects the leakage of LPG and the message of alertness through Arduino will give on the LCD display as well as the buzzer will turn on.

A Micro Crack Detection & Condition Monitoring of Bearing Using DWT Method in Catia
Authors:- M. Tech. Scholar Ketan Patil, Asst. Prof. G. R. Kesheorey

Abstract- Nowadays, fault detection in induction motors has gained importance. Motor health monitoring is performed to diagnose their operating condition using vibration signals. These signals are processed using different signal processing methods to extract the characteristic parameters permitting localization of the fault. In this paper, we propose a diagnostic method based on Hilbert and Discrete Wavelet Transforms for the detection of bearing faults in asynchronous machines. The discrete wavelet transform (DWT) is intended to provide the detail coefficients while the Hilbert transform (HT) is used to obtain the temporal envelope then the envelope spectrum of the detail. The kurtosis value indicates the optimum decomposition wavelet level containing the significant frequencies corresponding to faults for early detection. The result obtained by HT-DWT is more suitable for the analysis of emergency signals. This technique is effective for either stationary or non-stationary signals. Healthy case is compared to faulty case in order to extract frequencies characterizing different faults. The validation of this approach is evaluated by comparing theoretical with experimental results.

A Mutidisk Clutch Design & Performance Optimization Using Anova Method
Authors:-M. Tech. Scholar Shubham Verma, Asst. Prof. G. R. Kesheorey

Abstract-Multi plate clutch is one of the important part in the power transmission systems. Good design of clutch provides better engine performance. Multi plate clutch is most widely used in racing cars and heavy duty vehicle where high torque transmission required and limited space is available. In this project, we have designed a multi plate clutch by using empirical formulae. A model of multi plate clutch has been generated in CATIA V5 and then imported in workbench for Structural Applications. We have conducted structural analysis by varying the friction surfaces material and keeping base material as Steel. By observing the results, comparison is done for materials to validate.

Temperature Monitoring System Using Bolt IOT
Authors:- Ms. Megha Yadav, Ms. Neha Bargale, Ms. RutujaKadole, Ms. Aasiya Chaus, Asst. Prof. Mrs. Seema.G. Bavachkar

Abstract- Temperature assumes a major half during this day and age, even temporary amendment in temperature at enterprises could cause blasts that prompts debacles and loss of valuable existence of individuals. To defend people from these calamities we’ve planned this enterprise that alarms people by causing messages, messages and tweets once temperature passes boundary esteem or if any irregularity is known. Through these tweets the individual will inform the specialists concerning the temperature passing boundary esteem, then, at that time there is a probability of taking preventive measures to forestall catastrophes at completely different enterprises like drug organizations, and then forth In drug organization’s certain temperature ought to be preserved, forward temperature surpasses, the medication created around then cannot bear item utilized for medication since they may be unsafe whenever utilized for prescription as temperature wasn’t steady, transfer concerning an unbelievable misfortune for the company. Our item can likewise be helpful to minimize these sorts of misfortunes.

Optimization of the WSN Network Based on the EAMMH and OLIN Algorithm
Authors:- Atul Asija, Asst. Prof. Aashish Kumar Sharma

Abstract- Wireless Sensor Network (WSN) is a network type that consists of several sensor nodes used for particular functions in a specific area. These nodes forward the data to their nearest base station (BS). For the transmission of data, nodes with restricted energy can be used. A big challenge in WSN is the high quantity of energy needed for the little volume of data. Monitored processes that provide time-stamped data may alter significantly over time in real-world sensor networks. The OLIN (online information network), an online data mining approach, automatically accommodates the drift rate of the idea in a non-stationary data stream by continually generating a classification model from each sliding training example window. This paper presents a new IOLIN (incremental online information network) data mining algorithm in real-time, which saves a substantial amount of calculation effort by updating an existing model as long as no major idea drift is observed. The suggested technique relies on the overlooked “Information Network” (IN) decision-tree classification model and provides three different sorts of model updates. No statistically significant distinction between precision of the incremental algorithm (IOLIN) vs. renewable algorithm (OLIN) was discovered in studies with multi- year streams of traffic sensor data.

Arduino Based Solar Tracker
Authors:- Asst. Prof. Rupalee S. Ambekar, Shubham Saket

Abstract- A solar photovoltaic (SPV) cells based dual axis tracking system on Arduino Uno platform is implemented in this project for achieving maximum power during a day. The key idea of this article is implementing an automatic dual axis solar tracking system. Alignment of solar panel with the Sunlight for getting maximum solar radiation is experimented. This system tracks the maximum intensity of light in terms of maximum power point (MPP). When the light intensity decreases, its alignment changed automatically for catching maximum light intensity. This project shows implementation and analysis of dual axis solar tracker.

A Review Article In Distribution System Minimum Loss Reconfiguration Using Ant Colony Optimization Algorithm
Authors:- PG Schoar Mrs. Prabha Uikey, Prof. Dr. Anil Kori (HOD)

Abstract-This paper presents a comparative study of three Ant Colony Optimization (ACO) algorithms applied to Distribution Network Reconfiguration Problem. The original ACO algorithm called the Ant System (AS) and two of its variants viz. MAX-MIN Ant System (MMAS) and Ant Colony System (ACS) were used to minimize active power loss in distribution systems. The algorithms were coded in MATLAB and numerical experiments were conducted on two benchmark systems. The results indicate that even though all the three algorithms are capable of solving distribution network reconfiguration problem, ACS is found to perform better for larger systems.

Automation And Monitoring of Greenhouse
Authors:- Asst. Prof. Seema G.Bavachkar, Rutuja Upadhye, Mauyri Shinde, Sukanya Swami

Abstract-In traditional agriculture, farmers must regularly visit their farmland to measure various environmental parameters such as temperature, humidity, light intensity and soil moisture in order to grow the right crops on the right soil at the right time.Greenhouse cultivation, on the other hand, is a system in which a farmer grows crops in an ecological environment where all ecological parameters are adjusted according to the plant species. Greenhouse automation is a way for farmers to automatically monitor and control the greenhouse environment anytime, anywhere. In this article, the authors propose an automated greenhouse monitoring and control system that includes various sensors such as temperature sensors, moisture sensors, light sensors, and soil moisture sensors for harvesting.

Electron Orbit’s Shape for Hydrogen and Helium Atoms
Authors:- Refah Saad Alkhaldi

Abstract- This paper is a continuous work of some facts about the electrons in the first orbit of H and He atoms. Position of electron according to angle around the nucleus, the shapes of the first orbit, as well as the electron intensity from De Broglie equation are all illustrated.

A Review on Three Wheeler Electric Vehicle
Authors:- Pramod K N, Prashant D H, Akash Shetty, Karthik K, Abhishek B

Abstract- Electric vehicles are believed to be an effective solution for reducing greenhouse gas emissions. Despite extensive study on the attributes and characteristics of electric vehicles and their charging infrastructure design, the development and network modelling of electric vehicles are still evolving and limited. This article provides a comprehensive review of electric vehicle studies and identifies existing research gaps in the aspects of theories, modelling approaches, solution algorithms and applications.

Self-Driving Car: Autonomous Driving Using Lane Detection
Authors:- Mr. Mohd.Aafeen H Shaikh, Mr. Shivdatta D Bapat, Mr. Saifali S Rangrej, Prof. Mrs. S G Bavachkar

Abstract- Self-ruling Cars are the eventual fate of driving extravagance, a fantasy about sitting in a vehicle and giving your objective as an information and it takes you to your ideal spot. To make this little glimpse of heaven engineer and automakers from one side of the planet to the other have only one objective of their life, that is a completely settled Autonomous vehicle. Albeit this is as yet a fantasy however we have been very near accomplishing the last objective. This accompanies difficulties, challenges that come helpful while making something fantastic, and the Autonomous vehicle is no not exactly an outlandish game. It requires soaking up new innovations with the auto, make it work splendidly together, in light of the fact that wellbeing of the traveler will depend on oneself driving vehicle. Throughout the decade the Auto business has progressed fundamentally towards a future without a human driver. Specialists are right now attempting to beat the mechanical, political and social difficulties associated with making self-ruling vehicles standard. These vehicles should be protected, dependable and cost-proficient. Interfacing them and making coordination components could help accomplishing these objectives. This undertaking proposes a vehicle-to- everything (V2X) coordination convention for independent vehicles (AVCP: Autonomous Vehicle Coordination Protocol) and a testing climate where it will be assessed. The AVCP plans to fundamentally lessen travel time and increment security for self-governing vehicles by empowering them to trade detecting and directing data with one another and with side of the road units (RSUs).

Investigations on Various Concrete Properties by Replacement of Fine Aggregate with Stone (Quarry) Dust
Authors:- Y.Anand Babu, Asst. Prof. Modi Musalaiah, Asst. Prof. B.Srikanth

Abstract- The global consumption of natural sand is very high, due to the extensive use of concrete. In general, the demand of natural sand is quite high in developing countries to satisfy the rapid infrastructural growth, in this situation developing country like India facing shortage in good quality natural sand. Particularly in India, natural sand deposits are being depleted and causing serious threat to environment as well as the society. Increasing extraction of natural sand from river beds causing many problems, loosing water retaining sand strata, deepening of the river courses and causing bank slides, loss of vegetation on the bank of rivers, exposing the intake well of water supply schemes, disturbs the aquatic life as well as affecting agriculture due to lowering the underground water table etc are few examples. The study employed case study design of generation and utilization of quarry dust at chimakurthy quarry. The quarry dust was tested experimentally for technical viability in the production of quarry dust building blocks; an impact assessment was conducted and finally a cost benefit analysis was carried out to determine the commercial viability as well as social cost benefit of utilizing the quarry dust as a raw material in the manufacture of building blocks. All the experimental data shows that the addition of the industrial wastes improves the physical and mechanical properties. Here we will conclude that the strength should be increased at 25% of stone dust. So by this we will say that from 25% on wards we have to use stone dust. But it should not exceed to 50%.

Cad Modelling and Analysis of Axle Shaft of Rice Planting Machine
Authors:- Prof. A.V.Desai, Digambar S. Powar, Mr. Omkar B. Yadav, Rahul T. Patil, Rupesh R. Shinde, Swarup A. Kamble

Abstract- A rice transplanter is a specialized machine fitted with a transplanter mechanism (usually having some form of reciprocating motion) driven by the power from the live axle, in order to the transplant rice seedlings onto paddy field. Rice is a major food grain crop of world. Unlike upland row crops, cultivation of low land rice crop is a labour intensive process. In spite of the common belief of availability of surplus agricultural labour in India, there actually exists a scarcity of skilled agricultural workers during the peak transplanting seasons. If this operation is not done in time the yield goes down. In view of this, there is an urgent need to mechanize this operation. The rice translation process is generally manual which involves number of labour. The process of manual rice transplantation is not so efficient as compared to the mechanical rice transplantation. Machine transplanting using rice transplanter requires considerably less time and labour than manual transplanting. It increases the approximate area that a person can plant.

A Comparative Review of CPU Scheduling Algorithms
Authors:- Muskaan Pirani, Denish Ranpariya, Mihir Vaishnav

Abstract-Multiple programmes can run in memory at the same time, allowing for CPU and I/O overlap. The problem of selecting a process from the ready queue to be performed by the CPU is addressed by CPU scheduling. Because of the need to adjust and evaluate the operating system as well as assess the performance of actual applications, developing a CPU scheduling algorithm and understanding its effect is challenging and time consuming. Since the processor is such a valuable resource, CPU scheduling is critical for achieving the operating system (OS) design goals. The aim of CPU scheduling is to reduce average turnaround time and average waiting time so that as many processes as possible can run at any given time, maximising CPU utilisation. This paper aims to compile a list of the most common CPU scheduling algorithms that have been proposed so far. FCFS, SJF, SRTF, Round Robin, Priority scheduling, HRRN, and LJF are some of the algorithms we look at.

Factors Involved in the Assessment of Durability of Concrete
Authors:- Deepika Srivastava, Md. Tasleem, Ashraf Hussain

Abstract- In this study, the factors involved for accessing the durability of the concrete structures, now the day’s construction field has grown up with lots of advancement of techniques & technologies. We are making structures touching the height of the sky as well as achieved the success to build the structures beneath the ground. While constructing these structures, the durability of the structure is an important phenomenon that we have to keep in mind while adopting the construction method. We should have to be aware of the Structure’s durability or the life of the structure, some important parameters to be considered before its construction that the structure should be ecofriendly, economic & durable, So many researches were done on the durability of concrete structures, SEM testing is one of the methods to get any information about the deterioration stage in a particular structure as it provides us the information of pore structures of the concrete specimen in image form which is helpful for us to study the necessary details of structures durability.

IOT Based Industrial Automation Using Google Assistant
Authors:- Asst. Prof. Ms.G.Indhuja, A.Jaromepeter, R.Sushma, D.Kamali, N.Lavanya Sri

Abstract- The proposed project focussed with the rapid development of the field of industrial control, industrial control in network applications, intelligent and distributed monitoring system requirements are also rising, and based on SN (Sensor Network) of various application systems also appear in large numbers. The intention of SN is to integrate the sensed environment parameters with the traditional network by means of a large number of sensor nodes, and the intelligent environment monitoring can be realized through the convenience of network connectivity. And the application of SN based on Arduino Environmental is development platform has become the current hot spot, which benefits from its innate advantages in hardware open source, operation performance, reliability, volume, energy consumption, cost and scalability. The Voltage, Current and Environmental temperature monitoring system based on Arduino development platform, through the use of sensors, pyrotechnic detection sensors, gas detection sensors, the corresponding characteristics of the communication system parameters monitoring, through the network monitoring parameters are transmitted to the remote server timely processed (remote data recording, remote alarm and real-time control processing), can achieve the basic security protection of communication system, improve the state of the environment monitoring and management efficiency, in order to improve the maintenance level of communication system. The entire system is controlled through Google Assist to enhance the control operations.

Detection and Prevention of Wormhole Attack using the Trust-Based Routing System
Authors:- M. Tech. Scholar Rachna Pandey, Prof. Pradeep Tripathi

Abstract- Mobile Ad Hoc Network (MANET) is a rising spot of concentrate in the correspondence framework world. As the MANET is with without foundation, it is having dynamic nature of self-assertive system topology. The extent of this proposition is to do the investigation of wormhole attack and flooding attack set up its counteractive action system by applying it on responsive directing convention AODV, NS-2 organize test system is utilized for execution examination and reproduction. The extent of this postulation is to roll out improvements in the AODV steering convention by including a noxious node in the current AODV directing convention and in every one of the records identified with it. At that point to check the execution of system in view of a few parameters like PDR, throughput and End to end delay, TCP and UDP parcel examination and so on the outcome is being shown in NAM. A gathering of worm hole node effortlessly utilized against directing in mobile promotion sells systems. These sorts of attack are called communitarian attack. Two malevolent nodes are making a passage is called nodeholeattack. An assailant causes the clog in organize by producing an extreme measure of activity. The aggressor node always sends the gigantic amount of pointless information bundles into the system. This causes a tremendous clog of undesirable parcel into the system. Because of the hindering the information parcels, RREQ, RREP or RERR bundle send by the genuine node. To keep the wormhole, node opening, community-oriented wormhole and flooding attack, the counter measure which Trust esteem is figured on the premise of course ask for, course answer and information parcels. After count get put stock in values between 0 to 1. In the event that trust esteem is more prominent than 0.5 at that point marks node is solid and permit on a system generally piece. System execution of proposed convention trusted AODV steering convention is assessed. The outcome demonstrates execution change when contrasted with standard AODV convention.

Rumor Detection from Social Media
Authors:- Pragya Gaur, Vasu Verma, Vaibhav Bhardwaj, Utkarsh Kashyap

Abstract- We know that now a days the rumours around the world in every filed has become a major concern for everyone that we cannot neglect. Whether you are at home, college, work, or anywhere in the world and you came across something that is known to be a rumour going on around the city, state or country, you start developing that feeling of anxiety and desperation unless you are not clarified on the statement. In order to ensure the right or wrong we go through Internet and search across it to find more and more about it, but sometimes even if we try with multiple search through the google we are not given a clarity about the situation going on around. Hence to overcome this problem we have come up with an Idea of Rumour detection Web App. In this Web App we have designed an app which will give you the result on the basis of an algorithm which will provide you the most releveant content regarding the situation going on around with the exact clarity and verified resources that are available all over the globe.

Design & Fabrication of Axial Noodle Making Machine
Authors:- Prof. V. S. Nikam, Mr. Nilesh Bule, Mr. Pratik Konde, Mr. Nikhil Ghongade, Mr. Zuber Shaikh

Abstract- Noodles are of the staple food consumed in many Asian countries .Instant noodles have become internationally recognized food and word wide consumption is one rise. Whenever, we think about noodles we remember our part experience where our mother making had been noodle (savage) by their hand in long strips and strings. Now in modern era we have proposed automation and giving relief to those hand practice making noodle by taking lot of efforts .we have “Design and Fabrication of Axial noodle making machine” this machine will help us to makes noodles and its similar product like pasta ,akki savage with different diameter with greater quantity and accuracy with the underestimation of labor cost, space, time, effort and cotton of wastage. The proposed Noodles making machine will forced out work through the well-shaped dice in the axial direction by the extruder which held and rotates in barrel or cylinder. Here the work will produce parallel to base of machine hence its named “Axial Noodle making machine”. The working of this similar to the squeezing the toothpaste from paste pack. On the bed rock on this principle the dough will be squeezed chronologically by the extruder which rotates with uniform speed. This whole mechanism will be drive by the heavy duty D.C. Motor. The main feature of the proposed model is to start drawing work by feeding 400gm of dough which is itself a proof of its compactness.

Demand Side Management on Microgrids
Authors:-Dr. R.M. Holmukhe, Anjali, Sagar Saroj, Sanju Raj

Abstract- Energy demand and expectations of high supply reliability is surging up on a daily basis. Due to this, renewable resources are in great demand which has escalated the use of Microgrids extensively . In a Microgrid environment, economic operation signifies economic scheduling of power generation as well as scheduling of the load. Not only reducing the cost of generation but also reducing the inconvenience caused due to shifting of loads is a multi-objective optimization problem.Thus, Demand Side Management can prove to be useful for such problems as the primary focus of this work is to optimize the load curves, cut down the tariff cost and provide 24×7 electricity to each and every corner. Patna medical college Hostel is considered as residential Microgrid, Balewadi feeder as commercial Microgrid and Yamuna Nagar feeder as industrial Microgrid on which Demand Side Management programs are implemented to enhance the performance and lower the cost of investment. The methodology used here will be based on four terms: California Standard Test, DSM indices, Flowchart for DSM Analysis. These are used to design and evaluate the technical feasibility and economic viability of off-grid and on-grid Microgrids.

Gesture Recognition for User Interaction
Authors:- Srija Nagabhyru, Anshul Joshi

Abstract- With the massive influx and advancement of technologies there is a scope for us to interact with our systems in the best possible way. One such technology would be Gesture based Human Computer Interaction. So our system makes use of HCI which would help us interact without touching the screen. It is a well known fact that two dimensional user interfaces are everywhere, but with the increasing popularity of Extended Reality(XR) we require a better, more sophisticated three dimensional user interface.

A Novel Wavy-Tape Insert Configuration for Pipe Heat Transfer Augmentation
Authors:- M.Tech. Scholar Yogesh Chouhan, Prof. Rohit Kumar Choudhary

Abstract- Various techniques have been tested on heat transfer enhancement to upgrade the involving equipment, mainly in thermal transport devices. These techniques unveiled significant effects when utilized in heat exchangers. One of the most essential techniques used is the passive heat transfer technique. Corrugations represent a passive technique. In addition, it provides effective heat transfer enhancement because it combined the features of extended surfaces, turbulators and artificial roughness.The effect of wavy strip turbulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied. The configuration, gain in heat transfer augmentation, cost in pressure loss, generated swirl flow character, heat transfer enhancement mechanism, optimal geometric parameters and overall thermal hydraulic performance of wavy-tape are successively expounded in this work.

A Review on Fundamentals of Engineered Cementitious Composite (Bendable Concrete)
Authors:-PG Scholar Modugu Naveen Kumar, Asst. Prof. K.Sampath Kumar

Abstract- This paper provides an overview of the various properties of engineered cementitious composites (ECCs) that are used in a variety of structural applications. Different properties of engineered cementitious composites are investigated in this paper, including tensile, flexural, compressive, tensile strain capacity, shear strength, toughness, fibre matrix interaction, drying shrinkage, water permeability, sorptivity, cracking, impact and frost resistance, and beam-column connection behavior. According to the study, ECC has a much greater strain capacity than conventional concrete, as well as a higher energy absorption capacity, defection capacity, and impact resistance, as well as a crack width of less than 100 m. The use of mineral admixtures improves tensile strain capacity with multiple fine cracks, while compressive strength and carbon dioxide emissions decrease, according to the findings of various studies. Fiber hybridization can increase ECC’s strain hardening with various fine cracking, flexural and toughness properties, impact resistance, and crack width resistance.

Automatic Number Plate Recognition System
Authors:-Asst. Prof. S. A. Shinde, Miss. Shital S. Hadimani, Miss. Sayali S. Jamdade, Miss. Pragati R. Bhise

Abstract- Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from the moving vehicle because of the speed of the vehicle. Therefore, there is a need to develop Automatic Number Plate Recognition (ANPR) system as a one of the solutions to this problem. Automatic Number Plate Recognition (ANPR) is an image processing technology which uses number (license) plate to identify the vehicle. The objective is to design an efficient automatic authorized vehicle identification system by using the vehicle number plate. The developed system first detects the vehicle and then captures the vehicle image. Vehicle number plate region is extracted using the image segmentation in an image. Optical character recognition technique is used for the character recognition. The resulting data is then used to compare with the records on a database so as to come up with the specific information like the vehicle’s owner, place of registration, address, etc.

Improved Security for Online Exams Using Group Cryptography
Authors:- K. Usha Rani, Ch. Varsha, B. Priyanka, P. Neeharika, Associate Prof. Dr. S.Venkatramulu

Abstract- Online examination system is a internet-based system. Exam is conducted using the internet. The basic aim is to conduct the online exams more securely. For high security we used group based cryptography. Mail authentication is provided so that user gets username and password. In the database the user credentials and user answers are stored in the form of encrypted format. Only admin have the access to the database. The encrypted form of data in the database cannot hacked by the hacker.

Performance Optimization of Absorption Refrigeration Systems Using Box-Behnken Design
Authors:- M.Tech. Scholar Roushan Kumar Shashi, Asst. Prof. Neetesh Kumar Gupta

Abstract- Nonetheless, a detailed study analyzing all these parameters and determining their contribution ratios on the system’s performance with a statistical approach has not been encountered in the literature. For this reason, the purpose of this study is to examine the parameters that present the most significant effect on the ARS’s COP values and determine the importance order of these parameters by utilizing Taguchi and ANOVA methods. Moreover, the best and worst working conditions are determined by different statistical analysis methods and the results are compared.

A Review on Implementation of Inventory Management Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Priyank Jain, Prof. Trilok Mishra

Abstract- To achieve optimum inventory replenishment is significantly difficult due inherent uncertainties in demands and supply which resulting in loss of sales or keeping excessive inventories. An unkempt inventory can take up to one-third of an organization’s annual investment. Therefore, in order to compete with invariably erratic demands, it is not only challenging to develop an intelligent system to maintain and control an optimum level of inventory but has also become mandatory.

Automobile Black Box System for Accident and Crime Analysis
Authors:- Narendra Tallapaneni, Gudapati Krishna Hemanth, K. Venkatesh

Abstract- Automobiles and computing technologies are creating a new level of data services in vehicles. The Automobile Black Box has functions similar to an airplane black box. It is used to analyze the cause of vehicular accidents and prevent the loss of life and property arising from vehicle accidents. This paper proposes a prototype of an Automobile Black Box System that can be installed into vehicles. The system aims to achieve accident analysis by objectively tracking what occurs in vehicles. The system also involves enhancement of security by preventing tampering of the Black Box data. In addition, the Black Box sends an alert message to a pre-stored mobile number via Short Message Service (SMS) in the case of occurrence of an accident.

Evecurate – A Smart Event Management App Using Flutter and Firebase
Authors:- HOD. Dr R Juliana, Naveen Kumar VG, Richard G, Shivadarshini P

Abstract- Event management is a process that entails a great deal of communication, careful planning, scheduling, advertising, and audience outreach. The core aim of our project is to apply modern technologies and develop a Mobile application to ease out the complex process of traditional event management approaches and thus transforming it into a smart event management system. In specific, our project focuses on the Events conducted by many Colleges and universities which follows the traditional event management approaches. Every time an event is conducted in a college/ university there are more things to be done like planning of events, keeping track of the plan, following a strict budget, share out crystal clear details of the event for the students, sharing of invitations, conduct registration, advertise among other colleges and even sometimes there will be lack of live interaction with the audience. The Mobile Application “Evecurate” developed wraps all the essential services for planning and conducting the events in the colleges and Universities. The application includes QR technology which generates QR code to the event audience which is used for easy Check-in process that is during the registration process. The QR code technology is also used for the Event audience interaction in which audience can provide reviews for the events conducted and can take part in the polls or Q/A session that can be conducted using the application. The application constitutes an event sharing module where the event organizer can enter the details of the event and share them on the application itself. From the project the mobile application “Evecurate” will reduce all the difficulties in the traditional event management approach and pave way for an alternate system that is the smart event management.

A Experimental Investigation on Performance of Concrete with Partial Replacement of Coarse Aggregate and Fine Aggregate with EPS and Iron Slag
Authors:- K .Mohan Sai, B.Tejaswi, D.Manaswi, Ch. Lakshmi Narayana, G.Kumar Sai, M.Heanth Kumar, P.S.V Anudeep, Associate Prof. Ch.Veerottham Kumar

Abstract- A rice transplanter is a specialized machine fitted with a transplanter mechanism (usually having some form of reciprocating motion) driven by the power from the live axle, in order to the transplant rice seedlings onto paddy field. Rice is a major food grain crop of world. Unlike upland row crops, cultivation of low land rice crop is a labour intensive process. In spite of the common belief of availability of surplus agricultural labour in India, there actually exists a scarcity of skilled agricultural workers during the peak transplanting seasons. If this operation is not done in time the yield goes down. In view of this, there is an urgent need to mechanize this operation. The rice translation process is generally manual which involves number of labour. The process of manual rice transplantation is not so efficient as compared to the mechanical rice transplantation. Machine transplanting using rice transplanter requires considerably less time and labour than manual transplanting. It increases the approximate area that a person can plant.

Disease Prediction Using Machine Learning Algorithms
Authors:-Pranav Kumar, Subash Kumar Shah

Abstract- Health care has become a major problem in the world. Disease cases are increasing rapidly among humans, especially among the younger generation. The healthcare sector is one of the leading research areas in the current context with the rapid development of technology and data. The latest technological advances allow for the automatic use of machine learning techniques. These machine learning methods can be used to diagnose ‘or predict diseases’ in advance. The healthcare industry produces a vast amount of information in its infancy in an unstructured format that a computer cannot understand. Thanks to the development of modern technology, the healthcare industry also manages information in a systematic way that can be understood through machine learning technology. In this case if we use machine learning technology to predict disease, then there is a chance of getting the disease in the early stages and informing the patient that they have received the best treatment to treat the disease. This paper uses seven controlled algorithms namely KNN, Decision Tree, Random Forest, Naive bayes to predict disease. In this paper among those seven algorithms, Neural Networks provided the best accuracy as 98.30% and this program provides results to test model accuracy in predicting diseases. The accuracy of the algorithm is determined by the performance of the data provided. The expected outcome and scope of this project is that if disease is not predicted rather than given in advance treatment that can be given to patients which can reduce health risks and save patients’ lives and the cost of accessing treatment can be reduced to a minimum.

Design & Implementation of IOT Based Firefighting System to Protecting Farm
Authors:-Ms. Aditi A. Kulkarni, Ms. Sweety A. Nargunde, Ms. Ruksana A. Mulla, Ms. Karishma D. Kate, Prof . K. K. Nikam

Abstract-Agriculture plays a crucial role in the economy of developing countries, and provides the main source of food, income and employment to their rural populations.Farmers hold the backbone of the agricultural system. Agriculture is the world’s leading source of food items.In summer season many of farms are dry and plants also dry there is lots of probability to occurring farm fire in farm due to man-made like, short circuit in electricity distribution line, firing stubble by humans.Because of that action farms are affected badly. This can make affect on further cultivation season. We are building a smart system which is powered by IOT based which will protect our farm from fire. When fire is occurs in surrounding farms then our system will sense the fire and start water sprinklers to put out the fire and share this data on IOT to know the status of farm to farmer.We also doing automation using IOT based irrigation system. We achieving this controlling system world-wide by using IOT based technology.

Obstacle Detection using LIDAR
Authors:- Sangam Kamble, Prof. Dr. Shilpa Kharche

Abstract- For Autonomous Vehicle, Obstacle Detection is one of the primary tasks. A number of sensor systems are available for obstacle detection. One kind of such sensor system is LIDAR (Light Detection and Ranging) system known for its high accuracy in measuring distances. LIDAR is commonly used to make high-resolution 2D/3D map of the environment. This project uses RPLIDAR A1 Sensor is mounted on the top of the vehicle. RPLIDAR A1 Sensor is 360 degree 2D Laser Scanner (LIDAR) Sensor detects the obstacles within 6 meter range. Point cloud output from the RPLIDAR sensor provides the necessary data for robot software to determine where obstacles exist in the environment and where the robot is located related to those obstacles. Hector_slam contains ROS (Robot Operating System) packages related to performing real-time SLAM (Simultaneous Localization and Mapping). In other words using information from RPLIDAR A1, hector_slam built a map of environment and show detected obstacles and where vehicle is located related to the map. Also, this vehicle uses two Laser Sensors for its movements. Laser sensors are attached in front of the vehicle. One is on Left side and another is on Right side of the vehicle. Laser Sensors detect obstacles and they avoid collision with the obstacles.

Fine-Grained Facial Expression Recognition using Machine Learning
Authors:- Prof. Pallavi Patil, Kalyani Limkar, Samruddhi Waghmare, Siddhi Bokil, Bhakti Vispute

Abstract- A face emotion detection system that cans analyses basic human facial expressions is being developed in this project. The proposed method analyses a person’s face to determine his or her mood, and then plays an audio file that is related to that person’s emotion based on the information obtained from the face. The system will first recognize a human face and then proceed to the next step in the process, and so on. The process of face detection is carried out. Following that, the technique of feature extraction is used to recognize the human face.. This method aids in the recognition of the human’s emotion by utilizing features of the face image. Those feature points are discovered through the feature extraction of the lip, mouth, and eyes, as well as the brow. If the input face matches exactly to the face in the emotions base dataset, we can determine the exact emotion of the human and play the audio file that corresponds to the exact emotion of the human. In addition, we recommend music based on the mood that has been detected. Recognition under a variety of environmental conditions can be achieved through training on a small number of distinguishing characteristics of different faces. A straightforward, efficient, and accurate approach is proposed here. In the field of recognition and detection, systems play a critical role in achieving success.

Development of Economical and Environment Friendly Landfill Liners for Tier II Cities
Authors:-Sachiket Mungarawadi

Abstract- Rapid industrialization and population explosion in India has led to the migration of people from villages to cities, which generate thousands of tonnes of Municipal Solid Waste (MSW) daily. Municipal solid waste management has become a serious problem because of rapid urbanization and improved economic activities. The insufficient collection and inappropriate disposal of solid wastes represent a source of water, land and air pollution and pose risks to human health and environment. Municipal Solid Waste (MSW) is a complex refuse consisting of various materials with different properties.Leachate resulting from this is a hazardous pollutant to the soil and groundwater underlying. Entering of leachate and heavy metals into the soil leads to the contamination of both soil and groundwater. The fill material, decayed organic soils and soils having continuous contact with sanitary fill environment alter the desired geotechnical properties as well as chemical properties. In an engineered landfill, bottom liner and top cover play an important role in controlling the pollution of groundwater, air and soil. Hence utmost care is required in designing and constructing the liner and cover. But cost of the liner/cover material used for the construction of the liner and covers govern the design philosophy of the liner and cover for waste impoundments, as material required is of very huge quantity. In order to better utilize the locally available materials as landfill liners and covers in countries like India, to make the landfill construction cheaper, a systematic study was needed in the form of geotechnical and geoenvironmental characterization of these locally available soils and other materials.Therefore, the present study is aimed to design eco-friendly and economical single-liner system by replacing some percentages of bentonite clay with with baggase ash or straw fibers to avoid entering of harmful liquids into groundwater. As a part of the present investigation, Karnataka state, in India was chosen and tier II cities are identified across the Karnataka state. In all tier II cities, huballi city is selected for our study. The locally available Halumannu is collected from Unakal village, Hubballi. Specific gravity, Natural moisture content, Consistency limits, Sieve analysis, Hydrometer, Compaction, Consolidation and Unconfined compressive strength tests are conducted on collected soil sample. From the results of the extensive experimental investigations Halumannu is silty soil with low degree of expansion. And the strength of soil is less and it can be increased by adding suitable soil stabilizers like cement, lime.

Multifunctional Wireless Hand Sanitisation Based Service Robot Cart
Authors:- Saurabh M. Jambhle, Shubham R. Bawane, Saurabh Chakole

Abstract-There ie new broad health crisis which is known to all of us that is novel coronavirus covid 19. It has spread to world wide and many people get infected by it. The virus is get spread by getting physical contact, by touching and by gathering at social places. To stop the spreading of corona virus some methods is mentioned by the “WORLD HEALTH ORGANISATION” i.e WHO is to- wear a mask, social distancing, and hand sanitization, work from home, avoide gathering at social places and to avoide croud places. This is because of virus get spread by touching a object at local places and due to physical contact with others. We have seen that at public places like shopping malls, hospitals, railway stations, bus stops, petrol pump, utility stores etc there is still gathering of people and croud is there. Because all such places providing essensial services which has to be permitted by govt. And at such places there are chances of get contact with the covid +ve patient. At such places there is no social distancing and hand sanitization is there. One person at a time at such places can not handle the croud and can not be able to give instruction to people. In order to treat and reduce the spread of corona virus circumstances, to maintain a social distancing and constant hand sanitisation and disinfection of our hand at public places become a neccessity. So the aim of this study is to design, develop and fabricate a smart contactless hand sanitizer dispensing system which is mounted on wireless bluetooth control service robot cart. These cart is develop for making contactless human to human interaction in public places where it can controlled by smartphone and having inbuilt contactless sensor based hand sanitisation system. The presented system has ability to work contactlessly to interact with patient in hospitals, to provide services at various industries and trolly provider in shopping mall, railway station for automatic hand sanitisation and at various public places as hospatility service provider.There ie new broad health crisis which is known to all of us that is novel coronavirus covid 19. It has spread to world wide and many people get infected by it. The virus is get spread by getting physical contact, by touching and by gathering at social places. To stop the spreading of corona virus some methods is mentioned by the “WORLD HEALTH ORGANISATION” i.e WHO is to- wear a mask, social distancing, and hand sanitization, work from home, avoide gathering at social places and to avoide croud places. This is because of virus get spread by touching a object at local places and due to physical contact with others. We have seen that at public places like shopping malls, hospitals, railway stations, bus stops, petrol pump, utility stores etc there is still gathering of people and croud is there. Because all such places providing essensial services which has to be permitted by govt. And at such places there are chances of get contact with the covid +ve patient. At such places there is no social distancing and hand sanitization is there. One person at a time at such places can not handle the croud and can not be able to give instruction to people. In order to treat and reduce the spread of corona virus circumstances, to maintain a social distancing and constant hand sanitisation and disinfection of our hand at public places become a neccessity. So the aim of this study is to design, develop and fabricate a smart contactless hand sanitizer dispensing system which is mounted on wireless bluetooth control service robot cart. These cart is develop for making contactless human to human interaction in public places where it can controlled by smartphone and having inbuilt contactless sensor based hand sanitisation system. The presented system has ability to work contactlessly to interact with patient in hospitals, to provide services at various industries and trolly provider in shopping mall, railway station for automatic hand sanitisation and at various public places as hospatility service provider.

A Review on Conformal Cooling of an Injection Moulded Part through Mouldx 3D
Authors:- M.Tech. Scholar Snehil Kumar Tripathi, Prof. Ritu Srivastva

Abstract- Cooling time is a key element in. Typically, it is used to determine the total cycle time. As a result, in injection moulding, reducing cooling time can assist minimise production costs while also shortening the manufacturing process time. significant factors in reducing cooling time is the design of the cooling system. The cooling system architecture is limited in traditional moulding manufacturing methods. The distance between cooling channels and cavity may vary across the component for cavities with higher curvature. As a result of the low heat buildup, the product quality is poor. The cooling channels can be closer to the exterior of the depression by using traditional technologies 3D printing than by using traditional procedures. This test makes use of a real three-dimensional test system to predict the infusion forming process and item twisting.

Glass Identification Using Extreme Gradient Boosting Algorithm
Authors:- Pulkit Dhingra

Abstract- The Discovery of important information from criminal evidence is essential to make an effective criminological investigation. It is necessary to analyze this data of evidence and get answers that will help in the study. Machine learning techniques provide a bundle of state-of-the-art algorithms to analyze the data to get results efficiently. Extreme Gradient Boosting (XG-Boost) is one of the most successful machine learning algorithms used in classification problems. This paper applies the XG-Boost technique to help criminological investigators identifying the type of glass gathered as evidence while undergoing an investigation. The method can also be beneficial for other use cases that include the segregation of glass based on the materials incorporated in it.

Face Recognition Based Media Player
Authors:- Abhishek Rathi, Siddharth Ahluwalia, Suryansh Rana, Asst. Prof. Mrs. Vaishali Malik

Abstract- In this project, we aim to provide a high-level media player which plays and pauses the audio by recognizing the user’s face if the user isn’t near to the machine, it quickly stops the audio. We are attempting to add a component of controlling different highlights of the media player.

Smart Maintains and Monitoring of Agricultural Field
Authors:- M.Tech. Scholar Hemanth Kumar D T, Associate Ravi Kumar M N

Abstract- The proposed system smart maintenance and monitoring of agriculture Field the using the modern technology like in an Internet of things (IoT), mechanic learning (ML), artificial intelligence (AI).It solves the major problem of water wastage in irrigation system, The main approach of our system is to solve the time money energy of a former for smart control of water management. A sensor network proposed by our project deals with basic parameters of the agriculture Field or PH value of soil moisture temperature and humidity of the agriculture Field. In our system we proposed camera for an agricultural field to monitoring the agriculture Field, the data are used to analyze the status of crop cultivation, Manual fencing as some default the thieves over come to field the fencing are now electrical fencing that can harm the people and animals which have an approach to death by current, the smart fencing by laser or infra red rays are used to overcome this difficulty in an intruder passed through Lazar the sensor camera instantly capture the image of that field and send this Image to the respective mail address.

Secure Data Transmission Using Image Steganography- A LabVIEW Approach
Authors:- PG Scholar I. C. Narasimha, Associate Prof. D. Anuradha, Prof. Dr. G. Lakshmi Narayana, Associate Prof. S. Mohan Das

Abstract- Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like image, audio, video. image Steganography is a technique used to transmit hidden information by modifying an image signal in to imperceptible manner. In this proposed method, secret message in form of image or text is embedded within another original image. In the transmitter end the output will be similar to the original with secret message embedded inside. The hacker will be blinded by the transmitted signal. At the receiver end the original message can be retrieved without any loss. The entire proposed system is simulated and their corresponding waveforms prove the effectiveness of this method.

Design and Development of Multipurpose Agricultural Machine
Authors:- Dhairyasheel Patil, Ruturaj Khot, Saikrishn Gajula, Tamajid Shaikh, Asst. Prof. Hrishikesh Jadhav

Abstract- The scope of this project is to design and development of a portable multipurpose agricultural machine; focuses on shredding of sugarcane leavings, coconut leaves, Areca leaves and paddy straw, later this chopped powder is a source to prepare the vermin compost. The task started with the accumulation of information and data, through survey in agricultural and literature studies. Existing models are hand wheel operated, vertical and horizontal electric chopping shredder is prone to have problems like large space requirement, uneven cutting, and manpower requirement. Hence traditional methods are not sufficient and satisfactory for chopping the crop residues. Considering the user’s needs and buying capacity a prototype was designed and constructed. The proposed prototype is so designed to guide materials in different compartments by power driven transmission through chain, belt, pulley and spur gear attachment to have a chopped and powder materials. The overall operation of the proposed shredder, running at a cutting speed of 700 RPM nearly has a cutting efficiency up to 90%.

Development and Analysis of Noise Map of Pune Region Using Arc-GIS
Authors:- Rohan Raut, Sajal Sinha, Swaraj Meshram, Chaitanya Ingale, Pro. Shree Kambale

Abstract-We present our analysis report on Noise Pollution Level in different areas of Pune region and ways to minimize the problem as much we can. In this paper, we have analyzed the data which we collected from various online websites related to Noise Pollution survey in different regions of Pune and used that data to identify possible trends and factors. We used normal distribution or Gaussian distribution to get the values and those values were used to plot the maps and graphs. Furthermore, various techniques in order to minimize noise pollution have been discussed.

Indian Currency Recognition System
Authors:- Dr. Dayanand Jamkhandikar, Kaveri, Sahana, Sudharani, V Pooja shree

Abstract- Counterfeit notes are one of the biggest problem occurring in cash transactions. For country like India, it is becoming big hurdle. Because of the advances in printing, scanning technologies it is easily possible for a person to print fake notes with use of latest hardware tools. Detecting fake notes manually becomes time-consuming and untidy process hence there is need of automation techniques with which currency recognition process can be efficiently done. This work Extraction of different features in fake and real currency notes and through comparing with each other we can able to differentiate the fake note from the real note. In this approach, feature extracted dataset is used and for detection of the genuineness currency. Security feature of Indian currency note available on front and back side of the notes are used as features. This work uses ORB (Oriented FAST and Rotated BRIEF) and Brute-Force matcher approach to extract the feature of currency. The identification mark, optical variable ink, and extracted currency features decides the currency recognition. The features extraction is performed on the image of the currency and it is compared with the features of genuine currency. The desired result will indicate whether the note is genuine or fake.

Design and Development of Chassis, Braking And Steering System of Pedal
Assisted Electric Car

Authors:- Prathmesh Khaladkar, Varad Joshi, Prathamesh Joshi, Indrajit Shinde, Sourabh Patil, Asst. Prof. Hrishikesh Jadhav

Abstract- During the revolution for the eco-friendly technologies bicycles were the most depended modes of transportation, along with this the consideration of the increase in fuel price and the environmental factors. We must admit that it is far better to use a bicycle over a motor vehicle for short distance travelling. Imagine how useful would the bicycle be if even the small effort applied by man for climbing slopes and riding on rough terrain is reduced in it. “The e-Bike”. Our idea of implementation of the project was mainly based towards providing a tribute to the “GREEN ENERGY”.

Utilization of Coconut Fiber and Marble Slurry in Concrete
Authors:- Ajaz Ahmad Mallah , Basit Idrees Tak , Nasir Manzoor ,Asst. Prof. Mahendra Kumar

Abstract- Concrete is a composite material made out of fine and coarse total reinforced along with liquid concrete that solidifies over the long run. Concrete is most ordinarily utilized man made material on the planet. It is form capable, versatile, moderately fireproof, for the most part accessible, and reasonable. Unfortunately, the production of Portland cement releases large amounts of carbon dioxide, into the atmosphere, which causes enormous impact on the environment. Worldwide, the cement industry alone is estimated to be responsible for about 7% of all CO2 generated. 1.25 tones of co2 is emitted for production of 1 tone cement. Simultaneously enormous measure of characteristic assets are needed to deliver huge loads of cement each year which causes over misuse of normal assets. Consequently, the development business is constrained to search for other financial and supportable substitutes.

Land Use Change Detection Using Remote Sensing Technology
Authors:- Anshuman Kumar Yadav, Deepika Yadav, Ishant Choudhary, Mini Singh, Mr. Yogendra Sharma

Abstract- Land use land cover of any areas highly dynamic in nature and is highly prone to ongoing socio-economic and demographic changes in spatial perspective in this context the role of urbanization and consequent urban development in a fast urbanization country like India is crucial in bringing about rapid changes in rate of conversion of natural landscape into built-up landscape which finally is leading to a number of environmental problems. Therefore, an effort has been made in this paper to examine the land use land cover change of the district Gautam Budh Nagar, Uttar Pradesh, India over two different time periods of 2011 and 2021 in response to ongoing urbanization process and its impact on natural vegetation cover. For this purpose, the present study has identified the role of geospatial techniques to examine the change detected in land use land cover and associated changes in natural environments. The paper is based on remote sensing data of LANDSAT 8 for analyzing the LULC and its differential impacts on environment due to urbanization in Gautam Budh Nagar, Uttar Pradesh, India. Supervised classification of all the satellite images have been done to show various land use type on the study area.

Artificial Intelligence Powered Medical Expert
Authors:- Sagar Mallapur, Ravishankara K, Tejprakash C V

Abstract- Artificial Intelligence (AI) predictive techniques enables auto diagnosis and reduces detection errors compared to exclusive human expertise. Disease diagnosis is the identification of an health issue, disease, disorder, or other condition that a person may have. The study considered most frequently used databases, in which We further discuss various diseases along with corresponding techniques of AI, Machine Learning, and Natural Language Processing. Expert System using Artificial Intelligence interacts with the patients with the help of the Natural Language Processing (NLP) and takes the required information or data regarding the disease. Then calculates the possible outputs or diseases and their root causes and says those predictions back to the patient. . Finally, the paper also provides some avenues for future research on AI-based diagnostics systems based on a set of open problems and challenges.

Patient Health Monitoring System Using IoT
Authors:- Prof. U. P. Shinde, Asst. Prof. Anil B. Patil, Mr. Ajay R. Gaikwad , Asst. Prof. Umesh J. Tupe

Abstract- This paper depicts a method for using IoT to monitor a patient’s body 24 hours a day, seven days a week. Patient monitoring systems are becoming increasingly popular among researchers and patient guardians these days. Caregiving duties are increasing as the older population grows. As a result, patient health monitoring systems are becoming increasingly popular. The monitoring of patients is the basis for this paper. We created a patient monitoring device that is both dependable and energy efficient. It has the capability of sending real-time patient parameters. It allows clinicians to track the patient’s health parameters in real time. The proposed federal system continuously monitors the patient’s health utilizing several sensors attached to the Arduino board. The data is then sent to the server using the Arduino Ethernet shield. An alarm is sent to the doctor via an Android application loaded on the doctor’s smartphone if any of the parameter values exceed the specified threshold.

Optimal Design of Water Plumbing System in Multistoreyed Building
Authors:- Alina Nazim, Aman Yadav, Piyush Pandey

Abstract- Multistoreyed buildings are inevitable in today’s modern living. For plumbing purposes, the term “multi-storey” is applied to buildings that are too tall to be supplied throughout by the normal pressure in public water mains. Water main supply pressure of 8-12 meter (25-40 feet) can supply a typical two-storey building, but higher buildings may need pressure booster systems. The main aim of the study is to develop optimization model for designing down feed piping system in multistoreyed building by minimizing the cost of piping. The specific objectives of this study are: To develop linear programming-based methodology for the design of water plumbing system in multistoreyed building. To demonstrate the applicability of the developed optimal design method for example problem. To compare the performance of the developed optimal design method with traditional method of design.

IoT Based Smart Mirror
Authors:- Himakanksha Singh, Mayank Gupta, Kunal Khatri, Khushboo Shrivastav, Rabia Akhtar, Kamil Khan

Abstract- Smartamirrors are thought to be the way of the future. It’s a community of a connected world where we may check the news, temperature, weather, and other information while grooming ourselves infront of the mirror every morning. As a result, in suggested system, these quiet mirrors enable for internet news to be received and shown on the mirror screen. Additionally, it shows the present temperature, time, and schedule. As a result, system combines a Raspberry Pi 3 CPU with display for viewing the information, IOT-based electronics, and a temperature sensor. We used carefully modelled panels to construct the exterior frame. The outside frame is made from a perfectly sculpted panel. The system is then encased in customised glass with a rear frame. The mirror’s frame cavity now has precisely positioned amounts for the display housing to be installed. This is required in order to obtain the deliberate result.

Financial Instruments Fraud Detection Using Machine Learning
Authors:-Dr. Priti. Subramanium, Bhusawal Evangel Denis Rodrigues

Abstract- The rapid growth in industries mainly in the e-commerce sector has led to massive use of credit cards for online purchases and consequent surge in the fraud related to it which makes it necessary for banks to keep updating their fraud detection methods. Machine learning approaches are mostly being used to analyze and detect the increasing serious problem of credit card fraud. For discovering these fraud transactions banks make use of various machine learning methodologies. The performance of fraud detection in credit card transactions greatly depends upon the sampling approaches being carried out on the data-sets, selection of variables and detection techniques used in finding out the unauthorized activities. In this project the methods that have been used are logistic regression, neural networks, k-nearest neighbor are used for credit card fraud detection. I have also done oversampling to balance the data set. These techniques are applied on the dataset and output is generated .The performance of the techniques is evaluated for different variables based on sensitivity, accuracy and error rate.

Review on Electrical Transmission Technology
Authors:- B.Tech. Scholar Shivam

Abstract- I have put all the content in this research paper in such a way that after reading it all the doubt clear related to the electrical transmission technology. I have tried to give importance to most wireless transmission system in this particular system. Moreover, in this research paper the process of improving the power factor of the transmission line and I have also tried to find out how to transport electricity from one place to another by wire.

Design and Development of Regenerative Braking System
Authors:- Pranav R. Khot, Shubham V. Sonawane, Manish A. Atyalkar, Girdhar S. Gavali, Vaibhavraj S. Desai, Prof. Dr. Anantkumar J. Gujar

Abstract-The brakes are commonly use friction between two surfaces pressed together to convert the kinetic energy of the moving object into heat, though other methods of energy conversion may be employed as all the energy here is being distributed in the form of heat. Regenerative braking converts much of the energy to electrical energy, which may be stored for later use. We are also going to make a working model of regenerative braking to illustrate the process of conversion of energy from one form to another. Regenerative braking converts a fraction amount of total kinetic energy into mechanical or electrical energy but with further study and research in near future it can play a vital role in saving the non-renewable sources of energy.

Electronic Differential System Control Strategy for Electric Vehicles
Authors:- Prashant Vinayak Kadam, Prof. Nilesh Alone

Abstract- This paper presents a control strategy that is applied in turning control for decentralizedelectric vehicles known as the electronic differential system. The conventional mechanical differentialhas drawbacks, such as bulkiness and slow response. The electric system response is not only tentimes faster than its mechanical counterpart, but its accurate control even reduces the loss of powerfrom the motor to the wheel. Through the turning radius from the steering angle command thatthe driver gives, the controller can distribute torque to each wheel. After controlling each wheel’srotation, the vehicle can turn in neutral steering. The results show that this strategy can be effectivelyemployed on urban roads.

Physical, Chemical and Morphology Characteristics of the Malaysian Coconut Shell Powders (CSP)
Authors:- Hussin N., Ngalim A., Govindasamy S.A., Wan Ali W.K.A,
Othman Z., Zainol R., Abd Rahman Z., Abu Samah. A.H., Md. Radzi M.F., Ibrahim B.H, Ahmad@Ramli A.A., Md. Zailani N. , Osman A.G., Mohd Nawi M.R.

Abstract- Coconut shell (CS) raw materials used in this project were obtained from our previous by-products of copra processing. The methodologies involved are (i). Collection of CS materials, cleaned, air dried and kept in a proper container prior to production of coconut shell powder (CSP). CSP is a potential industry material and it has been reported by several industries as natural raw materials for production of repellent fillers, adhesives, composites and other high value added of non-food products. In this research, CS was further processed into powder form (CSP) by several steps of processing that will be discussed further in this finding; and the second methodology – (ii). A detailed evaluation of CSP was conducted for its chemical and physical properties. These analyses covered the determinations of: i. Color profiles; ii. Bulk density; iii. Screening on the morphology of CSP using a Scanning electron microscope (SEM); iv. Evaluation of fiber characterizations and v. Measurement of oil residual in the CSP. The aims of this research are to produce specialty CSP materials, identified the physical and chemical characteristics of the CSP; and highlighted CSP as high potential value-added products for non-food uses as an extra income for coconut farmers and related industries.

New Customer Acquisition in Retail Industry
Authors:- Asst. Prof. Dr. Anuradha Yadav, Research Scholar Noor Mohammed Faraz

Abstract- The Indian retail market is rising and so is the challenge to attract new customers has also transformed into new ways. A customer has unlimited retail options to look for his/her desired product and make the purchase decision. Getting a new customer or a potential buyer is certainly to enhance the profitability. Consequently, there is need to understand the efforts employed by the retailer to acquire new customer. This manuscript was written with purpose to understand retailer’s efforts toward new customer acquisition through a secondary data review of past research work. Based on the review of various variable have been identified to determine the perception of a retailer towards new customer acquisition. The impact of these concepts on new customer acquisition and customer satisfaction needs further deliberation and research. The study proposes a model that would through an empirical deliberation find the gap between dimensions of retailer’s and customer satisfaction of new customer acquisition and consumer’s dimension of store choice. However, the future research needs to test the model and know the customer’s response towards these efforts made by the retailers and to ascertain the success of these efforts from the point of view from the retailer.

Productivity Improvement in Manufacturing Industry Using Industrial Engineering Technique
Authors:-M. Tech. Scholar Shailendra Yadav, Prof. Trilok Mishra, Prof. Sachin Jain

Abstract- In today’s increasingly competitive world, it is important to constantly improve, be it amanufacturing or service industry. Quality with quantity is a main characteristic which helps a company stay in the competition. Technology has taken leaps of development lately and this has brought about an increase in the customer demands. The main aim is to studythe current capacity, analyze it to find areas of improvement and make an improvementproposal tomeettheforecasted increasein demand. This thesis presents the current performance of outputs and capacity of the plant calculated using continuous data collected in shop floor. In each workstation the processing time is different and the longest time consumption workstation will be identified as a bottleneck workstation. The identified bottle neck station will be analyzed to reduce the processing time which increases production rate.

Hypoglycemic Encephalopathy
Authors:- Ayouche Othman, El Bakkari Asaad, Nabil Motassim Billah, Ittimad Nassar

Abstract- We report the case of 23-year-old man without medical history who intentionally ingested a high dose of biguanide. He was found lying in a coma state with low blood glucose, transferred to the emergency department for non resolved biguanide intoxication.

Current Scenario of Breastfeeding in India
Authors:- Associate Prof. Dr. Ritu Pradhan, Anupreet Kaur Sobti

Abstract-Breastfeeding is an unparalleled universally recommended intervention for the promotion of health and nutrition of children and reduction of mortality. In spite of the WHO recommendations and baby-friendly hospital initiative, breastfeeding practices are inappropriate due to maternal, infant, socioeconomic, and cultural factors. WHO recommends the use of various Infant and Young Child (IYC) indicators for assessing infant and young child feeding practices. Unlike in 2008, no distinction is made between core and optional indicators in this set of recommendations (2021). To support programme assessment, planning and monitoring, national-level reporting on estimates for IYCF indicators should take place approximately every three to five years. NFHS-5 findings show a worrying trend in child feeding practices. Despite the importance of breastfeeding practices for the healthy growth and development of infants and young children and health of mothers, data is not so encouraging. Necessary action is therefore the need of the hour. Breastfeeding is not only a mother’s responsibility. To enable all mothers and children to be breastfed, it requires support from governments, healthcare systems, families, communities, employers and work places to actually make it work. We need to leverage all sectors of society to make breastfeeding successful for mothers and babies. Appropriate individual and group counseling for families and community is required. Adequate funding and implementation of policies and programmes is also necessary.

A Color Image Steganography Method to Hide Multiple Images with LSB Coding
Authors:- Research Scholar Palac Gupta, Deepinder Kaur (HOD)

Abstract- Data and information security is one of the crucial tasks in the digital and data communication. In the ancient time there are various ways to hide data into various objects. In modern day the data security is also very important. Data can be of various types like text, image, audio or any other form. In image steganography image acts as cover image and it can hide text, image and other form of data. In case of multiple image steganography various image can be hidden in a single image. Benefit of this approach is that those hidden images can hide the data also. So it becomes very difficult to access those hidden data. Steganography can be classified into two categories namely spatial domain and transform domain. Both have different advantages. In this paper a novel technique for hiding multiple digital images in a colored digital image with the help of LSB encoding is proposed. 8-bit LSB technique will be used for the embedding of data into the cover image which is also known as stego digital image. The proposed technique will be able to hide various images with the encrypted method and then with the help of decoding method images can be recovered. The proposed technique will be compared with the already existing multiple image hidden steganography technique. Various objective parameters like hiding capacity, file size before steganography and after steganography, mean square error and peak signal to noise ratio will be taken as objective parameters. All the implementation will be performed in the Matalb software.

Voltage and Other Parameters Monitoring System Using Android Mobile Application
Authors:- B.Rajalakshmi, S.Surya

Abstract- In this paper,have proposed android mobile displaytoeasy voltage, current monitoringin a transformer. When testing and troubleshooting the electrical works/PCB, the person face issues while placing probes on 2 points on the electric lines and simultaneously noting the value in multi-meter . As the conventional model consumes more time as well as it also leads to faulty/improper measurements and also causes accidents when in contact with live wire. To overcome the issue, have proposed to integrate voltage display through the user application for a virtual voltage display while trouble shooting/testing the system. An arduino is used in the circuit for processing and displaying output. The Arduino Nano V3.0 controller and Bluetooth HC-05 are a cheap microcontroller and wireless device, respectively. The new Android smartphone application that monitors the voltage and current measurements uses the open source MIT App Inventor 2 software. The voltage and current measured, system is designed smartly.

Studies on Development of Process Technology for Preparation of Multigrain Extruded Snacks
Authors:- Kokani Ranjeet Chunilal (Pricipal), Shinde Gaurav Sanjay

Abstract- The aim to prepare Extruded snacks as a nutritional point of view and to provide convenience to the consumer. The main ingredients which were used for preparation of crackers were Soyabean flour, Ragi, Rice and Corn flours. All ingredients contain Energy, Protein, Carbohydrates, Fat and Vitamins such as vitamin A, Thiamin (B1), B3, vitamin C, Folate (B9) and Minerals such as Ca, K, Zn, Ph, Mg, etc. A snack was a good tea time snacks typically made from grain & flour and mixing of multi flours. Snacks are usually crispy, crunchy in taste, small in size. For preparation of multigrain extruded snacks ingredient used like Soya flour, Ragi Flour, Corn Flour and Rice Flour were mixed together with other ingredient. Then make a smooth dough after that filling it in hand extruder and frying at 120°C for 10 to 15min till golden brownish colour than cool it and packed it for further study. For standardization of recipe 3 trials had done T1, T2, T3, and from that trial T2 has selected according to sensory evaluation, among all the levels of Extruded snacks prepared trials T2 recorded highest score in all the quality attributes and good storage ability. Proximate composition of extruded multigrain snacks were Moisture content (12.75%), Ash (4.2%), Fat (4.6%), and Protein (16.9%), Carbohydrate (60.8%), Energy (352.65kcal) etc. It was concluded that the Extruded Snacks made from Multigrain can be store for three months in Low density polyethylene pouches at room temperature. So the Extruded Snacks made from Multigrain can be satisfy the consumer in acceptable.

Data Balancing and Apply Machine Learning Approach for Unbalanced Cancer Dataset
Authors:- M. Tech. Scholar Kamal Singh Baghel, Asst. Prof. Avinash Pal

Abstract- In medical sciences and biomedical domain, prediction of cancer disease is most difficult task since the machine learning techniques making computer aided diagnosis. In world, main causes of death are due to cancer diseases. Thus, for detecting and diagnosis of cancer diseases of a patient, there is a need to develop a decision support system. Data mining arrangement systems, the main aim of our project is to predict more accurately and precisely the presence of cancer disease in more efficient manner. With high dimensional unbalanced dataset with huge number of attributes, it is a challenging task in Data Mining and Machine Learning of Cancer based diseases. The imbalanced class distribution is one of the most frequently occurred phenomenons in the real-world health & biomedical datasets, which significantly causes the overall and con siderable loss of many essential pathological information and crucial details from an abnormal class. Indeed, Many of the times the misdiagnosis of these abnormal classes is very severe than the normal classes in biomedical disease diagnosis and cancer diagnosis. These are some main and important factors that further results in a lower rate of classification accuracy and precision of an abnormal class and incorrect diagnosis results with less sensitivity. Therefore, there is a need to establish a significantly effective classification machine learning model approach for limited and imbalanced health & biomedical cancer dataset and other biomedical datasets. The proposed approach will surely increase the accuracy and the precision of the output rather than that of the traditional SMOTE Algorithm with increase in the F-Score and Recall which also known as sensitivity. The proposed customized approach with addition to the Centroid method replacing the Euclidean Distance method will increase the efficiency and predictability of the system at very comparable levels. The overall results will be carried out effectively over the Cervical Cancer Dataset used in this study are taken out from the database repository which is UCI Machine Learning Repository and other Bio-Medical Imbalanced Datasets such as Diabetes, Heart Diseases can be used from Github & data world repositories, The Cervical Cancer Imbalanced Dataset is The dataset which is comprises habits, demofigureic information, and historic medical records of total 858 patients having.

Multipath Congestion Control and Predication and Detection of Attacks in MANET
Authors:- M. Tech. Scholar Vinita Kashid, Asst. Prof. Dr. Mukesh Patidar, Hod. Mr. K. K. Sharma

Abstract- Manet is self-configuring and self-organizing network; it doesn’t rely on pre-existing infrastructure. Manet or mobile ad-hoc network is capable of forming proxy network without the necessity of a central administration or any standard support devices. It is a wireless network that can communicate to each other. Since it’s a wireless network therefore its biggest problem is Congestion. This congestion occurs due to the presence of heavy traffic (packets) in the network. The controlling of the congestion is important within the manet, the quality congestion control mechanism isn’t ready to handle the complex or any hardcore congestion, if this congestion couldn’t be control it will collapse the whole network. We have proposed the congestion control by performing the default network nodes using Network Simulator NS2.35 with the Routing Technique of AODV and DSR, along with them we perform our routing technique called CCAODV (Congestion Control AODV) thus after final result one can see the workability and enhanced performance in packet delivery ratio and throughput from our proposed work.

Detection and Mitigation of Mitigate Denial of Service (Dos) Attacks Using Trust-Based Mechanism
Authors:- M. Tech. Scholar Deepak Chouhan, Asst. Prof. Avinash Pal

Abstract-The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envaisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in computation, storage, and network capacity, which makes them easy to hack and compromise. To achieve secure development of IoT, it is necessary to engineer scalable security solutions optimized for the IoT ecosystem. To this end, Software Defined Networking (SDN) is a promising paradigm that serves as a pillar in the fifth generation of mobile systems (5G) that could help to detect and mitigate Denial of Service (DoS) and Distributed DoS (DDoS) threats. In this work, we propose to experimentally evaluate an entropy-based solution to detect and mitigate DoS and DDoS attacks in IoT scenarios using a stateful SDN data plane. The obtained results demonstrate for the first time the effectiveness of this technique targeting real IoT data traffic.

Review of Uses Cassia Sophera Linn Plant Belonging to Family Caesalpinieae
Authors:- V.K. Dwivedi, D. Thakur

Abstract- Nothing existed in the world of thought matter and experience which is not a medicine” Disease, decay and death have always co-existed with life. The study of diseases and their treatment must have been contemporaneous with the down of human intellect. Man’s existence on this earth has been made possible only because of the vital role played by the plant kingdom in sustaining his life. The wealth of India is stored in natural flora India is virtually a herbarium of the world. India possesses all type of climate conditions varying from temperate to tropical and dry to humid and wet. There are about 2060 higher plant species being used in Indian system of medicine and nearly 600 species ayurvedic system, 50 in Unani system and 550 species in phytopharmaceutical industries. Besides these, many more are being used in folklore and traditional remedial systems. This article aims to provide a comprehensive review on the therapeutic and pharmacological as well as phytochemical aspects of Cassia Sophera plant. It is widely used in traditional medicinal system of India has been reported to possess Antioxidant, cytotoxic, and Hemorrhoideic activity etc. The medicinal potential of flora has been exploited to isolate and achieve various constituents like steroids, terponoids, essential oils,polyacetylen, hydrocarbon, Alkaloids, peptides, Carbohydrates, flavanoids etc. It is clear that the medicinal properties and therapeutic uses of Cassia Sophera as well as its phytochemical investigations prove its significance as a valuable medicinal plant [1].

Secure MANET using Curve-Based Cryptography
Authors:- M. Tech. Scholar Lalita Mandloi, Asst. Prof. Avinash Pal

Abstract- Mobile Ad hoc Network (MANET) is a mobile and infrastructure less network, widely used in various applications. In this paper, we study the major security issues in MANET to reduce the malicious activity at the nodes. To reduce theunsecured network, Enhanced Adaptive Acknowledgement Scheme (EAACK) is proposed and it involves Acknowledgement (ACK), Secure Acknowledgement (SACK), and Misbehavior Report Authentication (MRA) schemes. In EAACK scheme, the 2b (2-Bit) packet header is used and it overcomes some of the disadvantages of Watchdog behavior. In this work, the sender has to digitally sign the ACK packets and the receiver has to verify it. The proposed Scheme is applied to 40% of malicious nodes and Routing overhead (Ro) hits the value 0.6. The Network performance is better when the value of Ro is 0. In order to secure more, Credibility Based Sequence Distance Vector Routing (CBSDV) and Curve based cryptographic technique is used. Simulation results show that proposed scheme provides better secure network and CBSDV, hop count, time duration, energy values and trust scores play a deciding factor between the source and destination in the network.

Facial Expression Recognition: A Review
Authors:- M.Tech Scholar Shivani Patidar, Asst. Prof. P. Kumar Choure

Abstract-Facial expressions are the fastest means of communication while conveying any type of information. These are not only exposing the sensitivity or feelings of any person but can also be used to judge his/her mental views. This paper includes the introduction of the face recognition and facial expression recognition and an investigation on the recent previous researches for extracting the effective and efficient method for facial expression recognition.

Review Articles of Piston Designing Methodology and Optimization of its Performance
Authors:-M. Tech. Scholar Rajesh Jamra, Asst. Prof. Dheeraj Shriwas, Associate Prof. Devendra Singh Sikarwar

Abstract- In this paper gives a review of various piston design approach and provide a summary of conceptual design method previous research articles. For purpose of paper to collection of Literature review of related to piston designing contrast to designing drawback and different type of material optimization problem. To identification and observation of piston design method, Materials optimization suitable to piston designing with its performance evaluation see paper section-II summaries of algorithm of piston design.

Advanced Approach for CORDIC Architecture Using Carry Select Adder
Authors:- Harsit Tiwari, Tarun Verma

Abstract- We have developed an efficient CORDIC algorithm in this research, which uses many rotations to reduce the CORDIC rotation angle. Instead of employing a regular adder, this innovative CORDIC method employs an area efficient carry select adder (CSLA). In many data processing techniques, this adder can do quick arithmetic operations. Finally, several parameters such as area, power, and latency are evaluated, and the proposed approach reduces these when compared to the existing method.

A Descriptive Study to Assess the Level of Awareness on Covid 19 Precaution among Home Makers at Selected Areas of Chengelpet District
Authors:- Associate Prof. S.Kavitha, Associate Prof.P. Sangeetha, Dr. N. Kokilavani (Principal)

Abstract-The Covid-19 pandemic worldwide caused by severe loss of health and life of many people. Covid appropriate behaviours were entrusted by government of India to reduce the covid-19 spread across the nation. This article reveals the level of awareness on covid-19 preventive measures among the home makers, it is a Non- experimental design – Descriptive research design was adopted to selected 50 clients from selected areas of chengelpet district by purposive sampling technique, assessed by the structured multiple choice questionnaire and analysed by using descriptive statistics.The findings of this study suggests 61.2% of clients are having inadequate awareness, 28.4% of them having moderately adequate awareness and only10.4% falls in category of adequate the level of awareness on tuberculosis. This study concludes that around 61% of the clients are having inadequate awareness on covid19 appropriate behaviour. The researcher also suggests that an educational intervention can help the clients to improve their awareness thereby it reduces the spreading rates of Covid 19 in forth coming months.

A Review on Wireless Sensor Network for Energy Consumptions
Authors:- M. Tech. Scholar Amit Garg, Asst. Prof. Mukesh Kumar Gupta

Abstract- WSNs have made conceivable ongoing information total and investigation on an extraordinary scale. Normally, they have stood out and accumulated across the board claim towards applications in different regions including calamity cautioning frameworks, condition checking, human services, wellbeing and key zones, for example, guard observation, reconnaissance, and interloper recognition. If there should arise an occurrence of atomic force plant if any little deferral happens for information sending because of any hub disappointment may brings about serious catastrophe. Thus successful Topology Control is required to acquire a vitality productive sensor organize regardless of whether any hub comes up short. A vitality proficient topology control utilizing crossover bio enlivened calculation based group head choice is introduced in this work.

Newfangled Approach for Analyzing the Impact of Artificial Intelligence in E- Commerce
Authors:- M.Tech. Scholar Shriya Asati, Associate Prof. Dr. Sunil Phulre, Prof. Dr. Bhupesh Gour (Hod)

Abstract- During the last decade of the twentieth century and among the first one and half decades of the third millennium-up to the best knowledge of the author of this thesis, the issue of Business Intelligence and its involvement in business environment and in Electronic Commerce environment in particular for better achievement, has ‘often’ been dealt with as several individual unidirectional problems, or quite seldom as bidirectional problem. This thesis presents however a research project that has differently handled the said issue as a ‘single’ multidirectional problem. The general trend to utilize the concept of Business Intelligence was through considering it as a tool or a means that is actively reliable in decision making concerning business organizations with respect to their partial activates besides their strategic and executive planning.

Intrusion Prevention for Covid-19 Using IOT Devices
Authors:- Asst. Prof. Guru Prasad, Abhijeet

Abstract- This COVID-19 pandemic caused by novel corona virus is continuously spreading until now all over the world. Many precautionary measures have been taken to reduce the spread of this disease where wearing a mask is one of them. We propose a Raspberry Pi based system that restricts the growth of COVID-19 by finding out people who are not wearing any facial mask. While a person without a mask is detected. As we know fever is also a symptom of COVID-19, so our system will check body temperature of the person and also it will check if that person is maintaining proper social distancing or not. If the person follows all standard operating procedures then the automated door is opened he/she can enter. If the person is not following any one among three Standard Operating Procedures then the person will not be allowed to enter into the office / school / college. It alerts through buzzer.

A Comprehensive Review on the Various Steganography Methods Based on Encryption and Data Hiding
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- As the technology is advancing day by data and with the same pace information and its secure transmission is also crucial in the process of information transmission. Images are usually the simplest digital data which is used in multiple applications. From satellite to whatsapp applications all around and there are billions of images that are transmitted through digital communication channel. To solve the problem of safest delivery of message to the receiver encryption with the steganography method can be used simultaneously. Various researchers had proposed various ways of hiding data into digital images either by using encryption and steganography and some has combined both these methods to make data more secure. In this review paper a deep literature survey is performed on the steganography of digital images where encryption and data hiding are used for making the data safer.

IoT based Smart Mirror using Raspberry Pi
Authors:- Anubha Jain, Diwakar Kumar, Kirti Agrawal, Assistant Professor Shruti Sharma

Abstract- This project represents the development and designs of a mirror that Shows a graceful interface for glancing information, and it is also used for setting the To-Do list. And in this android facilities can also be added. The Smart mirror is such kind of device that functions as a mirror with many advanced capabilities of displaying multimedia data i.e. Videotext and images.

Implementation of Rank Positional Weight Technique Inbalancing of Production Line in a Manufacturing Industry
Authors:- M. Tech. Scholar Vivek Barenge, Prof. Trilok Mishra, Prof. Sachin Jain, Prof. Harimohan Soni

Abstract- This work mainly focuses on application of line balancing to minimise idle time of work station in production line. The methodology adopted includes calculation of cycle time of process, identifying the non –value-added activities, calculation of total work load on station and distribution of work load on each workstation by line balancing, in order to improve the efficiency of line. A production line of a shaft manufactured by K.K. Engineering Works, Govindpura, Bhopal (M.P) is considered for this research work and time study is performed in order to determine the standard time for each process. Then, rank positional weighted method (RPW) is evaluated with the help of standardized data to solve the assembly line problem and defines the line efficiency which provides a better productivity in the existing flow line by reducing the idle time.

A Review on Block Chain in Cloud Computing Healthcare Data Security
Authors:- M.Tech. Student Atul Soni, Asst. Prof. Manoj Kumar Gupta

Abstract- This work mainly focuses on application of line balancing to minimise idle time of work station in production line. The methodology adopted includes calculation of cycle time of process, identifying the non –value-added activities, calculation of total work load on station and distribution of work load on each workstation by line balancing, in order to improve the efficiency of line. A production line of a shaft manufactured by K.K. Engineering Works, Govindpura, Bhopal (M.P) is considered for this research work and time study is performed in order to determine the standard time for each process. Then, rank positional weighted method (RPW) is evaluated with the help of standardized data to solve the assembly line problem and defines the line efficiency which provides a better productivity in the existing flow line by reducing the idle time.

College Experience of Students in a Faith-Based Institution
Authors:- Vo Truong Giang

Abstract- This paper aimed to understand the experience of college students who studied under a faith-based institution, especially in Thailand. By using a one-on-one interview form, the researcher collected data of eighteen participants who regularly studied in a faith-based institution. Each interviewee was asked a list of ten questions focused on their personal demonography, feeling, thinking, and experience about four major aspects of the topic – physical, mental, spiritual, and social. All participants completed providing the answers under the normal condition. Through reading the transcribed texts several times, the data were formed into different categories and themes for analysis. The result showed that students had positive perspectives about faith-based institutions. Health educations that applied religious’ principles were taught both direct – lessons and indirect – encouraged programs. Moreover, these institutions provided healthy environments and mental support systems for students to grow their mental health and spiritual life. Both religious and non-religious students reported the effective teachings of faith-based institutions which changed their perceptions and behaviors positively in terms of social interaction development.

Iot Based Smart Farming System
Authors:- Aniket Chande, Ayush Kumar Chaudhary, Govind Gurme, Prof. Mrunalini Bhandarkar

Abstract- In India over 60% population is relied on agriculture as the basic source of their income. As a result, it contributes to 1/3rd of Indian economy. That is the reason agriculture is integral part of Indian economy. Also, it plays crucial role in development of country. And traditional farming degrading the development in agriculture, there is necessity of technological intervention in agricultural practices to increase overall grade of farming. There are various methods in farming that demands automation and reduced human efforts. Hence, agriculture can be made smart using IoT and other smart automation tools & technologies. Smart agriculture increases crop yield, quality, decreases water wastage etc. Internet of Things (IoT), Machine Learning (ML), and automation technology has brought revolution in every field, making everything smart and intelligent. The main objective of this project is to propose IoT based Smart Farming System supporting farmers in getting Livestock Data, Temperature, Soil Moisture, Humidity, PH measures and fire detection for efficient monitoring of environment which will empower them to increase their overall grade of service and their product quality. This will increase mainly the income of farmers and reduce the unnecessary expenses. The IoT based Smart Farming System being recommended is assimilated with Arduino, Sensors and a Wi-Fi module producing live data feed.

Low Power Adiabatic Logic Design for VLSI Applications
Authors:- Sanjay Kumar, Prof. Sher Singh, Asst. Prof. Suresh S.Gawande

Abstract- The ever-increasing transistor integration in VLSI have augmented the power dissipation due to transistor switching in a massive amount. Power reduction and low power circuits have become a major research topic now a days. Adiabatic logic style is found to be an effective solution in achieving low power. In this paper, various adiabatic logic approaches have studied and compared with a proposed adiabatic logic based on PFAL logic circuit. Adiabatic logic styles such as 2N-2P, 2N2N-2P, DCPAL and PFAL are considered and their average power dissipation and delay at different frequencies are compared with the proposed circuit. the proposed circuit has achieved the average power consumption of 1.649nw, 1.938nw, 1.932nw, 2.596nw for BUFFER, NAND, NOR and XOR circuits respectively at 10MHz. At 32nm technology the average power consumption of 0.842nw, 0.942nw, 0.957nw, 1.038nw for the same logic at 10 MHz. From the results it is concluded that proposed ON OFF DCDB-PFAL based circuit performed very well and achieved lowest power consumption among all other adiabatic logic circuits.

Adiabatic Logic Circuits Designfor Low Power in Applications in Digital Circuits
Authors:- Sanjay Kumar, Prof. Sher Singh, Asst. Prof. Suresh S.Gawande

Abstract- With the continuous scaling down of device technology in the field of VLSI circuit design, low power dissipation has become one of the primary concern of the research field. With the increasing demand of low power portable devices, adiabatic logic gates prove to be an effective solution. This paper presents different types of adiabatic logic families such as 2N-2N2P, PFAL (Positive Feedback Adiabatic Logic), DCPAL (Differential Cascode and Pre-resolved Adiabatic Logic) and a proposed circuit based on the PFAL logic circuit. This paper investigates different adiabatic logic families such as ECRL, 2N-2N2P and PFAL. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100MHz frequency, for fair comparison of results W/L ratio of all the circuit is same. Finally average power dissipation characteristics are plotted with the help of a graph and comparisons are made between different logic families.

A Descriptive Study to Assess the Level of Awareness on Covid 19 Precaution among Home Makers at Selected Areas of Chengelpet District
Authors:- Associate Prof. Ms.S.Kavitha, Associate Prof. Ms.P. Sangeetha, Dr. N. Kokilavani (Principal)

Abstract- The Covid-19 pandemic worldwide caused by severe loss of health and life of many people. Covid appropriate behaviours were entrusted by government of India to reduce the covid-19 spread across the nation. This article reveals the level of awareness on covid-19 preventive measures among the home makers, it is a Non- experimental design – Descriptive research design was adopted to selected 50 clients from selected areas of chengelpet district by purposive sampling technique, assessed by the structured multiple choice questionnaire and analysed by using descriptive statistics.The findings of this study suggests 61.2% of clients are having inadequate awareness, 28.4% of them having moderately adequate awareness and only10.4% falls in category of adequate the level of awareness on tuberculosis. This study concludes that around 61% of the clients are having inadequate awareness on covid19 appropriate behaviour. The researcher also suggests that an educational intervention can help the clients to improve their awareness thereby it reduces the spreading rates of Covid 19 in forth coming months.

A Review of Welding Process on Microstructure & Mechanical Properties of Zinc Brass
Authors:- M. Tech. Scholar Jatin Dalal, Asst. Prof. Manoj

Abstract-One of a kind lapping welding joints of Cu & metal conductors are made by grinding blend weld process methodology at a no. of welded heating i/ps. The impact of welded heating i/ps on nano-design & m/c properties of get over welding combinations at 2 assorted joining plans (for instance Propelling side & Retreating side joint courses of action) was analyzed. In dual combination plans, Cu & metal plating are arranged on the topped & base plates, independently.

IoT based Smart Mirror using Raspberry Pi
Authors:- Anubha Jain,Diwakar Kumar,KirtiAgrawal, Asst. Prof.Shruti Sharma

Abstract- This project represents the development and designs of a mirror that Shows a graceful interface for glancing information, and it is also used for setting the To-Do list. And in this android facilities can also be added. The Smart mirror is such kind of device that functions as a mirror with many advanced capabilities of displaying multimedia data i.e. Videotext and images.

Feasibility Analysis of Single Effect Vapour Absorption Systemin Dairy Industry
Authors:- M. Tech. Scholar Arvind Kumar, Prof. Suresh Bhadoriya

Abstract- Today’s world is facing two most important environmental problems. They are the energy crisis and the greenhouse effect. Scientists are working on how to eradicate these problems. Most of the today’s innovations are based on this fact. Lithium-Bromide and water driven absorption refrigeration cycle is a burning example of this concept, which not only helps in minimizing the fossil fuel usage, hence the reduced CO2 gas emission but also utilizes the low-grade heat from various industries and data centres.Energy, exergy and advanced exergy methods are used to analyse a milk powder production facility. In this study, feasibility analysis of single effect vapour absorption systemin dairy industry has been evaluated.

IoT Based Anti-Poaching Alarm System for Trees in Forest
Authors:- Pankil Chhabra, Teerth Jain, Harshvardhan Kalaskar, Prof. A. V. Bhamare

Abstract- All around the world there are numerous occurrence about stealing of trees like sandal, sagwan, timber etc. These trees are expensive and pitiful. They are utilized in medicine, beautifying agent, furniture etc. To limit their sneaking and to spare woodland around the world some preventive estimates should be conveyed and sometimes in forest, fire broke out which cause destruction to wildlife animal and also tree so it is necessary to control fire as soon as possible. For this we have built up a framework which can be utilized to limit sneaking. The structure framework utilizes three sensor i.e. tilt sensor, vibration sensor, flame sensor to recognize the tendency of tree when its being cut, to detect unlawful logging and to detect fire in forest respectively. And with the help of IOT model information being sent to Forest authorities.

Smart Grid Management by Genetic Algorithm and Renewable Resources
Authors:- M.Tech. Scholar Mahesh Nair, Prof. Lavkesh Patidar

Abstract- As power requests are expanding day by day causing unbalance in the present grid framework which brings about different causes like load shedding, unbalance voltage and so on which at last influences the end users. Presently to stay away from every such circumstance the main alternative is to take care of the demand by generation but, world are additionally slacking with the conventional sources so producing more power is not helpful by traditional ways. The power industry has adopted “smart” grids that use information and communication technologies, which may make electric power systems more reliable and efficient. This paper has proposed a grid load balancing by modified genetic algorithm and renewable resources. Genetic algorithm provides a combination of renewable resource with non-renewable power resources. Experiment was done on different environmental condition to get better comparisons.

Feature Extraction and Classification Techniques for Analysis Stress Using EEG Signals with Web Application
Authors:- Sowmya H D, DR. Girisha GS

Abstract- The biological response to stress originates in brain that involves different biochemical and physiological effects. Numerous basic clinical strategies to survey pressure depend on the nearness of explicit hormones and on highlights separated from various signs, including electrocardiogram circulatory strain, skin temperature, or galvanic skin reaction. To screen pressure various strategies can be utilised. In this task for an anxiety acknowledgment, Electroencephalogram (EEG) signal is utilised. Electroencephalogram (EEG) signal is a neuro-signal that is produced due to diverse electrical exercises in the mind. Various sorts of electrical exercises related to various conditions of the mind. These signs can be caught and handled to get the helpful data that can be utilised in early location of some physiological state. In this proposed system, EEG signal database is pre-processed and features are extracted. Classification of stress level is done by implementing machine learning algorithms. In which Random Forest will provide the better accuracy.

A Review Article of ANN and Adaboost Based Effective Face Recognition and Improvement of Classification Training
Authors:- P.G. Scholar Priyanshu Tamrakar, Assistant Professor Hemant Amhia

Abstract-The Face Recognition (FR) is growing as a major research area because of the broad choice of applications in the fields of commercial and law enforcement. Traditional FR methods based on Visible Spectrum (VS) are facing challenges like object illumination, pose variation, expression changes, and facial disguises. Unfortunately these limitations decrease the performance in object identification and verification. To overcome all these limitations, the Infrared Spectrum (IRS) may be used in human FR. So it leads and encourages the researchers for continuous research in this area of FR. Simultaneously, the present study emphasizes the use of three dimensional cubic dataset i.e. Multi/ Hyperspectral Imagery Data in FR. The IR based Multi/ Hyperspectral Imaging System can minimize the several limitations arise in the existing and classical FR system because the skin spectra derived with cubic dataset depicts the unique features for an individual. Multi/ Hyperspectral Imaging System provides valuable discriminants for individual appearance that cannot be obtained by additional imaging system that’s why this may be the future of human FR. This paper also presents a detailed and time to time review of the literature on FR in IRS.

Design and Analysis of Compatibility of Crash Box with Trigger and Thickness Variation for Vehicle Frontal Part During Low Velocity Collision
Authors:- M. Tech. Student Harikrishna.S, Prof. Nilesh A Sakle

Abstract- The frontal impact as per the statistics is the most common means of phenomena when it comes to collision and thereby results in several injuries and fatalities. Therefore the design of crashbox has become an important area of focus for vehicle structure to deform and absorb the impact energy during collsion. The crash box deforms by absorbing the force and reduces the force acted on the longitudinal members there by preventing the collision force intrusion to passenger cabin. Triggers can be implemented in the design of crash box to help in achieving sequential deformation pattern. The crashbox is tested at 15 kmph based on RCAR (Research Council for Automobile Repairs) regulation. A crashbox of a Sedan has been measured and designed to been taken as a benchmark. A hexagonal crashbox has been designed with trigger holes and trigger thickness variations and is compared with the benchmark Sedan crashbox to determine its deformation characterisitcs. The main objective is to design a crash box with trigger and thickness variation to aid the longitudinal members using Creo 2.0 software and analyse the overall behaviour & characteristics using the ANSYS software.

Development of Web Server Using AI
Authors:- Bhavana.B Sunanda Bhargavi Devika.B

Abstract- Website: A collection of web pages which are grouped together and usually connected together in various ways. Web server: A project hosts a website of twitter management system. Artificial intelligence (AI) is the ability of a computer program or a machine to think and learn. Study of social network platforms such as twitter.

Android Based Smart Shopping System
Authors:- Raji Bokade, Prof. Nitin Deotale

Abstract- E-commerce has taken the world by surge due to its limitless advantages. Even so, many customers find themselves getting stuck in chicanery and receive trite products. They tend to incline towards the traditional or off-line shopping which is more trustworthy. But traditional shopping seems too time consuming and includes a lot of labor. In an attempt to bridge this gap between the extant traditional shopping and the burgeoning online shopping, this paper discusses an application wherein people can exploit the advantages of both off-line and on-line shopping. This system can be implemented by any shop and can be used at internet and smartphone friendly places. The application mentioned here would read the barcode of the product and add it to the cart in application with methods to change or edit the list. Payment gateway is provided to make payments. Shops can provide an online portal, which would avoid losing customers. Since the application is available on the smartphone it is easily accessible and readily available.

A Comprehensive Review on the Various Steganography Methods Based on Encryption and Data Hiding
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- As the technology is advancing day by data and with the same pace information and its secure transmission is also crucial in the process of information transmission. Images are usually the simplest digital data which is used in multiple applications. From satellite to whatsapp applications all around and there are billions of images that are transmitted through digital communication channel. To solve the problem of safest delivery of message to the receiver encryption with the steganography method can be used simultaneously. Various researchers had proposed various ways of hiding data into digital images either by using encryption and steganography and some has combined both these methods to make data more secure. In this review paper a deep literature survey is performed on the steganography of digital images where encryption and data hiding are used for making the data safer.

Smart Automation Attendance System using Neural Networks
Authors:- Satwik Ram Kodandaram, Kushal Honnappa, Rishab Darshan S

Abstract- A Traditional Attendance system will be a huge burden on teachers. After marking down, it manually, they have to upload it to some database to maintain the student’s records. When there is a batch of students more than 500, doing it manually is imaginary. To resolve this problem, a smart and auto attendance management system is utilized. But authentication is a very important issue in this system. The smart attendance system is generally done with the help of biometrics. Face recognition is one of the best biometric methods to improve this attendance system. Being a prime feature of biometric verification, facial recognition is used in several applications like video monitoring. By utilizing this system, the problem of proxies and students being marked present even though they are not physically present in the class can be easily solved. The main implementation step used in this system is face detection and recognizing the detected face. This paper proposes a model for implementing an automated attendance management system using ANN and CNN. After this, the student’s faces are mapped to their USN (University serial number) or ID. When the student’s face is recognized and if they are present in the current location of the teacher, automatically the USN mapped to that student is marked as present in the database. In this model, the teacher needs to hosts the system through a web application or android application. While hosting the teacher’s current location is taken. This model will be a successful technique to manage the attendance and records of students.

To Design and Analysis of Staad Based Chimney Design and Air Flow Observation
Authors:- M. Tech. Scholar Shivraj Patidar, Prof. Sourabh Dashore

Abstract- It has been observed that most of the existing studies have focused on the load considerations for design of tall chimneys. To make a further contribution to this study, this paper presents the load parameters considered for the design of RCC chimney and focuses on one of the structural parameters of RCC chimneys viz. the effects of number of supports to the flue. A brief review on the types of supports is presented in this paper and analysis is carried out for different kinds of supports to the flue. The comparison of results is plotted. The software STAAD Pro and MS Excel sheets have been used for design.

Importance of Smart Sensor Technology in IoT Based Applications
Authors:- Ankita S Sawalkar

Abstract- Nowadays , there is a large requirement of Smart Sensors as recent technologies are developing with high speed electronic circuits with low cost. These collaborative interactions need higher quality, reliability, and economic efficiency of technical products. In this article, there will be an overview about Smart Sensors and Sensor Technology in today’s IoT based applications with structures, types and example.

A Comprehensive Review of Various Face Detection and Recognition Techniques
Authors:- Research Scholar Amritpal Kaur, Asst. Prof. Shaveta Bala

Abstract-From the last decade the computer vision and the machine learning fields has various applications in almost every field of artificial intelligence. From object detection to recognition, bar code reading to biometric data matching, from vegetable classification to vehicle information extraction in almost every area both of these fields are dominating. For the identity verification face detection and recognition are one of the prime steps. Various researchers have developed various algorithms for face detection and recognition. All of these methods have some pros and cons. Some are fast in execution and some have high accuracy. In this review paper a comprehensive review is performed on the face detection and recognition techniques so that various researchers could find the insight of the various researches performed on this field of artificial intelligence.

Evaluation of Spectrum Sharing in Cognitive Radio Networks Using Fuzzy Logic
Authors:- Anooja.B, Princy Merin Jose

Abstract- Cognitive radio (CR) network is the footstep and essential need of the new wireless emerging technologies like the Wireless Sensor Network (WSN), Internet of Things (IoT), Bluetooth, and Vehicular Ad Hoc Network (VANET). Due to tremendous progress in the number of wireless devices and their traffic, large scale use of these technologies may soon cause a shortage of spectrum as all these technologies use unlicensed bands. So, CR is a vital choice for their survival.The proliferation of mobile devices and the heterogeneous environment of wireless communications has increased the need for additional spectrum for data transmission. It is not possible to altogether allocate a new band to all networks, which is why fully efficient use of the already available spectrum is the demand of the day. Cognitive radio (CR) technology is a promising solution for efficient spectrum utilization, where CR devices, or secondary users (SUs), can opportunistically exploit white spaces available in the licensed channels. SUs have to immediately vacate the licensed channel and switch to another available channel when they detect the arrival of the incumbent primary user. However, performance for the SU severely degrades if successive channel switching happens. Moreover, taking the channel-switching decisions based on crisp logic is not a suitable approach in the brain-empowered CR networks (CRNs) where sensing information is not only imprecise and inaccurate but also involves a major uncertainty factor. In this paper, I propose a fuzzy logic-based decision support system (FLB-DSS) that jointly deals with channel selection and channel switching to enhance the overall throughput of CRNs. The proposed scheme reduces the SU channel switching rate and makes channel selection more adaptable. The performance of the proposed scheme is evaluated using a fuzzy logic, and a comprehensive comparison study with a baseline scheme is presented. The simulation results are promising in terms of the throughput and the number of hand-offs and making our proposed FLB-DSS a good candidate mechanism for SUs while making judicious decisions in the CR environment.

Impact of Social Media on Stock Market
Authors:- Prabhav Sharma

Abstract- This research shows the impact of various social media sites which directly and indirectly influence today’s stock market and made possible to manipulate for personal as well as community gains. This research shows the subsequent rise and fall in the prices of shares after the tweets of CEO’s and wealthy entrepreneurs having a strong social media presence in various platforms. It also discusses an analysis of the Gamestop surge event where some users on Reddit invested heavily on that share and massively increased the price which was dying because of short selling done by hedge funds.

A Novel Approach of Data Hiding in Encrypted Digital Images using Hybrid Steganography
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- This research shows the impact of various social media sites which directly and indirectly influence today’s stock market and made possible to manipulate for personal as well as community gains. This research shows the subsequent rise and fall in the prices of shares after the tweets of CEO’s and wealthy entrepreneurs having a strong social media presence in various platforms. It also discusses an analysis of the Gamestop surge event where some users on Reddit invested heavily on that share and massively increased the price which was dying because of short selling done by hedge funds.

Prediction of Breast Cancer using Deep Learning
Authors:- Asst. Prof. Anandajayam.P, Abhishree.P, Rashmi.C.U, Keerthana.M

Abstract- The recent developments in the information technology have generated a volatile growth of data. In this paper we cover the problem of breast cancer prediction using Machine Learning. We considered two types of datasets, namely, Gene Expression (GE) andDNA Methylation (DM). The main objective of this paper is to predict the breast cancer using Deep Learning. We have developed a deep learning model to detect Breast cancer in CSV files. Benign and Malignant will be the two detections of the model. We use PyCharm as the platformto train and test our datasets.

Comparative Analysis of Machine Learning Algorithms To Perform Customer Segmentation
Authors:- Stuti Arora, Sunanda Mandal, Sasi Rekha Sankarl

Abstract- TConsidering the current pandemic, companies are finding it difficult to reach out to their customers and target them. Given a dataset of customer details pertaining to any company, it would be possible to come up with a generalized machine learning algorithm (by comparing K-Means Clustering, Principal Component Analysis and DBSCAN) keeping in mind the factors – age, gender, annual income and spending score. Using this, we can identify the most profitable segment of customers, hence ensuring efficient utilization of funds, workforce and time and adding to the overall brand value of the company. Using the age group of the most profitable segment of customers, the concept of generational marketing can be applied in order to narrow down which marketing channel would be the most effective to target customers on the basis of their age.

Morphological Study of Discarded Polyurethane Hybrid Composites
Authors:- Mr. J. Starlin Deva Prince, Godfrey Mohan R, Milan Chand J S, Mohammed Shabeen J

Abstract- Hybrid materials are composites consisting of two constituents at the nanometer or molecular level. Commonly one of these compounds is inorganic and the other one organic in nature. Thus, they differ from traditional composites where the constituents are macroscopic. Mixing at the microscopic scale leads to a more homogeneous material that either shows characteristics in between the two original phases. Polyurethane is a plastic material, which exists in various forms. It can be tailored to be either rigid or flexible, and is the material of choice for a broad range of end-user applications such as: insulation of refrigerators and freezers, building insulation, High abrasion resistance Thick section molding , Colorability ,Oil resistance, Ozone resistance, Radiation resistance. Other advantages are castable nature and Low pressure tooling. This investigation helps to know about the morphological study of discarded polyurethane hybrid composite. Layout method is used for combining both polyurethane and nylon fibres. By using the following combination, we have prepared six samples with different samples as S1- S6. The percentage proportions as follows;
S1- 100% polyurethane
S2- 80% polyurethane + 20% nylon
S3- 60% polyurethane + 40% nylon S4-100% nylon
S5-80% nylon + 20% polyurethane S6-60% nylon + 40% polyurethane

DOI: 10.61137/ijsret.vol.7.issue4.646

Dynamic Mechanical Analysis of Discarded Polyurethane with Polyester Hybrid Composites
Authors:- E. Bravin Daniel, Ajin B S, Ajun Jijo S, Berin J

Abstract- A composite material is a combination of two materials with different physical and chemical properties. When they are combined they create a material which is specialised to do a certain job, for instance to become stronger, lighter or resistant to electricity. They can also improve strength and stiffness. Polymer matrix composites (PMCs) are the most widely used composite type. Just as is the case for polymers, the environment typically needs to be controlled to obtain consistent test results for PMCs Polymer matrix composites (PMCs) have gained considerable interest mainly due to their low cost and higher specific strength and stiffness compared to conventional metallic alloys. This prepared composites were evaluated by dynamic mechanical analysis method such as dynamic mechanical analysis, X-Ray diffraction, Fourier transform infrared. The aim is to conduct the dynamic mechanical analysis of polyurethane and polyester composite. Polyurethane is the thermosetting polymer composite which can withstand high temperature. On the other hand polyester is the fiber material with ductile nature. After the preparation of the composites ,mechanical analysis of the specimen is to be analyzed.

DOI: 10.61137/ijsret.vol.7.issue4.647

Investigation of Co-Pyrolysis of Plastic and Cocos Nocifera
Authors:- S. Ajith kumar, Janobin S, Halin Heijal A, Bisel M

Abstract- Generally all over the world, the usage of fossil fuels in the day to day life as liquid, gas and the solid have been highly increased. Nowadays the population is getting highly increased and at the same time, the usage of biomass is also increasing. Biomass is an alternate fuel from the starting era of biotic organism. The usage of plastic also increased. The disposal and recycling of plastic is facing a challenging task. The researchers are facing high tedious problem in destroying plastic. Since the decomposition of plastic is highly dangerous to the soil. Pyrolysis process is the most promising for the waste to useful form of energy conversion techniques. While destroying biomass and plastic, more carbon footprints are seen. End product of plastic and biomass pyrolysis has its own deficiency in its characterization. In order to overcome these drawbacks, biomass and plastic is combined together as mass quantity and undergoes pyrolysis process for finding the better result. The pyrolysis end product properties like ash content, moisture content, kinematic viscosity, density, flash point, fire point, cloud point, pour point, gross calorific value and specific gravity are determined.

DOI: 10.61137/ijsret.vol.7.issue4.648

IoT-Driven Personalized Healthcare

Authors: Nithin Nanchari

Abstract: With the rise of the web of things in the health sector, the personalized treatment of people in real-time using real data has evolved into shape. Through IoT and personalized healthcare, individual medical interventions are delivered so that patients can monitor themselves and gain better treatment effectiveness. The contribution of this paper consists of how IoT enables custom healthcare solutions through AI-driven health assistants, real-time data analytics, a patient-centric approach, and wearable technology. Also, the study highlights the utility of IoT in improving the accuracy of precision medicine and improving healthcare services. Such a personalized healthcare solution could progress by integrating IoT and AI.

DOI: http://doi.org/10.5281/zenodo.15796148

 

The Introduction of Multi-Tenant Solaris Environments for Research Institutions

Authors: Harini Samarasinghe, Dilan Madushanka, Ruwani Gamage, Amila Wickramasinghe

Abstract: Research institutions are increasingly challenged to support a diverse array of computing workloads ranging from high-throughput bioinformatics to high-performance simulations within constrained physical infrastructure. Multi-tenant architectures offer a cost-effective and scalable solution, enabling multiple research groups to securely share resources while maintaining strong boundaries of isolation, performance, and compliance. This review explores the architectural, operational, and security dimensions of building multi-tenant environments using Oracle Solaris. It covers foundational technologies such as zones and Logical Domains (LDOMs), details approaches to resource allocation, identity management, and audit logging, and addresses the specific needs of research computing environments including regulatory compliance (HIPAA, GDPR, FERPA), data reproducibility, and access governance. The article further discusses automation, orchestration, and monitoring strategies, including integration with DevOps tools and SIEM platforms. Real-world use cases from genomics labs, physics departments, and engineering faculties illustrate the practical applications of Solaris-based tenancy. Challenges such as kernel-sharing risks, resource contention, and cloud scalability limitations are critically examined. Finally, the paper outlines future directions including hybrid cloud integration, AI-optimized zone support, and policy-as-code templates for rapid, compliant deployments. This comprehensive review serves as a technical and strategic guide for research institutions seeking to modernize and secure their multi-tenant UNIX infrastructure using Solaris.

DOI: https://doi.org/10.5281/zenodo.15847545

A Telemetry-Centric Approach To Identifying Recurrent Defect Structures In Software Systems

Authors: Hema Latha Boddupally

Abstract: This study examines how telemetry driven code analytics can be systematically leveraged to identify recurrent defect structures in complex software systems, addressing a persistent challenge in software quality engineering where failures reappear across releases despite localized fixes. The research focuses on the problem of distinguishing isolated faults from structurally recurring defects by using runtime telemetry as a primary analytical signal rather than relying solely on static inspection or post-incident reports. The study adopts a mixed methodological approach combining empirical analysis of telemetry artifacts, structured feature engineering, and quantitative pattern detection techniques to uncover repeatable defect signatures that span code, configuration, and execution behavior. Findings demonstrate that telemetry-informed analysis enables earlier recognition of defect recurrence, improves diagnostic consistency, and strengthens the linkage between observed failures and underlying code structures. The proposed approach introduces a coherent analytical framework that integrates telemetry normalization, defect signature extraction, and code level attribution, offering a novel contribution to defect analysis practices. From a strategic perspective, the study contributes to software engineering research by reframing defect detection as a signal driven, evidence based process grounded in runtime behavior. Practically, it provides guidance for engineering teams seeking to enhance reliability, reduce diagnostic effort, and institutionalize learning from recurring failures. The work holds significance for both academic inquiry and industrial practice by advancing a scalable, analytically rigorous pathway for improving long term software quality.

DOI: http://doi.org/10.5281/zenodo.18125283

Intelligent Automation Of Financial Compliance And Reporting Processes Using SAP And Machine Learning

Authors: Ira Chaturvedi

Abstract: The rapid digitization of corporate finance and the increasing complexity of global regulatory frameworks have necessitated a shift from manual oversight to intelligent automation. This review article investigates the integration of Machine Learning algorithms within the SAP S/4HANA ecosystem to enhance financial compliance and reporting efficiency. By leveraging the SAP Business Technology Platform, organizations can move beyond traditional rule-based systems to implement real-time anomaly detection, automated intercompany reconciliations, and predictive financial closing processes. The analysis explores the technical architecture required to bridge the gap between transactional data and autonomous governance, highlighting the role of the Universal Journal as a single source of truth. Furthermore, the article addresses the strategic challenges of data orchestration, the necessity of Explainable AI for auditability, and the emerging role of Natural Language Processing in interpreting unstructured regulatory documents. As financial reporting transitions toward a continuous monitoring model, the synergy between ERP robustness and machine intelligence becomes a critical factor in reducing operational risk and ensuring transparency. The findings suggest that while intelligent automation significantly reduces the manual burden of compliance, a human-in-the-loop approach remains essential for maintaining ethical oversight and professional judgment. Ultimately, this review provides a comprehensive framework for organizations seeking to leverage SAP and machine learning to transform the finance function into a proactive strategic asset.

DOI: http://doi.org/10.5281/zenodo.18159753

Designing Scalable And Adaptive Cloud–IoT Ecosystems For Wireless Networks

Authors: Mehar Bediya

Abstract: The rapid expansion of the Internet of Things (IoT) and the increasing reliance on wireless connectivity have driven the integration of cloud computing into large-scale IoT ecosystems. While cloud-based solutions offer elastic resources and centralized management, the growing number of connected devices, heterogeneous workloads, and dynamic wireless conditions pose significant challenges in terms of scalability and adaptability. Traditional Cloud–IoT architectures often struggle to efficiently accommodate massive device connectivity, fluctuating data rates, and varying quality-of-service requirements. Consequently, there is a growing need for architectural designs that can dynamically scale resources and adapt system behavior in response to changing network and application conditions. This review paper provides a comprehensive analysis of scalable and adaptive Cloud–IoT ecosystem design for wireless networks. It examines foundational architectural models, wireless communication technologies, and cloud computing paradigms that support IoT deployments. The paper further investigates scalability challenges related to device density, data volume, network capacity, and resource provisioning, as well as adaptability mechanisms that enable context-aware, autonomous, and mobility-aware system operation. Key architectural approaches, including edge and fog computing, microservices, containerization, and serverless computing, are reviewed and compared. In addition, the paper discusses resource management, orchestration strategies, and critical considerations related to security, privacy, and reliability. Through a comparative analysis of existing solutions and an exploration of application domains, the review identifies current limitations, trade-offs, and open research challenges. The paper aims to guide researchers and practitioners in designing resilient, efficient, and future-ready Cloud–IoT ecosystems for dynamic wireless environments.

DOI: http://doi.org/10.5281/zenodo.18159755

Intelligent Financial Governance In SAP ERP Using Hybrid Machine Learning Models

Authors: Aarvik Bhatnagar

Abstract: Effective financial governance is critical for ensuring accuracy, transparency, compliance, and risk mitigation in enterprise resource planning (ERP) systems. SAP ERP provides robust financial and control functionalities; however, traditional governance mechanisms largely depend on static rule-based controls and manual audits, which are increasingly insufficient in handling high-volume, complex, and dynamic financial transactions. This paper proposes an intelligent financial governance approach for SAP ERP systems using hybrid machine learning models that combine rule-based logic, statistical methods, and advanced machine learning techniques. The proposed framework integrates seamlessly with SAP financial modules to enable real-time monitoring, anomaly detection, predictive risk assessment, and continuous compliance management. By leveraging hybrid model architectures, the approach balances adaptability and learning capability with transparency and regulatory interpretability. Practical use cases, including fraud detection, compliance monitoring, and predictive financial controls, demonstrate the effectiveness of the proposed solution. Experimental evaluation highlights the superiority of hybrid models over traditional rule-based and standalone machine learning approaches in terms of detection accuracy, false-positive reduction, and operational scalability. The findings indicate that hybrid machine learning models can transform financial governance in SAP ERP from a reactive control function into a proactive, intelligent, and strategic capability.

DOI: http://doi.org/10.5281/zenodo.18159759

Revisiting Factor Models After 2020: Machine Learning, Factor Stability, and Investment Performance

Authors: Oksana Anatolyevna Malysheva

Abstract: The new financial market environment after 2020, due to the COVID-19 shock, unprecedented monetary interventions, and increased macroeconomic uncertainty has cast new doubt on the reliability and persistence of the traditional models of asset pricing factors. Although classical factor models have traditionally been the basis of portfolio construction and the management of risk, there has been mounting evidence that factor stability can be lost in the face of structural regime changes. The paper reexamines previous post-2020 period factor models with specific focus on occupation of factor permanency and incremental importance of machine learning methods in explaining and predicting investment outcomes. The main aim of this paper is to evaluate whether the traditional risk factors hold their values and are economically significant beyond 2020 and to test the possibility of machine learning-based methods to predict better than traditional linear models to forecast the portfolio performance and results. The study builds standard factor portfolios with a wide equity universe over the post-2020 time sample, and it compares their performance to machine learning-based models that help to identify the nonlinear links and time-varying interactions between firm characteristics. The analysis methodology will be a combination of benchmark linear factor regressions with supervised machine learning algorithms, such as ensemble-based algorithms, applying consistent training and validation to these algorithms. Factor stability is determined with the help of rolling-window estimation and structural change analysis and investment performance with the help of risk-adjusted returns measures and transaction cost-adjusted portfolio performance. The results show that the stability and persistence of a number of conventional factors significantly decreased after 2020 and became more sensitive to market regimes. The models of machine learning have shown greater out-of-sample, and risk-adjusted returns, and the returns are not uniform across factors. The research provides empirical data on post-crisis factor behavior and provides a practical direction of applying machine learning in the integration of factored investment strategies in changing market conditions.

End-to-End Lifecycle Management Of Distributed Cloud-Native Systems

Authors: Ananya Iyer

Abstract: The rapid evolution of cloud computing paradigms has significantly accelerated the adoption of distributed, cloud-native systems grounded in microservices architecture, containerization, dynamic orchestration, and continuous delivery pipelines. Unlike traditional monolithic systems that rely on tightly coupled components and static infrastructure, cloud-native applications are deliberately engineered to leverage elastic scalability, resource abstraction, and automated infrastructure provisioning within highly dynamic cloud environments. Foundational platforms such as Docker and Kubernetes have enabled the development of portable, resilient, and self-healing workloads capable of operating consistently across heterogeneous infrastructures. These technologies facilitate container image standardization, declarative orchestration, automated scaling, and fault recovery. However, as deployments extend to multi-cluster, hybrid-cloud, and multi-cloud ecosystems, system complexity increases exponentially, making comprehensive lifecycle governance a significant technical and organizational challenge. End-to-end lifecycle management therefore encompasses not only architectural design and containerized development but also automated CI/CD pipelines, runtime orchestration, observability engineering, security integration, performance tuning, cost governance (FinOps), and systematic service decommissioning. This review synthesizes contemporary methodologies, architectural patterns, and operational frameworks that support lifecycle governance within large-scale cloud-native ecosystems. It critically examines cross-cutting paradigms including DevSecOps integration, Infrastructure as Code (IaC), GitOps workflows, service mesh architectures, policy-as-code enforcement, FinOps optimization, and AI-driven operations (AIOps). These paradigms collectively emphasize automation, declarative configuration management, continuous validation, and compliance-aware deployment strategies. Particular attention is devoted to runtime observability engineering, integrating metrics, logs, and distributed tracing to enable proactive monitoring and rapid fault isolation. Additionally, the review addresses emerging security imperatives such as software supply chain integrity, container image signing, zero-trust networking models, and runtime threat detection. By embedding governance mechanisms directly into CI/CD and orchestration pipelines, organizations can mitigate configuration drift, reduce operational risk, and enhance resilience in highly dynamic distributed environments. Furthermore, emerging directions such as platform engineering, internal developer platforms (IDPs), serverless-native orchestration models, eBPF-based deep observability, and autonomous remediation frameworks are analyzed as transformative drivers of next-generation lifecycle management. These innovations aim to abstract operational complexity, improve developer productivity, and enable predictive, self-optimizing infrastructure behavior. The study concludes that holistic lifecycle integration—rather than isolated adoption of discrete tools—is essential for achieving sustained operational resilience, regulatory compliance, energy-efficient infrastructure utilization, and continuous innovation in large-scale distributed ecosystems. By consolidating architectural principles, operational best practices, and forward-looking research trajectories, this review provides a comprehensive conceptual and practical framework for researchers and practitioners seeking to advance end-to-end lifecycle management strategies in modern cloud-native systems.

DOI: http://doi.org/10.5281/zenodo.18670338

Cloud-Native System Engineering For High Availability And Performance

Authors: Arjun Rao

Abstract: Cloud-native system engineering has fundamentally transformed the way modern software applications are architected, deployed, and managed across distributed computing environments. Unlike traditional monolithic models that rely on tightly coupled components and static infrastructure, cloud-native approaches embrace modularity, elasticity, and automation as core design principles. Built around technologies such as containerization, microservices architecture, declarative infrastructure, and automated orchestration, cloud-native systems are specifically engineered to operate efficiently in dynamic public, private, and hybrid cloud ecosystems. These systems are designed not only to scale horizontally in response to fluctuating workloads but also to maintain operational continuity in the presence of hardware failures, network disruptions, and unpredictable traffic surges. A primary objective of cloud-native engineering is to achieve high availability (HA)—ensuring minimal service downtime—and high performance (HP)—delivering low latency, high throughput, and efficient resource utilization. High availability is accomplished through architectural strategies such as redundancy, replication, self-healing mechanisms, intelligent load balancing, and fault isolation. High performance, on the other hand, is supported by horizontal scalability, caching strategies, observability-driven optimization, and automated resource management. Together, these characteristics enable resilient and adaptive distributed systems capable of sustaining mission-critical workloads. This review provides a comprehensive examination of the foundational architectural principles, including microservices decomposition and container orchestration; the enabling technologies that support scalability and resilience; and the operational frameworks that integrate continuous integration and continuous deployment (CI/CD). It further explores advanced performance optimization techniques, such as predictive auto-scaling and edge computing, alongside established resilience strategies, including circuit breaker patterns, chaos engineering, and service mesh architectures. Emphasis is placed on practical design patterns, reliability engineering practices, and the cultural integration of DevOps methodologies to achieve sustained operational excellence. By synthesizing current advancements and emerging trends, this review highlights how cloud-native system engineering is evolving toward autonomous, self-optimizing infrastructures. These infrastructures combine intelligent automation, real-time observability, and predictive resilience to meet the growing demands of large-scale, distributed applications.

DOI: http://doi.org/10.5281/zenodo.18670345

Minimization Of Hazardous Solvent Use In Organic Synthesis: Green Chemistry Approaches

Authors: Dr. Ekata Singh

Abstract: Organic synthesis uses solvents in nearly every stage of a chemical process. Solvents are very important as they dissolve reactants, enhance mixing, control reaction temperature and make it easier to isolate and purify the final product. Solvents also affect the speed and result of the reaction, in many cases. Solvents are widely used in laboratory research and industrial chemical production. But many of the most commonly used solvents are dangerous. They are toxic, flammable, highly volatile and difficult to dispose of safely. Common examples include benzene, chloroform, dichloromethane, N,N-dimethylformamide (DMF) and N-methyl-2-pyrrolidone (NMP). Long-term or repeated exposure to such solvents may affect skin, lungs, liver, nervous system and in some cases even increase the risk of cancer or reproductive damage. If not managed properly, solvent waste may pollute air, water and soil. As a result of these concerns, chemists are now giving more emphasis to reducing the use of hazardous solvents in organic synthesis. This is one of the central goals of green chemistry. Green chemistry promotes the designing of safer chemical processes that use fewer harmful substances and create less waste. This paper explains why hazardous solvents are widely used in organic synthesis and how they lead to health, safety, and environmental hazards. It also discusses the main green chemistry methods used for the reduction of solvent-related hazards. And this is where we want to see if we can replace hazardous solvents with safer ones, use greener solvents, carry out solvent-free reactions, design better reaction structures and recover or recycle solvents after use when we want to. Some good things have been done so far but a lot of scientific and practical problems remain. Still, the right way forward is to reduce the use of hazardous solvents so organic synthesis is safer and cleaner.

DOI: https://doi.org/10.5281/zenodo.19479101

Published by:

How To Publish My Project In Journal

Uncategorized

Project completion for a final year student of any course is a moment of pride and happiness. Some, of course, departments, colleges, universities need publication of project work as well. So how to publish my project in journal is a major question for young scholars. Writing a paper, flow of project representation, publication website selection is all-new assignment. Students need proper guidance from mentors or faculty to get good papers and publications. This article helps those final year students by elaborating the major points of paper writing.

Submit Paper Now

Article Processing Charges

  1. Title: This is a single line that must have words related to your: work/paper content / special technique/technique name/feature name / Area of research.
  2. Abstract: It’s the first paragraph in the paper. This paragraph includes:
    1. One two-line of the paper research area.
    2. One or two lines of the main issue resolve by paper or focus by the paper.
    3. Further three to five lines of proposed model description in case of a research paper, or three to five of survey paper heading.
    4. One or two lines for introducing the finding of the paper.
  3. Keyword / Index Terms: These are important words or key phrases in the paper. Try to include four to six words. Like: computer science, clustering, data mining, genetic algorithm.
  4. Introduction: This portion of the paper should include a general introduction of the paper research area, some of the major issues in the area if paper is a research paper then include the objective as well.
  5. Related Work / Literature Survey: Previous year’s work proposed by scholars of the same area was introduced in this section with an objective that what technique adopts by them to resolve the same issue.
  6. Further section of the paper was dependent on your paper content.
  7. Conclusion: This is again a single paragraph that specifies the findings of the paper as per the content mention in the previous section. This paragraph should have one line of future scope as well.
  8. References: As per content references used by the paper should be include. Try to follow one pattern like Authors’s Name, “Title of Paper”. Publication detail, Publication Timestamp (Volume, issue, year page number).

Students follow the above steps to write paper content for getting published in a good journal. This article help scholar to resolve their major question of how to publish a project paper in journal, similarly how to publish research paper for final year project.

In order to know more about how to publish a journal paper on a final year project or how to publish a project paper, they can directly contact us for improving their writing skills with some suggestions of content and techniques.

Published by:
× How can I help you?