IJSRET » Blog Archives

Author Archives: vikaspatanker

Publish Paper in International Journal

Uncategorized

Before finding an International journal to publish your research paper, researchers and authors should study the proper way to publish a research paper. Sometimes when scholars and researcher doesn’t follow the proper steps and process then their paper will get automatically rejected by the reviewers. How can you Publish paper in international journal is thee common question which arise in every authors mind before publishing. IJSRET is showing you the correct and accurate way to get your paper published in international journal.

Steps to publish research paper in IJSRET:

Submit Your Paper 

Check Publication Charges

  1. Detect a research issue: The primary task you need to do is to detect a research problem in an article. Research problem can be detected by going through to some recent reports and articles of your field.

 

  1. Survey: Do not think that finding a solution of your detected problem in an article will be easy. Authors and researchers need to do a survey and investigation to find a better solution of the detected problem. After a deep analysis and study the solution of a detected problem will be found.

 

  1. Advantages and limitations: After finding a better solution of the detected problem authors and researchers need to find the advantages and limitations of that solution.

 

  1. Application of the solution: It is a very important stage where researchers need to apply their investigated solution for a problem and try to solve a problem in their own way and find out their advantages and disadvantages.

 

  1. Make a comparison: You need to make a comparison between your investigated solution and existing solution. You need to also proof here why your presented solution of the problem is better.

 

  1. Find a journal: Now what a last thing you need to do is to find an international journal to publish your research paper. Finding a right international journal to publish your research paper, review paper and survey paper will be a very tough task for you. IJSRET is giving you a platform to Publish paper in international journal in a very easy way. If you do your research according to the above described steps then your research paper will be easily publish in any of the international journal.
Published by:

Conversational AI in Human Capital Management: Transforming Self-Service Experiences with Oracle Digital Assistant

Uncategorized

Authors: Kranthi Kumar Routhu

Abstract: The emergence of intelligent chatbots has fundamentally reshaped how employees interact with enterprise systems, especially within the domain of human capital management (HCM). Unlike traditional portals and static forms, conversational interfaces offer a more natural, intuitive, and immediate way for employees to access services and information. Organizations increasingly leverage these digital assistants to simplify complex HR transactions, provide continuous 24/7 self-service capabilities, and enhance overall employee engagement. Oracle Digital Assistant (ODA), when seamlessly integrated with Oracle HCM Cloud, enables a secure, scalable, and intelligent foundation for modern service delivery. Through advanced natural language understanding, prebuilt HCM skills, and REST API–based integrations, organizations can automate high-volume, routine tasks such as leave requests, payslip retrieval, and benefits inquiries by reducing response time while improving accuracy. This article outlines the underlying architecture, deployment strategies, and measurable business impacts of conversational AI, demonstrating how chatbot-driven service models modernize and elevate the employee experience.

DOI: http://doi.org/10.5281/zenodo.17678011

Published by:

IJSRET Volume 5 Issue 6, Nov-Dec-2019

Uncategorized

Optimizing Profit with the Linear Programming Model in a Manufacturing Industry
Authors:- M.Tech. Scholar Shrikant Desai, Professor Y.P. Ladhe

Abstract:- The study has successfully determined the product mix of Bansal Pipe Industry, Indore. In the process, the optimal quantities of the various PVC pipes to be produced within the study period in order to maximize profit were established. Also the status of the resources and the unit worth of each resource to the objective function were known with respect to varying budget resources and labor time. This is the advantage of going beyond mere knowledge of existing decision making tools to actual practical proof of its workability. The study has shown that linear programming model can be applicable in BIL, Indore. The researcher, through observation, noted that decision making regarding the quantity of shoes to be produced was based on trial and error method which yielded sub-optimal results. Hence, an attempt was made to fill this gap, has demonstrated practical means of developing a working linear programming model to find solution to the problem of sub-optimal results often realized by BIL. Also, the literature reviews in this work have – further affirmed that linear programming model is workable.

A Review on Organic Rankine Cycle (Orc) for Waste Heat Recovery with Different Refrigerant
Authors:- M.Tech. Scholar Rajeev Kumar, Prof. Brijendra Yadav

Abstract:- Rising energy demand due to industrial development, population growth, is pushing the mankind for utilizing more and more conventional energy sources such as coal, oil and gas. There is a need to minimize the use of such types of resources because; it contributes to the global warming, pollution and climate change. Use of alternative sources of energy such as solar, hydro, wind, tidal, geothermal, biofuel, and nuclear are preferable and are

A Survey on Different Adiabatic Logic Circuits for Low Power in Dsm Technology
Authors:- Priya Kumari, Ashish Chouhan, MD Naushad Akhtar

Abstract:- The term ‘adiabatic’ is coined from thermodynamics in which a method where no energy exchange takes place with environment results no dissipation of energy loss. On the other hand in short circuit devices in energy exchange process charge has been transfer between different nodes. Practically, with the use of partial adiabatic operation in the circuit results for the improvement of overall performance of the circuit with complexity. The result is represented in tabular and graphical form. And a comparison is done among all the simulation. After a detailed examination a conclusion has been drawn based on the entire work done and also from the simulation and the result is evaluated. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100 MHz frequency, for fair comparison of results W/L ratio of all the circuit is same.

Analysis of Embedded Network Security by Intrusion Detection System
Authors:- Research Scholar Mr. Suresh .B, Associate Prof. & Head Dr. M. Venkatachalam

Abstract:- The term ‘adiabatic’ is coined from thermodynamics in which a method where no energy exchange takes place with environment results no dissipation of energy loss. On the other hand in short circuit devices in energy exchange process charge has been transfer between different nodes. Practically, with the use of partial adiabatic operation in the circuit results for the improvement of overall performance of the circuit with complexity. The result is represented in tabular and graphical form. And a comparison is done among all the simulation. After a detailed examination a conclusion has been drawn based on the entire work done and also from the simulation and the result is evaluated. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100 MHz frequency, for fair comparison of results W/L ratio of all the circuit is same.

A Survey on Low Power High Speed Domino Circuit in Low Power VLSI Design
Authors:- MD Naushad Akhtar, Ashish Chouhan, Priya Kumari

Abstract:- Increased number of transistor count and reduced device size is main reason behind scaling and this incorporates leakage current also in other hand battery technology is growing very slowly hence we need low power circuit so that we can enhance overall performance of device. After evolution of CMOS circuit the scientist moved on static and dynamic circuit design. In static CMOS there are various limitations like no. of transistor count, power dissipation, slow speed, hence to overcome these limitation a new circuit pseudo NMOS is used. It exist somewhere between static and dynamic circuit. We have seen that FinFET technology is simulated by BISM4 model using HSPICE at 32nm process technology at 250C with CL=1pF at 100MHz frequency. When CMOS is compared with FinFET for 8 and 16 input OR gate we save average power 15.46%, 21.34% SFLD, 57.37%, 20.12% HSD, 30.90%, 42.46% CKD respectively.

The Effect of Radial Swirl Generator on Reducing Emissions from Bio-Fuel Burner System
Authors:-M.Tech. Scholar Amaresh prasad Sinha, Prof. Poonam Wankhede, Dr. Mohit Gangwar

Abstract:- A liquid bio-fuel burner system with various radial air swirlers attached to combustion chamber of 280 mm inside diameter and 1000 mm length has been investigated. All tests were conducted using crude palm oil as fuel. A radial flow air swirler with curved blades having 50 mm outlet diameter was inserted at the inlet plane of the combustor to produce swirling flow. Fuel was injected at the back plate of the swirler outlet using central fuel injector with single fuel nozzle pointing axially outwards. The swirler vane angles and equivalence ratios were varied. Tests were carried out using four different air swirlers having 45°, 50°, 60°and 70° vane angles. NOx emissions reduction of about 12 percent was obtained at swirl number of 1.911 as compared to 0.780 at the same equivalence ratio of 0.83. In addition, emission of carbon monoxide decreased as the swirl number increased. The results shows that a proper design of air swirler has great effect on mixing process and hence the combustion and emission.

CFD Analysis of Heat transfer in Tube Inserted with Centrally Hollow Narrow Twisted Tapes
Authors:- M.Tech. Scholar Ajay Kumar Roy, Prof. Suresh Kumar Badholiya, Rohit Choudhary

Abstract:- In this study, a new tube insert, named centrally hollow narrow twisted tape, is developed and its effect on the heat transfer enhancement performance of a tube under laminar flow conditions is numerically simulated. The model defines two study variables—hollow width and clearance—and then incorporates the concept of a unilateral twisted tape; the effect of the number of unilateral twisted tapes on the tube heat transfer performance is then examined. The results show that the tube with cross hollow twisted tape inserts has the best overall heat transfer performance for different hollow widths of the tape.

A Review on Heat Transfer Enhancement Analysis of Tube Inserted with Centrally Hollow Narrow Twisted Tapes
Authors:- M.Tech. Scholar Ajay Kumar Roy, Prof. Suresh Kumar Badholiya, Rohit Choudhary

Abstract:- In this study, a new tube insert, named centrally hollow narrow twisted tape, is developed and its effect on the heat transfer enhancement performance of a tube under laminar flow conditions is numerically simulated. The model defines two study variables—hollow width and clearance—and then incorporates the concept of a unilateral twisted tape; the effect of the number of unilateral twisted tapes on the tube heat transfer performance is then examined. The results show that the tube with cross hollow twisted tape inserts has the best overall heat transfer performance for different hollow widths of the tape.

Design and Implementation of Sensor Less Voltage Control Technique for Power Quality in Telecom
Authors:- M.Tech. Student Tamba Rajeswari, Assistant Prof. B.Jagan Narayana, Assistant Professor& Hod V. Sunil Kumar Reddy

Abstract:- In this paper, a three-phase three-switch three-level boost (Vienna) type PWM rectifier is proposed as an active front-end power factor correction (PFC) rectifier for power quality improvement in telecom load. The sensor less voltage control technique is proposed and it does not rely on any input voltage information results in reliable and robust operation. A brief description on the principle of operation and the most advantageous modulation method of the proposed system is discussed. The feasible switching states are identified for the proposed active front-end converter resulting in reduced switching stress and DC ripples. A triangular carrier based control logic is applied and the input current reaches sinusoidal shape without the need of sensing the input voltage. The detailed analysis of front-end PFC converter is carried out by equivalent circuit analysis. Also, the complete loss and efficiency calculation of the converter is explicitly carried out with the help of hardware design guidelines. The performance of the proposed system and its capability to operate satisfactorily in the event of failure of one-phase of the mains is verified through MATLAB Simulation and results obtained are presented. The experimental setup rated for 9 kW is developed in the laboratory to validate the simulation results. From the simulation and hardware results, it is observed and recorded that the power quality parameters are improved and are well within the IEEE, IEC standards.

A Comparison of Tcsc Fact Device Performance and Long Distance Transmission
Authors:- Maneesha Kushwaha, Arun Pachori

Abstract:- The prudent point of view of Flexible AC Transmission System (FACTS) establishment and execution has been an essential issue since origin and expanding each day because of vital, specialized and showcase requirements. The advancement of these issues assumes a significant job in the achievement of any utility and at last minimal effort accessibility of intensity at the client end. This paper exhibits the ideal area of Thruster Controlled Series Capacitor (TCSC) in control framework to limit the transmission misfortune utilizing Particle Swarm Optimization procedure. The reenactments are performed on the IEEE-14 transport framework, IEEE 30 transport framework and Indian 75 transport framework with Newton Raphsonload flow calculation including TCSC.

Review of Image Retrieval using Color Text and Shape Techniques
Authors:- ME Scholar Roshani Yadav, HOD Mr. Kamlesh Patidar

Abstract:- The big digital image databases are yielded by the widespread of smart devices along with the exponential growth of virtual societies. If not fused with efficient Content-Based Image Retrieval (CBIR) tools, these databases can be counter-productive. The introduction of promising CBIR systems had been witnessed last decade which promoted applications in various fields. In this editorial, an analysis on state of the art content-based image retrieval which includes theoretical and empirical work is propounded. This work comprises of publications that cover aspects of research relevant to CBIR area. That is to say, unsupervised and supervised education and combination techniques along with which the low-level image visual descriptors have been reported. Furthermore, challenges and applications that appeared to carry CBIR research have been discussed in this work.

Object Recognition Based on MATLAB
Authors:- Assistant Prof. Vishal V. Mehtre, UG Scholar Shivani Jitendra Khare

Abstract:- This paper describes image processing and its applications using MATLAB. Prime objective of image processing involves extraction of important information from the processed images. By use of this data, description and interpretations can be provided by the machine. Image processing modifies the original image in the desired format (image). And this system provides the users with the hard copy of the image using printer and also allows them to save the file in the desired format with extensions. In our practical life, we find many applications of image processing. One of the best examples in our day to day life is our brain in coordination with our eye which views a lot of images and helps the brain to sense and process information at higher rates and less time. Hence such operations carried out using image processing will help us in greater understanding and vision by development and implementation of image processing. In this paper image processing, object detection, applications of image processing using MATLAB and prospects are discussed.

Design and Implementation Optimization Algorithm for Underwater Acoustic Sensor Network
Authors:- Neha Jamrey, K K Sharma

Abstract:- Underwater Wireless Sensor Networks (UWSNs) contain several components such as vehicles and sensors that are deployed in a specific acoustic area to perform collaborative monitoring and data collection tasks. Tese networks are used interactively between different nodes and ground-based stations. Presently, UWSNs face issues and challenges regarding limited bandwidth, high propagation delay, 3D topology, media access control, routing, resource utilization, and power constraints. In the last few decades, research community provided different methodologies to overcome these issues and challenges; however, some of them are still open for research due to variable characteristics of underwater environment. In this paper, a survey of UWSN regarding underwater communication channel, environmental factors, localization, media access control, routing protocols, and effect of packet size on communication is conducted. We compared presently available methodologies and discussed their pros and cons to highlight new directions of research for further improvement in underwater sensor networks.

Prediction of Compressive Strength of Concrete Using Artificial Neural Network Model
Authors:- M.Tech. Student Sandeep Solanki, Asst. Prof. Mr. Sambhav Gangwal

Abstract:- This study proposes to build a concrete compressive strength development over time (CCSDOT) model by using conventional method combined with the artificial intelligence method. The CCSDOT model performed well in predicting and fitting the compressive strength development in green concrete containing cement, slag, fly ash, and limestone flour. It is concluded that the CCSDOT model is stable through the use of sensitivity analysis. To evaluate the precision of this model, the prediction results of the proposed model were compared to that of the model based on the BP neural network. The results verify that the recommended model enjoys better flexibility, capability, and accuracy in predicting the compressive strength development in concrete than the other models.

Brain Stimulation Game application for children
Authors:- P.S.M Alawatta

Abstract:- Most of the new generation children nowadays are using their parent’s electronic devices as a habit. Addict on to new technologies lead the children away from educational activities. This is affect to the child’s future and main problem is this that the early childhood does not develop on correct way. Considering about this problem the research implemented an educational gaming application based on how to use technologies toward to better future by navigate children to educational activities and reducing time wasting for useless things through the new technologies. Smart Kids is an Unity based gaming application for children of 6 to 10 age category. Prototype methodology used for implement the application. The developed gaming application based on Mathematics and includes many features. The application developed to improve child’s cognitive skills in mathematics and memory development areas. Different game categories used to develop child’s different kind of skills and each category included different levels. The variation of gaming categories will be motivating child to do different sides. When considering about parents, within the busy life style some parents have not time to check child’s skills improvements. As a solution, developed application calculates child’s performance.

Implementation of Queuing Theory Along with Lean Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Bharat, Professor Vipul Upadhayay, Yogesh P Ladhe

Abstract:- This research provides a context for investigating the integration of queuing theory and scheduling approaches with the goal of more effectively solving scheduling problems arising in dynamic environments. In this thesis main objective of research are applied queuing theories in a production line by using an analytical model, using a queuing model to examine performance of a production line, To give information about the studied production line in this case study and To improve both efficiency and performance of workstations. This research work is carried out in Pressroom Industries limited, Bhopal. This industry produces variety of products such as sprocket, spur gear, helical gear and gear housing etc. In this work spur gear manufacturing is taken for study. At first different manufacturing processes (cutting the bar stock, OD turning, center drilling followed by boring, CNC machining, gear hobbling, debarring, keyway slotting and gear grinding) are identified. It is found the cutting, hobbling, drilling and slotting process are bottle neck processes. From the analysis it is found that the setup time of keyway slotting consumes more time. Using SMED concept single pallet is converted to two pallets.

Fem Analysis of Structural Response of Sandwich Beam
Authors:- M.Tech. Scholar Himanshu Kumar Gupta, Asst. Prof. Rakesh Patel, Prof. Vikas S Pagey

Abstract:- Sandwich plate are composite systems having high stiffness-to-weight and Strength-to weight ratios and are used as light weight load bearing components. The use of thin, strong skin sheets adhered to thicker, lightweight core materials has allowed industry to build strong, stiff, light, and durable structures. Due to the use of viscoelastic polymer constituents, sandwich beams can exhibit time-dependent behavior. This study examines the behavior of sandwich plate driven by the varying core thickness and different core stiffness. Finite element (FE) method is used to analyze the overall transient responses, harmonic responses and the static responses of the sandwich systems subject to a concentrated point load at the mid span of the beam. In this study the skin, i.e. the top and bottom layers are made up of aluminum while the core is made up of foam family. The stress and deformation fields are analyzed. The core thickness and core material stiffness was varied keeping the skin thickness constant and the behavior of the sandwich beam is studied under static and dynamic conditions.

Car Damage Detection and Analysis Using Deep Learning Algorithm For Automotive
Authors:- Rakshata P, Padma H V, Pooja M , Yashaswini H V, Karthik V

Abstract:- Images and its processing form a vital part of understanding of the world around us. Therefore incomplete images make it unable for us to detect and analyze the premise of the picture. This is of no use to us, but today’s machine learning platforms are capable of restoring the lost or corrupted parts of such images, making it easier to understand the context behind the scenes and efficiently analyze the pictures taken. In painting Extrapolation can be done by propagation of local structures into the unknown parts, in order to construct the missing part’s one pixel (or patch) at a time, while maintaining consistency with the neighborhood pixels. This application of deep learning is used in the car damage detection and extraction of original features before the incident for timely insurance claims.

Thermal Analysis of Organic Rankine Cycle Based on Different Fluid Type
Authors:- M. Tech Scholar Sanjay Rahangdale, Prof. Kashiram Kadwe

Abstract:- The ORC works with a high molecular mass organic working fluid with the characteristic of having a phase change of liquid to vapour occurring at a temperature which is lower than the phase change of water to steam for a given pressure. The recovery of low grade heat can be achieved using organic fluids. These low grade heat sources can be from biomass energy, solar energy, geothermal energy and industrial waste. This work presents an analysis of organic Rankine cycle (ORC) using R143a, R600a, R134a and RC318 as working fluids under constant external conditions. An EES program has been developed to parametrically compare the first and second law efficiencies and turbine size factor with increase in turbine entry temperature, heat source temperature, and turbine efficiency and pinch point temperature difference.

A Review Article of Composite Drive Shaft Vibration Effects and Methodology
Authors:- M.Tech. Scholar Govind Solanki, H.O.D. Mr. Ganesh Kesheorey

Abstract:- Almost all automobiles (at least those which correspond to design with rear wheel drive and front engine installation) have transmission shafts. The weight reduction of the drive shaft can have a certain role in the general weight reduction of the vehicle and is a highly desirable goal, if it can be achieved without increase in cost and decrease in quality and reliability. It is possible to achieve design of composite drive shaft with less weight to increase the first natural frequency of the shaft and to decrease the bending stresses using various stacking sequences. By doing the same, maximize the torque transmission and tensional buckling capabilities are also maximized. This work deals with the replacement of a conventional steel drive shaft with High Strength Carbon drive shafts for an automobile application.

Quality and Productivity Improvement in Gear Manufacturing Process by using Quality Control Chart and Capability Analysis Including Sampling
Authors:- M.Tech. Scholar Hari Krishnadas Raut, Asst. Prof. Yogesh Ladhe

Abstract:- Increasing productivity and profitability are main objectives of any organization. Many tools and techniques are used to reduce rejections and defects of product. Most of the rejections and defects are occurred due to improper control of quality of product. So use of 7 Quality control tools is best way to reduce rejections and defects of product after analyzing of manufacturing process. Another advantage is increasing customer satisfaction by use of 7 Quality control tools in today competitive market. Based on application of these tools will increase the level of standard products which they require as vision of an organization. The purpose of this work is to discuss the effect of implementation of Total Quality Management (TQM) in manufacturing industry (Shree Gears Pvt. Ltd, Indore). Very few service companies have been able to reap full benefits of TQM. One major reason for its inadequate success is that of trying to implement in service companies techniques that have been successful in manufacturing. In manufacturing, emphasis of TQM is on “zero defects”. Control charts and sampling are the major tools of quality control. However, in services, emphasis is on “zero defections”. Focus is on customer satisfaction and team approach. TQM can boost profits and improve customer satisfaction by reducing defects.

Road Construction in Hilly Region and Their Problem and Solution
Authors:- M.Tech. Scholar Techi Takar, Jitender Kumar

Abstract:- Construction of road is very much important for the transportation of goods and services from one place to another by the mean of roadway network. Road transportation is one of the primary modes of transportation since from the earlier time. The mode of road construction is varies with the geographical feature of the earth such as plain land, mountain terrain, steep and hilly region. It is more easy and accessible to construct a road in plain region as compare to the hilly region.This paper presents the road construction mode in the hilly region as well as their problem and solution with reference to the segment of NH-13 from Sagalee to Midpu (Doimukh). Hilly region comprises of steep mountain terrain, naturally hard rock strata and various turning points which made the road construction very difficult. As the development take place so it is necessary to connect the every corner of the country in order to have a transportation facility easy and accessible in terms of commercial purpose ,business purpose ,health and medical services , education sector etc. Therefore construction of serviceable road in hilly region is very much important for the overall Nation growth. The review study of this paper is to bring the knowledge of road construction problem and their solution of particular hilly region road stretch from Sagalee to Midpu (Doimukh) which is the capital region of Arunachal Pradesh, having stretch length of 74 km.

Implementation of Water Tank Design using Staad Pro Software
Authors:- Sunita Ahuja, Sourabh Dashore

Abstract:- Intensity of the wind is the principal reason for wind caused disaster. Hence constructed structures must be prepared by constructor to fight the impending disaster due to wind by understanding the performance of the structure under wind load. In this study a computational analysis of water tank has been carried to evaluate the performance of elevated water tank under the action wind forces. Since these types of tanks have high mass concentrated at the top height of slender supporting structure and that’s why this type of structures are mainly susceptible to horizontal forces induced by wind. Elevated water tanks have been investigated to analyze the actions of this structure due to wind force by changing different parameters such as capacity, height of stage, terrain category and wind zone. The results presented in this paper will be useful to the designer to understand the effect of various factors as mentioned above on the magnitude of wind force acting on the elevated water tank. Overhead Intze type tank is a form of expanded water tank resting on staging. Bottom part of tank of Intze tank is abounding in flat structure, thus in flat bottom, the thickness and reinforcement is set up to be high. This work aims to study the performance of the Overhead water tank of Intze type having different configuration of staging under the action of basic wind loads in different terrain category.

Review on Nano Particle Based Li Ion Batteries
Authors:- Y. V. Aravind Kumar

Abstract:- Li ion batteries have applications in nanotechnology .Here in this paper we were mainly focused on nonmaterial’s such as CNTs, silicon thinflims, coaxial MnO2/carbon annotate array electrodes ,self assembled TiO2 grapheme and li paper batteries to improve the performance of nanobatteries and storage.

Movie Recommendation Using Principle Component Analysis
Authors:- M.Tech. Scholar Bharti Vishwakarma, Prof. Ashish Tiwari

Abstract:-Recommendation system uses different types of algorithms to make any type of recommendations to user. Collaborative filtering recommendation algorithm is most popular algorithm, which uses the similar types of user with similar likings, but somewhere it is not that much efficient while working on big data. As the size of dataset becomes larger then some improvements in this algorithm must be made. Here in our proposed approach we are applying an additional hierarchical clustering technique with the collaborative filtering recommendation algorithm also the Principle Component Analysis (PCA) method is applied for reducing the dimensions of data to get more accuracy in the results. The hierarchical clustering will provide additional benefits of the clustering technique over the dataset and the PCA will help to redefine the dataset by decreasing the dimensionality of the dataset as required. By implementing the major features of these two techniques on the traditional collaborative filtering recommendation algorithm the major components used for recommendations can be improved. The proposed approach will surely enhance the accuracy of the results obtained from the traditional CFRA and will enhance the efficiency of the recommendation system in an extreme manner. The overall results will be carried out on the combined dataset of TMDB and Movie lens, which is used for making recommendations of the movies to the user according to the ratings patterns created by the particular user.

Review of Worm Hole Attack in WSN
Authors:- M.Tech. Scholar Bharti Yadav, Prof. Shailendra Tiwari

Abstract:-Wormhole attacks can undermine or put out of action wireless sensor networks. In a typical wormhole attack, the attacker be given packets at one point in the network, forwards through a wired or wireless network with take away latency than the network links, and transmits them to a different point in the network. This paper describes a give out wormhole recognition algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a network. Since wormhole attacks are passive in nature, a hop count technique is used by the algorithm as a explore procedure, renovates local maps in each node, and then uses a diameter element to detect abnormalities reason by wormholes. It can provide the approximate location of wormholes, which is useful in implementing countermeasures this is the main advantage of algorithms.

Predication and Root Selection of Worm Hole Attack in WSN
Authors:- M.Tech. Scholar Bharti Yadav, Prof. Shailendra Tiwari

Abstract:- Sensor Networks (WSN) are often vulnerable to several types of attacks due to its open space deployment and large area of applications. Wormhole is one of such attack, which falls under the category of Denial of Service (DoS). In this attack, an attacker takes control of the network services by developing an overlay tunnel called wormhole channel. In this paper, a mechanism has been proposed by appending extra four-bit information to RREP packets which is known to both sender and receiver; thus, reducing chances of wormhole tunnel. The work is based on AODV protocol and simulated in NS2, which effectively detect illegitimate attack carriers.

Design & Development of Electromagnetic Dynamometer for Testing of FHP Motor: A Review
Authors:- PG Student Rajgonda Shivgonda Patil, Principal S.H.Sawant

Abstract:- Ensuring any kind of Motor Performance as a part of Design Validation of FHP Motor is necessary to know against actual theoretical design of motor verses real test results obtained only through motor testing .Electromagnetic Brake Dynamometer (Eddy Brake Dynamometer ) is best suitable for Testing the Motor as a part of Loading & knowing the results at different torque values which enable us to know various characteristics parameters like Speed verses Torque, Current verses Torque, Input watt verses Torque & efficiency verses Torque as these are Key Motor parameters which should know to Designer or Motor manufacturer before releasing the product to customer cum market . This New Test Rig consisting of Designing, Development & validation of Motor.

Enhancement of PAPR Reduction Using Pso Based Optimization Technique
Authors:- M.E. Scholar Rati Ranjan Kumar , Asst. Prof. Komal Kanojia

Abstract:- A non-constant envelope with high peaks is a main disadvantage of Orthogonal Frequency Division Multiplexing (OFDM). These high peaks produce signal excursions into non-linear region of operation of the Power Amplifier (PA) at the transmitter, thereby leading to non-linear distortions and spectral spreading. Many Peak to Average Power Ration (PAPR) reductions methods have been proposed in the literature. The objective of this review is to give a clear understanding of different techniques to reduce PAPR of the signal.

Gaze PIN entry for Password Authentication
Authors:- Mr.Raghavendrachar S, Soumya Dattatreya Hegde, Varsha Purushotham, VennalaKN, Vidyashree S

Abstract:- Secret identification numbers are widely used for user authentication and security. Authentication of password using PINs requires users to input the PIN physically, which could be vulnerable to password knowing via shoulder surfing or thermal tracking. Authentication of PIN with hands-off gaze based (by closing the eye) PIN entry techniques, on the other hand, there is no physical footprints behind and therefore offer a more secure password entry option, Gaze -based authentication refers to finding the eye location across sequential image frames, and tracking over eye center over time. This paper presents a real-time application for gaze-based PIN entry, and eye detection and tracking for PIN identification using a smart camera.

Social BOT Detection for Twitter Dataset Using GBC Technique
Authors:- M.Tech. Scholar Roshani Singh, Prof. Sumit Sharma

Abstract:- Today, peoples are devoting large amount of time in social networks. As social media network popularity increases day by day, content writer are spamming on these platform for potential benefits of some organizations. Here graph based clustering algorithm was proposed to develop a binary cluster on the basis of serial or sequential action perform by the user. As per series of action social network graph is reduce into spanning tree where highly distance nodes are identified as abnormal behavior. So group of highly distance nodes are consider as the social bots while other are real users. Experiment was perform on real social sequential dataset of twitter. Results were compared on various evaluation parameters and it was obtained that proposed approach has improved all such parameter values as compared to previous approach adopt by researcher.

Survey on Stress Analysis and Design Optimization of A Pressure Vessel using Ansys
Authors:- M.Tech. Scholar Nitesh Katiyar, Assistant Professor Ranjeet Kumar

Abstract:- Pressure vessels are a commonly used device in marine engineering. Until recently the primary analysis method had been hand calculations and empirical curves. New computer advances have made finite element analysis (FEA) a practical tool in the study of pressure vessels, especially in determining stresses in local areas such as penetrations, O-ring grooves and other areas difficult to analyze by hand. This project set out to explore applicable methods using finite element analysis in pressure vessel analysis.

Stress Analysis and Design Optimization of a Pressure Vessel using Ansys
Authors:- M.Tech. Scholar Nitesh Katiyar, Assistant Professor Ranjeet Kumar

Abstract:- Pressure vessel is used to carry liquids such as petrol, kerosene; aviation fuel etc and these fuel tanks are used to transport fuel. Finite element method is a mathematical technique used to design a fuel carrying vessel and performing the stress analysis. The main objective of this paper is to design and analysis of pressure vessel. The designing various parameters of Pressure Vessel checked and designed according to the principles specified in American Society of Mechanical Engineers (A.S.M.E).

Review: Trust in VANET
Authors:- M.Tech. Scholar Divyam Singh, Prof. Shiva Bhatnagar

Abstract:- Vehicular ad-hoc networks(VANETs) expedite those probability change those way individuals experience the readiness of a secured interoperable remote correspondences a that consolidates cars, transports, activity signals, convenient telephones, Furthermore unmistakable contraptions. An opportunity to in any case, VANETs need help exposed against security perils because of developing dependence ahead correspondence, preparing, and control advancements. The surprising security Also security tests acted by VANETs in-enlightened decency data place stock in, mystery, no renouncement, get the opportunity to control, constant operational necessities/demands, availability, What’s greater security confirmation. The enduring quality for VANETs Might an opportunity to be improved Eventually Tom’s scrutinizing tending on completely those two dominant part of the information trust, which is depicted Likewise those examination from asserting regardless for if Furthermore what precisely degree those low down activity information would reliable, Furthermore focus trust, which is depicted Likewise how dependable those center points Previously, VANETs show up with make. In this paper, an assault safe trust association devise might be suggested for VANETs that could recollect What’s more acclimate to malevolent attacks what’s more review those relentless nature of the two information and versant centers On VANETs. Exceptionally, greater part of the information trust might be assessed done light of the information recognized Also gathered beginning with different vehicles; focus trust is reviewed On two estimations, I. E., helpful trust and suggestive trust, which show how at risk a middle cam wood satisfy its comfort what’s more door reliable those proposition beginning with an inside to isolate center points will be, freely. The adequacy Also capability of the recommended symbolization plot might be authorize through far reaching examinations. Those prescribed trust association subject might be relevant with a wide arrangement about VANET demands should overhaul development prosperity, flexibility, and trademark security with pushed ahead unflinching quality.

A Review: Speech Recognition
Authors:- Sunil, Shweta, Tanya Gulati, Asst.Prof.Garima Singh

Abstract:- Speech recognition is the capability of a program to identify words and expression in spoken language and convert them to a binary language so computer system can understand. Each spoken word is split into discontinuous division which include many tones. This paper brief about the speech recognition system and how it’s work and application in day to day life.

Energy Preserve using LEACH protocol in Wireless Sensor Networks
Authors:- M.Tech. Scholar Om Patel, Prof. Shiva Bhatnagar

Abstract:- In the time of new invention Networks many rising and future empower advancements achieve the prerequisites of pervasive correspondence systems. Remote Sensor Networks is a fundamental classification of these best in class advances, the gigantic worries of these systems are vitality proficient and efficient information accumulation. Bunch based directing in WSNs is a colossal answer for upgrade the vitality productivity of the hubs and creative information gathering. Many examinations on organize lifetime and information accumulation have been proposed by the (LEACH) Low Energy Adaptive Clustering Hierarchy conspire that permits the part of the group head turned among the sensor hubs and endeavors to disseminate the vitality utilization through every one of the hubs. The lifespan of WSNs are influenced by the Cluster Head choice; this is often on the grounds that a CH expends additional power than a Cluster (non-CH) hub. Inthis examination think about, a vitality effective bunch head choice in Mobile WSN is proposed, investigated and approved on the premise of remaining vitality and randomized determination of the hub, which is not doled out as a group head in past round. Additionally, the proposed approach demonstrates the noteworthy changes when contrasted and LEACH and a unique Application Specific Network Protocol for Wireless detector Networks conventions regarding vitality utilization of sensor hubs, improved system lifetime and proficient information assembling because of less vitality utilization amid information transmission.

Review of Wide Bandwidth Low Power Low Noise Amplifier
Authors:- M.Tech. Scholar Shradha Chouhan, Asst. Prof. Priyanshu Pandey

Abstract:- Recently, Low noise amplifier versatile used in modern wireless communication like Wi-Max, WLAN, GSM, Bluetooth and satellite communication. Low Noise amplifier have important feature like amplify the signal with rejection of noise. Low noise amplifier in modern communication used as filter with amplifier. In recent scenario low noise amplifier available in wide band, single band, multi-band frequency of application. In present days low noise amplifier the also reduces the reflection of signal exist by elements and connecting interface inside the amplifier. Low noise amplifier available with high gain, noise rejection and with less power consumption. In this paper review the work of past decades done in low noise amplifier. Low Noise Amplifier (LNA) is versatile used as a broadband mixer, low noise amplifier, power amplifier and Darlington amplifier, active balunes, multiband amplifier. Today technology required high speed of transmission efficiency with small power consumption and less utilization of elements in proposed amplifier, Low Noise Amplifier (LNA) products full fill all requirement of modern wireless communications, so that review and discussion, future requirement of technology is needed to discuss. In this paper discusses issues of low noise amplifier, its application, issues and recent trends. In this paper review some techniques of Low Noise Amplifier (LNA) to improve perform and surveyed almost all the Possible Work of Past Decades.

Image Encryption using Steganography
Authors:- Srinvas Nishant, Sarath Dasari, Anisha M Lal

Abstract:- steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are digital images. Due to recent developments in steganalysis, providing security to personal contents, messages, or digital images using steganography has become difficult. His paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good stenographic algorithm and briefly reflects on which stenographic techniques are more suitable for which applications.

Image Retrieval using Hybrid Technique
Authors:- M.Tech. Scholar Deeksha Waghale, Prof. Ashish Tiwari

Abstract:- To retrieve important images from a dissimilar collection by using visual queries as search arguments are the arduous and substantial open problems. In this paper the writers have mentioned the designs and implementations of a simple yet very effective Content-Based Image Retrieval (CBIR) system. The colors, textures and the shapes features are the vital parts of this system. With the three main consequent searching steps the searching becomes multilevel. Such propounded systems are very unique as they consider one feature at each step and use the results of the previous step as the input for the next coming step in multilevel pattern whereas in the earlier methods all the features are combined at once for the single-level search of an average CBIR system. The propounded method is very simple and comfortable to adopt. The retrieval grade of the propounded method is valuated using bi-benchmark datasets for an image classification. The above system of methods shows very good results in terms of amelioration in retrieval qualities, when compared with the literature. In proposed work we get accuracy like between 68.15 % to 94.86% in used different features.

Review of Intrusion Detection system
Authors:-M.Tech. Scholar Purnesh Tiwari, Assistant Professor Prakash Mishra

Abstract:- The Internet of Things (IoT) is a new model that integrates physical objects and Internet and became one of the principal technological evolutions of computing. It is estimated that a trillion of physical objects will be connected to the Internet until 2022. The low accessibility and the lack of interoperability of many of these devices in a vast heterogenous landscape will make it very hard to design specific security measures and apply specific security mechanism. Moreover, IoT networks still exposed and vulnerable to attacks aimed to disrupt the network. Therefore, additional security tools specific to IoT are needed. Intrusion Detection System (IDS) could fulfill this purpose. In this paper, we present a literature review on the IDS in IoT topic, mainly focusing on the current state of research by examining the literature, identifying current trends and presenting open issues and future directions.

Iot Based Intelligent Trolley for Shopping Malls
Authors:- Ragini Raiyani

Abstract:- The project is based on the development of a project with the aim to reduce the time spent in the store and to make shopping of day to day items an experience instead of a headache. This cart uses modern and cheap technology like RFID and minicomputers to make it intelligent and timesaving. It helps the consumers to utilize the time saved in other fruitful activities instead of wasting their time by standing in long queues at the checkout counter.

A Review: Rumors Detection on Twitter using Machine Learning Techniques
Authors:- M.Tech. Scholar Kavita Khalotiya, Prof. Ashish Tiwari

Abstract:- In this period, web based life stage are progressively utilized by individuals to pursue newsworthy occasions since it is quick, simple to get to and modest similarly. In spite of the expanding utilization of web based life for data and news assembling, its tendency prompts the development and spread of gossipy tidbits i.e., data that are unconfirmed at the season of posting, which may makes genuine harm government, markets and society. Along these lines, there is need of compelling framework for distinguishing bits of gossip as ahead of schedule as conceivable before they generally spread. Viable framework should comprise of four parts: Rumor location, gossip following, position grouping, and veracity arrangement. Loads of work has been done in later segment while less work in segment talk identification. In this way, presently we should take a shot at gossip location. In this paper, we will condense endeavors done till now around there. A large portion of existing techniques identifies from the earlier bits of gossip, i.e., predefined gossipy tidbits. So it is required to have robotized gossip discovery strategy which recognizes new developing gossipy tidbits viably and as ahead of schedule as could reasonably be expected.

Survey Paper of Wireless Sensor Network
Authors:- M .Tech. Scholar Kamakshi Gupta, Asst. Prof. Shailendra Tiwari

Abstract:- In recent years there is a quick advancement in the field of Wireless sensor network. This paper gives brief introduction of Wireless sensor associate with its applications in the field of condition, structure checking, keen home watching, Industrial application, prosperity, military, vehicle recognizable proof, blockage control and RFID tag. With movement in WSN, little and simplicity sensor centers end up available, which have limits of Wireless correspondence, recognizing diverse sorts of biological conditions and data getting ready. There are different sorts of coordinating traditions depending on application and framework designing. Guiding traditions give route in the framework and capable multi-skip correspondence. WSNs can be found in various applications like normal native and military by and large which get a handle on enemy interference area, challenge following, calm watching, living space checking, fire acknowledgment and cutting edge.

Phone Security on Android Device
Authors:- M.Tech. Scholar Rajeshwari Yogi, Prof. Ashish Tiwari

Abstract:- Android is a savvy versatile terminal working stage center on Linux. Be that as it may, because of its open-source programming and programmable structure character, it drives the Android framework helpless against get infection assaults. This paper has profoundly inquired about from the Linux framework security system, Android-explicit security instruments and other assurance components. Also, on this premise, Android gadgets have accomplished firmly watched on ordinary state. With the goal that aggressors cannot utilize the portion module or center library to get most elevated access consent and be assaulted. In the mean time, to additionally reinforce the security of Android gadgets, it empowers them to appropriately deal with the high-hazard danger. This paper likewise fortified interruption identification framework (HIDS) in light of the host so as to identify noxious programming and reinforce the Android framework level access control.

Digital Water Marking Technique using Decision Tree
Authors:- M. Tech. Scholar Nikhil Shrivastava, Assistant Professor Prakash Mishra

Abstract:- The quick development of the Internet in the previous years has quickly expanded the accessibility of advanced information, for example, sound, pictures and recordings to general society. As we have seen in the previous couple of months, the issue of ensuring sight and sound data turns out to be increasingly essential and a great deal of copyright proprietors are worried about securing any unlawful duplication of their information or work. Some genuine work should be done so as to keep up the accessibility of mixed media data. Highlight extraction and order based computerized water checking is new territory of research in flow security assurance and copyright strategy. Around there of research different creators utilized element extraction method, for example, wavelet change work and for arrangement reason utilized help vector machine. During the time spent element based water checking strategy include extraction is most critical part and the characterization relies upon chosen highlight. In this paper proposed novel computerized water checking strategy dependent on whole number wavelet change with quality based order procedure. For the choice of highlight quality utilized RBF work. The determination of quality relies upon separated element by whole number wavelet change. The proposed technique recreates in MATLAB programming and tried some rumored assault, for example, commotion assault, share assault and interpretation assault. Our observational assessment result indicates better execution in pressure of DWT water stamping system.

Conservation of Water in Drought Areas
Authors:- Prof. Madhuri S. Bore, Prof. Monali G. Ingle

Abstract:- India is one of the agricultural economy based country. Despite, the share of agriculture sector to GDP of the country is only about 24%, 70% of Indians are dependent on farm incomes, and about 60% of farm cultivation depends on rains. In past few years there has been increase in extreme weather events such as drought, flood, heat and cold waves, strong wind etc. India suffered of drought in 2002 with seasonal June – September all India rainfall 19% below normal after all India drought occurred during June – September, 1987. Droughts have severe economic, environmental and social impacts. Areas having poor rain could be detected in advance. It is possible to reduce agricultural losses by advanced prediction of poor or no rain situations, timely dissemination of weather based agro-advisories to planners and farmers.

Hospital Waste Management and its Impact on a local Community in Indore City
Authors:- M.Tech. Scholar Anant Tare, Asst. Prof. Vijay Kahar

Abstract:- Hospital waste management in the world is a formal discipline and does occupy a critical place in the management of health care sector. The management of hospital waste requires its removal and disposal from the health care establishments as hygienically and economically as possible by methods that all stages minimizes the risk to public health and to environment. To analyze the present situation analysis of medical waste management systems was performed to understand the various handling and disposal procedures, the knowledge and awareness of individuals involved in medical waste generation, handling and disposal, and the potential impacts of the waste stream on both human health and the natural environment. The method adapted for present study was literature review and survey method. The data collection was done through questionnaire (data collection form), informal interviews and site visits. It was found that a variety of methods were used by the medical facilities to dispose their wastes including burning burial, entombing, selling, dumping, and removal by municipal bins. The waste disposal practice was found to be quite unsafe, and both clinical and non-clinical wastes were found to be thrown together. There was insufficient awareness of the magnitude of the medical wastes issue by concerned individuals at different levels from director or divisional head to waste pickers. There was no safety measure observed in dealing with waste disposal or laboratory analysis of infectious diseases. Medical waste incineration is identified as the most preferred disposal method.

Review of Under Water Communication on Wsn
Authors:- M.Tech. Scholar Priyanka Patwari, Asst. Prof. Madhvi Singh Bhanwar

Abstract:- This paper explains briefly our research directions in the field underwater sensor networks. We explain potential applications to off-shore oil fields for equipment monitoring, seismic monitoring and underwater robotics. We describe research directions in MAC, short-range acoustic communications, localization protocols and time synchronization for high latency acoustic networks, application level time scheduling and long-duration network sleeping.

Online Video Game Streaming using Cloud Gaming
Authors:- Pravin R. Thokal, Omkar D. Kshirsagar, Shubham R. Hadake, Muktesh T. Bobade

Abstract:- The present paper mainly focuses on review of cloud gaming. In cloud gaming, sophisticated game runs on powerful servers in data centers, rendered game scenes are streamed to gamers over the Internet in real-time, and gamers use light-weight software executed on devices to interact with the games. Computer games used to take more time to get installed on Computer systems as games are too complicated and the computer hardware has low specifications. Gamers have to repeatedly upgrade their computers to play latest computer games. Cloud gaming is a system that has the potential to make virtually any video game, regardless of system requirements, to be played on almost any system.

A Survey on Data Storage, Maintenance and Accessing Challenges in Cloud Computing
Authors:- Thilagavathy Sakthivel, Vijayalakshmi Saravanan

Abstract:- Cloud computing holds the possibility to dispense with the prerequisites for setting up of high cost figuring foundation for the IT-based arrangements and administrations that the business employments. It vows to give an adaptable IT design, open through web for lightweight convenient gadgets. This would permit many-crease increment in the limit or capacities of the current and new programming. In a distributed computing condition, the whole information dwell over a lot of organized assets, empowering the information to be gotten to through virtual machines. Since these server farms may lie in any side of the world past the range and control of clients, there are diverse security and protection provokes that should be comprehended and dealt with. Likewise, one can never prevent the likelihood from securing a server breakdown that has been seen, rather frequently in the on-going occasions. There are different issues that should be managed regard to security and protection in a distributed computing situation. This broad overview paper intends to expound and investigate the various uncertain issues compromising the Cloud processing selection and dissemination influencing the different partners connected to it.

What is Image Recognition?
Authors:- Justin Devassy, Abhishek Bharadwaj (Student MCA), Prof. LatikaKharb

Abstract:- In recent years, Image recognition has become a buzzword in the tech world. Deep learning has changed the entire world over the past few years image recognition is one of the striking features of deep learning. Every day, more applications depend on neural networks which are the core component of deep learning in fields of object detection, identification, and classification. In the paper, we have discussed about what is image recognition, some real world examples, image recognition tools, opportunities, uses and problems in image processing.

Experimental Evaluation of Super plasticizers used in M20 & M25 Grades Concrete
Authors:- Sc. B Pankaj Joshi, Sc. C Raj Kumar, Sc. E Rajeev Kumar

Abstract:- Chemical admixtures are one of the important ingredients in concrete other than Portland cement, water and aggregate added to the mix before or during mixing. Admixtures are primarily used to reduce the water-cement ratio to enhance workability and compressive strength of concrete along with other properties. Successful use of admixtures depends on the use of appropriate methods of batching and concreting. Most admixtures are supplied in ready-to-use liquid form and are added to the concrete at the plant or at the jobsite. Certain admixtures, such as pigments, expansive agents, and pumping aids are used only in extremely small amounts. The effectiveness of an admixture depends on several factors including: type and amount of cement, water content, mixing time, slump and temperature. The paper presents the experimental results for comparison of two super plasticizers (Naphthelene based and Poly-carboxi late based) used in M20 & M25 grade concrete mixes to achieve economical concrete mix.

Real Time Enhanced Speech Recognition Technique to Operate Computer System Using SVM:Review
Authors:- Jadhav Sayali, Kadam Madhuri, Talreja Khushboo, Khatake Sujata

Abstract:- Speech is unique human characteristic used as tool to communicate. Speech Recognition technology is one most of the fast growing engineering technologies. It has a number of applications in different areas and provides potential benefits. Nearly 20% people of the world are suffering from various disabilities, the speech recognition system in those particular cases provide a significant help to them, so that they can share information with people by operating computer through voice input. The main objective is to recognize the spoken word by same speaker using multi-class support vector machine. Because of their limitations and high cost, voice recognition systems have traditionally been used only in a few specialized situations. For example, such systems are useful in instances when the user is unable to use a keyboard to enter data because his or her hands are occupied or disabled. Instead of typing commands, the user can simply speak into a microphone. The performance of system gives better result with reducing the work of human in terms through input device or touch screen. This work is proposed to operate the computer system through the voice commands like open or close file or any computer operations.

Review of Cooling Load Calculation of New Academic Building of Asansol Engineering College
Authors:- UG Sourabh Choudhary, UG Shantnu Sharma, UG Sayak Saha, UG Sanu Kumar, UG Sanjeev Kumar, UG Rohit Vishwas, Asst. Prof. Kaushal Kishore

Abstract:- Day by day due to increasing global temperature of the environment the demand of Air Conditioning Systems is increasing so it’s very important that the right amount of Air Conditioning System is selected. This process of selecting the right amount of Air Conditioning System is done by calculating the heat loads from the various sources in the room. The calculation of Heat Load is very complex process and required a lot of complex mathematical calculation. So to simplify it various software such as HAP 4.0 etc. are used for the above said purpose. These software’s though are simple for the professionals but appear to be very complex for common people. So this projects develops a alternate excel sheet which does the same work as that of the professional software’s but in a very simple manner. This project contains a detailed cooling load calculation of “New Academic Building” of Asansol Engineering College, Asansol, West Bengal. Its covers all the aspects of solar heat gain through glass, walls, partition walls, ceilings, equipment etc. All the calculations are done in an excel sheets with all the data collected from ASHRAE and ISHRAE handbooks. The project also describes the different heat load parameters such as refrigeration, air conditioning, etc. The various assumptions and design parameters are also considered for the development of this project. The detailed calculation and the mathematics running behind the working of the excel sheet is also described in the 2nd half portion of the project.

Evaluation on Temperature Distribution Effect in Internal Combustion Engine Fin withDifferent Profile
Authors:- A. Gautam, R. Mohan

Abstract:- The fins used in internal combustion engine plays a vital role in thermal distribution of engine during its operating condition which is used to dissipate the heat gained from combustion inside the cylinder. It is mounted above the engine to extract maximum amount of heat flux generated inside it. In present study, the UNI-GRAPHICS NX-8.0 has been used to develop the CAD model of IC engine fin. The ANSYS workbench 15.0 software is used for steady state thermal analysis of IC engine fin in order to assess the parameters affecting their thermal performances. Here, the present model is validated with the previous literatures and it is observed to be in good agreement. The performance of various fin profile such as concave fin, convex fin, convex with perforation, elliptical fin, elliptical with fillet fin, elliptical fin with perforation are assessed. The simulation of the optimized model i.e. elliptical fin with perforation gives higher value of temperature distribution with respect to distance in fin profiles. It has also been observed that thermal resistance was reduced at constant temperature of 495K inside the cylinder. The maximum convergence is observed for elliptical fin profile with perforation irrespective of parameters and configurations employed in the analysis.

A Survey of Deep-Learning Model using Intrusion Detection for the Internet of Things
Authors:- Ms.S.Vinitha, Prof. M.Ganesan, Ms.S.Arabindhu

Abstract:- Cyber-attacks on the Internet of Things (IoT) are developing at a disturbing rate as gadgets, applications, and correspondence systems are winding up progressively associated and coordinated. At the point when assaults on IoT systems go undetected for longer periods, it influences accessibility of basic frameworks for end clients, expands the quantity of information breaks and wholesale fraud, drives up the expenses and affects the income. It is basic to recognize assaults on IoT frameworks in close ongoing to give powerful security and guard. In this paper, we build up a wise interruption discovery framework custom fitted to the IoT condition. Specifically, we utilize a profound learning calculation to identify pernicious traffic in IoT systems. The location arrangement gives security as an administration and encourages interoperability between different system correspondence conventions utilized in IoT. We assess our proposed recognition system utilizing both genuine system follows for giving a proof of idea, and utilizing recreation for giving proof of its adaptability. Our exploratory outcomes confirm that the proposed interruption recognition framework can recognize true interruptions adequately.

A Critical Review of Recent Nuclear Plant Accidents and Disasters
Authors:- M.Tech. Scholar Sourabh Verma, Prof. S. N. Varma

Abstract:- Present day safety levels are achieved by learning from past accidents. We learn to use a knife by analyzing at the incidents which caused injury and harm .As per HSA (Health Science Association) report “Incident investigation are intended to determine the cause of an incident, to identify unsafe conditions or acts and to recommend corrective actions so that similar incidents don’t occur in the future. The purpose is prevention, not blame. After an investigation, employers are required without any undue delay to take corrective actions and then report on the actions taken”.

Eye Can Help – An Assistive Eye Wearable for the Blind Designed Using Real-Time Object Detection
Authors:- Hrituja Khatavkar

Abstract:- It is a big challenge for the visually impaired to access the surrounding with ease. Given paper presents a tool, an assistive device for the blind that will aid them navigate the surroundings. This device uses real-time object detection to identify the objects in nearby environment and then the is processed to convert to speech to make the understand.

A Survey on Security Attacks in Vehicular Adhoc Networks (Vanets)
Authors:- S.Arabindhu, Prof K. Prem Kumar, S. Vinitha

Abstract:- VANETs have turned into a major part of numerous savvy transportation frameworks. Security is a significant yearning for VANET in perspective on the actualities that improved security which diminishes mishaps and subsequently improves traffic conditions but then spare lives. Creating secure VANET foundations stays most noteworthy test. As verification permits confiding in both client and information, it requires significant consideration in the security structure of VANETs. A large portion of the examination purposeful endeavors’ in scholastics and industry are engaged to give productive security engineering to VANET to shield the system from foe hubs and assaults. The issue of VANET is transmitting data to address goal without impact in that data. Bringing up security holes with respect to particular dangers, the arrangement will permit to structured new secure system control strategies. This paper gives different assaults in VANET and potential arrangements by utilizing cryptographic tasks.

A Survey on Internet of Things Based Water and Energy Management Open Research Issues
Authors:- Ms. Vijayalakshmi Saravanan, Ms. Thilagavathy Sakthivel

Abstract:- The quick progressions in correspondence advances and the hazardous development of Internet of Things (IoT) have empowered the physical world to imperceptibly entwine with actuators, sensors, and other computational components while keeping up persistent system network. The persistently associated physical world with computational components frames a keen domain. A brilliant domain plans to help and improve the capacities of its tenants in executing their errands, for example, exploring through new space and moving substantial items for the older, to give some examples. Specialists have directed various endeavors to utilize IoT to encourage our lives and to examine the impact of IoT based keen situations on human life. This paper studies the cutting edge examine endeavors to empower the IoT based brilliant situations. We sort and group the writing by concocting a scientific classification dependent on correspondence empowering influences, arrange types, advancements, neighborhood models, targets, and attributes. Besides, the paper features the uncommon open doors achieved by IoT based brilliant conditions and their impact on human life. Some announced contextual analyses from various endeavors are additionally displayed. At long last, we talk about open research difficulties for empowering IoT based savvy situations.

A Research of Dealing with Sinkhole Attacks To Prevent Security in WSN
Authors:-Ms. K. Prasannadevi, Prof P.Karthikeyan, Ms.A.Swathy

Abstract:- Wireless Sensor Network (WSN) is rising as a common innovation because of its wide scope of utilizations in military and regular citizen areas. These systems are effectively inclined to security assaults. Unattended establishment of sensor hubs in the earth causes numerous security dangers in the remote sensor systems. There are numerous potential assaults on sensor system, for example, specific sending, sticking, sinkhole, wormhole, Sybil and hi flood assaults. Sinkhole assault is among the most damaging steering assaults for these systems. It might make the interloper draw all or a large portion of the information stream that must be caught at the base station. When sinkhole assault has been actualized and the enemy hub has begun to fill in as system part in the information directing, it can apply some more dangers, for example, dark opening or dim gap. Eventually this drop of some significant information bundles can upset the sensor organizes totally. This paper centres around the different techniques that can be actualized to beat this assault like Location Based Compromise Tolerant Hop Count Monitoring Scheme and through Non Cryptographic Security Mechanism, Method of Sinkhole Attack Detection.

A Survey on Security Attacks in Vehicular Adhoc Networks (Vanets)
Authors:- S.Arabindhu, Prof K. Prem Kumar, S. Vinitha

Abstract:- VANETs have turned into a major part of numerous savvy transportation frameworks. Security is a significant yearning for VANET in perspective on the actualities that improved security which diminishes mishaps and subsequently improves traffic conditions but then spare lives. Creating secure VANET foundations stays most noteworthy test. As verification permits confiding in both client and information, it requires significant consideration in the security structure of VANETs. A large portion of the examination purposeful endeavors’ in scholastics and industry are engaged to give productive security engineering to VANET to shield the system from foe hubs and assaults. The issue of VANET is transmitting data to address goal without impact in that data. Bringing up security holes with respect to particular dangers, the arrangement will permit to structured new secure system control strategies. This paper gives different assaults in VANET and potential arrangements by utilizing cryptographic tasks.

A Survey on Internet of Things Based Water and Energy Management Open Research Issues
Authors:- Ms. Vijayalakshmi Saravanan, Ms. Thilagavathy Sakthivel

Abstract:- The quick progressions in correspondence advances and the hazardous development of Internet of Things (IoT) have empowered the physical world to imperceptibly entwine with actuators, sensors, and other computational components while keeping up persistent system network. The persistently associated physical world with computational components frames a keen domain. A brilliant domain plans to help and improve the capacities of its tenants in executing their errands, for example, exploring through new space and moving substantial items for the older, to give some examples. Specialists have directed various endeavors to utilize IoT to encourage our lives and to examine the impact of IoT based keen situations on human life. This paper studies the cutting edge examine endeavors to empower the IoT based brilliant situations. We sort and group the writing by concocting a scientific classification dependent on correspondence empowering influences, arrange types, advancements, neighborhood models, targets, and attributes. Besides, the paper features the uncommon open doors achieved by IoT based brilliant conditions and their impact on human life. Some announced contextual analyses from various endeavors are additionally displayed. At long last, we talk about open research difficulties for empowering IoT based savvy situations.

Tree Species Identification and It’s Diseases using Machine Learning
Authors:- Satish V. Kendre, Prof. J. N. Nandimath

Abstract:- Tree species identification is crucial for forest management. From the perspective of plant taxonomy, leaves, flowers, roots, and fruits all carry important information to distinguish different species. Roots, however, are buried in the ground and not easy to obtain. When the leaf image is uploaded to PC and then its essential features are identified and recorded And it’s diseases using image processing methods. Feature extraction is a critical stage because the ability of a system to discriminate various types of leaves depends on the features extracted. The features have to be stable in order to make the identification system robust. Subsequently the plant leaf is recognized using techniques of machine learning. We will provide an effective approach to automatically identify tree Species and its diseases machine Learning. The convolution neural network is a widely-used classifier, and provides an alternative for the traditional image recognition approach. The work will identifies tree species by analyzing tree leaves, which have multi-dimensional features such as color, shape, and leaf vein signatures. Since it is difficult to find a single leaf feature to accurately identify tree species and it’s diseases, convolution neural networks are employed to integrate multi-dimensional leaf features.

Survey on Prediction of Heart Disease using Machine Learning
Authors:- M.Tech. Scholar Yashita Agarwal, Asst. Prof. Deepak Singh Tomar, Hod Dr. Bhupesh Gour

Abstract:- Machine Learning algorithms provide the facility to find new facts in the form of patterns from the history of records stored in databases. Predicting the diseases in earlier stages is a major task of data mining algorithms. The number of costly tests is required for patients to analyze the symptoms and causes for effective disease diagnosis. On the other hand, this number of tests on patients can be eliminated using data mining machine learning algorithms. This minimizes number of tests which plays considerable outcomes in time and accuracy level of prediction. Heart disease prediction is essential since it permits healthcare professionals to analyze the attributes important for diagnosis like blood pressure, diabetes, age, height, weight, etc., effectively.

Use of Artificial Intelligence in Sales and Marketing
Authors:- MBA Student Atul Karale , Prof. Raghvendra Sandhane

Abstract:- Artificial intelligence is impacting the sales and marketing in an unparalleled way. AI is expected to grow performance across all sectors, especially those with a high proportion of predictable tasks. Companies like Walmart, Amazon are heavily investing in AI because of which Sales and marketing reps are facing a grim future. In this paper, a literature review of how artificial intelligence-based systems is used for sales and marketing purpose, how AI has evolved from time to time with special focus on organization which are presently using this for industrial marketing is covered. This paper also includes a survey which is aimed at gathering information from organizations on how they are using artificial intelligence. This paper therefore tries to address the use of AI cases in sales and marketing and also aims to determine the future scope of artificial intelligence in different marketing activities.

A Survey on Searching Mechanism for Encrypted Cloud Storage
Authors:- M.Tech. Scholar Mintu Kumar, Professor Niresh Sharma

Abstract:- The basic advantage of cloud computing is giving of data benefit, by which the data proprietors stores their information in general data server farms by financially sparing their capital venture towards data management. Distributed cloud storage gives clients enormous storage room and makes it easy to use for prompt necessity of data, which is the establishment of a wide range of cloud based applications. Data giving in the business open cloud additionally raises the issue for unapproved data get to and the distributed cloud storage would not be commendable if the outsourced data isn’t viably used. The challenge is on the most proficient method to influence successful data to access in the public cloud storage aiming at change of different searching procedures for expanding the data usage. In this paper, an endeavour is made to review different searching procedures for the powerful data use in cloud storage and is talked about in detail.

Analysis of A Fatigue Life Prediction for Safe and Economical Machine Shaft
Authors:- M.Tech. Scholar Gaurav Kumar, Asst. Prof. Ranjeet Kumar, Asst. Prof. R.S. Sikarwar

Abstract:- High-strength bolts are widely used in wind turbines and play a significant role in their operation. In this paper, in order to study the ultimate strength of high-strength bolts in the connection between the hub and main shaft in wind turbine with pretension effects, two kinds of finite element models are presented: a solid bolt model and a simplified bolt model. In this proposed study the numerically simulation analysis of the fatigue behavior of stepped shaft made of Carbon steel SAE 1045_390_QT under a biaxial loading (torsion-bending moment). This work will include the complete analysis of stepped shaft by using Ansys workbench 15.

Identification of Plant Leaf Diseases using Deep Convolutional Neural Networks
Authors:- M.Tech. Scholar Tirupati Murali Mohan, Asst. Prof. & Hod P. Bhanu Prakash Reddy

Abstract:- – Agriculture is the most important part of the global economy as it presents food safety. However, in modern years, it has been noted that plants are broadly infected by various infections. The manual examination of plant, fruit and leaf diseases is a complicated process which can be reduced by using automated processes for detection of plant diseases at the first stage. In the field of horticultural information, the automatic identification moreover diagnosis of maize leaf diseases are extremely desired. For increasing growth and productivity of the crop field, farmers need automatic monitoring of disease of plants instead of manual. Standard monitoring of disease do not produce a satisfactory outcome as natural eye observation is the old process needs more extra time for disease identification also need specialist hence it is not effective. Curvularia leaf spot, Brown spot, Mosaic, Grey spot, and Rust are five popular types of leaf diseases. To overcome the drawbacks of regular eye observing procedure, we used digital image processing method for active and accurate disease detection of the plant. To develop the identification accuracy of leaf diseases and decrease the number of parameters, the improved GoogLeNet and Cifar10 models based upon deep learning are proposed for leaf disease identification in this paper. Two improved standards that are employed to train and test nine varieties of maize leaf images are obtained by changing the parameters, adjusting the pooling combinations, combining dropout operations and rectified linear unit functions, and decreasing the number of classifiers. The enhanced processes have probably improved the accuracy of leaf disease and decreased the convergence repetitions, which can efficiently increase the model training and identification capability.

Online Parking Booking System
Authors:- Nidhi Sharma, Ruchita Bhoye, Anuja Deokar, Shrishti Nayak

Abstract:- With the increasing number of vehicles, finding a parking space in most areas is difficult for drivers. The common method of finding a free space is manual. This method takes time and effort. Hence, this project offers an online reservation system where the users can view various parking areas and select the available space. If the booking space is available then he/she can book it for specific time slot. The booked space will be marked red and will not be available for anyone else for that specified time. This system provides an additional feature of cancelling the bookings. User can remove their booked space anytime. Online payment can be done. After making payment, user will get a notification on his/her phone with unique parking number.

Traffic Sign Recognition and Boundary Estimation Using Convolutional Neural Network
Authors:- M.Tech. Scholar M. Hanumesh Raja, Asst. Prof. & Hod P. Bhanu Prakash Reddy

Abstract:- Now a days, a large number of vehicles is quickly increasing. In parallel, the number of routes and traffic signs has developed. As an outcome of developed traffic signs, the drivers are required to learn all the traffic signs and to pay attention to them while driving. A method that can automatically identify the traffic signs has been required to decrease traffic accidents and to drive more easily. Recognition and Detection of texts in traffic signs have been extensively studied and with the advance in image capture technology has accommodated to develop or to produce new methods to resolve this issue. In this work, we introduced a method for detection, segmentation and recognition of text-based traffic signs from images analyzing and processing techniques. We introduce a unique traffic sign detection system that concurrently estimates the location and precise boundary of traffic signs using convolution neural network (CNN). Estimating the precise boundary of traffic signs is very important in navigation systems for smart vehicles where traffic signs can be used as 3-D landmarks for the road environment. In this paper, the boundary view of a traffic sign is formulated as 2- D pose and shape class prediction problem, and this is completely solved by a single CNN. With the predicted 2-D pose and the shape class of a targeted traffic sign in the input, we determine the actual boundary of the destination sign by projecting the boundary of a corresponding template sign image into the input image plane.

Automated Payroll with Gps Tracking and Image Capture
Authors:- Shinde Reshma U.

Abstract:- This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 30 minutes .When user logout the system again the image will be captured as well as GPS location will be send to the admin. In order to keep track of the attendance as well as payroll of the field work people, this system plays a major role.

A Review on Heat Transfer Analysis of Internal Combustion Engine Fins at Different Profile
Authors:- A. Gautam, R. Mohan

Abstract:- The part or component which faces high temperature variation and thermal stress is engine cylinder and also the core automobile component of engine is cylinder. So there has to need of slowdown the high temperature variation and thermal stress of cylinder by using the fins. To increase the heat transfer by convection fins have provided on the surface of cylinder. Internal combustion engine fins plays an important role in thermal distribution in engine during its operating condition which is used to dissipate the heat gained from combustion inside the cylinder. It is mounted above the engine to extract maximum amount of heat flux generated in it. This paper presents a review of different fin profile to reduce thermal resistance and get maximum convergence.

Wearable Polymer Optical Fiber Sensors in Healthcare using Iot
Authors:- C.Premanantha Madhavan, K.Jebastin

Abstract:- Sleep disordered breathing is an increasingly common condition among the general population. Life expectancy in most countries has been increasing continually over the several few decades thanks to significant improvements in medicine, public health, as well as personal and environmental hygiene. However, increased life expectancy combined with falling birth rates are expected to engender a large aging demographic in the near future that would impose significant burdens on the socio-economic structure of these countries. Therefore, it is essential to develop cost-effective, easy-to-use systems for the sake of elderly healthcare and well-being. Remote health monitoring, based on non-invasive and wearable sensors, actuators and modern communication and information technologies offers an efficient and cost-effective solution that allows the elderly to continue to live in their comfortable home environment instead of expensive healthcare facilities. These systems will also allow healthcare personnel to monitor important physiological signs of their patients in real time, assess health conditions and provide feedback from distant facilities. In this paper, we have presented and compared several low-cost and non-invasive health and activity monitoring systems that were reported in recent years. A survey on textile-based sensors that can potentially be used in wearable systems is also presented. Finally, compatibility of several communication technologies as well as future perspectives and research challenges in remote monitoring systems will be discussed.

Material Characteristics of Geopolymer Concrete for Different Strength
Authors:- Ph.D Research Scholar G.Jayarajan, Prof. & Dean Dr.S.Arivalagan

Abstract:-Every year 87 to 100 million tonne of fly ash is generated from coal based thermal power stations in India and power is the key to the prosperity and development of a nation and the power generation in India consumes 70% of country’s coal production and generates 100 million tonnes ash per tear. The ash generation is projected to increase at least to 175 million tonne per year by 2012. Now, having seen that fly ash is such a wonderful and useful material that it can be used for large number of gainful applications like in building components, cement, construction of embankments, raising, dykes, agriculture and mine fill material, it is successfully accepted for large scale utilization instead of disposing at high handling costs. This article deals with the management of fly ash in utilization based on its quality and value, Quarry dust, 12.5mm coarse aggregate with geoploymer concrete.

Perception of Business Education Teachers on The Need for Adoption of E-Learning Approach In Teaching and Learning
Authors:- Bamidele Vincent Olawale, Ayibiowu Stephen Idowu, Murtala Muhammed Yusuf

Abstract:- This paper examines the perception of business educators on the need for adoption of e-learning approach of teaching and learning in tertiary institutions. Two (2) research questions as well as hypotheses were raised for this study. The study made use of 500 Business education teachers who participated voluntarily in the study. The business educators used for the study were recruited from the six states of the North western region of the country, namely; Kano, Kaduna, Kastina, Zamfara, Sokoto and kebbi. A well structured questionnaire was used to collect the data used in this research. SPSS statistical tool was used to analyze the data, hypotheses were tested using t-test. And the finding of the study depicts that the perception of business educators with long teaching experience and those with shorter teaching experience on implementation of E-learning Approach in Teaching and learning of Business education differs. The finding of the study also shows that there is no significant difference between the perceptions of business education teachers who are first Degree holder (BSc/Bed) and those who are second degree holder (M.sc) on implementation of E-learning Approach in Teaching and learning of Business education. The study among others recommends that optimal attention should be given to improved software and appropriate policies that will favour e-learning approach of teaching and learning at all level of education in Nigeria.

A Survey: Possibility of using Building Material Waste and Waste Tyre as a Construction Material
Authors:- Ankit Chand Mishra, Assitant Prof. Dr. Sneha Gupta

Abstract:- The main objective of this study is to investigate the potential use of various solid wastes for producing construction materials. This paper is based on the review of available literature on the construction materials including different kind of solid waste. The traditional method for producing construction material is using the valuable natural resources. Besides the industrial and urban management system are generating solid waste and most probable dumping them in open fields. This activity poses serious detrimental effects on the environment. To protect the environment many efforts are being made for the reutilization of various types of solid waste with a view to utilize them in the production of various construction materials. This paper is about the environmental implications caused by the generation of various solid wastes. In addition, this paper shows the application of building material waste and solid waste based construction materials.

Past Studies on Thermodynamic Analysis of A Novel Combined Cycle Comprised of Vapor-Compression Refrigeration And Organic Rankine Cycles
Authors:- M.Tech. Scholar Prashant Kumar, Professor Sujeet Kumar Singh

Abstract:- The world is facing energy and environmental challenges due to population growth and economy development. The utilization of renewable energy can significantly contribute to reduction in consumption of conventional energy and environmental pollution. Low grade thermal energy can be utilized in organic Rankine cycle driven vapour compression refrigeration system (combined ORC-VCR) to produce refrigeration effect. Low grade renewable energy can be obtain from the source such as solar, geothermal and waste heat of industries.

Implementing Dynamic Shrew Attack Protection (Sap) to Defend Against Shrew Attack on Edges
Authors:- Asst. Prof. Agath Martin, Asst. Prof. Nidhin Sani, Asst. Prof. Nidhin Sani, Asst. Prof. Nishanth R.

Abstract:- Today’s world is ruled by Internet which is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It consists of different type of routers and components to connect between various sources. We have both inner router which connects similar topology and outer router which connects different topology. One of the error types in communication is packet loss by any means which may leads to attacks in TCP connection. Shrew Attack leads to packet drops which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. We have so many reasons for packet dropping in edges; one of such reason is due to service level agreement (SLA) enforcement where it is a negotiated agreement between two parties (e.g., customer and service provider). In this paper we propose SAP (Shrew Attack Protection) which is an architectural model that used to defend against the shrew attack rather than attempting to detect and isolate. Basic concept which used here is differential tagging & drop rate collector to identify the victims Till now research have been shown mitigating the attack in inner router where the loss is very less. But we implement SAP in edges to reduce the packet-loss (where theoretically more drops in edges) and further stop the TCP connection from closing. SAP is a destination-port-based mechanism and requires only a small number of counters to find potential victims, which makes SAP readily implement able on top of existing router mechanisms.

Study of Forced Convection Nanofluid Heat Transfer in The Automotive Cooling System
Authors:- M.Tech. Scholar Atulya Agrawal, Professor Deo Kumar Singh

Abstract:-The development of high performance thermal systems for heat transfer enhancement has become popular nowadays. A number of works has been performed to gain an understanding of the heat transfer performance for their practical application to heat transfer enhancement. Thus the advent of high heat flow processes has created significant demand for new technologies to enhance heat transfer. Heat transfer performance of liquids is limited by their low thermo-physical properties compared with those of solids. Dispersing solid metallic or non-metallic materials in a base fluid (liquid), such as water, ethylene glycol or glycerol, has become an interesting topic recently. In this paper, the friction factor and forced convection heat transfer of different nano particles dispersed in water in a car radiator was numerically determined. Four different nano fluid volume concentrations (1%, 2%, 3% and 4%) were used, and the resulting thermal properties were evaluated. The Reynolds number and inlet temperature ranged from 10000 to 100000 and from 60 to 90 °C, respectively.

Comparative Study of ILS and MLS Systems and Proposed MLS Prototype on Runway 27 of Bangalore International Airport
Authors:- M.Tech. Scholar Niyonsaba Jeremie, Professor Samuel Vivek

Abstract:-This paper discusses how the instrument landing system (ILS) and microwave landing system (MLS) operate, their subsystems and how to convert Bangalore’s international airport ILS system into MLS system. The need of MLS system over ILS system is also covered in this paper.

Comprehensive Study of Cast Iron Welding by using Different Electrode, with the Help of Destructive Testing
Authors:-Prof. Aamir Sayed, Akash S.Kogade, Akash S.Lilhare, Bablu P.Bhimte, Akshay Wankhede

Abstract:-The problematic welding characteristics of the cast iron originate majorly from the high carbon content of the material. On welding and cooling, the carbon makes formation of various undesired microstructures possible, reducing the weld ability a great deal in all regions related to welding. For welding cast iron material by using hot welding process according to the preheating temperatures ranges. the lower preheating temperatures are nonsufficient for lowering the cooling rate to the desired values and hence formation of brittle phases as martens tic and carbides are encountered.For these cases generally Ni based electrodes are used. Ni based fillers are weaker than steel alloys and yields higher ductility. Increased ductility suspends crack formation especially in case of martens tic transformation and additionally Nickel bonds with Carbon preventing formation of iron carbide. Despite these superior properties, Ni electrodes provide relatively lower mechanical properties with respect to steel.

Survey on Secure Routing Method in Wireless Sensor Networks Based Pso
Authors:- M.Tech. Scholar Anamika Kumari, Asst. Professor Niresh Sharma, Dr. Varsha Namdeo

Abstract:-Some trust-based methods have been proposed for consideration by guaranteeing the security routing of wireless sensor networks (WSN) recently. However, Most of the current research work usually consumes a lot of energy resources and computing resources or only performs well for specific types of attacks. Nowadays, most of current research works are only targeted at specific types of attacks, so they cannot cope with dynamically changing security environments. Therefore, it is extremely important to design an effective security routing algorithm to ensure data security.

Image Colorization Using Deep Learning
Authors:-Abhishek Thakur, Sumit Pandey, Priyanka Dusane, Nidhi Sharma

Abstract:-The idea of colorizing black and white films and pictures is a very old notion dating back to 1902. Today it is accepted as enrichment to the art form. Today, colorization is usually done by hand in Photoshop and other software. This takes a lot of time and proficiency. In short, an image can take up to one month to colorize. It requires considerable research. A face alone requires up to 20 layers of pink, green and blue shades to get it just right. In this project we are attempting to recolor B/W or Grayscale images using Convolution Neural Networks. This survey paper covers a few techniques that automate the task of recoloring desaturated images. These techniques employ the use of image processing and machine learning to achieve the desired outputs.

Crowd Monitoring System using Artificial Neural Networks
Authors:- Shreyash Pimpalshende, Barsha Koley, Shubham Patil, Supriya Kudale, Dr. Archana Chaugule

Abstract:- Detection of objects and their analysis into useful data has always been the core concern throughout the human evolution. From the introduction of computers, to providing those human like capabilities, to the upcoming trends in computer vision and natural language processing, these abilities are now been started to replicate by the computers. Use of Artificial Intelligence is currently the prime focus of industry in development of such core abilities for computers. Our Project involves the use of Artificial Neural Networks to determine, analyze and classify the objects been given to the feed input of it and generate useful insights, resulting in the determination of person head count in particular place, thereby monitoring the crowd and taking appropriate actions.

Study of use of Artificial Intelligence as an Enabler for Startup Success
Authors:- Ph.D Research Scholar Saumendra Mohanty

Abstract:- Artificial Intelligence is turning out to be a godsend for startups. Funding of artificial intelligence-focused companies reached approximately $9.3 billion in the U.S. in 2018, an amount that will continue to rise as the transformative impact of AI is realized. AI-based analysis is used by these Startups to make data-driven decisions. AI in business analytics can play a very crucial role in the overall success of startup organization. Advanced computing tools, machine learning, predictive Artificial Intelligence is turning out to be a great enabler to Startups to gain early traction, Big Corporation interest & investor funding over other non AI based technology Startups. As business leaders and innovators race to reach the promise of artificial intelligence to deliver a competitive advantage as well as cost and time savings, the technology is altering industries from finance to manufacturing with new products, processes and capabilities. Startups are taking advantage of AI because it enables them to provide their customers with personalized marketing, which in turn increases engagement, helps to enhance customer loyalty and improve sales, saves time and money by automating and optimizing routine processes and tasks. Increase productivity and operational efficiencies and make faster business decisions based on outputs analysis and AI have fueled the growth of new-age business intelligence tools.A recent study of Artificial Intelligence firms from three continents and 18 industries, picked show a clear trend in this regard .Many large companies have invested or acquired those Startups which have used AI /ML Algorithms.

Vehicle Crash Alert System
Authors:- Prof. M.B.Yelpale, Shubham Sanjay More, Sahil Anis Pathan, Amogh Satish Kumathekar, Priyadarshan Sanjay Deshmukh

Abstract:- At the start the GPS continuously takes computer file from the satellite and stores the latitude and line values in AT89s52 microcontroller’s buffer. If we have got to trace the vehicle, we’d prefer to send a message to GSM device, by that it gets activated. It jointly gets activated by police work accident on the shock detector connected to vehicle. Parallely deactivates GPS with the help of relay .Once GSM gets activated it takes the last received latitude and line positions values from the buffer and sends a message to the particular vary or PC that’s predefined at intervals the program. Once message has been sent to the predefined device the GSM gets deactivated and GPS gets activated.

A Review To Improvement Power Quality To Grid Connectedwindenergy System by Statcom
Authors:- Lallan Kumar, Astha Dixit

Abstract:- This paper a review of power quality improvement of wind energy system by using of STATCOM to the grid system. It shows how power electronic devices and Flexible AC Transmission Systems play a role to mitigate the power quality problems. But in the transmission system of wind energy system is affected voltage variation, flicker, harmonics and switching operation .Hence the power system losses stability and lagging power factor to connect the load. In this paper researched by using of static compensator (STATCOM) with using the battery stored system (BESS) at the common point coupling to power factor improvement and minimize total harmonic distortion of the grid system. To improve power quality by using STATCOM to connect the grid of wind energy system of a scheme of simulated of the power system of block set. The required power system maintain voltage stability and phase difference is zero, minimize distortion, harmonics to power system according to the guidelines specified in IEC-61400 standard (International Electro-technical Commission) provides some norms and measurement parameter.

Friend Recommendation System Using Location-based Social Networks : A Review
Authors:- M.Tech. Scholar Ravi Kumar Sahu, Assistant Professor Abhilasha Vyas

Abstract:- Nowadays use of social networking site is increasing exponentially. Almost 90 to 95 percent of the young generation (especially students) are using social networking services. Every social networking site is using different factors for recommending friends. These factors may include social graph, tastes, moral standards, habits, attitudes, profession, etc. Two decades ago, people typically made friends with others who live or work surrounding to themselves like neighbors or colleagues. With the rapid advances in social networks, services such as Facebook, Twitter, Google+ have provided us new ways of making friends. So there is a big challenge with the social networking services which is how to recommend a good friend to a user.

Role of Fog Computing in the Internet of Things
Authors:- Narendra Rao Tadapaneni

Abstract:-Fog computing locates certain resources and transactions at the edge of a network. Therefore, locating resources closer to the devices, it allows internet users to aggregate bandwidth at access points. This reduces the overall need for bandwidth since less data is being transmitted away from data centres. Therefore, Fog computing is new technology to the edge of the network which has led to the implementation of a new breed of applications and services [1]. This research paper will present the characteristics of Fog computing and its role in the Internet of Things.

Experimental and Investigation of Aluminium Metal Matrix Composite and Its Application
Authors:- Research Scholar Pavan Balappa Bagali, Professor Dr G. R. Selokar

Abstract:- Aluminium metal matrix composites are gaining widespread acceptance for automobile, aerospace, agriculture farm machinery and many other industrial applications because of their essential properties such as high strength, low density, good wear resistance compared to any other metal. The addition of reinforcements into the metallic matrix improves the stiffness, specific strength, wear, creep and fatigue properties com- pared to the conventional engineering materials. This paper presents the overview of the effect of addition on different reinforcements in aluminium alloy highlighting their merits and demerits. Major issues like agglomerating phenomenon, fiber-matrix bonding and the problems related to distribution of particles are discussed in this paper. Effect of different reinforcement on AMCs on the mechanical properties like tensile strength, strain, hardness, wear and fatigue is also dis- cussed in detail

Enhancement of Mechanical Properties ofBanana Fiber Reinforced Epoxy Composites Filled with Groundnut Shell Ash
Authors:- Guruji Ramakrishna, Registrar Professor G. R. Selokar (Supervision)

Abstract:- The composite comprises of fundamentally two stages for example grid and fiber. The availability of trademark fiber and effortlessness of amassing have allured researchers worldwide to endeavour by local benchmarks open cheap fiber and to learning their reachability of fortress judgments and to what degree they satisfy the obliged specifics of extraordinary fortified polymer composite went for basic order. Fiber fortified polymer composites has various inclinations, for instance, by and large negligible exertion of creation, easy to create and preferred quality difference over immaculate polymer tars due with this reason fiber reinforced polymer composite used inside a combination of arrangement as class of structure material.

Manufacturing and Testing the Surface Integrity of The Bimetallic Pistons and Its Significance
Authors:- Research Scholar Sumeet Hangargi, Professor G. R. Selokar (Supervision)

Abstract:- The bond integrity after machining is primarily related to the magnitude of the cutting forces during machining and thus the objective of the paper is to obtain optimal cutting parameters in turning of such pistons. In addition, any machining process should also satisfy surface finish requirements. A Taguchi analysis of the influence of cutting speed, feed, and depth of cut on cutting force were conducted and the extent of debonding and the surface finish was measured independently after machining to ensure that this minimum cutting force condition fully satisfied all the product requirements Those parameters yielding minimum cutting forces were identified as minimal cutting force parameters, so numerical simulation and experiments were carried out on these parameters. After machining, the intermediate bonding between metallic regions was studied using ultrasonic testing.

Analysis Through Condition Base Monitoring (Cbm) System
Authors:- Research Scholar T D Sundaranath, Registrar Professor Dr G. R. Selokar (Supervision)

Abstract:- These test rigs have been embedded, instituted and installed with enormous mechanical, electrical and electronic elements like power drivers, gears, motors, sensors and with electronic gadgets Why it’s an interesting problem – For to test each machines like alternators, starter motors and wiper motors, major expenses contributing with power test rigs and gadgets are not available instantaneously to recheck and confirm whether the machine is OK OR NOT OK. In this paper we proposed Innovation technology for detection of Tangible & Intangible failure modes through Condition Base Monitoring (CBM) System.

Project Management and Planing in the Field of Engineering Procurment and Construction
Authors:- Scholar Kapa Lakshmikantha Reddy, Registrar Prof. Dr. G. R. Selokar, (Supervision)

Abstract:- The components that influence project achievement are altogether vital. In spite of the significance of understanding project execution pointers, couple of observational investigations have been directed in the course of the most recent decade as far as breaking down the components that decide the execution of elevated structures in Engineering, Procurement, and Construction (EPC) projects. Projects in the industrial EPC and mining sectors of the construction industry share common characteristics such as complexity and size, high levels of interdependency between multiple stakeholders, remote and disperse geographical locations, and in many cases, extreme weather conditions. The combination of these characteristics creates production environments in which variability abound hampering performance, causing delays, and reducing quality and safety levels. The Construction Industry is a mind boggling and divided industry worldwide concerning its inventory network, items, and forms, and is looked with a comparable predicament as looked by producers amid its time in past decades.

Inter-laminar Fracture of Composites Materials for Aerospace Structures

Authors:- Research Scholar Imran Abdul Munaf Saundatti, Prof. Dr G. R. Selokar (Supervision)

Abstract:- The point of the present research is to pick up a superior comprehension of inter-laminar facture of polymer framework composites in various modes, and to create scientific model to anticipate the critical strain energy discharge rates. Accentuation has been set on the root revolution at the crack tip which was accepted to be a critical factor which influences the delaminating fracture toughness, and critical burden. A joined experimental and hypothetical investigation has been directed to decide the job of root revolution on critical burden. The objective of anticipating the reliance of root pivot on critical strain energy discharge rate under mode I is accomplished. The initial segment of the present examination analyzes inter-laminar fracture toughness of Double Cantilever Beam (DCB) examples dependent on a changed Timoshenko beam model.

Scaling Financial Data Warehouses with AI: Towards a Future-Proof Cloud-Based Ecosystem
Authors:- Srinivasa Chakravarthy Seethala

Abstract:- In the financial sector, the scale and complexity of data have increased exponentially, pushing legacy data warehousing solutions to their limits. Cloud-based architectures, when combined with artificial intelligence (AI), provide financial institutions with future-proof, scalable data management solutions capable of processing massive datasets for real-time insights and predictive analytics. This paper examines how AI and cloud technologies are revolutionizing financial data warehouses, enabling institutions to scale their data assets and create future-proof ecosystems. We explore the synergies between AI, cloud computing, and advanced data warehousing techniques and how they are reshaping the landscape of financial data management and analysis. This article highlights the benefits of AI-driven ETL processes, real-time analytics, and scalable storage, while examining the security, compliance, and operational efficiencies achieved in a cloud-based financial ecosystem.

DOI: 10.61137/ijsret.vol.5.issue6.575

Creational Design Patterns for Dynamic Device Management in IoT Biometrics
Authors:- Dr. Vinayak Ashok Bharadi

Abstract:- This paper investigates the application of creational design patterns—specifically the Singleton and Factory patterns—in Java-based IoT frameworks for managing biometric devices. The study builds on Ramakrishna Manchana’s 2019 research on design patterns, demonstrating how these patterns can enhance scalability, modularity, and flexibility in IoT systems dealing with multimodal biometric data. By employing a dynamic configuration model, the proposed framework enables efficient device management and secure data processing, ensuring adaptability to evolving IoT requirements.

DOI: 10.61137/ijsret.vol.5.issue6.576

Nano-Enabled Consumer Products: Cosmetics, Textiles, and Packaging
Authors:- Dr. Ramesh Kumar

Abstract:- Nanotechnology has revolutionized consumer products by introducing engineered nanomaterials (ENMs) that enhance performance, durability, and user experience. This paper explores the integration of nanotechnology in cosmetics, textiles, and packaging—three key sectors where nano-enabled innovations are driving significant transformations. In cosmetics, nanocarriers and UV-blocking agents improve efficacy and aesthetics. In textiles, nanoparticles impart antimicrobial, UV-resistant, and self-cleaning properties. In packaging, nanomaterials enhance barrier functions, enable active and smart features, and promote sustainability. The study also addresses the associated safety and environmental concerns, including nanoparticle toxicity, ecological persistence, and regulatory challenges. It highlights the global regulatory landscape and underscores the importance of risk assessments and consumer transparency. Emerging trends such as biodegradable nanomaterials, intelligent fabrics, and IoT-integrated packaging are poised to shape the future of nano-enabled goods. Despite technical and ethical challenges, the convergence of nanotechnology and consumer product design offers vast potential. The paper concludes by emphasizing the need for responsible innovation, robust regulation, and public engagement to ensure that nanotechnology continues to benefit both consumers and the environment.

DOI: 10.61137/ijsret.vol.5.issue6.577

Nanotechnology in Health Care and Medicine
Authors:-Dr. Vikram S. Jain

Abstract:- Nanotechnology has emerged as a transformative force in modern health care and medicine, offering innovative solutions that enhance disease diagnosis, treatment, and prevention. Operating at the nanoscale, where materials display unique physicochemical properties, nanotechnology enables the precise manipulation of biological systems. This paper explores the fundamental principles of nanomedicine and examines its wide-ranging applications, including targeted drug delivery, advanced diagnostic tools, regenerative therapies, and tissue engineering. It also addresses the integration of nanotechnology with cutting-edge technologies such as artificial intelligence and theranostics, which are driving the evolution of personalized and precision medicine. The paper highlights key diagnostic innovations such as quantum dot imaging, nanosensors, and lab-on-a-chip devices that enable early and accurate disease detection. In therapeutics, it reviews how nanocarriers enhance drug bioavailability and reduce systemic toxicity, while also supporting gene therapy and minimally invasive interventions like photothermal therapy. In regenerative medicine, nanomaterials serve as bioactive scaffolds for tissue repair and support stem cell therapies. However, the rapid progress in nanomedicine raises concerns regarding biocompatibility, long-term safety, regulatory oversight, and ethical implications. Emerging trends suggest a future where nanomedicine plays a central role in real-time health monitoring and intelligent treatment delivery. Despite its promise, the field faces challenges related to scalability, standardization, cost, and clinical translation. A multidisciplinary approach, incorporating materials science, toxicology, clinical research, and policy reform, is essential to maximize its benefits while minimizing risks.

DOI: 10.61137/ijsret.vol.5.issue6.578

Fundamentals of Nanomaterials and Their Industrial Relevance
Authors:-Professor Deshmukh Upadhya

Abstract:- Prof. Deshmukh Upadhya Nanomaterials represent a critical frontier in modern materials science, offering unique structural, chemical, and physical properties that differ significantly from their bulk counterparts. These materials—ranging from nanoparticles and nanowires to nanotubes and quantum dots—exhibit enhanced reactivity, strength, conductivity, and surface-to-volume ratios that make them exceptionally valuable for industrial innovation. This paper explores the core concepts surrounding nanomaterials, including their classification, synthesis methods, characterization techniques, and functional properties. Emphasis is placed on their wide-ranging applications across key sectors such as electronics, healthcare, energy, aerospace, and environmental engineering. The economic and commercial implications of nanomaterials are also discussed, highlighting their growing market potential, challenges in scalability, safety considerations, and the need for regulatory alignment. Additionally, this paper addresses future prospects by examining emerging trends such as green nanotechnology, hybrid materials, and the integration of artificial intelligence in nanomaterial design. Together, these insights provide a comprehensive foundation for understanding how nanomaterials are reshaping industrial landscapes and opening new avenues for sustainable, high-performance technologies.

DOI: 10.61137/ijsret.vol.5.issue6.579

Introduction to Nanotechnology in the Business World
Authors:-Dr. Aarti Sharma

Abstract:- Nanotechnology, defined by its ability to manipulate matter at the nanoscale, has emerged as a transformative force in the global business landscape. This review introduces the foundational principles of nanotechnology and explores its profound implications across diverse industries including healthcare, electronics, energy, and consumer goods. It discusses the commercialization trajectory of nanotech innovations, examining how scientific breakthroughs transition into market-ready solutions. The review highlights the evolving business models shaped by nanoscale technologies, from startups leveraging cutting-edge materials to multinational corporations incorporating nanotechnology into sustainability and digital transformation strategies. Key enablers such as research and development ecosystems, intellectual property management, regulatory frameworks, and public-private collaborations are analyzed to understand how businesses can unlock strategic opportunities. Additionally, the review addresses challenges such as scalability, ethical concerns, and public acceptance, offering a realistic view of the path ahead. By laying the conceptual and practical groundwork, this chapter sets the stage for a comprehensive exploration of nanotechnology’s role in shaping the future of innovation-driven commerce.

DOI: 10.61137/ijsret.vol.5.issue6.580

Nanotechnology in Agriculture and Food Safety
Authors:-Dr. Anwar Qureshi

Abstract:- Nanotechnology is rapidly emerging as a powerful tool to address critical challenges in agriculture and food safety. By leveraging engineered nanomaterials with unique properties, it enables enhanced crop production, precision nutrient delivery, targeted pest control, and real-time monitoring of soil and food quality. Nano-enabled livestock health solutions and advanced food processing techniques improve productivity and extend shelf life. Additionally, nanosensors and smart packaging technologies offer sensitive, rapid detection of contaminants, enhancing food safety throughout the supply chain. Despite these benefits, concerns over nanoparticle toxicity, environmental persistence, and regulatory gaps remain. This paper provides a comprehensive review of nanotechnology applications in agriculture and food safety, discusses safety and policy considerations, and highlights emerging trends such as green nanotechnology and digital integration. Responsible innovation, supported by harmonized regulations and stakeholder engagement, is imperative to maximize the positive impact of nanotechnology on sustainable food systems.

DOI: 10.61137/ijsret.vol.5.issue6.581

Innovation Pathways in Nanotech Startups
Authors:-Dr. Narayanan Swamy

Abstract:- Nanotechnology startups represent a critical engine of innovation, bridging scientific discovery and commercial application in fields ranging from healthcare to materials science. This paper explores the multifaceted innovation pathways that these startups navigate, including technology development, funding dynamics, business models, and regulatory challenges. By examining internal and external sources of innovation such as academic collaborations, government support, and strategic partnerships, it highlights how nanotech ventures overcome technical and market barriers to scale their technologies. Case studies of successful startups illustrate practical strategies and lessons, while emerging trends like artificial intelligence integration and sustainable nanotechnologies offer insights into future opportunities. Understanding these pathways is essential for entrepreneurs, investors, and policymakers aiming to foster a thriving nanotech innovation ecosystem.

DOI: 10.61137/ijsret.vol.5.issue6.582

Nanoelectronics and the Semiconductor Industry with Impacts
Authors:-Professor Zulkarnain

Abstract:- Nanoelectronics, the study and application of electronic components at the nanometer scale, is revolutionizing the semiconductor industry by pushing the boundaries of device miniaturization and performance. This paper reviews the fundamental principles of nanoelectronics, the semiconductor materials utilized, and advanced fabrication techniques critical for device creation at the nanoscale. Key nanoelectronic devices, including FinFETs, quantum dots, and molecular electronics, are examined alongside their applications in modern electronics. The paper discusses the profound impact of nanoelectronics on semiconductor manufacturing, highlighting the challenges of scaling, cost, and material integration. Emerging trends such as 2D materials, quantum computing, and flexible electronics are explored as drivers of future innovation. Despite significant obstacles, nanoelectronics offers promising pathways to sustain Moore’s Law and enable new computing paradigms, making it pivotal for the future of the semiconductor industry.

DOI: 10.61137/ijsret.vol.5.issue6.583

Energy Sector Applications: Nanomaterials in Batteries and Solar Cells
Authors:-Dr. Zainal Shareif

Abstract:- The growing global demand for energy, coupled with the urgent need to transition to sustainable sources, has intensified interest in advanced technologies that can enhance energy generation and storage. Nanomaterials, with their unique physicochemical properties at the nanoscale, are playing a transformative role in improving the performance of batteries and solar cells. This paper examines the fundamental mechanisms by which nanomaterials enhance electrical conductivity, charge storage, and energy conversion efficiency. It explores their applications in lithium-ion and next-generation batteries, as well as in various photovoltaic technologies including silicon-based, thin-film, organic, and perovskite solar cells. The paper also discusses environmental and economic considerations, highlighting the need for sustainable synthesis and lifecycle assessments. Looking ahead, it evaluates emerging trends such as AI-driven material discovery and multifunctional nanostructures that promise to shape the future of the energy sector. Through a multidisciplinary lens, this work underscores the critical role of nanotechnology in enabling high-performance, scalable, and environmentally responsible energy solutions.

DOI: 10.61137/ijsret.vol.5.issue6.584

Sustainable Nanotechnology: Green Manufacturing and Circular Models
Authors:-Dr. Ismail Shiek Hussain

Abstract:- Sustainable nanotechnology integrates green manufacturing practices and circular economy principles to address the environmental and health challenges posed by traditional nanomaterial production. By employing eco-friendly synthesis methods, energy-efficient fabrication, and designing nanomaterials for recyclability and safe degradation, sustainable nanotechnology aims to minimize hazardous waste and resource depletion while enhancing product performance. Life cycle assessments and toxicity evaluations are critical in guiding safer and more responsible nanotech development. Despite technical and scalability challenges, advances in digital tools and supportive regulatory frameworks offer promising pathways for industry adoption. This paper explores the fundamentals, techniques, and models that define sustainable nanotechnology, emphasizing the need for multidisciplinary collaboration and policy innovation to realize a greener, circular future in nanomaterial science and manufacturing.

DOI: 10.61137/ijsret.vol.5.issue6.585

Artificial Intelligence and Nanotechnology Convergence
Authors:-Dr. Lim Wei

Abstract:- The convergence of Artificial Intelligence (AI) and nanotechnology is an emerging interdisciplinary frontier that holds immense potential to revolutionize diverse fields including healthcare, electronics, energy, and environmental science. By integrating AI’s data-driven intelligence with the precision and novel properties of nanoscale materials and devices, this synergy enables accelerated design, optimized manufacturing, and enhanced performance of nanosystems. AI facilitates the modeling and control of complex nanoscale phenomena, while nanotechnology provides innovative hardware platforms that enhance AI’s computational efficiency and capabilities. This paper explores the fundamental principles underlying both fields, outlines key paradigms of their convergence, and reviews significant applications ranging from AI-powered nanorobotics in medicine to nanotech-enabled neuromorphic computing. Furthermore, it addresses critical challenges such as data complexity, fabrication limitations, ethical concerns, and regulatory issues. Finally, the paper discusses future directions, emphasizing the importance of interdisciplinary collaboration and responsible innovation to harness the full potential of AI and nanotechnology convergence for societal benefit.

DOI: 10.61137/ijsret.vol.5.issue6.586

Innovative Business Strategies for Nanotechnology Companies
Authors:-Devendrappa Patil

Abstract:- Nanotechnology represents a frontier of scientific innovation with vast potential to transform industries ranging from healthcare and electronics to energy and materials science. However, nanotechnology companies face unique business challenges, including high research and development (R&D) costs, complex regulatory environments, slow market adoption, and difficulties scaling production. This paper explores innovative business strategies that enable nanotechnology enterprises to overcome these challenges and achieve sustainable growth. Key strategies examined include robust investment in R&D to drive continuous innovation, effective management of intellectual property to secure competitive advantage, and the cultivation of strategic partnerships across academia, industry, and government to accelerate commercialization. Additionally, the paper discusses customer-centric approaches that align product development with market needs, emphasizing flexibility and responsiveness in business models. Emerging trends such as open innovation ecosystems and platform-based service models are also evaluated for their potential to lower entry barriers and foster collaborative development. Sustainability considerations and circular economy principles are highlighted as increasingly important factors in business strategy, given environmental concerns associated with nanomaterial production and lifecycle management. Through case studies of successful nanotechnology firms and market analysis, the paper illustrates how these strategies have been implemented in practice, resulting in competitive positioning and enhanced market reach. The paper concludes by offering strategic recommendations for nanotech companies to navigate future technological and market shifts, emphasizing agility, collaboration, and responsible innovation. This study provides valuable insights for entrepreneurs, investors, policymakers, and researchers aiming to harness the full commercial potential of nanotechnology.

DOI: 10.61137/ijsret.vol.5.issue6.587

Fundamentals of Nanomaterials and Their Industrial Relevance
Authors:-Devendrappa Patil

Abstract:- Nanomaterials, defined as materials with structural components smaller than 100 nanometers, possess unique mechanical, electrical, thermal, and optical properties that significantly differ from their bulk counterparts. These properties arise from high surface area-to-volume ratios and quantum-scale effects, which enable novel functionalities not achievable in traditional materials. The fundamental understanding of nanomaterials includes their classification—such as nanoparticles, nanowires, nanotubes, and nanosheets—and their synthesis through methods like top-down lithography and bottom-up chemical assembly. Characterization techniques including electron microscopy, spectroscopy, and atomic force microscopy are essential for determining nanoscale morphology, composition, and performance. As nanotechnology continues to evolve, the industrial relevance of nanomaterials is expanding rapidly. Sectors such as electronics, energy, healthcare, automotive, and construction increasingly rely on nanomaterials to deliver lighter, stronger, more durable, and energy-efficient products. From carbon nanotubes in structural composites to quantum dots in display technologies and silver nanoparticles in antimicrobial coatings, the applications are vast and transformative. However, challenges remain in terms of scalability, safety, environmental impact, and regulatory compliance, which must be addressed to fully integrate nanomaterials into mainstream industrial ecosystems. This paper provides a comprehensive overview of the fundamental aspects of nanomaterials and evaluates their growing importance in industrial innovation and sustainable development.

DOI: 10.61137/ijsret.vol.5.issue6.588

Neuromorphic Engineering and Nanoscale Computing
Authors:-Sudhir Sharma

Abstract:- Neuromorphic engineering and nanoscale computing are two rapidly evolving fields that together promise a revolutionary shift in computational paradigms. Neuromorphic systems aim to mimic the structure and functionality of biological neural networks, offering highly efficient, adaptive, and parallel processing capabilities. Simultaneously, nanoscale computing explores the use of materials and devices at nanometer dimensions to overcome limitations in traditional semiconductor technologies and achieve ultra-compact, low-power hardware solutions. When integrated, nanoscale devices—such as memristors, nanowires, carbon nanotubes, and quantum dots—can serve as artificial neurons and synapses, enabling the development of neuromorphic hardware that combines high performance with energy efficiency.

DOI: 10.61137/ijsret.vol.5.issue6.589

Blockchain Applications in Nanotechnology Supply Chains
Authors:-Dr. Nusrat Jahan

Abstract:- Nanotechnology supply chains are complex, global networks requiring stringent oversight to ensure quality, safety, and regulatory compliance. Traditional supply chain management systems often lack the transparency and traceability needed to track the provenance and handling of sensitive nanomaterials, which can hinder trust and efficiency among stakeholders. Blockchain technology offers a decentralized, immutable ledger that enhances transparency, security, and automation through smart contracts, making it a promising solution to these challenges. This paper explores the integration of blockchain within nanotechnology supply chains, detailing its potential to improve provenance verification, prevent counterfeiting, streamline regulatory compliance, and protect intellectual property. It also examines the benefits, including increased operational efficiency, enhanced collaboration, and support for sustainability initiatives. The discussion addresses current limitations such as scalability, interoperability, data privacy, and regulatory uncertainties, highlighting the need for ongoing technological innovation and multi-stakeholder cooperation. Case studies of early blockchain adoption in nanotech and related industries illustrate practical insights and lessons learned. Finally, the paper identifies future research opportunities and technological trends, such as the convergence of blockchain with IoT and AI, which promise to further transform nanotechnology supply chains. By fostering a secure, transparent, and efficient supply chain ecosystem, blockchain can play a vital role in enabling the responsible development and commercialization of nanotechnology products on a global scale.

DOI: 10.61137/ijsret.vol.5.issue6.590

IoT and Nano Sensors in Smart Infrastructure
Authors:-Professor Yelena Smirnova

Abstract:- The integration of Internet of Things (IoT) technology with nanosensors is revolutionizing the development and management of smart infrastructure systems worldwide. This paper explores the synergistic potential of IoT and nanosensors in enhancing infrastructure monitoring, control, and sustainability across sectors such as transportation, energy, water management, and urban planning. Nanosensors, with their nanoscale dimensions and high sensitivity, enable real-time detection of physical, chemical, and biological parameters at unprecedented resolution, while IoT platforms facilitate seamless connectivity, data collection, and intelligent analytics. Together, these technologies enable predictive maintenance, efficient resource management, environmental monitoring, and improved safety, contributing to resilient and sustainable infrastructure. The paper discusses the underlying technologies, current applications, data processing frameworks, and key technical challenges including sensor durability, power supply, scalability, and cybersecurity. It also examines economic and environmental impacts, highlighting the long-term cost savings, energy efficiency, and pollution reduction benefits enabled by these innovations. Finally, future trends such as advancements in nanomaterials, 5G/6G communications, AI integration, and regulatory frameworks are analyzed to provide a roadmap for the evolving smart infrastructure landscape. By addressing both technological and societal aspects, this work underscores the transformative role of IoT and nanosensors in building smarter, safer, and more sustainable urban and industrial environments.

DOI: 10.61137/ijsret.vol.5.issue6.591

Harnessing AI Dashboards In Oracle Cloud HCM: Advancing Predictive Workforce Intelligence And Managerial Agility

Authors: Kranthi Kumar Routhu

Abstract: The emergence of intelligent chatbots has fundamentally reshaped how employees interact with enterprise systems, especially within the domain of human capital management (HCM). Unlike traditional portals and static forms, conversational interfaces offer a more natural, intuitive, and immediate way for employees to access services and information. Organizations increasingly leverage these digital assistants to simplify complex HR transactions, provide continuous 24/7 self-service capabilities, and enhance overall employee engagement. Oracle Digital Assistant (ODA), when seamlessly integrated with Oracle HCM Cloud, enables a secure, scalable, and intelligent foundation for modern service delivery. Through advanced natural language understanding, prebuilt HCM skills, and REST API–based integrations, organizations can automate high-volume, routine tasks such as leave requests, payslip retrieval, and benefits inquiries by reducing response time while improving accuracy. This article outlines the underlying architecture, deployment strategies, and measurable business impacts of conversational AI, demonstrating how chatbot-driven service models modernize and elevate the employee experience.

DOI: http://doi.org/10.5281/zenodo.17670667

Deep Learning -Based Suicidal Thought Detecion From Social Media With IOT-Enabled Alert System

Authors: Kranthi Kumar Routhu

Abstract: The emergence of intelligent chatbots has fundamentally reshaped how employees interact with enterprise systems, especially within the domain of human capital management (HCM). Unlike traditional portals and static forms, conversational interfaces offer a more natural, intuitive, and immediate way for employees to access services and information. Organizations increasingly leverage these digital assistants to simplify complex HR transactions, provide continuous 24/7 self-service capabilities, and enhance overall employee engagement. Oracle Digital Assistant (ODA), when seamlessly integrated with Oracle HCM Cloud, enables a secure, scalable, and intelligent foundation for modern service delivery. Through advanced natural language understanding, prebuilt HCM skills, and REST API–based integrations, organizations can automate high-volume, routine tasks such as leave requests, payslip retrieval, and benefits inquiries by reducing response time while improving accuracy. This article outlines the underlying architecture, deployment strategies, and measurable business impacts of conversational AI, demonstrating how chatbot-driven service models modernize and elevate the employee experience.

DOI: http://doi.org/10.5281/zenodo.17670667

Conversational AI in Human Capital Management: Transforming Self-Service Experiences with Oracle Digital Assistant

Authors: Kranthi Kumar Routhu

Abstract: The emergence of intelligent chatbots has fundamentally reshaped how employees interact with enterprise systems, especially within the domain of human capital management (HCM). Unlike traditional portals and static forms, conversational interfaces offer a more natural, intuitive, and immediate way for employees to access services and information. Organizations increasingly leverage these digital assistants to simplify complex HR transactions, provide continuous 24/7 self-service capabilities, and enhance overall employee engagement. Oracle Digital Assistant (ODA), when seamlessly integrated with Oracle HCM Cloud, enables a secure, scalable, and intelligent foundation for modern service delivery. Through advanced natural language understanding, prebuilt HCM skills, and REST API–based integrations, organizations can automate high-volume, routine tasks such as leave requests, payslip retrieval, and benefits inquiries by reducing response time while improving accuracy. This article outlines the underlying architecture, deployment strategies, and measurable business impacts of conversational AI, demonstrating how chatbot-driven service models modernize and elevate the employee experience.

DOI: http://doi.org/10.5281/zenodo.17678011

The Impact Of Deep Learning On Enhancing Phishing Detection Mechanisms

Authors: Rohan C. Shrestha

Abstract: Phishing attacks have become a critical cybersecurity threat in the digital era, targeting individuals, businesses, and organizations to obtain sensitive information such as login credentials, financial data, and personal identification details. The sophistication of modern phishing attacks has evolved beyond simple spam emails, encompassing spear phishing, clone phishing, smishing, and vishing, making detection increasingly difficult. Traditional detection mechanisms, including rule-based systems, blacklists, and heuristic approaches, often fail to detect new or obfuscated attacks and are prone to high false-positive rates, which can compromise security operations. Deep learning (DL), a subset of artificial intelligence, offers promising solutions to these challenges through its ability to automatically extract complex features, learn non-linear relationships, and detect patterns that are imperceptible to human analysts or conventional machine learning algorithms. This review examines the application of deep learning in enhancing phishing detection mechanisms, focusing on architectures such as Artificial Neural Networks (ANNs), Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Long Short-Term Memory (LSTM) networks, and autoencoders. The discussion highlights how these models improve detection accuracy, adaptability, and resilience against evolving phishing strategies. Furthermore, the review explores the utilization of diverse datasets, challenges in computational requirements and adversarial robustness, and the role of hybrid and ensemble models in optimizing performance. Finally, future directions, including explainable AI, multi-modal detection systems, and adaptive reinforcement learning frameworks, are addressed. Overall, deep learning provides a transformative approach to phishing detection, offering enhanced efficiency, robustness, and proactive threat mitigation, while opening avenues for continued research into intelligent, adaptive cybersecurity solutions.

DOI: http://doi.org/10.5281/zenodo.17879281

The Influence Of Generative AI On Adaptive Malware Defense Systems

Authors: Sandhya R. Bista

Abstract: Generative Artificial Intelligence (AI) has rapidly become a transformative yet paradoxical force in the domain of cybersecurity. Its dual-edged nature capable of both fortifying defenses and amplifying cyber threats has redefined the way organizations approach malware detection, prevention, and response. Traditional cybersecurity models, which rely heavily on signature-based detection and heuristic methods, are increasingly inadequate against polymorphic, evasive, and zero-day malware variants. These conventional systems lack the adaptive capacity to counter attackers who continuously modify malicious code to escape static defense algorithms. In contrast, generative AI introduces a new paradigm in which defense systems evolve dynamically, learning from both real and simulated threats to anticipate and neutralize future attacks before they occur. Generative AI models such as Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and transformer-based architectures have been instrumental in driving this evolution. GANs, for instance, can simulate sophisticated attack patterns, enabling security systems to train against artificially generated malware samples that replicate real-world adversarial behavior. Similarly, transformer-based models enhance contextual awareness and anomaly detection by processing vast streams of network, behavioral, and endpoint data in real time. This fusion of generative modeling and adaptive learning fosters proactive defense strategies capable of identifying subtle deviations indicative of malicious intent long before damage is inflicted.

DOI: http://doi.org/10.5281/zenodo.17879335

The Impact Of Cloud-native Observability Platforms On Service Performance Visibility

Authors: Keshav M. Rana

Abstract: Cloud-native observability platforms have revolutionized how organizations understand, measure, and improve service performance in distributed computing environments. Unlike traditional monitoring tools that focus on static metrics, observability provides a holistic, data-driven view of system behavior through the collection and correlation of metrics, logs, and traces. In dynamic environments powered by containers, microservices, and Kubernetes orchestration, such platforms enable real-time insights into performance bottlenecks, latency variations, and service dependencies. This comprehensive visibility helps teams identify root causes, optimize system efficiency, and enhance user experience. However, observability in cloud-native systems also introduces challenges, including data volume management, complex instrumentation, and high computational costs. Modern observability platforms address these issues through automation, AI-driven analytics, and scalable data architectures capable of handling multidimensional telemetry. This review explores the evolution, architecture, and influence of observability platforms on service performance visibility, highlighting their role in proactive fault detection, system resilience, and decision-making efficiency. It also examines the challenges and future directions shaping the next generation of observability frameworks that promise self-optimizing and predictive performance management in cloud-native ecosystems.

DOI: http://doi.org/10.5281/zenodo.17879382

Designing End-to-End Observability Architectures For High-Reliability .NET Cloud Applications In Production Environments

Authors: Hema Latha Boddupally

Abstract: The increasing operational complexity of cloud-hosted .NET applications has elevated the need for observability architectures that extend beyond basic monitoring and support sustained reliability in production environments. As systems evolve toward distributed service models, traditional approaches centered on isolated logs or infrastructure metrics often fail to provide sufficient insight into runtime behavior, failure propagation, and performance degradation. This work examines the architectural design of end-to-end observability for high-reliability .NET cloud applications, focusing on how structured telemetry, correlation mechanisms, and operational feedback loops can be systematically integrated into production systems. The study adopts an architectural and design-oriented methodology, combining decomposition of observability layers with scenario-driven analysis of real-world operational conditions. It analyzes how logs, metrics, and distributed traces can be aligned with application boundaries, dependency interactions, and reliability objectives to support faster diagnosis, reduced mean time to recovery, and improved operational confidence. The findings indicate that observability treated as a first-class architectural concern enables clearer visibility into execution paths, more effective alerting strategies, and stronger alignment between development and operations practices. By articulating a reference architecture, instrumentation patterns, and operational workflows suitable for enterprise .NET environments, the work contributes a structured framework for building production-grade observability capabilities. The implications extend to teams responsible for maintaining mission-critical cloud services, offering practical guidance for designing systems that remain transparent, diagnosable, and dependable under continuous change and operational pressure.

DOI: http://doi.org/10.5281/zenodo.18042689

Security Vulnerability Management In Multi-Vendor Network Environments

Authors: Narendra Reddy Burramukku

Abstract: The increasing adoption of multi-vendor network architectures in enterprise, data center, cloud, and hybrid environments has significantly enhanced flexibility, cost efficiency, and technological innovation. However, the heterogeneity of hardware, software, firmware, and management interfaces across vendors introduces substantial challenges in maintaining a consistent and resilient security posture. Security vulnerability management in such environments is particularly complex due to interoperability limitations, asynchronous patch cycles, fragmented monitoring systems, and inconsistent policy enforcement. This paper presents a comprehensive review of security vulnerability management strategies in multi-vendor network environments, focusing on vulnerability identification, classification, prioritization, and remediation. It examines traditional and modern vulnerability assessment techniques, including automated scanning, penetration testing, threat modeling, and standardized vulnerability databases. The study further analyzes vulnerability management frameworks encompassing patch management, policy-based security, integration with SIEM and threat intelligence platforms, and automation through orchestration. Key challenges related to scalability, real-time monitoring, compliance, and governance are critically discussed. Performance and effectiveness metrics such as remediation time, detection accuracy, operational efficiency, and risk reduction are evaluated to assess practical deployment feasibility. Emerging approaches, including AI- and ML-driven vulnerability management, zero-trust architectures, micro-segmentation, blockchain-based security mechanisms, and cloud-native platforms, are explored as potential solutions to existing limitations. By synthesizing current research, identifying literature gaps, and outlining future research directions, this review provides a structured reference for researchers, network architects, and security practitioners seeking to enhance vulnerability management in complex, heterogeneous network infrastructures.

DOI: https://doi.org/10.5281/zenodo.18383985

 

Policy-Driven Automation for Scalable Governance in Enterprise Big Data Platforms

Authors: Madhava Rao Thota

Abstract: As enterprise data platforms continue to expand in scale, diversity, and operational criticality, the combination of high data velocity, exponential data growth, and increasingly stringent regulatory requirements renders manual governance and ad hoc operational controls both inefficient and error-prone. In response to these pressures, policy-driven automation has emerged as a foundational paradigm for managing end-to-end data lifecycles, fine-grained access control, regulatory compliance, and repeatable operational workflows across heterogeneous, distributed environments. This article synthesizes prior academic research and industry practices published between 2000 and 2018 to examine how declarative, machine-interpretable policies can be systematically translated into automated enforcement actions within modern enterprise data platforms. Drawing on established policy frameworks, rule-oriented and distributed data management systems, and workflow orchestration engines, we present an integrated architectural perspective that spans policy definition, policy decision evaluation, and policy execution. The discussion is grounded in practical, widely adopted database and Big Data technologies including MongoDB, Apache Cassandra, and DataStax Enterprise illustrating how policy-driven automation enables scalable governance, operational resilience, and auditable compliance while preserving the flexibility and performance required by contemporary enterprise data ecosystems.

DOI: https://doi.org/10.5281/zenodo.18478880

 

Navigating Linguistic Diversity In Global Markets: The Role Of Business Communication In Reducing Transaction Costs In Multinational Corporations

Authors: Dipikaben Solanki

Abstract: The concept of globalization has greatly widened the trade internationally and made more contacts between the firms that work in different linguistic and cultural backgrounds. Multinational companies often deal with partners, employees as well as stakeholders with varying language backgrounds as a result of which communication has become difficult in global businesses. The communication barriers have frequently been the cause of misunderstanding in a negotiation, postponement of decision making and lack of efficiency in organizational coordination. These issues have raised transaction costs and made international trade not very efficient. Hence, the study of the contribution of business communication in the management of linguistic diversity has gained more significance to multinational corporations. This paper has attempted to discuss the role of communication barriers in transaction costs in multinational companies and explore the role of well-organized communications strategies in enhancing coordination in the international markets. The study has taken the qualitative research method, based on secondary data gathered through scholarly research and international business literature concerning communication management and international trade. The results have revealed that linguistic diversity plays a key role in determining the effectiveness of communication in multinational organizations. Those firms who incorporate formal communication networks, uniform organizational language policy and cross cultural communications training have shown better coordination and less operational inefficiency. The research has thus indicated the need to have strategic communication management in improving efficiency and competitiveness in global trade.

DOI: https://doi.org/10.5281/zenodo.19250380

Published by:

Policy-Driven Automation for Scalable Governance in Enterprise Big Data Platforms

Uncategorized

Authors: Madhava Rao Thota

Abstract: As enterprise data platforms continue to expand in scale, diversity, and operational criticality, the combination of high data velocity, exponential data growth, and increasingly stringent regulatory requirements renders manual governance and ad hoc operational controls both inefficient and error-prone. In response to these pressures, policy-driven automation has emerged as a foundational paradigm for managing end-to-end data lifecycles, fine-grained access control, regulatory compliance, and repeatable operational workflows across heterogeneous, distributed environments. This article synthesizes prior academic research and industry practices published between 2000 and 2018 to examine how declarative, machine-interpretable policies can be systematically translated into automated enforcement actions within modern enterprise data platforms. Drawing on established policy frameworks, rule-oriented and distributed data management systems, and workflow orchestration engines, we present an integrated architectural perspective that spans policy definition, policy decision evaluation, and policy execution. The discussion is grounded in practical, widely adopted database and Big Data technologies including MongoDB, Apache Cassandra, and DataStax Enterprise illustrating how policy-driven automation enables scalable governance, operational resilience, and auditable compliance while preserving the flexibility and performance required by contemporary enterprise data ecosystems.

DOI: https://doi.org/10.5281/zenodo.18478880

 

Published by:

Designing End-to-End Observability Architectures For High-Reliability .NET Cloud Applications In Production Environments

Uncategorized

Authors: Hema Latha Boddupally

Abstract: The increasing operational complexity of cloud-hosted .NET applications has elevated the need for observability architectures that extend beyond basic monitoring and support sustained reliability in production environments. As systems evolve toward distributed service models, traditional approaches centered on isolated logs or infrastructure metrics often fail to provide sufficient insight into runtime behavior, failure propagation, and performance degradation. This work examines the architectural design of end-to-end observability for high-reliability .NET cloud applications, focusing on how structured telemetry, correlation mechanisms, and operational feedback loops can be systematically integrated into production systems. The study adopts an architectural and design-oriented methodology, combining decomposition of observability layers with scenario-driven analysis of real-world operational conditions. It analyzes how logs, metrics, and distributed traces can be aligned with application boundaries, dependency interactions, and reliability objectives to support faster diagnosis, reduced mean time to recovery, and improved operational confidence. The findings indicate that observability treated as a first-class architectural concern enables clearer visibility into execution paths, more effective alerting strategies, and stronger alignment between development and operations practices. By articulating a reference architecture, instrumentation patterns, and operational workflows suitable for enterprise .NET environments, the work contributes a structured framework for building production-grade observability capabilities. The implications extend to teams responsible for maintaining mission-critical cloud services, offering practical guidance for designing systems that remain transparent, diagnosable, and dependable under continuous change and operational pressure.

DOI: http://doi.org/10.5281/zenodo.18042689

Published by:

MICROFINANCE: A SCIENTIFIC REVIEW OF SCOPE, PRACTICES, AND IMPACTS

Uncategorized

Authors: Anjanappa. T

Abstract: Microfinance has emerged as a powerful tool to combat poverty, stimulate economic development, and enhance financial inclusion across the globe. Originating as an innovative mechanism to extend small loans to the marginalized poor, particularly women, microfinance institutions (MFIs) have grown to encompass a wide array of financial services including savings, insurance, and capacity building programs. This paper examines the theoretical foundations and practical applications of microfinance, highlighting its importance, merits, and demerits. The discussion explores how microfinance empowers low income households, creates opportunities for entrepreneurship, and reduces dependency on informal moneylenders. Nevertheless, challenges such as high interest rates, over-indebtedness, and sustainability issues remain pressing concerns. Recent developments, including digital microfinance platforms, mobile banking integration, and micro-insurance schemes, demonstrate the sector’s adaptation to evolving socioeconomic realities. Applications are examined within rural and urban settings, emphasizing their transformative role in poverty alleviation, women’s empowerment, and inclusive development. Limitations such as operational inefficiencies, regulatory bottlenecks, and the mixed evidence of long term poverty reduction are critically analyzed. Through a synthesis of related literature and case based evidence, this study contributes to the broader understanding of microfinance as both an opportunity and a challenge in global development.

Published by:

Corporate Social Responsibility: A Contemporary Perspective

Uncategorized

Authors: Anjanappa. T

Abstract: Corporate Social Responsibility (CSR) has emerged as one of the most influential paradigms shaping the relationship between businesses and society. Once regarded as a voluntary philanthropic practice, CSR today is increasingly recognized as a strategic tool that integrates ethical responsibility, sustainability, and long-term value creation into business operations. This paper explores the conceptual foundations of CSR, its growing importance in the global economy, and the associated merits and demerits. Special emphasis is given to recent developments, including the integration of CSR with Environmental, Social, and Governance (ESG) standards, legal mandates such as India’s Companies Act (2013), and the shift towards stakeholder centric models of corporate accountability. The paper also discusses the challenges of CSR implementation, critiques such as green washing, and the evolving expectations from corporations in the post-pandemic world. Drawing on theoretical frameworks and case studies, the article argues that CSR is no longer peripheral but central to corporate sustainability and competitiveness. The findings highlight that companies engaging meaningfully in CSR are better positioned to build trust, enhance brand equity, and contribute to achieving Sustainable Development Goals (SDGs).

Published by:

IJSRET Volume 5 Issue 5, Sep-Oct-2019

Uncategorized

Suitability and Performance of Bubble Deck Slab: A
Review

Authors:- Victor Osaze Francis

Abstract:- Slabs are of extreme importance in any structural construction, as they are primary members. However, about 80% of the concrete in the middle of conventional solid slab are of little structural importance. Bubble deck slab (also known as voided slab) is a phenomenon that removes the structurally-inefficient concrete in the middle of slab by replacing it with high-density spherical plastic balls. This solution will solve the problems of high cost, shorter span, longer construction duration, and environmental pollution associated with the use of traditional slab. This review study investigates how bubble deck slab compares with traditional solid slab in everyday use, under loading condition, and consequently making informed recommendations to minimize the inadequacies of the bubble deck slab system.

A Secure Iot Communication against Reactive Jamming Attack in CRN Subtitle
Authors:- Nitesh Yadav, Dr. Abhishek Bhatt

Abstract:- The number of nodes or IoT devices is sense and control the communication. The primary users are more trustworthy than the secondary users, since these are authorized or licensed users. The purpose of CRN is to intellect the spectrum band and identify the free channels which will be used for un-authorized access user or attacker that flooded the unwanted packets to next node or destination node in network. CRN get better the efficiency of spectrum handling, but it also performance degrades due to new security threats with jamming attacks during the spectrum sensing process, which can corrupt the effectiveness of spectrum sensing. In this research we proposed security scheme against packet flooding Jamming attack. The performance is vitiated in high, medium and low jamming probability and applies the proposed scheme to reduces the flooding. The hop count value based on forward and reverse mechanism of detection and provides secure communication in IoT CRN . The reliability of link is equivalent from the forward and reverse path consistency i.e. more in proposed security scheme as compare to with Batch based SA-MAC scheme. The proper packet forwarding in particular link and the reverse and forward is counted properly but correctly, current node are in suspicious. The record value of hop count is based on the packets receiving but heavy flooding is also disturb it at starting connection establishment procedure.

A Review on Efficient Approach for Scheduling Tasks in Cloud Computing Environments
Authors:- Anjali Kumari, Manoj Lipton

Abstract:- Nowadays, Cloud computing is widely used in companies and enterprises. However, there are some challenges in using Cloud computing. The main challenge is resource management, where Cloud computing provides IT resources (e.g., CPU, Memory, Network, Storage, etc.) Based on virtualization concept and pay-as-you-go principle. The aim of this proposed algorithm is to minimize the completion time and cost of tasks, and maximize resource utilization. The performance of this proposed algorithm has been evaluated using Clouds toolkit. It schedules the entire task within a particular deadline while increasing the system performance. The cloud-sim simulator is used for evaluating the task scheduling like file uploading. In this module we have to initialize the performance of this proposed algorithm has been evaluated using Cloud Sim toolkit. It schedules the entire task within a particular deadline while increasing the system performance. Here we propose a VM Placement aims to distribute the dynamic workload smoothly to all the hosts in the cloud to gain an improvement in both the utilization of Resources and the speed of execution time. It allocates the incoming tasks to all available VMs. In order to achieve balancing and avoid congestion.

A Review on Parametric Study and Optimization of H-Type Finned Tube Heat Exchangers using Taguchi Method
Authors:- M.Tech. Scholar Ankit Raj, Asst. Prof. Brijendra Kumar Yadav

Abstract:- In order to improve the heat exchange efficiency and extend surface heat transfer, H-type finned tubes have been widely used in boilers and waste heat recovery in recent years. H-type finned tubes are derived largely from rectangle finned tubes. Because of their unique groove structure on the fin surface, H-type finned tubes have excellent anti-wear and anti-fouling performance.

Parametric Study and Optimization of H-Type Finned Tube Heat Exchangers using Taguchi Method
Authors:- M.Tech. Scholar Ankit Raj, Asst. Prof. Brijendra Kumar Yadav

Abstract:- Fin and- tube heat exchangers are the typical equipment with extended surface and widely used in many engineering applications, such as air conditioning units, compressor intercoolers, boiler economizers, etc. Heat exchangers are widely used in various industries, such as space heating, refrigeration, air conditioning, power stations, chemical plants, petrochemical plants, petroleum refineries and waste heat recovery process. A heat exchanger is a device used to transfer heat between one or more fluids, which may be separated by a wall to prevent mixing or may be in direct contact. In this study, a parametric study is performed to investigate the effects of geometric parameters on the heat transfer characteristic and the flow friction characteristic of H-type finned tube heat exchangers. The effectiveness of various parameters on the objectives is evaluated and the geometric structure of the H-type finned tube is optimized for the best performance using Taguchi method. The results show that fin height, transversal tube spacing and longitudinal tube spacing is statistically significant to the flow performance characteristics of the H-type finned tube. Hence, these three parameters must be firstly considered and paid more attention during the design and optimization of H-type finned tube heat exchangers. Analysis of variance also further validates that intuitive analysis is correct.

Review Thermal Performance Enhancement of Double Pipe Heat Exchanger With Wavy
Authors:- Research Scholar Kundan Kumar, Asst. Professor Sujeet Kumar Singh

Abstract:- In present study, wavy-tape inserts are introduced to help establish swirl flow inside a straight pipe. Three-dimensional models will be created to simulate the flow and heat transfer characteristics inside the pipe with wavy-tape inserts. CFD simulation will be carried out to investigate the effects of different tape angles on the thermal-hydraulic performance of pipe. The effect of wavy strip tabulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied.

Thermal Performance Enhancement of Double Pipe Heat Exchanger with Wavy Tape
Authors:- Research Scholar Kundan Kumar, Asst. Professor Sujeet Kumar Singh

Abstract:- CFD simulation will be carried out to investigate the effects of different tape angles on the thermal-hydraulic performance of pipe. The effect of wavy strip tarbulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied. The configuration, gain in heat transfer augmentation, cost in pressure loss, generated swirl flow character, heat transfer enhancement mechanism, optimal geometric parameters and overall thermal hydraulic performance of wavy-tape are successively expounded in this work. It was seen that the results obtained from the simulation for the plain tube are in a good agreement with those predicted by the standard correlations. It is noted that, in this case the discrepancy between the results is less than 9% for Nusse. lt number and 11% for the friction factor. The wavy-tape induces significant swirl flow inside the pipe. Particularly, pairs of tangential vortices are generated on the flanks of the tape. These vortices break the thermal boundary layer and intensify the fluid advection, which consequently lead to highly localized heat transfer enhancement on the pipe surface.

A Review on Optimization of Heat Transfer in Six-Start Spirally Corrugated Tubes using Taguchi Method
Authors:- M.Tech. Scholar Sanjoo Sahani, Professor Poonam Kumar Agade

Abstract:- Heat transfer devices have been used for conversion and recovery of heat in many industrial and domestic applications. Over five decades, there has been concerted effort to develop design of heat exchanger that can result in reduction in energy requirement as well as material and other cost saving. Heat transfer enhancement techniques generally reduce the thermal resistance either by increasing the effective heat transfer surface area or by generating turbulence. Sometimes these changes are accompanied by an increase in the required pumping power which results in higher cost. The effectiveness of a heat transfer enhancement technique is evaluated by the Thermal Performance Factor which is a ratio of the change in the heat transfer rate to change in friction factor.

Optimization of Heat Transfer in Six-Start Spirally Corrugated Tubes using Taguchi Method
Authors:- M.Tech. Scholar Sanjoo Sahani, Professor Poonam Kumar Agade

Abstract:- In this study, a parametric study is performed to investigate the effects of geometric parameters on the heat transfer characteristic, the flow friction characteristic and overall thermal-hydraulic performance of corrugated tube heat exchangers. The effectiveness of various parameters on the objectives is evaluated and the geometric structure of the corrugated tube is optimized for the best overall thermal-hydraulic performance using Taguchi method. The geometric parameters considered in the model include corrugation height and corrugation pitch. The results show that corrugation height have dominant influence on heat transfer characteristic with contribution ratios of 74.79% respectively while corrugation pitch has minor effects.

Development of Fluid Transfer System (FTS)
Authors:- Abutu Joseph, Oluleye, Atinuke Modupe, Oladosu, Lekan Temidayo, Emmanuel, Abakpa James, Lawal, Albert Sunday

Abstract:- In this study, a fluid transfer system was developed using standard design procedure outlined in literatures. The effect of viscosity on the flow rate of a fluid (water) from different sources was also investigated. The development of the system involved design calculations, fabrication of metal base as well as tank guides. Similarly, plumbing of the system was done using polyvinyl chloride (PVC) pipes, gates valves, other pipe fittings and a centrifugal pump. The Reynolds number and the fluid pressure drop was also determined to investigate the nature of fluid flow through the system and the pressure drop in the motion of the transferred fluid respectively. The results showed that the flow through the system is turbulent since the Reynolds number (Re) 4000 (Re = 9160) while fluid pressure drop results indicate that there was more drop in fluid pressure at the longer lengths of pipe compared to the shorter ones. Testing of the system was also conducted sing three sources of water (rain, tap and stream) and the experimental result revealed that rain water has a higher volume flow rate compared to other sources of water with stream water having the least rate of flow.

Human Engineering in Tractor Design- A Review
Authors:- Lecturer, Anil Kumar

Abstract:- In India agriculture is one of the important sectors which provide local employment and have significant contribution in our GDP. The large population in our country needs various types of food and other agriculture products. As the land available with the country for cultivation is limited therefore in order to increase agriculture output we should make best use our available cultivable land using farm equipment’s and implements. Tractor is one of the main reasons which helped to increase productivity of farming sector reducing dependency of our farmers on animals for tillage and irrigation activities. Tractor was one of the main components which helped in making India self-sufficient in producing food items for its large population and creating green revolution in our country. Unwanted accidents involving farm equipment and machinery especially involving tractors continue to happen. One of the reasons for these accidents is driver fatigue and non-implementation of human factors while designing tractors. There are many human factors which enhance the use of tractor in farming activities without any troubles to the driver/ Operator making it easy to use.. This paper will explain the details of those human factors which need to be taken care while designing a tractor.

K-Fold Cross-Validation Machine Learning Approach on Data Imbalance for Wireless Sensor Network
Authors:- Mandvi Tripathi, Ankur Taneja

Abstract:-Machine learning is used to teach machines how to handle the data more efficiently. Sometimes after viewing the data, we cannot interpret the pattern or extract information from the data. In that case, we apply machine learning with the abundance of datasets available. The purpose of machine learning is to learn from the data. Many studies have been done on how to make machines learn by themselves. Data imbalance problem become greatest issue in for machine learning algorithm. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important. There are different methods available for classification of imbalance data set which is divided into three main categories, the algorithmic approach, data-pre-processing approach and feature selection approach. We will apply on wireless imbalance data to identify correct information. In this research work systematic study for define which gives the right direction for research in class imbalance problem. After apply our K-fold cross validation Technique for imbalance to balance data and a random forest algorithm a classification approach for balanced data we achieved a good accuracy rate percentage.

Comparative Analysis of Multi Leaf Spring and Composite Leaf Spring using Finite Element Method Under Static Loading Condition
Authors:- M. Tech. Scholar Narendra Kumar Verma, Asst. Prof. Mukesh Hemnani, Rakesh Sharma

Abstract:- The work is carried out on the front end multi leaf spring of a commercial vehicle. In this analysis the conventional steel leaf spring is tested for static loading condition and results are compared with a virtual model of composite multi leaf spring. The material used for conventional steel leaf spring is 65Si7 (BIS) and for composite leaf spring E-Glass/ Epoxy. The CAD model of the multi leaf spring is prepared in Solid works 16 and analyzed using ANSYS 16. The FE analysis of the leaf spring has been performed by discretization of the model in infinite nodes and elements and refining them under defined boundary condition. Bending stress and deflection are the target results. A comparison of both i.e. experimental and FEA results have been done to conclude.

A Review on Thermal Performance Analysis of Simple Organic Rankine Cycle with and without Internal Heat Exchanger using EES Code
Authors:- M. Tech. Scholar Vinay Yadav, Asst. Professor Brijendra Kumar Yadav

Abstract:- Energy efficiency and conservation are gaining attention due to increasing trend of greenhouse gas emissions. Increasing energy demand urges the researchers to design energy efficient, environmental friendly and commercially viable systems. Integration of thermal systems (hybrid systems) improves the energy efficiency, fuel utilization factor and reduces the carbon emissions. Integration of renewable energy sources avail the advantage of decentralized applications. The study investigates the effects of internal heat exchanger on the thermo-economic performance of organic Rankine cycle (ORC) configurations based on fluid properties and heat sources.

Thermal Performance Analysis of Simple Organic Rankine Cycle with and without Internal Heat Exchanger using EES Code
Authors:- M. Tech. Scholar Vinay Yadav, Asst. Professor Brijendra Kumar Yadav

Abstract:- In this study, performance of a simple organic Rankine cycle (S-ORC) and organic Rankine cycle with internal heat exchanger (IHX-ORC) have been compared. Two ORC configurations are investigated as follows: S-ORC and IHX-ORC. With respect to different ORC configurations, the first law efficiency, second law efficiency and net work done will be compared under the conditions of different heat source temperatures and heat source flow rates. The effects of working fluid type, heat source temperature domains on the system, thermo-economic performance will be investigated. Furthermore, the effects of pinch point temperature difference in IHX on the IHX-ORC system are analyzed.

A Review on Spectrum Efficiency Improvement for Quasi-Constant Envelope OFDM

Authors:- M. Tech. Scholar Rishabh Shukla, Hod. Dr.Vineeta Saxena Nigam

Abstract:- Benefiting from low peak-to-average power ratio (PAPR), constant envelope OFDM (CE-OFDM) is a promising technique in coherent optical communication. However, the spectrum efficiency of CE-OFDM is only half of conventional coherent optical OFDM, which restricts its application. We proposed a novel quasi-constant envelope OFDM (Quasi-CE-OFDM) scheme with in-phase/quadrature (I/Q) modulator. Furthermore, a phase demodulation scheme based on Taylor series expansion is performed to reduce calculation complexity and avoid phase ambiguity. Simulation results show that the proposed scheme could double the spectrum efficiency effectively without losing the advantage of high nonlinearity tolerance.

Simulation Result of BER and OSNR Performance for Quasi-Constant Envelope OFDM

Authors:- M. Tech. Scholar Rishabh Shukla, Hod. Dr.Vineeta Saxena Nigam

Abstract:- Quasi-Constant Envelope OFDM transmits dual-stream simultaneously to improve the spectral efficiency of Constant Envelope OFDM. It can provide high data rate links and maintain a low PAPR to reduce the distortion caused by the nonlinear power amplifier. Thus, the quasi-constant envelope OFDM is suitable for satellite communication system. However, the carrier frequency offset (CFO) in satellite communication must be estimated and compensated before the demodulation. In this paper a CFO estimation scheme is proposed for quasi-constant envelope OFDM satellite system under additive white Gaussian noise (AWGN) channel. Since the null subcarrier at the transmitter can be considered as the prior information at the receiver, this null subcarrier can be used to estimate the CFO through phase demodulator and inverse discrete Fourier transform (IDFT) module at the receiver. Mathematical analysis reveals that the ideal estimation range of normalized CFO is nearly half of the size of IDFT under AWGN channel. Simulation results show that the proposed scheme performs well at moderate and high signal-to-noise ratio (SNR) conditions.

Grid-Connected Pv Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel , Professor Pragati Priya ,
Professor Manju Gupta

Abstract:-In the last decade solar power technologies became less costly and additional efficient, that have created it to an attractive resolution, being cleaner and additional environmentally friendly energy resource than traditional ones like fossil fuels, coal or nuclear. yet, a PV system continues to be rather more expensive than traditional ones, because of the high producing prices of PV panels, however the energy that drives them -the lightweight from the sun- is free, offered nearly everyplace and can still be present for many years, long in spite of everything non-renewable energy sources are depleted. One in every of the main benefits of PV technology is that it’s no moving components. Therefore, the hardware is very robust; it’s a long time period and low maintenance necessities. And, most significantly, it’s one resolution that gives environmentally friendly power generation. The efficiency of economic PV panels is around 15-20%. Therefore, it’s important that the power created by these panels isn’t wasted, by using inefficient power electronics systems. The efficiency and reliability of each single-phase and 3 part PV inverter systems is improved using transformer less topologies, however new issues related to escape current and safety need to be dealt with.

A Review on Grid-Connected Pv Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel , Professor Pragati Priya ,
Professor Manju Gupta

Abstract:- The need for cleaner surroundings and also the continuous increase in energy desires makes localized renewable energy production more and additional necessary. This continuously-increasing energy consumption overloads the distribution grids in addition because the power stations, so having a negative impact on power availability, security and quality [1]. One among the solutions for overcoming this can be the Distributed Generation (DG) system. dg systems using renewable energy sources like solar, wind or hydro, have the advantage that the ability is made in shut proximity to wherever it’s consumed. This manner the losses because of transmission lines aren’t present.

Fabrication of Al 7068 Reinforced with Tur Husk Ash (THA) and Alumina Hybrid Metal Matrix Composite by Powder Metallurgy and Evaluating Its Microstructure and Mechanical Properties
Authors:- Mohammed Amair Sohail, Associate Prof. B.S.Motgi, Prof. Dr. G.K. Purohit

Abstract:- The applications of metal matrix composites are increasing day by day due to high strength to weight ratio. The hybrid aluminum composites can be considered as an outstanding material where high strength and wear-resistant components are of major importance, predominantly in the aerospace and automotive engineering sectors. In the present work , Al7068 reinforced with tur husk ash(THA) and Al2O3 hybrid metal matrix composite is prepared from sintering of mechanically alloyed powder (ball milling) in powder metallurgy process. Different combinations of compositions (Al7068 reinforced with 0%,4%,8%,12% 0F THA and Al2O3) were taken with total 16 combinations. Hardness was found to be increasing with increasing percentage of Al2O3 but was decreasing with increasing percentage of THA. The microstructure of the composites was studied.

Dc Micro grid Monitoring and Protection
Authors:- Veerpratap Meena, Dr. Vinay Pant

Abstract:- With the proliferation of distributed energy resources (solar, fuel cell, etc.) and DC loads, the installation and deployment of DC microgrid is seeking more attention in the contemporary paradigm of power system evolution. DC microgrid adds advantage of overall system efficiency increase due to decrease in the conversion losses and ohmic losses. Also, energy storage components are directly connected to the DC bus with the help of bidirectional converters, thus increasing the reliability of the system. However, this stochastic integration of renewable and dynamic operations of controlling poses protection problems for the DC microgrids. The main challenge in DC micro grid protection and control operations is the lack of standards and guidelines. The fault clearing time is also affected due to the lack of inertia and resistive of nature of the network. There is no zero crossing in DC system which affects the operation of the circuit breaker for fault isolation. The presented state-of-art is focused on identification of types of fault protection device, challenges in the DC microgrid system, architecture of DC microgrid controller strategies and different protection techniques are also discussed. This paper review various types of parameter estimation techniques are discussed in detail to improve the protection scheme. Superimposed current based unit protection scheme, protection using the oscillation frequency and transient power, and parameter estimation approach are help to determine the fault location and type of fault.

Investigation of Microstructure and Mechanical Properties of Hybrid Composite Aluminum 7068 Reinforced with Tur Husk Ash (THA) and Silicon Carbide (Sic)
Authors:- Shaikh Mohammad Tayyab Raza, Associate Prof. B.S.Motgi, Prof. Dr. G.K. Purohit

Abstract:- This paper deals with the fabrication of Al-7068 composites manufactured by powder metallurgy route reinforced with different weight percentages of tur husk ash (THA) and SiC A low pressure of 400 MPa was applied for compacting the composites and sintered at a temperature of 720oC for three hour. TG and XRD analysis of tur husk ash (THA) was done to obtain its chemical composition. SEM and EDX analysis was done to study the micro-structural behavior. Hardness and compression test were carried out. The hardness has been improved by adding the weight percentage of SiC but seems to be crash by adding the weight percentage of tur husk ash (THA). The compressive strength was found to be varying.

E-Mail Spam Classification Using Long Short-Term Memory Method
Authors:- M.E. Scholar (CSE) Shripriya Dongre, HOD (CSE) Prof. Kamlesh Patidar

Abstract:- In recent years, the single-modal spam filtering systems have hade high detection rate for text spamming. To avoid detection based on the single-modal spam filtering systems, spammers in jet junk information into the multi-modality part of an email and combine them to reduce the recognition rate of the single-modal spam filtering systems, there by implementing the purpose of evading detection.In view of this situation,a new model called text based data set module architecture based on model fusion (MMA-MF) is proposed, which use a text based dataset fusion method to ensure it could effectively filter spam whether it is hidden in the text. The model fuses a Convolution Neural Network (CNN) model and a Long Short-Term Memory (LSTM) model to filter spam. Using the LSTM model and the CNN model to process the text parts of an email separately to obtain two classification probability values, then the two classification probability values are incorporated into a fusion mode lt identify whether the email is spam or not. For the hyper parameters of the MMA-MF model, we use a grid search optimization method to get the most suitable hyper parameters for it, and employ a k-fold cross-validation method to evaluate the performance of this model. Our experimental results show that this model is superior to the traditional spam filtering systems and can achieve accuracies in the range of92.64–98.48%.

Review Paper on Analysis & Conduction of Certificate Examination in Cloud Environment
Authors:- Prof. C.U Chauhan, Priyanka Gupta, Snehal Gondane, Omeshwari Bobade, Roshan Gabhane, Sachi Gedam

Abstract:- Traditional Exam cell activity mostly includes a lot of manual paper work. The aim of the project is to build a centralized system. So that all the examination activities can be done effectively and efficiently for both students and admin . The final system would constitute a computerized module aimed at replicating offline exam cell process. The system is a new concept which came into existence because of a large amount of data being on paper. The automated system for exam cell department will benefit both the students as well as exam cell department staff to easily handle the entire task related to exam cell in contrast to the existing manual system. This system will make the procedure of exam cell in an organized manner. The admin can also generate the Transcripts and Letter of Recommendation, and can also verify, confirm the photocopy and revaluation of each applied student by using the CLOUD COMPUTING Technology.

Grid Tied One Megawatt Solar Photovoltaic Power Plant at Bhopal: A Feasibility Study
Authors:- M.Tech Scholar Lalit Kumar Goel, Prof. (Dr) Mukesh Pandey, Associate Prof. Dr Anurag Gour

Abstract:- With about 300 clear and sunny days in a year, the calculated solar energy incidence on India’s land area is about 5000 trillion KWh per year. India is densely populated and has been blessed with high solar insulation; it is a best combination for harnessing solar power. The way India is tapping the solar energy, the country is already a leader in solar power generation. In the solar energy sector, large projects have been proposed, and a 34,000 km2 area of the Western Desert has been earmarked for solar power projects, sufficient to generate 500 GW to 2,000 GW. Ministry of New and Renewable Energy(MNRE) has released the Jawaharlal Nehru National Solar Mission (JNNSM) Phase 2 Draft Policy, our Government is planning to install 10GW of Solar Power, and of this planning, 4 GW is under the central govt scheme and the remaining 6GW under state govt schemes.

Heart Rate Measurement using The Change of Color of Skin over Time Due To Blood Flow
Authors:- Soumyadip Chattopadhyay

Abstract:- Heart Rate is an important medical parameter in case of maintaining one’s health. There are some apps available in the market that can calculate the heart rate of a person by using a Smartphone camera. No external pulsometers are required. But, these applications also consists of different issues in measuring proper pulse, like motion, noise in capturing the video, premature ventricular contraction and many more. Also some human errors like low or high pressure on the mobile camera, misplacement of finger over the camera leads to countable amount of error in measurement of Heart Rate. In our case of study, we have developed an application using existing algorithms that can cut down these errors up to an extent and gives the user almost error less Pulse of him or her by using the video of change of color of skin over time. We have captured video to get the PPG using smart phone and used tan 1st order Butterworth (IIR) band pass filter with frequency domain analysis and Hann windowing for leakage reduction.

Production of High-Strength Concrete by Utilizing Volcanic Pumice Waste in KSA, Jazan Region: Particle Size Effect
Authors:- Abdullah M. Zeyad, Saeed A. Al-Qahtani, Hussain A. Al-Shehri

Abstract:- Volcanic areas are scattered in several areas of Saudi Arabia. This spread contributes to the diversity of the sources of volcanic substances and their chemical structures. This study assesses the use of volcanic pumice powder (VPP) obtained from volcanic residues in the western region of Saudi Arabia to produce high-strength concrete (HSC). Chemical analysis reveals that these volcanic residues consist of 76.01% pozzolanic materials. The VPP was used to replace part of the cement content of HSC, and the effects of replacing 10% and 20% of the cement mass with VPP on HSC properties were studied. In particular, the effects of granules measuring 4.96 µm (4VPP) and 63.6 µm (60VPP) in size were observed. The compressive strength, flexural strength, indirect tensile strength, porosity, and water absorption rate of the samples were determined after 7, 28, and 90 days of curing. The compressive strength of HSC samples containing 10% (4HSC10) and 20% (4HSC20) 4VPP improved by 12.0% and 16.6% compared with those of 60HSC10 and 60HSC20, respectively, after 28 days of aging. Water absorption decreased when the main particle size was 4 mm compared with that when the main particle size was 60 mm. The water absorption rate decreased by 12% after 28 days of curing when 20% of the cement mass was replaced with 4VPP.

Estbt- Enhance Secure Trust Based Transmission for Mobile Ad-Hoc Network
Authors:- Shailendra shrivastava, Sushma Kushwaha

Abstract:- Mobile Ad-Hoc network is most popular in current scenario but when this network popular increased as well as so many attacked or unauthorized access increased. In this article will analysis about secure and trust based communication. In any case, constructing a trust model that receives recommendation by different hubs in the system is a testing issue because of the danger of dishonest recommendation like bad-mouthing, ballot-stuffing and collusion. The attacks caused by badly behaving nodes when increasing recommendations in the existing trust models. A recommendation based trust model demonstrate with a protection plan, which uses clustering technique to powerfully filter out attacks related to dishonest recommendations between certain time in view of number of cooperation, similarity of data and closeness between the hubs. The model is observationally tried under a few mobile and separated topologies in which hubs encounter changes in their neighborhood prompting regular course changes. The experimental investigation exhibits vigor and precision of the trust demonstrate in a dynamic MANET condition. This model can be extended by weighting recommendations based on time and location to mitigate the influence of location and time dependent attacks.

Classifying Vehicle Activity Patterns from Iot Device & Remote Monitoring System
Authors:- M.Tech. Scholar Prachi Pandey, Asst. Prof. Ankur Taneja

Abstract:- By using the Internet of Things Technology can greatly enhance the performance, monitoring and maintenance of the vehicle. In this paper analysis is based on the Implementation of new cost effective methodology based on IoT to monitor vehicle health remotely for performance evaluation. This will facilitate preventive maintenance, fault detection, historical analysis of the vehicle in addition to real time monitoring. In this paper analysis The vehicle consist of onboard GPRS module which collect the CAN data from the CAN device fitted on the vehicle and send it to the remotely located server. Second phase work focus on Monitoring the temperature of the vehicle system avoid sparking of the vehicle and also providing the fuel consumption & Battery information of display and third phase of implementation using of GSM Module when vehicle is provide the unusual activity & driver is facing any problem then it give message to the owner of vehicle. In this proposed IoT system that allows the owner to monitor the data provided by the sensors available on a vehicle, and to control processes automatically, anytime and anywhere using cloud system analysis. We are Using Support-Weight Approach for classification of IoT Data, after that we compared some parameter like Computation Cost, Computation Time, Accuracy etc.

Parking System for Smart City using Internet of Thing
Authors:- M.Tech. Student Monika Bijore, Asst. Prof. Monika Raghuwanshi

Abstract:- – Recently parking has become a serious issue and even worse, because of the increasing number of automobiles everywhere. In this paper we propose an IoT based guidance for user as well as Upcoming self-driving vehicles to search parking space for the vehicle. it also help user to choose the right vehicles to travel according to the parking spaces available to the destination point. it provides an intelligent guidance to the user, user can choose their travelling vehicle as two wheelers, four wheelers or public transport according to the traffic density. It aims to develop an intelligent parking guidance system. which reduces difficulty in conventional parking system. The system can monitor the state of every parking slot by deploying a sensor node on the slot. Accordingly, sensor senses the status of parking slot and sends status to central node server controller. The controller unit collects the data from all sensor node and upload to the server using http protocol where user can check the parking status from anywhere using internet and any browser. The system can also integrate with the artificial intelligence network like google assistance and self-driving car. Google assistance assist user to choose right vehicle according to the traffic density and parking space available at the destination point. User can simply see the space available by clicking in google map of their destination building or social parking.

A Study on Design of Single Sided Linear Induction Motor and Controlling with Voltage Source Inverter Fed Convertor
Authors:-M. Tech. Scholar S. Venkata Sai Kumar

Abstract:- Now-a-days, Linear Induction Motors are widely used, in many industrial applications like transportation, conveyor systems, actuators, material handling, pumping of liquid metal, and sliding door closers, etc. The advantages of linear motor is that it requires no mechanical rotary-to-linear converters, high efficiency and economical. The linear induction motor is very useful at places requiring linear motion since it produces thrust directly and has a simple structure, easy maintenance, high acceleration/deceleration and low cost. Linear Induction Motor is basically a rotating squirrel cage induction motor opened out flat. Instead of producing rotary torque from a cylindrical machine it produces linear force from a flat one. The stator of the linear induction motor acts as the primary and the rotor of the linear induction motor acts as the secondary of linear induction motor. As a result, the stator is built with steel laminations and rotor is built with conductor sheet and black iron. The single sided linear induction motor construction is easy and low cost. The working principle of single sided linear induction motor is same as the conventional induction motor. In the secondary eddy current is generated due to an induced EMF. The EMF is induced because of relative velocity between travelling magnetic flux and secondary. The thrust force or linear force is produced due to interaction between travelling flux and eddy current. In this paper, a single sided linear induction motor design parameters are analyzed and prototype has been designed and motor will be control with Voltage Source Inverter Fed Convertor.

Grid Tied One Megawatt Solar Photovoltaic Power Plant at Bhopal: A Study on Performance Analysis Including Efficiency Calculation
Authors:- Research Scholar Lalit Kumar Goel, Prof. (Dr) Mukesh Pandey, Assistant Prof. Dr Anurag Gour

Abstract:- The growing energy demand in developing nations has triggered the issue of energy security. This has made essential to utilize untapped potential of renewable resources. India is focusing on development of its own sources of energy. For PV panels, the efficiency of converting solar energy to electricity is around 7%.Average solar radiation incident over India varies from 4kWh/day – 7 kWh/day. Grid connected PV systems have become the best alternatives in renewable energy at large scale. Performance analysis of these grid connected plants could help in designing, operating and maintenance of new grid connected systems. A 1MW photovoltaic grid connected plant commissioned at Bhopal is one of the commercial solar power plants with the site receiving a good solar radiation of 5.61 kWh/m2/day and annual temperature of about 31.2 oC . The plant is designed to operate with a fixed tilt. In this study the solar PV plant aspects along with its annual performance is elaborated.

A Review on Implementation of Queuing Theory Along with Lean Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Bharat, Professor Vipul Upadhayay, Yogesh P Ladhe

Abstract:- Within the combinatorial scheduling community, there has been an increasing interest in modeling and solving scheduling problems in dynamic environments. Such problems have also been considered in the field of queuing theory, but very few research take advantage of developments in both areas, and previous surveys on dynamic scheduling usually make no mention of queuing approaches. In this research, we provide an overview of queuing theoretic models and methods that are relevant to scheduling in dynamic settings.

Automobile Technology A Study of Past, Present and Future
Authors:- Md. Shakil Hossain

Abstract:- This paper highlights the journey of automobile technology since the very beginning of invention to the present, also discuss the future development of this technology. Automobile technology is always of interest to those people who like to know and get touched with new invention of engineering. This paper can help one to recognize the development in vehicle technology for the past, present, and future. Lot of changes happened in automobile technology since 19th century, when the first radio controlled vehicles were designed. In the subsequent decades, automotive electric cars appeared which were powered by battery and embedded circuits in the roads. By the middle of last century, automotive cars were having approximately same electronic systems shown one by one. Various semi-autonomous type set up in modern cars such as lane keeping, automatic braking and adaptive cruise manage are based on such systems. It is forecasted that most companies will start fully autonomous vehicles by the coming of next decade. The future of autonomous vehicles is an ambitious era of safe and comfortable transportation.

Smart Sugarcane Crop Growth Monitoring System using IOT and Image Processing
Authors:- Someshwar Terkar, Saurabh Shinde, Sushma Potdar, Neha Chavan, Ms. K.S. Jadhav

Abstract:- Agriculture is the most important sector of an Indian economy. Sugarcane is the main source of sugar in India and holds a prominent position as a cash crop. People uses conventional way for the farming. Conventional way requires more human power. Around 55% people in India has been engaged in agriculture but only 15% goods we get from the agriculture. Though there is a large area under cultivation, we don’t get maximum yield. The fact that most of our farmers have the lack of proper knowledge makes it even more erratic. A large portion of farming and agricultural activities are based on the predictions, which at times fail. Due to this, farmers have to bear huge losses. Since we know the benefits of proper irrigation and soil nutrients in the growth of sugarcane crop, such parameters can’t be ignored. Diseases occurred to the sugarcane plant can affect the yield of sugarcane. Sothe “Smart sugarcane crop growth monitoring system based on IOT and image processing” is one of the best way to increase crop yields.

Data and Components Availability
Authors:- Atharva Manoj Kulkarni

Abstract:- Agriculture is the most important sector of an Indian economy. Sugarcane is the main source of sugar in India and holds a prominent position as a cash crop. People uses conventional way for the farming. Conventional way requires more human power. Around 55% people in India has been engaged in agriculture but only 15% goods we get from the agriculture. Though there is a large area under cultivation, we don’t get maximum yield. The fact that most of our farmers have the lack of proper knowledge makes it even more erratic. A large portion of farming and agricultural activities are based on the predictions, which at times fail. Due to this, farmers have to bear huge losses. Since we know the benefits of proper irrigation and soil nutrients in the growth of sugarcane crop, such parameters can’t be ignored. Diseases occurred to the sugarcane plant can affect the yield of sugarcane. Sothe “Smart sugarcane crop growth monitoring system based on IOT and image processing” is one of the best way to increase crop yields.

A Survey on Different Techniques of Static and Dynamic Load Balancing
Authors:- Ph.D Scholar Vinod Patidar, Dr. Shiv Shakti Shrivastava

Abstract:- As cloud computing have number of issues related to security, bandwidth efficiency, large information handling, load balancing, etc. Load balancing implies distribution of the workload to node or servers or assets with the goal that one can accomplish maximum utilization of resources, reduce execution time, increase system throughput and so on. This paper gives a concise study of cloud based service balancing methods proposed by different researchers. Here various features of service are detailed for the load balancing and planning. Different sorts of requirement of load balancing was additionally talked with their significance and limitations. So according to the module as well as steps used in techniques classification of load balancing algorithms are done with a comprehensive and comparative understanding of existing literature.

A Survey on Techniques and Features of Document Classification
Authors:- Ph.D Scholar Vinod Sharma, Dr. Shiv Shakti Shrivastava

Abstract:- Traditional information retrieval methods become inadequate for increasing vast amount of data. Without knowing what could be in the documents; it is difficult to formulate effective queries for analyzing and extracting useful information from the data. This survey focused on some of the present strategies used for filtering documents. Starting with different types of text features this paper has discussed about recent developments in the field of classification of text documents. This paper gives a concise study of methods proposed by different researchers. Here various pre-processing steps were also discussed with a comprehensive and comparative understanding of existing literature.

A Survey on Intrusion Detection System Techniques and Features for Identification
Authors:- Ph.D Scholar Raj kumar Pandey, Dr. Shiv Shakti Shrivastava

Abstract:- The intrusion detection systems (IDSs) are essential elements when it comes to the protection of an ICT infrastructure. Intrusion detection systems (IDSs) are widespread systems able to passively or actively control intrusive activities in a defined host and network perimeter. Recently, different IDSs have been proposed by integrating various detection techniques, generic or adapted to a specific domain and to the nature of attacks operating on. In this paper survey was done on the various techniques of intrusion detection system where some of supervised and unsupervised intrusion detection techniques are discussed. Here methodology of various researchers is explained with their steps of working. Different types of attacks done by the intruders were also discussed.

Design and Development of Text-Image Watermarking Based on Integer Wavelet Transform (IWT) and Discrete Cosine Transform (DCT)
Authors:- PhD Scholar Arpana Bhandari, Associate Professor Dr. Shailja Shukla, Professor Dr. Rajiv Shrivastava, Asst. Professor Dr. Vijay Bhandari

Abstract:-This paper investigates Text-images still has a great importance, despite the spread of electronic texts. Text-images are protected using digital watermarking. This paper proposes a watermarking method applied to text images. This method integrates two transforms: integer wavelet transforms (IWT) and discrete cosine transforms (DCT). For the watermark embedding, IWT is performed on the cover image and DCT is applied to the low frequency sub-band LL. The watermark image is inserted in the lower to medium DCT coefficients to achieve a high degree of robustness and imperceptibility. Experiments using different English text-images are performed to evaluate the proposed method in terms of imperceptibility and robustness. Results show that the proposed method has higher imperceptibility compared to other existing methods applied to English text-images. Also, the proposed method provides good robustness results, especially against compression and noise..

Smart Home Automation Technique using Unsupervised Machine Learning Algorithm
Authors:- Nikhil, Amit Sahni, Rishav Kumar Thakur

Abstract:-Smart home mechanization technique is getting highly considered these days because its wide selection of uses like security system, controlling home appliances, entertainment system, lighting etc. Large quantity information is accumulated from the past good home expertise by the user however these information isn’t absolutely used, but currently because of development of huge information and machine learning technologies these prediction is also accustomed manufacture a very intelligent system. Regarding this paper proposes user behavior prediction formula (UUBP) that uses a artificial neural network(ANN) and tells a couple of new and advanced conception of forgetting issue to contend with the shortcomings of previous algorithm. This formula shows high-learning ability and wants minimum human intervention. This formula may contend with the user influence and outdated records. UUBP formula shows more robust performance then different algorithms.

Comparative Analysis of Traffic Classification Algorithms in Deep Learning
Authors:- Goddeti Mallikarjun, A. Srinish Reddy, J. Manikandan

Abstract:- Traffic classification is an important algorithm to a wide range of applications from QoS provisioning and billing in ISPs to security-related applications in firewalls and intrusion detection systems. Port-based, information packet scrutiny, and classical machine learning ways in which area unit used extensively inside the past, but their accuracy has declined due to the dramatic changes in Internet traffic, particularly the increase in encrypted traffic. With the proliferation of deep learning ways, researchers have recently investigated these ways for traffic classification and according high accuracy. In this article, we tend to introduce a general framework for deep-learning-based traffic classification. We gift usually used deep learning ways and their application in traffic classification tasks. Then we have a tendency to discuss open issues, challenges, and opportunities for traffic classification.

Advanced Smart Road Deformation Detection System
Authors:- Reetu Jain, Aarav Amit Akali, Jai Jariwala, Tanay Nistala

Abstract:- Aging roads and poor road-maintenance systems resulted many potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly to find the location a data base as to be developed, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts causing loss of time and money to government. Thus, in this paper, we introduced a pothole-detection system using a commercial “Road sepoy”. The proposed system detects potholes using vision-based tracking system and MATLAB algorithm specifically designed to work with road sepoy camera giving us accurately in real-time environment. Geo-mapping the pothole in google maps helps the exact location.

Automated Vehicle Identification and Toll Tax Collection
Authors:- Anwar A. Shaikh, Akshay B. Raskar, Sagar R.Sonne, Omkar S.Lalge, Prof. K.S. Jadhav

Abstract:- The ANPR (Automatic Number plate Recognition) system is based on image processing technology. It is one of the necessary systems designed to detect the vehicle number plate. In today’s world with the increasing number of vehicle day by day it’s not possible to manually keep a record of the entire vehicle. With the development of this system it becomes easy to keep a record and use it whenever required. The main objective here is to design an efficient automatic vehicle identification system by using vehicle number plate. The system first would capture the vehicles image as soon as the vehicle reaches the security checking area. The captured images are then extracted by using the segmentation process. Optical character recognition is used to identify the characters. The obtained data is then compared with the data stored in their database. The system is implemented and simulated on MATLAB and performance is tested on real images. This type of system is widely used in Traffic Control Areas, Tolling, Parking Area etc. This system is mainly designed for the purpose of security system.

A Survey on Cigs Solar Cell Technology
Authors:- Asst. Prof. J. Dinesh Kumar, Associate Prof. S. Prince Immanuel Alexander, Asst. Prof. G. Lavanya

Abstract:- Thin film solar cells are favorable because of their minimum material usage and rising efficiencies. The three major thin film solar cell technologies include amorphous silicon (α-Si), copper indium gallium selenide (CIGS), and cadmium telluride (CdTe). In this paper, the evolution of each technology is discussed in both laboratory and commercial settings, and market share and reliability are equally explored. The module efficiencies of CIGS and CdTe technologies almost rival that of crystalline solar cells, which currently possess greater than 55% of the market share. α-Si is plagued with low efficiency and light-induced degradation, so it is almost extinct in terrestrial applications. CIGS and CdTe hold the greatest promise for the future of thin film. Longevity, reliability, consumer confidence and greater investments must be established before thin film solar cells are explored on building integrated photovoltaic system.

A Review Article of Transportation Vehicles Routing Scheduling using Genetic Algorithm
Authors:- Kshitij Singh Chouhan, Professor Vinay Deulkar

Abstract:- The paper proposes a technique for the development of ‘‘optimal’’ transit route networks (for example, a bus route network) given the information on link travel times and transit demand. The proposed method, unlike previous techniques, primarily uses optimization tools for the development of the transit route network—the reliance on heuristics is minimal. In the proposed method, genetic algorithms, an evolutionary optimization technique, is used to develop the ‘‘optimal’’ set of routes. Results show that the proposed procedure performs better than the existing techniques.

A Survey on Optimization Techniques of Spectrum Sensing and Allocation in Cognitive Network
Authors:- Vivek Banerjee, Dr. Rajneesh Kumar Karn

Abstract:- Cognitive radio network increase spectrum as non-licensed users get chance to transfer their data. Hence IOT devices get dynamic access to the spectrum by sensing channel data. Spectrum sensing is a key enabler for cognitive radios technology in network implementation. Spectrum sensing identifies idle spectrum and provides attentiveness about the sensing radio environment. In this paper, a survey of the CRs technology is presented. Different papers of the spectrum sensing techniques are reviewed. Here paper has summarize techniques adopt by researchers to increase the detection rate, in different environment of ideal and real situation. Spectrum allocation algorithm also discuss as utilization depends on allocation as well. Comparison of sensing technique with their issues is tabularized. Paper has explained various evaluation parameters for comparison of spectrum sensing techniques.

Optimizing Garbage Collection for High-Performance
Machine Learning Applications in Java

Authors:- Rajesh S. Bansode, Dr. Professor

Abstract:- This paper explores the optimization of garbage collection (GC) techniques in Java Virtual Machine (JVM) to improve the performance of machine learning (ML) applications. By analyzing GC algorithms and leveraging tuning strategies from Ramakrishna Manchana’s 2018 research, this study addresses critical challenges in resource-constrained environments such as IoT. The proposed approach focuses on minimizing latency during model training and deployment while enhancing memory efficiency. A comparative analysis of various GC algorithms is presented, with experimental results demonstrating the effectiveness of GC tuning for high-performance ML workflows.

Corporate Social Responsibility: A Contemporary Perspective

Authors: Anjanappa. T

Abstract: Corporate Social Responsibility (CSR) has emerged as one of the most influential paradigms shaping the relationship between businesses and society. Once regarded as a voluntary philanthropic practice, CSR today is increasingly recognized as a strategic tool that integrates ethical responsibility, sustainability, and long-term value creation into business operations. This paper explores the conceptual foundations of CSR, its growing importance in the global economy, and the associated merits and demerits. Special emphasis is given to recent developments, including the integration of CSR with Environmental, Social, and Governance (ESG) standards, legal mandates such as India’s Companies Act (2013), and the shift towards stakeholder centric models of corporate accountability. The paper also discusses the challenges of CSR implementation, critiques such as green washing, and the evolving expectations from corporations in the post-pandemic world. Drawing on theoretical frameworks and case studies, the article argues that CSR is no longer peripheral but central to corporate sustainability and competitiveness. The findings highlight that companies engaging meaningfully in CSR are better positioned to build trust, enhance brand equity, and contribute to achieving Sustainable Development Goals (SDGs).

From Legacy To Agile How Linux Is Reshaping The Salesforce CRM Landscape

Authors: Aditya Reddy

Abstract: The transformation of enterprise customer relationship management (CRM) from legacy monolithic systems to agile, cloud-native platforms has accelerated with the adoption of Salesforce CRM. At the core of this transition, Linux has emerged as a strategic enabler, providing scalability, stability, and security across hybrid and multi-cloud environments. This review explores how Linux supports Salesforce CRM deployments by addressing legacy challenges, enhancing compliance, reducing operational costs, and enabling emerging use cases such as edge computing and AI integration. Case studies from industries including finance, healthcare, and retail illustrate Linux’s role in improving operational efficiency and driving innovation. The paper also critically evaluates the strengths and limitations of Linux in Salesforce ecosystems, offering a balanced perspective on its adoption. Future directions highlight the growing importance of containerization, automation, and compliance frameworks, positioning Linux as a foundational technology for agile CRM operations in the digital era.

DOI: https://doi.org/10.5281/zenodo.17140147

 

The UNIX Administrators Playbook Kickstarting A Modern Career In Hybrid Cloud

Authors: Arjun Reddy

Abstract: The evolution of enterprise IT from traditional data centers to hybrid cloud infrastructures has reshaped the role of the UNIX administrator. Once primarily tasked with maintaining stable and secure on-premises systems, administrators today are expected to integrate legacy UNIX workloads with cloud-native platforms, automation frameworks, and containerized environments. This review explores the challenges and opportunities presented by this transformation, highlighting the critical balance between reliability and agility that defines modern hybrid infrastructures. It examines skill gaps, training demands, and the complexities of managing multi-vendor ecosystems, while also emphasizing the growing importance of automation, predictive monitoring, and compliance frameworks. Real-world case studies across finance, healthcare, and government demonstrate how UNIX continues to play a foundational role in mission-critical operations, even as cloud adoption accelerates. By analyzing future trends such as AIOps, edge computing, and the convergence of system administration with site reliability engineering, the article underscores how UNIX administrators can future-proof their careers. The playbook presented here advocates for continuous upskilling, strategic adoption of hybrid technologies, and a mindset shift from maintenance to innovation. Ultimately, the UNIX administrator’s relevance in the hybrid era is not diminished but redefined, offering new pathways for professional growth and enterprise resilience.

DOI: http://doi.org/

The Qlik Journey: Building Data-Driven Cultures With QlikView, Qlik Sense And A Solid BI Lifecycle

Authors: Aarav Nikhil

Abstract: Business Intelligence (BI) has become a cornerstone of modern enterprises, enabling organizations to transform raw data into actionable insights for informed decision-making. Qlik, through its evolution from QlikView to Qlik Sense, has significantly influenced the BI ecosystem by bridging the gap between guided analytics and self-service, cloud-native intelligence. This review article examines Qlik’s contributions to building data-driven cultures, aligning with the BI lifecycle framework, and integrating with broader enterprise data fabrics. It explores the technical strengths and limitations of QlikView, the architectural advancements of Qlik Sense, and the role of Qlik Data Integration in supporting real-time analytics. Furthermore, it highlights governance, compliance, and adoption strategies, alongside comparative analyses with other BI platforms. Case studies across healthcare, finance, retail, and the public sector illustrate Qlik’s transformative potential, while the discussion of challenges and future directions underscores the need for strategic adoption. The findings suggest that Qlik not only delivers advanced analytics capabilities but also acts as a catalyst for organizational cultural transformation toward data-driven decision-making.

DOI: http://doi.org/

The Influence Of Container Orchestration Security On Microservices Reliability

Authors: Sonam D. Wangchuk

Abstract: Container orchestration systems have become the foundation of modern microservice architectures, enabling automated deployment, scaling, and management of containerized workloads. As organizations shift to cloud-native environments, the security of orchestration platforms such as Kubernetes, Docker Swarm, and OpenShift has emerged as a critical determinant of overall system reliability. Orchestration security ensures that applications maintain consistent performance, resilience, and integrity even in the face of evolving cyber threats. However, inadequate security controls within orchestration layers such as unprotected APIs, misconfigured network policies, and unencrypted communications can lead to severe vulnerabilities that disrupt service continuity. This review explores the intricate relationship between container orchestration security and microservices reliability. It analyzes the evolution of orchestration systems, common security challenges, and the impact of security mechanisms on microservices performance and stability. Additionally, it discusses best practices and emerging frameworks that integrate security and automation to ensure sustained reliability. The paper concludes by emphasizing the need for adaptive, intelligent orchestration mechanisms that integrate security and reliability by design, ensuring robust and scalable cloud-native infrastructures capable of withstanding future operational and security challenges.

DOI: http://doi.org/10.5281/zenodo.17880571

The Impact Of AI-based Forensic Systems On Post-incident Investigations

Authors: Anura J. Perera

Abstract: Artificial intelligence (AI) has revolutionized post-incident investigations by introducing automation, precision, and predictive intelligence into digital forensic processes. Traditional forensic techniques, dependent on manual log examination and human expertise, often struggle to handle the enormous data volumes and complex digital trails generated in modern cyber incidents. AI-based forensic systems leverage machine learning, natural language processing, and data mining to extract, analyze, and correlate evidence at unprecedented speed and accuracy. These systems can automatically detect anomalies, reconstruct attack timelines, and identify threat actors by learning from historical data patterns. The review explores the evolution of digital forensics, the integration of AI-driven tools, and the measurable improvements in investigation efficiency. It also highlights challenges such as model transparency, bias, explainability, and legal admissibility of AI-generated evidence. Moreover, it discusses emerging research opportunities, including explainable AI, blockchain-enabled evidence validation, and collaborative forensics through federated learning. By synthesizing academic research and industrial applications, this paper emphasizes that AI-based forensic systems are not merely tools but strategic enablers of resilience in cyber incident response. They represent a paradigm shift toward intelligent, adaptive, and self-learning investigation frameworks, crucial for addressing the growing sophistication of digital threats in enterprise and law enforcement environments.

DOI: http://doi.org/10.5281/zenodo.17880644

The Influence Of Cognitive Analytics On IT Compliance Auditing Accuracy

Authors: Malini R. De Silva

Abstract: The increasing complexity of regulatory requirements and the growing volume of enterprise data have made IT compliance auditing a challenging process for organizations. Traditional audit methods, reliant on static rule sets and manual inspection, often struggle to maintain accuracy and timeliness in dynamic digital environments. Cognitive analytics, integrating artificial intelligence, machine learning, and natural language processing, has emerged as a transformative approach to enhance audit precision and adaptability. By simulating human reasoning and contextual understanding, cognitive systems can analyze structured and unstructured data, interpret compliance documentation, and detect anomalies with greater accuracy. These systems not only automate evidence collection but also prioritize high-risk areas using predictive insights, thereby improving overall compliance efficiency. Furthermore, cognitive analytics enables continuous learning from historical audit outcomes, refining its models to adapt to evolving regulations. As a result, IT audit processes become more proactive, data-driven, and transparent. This paper reviews how cognitive analytics reshapes compliance auditing, improving reliability, speed, and accuracy while reducing operational overhead. The integration of cognitive intelligence represents a paradigm shift toward intelligent, adaptive, and autonomous compliance ecosystems capable of ensuring governance integrity in modern IT infrastructures.

DOI: http://doi.org/10.5281/zenodo.17880764

A Study On Secure Data Transmission In Distributed Systems

Authors: Tanvir Hasan

 

 

Abstract: Secure data transmission in distributed systems is a critical requirement for ensuring confidentiality, integrity, and availability of information exchanged across interconnected and geographically dispersed components. This study examines the fundamental principles, protocols, and techniques used to achieve secure communication in distributed environments, including cloud systems, peer-to-peer networks, and microservices architectures. It explores the role of cryptographic mechanisms such as encryption, digital signatures, and key management in protecting data during transmission. The study also analyzes secure communication protocols such as TLS/SSL, VPNs, and secure APIs that enable trusted interactions between system components. Additionally, it highlights emerging approaches such as blockchain-based security models and zero-trust architectures for enhancing trust and resilience. Key challenges, including latency overhead, scalability, interoperability, and vulnerability to cyberattacks such as man-in-the-middle and denial-of-service attacks, are discussed along with mitigation strategies. The findings emphasize that a multi-layered security approach combining encryption, authentication, monitoring, and policy enforcement is essential for ensuring secure and efficient data transmission in distributed systems.

DOI:

 

 

Published by:

Journal on Civil Engineering Topics

Uncategorized

IJSRET is an online platform which gives a way to scholars, researchers to share their research paper/review paper/survey paper in the field of civil engineering. There is no doubt that the demand and the need of engineers who are expertise in this field is increasing day by day. As the demand is increasing so the improvement is also required along with it. So, for an improvement we have created this platform in which a researcher and a scholar can find an number of civil engineering topics to publish their research paper or they can suggest if they have something new related. They can submit their paper by selecting submit option, they can also check the publication charge by clicking on check publication charges, after that their paper will be published within 3-4 days after the complete analysis of their research paper by our team.

Submit Your Paper 

Check Publication Charges

One can publish their journal by selecting the links given below –

Spark your career with IJSRET PUBLICATION

From then above ideas of topics of a journal, if a researcher haven’t find any according to their findings and research so, they can directly contact us or they can also leave a feedback for us. Our team will consider your topics if it is suitable. Through this platform a researcher can spark their career by publishing their research paper.</p?

Published by:

Research Paper Publication Sites

Uncategorized

Websites having valid ISSN number can publish papers on there portal. So scholars who are looking for research paper publication sites can cross check for valid publication house by the presence of eight digit number. Each of publication media has its own format for presenting there content to the globe with signature of its site like name, logo, ISSN number, etc. Sites for publishing research papers should be at-least three year old have papers in each volume and issue. It should be attentive for young researcher as well. Junior researchers who are new in this field of publication can read following point to filter good publication media.

  1. Valid E-ISSN number
  2. Good impact factor from reputed organizations.
  3. Global indexing
  4. Highly responsive for author in there paper submitting, publishing.
  5. Reviewer team for fast response

Submit Your Paper  / Check Publication Charges

Research paper publishing sites providing all above services are good journals. Scholars who are initializing their work can consult with mentor for the same for selection of international journal. One should cross check relevant content other paper on the site as this increase the journal relevance with the publishing site.

Published by:
× How can I help you?