IJSRET » Blog Archives

Author Archives: vikaspatanker

IJSRET Volume 7 Issue 4, July-Aug-2021

Uncategorized

Prediction of Rainfall Using Machine Learning Algorithms
Authors:- Ishwarya G, Santhrupthi M B, Shanthi B, Asst. Prof. Varsha N

Abstract-Prediction of rainfall using precipitation forecast is significant as substantial precipitation can prompt numerous debacles. The expectation assists individuals with taking preventive measures and besides the forecast ought to be exact. There are two sorts of expectation transient precipitation forecast and long haul precipitation. Forecast generally transient expectation can gives us the precise outcome. The fundamental test is to construct a model for long haul precipitation forecast. Substantial precipitation expectation could be a significant disadvantage for geology division since it is firmly connected with the economy and lifetime of human. It is a reason for cataclysmic events like flood and dry spell that square measure experienced by people across the world every year. Precision of precipitation articulation has decent significance for nations like India whose economy is fundamentally reliant upon horticulture. The powerful idea of air, applied math procedures neglect to give reasonable precision to precipitation proclamation. The forecast of precipitation utilizing AI methods may utilize relapse. Expectation of this undertaking is to offer non-specialists simple admittance to the methods, approaches used in the area of precipitation forecast and give a near report among the different AI strategies.

Contingency Analysis
Authors:- Asst. Prof. Vishal V. Mehtre, Shubham Saket, Siddharth Gautam

Abstract- A dependable, continuous supply of electrical energy is a necessary component of today’s advanced societies. Hence to maintain the power system security and reliablity is one of the inmportant tasks for system engineers. The security assessment is an important task because it provides information related the state of the system in the case of a contingency. Contingency like sudden loss of line or generator or increase/decreased in power demandcause voilation of bus voltage or transmission line overloading. Hence to keep the system safe and continuity of supply contingency analysis is important. Different terms related to contingency including FDLF is reviewed in this paper.

Safety Perception Survey as a Tool for Improving the Safety Climate in a Manufacturing Industry
Authors:- S Vashishta

Abstract- Safety in the Steel industry has always been an area of concern. Though significant improvements in safety awareness of the employees have been achieved along with deployment of safer equipment & technology, incidents still continue to occur and the industry still continues to lag behind most other high risk industries as far as level of safety climate is concerned.A safety climate survey aims to measure employee’s perceptions on the status of safety at their workplace & can help in identifying the gaps in various Safety Management System elements, thereby providing management with useful insights to plan their strategies.The paper aims to measure the Safety Climate of a Steel manufacturing Plant through a Safety perception survey. A questionnaire-based survey was considered as it is one of the most frequently used and widely accepted methods for measuring safety climate. A questionnaire was developed consisting of 5 safety climate components with 44 questions and was administered to 102 employees (Supervisors, technicians, workers, etc.). Various Statistical tools like mean, SD, Variance, Cronbach’s alpha & Split half correlation, and one-way ANOVA test were applied for doing various types of analysis and arriving at conclusion.

Automatic Questionnaire Generator
Authors:- Asst. Prof. G.Vijaya Lakshmi, P. H Saraswathi, B.Reshmi, T. Sai Santoshi, P. Sunith Kumar

Abstract- This Project is based on the work carried out on bulk amount of text. Learning through the internet becomes popular that facilitates learners to learn anything, anytime, anywhere from the web resources. This system can find the self-learning gaps of learners and improve the progress of learning. The manual question generation takes much time and labor. Therefore, automatic question generation from learning resources is the primary task of an automated questionnaire generator. Stop words and unwanted words are identified by NLP techniques. In order to perform machine learning on text, the data is transformed into vector representations such that we can apply numeric machine learning. Representing data numerically gives us the ability to perform meaningful analytics and also creates the instances on which machine learning algorithms operate. Hence feature extraction is done by using Spacy module and performing One-Hot-Encoding. Naïve Bayes Classifier is used to train the data and the model performance is evaluated on the basis of metrics such as accuracy, precision, f1 score, recall, confusion matrix. The purpose of this project is to generate and assess the questions automatically in 3 formats (True/False, Choose the correct answers, Cloze Questions) when given text as an input.

The Operation of the “Quiz Test Application Using Python Studio
Authors:- UG Student Amar Bansode, UG Student Rakesh Navghan, UG Student Santosh Birajdar, UG Student Anil Nivargi, UG Student VikasBhadkumbe, Lecturer Snehal Shinde

Abstract- Purpose: This paper shows the working of python App this quiz application. Also, it gives the processes which happen in the supply quiz industry.The main aim of this research paper is quiz app software and technology. The analysis should include market and users need in order to be able to fabricate the quiz application and make it available for users as a helpful utility and entertaining application. This research paper is mainly motivated to solve certain problems related, for example, to disable student and in general to collaborative learning. In general the Project & Title will be selected from various sources and send it. to the top like the Project Title along with a bud ese new of the Project in a document called Project Abstract The HOD will accepts the Project and allows the student to proceed and start working on the Project In the middle of the Project designing the HOD also makes a proudest to the Student in and the Sample Code of any medal as well. And at the final the Studies has porcine the cells Documents like Project Final Document. Source Code and all the content in a Compact Dock (CD) and to the HOD along with printed and copy The HOD will see all these documents and finishes the Project Review and enters the Marks to the College records Thus we selected e-Project Submission as our Project to reduce.

Coupled Inductor Based Single-Stage Boost Inverter
Authors:- M. Tech. Scholar Mr. Ravikumar Wakade, Prof. R. M. Bhombe, Prof. Yogesh Likhar

Abstract- Renewable power systems as distributed generation units often experience big changes in the inverter input voltage due to fluctuations of energy resources. Often, a front-end boost converter is added to step up the dc voltage when the energy re- sources are at a weak point. However, when a very high boost gain is demanded, the duty cycle may come to its extreme and large duty cycles causes serious reverse-recovery problems. This paper proposes a novel single-stage boost-type inverter with coupled inductor. By introducing impedance network, including coupled inductor, into the three-phase bridge inverter, and adjusting the previously forbidden shoot-through zero state, the converter can realize a high boost gain and output a stable ac voltage. The single-stage operation of the converter may lead to improved reli-ability and higher efficiency. Theoretical analysis, simulation, and experimental results are presented to verify good performance.

Covid 19 Detection from Chest X-Ray Images Using Deep Learning
Authors:- Sanket Dhobale, Aniket Kandrikar, Sumeet Manapure, Aniket Zullarwar

Abstract-The Covid-19 first occurs in Wuhan, China in December 2019. After that the virus spread all around the world and at the time of writing this paper the total number of confirmed cases are above 170 million with over 3.8 million deaths. Machine learning algorithms built on radiography images can be used as a decision support mechanism to aid radiologists to speed up the diagnostic process. CNN is a Deep Learning algorithm, we are using Convolution Neural Network(CNN) to identify the different features of the x ray images or we can say to visualize the most discriminating regions of the input images. We are taking images of chest x-rays from github. The application of deep learning in the field of COVID-19 radiologic image processing reduces false-positive and negative errors in the detection and diagnosis of this disease and offers a unique opportunity to provide fast, cheap, and safe diagnostic services to patients.

Handwritten Equation Solver Using Convolutional Neural Network
Authors:- Shweta V. Patil, Apurva S. Patil, Harshada C. Mokal, Asst. Prof. Mr. Swapnil Waghmare

Abstract-At present, there is advancement in every sector of technology. Machine learning and deep learning technologies are important parts nowadays. Many fields such as artificial intelligence, handwritten recognition, robotics, and many uses these techniques. Convolution Neural Network is used for classification, image processing, and segmentation. In our project, we had developed a web application that solves handwritten equations. It captures handwritten equations via camera and the character recognition takes place through preprocessing of image. Segmentation along with the character classification is the most difficult part. Convolution Neural Network is used for classification of character that makes the equations as a string. String operations performed on each recognized equation for the solution. As based on earlier modules of equation solver, we have added a module that provides a link for each solution. Hence, our implemented model is easy to access to solve complicated equations, and get precise output.

A Review Article NR Image Quality Assessment of Satellite Image Enhancement
Authors:- Harshil Jain, Asst. Prof. Hemant Amhia

Abstract- Satellite image enhancement is the technique which is most widely required in the field of satellite image processing to improve the visualization of the features. Satellite images are captured from a very long distance, so they contain too much noise and distortion because of atmospheric barriers. After capturing the image, some radiometric and geometric corrections are carried out on it but they are not sufficient for all the applications. It is very important to enhance the restored image before using it. In this paper, different methods for satellite image enhancement viz. contrast enhancement, resolution enhancement, edge enhancement, density slicing, digital mosaics and synthetic stereo images are discussed in detail, as well as experimental results of two techniques viz. contrast enhancement of multispectral color composite and IHS (Intensity, Hue, Saturation) transformation are shown.

MATLAB Simulation Based Reasonable Investigation of MPPT Methods for Cuk Converter Established Solar PV System to Connect to Utility Grid
Authors:- M. Tech. Scholar Dasharath Moyade, Asst. Prof. Dr. J. S. Shakya, Asst. Prof. S.S. Thakur, Associate Prof. C.S. Sharma

Abstract- In this paper presents a reasonable investigation of Maximum power point tracking system(MPPT) using a perturb and observe algorithm for Cuk DC-DC power converter based solar photovoltaic (PV) system to supply power to on grid.Cuk converter delivers an output voltage that may be less than or greater than input voltage. An imperativeimprovement of Cuk converter is a constant current at both the input and the output of the converter. Drawbacks of the Cuk converter are a high number of reactive components and high current stresses on the switch. The Cuk converter delivers a batter output voltage with reduced ripples and increase efficiency. MPPT methods are used in solar PV systems to extract the maximum power from the PV array under dynamic atmospheric circumstances. The electric power generated by solar panel, this power is regulated and it is required to constant power through the Cuk converter is used for improve to desirable voltage at solar panel. These methods are stimulated by MATLAB/Simulink program.

GASBE: A Graded Attribute-Based Solution for Access Control in Cloud Computing
Authors:- Piyush Kumar Jain, Prof. Rupali Bhartiya

Abstract- Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. To keep sensitive user data confidential against un-trusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine grained data access control is desired, and thus do not scale well. The problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control actually still remains unresolved. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to un-trusted cloud servers without disclosing the underlying data contents. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re- encryption, and lazy re-encryption.

Covid-19 Mask Detection
Authors:- Zuveriya, Ummehabeeba R, Asst. Prof. K B Drakshayini

Abstract- The COVID-19 epidemic has forced governments around the world to set limits on the transmission of the virus. A report shows that wearing the right face mask when in a public place and at work clearly reduces the risk of transmission. An effective and economical way to use learning tools to create a safe place to set up a device. With the ongoing epidemic, it is very important to have high quality applications and services designed to reduce risk. The COVID-19 epidemic is a catastrophe for mankind regardless of race, religion, gender and religion. The COVID-19 face mask detector uses in-depth reading techniques to effectively assess whether a person is wearing a face mask or not. Using a deep learning approach called the Convolutional Neural Network; you have found 98.6% accuracy. Cases where the mask is worn improperly are where the nose and mouth are partially covered as the mask is not worn.

IOT Based Disinfection and Sterilization using Temperature and Humidity
Authors:- Asst. Prof. Ms. M. Nalina Sangaviya, S. Lakshmanan, M. Pavithra, G. Sasireka, G. Vahini

Abstract- The Project is developed based on the Guideline for Disinfection and Sterilization in Healthcare Facilities, University of North Carolina Health Care System. Extrapolates quantitative data for ozone virucidal activity on the basis of the available scientific literature data for a safe and effective use of ozone in the appropriate cases and to explore the safety measures developed under the stimulus of the current emergency situation. Ozone is a powerful oxidant reacting with organic molecules, and therefore has bactericidal, virucidal, and fungicidal actions. At the same time it is a toxic substance, having abverse effects on health and safety. Instead of Ozone system, here we are proposed Temperature and Humidity based Disinfection and Sterilization system. Proposed system maintaining 37OC and 85% of Relative humidity at Disinfection and Sterilization area. Its use is being proposed for the disinfection of workplaces, public placeswith particular reference to the COVID-19 pandemic outbreak. Water mist is generated by Ultrasonic based mist maker and Temperature of the room is increased by heater attached with proposed system. It should be injected into the room that is to be disinfected until the desired Humidity and Temperature concentration is reached. After the time needed for the disinfection, its concentrations must be reduced to the levels required for the public safety. Here we are using Node MCU Esp8266 module to transfer status of the system to remote location. Electromagnetic relay is used to turn on and off the Ultrasonic humidifier and Heater.16*2 LCD display is used to display the notification to user side. The developed system improves the reliability and stability of Disinfection and Sterilization.

Performance of Telecommunications Tower During Seismic and Wind Loading Condition
Authors:- M. Tech. Scholar Shubham P Patel, Asst. Prof. Nirmal S. Mehta, Asst. Prof. Hiral V. Patel

Abstract- Four-legged self-supporting towers are commonly used in telecommunications around the world. In recent years, the communication industry has experienced considerable growth, resulting in the construction of a large number of towers to improve coverage area and network consistency. These towers play an important part in wireless communication networks, so their collapse in the event of a crisis is a big concern. As a result, when building these towers, harsh situations should be taken into account to the fullest extent possible. The effect of wind on four-legged self-supporting towers has been studied extensively in most studies. A study on models at differing heights with various bracing for earthquake and wind effects was carried out in this dissertation. Gust factor method is used to investigate the wind effect on the structure, and the modal analysis and response spectrum analysis are used to investigate the seismic effect on the structure. The results obtained from the above analysis are tabulated, compared and conclusions are drawn.

V.I.S- Vehicle Information App
Authors:-Sushant Gangwar, Siddhant Chaudhary, Swapnil Tyagi, Asst. Prof. Mr. Praveen Mishra

Abstract- With the ascent of populace and vehicles utilizations, it’s getting hard to keep up and distinguish vehicles in brief timeframe. Thus, such close to home data is accessible just to government access and a few organizations who pay government to share that information. To add straightforwardness numerous organizations unveiled such information with government instruments, for example, SMS administration partnered to government for data or by utilizing cloud served information. Such applications or instruments are named as Vehicle Information Systems which are utilized to discover data with respect to any vehicle either enlisted or is obscure to information on use and spot. Such frameworks are gainful in dealing with the information base of vehicle enrolled effectively. These frameworks are broadly utilized by enormous organizations to keep up the information of vehicles left in their place. Likewise utilized by Police and other protection association to find dubious things. Large numbers of openly accessible such administrations or virtual products got obsolete or beaded with the ascent of OS refreshes. IOS has just scarcely any such applications coming up and generally individuals who use IOS need to depend on SMS administration or government sites. Despite the fact that administration give data on solicitation however it doesn’t share entire information of the specific vehicles. That data is sub-separated in divisions of individuals who are mentioning them which implies any authority like Police can have entire subtleties improbable ordinary individuals because of protection and security reasons. With concentrating of different devices and thoughts that exposed in this framework, we get some answers concerning deserted devices, for example, OCR, Credential Recognition and so on These instruments were great however didn’t functioned admirably over various OS and subsequently Hybrid Variants were presented in investigation which fairly adjusted the exhibition to a degree. In 2019, Indian Government made the stride of digitalization and reported API of such information which was simply accessible to confided in specialists of India. Programming interface apparatus took the large jump in optimizing and accessibility of information with no security break. With the writing and articles, we presumed that distinctive OS administrations are there yet just a couple of administrations act in each OS. To fill the gap of administrations we choose to make a help that will safely and productively work cross-stages.With the ascent of populace and vehicles utilizations, it’s getting hard to keep up and distinguish vehicles in brief timeframe. Thus, such close to home data is accessible just to government access and a few organizations who pay government to share that information. To add straightforwardness numerous organizations unveiled such information with government instruments, for example, SMS administration partnered to government for data or by utilizing cloud served information. Such applications or instruments are named as Vehicle Information Systems which are utilized to discover data with respect to any vehicle either enlisted or is obscure to information on use and spot. Such frameworks are gainful in dealing with the information base of vehicle enrolled effectively. These frameworks are broadly utilized by enormous organizations to keep up the information of vehicles left in their place. Likewise utilized by Police and other protection association to find dubious things. Large numbers of openly accessible such administrations or virtual products got obsolete or beaded with the ascent of OS refreshes. IOS has just scarcely any such applications coming up and generally individuals who use IOS need to depend on SMS administration or government sites. Despite the fact that administration give data on solicitation however it doesn’t share entire information of the specific vehicles. That data is sub-separated in divisions of individuals who are mentioning them which implies any authority like Police can have entire subtleties improbable ordinary individuals because of protection and security reasons. With concentrating of different devices and thoughts that exposed in this framework, we get some answers concerning deserted devices, for example, OCR, Credential Recognition and so on These instruments were great however didn’t functioned admirably over various OS and subsequently Hybrid Variants were presented in investigation which fairly adjusted the exhibition to a degree. In 2019, Indian Government made the stride of digitalization and reported API of such information which was simply accessible to confided in specialists of India. Programming interface apparatus took the large jump in optimizing and accessibility of information with no security break. With the writing and articles, we presumed that distinctive OS administrations are there yet just a couple of administrations act in each OS. To fill the gap of administrations we choose to make a help that will safely and productively work cross-stages.

Solar Power Inverters
Authors:- Meghana S

Abstract- An inverter converts the DC generated by the solar panels to AC which is used by the electrical grids. Inverters are the example of a class of devices called power electronics that regulate the flow of electrical power.

Concentrated Solar Power
Authors:- Nisarga MR

Abstract- Integration technology has become important due to the world’s energy requirements which imposed significant need for different methods by which energy can be produced or integrated, in addition to the fact that integration of solar energy into non-renewable sources is important as it reduces the rates of consuming of non-renewable resources hence reduce dependence of fossil fuels. Basically, there are two types of solar power generation used in integration with grid power – concentrated solar power (CSP) and photovoltaic (PV) power. CSP generation, sometimes known as solar thermal power generation, is much like conventional thermal power generation that converts thermal energy (steam) into electricity.The direct current is then converted to alternating current, usually using inverters and other components, in order to be distributed onto the power grid network.

A Study of HRM and Digital Transformation in Organization’s Strategy and Policies: Reshaping HR Space
Authors:- Phd. Scholar Miss. Sunakshi Verma, Dr. Neeti Rana

Abstract- A digital strategy is essential for “Future-proofing” a Company That wants to stay ahead of the competition.This research paper emphasized the importance of artificial intelligence and digital technologies in HR management: Its review three areas related to Digital Transformation in Organization” Digital workforce”, ”Digital Workplace” and “Digital Management & employee”, its showing most important issues at present are cloud Computing, Internet of things (IoT), exabytes of data and artificial intelligence(AI).The objective of this study “Digitalisation + Transformation = Productivity” this everyone can agree that under pressure and confusion, digital transformation involves a number of important changes, time-saving, opportunity, reshape and reinforce their roles within their organization. The paper illuminates to explore the use of technology-driven tools in HR professionals to use these innovations in positive ways. In this study I worked primary and secondary data has been collected through structured Questionnaire and Secondary data was collected from business magazines, Case study, Published data, books, e-journals, newspapers- the novelty of this study consists in exploring the HRM digitalization process in the organization.

Plant Disease Detection Using Neural Network
Authors:- Ms. Harsha Gupta, Aakash Bhatt, Adarsh Verma, Anshu Kr. Singh, Tushar Bhatt

Abstract- When plants and crops are suffering from pests it affects the agricultural production of the country. Usually, farmers or experts observe the plants with an eye for the detection and identification of disease. But this method is often time processing, expensive and inaccurate. Automatic detection using image processing techniques provide fast and accurate results. This paper cares with a replacement approach to the development of a disease recognition model, supported leaf image classification, by the utilization of deep convolutional networks. Advances in computer vision present a chance to expand and enhance the practice of precise plant protection and extend the market of computer vision applications within the field of precision agriculture. a unique way of training and therefore the methodology used to facilitate a fast and straightforward system implementation in practice. All essential steps required for implementing this disease recognition model are fully described throughout the paper, starting from gathering images to make a database, assessed by agricultural experts, a deep learning framework to perform the deep CNN training. This method paper may be a new approach in detecting plant diseases using the deep convolutional neural network trained and finetuned to suit accurately the database of a plant’s leaves that was gathered independently for diverse plant diseases. The advance and novelty of the developed model dwell its simplicity; healthy leaves and background images are in line with other classes, enabling the model to distinguish between diseased leaves and healthy ones or from the environment by using CNN. Plants are the source of food on earth. Infections and diseases in plants are therefore a big threat, while the foremost common diagnosis is primarily performed by examining the plant body for the presence of visual symptoms [1]. As an alternative to the traditionally time-consuming process, different research works plan to find feasible approaches towards protecting plants. In recent years, growth in technology has engendered several alternatives to traditional arduous methods [2]. Deep learning techniques are very successful in image classification problems.

A Implementation of Digital Image Forgery using DWT and SIFT Features
Authors:- Research Scholar Chavi Rana, Asst. Prof. Gyanendra Kumar Singh

Abstract- The use of digital photography has increased over the last few years and this trend has opened the door for image forgery. Image forgery has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving images) Existing systems integrate block-based and key point-based forged detection in this work methods DWT extraction and SIFT Features with SLIC super pixel segmentation algorithms is proposed to detect the forgery area from the dataset. Existingwork can roughly indicate suspicious, forged areas. The proposed system approach reduces image debugging increase the accuracy and detects copy-moving image forgery region. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image forgery is proposed. This simulation executed in MATLAB simulation.

Detection of Digital Forgery Image using Discrete Wavelet Transform and SIFT Features Extraction
Authors:- M.Tech Scholar Deepali Pal, Prof. Amit Shrivastav

Abstract- Digital images have a very significant role in various fields like medical imaging, journalism, criminal and forensic investigations. Because of the widespread availability of photo editing software and tools, it becomes problematic to use the digital images in applications where their genuineness is of prime importance. Therefore, it is necessary to create forensic techniques which are capable of detecting the tampering in image. Most common operations that are involved in the creation of forged images are contrast enhancement, copy-paste forgery etc. In this paper, we present different techniques for detecting global contrast enhancement and copy-paste forgery. The proposed technique for the detection of contrast-enhanced image is based on contrast calculation. The use of digital photography has increased over the last few years and this trend has opened the door for image forgery. Image forgery has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving images) Existing systems integrate block-based and key point-based forged detection in this work methods DWT extraction and SIFT Features with SLIC super pixel segmentation algorithms is proposed to detect the forgery area from the dataset. Existing work can roughly indicate suspicious, forged areas. The proposed system approach reduces image debugging increase the accuracy and detects copy-moving image forgery region. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image forgery is proposed. This simulation executed in MATLAB simulation.

Design and Experimental Investigation of Thermal Performance of Different Heat Sink for High Power Led Lights
Authors:- Ravindra.H. Raut , Ass. Prof. S.S Jaware

Abstract- LEDs have been used in many products due to their longevity, more power saving, and higher lumens per watt. About 80% of the electrical power is wasted as heat or reductant heat, which increases the junction temperature of the LED’s. This increase in the temperature in the LED’S decreases the longevity and color of LED’S. Proper thermal management is required to remove this heat effectively. The heat sink design and usage of proper thermal interface materials for increasing the heat removal is required. In this paper, temperature increase in a LED fixture during a time interval with and without thermal interface material is measured and tabulated to find the effectiveness of the thermal interface material in removing more heat is studied. In addition, a simulation using Solidworks thermal simulation is done to validate the analytical thermal-time study results. The entire study provides a guideline for the design of LED high bays in the future and demonstrates the importance of the thermal interface materials in the design studied.

PSO and Automatic Finite Deterministic Algorithm for Secured Energy Efficient Routing in Wireless Sensor Network
Authors:- M.Tech. Scholar Diksha Jharbade, Prof. Amit Shrivastav

Abstract- 5G wireless sensor network (WSN) is a network of autonomous nodes used to monitor the environment. Energy competence or secure data transmission are measured as mainly imperative devise goals for WSN. With the increase in difficulty of workstation networks, the increase in network-based attacks has attracted consideration of different researchers from several fields. Therefore, many intrusion detection systems (IDS) have been implemented to address various aspects of complex safety, such as DoS, worms, viruses, malware, etc. IDS automation has been planned to recover realization of energy resourceful routing in wireless sensor networks in a secure manner. Automatic finite deterministic and particle swarm optimization (PSO) solutions for intrusion detection and data transmission performed in a secure manner by determining and following an optimized path Routing through the best path can recover overall presentation of sensor network in wireless technology and has been controlled through various indicators (such as power expenditure, capacity, network life, active nodes and dead nodes). In this work, threat model and safety objectives for secure routing in wireless network. This simulation executed in MATLAB simulation platform.

Consumer-Service Provider Connect
Authors:- Shrestha Sharma, Nabhya Jha, Nimal Nainan, Shweta Tripathi

Abstract- We have created an online portal that helps the users using it to either provide services or seek services.The main aim of this project is to create a system which connects consumers and service providers. The consumers and service providers can both post their targeted requirements and seek out each other. The jobs may include short or long term services. Consumers can browse for services and send requests to the service providers by filling the required details. The service provider who finds the details of the service in accordance with his/her schedule and is ready to provide the service will accept the request and will be assigned to the consumer. This will open a new window of opportunities for several people in situations where they cannot actively go out to seek jobs or cannot work consistently.

A Study of HRM and Digital Transformation in Organization’s Strategy and Policies: Reshaping HR Space
Authors:-Phd. Scholar Sunakshi Verma, Dr. Neeti Rana

Abstract-A Digital strategy is essential for “Future-proofing” a Company that wants to stay ahead of the competition.This research paper emphasized the importance of artificial intelligence and digital technologies in HR management: Its review three areas related to Digital Transformation in Organization” Digital workforce”, ”Digital Workplace” and “Digital Management & employee”, its showing most important issues at present are cloud Computing, Internet of things (IoT), exabytes of data and artificial intelligence(AI).The objective of this study “Digitalisation + Transformation = Productivity” this everyone can agree that under pressure and confusion, digital transformation involves a number of important changes, time-saving, opportunity, reshape and reinforce their roles within their organization. The paper illuminates to explore the use of technology-driven tools in HR professionals to use these innovations in positive ways. In this study I worked primary and secondary data has been collected through structured Questionnaire and Secondary data was collected from business magazines, Case study, Published data, books, e-journals, newspapers- the novelty of this study consists in exploring the HRM digitalization process in the organization.

Optimization of Functional Beverages made from Ginger Cumin and Honey
Authors:- Rasik R.Thkur, Nitish V Khanvilkar, Sayli N Kale, S.M. Lokhande, Amol Prakash Sonone

Abstract- Ginger and honey both have an excellent nutritional and medicinal property that is why the combination of both in the right proportion makes highly nutraceutical as well refreshing drinks. Energy drinks are widely consumed by adolescents as these claim to improve performance, endurance, and alertness. Looking at the contents in the energy drinks and their benefits, the industry may like to relook at what the consumers really need. We are developing the functional drink by using ginger, Cummins, honey with the addition of water to rehydrate. The present investigation was undertaken with the objective of standardizing the process for the preparation of the functional beverage product was evaluated for proximate analysis, sensory analysis, and storage condition. Beverage contain 13% Brix, 0.20 % Acidity, these parameters remain constant at cold storage for more than 30 days. We used honey in the product instead of sugar, jaggery, or any other artificial sweetener for better consumption for diabetic patients. Increased urbanization, rising disposable income, and growing health consciousness among the youth have increased the demand for non-carbonated drinks called energy drinks.

Using GIS to Assess the Hydropower Potential of a Run-of-River Small Hydropower Plant in Chamkhar River, Bhutan
Authors:- Dorji Letho, Leki Dorji, PhuntshoTashi, Jamyang Seldon

Abstract- Bhutan is a considered as a carbon negative country as forested sequestered more amount of CO2 as compared to the CO2 emission through variety of activities. Being the world’s only carbon negative economy, hydropower development continues to play a major role in Bhutan’s sustainable economic development.Clean energy sources such as hydropower, are crucial in combating global warming and the effects of it. Bhutan is blessed with one of the highest per capita hydropower potentials in the world and has only harnessed around 6.3% of its total hydropower potential so far. It also has numerous potential sites for small scale run-of-river hydropower, which have minimal adverse environmental impacts, in contrast to large scale hydropower plants. The limitations fostered to such development have been imposed by the inaccessibility physically to these locations, owing to the rugged terrain making a difficult to select an appropriate location, thus it could be partially solved and boosted by the use of GIS technology of ArcGIS tools. In using such tools, enable us to explore hydropower potentials in faster, cost effective and precise ways. This paper studies the location of the run-of-river small scale hydropower potential along the Chamkhar River in Bhutan. Ninety-eight potential locations were found under the criteria of the head, discharge and slope criteria out of which twenty-seven locations lied outside protected bounds. Of these only ten of them are further taken to get the most optimized location and this result can be refined by field studies to select the most optimized location among the potential ones.

Design & Fabrication of Sugar Globules Making Machine
Authors:- Associate Prof. N. H. Chahande, Amit H. Pall, Pranjali P. Zade, Akshay V. Nimje, Tushar K. Karwade

Abstract- As progress of Medical Science increasing day by day likewise the side effect of allopathic medicines are also being seen in the world. Looking to the adverse effect of allopathic medicines population of this era is moving towards the Ayurveda & Homeopathic Medicines because it is well known that adverse effect of homeopathic & Ayurveda medicines are quite low. Homeopathic globules are commonly used in clinical practice, while research focuses on liquid potencies. Sequential dilution and succession in their production process has been proposed to change the physico-chemical properties of the solvent(s).Various machines have been used over the years to prepare homeopathic medicines. Although these machines follow the same principles, i.e. energetically mixing the medicines and diluting them significantly, their mode of operation is different from each other.

Detection of Autism Spectrum Disorder Using Machine Learning
Authors:- Kruthi C H, Tejashwini H N , Poojitha G S, Shreelakshmi H S, Asst. Prof. Shobha Chandra K

Abstract- Autism spectrum Disorder (ASD) also known as Neuro-developmental disorder that affects people’s interaction, learning and communication skills. Despite the fact that identification of this syndrome can be done at any age, its symptoms typically appear in the first 2 years of life. Determining the autism traits through screening tests is extravagant and extensive. With the improvement of artificial intelligence and machine learning, autism can be detected at quite an early stage. However a number of studies have been done using different techniques, these studies did not provide any final conclusion about detecting autism traits among the people of age group 3 years and below. Hence the paper aims to present an autism prediction model using machine learning techniques and to develop a web application that could successfully predict autism traits of a person. In other words, this paper focuses on developing an autism screening application for detecting the autism spectrum disorder traits among the people of age 3 years and below. This project model was evaluated with AQ 10 dataset (1054 datasets) and 50 actual dataset collected from people with and without autism traits. The Analysis results showed that the proposed prediction model gives better results in terms of specificity, precision, sensitivity, accuracy and f1 score for both datasets.

IoT Based Air Pollution Monitoring System
Authors:- Ashwini, Anvitha Poojary, Anvitha U, Akshata Hedge, Prof. Dr. Mohideen Badhusha S

Abstract- Internet of Things (IoT) is a worldwide system of “smart devices” that can sense and connect with their surroundings and interact with users and other systems. Global air pollution is one of the major concerns of our era. Existing monitoring systems have inferior precision, low sensitivity, and require laboratory analysis. Therefore, improved monitoring systems are needed. To overcome the problems of existing systems, we propose a three-phase air pollution monitoring system. An IoT kit was prepared using gas sensors, Arduino IDE (Integrated Development Environment), and a Wi-Fi module. This kit can be physically placed in various cities to monitoring air pollution. The gas sensors gather data from air and forward the data to the Arduino IDE. The Arduino IDE transmits the data to the cloud via the Wi-Fi module. We also developed a Web front-end so that users can view and access relevant air quality data from the cloud.

The Multi-Phase Spatial Meta-Heuristic Algorithm for Public Health Emergency Transportation
Authors:- Fariba Afrin Irany, Arnav Iyer, Armin R. Mikler, Rubenia Borge Flores

Abstract- The delivery of Medical Countermeasures -MCMs for mass prophylaxis in the case of a bio- terrorist attack is an active research topic that has interested the research community over the past decades. The objective of this study is to design an efficient algorithm for the Receive Reload and Store Problem –RSS in which we aim to find feasible routes to deliver MCMs to a target population considering time, physical, and human resources and capacity limitations. For doing this, we adapt the p-median problem to the POD-based emergency response planning procedures and propose an efficient algorithm solution to perform the p-median in reasonable computational time. We present RE-PLAN, the Response PLan Analyzer system that contains some RSS solutions developed at The Center for Computational Epidemiology and Response Analysis (CeCERA) at the University of North Texas. Finally, we analyze a study case where we show how the computational performance of the algorithm can impact the process of decision making and emergency planning in the short and long terms.

A Review Article Hybrid Power System with Integration of Wind, Battery and Solar PV System
Authors:- Vijay Patre, Associate Prof. Dr. Manju Gupta

Abstract- As the race for global industrialization begin late in 18th century, the developing technology made humans to depend on energy, so as the energy crisis begins, in this modern era, electricity become a most essential need of human beings, from household to industrial work. So, the purpose of the project is to generate electricity without using non-renewable resources and pollution. Since, renewable standalone energy generation systems have disadvantages, which need to be overcame by hybrid systems. Wind and solar energy have being popular ones owing to abundant, ease of availability and convertibility to the electric energy. This work covers realization of hybrid energy system for multiple applications, which runs under a designed circuitry to utilize the solar and wind power. And a designed circuitry for more efficient results, and inverters to convert the electrical energy as per demand.

Face Mask Detector
Authors:- Keerthi Yaramala, Jamula Keerthi Sameera, Harshitha Yarlagadda, Bommina Naga Pranathi

Abstract- In this new era where we are experiencing a pandemic and people all around the world are advised to wear masks, some people are not used to it and are avoiding to wear masks. The motivation behind this projects is that if we can take help of AI to detect people wearing or not wearing masks in public places, it would be helpful to increase our safety. If deployed correctly, the mask detector could potentially be used to help ensure our safety.

Automation and Monitoring of Greenhouse
Authors:- Asst. Prof. Seema G.Bavachkar, Rutuja Upadhye, Mauyri Shinde, Sukanya Swami

Abstract-In traditional agriculture, farmers must regularly visit their farmland to measure various environmental parameters such as temperature, humidity, light intensity and soil moisture in order to grow the right crops on the right soil at the right time.Greenhouse cultivation, on the other hand, is a system in which a farmer grows crops in an ecological environment where all ecological parameters are adjusted according to the plant species. Greenhouse automation is a way for farmers to automatically monitor and control the greenhouse environment anytime, anywhere. In this article, the authors propose an automated greenhouse monitoring and control system that includes various sensors such as temperature sensors, moisture sensors, light sensors, and soil moisture sensors for harvesting.

Review Paper on Harsh Environmental Structural Health Monitoring
Authors:- Hossain Ahmed, Seifollah Nasrazadani, Shuai Ju

Abstract- Proper maintenance and continuous monitoring are essential for ensuring the safety of the structure. Many types of sensors are developed to monitor the degradations of the structure, especially in a harsh environment, to identify the structural defect at a preliminary stage. To consider the material as a sensor in a harsh environment should have the ability to withstand high temperatures or at a high vibration, electromagnetic interference, high strain, etc. The data acquisition technique and an optimum number of the sensor to get accurate data are a significant factor for SHM, especially at the harsh environment. This review will describe the different types of harsh environments and the suitable and application of reliable, high-efficiency sensors based on the harsh environment.

Geospatial Mapping of Flood Susceptibility via Multi-Criteria Analysis AHP and GIS: La Paz Basin, Baja California Sur., Mexico
Authors:- Prof. Joel Hirales-Rochin

Abstract- The research presents the multi-criteria analysis approach (MCA) to describe the effective use of geospatial techniques for the reduction of geohydrological risk and its relationship with urban territorial development at the local level, in the case of the La Paz Basin, Baja California Sur., Mexico. In addition, Geology is presented as a tool to identify areas of geohydrological risk, useful to determine the close relationship between the geological space and the sustainable urban development of a city. From this interaction, it is possible to respond to the growing demand for environmental and urban solutions. Today’s cities are characterized by rapid and poorly planned urbanization, which, together with climate change, has exacerbated the risk of flooding in urban and rural areas globally, resulting in devastating loss of human life and property.At the national, regional and local level where the study area is located, floods are one of the most susceptible geohydrological hazards. The objective of this research is to identify these areas of risk of susceptibility to flooding and to make known the factors that influence it, such as the growing number of new urban areas, which are not linked to an adequate analysis of the hydrological geographic environment and little knowledge of the main factors that control these risk conditions.The methodology was based on a characterization of the geological and hydrogeological conditions of the basin of the city of La Paz; Mexico. The methodology of the Analytical Hierarchy Process (AHP) applied to generate the flood susceptibility map was built based on thirteen influencing parameters, that is, elevation, slope, distance from the drainage network, geomorphology, drainage density, flow accumulation, rainfall, land use / vegetation, geology, stream power index, topographic moisture index, and topography curvature. All this, through geographic information systems (Arcgis). The results represent the first stage of a larger-scale project with the purpose of updating the knowledge of vulnerability and geo-hydrological risks of the study area. Therefore, it is possible to contribute new knowledge to be used in a sustainable growth of the city’s population, the improvement of current construction standards and the corresponding zoning to anticipate its development in an orderly manner. Finally, it is considered that this type of zoning of areas susceptible to risks (urban settlement scale) provides an analysis of the risk conditions where the citizen of any city can be located in his own community and know his own conditions of civil protection. Knowledge that currently most risk studies only offer large-scale results and a broader vision.

Structural Analysis of I-Girder Bridge and Comparison for Various Loading
Authors:- Mr. Abhijeet Fopase, Asst. Prof. Ishant Dahat

Abstract- I-beams and plate design in terms of the simple capital value of the superstructure, the advantages of the shape of the boxing beam, such as better appearance and reduced maintenance, may well deserve the evaluation of the boxing beam as an alternative for any bridge in the span range from 45 m to 100 m. For bridges with a significant curvature of the plan, box beams should always be considered. In particular, if more websites are introduced (than would be used with straps), thinner web panels will need more rigidity. Nevertheless, they may still have a lower shear stress limit and be less effective in bending. Wide compression flanges can also be less than fully effective due to bending considerations (plate beam flanges are usually fully effective). In this paper, various bridges of I-brothers are analyzed using BRIDGELINK software.

Effect of Depression on Functional Recovery – A Correlational Study
Authors:- Md. Zahir Uddin Akanda

Abstract- Study design and purpose: A quantitative and non experimental, correlational study was conducted in order to investigate the relationship between the Beck Depression Inventory (BDI) score and the Functional Independent Measure (FIM) score of the patients with Spinal Cord Injury. Objective: To find out Is there a relationship between BDI and FIM score? How strong is that relationship? What is the direction of the relationship (positive or negative)? Setting: Centre for the Rehabilitation of the paralysed (CRP) Spinal Cord Injury hospital indoor department: Chapain, Savar, Dhaka. Methods: Stratified – systematic random sampling was used to select the participants. Participants were individually interviewed using a semi structured questionnaire, the Functional Independent measure (FIM) and the Beck Depression Inventory (BDI). Results:The data were subjected to statistical analysis. Using a parametric Pearson test, a significant negative correlation (r=-0.3586, p<0.02, for two tailed hypothesis) between the FIM score and BDI score was found. The descriptive data calculated as percentages. Among the patients studied 20% had mild mood disturbance, 7% had borderline clinical depression, 33% had moderate depression, 20% had severe depression, and another 20% had extreme depression. Conclusion: Our results have important implications for the treatment of patients with SCI. the findings indicate that the patients BDI score were negatively related with FIM scores. In our opinion these data justify the provision of a psychological service in every hospital where patients with SCI are treated. Further research is required to explore the reason behind this correlation.

A Study of Setback Effect on Multi-Storied Building with Mass and Stiffness Irregularity
Authors:- M. Tech. Scholar Nimant N Chopada, Asst. Prof. Arjun M Butala

Abstract- This research concerned with the compare to regular building with setback building with consider various irregularities on the seismic response of structure. Architects typically suggest irregular structures for the sake of the structure’s architectural elegance. As a result, seismic responses of buildings with unusual configurations must be determined. The structural configuration of a multi-story building affects its actions during a strong earthquake. One of the most common causes of failure during earthquakes is an irregular plan or elevation configuration. As a result, irregular structures, especially those in seismic zones, are a source of concern. Since, structures normally have a combination of irregularities, predicting the seismic response based on a single irregularity cannot be accurate. It is critical to choose the form, degree, and position of irregularities in the design of structures because this contributes to the structure’s usefulness and aesthetics. Therefore, the study the seismic behaviour of regular building with compare to setback building with different irregularities. we have considered 7th floor model consider with provide mass irregularity and stiffness irregularity. All frames are subjected to seismic loads and the response of the structures is analysis in ETABS software with different parameter e.g., displacement, storey drift, storey shear, storey stiffness.

Wireless Sensor Node Energy Optimization by Packet Routing and Clustering
Authors:- Dr. Shweta Singh, Jamvant Omkar

Abstract- Wireless network depends on life of battery as communication depends on calculation. Many of data collection activity depend on sensors continuous information collection. Hence energy optimization required for the long life of network. So nodes communications need some intelligence for sending data to the base station. This paper has developed a clustering approach for nodes energy optimization as genetic algorithm adopts dynamic situation without any guidance. Paper has developed invasive weed optimization algorithm which select cluster center from the available nodes and reduce energy losses. It was obtained that proposed model has utilized node node energy and position in fitness function for cluster center selection. Experiment was done on different number of nodes and network area size. Result shows that proposed model has increase the life span of WSN.

Performance Evaluation of Interference Cancellation methods in Cognitive Radio for Aeronautical Communication System
Authors:- Santhiya Lakshmi, Vineetha Mathai, Prof. Indumathi

Abstract-The Very High Frequency band (VHF) currently used for aeronautical communications is becoming congested, and hence L band is used for meeting the future capacity requirements in aeronautical communications which will require much greater use of data communications. Due to air traffic, cognitive radio based air to ground communication is introduced which provides dynamic spectrum access to airplanes to overcome the spectrum scarcity problem and in that spectrum sensing is done to find vacant place for effective communication. In the spectrum sensing, the DME and LDACS is the primary and secondary system. When the secondary system access the primary’s vacant place, the DME interference exist in the LDACS signal. This affects the effective communication from air to ground. Thus we propose three new approaches to mitigate the interference, one of which is a space time block coding method and the another two types are Pulse blanking algorithm and Decision directed noise estimation. In this work, we analyse and remove the interference in LDACS signal and compare the performance of these interference reducing algorithms.

Border Security System for Intrusion Detection Using Robotic System, Thermal Imaging Camera, Computer Vision and Machine Learning
Authors:- Vastav Bharambe, Om Gaikwad, Mohan Kshirsagar

Abstract- Border Security is a very crucial issue for every country, nowadays handling terrorisom and security breach is the biggest challenge for every country, terrorists generally use multiple on and off terrain ways to breach the border lines. As per the BBC NEWS report every year 70+ intrusions happen in border areas, Also as per the report of The New Indian Express 111 terrorist infiltrates j&k border since 2019. These intrusions are very dangerous for the country in terms of GDP growth. The novelty of our research is we are developing a system which has capability of detection and identification for human presenase, with the same we are trying to achieve detection and recognition for weapons if the same person is carrying. This system can be used at multiple places such as Government Private Sectors, Research facilities, National and International Banks, Military Facilities. Some Secrete Private Factories. The Design aspect of this system we came up with a novel idea where we are using a Thermal Imaging Camera and a Normal CCTV camera, we are processing both the images at the same time towards finding the Presence of Human living beings. As per the study Times of India border line breach happens in the form of animals means Territories wear such costumes.

Fruit Counting For Automated Inventory Management System Using Neural Networks
Authors:- Athira Mahesh, Nagaraja Hebbar N, Preethika

Abstract- In agricultural sector the problem of identification and counting the number of fruits on trees plays an important role in crop estimation works. At present manual counting of fruits is carried out at many places. Manual counting has many drawbacks as it is time consuming and requires plenty of labors. The automated fruit counting approach can help crop management system by providing valuable information of forecasting yields or by planning harvesting schedule to attain more productivity. This work presents an automated and efficient fruit counting system using computer vision techniques and neural network object detection methods. Neural networks have the capability of recognizing complex patterns and they shows better accuracy when compared with other techniques.

College Feedback System
Authors:- Mr. Sourabh C Bal, Mr.Rushikesh S Kadam, Prof. Mr.Kartik Nikam, Mr. Muzamil M Shaikh

Abstract- Nowadays, Nowadays, instructive Institutions are paying expanding regard for the perspectives on Student’s on the inclusion in learning and educating through surveys or inputs. Online Feedback System is a web application which gives base to the schools/universities to lead understudy’s input on the web. The objective of the investigation was to foster an all-in-one input framework serving the two understudies and educators. The framework includes age and examination of educator’s criticism pages, synopsis, and a conveyance of input. The framework is created for the all-undergrads and staff individuals Also Students can offer input about their workforce individuals. The understudy needs to look over phenomenal, generally excellent, great, agreeable, poor. Then, at that point subsequent to endeavoring each question needs to present his input with the framework. This on the web input framework is the ideal spot to discover criticism assessed as per the prerequisites and it is the effective one to get criticism examination of understudies and staffs.

Plumbing Pool Website
Authors:- Dr. Deepica Dom Iac, Abhishek Bagwari, Anas Khan

Abstract- The main purpose of doing the project at plumbing pool Website for plumbers to get us aquaintedwith make a particular project look good.Customer has it becomesa concern for many around the market, , this project helps toprovide plumbers through our site a purpose of this project to show how the plumbing system works. The main purpose of this study is to improve the plumbing industry and convinent way to provide plumber, which can help customer to find plumber and all necessary information online plateform.

A Review on IOT Based Irrigation System by Using AES Algorithm
Authors:- Miss. Dipali Kaluse, Prof. Jayant Rohankar, Prof. Mukul Pande

Abstract- India is mainly an agriculture country. Agriculture is the most important occupation for the most of the Indian families. This system have sensors for soil moisture, temperature sensor and humidity sensor, rain sensor, day night sensor, microcontroller, Wi-Fi controller, motor, rechargeable battery, and AC adaptor. The microcontroller of the control unit is programmed with threshold values of the temperature and moisture content. This sensor senses the various parameters of soil moisture and gets automatically ON/OFF the motor according to these parameters. These sensed parameter and status of the motor will be shown on mobile phone, and laptop.

Automation in LPG Cylinder Monitoring System
Authors:- A.R.Telepatil, Tejal Bhosale, Rutuja Sutar, Dipti Vardhamane

Abstract- The image processing is used to detect, recognize and calculate the number of objects. The proposal of this system is to develop the electronic solution using the image processing technique to reduce human error and also human efforts. In this solution we are going to target problems relevant to LPG like leakage of LPG gas. For counting the number of cylinders in godown, camera will capture the image of cylinders from top side. Using image processing, the number of particular size circles (uppermost circle of cylinder) will detect and from the number of circles, we will get the number of cylinder count. The LPG gas may lead to explosion and suffocation also. Using gas sensor which detects the leakage of LPG and the message of alertness through Arduino will give on the LCD display as well as the buzzer will turn on.

A Micro Crack Detection & Condition Monitoring of Bearing Using DWT Method in Catia
Authors:- M. Tech. Scholar Ketan Patil, Asst. Prof. G. R. Kesheorey

Abstract- Nowadays, fault detection in induction motors has gained importance. Motor health monitoring is performed to diagnose their operating condition using vibration signals. These signals are processed using different signal processing methods to extract the characteristic parameters permitting localization of the fault. In this paper, we propose a diagnostic method based on Hilbert and Discrete Wavelet Transforms for the detection of bearing faults in asynchronous machines. The discrete wavelet transform (DWT) is intended to provide the detail coefficients while the Hilbert transform (HT) is used to obtain the temporal envelope then the envelope spectrum of the detail. The kurtosis value indicates the optimum decomposition wavelet level containing the significant frequencies corresponding to faults for early detection. The result obtained by HT-DWT is more suitable for the analysis of emergency signals. This technique is effective for either stationary or non-stationary signals. Healthy case is compared to faulty case in order to extract frequencies characterizing different faults. The validation of this approach is evaluated by comparing theoretical with experimental results.

A Mutidisk Clutch Design & Performance Optimization Using Anova Method
Authors:-M. Tech. Scholar Shubham Verma, Asst. Prof. G. R. Kesheorey

Abstract-Multi plate clutch is one of the important part in the power transmission systems. Good design of clutch provides better engine performance. Multi plate clutch is most widely used in racing cars and heavy duty vehicle where high torque transmission required and limited space is available. In this project, we have designed a multi plate clutch by using empirical formulae. A model of multi plate clutch has been generated in CATIA V5 and then imported in workbench for Structural Applications. We have conducted structural analysis by varying the friction surfaces material and keeping base material as Steel. By observing the results, comparison is done for materials to validate.

Temperature Monitoring System Using Bolt IOT
Authors:- Ms. Megha Yadav, Ms. Neha Bargale, Ms. RutujaKadole, Ms. Aasiya Chaus, Asst. Prof. Mrs. Seema.G. Bavachkar

Abstract- Temperature assumes a major half during this day and age, even temporary amendment in temperature at enterprises could cause blasts that prompts debacles and loss of valuable existence of individuals. To defend people from these calamities we’ve planned this enterprise that alarms people by causing messages, messages and tweets once temperature passes boundary esteem or if any irregularity is known. Through these tweets the individual will inform the specialists concerning the temperature passing boundary esteem, then, at that time there is a probability of taking preventive measures to forestall catastrophes at completely different enterprises like drug organizations, and then forth In drug organization’s certain temperature ought to be preserved, forward temperature surpasses, the medication created around then cannot bear item utilized for medication since they may be unsafe whenever utilized for prescription as temperature wasn’t steady, transfer concerning an unbelievable misfortune for the company. Our item can likewise be helpful to minimize these sorts of misfortunes.

Optimization of the WSN Network Based on the EAMMH and OLIN Algorithm
Authors:- Atul Asija, Asst. Prof. Aashish Kumar Sharma

Abstract- Wireless Sensor Network (WSN) is a network type that consists of several sensor nodes used for particular functions in a specific area. These nodes forward the data to their nearest base station (BS). For the transmission of data, nodes with restricted energy can be used. A big challenge in WSN is the high quantity of energy needed for the little volume of data. Monitored processes that provide time-stamped data may alter significantly over time in real-world sensor networks. The OLIN (online information network), an online data mining approach, automatically accommodates the drift rate of the idea in a non-stationary data stream by continually generating a classification model from each sliding training example window. This paper presents a new IOLIN (incremental online information network) data mining algorithm in real-time, which saves a substantial amount of calculation effort by updating an existing model as long as no major idea drift is observed. The suggested technique relies on the overlooked “Information Network” (IN) decision-tree classification model and provides three different sorts of model updates. No statistically significant distinction between precision of the incremental algorithm (IOLIN) vs. renewable algorithm (OLIN) was discovered in studies with multi- year streams of traffic sensor data.

Arduino Based Solar Tracker
Authors:- Asst. Prof. Rupalee S. Ambekar, Shubham Saket

Abstract- A solar photovoltaic (SPV) cells based dual axis tracking system on Arduino Uno platform is implemented in this project for achieving maximum power during a day. The key idea of this article is implementing an automatic dual axis solar tracking system. Alignment of solar panel with the Sunlight for getting maximum solar radiation is experimented. This system tracks the maximum intensity of light in terms of maximum power point (MPP). When the light intensity decreases, its alignment changed automatically for catching maximum light intensity. This project shows implementation and analysis of dual axis solar tracker.

A Review Article In Distribution System Minimum Loss Reconfiguration Using Ant Colony Optimization Algorithm
Authors:- PG Schoar Mrs. Prabha Uikey, Prof. Dr. Anil Kori (HOD)

Abstract-This paper presents a comparative study of three Ant Colony Optimization (ACO) algorithms applied to Distribution Network Reconfiguration Problem. The original ACO algorithm called the Ant System (AS) and two of its variants viz. MAX-MIN Ant System (MMAS) and Ant Colony System (ACS) were used to minimize active power loss in distribution systems. The algorithms were coded in MATLAB and numerical experiments were conducted on two benchmark systems. The results indicate that even though all the three algorithms are capable of solving distribution network reconfiguration problem, ACS is found to perform better for larger systems.

Automation And Monitoring of Greenhouse
Authors:- Asst. Prof. Seema G.Bavachkar, Rutuja Upadhye, Mauyri Shinde, Sukanya Swami

Abstract-In traditional agriculture, farmers must regularly visit their farmland to measure various environmental parameters such as temperature, humidity, light intensity and soil moisture in order to grow the right crops on the right soil at the right time.Greenhouse cultivation, on the other hand, is a system in which a farmer grows crops in an ecological environment where all ecological parameters are adjusted according to the plant species. Greenhouse automation is a way for farmers to automatically monitor and control the greenhouse environment anytime, anywhere. In this article, the authors propose an automated greenhouse monitoring and control system that includes various sensors such as temperature sensors, moisture sensors, light sensors, and soil moisture sensors for harvesting.

Electron Orbit’s Shape for Hydrogen and Helium Atoms
Authors:- Refah Saad Alkhaldi

Abstract- This paper is a continuous work of some facts about the electrons in the first orbit of H and He atoms. Position of electron according to angle around the nucleus, the shapes of the first orbit, as well as the electron intensity from De Broglie equation are all illustrated.

A Review on Three Wheeler Electric Vehicle
Authors:- Pramod K N, Prashant D H, Akash Shetty, Karthik K, Abhishek B

Abstract- Electric vehicles are believed to be an effective solution for reducing greenhouse gas emissions. Despite extensive study on the attributes and characteristics of electric vehicles and their charging infrastructure design, the development and network modelling of electric vehicles are still evolving and limited. This article provides a comprehensive review of electric vehicle studies and identifies existing research gaps in the aspects of theories, modelling approaches, solution algorithms and applications.

Self-Driving Car: Autonomous Driving Using Lane Detection
Authors:- Mr. Mohd.Aafeen H Shaikh, Mr. Shivdatta D Bapat, Mr. Saifali S Rangrej, Prof. Mrs. S G Bavachkar

Abstract- Self-ruling Cars are the eventual fate of driving extravagance, a fantasy about sitting in a vehicle and giving your objective as an information and it takes you to your ideal spot. To make this little glimpse of heaven engineer and automakers from one side of the planet to the other have only one objective of their life, that is a completely settled Autonomous vehicle. Albeit this is as yet a fantasy however we have been very near accomplishing the last objective. This accompanies difficulties, challenges that come helpful while making something fantastic, and the Autonomous vehicle is no not exactly an outlandish game. It requires soaking up new innovations with the auto, make it work splendidly together, in light of the fact that wellbeing of the traveler will depend on oneself driving vehicle. Throughout the decade the Auto business has progressed fundamentally towards a future without a human driver. Specialists are right now attempting to beat the mechanical, political and social difficulties associated with making self-ruling vehicles standard. These vehicles should be protected, dependable and cost-proficient. Interfacing them and making coordination components could help accomplishing these objectives. This undertaking proposes a vehicle-to- everything (V2X) coordination convention for independent vehicles (AVCP: Autonomous Vehicle Coordination Protocol) and a testing climate where it will be assessed. The AVCP plans to fundamentally lessen travel time and increment security for self-governing vehicles by empowering them to trade detecting and directing data with one another and with side of the road units (RSUs).

Investigations on Various Concrete Properties by Replacement of Fine Aggregate with Stone (Quarry) Dust
Authors:- Y.Anand Babu, Asst. Prof. Modi Musalaiah, Asst. Prof. B.Srikanth

Abstract- The global consumption of natural sand is very high, due to the extensive use of concrete. In general, the demand of natural sand is quite high in developing countries to satisfy the rapid infrastructural growth, in this situation developing country like India facing shortage in good quality natural sand. Particularly in India, natural sand deposits are being depleted and causing serious threat to environment as well as the society. Increasing extraction of natural sand from river beds causing many problems, loosing water retaining sand strata, deepening of the river courses and causing bank slides, loss of vegetation on the bank of rivers, exposing the intake well of water supply schemes, disturbs the aquatic life as well as affecting agriculture due to lowering the underground water table etc are few examples. The study employed case study design of generation and utilization of quarry dust at chimakurthy quarry. The quarry dust was tested experimentally for technical viability in the production of quarry dust building blocks; an impact assessment was conducted and finally a cost benefit analysis was carried out to determine the commercial viability as well as social cost benefit of utilizing the quarry dust as a raw material in the manufacture of building blocks. All the experimental data shows that the addition of the industrial wastes improves the physical and mechanical properties. Here we will conclude that the strength should be increased at 25% of stone dust. So by this we will say that from 25% on wards we have to use stone dust. But it should not exceed to 50%.

Cad Modelling and Analysis of Axle Shaft of Rice Planting Machine
Authors:- Prof. A.V.Desai, Digambar S. Powar, Mr. Omkar B. Yadav, Rahul T. Patil, Rupesh R. Shinde, Swarup A. Kamble

Abstract- A rice transplanter is a specialized machine fitted with a transplanter mechanism (usually having some form of reciprocating motion) driven by the power from the live axle, in order to the transplant rice seedlings onto paddy field. Rice is a major food grain crop of world. Unlike upland row crops, cultivation of low land rice crop is a labour intensive process. In spite of the common belief of availability of surplus agricultural labour in India, there actually exists a scarcity of skilled agricultural workers during the peak transplanting seasons. If this operation is not done in time the yield goes down. In view of this, there is an urgent need to mechanize this operation. The rice translation process is generally manual which involves number of labour. The process of manual rice transplantation is not so efficient as compared to the mechanical rice transplantation. Machine transplanting using rice transplanter requires considerably less time and labour than manual transplanting. It increases the approximate area that a person can plant.

A Comparative Review of CPU Scheduling Algorithms
Authors:- Muskaan Pirani, Denish Ranpariya, Mihir Vaishnav

Abstract-Multiple programmes can run in memory at the same time, allowing for CPU and I/O overlap. The problem of selecting a process from the ready queue to be performed by the CPU is addressed by CPU scheduling. Because of the need to adjust and evaluate the operating system as well as assess the performance of actual applications, developing a CPU scheduling algorithm and understanding its effect is challenging and time consuming. Since the processor is such a valuable resource, CPU scheduling is critical for achieving the operating system (OS) design goals. The aim of CPU scheduling is to reduce average turnaround time and average waiting time so that as many processes as possible can run at any given time, maximising CPU utilisation. This paper aims to compile a list of the most common CPU scheduling algorithms that have been proposed so far. FCFS, SJF, SRTF, Round Robin, Priority scheduling, HRRN, and LJF are some of the algorithms we look at.

Factors Involved in the Assessment of Durability of Concrete
Authors:- Deepika Srivastava, Md. Tasleem, Ashraf Hussain

Abstract- In this study, the factors involved for accessing the durability of the concrete structures, now the day’s construction field has grown up with lots of advancement of techniques & technologies. We are making structures touching the height of the sky as well as achieved the success to build the structures beneath the ground. While constructing these structures, the durability of the structure is an important phenomenon that we have to keep in mind while adopting the construction method. We should have to be aware of the Structure’s durability or the life of the structure, some important parameters to be considered before its construction that the structure should be ecofriendly, economic & durable, So many researches were done on the durability of concrete structures, SEM testing is one of the methods to get any information about the deterioration stage in a particular structure as it provides us the information of pore structures of the concrete specimen in image form which is helpful for us to study the necessary details of structures durability.

IOT Based Industrial Automation Using Google Assistant
Authors:- Asst. Prof. Ms.G.Indhuja, A.Jaromepeter, R.Sushma, D.Kamali, N.Lavanya Sri

Abstract- The proposed project focussed with the rapid development of the field of industrial control, industrial control in network applications, intelligent and distributed monitoring system requirements are also rising, and based on SN (Sensor Network) of various application systems also appear in large numbers. The intention of SN is to integrate the sensed environment parameters with the traditional network by means of a large number of sensor nodes, and the intelligent environment monitoring can be realized through the convenience of network connectivity. And the application of SN based on Arduino Environmental is development platform has become the current hot spot, which benefits from its innate advantages in hardware open source, operation performance, reliability, volume, energy consumption, cost and scalability. The Voltage, Current and Environmental temperature monitoring system based on Arduino development platform, through the use of sensors, pyrotechnic detection sensors, gas detection sensors, the corresponding characteristics of the communication system parameters monitoring, through the network monitoring parameters are transmitted to the remote server timely processed (remote data recording, remote alarm and real-time control processing), can achieve the basic security protection of communication system, improve the state of the environment monitoring and management efficiency, in order to improve the maintenance level of communication system. The entire system is controlled through Google Assist to enhance the control operations.

Detection and Prevention of Wormhole Attack using the Trust-Based Routing System
Authors:- M. Tech. Scholar Rachna Pandey, Prof. Pradeep Tripathi

Abstract- Mobile Ad Hoc Network (MANET) is a rising spot of concentrate in the correspondence framework world. As the MANET is with without foundation, it is having dynamic nature of self-assertive system topology. The extent of this proposition is to do the investigation of wormhole attack and flooding attack set up its counteractive action system by applying it on responsive directing convention AODV, NS-2 organize test system is utilized for execution examination and reproduction. The extent of this postulation is to roll out improvements in the AODV steering convention by including a noxious node in the current AODV directing convention and in every one of the records identified with it. At that point to check the execution of system in view of a few parameters like PDR, throughput and End to end delay, TCP and UDP parcel examination and so on the outcome is being shown in NAM. A gathering of worm hole node effortlessly utilized against directing in mobile promotion sells systems. These sorts of attack are called communitarian attack. Two malevolent nodes are making a passage is called nodeholeattack. An assailant causes the clog in organize by producing an extreme measure of activity. The aggressor node always sends the gigantic amount of pointless information bundles into the system. This causes a tremendous clog of undesirable parcel into the system. Because of the hindering the information parcels, RREQ, RREP or RERR bundle send by the genuine node. To keep the wormhole, node opening, community-oriented wormhole and flooding attack, the counter measure which Trust esteem is figured on the premise of course ask for, course answer and information parcels. After count get put stock in values between 0 to 1. In the event that trust esteem is more prominent than 0.5 at that point marks node is solid and permit on a system generally piece. System execution of proposed convention trusted AODV steering convention is assessed. The outcome demonstrates execution change when contrasted with standard AODV convention.

Rumor Detection from Social Media
Authors:- Pragya Gaur, Vasu Verma, Vaibhav Bhardwaj, Utkarsh Kashyap

Abstract- We know that now a days the rumours around the world in every filed has become a major concern for everyone that we cannot neglect. Whether you are at home, college, work, or anywhere in the world and you came across something that is known to be a rumour going on around the city, state or country, you start developing that feeling of anxiety and desperation unless you are not clarified on the statement. In order to ensure the right or wrong we go through Internet and search across it to find more and more about it, but sometimes even if we try with multiple search through the google we are not given a clarity about the situation going on around. Hence to overcome this problem we have come up with an Idea of Rumour detection Web App. In this Web App we have designed an app which will give you the result on the basis of an algorithm which will provide you the most releveant content regarding the situation going on around with the exact clarity and verified resources that are available all over the globe.

Design & Fabrication of Axial Noodle Making Machine
Authors:- Prof. V. S. Nikam, Mr. Nilesh Bule, Mr. Pratik Konde, Mr. Nikhil Ghongade, Mr. Zuber Shaikh

Abstract- Noodles are of the staple food consumed in many Asian countries .Instant noodles have become internationally recognized food and word wide consumption is one rise. Whenever, we think about noodles we remember our part experience where our mother making had been noodle (savage) by their hand in long strips and strings. Now in modern era we have proposed automation and giving relief to those hand practice making noodle by taking lot of efforts .we have “Design and Fabrication of Axial noodle making machine” this machine will help us to makes noodles and its similar product like pasta ,akki savage with different diameter with greater quantity and accuracy with the underestimation of labor cost, space, time, effort and cotton of wastage. The proposed Noodles making machine will forced out work through the well-shaped dice in the axial direction by the extruder which held and rotates in barrel or cylinder. Here the work will produce parallel to base of machine hence its named “Axial Noodle making machine”. The working of this similar to the squeezing the toothpaste from paste pack. On the bed rock on this principle the dough will be squeezed chronologically by the extruder which rotates with uniform speed. This whole mechanism will be drive by the heavy duty D.C. Motor. The main feature of the proposed model is to start drawing work by feeding 400gm of dough which is itself a proof of its compactness.

Demand Side Management on Microgrids
Authors:-Dr. R.M. Holmukhe, Anjali, Sagar Saroj, Sanju Raj

Abstract- Energy demand and expectations of high supply reliability is surging up on a daily basis. Due to this, renewable resources are in great demand which has escalated the use of Microgrids extensively . In a Microgrid environment, economic operation signifies economic scheduling of power generation as well as scheduling of the load. Not only reducing the cost of generation but also reducing the inconvenience caused due to shifting of loads is a multi-objective optimization problem.Thus, Demand Side Management can prove to be useful for such problems as the primary focus of this work is to optimize the load curves, cut down the tariff cost and provide 24×7 electricity to each and every corner. Patna medical college Hostel is considered as residential Microgrid, Balewadi feeder as commercial Microgrid and Yamuna Nagar feeder as industrial Microgrid on which Demand Side Management programs are implemented to enhance the performance and lower the cost of investment. The methodology used here will be based on four terms: California Standard Test, DSM indices, Flowchart for DSM Analysis. These are used to design and evaluate the technical feasibility and economic viability of off-grid and on-grid Microgrids.

Gesture Recognition for User Interaction
Authors:- Srija Nagabhyru, Anshul Joshi

Abstract- With the massive influx and advancement of technologies there is a scope for us to interact with our systems in the best possible way. One such technology would be Gesture based Human Computer Interaction. So our system makes use of HCI which would help us interact without touching the screen. It is a well known fact that two dimensional user interfaces are everywhere, but with the increasing popularity of Extended Reality(XR) we require a better, more sophisticated three dimensional user interface.

A Novel Wavy-Tape Insert Configuration for Pipe Heat Transfer Augmentation
Authors:- M.Tech. Scholar Yogesh Chouhan, Prof. Rohit Kumar Choudhary

Abstract- Various techniques have been tested on heat transfer enhancement to upgrade the involving equipment, mainly in thermal transport devices. These techniques unveiled significant effects when utilized in heat exchangers. One of the most essential techniques used is the passive heat transfer technique. Corrugations represent a passive technique. In addition, it provides effective heat transfer enhancement because it combined the features of extended surfaces, turbulators and artificial roughness.The effect of wavy strip turbulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied. The configuration, gain in heat transfer augmentation, cost in pressure loss, generated swirl flow character, heat transfer enhancement mechanism, optimal geometric parameters and overall thermal hydraulic performance of wavy-tape are successively expounded in this work.

A Review on Fundamentals of Engineered Cementitious Composite (Bendable Concrete)
Authors:-PG Scholar Modugu Naveen Kumar, Asst. Prof. K.Sampath Kumar

Abstract- This paper provides an overview of the various properties of engineered cementitious composites (ECCs) that are used in a variety of structural applications. Different properties of engineered cementitious composites are investigated in this paper, including tensile, flexural, compressive, tensile strain capacity, shear strength, toughness, fibre matrix interaction, drying shrinkage, water permeability, sorptivity, cracking, impact and frost resistance, and beam-column connection behavior. According to the study, ECC has a much greater strain capacity than conventional concrete, as well as a higher energy absorption capacity, defection capacity, and impact resistance, as well as a crack width of less than 100 m. The use of mineral admixtures improves tensile strain capacity with multiple fine cracks, while compressive strength and carbon dioxide emissions decrease, according to the findings of various studies. Fiber hybridization can increase ECC’s strain hardening with various fine cracking, flexural and toughness properties, impact resistance, and crack width resistance.

Automatic Number Plate Recognition System
Authors:-Asst. Prof. S. A. Shinde, Miss. Shital S. Hadimani, Miss. Sayali S. Jamdade, Miss. Pragati R. Bhise

Abstract- Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from the moving vehicle because of the speed of the vehicle. Therefore, there is a need to develop Automatic Number Plate Recognition (ANPR) system as a one of the solutions to this problem. Automatic Number Plate Recognition (ANPR) is an image processing technology which uses number (license) plate to identify the vehicle. The objective is to design an efficient automatic authorized vehicle identification system by using the vehicle number plate. The developed system first detects the vehicle and then captures the vehicle image. Vehicle number plate region is extracted using the image segmentation in an image. Optical character recognition technique is used for the character recognition. The resulting data is then used to compare with the records on a database so as to come up with the specific information like the vehicle’s owner, place of registration, address, etc.

Improved Security for Online Exams Using Group Cryptography
Authors:- K. Usha Rani, Ch. Varsha, B. Priyanka, P. Neeharika, Associate Prof. Dr. S.Venkatramulu

Abstract- Online examination system is a internet-based system. Exam is conducted using the internet. The basic aim is to conduct the online exams more securely. For high security we used group based cryptography. Mail authentication is provided so that user gets username and password. In the database the user credentials and user answers are stored in the form of encrypted format. Only admin have the access to the database. The encrypted form of data in the database cannot hacked by the hacker.

Performance Optimization of Absorption Refrigeration Systems Using Box-Behnken Design
Authors:- M.Tech. Scholar Roushan Kumar Shashi, Asst. Prof. Neetesh Kumar Gupta

Abstract- Nonetheless, a detailed study analyzing all these parameters and determining their contribution ratios on the system’s performance with a statistical approach has not been encountered in the literature. For this reason, the purpose of this study is to examine the parameters that present the most significant effect on the ARS’s COP values and determine the importance order of these parameters by utilizing Taguchi and ANOVA methods. Moreover, the best and worst working conditions are determined by different statistical analysis methods and the results are compared.

A Review on Implementation of Inventory Management Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Priyank Jain, Prof. Trilok Mishra

Abstract- To achieve optimum inventory replenishment is significantly difficult due inherent uncertainties in demands and supply which resulting in loss of sales or keeping excessive inventories. An unkempt inventory can take up to one-third of an organization’s annual investment. Therefore, in order to compete with invariably erratic demands, it is not only challenging to develop an intelligent system to maintain and control an optimum level of inventory but has also become mandatory.

Automobile Black Box System for Accident and Crime Analysis
Authors:- Narendra Tallapaneni, Gudapati Krishna Hemanth, K. Venkatesh

Abstract- Automobiles and computing technologies are creating a new level of data services in vehicles. The Automobile Black Box has functions similar to an airplane black box. It is used to analyze the cause of vehicular accidents and prevent the loss of life and property arising from vehicle accidents. This paper proposes a prototype of an Automobile Black Box System that can be installed into vehicles. The system aims to achieve accident analysis by objectively tracking what occurs in vehicles. The system also involves enhancement of security by preventing tampering of the Black Box data. In addition, the Black Box sends an alert message to a pre-stored mobile number via Short Message Service (SMS) in the case of occurrence of an accident.

Evecurate – A Smart Event Management App Using Flutter and Firebase
Authors:- HOD. Dr R Juliana, Naveen Kumar VG, Richard G, Shivadarshini P

Abstract- Event management is a process that entails a great deal of communication, careful planning, scheduling, advertising, and audience outreach. The core aim of our project is to apply modern technologies and develop a Mobile application to ease out the complex process of traditional event management approaches and thus transforming it into a smart event management system. In specific, our project focuses on the Events conducted by many Colleges and universities which follows the traditional event management approaches. Every time an event is conducted in a college/ university there are more things to be done like planning of events, keeping track of the plan, following a strict budget, share out crystal clear details of the event for the students, sharing of invitations, conduct registration, advertise among other colleges and even sometimes there will be lack of live interaction with the audience. The Mobile Application “Evecurate” developed wraps all the essential services for planning and conducting the events in the colleges and Universities. The application includes QR technology which generates QR code to the event audience which is used for easy Check-in process that is during the registration process. The QR code technology is also used for the Event audience interaction in which audience can provide reviews for the events conducted and can take part in the polls or Q/A session that can be conducted using the application. The application constitutes an event sharing module where the event organizer can enter the details of the event and share them on the application itself. From the project the mobile application “Evecurate” will reduce all the difficulties in the traditional event management approach and pave way for an alternate system that is the smart event management.

A Experimental Investigation on Performance of Concrete with Partial Replacement of Coarse Aggregate and Fine Aggregate with EPS and Iron Slag
Authors:- K .Mohan Sai, B.Tejaswi, D.Manaswi, Ch. Lakshmi Narayana, G.Kumar Sai, M.Heanth Kumar, P.S.V Anudeep, Associate Prof. Ch.Veerottham Kumar

Abstract- A rice transplanter is a specialized machine fitted with a transplanter mechanism (usually having some form of reciprocating motion) driven by the power from the live axle, in order to the transplant rice seedlings onto paddy field. Rice is a major food grain crop of world. Unlike upland row crops, cultivation of low land rice crop is a labour intensive process. In spite of the common belief of availability of surplus agricultural labour in India, there actually exists a scarcity of skilled agricultural workers during the peak transplanting seasons. If this operation is not done in time the yield goes down. In view of this, there is an urgent need to mechanize this operation. The rice translation process is generally manual which involves number of labour. The process of manual rice transplantation is not so efficient as compared to the mechanical rice transplantation. Machine transplanting using rice transplanter requires considerably less time and labour than manual transplanting. It increases the approximate area that a person can plant.

Disease Prediction Using Machine Learning Algorithms
Authors:-Pranav Kumar, Subash Kumar Shah

Abstract- Health care has become a major problem in the world. Disease cases are increasing rapidly among humans, especially among the younger generation. The healthcare sector is one of the leading research areas in the current context with the rapid development of technology and data. The latest technological advances allow for the automatic use of machine learning techniques. These machine learning methods can be used to diagnose ‘or predict diseases’ in advance. The healthcare industry produces a vast amount of information in its infancy in an unstructured format that a computer cannot understand. Thanks to the development of modern technology, the healthcare industry also manages information in a systematic way that can be understood through machine learning technology. In this case if we use machine learning technology to predict disease, then there is a chance of getting the disease in the early stages and informing the patient that they have received the best treatment to treat the disease. This paper uses seven controlled algorithms namely KNN, Decision Tree, Random Forest, Naive bayes to predict disease. In this paper among those seven algorithms, Neural Networks provided the best accuracy as 98.30% and this program provides results to test model accuracy in predicting diseases. The accuracy of the algorithm is determined by the performance of the data provided. The expected outcome and scope of this project is that if disease is not predicted rather than given in advance treatment that can be given to patients which can reduce health risks and save patients’ lives and the cost of accessing treatment can be reduced to a minimum.

Design & Implementation of IOT Based Firefighting System to Protecting Farm
Authors:-Ms. Aditi A. Kulkarni, Ms. Sweety A. Nargunde, Ms. Ruksana A. Mulla, Ms. Karishma D. Kate, Prof . K. K. Nikam

Abstract-Agriculture plays a crucial role in the economy of developing countries, and provides the main source of food, income and employment to their rural populations.Farmers hold the backbone of the agricultural system. Agriculture is the world’s leading source of food items.In summer season many of farms are dry and plants also dry there is lots of probability to occurring farm fire in farm due to man-made like, short circuit in electricity distribution line, firing stubble by humans.Because of that action farms are affected badly. This can make affect on further cultivation season. We are building a smart system which is powered by IOT based which will protect our farm from fire. When fire is occurs in surrounding farms then our system will sense the fire and start water sprinklers to put out the fire and share this data on IOT to know the status of farm to farmer.We also doing automation using IOT based irrigation system. We achieving this controlling system world-wide by using IOT based technology.

Obstacle Detection using LIDAR
Authors:- Sangam Kamble, Prof. Dr. Shilpa Kharche

Abstract- For Autonomous Vehicle, Obstacle Detection is one of the primary tasks. A number of sensor systems are available for obstacle detection. One kind of such sensor system is LIDAR (Light Detection and Ranging) system known for its high accuracy in measuring distances. LIDAR is commonly used to make high-resolution 2D/3D map of the environment. This project uses RPLIDAR A1 Sensor is mounted on the top of the vehicle. RPLIDAR A1 Sensor is 360 degree 2D Laser Scanner (LIDAR) Sensor detects the obstacles within 6 meter range. Point cloud output from the RPLIDAR sensor provides the necessary data for robot software to determine where obstacles exist in the environment and where the robot is located related to those obstacles. Hector_slam contains ROS (Robot Operating System) packages related to performing real-time SLAM (Simultaneous Localization and Mapping). In other words using information from RPLIDAR A1, hector_slam built a map of environment and show detected obstacles and where vehicle is located related to the map. Also, this vehicle uses two Laser Sensors for its movements. Laser sensors are attached in front of the vehicle. One is on Left side and another is on Right side of the vehicle. Laser Sensors detect obstacles and they avoid collision with the obstacles.

Fine-Grained Facial Expression Recognition using Machine Learning
Authors:- Prof. Pallavi Patil, Kalyani Limkar, Samruddhi Waghmare, Siddhi Bokil, Bhakti Vispute

Abstract- A face emotion detection system that cans analyses basic human facial expressions is being developed in this project. The proposed method analyses a person’s face to determine his or her mood, and then plays an audio file that is related to that person’s emotion based on the information obtained from the face. The system will first recognize a human face and then proceed to the next step in the process, and so on. The process of face detection is carried out. Following that, the technique of feature extraction is used to recognize the human face.. This method aids in the recognition of the human’s emotion by utilizing features of the face image. Those feature points are discovered through the feature extraction of the lip, mouth, and eyes, as well as the brow. If the input face matches exactly to the face in the emotions base dataset, we can determine the exact emotion of the human and play the audio file that corresponds to the exact emotion of the human. In addition, we recommend music based on the mood that has been detected. Recognition under a variety of environmental conditions can be achieved through training on a small number of distinguishing characteristics of different faces. A straightforward, efficient, and accurate approach is proposed here. In the field of recognition and detection, systems play a critical role in achieving success.

Development of Economical and Environment Friendly Landfill Liners for Tier II Cities
Authors:-Sachiket Mungarawadi

Abstract- Rapid industrialization and population explosion in India has led to the migration of people from villages to cities, which generate thousands of tonnes of Municipal Solid Waste (MSW) daily. Municipal solid waste management has become a serious problem because of rapid urbanization and improved economic activities. The insufficient collection and inappropriate disposal of solid wastes represent a source of water, land and air pollution and pose risks to human health and environment. Municipal Solid Waste (MSW) is a complex refuse consisting of various materials with different properties.Leachate resulting from this is a hazardous pollutant to the soil and groundwater underlying. Entering of leachate and heavy metals into the soil leads to the contamination of both soil and groundwater. The fill material, decayed organic soils and soils having continuous contact with sanitary fill environment alter the desired geotechnical properties as well as chemical properties. In an engineered landfill, bottom liner and top cover play an important role in controlling the pollution of groundwater, air and soil. Hence utmost care is required in designing and constructing the liner and cover. But cost of the liner/cover material used for the construction of the liner and covers govern the design philosophy of the liner and cover for waste impoundments, as material required is of very huge quantity. In order to better utilize the locally available materials as landfill liners and covers in countries like India, to make the landfill construction cheaper, a systematic study was needed in the form of geotechnical and geoenvironmental characterization of these locally available soils and other materials.Therefore, the present study is aimed to design eco-friendly and economical single-liner system by replacing some percentages of bentonite clay with with baggase ash or straw fibers to avoid entering of harmful liquids into groundwater. As a part of the present investigation, Karnataka state, in India was chosen and tier II cities are identified across the Karnataka state. In all tier II cities, huballi city is selected for our study. The locally available Halumannu is collected from Unakal village, Hubballi. Specific gravity, Natural moisture content, Consistency limits, Sieve analysis, Hydrometer, Compaction, Consolidation and Unconfined compressive strength tests are conducted on collected soil sample. From the results of the extensive experimental investigations Halumannu is silty soil with low degree of expansion. And the strength of soil is less and it can be increased by adding suitable soil stabilizers like cement, lime.

Multifunctional Wireless Hand Sanitisation Based Service Robot Cart
Authors:- Saurabh M. Jambhle, Shubham R. Bawane, Saurabh Chakole

Abstract-There ie new broad health crisis which is known to all of us that is novel coronavirus covid 19. It has spread to world wide and many people get infected by it. The virus is get spread by getting physical contact, by touching and by gathering at social places. To stop the spreading of corona virus some methods is mentioned by the “WORLD HEALTH ORGANISATION” i.e WHO is to- wear a mask, social distancing, and hand sanitization, work from home, avoide gathering at social places and to avoide croud places. This is because of virus get spread by touching a object at local places and due to physical contact with others. We have seen that at public places like shopping malls, hospitals, railway stations, bus stops, petrol pump, utility stores etc there is still gathering of people and croud is there. Because all such places providing essensial services which has to be permitted by govt. And at such places there are chances of get contact with the covid +ve patient. At such places there is no social distancing and hand sanitization is there. One person at a time at such places can not handle the croud and can not be able to give instruction to people. In order to treat and reduce the spread of corona virus circumstances, to maintain a social distancing and constant hand sanitisation and disinfection of our hand at public places become a neccessity. So the aim of this study is to design, develop and fabricate a smart contactless hand sanitizer dispensing system which is mounted on wireless bluetooth control service robot cart. These cart is develop for making contactless human to human interaction in public places where it can controlled by smartphone and having inbuilt contactless sensor based hand sanitisation system. The presented system has ability to work contactlessly to interact with patient in hospitals, to provide services at various industries and trolly provider in shopping mall, railway station for automatic hand sanitisation and at various public places as hospatility service provider.There ie new broad health crisis which is known to all of us that is novel coronavirus covid 19. It has spread to world wide and many people get infected by it. The virus is get spread by getting physical contact, by touching and by gathering at social places. To stop the spreading of corona virus some methods is mentioned by the “WORLD HEALTH ORGANISATION” i.e WHO is to- wear a mask, social distancing, and hand sanitization, work from home, avoide gathering at social places and to avoide croud places. This is because of virus get spread by touching a object at local places and due to physical contact with others. We have seen that at public places like shopping malls, hospitals, railway stations, bus stops, petrol pump, utility stores etc there is still gathering of people and croud is there. Because all such places providing essensial services which has to be permitted by govt. And at such places there are chances of get contact with the covid +ve patient. At such places there is no social distancing and hand sanitization is there. One person at a time at such places can not handle the croud and can not be able to give instruction to people. In order to treat and reduce the spread of corona virus circumstances, to maintain a social distancing and constant hand sanitisation and disinfection of our hand at public places become a neccessity. So the aim of this study is to design, develop and fabricate a smart contactless hand sanitizer dispensing system which is mounted on wireless bluetooth control service robot cart. These cart is develop for making contactless human to human interaction in public places where it can controlled by smartphone and having inbuilt contactless sensor based hand sanitisation system. The presented system has ability to work contactlessly to interact with patient in hospitals, to provide services at various industries and trolly provider in shopping mall, railway station for automatic hand sanitisation and at various public places as hospatility service provider.

A Review on Conformal Cooling of an Injection Moulded Part through Mouldx 3D
Authors:- M.Tech. Scholar Snehil Kumar Tripathi, Prof. Ritu Srivastva

Abstract- Cooling time is a key element in. Typically, it is used to determine the total cycle time. As a result, in injection moulding, reducing cooling time can assist minimise production costs while also shortening the manufacturing process time. significant factors in reducing cooling time is the design of the cooling system. The cooling system architecture is limited in traditional moulding manufacturing methods. The distance between cooling channels and cavity may vary across the component for cavities with higher curvature. As a result of the low heat buildup, the product quality is poor. The cooling channels can be closer to the exterior of the depression by using traditional technologies 3D printing than by using traditional procedures. This test makes use of a real three-dimensional test system to predict the infusion forming process and item twisting.

Glass Identification Using Extreme Gradient Boosting Algorithm
Authors:- Pulkit Dhingra

Abstract- The Discovery of important information from criminal evidence is essential to make an effective criminological investigation. It is necessary to analyze this data of evidence and get answers that will help in the study. Machine learning techniques provide a bundle of state-of-the-art algorithms to analyze the data to get results efficiently. Extreme Gradient Boosting (XG-Boost) is one of the most successful machine learning algorithms used in classification problems. This paper applies the XG-Boost technique to help criminological investigators identifying the type of glass gathered as evidence while undergoing an investigation. The method can also be beneficial for other use cases that include the segregation of glass based on the materials incorporated in it.

Face Recognition Based Media Player
Authors:- Abhishek Rathi, Siddharth Ahluwalia, Suryansh Rana, Asst. Prof. Mrs. Vaishali Malik

Abstract- In this project, we aim to provide a high-level media player which plays and pauses the audio by recognizing the user’s face if the user isn’t near to the machine, it quickly stops the audio. We are attempting to add a component of controlling different highlights of the media player.

Smart Maintains and Monitoring of Agricultural Field
Authors:- M.Tech. Scholar Hemanth Kumar D T, Associate Ravi Kumar M N

Abstract- The proposed system smart maintenance and monitoring of agriculture Field the using the modern technology like in an Internet of things (IoT), mechanic learning (ML), artificial intelligence (AI).It solves the major problem of water wastage in irrigation system, The main approach of our system is to solve the time money energy of a former for smart control of water management. A sensor network proposed by our project deals with basic parameters of the agriculture Field or PH value of soil moisture temperature and humidity of the agriculture Field. In our system we proposed camera for an agricultural field to monitoring the agriculture Field, the data are used to analyze the status of crop cultivation, Manual fencing as some default the thieves over come to field the fencing are now electrical fencing that can harm the people and animals which have an approach to death by current, the smart fencing by laser or infra red rays are used to overcome this difficulty in an intruder passed through Lazar the sensor camera instantly capture the image of that field and send this Image to the respective mail address.

Secure Data Transmission Using Image Steganography- A LabVIEW Approach
Authors:- PG Scholar I. C. Narasimha, Associate Prof. D. Anuradha, Prof. Dr. G. Lakshmi Narayana, Associate Prof. S. Mohan Das

Abstract- Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like image, audio, video. image Steganography is a technique used to transmit hidden information by modifying an image signal in to imperceptible manner. In this proposed method, secret message in form of image or text is embedded within another original image. In the transmitter end the output will be similar to the original with secret message embedded inside. The hacker will be blinded by the transmitted signal. At the receiver end the original message can be retrieved without any loss. The entire proposed system is simulated and their corresponding waveforms prove the effectiveness of this method.

Design and Development of Multipurpose Agricultural Machine
Authors:- Dhairyasheel Patil, Ruturaj Khot, Saikrishn Gajula, Tamajid Shaikh, Asst. Prof. Hrishikesh Jadhav

Abstract- The scope of this project is to design and development of a portable multipurpose agricultural machine; focuses on shredding of sugarcane leavings, coconut leaves, Areca leaves and paddy straw, later this chopped powder is a source to prepare the vermin compost. The task started with the accumulation of information and data, through survey in agricultural and literature studies. Existing models are hand wheel operated, vertical and horizontal electric chopping shredder is prone to have problems like large space requirement, uneven cutting, and manpower requirement. Hence traditional methods are not sufficient and satisfactory for chopping the crop residues. Considering the user’s needs and buying capacity a prototype was designed and constructed. The proposed prototype is so designed to guide materials in different compartments by power driven transmission through chain, belt, pulley and spur gear attachment to have a chopped and powder materials. The overall operation of the proposed shredder, running at a cutting speed of 700 RPM nearly has a cutting efficiency up to 90%.

Development and Analysis of Noise Map of Pune Region Using Arc-GIS
Authors:- Rohan Raut, Sajal Sinha, Swaraj Meshram, Chaitanya Ingale, Pro. Shree Kambale

Abstract-We present our analysis report on Noise Pollution Level in different areas of Pune region and ways to minimize the problem as much we can. In this paper, we have analyzed the data which we collected from various online websites related to Noise Pollution survey in different regions of Pune and used that data to identify possible trends and factors. We used normal distribution or Gaussian distribution to get the values and those values were used to plot the maps and graphs. Furthermore, various techniques in order to minimize noise pollution have been discussed.

Indian Currency Recognition System
Authors:- Dr. Dayanand Jamkhandikar, Kaveri, Sahana, Sudharani, V Pooja shree

Abstract- Counterfeit notes are one of the biggest problem occurring in cash transactions. For country like India, it is becoming big hurdle. Because of the advances in printing, scanning technologies it is easily possible for a person to print fake notes with use of latest hardware tools. Detecting fake notes manually becomes time-consuming and untidy process hence there is need of automation techniques with which currency recognition process can be efficiently done. This work Extraction of different features in fake and real currency notes and through comparing with each other we can able to differentiate the fake note from the real note. In this approach, feature extracted dataset is used and for detection of the genuineness currency. Security feature of Indian currency note available on front and back side of the notes are used as features. This work uses ORB (Oriented FAST and Rotated BRIEF) and Brute-Force matcher approach to extract the feature of currency. The identification mark, optical variable ink, and extracted currency features decides the currency recognition. The features extraction is performed on the image of the currency and it is compared with the features of genuine currency. The desired result will indicate whether the note is genuine or fake.

Design and Development of Chassis, Braking And Steering System of Pedal
Assisted Electric Car

Authors:- Prathmesh Khaladkar, Varad Joshi, Prathamesh Joshi, Indrajit Shinde, Sourabh Patil, Asst. Prof. Hrishikesh Jadhav

Abstract- During the revolution for the eco-friendly technologies bicycles were the most depended modes of transportation, along with this the consideration of the increase in fuel price and the environmental factors. We must admit that it is far better to use a bicycle over a motor vehicle for short distance travelling. Imagine how useful would the bicycle be if even the small effort applied by man for climbing slopes and riding on rough terrain is reduced in it. “The e-Bike”. Our idea of implementation of the project was mainly based towards providing a tribute to the “GREEN ENERGY”.

Utilization of Coconut Fiber and Marble Slurry in Concrete
Authors:- Ajaz Ahmad Mallah , Basit Idrees Tak , Nasir Manzoor ,Asst. Prof. Mahendra Kumar

Abstract- Concrete is a composite material made out of fine and coarse total reinforced along with liquid concrete that solidifies over the long run. Concrete is most ordinarily utilized man made material on the planet. It is form capable, versatile, moderately fireproof, for the most part accessible, and reasonable. Unfortunately, the production of Portland cement releases large amounts of carbon dioxide, into the atmosphere, which causes enormous impact on the environment. Worldwide, the cement industry alone is estimated to be responsible for about 7% of all CO2 generated. 1.25 tones of co2 is emitted for production of 1 tone cement. Simultaneously enormous measure of characteristic assets are needed to deliver huge loads of cement each year which causes over misuse of normal assets. Consequently, the development business is constrained to search for other financial and supportable substitutes.

Land Use Change Detection Using Remote Sensing Technology
Authors:- Anshuman Kumar Yadav, Deepika Yadav, Ishant Choudhary, Mini Singh, Mr. Yogendra Sharma

Abstract- Land use land cover of any areas highly dynamic in nature and is highly prone to ongoing socio-economic and demographic changes in spatial perspective in this context the role of urbanization and consequent urban development in a fast urbanization country like India is crucial in bringing about rapid changes in rate of conversion of natural landscape into built-up landscape which finally is leading to a number of environmental problems. Therefore, an effort has been made in this paper to examine the land use land cover change of the district Gautam Budh Nagar, Uttar Pradesh, India over two different time periods of 2011 and 2021 in response to ongoing urbanization process and its impact on natural vegetation cover. For this purpose, the present study has identified the role of geospatial techniques to examine the change detected in land use land cover and associated changes in natural environments. The paper is based on remote sensing data of LANDSAT 8 for analyzing the LULC and its differential impacts on environment due to urbanization in Gautam Budh Nagar, Uttar Pradesh, India. Supervised classification of all the satellite images have been done to show various land use type on the study area.

Artificial Intelligence Powered Medical Expert
Authors:- Sagar Mallapur, Ravishankara K, Tejprakash C V

Abstract- Artificial Intelligence (AI) predictive techniques enables auto diagnosis and reduces detection errors compared to exclusive human expertise. Disease diagnosis is the identification of an health issue, disease, disorder, or other condition that a person may have. The study considered most frequently used databases, in which We further discuss various diseases along with corresponding techniques of AI, Machine Learning, and Natural Language Processing. Expert System using Artificial Intelligence interacts with the patients with the help of the Natural Language Processing (NLP) and takes the required information or data regarding the disease. Then calculates the possible outputs or diseases and their root causes and says those predictions back to the patient. . Finally, the paper also provides some avenues for future research on AI-based diagnostics systems based on a set of open problems and challenges.

Patient Health Monitoring System Using IoT
Authors:- Prof. U. P. Shinde, Asst. Prof. Anil B. Patil, Mr. Ajay R. Gaikwad , Asst. Prof. Umesh J. Tupe

Abstract- This paper depicts a method for using IoT to monitor a patient’s body 24 hours a day, seven days a week. Patient monitoring systems are becoming increasingly popular among researchers and patient guardians these days. Caregiving duties are increasing as the older population grows. As a result, patient health monitoring systems are becoming increasingly popular. The monitoring of patients is the basis for this paper. We created a patient monitoring device that is both dependable and energy efficient. It has the capability of sending real-time patient parameters. It allows clinicians to track the patient’s health parameters in real time. The proposed federal system continuously monitors the patient’s health utilizing several sensors attached to the Arduino board. The data is then sent to the server using the Arduino Ethernet shield. An alarm is sent to the doctor via an Android application loaded on the doctor’s smartphone if any of the parameter values exceed the specified threshold.

Optimal Design of Water Plumbing System in Multistoreyed Building
Authors:- Alina Nazim, Aman Yadav, Piyush Pandey

Abstract- Multistoreyed buildings are inevitable in today’s modern living. For plumbing purposes, the term “multi-storey” is applied to buildings that are too tall to be supplied throughout by the normal pressure in public water mains. Water main supply pressure of 8-12 meter (25-40 feet) can supply a typical two-storey building, but higher buildings may need pressure booster systems. The main aim of the study is to develop optimization model for designing down feed piping system in multistoreyed building by minimizing the cost of piping. The specific objectives of this study are: To develop linear programming-based methodology for the design of water plumbing system in multistoreyed building. To demonstrate the applicability of the developed optimal design method for example problem. To compare the performance of the developed optimal design method with traditional method of design.

IoT Based Smart Mirror
Authors:- Himakanksha Singh, Mayank Gupta, Kunal Khatri, Khushboo Shrivastav, Rabia Akhtar, Kamil Khan

Abstract- Smartamirrors are thought to be the way of the future. It’s a community of a connected world where we may check the news, temperature, weather, and other information while grooming ourselves infront of the mirror every morning. As a result, in suggested system, these quiet mirrors enable for internet news to be received and shown on the mirror screen. Additionally, it shows the present temperature, time, and schedule. As a result, system combines a Raspberry Pi 3 CPU with display for viewing the information, IOT-based electronics, and a temperature sensor. We used carefully modelled panels to construct the exterior frame. The outside frame is made from a perfectly sculpted panel. The system is then encased in customised glass with a rear frame. The mirror’s frame cavity now has precisely positioned amounts for the display housing to be installed. This is required in order to obtain the deliberate result.

Financial Instruments Fraud Detection Using Machine Learning
Authors:-Dr. Priti. Subramanium, Bhusawal Evangel Denis Rodrigues

Abstract- The rapid growth in industries mainly in the e-commerce sector has led to massive use of credit cards for online purchases and consequent surge in the fraud related to it which makes it necessary for banks to keep updating their fraud detection methods. Machine learning approaches are mostly being used to analyze and detect the increasing serious problem of credit card fraud. For discovering these fraud transactions banks make use of various machine learning methodologies. The performance of fraud detection in credit card transactions greatly depends upon the sampling approaches being carried out on the data-sets, selection of variables and detection techniques used in finding out the unauthorized activities. In this project the methods that have been used are logistic regression, neural networks, k-nearest neighbor are used for credit card fraud detection. I have also done oversampling to balance the data set. These techniques are applied on the dataset and output is generated .The performance of the techniques is evaluated for different variables based on sensitivity, accuracy and error rate.

Review on Electrical Transmission Technology
Authors:- B.Tech. Scholar Shivam

Abstract- I have put all the content in this research paper in such a way that after reading it all the doubt clear related to the electrical transmission technology. I have tried to give importance to most wireless transmission system in this particular system. Moreover, in this research paper the process of improving the power factor of the transmission line and I have also tried to find out how to transport electricity from one place to another by wire.

Design and Development of Regenerative Braking System
Authors:- Pranav R. Khot, Shubham V. Sonawane, Manish A. Atyalkar, Girdhar S. Gavali, Vaibhavraj S. Desai, Prof. Dr. Anantkumar J. Gujar

Abstract-The brakes are commonly use friction between two surfaces pressed together to convert the kinetic energy of the moving object into heat, though other methods of energy conversion may be employed as all the energy here is being distributed in the form of heat. Regenerative braking converts much of the energy to electrical energy, which may be stored for later use. We are also going to make a working model of regenerative braking to illustrate the process of conversion of energy from one form to another. Regenerative braking converts a fraction amount of total kinetic energy into mechanical or electrical energy but with further study and research in near future it can play a vital role in saving the non-renewable sources of energy.

Electronic Differential System Control Strategy for Electric Vehicles
Authors:- Prashant Vinayak Kadam, Prof. Nilesh Alone

Abstract- This paper presents a control strategy that is applied in turning control for decentralizedelectric vehicles known as the electronic differential system. The conventional mechanical differentialhas drawbacks, such as bulkiness and slow response. The electric system response is not only tentimes faster than its mechanical counterpart, but its accurate control even reduces the loss of powerfrom the motor to the wheel. Through the turning radius from the steering angle command thatthe driver gives, the controller can distribute torque to each wheel. After controlling each wheel’srotation, the vehicle can turn in neutral steering. The results show that this strategy can be effectivelyemployed on urban roads.

Physical, Chemical and Morphology Characteristics of the Malaysian Coconut Shell Powders (CSP)
Authors:- Hussin N., Ngalim A., Govindasamy S.A., Wan Ali W.K.A,
Othman Z., Zainol R., Abd Rahman Z., Abu Samah. A.H., Md. Radzi M.F., Ibrahim B.H, Ahmad@Ramli A.A., Md. Zailani N. , Osman A.G., Mohd Nawi M.R.

Abstract- Coconut shell (CS) raw materials used in this project were obtained from our previous by-products of copra processing. The methodologies involved are (i). Collection of CS materials, cleaned, air dried and kept in a proper container prior to production of coconut shell powder (CSP). CSP is a potential industry material and it has been reported by several industries as natural raw materials for production of repellent fillers, adhesives, composites and other high value added of non-food products. In this research, CS was further processed into powder form (CSP) by several steps of processing that will be discussed further in this finding; and the second methodology – (ii). A detailed evaluation of CSP was conducted for its chemical and physical properties. These analyses covered the determinations of: i. Color profiles; ii. Bulk density; iii. Screening on the morphology of CSP using a Scanning electron microscope (SEM); iv. Evaluation of fiber characterizations and v. Measurement of oil residual in the CSP. The aims of this research are to produce specialty CSP materials, identified the physical and chemical characteristics of the CSP; and highlighted CSP as high potential value-added products for non-food uses as an extra income for coconut farmers and related industries.

New Customer Acquisition in Retail Industry
Authors:- Asst. Prof. Dr. Anuradha Yadav, Research Scholar Noor Mohammed Faraz

Abstract- The Indian retail market is rising and so is the challenge to attract new customers has also transformed into new ways. A customer has unlimited retail options to look for his/her desired product and make the purchase decision. Getting a new customer or a potential buyer is certainly to enhance the profitability. Consequently, there is need to understand the efforts employed by the retailer to acquire new customer. This manuscript was written with purpose to understand retailer’s efforts toward new customer acquisition through a secondary data review of past research work. Based on the review of various variable have been identified to determine the perception of a retailer towards new customer acquisition. The impact of these concepts on new customer acquisition and customer satisfaction needs further deliberation and research. The study proposes a model that would through an empirical deliberation find the gap between dimensions of retailer’s and customer satisfaction of new customer acquisition and consumer’s dimension of store choice. However, the future research needs to test the model and know the customer’s response towards these efforts made by the retailers and to ascertain the success of these efforts from the point of view from the retailer.

Productivity Improvement in Manufacturing Industry Using Industrial Engineering Technique
Authors:-M. Tech. Scholar Shailendra Yadav, Prof. Trilok Mishra, Prof. Sachin Jain

Abstract- In today’s increasingly competitive world, it is important to constantly improve, be it amanufacturing or service industry. Quality with quantity is a main characteristic which helps a company stay in the competition. Technology has taken leaps of development lately and this has brought about an increase in the customer demands. The main aim is to studythe current capacity, analyze it to find areas of improvement and make an improvementproposal tomeettheforecasted increasein demand. This thesis presents the current performance of outputs and capacity of the plant calculated using continuous data collected in shop floor. In each workstation the processing time is different and the longest time consumption workstation will be identified as a bottleneck workstation. The identified bottle neck station will be analyzed to reduce the processing time which increases production rate.

Hypoglycemic Encephalopathy
Authors:- Ayouche Othman, El Bakkari Asaad, Nabil Motassim Billah, Ittimad Nassar

Abstract- We report the case of 23-year-old man without medical history who intentionally ingested a high dose of biguanide. He was found lying in a coma state with low blood glucose, transferred to the emergency department for non resolved biguanide intoxication.

Current Scenario of Breastfeeding in India
Authors:- Associate Prof. Dr. Ritu Pradhan, Anupreet Kaur Sobti

Abstract-Breastfeeding is an unparalleled universally recommended intervention for the promotion of health and nutrition of children and reduction of mortality. In spite of the WHO recommendations and baby-friendly hospital initiative, breastfeeding practices are inappropriate due to maternal, infant, socioeconomic, and cultural factors. WHO recommends the use of various Infant and Young Child (IYC) indicators for assessing infant and young child feeding practices. Unlike in 2008, no distinction is made between core and optional indicators in this set of recommendations (2021). To support programme assessment, planning and monitoring, national-level reporting on estimates for IYCF indicators should take place approximately every three to five years. NFHS-5 findings show a worrying trend in child feeding practices. Despite the importance of breastfeeding practices for the healthy growth and development of infants and young children and health of mothers, data is not so encouraging. Necessary action is therefore the need of the hour. Breastfeeding is not only a mother’s responsibility. To enable all mothers and children to be breastfed, it requires support from governments, healthcare systems, families, communities, employers and work places to actually make it work. We need to leverage all sectors of society to make breastfeeding successful for mothers and babies. Appropriate individual and group counseling for families and community is required. Adequate funding and implementation of policies and programmes is also necessary.

A Color Image Steganography Method to Hide Multiple Images with LSB Coding
Authors:- Research Scholar Palac Gupta, Deepinder Kaur (HOD)

Abstract- Data and information security is one of the crucial tasks in the digital and data communication. In the ancient time there are various ways to hide data into various objects. In modern day the data security is also very important. Data can be of various types like text, image, audio or any other form. In image steganography image acts as cover image and it can hide text, image and other form of data. In case of multiple image steganography various image can be hidden in a single image. Benefit of this approach is that those hidden images can hide the data also. So it becomes very difficult to access those hidden data. Steganography can be classified into two categories namely spatial domain and transform domain. Both have different advantages. In this paper a novel technique for hiding multiple digital images in a colored digital image with the help of LSB encoding is proposed. 8-bit LSB technique will be used for the embedding of data into the cover image which is also known as stego digital image. The proposed technique will be able to hide various images with the encrypted method and then with the help of decoding method images can be recovered. The proposed technique will be compared with the already existing multiple image hidden steganography technique. Various objective parameters like hiding capacity, file size before steganography and after steganography, mean square error and peak signal to noise ratio will be taken as objective parameters. All the implementation will be performed in the Matalb software.

Voltage and Other Parameters Monitoring System Using Android Mobile Application
Authors:- B.Rajalakshmi, S.Surya

Abstract- In this paper,have proposed android mobile displaytoeasy voltage, current monitoringin a transformer. When testing and troubleshooting the electrical works/PCB, the person face issues while placing probes on 2 points on the electric lines and simultaneously noting the value in multi-meter . As the conventional model consumes more time as well as it also leads to faulty/improper measurements and also causes accidents when in contact with live wire. To overcome the issue, have proposed to integrate voltage display through the user application for a virtual voltage display while trouble shooting/testing the system. An arduino is used in the circuit for processing and displaying output. The Arduino Nano V3.0 controller and Bluetooth HC-05 are a cheap microcontroller and wireless device, respectively. The new Android smartphone application that monitors the voltage and current measurements uses the open source MIT App Inventor 2 software. The voltage and current measured, system is designed smartly.

Studies on Development of Process Technology for Preparation of Multigrain Extruded Snacks
Authors:- Kokani Ranjeet Chunilal (Pricipal), Shinde Gaurav Sanjay

Abstract- The aim to prepare Extruded snacks as a nutritional point of view and to provide convenience to the consumer. The main ingredients which were used for preparation of crackers were Soyabean flour, Ragi, Rice and Corn flours. All ingredients contain Energy, Protein, Carbohydrates, Fat and Vitamins such as vitamin A, Thiamin (B1), B3, vitamin C, Folate (B9) and Minerals such as Ca, K, Zn, Ph, Mg, etc. A snack was a good tea time snacks typically made from grain & flour and mixing of multi flours. Snacks are usually crispy, crunchy in taste, small in size. For preparation of multigrain extruded snacks ingredient used like Soya flour, Ragi Flour, Corn Flour and Rice Flour were mixed together with other ingredient. Then make a smooth dough after that filling it in hand extruder and frying at 120°C for 10 to 15min till golden brownish colour than cool it and packed it for further study. For standardization of recipe 3 trials had done T1, T2, T3, and from that trial T2 has selected according to sensory evaluation, among all the levels of Extruded snacks prepared trials T2 recorded highest score in all the quality attributes and good storage ability. Proximate composition of extruded multigrain snacks were Moisture content (12.75%), Ash (4.2%), Fat (4.6%), and Protein (16.9%), Carbohydrate (60.8%), Energy (352.65kcal) etc. It was concluded that the Extruded Snacks made from Multigrain can be store for three months in Low density polyethylene pouches at room temperature. So the Extruded Snacks made from Multigrain can be satisfy the consumer in acceptable.

Data Balancing and Apply Machine Learning Approach for Unbalanced Cancer Dataset
Authors:- M. Tech. Scholar Kamal Singh Baghel, Asst. Prof. Avinash Pal

Abstract- In medical sciences and biomedical domain, prediction of cancer disease is most difficult task since the machine learning techniques making computer aided diagnosis. In world, main causes of death are due to cancer diseases. Thus, for detecting and diagnosis of cancer diseases of a patient, there is a need to develop a decision support system. Data mining arrangement systems, the main aim of our project is to predict more accurately and precisely the presence of cancer disease in more efficient manner. With high dimensional unbalanced dataset with huge number of attributes, it is a challenging task in Data Mining and Machine Learning of Cancer based diseases. The imbalanced class distribution is one of the most frequently occurred phenomenons in the real-world health & biomedical datasets, which significantly causes the overall and con siderable loss of many essential pathological information and crucial details from an abnormal class. Indeed, Many of the times the misdiagnosis of these abnormal classes is very severe than the normal classes in biomedical disease diagnosis and cancer diagnosis. These are some main and important factors that further results in a lower rate of classification accuracy and precision of an abnormal class and incorrect diagnosis results with less sensitivity. Therefore, there is a need to establish a significantly effective classification machine learning model approach for limited and imbalanced health & biomedical cancer dataset and other biomedical datasets. The proposed approach will surely increase the accuracy and the precision of the output rather than that of the traditional SMOTE Algorithm with increase in the F-Score and Recall which also known as sensitivity. The proposed customized approach with addition to the Centroid method replacing the Euclidean Distance method will increase the efficiency and predictability of the system at very comparable levels. The overall results will be carried out effectively over the Cervical Cancer Dataset used in this study are taken out from the database repository which is UCI Machine Learning Repository and other Bio-Medical Imbalanced Datasets such as Diabetes, Heart Diseases can be used from Github & data world repositories, The Cervical Cancer Imbalanced Dataset is The dataset which is comprises habits, demofigureic information, and historic medical records of total 858 patients having.

Multipath Congestion Control and Predication and Detection of Attacks in MANET
Authors:- M. Tech. Scholar Vinita Kashid, Asst. Prof. Dr. Mukesh Patidar, Hod. Mr. K. K. Sharma

Abstract- Manet is self-configuring and self-organizing network; it doesn’t rely on pre-existing infrastructure. Manet or mobile ad-hoc network is capable of forming proxy network without the necessity of a central administration or any standard support devices. It is a wireless network that can communicate to each other. Since it’s a wireless network therefore its biggest problem is Congestion. This congestion occurs due to the presence of heavy traffic (packets) in the network. The controlling of the congestion is important within the manet, the quality congestion control mechanism isn’t ready to handle the complex or any hardcore congestion, if this congestion couldn’t be control it will collapse the whole network. We have proposed the congestion control by performing the default network nodes using Network Simulator NS2.35 with the Routing Technique of AODV and DSR, along with them we perform our routing technique called CCAODV (Congestion Control AODV) thus after final result one can see the workability and enhanced performance in packet delivery ratio and throughput from our proposed work.

Detection and Mitigation of Mitigate Denial of Service (Dos) Attacks Using Trust-Based Mechanism
Authors:- M. Tech. Scholar Deepak Chouhan, Asst. Prof. Avinash Pal

Abstract-The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envaisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in computation, storage, and network capacity, which makes them easy to hack and compromise. To achieve secure development of IoT, it is necessary to engineer scalable security solutions optimized for the IoT ecosystem. To this end, Software Defined Networking (SDN) is a promising paradigm that serves as a pillar in the fifth generation of mobile systems (5G) that could help to detect and mitigate Denial of Service (DoS) and Distributed DoS (DDoS) threats. In this work, we propose to experimentally evaluate an entropy-based solution to detect and mitigate DoS and DDoS attacks in IoT scenarios using a stateful SDN data plane. The obtained results demonstrate for the first time the effectiveness of this technique targeting real IoT data traffic.

Review of Uses Cassia Sophera Linn Plant Belonging to Family Caesalpinieae
Authors:- V.K. Dwivedi, D. Thakur

Abstract- Nothing existed in the world of thought matter and experience which is not a medicine” Disease, decay and death have always co-existed with life. The study of diseases and their treatment must have been contemporaneous with the down of human intellect. Man’s existence on this earth has been made possible only because of the vital role played by the plant kingdom in sustaining his life. The wealth of India is stored in natural flora India is virtually a herbarium of the world. India possesses all type of climate conditions varying from temperate to tropical and dry to humid and wet. There are about 2060 higher plant species being used in Indian system of medicine and nearly 600 species ayurvedic system, 50 in Unani system and 550 species in phytopharmaceutical industries. Besides these, many more are being used in folklore and traditional remedial systems. This article aims to provide a comprehensive review on the therapeutic and pharmacological as well as phytochemical aspects of Cassia Sophera plant. It is widely used in traditional medicinal system of India has been reported to possess Antioxidant, cytotoxic, and Hemorrhoideic activity etc. The medicinal potential of flora has been exploited to isolate and achieve various constituents like steroids, terponoids, essential oils,polyacetylen, hydrocarbon, Alkaloids, peptides, Carbohydrates, flavanoids etc. It is clear that the medicinal properties and therapeutic uses of Cassia Sophera as well as its phytochemical investigations prove its significance as a valuable medicinal plant [1].

Secure MANET using Curve-Based Cryptography
Authors:- M. Tech. Scholar Lalita Mandloi, Asst. Prof. Avinash Pal

Abstract- Mobile Ad hoc Network (MANET) is a mobile and infrastructure less network, widely used in various applications. In this paper, we study the major security issues in MANET to reduce the malicious activity at the nodes. To reduce theunsecured network, Enhanced Adaptive Acknowledgement Scheme (EAACK) is proposed and it involves Acknowledgement (ACK), Secure Acknowledgement (SACK), and Misbehavior Report Authentication (MRA) schemes. In EAACK scheme, the 2b (2-Bit) packet header is used and it overcomes some of the disadvantages of Watchdog behavior. In this work, the sender has to digitally sign the ACK packets and the receiver has to verify it. The proposed Scheme is applied to 40% of malicious nodes and Routing overhead (Ro) hits the value 0.6. The Network performance is better when the value of Ro is 0. In order to secure more, Credibility Based Sequence Distance Vector Routing (CBSDV) and Curve based cryptographic technique is used. Simulation results show that proposed scheme provides better secure network and CBSDV, hop count, time duration, energy values and trust scores play a deciding factor between the source and destination in the network.

Facial Expression Recognition: A Review
Authors:- M.Tech Scholar Shivani Patidar, Asst. Prof. P. Kumar Choure

Abstract-Facial expressions are the fastest means of communication while conveying any type of information. These are not only exposing the sensitivity or feelings of any person but can also be used to judge his/her mental views. This paper includes the introduction of the face recognition and facial expression recognition and an investigation on the recent previous researches for extracting the effective and efficient method for facial expression recognition.

Review Articles of Piston Designing Methodology and Optimization of its Performance
Authors:-M. Tech. Scholar Rajesh Jamra, Asst. Prof. Dheeraj Shriwas, Associate Prof. Devendra Singh Sikarwar

Abstract- In this paper gives a review of various piston design approach and provide a summary of conceptual design method previous research articles. For purpose of paper to collection of Literature review of related to piston designing contrast to designing drawback and different type of material optimization problem. To identification and observation of piston design method, Materials optimization suitable to piston designing with its performance evaluation see paper section-II summaries of algorithm of piston design.

Advanced Approach for CORDIC Architecture Using Carry Select Adder
Authors:- Harsit Tiwari, Tarun Verma

Abstract- We have developed an efficient CORDIC algorithm in this research, which uses many rotations to reduce the CORDIC rotation angle. Instead of employing a regular adder, this innovative CORDIC method employs an area efficient carry select adder (CSLA). In many data processing techniques, this adder can do quick arithmetic operations. Finally, several parameters such as area, power, and latency are evaluated, and the proposed approach reduces these when compared to the existing method.

A Descriptive Study to Assess the Level of Awareness on Covid 19 Precaution among Home Makers at Selected Areas of Chengelpet District
Authors:- Associate Prof. S.Kavitha, Associate Prof.P. Sangeetha, Dr. N. Kokilavani (Principal)

Abstract-The Covid-19 pandemic worldwide caused by severe loss of health and life of many people. Covid appropriate behaviours were entrusted by government of India to reduce the covid-19 spread across the nation. This article reveals the level of awareness on covid-19 preventive measures among the home makers, it is a Non- experimental design – Descriptive research design was adopted to selected 50 clients from selected areas of chengelpet district by purposive sampling technique, assessed by the structured multiple choice questionnaire and analysed by using descriptive statistics.The findings of this study suggests 61.2% of clients are having inadequate awareness, 28.4% of them having moderately adequate awareness and only10.4% falls in category of adequate the level of awareness on tuberculosis. This study concludes that around 61% of the clients are having inadequate awareness on covid19 appropriate behaviour. The researcher also suggests that an educational intervention can help the clients to improve their awareness thereby it reduces the spreading rates of Covid 19 in forth coming months.

A Review on Wireless Sensor Network for Energy Consumptions
Authors:- M. Tech. Scholar Amit Garg, Asst. Prof. Mukesh Kumar Gupta

Abstract- WSNs have made conceivable ongoing information total and investigation on an extraordinary scale. Normally, they have stood out and accumulated across the board claim towards applications in different regions including calamity cautioning frameworks, condition checking, human services, wellbeing and key zones, for example, guard observation, reconnaissance, and interloper recognition. If there should arise an occurrence of atomic force plant if any little deferral happens for information sending because of any hub disappointment may brings about serious catastrophe. Thus successful Topology Control is required to acquire a vitality productive sensor organize regardless of whether any hub comes up short. A vitality proficient topology control utilizing crossover bio enlivened calculation based group head choice is introduced in this work.

Newfangled Approach for Analyzing the Impact of Artificial Intelligence in E- Commerce
Authors:- M.Tech. Scholar Shriya Asati, Associate Prof. Dr. Sunil Phulre, Prof. Dr. Bhupesh Gour (Hod)

Abstract- During the last decade of the twentieth century and among the first one and half decades of the third millennium-up to the best knowledge of the author of this thesis, the issue of Business Intelligence and its involvement in business environment and in Electronic Commerce environment in particular for better achievement, has ‘often’ been dealt with as several individual unidirectional problems, or quite seldom as bidirectional problem. This thesis presents however a research project that has differently handled the said issue as a ‘single’ multidirectional problem. The general trend to utilize the concept of Business Intelligence was through considering it as a tool or a means that is actively reliable in decision making concerning business organizations with respect to their partial activates besides their strategic and executive planning.

Intrusion Prevention for Covid-19 Using IOT Devices
Authors:- Asst. Prof. Guru Prasad, Abhijeet

Abstract- This COVID-19 pandemic caused by novel corona virus is continuously spreading until now all over the world. Many precautionary measures have been taken to reduce the spread of this disease where wearing a mask is one of them. We propose a Raspberry Pi based system that restricts the growth of COVID-19 by finding out people who are not wearing any facial mask. While a person without a mask is detected. As we know fever is also a symptom of COVID-19, so our system will check body temperature of the person and also it will check if that person is maintaining proper social distancing or not. If the person follows all standard operating procedures then the automated door is opened he/she can enter. If the person is not following any one among three Standard Operating Procedures then the person will not be allowed to enter into the office / school / college. It alerts through buzzer.

A Comprehensive Review on the Various Steganography Methods Based on Encryption and Data Hiding
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- As the technology is advancing day by data and with the same pace information and its secure transmission is also crucial in the process of information transmission. Images are usually the simplest digital data which is used in multiple applications. From satellite to whatsapp applications all around and there are billions of images that are transmitted through digital communication channel. To solve the problem of safest delivery of message to the receiver encryption with the steganography method can be used simultaneously. Various researchers had proposed various ways of hiding data into digital images either by using encryption and steganography and some has combined both these methods to make data more secure. In this review paper a deep literature survey is performed on the steganography of digital images where encryption and data hiding are used for making the data safer.

IoT based Smart Mirror using Raspberry Pi
Authors:- Anubha Jain, Diwakar Kumar, Kirti Agrawal, Assistant Professor Shruti Sharma

Abstract- This project represents the development and designs of a mirror that Shows a graceful interface for glancing information, and it is also used for setting the To-Do list. And in this android facilities can also be added. The Smart mirror is such kind of device that functions as a mirror with many advanced capabilities of displaying multimedia data i.e. Videotext and images.

Implementation of Rank Positional Weight Technique Inbalancing of Production Line in a Manufacturing Industry
Authors:- M. Tech. Scholar Vivek Barenge, Prof. Trilok Mishra, Prof. Sachin Jain, Prof. Harimohan Soni

Abstract- This work mainly focuses on application of line balancing to minimise idle time of work station in production line. The methodology adopted includes calculation of cycle time of process, identifying the non –value-added activities, calculation of total work load on station and distribution of work load on each workstation by line balancing, in order to improve the efficiency of line. A production line of a shaft manufactured by K.K. Engineering Works, Govindpura, Bhopal (M.P) is considered for this research work and time study is performed in order to determine the standard time for each process. Then, rank positional weighted method (RPW) is evaluated with the help of standardized data to solve the assembly line problem and defines the line efficiency which provides a better productivity in the existing flow line by reducing the idle time.

A Review on Block Chain in Cloud Computing Healthcare Data Security
Authors:- M.Tech. Student Atul Soni, Asst. Prof. Manoj Kumar Gupta

Abstract- This work mainly focuses on application of line balancing to minimise idle time of work station in production line. The methodology adopted includes calculation of cycle time of process, identifying the non –value-added activities, calculation of total work load on station and distribution of work load on each workstation by line balancing, in order to improve the efficiency of line. A production line of a shaft manufactured by K.K. Engineering Works, Govindpura, Bhopal (M.P) is considered for this research work and time study is performed in order to determine the standard time for each process. Then, rank positional weighted method (RPW) is evaluated with the help of standardized data to solve the assembly line problem and defines the line efficiency which provides a better productivity in the existing flow line by reducing the idle time.

College Experience of Students in a Faith-Based Institution
Authors:- Vo Truong Giang

Abstract- This paper aimed to understand the experience of college students who studied under a faith-based institution, especially in Thailand. By using a one-on-one interview form, the researcher collected data of eighteen participants who regularly studied in a faith-based institution. Each interviewee was asked a list of ten questions focused on their personal demonography, feeling, thinking, and experience about four major aspects of the topic – physical, mental, spiritual, and social. All participants completed providing the answers under the normal condition. Through reading the transcribed texts several times, the data were formed into different categories and themes for analysis. The result showed that students had positive perspectives about faith-based institutions. Health educations that applied religious’ principles were taught both direct – lessons and indirect – encouraged programs. Moreover, these institutions provided healthy environments and mental support systems for students to grow their mental health and spiritual life. Both religious and non-religious students reported the effective teachings of faith-based institutions which changed their perceptions and behaviors positively in terms of social interaction development.

Iot Based Smart Farming System
Authors:- Aniket Chande, Ayush Kumar Chaudhary, Govind Gurme, Prof. Mrunalini Bhandarkar

Abstract- In India over 60% population is relied on agriculture as the basic source of their income. As a result, it contributes to 1/3rd of Indian economy. That is the reason agriculture is integral part of Indian economy. Also, it plays crucial role in development of country. And traditional farming degrading the development in agriculture, there is necessity of technological intervention in agricultural practices to increase overall grade of farming. There are various methods in farming that demands automation and reduced human efforts. Hence, agriculture can be made smart using IoT and other smart automation tools & technologies. Smart agriculture increases crop yield, quality, decreases water wastage etc. Internet of Things (IoT), Machine Learning (ML), and automation technology has brought revolution in every field, making everything smart and intelligent. The main objective of this project is to propose IoT based Smart Farming System supporting farmers in getting Livestock Data, Temperature, Soil Moisture, Humidity, PH measures and fire detection for efficient monitoring of environment which will empower them to increase their overall grade of service and their product quality. This will increase mainly the income of farmers and reduce the unnecessary expenses. The IoT based Smart Farming System being recommended is assimilated with Arduino, Sensors and a Wi-Fi module producing live data feed.

Low Power Adiabatic Logic Design for VLSI Applications
Authors:- Sanjay Kumar, Prof. Sher Singh, Asst. Prof. Suresh S.Gawande

Abstract- The ever-increasing transistor integration in VLSI have augmented the power dissipation due to transistor switching in a massive amount. Power reduction and low power circuits have become a major research topic now a days. Adiabatic logic style is found to be an effective solution in achieving low power. In this paper, various adiabatic logic approaches have studied and compared with a proposed adiabatic logic based on PFAL logic circuit. Adiabatic logic styles such as 2N-2P, 2N2N-2P, DCPAL and PFAL are considered and their average power dissipation and delay at different frequencies are compared with the proposed circuit. the proposed circuit has achieved the average power consumption of 1.649nw, 1.938nw, 1.932nw, 2.596nw for BUFFER, NAND, NOR and XOR circuits respectively at 10MHz. At 32nm technology the average power consumption of 0.842nw, 0.942nw, 0.957nw, 1.038nw for the same logic at 10 MHz. From the results it is concluded that proposed ON OFF DCDB-PFAL based circuit performed very well and achieved lowest power consumption among all other adiabatic logic circuits.

Adiabatic Logic Circuits Designfor Low Power in Applications in Digital Circuits
Authors:- Sanjay Kumar, Prof. Sher Singh, Asst. Prof. Suresh S.Gawande

Abstract- With the continuous scaling down of device technology in the field of VLSI circuit design, low power dissipation has become one of the primary concern of the research field. With the increasing demand of low power portable devices, adiabatic logic gates prove to be an effective solution. This paper presents different types of adiabatic logic families such as 2N-2N2P, PFAL (Positive Feedback Adiabatic Logic), DCPAL (Differential Cascode and Pre-resolved Adiabatic Logic) and a proposed circuit based on the PFAL logic circuit. This paper investigates different adiabatic logic families such as ECRL, 2N-2N2P and PFAL. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100MHz frequency, for fair comparison of results W/L ratio of all the circuit is same. Finally average power dissipation characteristics are plotted with the help of a graph and comparisons are made between different logic families.

A Descriptive Study to Assess the Level of Awareness on Covid 19 Precaution among Home Makers at Selected Areas of Chengelpet District
Authors:- Associate Prof. Ms.S.Kavitha, Associate Prof. Ms.P. Sangeetha, Dr. N. Kokilavani (Principal)

Abstract- The Covid-19 pandemic worldwide caused by severe loss of health and life of many people. Covid appropriate behaviours were entrusted by government of India to reduce the covid-19 spread across the nation. This article reveals the level of awareness on covid-19 preventive measures among the home makers, it is a Non- experimental design – Descriptive research design was adopted to selected 50 clients from selected areas of chengelpet district by purposive sampling technique, assessed by the structured multiple choice questionnaire and analysed by using descriptive statistics.The findings of this study suggests 61.2% of clients are having inadequate awareness, 28.4% of them having moderately adequate awareness and only10.4% falls in category of adequate the level of awareness on tuberculosis. This study concludes that around 61% of the clients are having inadequate awareness on covid19 appropriate behaviour. The researcher also suggests that an educational intervention can help the clients to improve their awareness thereby it reduces the spreading rates of Covid 19 in forth coming months.

A Review of Welding Process on Microstructure & Mechanical Properties of Zinc Brass
Authors:- M. Tech. Scholar Jatin Dalal, Asst. Prof. Manoj

Abstract-One of a kind lapping welding joints of Cu & metal conductors are made by grinding blend weld process methodology at a no. of welded heating i/ps. The impact of welded heating i/ps on nano-design & m/c properties of get over welding combinations at 2 assorted joining plans (for instance Propelling side & Retreating side joint courses of action) was analyzed. In dual combination plans, Cu & metal plating are arranged on the topped & base plates, independently.

IoT based Smart Mirror using Raspberry Pi
Authors:- Anubha Jain,Diwakar Kumar,KirtiAgrawal, Asst. Prof.Shruti Sharma

Abstract- This project represents the development and designs of a mirror that Shows a graceful interface for glancing information, and it is also used for setting the To-Do list. And in this android facilities can also be added. The Smart mirror is such kind of device that functions as a mirror with many advanced capabilities of displaying multimedia data i.e. Videotext and images.

Feasibility Analysis of Single Effect Vapour Absorption Systemin Dairy Industry
Authors:- M. Tech. Scholar Arvind Kumar, Prof. Suresh Bhadoriya

Abstract- Today’s world is facing two most important environmental problems. They are the energy crisis and the greenhouse effect. Scientists are working on how to eradicate these problems. Most of the today’s innovations are based on this fact. Lithium-Bromide and water driven absorption refrigeration cycle is a burning example of this concept, which not only helps in minimizing the fossil fuel usage, hence the reduced CO2 gas emission but also utilizes the low-grade heat from various industries and data centres.Energy, exergy and advanced exergy methods are used to analyse a milk powder production facility. In this study, feasibility analysis of single effect vapour absorption systemin dairy industry has been evaluated.

IoT Based Anti-Poaching Alarm System for Trees in Forest
Authors:- Pankil Chhabra, Teerth Jain, Harshvardhan Kalaskar, Prof. A. V. Bhamare

Abstract- All around the world there are numerous occurrence about stealing of trees like sandal, sagwan, timber etc. These trees are expensive and pitiful. They are utilized in medicine, beautifying agent, furniture etc. To limit their sneaking and to spare woodland around the world some preventive estimates should be conveyed and sometimes in forest, fire broke out which cause destruction to wildlife animal and also tree so it is necessary to control fire as soon as possible. For this we have built up a framework which can be utilized to limit sneaking. The structure framework utilizes three sensor i.e. tilt sensor, vibration sensor, flame sensor to recognize the tendency of tree when its being cut, to detect unlawful logging and to detect fire in forest respectively. And with the help of IOT model information being sent to Forest authorities.

Smart Grid Management by Genetic Algorithm and Renewable Resources
Authors:- M.Tech. Scholar Mahesh Nair, Prof. Lavkesh Patidar

Abstract- As power requests are expanding day by day causing unbalance in the present grid framework which brings about different causes like load shedding, unbalance voltage and so on which at last influences the end users. Presently to stay away from every such circumstance the main alternative is to take care of the demand by generation but, world are additionally slacking with the conventional sources so producing more power is not helpful by traditional ways. The power industry has adopted “smart” grids that use information and communication technologies, which may make electric power systems more reliable and efficient. This paper has proposed a grid load balancing by modified genetic algorithm and renewable resources. Genetic algorithm provides a combination of renewable resource with non-renewable power resources. Experiment was done on different environmental condition to get better comparisons.

Feature Extraction and Classification Techniques for Analysis Stress Using EEG Signals with Web Application
Authors:- Sowmya H D, DR. Girisha GS

Abstract- The biological response to stress originates in brain that involves different biochemical and physiological effects. Numerous basic clinical strategies to survey pressure depend on the nearness of explicit hormones and on highlights separated from various signs, including electrocardiogram circulatory strain, skin temperature, or galvanic skin reaction. To screen pressure various strategies can be utilised. In this task for an anxiety acknowledgment, Electroencephalogram (EEG) signal is utilised. Electroencephalogram (EEG) signal is a neuro-signal that is produced due to diverse electrical exercises in the mind. Various sorts of electrical exercises related to various conditions of the mind. These signs can be caught and handled to get the helpful data that can be utilised in early location of some physiological state. In this proposed system, EEG signal database is pre-processed and features are extracted. Classification of stress level is done by implementing machine learning algorithms. In which Random Forest will provide the better accuracy.

A Review Article of ANN and Adaboost Based Effective Face Recognition and Improvement of Classification Training
Authors:- P.G. Scholar Priyanshu Tamrakar, Assistant Professor Hemant Amhia

Abstract-The Face Recognition (FR) is growing as a major research area because of the broad choice of applications in the fields of commercial and law enforcement. Traditional FR methods based on Visible Spectrum (VS) are facing challenges like object illumination, pose variation, expression changes, and facial disguises. Unfortunately these limitations decrease the performance in object identification and verification. To overcome all these limitations, the Infrared Spectrum (IRS) may be used in human FR. So it leads and encourages the researchers for continuous research in this area of FR. Simultaneously, the present study emphasizes the use of three dimensional cubic dataset i.e. Multi/ Hyperspectral Imagery Data in FR. The IR based Multi/ Hyperspectral Imaging System can minimize the several limitations arise in the existing and classical FR system because the skin spectra derived with cubic dataset depicts the unique features for an individual. Multi/ Hyperspectral Imaging System provides valuable discriminants for individual appearance that cannot be obtained by additional imaging system that’s why this may be the future of human FR. This paper also presents a detailed and time to time review of the literature on FR in IRS.

Design and Analysis of Compatibility of Crash Box with Trigger and Thickness Variation for Vehicle Frontal Part During Low Velocity Collision
Authors:- M. Tech. Student Harikrishna.S, Prof. Nilesh A Sakle

Abstract- The frontal impact as per the statistics is the most common means of phenomena when it comes to collision and thereby results in several injuries and fatalities. Therefore the design of crashbox has become an important area of focus for vehicle structure to deform and absorb the impact energy during collsion. The crash box deforms by absorbing the force and reduces the force acted on the longitudinal members there by preventing the collision force intrusion to passenger cabin. Triggers can be implemented in the design of crash box to help in achieving sequential deformation pattern. The crashbox is tested at 15 kmph based on RCAR (Research Council for Automobile Repairs) regulation. A crashbox of a Sedan has been measured and designed to been taken as a benchmark. A hexagonal crashbox has been designed with trigger holes and trigger thickness variations and is compared with the benchmark Sedan crashbox to determine its deformation characterisitcs. The main objective is to design a crash box with trigger and thickness variation to aid the longitudinal members using Creo 2.0 software and analyse the overall behaviour & characteristics using the ANSYS software.

Development of Web Server Using AI
Authors:- Bhavana.B Sunanda Bhargavi Devika.B

Abstract- Website: A collection of web pages which are grouped together and usually connected together in various ways. Web server: A project hosts a website of twitter management system. Artificial intelligence (AI) is the ability of a computer program or a machine to think and learn. Study of social network platforms such as twitter.

Android Based Smart Shopping System
Authors:- Raji Bokade, Prof. Nitin Deotale

Abstract- E-commerce has taken the world by surge due to its limitless advantages. Even so, many customers find themselves getting stuck in chicanery and receive trite products. They tend to incline towards the traditional or off-line shopping which is more trustworthy. But traditional shopping seems too time consuming and includes a lot of labor. In an attempt to bridge this gap between the extant traditional shopping and the burgeoning online shopping, this paper discusses an application wherein people can exploit the advantages of both off-line and on-line shopping. This system can be implemented by any shop and can be used at internet and smartphone friendly places. The application mentioned here would read the barcode of the product and add it to the cart in application with methods to change or edit the list. Payment gateway is provided to make payments. Shops can provide an online portal, which would avoid losing customers. Since the application is available on the smartphone it is easily accessible and readily available.

A Comprehensive Review on the Various Steganography Methods Based on Encryption and Data Hiding
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- As the technology is advancing day by data and with the same pace information and its secure transmission is also crucial in the process of information transmission. Images are usually the simplest digital data which is used in multiple applications. From satellite to whatsapp applications all around and there are billions of images that are transmitted through digital communication channel. To solve the problem of safest delivery of message to the receiver encryption with the steganography method can be used simultaneously. Various researchers had proposed various ways of hiding data into digital images either by using encryption and steganography and some has combined both these methods to make data more secure. In this review paper a deep literature survey is performed on the steganography of digital images where encryption and data hiding are used for making the data safer.

Smart Automation Attendance System using Neural Networks
Authors:- Satwik Ram Kodandaram, Kushal Honnappa, Rishab Darshan S

Abstract- A Traditional Attendance system will be a huge burden on teachers. After marking down, it manually, they have to upload it to some database to maintain the student’s records. When there is a batch of students more than 500, doing it manually is imaginary. To resolve this problem, a smart and auto attendance management system is utilized. But authentication is a very important issue in this system. The smart attendance system is generally done with the help of biometrics. Face recognition is one of the best biometric methods to improve this attendance system. Being a prime feature of biometric verification, facial recognition is used in several applications like video monitoring. By utilizing this system, the problem of proxies and students being marked present even though they are not physically present in the class can be easily solved. The main implementation step used in this system is face detection and recognizing the detected face. This paper proposes a model for implementing an automated attendance management system using ANN and CNN. After this, the student’s faces are mapped to their USN (University serial number) or ID. When the student’s face is recognized and if they are present in the current location of the teacher, automatically the USN mapped to that student is marked as present in the database. In this model, the teacher needs to hosts the system through a web application or android application. While hosting the teacher’s current location is taken. This model will be a successful technique to manage the attendance and records of students.

To Design and Analysis of Staad Based Chimney Design and Air Flow Observation
Authors:- M. Tech. Scholar Shivraj Patidar, Prof. Sourabh Dashore

Abstract- It has been observed that most of the existing studies have focused on the load considerations for design of tall chimneys. To make a further contribution to this study, this paper presents the load parameters considered for the design of RCC chimney and focuses on one of the structural parameters of RCC chimneys viz. the effects of number of supports to the flue. A brief review on the types of supports is presented in this paper and analysis is carried out for different kinds of supports to the flue. The comparison of results is plotted. The software STAAD Pro and MS Excel sheets have been used for design.

Importance of Smart Sensor Technology in IoT Based Applications
Authors:- Ankita S Sawalkar

Abstract- Nowadays , there is a large requirement of Smart Sensors as recent technologies are developing with high speed electronic circuits with low cost. These collaborative interactions need higher quality, reliability, and economic efficiency of technical products. In this article, there will be an overview about Smart Sensors and Sensor Technology in today’s IoT based applications with structures, types and example.

A Comprehensive Review of Various Face Detection and Recognition Techniques
Authors:- Research Scholar Amritpal Kaur, Asst. Prof. Shaveta Bala

Abstract-From the last decade the computer vision and the machine learning fields has various applications in almost every field of artificial intelligence. From object detection to recognition, bar code reading to biometric data matching, from vegetable classification to vehicle information extraction in almost every area both of these fields are dominating. For the identity verification face detection and recognition are one of the prime steps. Various researchers have developed various algorithms for face detection and recognition. All of these methods have some pros and cons. Some are fast in execution and some have high accuracy. In this review paper a comprehensive review is performed on the face detection and recognition techniques so that various researchers could find the insight of the various researches performed on this field of artificial intelligence.

Evaluation of Spectrum Sharing in Cognitive Radio Networks Using Fuzzy Logic
Authors:- Anooja.B, Princy Merin Jose

Abstract- Cognitive radio (CR) network is the footstep and essential need of the new wireless emerging technologies like the Wireless Sensor Network (WSN), Internet of Things (IoT), Bluetooth, and Vehicular Ad Hoc Network (VANET). Due to tremendous progress in the number of wireless devices and their traffic, large scale use of these technologies may soon cause a shortage of spectrum as all these technologies use unlicensed bands. So, CR is a vital choice for their survival.The proliferation of mobile devices and the heterogeneous environment of wireless communications has increased the need for additional spectrum for data transmission. It is not possible to altogether allocate a new band to all networks, which is why fully efficient use of the already available spectrum is the demand of the day. Cognitive radio (CR) technology is a promising solution for efficient spectrum utilization, where CR devices, or secondary users (SUs), can opportunistically exploit white spaces available in the licensed channels. SUs have to immediately vacate the licensed channel and switch to another available channel when they detect the arrival of the incumbent primary user. However, performance for the SU severely degrades if successive channel switching happens. Moreover, taking the channel-switching decisions based on crisp logic is not a suitable approach in the brain-empowered CR networks (CRNs) where sensing information is not only imprecise and inaccurate but also involves a major uncertainty factor. In this paper, I propose a fuzzy logic-based decision support system (FLB-DSS) that jointly deals with channel selection and channel switching to enhance the overall throughput of CRNs. The proposed scheme reduces the SU channel switching rate and makes channel selection more adaptable. The performance of the proposed scheme is evaluated using a fuzzy logic, and a comprehensive comparison study with a baseline scheme is presented. The simulation results are promising in terms of the throughput and the number of hand-offs and making our proposed FLB-DSS a good candidate mechanism for SUs while making judicious decisions in the CR environment.

Impact of Social Media on Stock Market
Authors:- Prabhav Sharma

Abstract- This research shows the impact of various social media sites which directly and indirectly influence today’s stock market and made possible to manipulate for personal as well as community gains. This research shows the subsequent rise and fall in the prices of shares after the tweets of CEO’s and wealthy entrepreneurs having a strong social media presence in various platforms. It also discusses an analysis of the Gamestop surge event where some users on Reddit invested heavily on that share and massively increased the price which was dying because of short selling done by hedge funds.

A Novel Approach of Data Hiding in Encrypted Digital Images using Hybrid Steganography
Authors:- Research Scholar Savinder Kaur, Asst. Prof. Shaveta Bala

Abstract- This research shows the impact of various social media sites which directly and indirectly influence today’s stock market and made possible to manipulate for personal as well as community gains. This research shows the subsequent rise and fall in the prices of shares after the tweets of CEO’s and wealthy entrepreneurs having a strong social media presence in various platforms. It also discusses an analysis of the Gamestop surge event where some users on Reddit invested heavily on that share and massively increased the price which was dying because of short selling done by hedge funds.

Prediction of Breast Cancer using Deep Learning
Authors:- Asst. Prof. Anandajayam.P, Abhishree.P, Rashmi.C.U, Keerthana.M

Abstract- The recent developments in the information technology have generated a volatile growth of data. In this paper we cover the problem of breast cancer prediction using Machine Learning. We considered two types of datasets, namely, Gene Expression (GE) andDNA Methylation (DM). The main objective of this paper is to predict the breast cancer using Deep Learning. We have developed a deep learning model to detect Breast cancer in CSV files. Benign and Malignant will be the two detections of the model. We use PyCharm as the platformto train and test our datasets.

Comparative Analysis of Machine Learning Algorithms To Perform Customer Segmentation
Authors:- Stuti Arora, Sunanda Mandal, Sasi Rekha Sankarl

Abstract- TConsidering the current pandemic, companies are finding it difficult to reach out to their customers and target them. Given a dataset of customer details pertaining to any company, it would be possible to come up with a generalized machine learning algorithm (by comparing K-Means Clustering, Principal Component Analysis and DBSCAN) keeping in mind the factors – age, gender, annual income and spending score. Using this, we can identify the most profitable segment of customers, hence ensuring efficient utilization of funds, workforce and time and adding to the overall brand value of the company. Using the age group of the most profitable segment of customers, the concept of generational marketing can be applied in order to narrow down which marketing channel would be the most effective to target customers on the basis of their age.

Morphological Study of Discarded Polyurethane Hybrid Composites
Authors:- Mr. J. Starlin Deva Prince, Godfrey Mohan R, Milan Chand J S, Mohammed Shabeen J

Abstract- Hybrid materials are composites consisting of two constituents at the nanometer or molecular level. Commonly one of these compounds is inorganic and the other one organic in nature. Thus, they differ from traditional composites where the constituents are macroscopic. Mixing at the microscopic scale leads to a more homogeneous material that either shows characteristics in between the two original phases. Polyurethane is a plastic material, which exists in various forms. It can be tailored to be either rigid or flexible, and is the material of choice for a broad range of end-user applications such as: insulation of refrigerators and freezers, building insulation, High abrasion resistance Thick section molding , Colorability ,Oil resistance, Ozone resistance, Radiation resistance. Other advantages are castable nature and Low pressure tooling. This investigation helps to know about the morphological study of discarded polyurethane hybrid composite. Layout method is used for combining both polyurethane and nylon fibres. By using the following combination, we have prepared six samples with different samples as S1- S6. The percentage proportions as follows;
S1- 100% polyurethane
S2- 80% polyurethane + 20% nylon
S3- 60% polyurethane + 40% nylon S4-100% nylon
S5-80% nylon + 20% polyurethane S6-60% nylon + 40% polyurethane

DOI: 10.61137/ijsret.vol.7.issue4.646

Dynamic Mechanical Analysis of Discarded Polyurethane with Polyester Hybrid Composites
Authors:- E. Bravin Daniel, Ajin B S, Ajun Jijo S, Berin J

Abstract- A composite material is a combination of two materials with different physical and chemical properties. When they are combined they create a material which is specialised to do a certain job, for instance to become stronger, lighter or resistant to electricity. They can also improve strength and stiffness. Polymer matrix composites (PMCs) are the most widely used composite type. Just as is the case for polymers, the environment typically needs to be controlled to obtain consistent test results for PMCs Polymer matrix composites (PMCs) have gained considerable interest mainly due to their low cost and higher specific strength and stiffness compared to conventional metallic alloys. This prepared composites were evaluated by dynamic mechanical analysis method such as dynamic mechanical analysis, X-Ray diffraction, Fourier transform infrared. The aim is to conduct the dynamic mechanical analysis of polyurethane and polyester composite. Polyurethane is the thermosetting polymer composite which can withstand high temperature. On the other hand polyester is the fiber material with ductile nature. After the preparation of the composites ,mechanical analysis of the specimen is to be analyzed.

DOI: 10.61137/ijsret.vol.7.issue4.647

Investigation of Co-Pyrolysis of Plastic and Cocos Nocifera
Authors:- S. Ajith kumar, Janobin S, Halin Heijal A, Bisel M

Abstract- Generally all over the world, the usage of fossil fuels in the day to day life as liquid, gas and the solid have been highly increased. Nowadays the population is getting highly increased and at the same time, the usage of biomass is also increasing. Biomass is an alternate fuel from the starting era of biotic organism. The usage of plastic also increased. The disposal and recycling of plastic is facing a challenging task. The researchers are facing high tedious problem in destroying plastic. Since the decomposition of plastic is highly dangerous to the soil. Pyrolysis process is the most promising for the waste to useful form of energy conversion techniques. While destroying biomass and plastic, more carbon footprints are seen. End product of plastic and biomass pyrolysis has its own deficiency in its characterization. In order to overcome these drawbacks, biomass and plastic is combined together as mass quantity and undergoes pyrolysis process for finding the better result. The pyrolysis end product properties like ash content, moisture content, kinematic viscosity, density, flash point, fire point, cloud point, pour point, gross calorific value and specific gravity are determined.

DOI: 10.61137/ijsret.vol.7.issue4.648

IoT-Driven Personalized Healthcare

Authors: Nithin Nanchari

Abstract: With the rise of the web of things in the health sector, the personalized treatment of people in real-time using real data has evolved into shape. Through IoT and personalized healthcare, individual medical interventions are delivered so that patients can monitor themselves and gain better treatment effectiveness. The contribution of this paper consists of how IoT enables custom healthcare solutions through AI-driven health assistants, real-time data analytics, a patient-centric approach, and wearable technology. Also, the study highlights the utility of IoT in improving the accuracy of precision medicine and improving healthcare services. Such a personalized healthcare solution could progress by integrating IoT and AI.

DOI: http://doi.org/10.5281/zenodo.15796148

 

The Introduction of Multi-Tenant Solaris Environments for Research Institutions

Authors: Harini Samarasinghe, Dilan Madushanka, Ruwani Gamage, Amila Wickramasinghe

Abstract: Research institutions are increasingly challenged to support a diverse array of computing workloads ranging from high-throughput bioinformatics to high-performance simulations within constrained physical infrastructure. Multi-tenant architectures offer a cost-effective and scalable solution, enabling multiple research groups to securely share resources while maintaining strong boundaries of isolation, performance, and compliance. This review explores the architectural, operational, and security dimensions of building multi-tenant environments using Oracle Solaris. It covers foundational technologies such as zones and Logical Domains (LDOMs), details approaches to resource allocation, identity management, and audit logging, and addresses the specific needs of research computing environments including regulatory compliance (HIPAA, GDPR, FERPA), data reproducibility, and access governance. The article further discusses automation, orchestration, and monitoring strategies, including integration with DevOps tools and SIEM platforms. Real-world use cases from genomics labs, physics departments, and engineering faculties illustrate the practical applications of Solaris-based tenancy. Challenges such as kernel-sharing risks, resource contention, and cloud scalability limitations are critically examined. Finally, the paper outlines future directions including hybrid cloud integration, AI-optimized zone support, and policy-as-code templates for rapid, compliant deployments. This comprehensive review serves as a technical and strategic guide for research institutions seeking to modernize and secure their multi-tenant UNIX infrastructure using Solaris.

DOI: https://doi.org/10.5281/zenodo.15847545

A Telemetry-Centric Approach To Identifying Recurrent Defect Structures In Software Systems

Authors: Hema Latha Boddupally

Abstract: This study examines how telemetry driven code analytics can be systematically leveraged to identify recurrent defect structures in complex software systems, addressing a persistent challenge in software quality engineering where failures reappear across releases despite localized fixes. The research focuses on the problem of distinguishing isolated faults from structurally recurring defects by using runtime telemetry as a primary analytical signal rather than relying solely on static inspection or post-incident reports. The study adopts a mixed methodological approach combining empirical analysis of telemetry artifacts, structured feature engineering, and quantitative pattern detection techniques to uncover repeatable defect signatures that span code, configuration, and execution behavior. Findings demonstrate that telemetry-informed analysis enables earlier recognition of defect recurrence, improves diagnostic consistency, and strengthens the linkage between observed failures and underlying code structures. The proposed approach introduces a coherent analytical framework that integrates telemetry normalization, defect signature extraction, and code level attribution, offering a novel contribution to defect analysis practices. From a strategic perspective, the study contributes to software engineering research by reframing defect detection as a signal driven, evidence based process grounded in runtime behavior. Practically, it provides guidance for engineering teams seeking to enhance reliability, reduce diagnostic effort, and institutionalize learning from recurring failures. The work holds significance for both academic inquiry and industrial practice by advancing a scalable, analytically rigorous pathway for improving long term software quality.

DOI: http://doi.org/10.5281/zenodo.18125283

Intelligent Automation Of Financial Compliance And Reporting Processes Using SAP And Machine Learning

Authors: Ira Chaturvedi

Abstract: The rapid digitization of corporate finance and the increasing complexity of global regulatory frameworks have necessitated a shift from manual oversight to intelligent automation. This review article investigates the integration of Machine Learning algorithms within the SAP S/4HANA ecosystem to enhance financial compliance and reporting efficiency. By leveraging the SAP Business Technology Platform, organizations can move beyond traditional rule-based systems to implement real-time anomaly detection, automated intercompany reconciliations, and predictive financial closing processes. The analysis explores the technical architecture required to bridge the gap between transactional data and autonomous governance, highlighting the role of the Universal Journal as a single source of truth. Furthermore, the article addresses the strategic challenges of data orchestration, the necessity of Explainable AI for auditability, and the emerging role of Natural Language Processing in interpreting unstructured regulatory documents. As financial reporting transitions toward a continuous monitoring model, the synergy between ERP robustness and machine intelligence becomes a critical factor in reducing operational risk and ensuring transparency. The findings suggest that while intelligent automation significantly reduces the manual burden of compliance, a human-in-the-loop approach remains essential for maintaining ethical oversight and professional judgment. Ultimately, this review provides a comprehensive framework for organizations seeking to leverage SAP and machine learning to transform the finance function into a proactive strategic asset.

DOI: http://doi.org/10.5281/zenodo.18159753

Designing Scalable And Adaptive Cloud–IoT Ecosystems For Wireless Networks

Authors: Mehar Bediya

Abstract: The rapid expansion of the Internet of Things (IoT) and the increasing reliance on wireless connectivity have driven the integration of cloud computing into large-scale IoT ecosystems. While cloud-based solutions offer elastic resources and centralized management, the growing number of connected devices, heterogeneous workloads, and dynamic wireless conditions pose significant challenges in terms of scalability and adaptability. Traditional Cloud–IoT architectures often struggle to efficiently accommodate massive device connectivity, fluctuating data rates, and varying quality-of-service requirements. Consequently, there is a growing need for architectural designs that can dynamically scale resources and adapt system behavior in response to changing network and application conditions. This review paper provides a comprehensive analysis of scalable and adaptive Cloud–IoT ecosystem design for wireless networks. It examines foundational architectural models, wireless communication technologies, and cloud computing paradigms that support IoT deployments. The paper further investigates scalability challenges related to device density, data volume, network capacity, and resource provisioning, as well as adaptability mechanisms that enable context-aware, autonomous, and mobility-aware system operation. Key architectural approaches, including edge and fog computing, microservices, containerization, and serverless computing, are reviewed and compared. In addition, the paper discusses resource management, orchestration strategies, and critical considerations related to security, privacy, and reliability. Through a comparative analysis of existing solutions and an exploration of application domains, the review identifies current limitations, trade-offs, and open research challenges. The paper aims to guide researchers and practitioners in designing resilient, efficient, and future-ready Cloud–IoT ecosystems for dynamic wireless environments.

DOI: http://doi.org/10.5281/zenodo.18159755

Intelligent Financial Governance In SAP ERP Using Hybrid Machine Learning Models

Authors: Aarvik Bhatnagar

Abstract: Effective financial governance is critical for ensuring accuracy, transparency, compliance, and risk mitigation in enterprise resource planning (ERP) systems. SAP ERP provides robust financial and control functionalities; however, traditional governance mechanisms largely depend on static rule-based controls and manual audits, which are increasingly insufficient in handling high-volume, complex, and dynamic financial transactions. This paper proposes an intelligent financial governance approach for SAP ERP systems using hybrid machine learning models that combine rule-based logic, statistical methods, and advanced machine learning techniques. The proposed framework integrates seamlessly with SAP financial modules to enable real-time monitoring, anomaly detection, predictive risk assessment, and continuous compliance management. By leveraging hybrid model architectures, the approach balances adaptability and learning capability with transparency and regulatory interpretability. Practical use cases, including fraud detection, compliance monitoring, and predictive financial controls, demonstrate the effectiveness of the proposed solution. Experimental evaluation highlights the superiority of hybrid models over traditional rule-based and standalone machine learning approaches in terms of detection accuracy, false-positive reduction, and operational scalability. The findings indicate that hybrid machine learning models can transform financial governance in SAP ERP from a reactive control function into a proactive, intelligent, and strategic capability.

DOI: http://doi.org/10.5281/zenodo.18159759

Revisiting Factor Models After 2020: Machine Learning, Factor Stability, and Investment Performance

Authors: Oksana Anatolyevna Malysheva

Abstract: The new financial market environment after 2020, due to the COVID-19 shock, unprecedented monetary interventions, and increased macroeconomic uncertainty has cast new doubt on the reliability and persistence of the traditional models of asset pricing factors. Although classical factor models have traditionally been the basis of portfolio construction and the management of risk, there has been mounting evidence that factor stability can be lost in the face of structural regime changes. The paper reexamines previous post-2020 period factor models with specific focus on occupation of factor permanency and incremental importance of machine learning methods in explaining and predicting investment outcomes. The main aim of this paper is to evaluate whether the traditional risk factors hold their values and are economically significant beyond 2020 and to test the possibility of machine learning-based methods to predict better than traditional linear models to forecast the portfolio performance and results. The study builds standard factor portfolios with a wide equity universe over the post-2020 time sample, and it compares their performance to machine learning-based models that help to identify the nonlinear links and time-varying interactions between firm characteristics. The analysis methodology will be a combination of benchmark linear factor regressions with supervised machine learning algorithms, such as ensemble-based algorithms, applying consistent training and validation to these algorithms. Factor stability is determined with the help of rolling-window estimation and structural change analysis and investment performance with the help of risk-adjusted returns measures and transaction cost-adjusted portfolio performance. The results show that the stability and persistence of a number of conventional factors significantly decreased after 2020 and became more sensitive to market regimes. The models of machine learning have shown greater out-of-sample, and risk-adjusted returns, and the returns are not uniform across factors. The research provides empirical data on post-crisis factor behavior and provides a practical direction of applying machine learning in the integration of factored investment strategies in changing market conditions.

End-to-End Lifecycle Management Of Distributed Cloud-Native Systems

Authors: Ananya Iyer

Abstract: The rapid evolution of cloud computing paradigms has significantly accelerated the adoption of distributed, cloud-native systems grounded in microservices architecture, containerization, dynamic orchestration, and continuous delivery pipelines. Unlike traditional monolithic systems that rely on tightly coupled components and static infrastructure, cloud-native applications are deliberately engineered to leverage elastic scalability, resource abstraction, and automated infrastructure provisioning within highly dynamic cloud environments. Foundational platforms such as Docker and Kubernetes have enabled the development of portable, resilient, and self-healing workloads capable of operating consistently across heterogeneous infrastructures. These technologies facilitate container image standardization, declarative orchestration, automated scaling, and fault recovery. However, as deployments extend to multi-cluster, hybrid-cloud, and multi-cloud ecosystems, system complexity increases exponentially, making comprehensive lifecycle governance a significant technical and organizational challenge. End-to-end lifecycle management therefore encompasses not only architectural design and containerized development but also automated CI/CD pipelines, runtime orchestration, observability engineering, security integration, performance tuning, cost governance (FinOps), and systematic service decommissioning. This review synthesizes contemporary methodologies, architectural patterns, and operational frameworks that support lifecycle governance within large-scale cloud-native ecosystems. It critically examines cross-cutting paradigms including DevSecOps integration, Infrastructure as Code (IaC), GitOps workflows, service mesh architectures, policy-as-code enforcement, FinOps optimization, and AI-driven operations (AIOps). These paradigms collectively emphasize automation, declarative configuration management, continuous validation, and compliance-aware deployment strategies. Particular attention is devoted to runtime observability engineering, integrating metrics, logs, and distributed tracing to enable proactive monitoring and rapid fault isolation. Additionally, the review addresses emerging security imperatives such as software supply chain integrity, container image signing, zero-trust networking models, and runtime threat detection. By embedding governance mechanisms directly into CI/CD and orchestration pipelines, organizations can mitigate configuration drift, reduce operational risk, and enhance resilience in highly dynamic distributed environments. Furthermore, emerging directions such as platform engineering, internal developer platforms (IDPs), serverless-native orchestration models, eBPF-based deep observability, and autonomous remediation frameworks are analyzed as transformative drivers of next-generation lifecycle management. These innovations aim to abstract operational complexity, improve developer productivity, and enable predictive, self-optimizing infrastructure behavior. The study concludes that holistic lifecycle integration—rather than isolated adoption of discrete tools—is essential for achieving sustained operational resilience, regulatory compliance, energy-efficient infrastructure utilization, and continuous innovation in large-scale distributed ecosystems. By consolidating architectural principles, operational best practices, and forward-looking research trajectories, this review provides a comprehensive conceptual and practical framework for researchers and practitioners seeking to advance end-to-end lifecycle management strategies in modern cloud-native systems.

DOI: http://doi.org/10.5281/zenodo.18670338

Cloud-Native System Engineering For High Availability And Performance

Authors: Arjun Rao

Abstract: Cloud-native system engineering has fundamentally transformed the way modern software applications are architected, deployed, and managed across distributed computing environments. Unlike traditional monolithic models that rely on tightly coupled components and static infrastructure, cloud-native approaches embrace modularity, elasticity, and automation as core design principles. Built around technologies such as containerization, microservices architecture, declarative infrastructure, and automated orchestration, cloud-native systems are specifically engineered to operate efficiently in dynamic public, private, and hybrid cloud ecosystems. These systems are designed not only to scale horizontally in response to fluctuating workloads but also to maintain operational continuity in the presence of hardware failures, network disruptions, and unpredictable traffic surges. A primary objective of cloud-native engineering is to achieve high availability (HA)—ensuring minimal service downtime—and high performance (HP)—delivering low latency, high throughput, and efficient resource utilization. High availability is accomplished through architectural strategies such as redundancy, replication, self-healing mechanisms, intelligent load balancing, and fault isolation. High performance, on the other hand, is supported by horizontal scalability, caching strategies, observability-driven optimization, and automated resource management. Together, these characteristics enable resilient and adaptive distributed systems capable of sustaining mission-critical workloads. This review provides a comprehensive examination of the foundational architectural principles, including microservices decomposition and container orchestration; the enabling technologies that support scalability and resilience; and the operational frameworks that integrate continuous integration and continuous deployment (CI/CD). It further explores advanced performance optimization techniques, such as predictive auto-scaling and edge computing, alongside established resilience strategies, including circuit breaker patterns, chaos engineering, and service mesh architectures. Emphasis is placed on practical design patterns, reliability engineering practices, and the cultural integration of DevOps methodologies to achieve sustained operational excellence. By synthesizing current advancements and emerging trends, this review highlights how cloud-native system engineering is evolving toward autonomous, self-optimizing infrastructures. These infrastructures combine intelligent automation, real-time observability, and predictive resilience to meet the growing demands of large-scale, distributed applications.

DOI: http://doi.org/10.5281/zenodo.18670345

Minimization Of Hazardous Solvent Use In Organic Synthesis: Green Chemistry Approaches

Authors: Dr. Ekata Singh

Abstract: Organic synthesis uses solvents in nearly every stage of a chemical process. Solvents are very important as they dissolve reactants, enhance mixing, control reaction temperature and make it easier to isolate and purify the final product. Solvents also affect the speed and result of the reaction, in many cases. Solvents are widely used in laboratory research and industrial chemical production. But many of the most commonly used solvents are dangerous. They are toxic, flammable, highly volatile and difficult to dispose of safely. Common examples include benzene, chloroform, dichloromethane, N,N-dimethylformamide (DMF) and N-methyl-2-pyrrolidone (NMP). Long-term or repeated exposure to such solvents may affect skin, lungs, liver, nervous system and in some cases even increase the risk of cancer or reproductive damage. If not managed properly, solvent waste may pollute air, water and soil. As a result of these concerns, chemists are now giving more emphasis to reducing the use of hazardous solvents in organic synthesis. This is one of the central goals of green chemistry. Green chemistry promotes the designing of safer chemical processes that use fewer harmful substances and create less waste. This paper explains why hazardous solvents are widely used in organic synthesis and how they lead to health, safety, and environmental hazards. It also discusses the main green chemistry methods used for the reduction of solvent-related hazards. And this is where we want to see if we can replace hazardous solvents with safer ones, use greener solvents, carry out solvent-free reactions, design better reaction structures and recover or recycle solvents after use when we want to. Some good things have been done so far but a lot of scientific and practical problems remain. Still, the right way forward is to reduce the use of hazardous solvents so organic synthesis is safer and cleaner.

DOI: https://doi.org/10.5281/zenodo.19479101

Protocol-Aware Engineering For Reliable IMAP And POP Servers: An RFC-Driven Design Approach

Authors: Dr. Jonathan Reed, Dr. Emily Carter, Michael Thompson, Dr. Sarah Williams, David Anderson, Jeji Krishnan

Abstract: Modern email communication systems rely heavily on standardized protocols such as the Internet Message Access Protocol (IMAP) and Post Office Protocol (POP) to ensure reliable message retrieval and management; however, increasing system complexity, diverse client behaviors, and evolving network conditions have exposed limitations in traditional server implementations, often resulting in inconsistencies, performance degradation, and reliability challenges. This paper presents a protocol-aware engineering approach for designing robust and reliable IMAP and POP server architectures, grounded in strict adherence to Request for Comments (RFC) specifications. The proposed approach emphasizes deep protocol understanding, enabling systems to accurately interpret and enforce RFC-defined behaviors while accommodating real-world operational constraints. By integrating protocol-driven validation, optimized state management, and enhanced error-handling mechanisms, the architecture improves interoperability, minimizes protocol violations, and strengthens system resilience. Furthermore, the study incorporates performance-oriented strategies such as efficient session management, concurrency control, and resource optimization to support large-scale deployments. A key contribution of this research is the redesign of server workflows based on protocol semantics, ensuring consistent behavior across diverse client implementations. The paper also explores fault tolerance techniques, including graceful recovery, intelligent retry strategies, and connection stability enhancements tailored specifically for IMAP and POP interactions. Experimental evaluation demonstrates notable improvements in server reliability, response time, and fault recovery capabilities. Overall, the findings indicate that protocol-aware engineering combined with RFC-driven design principles provides a scalable and dependable foundation for modern email infrastructures, offering valuable insights and practical guidance for engineers and researchers involved in the development and maintenance of reliable messaging systems.

DOI: http://doi.org/10.5281/zenodo.20157377

Published by:

How To Publish My Project In Journal

Uncategorized

Project completion for a final year student of any course is a moment of pride and happiness. Some, of course, departments, colleges, universities need publication of project work as well. So how to publish my project in journal is a major question for young scholars. Writing a paper, flow of project representation, publication website selection is all-new assignment. Students need proper guidance from mentors or faculty to get good papers and publications. This article helps those final year students by elaborating the major points of paper writing.

Submit Paper Now

Article Processing Charges

  1. Title: This is a single line that must have words related to your: work/paper content / special technique/technique name/feature name / Area of research.
  2. Abstract: It’s the first paragraph in the paper. This paragraph includes:
    1. One two-line of the paper research area.
    2. One or two lines of the main issue resolve by paper or focus by the paper.
    3. Further three to five lines of proposed model description in case of a research paper, or three to five of survey paper heading.
    4. One or two lines for introducing the finding of the paper.
  3. Keyword / Index Terms: These are important words or key phrases in the paper. Try to include four to six words. Like: computer science, clustering, data mining, genetic algorithm.
  4. Introduction: This portion of the paper should include a general introduction of the paper research area, some of the major issues in the area if paper is a research paper then include the objective as well.
  5. Related Work / Literature Survey: Previous year’s work proposed by scholars of the same area was introduced in this section with an objective that what technique adopts by them to resolve the same issue.
  6. Further section of the paper was dependent on your paper content.
  7. Conclusion: This is again a single paragraph that specifies the findings of the paper as per the content mention in the previous section. This paragraph should have one line of future scope as well.
  8. References: As per content references used by the paper should be include. Try to follow one pattern like Authors’s Name, “Title of Paper”. Publication detail, Publication Timestamp (Volume, issue, year page number).

Students follow the above steps to write paper content for getting published in a good journal. This article help scholar to resolve their major question of how to publish a project paper in journal, similarly how to publish research paper for final year project.

In order to know more about how to publish a journal paper on a final year project or how to publish a project paper, they can directly contact us for improving their writing skills with some suggestions of content and techniques.

Published by:

A Telemetry-Centric Approach To Identifying Recurrent Defect Structures In Software Systems

Uncategorized

Authors: Hema Latha Boddupally

Abstract: This study examines how telemetry driven code analytics can be systematically leveraged to identify recurrent defect structures in complex software systems, addressing a persistent challenge in software quality engineering where failures reappear across releases despite localized fixes. The research focuses on the problem of distinguishing isolated faults from structurally recurring defects by using runtime telemetry as a primary analytical signal rather than relying solely on static inspection or post-incident reports. The study adopts a mixed methodological approach combining empirical analysis of telemetry artifacts, structured feature engineering, and quantitative pattern detection techniques to uncover repeatable defect signatures that span code, configuration, and execution behavior. Findings demonstrate that telemetry-informed analysis enables earlier recognition of defect recurrence, improves diagnostic consistency, and strengthens the linkage between observed failures and underlying code structures. The proposed approach introduces a coherent analytical framework that integrates telemetry normalization, defect signature extraction, and code level attribution, offering a novel contribution to defect analysis practices. From a strategic perspective, the study contributes to software engineering research by reframing defect detection as a signal driven, evidence based process grounded in runtime behavior. Practically, it provides guidance for engineering teams seeking to enhance reliability, reduce diagnostic effort, and institutionalize learning from recurring failures. The work holds significance for both academic inquiry and industrial practice by advancing a scalable, analytically rigorous pathway for improving long term software quality.

DOI: http://doi.org/10.5281/zenodo.18125283

Published by:

Reframing CRM Intelligence Through Knowledge Graph–Based Relationship Modeling

Uncategorized

Authors: Santhosh Reddy BasiReddy

Abstract: Customer Relationship Management (CRM) systems have evolved from simple data repositories into complex enterprise platforms that support decision making, automation, and customer engagement across multiple business functions. Despite these advances, most CRM architectures remain constrained by relational data models that limit contextual awareness, restrict flexible relationship exploration, and hinder real time insight generation. This paper examines the embedding of knowledge graphs within CRM systems as an approach to enabling semantic data integration, dynamic relationship discovery, and real time analytics over customer and enterprise data. Drawing on established research in semantic networks, enterprise knowledge graphs, and graph traversal models, the study outlines an architectural perspective for incorporating knowledge graphs into CRM platforms. The proposed approach illustrates how graph-based representations can enhance operational intelligence, improve contextual decision support, and support adaptive; insight driven CRM workflows in enterprise environments.

DOI: http://doi.org/10.5281/zenodo.18014115

Published by:

Frequently Asked Questions

Uncategorized

FAQs Related to International Journal for paper Publication

  • How to submit a paper in International Journal?

  • Journal provides two options (1) author can directly send paper at: ijsreteditor@gmail.com (2) Online Submission form, For online submission visit. Submission through online mediums is fast and easy for scholars.
  • How many days do the reviewers take to respond for paper acceptance or rejection?

  • Review time depends on the reviewer but normally it takes 2 to 5 days. As per paper content time vary, but for some fast review, the scholar can request at ijsreteditor@gmail.com after paper submission.
  • What is the paper submission format (pdf, doc)?

  • Journal accepts paper in all pdf and doc files. But it’s better if scholars provide doc files.
  • What are publication charges?

  • Publication fees is categorize into two types. (1) Indian author charges are 1000 Rs, we reduce this fees upto 600Rs as per paper quality (good quality paper less price). (2) Non-Indian ublication charge is 32USD.
  • Does the author get digital certificates after publication?

  • Yes, all authors in a research paper get separate digital certificates.
  • Do authors get digital or hard copies of paper and certificates?

  • This is an online journal so only soft or digital copies of paper and certificates were provided.
  • Paper publication link?

  • Scholar check volume issue of publication mention in certificate and visit on Archives page of the portal. Select specific volume and issue link after this you can search on-page by author, paper title, and click on the download button to view your published paper.
  • How to complete the copyright form?

  • In copyright write detail of first / corresponding author,
  • How to submit publication fees?

  • Indian authors can pay by Netbanking, UPI options available at: https://ijsret.com/article-processing-fee/ . Non-Indian authors can pay by Paypal
  • Journal Indexing on other sites?

  • We have list all our indexing at https://ijsret.com/journal-indexing/
  • The maximum limit for the number of authors and pages ? Journal charge extra amount after any specific number of authors/pages?

  • No extra charges for an increase in the number of pages or authors on the page. Minimum one author and minimum of 3 pages is the lower limit for publication. No maximum limit set for the author and page count.

For other queries, scholars can chat with our staff and resolve their doubts. We are ready to help you.

Published by:

Operational Intelligence For Kubernetes: Applying Machine Learning To Capacity Forecasting And Infrastructure Cost Optimization

Uncategorized

Authors: Sriram Ghanta

Abstract: Operational reliability and cost efficiency in container orchestration platforms depend on accurate capacity planning under highly variable workloads, yet prevailing practices in Kubernetes environments remain largely reactive and heuristic driven. This study addresses the persistent challenge of aligning resource provisioning decisions with dynamic demand patterns while controlling infrastructure expenditure. The research investigates how operational intelligence can be systematically enhanced through the application of machine learning models to capacity forecasting and cost optimization in Kubernetes clusters. Using a quantitative, design-oriented methodology, the study integrates telemetry driven feature engineering with predictive modeling techniques to estimate short and medium horizon resource requirements. Forecast outputs are coupled with a constrained optimization framework that translates predictions into actionable provisioning and right sizing decisions while preserving service stability. Empirical evaluation across representative workload scenarios demonstrates measurable improvements in forecast accuracy, reduction of resource over allocation, and sustained operational performance under variable demand conditions. The findings highlight the value of combining predictive analytics with governance aware execution loops rather than fully automated control. This work contributes a structured operational intelligence framework that bridges the gap between monitoring data and infrastructure decision making, offering both academic insight into applied machine learning for systems operations and practical guidance for platform engineers. The study concludes that predictive capacity intelligence represents a viable pathway toward more disciplined, cost-conscious Kubernetes operations with broader implications for data driven infrastructure management research.

DOI: http://doi.org/10.5281/zenodo.18083289

Published by:

Hybrid Control Strategies for Efficient Scheduling and Flow Management in ETL Pipelines

Uncategorized

Authors: Srujana Parepalli

Abstract: Efficient coordination of extract, transform and load operations remains a central challenge in modern data environments where heterogeneous workloads, fluctuating input volumes and interdependent processing paths must be executed reliably within constrained operational windows. Traditional scheduling approaches, which rely primarily on static calendars or isolated event triggers, often struggle to accommodate sudden workload shifts, variable resource availability or the dynamic behavior of upstream systems. This study introduces a hybrid control strategy designed to integrate rule-driven scheduling with adaptive flow management mechanisms capable of adjusting execution plans in response to real-time operational conditions. The proposed approach combines deterministic dependency modeling, workload-aware prioritization, constraint-sensitive routing and continuous feedback loops to create a more stable and resilient orchestration layer for large-scale ETL ecosystems. Using a conceptual and analytically grounded evaluation across representative pipeline scenarios, the study demonstrates how hybrid control methods can reduce congestion, mitigate cascading delays, improve resource utilization and enhance operational predictability. The findings contribute a structured framework that unifies classical scheduling principles with adaptive control logic, offering enterprises a scalable method for coordinating complex ETL pipelines while maintaining reliability, throughput and adherence to business-driven processing commitments.

DOI: https://doi.org/10.5281/zenodo.17896504

Published by:

From Control To Code: Governance Models For Multi-Cloud ERP Modernization

Uncategorized

Authors: Shravan Kumar Reddy Padur

Abstract: By 2021, enterprise resource planning (ERP) ecosystems had transformed from monolithic, vendor-locked systems into distributed, multi-cloud platforms that seamlessly integrated Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and on-premises workloads. This evolution introduced new layers of complexity—spanning identity management, data residency, and cross-cloud compliance that traditional manual governance frameworks could no longer manage effectively. As organizations sought agility and resilience, governance matured from static, checklist-driven processes into codified, policy-as-code frameworks that embedded compliance directly within automation pipelines. Standards such as ISO 38500, NIST SP 800-53, and COBIT 5 provided the structural foundation, while Zero-Trust, FinOps, and continuous compliance architectures redefined operational execution. Drawing on two decades of evolution, this article consolidates these paradigms into a unified governance model that aligns multi-cloud ERP modernization with verifiable security, cost transparency, and adaptive policy enforcement across dynamic enterprise environments.

DOI: http://doi.org/10.5281/zenodo.17679693

Published by:

AI-Augmented Benefits Administration: A Standards-Driven Automation Framework With Oracle HCM Cloud

Uncategorized

Authors: Kranthi Kumar Routhu

Abstract: The digitization of human capital management has fundamentally reshaped how organizations design, deliver, and optimize employee benefits by replacing rigid, manual workflows with intelligent, data-driven ecosystems. Historically, benefits administration depended on paper-based processes, fragmented eligibility checks, and periodic reconciliations that increased operational risk and slowed employee service delivery. By mid-2021, forward-looking enterprises began embedding AI-driven decision support, standardized data exchange protocols, and event-based automation into Oracle HCM Cloud, creating adaptive benefits ecosystems that respond dynamically to workforce needs. These transformations enable not only faster and more accurate enrollment but also personalized plan recommendations, automated compliance validation, and seamless integration with carriers and payroll systems through Oracle Integration Cloud (OIC). This paper outlines a practical automation blueprint that leverages recommendation engines, predictive triggers, and secure real-time integrations to deliver scalable, compliant, and employee-centric benefits experiences at enterprise scale.

DOI: https://doi.org/10.5281/zenodo.17669918

Published by:

IJSRET Volume 7 Issue 3, May-June-2021

Uncategorized

Estimation of Cooling/Heating Loads Quantity of Air (CFM) and Hence Tons of Refrigeration Required for Air-Conditioning of Commercial Establishment
Authors:- Asst. Prof. Attalique Rabbani, Moazzam Mohd Mujeeb, Samad Bin Khaled, Abdul Wahab

Abstract- More than 90 per cent of our time is spent in buildings i.e. either in the office or at home. Energy used in buildings (residential and commercial) accounts for a significant percentage of a country’s total energy consumption. This percentage depends greatly on the degree of electrification, the level of urbanization, the amount of building area per capita, the prevailing climate, as well as national and local policies to promote efficiency. In many countries, buildings consume more energy than transport and industry. The International Energy Agency (IEA) statistics estimate that globally, the building sector is responsible for more electricity consumption than any other sector, 42 per cent. Today, the field of air conditioning design is more technologically challenging than ever before. While design innovations and product improvement promise sleeker, more versatile, more powerful and more energy-efficient air conditioners, the challenge today lies in identifying the most appropriate products, for their application at hand. Indeed, today the emphasis is no more on understanding air conditioning “products” but on crating “solutions” and not just solutions, but “customized solutions” that suit specific needs i.e., heating/cooling or ventilation. Central Air-conditioning plant comprises of Heating Ventilation and Air-Conditioning. Conditioning means control of mainly Temperature and humidity apart from dust odour. Temperature and humidity is control through vapour refrigeration cycle, having refrigeration like R-134a. Air is composed mainly of gases. The major gaseous components of clean, dry air near sea level are approximately 21% oxygen, 78% nitrogen, 1% argon, and 0.04% carbon dioxide. Normal outdoor air contains varying amounts of foreign materials (permanent atmospheric impurities). These materials can arise from natural processes such as wind erosion, sea spray evaporation, volcanic eruption, and metabolism or decay of organic matter. The natural contaminant concentrations in the air that we breathe vary but are usually lower than those caused by human activity. To evaluate the thermal load, quantity of air to be distributed and ventilation air in the conditioned space Carrier developed software HAP v.4.41 is used. Quantity of air, which is evaluated from the heat gains/loss into the space need to be properly evaluated considering the orientation if the building, type of glass/structure, occupancy and nature of work in the conditioned area, so is the quantity of air need to be exhausted. And to evaluate ton of the refrigeration required for the same.

A Survey on Cloud Environment Intrusion Detection System Types and Issues
Authors:- Asst. Prof. Ms. Amlesh Singh, Dean Dr. Pratima Gautam

Abstract- Cloud reduces implementation cost and increases flexibility of data access around the globe. But this easiness of uses introduces the vulnerability in the network. So different type of attacks inform of intrusion was prepared and execute by insider or outsider virtual machines in the cloud. Detection of such type of attacks needs to develop intrusion detection system. This paper has found type of intrusion in cloud environment. Further paper has summarized various techniques proposed by scholars to develop a intrusion detection system. Various intrusion detection system were classified as per detection approaches adopt by researcher. Finally paper detailed the issues of cloud security that make this area of research more complex.

An Analysis of Receiver Operating Characteristic Curve, Area Under Curve and Precision Recall
Authors:- Associate Prof. Praveen Gujjar J, Asst. Prof. Naveen Kumar V

Abstract- Receiver Operating Characteristic (ROC) curves are commonly used to present results for binary decision problems in machine learning. However, when dealing with highly skewed datasets, Precision-Recall (PR) curves give a more informative picture of an algorithm’s performance. Researcher show that a deep connection exists between ROC space and PR space, such that a curve dominates in ROC space if and only if it dominates in PR space. A corollary is the notion of an achievable PR curve, which has properties much like the convex hull in ROC space; researcher show an efficient algorithm for computing this curve. Finally, we also note differences in the two types of curves are significant for algorithm design. For example, in PR space it is incorrect to linearly interpolate between points. Furthermore, algorithms that optimize the area under the ROC curve are not guaranteed to optimize the area under the PR curve.

Experimental Study on Dolomite Bricks with Positive Permanent Linear Change
Authors:- Ms. Varnita Mahant, Asst. Prof. Ms. Swati Agrawal, Asst. Prof. Mr. Akshit Lamba

Abstract- Dolomite brick is that the foremost vital stable refractory under the working conditions of Argon Oxygen De-carbonization (AOD). For AOD applications, the Dolomite bricks should have positive Permanent Linear Change (PLC) on re-heating. A positive PLC dolomite brick has higher life and best fitted to joint less refractory lining with no cobble stoning defect. Therefore the event of dolomite bricks having positive PLC during applications could also be a challenge for refractory manufacturing industry. Within this investigation, dolomite refractory bricks were prepared by varying different additive with an intention to urge the positive PLC of the brick. It’s documented that Iron Oxide could also be an honest additive for dolomite brick sintering. it is also been reported that monoclinic zirconia (m-ZrO2) additive improves the BD, CCS and PLC of dolomite brick. During this background, first trial composition was containing a tough and fast amount of 1% m-ZrO2 and different concentration and sorts of iron oxide. Mill scale containing Fe2O3 was added in two different concentrations 0.5%, 1% and in another trial 0.25% of nano Fe2O3 was added. Fe2O3 containing bricks showed an honest improvement in BD and CCS because of the upper sintering of dolomite grains in presence of liquid formation during sintering by the presence of Fe2O3.The CCS value was within the range 750-800 kg/cm2. However, the PLC value was negative within the range of -0.2 to -0.35%. relying on this result, new additive, Chrome Green oxide was then used. it has been found that the PLC tends to be positive with increase in Cr2O3 content. However, in presence of Cr2O3 the m-ZrO2 it had been not performing well. Finally m-ZrO2 was removed and a far better percentage of Cr2O3 additives showed the positive PLC (+ 0.12%) of the dolomite brick. The brick showed a CCS value of 650 g/cm2. this is often often within the suitable limit.

Memory Organization in Computer Architecture
Authors:- Kishan Singh, Aniket Singh, Asst. Prof. Rohini Rathod

Abstract- This article presents give an general idea of the memory organization in computer architecture .In this paper we will learn about type of memory and there memory organization in COA (computer application and architecture). Memory is employed for storing programs and knowledge that area unit needed to perform a particular task. A memory unit is that the assortment of storage units or devices along. The memory unit stores the binary data within the variety of bits. The classification of primary and secondary memory, the different types of ROM and RAM we will learn about direct mapping in the article.

IOT Based Healthcare Monitoring and Intelligence
Authors:- Namrata Jewargi, Sonal Shinde, Mr. Pratap Nair

Abstract- Nowadays, People are getting more prone to diseases and medical problems more than ever. So to reduce the Regular Routine Check-ups, an IOT based system which is Smart and Intelligent using Sensors for sick patients examination has been proposed here. Healthcare Services using IOT based Platform will make a huge difference for medical field. Using Internet of Things with Wireless Connectivity alongside an Android Application which will make the Doctors and Patients easier to communicate. The proposed system here is an Smart and Intelligent system that will give proper medicine the patient his/her with prescription that will be shown on Patient’s Phone. Any updates related to medicines given by doctor’s will be shown on Patient’s phone and will alarm the patient about the right timings and right medicines.

IOT Based Surveillance Robotic Car Using Raspberry Pi
Authors:- Aniket M. Ainapure, Akshay kumar S. Basargav, Sanket V. Mhetar, Asst. Prof. Saurabh R. Prasad

Abstract- Robots have found a drastically increasing demand in day-to-day life. In this present work, a Raspberry Pi based spy robot with remote monitoring and control through Internet of Things (IoT) has been developed. Because of IoT feature, it overcomes the problem of limited range surveillance. The spy robot system comprises the Raspberry Pi (small single-board computer), night vision pi camera and sensors. This robot can be controlled with the help of laptop/mobile. The proposed robot is small in size thus capable of manoeuvring into area where human access is not easily possible. This surveillance system using spy robot can be customized for various fields like industries, banks and shopping malls. This system will save human live, and protect the country from enemies. We have also developed a webpage consisting of Graphical User Interface (GUI) application to facilitate the robot control. The live streaming ability of the Pi allows the camera feed to be analysed from any location using internet.

Review Paper on the Study of Permeable Pavement
Authors:- Aditi S. Shinde, Shilpa B. More, Onkar S. Shekade, Pranay D. Shelar, Asst. Prof. Baliram R. Warvate

Abstract- Permeable pavement is used in construction industries such as, parking lots, low–traffic roads and sidewalks. It consist of porous concrete, portland cement concrete, coarse aggregate, fine aggregate, water, cement and admixtures. From recent studies, it is conclude that permeable pavement is best solution to reduce stormwater pollution. As per litrearure review it is seen that permeable pavement is an eco–friendly paving material that allows water to percolate directly through the surface and recharge groundwater. And also can reduce volumes and improve water quality of stormwater runoff by allowing water to percolate through it’s joints, while being filtered through layers of aggregate

Mandatory Seat Belt With Steering Controlled Head Light
Authors:- Thakkar Vrushabh, Sorathia Nishant, Jethva Hardik, Diwasaliwala Kushang, Bhure Kunal, Asst. Prof. Dhruv Solanki

Abstract- The purpose of this project was done to focus on the design and working of an Arduino based Adaptive Headlight System (AHS) for automobile safety. The highest fatal accidents occur on the curved road at night time. In maximum cases, the recognition of objects in the traffic zone plays an important role. These facts point to the necessity of the role of automobile adaptive headlight systems. The dazzling headlights also contribute to recognition of objects due to temporary vision loss. Components that are easily available in the market are suitable for adaptive headlight system. The system is designed to receive input from the sensors and manipulate the data which drives the motor connected to the headlights. Also, the headlights brightness is automatically varied to prevent glare on other drivers. Safety is a precaution taken to live our life to live in a better way. Safety is a main concern while considering automobiles too. Basically, our little carelessness has led to many accidents in roadways. Negligence of wearing seatbelt is also a major reason for the fatal accident. To prevent that we are making the seatbelt as a mandatory one. Unless or until the seatbelt the driver will not be able to start the vehicle. Our innovation is done by placing the IR sensor in the seatbelt and the IR sensor is connected to the microcontroller. The microcontroller is connected to the ignition coil. When the heartbeat sensor senses the heartbeat, the signal is transmitted to the microcontroller which makes the ignition coil to ignite and the spark plug sparks and the car starts. By making our innovation in seatbelt, carelessness transforms into mandatory and it also increase the safety level in the automobile.

Survey on Content Based Disaster Management Using Social Media
Authors:- Prof. Ashish P. Mohod, Vedant Dhurve, Krutika Hedaoo, Himanshu Itankar, Jayesh Lanjewar

Abstract- Today, Online Social Media such as Twitter, Facebook, WhatsApp, are important sources of real-time information related to things happen around us. People use social media for discussing different situation like disaster / crisis including both natural and man-made disasters. We can use this information for Disaster management. There has been a lot of work on designing information systems that would be useful for aiding post and pre disaster relief operations. We need Automatic System for gathering critical information and coordinating relief ops. And Also need to Learn from Prior Events and be prepared accordingly. Hence we have used Twitter API to access the twitter data. In this project we propose a natural disaster analysis interface that solely makes use of tweets generated by the twitter user during the event of disasters. We observe that our analysis of data from social media provides a viable, economical, uncensored and real-time alternative to traditional methods for disaster analysis and the perception of affected population towards a natural disaster.

Smart Energy Efficient Home Automation System Using IOT
Authors:- Asst. Prof Shaik Fareed Ahmed, Mohammed Abdul Sami Rahman, Syed Mudaseer Ahmed Razvi, Adeel Ahmed

Abstract- Advancement in IoT based application has become the state-of-the art technology among there searcher due to the availability of Internet everywhere. To make the application more user friendly, web based and android based technologies have gained their importance in this cutting edge technology. In this paper, smart energy efficient home automation system is proposed that can access and control the home equipments from every corner of the world. For this system, Internet connectivity module is attached to the main supply unit of the home system which can be accessed through the Internet. For wireless connectivity, the static IP address is used. Home automation is based on multimodal application that can be operated using voice recognition command of the user using the Google Assistant or through a web based application. Thus, main objective of this work is to make our home automation system more secure and intelligent.

Website Like Github for Project Sharing and Open Source Work
Authors:- Gitanjali Mukadam, Nandini Naik, Samyukta Sandeep, Rashmi Mada, Prof. Audumber Umbare

Abstract- The goal of this project is to create a git-based website. The website will provide users the option to store all the code that they are working in a public or private database/repository. If the repository is public then the code is available to download on the website for other users. This gives users a chance to collaborate with people working on the same topic of interest around the world. In simpler words the website is going to be a social networking site for software enthusiasts around the world.

Disease Prediction System in New Normal
Authors:- Sonal Shilimkar, Pratiksha Thosar, Prajakta Dharade, Ayushi Patel, Asst. Prof. Varsha Pimprale

Abstract- In this disease prediction system follows normal rules. The system is designed such that to provide a facility predicting disease from given reports. Report can be in the form of image (MRI, x-Ray, mammography, etc). Or in the form of input parameters like numerical value came with the result of reports. The system will take an input from the user for specific disease the system will follow image processing techniques to process and extract result from image. The result will be provided to a user. The system will also suggest nearby specialists for detected disease.

A Review on Applications of Artificial Intelligence for Public Cloud
Authors:- Assistant Professor Anumandla Mounika

Abstract- Artificial Intelligence has additionally made it less complicated for individuals to trade as well as invest. Before artificial intelligence, evaluating stock market information was an opportunity taking in and also complicated for individuals. Currently, individuals have the energy to commit at their fingertips. They may analysis which shares that they want to buy and they can know the danger of investing by looking at just how the company has performed in the past. This also creates the stock market much more affordable because it is now simpler to invest. Folks may analyze the changes in stock just before the put-in, this caused even more reliability in trading.

Survey on IoT Security: Challenges and Solution with ML, AI, Block Chain Technology
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N, HOD. Dr.Narasimhamurthy M S

Abstract- Internet of Things (IoT) is one of the most rapidly used technologies in the last decade in various applications. The smart things are connected in wireless or wired for communication, processing, computing, and monitoring different real-time scenarios. The things are heterogeneous and have low memory, less processing power. The implementation of the IoT system comes with security and privacy challenges because traditional based existing security protocols do not suitable for IoT devices. In this survey, the authors initially described an overview of the IoT technology and the area of its application. The primary security issue CIA (confidentially, Integrity, Availability) and layer-wise issues are identified. Then the authors systematically study the three primary technology Machine learning(ML), Artificial intelligence (AI), and Blockchain for addressing the security issue in IoT. In the end, an analysis of this survey, security issues solved by the ML, AI, and Blockchain with research challenges are mention.

Covid19: Distance Learning in Times of Crisis(Job Portal)
Authors:- Prof. Hemant Kumar Pathak, M. Tech. Scholar Vinita Sahu

Abstract- The process we followed in this is promoting distance learning and students can get their job during this COVID period. The main aims of this portal are to connect to the industries and acts as an online recruitment to support the students to find the right IT job after graduation. We create a portal like job portal and students do registration by filling their information one by one and after collecting all details we can shortlist the students according to their fields and interest and provide job. Our job portal contains 3 modules. Administrators, recruiters and job seekers the administrator has the authority of the entire portal. You can view the recruiter’s requirements and search for relevant candidates for that profile. Recruiters can post jobs and view profiles of job applicants. The project brief aims to provide work during this COVID time period and promote distance learning. There are many platforms to learn different technologies. Therefore, we can use these online platforms to learn different technologies and apply for different job profiles. The purpose of the app is to develop a system that job seekers and recruiters can use to communicate with each other. The online job portal is an application where job seekers can register on the website and search for positions that suit them, because employers register on the website and provide company vacancies. The online job portal system is a software package that agencies can use to improve business efficiency.

Visual and Vocal Prosody Analysis Based on Artificial Intelligence
Authors:- Asst. Prof. Ramya. R, Asst. Prof. Bilomin Ramya. A, Somnath. S. M, Amarthiyan. S, Karan. D

Abstract- Analysis of observable behavior in depression primarily relies on subjective measures. New computational approaches make possible automated audiovisual measurement of behaviors that humans struggle to quantify (e.g., movement velocity and voice inflection). Emotions are normally displayed by visual, vocal, and other physiological means. One of the important way humans display emotions is through facial expressions. Facial expression is one of the most powerful ways that people bring together conversation and communicate emotions and other mental, social, and physiological cues. Highlights include a study that measured the temporal coordination of vocal tract and facial movements, a study that predicted which adolescents would go on to develop depression based on their voice qualities, and a study that tested the behavioral predictions of clinical theories using automated measures of facial actions and head motion. The large sizes of data in recent years has led to the need for big data and streaming frameworks for mining.

IoT Based Underground Fault Cable Detection Using Wireless Technology
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N

Abstract- Underground cables are prone to a wide variety of faults due to underground conditions, wear and tear, rodents etc. Diagnosing fault source is difficult and entire cable should be taken out from the ground to check and fix faults. The project work is intended to detect the location of fault in underground cable lines from the base station in km using a PIC16F877A controller. To locate a fault in the cable, the cable must be tested for faults. This prototype uses the simple concept of Ohms law. The current would vary depending upon the length of fault of the cable. In the urban areas, the electrical cables run in underground instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable. The proposed system finds the exact location of the fault. The prototype is modeled with a set of resistors representing cable length in km and fault creation is made by a set of switches at every known distance to cross check the accuracy of the same. In case of fault, the voltage across series resistors changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed PIC IC that further displays fault location in distance. The fault occurring distance, phase, and time is displayed on a 16X2 LCD interfaced with the microcontroller. IoT is used to display the information over Internet using the Wi-Fi module ESP8266.A webpage is created using HTML coding and the information about occurrence of fault is displayed in a webpage.

Face Detection using Neural Network
Authors:- Owais Khan, Prabhat Singh, Ruchika Suryawanshi, Manish Shetty, Prof. Devidas Chikhale

Abstract- Face recognition is an important function of surveillance system, enabling detection and identification of person who appear in a frame. Face recognition from the real data, capture images, sensor images and database images is challenging problem due to the wide variation of face appearances, illumination effect and the complexity of the image background. With the development of deep learning, face recognition technology based on CNN (Convolutional Neural Network) has become the main method adopted in the field of face recognition. It is a multi-layer network which is used to train the network, to perform a particular task using classification. This paper suggests a cascade classifier based face detection and convolutional neural network based face recognition that can recognize the faces.

Sustainable, Portable and Efficient Electricity Delivery from 4 Different Sources
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Md Khaleel Ur Rehman, Md Zain Ul Abedeen, Syed Akber Ali Salman,

Abstract- The main objective of this project is to provide uninterrupted power supply to a load, by selecting the supply from any source out of 4 such as main power supply,solar energy, generator, and inverter power supply automatically in the absence of any of the source. The demand for electricity is increasing every day and frequent power cuts is causing many problems in various areas like industries, hospitals and houses. An alternative arrangement for power source is a serious matter. In this project we used four switches to demonstrate the respective failure of that power supply. When any of the switches is pressed it shows the absence of that particular source, switches are connected to microcontroller as input signals. A microcontroller of ATMEGA8-32 family is used. The output of microcontroller is given to the relay driver IC, which switches appropriate relay to maintain uninterrupted supply to the load. The output shall be observed using a lamp drawing power supply from main supply initially. On failure of the main supply (which is actuated by pressing the appropriate switch) the load gets supply from the next available source, say the solar. If the solar also fails it switches over to the next available source and so on. The current status, as to which source supplies the load is also displayed on an LCD. As it is not feasible to provide all 4 different sources of supply, one source with alternate switches are provided to get the same function, Taking in consideration the use of the source whose cost is the lowest then, the higher cost sources and so on.

Memory Organization in Computer Architecture
Authors:- Kishan Singh, Aniket Singh

Abstract- This article presents give an general idea of the memory organization in computer architecture .In this paper we will learn about type of memory and there memory organization in COA (computer application and architecture). Memory is employed for storing programs and knowledge that area unit needed to perform a particular task. A memory unit is that the assortment of storage units or devices along. The memory unit stores the binary data within the variety of bits. The classification of primary and secondary memory, the different types of ROM and RAM we will learn about direct mapping in the article.

Identification and Controlled of Short Duration Voltage Disturbance by using RMS Algorithm of Distribution System
Authors:- PG Scholar Miss. Anjali Nandkumar Jambhulkar , Prof. Hitesh Murkute, Prof. R.M Bhombe (HOD)

Abstract- Delivering good quality of power is the main agenda for distribution system to the loads. But maintain power quality is not so easy due to the load variations in the system. Sag and swell are the main factors that affect power quality. In this paper, multiple sag conditions and swell conditions were tested by producing the condition in different phases of the system. A simple algorithm called RMS algorithm was developed and tested for the said conditions. Sag and swell were generated on single phase and multiple phases for testing the algorithm. The algorithm and the results were obtained using Matlab. .DVR is installed between supply and load which will inject voltage and active power to the distribution system during balanced/unbalanced voltage sag and swell disturbances. The performance of DVR based of voltage sag, swell is going to be tested and Simulation results are going to be carried out by MATLAB with its Simu-link to analyze the proposed method.

A Review Article of Road Ways Hot Spot Design Optimization with Calibration of Geographical Side
Authors:-Monika Dawar, Asst. Prof. Vinay Deulkar (HOD)

Abstract- In this a literature review is given of the methods and techniques that are used to analyse black spots and black zones. Although, no universally accepted definition of a black spot or black zone is given, these locations will in general be described as high risk accident locations. In this context, several statistical models are described in literature to model the accident frequency and accident severity.

Configurable Survey Template APP
Authors:- Mr. Shubham Ambre,Ms. Priyanka Lokhande,Mr. Manish Ram, Ms.Mohini Misale

Abstract- Mobile phones have become a necessity for living in this technologically advanced generation with development in electronics and communication. The applications used daily have become an essential part of the business world and provide a simpler means to communicate with the consumer. This paper deals with such an android application which will be used to gather information for creating upcoming products in various industries by targeting the need of their customers. A survey app is required for the industries to connect with their clients to collect better feedback. So, they would be able to design their future products according to the need and demand of today’s society. When the opinion of the client is considered, the industry can provide good and a satisfactory service. This platform allows the client to raise their concerns freely. For example, when we consider a survey app in the fashion industry the features included are- provide upcoming product details before it hits the market, release and pre-order schedule, notice board, updates on previous products like bags, shoes, purses etc. notification for recently inclusive updates, designer details and collaborative works. Its goal is to provide the customer every detail before passing out a feedback form so the feedback and review of the customer is unbiased, and they can make a well-informed decision before purchasing the products. It will take place by making communication effortless, provide simple and quick access to information. Though it will be a development for a specific industry only, this application has the potential function to have an extension version for a wide range of users.

PC Based 2D Game Design
Authors:- Aanesha S. Ghosh Dastidar, Rini Sarkar, Pranjal S. Tikande, Shree S. Meher, Dr. Siddharth Hariharan

Abstract- Games are a fundamental way that humans interact and learn. They provide so many advantages for people of all interests and abilities. The main benefits of using computer games as learning tools, is related with problem solving, 21st- century skills, integration of learning and assessment, collaboratives and interactivity, addressing cognitive as well as affective learning issues, and motivation for learning. Gaming is gaining a different level of attention not only from the youngsters but also from different age people. It is creating a virtual world where we can virtually live our life. Gaming has gained importance in Desktop application as well as in Android Application. The objective of the following paper is to give information about pc-based game designs. In this paper a 2d game generation is described. The game is “Brick Blasters”. It is a 2.0 version of this respective game where its background theme and many other aspects are changed. Different levels and different attraction have enhanced the game in a new way.

Aahar – Food Donation App
Authors:- Mrigank Mathur, Ishan Srivastava, Vaishnavi Rai, Assistant Prof. Mr. S. Kalidass

Abstract- The sharp rise in the amount of food waste creates theneed for charity in terms of donations. Food is mostly lost everyday in numerous restaurants, parties, socialgatherings, college canteens and many other social activities in the present scenario. By visiting each organisation several times to reduce the problems with food waste, people donate food manually. Where there are platforms that have made attempts to help people donate food, the current framework offers a new internet-based application that provides all poor people/organizations with a forum for recycling surplus food. The device has seen to be an efficient wayto donate items over the Internet to organizations, etc. It highlights the ability to prevent food waste. It offers details about the inspiration behind such an application, explaining the current mechanism of contributions and how the product works to benefit society. This framework would establish a shared communication platform for hotels/restaurants, charities and individuals, where charities and individuals can contact restaurants that have remaining food directly and report generation. Showing how much food is given by which restaurant and giving reward points Food Donor, Food Receiver, Third Party Provider, Admin are the key modules in this framework where Food Donor can be any organisation, entity or college that wants to donate food and build a new food donation request and Food Receiver can be any food-seeking charity corporation. A fresh food donation request will be produced on thesite and a message will be sent to the third-party provider responsible for transporting food from the food donor to the food recipient until the request is approved.

Pothole and Uneven Roads Detection using Android Application
Authors:- Prof. Sadhana B, P M Vidyashree, Sahana Salian, Sushmitha Shetty, Thrupthi H Karkera

Abstract- The android application makes use of mobile sensors for detecting anomalies on the road surface including potholes, cracks and bumps. This application will utilize sensors to analyse the level of unevenness of the road. The application collects information and stores the information on a database so that the potholes location can be made public to all the users. When all the potholes are pinpointed on a map, it becomes very easy for civic authorities to focus their efforts on stretches of roads. A good road helps to simulate economic and social development. Maintenance of proper condition of roads is becoming a major issues in many developing countries like India creating disturbance in smooth travel and cause damage to vehicles. This project proposes an efficient solution for pothole detection which is cost and power effective.

Design and Optimization Power in 10T SD RAM with Voltage Etimation using Artficial Intelligence
Authors:-Priya Jain, Mrs. Megha Soni

Abstract- Random access memory is an essential resource required by the computational hardware. As the processor speed has attained GHz clock frequency, memory throughput can be a bottleneck to achieve high performance. 10T SDRAM can deliver a reasonable solution for such data storage. Typical computational system consists of multiple hardware modules that perform different operations on the data. These modules attempt to access the data concurrently. This leads to a requisite for a memory controller that arbitrates amid requests queried by different modules and exploits maximum throughput. The memory controller interfaces SDRAM and other subsystems. Hence it manages the data into and out of memory. The access latency or access speed solely depends on the implementation of memory controller. We are also proposed on AI algorithm because it is consume lower power as compare to AI. The study comprises area, power and timing analysis of the both in AI based 10T SDRAM. Synopsys Design Compiler tool is used to obtain the necessary results. Conventional 10T SDRAM and MESFET 10T SDRAM are analyzed through Microwind and DHCH tool in technology. It is seen that sub-threshold and gate leakage, both effects the operation of the SSDRAM cell. In this thesis MESFET is used to simulate the 10T SDRAM cell and it is concluded that MESFET increases the performance of SDRAM cell.

Prepaid Energy Meter using GSM and Arduino
Authors:-Dinesh Yadav, Atharva Parab, Siddharth Raul, Bhavesh Sharma, Sheeba P.S.

Abstract- It is realized that one of the main defective subsystems adding to the tremendous budget loss in Power Supply Company is that the improper meter reading and charging framework. Mistakes are observed at every phase of charging the energy rates, almost like blunders with conventional meters, reading errors by humans while noticing the consumed energy; and error during the preparation of paid and the due bills. The solution for this downside may be a prepaid charging or billing framework of consumed energy. Most of the developing countries are in the process to shift their conventional energy management practices to the fashionable ones by replacing the old and traditional energy meters with the smart technology meters outfitted with the prepaid facility to quantify the facility consumption so on decrease the income deficits looked by utilities due to customer unwillingness to form consumed energy payments on time. Our proposed design embedded with Arduino and GSM technology is a level-up upgrade over the currently existing energy meter, which enables consumers to effectively manage their electricity usage. The system performance is sweet with the acquired results. An earlier charging will undoubtedly get solve the problems of unpaid bills and man-made mistakes in meter readings, along these lines guaranteeing justified income for the utility.

Comparative Analysis of Financial Performance: A Study with Reference to TCS & INFOSYS
Authors:-Asst. Prof. Samrat Banerjee, Nikhil Modi

Abstract- The implementation of Liberalization, Privatization and Globalization lead to the emergence of the IT sector in India, which is one of the most booming sector of 21st century.Increased Foreign Direct investment provided more impetus for these IT giants to explore its massive heights in India. As service sector contributes a major portion of our GDP,IT sector has been instrumental in contributing to the success of the service sector.This study focuses on evaluating and comparing the financial performance of two IT giants, TCS & Infosys, and thus analyzes its Du-pont model.Descriptive statistics and Multiple regression model were used for the analysis.

IOT Based Surveillance Robotic Car Using Raspberry Pi
Authors:-Aniket M. Ainapure, Akshay kumar S. Basargav, Sanket V. Mhetar, Asst. Prof. Saurabh R. Prasad

Abstract- Robots have found a drastically increasing demand in day-to-day life. In this present work, a Raspberry Pi based spy robot with remote monitoring and control through Internet of Things (IoT) has been developed. Because of IoT feature, it overcomes the problem of limited range surveillance. The spy robot system comprises the Raspberry Pi (small single-board computer), night vision pi camera and sensors. This robot can be controlled with the help of laptop/mobile. The proposed robot is small in size thus capable of manoeuvring into area where human access is not easily possible. This surveillance system using spy robot can be customized for various fields like industries, banks and shopping malls. This system will save human live, and protect the country from enemies. We have also developed a webpage consisting of Graphical User Interface (GUI) application to facilitate the robot control. The live streaming ability of the Pi allows the camera feed to be analysed from any location using internet.

Designing the Communication Architecture in Future Tripping Device
Authors:-Vikas Shrivastava

Abstract- This paper presents an estimation of SF6 gas circuit breakers reliability in the transmission substations, Among the substation equipment circuit breakers play a vital role when triggered to switch to Control the power transfer based on the load demand situations, Isolate faulty circuits, Prevent system stability failures in case the system parameters are crossing the permissible limit allow maintenance of substation equipment Generally when utilities wanted to procure circuit breakers (CBs) in past as well as today, their preference is always for three pole operated circuit breakers due to cost effectiveness. This preference continued up to voltage levels of 220kV, beyond which the higher phase spacing has not permitted possibility of three pole operated Air Insulated Substation (AIS) circuit breakers. In Gas Insulated Substations (GIS), the limitation is 170kV for three pole operated CBs, beyond which the size of the tubular housing may become uneconomical. A circuit breaker failure may result in the unavailability of an entire power system, causing major disruption and severe financial losses. Describe in this paper.

Designing the Communication Architecture in Future Tripping Device
Authors:-Vikas Shrivastava

Abstract- Transformers are basic design of electrical device which provide power transmission with transforming induced current from one circuit to another. The induced current can be converted step up or step down of current or voltage. This application mainly deliberates on the three-phase transformers which are used in among electric poles and the Power transformers. The real time overprotective is done on the basic features like gas level, oil aging and regulation of overload and temperature maintenance. These features are essential for effective power transmission and long life of industrial transformers and Communication Architecture for Future Protection & Control of Power Transformer .The monitoring and control of the transformer is done by using IEC 61850 AND RET 620 processor.

D.C. Operated Portable Vehicle Lifting Jack
Authors:-Joshi Kandarp U, Patel Nisarg N, Soni Vatsal D, Vakil Brijesh M, Asst. Prof. Mr. Bhaumik Bhandari, Principal Dr. D.M. Patel

Abstract-Car jack is a device used to lift up the cars while changing the tires during an emergency. Car jacks are available at the market has some disadvantages such as requiring more energy to operate, are not suitable for women and cannot be used on the uneven surface. The purpose of this project is to modify the design of the existing car jack in terms of its functionality and also human factors considerations. In this project, the scopes of research were on the designing 1.5 to 3 Ton maximum lifting capacity of car jack by using optimization concept.

Big Data Security Challenges and Prevention Mechanisms in Business
Authors:-Anusha Dissanayake

Abstract-Sensitive data analytics have reached gradually a smart area in the business world over the past few years. Various research has emphasized the importance of this field in augmenting the business performance in the industry. Excessive collection of data is making harmful effects on human beings. These data are extremely vulnerable for outsiders thanks to their hidden value. Big data gives us more advantages to make progress in many fields including business. It improves the competitive advantage of companies and to add value for many social and economic sectors. Sensitive data sharing brings new information security and privacy challenges. Earlier technologies and methods are no longer appropriate and lack performance when applied in a big data context. This research focuses on investigating the challenges and providing viable solutions to minimize the risk of the threats of user data.

QR Scan Based System for School Bus Tracking
Authors:- S. Ramya, P. Ajitha, M. Brindha, A. Gayathri, Mrs. V. Kavitha

Abstract- In the current day, it isn’t unprecedented for guardians and watchmen to stress over the prosperity and security of their youngster or kids. With the appearance of various advancements, schools that can bear, execute broad and exorbitant measures to guarantee the security of their understudies. Nonetheless, such advances remain out of reach to the not all that rich. This paper proposes a productive and dependable school transport following cum security arrangement as an application combined with a site. The framework consolidates area following, a basic yet idiot proof validation and warning system, and oddity discovery strategies for bringing cautions up if there should arise an occurrence of strange movement. Such a framework takes into account the guardians to be mindful of their youngster in remarkable just as known conditions. The school specialists are likewise ready to screen the situation with their transports by means of a site.

Review on Finite Element Modelling and Analysis of Steel Angles
Authors:- Md Mozaffar Masud, Prof. A. K. L. Srivastava

Abstract- Steel angles under tension are frequently used in a variety of structures because of the basic simplicity of its cross-section. The stress distribution in the vicinity of such connections is non-uniform because of the coupled effects of connection eccentricity, shear lag and stress concentrations. This paper presents finite element techniques used in modelling the angle tension members. Further, the associated problems such as the shape of the material stress-strain curve, the interaction between the gusset plate and the angle, the interaction between the bolt and the bolt hole, the appropriate failure criteria, the effect of punching of holes etc. are discussed. Finally, the prospects of accurate modelling of such connections are explored.

Early Detection of Heart Disease Using Machine Learning
Authors:- Shekhar Chavda, Rishikesh Kumbhar, Shubham Karande, Prof. Snigdha Bangal

Abstract- Heart connected diseases square measure primarily the foremost reason of death throughout the world and because of that an outsized range of casualties square measure arising in countries with low and middle financial gain like Asian nation. A large quantity of information is unendingly generated by medical practitioners. the information generated will be used for the first detection of heart diseases, which may effectively support to scale back the incidence of assorted heart connected diseases. the choice prediction will be effectively done by enhancing the information identification needed to find patterns that weren’t once renowned. economical prediction will be done by accessing the information accumulated from health care firms and industries and realize the hidden patterns.

Cloud Based Meta Engine for High Availability and Maximum Service Performance
Authors:- Infant Raju. R, Ananthi Christina R, ArshimaShimona C A, Sherril Sophie Maria Vincent

Abstract- A one stop solution for the entire mobile and PC OS, which uses only the hardware of the system whereas the software (Meta Engine) resides on the cloud which replaces existing OS. A cloud OS is a kind of lightweight operating system that stores data and can access Web-based applications from a remote server. In the proposed system, users work with Cloud-based framework accessible via browser on any device, which is similar in services, applications, look and feel of an operating system. With this design, users can work from multiple devices and multiple places which are accessible to the Internet over the same set of applications and files.High availability and Cloud Computing yields maximum service performance with a minimalistic hardware support using SaaS and DaaS service. This integrates existing operating systems and web browsers. The internet becomes your personal computer, the browser becomes your cloud desktop. Secure and effortless integration of applications and data that ends up in aqueous experience. Working throughout all phases of the software development lifecycle: writing, testing, and maintaining the code that powers highly scalable cloud applications offering the user full stack support. The cloud stack OS provides Saas and Daas services at the user end. DaaS-offering a service provider that delivers virtual desktops to end users over the Internet. Saas – allows each user to access programs via the internet, instead of having to install the software on the user’s computer. The software could be customized anyway for any purpose. This OS could include the demanded applications inevitable by the client. Eg. Bank, Hospital, Workplace monitoring. Thus a Generic OS simulation for mobile and desktop via mobile app and web app is rendered.

Design and Analysis of Submarine Radome
Authors:- Asst. Prof. Md Baha Uddin, Mohd. Mahmood, Shahbaz Pasha, Mohd. Naqi Ahmed

Abstract- Submarine antenna is used for communication by Radio Frequency (RF) system. It is protected by radome. Radomes are the electromagnetic windows that protect microwave sub-systems from the environmental effects Low-observable radomes are usually made of E-glass/epoxy composite due to its low dielectric constant which is necessary not to interfere electromagnetic (EM) wave transmission characteristics. Since aramid fibers have lower dielectric constant and higher strength than those of E-glass fiber. The dielectric strength constant were measured of the E-glass/epoxy and Aramid/epoxy materials The modal analysis is also carried out on radome to check for the natural frequency of the radome. So that resonance does not occur if the natural frequency of the radome coincides with the excitation frequency of the submarine. It is designed to a high pressure radome covering frequencies from 15 KHz to 18 GHz to meet the submarine applications. The details are presented in this paper.

Boat rental app in Cloud Environment of Salesforce
Authors:- Assistant Professor H K Virupakshaiah, Nikita Shetty (Project Student)

Abstract- This paper examines the advantages of Boat Rental App over cloud technology to better connect with customers and owners. We build here a boat sharing service platform where company acts as a leasing agent and customers can use this platform to give their boats for rental instead of investing on its own. This helps author to find varieties of boats in nearer location with complete details. This paper concerned with the improvement of efficiency and productivity of business and saving time in searching boats for author or end users.

Dual Axis Solar Tracking System
Authors:- Asst. Prof. Asra Sultana, Shaik Omer, Mohammed Sameer, Mohammed Abdul Bari

Abstract- Solar panel has been used increasingly in recent years to convert solar energy to electrical energy. The solar panel can be used either as a stand-alone system or as a large solar system that is connected to the electricity grids. The earth receives 84 Terawatts of power and our world consumes about 12 Terawatts of power per day. We are trying to consume more energy from the sun using solar panel. In order to maximize the conversion from solar to electrical energy, the solar panels have to be positioned perpendicular to the sun. Thus the tracking of the sun’s location and positioning of the solar panel are important. The goal of this project is to design an automatic tracking system, which can locate position of the sun. The tracking system will move the solar panel so that it is positioned perpendicular to the sun for maximum energy conversion at all time. Photo resistors will be used as sensors in this system. The system will consist of light sensing system, microcontroller, gear motor system, and a solar panel. Our system will output up to 40% more energy than solar panels without tracking systems.

Mood Music Player
Authors:- Nitesh Jha, Ronak Shukla, Prof. Uma Goradiya

Abstract- Recent studies confirm that humans respond and react to music and that music has a high impact on person’s brain activity. The average Indian listens up to two hours of music every day. People tend to listen to music based on their mood and interests. This project focuses on creating an application to suggest songs for user based on their mood by capturing facial expressions. Facial expression is a form of nonverbal communication. Computer vision is an interdisciplinary field that helps convey a high-level understanding of digital images or videos to computers. In this system, computer vision components are used to determine the user’s mood through facial expressions. Once the mood is recognized, the system suggests a playlist for that mood, saving a lot of time for a user over selecting and playing songs manually. Mood-Based Music Player also keeps track of user’s details like number of plays for each song, sorts songs based on category and interest level, and reorganizes the play-list every time. The system also notifies user about the songs that are never played so that they can be deleted or modified.

Inventory Management System
Authors:- Prof. Deshmukh R.R, Aishwarya Pawar, Vaishnavi Katore, Nikita Dabhade,
Vishakha Kasture, Sohan Bagul

Abstract- This project is aimed at developing a desktop based application named Inventory Management System for managing the inventory system of any organization. The Inventory Management System (IMS) refers to the system and processes to manage the stock of organization with the involvement of Technology system. This system can be used to store the details of the inventory, stock maintenance, update the inventory based on the sales details, generate sales and inventory report daily or weekly based. This project is categorize individual aspects for the sales and inventory management system. In this system we are solving different problem affecting to direct sales management and purchase management. Inventory Management System is important to ensure quality control in businesses that handle transactions resolving around consumer goods. Without proper inventory control, a large retail store may run out of stock on an important item. A good inventory management system will alert the wholesaler when it is time to record. An automated Inventory Management System helps to minimize the errors while recording the stock.

Methodological Obligation in Inherited Procedures for the Optimization Through Agile Considerable Awareness and Investigative for E-Commerce
Authors:- Dr. Santosh Kumar Dwivedi, Dr. Rajeev Tripathi

Abstract- In talent state of concerns after Coid-19 pandemic software program-based equipment deployed in a company to cater to the complicated commercial enterprise processes, combine diverse commercial enterprise devices and cope with necessities of a worldwide consumer base. The conventional method of software program engineering succumbs to the converting want of consumer and era advancement. On the behest of the consumer, a software program system ought to be designed in a manner that it is going in concert with the existing person needs. Agile for instance, is a famous instance of a lifecycle used to construct smart and analytical systems. Methodological responsibility is a time period coined through Ward Cunningham to indicate the quantity of rework required to position a bit of software program into that nation which it ought to have had from the beginning. Obligation Management Model is used to hit upon Methodological responsibility. The examination pursues updated address the reason of the boost of IS lightsomeness and pleasant for detecting, finding, associated mixture and execution in a mild-footed IS. IS lightsomeness is specified in mild of the reality that the ability of associate IS to acumen changing progressively; determine it continuously; and select out and achieve a reaction continuously. Architecting associate dexterous IS can be a multifaceted and asset extreme crucial, ultimately assessment of its factors of hobby is quite desired and proper, associate hobby for lithe system is presented, this paper expects associate net commercial enterprise approach with lightsomeness, and it talks approximately its security conjointly. This system receives better on-line commercial enterprise viability and acquires to unmatched low of goings-on troubles.

Multilevel Security Using Honeypot
Authors:- M. Tech. Scholar Yamini S. Shegaonkar, Asst Prof. Dr. Leena Patil, Asst Prof. Dr. Shrikant Zade

Abstract- Security is becoming a major issue today. A Security is not limited to laptops and other devices. Data security is becoming more and more important today. Data is not safe in any social situation since any person with access to hacking can access data, so that any organization can protect its data against any type of cyber attack. It is important. It is an imperative task, and work. This is why honeypot security is used primarily for data protection. Interacting with the location of attackers and attackers, network of attackers and malware assault details is the main work of this security. Honeypot will create data logs for attackers. Honeypot supplies a researcher with relevant data on attackers. They might understand easily. Honeypot and its benefits will be examined in this paper. We will also learn how Honeypot interacts and collects information and keeps data secure from attackers.

“Design and Development of Multiutility Sheller Machine using Powered by Vehicle”
Authors:- M. Tech. Scholar K. N. Ramteke, Asst. Prof. V. B. Vaidya

Abstract- Agriculture is the most important factor of our Indian economy, in Indian agricultural farming produces semi-finished product or goods. Groundnut, chickpeas and other various different types of seeds are agricultural semi-finished Products. Lack of processing machines on these types of goods, especially Groundnut, Yellow peas, Chickpeas etc. these types of seeds, their lack of Sheller machine is a major problem of formers to production of the finished product in our country. In beginning this Process was done by manually which is output got from this method was very low and it does very time consuming process. On other hand some machines are working on the electric motor or tractor which is very costly as well as not comfortable for every former at every place. Therefore we proposed affordable Sheller machine. And this is powered by vehicle as well as an electric motor. The farmer can be selected on our own requirement what her need and what he want. This project involves so many processes like research of previous machines, design of new components, calculation, fabrication and assembling of different components.

Speed & Direction Control of DC Motor through Bluetooth HC-05 Using Arduino
Authors:- Asst. Prof. S.Md. Mazhar Ul Haq, Mohammad Mujahid, Mir Naser Ali Khan, Syed Abdul Farhan

Abstract- The technology is a process that never ends and to improve the quality of any product these technologies are required. Under this article, the blueprint and execution of a cheap, robust as well as resilient and secure Bluetooth based device DC motor is present. The blueprint is represented on AT Mega 328 board and the motor is liaisons to the input/output ports. The connection between the controlling device and the Arduino Nano is without wire i.e. wireless due to which an individual can operate easily who are using Bluetooth devices. Due to low cost of this system, DC motor to be controlled with the help of this board.

Designing of CSSD System using VGG Algorithm
Authors:- Avani Agrawal, HOD. Dr. Kamal Shah

Abstract- Five billion people worldwide have no access to quality surgical care. The skill of the physician varies greatly, and many patients who are offered care have problems and are easily injured. Improving surgical training and feedback can help reduce the level of complications that have been shown to be preventable. To do this, it is important to test the ability to work, a process that requires professionals right now and manual, time-consuming, and humble. In this work, we introduce a method to automatically assess the performance of physicians by tracking and analyzing the movement of tools in surgical videos, using region-based convolutional neural networks. While previous methods have talked about the availability of tools, ours is the first to not only see the presence but also locally available surgical tools in real laparoscopic surgical videos. We show that our approach is more sensitive to the limitations of tools and far outweighs the methods available to determine the presence of tools.

Brain Tumor Detection
Authors:- Tejas Mhatre, Omkar Narangikar, Shubham Dhonde, SugatPalaspagar, Dr. Shilpa Joshi

Abstract- One of the dreadful diseases existing within the world is brain tumor. When it involves biomedical applications, Image Processing is widely used for diagnosis of various tissues. This paper deals with detection of brain tumor from MRI images of the brain. Tumor may be a rapid uncontrollable growth of cells. Magnetic Resonance Imaging (MRI) is that the device required to diagnose brain tumor. The traditional MRI images are not that suitable for fine analysis, so Image Processing is a crucial process required for efficiently analyzing the tumor images. An algorithm for brain tumor detection is proposed. Image Processing is employed within the medical tools for detection of tumors. Image Segmentation alongside pre-processing of images is implemented for detection of tumors. The shape and texture for feature extraction is considered. It is expected that the experimental results of the proposed system will give better leads to comparison to other existing systems.

Multifunctional Agricultural Sprayer
Authors:- Parikh Vaibhav D., Patel Chirag J., Patel Het J., Patel Ronak S., Asst. Prof. Pankaj Prajapati, Principal Dr. D. M. Patel

Abstract- India is claimed to be an agricultural base country directly or indirectly 75% of the peoples are hooked in to farming, during this agriculture sector there’re tons of field work, such as weeding, reaping, sowing etc. Apart from these operations, spraying is additionally a crucial operation to be performed by the farmer to guard the cultivated crops from insects, pests, fungi and diseases that various insecticides, pesticides, fungicides and nutrients are sprayed on crops for cover. Farmers face enormous problem while spraying the pesticide like tank capacity is extremely small, high cost and spaying time taken more. In order to scale back problems different sort of sprayers has been introduced within the market, but these devices don’t meet the required problems or demands of the farmers. Small scale farmers are very curious about manually lever operated knapsack sprayer due to its versatility, cost and style. But multi-functional pesticide sprayer pumps are combination of both manually & battery-operated pump for better efficiency. We make it as Multifunctional Pesticide Sprayer which can perform many tasks at a time like weeding, cropping etc. This one is trolley operated system by using this we can reduce maximum effort required for spraying pesticides as well as we can spray pesticides in any direction or around the crops at any height of crops. This is used for weeding, ploughing etc. This paper suggests a model of operated by hand multi nozzle pesticides sprayer pump which may perform spraying at maximum rate in minimum time.

A Review of Face Recognition Using SIFT Feature Extraction
Authors:- Prof. Shubha Dubey, Ravina Meena

Abstract- Face detection may be defined as the process of determining whether face is present or not in a given image, if present, then the location of the face is notified. Face can be detected in colour or single intensity, single image or video sequence (single image/frame taken at a time).Another term closely related to face detection is face localization. It may be defined as determining position of single face in a given image. The difference is that in face localization it is assumed that only one face is present in the input image. But in the face detection presence of face either one or many is not known prior. Facial feature detection is to detect the presence and location of facial features like eyes, eyebrow, nose, nostrils, mouth, lips and ears. Automatic Face Recognition aims to use pattern recognition technology to identify people in photos or videos. Automatic face recognition has been widely used in applications from social media to advanced authentication systems. Face recognition technology is very mature. In an unlimited real environment, automatic recognition of faces from digital cameras is still very challenging because it involves important changes in acquisition conditions, facial expressions and attitude changes. Therefore, the key challenges in this area as well as developed solutions and applications based on imaging and machine learning technologies are introducing the topic of automatic computer face recognition.

Control BLDC Motor using Bidirectional DC Converter for Electric Vehicle
Authors:- M. Tech. Scholar Sana Afreen Khan, Prof. Diksha Khare, Prof. Yogesh Likhar

Abstract- The aim of this research project is to design a three phase four quadrant variable speed drive (VSD) for a permanent magnet brushless direct current motor (PMBLDC) that can be applied to an electric vehicle (e-bike). The design is confined to PMBLDC motors with a maximum power rating of 1.5kW. The speed controller operates in current mode at a maximum voltage and current rating of 50V and 30A, respectively. The VSD has the ability to smoothly control the current delivered to the DC motor and therefore controls its torque. The motor’s current is limited in all four quadrants of operation, and its speed is limited in the forward and reverse directions. The performance of the proposed DC motor VSD system is tested on an electric vehicle. Simulation is carried out using MATLAB. A Simulink model is developed to simulate and analyze the operation of the motor. A permanent magnet synchronous machine with trapezoidal back EMFis modeled as a BLDC machine. A controller has been modeled with feedback signals from the Hall sensors of the motor. Based on the Hall signals, gate pulses (PWM pulses) are generated and appropriate switches of the inverter circuit are triggered to achieve precise control of the motor. The voltage across the battery which is charged during the braking period is also measured. The proposed electrical vehicle speed control system provides efficient control in all four quadrants of operation and it is a suitable alternative for a low cost transportation mode.

A Review: Design And Implementation Of An Intelligent Wheelchair Controlled By Multifunctional Parameter
Authors:- Bhushan M. Ghubade, Dr. Shubhangi Giripunje

Abstract- The purpose of this task is to make a Multi-Functional Wheelchair using Accelerometer ADXL335 and ESP32 as sensor to help physically disabled human beings in transferring from one region to any other simply by giving path from the hand, voice, Bluetooth. This Accelerometer ADXL335 and ESP32 primarily based totally challenge use Accelerometer ADXL335 and ESP32 for transferring backward path, ahead path, left path or proper path. We have advanced a Multi-useful wheelchair for medically disable human beings. We are working wheelchair by multi-feature 1) Bluetooth (Using Bluetooth device, ESP32), 2) Hand Gesture (Using Accelerometer ADXL335 MEMS), 3) Voice (ESP32). This makes challenge very powerful. The fundamental of this challenge is achieved retaining in thoughts to able the handicapped man or woman to transport round their domestic without any assist of different character.

Design of Single Precision Floating Point Arithmetic Unit
Authors:-Devyani R. Kamale, Lecturer Mrs. Pradnya J. Suryavanshi, Lecturer Ms. Sharda G. Mungale

Abstract- Most of the algorithms instigated in FPGAs used to be fixed-point. Floating-point operations are useful for calculations involving large dynamic range, but they require significantly more resources than integer operations. With the current trends in system necessities and available FPGAs, floating- point implementations are becoming more common and designers are increasingly taking benefit of FPGAs as a platform for floating-point implementations. The rapid development in Field- Programmable Gate Array (FPGA) technology makes such devices increasingly attractive for instigating floating-point arithmetic. Associated to Application Specific Integrated Circuits, FPGAs offer reduced development time and costs. Moreover, their suppleness enables field upgrade and variation of hardware to run-time conditions. A 32-bit floating-point arithmetic unit with IEEE 754 Standard has been premeditated using VHDL code and all operations of addition, subtraction, multiplication and division are verified on Xilinx.

A Study on Vertical Axis Wind Turbine
Authors:-Maicecer Karan, Abhishek Singh, Parikh Kaival, Vaghela Pruthviraj, Malek Sohil,
Asst. Prof. Nishit Patel, Principal Dr. D.M Patel

Abstract- This project studied the potential for installing roof-mounted vertical axis wind turbine (VAWT) systems on house roofs. The project designed several types of VAWT blades with the goal of maximizing the efficiency of a shrouded turbine. The project also used a wind simulation software program, WASP, to analyze existing wind data measured on the roofs of various WPI buildings. Scale-model tests were performed in the WPI closed- circuit wind tunnel. An RPM meter and a 12 volt step generator were used to measure turbine rotation speeds and power output at different wind speeds. The project also studied roof mounting systems for turbines that are meant to dissipate vibrations to the roof structure. Turbine vibrations were measured during the wind tunnel tests and in impact tests on a scale-model house. Recommendations were made for future designs of roof-mounted VAWTs.

Why Data Structures?
Authors:- M. Amitha Reddy

Abstract- This paper explores the definition and importance of data structures in the field of Computer Science. We will aslo see the chief grounds of using various data structures.The study of data structure helps us to understand how data is organized and how data flow is managed to increase efficiency of any process or program. They also provide various methods to organize and represent the data within the computer’s memory. Different types of data structures are examined in this paper. This paper begins with an overview of data structures and its types. It then examines their main application and concludes with the necessity of data structures in the Computer Science specialization. This paper is the result after a detailed research under the situation of absence of data structures.

Design of Cashew Nut Shelling Machine
Authors:- Suhas M Chougule, Prof. R. B. Gunale

Abstract- Cashew is highly appreciated in a large number of countries and cultures. India is the largest cashew processor in the world. Export of cashew nut shell liquid from India stood at 11,677 million tones (MT). Cashew which belongs to the family is native to the tropical parts the USA, Mexico, Brazil and the West Indies. However, it has since become naturalized in many lowland tropical areas. It is one of the most nutritious food crops of the tropical world, with high protein and fat content. The US is the largest market for Indian cashew kernels, followed by the UAE and the Netherlands, while Indian Cashew nut shell liquid is largely exported to South Korea, followed by China and the US. The cashew industry ranks third in the world production of edible nuts. The major exporters of cashew in the world are India and Brazil with 60% and 31% respectively of the world market share. The major cashew nut importers are the United States (55%), the Netherlands (10%), Germany (17%), Japan (5%) and the UK (5%). Cashew kernels are ranked as either the second or third most expensive nut traded in the US. Also process of cashew nut is very much important as to improve production rate. Now days there are various machineries used to save the time and to improve the quality. The Industries are using manual, Semi-Automatic and fully automatic machineries to increase the production rate. But In conventional process, it takes more time to complete operation and hence production rate is very low. Thus to reduce human injuries in conventional methods and to increase the production of cashew nut the present study has been studied.

Face Mask Detection and Surveillance System
Authors:- Karthik Prasad N, Prasadkumar Raviswamy Chikkamath, Pavan G Jambigi, Preetham Kumar M S, Asst. Prof. K. Asha

Abstract- The COVID -19 pandemic has reshaped our lives. Many of us are staying at home , avoiding to socialize and changing everyday habits, like going to school or work, in ways we never imagined . While we are modifying our old behaviors , there are new practices we need to adopt. First and foremost, the habit of wearing a mask or face covering whenever we are in a public space. Masks and face coverings have been proven to prevent the wearer from transmitting the COVID -19 virus to others and may provide some protection to the wearer itself. The outcome of this system is to help societal health by administrating a strict rule to avoid the spread of this contagious “Novel Corona Virus”. Our model will detect those people without face masks and warn the person about his negligence. And also report about this to the concerned authority. AI is an advanced technology which will work on the mathematical problem to respond to the real-world situations. To analyze the high transmission hot-spots and modulate the inspection in such areas is the main concern. To achieve this, we analyze the density of the lawbreakers (non- mask bearers ) and then report this data to the nearby authorities and based on this information, they will document the areas of high negligence and take necessary actions. The system is implemented using YOLOv4. This system will bring more insights to navigate/track the increasing spread of the virus. The authorities can be aware of the risk in certain areas and allot the inspection team accordingly. If the reports of each area are circulated on social media and news telecasts , people would be very cautious of the risks they will be facing. Hence, this will bring down the increasing rate of spread of the Corona Virus.

Farmer Friendly Drone
Authors:- Rajnandini Patil, Narayani Peshkar, Saloni Hatgine, Atharv Ghalsasi, Prof. Mrs S A Pore

Abstract- With the increase in population, the demand for the production of crops is also increasing. Along with the production, the quality of crops is one of the major concerns which come with this. Vast fields and low efficiency in crop monitoring create the largest obstacle in farming. It creates a major threat to food security. With the recent advances in technology, we can use quadcopters equipped with cameras for monitoring the fields. For crop disease identification advanced technologies like deep learning, image processing is very useful. These Unmanned aerial vehicles (UAV) are great to achieve the goals for tomorrow’s farming. Our proposed work discusses how we can detect the diseases on crops in the early stages. In this project, we have used raspberry pi to gather the required images from the camera and after capturing the image, image segmentation is done through Keras. This image segmentation will provide in the end a classification between the diseased and healthy crop and this information will be given to the farmer.

Android Mobile Monitoring Application with Google Firebase Real-Time Database
Authors:- Ankit Kukade, Dikshant Deogade, Ankur Ramteke ,Saurabh Kambale, Saurabh Kambale, Prof.Jayant Rohankar

Abstract- Using electronic devices is not limited to adult or to specific time or place. Children use difficult types of mobile device with no constraints. Guardian concern about the effect of the technical explosion on theirchildren development. Controlling , monitoring and managing approaches are in need to help in overcoming some of the worries. This gives insight in approaches to monitor and control children electronic devices thatallow guardian to manage and monitoring data, applications, or services available in kids mobile devices. The main challengeis to balance privacy and flexibility with the case of use. The project also includes the implementation of an androidapp called parent monitor app.

Clustering Approaches to Offer Business Insights
Authors:- B.Tech. Student Suyash Sharma , B.Tech. Student Kashif Ahmad, B.Tech. Student Varundeep Singh

Abstract- Various business undertakings have come to understand the centrality of CRM and the utilization of specialized skills to accomplish serious advantages. This examination investigates the significance of Customer Segmentation as a center capacity of CRM(Customer Relationship Management ) just as the different models for fragmenting clients utilizing bunching procedures. The accessible bunching models for client division, when all is said in done, and the major models of K-Means, DBSCAN, and Hierarchical Clustering, specifically, are examined and the temperance and indecencies of the strategies are called under attention. The individual models are examined.

Face Mask Detection System
Authors:- Shelke Rohit, Salke Sumedha, Rahate Anchal, Sherkar Tejaswini

Abstract- The COVID-19 pandemic is causing a global health crisis so the effective protection methods is wearing a face mask and follow social distancing in public areas according to the World Health Organization (WHO). The COVID-19 pandemic forced governments across the world to impose lockdowns to prevent virus transmissions. Reports indicate that wearing face masks while at work clearly reduces the risk of transmission. An efficient and economic approach of using AI to create a safe environment in a manufacturing setup. A hybrid model using deep and classical machine learning for face mask detection will be presented. A face mask detection dataset consists of with mask and without mask images , we are going to use OpenCV to do real-time face detection from a live stream via our webcam. We will use the dataset to build a COVID-19 face mask detector with computer vision using Python, OpenCV, and Tensor Flow and Keras. Our goal is to identify whether the person on image/video stream is wearing a face mask or not with the help of computer vision and deep learning.

Medicine Reuse System
Authors:- Komal Chunge, Shruti Deshmane, Vikas Solanke

Abstract- Today in this present area where technological advances are at its vertex, there is not even a single sector which remains untouched by technology. Technology has not merely established our lives simpler, but also offers a high level of safety and security wherever required. Technological devices are available which provides refuge for all the mankind. People are very concern about their health, But there are some people who cannot afford to take medicines. And such people are more likely to get major rather serious. Serious disease are dangerous and can become uncontrollable if timely medicines are not taken. Our health should be our first priority. Medicine donation is an active activity which is done by NGOs, but there are very few donors are available. Because of today’s situation donors cannot donate medicines to NGO. This paper basically deals with the donors who can donate the medicines, and transforming this simple application into most advanced donation system in the future. Some of the condition for the donor they can donate only they medicines which are not expired. Some people die simply because they do not receive timely medication. Therefore, developing medicine reuse system is very essential. Hence, this paper presents a medicine reuse system to donate medicines to the NGO.

Knowledge, Attitude, & Practice Regarding Environmental Hazards of Plastic Use
Authors:- Renno Jose B. Gabuya. Ed.D.

Abstract- This study looks into the knowledge, attitude, and practice of Barangay Bachao, Daram, Samar regarding environmental hazards of plastic use. Specifically it aims to: 1) identify the knowledge or information that residents possess regarding the danger of plastic use; 2) find out their attitude towards the use of plastic and the hazards it carries; and 3) identify their practices that might mitigate or perpetuate the hazards. Both quantitative and qualitative research designs were employed in the study. A survey was conducted among the 78 residents of the barangay and non-numerical data were also gathered from unstructured interviews.

Survey On Skin Disease Recognition Using Texture Analysis
Authors:- Gauravi S. Khandalkar, Associate Prof. Leena H. Patil, Associate Prof. Shrikant Zade

Abstract- Skin diseases are one of the most common diseases that people have faced over the years. The recognition of skin diseases is mainly based on the doctor’s experience and the results of skin biopsy. This is a long process. Image recognition and classification are important for improvement. Diagnose accuracy and overcome the lack of human experts. Image classification of skin diseases is an important task. The correct classification depends largely on the characteristics of the disease in question. Many skin conditions have very similar visual characteristics, which makes it more difficult. Choose useful image functions. Accurate image analysis of such diseases can increase the speed of diagnosis and speed up the diagnosis Process. A shorter diagnosis time can provide patients with better and cheaper care. Various methods and techniques are used to classify skin diseases, namely: traditional or manual performance-based methods and deep learning-based methods.

Future of Commerce Between Farmers and Merchants
Authors:- Vinay Solanki, Yash Mehta, Prabhat Tiwari, Shreshth Gupta, Margi Patel

Abstract- In recent years, electronic commerce of agricultural products has developed rapidly. In the development process of electronic commerce of agricultural products, many classic cases and business models have emerged, such as Reliance Fresh. The author analyzes and compares each model from 7 aspects and summarizes their differences and links. Finally, the author puts forward suggestions on the development of electronic commerce of agricultural products in India.[1]

Implementation On Iot Based Underground Fault Detection Using Wireless Technology
Authors:-P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N

Abstract- Detecting fault cable system proposes fault location model for underground power cable using microcontroller. Fault location models are to determine the distance of underground cable fault from base station in kilometers. This project uses the simple concept of ohm’s law. When any fault like short circuit occurs, voltage drop will vary depending on the length of fault in cable, since the current varies. A set of resistors are therefore used to represent the cable and a dc voltage is fed at one end and the fault is detected by detecting the change in voltage using a analog to voltage converter and a microcontroller is used to make the necessary calculations so that the fault distance is displayed on the LCD display.

Smart Shopping Cart with Interactive Chatbot
Authors:-Naveen Kumar B S, Prem Kumar, Anil Kumar, Dibyendu Dey

Abstract- The main focus of our project is to reduce human efforts and ease of shopping at shopping malls. The present scenario at every mega malls or shopping malls has the hastiest situation when it comes to heavy rush while standing in queue for prolonged hours at the billing counter. Our goal is to reduce those meaningless efforts to minimum and provide a better option using latest technology for a user-friendly shopping experience of the mall customers.

Generation of High Frequency Bat Voice for Avoiding Locust Attack in Field
Authors:- Krishna Deshpande, Jay Gaikwad, Pranjal Tiwari, Prof. Dr. Prasanna G Shete

Abstract- Locust attacks needs to be avoided for the healthy growth of the wheat crop. And farmers generally use harmful chemicals sprays to avoid the locust attack. The use of chemical sprays affects the growth of wheat crop adversely, and also have toxic effect on humans and environment. To avoid toxic chemical spray and its ef- fects on humanity, environment, and most importantly on the crop for locust attack we are proposing to generate high frequency (200- 250KHz) signal to tackle locust attack.

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water.

A Literature Review on Privacy Preserving Implementing for TPA Data Sharing in Cloud
Authors:-Dnyanada N. Meshram, Asst. Prof. Shrikant D. Zade, Associate Prof. Leena H. Patil

Abstract- Today, many data warehouses and computing facilities are tested in cloud computing systems. Several people participated in the improvement of services in the system. Nowadays, cloud computing services cover a variety of possibilities, so shared computing resources and data can be transferred to computers and other devices as needed, thereby providing users with space for storing documents, pictures, etc. Whenever they want. However, the security of the document cannot be guaranteed. Cloud can provide services, through these services, you can access your applications and data anytime, anywhere. Since the data is stored in encrypted form, it must be fully protected. Many users host their data in the cloud, so accuracy and security are a top priority. We want to enable an external auditor (TPA) to check the integrity of the data stored in the cloud. Using cloud storage to share data with others is a common process. The current system believes that sharing data among multiple users may be one of the most compelling features that inspire cloud storage. In this we propose a secure cloud storage system supporting privacy-preserving publicauditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently.

Continuous Monitoring & Protection of 3-Phase Induction Motors Using PLC and SCADA
Authors:- Arsalan Ahmed Danish, Md Khaleelullah, Fahad Bin Zaid, Asst. Prof. Asra Sultana

Abstract- Induction motors are widely used in many operating areas and industrial applications as they are simple, robust, and reliable and have low production costs. The use of Induction motors have increased nowadays due to their versatility, good self-starting capability and these motors also offer simple, rugged construction, , low cost, reliability and easy maintenance. The reliability of an induction motor is of great Importance in applications such as commercial, aerospace and military and many industrial applications. In this paper different problems of IM are dealt with as over current, overvoltage, over temperature, over speed, inrush current, vibration monitoring during it’s time of operation. There are various proposed methods for fault diagnosis and protection of IM. Some of them are Stator fault monitoring techniques, protection system using Microcontrollers, On-line fault detection, Programmable Integrated Circuit (PIC) based protection system and Programmable Logic Controller (PLC) based protection system. In this study, the method which is applied is PLC based protection system of an IM.

A Fuzzy Text Fragementation by Implementing SSA Algorithm
Authors:- PG Scholar Aakansha Jha, HOD. Dr. Lal Ji Prasad

Abstract- In this new world that is surrounded by digital technologies and human wants to utilize the technology in spite of manually complete the assignments. The digital environment of today’s world creates a knowledge-based society surrounded by a high-tech economy concept that spans over its influence on how the manufacturing throughput and the information technology sector operate in an efficient and convenient way. Here we announce a project research based on Extract Technology. In this technology data can be refined and sourced with specific certainty and relevance. The concept of artificial intelligence technique correlates with the design of machine learning and it is very effective. Auto Defragmentation is an intelligent content summarization concept that automatically parses information, documents and many more into relevant and accurately abbreviated summaries. This is a concept of converting a whole paragraph into one third. This paper introduce the main research challenges of the data mining algorithm implementation with analysing the one subject note and bifurcate it into different subjects on the basis of ‘keywords’. In our technology chart ‘keyword’ are relative words of a prescribed subject that helps to distribute a single note into its respective subject’s folders. The basic architectural approach of the Data Defragmenter is to manipulate and rectify the data structure implementation on the basis of data mining and data warehouse concepts. Finally, the future of notes making approach will work terms like “Data Arranger”. Proposed approach is researched in different sectors like student’s notes making, letter writing, news reporting, script managing, and different more criteria related to writing work and managing prepared notes. General Terms: Fragmenting Notes, Auto Separation, Notes Classification.

PRAYAS Child Welfare Application
Authors:- Prof. Sonal Chakole, Sourabh Pandya, Pratik Pogde, Ankit Vitale, Dipika Katare

Abstract- Street life is a challenge or survival, even for adults, and is yet more difficult for children. They live within the city but are unable to take advantages of the comforts of urban life. There are so many slum children who roam on streets, while at this age they should study. But due to the financial crisis, they don’t have the privileges of education. Therefore they risk their lives just to get enough meal to stay alive. To get overcome from such crisis, our system will help the needy and homeless children. If we develop such kind of system, then this will surely promote poor and destitute children of our country. And this will be a small step towards promoting new generation.

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water.

Plant Disease Detection and Solution Using Image Classification
Authors:- Sahil Thakur, Darshan Patil, Rita Sarse, Prof. Manisha Bharambe

Abstract- Crop cultivation plays a crucial role within the agricultural field. Presently, the loss of food is particularly because of infected crops, which reflexively reduces the assembly rate. Identifying plant diseases is not explored yet. The foremost challenge is to reduce the usage of pesticides within the agricultural field and to increase the quality and quantity of the assembly rate. Our paper is used to explore the disease prediction at an untimely action. We propose an enhanced algorithm to predict the infected area of the leaves. For segmenting infected region and placing it to its relevant classes, colour based segmentation model is used. Experimental analyses were done on samples images in terms of sometime complexity and thus the world of infected region. Plant diseases are often detected by image processing technique. Disease detection has steps like image acquisition, pre-processing, segmentation, classification and feature extraction. Our project is used to detect the plant diseases and provide solutions to urge over the disease. It shows the affected a neighbourhood of the leaf in percentage. We planned to style our project with voice navigation system, so a private with lesser expertise in software should even be able to use it easily.

Pre-Processing for the Reconstruction of Fetal MRI Images
Authors:- M. Tech. Scholar Anagha A, Asst. Prof. Aruna B

Abstract- Clinical imaging scenarios like foetus imaging, which include significant subjective movements, does complicate the 3D image and volume reconstruction process and it remains as a problem to overcome. This project is to bring up a learning based image registration to picture the 3D rigid transformations of arbitrarily oriented 2D slices. The advantage is that no spatial transform initialization is required. Only image slice intensity is needed. Convolutional Neural Network (CNN) architecture is used to learn the regression function for mapping 2D image slices to a 3D canonical atlas space. This quantitatively evaluates the simulated magnetic resonance imaging (MRI). Further it demonstrates the results on MRI data where this method is integrated into a full reconstruction and compensation. This paper is to elaborate the preprocessing step for the whole reconstruction of fetal image project.

Accident Avoidance and Alert System
Authors:-Sourabh S. Bagi, Prathmesh S. Parit, Nilesh B. Vaishnav, Asst. Prof. Anushka D. Kadage

Abstract- Accidents are the main threat in today’s modern world. All though the technological development in automobiles increases day by day, there are no proper advancements in the perspective of accident avoidance and detection. This system avoids accidents due to collisions occurring between the vehicles because of the driver’s negligence. In case of any accidents, there is smart rescue system in the vehicle which helps in sending the location of accident spot to the family members. So, the proposed system is designed for vehicle which will not only prevent the accidents but will also look over the safety of the driver. It is used to analyze the cause of vehicular accidents and prevent the loss of life and property arising from vehicle accidents.The system also involves the improvement of the security by preventing the damage of the Car.This System records the relevant details about a Vehicle such as Distance from obstacles, Speed of Vehicle, detect vibration of the vehicle Detect orientation or inclination of vehicle.

A Novel Smart Energy Theft System
Authors:-Asst. Prof. S. Md. Mazher Ul Haq, Yaseen Quraishi, Syed Mohd Taseen Shuttari, Mohd Abdul Faheem

Abstract- Energy theft has become a serious issue in the smart grid community. It has caused massive losses for many countries that exceed billions of dollar. Nowadays, a smart meter will be placed at the end of every distribution network to record power consumption and generates the energy reports remotely. Energy theft methods involve hacking smart home appliance and most commonly direct hooking on other households electricity supplies. Other methods involved are tampering with the smart meter’s software, mechanism, and manipulating data through cloud storage. Thus, attackers can reduce their own electricity usage by manipulating other households through tampering and hacking to increase their electricity usage as the aggregate bill for all customers in the community remains the same This system principally monitors electrical parameters of household appliances such as voltage and current and subsequently calculates the power consumed.

A Review on AFD- PSO Algorithm Based Secured Energy Efficient Wireless Sensor Network
Authors:-M. Tech. Scholar Diksha Jharbade, Prof. Amit Shrivastav

Abstract- Wireless Sensor Networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Energy efficiency and secured data transmission are considered as the most important design goals for WSN. As the complexity of computer networks increased, the erudition of network-based attacks drew the attention of various researchers from several sectors. As a result of this, many Intrusion Detection System (IDS) have been deployed in such a way that it resolves various aspects of network security such as DoS, worms, viruses, malware, etc. Automation of IDS has been proposed in order to improve the energy efficient routing in Wireless Sensor Network in a secured manner. This paper represent a review on LD2FA (Learning Dynamic Deterministic Finite Automata) the dynamic nature of the network is cultured. In turn, LD2FA – PSO provides the information about the node, packet and route inspection for detection and elimination of intruders so that the data transmission is done in an energy efficient manner through the optimal path. Routing through optimal path improves the overall performance of the sensor network and through various metrics such as energy consumption, throughput, network lifetime, alive and dead nodes incorporates the Deterministic Finite Automata (DFA) and Particle Swarm Optimization (PSO) for intrusion detection and the data transmission is done in a secured manner by determining and following the optimized route. Various techniques showing in the literature.

A Review on Digital Image Copy –Move Detection
Authors:-M. Tech. Scholar Deepali Pal, Prof. Amit Shrivastav

Abstract- The use of digital photography has increased over the last few years and this trend has opened the door for image falsification. Image falsification has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving and sewing images). Existing systems integrate block-based and keypoint-based counterfeit detection methods with SLIC super pixel segmentation algorithms. Existing programs can roughly indicate suspicious, counterfeit areas. SLIC image segmentation uses simple and global stopping criteria, which reduces the accuracy of image debugging and detects copy-moving image falsification. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image falsification is proposed.

Antioxidant Properties of Prosopis Cineraria (Ghaf): Pods And Leaves
Authors:- Dr. Vibha Bhardwaj

Abstract- The aim of the present investigation was to evaluate the antioxidant properties of Pods and Leaves of Prosopiscineraria (Ghaf). Antioxidants protect biological systems against free radical damage. Insufficient levels of endogenous and exogenous antioxidants can cause oxidative stress, an imbalance of oxidants and antioxidants resulting in cellular damage or death. The antioxidant activity was assessed by DPPH scavenging activity. The methanolic extract of pods and leaves P. cineraria had shown very significant DPPH (1, 1-diphenyl-2-picrylhydrazyl) radical scavenging activity. The DPPH radical scavenging activity of the extract increased with the increasing concentration of the plant extract. In DPPH free radical scavenging assay IC50 value of methanolic extract of P. cineraria pod and leaves were found to be 550 μg/mL and 480μg/mL respectively. Therefore, in vitro assays indicate that P. cineraria pods and leaves extracts are a better source of natural antioxidant, which might be helpful in preventing the progress of various oxidative stresses.

Slider Foot Scaffold on Railway Station with New Perception
Authors:- Mayur Kailas Suryawanshi, Vivekanand Gopalrao Patil, Bharat Prakash Shirsath, Kunal Sunil Aaglave, Asst. Prof. Habiburrahman Ansari

Abstract- The Fundamental objective of Customized Railway Bridge System is to assist the truly Tried Explorers to move beginning with one Phase then onto the following. Crossing point the railway track inside the railway station is outstandingly problematic. Nevertheless, it is extremely difficult to the impaired and developed individuals to cross the railway track without the help of others. In railroad station people’s necessities to move from one phase to other stage hence, stairway is given. In present day times lift or lift system is similarly being executed. Nonetheless, these options are either a costly endeavor or then again dreary endeavor. In this paper the experts use a lot of resources train characteristics, driving rules and information about various trains to make their movement technique. There are various elderly individuals social classes encountering leg cramps walking inconveniences leg vain issues and tenacious foot tortures, etc That is the motivation to deal with this troublesome we are making a response for that is we will make a venture on a level changed stage which is related between the two stations stage. Since because of this there will be no convincing motivation to bouncing on a bridge by adults similarly as kids. This will help the voyager’s with diminishing the effort in moving between various stages. The developed and incapacitated individual can without a doubt get across the contrary side. Lately, focal points for the advancement are the applying using modified associate is move backward by using clock base furthermore, manual executive or sensor base and manual overseers. So specific use in having railroad station. Exactly when the train will pass from stage by then request will be send through Arduino to motor to pen it.

FARMBOOK-Portal for Connecting Buyers and Sellers
Authors:- Asst. Prof. Saravanan, Bharath.T, Sravan.P

Abstract- Agriculture a huge role in the economy of India, where more half of its rural households still depend on agriculture for their livelihood. More than 75% of farmers being small and marginal. Even though agriculture is the major block in the Indian economy. But the farmers who are the back bone of this are not benefited due to the lack of good prices for the crop, lack of new techniques, and lack of technologies, and methods to see profits. The growth of the mobile communication technology is creating more opportunities learn and make huge innovations in the developing countries, where bringing information technology in the field of agriculture give best of it as well. The introduction of the mobile phones leads to new services and applications, in agriculture sector this is used to know the information about the new technique, climate, soil, marketing etc. It is one of the areas where it makes a huge impact on the agriculture and the rural development. Information technology in the agriculture opens the gates to the huge productions and profits which leads to increase in economy and profits to farmers. Giving importance to the agriculture leads to growth of our nation. Where information technology with agriculture provides good ability and awareness to the future generation. As per the concern of the farmers this combination of technology leads to the huge change in trends.

Brain Tumor Recognition through MIR Image
Authors:- Prof. Pranay M. Meshram, Lalit Roshankhede, Ujwal Kurhade, Priyanka Waghmare, Nilkanth Bhagat

Abstract- Brain tumor at early stage is very difficult task for doctors to identify. MRI images are more prone to noise and other environmental interference. So it becomes difficult for doctors to identify tumor and their causes. So here we come up with the system, where system will detect brain tumor from images. Here we convert image into grayscale image. We apply filter to image to remove noise and other environmental interference from image. User has to select the image. System will process the image by applying image processing steps. We applied a unique algorithm to detect tumor from brain image. But edges of the image are not sharp in early stage of brain tumor. So we apply image segmentation on image to detect edges of the images. In this method we applied image segmentation to detect tumor. Here we proposed image segmentation process and many image filtering techniques for accuracy.

Vision Face Recognition Attendance Monitoring System Using Deep Learning and Computer Vision
Authors:- Ritika Andhare, Akanksha Baghele, Ankita Tiwari, Prof. K.D. Yesugade

Abstract- Background: This рrоjeсt will show how we can use algorithms fоr fasсe deteсtiоn and recognition in the construction of programs to build a program that will look and see the front faces of students in сlаssrооm. “A fassee is the frоnt раrt оf а рersоn’s heаd frоm the fоreheаd tо the сhin, оr the соrresроnding раrt оf аn аnimаl” (Oxfоrd Diсtiоnаry). In interасtiоns, fasсe is the most imrоrtаnt fасtоr and is capable of extracting implоrtаnt infоrmаtiоn аbоut а рersоn оr individualuаl. All humnns have the power to see how people can cope with their consequences. The рrороsed sоlutiоn is tо develоr а wоrking рrоtоtyрe оf а system thаt will fasсilitаte сlаss соntrоl fоr BVСОEW leсturers in а сlаssrооm by deteсting fо them. The second part of the program will also be able to make face recognition compared to a smaller database. In recent years, research has been done, and vision and development programs have been developed. Some are used on social media, in banking apps, in government offices e.g. Metropolitan Police, Facebook etc. After that, the Classification algorithm was used within an application that created multiple human templates. So facial features have it been detected. After that, it saved a particular database with their unique ID. Furthermоre, the verifiсаtiоn рrосess hаs been stаrted by mаtсhing the temрlаtes inside the dаtаbаse. To please this, the student is then regarded as аutоmаtiсаlly. Findings: Submitted prematurely with vоiсe and biоmetriс teсhnоlоgy саn improve security time. Emрlоyee’s аttendаnсe саn is characterized by the modern pull of the potential disruption of рunсtuаlity. Students can be arrested and transported by the fasсe deteсtiоn. Well, it may be set to bnnks tо improve chastity by capturing аuthоrized рeорle оnly оr whо hаve ассоunts in thаt bank. Nоvelty / imрrоvements: Fоr acquires gender and sexuality, appropriate tactilenics distressed, and new sоme аррrоасhes fоr mаintаining security. We have removed the mоdels соmрlete with safety challenges in this рrоjeсt.

Thermal Insulating Powder Tester
Authors:- Mr. Aakash Ashtankar, Mr.Abhay Rakhade , Mr. Ankit Ghode, Mr. Rahul Katr, Mr. Rushab Kamble, Prof. Rahul. M. Dahekar

Abstract- Insulating Powder apparatus is designed to determine the thermal conductivity of insulating Powder. In this paper we will discuss about different powders testing its insulating properties. How different powders react in the insulating powder tester.

FEA of Existing Rocker Arm of Compression Garbage Truck
Authors:- Mr.Ashish R. Tale, Prof. A. S. Patil Prof. A. D. Diwate

Abstract- Experimental analysis of existing rocker arm is performed to determine stress and deformation. Later topology optimization is to be carried out for best optimized model leads to saving of material, cost as well as sustaining existing boundary condition. Manufacturing of new optimized model is compared with existing and analyzed in ANSYS software.
This project focuses on design optimization of Rocker arm targeting weight reduction with required strength and stiffness. Optimized design of arm is mandatory with appropriate material selection as well as valid finite element analysis. Optimization was performed considering static analysis of stress, strain and total deformation along with the suitable material selection. The experimental testing will be performed on universal testing machine. After making the comparative analysis result and conclusion was drawn.

Finite Element Analysis of Vehicle Seat
Authors:- Mr.Avadhoot D. Prabhu, Prof. A. S. Patil, Prof. A. D. Diwate

Abstract- Vehicle seat has great importance as it is the primary component of vehicle that provides comfort to the occupants. The seat should have proper strength and durability in case of accidents of when vehicle passes thru bumps. If seat structure breaks, severe injury can be occurred to the passengers. In present scenario fuel consumption of the vehicle should be minimum; hence there is a need to weight optimization of vehicle components without compromising the strength. To check these qualities of any physical components, Finite Element Analysis (FEA) is an imperative simulation tool. In this method CAD model of seat structure is prepared and developed FE model of complete seat assembly. Steel properties were used to model seat members. Passenger mass was distributed to the seat floor and seat back. As vehicle can have braking, cornering and bump event while passing on the roads, three load cases were simulated on seat and measured the stresses generated on seat members.

Vocal Extraction from Music Signal: Classification
Authors:- M. Tech. Scholar Anila R, Asst. Prof. Safoora O K

Abstract- Music signals contains atleast one vocal and instrumental music or can be pure music or can be pure instrumental music. Most of the researchers are doing their research on vocal signal separation from the mixed music signal. For this application the music which contain both vocal signal and instrumental music is taken. For this purpose first the feature is extracted from the music signal then the classification is done using SVM.

Implementing of Online Auction System
Authors:- Ms. Amrita Shirode, Akanksha Chavan, Sneha Bansoda, Vaibhavee Gadhave, Pranali Tatkar

Abstract- Online Auctions system is web application which will help the users to buy and sell the products. The system that holds the various products on a website and server sellers and bidders accordingly. And it is designed to allow users to set up their products for auctions and bidders to register and bid for different types of products that are available. This is a best method for buying and selling the products and services. And it helps the customers to buy and sell the products at reasonable price. There are some existing applications that allows users forbidding but the product is not available in your local area, you cannot do inspection of the product that you are going to buy. By online auction application user will be able to bid for product that is available in this local area.

Smart Attendence Monitoring System in College Smart Attendence Monitoring System in College Bus using RFIDBus using RFID
Authors:- K. Priyanka, S. Abirami, S. Kalivani, A. Kavitha, A. Meena

Abstract- On reviewing the past work of college bus tracking, monitoring and alerting system, there is a possibility to categorize various methodologies and identify new trends. One among them is a challenge for vehicle tracking, monitoring and alerting system. Now-a-days with the increase in the crime rate and accidents, Student often gets on the wrong buses and get off at the wrong stop. Bus drivers may be unable to identify all students and will not know in time if a student is missing. Parents have no way of knowing if there ward is safe until the evening when the returns there is no provision to monitor driving with in speed limit unscheduled deviation.. And it has the advantage of efficient tracking capabilities, low cost and easy maintenance. The RFID tags are effective and it is used for tracking and monitoring students. The bus unit is used to detect when a student enters/exits from the bus using RFID Card. This information is communicated to the parent unit and school unit that identify the presence of students. The system tracks the students by the IOT.

A Survey Paper on Full Stack Web Development
Authors:- Manish Bagal, Gaurav Kadam, Ajay Bandgar, Abhijit Salunkhe, Prof. R.M. Kedar

Abstract- The complexity of Web sites is increasing and transforming into Web applications that contain business logic, interactivity, transaction handling and states. This phenomenon forces the Web developers to adapt more traditional software engineering techniques to keep the Web applications error free, maintainable, reusable, well documented etc. Many Web developers do not use any engineering techniques at all and design mainly to create as fashionable applications as possible with no regards on the application’s functionality. This results in applications that are hard to maintain and with poor functionality. The purpose with this thesis was to see if the use of a more traditional software engineering technique, namely the Unified Modeling Language with the newly added Web Application Extension, resulted in a Web application with good design regarding the maintainability of the application. To investigate the maintainability of an application, the maintainability was further divided into three sub criteria: extensibility, reusability and documentation. These three criteria were then applied on a case study where a Web application was designed. From the analysis of the final design, using the three criteria, the maintainability was derived. This paper examines the four components of MEAN stack (Mongo DB, Express.js, Angular.js &Node.js) and how they go well together, their benefits as a complete stack in web development. This paper also describes the work flow and server architecture in detail to understand the working of these four technologies employed in the MEAN stack web development. This paper mainly focuses on roles of these four technologies in MEAN stack and how they are popularly implemented in present times.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale, Mr. Sandeep Thakre

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

Analysis Of Ber Performance Of Ofdm System Using Different Modulation Methods
Authors:- M.Tech. Scholar Shubham Srivastava, Associate Prof.Dr. Bharti Chourasia

Abstract- Now a days, demand for wireless systems are reliable and have a high spectral efficiency have increased because of the rapid expand of wireless digital communications. orthogonal frequency division multiplexing (ofdm) has been recognized for its good performance to achieve high data rates. ofdm and multiple input and multiple output (mimo) are two main techniques employed in 4th generation long term evolution (lte) networks. in ofdm, multiple carriers are used and it provide higher level of spectral efficiency as compared to frequency division multiplexing (fdm). in ofdm, because of loss of orthogonality between the subcarriers there is inter carrier interference (ici) and inter symbol interference (isi) and to overcome this problem, the use of cyclic prefixing (cp) is required. this uses 20% of available and width. but we are using the proposed method the bit error rate (ber) is improved and this may lead to higher accuracy rate.

A Comparative Study on Loan Eligibility
Authors:- Akash Dagar

Abstract- Nowadays, machine learning algorithms are used everywhere around us. In near future our lives would be eased out by using artificial intelligence. We all know checking if a person is eligible for loan or not is a very complex and time consuming process. And it’s a great source of income for banks. In recent years, many experts worked on loan approval prediction. Machine Learning algorithms play a very crucial role in prediction. In this paper four machine algorithms, Logistic Regression, Random Forest, Support Vector Machine, XGBoost are used for predicting if a person is eligible for a loan or not. On the basis of dataset used, we found that Logistic Regression provides better accuracy than other models.

Automatic Image Captioning With CNN and LSTM
Authors:- Biswarup Harh, Tejas Mahajan, Zulkif Khan, Prof. Gajanan Arsalwal

Abstract- PC Vision and Natural Language Processing in man-made consciousness is utilized for consequently portraying the substance of an image. To portray the image a very much framed English expressions is required. Naturally portraying image content is a lot of supportive to the outwardly debilitated individuals to comprehend the issue better. The paper is expected to recognize protests and advise individuals through text. It perceives image and converts to text utilizing LSTM. At first, the information image is changed over to a grayscale image that is handled through the Convolution Neural Network (CNN) to effectively distinguish the objects. Objects in the image are effectively recognized utilizing OpenCV, which is then changed over to text. The proposed technique for blind individuals is intended to expand to people with vision misfortune to accomplish their full potential.

Attenuation Coefficients of Gamma Rays in Some Natural Rocks
Authors:- A.Abbady, M. Motawea, S. Harb

Abstract- In this work, gamma-ray linear attenuation coefficients of phosphate and sandstone materialswere determined using an alternative method for determining gamma-ray linear attenuation coefficients. Different energies for gamma rays ( 22 Na 511, 1280 Kev) ( 137 Cs 662 Kev) ( 54 Mn 0.834.9 Kev) ( 65 Zn 1115.5 Kev) and ( 60 Co 1173, 1332 keV) had been used to ensure that the obtained experimental results are accurate; Moreover, the coefficients had been determined using the XCOM code and Radiological ToolboxUser’s Guide program. The XCOM code and Radiological Toolbox program had been utilized for gamma rays attenuation coefficients. The data show good correlation between experimentally and theoretically results. So, they can be applied as well as the empirical methods. The obtained results show that phosphate has effective shielding properties against gamma rays than sandstone.

Regenerative Braking System Using Buck-Booster
Authors:- Raj S. Mishra, Athang S. Ramadhin, Sharique A. L. Shaikh, Krishna K. Verma, Asst. Prof. Tejas K. Thakur

Abstract- In Automotive vehicles that are completely mechanical in nature, the braking system makes use of a vast surface to produce a rubbing action and converting all energy received into heat. The stopping power or capacity of brake can largely vary with the amount of frictional power generated. The objective is to capture this released energy byproduct, when brakes are applied and use it for electric power generation. With the help of conventional regenerative braking systems available in the markets, the above mentioned claim could be achieved. To enhance this system even more with an incorporation of DC to DC transfer (BOOST) module in the regenerative braking circuit we target to amplify the output generated even more which will be sufficient enough to recharge the battery at a much efficient rate resulting in less battery recharging times. The power can be further stored in capacitors for emergency electronic motor boost torque, providing immense acceleration at an instant to avoid accidents from rear or the sides making it a Safety feature.

Review of Fack News Analysis on Twitter Data Set
Authors:- M. Tech. Scholar Mamta Gehlot, Asst. Prof. Vasudha Sharma

Abstract- Today’s the modern era of the internet where people share the opinions, ideas of the people through such social media: microblogging sites, personal blog, reviews. various users review for a specific product, company, brand, individual, forums, company, brand and movies etc. sentiment analysis is a part of text mining where Analyzed, opinion of people and classified into tweets as good, bad, neutral. In this paper work data will be collected from twitter API and the sentiment of tweets and reviews published paper identified by searching particular keywords and then evaluate the polarity of tweets based on classified tweets as positive. Negative.After fed data into a supervised model for testing of new data sets. Machine learning techniques and tools are used. Machine learning classifiers such as Naive Bayes (NB), Maximum Entropy, Random Forest (RF), Support vector machine SVM classifiers are used for testing and training of the data sets and also evaluating the Polarity of sentiment of each tweet based on this analysis. Show that in result we get a performance of classifiers by evaluate parameters has highest accuracy. Using machine learning classifier RF, DTs, SVM and evaluate the accuracy of features and increasing the number of tweets. In the future work use of same methodology some more features can be added which are used for improving accuracy of prediction.

A Study on Consumer Perception with Reference to Flipkart
Authors:- Pawan Dadoria ,Ajitanshu Yadav , Ashish Teotia

Abstract- The importance of this study is to examine the customer perception towards Flipkart.com users in Greater Noida city. What people are thinking about flipkart company and what new and old generation people like most in Flipkart. com. Also tried to find out various attributes of Flipkart users of Greater Noida city towards the online shopping. For this study survey was conducted. The data will be collected from respondents through a scheduled containing question. The study result concluded that future in India especially in cities looking very bright. Flipkart.com offering best prices, good products and completely easy shopping experience for our customers. The success of any e-commerce company in India is depending upon its popularity, its branding image, its unique & fair policies, and its customer relationship etc. Design/ Methodology/ Approach– The study used a descriptive research methodology. A survey of 300 hundred college students in Greater Noida was conducted to describe and identify the perception of flipkart.com. Finding-The key result is that 83 percent of respondents provide cash on delivery, which influences respondents to buy online. The majority of respondents (54%) agree that detailed information about products in online shopping is essential. In Greater Noida, 75% of respondents are very happy with their online shopping experience on the flipkart.com website.

Weight Optimization of Vehicle Rim with Fatigue Tests
Authors:- M.E. Student Ashwini T. Vinchu, Asst. Prof D. S. Chaudhari

Abstract- Rims are now produced in Aluminum Alloy and Magnesium Alloy providing options to steel material which are heavy and difficult to produce due to complex styling. Also, rim should satisfy all the fatigue test criteria according to IS and ARAI standards. There are two important fatigue tests Radial fatigue test and Dynamic cornering fatigue test. In this paper we are studying optimization of Wheel rim with mass criteria and testing 2 different models and 2 materials on Fatigue tests with finite element analysis.

Review on “Design and Combustion of Pulsejet Engine”
Authors:- M. Tech. Scholar Ganesh Motekar, Prof. G.R. Kesheorey (Supervisor & HOD), Dr. A.J. Siddiqui (Executive Director)

Abstract- The pulsejet engines are of relatively simple design without any moving or rotating parts with low cost, easy to use but extremely high noise. The performance of pulsejet engine is significantly affected by design type, geometric parameters and combustion chamber volume. The current research studies the various researches conducted in improving the existing design of pulsejet engine using experimental and numerical techniques. The fuel type and fuel inlet configuration affecting the thrust generation and pressure is also studied by various researchers.

Identification of Potential Phytoremediation Behaviour of Arsenic and Cadmium Tolerant Plants in Contaminated Sites of Central India
Authors:-Ashish Kumar Bhui, Piyush Kant Pandey

Abstract-Arsenic and cadmium are of great environmental concern due to its extensive contamination and carcinogenic toxicity. There is a great need for reliable and cost-effective technologies capable of reducing arsenic contaminated sites to environmentally acceptable levels. Phytoremediation, a plant-based green technology, has been successfully used to remove contaminants from soils. After the discovery of an efficient arsenic-hyper accumulating plant in cold countries, the Brake fern (Nature, 409:579), efforts for discovering similar hyper accumulating species in areas having arid environment is in progress. In this effort four different plant samples found in wild, terrestrial and arid environment were harvested in Greenhouse in an arsenic- cadmium contaminated soil for 16 weeks and were analyzed for arsenic concentrations. In addition, some plants growing in naturally contaminated soils were also analyzed. Among these species Calotropis procera among other species was found to be a better arsenic and cadmium hyper accumulator, its efficiency being calculated in terms of their enrichment factor which for Calotropis procera was as high as 25.00 and 17. The highest arsenic concentrations the biomass of the plant growing in the arsenic-cadmium contaminated soil in the field was 14 ppm. This plant thus has a better potential to be used for Phyto remediating arsenic and cadmium contaminated sites.

Managing Changes Safely
Authors:- M. Tech. Scholar Ritesh Makwani, Nisha Kushwaha

Abstract- Change is the only permanent thing in this world” quoted by the Greek philosopher, Heraclitus, fits perfectly right for the industrial setting as well. In the current world of industrialization, the race to make any business successful leads to lot of dynamic conditions at workplace. Be it capacity enhancement of equipment and facility OR introduction of new aspect in technology & process to increase production quantity and quality, generates the need of Change. The Change is intended for good & useful purposes, however it has potential to add new hazards & risks and aggravate the existing ones. Disasters in the past have proved that if changes are not handled cautiously they can prove very costly. Lessons learnt from the past incidents and disasters have emphasized the need for Managing Change Safely. Management of Change (MOC) is one of the key aspect required to be complied as per many legal & regulatory requirements in several countries. This paper explores the requirements of the procedural details for Management of Change by deliberating on the various stages involved in handling Changes in an operating facility. Management of Change will typically comprise five key steps – Screen, Review, Approve, Implement, and Close. By implementing & maintaining a sound MOC Procedure, the industries, by managing hazards & risks, will make sure there are ZERO incidents, injuries & illnesses. Overall it means no suffering by injured/deceased and family, it also means no breach of laws & regulations, no penalties & compensations to be paid, no lost time, no business interruption and no financial losses.

Student’s Attendance Management System
Authors:- Nikita Shriname, Vaishali Pandhare, Prof. Palwe R.M

Abstract- Fingerprint verification is one of the most reliable personal identification methods is biometrics. With the rapid development of fingerprint verification, a number of its applications system etc. In this paper, a fingerprint Attendance management system is designed and implemented. This system based biometrics and serial port communication technique solve the problem of attendance and trouble of maintaining the register. It can make the user’s attendance more easily and effectively.

Fabrication of Automatic Pneumatic Braking System
Authors:- Avinash V. Khadye, Hardik A. Thakur, Akash S. Waghdhare, Abhishek K. Yadav, HOD. Wasim Khan

Abstract- Most of the accidents in four wheeled vehicles occur because of failure of braking systems. Manual method of applying brakes is always dangerous as it leads to accidents. Unconsciousness of driver, failure in the linkages of braking systems, road conditions, uncontrollable speed of the vehicle and manual operation of braking systems are the reasons of accidents. It is necessary to control brakes automatically through electronics devices to minimize the accident problems. In this project report we propose an effective methodology for automatic control of braking system to avoid accidents. In this technology we used Arduino, relays, IR transmitter and IR receiver for effective function of braking control system. This Braking system consists of IR transmitter and receiver circuit and the vehicle. The IR sensor is used to detect the obstacle. There is any obstacle in the path, the IR sensor senses the obstacle and giving the control signal to the Arduino Board which in turn sends signal to relay circuit and actuate solenoid which actuates the flow control system from the pneumatic circuit by actuates the pneumatic cylinder so as to stop the vehicle as programmed. This complete system can be fitted on to dashboard of a vehicle and effectively used for automatic control of braking system. The prototype has been prepared depicting the technology and tested as per the simulated conditions. In future the actual model may be developed depending on its feasibility.

Application Research on Smart Hospital Bed for Paralytic Patients
Authors:- Aayushma Jain

Abstract- The chosen idea is that of a Smart Hospital Bed for Paralytic Patients. I came across hospitals and NGO’s serving paralytic patients who have their whole or partial body disabled by the paralysis attack. These people in most cases are not able to convey their needs as they are neither able to speak properly nor do they convey through sign language due to loss in motor control by their brain. The focus of this project is to develop a software-hardware platform that addresses one of the costliest, acute health conditions of a paralytic patient. Caring for paralytic patient is extremely costly, increases the length of hospital stays and is very labor intensive. The proposed platform collects information from various sensors incorporated into the bed, analyzes the data to create a time-stamped, and commands the bed’s actuators to start ringing alarm whenever the patient shows a slight movement. These capabilities are combined to form a cognitive support system that augments the ability of a care giver, allowing them to provide better care to more patients in less time. For proof of concept, Ihave implemented algorithms and architectures that cover three key aspects of this platform: 1) data collection, 2) modeling & profiling, and 3) acting.

Rational Fire Revealing and Pictorial Guided Evacuation System Consuming Arduino and GSM
Authors:- Asst. Prof. Potaparthini Kiranmayee, Asst. Prof. Dubasi Kirtana, Asst. Prof. Chakali Swathi

Abstract-An example accomplished of distinguishing fire coincidence in actual time and as long as a pictorial management organization in circumstance of alternative in space Area is communicated in offered case. Project consumes binary parts hardware part and software part. The central and intellectual unit of the prototypical is arduino. “Hardware design comprises arduino, flame sensor, LEDs, liquid crystal display (LCD), buzzer, GSM. And software contains the programming of Arduino conferring to preparation of fire sensor and grounding of LED panels for supervisory emigration in case of fire”. The sensor units are associated via common data line to ATMEL MEGA328P AU1722 Arduino. A SIM 800C GSM kit based network module, accomplished of operational in normal. GSM Bands has been recycled to send alert communication. The scheme is working on overall determination published circuit board (PCB).

Fitness Club Management System
Authors:- Priyanka Sakhare, Prajkta Zanje, Palwe R.M.

Abstract- This Project “Fitness club Management system” is solution fitness centres to manage the customers in an easier and more convenient way.The administrator, is able to view all the members of fitness centre as well as their details. This project is a computer based program and it manages the gym members, the personal and the inventory. This system also maintains the client details,to provide the valuable reports regarding the progress of the gym member.

Productivity Improvement in Manufacturing Industry using Industrial Engineering Tools
Authors:- M. Tech. Scholar Pawan Nathani, HOD. Praveen Patidar

Abstract- This research study proposes an innovative analysis for controlling the defects in manufacturing industry. In this analysis, pipe bending process is concentrated. The component selected has often rejected due to flattening and crinkling of cross section of tube defects. Six Sigma, the zero defect approach, is used in this study. Define measure, analyse, improve and control (DMAIC) problem solving methodology is applied for problem analysis. Taguchi’s experimental design is used for process validation and improvement. The confirmation experiment showed that the rejection rate was reduced to 6.77 % from 21.66 % in case of flattening defect while rejection rate was reduced to 8.22 % from 16.77 % in case of crinkling defect. The application of Six Sigma program with Taguchi technique has developed an innovative cost effective methodology for controlling defects in less experimental time.

A Review on Defect Reduction in Manufacturing Process by Applying Six Sigma and Dmaic Problem Solving Methodology
Authors:- M. Tech. Scholar Pawan Nathani, HOD. Praveen Patidar

Abstract- In today’s competitive world, customer wants perfection and there is no room for error. Delighting the customer and new ways to exceed their expectations is requirement of today’s business world. Six sigma helps to achieve this goal. Six sigma is a highly disciplined process that helps us focus on developing and delivering near-perfect products and services. Six sigma helps us to reduce deviation in process and keep them within acceptance limit.

Android Based Furniture Shopping
Authors:- Mohini Bhosale, Varsha Pandit, Kulkarni D.P

Abstract- The furniture shopping system is an android application that allows clients to check out for different furniture available in the store and can even buy them on the online. The system gives a categories list of furniture results of various styles and models. Clients need to login into the system for browsing every item and would then be able to include them into their truck. Subsequent to choosing the items clients can make an anchor online installment by means of the credit card. In this manner, the online furniture shopping project brings a whole furniture shop on the web and makes it simple for both purchaser and dealer to make furniture deals.

Web Application for Rule Based Banking Chatbot
Authors:- Swathi. K, Arul Vijay Kumar. CH, A. P. S. B Vyshnav, A. Krishna Chaitanya, Manoj. K

Abstract- The banking industry is one of the most important sectors of Indian economy that has continuously increasing its activities due to the rise of population. Today banks have diversified their activities by offering various products and services such as credit cards, debit card, home loan, equity and general insurance.We all know we are running in tough times due to this pandemic situation,to support middle class families the reserve bank of india announced a three month loan moratorium on Indian public sector banks. So,we decided to develop a rule based banking chatbot web application to collect statistical data,scenarios and the reasons why the customers applied for loan moratorium and when will they get back to normal situation.The economical condition of the customer during this pandemic situation.do the customers looking other options to settle their loan or want to continue and the application stores all the feedback/responses provided by the customer.Our work concentrates to develop a chatbot web application that will help the customers understand the various options available to them during this tough time.

Crop Market
Authors:- Purval Bhoyar, Khushabu Potwar, Mansi Tiple, Pralay Ramteke, Payal Satpute, Asst. Prof. Nutan Sonwane

Abstract- There is lot of headache in crop selling and buying because farmer get very less prices of crop and these crop are very expensive for customer. In the current situation, farmers to direct consumer marketing is the most need of the country. As farmers are not getting high Compensation on the selling of agriculture commodities and customers are also not satisfied because they are paying high price than the original price of the product. This situation happens because of mediators. In this paper, we are trying to resolve various approaches regarding farmer to customer crop selling.

Arduino Based Solar Tracking Using LDR Sensor & Servo Motor
Authors:- Anshad M, Asst. Prof. Mrs. Asmin M K, Associate Prof. Ms. Shamna A

Abstract- The main objective of this seminar is to explain about solar tracking system which will keep the solar panels aligned with right facing the Sun in order to consume maximum solar power. The system tracks the maximum intensity of light from the sunlight . When the intensity of light is decreasing, this system automatically changes its direction to get maximum intensity of light. Light dependent resistors (LDR) have been used for sunlight detection and to capture the maximum light intensity. A servo motor is used to rotate the solar panel to the maximum light source sensing by the light dependent resistor (LDR) in order to increase the efficiency of the solar panel and generate the maximum energy. The system will be controlled by a servo motor and a microcontroller as a main processor. As a result of solar tracking system, solar panel will generate more power, voltage, current value and higher efficiency.

Mask Detection and Face Recognition System Using Tensor Flow, Keras and Mobile Net
Authors:- Samiksha Patankar, Vishakha Dubey, Raghav Bishnoi, Ritik Porwal, Ujjawal Tomar, Assistant Prof. Ronak Jain

Abstract- The deadly COVID-19 virus has become a very serious issue for each and every one in current time. To prevent being infected by the virus one can on his/her personal level can only wear mask to stay safe, keep social distancing and use sanitizers or wash hands. Keeping this pandemic situation in mind we proposed a project “Mask Detection and Face Recognition” which automatically detects face masks on human faces and note down the time and names of people recognized without face masks in excel sheet. The admin can then take actions accordingly on people recognized without face masks, like charging them with some penalty or simply instructing them to wear masks. This project can be implemented in a small organization or department where the face dataset is already available with the admin of that department or organization. By implementing this, the chances of people getting infected by virus reduces in the institution, as everyone will wear mask which are the personal protective equipment against virus. It is a project based on Machine Learning and Artificial Intelligence using OpenCV, Keras/Tensorflow, MobileNet and Deep Learning.

A Review Vision Guided Plant Leaf Disease Detection Using IOT
Authors:- Meghana B S, Roshani S P, Sindhu H M, Vidyashree, Asst. Prof. Gana K P

Abstract- In agribusiness exploration of programmed checking of diverse parameters along leaf illness recognition is imperative exam challenge as it is able to show blessings in controlling vast quarter of yields, and eventually this framework obviously identifies facet consequences of illness when they display up on plant clears out. The term leaf contamination is usually applied just for devastation of stay and sound takes to the air. This paper offers notion concerning estimation of various parameters of plant and investigation of leaf sickness discovery using image processing technique and machine learning algorithm i.e, SVM and sends the whole data over net by way of technique for time period IoT. Internet of factors (IoT) expects to stretch out internet to massive number of dispersed devices by means of characterizing preferred, interoperable correspondence conference. The real intention of internet of things (IoT) is to make a eager situation utilizing empowering advances, for instance, sensors, inserted gadgets, and correspondence conventions. For result purpose leaf of the plant is picked in positive framework growing any leaf is an awesome errand as the plant is provided to the assaults from distinct small-scale lifestyles bureaucracy, bacterial maladies and irritations. The facet effects of the attacks are usually identified via the leaves, stems or natural product exam. This is the motive leaf ailment location of plant is picked on this framework.

Survey Paper on Edge Computing
Authors:- Shashank Sharma, Anurag Punde, Nidhi Agrawal, Deepak Agrawal

Abstract- By utilizing cloud computing engineering and administrations to do concentrated calculation, particularly when Internet of Things (IoT) situations need to respond from experiences came about because of that calculation back to end gadgets, at that point we run into real restrictions of transfer speed blockage and the came about high dormancy. Edge Computing come to presence with various executions to steadily eliminate these hindrances on restrictions. A few approaches have been created in equal by various substances, similar to investigate gatherings, industry, administrators, and normalization associations. Haze registering, Multi-access (Versatile) Edge Computing, cloudlets, and so forth, are applicable models, remembered for the enormous class of Edge figuring. Their structures and advancements have numerous fundamental normal qualities, yet additionally contrasts in approach. A whiz question is raised – if any critical union will arise soon. This paper isn’t expected to be a finished study, however it endeavors to distinguish some intermingling architecture and some case studies related to edge computing.

A Hybrid MPPT Technique for Partially Shaded Photovoltaic Arrays
Authors:- M. Tech. Scholar Utsav Patil, Prof. R. M. Bhombe, Prof. Diksha Khare

Abstract- Photovoltaic panels are the most important green energy source because of their inexhaustible moreover its clean. It is important to connect the PV panels to the maximum power point tracking (MPPT) controller to optimize its output power. The PV panels output power efficiency is related to the rapidly variation of the incident irradiance moreover the partial shading pattern. The variation of the incident irradiance and the partial shading pattern makes the tracking of the global maximum peak (GMP) through the local ones too difficult, which extremely decrease the efficiency of the PV panels. The problem is the GMP value varies as the sun irradiance varies so; the detection of the GMP needs an efficient and fast algorithm which cannot be done by the traditional MPPT. In order to solve the problem, proposed system a hybrid new algorithm can combine a traditional MPPT algorithm, such as perturb and observe, or incremental conductance, with the ANN (artificial neural network) This new algorithm can combine a traditional MPPT algorithm, the proposed hybrid MPPT algorithm is based on the ANN and used to predict the global MPP region by estimating its voltage boundaries. Consequently, the conventional MPPT algorithm searches for the MPP in the predicted region. The proposed technique is modeled and simulated using MATLAB/Simulink.

Online Voting System
Authors:-Dr. Anupam Sharma (HOD), Yash Kumar Jain, Sudhanshu Gupta,Yash Jajoria, Kartikey Tyagi

Abstract- This paper deals with design, build and test an online voting system that facilitates user (the person who is eligible for voting), candidate (Candidate are the users who are going to stand in elections for their respective party), Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by voter id card number and password and click on his favourite candidates to register vote. This will increase the voting percentage in India. By applying high security, it will reduce false votes.

Modeling and Simulation of Gas Turbine Blade with Different Geometrical Perforated Holes
Authors:- Research Scholar Abhijeet Tiwari, Asst. Prof. Shamir Daniel, Asst. Prof. Nilesh Kumar Singh

Abstract- Gas turbine is a typical power generating device, although gas turbines are used for different purposes in presented work the model of the gas turbine used for the purpose of jet propulsion, aircraft and airplanes, is considered in addition the thermodynamic performance of the machinery is evaluated, to meet the requirement, some kind of arrangement need to being corporate for getting optimized power output. In the gas turbines the power is generated at a higher temperature and in large magnitude, the results of which it generates a lot of heat, so the cooling of turbine blade is very much required. To improve the cooling efficiency were quire more optimized and efficient cooling methods. We required some geometrical changes in the gas turbine blade as well as the changes in designs of turbine may be in the form of perforations. There are number of techniques employed for the purpose of cooling, it like increase the overall flow rate of the coolant around the gas turbine or providing the cooling holes in blade which may different size and shapes according to the gas turbine applications. For the purpose of cooling, the mediums required to flow continuously, either over the surface or under the surface for the optimum performance.In the present work we will see the effect of providing cooling holes on the turbine blade by improving its geometry using the CATIA modelling software and to analyse the different boundary conditions in the analysis ANSYS software. We will also optimize the material of the blade as well as we can also iterate the type of the coolant which is flow over the surface of the blade to improve its efficiency and to optimize the performance of the gas turbine. For three new nicke based alloys were taken namely Inconel 700, Nimonic 263 and MAR M247 and found that Inconel 700 proves to be the best among these materials. Secondly the blade geometry with cooling holes provides much more efficient results then simple blade geometry and it should be preferred.

Design and Performance Evaluation of 32-bit Floating Point Multiplier Using Vedic Multiplier
Authors:- Rajesh Deokate, Prof. N. M. Chore, Prof. M. N. Thakre

Abstract- Floating point multiplication is a common operation in advance Digital Signal Processing (DSP) applications. This paper explains a 32-bit binary Floating Point Multiplier (FPM) architecture using an Vedic multiplier. The proposed multiplier generates only the needed MSB bits of the product mantissa by making use of Divide and Conquer (D&C) algorithm with a modified Full Adder (F A) to increase the speed of multiplication. The pipeline architecture is also proposed to improve the performance of the multiplication in terms of reduced delay and power. The proposed FPM is compared with booth recoding based FPM and the various performance measures such as area, power and delay are analyzed.

E-Cycle Retailer App Based on Salesforce Platform
Authors:- Asst. Prof. Virupakshaiah H K, Gayathri R (Project Student)

Abstract- E- Cycle retailer App allows fictitious electric bicycles manufacture, manage their products and reseller orders using Salesforce platform. The need of the Electric-Cycle online retailer App is to simplify purchase E-cycle with complete requirements and to avoid the end user frustration and increase the productivity to the retailer. Product Explorer will provide the complete details of the E-cycle which is select by the customer by adding filters and the product is ordered by the reseller and the data is stored in reseller orders. These paper explain about the system provides complete solution to manage the time of cycle riding enthusiast to get a good and selected E-cycle through the reseller.

Vision Guided Plant Leaf Disease Detection Using IOT
Authors:- Meghana B S, Roshani S P, Sindhu H M, Vidyashree, Asst. Prof. Gana K P

Abstract- In agribusiness exploration of programmed checking of diverse parameters along leaf illness recognition is imperative exam challenge as it is able to show blessings in controlling vast quarter of yields, and eventually this framework obviously identifies facet consequences of illness when they display up on plant clears out. The term leaf contamination is usually applied just for devastation of stay and sound takes to the air. This paper offers notion concerning estimation of various parameters of plant and investigation of leaf sickness discovery using image processing technique and machine learning algorithm i.e, SVM and sends the whole data over net by way of technique for time period IoT. Internet of factors (IoT) expects to stretch out internet to massive number of dispersed devices by means of characterizing preferred, interoperable correspondence conference. The real intention of internet of things (IoT) is to make a eager situation utilizing empowering advances, for instance, sensors, inserted gadgets, and correspondence conventions. For result purpose leaf of the plant is picked in positive framework growing any leaf is an awesome errand as the plant is provided to the assaults from distinct small-scale lifestyles bureaucracy, bacterial maladies and irritations. The facet effects of the attacks are usually identified via the leaves, stems or natural product exam. This is the motive leaf ailment location of plant is picked on this framework.

Detection of Lung Cancer using Image Processing and Respiratory Monitoring System
Authors:- Mis. Rupali B. Dorkhande, Asst. Prof. Rahul Dhuture, Prof. Mrs. Rohini Pochhi

Abstract- As the oxygen saturation is very important in terms due to the pandemic. The role of pulse rate plays a major role to detect the symptoms of corona. Lung carcinoma the number of death reported day by day is increased. This type of sickness happened in human being. This is life threatening disease occurred globally. The detection of this infection at premature stage can be curable. Also the disease is affected due to bad eating habits, pollution, smoke, etc. are the main causes. CT scan, mri, X-ray and much more are used for recognition of this illness symptoms. The tissue grows abnormally in affected region. Image processing is the technique where we can find the detected region. Respiratory also plays very important role for sp02 sensor is proposed. The proposed system which works with the hardware and software gives result regarding normal and abnormality of patient.

Home Automation Using Gesture Control and RF Communication
Authors:- Shashank Sundar

Abstract- This general paper directs towards the concept of Home Automation. We will see a detailed concept of (1) Home automation concept; (2) use of wireless communication; (3) adapting gestures to machine language. Contrary to other projects, I aim to work towards gesture-based control of home automation systems. This research has the diversification to capture gestures and process them in real time to perform specified functions in a smart home. It can be said that this paper will be a great analysis to study what home automation is and the required components both hardware and software.

Space Vector Based Hybrid Random Pwm For Two Level Vsi Fed Induction Motor Drive
Authors:- Asst. Prof. Dr. Nayeemuddin.M, Asst. Prof. Dr. G.Venkata Subba Reddy, Asst. Prof. B. Amarnath Naidu

Abstract- A conventional PWM inverter fed Induction motor drive generates more harmonic content. The Random PWM (RPWM) techniques will reduce the harmonic content. In this paper a hybrid Random PWM technique is implemented and the simulation results will effectively proves the reduction of harmonic content compared to conventional SVPWM techniques.

Numerical Simulation of Truncated Aerospike Nozzle
Authors:- P.G Scholar Nagarajan P, Asst. Prof. Thiru.D.Kulandaivel

Abstract- Aerospike nozzles are being considered in the development of the Single Stage to Orbit launching vehicles because of their prominent features and altitude compensating characteristics. This paper presents the design of aerospike nozzles using characteristic method in conjunction with streamline function, and performance study through numerical simulation using commercial Computational Fluid Dynamics (CFD) code ANSYS FLUENT. For this purpose nozzles with truncation lengths of 10%,20%,30% 40%, 50% are choosen, because of the thermal and structural complications in the ideal aerospike nozzle. Simulation of the flow is carried out at three different altitude conditions representing Under-expansion, Ideal, and over- expansion conditions of the flow. Optimum percentage of the truncation is selected by the comparison of nozzles with different lengths of truncation under various altitude parameters. The results show that the flow pattern of the nozzles under different altitude conditions are almost similar. The truncated nozzle is found to give optimum performance and it has achieved the desired exit Mach number in all the three altitude conditions.

Critical Factors Influencing Construction Productivity in Vidarbha Region
Authors:- P.G. Student Ajit Ambekar, Asst. Prof. A. M. Ingle, Associate Prof. Syed Sabihuddin

Abstract- Literature review and factors recommended by experts were considered categorical factors. 40 factors classified into 5 groups were analyzed and classified taking into account the relative importance indicator. Questionnaires were distributed to the project manager, project engineer, architecture, etc. It was concluded that the final cost of the projects was higher than the estimated cost. It is recommended to develop human resources through appropriate and ongoing training programs that have a clear task, vision and planned approach to overcoming violations in the implementation of construction projects. It is expected that the factors discussed will help to successfully carry out construction projects.

Classification and Prediction of Diseases with Similar Symptoms
Authors:- Prof. Khaire R.B, Pankaj Suryawanshi, Abhijeet Kadtan, Jayesh Dayalani, Tejas Sonavane

Abstract- Beauty parlor management system is web based Beauty parlor management system application with appointment scheduling functionality. it connects clients, salons and stylists in online community allowing user to browse salon and styl ists and book or cancel appointments. User can also write and read reviews of salons and particular stylists. salons can specifysty lists that work at there salons, as well as services they offer. salon can also book appointment for customers, and can view and print schedules in convenient formats. . User can also write and reviews about the salon or stylist. This system helps both the customer and the salon. Customer can easily find best salon in their locality and can check the review of other customer of that salon online. It helps him to take decision of taking the services of a particular salon.

Classification and Prediction of Diseases with Similar Symptoms
Authors:- Dr. Archana Ajit Chaugule(Project Guide), Shrutika Sarawade, Priyanka Dhondage, Sapna Burud, Sonali Gulimi

Abstract- The field of medicine is found to have a lot of information but unable to implement that information.This is due to lack of tools to discover the hidden information and development in them. By applying the machine learning algorithms and techniques, valuable knowledge can be extracted from the health care system Malaria and Dengue have group of condition affecting the structure and functions of the body and has many root causes. We are using Deep Learning algorithm to increase the accuracy of Malaria and Dengue Disease Prediction System. It is implemented as desktop application in which user submits the heterogeneous data like text and image of blood cell symptoms. It results in hidden data from stored database and deep learning models are used to compare these user values with our trained model.

Website Development of Restaurant Management
Authors:- Prof. Jadhav A.K, Nupur Ligade, Renuka Savale, Malay Chitodkar, Rushikesh Salve

Abstract- The Restaurant Management website provide convince for the customer. The restaurant management system is there to help communication between all teams within a restaurant by minimizing the probability of human error and getting a more efficient and effective information. This System set up menu online and the customers easily places the order with a simple mouse click. By using the food menu online anyone can easily track the orders, maintain customer’s database and improve food delivery service.

Risk Management System for Stock Market
Authors:- Amey More, Tejas Warishe, Prof D.M.Bavkar, Abhay Mehta

Abstract- A sound risk management system is integral to an efficient clearing and settlement system. NSE introduced for the first time in India, risk containment measures that were common internationally but were absent from the Indian securities markets. Risk containment measures include capital adequacy requirements of members, monitoring of member performance and track record, stringent margin requirements, position limits based on capital, online monitoring of member positions and automatic disablement from trading when limits are breached, etc. Risk Management for Derivative products is managed with Standard Portfolio Analysis of Risk (SPAN)® is a highly sophisticated, value-at-risk methodology that calculates performance bond/margin requirements by analyzing the “what-if’s” of virtually any market scenario. SPAN ® is a registered trademark of the Chicago Mercantile Exchange, used herein under License. The Chicago Mercantile Exchange assumes no liability in connection with the use of SPAN by any person or entity.

A Review on Automated Attendance Management Systems
Authors:-Abhijith M.S, Christy Jojy

Abstract- Effective attendance management has become a major challenge in academic institutions as it is difficult to mark the attendance of the students especially when the class is very large and time is of great essence. Most of the Smart Attendance Systems keep the authentic record of every registered student and destroys the traditional tedious task that has been implemented. However, such systems still have issues that allow the research to increase multiple folds. This paper brings a literature survey on the related and currently existing works and also proposes a new idea on automated attendance management system using face recognition and RFID which handles the attendance process more precisely and efficiently.

Smart Multifunction Agriculture Robot Powered by Solar with Solar Tracking System
Authors:- Ankita Bhimgade, Prof. Hitesh Murkute, Prof. Yogesh Likhar, Prof. R. M. Bhombe (HOD)

Abstract- Smart multifunctional agriculture robot is designed to reduce efforts of the farmer. This robot perform various agriculture activities like ploughing, seed sowing, mud leveling and water spraying at a time. This robot is powered by solar so the cost of fuel will be reduced. This robot has solar tracking system which helps to use maximum solar energy from sun. This robot required less man power because it can operate using mobile Bluetooth by single person. This robot reduces overall cost for farming and increase productivity.

Virtual Voting System
Authors:- Asst. Prof. Gaurav Kumar, Divya Agarwal, Astha Tiwari, Smriti Gupta

Abstract- Indian voting system plays a vital role in Indian Democracy. The existing system is offline and has certain disadvantages. In recent years, the spread of covid-19, inefficient rural voters, people away from their birthplaces, paper waste affecting mother nature, the budget which could have been used for development, unseen frauds, wastage of human power, have been recorded and can be avoided by the virtual voting system.The main approach is to supply an easy and secure electoral system in India.

A Review on Automated Attendance Management Systems
Authors:- Abhijith M.S, Christy Jojy

Abstract- Effective attendance management has become a major challenge in academic institutions as it is difficult to mark the attendance of the students especially when the class is very large and time is of great essence. Most of the Smart Attendance Systems keep the authentic record of every registered student and destroys the traditional tedious task that has been implemented. However, such systems still have issues that allow the research to increase multiple folds. This paper brings a literature survey on the related and currently existing works and also proposes a new idea on automated attendance management system using face recognition and RFID which handles the attendance process more precisely and efficiently.

Election System using Block Chain Technology
Authors:- Mayur Chaudhari, Prof. Dinesh Patil (HOD)

Abstract- Voting is an integral part of any organization which helps organizations to take important decisions after taking a consensus from others and help implement any idea/decision in a procedural manner. This system is an online voting system based on blockchain technology. In view of the problems of malicious voting, data security, privacy leakage and so on in the current online voting system, the system can guarantee the fairness, openness, verifiability and non-tampering of voting data in the voting system by combining the decentrization of blockchain technology, the non-tampering of data and the anonymity of the voting system. Users can use the system to create voting projects, set voting time, register to vote and other operations, the system also provides the voting data traceability verifiable function, designed to build a more efficient and safe voting environment for users.

Building Cooling by Using Phase Change Materials for Human Comfort
Authors:- Prasad M. Sawant,Pruthviraj B. Patil, Rushikesh R. Patil,Shahidhusain R. Narwade, Abhishek A. Kurade, Mr. Avesahemad S.N. Husainy

Abstract- It is well acknowledged that technologies to achieve thermal comfort in buildings while cooling and heating demand are required. Thus, for the internal cooling and heating of building. One of the advanced technologies Thermal Energy Storage (TES) by using phase change material. The use of PCMs in building provides the potential for better indoor thermal comfort for resident due to the reduced indoor temperature fluctuations, and lower global energy consumption due to the load reduction/shifting. Building researcher need PCMs to better understand building temperature reaction features and the economic viability of utilizing PCMs, as well as to take additional steps to fully use PCMs to improve indoor environmental quality and overall building energy performance. This paper shares assessment TES in building using sensible, latent heat and thermochemical energy storage. Sustainable heating and cooling with TES in buildings can be achieved through passive system in building envelopes, Phase Change Material (PCM) in active system, sorption system, and seasonal storage.

Alcohol Detection and Vehicle Speed Controlling
Authors:- D. Shalini, R. Jhansi Bai, K. Pawan Kumar, I. Rajkumar, Asst. Prof. N. Aravind

Abstract- This is new approach towards automobiles safety and security to decrease the no of accident caused due to drunken drivers. by using a smart electronic system which monitors continuously the content of alcohol in air surrounding the body. Which makes the humans driving safer and to overcome accidents. This system implemented by us aims at reducing the road accidents in the future due to drunken drivers. Vehicle speed will be varied on the content of the alcohol detected. If the vehicle running at the high speed(100KMPH) medium speed (50-80KMPH) and low speed(40KMPH) which helps the driver to reach the destination safely. If the distance is between front vehicle the speed of the vehicle is reduced. In extreme situations the system disables the vehicle by switching of the ignition. The GPS captures the locations and sends the information to authorities with help of GSM. All the function in this project carried out by with help of ARDUINO UNO based on ATMEGA328P.

E-Commerce Portal: Grocery Delivery
Authors:- Asst. Prof. N.A. Ghodichor, Monali Vijay Ramteke, Yash Rameshwar Agrawal, Vipin Yadav, Vivek Shivprakash Raut, Suyash Shivshankar Ajbale, Mahadev Saren

Abstract- ShopWala is an E-commerce portal for purchasing groceries online. The main motive behind making such portal is to reduce the spread of covid-19 virus in the State. This E-commerce websites helps to control the mass gatherings at supermarkets , Using these websites, customers can buy goods or products online just by visiting the website and ordering the item online by making payments online. This E-commerce portal is open 24*7*365 so that customers can purchase the products any time according to their requirements. The proposed work will helps in building a website to buy, sell products or goods online using internet connection. The purchasing of goods online, user can choose different products based on categories, secure online payments, delivery services and hence covering the disadvantages of the existing system and making the buying easier and helping the vendors to reach wider market. In existing system of buying goods has several disadvantages. It requires lots of time to travel to the particular shop to buy the goods.

Production and Industrial Applications of Xylanase: A Review
Authors:- Deepanshi Tyagi, Dr. Divya Sharma

Abstract- The global population is increasing at a rapid rate, which results in high demand of life-supporting products. During the production of these life supporting products like textiles, paper and fibers etc. there is a generation of huge amounts of chemicals in the environment, which pollute the air. Therefore, industries around the world are looking for eco-friendly technologies for fulfilling the product demand without polluting environment and is economical to use. The use of enzymatic processes has been implanted in a broad range of industries in recent decades, because they are specific, fast in action, save raw materials, energy and chemicals as compared to conventional processes. In recent years, microbial enzymes have been used commercially in many industries such as pulp and paper, food, textile and feed industry. Xylanase was produced from different microorganisms such as fungi, bacteria. Xylanase enzyme has been utilised in getting enhanced sugar extraction from fruit juices, clarification of fruit juices and substantial dough-raising in bakery industries. This review is focusing on the properties of xylan, production of xylanase enzyme, mechanism of action and applications in different fields. So, the aim of this review here is to explore the applications of xylanase enzymes at different industrial levels.

Driver Drowsiness Detection System for Vehicles
Authors:- Aditya Chadde, Sunil Bhagat, Saurabh Chikankar, Prashik Kamble, Sankalp Moharle, Preetee Karmore, Nutan Sonwane

Abstract- The main reason for motor vehicular accidents is the driver drowsiness. This work shows a surveillance system developed to detect and alert the vehicle driver about the presence of drowsiness. It is used a smartphone like small computer with a mobile application using Android operating system to implement the Human Computer Interaction System. For the detection of drowsiness, the most relevant visual indicators that reflect the driver’s condition are the behavior of the eyes, the lateral and frontal assent of the head and the yawn. The system works adequately under natural lighting conditions and no matter the use of driver accessories like glasses, hearing aids or a cap. Due to a large number of traffic accidents when driver has fallen asleep this proposal was developed in order to prevent them by providing a non- invasive system, easy to use and without the necessity of purchasing specialized devices. The method gets 93.37% of drowsiness detections.

Design and Simulation of VTOL Stealth Bomber Controlled by Artificial Intelligence
Authors:- Shashank Sundar

Abstract- This project aims to design, engineer and test a new variant of vertical take-off and landing aircrafts. The implementation of a new design of VTOL engine and supporting machinery in a stealth bomber along with transfer of control from user to artificial intelligence using neural networks and AI processors. The project aims to close the gap between machine learning and aviation system along with providing a new strain of stealth aircrafts for modern combat operations. The use of SolidWorks to design the aircraft and Ansys simulation for the testing provided with valuable results that would prove successful in real time application and practice.

Zero Energy Building & Magnetic Levitation
Authors:- Khan Mujahid Ahmed Abdul Quddus, Shaikh Khalid Rabbani, Salmani Abdul Rehman, Shaikh Huzaifa Khurshid, Associate Prof. Avinash More, Asst. Prof. Suresh Suryavanshi

Abstract- Our aim of paper is to compile the information regarding research of magnetic levitation technology in civil engineering sector and to bring environmental sustainability by means of renewable energy sources. We are trying to introduce a new concept of magnetic levitation to make structure earthquake resistant. Levitation is a magnetic phenomenon resulted when two same poles are introduced to each other. Maglev or magnetic levitation is an innovative technology that can simultaneously guide, propel and suspend a train using the magnetic force between a guide way and the electromagnets in the train, similarly a powerful electromagnet creating large magnetic field which will be able to lift entire superstructure and act as substructure indirectly. In addition to this we are trying to make the premises eco-friendly by using renewable energy resources to meet the energy requirements of the structure. Zero-energy building is a building with zero net energy consumption meaning the total amount of energy used by the building on an annual basis is equal to the amount of renewable energy created on the site or in other definitions by renewable energy sources off site. We are using solar wind and hydro energy to make the structure environment friendly.

Recyclable Wastage Classifier
Authors:- Asst. Prof. Monica Batra, Mayank Gupta, Naman Jindal, Riya

Abstract- Detecting fault cable system proposes fault location model for underground power cable using microcontroller. Fault location models are to determine the distance of underground cable fault from base station in kilometers. This project uses the simple concept of ohm’s law. When any fault like short circuit occurs, voltage drop will vary depending on the length of fault in cable, since the current varies. A set of resistors are therefore used to represent the cable and a dc voltage is fed at one end and the fault is detected by detecting the change in voltage using a analog to voltage converter and a microcontroller is used to make the necessary calculations so that the fault distance is displayed on the LCD display.

Efficient Approach for Palm Line Extraction and Matching for Personal Authentication
Authors:- M.Tech. Scholar Awantika Belwanshi, Asst. Prof. Shailesh Khaparkar

Abstract- Palm print recognition has been reconnoitered over numerous years. During this instance of time, several different glitches related to palm print recognition have been addressed. Furthermost of the studies has been done in palmprint recognition due to its stability, reliability and exclusivity. Furthermore it has been used for law enforcement, civil applications and access control applications. Researchers have proposed a variety of palmprint preprocessing, feature extraction and matching approaches. This paper deliberates about the number of investigation works introduced to overcome the difficulties confronted in each stage of palm print verification. Our study on palm print recognition focuses on verifying the palm print in different types of schemes involved. In this thesis, we projected a novel framework to execute multi biometrics by broadly combining the left and right palmprint images. This framework integrated three kinds of scores generate from the left and right palmprint images to perform matching score-level fusion.

Android APP for Online Examination and Results Systems
Authors:- Ms.Sneha P. Mhaiskey, Mayuri R. Thombare, Ms. Nirasha M. Patle, Ms. Kiran S. Gujarkar, Prof. Abhay Rewatkar

Abstract- The Online Examination System is a software that allows any institute or sector to arrange, administer, and monitor examination via the internet. This is achievable under Internet/Local Area Network (LAN) conditions. It’s possible. Delays in result processing, arranging problems, and keeping records are some of the concerns that can arise during physical examination systems. It’s difficult to avoid bad record management and manual record searching. The system’s upkeep is also difficult, time-consuming, and exhausting. One of the most important aspects of an online education system is the online test. It is well organized, efficient, and saves a significant quantity of material resources. On the web, a testing system has evolved. The paper explains the system’s principle, shows the system’s primary functions, and explores the system’s security.

Review on Secured and Automated Healthcare System
Authors:- J Jenitta, Arun M, Balakrishna J, Sangeetha D, Vijay G

Abstract- Diseases are one of the biggest challenges for developing countries. Due to the growth in population, providing health-care services is becoming difficult day by day, especially in rural areas. The problem also lies in updating doctors of the monitoring parameters and the history of patients from time to time. The use of remote healthcare technology may reduce most of the management of chronic diseases, meanwhile it may also contribute to the improvement of people’s quality of life. Healthcare monitoring systems, by using low cost wireless sensors and existing Internet of things technology as a communication platform, alerts the doctors if a patient is in need of medical attention or hospitalization. The Internet of things is being applied in healthcare.The physiological parameters of the patients like Pulse rate , heart beat, body temperature, humidity are sent to doctors for monitoring and based on doctors advice the medicines will be automatically given to the patients who are away from doctors which is connected to a physician server or medical server through the internet. This paper gives a review about the various technologies used in remote health monitoring systems.

Modular Multilevel DC/DC Power Converter for High Voltage DC-Connected Wind Energy Applications
Authors:-M. Tech. Scholar Mohini Rangari, Prof. R. M. Bhombe, Prof. Yogesh Likhar

Abstract- In this project, a multilevel modular DC/DC conversion system based on the capacitor-clamped module is explained. This project explores the application of modular multi-level converters (MMC) as a means for harnessing the power from wind power plants. The MMC consists of a large number of simple voltage sourced converter (VSC) sub¬ modules that can be easily assembled into a converter for high-voltage and high power. DC/DC power conversion solutions are becoming more popular for fulfilling the growing challenges in the high voltage DC-connected wind power industry. Two types of the capacitor-clamped modules, the double-switch module and switchless module, are discussed. A soft-switching technique is adopted to achieve minimal switching losses and the maximum system efficiency. The inherent interleaving property of the proposed configurations effectively reduces the output voltage ripple without adding extra components. A cascaded hybrid topology is developed by the combination of double-switch and switchless modules. The proposed hybrid topology achieves higher efficiency and lower component count. This project is implemented by using Matlab / simulation.

Glance on Food Security, Food Safety and Sustainability in Agriculture and Livelihoods (Asia Region)
Authors:- Snehal P Hulikire, Gouri B Shinde, Riya V Patil, Mr. Avesahemad S N Husainy

Abstract- COVID-19 pandemic has substandard consequences across the world and has put on the spotlight the existing discrepancy in the security and sustainability within our food and agriculture system. So the COVID-19 crises has deeply increased already existing inequalities and created massive vulnerabilities in the livelihoods. Food is basic necessity and agriculture is backbone of economy in order to that food security is the most important and significant aspect of sustainable and progressive development and also agriculture field is able to provide livelihoods to people in Vulnerable and developing countries. Asia consists of some of the most food insecure countries in the world and it has drawn considerable affection to food movement .And it is generating crucial challenges between the rebalance of scarcity and availability. Because of this it is created large environmental hazards as there was tragic waste of food when many were going hungry. So the supply chain should be flexible enough to adjust the spike rate of demand and supply. The purpose of this review is to assess the impact of COVID-19 on food, agriculture and livelihood and improve the security and sustainability in it.

Online Healthcare System
Authors:- Ninad Verulkar, Sushil patil, Varsha Rahangdale, Komal Vaidya

Abstract- This paper implements an android based mobile app for online medicine shopping. This mobile app is developed to facilitate online medicine purchase by verifying the prescription uploaded by the user and to confirm the order. This system includes mobile application interfaces, pharmacist interface, database, web service provider for intermediate process to provide service through android mobile phone. When the user wants to make purchase through mobile app, necessary to upload the authorized prescription from a doctor and the prescription will be stored in the database. Then the user precedes the process by giving medicine name in the mobile application Whatapp interface. When the medicine is available in the pharmacy, the user allowed to add the medicine in the cart list, if the medicine is not available in the pharmacy, the mobile app will hold the process for the pharmacist response to post a suggestion and get confirmation for providing equivalent brand of medicine. The prescription uploaded by the user is compared with the cart list and will be approved by the pharmacist before placing the order. The domain of this system is android application. The n-gram technique is used in this system to speed up the searching process by the user typing medicine name in the user application interface. The drawback of existing system is online shopping or android apps are not user friendly. The proposed mobile app is user friendly by implementing the Bot Builder Framework for online medicine shopping.

A Carrier-based Discontinuous PWM Method with Varying Clamped Area for Vienna Rectifier
Authors:- Prof. Sonali Dhurvey, Jyoti Jiwtode, Sanika Nagarare, Ankita Bhurse, Manthan Bamnote, Alkesh Kadu, Ashish Madavi, Vishal Chalakh,

Abstract- Conventional single-phase Vienna rectifiers employ proportional- integral (PI) controllers which are appropriate for controlling DC components, to regulate their line currents. However, in the regions close to the line current’s zero-crossing point, the dynamics of PI controllers are too slow to respond to the reference current, which has an AC component. Hence, the power factor (PF) of the device is degenerated, and total harmonic distortion (THD) increases. A controller with a fast dynamic response is thus required to solve this problem. In this paper, we investigate the use of a model-based predictive controller (MPC), which has a faster dynamic response than a PI controller, to improve the line current quality of a single-phase Vienna rectifier.

Solar Based Dstatcom Using Srf and Irp Control Theory
Authors:- M. Tech. Scholar Adesh Dandi, Prof. R.M.Bhombe, Prof. Yogesh likhar

Abstract- In modern eras increasing in use nonlinear load or power electronics load to satisfied the need of todays industry such as adjustable speed drives, office accessories, Synchronous motor drive, Variable Frequency drive Energy efficient lighting etc . but such types of load is create harmonics in the system which flow from load to source and it will harmful to equipment connected to the system so there need to compensate such type of problems already there are various devices available to solve and eliminate such type of problem but every devices having some advantages and drawback. In proposed system use shunt connected based DSTATCOM. In this project, a three phase three wire Distribution Static Compensator (DSTATCOM) is proposed for power quality improvement. There are traditional methods available to Control DSTATCOM such as Single pulse width Modulation, SPWM, SVPWM. In proposed project result analyses by using SRF and IRP controller the result observed in MATLAB Simulink.

A Review on IOT Based Water Irrigation And Farm Protection using Arduino
Authors:- Ajay Prakash, Rahul Kumar, Prabhat Kumar Singh, Ankit Singh, Asst. Prof. Shahab Ahmed, Asst. Prof. Abhishek Jain

Abstract- This paper portray mechanized water system framework which is configuration to use for agribusiness harvests and checking the dirt condition through soil dampness locator. This framework depends on IOT (Internet of things) since it is minimal expense in market, with the goal that Rancher will be competent for it. The IOT (Internet of things) is associated with rancher’s cell phone and Arduino (microcontroller) through the remote organization with assistance of wi-fi module. This model is fundamentally plan for checking the dirt water and shielding the field of from the light radiated by AC loads and light pillar fall on LDR. IOT (Internet of things) give the data about rancher field and soil dampness. The utilization of IOT for crop water system interaction will lessen the works strength and cost. Which control the progression of water.To satisfy the prerequisite of food, agribusiness ranch , it need fix measure of water for water system. Subsequently there is a need of keen water system framework which checking and controlling the measure of water to the fields. The sensors are utilized in the framework are soil dampness indicator and LDR which record the ongoing valve of actual boundary and send the information to microcontroller which is shown on it just as remote sent. In this framework rancher don’t needed the actual presence on the field. The field and water system measure are controlled and observed through the telephone through the IOT (internet of things).

File Tracking System
Authors:- Akshat Joshi, Aman Khandelwal, Ansh Vijay, Devansh Kumar Rathore, Ms. Garima Sharma

Abstract- File Tracking Systems is software that facilitates the process of file movement and tracking within an organization. In government and public organizations, every official procedure is carried out by moving files. When a file is moved, an entry is made in the office diary for record keeping. Comments are added in file to indicate the action to be taken and then file is moved further if required. Sometime the process may take number of days and if entry in the diary is missing then it becomes hard to search the file. To overcome this problem we have developed a system with the help of QR Scanner to monitor all file movements of every employee through which the concerned person can get timely information about the whole process. The point of the whole system is to make processes simpler, efficient and accountable by eliminating every scope of corruption, incompetence and making the whole system transparent to the highest degree.

Natural language Text to SQL Queries using ML
Authors:- Raja Mishra, Nishant Singh, Prof. Bhagyashree Patle, Rutkar Verma, Rushikesh Tokmurke

Abstract- Our focus is cross-domain context-dependent text-to-SQL generation task. Adjacent natural language questions are often linguistically dependent and their corresponding SQL queries tend to overlap, by editing the previously predicted query we utilize the interaction history to improve the generation quality. we employ an utterance-table encoder to affect complex table structures in several domains and a tableware decoder to include the context of the user utterance and therefore the table schema. We evaluate our viewpoint on the SParC dataset and signify the advantage of editing compared with the state-of-the-art baselines. We present simple techniques to leverage the table content to unravel the text-to-SQL problem for the BERT-based model. Based on the observation that a number of the table content and table header match some word in the question string, we encode an addition feature vector for a deep model. During testing our methods are beneficial for model inference because the tables are more or less the same in testing and training time. We assess our model on the wikiSQL dataset and outperform the BERT-based baseline by 3.7% in execution accuracy and three .7% in logic form and acquire state-of-the-art.

Survey Paper on Edge Computing
Authors:- Shashank Sharma, Anurag Punde, Nidhi Agrawal, Deepak Agrawal

Abstract- By utilizing cloud computing engineering and administrations to do concentrated calculation, particularly when Internet of Things (IoT) situations need to respond from experiences came about because of that calculation back to end gadgets, at that point we run into real restrictions of transfer speed blockage and the came about high dormancy. Edge Computing come to presence with various executions to steadily eliminate these hindrances on restrictions. A few approaches have been created in equal by various substances, similar to investigate gatherings, industry, administrators, and normalization associations. Haze registering, Multi-access (Versatile) Edge Computing, cloudlets, and so forth, are applicable models, remembered for the enormous class of Edge figuring. Their structures and advancements have numerous fundamental normal qualities, yet additionally contrasts in approach. A whiz question is raised – if any critical union will arise soon. This paper isn’t expected to be a finished study, however it endeavors to distinguish some intermingling architecture and some case studies related to edge computing.

A Review: Screening of Cellulase Enzyme And Their Applications
Authors:- Shiv Kumar, Anshika Sharma, Dr. Divya Sharma

Abstract- Cellulose is one of the most common polymers in nature. It exists almost exclusively in cotton fibers, and is combined with other materials (such as lignin and hemicellulose, wood, leaves and plant stems) in textiles and detergents. Medium cellulose is a long chain polymer composed of self-repeating glucose units, a monosaccharide, connected by β-1,4-glycosidic bonds. Cellulase causes the hydrolysis of individual cellulose fibers in order to break them down into smaller sugar units and ultimately produce glucose molecules.The production conditions of cellulase and bacteria to produce cellulase are optimized through variable factors. Various production conditions, such as carbon source, nitrogen source, pH, temperature, incubation temperature and seed size. Here, we mentioned different types of microorganisms that can produce cellulase under optimal conditions. In today’s world, this makes them more popular because industrial enzymes play a wide-ranging role in the commercial market, and we need to focus on additional research on their manufacturing.These substrates are sold every year and are environmentally friendly. The above methods are very useful for the production of cellulase because they reduce the problem of handling such agricultural waste. These substrates are more efficiently consumed by potential strains such as microorganisms, plants, etc. to produce cellulase. In this review, we try to explore the most effective source of cellulase production, both in terms of performance and quality.

Devising Communication strategies for Retaining Employees
Authors:- Moheb Faltas, MS

Abstract- The research will reflect numerous reasons as to why the employees leave the organization by considering not just past observations but also the observations from the recent times. A massive amount of data is available which reflects on the reasons behind the lack of employees’ retention. As we are entering into the advanced era; retention has always been a key factor, which is rapidly growing and making it more challenging for the organizations to facilitate and retain their employees. Employees’ retention is one of the crucial challenging factors which the workplaces are being faced by, as quitting of just a single employee lasts a massive negative impact over the organization, causing it not just to lose a skilled employee but also to start a new recruitment process for that one position, which tends to incur massive cost for job advertisement etc. So, the organizations must have first-hand knowledge of the factors that contribute to retaining the talented and skilled employees and enabling the organizations to be cost effective by not undergoing frequent recruitment procedures.

Small Scale Lunar Rover for Geographical Research/Survey
Authors:- Asst. Prof. Ms. Tanvi Rastagi, Md. Aftab Qadri, Piyush Shukla

Abstract- This paper deals with designing, building, and testing the Small scale Lunar Rover for geographical research and survey. This Lunar Rover is designed as keeping the focus on the problems faced by the geographical researcher and surveyor. This Rover is designed with simple and easy-to-understand technical methods. This rover is very lightweight so it can be carried by a 10 years old child and can be maintained easily by having minimum knowledge of robotics. It can measure the temperature of the surrounding area, it works on a wireless network therefore it can be controlled from a specific distance. It also provides live video feedback through an open channel on the network. So the research can take live reading and measurements of the particular area. This rover also has a grappling feature that is very important in research as the researcher must want to have some sample of the researching area. Through this feature, it can bring back samples to the researcher.

Reduction of Spring Back For Stainless Steel Sheet under Various Lubrication Mediums/Survey
Authors:- Archana Yadav, Prof. Anil Kumar, Subhash Kumar

Abstract- The Spring back occurs due to elastic recovery after removal of load in sheet metal forming. In certain cases of bending, the final angle is smaller than the original die angle and it is called the negative spring back. Similarly the final angle may be more than the original die angle and it is called the positive spring back. In sheet metal forming, there are many factors that affect the spring back. These are punch velocity, punch shape, sheet thickness, anisotropy and friction conditions etc. In the present work, three factors viz. Punch velocity, anisotropy (orientation with the rolling direction) and friction between punch and die set have been considered at three levels. The combination of these factors that gives the minimum spring back is predicted in V-die bending of stainless steel sheet. The full factorial experiments have been performed and ANOVA has been carried out using Minitab 14. The results show that medium punch velocity and 〖45〗^0orientation to rolling direction along with use of machine oil give the least spring back.

To Design a Flyover for Katraj Chowk
Authors:- Mahesh Kadam, Rohit Jadhav, Jayant Marne, Shubham Bhati, Juee Athalye

Abstract- In this paper, we aim to analyze and design a T-girder bridge by using the theory of structure, bridge Engineering, and foundation engineering. Theories of foundation engineering for sub-structure and theories of bridge engineering and live loading recommended by IRC forms the base of our design. The knowledge of foundation engineering, Influence lines, and Theory of structures are essential for the analysis and design of this project. IRC and IS code guidelines were preferred for the design purpose. The superstructure (RC slab, T-beam girder and cross girder) and sub-structure (RCC abutment and pier) components have been designed using a working state of design method under class AA, 70R and class A loading as prescribed by IRC. The courbons method was used in analysis of the slab. The limit state method of design was used for the design of pier shafts. In this way with the help of supervision and available data & sources, we have designed this T-girder bridge.

High Quality of Gaussian and Salt & Pepper Noise Remove from MRI Image using Modified Median Filter
Authors:- M.Tech. Scholar Anamika Shukla, Prof. Pankaj Sharma

Abstract- Images are often corrupted by impulse noise in the procedures of image acquisition and transmission. in this paper, we propose an efficient denoising scheme and its vlsi architecture for the removal of random-valued impulse noise. to achieve the goal of low cost, low-complexity vlsi architecture is proposed. we employ a decision-tree-based impulse noise detector to detect the noisy pixels, and an edge-preserving filter to reconstruct the intensity values of noisy pixels. furthermore, an adaptive technology is used to enhance the effects of removal of impulse noise. in an advanced imaging technique magnetic resonance imaging (mri) plays a major role in medical field to create high standard images contained in the human brain. mri imaging is often used when treating brain, prostate cancers, ankle and foot. noise elimination is the main constraint in digital image processing and sometimes it is very difficult to find out the origin of the noise.

Validation & Analysis of Injection Moulding Processparameters for Plastic Industry
Authors:- M.Tech. Student Naveen Kumar, Prof. Dr. S. M. Husain

Abstract- In the early days manufacturers came to us for a specific thermoformed or injection molded part or parts for a product they were making. Over the years we noticed that, more and more, they were coming to us for entire subassemblies and more complex parts that might incorporate both thermoformed and injection molded parts.Based on that experience, and our knowledge of the pressures that manufacturers are under to increase efficiency and reduce cost, it became obvious to us that we needed to provide a wider array of services to help our customers increase their efficiencies, reduce their overall costs and maximize their ROI on each project, part or component. This vision has lead us to add assembly, decorating (in and post mold), reusable packaging, RFID and much more to our capabilities.We believe that Lower Overall Customer Cost comes from an innovative, total solution made up of customer focused, operational excellence. By combining quality production and secondary services with design expertise, supply chain management, and world class logistics WPS has been able to help our customers find new ways to lower their costs and improve profitability. Injection molding has been a challenging process for many manufacturers and researchers to produce products meeting requirements at the lowest cost. Faced with global competition in injection molding industry, using the trial and error approach to determine the process parameters for injection molding is no longer good enough. Factors that affect the quality of a molded part can be classified into four categories: part design, mold design, machine performance and processing conditions. The part and mold design are assumed as established and fixed. During production, quality characteristics may deviate due to drifting or shifting of processing conditions caused by machine wear, environmental change or operator fatigue.Determining optimal process parameter settings critically influences productivity, quality, and cost of production in the plastic injection molding (PIM) industry. Previously, production engineers used either trial-and-error method or Taguchi’s parameter design method to determine optimal process parameter settings for PIM. This paper aims to review the recent research in designing and determining process parameters of injection molding. A number of research works based on various approaches have been performed in the domain of the parameter setting for injection molding. These approaches, including mathematical models, Taguchi method, Artificial Neural Networks (ANN),Fuzzy logic, Case Based Reasoning (CBR), Genetic Algorithms (GA), Finite Element Method(FEM),Non Linear Modeling, Response Surface Methodology, Linear Regression Analysis ,Grey Rational Analysis and Principle Component Analysis (PCA) are described in this article. The strength and the weakness of individual approaches are discussed. It is then followed by conclusions and discussions of the potential research in determining process parameters for injection molding.

A Survey on Automatic Multiple Choice Questions Generation from Text
Authors:- Ms. Nikeeta Patil, Ms. Kratika Kumari, Mr. Devendra Ingale, Ms. Pranali Patil, Mr. A. R. Uttarkar

Abstract- NLP is an area of exploration where many researchers have presented their work and is still an area under exploration to achieve higher correctness. We are going to use NLP for an automatic question generation system. As in any education system, the examination is conducted to judge the caliber of the students. So to conduct the examination, the educator needs to generate the questions manually which is a very time-consuming process, so we have decided to develop a system through which automatically multiple-choice questions will be generated within some time and human efforts will be reduced. In this paper, we consider the Automatic Question Generation system that generates multiple-choice questions. To generate multiple-choice questions, the system uses various NLP techniques. This paper presents a review of work to generate questions automatically from the inputted text.

Automatic Multiple Choice Questions Generation from Text
Authors:- Ms. Pranali Patil, Ms. Nikeeta Patil, Ms. Kratika Kumari, Mr. Devendra Ingale, Asst. Prof. Mr. A. R. Uttarkar

Abstract- Assessments and Examinations are going through a huge insurgency. Colleges, universities, and other instructive establishments are progressively moving towards on the web assessments. The example of appraisal is significantly moving towards the target evaluation for example MCQ based, it is hard to build and requires a lot of time for setting various inquiries. There’s a developing requirement for a cost-effective and time-effective computerized MCQ generation framework. In this paper, the content is first summed up utilizing the BERT calculation, and appropriately sentence planning is accomplished for creating MCQs. To create decisions for the questions, distractors are created utilizing WordNet (A lexical data set for English). As the BERT calculation has much better execution over other inheritance strategies also as it can measure a lot of information in less time, it will upgrade the speed of producing MCQs from given content.

A Review on Enhancement of a Grid Connected Wind Farm using STATCOM and PID Controller Based Stability
Authors:- M. Tech. Scholar Shubham Saxena, Asst. Prof. Dheeraj Gupta

Abstract-The development of the modern power system has led to an increasing complexity in the study of power system, and also presents new challenges to power system stability, and in particular, to the aspects of transient stability. Transient stability control plays a significant role in ensuring the stable operation of power systems in the event of large disturbances and faults, and is thus a significant area of research. Flexible AC transmission system (FACTS) devices can be a solution to these problems. They are able to provide rapid active and reactive power compensations to power systems, and therefore can be used to provide voltage support and power flow control, better transient stability and improve power oscillation damping. Suitably located FACTS devices allow more efficient utilization of existing transmission networks. Among the FACTS family, the shunt FACTS devices such as the static synchronous compensator (STATCOM) has been widely used to provide smooth and rapid, steady state and transient voltage control at points in the network Maintaining voltage and frequency ride-through requirements is essential in providing adequate voltage support and dynamic reactive power compensation. Wind turbines have to sustain voltage sags during grid faults by increasing reactive power compensation. The low voltage ride through (LVRT) or faults ride-through (FRT) is defined as the ability of wind energy converters to remain connected during faults on power system . The matlab simulation outcome demonstrates the overall implementation of wind farm by using just capacitor bank and using STATCOM or using STATCOM along with PID controller. Comparison of result shows that STATCOM with PID controller offers better performance.

Touchless Sanitizer Dispenser
Authors:- Dr Y. B. Gurav, Tejas Giri, Nupur Karve, Ifrah Ansari, Atish Oswal

Abstract-A programmed hand sanitizer apportioning machine is mechanized, non-contact, liquor-based hand sanitizer gadget, which discovers it’s utilization in clinics, work places, workplaces, schools and significantly more. Liquor is essentially a dissolvable, and furthermore a generally excellent sanitizer when contrasted with fluid cleanser or strong cleanser, likewise it needn’t bother with water to wash off since it is unpredictable furthermore, disintegrates in a split second after application to hands. It is too demonstrated that a convergence of >70% liquor can execute Covid in hands. Here, we have used IR sensor detects the hand put close to it, the Arduino Uno is utilized as a microcontroller, which detects the distance and the outcome is the pump starts running out the hand sanitizer.

Steady State Thermal Analysis of IC Engine Piston Head Surface Using Ansys Workbench
Authors:- Azeem Khan, Asst. Prof. Amit Sharma

Abstract-The goal of this research is to optimize stress changes on the upper surface of the piston under real-world engine conditions. Thermal behaviour testing on the piston surface is carried out in this research. Gas pressure, temperature, and piston material functions are among the functions used for study. According to studies, the damaged or not damaged top surface of the piston is extremely costly to repair and is not usually accessible owing to temperature. Convex and capital ANSYS 14.0, created in Solid Work 2016, piston profile for piston form and FEM studies for improving the piston’s heat behaviour. The piston is made of aluminium alloy and grey iron cast material. Pressure is used in structural analysis to assess the piston’s pressure and displacement. We can evaluate whether or not our suggested piston is safe under the load conditions by following the study’s results. Thermal flux and thermal temperature distribution are calculated using temperatures on the piston surface an examination of the heat.

Analysis of Pre-Processing Techniques in Retinal Images
Authors:- Asst. Prof. S.Bharathi

Abstract- In this paper various preprocessing techniques that can be applied on retinal images to enhance the performance of segmentation is discussed. Vessel extraction is required to judge how badly the person is affected due to hypertension, diabeties etc.the retinal images can be obtained from drive, stare, chase through internet . green channel extraction, border removal, filtering, contrast enhancement, morphological operations were carried out on retinal images during preprocessing phase. Preprocessed image can be used to generate features which are classified using supervised or unsupervised techniques. The preprocessing is carried out in matlab 13 version.

Fake News Classifier using Machine Learning & Natural Language Processing
Authors:- Satyam Rawat, Taukir Qureshi, Kundan Tormal, Sanket Pol, Prof. Gitimayee Sahu

Abstract-This Project comes up with the applications of NLP (Natural Language Processing) techniques for detecting the ‘fake news’, that is, misleading news stories that comes from the non-reputable sources. Only by building a model based on a count vectorizer (using word tallies) or a Term Frequency Inverse Document Frequency (TFIDF) matrix, (word tallies relative to how often they’re used in other articles in your dataset) can only get you so far. But these models do not consider the important qualities like word ordering and context. It is very possible that two articles that are similar in their word count will be completely different in their meaning. The main objective is to detect the fake news, which is a classic text classification problem with a straight forward proposition. It is needed to build a model that can differentiate between ‘Real’ news and ‘Fake’ news. The preprocessing is carried out in matlab 13 version.

A Review on Mango Leaf Diseases Identification Using Convolution Neural Network
Authors:- Research Scholar Purnima Batra Continue reading

Published by:
× How can I help you?