IJSRET » Blog Archives

Author Archives: vikaspatanker

Open Access Publication Fees

Uncategorized

The research journals which are open access (OA) generally has an advantage of not submitting accessing fees, as this is additional feature which is fully depend on the policies of journal. Open access is basically set of ideologies and practices which are spread through research work output free of cost or other access methods. There are varieties of open access journals in which open access publication fees is affects. This are categorized into colour naming system as follows:

Submit Research / Survey Paper

Paper Publication Charges

Gold OA: In this model, the publisher makes available all resources free of cost quickly without delay on the given journal website.

Green OA: This type of access is fully operated by the author that is the self-archiving which are controlled by author and the institute of journal or the host can download the work without paying.

Hybrid OA: as the name suggest it is combination of open and closed access journal. A publisher is funded for subscription and only have an access for individual article for which open access publication fees is paid.

Other than these naming model there also exist the black OA, diamond/platinum OA and bronze OA, but the above mentioned are mostly recognized. Research journals must not be time taking and lengthy legal procedures journals, as authors/students are in the hurry to published their manuscript and has busy scheduled also. So, choosing of ideal journal that helps them in their research publication with the less publishing fees is needed. The following are given some points that should be noted before selection of open access journal:

  • Publication that need to be paid must be clearly mentioned with every procedure that need to be followed that fees paid or not in such cases like pre-acceptance fees, approval fees, extra author fees, extra pages charges, charge per page if there is limit.
  • Open accessibility must be present for the journal which usually should be free or hybrid open access.
  • Journal must be legally authorized that is it has all legal procedure completed and has unique identity code. Along with at-least 3-4 years old.
  • Journal must have peer reviewed facility with no extra charges for the certificates and publishing time delays.
Published by:

IJSRET Volume 6 Issue 4, July-Aug-2020

Uncategorized

The Future of Urban Surveillance using IOT Based 4th Gen Parking Systems
Authors:- Valentine B

Abstract:-Vehicle parking occurs at the intersection of urban space system and mobile management. The first gen or era, or Parking 1.0, hardly had any service offerings except for a simple space-renting model that was managed and operated manually. Then Parking 2.0 offered electronic services such as parking meters that partially automated the fee collection and auditing systems. The present generation, Parking 3.0, provides basic automation that allows users to independently navigate the complete parking life cycle – from knowing the parking occupancy status to ticketing, parking, and fee settlement. In this we are focusing on an eco-friendly system called Automated Valet Parking along with Pollution based parking fees, wireless charging slots and parking lifts provides additional weightage to this system, which uses hybrid robotic valets in smart parking and helps optimizing parking space.

A Review on Support Vector Machine Based Classification of Alzheimer’s disease from Brain MRI
Authors:- M.Tech. Scholar Ekta yadav , Associate Prof. & Head Dr. Jitendra Singh Chauhan

Abstract:-Alzheimer’s disease (AD) is important source of dementia and can cause serious health or socio-economic problems. Alzheimer’s disease is a progressive neurodegenerative ailment that causes changes in brain structure that affect behavior, thought, mood, or memory. Various multivariate analysis algorithms have been used to classify AD to distinguish it from healthy controls (HC). Effective early classification of AD or mild cognitive impairment (MCI) caused by HC are imperative because early preventative care can help reduce the risk factors reported in Alzheimer’s disease. The loss of cognitive ability has only a minor impact on a person’s daily life. The middle stage is the middle stage of AD. In severe AD, a person can no longer operate individually but depends entirely on others for care. In this article, support vector machines SVM and CNN will be used to diagnose Alzheimer’s brain MRI or classify it into definite stages. The algorithm was trained or tested using MRI data from Alzheimer’s disease. The data used included MRI scans of ca. 300 AD patients and 20 regular controls. And evaluate a new automated technique based on support vector machine (SVM) which classifies whole brain anatomical magnetic resonance imaging to distinguish patients by Alzheimer’s disease (AD).

A Review on Heart Disease Prediction by Machine Learning Techniques
Authors:- M.Tech. Scholar Shivangi Agrawal, Asst. Prof. & Hod Ashish Tiwari

Abstract:-We discussing data mining healthcare generation based predicting human diseases in biomedical and healthcare communities, accurate analysis of medical data benefits early disease detection, patient care and community services. We propose a novel methodology for disease predictions in different machine learning algorithms using find the user behaviors.We streamline machine learning algorithms for effective prediction of chronic disease outbreak in disease-frequent communities. The Main focus of this process is to implement a simple, reliable and easily applicable deep learning technique for the classification of the selected two different cardiac categories conditions to the best of our knowledge, none of the existing work focused on both data types in the area of medical big data analytics. Finally finding user behaviour based on given dataset.

Real Time Video Fog Dehazer for Automobiles
Authors:- Nishal P A, Vaisakh Anil, Sivaprasad V B, Linnet Tomy

Abstract:-Drivers know to take it slow and keep their distance from other cars during snow, ice and rainstorms. When it comes to different types of inclement weather, fog often gets overlooked as a serious hazard.Fog is a large cloud of water droplets that forms when air comes in contact with the ground and then cools. This phenomenon is responsible for 38,000 crashes, 15,000 injuries and 600 fatalities every year. These clouds greatly decrease visibility, frequently in the morning and evening.Fog may distort your perception of speed, as you cannot see other objects moving in relation to your vehicle. Therefore traffic in foggy weather conditions is a very important issue and has been widely researched within the field of computer vision. A Video Dehazing software is introduced to counter these problems and thereby reduce the number of accidents. For the project previous image dehazing that are developed over the past decade are reviewed and analyzed. At first,the techniques are categorized into three categories: image enhancement based methods, image fusion based methods and image restoration based methods. Various quality evaluation methods are implemented to make sure the project is capable of removing haze or fog. Finally, extensive experiments determine the performance of proposed system.

A Review on Brain Tumour Classification Using Support Vector Machine and Principle Component Analysis
Authors:- M.Tech. Scholar Nisha Tomar, Asst. Prof. & Hod Ashish Tiwari

Abstract:-Over the years, the enlargement in medical image processing is mounting in a marvellous manner. The rate of increasing diseases through deference to a compilation of category of cancer and other related human problems paves the way for the development in biomedical research. Consequently processing and analyzing these medical images is of high consequence for clinical diagnosis. This work focus on the stage successful classification of brain tumour images and segmentation of brain tumour data set images formulate use of the proposed hybrid logical technique the face up to and objectives on be going to of attribute extraction, image classification and segmentation for medical images will be discussed. The experimental results of proposed technique will be evaluate and validated for presentation and advantage analysis on magnetic resonance brain images, based on accuracy, sensitivity, specificity demonstrating the effectiveness of the proposed method there will be SVM , classifiers Used for identify normal and abnormal tissues from brain MR images.

A Review on Person Recognition using Support Vector Machine and Local Binary Pattern
Authors:- M.Tech. Scholar Priyanka Bhate , Asst. Prof. & Hod Ashish Tiwari

Abstract:-This paper discusses the concept of speech recognition with deep learning methods. Introduction of speech recognition, deep learning and deep learning methods is discussed in this review paper. Models of deep learning that are used in speech recognition is also described in this paper. This paper defines the related work on speech recognition using deep learning methods and about the sphinx, software allow the implementation of speech recognition in java language. The main motive of this review is to define the use of sphinx and eclipse to recognize speech. we will proposed We proposed new technique for human identification using fusion of both face and speech which can substantially improve the rate of recognition as compared to the single biometric identification for security system development. Our system using Viola Jones Algorithm for face detection. The proposed system uses Local Binary Pattern (LBP) as feature extraction techniques which calculate the local features. The Extracted features given as input SVM classifier to used to recognize the person and then display the result. This new system can be applied in various different fields such as identity verification and other potential commercial applications.

Genome Sequencing and Analysis of Cancer Codons
Authors:-Shailesh.D, Anooja Ali, Vishwanath R Hulipalled, Harshitha KB, Swetha Sivakumar, Manjunath C

Abstract:-Genome sequencing helps to identify the variation in genomic structure or to detect the new genomic sequences over the population. This sequence alignment detects the preserved interactome unit among organism. It evaluates the phylogenetic distance among organism of same species or different species and thereby detecting the functional domains, polymorphisms, and mutations. Sequence alignment is the arrangement of the sequences of deoxyribonucleic acid (DNA), ribonucleic acid (RNA) or macromolecule to spot regions of similarity which will be a consequence of practical, structural or organic process relationships between the sequences. In this paper, we detect mutation and the presence of cancer codon using pattern matching and sequence alignment. The sequences are preprocessed using Boyer Moore and k-mer indexing algorithms. Mutations present in the sequence is detected with local and global alignment with Naive approximation. Gene sequencing helps to understand and evaluate the genomic characteristics of an organism at a lesser cost and with great coverage.

A Review on Brain Tumor Segmentation and Classification Using Machine Learning Technique
Authors:- M.Tech. Scholar Nayan Pure , Assistant Professor & Head Ashish Tiwari

Abstract:-The successful early diagnosis of brain tumors plays a major role in improving the treatment outcomes and thus improving patient survival. Manually evaluating the numerous magnetic resonance imaging (MRI) images produced routinely in the clinic is a difficult process. Thus, there is a crucial need for computer-aided methods with better accuracy for early tumor diagnosis. Computer-aided brain tumor diagnosis from MRI images consists of tumor detection, segmentation, and classification processes. Over the past few years, many studies have focused on traditional or classical machine learning techniques for brain tumor diagnosis. Recently, interest has developed in using deep learning techniques for diagnosing brain tumors with better accuracy and robustness. these detection and segmentation approaches are reviewed with an importance placed on enlightening the advantages and drawbacks of these methods for brain tumor detection and segmentation. The use of MRI image detection and segmentation in different procedures are also described. Here a brief review of different segmentation for detection of brain tumor from MRI of brain has been discussed.

A Review on Energy Efficient Sensor Network Routing Protocol for Underwater Sensor Networks
Authors:- M.Tech. Scholar Surbhi Rathore , Assistant Professor & Head Ashish Tiwari

Abstract:- Underwater sensor networks (USN) are a collection of sensor nodes and vehicles for performing the cooperative task in the specified region. In autonomous networks, the sensors and the vehicles are self-organized. The network can alter itself for achieving this goal to the features of the marine environment the water covers 75% of the earth’s surface. Many resources lie underwater. Those are to be investigated. The current advances in technology have prompted the opportunities to try and do underwater explorations by using sensors at all stages. USN is the combination of wireless technology with a very tiny micro mechanical sensor technology that has an intelligent computing, smart sensing, and communication capabilities.

Third Eye for Blind Ultrasonic Vibrator Gloves
Authors:- Asst. Prof. Rakesh Narvey, Asst. Prof. Rahul Sagwal, Harshita Shakya , Nupur Bhardwaj, Pooja Mandre, Neha Rajpoot

Abstract:- In this paper we have researched on the ultrasonic vibrator gloves. This technology is implemented to help visually impaired in indentify the objects that may come in their path within 1.5m in any direction of the glove. When the user of this gloves encounters an object within the range of 1.5m, the glove alerts the user with a beeping sound and vibrations. As soon as the user goes towards the object, intensity of beeping sound will increase. Advantage of this glove is its highly low manufacturing cost which is almost ten times lower than the other technologies are being made of the same purpose. The use of ultrasonic sensors and Arduino lilypad have heavy communications on the gloves, but with the help of other components effect of ultrasonic radiations can be reduced easily. By this, this project can be easy to wearable with less harms and economical in price can lighten up the markets by its features. The main aim was economizing this project so that even the financially weaker may use it.

A Review on Facial Expressions Recognition Based on LBP & SVM
Authors:- M.Tech. Scholar Nagesh Patel, Assistant Professor & Head Ashish Tiwari

Abstract:- Face Expression plays an important role in human communication. Facial Expression Recognition (FER) is process performed by computers which consist of detect the face in the image and preprocess the face region, extracting facial expression features from image by analyzing the motion of facial features or change in the appearance of facial features. Then classifying this information into facial expression categories like prototypic facial expression such as fear, happy, sad or Action Units (AU) such as eye open or mouth stretched concatenated into single feature vector. This feature vector outlines a well-organized representation of face and is helpful in determining the resemblance among images.LBP features which are effectual and competent for facial expression recognition are generally used Firstly, face area is divided in small regions, by which histograms, Local Binary Patterns (LBP) are extracted and then Cohn Kanade is the database will be used for this work and the programming language used MATLAB.

Drunk Driving Prevention and Automatic Bus Pass Tracking by using Image Processing
Authors:- Assistant Professor Malarselvam V, James Ashish A, Peranban D, Arun S, Arulmani P

Abstract:- Now a days manual bus pass checking is done in schools and colleges, and many accidents occurs due to drunk and driving. Due to manual bus pass checking it leads to more time consumption and misusage of bus pass occurs. Our proposed product performs Image processing and finds the unauthorized person entering into the bus. Camera will take a snap of the unauthorized person and it will send the snap to the authority by using IoT. Alcoholic sensor [MQ3] will sense whether the driver is drunk or not, suppose if the driver is drunken the camera will take a snap of the drunken driver and it will send the snap to the person in in-charge by using IoT.

Sentiment Analysis using Deep Learning: A Review
Authors:- Digvijay Singh

Abstract:- Deep learning has evolved as a powerful technique that learns from the features present in multiple layers of the data and produces futuristic predictions. Deep Learning has been impacting many domains such as Computer Vision, Natural Language Processing and many more. As a part of Natural Language Processing, Deep Learning has been being used for the Sentiment Analysis, either to identify the purchase behavior of customers or in recommendation engine to provide them completely amazing user experience. Under this smart internet era World Wide Web such as Social media networks, Survey Forums, Review Sites generate huge amounts of data in the form of user-views, emotions, opinions and arguments about different social events, products, brands, and politics. Sentiments of users that are expressed on the web has great influence on the readers, product vendors and politicians. This unstructured data from the online resources is converted into well-structured meaningful data for Sentiment Analysis, Sentiment Analysis has recognized significant attention and has great impact on the industries. Sentiment analysis is referred to as identifying the feeling of people around us in the form of negative, positive, favorable, unfavorable, thumbs up, thumbs down, etc. One of the challenges in Sentiment Analysis is the lack of labelled data. And to rectify this issue, the sentiment analysis and deep learning techniques have been merged because deep learning models are very effective due to their automatic learning capability. This paper gives an overview of deep learning and then provides a comprehensive overview of its current applications in sentiment analysis.

Sentiment Analysis using Deep Learning: A Review
Authors:- Anushka Yadav, Kalyani Daharwal, Ashwini Kale, Priti Tayade, Asst. Prof. Akbar Nagani

Abstract:-Traffic congestion could be a severe problem in many major cities across the planet and it’s become a nightmare for the commuters in these cities. Traffic are often controlled in several main junctions by incorporating either automatic traffic signal control or traffic police. But conventional traffic signal system is predicted on fixed time concept allotted to every side of the junction which can’t be varied as per varying traffic density. At some times, a priority of traffic light needs to be changed based on more number of vehicles waiting in same road, VIPs vehicles and Ambulance vehicles etc. We propose to style and develop a density based traffic light system. The signal changes and sensing the traffic density . The algorithm design and encoded on Arduino based system, due to its simplicity and economy. IR sensors are used to measure the traffic density on a particular road. IR senser have limitations that it has light intensity issues. In future, it with the improvement in IR sensor technology light issue can be resolved. IR sensors are arranged on all junction point on square to detect traffic density properly, these sensors always sense the traffic on that particular road. All these sensors are interfaced to the Arduino. By these sensors, Arduino detects the traffic and controls the traffic system. The controls of traffic light depend on number of vehicles available on the road. This method also focuses on providing a free pathway for emergency services like ambulances and fire brigadevehicle that are arriving towards the signal by sensing the siren frequency in range 700Hz-900H.

Road Safety Audit In Indian Road With Improvement Of Capacity In Intelligence Transportation System
Authors:- ME Student Yogesh Bhagwan Rathore, Asst.Prof. & HOD Vinay Devualkar

Abstract:-Transportation plays a key role in the development of an area, but it happens only when the transportation is safe, rapid, comfortable and economy. A road is considered safe when only a few, or no accidents occur. Road and its surroundings, road users and vehicles are the elements contributing to road accidents. Pedestrians, bicyclists and two-wheeler motorized riders are the vulnerable road users. The loss of human life due to accident is to be avoided. Road safety audit (RSA) is a formal procedure for assessing accident potential and safety performance in the provision of new road schemes and schemes for the improvement and maintenance of existing roads. These Audit studies or analysis give scope for the reduction of accidents and helps us to provide safe, self-explaining and forgiving roads. By this we can save the precious human life as well as the nation‟s economy. The selected for this study is part of Hyderabad Outer and Inner Ring Roads, HMDA Roads. Knowledge of accidents that have occurred on roads helps us to improve the design of the roads or to influence the behavior of road users, so that similar accidents do not occur again. Literature review will be done for the safe movement of the Road safety audit and will check the merits and demerits of the techniques used previously.

Does Technology Plays A Key Role in Selling A Car?
Authors:- Krishna Innani

Abstract:-A car which is a luxury good in india, but still the demand for the car is increasing day by day. From past few years the automobile market has many new entries which are affecting the indian automobile market largely. This companies are more based on technologies i.e with the common features of a car it is also giving technologies which are attracting more and more customers towards it. This is the research on how the new entries effected indian car companies and few ideas which if indian companies use them, they could acquire the indian market and could give a very tough competition to the new companies. This article also includes the comparison of sales before and after the new companies’ entry in the indian market. This research would help many indian companies to increase the amount of sales of there manufactured car by using the ideas which are presented in the given article. The article is more for Tata Motors as it is my favourite brand in india. If Tata Motors acquire something from this research, I would be very grateful.

A Review Article of Maximum Power Point Tracking Based Transient Analysis of Wind Power Plant
Authors:- Raj Roushan , Professor Anil kumar Kori

Abstract:- This paper reviews and studies the state-of the-art of available maximum power point tracking (MPPT) algorithms. Due to the nature of the wind that is instantaneously changing, hence, there is only one optimal generator speed is desirable at one time that ensures the maximum energy is harvested from the available wind. Therefore, it is essential to include a controller that is able to track the maximum peak regardless of any wind speed. The available maximum power point tracking (MPPT) algorithms can be classified according to the control variable, namely with and without sensor, and also the technique used to locate the maximum peak. A comparison has been made on the performance of the selected MPPT algorithms on the basis of various speed responses and the ability to achieve the maximum energy yield. The tracking performance is performed by simulating wind energy system using MATLAB/Simulink simulation package. Besides that, a brief and critical discussion is made on the differences of available MPPT algorithms for wind energy system. Finally, a conclusion is drawn.

Condition Monitoring of Transformers Based on Sound Signals- A Review
Authors:- Imtiyaz Ahmad, Dr. Yaduvir Singh, Mr. Jameel Ahamad

Abstract:- Power transformers are important and expensive components in the electric power system. The de-regulation of electric power requires a reduction of the service and maintenance cost of the power utilities. Monitoring systems can help to decrease the transformer life cycle cost and to increase the high level of availability and reliability. On line monitoring is the record of relevant data of a transformer. Diagnosis is the interpretation of these monitored data including the history of the transformer and the statistical judgement of the failure rate. The importance of the monitored transformer and the economic consequences are the basis for the asset management of power transformer together with the risk evaluation. This paper attempts to present the different methodologies adopted for on line monitoring of power transformers..

A Review Article Of Enhancement Of Statcom Performance Using Srf Based Shunt Filter Power Transmission
Authors:- M.Tech.Student Chandra Kant Singh, Asst.Prof. Durgesh Vishwakarma2

Abstract:- Power transformers are important and expensive components in the electric power system. The de-regulation of electric power requires a reduction of the service and maintenance cost of the power utilities. Monitoring systems can help to decrease the transformer life cycle cost and to increase the high level of availability and reliability. On line monitoring is the record of relevant data of a transformer. Diagnosis is the interpretation of these monitored data including the history of the transformer and the statistical judgement of the failure rate. The importance of the monitored transformer and the economic consequences are the basis for the asset management of power transformer together with the risk evaluation. This paper attempts to present the different methodologies adopted for on line monitoring of power transformers..

Experimental Study of Pervious Concrete
Authors:- PG Student T. Gowri

Abstract:- Pervious concrete is a special type of concrete with a high porosity used for concrete flat work applications that allows water from precipitation and other source stop as directly through. By this, the runoff from the site is minimized and groundwater is enhanced. It is also called porous concrete, permeable concrete, no fines concrete and porous pavement fines. Pervious concrete can be made with little to no fine aggregates utilizing large aggregates. The concrete paste then covers the aggregates and helps the water to move through the concrete slab. A form of concrete with a high void content of about 30 percent is now becoming common due to its ability to minimize the runoff to drainage systems that can provide a water flow rate of about 0.34 cm / second. It is an important sustainable building technology and is one of the low-impact production techniques used by builders to protect water quality. Pervious concrete often finds its successful use in pavements, footpaths, walkways and highways for low loading intensity parking. The Environmental Protection Agency (EPA) has stated that the pervious concrete is considered to provide pollution control, storm management, and adequate growth. It is a composite substance that is created by combining cement, inert sand and gravel matrix or crushed stone. This concrete has a light color and open-cell structure which prevents them from absorbing heat from the sun; they also do not radiate the heat back into the atmosphere, which reduces heating in the environment. The pervious concrete has low cost of construction. It removes the storm water while reducing the number of contaminants that reach the rivers and ponds. Also, pervious concrete improves tree growth. The action of pervious concrete has been examined experimentally in the present research. The water-cement ratio was maintained at various ratios 0.35, 0.40, and 0.45. Different properties of pervious concrete were experimentally tested, e.g. work ability, compressive strength, split tensile strength, flexural strength at 7, 14 & 28 days. Mixing proportions with aggregate sizes (4.75 mm to 10 mm) give greater strength compared to mixes with aggregate sizes (10 mm to 20 mm) and (4.75 mm to 20 mm), respectively.

Traffic Light Monitoring System using IOT
Authors:- Ayush Kr. Chauhan, Asst. Prof. Saurabh Saxena, Astha Saini, Aakash Singh

Abstract:- To improve the traffic light configuration, this paper proposed monitoring system to be as an additional component to the intelligent traffic light system. This will be able to determine the location of the emergency vehicle and provide the smooth way at the crossroad where the traffic light is placed. On the wide roads a reserve path will be provide for the emergency vehicle so that they can reach their destination as soon as possible. If there is no emergency vehicle on the road that path can be used by normal vehicles. On the traffic light an emergency light added which will indicates the traffic whether there is an ambulance or any rescue wagon is on the road or not. If there is an emergency vehicle on road, the traffic will not use that reserve path. Where roads are narrow there the traffic will be controlled through the traffic light by the controller.

Wi-Fi Based Garbage Monitoring System
Authors:- Jiby Sara James, Nikita Kanojiya, Ruchi Gedam, Bushra Ayesha , Asst. Prof.Tirupati. M. Goskula

Abstract:-Collecting waste is important in order to keep the cities clean for a better environment to live in. Thus, the smarter techniques are used in the surroundings to overview and collect the important information. We have proposed a Wi-Fi based garbage monitoring system which is used to keep the cities clean. The system evaluates and shows the level of garbage collected in the bins through an android app. The android application made to support the project sends all the important information to a person in administrative department. In this way the waste management is automated.

Renewable Energy for Sustainable Development in India: Current Status And Future Prospects
Authors:-M.Tech. Student Poonam Kumari, Asst.Prof. Manish Kurre

Abstract:-Renewable energy sources and technologies have potential to provide solutions to the long-standing energy problems being faced by the developing countries. The renewable energy sources like wind energy, solar energy, geothermal energy, ocean energy, biomass energy and fuel cell technology can be used to overcome energy shortage in India. To meet the energy requirement for such a fast-growing economy, India will require an assured supply of 3–4 times more energy than the total energy consumed today. The renewable energy is one of the options to meet this requirement. Today, renewable account for about 33% of India’s primary energy consumptions. India is increasingly adopting responsible renewable energy techniques and taking positive steps towards carbon emissions, cleaning the air and ensuring a more sustainable future.

A Review Article on Comparison Between Rcc And Composite Materials In Multi Storey G+2 Building
Authors:- Ms. Sangeeta Malakar, Associate Professor Komal Bedi

Abstract:-In India Concrete Is Very Popular Material of Construction Especially In Case Of Medium And Low Rise Buildings. And In Case Of High Rise Buildings Steel Is Generally Used And The Composite Construction Is Not Such Popular But It Is Possible That Composite Construction Can Be More Beneficial In Case Of Medium And High Rise Buildings. Concrete Composite Construction Can Be Built In Place Of RCC Structures To Get Maximum Advantage Of Steel And Concrete And To Produce Efficient And Economic Structures. It Is the Decision Of Contractor Or Owner That Which Type Of Properties They Require In The Field And According To Those Properties The Type Of Material Can Be Chosen. This Paper Shows Comparison Of Various Aspects Of Building Construction For Steel, RCC As Well As Composite Buildings Considering Various Researches Acted On This Topic.

Heat Transfer through Water in Ground Air Heat Exchanger
Authors:- M.Tech. Scholar Swastik Kumar Agarwal, Dr.Shailendra Dwivedi(HOD)

Abstract:- Ground-air heat exchangers have become one of the important topics into consideration when HVAC industry is talked about. It is capable of transferring heat without liberation of any carbon compounds because of which it has edge over other heat transfer mediums. This paper shows the study of water to air heat transfer considering the material of the pipe and the optimal design of the pipe. Earth air heat exchangers are widely used in agricultural and industrial sectors for the past few decades in other parts of the world. The vise-versa is applied in the cooler parts to preheat the air reaching the room for comfort.

Teaching Learning Methods to Enhance Learners Learning Capability
Authors:- Asst. Prof. G. Ramani, Asst. Prof. B. Deepthi, Asst. Prof. R. Deepika

Abstract:- Learning is an art of enhancing the skills with knowledge. The learners are not like previous students to listen the lecture, instead they learn more by involving in the active learning process. We must step forward with the adoption of the changes in today’s learning and encourage and guide the learners for more self-learning which not only increases the learnings but also a raise in their potential of confidence. In this paper We discuss our own experiences the various active learnings and various tools for virtual learning, which makes the learning effective, reachable and outcome.

Embedded Web Client on Arduino Due
Authors:- PG Student Ashwini Pathade, Assistant Professor Poonam Soni

Abstract:- Nowadays, monitoring and controlling is important aspect in industry and home automation. On that basis many systems are measuring and controlling parameters like temperature, humidity, voltage, gas leakage etc. and result displays on different format. Embedded web client is the system which is used to monitor and control parameters like temperature and humidity. Embedded web client gives output in the form of offline mode as well as online mode. On the result basis on two systems are available in embedded web client one is online system and other is offline system. In Embedded web client controller receives data from sensors and transmit it to server periodically as well as perform certain useful functions like to display ADC value and controlling increased temperature. In embedded web client AT SAM 3X8E and NODE MCU used as a controller and display output on LCD as well as web page using XAMPP server. Embedded web client uses wi-fi module instead of router or Ethernet. Embedded web client is easy in construction, robust and gives real time application.

Utilization of Granite Saw Powder Waste in Brick
Authors:- Iswarya E

Abstract:- Nowadays, monitoring and controlling is important aspect in industry and home automation. On that basis many systems are measuring and controlling parameters like temperature, humidity, voltage, gas leakage etc. and result displays on different format. Embedded web client is the system which is used to monitor and control parameters like temperature and humidity. Embedded web client gives output in the form of offline mode as well as online mode. On the result basis on two systems are available in embedded web client one is online system and other is offline system. In Embedded web client controller receives data from sensors and transmit it to server periodically as well as perform certain useful functions like to display ADC value and controlling increased temperature. In embedded web client AT SAM 3X8E and NODE MCU used as a controller and display output on LCD as well as web page using XAMPP server. Embedded web client uses wi-fi module instead of router or Ethernet. Embedded web client is easy in construction, robust and gives real time application.The block is a building material, which is used to build up the structures. The aim of this project is to determine the compressive strength and other characteristic of the blocks. The blocks with clay and granite sawing powder waste, which will give a better understanding on the properties of blocks like compressive strength, water absorption and size and shape of block was good while comparing the other kind of blocks.The scope of this project is to determine and compare the strength of the blocks by using different percentage of clay and granite sawing powder waste. The investigation was carried out by various mix ratios using the laboratory test likes compression test, water absorption test. For strength characteristics, the results showed that a gradually increase in compressive strength, water absorption values in blocks was good while comparing the characteristics compressive strength of bocks.

Fabrication of Abrasive Jet Machine
Authors:- Assistant Professor K Prashanth, D H Pachchinavar,
Students, Mohammed ZaminUlhaq, Owais Ali Khan, Mohammed Azmathullah Shareef, Mohammed Rehan, Habeeb Abdul Rouf.

Abstract:- Abrasive Jet Machining (AJM) is the process of material removal from a work piece by the application of a high-speed stream of abrasive particles suspended in a gas medium from a nozzle. The material removal process is mainly caused by brittle fracture by impingement and then by erosion. The Abrasive Jet Machining will chiefly be used to cut shapes, drill holes and de-burr in hard and brittle materials like glass, ceramics etc. In this project, a model of the Abrasive Jet Machine was designed using CAD packages like AutoCAD and CATIA. Care was taken to efficiently use the available material and space. The machine was fabricated in the institute workshop with convectional machine tools like arc welding machine, hand drill, grinding machine using commonly available materials like mild steel sheet and rod, aluminum sheet, glue, polythene sheet, glass fiber which are commonly available in the local market. Care has been taken to use less fabricated components, because, the lack of accuracy in fabricated components would lead to a reduced performance of the machine.The different functional components of AJM are the machining chamber, work holding device, abrasive drainage system, compressor, air filter and regulator, abrasive nozzle, and mixing chamber with cam motor arrangement. The different components are selected after appropriate design calculations.

Reuse of Hazardous Waste as Alternative Building Materials–A Review
Authors:- UG Student Harshith. M, Masters Student Aditi Parmar Chitharanjan

Abstract:- Waste materials are a major environmental problem, among them the most dangerous are hazardous wastes that are substantial or potential threats to public health or the environment. Waste can be used in the construction industry in two ways: by reusing and recycling. This article presents a review of the literature on changes in the composition of traditional building materials with the addition of certain wastes without compromising on its durability and efficiency. This article mainly concentrates on the use of Polystyrene (PS), and formaldehyde resin which are some wastes attained from construction industries and their by-products. Some physical and mechanical properties are studied when these mixtures are partially replaced in cement with sand in experimental ratios to receive efficient ratios and to study its properties. This article is a review of major work done in this field.

Design and Analysys of Twin Cell Box Culvert
Authors:- Ramyasri.V, Assistant Professor Mr.P. Satheesh Kumar

Abstract:-Box Culverts are required to be provided under earth embankment for crossing of water course like streams, Nallas across the embankment as road embankment cannot be allowed to obstruct the natural water way. The culverts are also required to balance the flood water on both sides of earth embankment to reduce flood level on one side of road thereby decreasing the water head consequently reducing the flood menace. Culverts can be of different shapes such as arch, slab and box. These can be constructed with different material such as masonry (brick, stone etc) or reinforced cement concrete. Since culvert pass through the earthen embankment, these are subjected to same traffic loads as the road carries and therefore, required to be designed for such loads. The size, invert level, layout etc. are decided by hydraulic considerations and site conditions. The cushion depends on road profile at the culvert location. The structural design involves consideration of load cases (box empty, full, surcharge loads etc.) and factors like live load, effective width, braking force, dispersal of load through fill, impact factor, co-efficient of earth pressure etc. Relevant IRC Codes are required to be referred in the analysis and design of box culverts. The aim of this project is to model and analyze the box culvert using STAAD PRO software. This software is an effective and user friendly tool for three dimensional model generation, analysis and multi material design. The results obtained from STAAD PRO are compared with the manual calculations obtained using Excel. The structural elements of box culvert are designed to withstand maximum bending moment and shear force. The results obtained from STAAD are almost similar to manual calculations.

Indian Sign Language Recognition
Authors:- Mohit Patil, Pranay Pathole, Hrishikesh Patil, Ashutosh Raut, Prof. S S Jadhav

Abstract:-This paper introduces a system that can recognize poses and hand gestures of Indian Sign Language in real time using grid-based features. This system tries to reduce the communication gap between listening and speaking disabled and the rest of society. Existing solutions either provide relatively low precision or do not work in real time. The system provides good results in both parameters. Sign Language is captured from a smartphone camera and its frames are sent to a remote server for further processing. Techniques such as Face detection, object stabilization and skin color are used. Segmentation is also used for hand detection and tracking. The image undergoes a gridbased function extraction technique representing the placement of the hand in the form of Function Vector, Hand postures are classified using the k-Nearest Neighbors algorithm. However, by gesture classification, movement and intermediate positions of the hand observation sequences are entered into the chains of the hidden Markov model corresponding to the pre-selected gestures defined in Indian Sign Language.

A Clustering Algorithm Based on Topology Adaptive Distributed: A Comparative Study
Authors:- Dr. Akhilendra Kumar Khare, Prof. Chandra Kumar Jha

Abstract:- This Paper measure the performance a TACA (Topology Adaptive Clustering) Algorithm that aim to choose least integer of group heads to play down the numerals of hubs within the essential back bone.To memorize its one-hop neighbors algorithm uses the Neighbor Detection Protocol (NDP) . The algorithm which is dispersed in environment that reviews only the confined topology to choose a group head. Specifically, hub having the maximum weight between its one-hop neighbor is chooses as the group head. Average mobility and its available battery power is assuming only by calculated node weight. This paper moreover bargains with the vitality utilization of the distinctive portable hubs in different working modes. The cluster support techniques to back the hub portability in addition to hold the cluster control structure are too incorporated in this paper.

Deep Convolutional Neural Network Based Knee Injury Classification Using Magnetic Resonance Imaging
Authors:- Rishi Pandey , Soumya Mitra

Abstract:- Radiologists tend to possess human error during pathologies scans for any abnormalities, thus the introduction of automation shall have a great impact on accurately detecting injuries and more musculoskeletal examinations. Magnetic Resonance Imaging (MRI) scans are an effective method to detect injured sections but the process tends to be time-consuming and prone to human error. Therefore, our paper highlights the automation impact on knee MRI for abnormal, anterior cruciate ligament (ACL), meniscal damages using deep learning. Deep learning model such as Convolutional Neural Network (CNN) can infer the representation of images due to its properties: local connection and shared weights. We have explored two deep CNN models (VGG16 and VGG19) with transfer learning approach to predict knee injury on MRNet dataset collected by Stanford University. The classification accuracy obtained for abnormal, ACL tear and meniscal tear are 85.83%, 70% and 76.67% respectively using VGG16 whereas 83.33%, 67.50% and 68.33% respectively using VGG19 model.

Evaluation of Physical and Chemical Properties Concrete Incorporating Silica Fume and Nano-Sio2
Authors:- M.Tech. Scholar Vaibhav Saxena, Assistant Professor Anuj Verma

Abstract:- Silica fume concrete (SFC) is used for concrete mixtures, which possess workability, strength, high density, low permeability and resistance to chemical attack. The addition of Silica fume (SF) has proved to improve both the compressive strength and durability of concrete. From the earlier research, they found the optimum percentage of silica fumes to replace cement is 13% which used in this work. Silica fume is one of the by-products of silicon metal (or) it also knows as silicon alloy metal factories. The silica fume was considered as the waste industrial materials. Silica fume is also called as the condensed silica fume, micro silica and Volatilized silica. Due to its very active and high pozzolanic property it became the most valuable by-product among the pozzolanic materials. It is used in the concrete to improve its properties and it also increases the compressive strength. The color of silica fume is either premium white (or) premium grey. Silica fume (SF) is generated by the silicon metal or by ferrosilicon that which producing by industry. The compressive strength of each concrete decreases water– cement material ratio increases.

Autonomous Ocean Garbage Collector
Authors:- Sagar Gavade , Ghanashyam Phadke, Shrikant Somal, Praful Gaikwad, Mahesh Mane

Abstract:- This paper describes an automatic ocean garbage collector robot for collecting garbage floating in the ocean. Debris and plastic built-up everywhere on the water surface can be cleaned using this robot. The Automatic Ocean Garbage Collector is designed by implementing the concepts of various fields such as Embedded, Electric and Mechanical system as well as IOT cloud. Apart from cleaning it also alerts the system about the polluted water area depending on temperature, humidity and conductivity of water. The core idea behind the project is to build a reliable and cost-efficient robot.

An Investigation Report on Strength Charecteristics of Steel and Glass Fibers Insteed of Reinforcement In Concrete
Authors:- Post Graduate, D. Mounika, Assistant Professor G. Teja

Abstract:- – The Concrete preparation can do with Portland cement. This Ordinary Portland Cement having different types if characteristics: The concrete is strong in compression but is weak in tension. The concrete having the general structural weakness like cracks that are start to form as soon as concrete is placed and before it has properly hardened. These cracks are major cause of weakness in concrete particularly in large on-site applications leading to subsequent fracture and failure and general lack of durability. The weakness in tension can be overcome by the use of conventional rod reinforcement and to some extent by the inclusion of a sufficient volume of certain fibres.Fibre reinforced concrete (FRC) may be defined as a composite material made with Portland cement, aggregate, and incorporating discrete discontinuous fibres.Fibre- reinforced concrete (FRC) is concrete containing fibrous material which increases its structural integrity. It contains short discrete fibres that are uniformly distributed and randomly oriented – each of which lend varying properties to the concrete. In addition, the character of fibre-reinforced concrete changes with varying concretes, fibre materials, geometries, distribution, orientation, and densities. Steel Fibre reinforced concrete is a composite material consisting of cement paste, mortar or concrete with closely spaced and uniformly dispersed fibres It is also known as FRC. In this experimental investigation, an attempt has made to find out strength related tests like Compressive Strength, Split Tensile Strength, Flexural Strength using Pure concrete, steel fibres and Glass Fibres with to volume fraction of 0.0%,0.25%,0.5%, 0.75% and 1% and for aspect ratio and considered for M40 Grade of concrete. A total No. of 81 specimens were casted, cured and tested. The real contribution of the fibres is to increase the toughness of the concrete, under any type of loading and permit the fibre reinforced concrete to carry significant stress over a relatively large strain capacity in the post cracking stage. The results of the tests showed that the strength properties are enhanced due to addition of glass fibres.

The Characterization and Evaluation of Some Edible Oils for Their Frying Stability
Authors:- Abhilash Babu G

Abstract:- The oils and fats are used for frying foods which are a staple of the fast food industry in India.Such foods are very popular because of their desirable flavour,attractive colour and crispy texture.But eating too much of these foods can leads to serious health problems.The frying also cause substantial changes to physio-chemical-sensory-nutritional qualities of cooking oils.In this study,the most commonly and frequently used edible oils in India viz.,sunflower oil,palmolein oil and coconut oil, are analysed before and after frying to evaluate their quality during frying purposes.

Smart Agriculture Monitoring System Using Iot
Authors:- Assistant Professor D. Betteena Sheryl Fernando, UG Students M. Sabarishwaran
R. Ramya Priya, S. Santhoshini

Abstract:- Climate changes and rainfall has been erratic over the past decade. Due to this in recent era, climate-smart methods called as smart agriculture is adopted by many Indian farmers. One of the important applications of IOT is Smart Agriculture. It reduces wastage of water, fertilizers and increases the crop yield. Smart agriculture is an automated and directed information technology implemented with the IOT (Internet of Things). IOT is developing rapidly and widely applied in all wireless environments. In this project, sensor technology and wireless networks integration of IOT technology has been studied and reviewed based on the actual situation of agricultural system. Temperature sensor, Moisture sensor and pH sensor which senses the temperature, moisture content and pH in the soil. A combined approach with internet and wireless communications, Remote Monitoring System (RMS) is proposed. Major objective is to collect real time data of agriculture production environment that provides easy access for cultivation and increases the crop yield. By monitoring the field using the IP address Nutrient deficiency in the soil are detected and rectified.

A Review on Three-Dimensional Performance Analysis of Circular Fin Tube Heat Exchanger
Authors:- M.Tech. Scholar Abhishek Mishra, Prof. D.K.Mudaiya, Prof. Nitin Tenguria

Abstract:- In recent years, thousands of numerical and experimental studies have been performed on heat exchangers with different configurations. Mainly heat transfer and frictional characteristics have been studied in detail with respect to different geometrical parameters in various ranges of Reynolds number. Further these studies have been cross verified with researches already performed in this field. With the advent of new tools like CFD for the study of thermo-hydraulic characteristics, it has becomes easier to understand flow phenomena around the tubes for different rows and also in rest of flow regions. These studies also bring about some correlations so as to easily find the values ofcolburn and friction factor for various different geometrical parameters so as to suit to the different industrial conditions and requirements. An overview of the work already done on plate fin heat exchangers is presented in this paper.

A Study on Partial Replacement of Course And Fine Aggregate by Coconut Shell and Quarry Dust Mix
Authors:- Post Graduate, G. Teja Sree, Assistant professor, Mr. G. Teja,

Abstract:- In developing countries where concrete is commonly used, increase in cost of concrete made construction extremely pricey. The production of concrete require a choice of materials like Cement, Fine aggregate and Coarse Aggregate. Due to wide usage of concrete cost of materials is being increased. So another material is used for partial replacement of Fine aggregate and coarse aggregate in concrete. Main aim of this project is to decrease the cost of concrete. Research work have been conducted with gathering of materials required, the data required for mix design are obtained by sieve analysis and specific gravity test. Sieve analysis is carried out from a variety of fine aggregates (FA) and coarse aggregates (CA) samples and the sample which suit the condition is selected. Specific gravity tests are carried out for fine and coarse aggregate. FA is replaced by Quarry dust of 30 % along with the partial replacement of CA with coconut shell. Coarse aggregate is replaced with 10 %, 20%, 30% and 40 % by coconut shell. Design Mix used is M20 grade (1:1.5:3) with W/C Ratio 0.5.The Conventional concrete and Coconut shell with quarry dust concrete specimens were casted and tested for compressive strength and split tensile strength for 7 and 28 days. The compressive strength of the CS10%+QD30% and CS20%+QD30% was 24.35N/mm2 and 24.98 N/mm2, Split tensile strength is 3.45N/mm2 and 3.500N/mm2 respectively at 28days.A Study On Partial Replacement Of Coarse And Fine Aggregate By Coconut Shell And Quarry Dust Mix.

Vertex Edge and Equitable Vertex Edge Domination of Topologically Indexable Graphs
Authors:- Assistant Professor (Sl. G) Dr. S. Chitra, Assistant Professor (O. G) Ms. N. Prabhavathi

Abstract:- Let G = (V, E) be a simple graph. Let τ be a topology on V(G).We define a topology on V(G) and given a topology on a non-empty finite set V, and graph G(T) with vertex set V is called topological graph. In this paper we have identified the Perfect domination number, Vertex – Edge domination number, Equitable vertex-edge domination number Maximal vertex-edge domination number of graph G(T), also an attempt is made to identify the topologically indexable total Hamiltonian line graph.

Optimisation of Process Parameters for MIG Welding byUsing Grey Relational Analysis
Authors:- M. Tech. Scholar Benazir Aftab, Prof. Yogesh Mishra

Abstract:- The welding of Aluminium is a big challenge by conventional arc welding process and repeatability of welding depends on its control on welding speed and other processing parameters. In this study, GMAW welding of 5 mm thick mild steel was done by changing the welding current, gas flow rate and nozzle to plate distance to get a high strength joint. To get better strength welding of the MS plate is done from both side. The main aim of the study was to analyse the Effect of welding current, gas flow rate and nozzle to plate distance on the tensile strength of weld joint, micro hardness of the weld pool and macrostructure of the joint. The mechanical properties under consideration for present work were the Tensile Strength and Hardness. Tensile Strength and Hardness were determined using UTE100, with capacity of 100kN and Rockwell hardness tester respectively. It was found that preheat temperature has the most significant effect on the tensile strength and hardness. The maximum tensile strength and hardness achieved was welding current 124 A, gas flow rate 15 l/min and preheat temperature 275°C.

Experimental Investigation on Strength and Flexural Strength of Concrete by Partially Replacement of Cement by Coconut Endocarp Ash
Authors:- PG Student Aravind G , Asst. Prof. C. Gurumoorthy

Abstract:- Conservation of natural resources and prevention of environment should be considered predominant along with any kind of continuous technological and industrial development by minimizing quantity of waste disposal. If some of the waste materials are found suitable in concrete making, the cost of construction can be cut down, but also safe disposal of waste materials can be achieved. So, an attempt has been made to access the suitability of different replacement materials in the concrete production. The project is implemented by using coconut endocarp ash as a partial replacement material for cement. The experimental investigation is done on M30 grade concrete and its engineering properties were analysed using OPC cement along with coconut endocarp ash following standard mix design procedure. The compressive strength and tensile strength at 7 days ,14 days and 28 days of conventional concrete and concrete prepared using cement replaced in ranges of 5% with coconut endocarp ash to be measured. Finally, the results and graphs to be plotted. The flexural strength on beams using conventional concrete and concrete with partial replacement has to be studied and results will be compared.

Content-Based Retrieval in Cloud Image Repositories
Authors:- M.Tech. Student Krishna S.S., Professor Asha A.S.

Abstract:-Multimedia visual data have been increasing to store the cloud computing in recent years, following the emergence of many high interactive multimedia services and applications for mobile devices in both personal and corporate scenarios.This has been a key driving factor for the adoption of cloud-based data outsourcing solutions. Framework may fully supported in multi media data ex(images,video,audio)the main activity on this framework it may chunk the large amount of the data and using the Encryption for each chunks. The security process may high at this frame work high interactive multimedia
services and applications for mobile devices in both personal and corporate scenarios. This has been a key driving factor for the adoption of cloud-based data out sourcing solutions.

A Population Model with Stochastic Processes and a Fitness Mechanic
Authors:- Parth Adhia, Raj Joshi, Aditya Agashe, Mihir Rastogi, Gil Shteyman

Abstract:-We create a simulation modeling population growth, building upon the work of D J Aldous. Aldous creates an elementary model of city growth, akin to the “Chinese restaurant process”. His two determinants of growth are and, which are two constants which influence the behavior of the simulation. However, the real world is the result of a myriad of factors, and we wish to better illustrate that. Thus, we add further parameters to Aldous’s paper to represent a more accurate depiction of real-world behaviors. Added features include “fitness”, representing age and health, which influence tendencies for individuals to migrate based on preference and conditions. In addition, we have six inputs that dictate the behavior of the model’s growth. In addition to Aldous’s and , we utilize B, birthrate, C0, a constant of influence, c, the rate of immigration, and m, an indication of when people migrate. Together, these inputs and factors create a more realistic sample of real-world city growth phenomena. An analysis of the resulting data yields many patterns regarding total population, expected number of cities, the emergence of an infinite population, and critical points.

Investigation The Impact of Inorganic Fillers on The Electrical and Physical Properties of Resin Epoxy
Authors:- Shaimaa Mohamed Sayed Khodary, Loai Nasrat, Ahmed Abdel-Aziz , Anke Klingner

Abstract:-Epoxy micro composites with high loading of micro (silicon dioxide, magnesium hydroxide and mica) were fabricated and their electrical and physical properties were characterized .The main aim of this research is to enhance the performance of resin epoxy as an insulation materials. The micro and nano silicon dioxide are used as inorganic fillers to support the resin epoxy. The flashover voltage test was carried out to investigate the difference between the two fillers. The contact angle measurement was carried out to investigate the hydrophobicity among three types of micro fillers (silicon dioxide, magnesium hydroxide and mica).

Predicting the Post Covid-19 Trend of Indian GDP and Its Main Contributors
Authors:- Namrata Weling, Manasi Desai

Abstract:-Forecasting is the process of estimating the future predictions based on the historical data. However, due to global pandemic it has become difficult to predict the GDP of India in the coming years based on the past data. This study has attempted to shed light on predicting the future GDP of India and has considered the factors that contribute to the Indian GDP like Unemployment Rate, Population and Labour Force Participation Rate. This paper also focuses on the individual sector contribution to the Indian GDP. These sectors include Agriculture, Industry and Service. Data on GDP has been collected from year 2008 to 2019 from various research websites such as statistics times and trading economics. Data on state-wise GDP of India has been collected from various publications of the Reserve Bank of India. The unemployment rate, Population and labour force participation rate data has been collected from the world bank. A multiple linear regression model has been fitted on data to determine the relationship between unemployment rate, population and labour force participation rate with Indian GDP. Results suggest that as the unemployment rate increases the Indian GDP decreases and as the population increases GDP also increases. Based on this model, further values of Indian GDP were forecasted for the coming years. A linear regression model was used to predict the contribution of three sectors i.e. agriculture, industry and service sector, and the state-wise GDP of top nine contributing states in India was predicted. We hope to assist the policy makers and businesses to formulate economic and business strategies in turn more precisely through the findings of our research. It will also help investors in decision making, as to whether or not to invest in a particular sector, and which sector needs investment to be stabilized or prevented from a drastic fall.

SMARTUS
Authors:- Varsha Babu, Sandra Mariya M Anil, Neha P, Liya C George, Reshma K V

Abstract:- Forecasting is the process of estimating the future predictions based on the historical data. However, due to global pandemic it has become difficult to predict the GDP of India in the coming years based on the past data. This study has attempted to shed light on predicting the future GDP of India and has considered the factors that contribute to the Indian GDP like Unemployment Rate, Population and Labour Force Participation Rate. This paper also focuses on the individual sector contribution to the Indian GDP. These sectors include Agriculture, Industry and Service. Data on GDP has been collected from year 2008 to 2019 from various research websites such as statistics times and trading economics. Data on state-wise GDP of India has been collected from various publications of the Reserve Bank of India. The unemployment rate, Population and labour force participation rate data has been collected from the world bank. A multiple linear regression model has been fitted on data to determine the relationship between unemployment rate, population and labour force participation rate with Indian GDP. Results suggest that as the unemployment rate increases the Indian GDP decreases and as the population increases GDP also increases. Based on this model, further values of Indian GDP were forecasted for the coming years. A linear regression model was used to predict the contribution of three sectors i.e. agriculture, industry and service sector, and the state-wise GDP of top nine contributing states in India was predicted. We hope to assist the policy makers and businesses to formulate economic and business strategies in turn more precisely through the findings of our research. It will also help investors in decision making, as Purpose of this project to monitor the growth of multiple crops in the farm as well as providing the water to the particular crop as much it is required. It uses two sensors namely Soil Moisture Sensor(YL-69) and humidity and temperature sensor(DHT11). Soil moisture sensor it sense moisture of soil and DHT11 senses the humidity and temperature. By providing all these information it provides water to the plant. Apart from these image is captured through the pi-camera by which we compared the growth of plant by camera to the data saved on server. For daily water supply if there is rain outside then water is already absorbed by soil then water requirement of plant is change, then according to the need we provide the water to plant. The data of previous water supplied to the plant is stored on server also requirement of water for crop is determined through the information recorded on the server.to whether or not to invest in a particular sector, and which sector needs investment to be stabilized or prevented from a drastic fall.

Preparation and Characterization of Magnetite (Fe3O4) Nanoparticles with and Without Surfactant
Authors:-Saranya G. M.Sc, M.Phil.

Abstract:- Magnetite nanoparticles (Fe3O4) represent the most promising materials in medical applications. They have attracted extensive interest due to their super paramagnetic properties and their potential applications in many fields. Magnetite (Fe3O4) nanoparticles have found to be a potential material in several areas, such as biomedical [1–2], target drug delivery [3], tumor, cancer diagnosis and treatment [4] and as a magnetic resonance imaging (MRI) contrasting agent [5]. There are several techniques such as Chemical Bath Deposition, Hydrothermal method, Solvothermal, Co-precipitation method, Chemical Vapour Deposition and Sol-Gel method, Emulsion method, Arc discharge used for the preparation of Magnetite (Fe3O4) Nanoparticles. Among these methods, solvothermal method has been selected for the present work as it is simple, economic and non-polluting. This has been employed to synthesis Magnetite nanoparticles (Fe3O4) with and without the aid of surfactants, because there are several obvious advantages of the solvothermal technique over the traditional solid-state reactions. Also made investigate on structural, morphological and optical properties of the materials.

A Survey on Sales force and AI
Authors:-Sarthak Ghosh

Abstract:- Salesforce is very demanding cloud computing technology in IT industry, which is available on cloud, no need install any software as well as no hardware required. Salesforce.com (SFDC) is currently number one on demand CRM, which runs on force.com platform, as well as CRM is a model used to manage organization interactions like phone calls, Emails, Meetings, issues, Social media with customers and also prospects penetrating to Sales, Marketing and Support. In this paper, we are discussing about Introduction to Cloud Computing, Service models in Cloud Computing, Types of Cloud Computing, Architecture of Cloud Computing and Introduction to MVC as well as SFDC MVC. Further discussing about Introduction to Salesforce, SOQL,Apex and Its Comparison Operators and at last covering Force.com IDE and CRM. The aim of this paper is to show mainly importance of Salesforce.com which is a software giant that manages to give the buyer a easy to use as well as extremely effective CRM solution.Salesforce Research has made significant progress in deep learning and natural language processing (NLP) over the course of the last year that address these challenges and also make good spot in AI. We’ve built faster, more scalable model architectures and stable model, developed a reinforcement learning agent that programs new neural network architectures, and improved training methods in order to take full advantage of the huge of data currently available and to increase model performance for each individual NLP task. Today, Salesforce excited to announce new breakthroughs that bring us closer to a unified approach to tackling the many facets of natural language, paving the way for humans and machines to communicate more effectively and work side-by-side.

An Automated Intrusion Detection System by Using Artificial Immune System
Authors:- Assistant Professor Anjul Rai , M. Tech. Scholar Kalyani Takpure

Abstract:- In recent years, this area has seen significant advancesinwith the increasing network attacks worldwide, intrusion detection (ID) has become a hot research topic in last decade. Technologies such as neural networks and fuzzy logic have been applied in ID. The results are varied. Intrusion detection accuracy is the main focus for intrusion detection systems (IDS). Most research activities in the area aim to improve the ID accuracy. This paper focuses on an artificial advanced immune system (AIMS) based network intrusion detection scheme is proposed. An optimal feature selection and parameter quantization algorithms are defined. The difficult subject is addressed in the design of the algorithms. The scheme is tested on the widely used KDD CUP 99 dataset. We found good agreement when comparing our method with results from previous scheme outperforms other schemes in detection accuracy. In our experiments, a number of feature sets have been tried and compared. Compromise between complexity and detection accuracy has been discussed in the paper.

DC Power System with Super Capacitor &Sepic Converter Monitoring Using IOT
Authors:- P. Anushya, R. Brindha Devi, R. Deepika, P. Jayanthi, Assitant Professor A. Pradeep

Abstract:- As the conventional energy resources are depleting there is an urgent need for switching to renewable energy resources as well as increasing its functionality. This project proposes a design of solar power system fed by a photovoltaic source with a super capacitor storage system and sepic converter. The super capacitor has the fastest charging time compared to all other storage devices and also guarantees a longer lifetime in terms of charge cycles and has a large range of operating temperatures, but has the drawback of having low energy density. The lithium battery has higher energy density but requires an accurate charge profile to increase its lifetime. Combining the two storages is possible to obtain good compromise in terms of energy density. Sepic converters allow output from converters to be higher or lower than its input and allow the output to be non-inverted state with respect to input. It also reduces the amount of harmonics present in the output. A Controller is added between the solar panel and the battery to improve the system performance. The solar power system is controlled and monitored using Arduino microcontroller.

Analysis on Performance and Emission Characteristics of Extended Expansion Lean Burn Spark Ignition Engine
Authors:- Research Scholar D. Damodara Reddy, Professor G. R. Selokar (Supervision)

Abstract:- A thermodynamic modelling of extended expansion lean burn has been developed to predict the performance and emission characteristics. Experimentally a single cylinder four-stroke water-cooled diesel engine has been converted to operate as SI engine. To achieve lean combustion thefollowing modification were done, combustion chamber was modified to enhance and swirl and squish, copper as a catalyst was coated on the cylinder head and piston crown, and high energy transistorized coil ignition (TCI)system was used to ignite lean mixture.The top dwell of the intake cam were increased to delay intake valve closing. Four different top dwell were formed in the camshaft to achieve the intake valve closing timing 93º 113º 125º, 134º after BDC corresponding to the ER/CR ratio of 1.25, 1.5, 1.75 and 2 respectively. A side draught carburetor was used in the modified engine. Since delay of IVC increases, the quantity of charge pushed back also increases, thus lesser amount of charge will be retained inside the engine cylinder. Considering the maximum brake thermal efficiency and minimum BSFC, ER/CR ratio 1.5 and air-fuel ratio about 20 is found to be optimum. When the lean limit extend from an air-fuel ratio 17 to 20, EEE with ER/CR ratio 1.5 shows about 16.55% improvement in brake thermal efficiency, 21.45% decrease in BSFC, 53% reduction in NOX emission, 15.39% increase in UBHC emission, 45.38% reduction in CO emission. The maximum brake thermal efficiency and volumetric efficiency was observed at 1400 rpm.

Digital Marketing Stratergy and Role of SEO
Authors:- Research Scholar Chinmay Kapoor, Assistant Professor Dr. Manisha Raj

Abstract:- This study examines the digital marketing and role of search engine optimization. As the world has progressed into era of digitalization and technology is playing an integral part in everyone’s life. Digital Marketing has become a backbone for all the business houses to promote their market through online means with the help of internet. The overall purpose to study and writes on this topic is to broaden my knowledge about the concept of SEO which has become very important for every online business firm and how big role it plays while digital marketing. The basic design of study is to focus on the term digital marketing which has impacted all the business firms who wants to take their business online and how SEO has assisted them in doing that. The paper is based on the primary tools and in the end paper present various data about the current as well as the future trends of topic with graphs and charts collected from various sources alongside the Review of Literature. JEL Classification Code: M310, O35, O36

Inventory Management System in Construction of Buildings
Authors:- PG Student S. Kavin Prabu, Assistant Professor C. Gurumoorthy

Abstract:- The concept of inventory management system has been one of analytical aspects of management establishing control over purchase, storing and to keep track of the materials , workforce, equipment and production units involved for construction projects. The proper management of this component can improve the productivity and cost efficiency of a project. One of the major problem in delaying construction projects is poor managing systems. The inventory management system for construction industry involves procurement, identification, transport and storage of materials in construction projects. The main objective of our study is to investigate the efficiency and its impact in application of inventory management system in construction of small scale projects. Identification of impacts and risk influence of inventory management systems in a small-scaleprojects. The lack of proper handling and storage of material in construction site has made it difficult to track and locate the material availability and suggestion about inventory management system and its control over efficiency construction projects will be analysed and the outcome of the effective utilization of inventory at construction site of small scale project to overcome the difficulties by giving best the possible recommendations. ABC analysis is one of the most conventionally inventory management system suited for construction infrastructure.

Development of Aluminium Metal Matrix Composite and Its Characterization
Authors:- Research Scholar Pavan Balappa Bagali, Registrar Professor Dr G. R. Selokar (Supervision)

Abstract:- The hardness of the composites increments with expanding the measure of fortification. Change in wear conduct of the rutile molecule fortified composites was checked with sliding separation at various stacking conditions. It was seen that wear pace of the all composites increments with expanding the connected burden from 9.8N to 49N. Delamination wear is unmistakable at higher burden as a result of the discontinuity of oxide layer which covers the surface because of the quickened oxidation of the metal surface layers in contact.The composites fortified with fine particles displayed better wear conduct when contrasted with composites strengthened with coarse particles. Fine size rutile particles have less molecule to molecule separation in the matrix which builds the ability to move the heap from matrix to molecule and henceforth decreases the wear pace of the composite. The postponed change in wear from gentle to extreme at temperature from 200ºC to 250ºC is seen in the 20wt.% rutile fortified composites at 9.8N burden. The composite with 20 wt.% of fine size particles shows better wear opposition at low loads and temperature conditions in contrast with other creted composites.

Diagnosis of Brain Tumor Identification Based on a Deep Learning Model
Authors:- M.Tech. Student S. Naveen Kumar, Assistant Professor & Hod P. Bhanu Prakash Reddy

Abstract:- A brain tumour is a dangerous problem and its categorization is a difficult work for radiologists because of the complex scenery of the tumour cells. Freshly, computer-aided diagnosis-based systems have confirmed as assistive tools, to diagnose the brain tumour, by MRI (magnetic resonance imaging). In modern applications of pre-trained designs, generally, features are removed from bottom layers which are separate from general pictures to medical check-up images. To conquer this difficulty, this research suggests a process of multi-level characteristics removal and concatenation for the early identification of a brain tumour. Two pre trained deep learning models i.e. Inception-v3 and DensNet201 obtain this model validly. With the guidance of these two models, two distinct summaries of brain tumour recognition and its categorization were evaluated. First, the characteristics from various Inception modules were removed from the pre-trained Inception-v3 model and concatenated these characteristics for brain tumour categorization. Then, these characteristics were transferred to the softmax classifier to analyze the brain tumour. Second, pre trained DensNet201 was use to eliminate characteristics from various Dens Net blocks. Then, these features were concatenated and distributed to the softmax classifier to analyze the brain tumour. Both summaries were evaluated with the help of a three class’s brain tumour dataset that is possible publicly. The advanced mode contributed 99.34 %, and 99.51% testing efficiencies individually through Inception-v3 and DensNet201 on testing examples and achieved the most powerful performance in the identity of brain tumour. As outcomes indicates, the introduced technique based on features concatenation utilizing pre-trained models outperformed as related to current state-of-the-art deep learning and machine learning-based techniques for brain tumour classification.

Agricultural Disease Identification Based on Feature Enhancement and Datfgan
Authors:- M.Tech. Student S. Naga Raju, Assistant Professor & Hod P. Bhanu Prakash Reddy

Abstract:- The agricultural economy needs to identify farming diseases. For farming disease image identification, collected imagery are usually blurred, which can be reach to poor identification results in original invention environments. The quality of picture has a notable impact on the identification efficiency of pre-trained picture classifiers. To eliminate this difficulty, the proposed scheme can generative adversarial network with dual-attention and topology-fusion mechanisms called DATFGAN. This system can efficiently convert unclear images into bright and high-resolution images. In addition to this, the weight sharing plan in our advanced network can significantly decrease the number of parameters. Laboratory results explain that DATFGAN yields extra visually satisfying results than state-of-the-art methods. Furthermore, managed images are estimated based on identification tasks. Detection of plant leaf disease through some electronic procedure is beneficial as it reduces an extra effort of monitoring in large fields of crops, and at the very early stage itself it identifies the marks of diseases i.e. when they arrive on plant leaves.

Manufacturing Of Bimetallic Pistons and Its Surface Integrity
Authors:- Research Scholar Sumeet Hangargi, Prof. G. R. Selokar

Abstract:- To ensure better bonding, the insert is dipped in the molten aluminium bath, this dipping time playing a vital role. Achieving the near net shape of the bimetallic pistons without damaging the bonding between the aluminium and cast iron is the major challenge. Weight reduction and wear resistance, bimetallic pistons are used. Aluminum alloy is reinforced with cast iron insert to realize the bimetallic pistons. Nevertheless, as far as machinability is concerned, achieving the near net shape of the bimetallic pistons without damaging the bonding between the aluminum and cast iron is the major crisis. The bond integrity after machining is primarily related to the magnitude of the cutting forces during machining and thus the objective of the paper is to obtain optimal cutting parameters in turning of such pistons. In addition, any machining process should also satisfy surface finish requirements. A Taguchi analysis of the influence of cutting speed, feed, and depth of cut on cutting force were conducted and the extent of debonding and the surface finish was measured.

A Review Article of Reduction Power Loss with Optimization of 33 Bus Load Flow System
Authors:- M.Tech. Scholar Bharat Shakya, Assistant Professor Durgesh Vishwakarma

Abstract:- Power flow analysis stands out as the foundation of power system preliminary research as well as design. They are really essential for planning, operation, economic scheduling and interchange of power between utilities. The primary facts concerning power flow analysis are to identify the magnitude and phase angle of the voltage at every single bus and the real and reactive power flowing in each transmission system lines. The load flow study in a power system comprises a study of extremely important significance. The analysis uncovers the electrical performance and power flows (real and reactive) for stipulated circumstances whenever the system is functioning under the consistent state. This paper gives an overview of various techniques useful for load flow study under distinctive stipulated conditions.

Packing Automation in a High Variety Conveyor line via Image Classification
Authors:-B. Arjun, Vidhu Hari, Dileep Chandran, Assistant Professor Ajay Basil Varghese

Abstract:- Due to the rise in computational power available, there has been a steady increase of interest in fields such as image recognition and machine learning. Consequently, one of the best areas for its application is in the field of factory automation since it requires processing of large amounts of image data within strict time constraints. Implementing such systems has become much easier due to the rise of machine learning frameworks such as Tensorflow. Hence implementing a Machine learning based inference model to do routine tasks such as object identification and verification can greatly increase the overall efficiency and offer great monetary returns by minimizing human labor. An SSD Mobilenet based model was used for this purpose for its speed and accuracy.

A Review Article of Improvement of Grid Connected Photovoltaic System Using Artificial Neural Network
Authors:-M.Tech. Scholar Soni Roy, Assistant Professor Durgesh Vishwakarma

Abstract:- Nowadays in order to meet the increase in power demands and to reduce the global warming, renewable energy sources based system is used. Out of the various renewable energy sources, solar energy is the main alternative. But, compared to other sources, the solar panel system converts only 30–40% of solar irradiation into electrical energy. In order to get maximum output from a PV panel system, an extensive research has been underway for long time so as to access the performance of PV system and to investigate the various issues related to the use of solar PV system effectively. This paper therefore presents different types of PV panel systems, maximum power point tracking control algorithms, power electronic converters usage with control aspects, various controllers, filters to reduce harmonic content, and usage of battery system for PV system. Attempts have been made to highlight the current and future issues involved in the development of PV system with improved performance.

Image Forgery Detection Using Convolutional Neural Network
Authors:-Alvina Aslam, Ankita Saxena, Sonali Saxena, Vaishnavi Raman Dwivedi
Assistant Professor Manish Gupta, Assistant Professor. Priyanka Goel

Abstract:- With the advancement of high-resolution digital cameras and photo editing software featuring new and advanced features, the chances of image forgery have increased. The images can now be altered and manipulated easily. Image trustworthiness is now more in demand. Images in courtrooms for evidence, images in newspapers and magazines, and digital images used by doctors are few cases that demands for images with no manipulation. In this paper we discuss some of the types of image forgery and techniques to fight against these forgeries. he revolution in the digital world is changing the way in which we share and manipulate data, but this revolution has introduced many critical security issues that hampers the integrity of digital media. Many sophisticated digital technologies and photo-editing software like Adobe Photoshop have made the manipulation of images a fair practice. As a result, digital images are becoming prone to forgeries and hence trust in digital images has been eroded. Digital forgery is now a nightmare to individuals (e.g. fake images of celebrities and public figures), societies (fake images targeting religion or race), journalism, scientific publication etc. The existing image forgery detection techniques are widely divided into two categories-Active Approach and Passive (blind) Approach. Active approaches rely on pre-registration or pre-embedded information. A shield is produced for the images to protect them from being manipulated. It is mainly based on digital watermarking. The main disadvantage of this approach is that the protection against manipulation must precede any attempt of forgery which means the pre-existing digital images and data cannot gain any profit using the approach. Passive approach overcomes this disadvantage; the pre-existing images can also be catered using this approach. In this project, we propose the use of Discrete Cosine Transform and a deep learning approach to learn features in order to detect tampered images. Among different types of image forgery, copy-move forgery is the most popular to forge the digital imaged where a part of the original image is copied and pasted at another position in the same image. Different methods have been developed to detect the image forgery in digital images. To address this issue, we present a pixel-based copy-move forgery detection method to check the genuineness of digital images.In this project we detect region duplication forgery by applying Discrete Cosine Transform. We divide the image into overlapping blocks and then search for the duplicated blocks in the image. Proposed method includes the following steps: (1) convert the color image into gray-scale image, (2) divide the gray-scale image into overlapping blocks of size 8 × 8, (3) feature extraction using DCT on the basis of different feature sets,(4) Implementation of Convolutional Neural Network.

Utilizing Cloud Computing for Stronger Healthcare Data Security
Authors:- Ashish Gupta, Akhilesh Bansiya

Abstract:- The main objective of this project is securely store and maintains the patient records in the healthcare. HealthCare is a data-intensive domain where a large amount of data is created, disseminated, stored, and accessed daily. The block chain technology is used to protect the healthcare data hosted within the cloud. Healthcare data contain personal and sensitive information that may be attractive to cybercriminals. Cybercriminals seeking to benefit financially from the theft of such data may sell the data to a third-party provider,. Such data would be of interest to certain organizations or industries. The block that contain the medical data and the timestamp. Cloud computing will connect different healthcare providers. It allows healthcare provider to access the patient details more securely from anywhere. It preserves data from attackers. The data is encrypted prior to outsourcing to the cloud. The healthcare provider has to decrypt the data prior to download.

Analysis of Channel Sensing Technique: A New Approach to Channel Estimating in Mobile OFDM System
Authors:- Atul Kumar , Akhilesh Bansiya

Abstract:-To analyse the performance of orthogonal matching pursuit (OMP)-based compressed channel estimation (CCE) with deterministic pilot patterns, we propose a mathematical framework by defining four normalized mean-square-errors (NMSEs): the total NMSE (NMSET), the NMSE on dominant channel components (NMSED), the NMSE caused by ‘lost errors’ (NMSEL) and the NMSE caused by ‘false alarms’ (NMSE F).Then, we derive a formula with a closed form for evaluating the upper-bound of NMSED in the ideal case (NMSED;UB). Using the proposed analytical framework, the main findings include the NMSE D;UB is determined by the following four parameters: the deterministic pilot pattern, the maximum Doppler shift, the number of dominant multipath components and the SNR the NMSE D;UB can be viewed as an approximation of practical NMSE T in case that the probability of the successes of OMP exceeds a certain threshold, in which both NMSE L and NMSEF are neglect able; using linear regression models, the practical bit-error-rate performance also can be predicted well based on the proposed NMSED,UB. We believe that the proposed framework provides a useful tool for adaptively optimizing pilot parameters according to rapidly time-varying channel conditions when using OMP based CCEs in mobile OFDM systems.

How Joyful Winds Turned to Turbulent Storm – Downfall of Jet Airways
Authors:- Vaibhav Jain, Namya Jain

Abstract:-After 25 years of soaring and raising standards of flying in domestic skies, India’s premium full service airline, Jet Airways completely halted it’s operations on 17 April, 2019. Founded in 1993 Jet Airways truly changed the flying experience and turned out to be first successful full service airline of the country. The airline enjoyed huge market share and strengthen it’s brand in early years of it’s commencement but the Indian environment is not conducive for the aviation industry. The industry faced certain challenges and with the rise in competition the situation got worse. This is not the first downfall of airline that the country has witnessed. Another full service flamboyant carrier, Kingfisher Airlines was also drowned in the similar fashion as Jet Airways in 2012. Two of India’s full service international airlines completely got shut in a decade raises questions on the scenario in which Indian airlines are operating, challenges the industry is facing and what measures government is taking to protect aviation industry. India, the second most populous country, is fastest growing aviation market and is currently world’s fourth biggest aviation market which shows the potential to jump to third spot in the coming years. Despite the fact airlines struggle to operate and failed to earn healthy profits essential to sustain in the market. Jet is not the only example of how an airline couldn’t sustain in the market, earlier Kingfisher also faced its doomsday back in 2012 and national carrier Air India is also at the mercy of the government where every year it sanctions special funds to keep airline flying. This sheds light that full service carriers have had faced troubles and still the airlines are operating on thin margins. New business model launched by budget carriers Indigo and Spicejet have made life even more difficult for full service carriers and people’s price sensitive nature and habits gave low cost carriers an edge over the full service airlines.

A Review on CFD Analysis for Erosion Effects on Elbows Containing Water Particles
Authors:- M.Tech. Scholar Harsh Singh Gurjar, Prof.Sujeet Kumar Singh

Abstract:-Erosion due to particulate impingement is the key factor responsible for damage of industrial pipeline. Sulfur particles carried by high-speed flow impact pipelines, which may cause equipment malfunctions and even failure. In recent years, Computational Fluid Dynamics (CFD) technology has been widely used in many industrial fields. Afterwards, multiphase flow simulation with the discrete phase model of CFD software had been extensively explored in various fields, including the effects of parameters of the continuous phase on erosion scars, simulation of erosion rate, and modification of the erosion model. In this study, a review work has been performed in the context of erosion effects on elbows containing water particles.

Android Malware Detection by Using Random Forest Algorithm
Authors:- Prof. Yogesh Pawar, Yash Gudhka, Manish Sutar, Pavan Godhani

Abstract:-Android is one of the biggest Operating System platforms in the world. By the end of 2019, Android has much advancement in its Operating System. Android is widely used due to its openness and the backup provided by Google. Google has launched its Google Playstore where Android users find applications for every need. Since Android is open to applications from other sources apart from Google Playstore, attackers find it easy to insert malicious code inside the Android application package file which can further harm the users. Hence to protect users from malicious applications Malware detectors are developed to find the malicious code within the APK file.

Multi-Grid Phase Field Skin Tumor Segmentation in 3D Ultrasound Images
Authors:-Lochan Gowda M, Poorvika Achar V, Madhushree C R, Likitha S, P Nanditha

Abstract:- The aim of this paper is to present a new method for skin tumor segmentation in 3D ultrasound images. We consider a variational formulation the energy of which combines a diffuse interface phase field model (regularization term) and a loglikelihood computed using non parametric estimates (data attachment term). We propose a multi-grid implementation with exact solutions that has the advantage to avoid space discretization and numerical instabilities. The resulting algorithm is simple and is easy to implement in multi-dimensions. Concerning applications, we focus on skin tumor segmentation. The clinical dataset used or experiments is composed of 12 images with ground truth given by a dermatologist. Comparisons with reference methods show that the proposed method is more robust to the choice of the volume initialization. Moreover, thanks to the flexibility introduced by the diffuse interface, the sensitivity increases by 12% if the initialization is inside the lesion, and the Dice index increases by 59%, if the initialization covers the entire lesion. These results show that this new method is well-designed to tackle the problem of underestimation of tumor volumes.

Smart Energy Meter Surveillance and Billing Using IOT
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Mohd Owais Khan, Syed Omer, Mohd Asif Uddin

Abstract:- Electricity plays a cordial role in a day to day life. The electrical energy consumption inIndia is the third biggest after china and USA with 5.5% global share in 2016. The per person energy use rate in India is closer to 0.7 kw. India share with global energy demand will rise to 9% by 2035. Internet of things is an emerging field and IOT based devices have created a revolution in electronics and IT. The foremost objective of this project is to create awareness manual work, our existing electricity billing system has major has major drawbacks. This system gives the information on meter reading, power cut and the alert system for producing an alarm when energy consumption exceeds beyond the specified limit using IOT. This idea is being implemented to reduce the human dependency to collect the monthly reading and minimize the technical problems regarding billing process. This paper extends the design and implementation of an energy monitoring system with pre-intimation of power agenda using Arduino micro controller and GSM module. The advantage of this system is that a user can understand the power consumed by electrical devices on the daily basis and can take a further step to control them and thus help in energy conversation. From the electricity board section, the information regarding the bill amount, payment and the pre -planned power shut down details are communicated to the consumer. If the customer does not pay the bill in time, the user is informed through a message. If still the customer does not pay a bill, then as per designated consideration on, one alert message will be sent automatically power connection is disconnected from the remote server.

Energy Saving and Safety System Automation
Authors:- Asst. Prof. Sandeep Sheelwant, Mohd Gulzar, Md Sadeq, Tajammul Ahmed Khan

Abstract:- The main aim of this project is to save energy,Wastage of electricity is one of the main problems which we are facing now-a-days.Manytmes we leave the room and hall without switching of lights and fans,thus electricity is wasted.In this work we have presented a system in which energy will be saved based on number of people entering in or leaving out of the room.If there is no person in the room,then light and fan will be switched OFF.On the other hand as soon as any person enters the room,light and fan will be switched ON. On the basis of the intensity of sunlight we can increase or decrease the intensity of light.

Driver Assistant Systems Applied by Deep Learning Technology : A survey
Authors:-Zainab A. M. Al-Bassam, Intisar Al-Mejibli, Nazhat Saeed Abdul-Razaq

Abstract:- Increasing the number of vehicles and the tremendous development in the used techniques in the vehicles. In addition to, the increase in traffic accidents, which led to the rising of systems’ invention ofDriver Assistance Systems (DAS)that assist the driver in driving safely and discovery the ways by warning the driver about the dangerous situation in real time.This paper presents a study that highlighted the main approaches, methods, algorithms used to make smart assistant systems in the vehicles which used different architectures, tools, and sensors: GPS, Camera, Stereo camera, LIDAR, and Radar, Based on Deep learning algorithms, Computer vision, combined with deep learning and sensor fusion for years from (2011-2020).

Estimation of Erosion Rate on Elbows Containing Water Particles Using CFD
Authors:-M.Tech. Scholar Harsh Singh Gurjar, Prof. Sujeet Kumar Singh

Abstract:- Erosion due to particulate impingement is the key factor responsible for damage of industrial pipeline. In this study, the simulation work has been performed by using the combination of CFD code ANSYS Fluent along standard k-є turbulent model. The schematic model consists of a 90 degree bend pipe in which R/D ratio were set to be 10 mm and 1.5, respectively. Considering the influence of inlet flow field on simulation, a 100-mm (10D) vertical downstream straight pipeline and a 100-mm (10D) horizontal upstream straight pipeline of elbow were used.Erosion rates for particles of different R/D ratio are investigated at different inlet particle velocity. The Taguchi method was applied to find which of the three parameters among R/D ratio, Velocity of fluid, and Inner diameter of the pipe has the most effect on erosion rate and hence the optimum solution is obtained. It was find that Erosion is serious at the extrados of elbow and the junction between downstream pipeline and the intrados of elbow and The R/D ratio of the pipes has the biggest impact on the erosion rate compared to the other two variable.

Study of Hybrid Annuity Model ( HAM) Contract in Highway Construction Contractor and Owner Aspect
Authors:- Assistant Professor Shakti Singh

Abstract:-Following the policy change in the mid-1990s India has embarked on a brisk pace of highway development that gave a high priority to highway development in country. In 1997 to develop a large highway network in a relatively short period of time the National Highway Development Programme (NHDP) was launched. In India, road projects are awarded via : Build-Operate- Transfer (BOT)-Annuity, BOT-Toll,Design, Build, Finance, Operate and Transfer (DBFOT) model and EPC (engineering, procurement and construction) contract. After the BOT model of Public Private Partnership (PPP), an advanced version of the Model Concession Agreement (MCA), presently called as Hybrid Annuity Model (HAM) is paving way for road projects. Now National Highway Authority of India (NHAI) has adopted Hybrid Annuity Model (HAM) for highway development . The hybrid model is supposed to be a win-win situation for the government and developers. The government is expected to fund up to 40 percent of the project cost while the remaining 60 per cent to be funded by the private player, and thus easing the financial burden on the exchequer as well. This paper discuss the various features of HAM in road sector of India, later it compares the Hybrid Annuity Model (HAM) with the conventional DBFOT model of road construction so as to find out the benefit and risk associated with HAM both for owner & contractor prospective.

Question Answering Schemes: A Review
Authors:- M. Tech. Scholar Machhirke Vinod Kumar Sadhuram, Asst.Prof. Aparna Soni

Abstract:-Question Answering Systems (QAS) are turning into a model for the eventual fate of web search. In this paper we present an investigation of the most recent examination around there. We gathered distributions from top gatherings and diaries on data recovery, information the executives, computerized reasoning, web knowledge, characteristic language handling and the semantic web. We recognized and characterized the subjects of Question Answering (QA) being investigated on and the arrangements that are being proposed. In this investigation we likewise recognized the issues being most explored on, the most mainstream arrangements being proposed and the freshest patterns to assist specialists with increasing an understanding on the most recent turns of events and patterns of the exploration being done in the zone of inquiry replying.

Data Safety on Android Devices
Authors:- M. Tech. Scholar Rumana Nigar Ansari, Prof. Lakshita Landge

Abstract:- Today, everybody fundamentally requires an advanced cell. There are enormous measure of conceivable outcomes and various degrees saw in various zones of the portable world. With this fast development in portable administrations the analysts are frightened about the security dangers and are working upon it by making sure about the foundations which bolster the online-interface and other conveyed administrations. In this paper, we examine about utilizing AES calculation for dealing with the information of Android cell phones. The goal is to offer such types of assistance which can make sure about clients’ information. This information security procedure of PDAs is very novel.

Alcohol Drunk and Drive Accident Prevention System
Authors:- G. Adarsh, Rahul P.R, Vishnu Santhosh, Assistant Professor Prof. Simi M.S

Abstract:- Every year, people are injured or killed on the road because of drunk driving. In this prototype, we are making an attempt to prevent users from starting the car if they have consumed any alcohol and if they haven’t worn their seat belt. This system will take advantage of an MQ3 alcohol sensor, which is mounted on the seat belt of the driver seat. The reading from the sensor unit is compared with the allowed threshold value by the Raspberry Pi, if the driver is found drunk, the ignition locking system will prevent the driver from starting the car. The system is also mounted with a camera (Raspberry Pi Camera) to detect the driver’s presence so that the user may be prevented from trying to compromise it. The engine is started only when the user clears the alcohol test and the seat belt is engaged. The project is aimed to be implemented in real life to reduce the number of accidents caused by drunk driving and the carelessness of the driver to engage the seat belt.

A Study of Routing Protocol in Manet
Authors:- M.Tech. Student Muni, Rupali Malhotra

Abstract:- A mobile and ad-hoc network (MANET) is set of mobile nodes which communicate over radio and do not need any infrastructure. This kind of networks is very flexible and suitable for several situations and applications. Nodes not only have to fulfill the functionality of hosts, but each node has also to serve as a router, forwarding packets for other nodes. However, the performance of such networks has to be improved before this can be realized. Here in this paper I have proposed 2 step improvements in Ant Based Routing Protocol for enhancing improvement in the network and to reduce overburden of the network.

Neural Network Training by Genetic Algorithm Selected Feature for Intrusion Detection
Authors:- M.Tech. Scholar Pakija Sehar, HOD Dr. Avinash Sharma

Abstract:- With large increase of internet users network security is important issues in today era. As variety of users have different requirement, so proper identification of safe network is required.

Substation Automation Using PLCand SCADA
Authors:- Mohd Mansoor Ali, Ahmed Abdul Fatha, Md Uzairuddin, MA Hameed

Abstract:- The role is of substation is become more important in power system. The generating stations, transmission lines and distribution systems are the main components in substation system transmission lines switching, parameter measurement, fault detection and storing of historical data are carried out in each of the substation. Previously these activities was carried out manually, as complexity of system increase the role of substation become crucial and we need to move towards the use of IEDs and Automation. Activities carried out at substation are categorized in to three terms. supervision, control and Data acquisition. In an automated substation these are will be done using Programmable Logic controller and SCADA. For system monitoring or supervision data is given to controllers from RTU. Control command according to system parameter is produced by PLC and SCADA provide human machine interference. Substation automation systems make their control and monitoring possible in real time control and availability, reliability and security of the system.

Energy Efficient Integrated Protection System for Photovoltaic Microgrids
Authors:- M.Tech. Scholar Rajneesh Kumar Patel, Prof. Aaradhna Soni

Abstract:- Microgrids have proven to be a promising solution for the integration and management of intermittent renewable energy production. This article focuses on the main issues surrounding microgrid management and protection. It proposes an integrated control and protection system with a hierarchically coordinated control strategy. The strategy includes independent operating mode, grid-connected operating mode and microgrid conversion between these two modes. To improve the system’s faulty operating capacity, a comprehensive three – tier hierarchical protection system is also proposed, which fully adopts various protection schemes, such as relay protection, hybrid energy storage system (HESS) rules and emergency control. . The efficiency, feasibility and applicability of the proposed system are verified on the actual photovoltaic (PV) microgrid. It is expected that the research will provide general theoretical guidance and technical design experience for microgrids.

Security on Wireless Sensor Network
Authors:- Rajesh Rekwal, Asst. Prof. Lokesh Parashar

Abstract:-The dispersed nature and vibrant topology of wireless sensor network have some basic requirements that include reduced energy utilization and extended network’s lifetime. In this paper, we have focused on hierarchical protocols. In such protocol the nodes are arranged in clusters. To synchronize action and route data, cluster head are selected one per cluster. We have introduced a new approach in wireless sensor network for selecting the cluster-head by making use of artificial neural network in order to increase network’s lifetime. We have used residual energy as a factor to make cluster-head. Radial basis function network model is used for cluster-head selection problem. The simulation results provide network’s performance on the basis of some factors including number of dead nodes, total energy consumption, cluster head formation, number of nodes dying and the number of packets transferred to base station and cluster head. The performance of the proposed algorithm is compared with LEACH and LEACH-C based on energy efficiency and improved network lifetime.

Power Saving Using Variable Frequency Drive
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Mujahed Hussain Khan, Syed Faizan, Mohammed Khaled Siddiqi

Abstract:- As the demands of industrial needs varying the more outputs of the precise control of our basic electrical prime movers i.e. motor. As compared to AC motors the DC motors are easy to control but with increase in capacity they have their own limitations. Conversely AC motors particularly the Squirrel Cage induction motors are more economical but the speed control of these motor are quiet difficult because alteration of supply frequency is require. Nowadays with technological advance mentin drives system,the control of AC motors is more economically,easy to use and the control the range of speed both below and above the basespeed.According to the requirement, these drives can fundamentally alter the voltage and the frequency which is being fed to the motor using the technique called Pulse Width Modulation (PWM). Because of user friendly feature and reasonable cost these devices are gaining more popularity.As the Variable Frequency Device use the embedded system they can be programmed for automatic control reducing the manual intervention and interfaced to thecomputer.In the field of HVAC application the usage of Variable Frequency Drive have gained its number. Air handler, chiller, pumps and tower fans are the common application of VFD. A better understanding of Variable Frequency Drives with leads to improve in usage and determining of some appliances and High Voltage AC systems.A basic knowledge of operations, its terms, energy savings,and about the power factorsisma in aimof his dissertation also Harmonics mitigation by VFD and a simulation project to show how VFD is beneficial for energy savings. In addition to this paper will discuss the comparison between Variable Frequency Drives and of the technologies with respect to industrial standards.

Trust Based Authentication for Vehicular Ad Hoc Networks
Authors:- Rajendra Thakur , Assistant Prof. Lokesh Parashar

Abstract:- Since Vehicular ad hoc networks (VANETs) are vulnerable to various kinds of attacks, there is a need to fulfill the security requirements like message privacy, integrity, and authentication. The authentication technique is said to be efficient if it detects compromised nodes accurately with less complexity, reduced authentication delay, and keying overhead. In this paper, a trust-based authentication scheme for cluster-based VANETs is pro- posed. The vehicles are clustered, and the trust degree of each node is estimated. The trust degree is a combination of direct trust degree and indirect trust degree. Based on this estimated trust degree, cluster heads are selected. Then, each vehicle is monitored by a set of verifiers, and the messages are digitally signed by the sender and encrypted using a public/ private key as distributed by a trusted authority and decrypted by the destination. This verifies the identity of sender as well as receiver thus providing authentication to the scheme. By simulation results, we prove that the proposed technique provides high security with less over head and delay.

Using Raspberry PI IOT Home Automation
Authors:- Assistant Prof. Asra Sultana, MD Irshad Ali, Syed Mahaboob Jamaiz, Mirza Mahboob Ali

Abstract:- Internet of things is a technology of the future that has already started to touch our homes.The proposed system consists of a microcontroller-based circuit that has lights and fan connected to it along with Wi-Fi connector interfaced with our system. The user gives input commands through the smart phone which is interfaced with Wi-Fi connector in the circuit which is interconnected to microcontroller and Loads are operated remotely. This microcontoller is raspberry pi which is programmed to do switching operation of load. Thus we automate home appliances over internet using raspberry pi.

RO-PUF Delay Path Sensor
Authors:- PG Students T. Usha, Dr.V.J. Arulkarthick,

Abstract:- There are different factors that one would like to optimize when designing a VLSI circuit. Often they cannot be optimized simultaneously, only improve one factor at the expense of one or more others. The design of an efficient integrated circuit in terms of Power, Area and Speed has become a very challenging problem. To quickly perform measurements and evaluate the test results Automatic test equipment or automated test equipment (ATE) is used to performs test on a device, device (DUT), equipment under test (EUT) or unit under test (UUT).Though it was efficient in calculating characteristic of internal circuit, but the cost in computing the calculation an timing efficiency is very high. To address these issues, delay sensors are more and more frequently implemented on hardware and embedded into the System-Under-Test (SUT).It decreases the cost of testing and implementation. The Existing technique can be used for delay estimation, delay characterization and on-demand, real-time, estimation of the delay of cell-based array logic units such as multipliers. In chip manufacturing technology, reduction in chip size possesses great concern for power dissipation. Low power testing has become an important issue as power dissipation during testing mode is very high as compare to normal mode. PUF is used in testing of ASIC chips by generating pseudo random patterns. Instead of RO in existing method has been replaced by PUF circuit.

Real Time Attendance Marking System Using Face Recognition Approach
Authors:- Aparna K S, Ashwini Shirali, Bhoomika S, Gagana T S, Asst. Prof. M. Pavan

Abstract:- In real time taking the attendance in the classroom is a time-consuming task. Faculties face many problems in taking attendance manually. Manual attendance system is time consuming; it takes about 10 minutes to just mark attendance.In the present paper a real time automatic Attendance marking system using face recognition approach has been discussed. Face recognition has wider application and it is a good approach as compared to Biometric methods. Here Face recognition system is developed based on different machine learning concepts. We used HOG feature extraction technique in order to extract features of the face. We have planned to recognize multiple faces in the video which is taken in the classrooms.

Smart Waste Monitoring System Using IoT
Authors:-Chithkala H S, Deeksha S, Kavyashree Olekar, S Sujitha, Akshay M J

Abstract:- Waste management plays a major role in the country whose population grows exponentially. It is a systematic process consisting of collecting, transporting and disposing of garbage, sewage and other waste materials. One of the major problems in the current scenario is the unhealthy status of the dustbins. The monitoring can be done smartly by using the Internet of Things for transmission of the dustbin status. Arduino UNO is used to interface different sensors. The ultrasonic sensor is used to detect the user and automatically opens the dustbin lid. IR sensor will show the level of garbage filled in dustbin. Soil moisture sensor and IR sensor are used for segregating the dry and wet waste. Flame sensor is used for giving flame alert. The authority can get the status of the bin using Blynk app and notification is sent to both user and municipal authority when the dustbin is full.

Smart Waste Monitoring System Using IoT
Authors:-Chithkala H S, Deeksha S, Kavyashree Olekar, S Sujitha, Akshay M J

Abstract:- Waste management plays a major role in the country whose population grows exponentially. It is a systematic process consisting of collecting, transporting and disposing of garbage, sewage and other waste materials. One of the major problems in the current scenario is the unhealthy status of the dustbins. The monitoring can be done smartly by using the Internet of Things for transmission of the dustbin status. Arduino UNO is used to interface different sensors. The ultrasonic sensor is used to detect the user and automatically opens the dustbin lid. IR sensor will show the level of garbage filled in dustbin. Soil moisture sensor and IR sensor are used for segregating the dry and wet waste. Flame sensor is used for giving flame alert. The authority can get the status of the bin using Blynk app and notification is sent to both user and municipal authority when the dustbin is full.

Accident Detection and Messaging System using GSM and GPS Module
Authors:- K. Tejesh, Assistant Professor Priya

Abstract:- With the growing population the use of cars has emerge as superfluous and this has brought about growth in the range of injuries at an alarming price. This project objectives at detecting the accident and reporting the location of coincidence to the previously coded numbers. This facilitates in a fast carrier from the ambulance and the involved individual. The GPS and GSM era is used to find the position of the car in the shape of latitude and longitude coordinates and sends it thru SMS. Piezoelectric and alcohol sensors when prompted, help in detecting the twist of fate and sending the sign to the micro controller of the system. This similarly enables in sending the message to the involved individual. This device can help groups in the condo car enterprise to keep a track of the vehicular activity through sending message at normal intervals to the authorized numbers.

Fraud Detection: In Airline Loyalty Program UsingMachine Learning
Authors:- Cherian P Bright, Prof. Kuttyamma A J

Abstract:- almost all the airlines within the world have currently designed frequent-flyer programs that enable airline customers to be a neighbourhood of the program to accrue points or miles which can then be redeemed for aviation or the other rewards designed by the airline. Points earned under Frequent Flyer Programs could also be supported the category of fare, distance flew thereon airline or its partners, or the quantity paid. There are other ways to earn points. For instance, in recent years, more points are earned by using co-branded Loyalty and debit cards than by aviation. Differently to earn points is by pocket money at partner shops, car hire companies, hotels, or other co-partner businesses. Points are often redeemed for air and non-air travel, other services, or for increased benefits, like class upgrades, airport lounge access, means access, or priority bookings. Loyalty points are like currency! The increase of loyalty programs amongst airlines over the years has offered more options to monetize air miles’ balances built up by their customers. But this has spawned an increase of fraudsters too. During this age of digital transformation, airlines have a fundamental duty in fixing flexible and well-layered defines systems which will keep off the thrate of cyber criminals.The matter of monetary Fraud has increased abruptly nowadays. Losses thanks to the fraud transactions are costing billions of dollars per annum to the Airline Industry. To tackle this problem, decision systems that use efficient fraud detection algorithms should be invented. With the support of recent technologies, these systems can manage to research the knowledge and to make a prediction feature model. However, the invention of those systems isn’t a simple but quite challenging task thanks to the large amount of various and unbalanced data. Moreover, it’s tough to make a decision on which machine learning algorithm should be implemented for various business use cases.

A Systematic Review on Block chain Technology in Cloud Computing
Authors:- M. Tech. Scholar Shashi Kumar, Professor Dr. Varsha Namdeo

Abstract:- A health care cloud is a cloud computing service used by health care providers for storing, maintaining and backing up personal heath information (PHI) . Transforming healthcare via the cloud is about more than just the delivery of medical information from multiple computers at anytime, anywhere, and on any mobile device. It’s also about the benefits of being able to connect medical centers and cloud users for the purpose of sharing patients’ health data over the Internet. In this paper a blockchain based concept used to maintain healthcare data Blockchain can help protect the healthcare network.Cloud computing is the delivery of computing and storage space as a service to a distributed community of end users.The schema/model of Cloud computing is, all the servers, networks, applications and other elements related to data centers are made available to end users. Cloud computing is growing now-a-days in the interest of technical and business organizations but this can also be beneficial for solving social issues. Cloud computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.

Hybrid Power Generation by Using Solar and Wind Energy
Authors:- Assistant Professor Aqsa Fatima, Mohd Ibrahim, Rehan Ahmad, Imran Khan

Abstract:- Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy resources takes place i.e. wind and solar energy. This process reviles the sustainable energy resources without damaging the nature. We can give uninterrupted power by using hybrid energy system.Basically this system involves the integration of two energy system that will give continuous power.Solar panels are used for converting solar energy and wind turbines are used for converting wind energy into electricity. This electrical power system can be utilize for various purpose. Generation of electricity will takeplace at affordable cost. This paper deals with the generation of electricity by using two sources combine which leads to generate electricity with affordable cost without damaging the nature balance.

A Review of Ggbs and Steel Fibre Performance in High Performance Concrete
Authors:- M.Tech. Scholar Naincy Gupta, M.Tech. Scholar Mohd Rashid, Assistant Professor Nitish Jauhari

Abstract:- India is producing enormous amounts of industrial by-products out of which 150 million tonnes of GGBS itself. Apart from disposal of this solid waste, engineers strive for its value addition through its use as a construction material for achieving better economy, eco-friendliness without compromising on technical aspects. Varieties of concrete are mixed with GGBS as a replacement material for cement to understand its compressive strength and long term behaviour. It is seen from literature that the fibers enhance the performance of concrete. Accordingly, six trials were made with GGBS replacement along with variation of cement content, water cement ratio and steel fibers with aspect ratio 60 and variation in reinforcing indices. The workability of concrete increased with increasing the GGBS content and also observed there is a reduction in workability in fiber reinforced concrete. The results indicated that the concrete made with GGBS indicates the strength comparable to the concrete made with OPC for all replacement levels. There is a substantial decrease in strength at 80% replacement. While there is a substantial increase in long-term strength. The compressive strength of GGBS concrete was increased up to 19% than that of OPC concrete and also observed 5 to 12% strength increased in fiber reinforced concrete than GGBS concrete. For this purpose studied the compressive strength of concrete at the ages of 3, 7,28,56,90 and 180 days.

Event Handling in Java
Authors:- M. Amitha Reddy

Abstract:- This paper explores the definition and importance of event handling in Java with focus on different event handling classes. We will aslo see that we cannot write a GUI program without event handlers. Most events to which the program will respond are generated when the user interacts with a GUI-based program. These are the types of events examined in this paper. They are passed into the program in a variety of ways, with the specific method dependent upon the actual event. There are several types of events, including those generated by the mouse, the keyboard and various GUI controls, such as a push button, scroll bar or check box. This paper begins with an overview of Java’s event handling mechanism. It then examines the main event classes and interfaces used by the AWT and develops several examples that demonstrate the fundamentals of event processing.

Reinforcement Learning for Wireless Sensor Networks based on ISVM
Authors:- Palaghat Hariharan Lakshmi

Abstract:- Application performance and energy consumption deep exposed to task scheduling of nodes in wireless sensor networks (WSNs). Unreasonable task scheduling of nodes leads to excessive network energy consumption. Thus, a Q-learning algorithm for task scheduling based on Improved Support Vector Machine (ISVM) in WSNs, called ISVM-Q, is proposed to optimize the application performance and energy consumption of networks. Energy consumption of task scheduling is associated with a reward of nodes in the learning process. To solve the “dimensionality disaster” problem of Q-learning, SVM is introduced as a value function approximation. Parameterizations of SVM function can strengthen the interpretation characteristics by using experience knowledge. Experiments show that ISVM-Q has the ability to make nodes perform tasks reasonably in a dynamic environment. Compared with classic task scheduling algorithms, ISVM-Q achieves better application performance with less energy consumption and keeps the learning system stable.

Heat Transfer Augmentation Techniques for Double Pipe Heat Exchanger
Authors:- M.Tech. Scholar Arshad Kamal, Professor Rohit Kumar Choudhary

Abstract:- Nowadays for enhancing the convective heat transfer in various industries such as thermal power plants, chemical processing plants, air conditioning equipment, refrigerators, petrochemical, biomedical and food processing plants heat exchangers are employed with twisted-tape inserts have widely been applied. By employing, twisted tape insert bring together swirl into the fluid flow which subsequently interrupts a thermal boundary layer on the tube surface. The thermal performance of heat exchangers can be improved by heat transfer augmentation techniques. Tape insert is one of the passive heat transfer augmentation technique and used in utmost heat transfer application, for example, air conditioning and refrigeration systems food processes. Therefore, various enhancement techniques have been reviewed.

A Review on Application of Statistical Quality Control Tools in the Manufacturing Industry
Authors:-M.Tech. Scholar Shubham Madke, Professor Dr. P.L. Verma, Associate Professor Sanjay Jain

Abstract:- In this paper, a review of the systematic use of statistical quality control tools is presented. The main aim of this paper is to provide an easy introduction of statistical quality control tools and to improve the quality level of manufacturing processes by applying it. Quality control tools are the means for collecting data, analysing data, identifying root causes, and measuring the results. These tools are related to numerical data processing. All of these tools together can provide great process tracking and analysis that can be very helpful for quality improvements. These tools make quality improvements easier to see, implement, and track. The work shows continuous use of these tools upgrades the personnel characteristics of the people involved. It enhances their ability to think generate ideas, solve problems, and do proper planning. The development of people improves the internal environment of the organization, which plays a major role in the total Quality Culture.

Dynamic Analysis of Laminated Composite using ANSYS
Authors:-M.Tech. Scholar Mukesh Kumar Mandal, Professor Nitesh Kushwaha

Abstract:- In this investigation free vibration analysis of a composite plate is presented. An orthotropic plate with symmetric fibre orientation was considered for this study. The material properties were fixed. The natural frequencies were computed for different boundary conditions, hole-shape, aspect ratio, and fibre orientation. The effect of these variables on the nature of vibration is analysed and discussed. Also, the natural frequencies of a laminated composite plate with holes of various sizes were considered in order to examine the effect on the fundamental natural frequency. The eight noded shell 281 was used throughout the analysis. ANSYS 15.0 is used for modelling and analysis of the laminated plates. The Natural frequencies of the finite element (FE) were analysed by the ANSYS software.

The Limitations of RFID Implementation inRetailSupply Chain in IndiaA Case Study of the Hyderabad Region
Authors:-Rekha Gulle

Abstract:- – Efficient management of Supply Chain is increasingly becoming the most important method of attaching sustainable competitive advantage for the retail industry globally. However, supply chain management itself is challenged by several issues. These include product flow, out of stock and out of store phenomenon, data and inventory inaccuracies, the bullwhip effect is few of them. The manual routines adopted in most supply chain functions are seen to be the main cause of these issues and automation is considered to be a most effective remedy. While automation through bar code has achieved a fair degree of success, RFID’s are proving to be a more effective complement and alternate to bar coding. The business and operational efficiencies that accrue through RFID’s have already been proved in the countries of Europe and America. However, despite this their proliferation is still limited in India. That they be adopted more widely particularly in the retail industry in India is fast becoming an imperative in light of the fact that retail is one of the fastest growing and most important industry verticals within the country. This research attempts to ascertain what are the barriers to the incorporation of RFID into the supply chains of Indian companies and to posit possible solutions to the same. The empirical study was conducted in that region most representative of industry in India, Hyderabad. It was found that the main reasons inhibiting the spread and use of RFID in India were cost, labour, privacy issues, lack of government support and technical issues. Hence the proliferation of RFID in India will depend on the extent to which these issues are solved or sorted out. The possible solutions to these issues have also been identified in this research. The author believes that the implementation of solutions will greatly aid in the proliferation of RFID in industries throughout the country.

Natural Radioactivity Levels of Nile Water in Qena Governorate
Authors:- N. K. Ahmed, A. Abbady, K. Salaheldin, F. M. Abdallah

Abstract:-Total of 53 water samples were collected from Nile River at three different locations, Southern area (Qus region), Central area (Qena region), and Northern area (Nagi-Hamadi region), within Qena governorate, south of Egypt. 226Ra, 232Th, and 40K – were measured by low-level gamma-ray spectrometer NaI (Tl). The average values of 226Ra, 232Th and 40K were 0.44±0.009, 0.22± 0.001 and 4.73±0.10Bq/L, for Qus region respectively, but for Qena region the values were 0.50±0.0039, 0.45±0.0035 and 5.46±001Bq/L. – In Nagi-Hamadi region the activity concentration was 0.29±0.0019, 0.19±0.001 and 4.12±0.08 for 226Ra, 232Th and 40K respectively. The radium equivalent activity (Raeq) and absorbed dose rate (D) for all samples under studying were agree with the world average value. These values present no hazards tohuman.

Investigation of Radium Content and Radon Exhalation Rates in Archeological Areas in Luxor Governorate
Authors:- H. H. Negm, N. K. Ahmed, A. Abbady, M. M. Reda

Abstract:- In this study, long –term technique for alpha guard have been used to count radium content and radon exhalation rate in archaeological specimens.Specimens collected from Elkebash street, west bank, Luxor and Elkarnak temples. The values of radium contents were ranged from 181.12 to 236.04 with average value 207.919,from 89.41 to 151.84 with average value 122.42 , from 121.68 to 217.856 with average value 167.89and from 66.46 to 106.75 with average value82.26 for Elkebash, luxor temple ,west bank and ELkarnak temple respectively .In the other hand the Mass Exhalation Rate (EM)were from 0.99 to 1.78 with average value 1.5 ,from 0.67 to 1.14 with average 0.92 from 0.91 to 1.64 with average value 1.27 and from 0.50 to 0.80 with average value 0.62 for Elkebash, Luxor temple ,west bank and ELkarnak temple archaeological specimens while the Area Exhalation Rate (EX)for Elkebash, Luxor temple ,west bank and ELkarnak temple were from 8.39 to 15.04 with average value 12.65 ,from 8.39 to 14.04 with average 11.77 , from 7.4 to 13.3 with average value 10.23 and from 5.48 to 6.9 with average value 6.2 respectively.

Online Gas (LPG) Booking System (A Case Study of LPG Stations in Ghana)
Authors:- Dr. Egho-Promise Ehigiator Iyobor, Michael Ofosu-Appiah, Sandra Osei Somuah, Sarah Asabea Addo

Abstract:- Liquefied Petroleum, Gas (LPG) has become the cleanest, effective and efficient petroleum for domestic and commercial use. It is used in vehicles, for cooking, baking, etc. Although LPG is the most patronized and cost effective fuel for households and commercial use yet there is a major challenge associated with buying the gas at the stations. There is always long queue of people at the LGP stations especially during scarcity and this has become a persistent problem for several years in Ghana. In this study, an efficient web-based system will be designed and developed to avoid this unnecessary long queue and wasting of time at the gas stations.

A Survey on Features and Techniques for Student Data Analysis Performance Prediction
Authors:- Research Scholar Smt. Rhicha Tiwari, Dr. Prabhat Pandey

Abstract:- Large amount educational data is available in educational institute which can be utilized for analysis of improvement in academic performance. Number of academic activities work store in in educational data with some other feel like student locality, family e background. So researcher perform mining activity in such kind of data further enhance the capabilities of good scholar and find reason for Scholars who are not scoring good marks in their academic performance. This paper is collection of research activity performed by other scholars to analyse educational data and extract fruitful information. Paper has detailed some of of data analyzing techniques for prediction of student performance as per the academic activities or student involvement. Some of basic features related to academic data set analysis were also summarize in paper where combination of different features were also shown which help to extract good information for improvement of student performance. At last sum of evaluation parameters were also detail for comparison of different methods proposed for student performance prediction.

Exploring Earth and Moon in Virtual Reality
Authors:- Dr. Archana Ajit Chaugule, Shripad Agashe, Ashutosh Rane,
Parth Borate, Kunal Bhalekar

Abstract:- The principles of virtual assembly and the process of general assembly are analysed and conversed in this thesis. Meanwhile, parts parametric model creation and assembly, as well as component parts of assembly interference analysis are analysed in Unity .Virtual Assembly, the key to application of virtual reality technology in design and manufacturing, has drawn much courtesies of corporation and investigator. The exact design flow of virtual we assembly was given on the theory of virtual assembly included its gears of diesel engine was acted as an object to as assemble practically. By assembly inspecting and modifying, the assembly of the machine in virtual environment was available. Our VR system has three features; (a) it synthesizes highly realistic VR video from the data captured in actual assembly, (b) it estimates the reaction of the user to the VR spur by capturing the 3D locations of full body parts, and (c) it consists of off-the-shelf devices and is easy to use. Our demonstration provides users with a chance to experience our VR system and give them some quick feedback by visualizing the estimated 3D positions of their body parts.

Educational Data Mining in Education System
Authors:-M. Tech. Scholar Nandini Sahu, Head of the DepartmentProf. Lakshita Landge

Abstract:– The capacity to screen the advancement for students’ academic execution is an essential issue of the educational Group from claiming higher Taking in. An arrangement to dissecting students’ comes about dependent upon group dissection and utilization standard measurable calculations with organize their scores information as stated by the level about their execution may be portrayed. In this paper, we also actualized the k-mean grouping algorithm for examining students’ consequence information. Those model might have been consolidated for those deterministic model should dissect those students’ effects of a private foundation clinched alongside % Iberia which is a great benchmark with screen the progression of academic execution about people for higher institutional to the reason for making an successful choice by those academic organizers.

Question Answering Schemes: A Review
Authors:- M. Tech. Scholar Mohini Malviya, Assistant Prof. Manoj Soni

Abstract:- Question Answering Systems (QAS) are turning into a model for the eventual fate of web search. In this paper we present an investigation of the most recent examination around there. We gathered distributions from top gatherings and diaries on data recovery, information the executives, computerized reasoning, web knowledge, characteristic language handling and the semantic web. We recognized and characterized the subjects of Question Answering (QA) being investigated on and the arrangements that are being proposed. In this investigation we likewise recognized the issues being most explored on, the most mainstream arrangements being proposed and the freshest patterns to assist specialists with increasing an understanding on the most recent turns of events and patterns of the exploration being done in the zone of inquiry replying.

Reinforcement Learning for Wireless Sensor Networks based on ISVM
Authors:- Palaghat Hariharan Lakshmi

Abstract:- Application performance and energy consumption deep exposed to task scheduling of nodes in wireless sensor networks (WSNs). Unreasonable task scheduling of nodes leads to excessive network energy consumption. Thus, a Q-learning algorithm for task scheduling based on Improved Support Vector Machine (ISVM) in WSNs, called ISVM-Q, is proposed to optimize the application performance and energy consumption of networks. Energy consumption of task scheduling is associated with a reward of nodes in the learning process. To solve the “dimensionality disaster” problem of Q-learning, SVM is introduced as a value function approximation. Parameterizations of SVM function can strengthen the interpretation characteristics by using experience knowledge. Experiments show that ISVM-Q has the ability to make nodes perform tasks reasonably in a dynamic environment. Compared with classic task scheduling algorithms, ISVM-Q achieves better application performance with less energy consumption and keeps the learning system stable.

Preparation and evaluation of wine from Sugarcane and
carrot juice

Authors:- Dhilip KumarM., RagaventhiraV., PreethiG., SowmiyaP.,
BalasubramaniV., Soundhara Pandiyan R.

Abstract:- Wine is one of the functional fermented food that have many nutritional benefits. Wine is produced by the fermentation of yeast which involves the conversion of sugar to alcohol. It can acts as a nutritional supplement for many fruits and vegetables. In the present project, sugarcane and carrot juice was used for the preparation of wine. Fermentation is carried out with Saccharomyces cervisiae. It is commonly known as bakers yeast. Sugarcane ( Saccharum officinarum) juice which contains high amount of sugar and so it is used as a raw material. It is rich in calcium, magnesium , iron and other electrolytes. Carrot ( Daucus carotasubsp.sativus) juice is rich in vitamin A and C and it is a good source of antioxidants also. The main purpose of study is to develop the wine by adding sugarcane and carrot juice. Among the sugarcane blended with carrot juice non-pasteurized blended at 48.7% and PH 4.3 during the time of fermentation was observed. After five months of storage, alcohol content in the wine was increased. Therefore, the storage improves the quality of wine.

A Game Based Implementation of Minimax Algorithm Using AI Agents
Authors:- Ishank Lakhmani, Vartika Punjabi

Abstract:- This paper reports our analysis of results obtained after applying minimax algorithm for the implementation of an ultimate tic-tac-toe. We use a heuristic function to obtain the best possible move and, as soon as the game ends, then the updated method is propogated from the final move to the first move using backward chaining. That is how the agent learns. The performance of the agent is assessed by taking full-board and partial board representations. The game developed allows agent to play against other AI agents and human players also hum players to play against other human players.

IOT Based Light Monitoring System in Shopping Malls Parking
Authors:- M.P. Geetha, Asst. Prof. Sonali R, Nivetha V, UG Students Suriya S

Abstract:- This project aims for designing and executing the advanced development in embedded systems for the energy saving of smart lights. Currently, we have a manual system where the lights will be switched ON in the shopping malls parking. This project gives a solution for electrical power wastage. The proposed system provides a solution for energy saving. This is achieved by sensing and approaching a vehicle using an ultrasonic sensor. Upon sensing the movement, the sensor transmitted the data to the Arduino which makes the light switch bright. Similarly, as soon as the vehicle or an obstacle goes away the Light gets switched dim as the sensor senses any object at the same time, the status (Bright/Dim) of the smart light can be accessed from anywhere and anytime through the internet. This project is implemented with a smart embedded system that controls the smart lights based on the detection of vehicles or any other obstacles on the shopping malls parking. Using wi-fi , Whenever the obstacle is detected on the parking within the required time the lights will get automatically Bright/ Dim consistent and therefore the same information can be accessed through the internet. The real-time information of the smart light (Bright/Dim) status can be accessed from anytime, anywhere through the internet within the specified range.

Design and Fabrication of Automatic Grass Cutter
Authors:- Asst. Prof. S.Sumathi, S.Vimal Gomathy Sankar, K.Priyangapriya, AR Nilanchala

Abstract:- In today’s world ,Automation is very important part for invention.The present technology commonly used for cutting the grass over the field which creates pollution and loss of energy. The old grass cutter need to be replaced by automated one where system will work for guidance Automatic grass cutter will reduce the effort required for cutting grass in the lawns. Powersupply is used to run the motor and various sensors will be used to detect and avoid the unnecessary objects in the field during operation.This device show that how technology can be used to reduce human effort. so we are trying to make a daily purpose machine which is able to cut the grasses in lawn.Itwill project the operation aand obstacle detection.The grass cutting machine is available in various type like reel (cylinder), mower, rotary and mulching mower, professional mower. But these are very costly and unaffordable.Eventually,the improvement of redesign grass cutting machine finally will able to meet user requirement andsatisfactions.

Social Distancing Protocol Using Arduino
Authors:- Panthangi Sai Lohith

Abstract:- In view of the current situation the COVID-19 has become ubiquitous in every corner of the world. We must aim at preventing the community spread of the virus. To achieve this we must make sure a proper social distance is maintained from individual to individual. To make sure that a proper social distance is maintained from individual to individual I came up with the idea of social distancing device using Arduino uno.The main aim of this is to make sure a proper distance is maintained among individuals so that community spread of virus can be diminished. Here ultrasonic sensors are installed on three sides of the cap so it that measure the min imumdistance to be maintained by the individual in 360 degrees. Alsoa buzzer is installed which alerts the individual by giving a buzzer upon not maintaining a minimum distance.I used Arduinouno along with ultra sonicsensors and buzzer to indicatealerts.

Exact Series Solution for Vibration of Restrained Composite Plate
Authors:- Ahmed M. Farag El Sheikh

Abstract:- The main objective of the present paper is to derive an exact series solution to derive the egin values and eigen functions of the fourth order homogeneous partial differential equations PDES of composite plate. The plates are studied under various types of classical and restrained boundary conditions BCS. Due to the additional terms in the governing PDES and the complex substations of BCS, the deduced mathematical complexity makes the publications of this type in literature very few. Although a huge amount of publications are concerned with the vibration of composite plate, the analytic and closed form solutions have a little attention from the publishers. The previous review of publications shows that the method of separation of variables is one of the most universal powerful techniques for solving the linear PDE. The present paper offers an accurate analytical solution which reduces the labor may be needed for carrying out the alternative numerical solutions. The effectiveness of the derived method shows the capability to provide an explicit closed form solution for higher order linear PDE incorporating mixed derivatives under complex boundary conditions. The present approach is utilized to create the closed form solution of composite plates with many types of boundary conditions. Many numerical cases are demonstrated by calculating the eigen values and mode shapes for a different modes of anisotropic plates with different edges of supports.

Review: Healthcare Data Manage using BlockchainTechnology
Authors:-ME Scholar Shradha Paliwal, Assistant Professor Yunus Khan

Abstract:- Healthcare has been the industry with the highest boom in terms of both revenue and data. With so much of electronic health records, the security has been the need of the hour. To make this critical information more secure, there has been an urge to use the blockchain technology. Therefore, researches came up with a solution of blockchain technology in medical healthcare that will not only protect data from being tampered but will also ensure that the data leakage is stopped. This technology could preserve data and thus guarantee reliability. And if this technology is used along with cloud computing technology, problems related to storage can also be vanished, because cloud is trusted for storing and managing data. Also, the blockchain can address the security issues of the cloud. Indeed, medical data sharing and storing with Blockchain-based cloud can address a lot of issues of medical data. The main aim of this paper is to present the current state-of-the-art on blockchain-based medical healthcare system. We have clearly discussed several existing works on the same domain and also presented a comparative study among the published works.

Simulink Simulation of PV, Wind and Fuel Cell Based Hybrid Power Generation System
Authors:-M.Tech. Scholar Ravindra Kumar , Asst. Prof. Deman Kosale

Abstract:- Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy resources is takes place i.e. Fuel cell wind and solar energy. This process reviles the sustainable energy resources without damaging the nature. We can give uninterrupted power by using hybrid energy system. Basically this system involves the integration of two energy system that will give continuous power. Solar panels are used for converting solar energy and wind turbines are used for converting wind energy into electricity. This electrical power can utilize for various purpose. Generation of electricity will be takes place at affordable cost. This paper deals with the generation of electricity by using two sources combine which leads to generate electricity with affordable cost without damaging the nature balance.

Light Weight Secure Auditing Scheme for Shared Data in Cloud Storage
Authors:-M.Tech. Student Vempala. Sravani, Assistant Prof. V. Kasthuraiah

Abstract:- A cloud platform presents data users with shared information storehouse services, Data users can remotely save the information to the cloud and complete the information distributing with others. An inspection scheme that permits assembly members to alter information handles the integrity of the distributed information and verification of the distributed information. This outcome is in the complicated predictions for the organization members who distributed the information in the cloud databases. It neglects the safety and security risks among the organization members and the cloud agents. A less weight safe auditing system can be employed to protect the distributed information. To begin a powerful Third-Party Auditor, the auditing manner of the distributed information is simple towards data user privacy and proposes no supplementary duty to data users in the cloud databases. The third-party auditor can be used to protect the information on behalf of the data users. It promotes the privacy-preserving public auditing. The safety examination and the special review evaluation demonstrate that the suggested method is extremely secured and effective to hope in the cloud assistance platform.

A Lternative Energy Efficiency Design for The Laboratories
Authors:- Suhasini Pyarasani, P.E

Abstract:- Research labs HVAC design needs not only to provide the demands of indoor air quality, safe environment for research workers but also needs to offer comfort and protection for other occupants in the laboratory building. As research labs has different types of spaces there is a potential opportunity in energy wastage, if not designed with advanced design strategies.Designer needs to assess the load profile of the labs based on discussion with client on different factors such as hours usage in a day, hours usage in a semester/quarter, class size, occupied hours, unoccupied hours, etc. Research laboratories load profile vary hourly, daily, seasonally, diurnally, annually, and life-cycle bases where occupancy varies during certain periods of time and during extended periods of time.Research labs can represent a relatively high share of total costs, with energy intensities of up to~1000 kWh/sq. ft-year.The importance of minimizing the air volume in research laboratories is well known; as the labs require at least ten times air volume than in an office building. Few ways to minimize the load in the lab facilities includes decrease heating and cooling loads, decrease in dehumidification and humidification loads, decrease in fan and motor energy usage, and decrease in pumps and motors usage.Advance design strategies that help to design energy efficient HVAC design are modular boiler plants, DDC systems, 4- pipe VAV systems, tum-down ratios for chillers, indirect-direct evaporative cooling, heat recovery, and Active Chilled beams.Current paper discusses the pros and cons for active chilled beams and 4- pipe VAV’s advanceddesign measures including their first costs and life-cycle costs are discussed.

A Review on Feasibility Analysis of Single Effect Vapour Absorption System in Milk Processing Plant
Authors:- M.Tech. Student Rahul Kumar Mehra, Prof. Sujeet Kumar Singh

Abstract:- Milk is one of the best food available due to its nutrition values. For production of processed milk and other dairy products, quality Milk processing plants are required. Milk processing includes pasteurization, homogenization, evaporation, drying etc. In this study, system of a milk pasteurization process assisted by VAR is thermodynamically modelled. The whole energy requirement of the pasteurization system was supplied from Single Stage Libr VAR was used for both heating and cooling purposes. The heat exchangers were modelled with energy balances, based on the streams inlet and outlet enthalpies and mass flow rates. Therefrigerationunitwasbasedonasimplevapourcompressioncycleusing LiBr as a refrigerant. The energy analysis of the model was based on the 1st law of thermodynamics. An EES code has been developed using computer simulation program for simulating the cycle and validation of results with experimental one. This paper presents the review of the past studies done in the similar topic.

Enhancement and Suggestion System using NLP and ML for Response Classification
Authors:-Mr. Abhijit Uttam Shelake, Mrs. Hetal V. Gandhi

Abstract:- -This paper offers the architecture and layoutspecification for a campus assistant software on an Android platform. While taking clearance, students need to approachthe respective sta member and have to face diffculty in case they are unavailable. In this proposed system, students need not go to every sta for clearance.Instead, they can send request directly to respective staff members and if the sta does not have any issue with that student, they accept request. And when all such requests are are accepted by the staff and also higher authorities in some hierarchical order,the clearance form will be submitted. This procedure will save lots of time and efforts of the students. The other problem in an institute which we address is related to Feedback. We collect feedback from stakeholders related to any of the concerned issues and classify them so that they can be forwarded only to the appropriate sta members and incharge of respective department to take cognizance of it and also take corrective action if required. The system enables trackingthe status of each feedback and also provides facility to each of the concerned to track and update the actions undertaken with status. For implementing this feedback system, we make useof Natural Language Processingand Machine Learning tools and techniques.Our system also provides the facility for naïve people of find location within the institute.

Resolve the Worm hole Problem using Trust based Machanism
Authors:- M.E. Scholar Rupanshi Patidar, Assistant Prof. Sachin Mahajan

Abstract:- A Mobile Ad-hoc Network (MANET) is a lot of nodes that impart together agreeably utilizing the remote medium, and with no focal organization. Because of its inborn open nature and the absence of framework, security is a convoluted issue contrasted with different systems. That is, these systems are powerless against a wide scope of attack at various system layers. At the system level, malignant nodes can play out a few attacks going from detached spying to dynamic meddling. Wormhole is a case of serious assault that has pulled in much consideration as of late. It includes the redirection of traffic between two end-nodes through a Wormhole burrow, and controls the directing calculation to give figment that nodes situated a long way from one another are neighbours. To deal with this issue, we propose a novel location model to enable a node to check whether an assumed most limited way contains a Wormhole burrow or not. Our methodology depends on the way that the Wormhole burrow diminishes essentially the length of the ways going through it. To keep the black hole, worm opening, community oriented black hole and flooding attack, the counter measure which Trust esteem is figured on the premise of course ask for, course answer and information parcels. After count get put stock in values between 0 to 1. In the event that trust esteem is more prominent than 0.5 at that point marks node is solid and permit on a system generally piece. System execution of proposed convention trusted secure AODV steering convention (TAODV) is assessed. The outcome demonstrates execution change when contrasted with standard AODV convention.

Load Balancing in Cloud Computing Using Modified Round Robin Algorithm
Authors:-M.E. Scholar Srushti Patidar, Assistant Prof. Amit Saraf

Abstract:- Cloud computing utilizes the ideas of planning and load adjusting to relocate undertakings to underutilized VMs for adequately sharing the assets. The booking of the no preemptive errands in the Cloud computing condition is an irretrievable restriction and thus it must be relegated to the most fitting VMs at the underlying arrangement itself. For all intents and purposes, they arrived employments comprise of numerous related undertakings and they may execute the free errands in various VMs or in the same VM’ different centers. Likewise, the occupations touch base amid the run time of the server in fluctuating irregular interims under different load conditions. The taking part heterogeneous assets are overseen by apportioning the undertakings to suitable assets by static or dynamic booking to make the Cloud computing more productive and consequently it enhances the client fulfillment. Target of this work is to present and assess the proposed booking and load adjusting calculation by thinking about the abilities of each virtual machine (VM), the undertaking length of each asked for work, and the interdependency of different errands. Execution of the proposed calculation is considered by contrasting and the current strategies.

Advanced Footsteps Power Generation
Authors:- Assistant Prof. Jim Mathew Philip A, Soundar S, Vignesh V, Vishaly

Abstract:-The need for energy efficient and eco-friendly fuel is making its headway within the civilization for reducing pollution, emission of green house gases, mining tragedies and degradation of environment, fossil fuel end is proposed to create a transition beyond fossil fuels. The idea includes use of electrical transport, decommissioning of existing fueled powerhouse and prevention of further construction of recent fossil fueled power station and divestment within the fossil fuel industry. We are considering piezo electric crystals to reap industry. Electricity produced is stored in a LA battery. The battery acts as a source for the local (Bulb and the Fan).The Arduino employed is managed to control the bulb and fan with wireless Bluetooth connection with the help of Bluetooth connection. In this paper wireless connection is employed to efficiently use the energy produced by the piezoelectric effect and stored in lead acid battery for further and efficient use.

Review of Information Protection on Android Application Devices
Authors:- ME Scholar Priyanka Patidar, Assistant Prof. Devendra Singh Kaushal

Abstract:- Right now, Smart-telephones and other Mobile gadgets have ended up being amazingly fundamental in all aspects of our life. Since they have comparative capacities as contrasted and work area furthermore, they end up being amazing as far as CPU (Central handling Unit), Storage and introducing a few applications. Therefore, in remote correspondence advances, security is considered as a significant factor, dominatingly in remote specially appointed systems and portable working frameworks. Besides, in view of increasing the scope of versatile applications contained by assortment of stages, security is considered as one of the most important and generous discussion as far as issues, accuracy, trustees and reliabilities. This paper presents a consolidated report of flourishing security on versatile application dais and offering data of indispensable dangers to the clients and the ventures. In addition, this paper presents an assortment of strategies just as techniques for security estimations, the examination and prioritization inside the peak of portable stages. Moreover, it builds mindfulness and comprehension of security on versatile application stages so as to maintain a strategic distance from legal sciences, discovery and countermeasures which are utilized by the working frameworks. At last, this investigation additionally contends about the security wings for popular versatile stages and examination for an assessment inside a most recent exploration in the field of portable stage security.

A Comprehensive Review of AI and 5G-Enabled Secure Monitoring in IoMT-Based Healthcare Systems
Authors:- Research Scholar Er. Komal Garg, Professor Dr. Narender Kumar

Abstract:- The integration of Artificial Intelligence (AI) and 5G technology has transformed the Internet of Medical Things (IoMT), enabling smarter, faster, and more secure healthcare systems. This review critically examines the advancements and challenges of AI and 5G-enabled IoMT systems, with a focus on their applications in healthcare and the pressing issue of data security. The role of 5G in facilitating real-time monitoring, low-latency communication, and massive device connectivity is explored, alongside AI’s contribution to secure data processing, anomaly detection, and predictive analytics. Key challenges, such as vulnerabilities to cyberattacks, data privacy concerns, and the lack of interoperability, are analysed in detail. The review also provides a comparative analysis of existing IoMT security frameworks and AI-driven solutions, highlighting their strengths and limitations. Future directions in integrating advanced technologies like blockchain, federated learning, and edge computing into IoMT networks are discussed. This synthesis of emerging trends and innovative solutions serves as a roadmap for developing robust and secure healthcare ecosystems, leveraging AI and 5G to deliver real-time, patient-centred care while safeguarding sensitive medical data.

DOI: 10.61137/ijsret.vol.6.issue4.627

Designing Future Ready Compensation Systems With Data Driven Fairness And Performance Alignment In SAP SuccessFactors

Authors: Manoj Parasa

Abstract: This study examines how compensation design can be strengthened through data driven fairness analysis and performance aligned pay structures within SAP SuccessFactors, addressing long standing challenges associated with subjective decision patterns, inconsistent pay progression, and limited transparency in traditional compensation cycles. The research focuses on the need for organizations to transition from static guideline based models toward intelligent, analytically supported frameworks that enhance equitable decision making across diverse workforce groups. Using a mixed methods approach that combines quantitative compensation modeling with qualitative analysis of organizational pay practices, the study evaluates how fairness indicators, performance signals, and demographic patterns can be incorporated into structured compensation decisions without disrupting existing operational workflows. The findings demonstrate that early stage predictive techniques available in 2020 improve insight into pay disparities, support more consistent budget allocation, and enhance alignment between performance outcomes and reward decisions. The proposed framework introduces a future ready compensation model that integrates data inputs, analytical layers, and governance controls, enabling organizations to improve pay equity, strengthen performance differentiation, and reinforce strategic workforce planning. The study contributes to academic literature by outlining a practical methodology for embedding fairness analytics into enterprise compensation systems and offers industry practitioners a scalable pathway for modernizing pay structures while maintaining compliance and operational stability. The overall conclusion affirms that data informed compensation design in SAP SuccessFactors provides a more transparent, equitable, and strategically aligned foundation for long term organizational readiness.

DOI: https://doi.org/10.5281/zenodo.17698304

Fraud Detection And AML Analytics In Real-Time Payment Systems

Authors: Oksana Anatolyevna Malysheva

Abstract: They've opened up the door to instant fund transfers and around-the-clock availability. But at the same time made us more exposed to scammers and money laundering schemes, when real-time payments became a norm. Coming racing up against the tight timeframes and limited space to go back and correct anything that's gone wrong, the old way of doing things just isn't working anymore. This paper takes a hard look at the analytical and infrastructure-related issues surrounding the detection of fraud and money laundering in real-time payment systems, where speed, accuracy and meeting regulations all need to be juggled at the same time. Well-known techniques won’t cut it anymore in the world of real-time, so the researchers here take a more applied approach, merging real-time analytics systems, cutting-edge fraud detection and money laundering models. They lay out a comprehensive blueprint for real-time transaction analysis, fine-tuning features for ultra-fast decision-making, hybrid rule-based and AI-driven systems and risk-scoring that’s tailored to the flow of instant payments. When evaluating the performance of fraud and money laundering systems in real-time, this paper looks beyond the traditional measure of accuracy and zeroes in on things like response times, scalability and false positives, which are pretty critical in the real-time world. The real contributions of this work are threefold: a crystal-clear picture of the threats facing real-time payments, a logical analytical framework that gets the balance between detection models, real-world timeframes and regulatory expectations, and some down-to-earth advice on how to run your fraud and money laundering systems in a way that is not only effective but also explainable and scalable.

Robust Digital Foundation Architectures Supporting Enterprise Java And Spring Engineering

Authors: Ramani Teegala

Abstract: This research examines the growing need for structured, reliable, and productivity focused engineering environments during a period when organizations were transitioning from traditional development models to more collaborative and tool integrated ecosystems. It investigates the fragmentation of workflows, uneven tool adoption, and the absence of standardized development practices that often constrained Java and Spring engineers, resulting in delivery delays, quality inconsistencies, and extended onboarding cycles. The research aims to establish a systematic approach for designing and implementing developer experience platforms that unify development workflows, automate repetitive tasks, and promote consistency across large engineering teams. Using a mixed methods approach that integrates qualitative interviews with engineering leaders and quantitative analysis of productivity indicators, the study identifies platform capabilities that most effectively enhance developer outcomes, including integrated build automation, standardized project templates, curated toolchains, and centralized knowledge resources. The findings show that well structured developer experience platforms reduce cognitive load, improve code quality, and accelerate delivery cycles while strengthening collaboration and engineering confidence. Academically, the work contributes a structured model for evaluating developer experience within Java and Spring ecosystems and provides a foundational basis for future research in platform centric software engineering. Strategically, it demonstrates how organizations can leverage such platforms to modernize engineering culture, reinforce architectural alignment, and achieve sustainable delivery performance. The study concludes that formalizing developer experience as an operational discipline holds long term significance for both industrial practice and academic advancement.

DOI: https://doi.org/10.5281/zenodo.19100556

Assessment Of Fluoride Contamination In Rural Drinking Water Sources And Associated Skeletal Fluorosis Risk

Authors: Dr. Ekata Singh

 

Abstract: Fluoride contamination in drinking water is a major environmental and public health problem, especially in rural areas where groundwater is the main source of water. In this study Iaim to assess fluoride levels in drinking water in rural communities and assess the risk of skeletal fluorosis in the exposed population. Icarried out a systematic field-based survey in selected villages, sampling groundwater sources such as hand pumps, bore wells, open wells and so on. Fluoride levels were analyzed in the usual way and compared with the standard levels of international health authorities. In addition, Icarried out a formal health survey to establish the prevalence of skeletal fluorosis symptoms in the different age groups (joint stiffness, bone deformity, and restricted mobility). The study also looked at demographic, dietary, and socioeconomic characteristics to identify potential risk factors for fluoride toxicity. The water samples were found to be above safe levels of fluoride, and deeper aquifers were more strongly associated with the water samples. In the same way, skeletal fluorosis was found to be high, and high levels of skeletal fluorosis were observed in the case of long exposure and poor nutritional status, which shows an association with high levels of fluoride and skeletal fluorosis, and immediate action is needed to address the issue. Defluoridation techniques are suggested to be sustainable, safe alternatives, and community education programs should be introduced to prevent illness. This study offers a better understanding of fluoride contamination dynamics and can be used to construct region-specific water management and health policy.

DOI: https://doi.org/10.5281/zenodo.19436761

 

ML-Based QoS Optimization In Enterprise Networks

Authors: Deepak Chauhan

Abstract: The digital infrastructure of the modern enterprise is undergoing a radical transformation, driven by the widespread adoption of cloud-native applications, real-time collaboration tools, and high-bandwidth multimedia services. In this dynamic landscape, traditional Quality of Service (QoS) mechanisms, which rely on static priority queuing and manually defined traffic classes, are increasingly incapable of managing the volatility of network demand. This review explores the paradigm shift toward Machine Learning (ML)-based QoS optimization. By transitioning from reactive, threshold-based management to proactive, intent-driven architectures, ML enables enterprise networks to achieve "Cognitive Traffic Engineering." This article examines how various ML paradigms—including supervised learning for traffic classification, unsupervised learning for anomaly detection, and reinforcement learning for dynamic resource allocation—can be synthesized into a unified optimization fabric. We analyze the efficacy of Deep Learning models, such as Convolutional Neural Networks and Long Short-Term Memory units, in identifying application-layer requirements within encrypted tunnels without the need for Deep Packet Inspection. Furthermore, the review addresses the architectural integration of ML within Software-Defined Networking (SDN) and SD-WAN frameworks, enabling the "Self-Driving Network" vision. Critical challenges, such as model interpretability, real-time inference latency at the network edge, and data drift in multi-tenant environments, are discussed in depth. By synthesizing recent academic breakthroughs and industrial implementations, this paper provides a strategic roadmap for building resilient, high-performance enterprise networks. The findings suggest that ML-driven QoS is the foundational technology required to satisfy the stringent Service Level Agreements of the modern digital enterprise, ensuring that network resources are distributed with machine-speed precision and contextual intelligence.

DOI: https://doi.org/10.5281/zenodo.19491907

Predictive Network Failure Analysis Using Machine Learning

Authors: Sanjay Mishra

Abstract: The escalating complexity of modern network infrastructures, characterized by the convergence of 5G, software-defined networking (SDN), and hyperscale cloud-to-edge continuums, has rendered traditional reactive maintenance models obsolete. In these high-velocity environments, a single link failure or hardware malfunction can trigger a cascade of service disruptions, resulting in significant financial losses and reputational damage. This review examines the paradigm shift toward Predictive Network Failure Analysis (PNFA) powered by Machine Learning (ML). By leveraging high-fidelity telemetry data, including syslog entries, SNMP traps, and flow metrics, ML models can identify the subtle "pre-cursor" signatures of impending hardware exhaustion, optical signal degradation, or software anomalies. This article categorizes current methodologies, focusing on the use of Long Short-Term Memory (LSTM) networks for temporal fault forecasting and Random Forests for multi-variate root cause analysis. We explore how predictive models enable the transition from "Break-Fix" to "Proactive Remediation," where maintenance is triggered by a probability score rather than a catastrophic event. Furthermore, the review addresses critical challenges, such as the "data imbalance" problem, where failure events are rare compared to normal operations, and the necessity for Explainable AI (XAI) to ensure operator trust in automated diagnostics. By synthesizing recent academic breakthroughs and industrial frameworks, this paper provides a strategic roadmap for building "Self-Healing Networks." The findings suggest that ML-driven predictive analysis significantly reduces the Mean Time to Repair (MTTR) and improves overall network availability, providing the cognitive foundation required for the next generation of autonomous digital infrastructure.

DOI: https://doi.org/10.5281/zenodo.19491925

AI-Driven Security Solutions For Cloud Computing

Authors: Hendra Wijaya

Abstract: The rapid expansion of cloud computing has introduced significant security challenges, including data breaches, insider threats, misconfigurations, and advanced persistent attacks. Traditional security mechanisms are often insufficient to address the dynamic and large-scale nature of cloud environments. Artificial intelligence (AI) has emerged as a powerful approach to enhance cloud security by enabling intelligent, adaptive, and automated threat detection and response. This study explores AI-driven security solutions for cloud computing, focusing on how machine learning, deep learning, and data analytics techniques are applied to identify anomalies, predict potential threats, and strengthen overall system resilience. The paper examines key AI-based security mechanisms such as intrusion detection systems, behavioral analytics, threat intelligence, and automated incident response. It also discusses the integration of AI with cloud security frameworks, including zero-trust architecture, security information and event management (SIEM), and cloud security posture management (CSPM). Furthermore, the study highlights challenges such as data privacy, model accuracy, adversarial attacks, and scalability limitations. Emerging trends such as explainable AI, federated learning, and AI-powered autonomous security systems are also analyzed. The findings emphasize that AI-driven security solutions significantly enhance the ability to protect cloud environments, ensuring confidentiality, integrity, and availability of data and services.

DOI: https://doi.org/10.5281/zenodo.19654154

 

Distributed System Security And Threat Mitigation

Authors: Nurul Huda

Abstract: Distributed systems have become the backbone of modern computing environments, enabling scalable, fault-tolerant, and high-performance applications across cloud computing, IoT, and enterprise infrastructures. However, their decentralized nature introduces significant security challenges, including unauthorized access, data breaches, distributed denial-of-service (DDoS) attacks, and inconsistent security policies across nodes. This study provides a comprehensive review of security issues in distributed systems and explores effective threat mitigation techniques to ensure confidentiality, integrity, and availability of data and services. It examines key security mechanisms such as authentication, authorization, encryption, secure communication protocols, and intrusion detection systems. The study also highlights advanced approaches including zero-trust architecture, blockchain-based security, anomaly detection using machine learning, and secure multi-party computation. Furthermore, it discusses challenges such as scalability of security solutions, latency overhead, and coordination across distributed nodes. Emerging trends such as AI-driven security analytics and decentralized identity management are also analyzed. The findings emphasize that a multi-layered and adaptive security approach is essential for protecting distributed systems from evolving cyber threats.

DOI: https://doi.org/10.5281/zenodo.19654206

Security Frameworks For Enterprise Data Protection

Authors: Dewi Lestari

Abstract: The rapid digital transformation of enterprises has led to the generation and storage of vast amounts of sensitive data, making data protection a critical priority. Security frameworks provide structured approaches to safeguarding enterprise data against unauthorized access, breaches, and cyber threats. This study reviews key security frameworks for enterprise data protection, including ISO/IEC 27001, NIST Cybersecurity Framework, Zero Trust Architecture, and CIS Controls. It examines how these frameworks support risk management, data governance, access control, and compliance with regulatory requirements. The paper also explores the integration of encryption, identity and access management, network security, and continuous monitoring within these frameworks. Emerging technologies such as cloud computing, artificial intelligence, and distributed systems are analyzed in terms of their impact on enterprise security strategies. Key challenges, including evolving cyber threats, insider risks, and compliance complexities, are discussed along with mitigation strategies. The findings highlight that adopting comprehensive security frameworks enhances data confidentiality, integrity, and availability, ensuring robust protection in modern enterprise environments.

DOI: https://doi.org/10.5281/zenodo.19654242

 

Published by:

IJSRET Volume 6 Issue 3, May-June-2020

Uncategorized

Enhanced Security in ATM by IRIS and Face Recognition authentication
Authors:- Assistant Professor G.Mahendar, Assistant Professor Meenaiah Batta

Abstract:- Banking is very easier now a day, but sometimes the chances of cyber crimes are on rampant. There are number of frauds has occurred in banking transaction. Number of advantages of ATM system as well as number of frauds has become widespread. The growth in the online transaction has resulted in a greater demand for fast and accurate user recognition and authentication.lot of people have been depending on and trusting the Automatic teller Machine(ATM) to do banking needs easily. In this paper we propose the face recognition system for authentication process and increase the security in the banking area. By this system we can avoid the ATM robberies and unauthorized persons miss uses the ATM.

A Study on Performance Evaluation of 100 KLD Sewage Treatment Plant in the Circuit Breaker Assembly Process
Authors:- Santhosh Kumar VMS,Kola Sai Kiran, Assistant Professor V Surendar, Assistant Professor Rishi Dewan

Abstract:- The Proposed Study focuses on performance evaluation of 100 KLD sewage treatment plant. It is essential to monitor the performance characteristics of STP plant as treated water from STP is used for watering the garden. It came to the notice of the management that treated water supplied for watering garden from STP have an unbearable odour and it is sometimes very strong that it is causing discomfort to the plant employees who are passing by the passageways near to garden. In this study an attempt has been made in providing a solution that aims at reducing bad odour coming out from STP and thereby avoiding the discomfort to the employees who are passing by the passageways near to garden. The current study also aims at evaluating performance characteristics of the STP which helps in understanding the operating difficulties and design of STP. Sewage samples were collected from outlet of sewage treatment plant and is used to assess the water quality parameters such as chemical oxygen demand (COD), Bio-chemical oxygen demand (BOD), Total dissolved solids (TDS), Total suspended solids (TSS), Mixed liquid suspended solids(MLSS). The proposed sewage samples of 100 KLD sewage treatment plant were taken for a period of 20 days. The conclusions were drawn after precise evaluation of water quality parameters and possible recommendations were made with intent to tackle bad odour coming out from sewage treatment plant.

Reduction of Water Vapor by using Shaded Plastic Balls
Authors:- S.Maniyar,S.Maske,A.Yeotkar,S.Patil

Abstract:- Now a days the water are wasting from many resources such as flood, sewage mixture, evaporation etc. Although water covers more than 70% of the Earth, but only 1% of the Earth’s water is available for our drinking. So we are planned to deduce evaporation losses in natural water bodies by using the shades Plastic balls Method. Evaporation is one of the most important environmental processes that can reduce the quality and quantity of water available for industrial, agricultural and household uses; Here we use physical methods that is we use floating or suspended covers of shaded Plastic balls and can save a large percentage of water (between 43and 45%) .

Industrial Safety System using Internet of Things
Authors:- Prajwala Gavuji, Niharika Kaza

Abstract:- The aim of this work is to mitigate the destruction engendered due to fire outbreaks in industries like petroleum, chemicals, oil which leads to loss of life and property. It is very important to have some system that can keep the industry premises secure and also to notify the authorized people within the stipulated time in case of an emergency. Industrial safety system using Arduino (UNO) is designed in such a way that it detects fire using flame sensor, CO leakage using MQ-7 gas sensor, smoke and methane detection using MQ-2 gas sensor, to record temperature and humidity we use DHT-11 sensor, Light Dependent Resistors (LDRs) to know the intensity of light and Global System for Mobile Communications (GSM) is used to send messages and to make calls to the concerned person to alert him about the situation. All these sensors constantly provide their input to the micro controllers connected to them. The micro controller constantly processes this data.

A Study on Aircraft Components Repair with Cold Spray Technology; Introduction of Cold Spray Technology to Aviation Industry
Authors:- Dupally NVN Kishore Yadav
Mentors::- Dr. Christian Widener, Robert H. Hrabe, Mike Belmont

Abstract:- This paper describes about the Cold Spray Technology and its applications in Aircraft industry. It will give us a clear picture of how CST will change the Aircraft manufacturing and repair industry. This is the first paper to introduce about Aircraft`s Components repair with Cold Spray Technology like Aircraft Propellers, Aircraft Landing gears and Aircraft Fabrication. Most of the Aircraft Components repair is done with 7075 Aluminum alloy powder coat or mixture of different aluminum alloys. This makes the repaired component or fabricated area is stronger and Corrosion resistance along with longer life span. However; certain precaution along with procedures need to follow in order to get successful results. There have been great and high success rate of using the Cold Spray Technology is militarily and Air force in many developed countries like Germany, Japan and United States of America. Now it’s the time to introduce this CS Technology to commercial industry so that every manufacturing company can adapt this technology.Over the years many of Aircraft Manufacturing companies scrap all its metal components once they fail to work or throw them once they are not up to the OEM Standards. Researching companies like VRC Metal Systems in Rapid City, South Dakota has achieved patents on Spray technology by collaborating with South Dakota School of Mines. VRC Metal Systems created new wealth opportunities to the manufacturing and metal repair industries. This technology will be helpful to the most of the industries deals with metals that not only repairing with Cold Spray Coating but also in tools and fabrication repairing (vrcmetalsystems).

A Study on Aircraft Propeller and Component Repair with Cold Spray Technology (CST Process).
Authors:- Dupally NVN Kishore Yadav
Mentors::- Dr. Christian Widener, Robert H. Hrabe, Mike Belmont

Abstract:- This paper describes Cold Spray Technology and its application on aircraft propellers and their components. This will give the world a clear picture of how the CST process could change the aircraft propeller manufacturing and repair industry. The purpose is to introduce the Cold Spray Technology repair process to aircraft propellers and components such as propeller hubs, spinners, bulkheads, cylinders and propeller blades. Using CST repairs will provide aircraft owners and manufacturers a very cost-effective repair solution. Most of the aircraft propeller and component repair is done with a 7075 aluminum alloy powder coat or a mixture of different aluminum alloys. This makes the repaired component or fabricated area stronger and more corrosion resistant, increasing the life span of the part. However, certain precautions and procedures need to be followed to get successful and cost-effective results. There has been a high success rate using the Cold Spray Technology on military aircraft in many developed countries like Germany, Japan and United States of America and the user has saved more than 60% over the cost of buying new parts. Now is the time to introduce this Cold Spray Technology process to the commercial aviation industry so that every manufacturing and repair company has the opportunity to adopt this technology.

Generation of Dial Tone using GNU Radio
Authors:- Assistant Professor D.Diana Josephine, Vijaya Prabha.A, Suba Jeyashree.V, Sangeetha.S

Abstract:- GNU Radio is widely used to implement cognitive radio designs, enabling both experimentation and research. In recent years, Software defined radio has become a cost efficient and reliable communication paradigm where it’s RF front end is simplest as compared to the conventional SCR (software controlled radio). This paper aims to generate a standard dial tone consists of a 350 Hz and a 440 Hz signal using GNU, an open-source SDR platform. The graphical output of the generated dial tone is presented.

Wind Tree Turbine Energy Conversion System
Authors:- Hod. Dr. B.Gopinath, P.Tharani, B.Sowndarya, S.Tharani, R.Nandhini Priya

Abstract:- Wind energy is the fastest growing source of clean energy worldwide. Wind energy plays a vital role to generate the electricity. Likewise these sources are decreasing sooner rather than later.In this project wind energy is used to generate electricity by using aero leaves. Many aero leaves are placed in the form of tree shape, called wind tree. Vertical axis wind turbine is used to generate electricity. The PVC pipes or GI sheet are used for turbines and its look like a normal leaf but it placed in a vertical manner. These aero leaves are able to generate power from breezes .They are also silent, so they could theoretically be installed along buildings, streets, or even in people’s backyards. The aero leaves should rotate depend on wind direction. The vertical axis wind turbines will catch wind from all wind directions. When the wind blows, the aero leaves rotate and produce the energy. Power is generated with the help of generators and it is stored in battery. It concludes that, generating energy is good for the environment and also it can provide power to remote locations.

IOT Based Smart Detection System for Harmful Gases in Underground Sewages
Authors:- Asst. Prof. R.Saravanan,T.Kaaviya,S.Mahalakshmi, D.Kowsalya

Abstract:- Most of the cities adopted the underground drainage system and it’s the duty of Municipal Corporation to maintain cleanliness, healthy and safety of cities. If the drainage system is not properly managed then pure water gets contaminate with drainage water and infectious diseases may get spread. The primary objective of this project is to recognize the dangerous gases present inside sewer-pipeline to offer protected access to sewer-pipeline with the goal that the human fatalities, which happen due to presence of toxic gases can be avoided. This paper addresses NG leakage surveillance through a robust cooperative/synergistic scheme between biosensors and conventional detector systems; the network is validated in situ and optimized in order to provide reliable information at the required granularity level. Therefore we have used the IoT technology to make a Gas Leakage Detector having Smart Alerting techniques involving calling, sending text message and an e-mail to the concerned authority and an ability to predict hazardous situation so that people could be made aware in advance by performing data analytics on sensor readings. This approach is illustrated in the design of leak surveying over a pipeline network in Greece.

Experimental Study of Passive Construction Material in Buildings
Authors:- PG Student Sneha.N, Associate Professor Murugesh V

Abstract:- A Brick is a building material used to make walls, and other element in masonry construction. Traditionally the term brick refer to a unit composed of clay but it is now used to denote rectangular unit made of clay bearing soil {Red soil}, sand and lime or concrete material. Bricks are produced in numerous classes, type, material and size which vary with region and time period and are produced in bulk quantity. Brick are laid in in courses and numerous pattern known as bond collectively known as brickwork and may be laid in various kind of mortar to hold the brickwork together to make a durable structure. A fiber is added to the brick in order to provide strength ie; water hyacinth scientifically known as Eichhorniacrassipes is a free floating aquatic plant with broad, thick, glossy, ovate leaves which rises up to 1m in height . This can perform functions such as for bioenergy waste, water treatment, edibility. Medicinal use, temperature reduction etc. Water hyacinth are been dried and cut in to fiber form and mixes with the clay soil in 0, 1%,2%,3% . The mixture is been poured in mould in order to make brick. This is been dried under sunlight and the strength and other test is been calculated by comparing with normal brick. A lime is been coated at the face of brick.

Optimization of Biogas Production from Dairy Wastewater using Upflow Anaerobic Filter (UAF) Reactor
Authors:- M.Rajesh, Anatol Berhanu Gobana

Abstract:- The present study explores the feasibility of biogas production from dairy wastewater in the UAF reactor with simultaneous wastewater treatment. The study was carried out at different hydraulic retention times (8h, 12h, 16h, 24h). Two different media such as pebble stone media and aggregate media were used as the packed media. The maximum COD removal efficiency of 91.55 % is achieved at the hydraulic retention time of 24 Hours with an organic loading rate of 1.35 kg/m3/d for aggregate media, whereas for pebble stone media a maximum COD removal efficiency of 76.32 is achieved. Before the start of the experiments, the COD/BOD ratio is fixed to 1.4 with initial COD and BOD of 1350 mg/L and 960 mg/L.

A Comperitive Study of Point of Sale and Point of Purchase of Restaurant System
Authors:- Neeraj Goyal ,Prabhat Agrawal ,Rohan Hardeniya

Abstract:- The system is implemented to reduce the manual work and enhances the accuracy of work in a restaurant. This system manages and maintains the record of customers and their order online. This Android App has been made in a user friendly interface. So that Customer can add and delete the food items easily. The menu card of different restaurant consists of various food varieties available in the restaurant. Through the place ordering menu, the customer can simply click and order the food. The messaging module tells the supplier to supply the particular food. Also tracking module track the order. The billing system prepares the bill according to the delivered food. This system entirely reduces the unnecessary time. Every order is associated with an individual seat at the table, and orders are built one customer at a time, just like on paper, but with greater accuracy. Items can also easily be shared by the whole table, moved or modified, and noted and the cost can be calculated in real time.

Vehicle Detection Based RCNN
Authors:- Rahul Tomar,Hod. Shailendra Tiwari

Abstract:- These days, vehicle type identification assumes a significant job in the rush hour gridlock scene. Profound Learning calculation has been generally utilized in the field of article discovery. Applied the Faster RCNN system, improved the RPN systems, which was a successful and agent of the Convolutional Neural Network of profound learning on object arrangement calculation, and joined with the MIT and Caltech vehicle dataset just as some various kinds of vehicle pictures in the Internet, to identification and recognization the three sorts of vehicles which are commom in rush hour gridlock scene. The test results show the adequacy and high-effectiveness of technique for profound learning in the vehicle type identification.

Revocable Identity-Based Double Encryption with Timestamp for Secure Data Sharing in Clouds
Authors:- Assistant Professor T.A.Mohanaprakash, M.Naveen Kumar, D.Praveen Kumar, R.Rishikant

Abstract:- Cloud computing has become prevalent thanks to its nature of massive storage and vast computing capabilities. Ensuring a secure data sharing is critical to cloud applications. Recently, variety of identity-based broadcast proxy re-encryption schemes are proposed to resolve the matter. However, this technique requires a cloud user who wants to share data with a bunch of other users to participate the group shared key renewal process because Alice’s private secret is a prerequisite for shared key generation. This, however, does not ensure the complete security of the cloud. Therefore, a unique security notion named revocable identity-based double-encryption with timestamp is presented to deal with the problem of key revocation during this work. In an exceedingly RIB-DET scheme, a user can revoke a collection of delegates, designated by the delegator, from the double-encryption key which is created and time stamped for a short interval of time within which the requested file can be viewed or downloaded by the delegate ensuring maximum level of security and privacy. The performance evaluation reveals that the proposed scheme is much more efficient and practical.

A Review on Abrasive Water Jet Cutting Machining Due to Optimization, Advantages, Weakness and Future Directions
Authors:- Assistant Professor Altyib Abdallah Mahmoud Ahmed, Jing Qian

Abstract:- Abrasive water jet cutting [AWJC] is the machining technology with distinct advantages over the other non-traditional cutting technologies, such as no thermal distortion, high machining versatility, minimum residual stresses on the work piece and high flexibility and small cutting forces.
The process parameters which are mainly influenced the quality of cutting in AWJM are pressure of water, stand-off distance, nozzle diameter, traverse speed, an abrasive flow rate and abrasive size. The quality parameters considered in AWJCM are kerf Characteristics (KC), Surface Roughness (SR), Material Removal Rate (MRR), Depth of Cut (DC) and Nozzle wear (NW). Various mathematical models and modern approaches are applied to an optimize process parameters to improve the performance characteristics.
This paper reported on AWJCM research relating to improving performance measures, monitoring and control of the process, optimizing the process variables, applications for different types of materials, advantages and disadvantages of AWJCM, also the future trend of research work in the same area are reported in this paper.

Project Management using BIM
Authors:- M.Tech Scholar Sanket D. Alone

Abstract:- Planning and scheduling are important task in construction projects. In this project, 3D model was made using Revit, AutoCAD was used for 2D drawing, scheduling was done using Microsoft project, detection and elimination of clashes was done using Navisworks. For planning and scheduling work huge amount of paperwork is required, which makes the management very burdensome. These problems can be solved using project management software’s which helps to give a planned approach to planning. This analysis was done because of their comparable technical features and to evaluate on the basis of the function to manage the project. Each software had many benefits; in this project we have used software’s such as Revit, Navisworks, Primavera, AutoCAD, Microsoft project. In this study, a case of a railway wagon repair work shop has been taken to display how proper planning and scheduling is done.

An Approach to E-Certificate Designing with Auto-Emailing
Authors:- Assistant Prof. S Gokulakrishnan, Chitta Shanmukha Sarma

Abstract:- In this knowledge powered world, one always thrives to prove or project their own knowledge. Similarly, it has always been the human tradition to appreciate true talent and also celebrate one’s knowledge. The best possible way to do both these things is by certifying the particular individual for their achievements with a certificate. In the modern times, distribution of a certificate has become a common practice in all the conventions, conferences, etc. This popularity alone has created a need for designing the certificate in a more unique and creative manner. But not every user likes the templates given by the designer and hence requests for a personal touch in the design of the certificate which makes them feel that the certificate is unique in its own way. This paper tries to provide a solution for this challenge by providing a first in its kind website which helps the user in designing a certificate and then using it to his desired purpose. This project aims to ease the process of certificate designing and also distributing. Here, the user can develop an E-Certificate which is portable and can be circulated easily.

A Conceptual Framework Proposed for Classifying Investor Behaviour
Authors:- Ankita Pahwa, Sugam Maheshwari

Abstract:- Investment conduct has been the point of research for some academicians, investment investigators and portfolio supervisors for an exceptionally significant time-frame. The primary goal of these inquiries has been to decide the components that impact investors in settling on their venture choices. Understanding these elements turns out to be significant for the progression of the subject and to help experts in directing the investors in settling on sound venture choices. The old-style hypothesis of speculations depends on the “Effective Market Hypothesis” which accept that “the investors are balanced and that investors are fair in their expectations about future returns of their ventures.” However, this hypothesis of judiciousness was tested and prompted the development of behavioural finance dependent on the work done by Amos Tversky and Daniel Kahneman. This research attempts to comprehend the variables that impact singular investors character dependent on accessible literature and to build up a theoretical system to clarify the impact of risk tolerance, socio-segment factors and the behavioural biases in forming the investor type. The four types are conservative, moderate, growth and aggressive.

Cluster-Based Certificate Revocation with Vindication Capability for Mobile AD HOC Networks
Authors:- K.Tharani, D.Kannan, A.Gobinath, P.Karthick

Abstract:- Mobile ad hoc networks (MANETs) have pulled in a lot of consideration because of their portability and simplicity of arrangement. In any case, the remote and dynamic natures render them increasingly helpless against different sorts of security assaults than the wired systems. The significant test is to ensure secure system administrations. To address this difficulty, authentication denial is a significant necessary segment to make sure about system correspondences. Right now, center around the issue of authentication denial to segregate assailants from further taking an interest in organize exercises. For speedy and precise testament denial, the proposed Cluster-based Certificate Revocation with Vindication Capability (CCRVC) plot. Specifically, to improve the dependability of the plan, to recuperate the cautioned hubs to participate in the endorsement renouncement process; to upgrade the exactness, proposed the edge based component to evaluate and vindicate cautioned hubs as real hubs or not, before recouping them. The exhibitions of the plan are assessed by both numerical and reproduction investigation. Broad outcomes show that the proposed declaration renouncement conspire is powerful and proficient to ensure secure correspondences in portable specially appointed systems. The undertaking is planned utilizing Microsoft Visual Studio-2005. The Front end as C#. Net and MS-SQL Server 2000 is utilized as back end database.

Mean Stack
Authors:- Asst. Prof. Shalu Yadav, Akhil, Rohit

Abstract:- This paper covers the four important component of MEAN stack i.e. MongoDB, Express.js, Angular.js & Node.js and their benefits as a full stack in web development. That helps to build fast, robust and maintainable web application. JavaScript is used as scripting language for client-side programming as well as server side programming that runs in any almost every browser from client to server to database. It is a full stack JavaScript which is 100% open source as well as large community support. There are some other languages also.

Innovative Design of Conveyor Control System using Variable Frequency Drive (VFD)
Authors:- Alenogines L. San Diego, Romano A. Pimentel

Abstract:- The study focuses on the innovative design of the conveyor control system using variable frequency drive to introduce technology innovation and to produce competent and trained human resources competent with the necessary skills and knowledge that the industries need. A main control panel board is included in the design so as to replicate the real conveyor with its control system. The transfer control system is composed of different electrical control components like the push buttons, indicating lamps, circuit breakers, magnetic contactors, control relays and variable frequency drive (VFD). The transfer system is designed as an instructional device wherein it has the capability to demonstrate the principle and control of a conveyor system using a VFD. The conveyor is designed with a bag sewer machine constructed according to three classifications namely the conveyor, sewer and the controlling devices. The machine’s over-all mean shows a numerical value of 4.26 which is highly acceptable. This implies that the machine is acceptable in terms of its Aesthetic, Reliability, Safety and Functions.

Automatic Multiple Choice Question Paper Generator
Authors:- Akshat Akarsh, Dr. Dileep Kumar Yadav

Abstract:- This is a an very complex problematic era due to the growth in the field of computer science and demand we are facing today. Hence examinations has a vital role in analyzing student’s performance. And that is why it is important to have a smart development question model for growth of students as well as to test their learning. Multiple Choice Questions play important role in creating exam for any entrance test like JEE,IBPS,UPSC,BPSC and many other exams conducted in India.Many modern method of question paper generator come into existence.Now a days instructor are facing difficulties during data entry .Instead of data entry directly to a software ,we use excel or CSV type to upload it in indirect way.So that large amount of questions are uploaded quickly by different department.We are also using enhanced algorithm for selecting different level of question during generating multiple choice question.we also taking care of security concern in developing the proposed system. automatic question generation is part of[1] Natural Language Processing (NLP). It is an area of research where many researchers have presented their work and is still an area under research to achieve higher accuracy. Many researchers have worked in the area of automatic question generation through NLP, and numerous techniques and models have been developed to generate the different types of question automatically. Work has been done in many languages.

Representation of Construction Logistics Planning Model
Authors:- M.Rajesh, Anatol Berhanu Gobana, Gemeda Etefa Keno

Abstract:- Construction field has the strongest ability for occupational hazard events among all Asian industries. Planning the site layout of construction projects is a critical task that has a conservative impact on construction cost, productivity, and safety. It involves the placing and standard relocation of temporary facilities that are needed to support various construction activities on site such as offices, logistics industries, hotels, and parking areas. One of the major causes is construction employers or employees’ negative attitudes toward safety requirements imposed by different construction safety documents, such as construction safety regulations and project safety plans. Such attitudes towards safety requirements include ignorance, negligence and disobedience and the first two can be dealt with by raising construction project participants’ awareness of safety requirements through better construction safety planning. Due to the complexity of the site layout planning problem, construction managers often perform this task using old experience and first-come-first-serve basis which leads to ambiguity and even to inaccuracy. Accordingly, a number of site layout scheduled models have been developed over the past three decades to support this dynamic planning task. The large number of precautionary requirements from different construction safety documents may hinder project participants from carefully looking through them for identifying applicable precautionary requirements. In accordance with that, present approaches and tools for increasing awareness of safety requirements are not enough. Despite of the contributions of existing site layout planning models, they have a number of rules and regulations that require advance research in five main areas in order to: (1) establish international optimization of dynamic site layout planning; (2) integrate material procurement and site layout planning in a construction logistics planning model; (3) enable the usage of interior building spaces for logistics areas on congested construction sites; (4) involve automated retrieval and integration of all necessary data of construction logistics and site layout planning from already installed design and planning documents; and (5) consider security needs and constraints during the construction of critical infrastructure projects.
For the analysis of construction safety requirements, the Ordered Hierarchy of Content Object (OHCO) approach is adopted to build the representation model; Extensible Markup Language (XML) is used in this research to implement the OHCO-based model. First, two novel optimization models are developed that are capable of generating international optimal solutions of standards site layout planning in order to reduces resources transportation and facilities relocation costs while complying with various site geometric constraints. The first model, DSLP-GA, is implemented using Genetic Algorithms while the second model, DSLP-ADP, is formulated using Approximate Dynamic Programming. Ontological modeling, on the other hand, is leveraged to model semantically-rich concepts that describe construction contexts. In addition, the developed reasoning mechanisms utilize the ontological relationships between modeled concepts to automatically evaluate each concept’s applicability. Construction safety requirements’ applicability then can be evaluated by reasoning about the requirements’ applicability conditions and exceptions, which are represented using concepts defined in the concept ontologisms. Safety requirements can be classified according to their evaluated applicability. Second, a novel model of construction logistics planning (CLP) is developed to establish the integration and simultaneous optimization of critical planning solutions of material procurement and material storage on construction sites. Procurement solution variables are designed to identify the fixed-ordering-periods of each material in every construction stage, while dynamic layout decision variables are designed to identify the locations and orientations of material storage areas and other temporary facilities in each construction stage. The expected developments of this research study contribute to enhancing the current practices of site layout and material logistics planning and can lead to: (1) raising the efficiency and international optimality of construction site layout planning; (2) developing construction productivity that can be realized as a result of the early coordination between material procurement and site space planning; (3) enhancing the utilization of interior building spaces for material storage areas while minimizing its possible negative impacts on construction operations and schedules; (4) increasing the security level on the construction sites of critical infrastructure projects; and (5) reducing contractors site costs that cover the travel cost of resources on construction sites, material logistics, and site security systems.

Cloud and IoT Enabled Smart Vehicle Monitoring System
Authors:- Shivani V. Dinde, Sonali A. Chougale, Pournima B. Bansode, Amruta D. Bhosale

Abstract:- In today’s life standard, vehicles became an integral partner of each one’s life. In this modern era, situations and circumstances demands the usage of vehicles as a need of fast paced urban life. When any technology used for benefits, its uncotrolled use creates the serious problems for the human being. The vehicles also creates the very serious problem of pollution by emitting the hazardous gases, if it is beyond the standard values. Again due to the over speeding, drunk driving, drowsiness the accident occurs which destroys many life. The environment badly affected by the pollution which causes increase in the heat, acid rain, breathing problems etc.So to reduce the hazardous effect of vehicle, the smart vehicle monitoring system has been designed and developed using different IoT sensors and the Cloud computing concepts. With the help of our system vehicle owner can be alerted for the vehicle servicing if the emission of the gases from the vehicle is above the threshold. Also with the help of the image processing and IoT the buzzer can be raised against the drawsiness or fatigue by continuously monitoring the face of the driver. So, that it can reduce the pollution and the road accidents happens in day today life.

Identification of Defects in Fabric using Image Processing
Authors:- Asst.Professor Sumithra A, UG Student Surya Prakash S V, UG Student Vasanth G V, UG Student Vishaali K

Abstract:- Identifying the defects in the fabrics is a very important process in the textile manufacturing industries as it affects the quality of the fabrics manufactured by the industries. The main objective of this project includes reduction in the cost and improves the efficiency, to improve overall reliability and reduce the man power and to find the defective fabric and notify the workmen using an alert sound. Initially, the defects in the fabrics are found manually and only around 60% of the defects areidentified. As a consequence, there is an emerging need for the automation of identifying defects which will improve the quality of the fabrics and satisfy the customers. This proposed project is used to identify the defects in the fabrics by storing the images of the fabrics in a dataset which includes non-defective and defective images of fabrics in a grayscale format. Then, the images are extracted to the working platform software MATLAB. Once extracted, the images of the fabrics are pre-processed to resize images. If the reference and testing images are equal then there is no defect if they are not equal then the images are segmented using Adaptive K-means clustering algorithm and image representation is converted into matrix representation and the defected parts in the fabric images are identified. Finally, the defected parts are highlighted and shown and additionally the presence of the defects is notified using an alert sound using the system’s speaker as a soundsource.

Refine Observation of Kidney Stones using Neural Network
Authors:- J.Rabin Singh Antony UG Scholar RonyJoseph,P.Vijayaragavan,Asst. Prof. A.Jerrinsimla

Abstract:- Back Propagation Network with image and data processing techniques was employed to implement an automated kidney stone classification. The conventional method for medical resonance kidney images classification and stone detection is by human inspection. Operator-assisted classified methods are impractical for large amounts of data. Medical Resonance images contain noises caused by operator performance which can lead to serious inaccuracy classifications. Artificial intelligent techniques through neural networks and feature extraction are shown great potential in this field. Hence, in this paper the Back Propagation Network was applied for the purposes. Decision making was performed in two stages: feature extraction using the principal component analysis and the classification using Back Propagation Network (BPN). This project presents a segmentation method, Fuzzy C-Mean (FCM) clustering algorithm, for segmenting computed tomography images to detect the lung cancer in its early stages. The performance of the BPN classifier was evaluated in terms of training performance and classification accuracies. Back Propagation Network gives fast and accurate classification than other neural networks and it is a promising tool for classification of the cancer.

Woman Security Assistance System with GPS Tracking System
Authors:- K. Manaswini, B. Upendar Naik, G. Mukesh, Dr. Ravi Shankar Mishra (PhD and Hod.)

Abstract:- – Today in the current global scenario, women are facing many problems like women harassment. We propose to have a device which is the integration of multiple devices, hardware comprises of a wearable “Smart band” that endlessly communicates with sensible phone that has access to the web. This paper covers descriptive details about the design and implementation of “Smart band”. The device consists of a trigger, microcontroller (ATmega2560), GSM module (SIM900), GPS module (Neo-6M), IoT module (ESP-12E), Neuro Stimulator, Buzzer and Vibrating Sensor. In this project, when a woman senses danger she has to hold ON the trigger of the device. Once the device is activated, it tracks the current location using GPS (Global Positioning System) and sends emergency message using GSM (Global System for Mobile communication) to the registered mobile number and nearby police station. IOT module is used to track the location continuously and update into the webpage. Neuro Stimulator will produce non-lethal electric shock in emergency situations to detect the attacker, buzzer is used as an alarm to alert the nearby people so that they may understand that someone is in need and vibrating sensor will send the last location in case if the device gets defected. The main advantage of this project is that this device can be carried everywhere since it is small.
Today in the current global scenario, the prime question in every girl’s mind, considering the ever-rising increase of issues on women harassment in recent past is mostly about her safety and security. The only thought haunting every girl is when they will be able to move freely on the streets even in odd hours without worrying about their security. This paper suggests a new perspective to use technology for women safety. “848 Indian Women Are Harassed, Raped, Killed Every Day!!” That’s a way beyond HUGE number! We propose an idea which changes the way everyone thinks about women safety. A day when media broadcasts more of women’s achievements rather than harassment, it’s a feat achieved! Since we (humans) can’t respond aptly in critical situations, the need for a device which automatically senses and rescues the victim is the venture of our idea in this paper. We propose to have a device which is the integration of multiple devices, hardware comprises of a wearable “Smart band” which continuously communicates with Smart phone that has access to the internet. The application is programmed and loaded with all the required data which includes Human behavior and reactions to different situations like anger, fear and anxiety. This generates a signal which is transmitted to the smart phone.

Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption
Authors:- M.Venkata Rama Reddy, B.Brahma Teja, Dr.S.Babu

Abstract:- PHR (Particular thriving record) is a making calm decided model of success data trade that is as consistent as conceivable re-appropriated to be dealt with at an unapproachable, for instance, cloud suppliers. By and by, protection worries as precious success data that is shown to pariah. For guarantying the power of patients more than accessing their own PHRs, thus, it is considered as an ensured method to encode the PHR before redistributing. On the other hand, various problems related to security introduction, key association adaptability, beneficial client refusal and flexible access, experience is the most crucial difficulty in achieving fine-grained, cryptographically realized information locate a decent pace. Right now, a patient-driven novel structure is proposed and a portions set-up for information locate a decent pace PHRs placed aside in servers in semi-confided. For accomplishing fine-grained and adaptable information locate a useful pace PHRs, sway property based encryption (ABE) systems for encoding PHR record of each patient. It is actually not equal to previous researches in re-appropriating secure information, rotate around various situations related to proprietor information, as well as clients’ opening in the PHR structure into several security areas which by and large abatements the main association multifaceted nature for clients as well as proprietors. The patient security’s raised degree is ensured in that time by mishandling multi-authority ABE. In addition to this, this study permits dynamic alteration in record characteristics or access methods, bolsters productive on-request client/property disavowal as well as access to break-glass under crisis conditions.

Portable Sign Language Translator for Emergency Response Teams
Authors:- Mannava Vivek,Vitapu Gnanasagar

Abstract:- This paper details the development of a system that uses image classification models to identify the hand signs made by speech disabled persons. It allows for easier communication between the dumb/deaf person and others. The system utilizes deep learning in a portable device that helps emergency personnel understand the sign language made by the speech-disabled person without having to wait for an interpreter. As it operates on a database of sign language datasets, it can easily be trained to translate any sign language local to the region.

Optical Fibres
Authors:- Laveena Talreja

Abstract:- Optical Fibre is a flexible, transparent strand made up of very pure glass, the glass acts as a light pipe to transmit light from one end to the other end of fibre. The core of the optical fibre is surrounded by a cladding layer, made up of dielectric material. Stephen William Hawking once said – “Optical Fibre will lead an example for all loss less communication in mere future including IC technology. “Optical fibres cause minimum dispersion and has less attenuation value. The ultra-pure glass of fibre exhibits high tensile strength and extreme durability. Optical fibres are suited for carrying digital information.

Heat Load Calculation of Air Conditioning for Corporate Office
Authors:- M A Aziz, Mohammed Shoeb Ali, Abdullah Hassan, Supervision & Asst. Prof. Mohd Attalique Rabbani

Abstract:- Today, the field of air conditioning design is more technologically challenging than ever before. While design innovations and product improvement promise sleeker, more versatile, more powerful and more energy-efficient air conditioners, the challenge today lies in identifying the most appropriate products, for their application at hand. Indeed, today the emphasis is no more on understanding air conditioning “products” but on crating “solutions” and not just solutions, but “customized solutions” that suit specific needs .i.e., heating/cooling or ventilation. To quantify the air distribution required plays a vital role in HVAC. Quantity of air, which is evaluated from the heat gains/loss into the space need to be properly evaluated considering the orientation if the building, type of glass/structure, occupancy and nature of work in the conditioned area, so is the quantity of air need to be exhausted. And to evaluate ton of the refrigeration required for the same.

Power Generation through Speed Breaker
Authors:- Shoeb Yousuf Shareef, Syed Afroz, Md Siddiq Qureshi, Supervision Asst. Prof. Mohd Attalique Rabbani

Abstract:- – A large amount of energy is wasted by the vehicles on the speed breakers through friction, every time it passes over it. Energy can be produced by using the vehicle weight and speed. So here we propose a smart speed breaker that generates power. The reciprocating motion of the speed breaker is converted into rotary motion using the rack and pinion arrangement. We design a smart speed breaker that can pass vehicles coming from both sides and yet generate energy from it. The system makes use of mechanical assembly with metal sheets with linkages that press down with spring arrangement. The system makes use of the speed breakerpress and then uses a rack and pinion arrangement to press down and run generator motor thus generating energy. The spring mechanism is the used to drive the speed breaker back into original position. It converts rotary motion into linear motion, but sometimes we use them to change linear motion into rotary motion. This mechanism is very economical and easytoinstall. By doing proper arrangements we may generate high power electricity from road traffic.

Study of Regenerative Power System
Authors:- Syed Amer Hasan, Jaharath Khan, Ibrahim Mustafa, Supervision Attalique Rabbani (Asst.Prof.)

Abstract:- Proper utilization of waste energy can mitigate energy crisis and keep the cost under control. This project aimed to regenerate the energy from braking load in the vehicle. In this study, a prototype electric regenerative system is designed and tested experimentally to predict its performance. The prototype system is operated by a 12V motor that can recharge a 2.4V battery. It is observed that the amount of energy stored in the battery is increased with the increasing braking load. This energy can be used for operating auxiliary components such as fans, lights etc. and in cases, added to the main power source. In a nutshell, this project has brought the totally unused energy during braking in the limelight and paved the way to utilize this energy in a fruitful manner.

Mechanical Characterization of Hybrid Metal Matrix Compositions
Authors:- Mohammad Wajid Ahmed,Syed Abdul Gaffar,Mohammad Abdul Qayyu Ansari

Abstract:- This thesis, considers the potential of use Aluminum alloy 7075 And Graphite metal matrix composite (MMC) with particular reference to the aerospace industry. Initially, the required properties are identified, after which, the work explores pure aluminum and its importance in the industry along with its limitations. Using these limitations, MMCs were recommended as a possible replacement for aluminum and it is seen that the exact set of properties depend on certain factors. In this paper hardness and tensile strength experiments have been conducted by varying mass fraction of graphite (6%, 8%, and 10%) with Aluminum7075. The Rockwell cum brinell hardness testing method was used to determine hardness ,impact and universal testing machine is used to find the tensile properties for different compositions of aluminum 7075-graphite particulate metal matrix composite.

Online Vehicle Rental System
Authors:-Ansh Agrawal, Rishabh Mathur

Abstract:- The car rental system is being developed for customers so that they can book their vehicles from any part of the world. This application takes information from the customers through filling their details. A customer being registered in the website has the facility to book a vehicle which he requires. The proposed system is completely integrated online system. It automates manual procedure in an effective and efficient way. This automated system facilities customer and provides to fill up the details according to their requirements. It includes type of vehicle they are trying to hire and location. This system increases customer retention and simplify vehicle and staff Management in an efficient way. This software, Super car Rental System has a very user friendly interface. Thus the users will feel very easy to work on it. By using this system admin can manage their rental,Bookings, customer issues and vehicle issues etc…. The Super car information can be added to the system. or existing super car information can be edited or deleted too by the Administrator. The transaction reports of the car rental system can be retrieved by the admin,when its required. Thus, there is no delay in the availability of any car information, whenever needed the super car information can be Captured very quickly and easily.

Agribot
Authors:- Scholar Mohd Affan Ahmed,Scholar Abdullah Syed Mahmood Syed Jamal,Scholar
M.A Rauf Supervision & Asst. Prof. Mohd Attalique Rabbani

Abstract:- Many advances in technology have made the agriculture business a much less labor intensive industry to be a part of. If we think back even only 50 years, farmers were just beginning to incorporate technologies into their farming techniques. It has been said that individuals that are involved in the farming industry are some of the least susceptible to change
. They are very set in the ways of those came before them. When we take a look at the farming industry now, we can see that this is rapidly changing. Farmers are looking for new ways to implement technology to cut costs and reduce labor hours. One of the ways that farmers are beginning to explore new technologies in farming come from the RF agribot. This is something new to the agriculture industry, but is quickly gaining popularity from agriculture research companies around the country. These agribot are described by Farm Industry News as a agribot that drives it’s solving with a computer in control. Although still in the research phase of development, RF agribot are rapidly becoming more of a reality than an idea. The agribot is controlled by a RF remote. This can be moved forward and reverse direction using DC motors. Also this robot can take sharp turnings towards left and right directions. Most of the cases the things done during farming are plough, watering and seeding. For performing all these operations lot of manpower is needed. So, by using RF agribot all these things can be done with ease.

Video Surveillance System for Human Protective Equipment Detection
Authors:- Dhansura Husain, Khan MohammedAli, Qazi Altamash

Abstract:- We have presented the idea to reduce the accidents by simple video analysis software as a web-application which performs a new self-organizing method for modeling to allow or disallow person with a missing equipment. This can help in lowering the labour work of verifying the absent equipment. Moreover, the approach is suitable to be adopted in any chemical industry, nuclear industry or in a small laboratory which can improve safety of the workers and labourers.This is a very desirable operative mode, considering that a very actual visual surveillance task is looking for suspect missing equipment. In this paper, a video-based surveillance system for detecting the absent equipment objects in unmanned environments has been proposed. The system is able to detect a permanent change in a scene in a reasonable time and to recognize if the change is due to an missing equipment.

A Non Gps Based Location Tracking of Public Buses using Bluetooth Proximity Beacons
Authors:- Dean Academics Dr. Anmol Kumar Goyal,UG Student Yashaswini,UG Student
K. Swetha,UG Student K. Nithin Reddy

Abstract:- This paper presents the prototyped design of A non gps based location tracking of public buses using Bluetooth proximity beacons. The system design in this paper include microcontroller connected to Arduino Uno, IOT module, RFID, Bluetooth low energy device and another device like DC motor. These results of this help people to track the buses location and places where it travels without wasting their time by using mobile phone. The RFID will scan the data and scanner will be present in the bus stop and IOT module is used for scanning and receiving the data when bus was somewhere. By using Bluetooth, we can see the bus location and journey of bus.

Development of Nutrient Rich Biscuits by Incorporating Avena sativa and Moringa oleifera Leaves in Wheat Biscuits
Authors:-
Preethi G,Dhilipkumar M,Beulah Christy I,Thirumoorthy R,Gayathri P

Abstract – Biscuits are a type of bakroduct that are becoming one of the vital snack foods worldwide because of their taste, stable shelf life and crispiness. This study was conducted to enhance the nutritional content of biscuits by incorporating moringa leaves extract and Avena sativa(oat) flour. Moringa oleifera is from Moringaceae family. It is most widely grown in tropics and subtropics. These leaves are highly nutritious and are rich in proteins, iron, beta carotene, vitamin A, C and potassium[1]. Avena sativa commonly known as oats. It is rich in fibre, vitamins, minerals, essential amino acids and antioxidants[2]. Different compositions of oat flour and moringa leaves extract are mixed with wheat flour along with lecithin, salt, shortening, baking powder and palm sugar. The prepared dough is baked at 175°C-180°C for 15 minutes. The results showed that with the increasing addition of Moringa leaves extract and oats flour within the recipe, increases the protein, dietary fibre, total fat and sugar contents and also showed considerable changes in sensory attributes and in physiochemical properties also.

Authors:- Dr. Deepak Raj Rao G.

Abstract – Various new technological breakthroughs happened with the advent of Internet which made the Communication, Commerce, Banking and Governance, etc., easy and simple. Ecommerce, online banking, Digital Signature and Cloud Technology changed the Business and Commerce to new height. Online banking offers four benefits to the consumers like speedy, no queue, availability and digital and the invention of Bitcoin [1] in the year 2009 by Satoshi Nakamoto not only bring new avenue for financial transaction but also new challenges for the Law Enforcement Agencies in the investigation of crimes. There are so many myths such as all the transactions done using Bitcoin are anonymous and there cannot be any kind of digital evidence available if a Bitcoin is used while doing a crime. These myths about the Bitcoin need to be addressed for the performing better investigation in any crime done using Bitcoin. A study was conducted to find the availability of digital evidence that is created if Bitcoins are used to do any online financial transaction. This paper will provides the information found from the study on the various traces that gets created when using a Bitcoin for doing any kind of online financial transaction. Using these, it will be very helpful for the investigating officer in investigating the crimes in which Bitcoins are used.

Assessments of Geotechnical Conditions and Slope Stability Analysis: Case Study in Gedo town, Ethiopia
Authors:- Worku Firomsa Kabeta,Gemechu Abdissa Diro,Daniel Kefelegn Teshager

Abstract:- Slope stability analysis is a vital task to Geotechnical Engineers as slope failures can have devastating social and economic impacts. This paper focuses on the assessments of geotechnical conditions and slope stability analysis of Gedo town, which is located in central Ethiopia, where landslide incidence is active. The study involves a collection of both disturbed and undisturbed soil samples for laboratory tests, such as natural moisture content, unit weight, specific gravity, Atterberg limits, grain size analysis, and shear strength tests were conducted as per ASTM standard. The characteristics of the terrain, soil, groundwater table, and depth and geometry of the failures, were studied in this work. For the slope stability analysis, the safety factor is computed based on the general limit equilibrium method that encompasses various methods inside using slope/w in Geo Studio 2012 software packages. According to the results, the slope in the study area is unstable. The main types of landslide are slides and fall for the soil in the study area, and groundwater, rainfall, soil type, land use, shape, and angle of slopes are the major landslide factors. According to this research finding, the rainfall has an outstanding contribution to slope failure in the study area.

Experimental Research on Abrasive Flow Machining
Authors:- Research Scholar Kanapala Rajendra Prasad, Registrar & Prof. Dr. G. R. Selokar , (Supervision)

Abstract:- The effects of the Abrasive flow machining process and the field of electrochemical smaller scale machining process is uncovered the extraordinary capability of its accuracy machining. It is also found that, numerous investigations were focused mainly on process parameters one after another. Further, it is required that, the Abrasive Flow Machining (AFM) and Electro Chemical Micro Machining (ECMM) procedure is to be streamlined explicitly for every material with respect to MRR, dimensional deviation and machining cost. To minimize the number of experiments, it also planned to make use of Taguchi design of experiments with ANOVA, in terms of %ΔRa and MR. Hereditary Algorithms are utilized to establish an empirical relationship between process parameters and material removal rate (MRR).The machining surfaces were additionally examined by utilizing Atomic Force Microscopy (AFM) and Scanning Electron Microscopy (SEM) to study the erosion mechanisms and machining process.

Automatic Detection of Cardiac Arrhythmia using Neural Network
Authors:- UG Scholar M. Bharath,UG Scholar R.Sivashankar,UG Scholar P.Vijaya Sekar,Associate Prof. S.Hemamalini

Abstract:- Cardiac arrhythmia indicates abnormal irregular activity of heart beat that can be a great threat to human. So it need to be identified for clinical diagnosis and treatment. Analysing of ECG signal is an important role in determining cardiac diseases. An systematic method of analysing ECG signal and identifying the heart abnormalities have been proposed. Existing system uses the SVM classifier (support vector machine) for classification. K means clustering algorithm and dynamic time warping for detecting the values from the ECG . These methodologies provides less accuracy and faces high computational load is the main drawback. To overcome these drawbacks, we proposed a system, that uses the Feed Forward neural network method. This neural network has been selected for this system because it performs in One-way propagation. It computes the result fast and with high accuracy. At first QRS components have been extracted from the ECG signal. By rejecting the background noise from the ECG signals to improve the accuracy in results. From the extracted signals, transforming raw data into a readable format that is more suitable for further analysis. Data are given to the feature extraction process. Neural networks always perform supervised learning tasks, building knowledge from predefined data where the similar matching information are provided in advance. The final task is to classify the heart abnormalities by comparing the ECG and previously stored information. Here, data used for the analysis of ECG signal are from database.

Analysis of SS316L by using Abrasive Flow Machining
Authors:- Research Scholar Kanapala Rajendra Prasad, Registrar & Prof. Dr. G. R. Selokar , (Supervision)

Abstract:- Experiential test facility is designed, which comprises of a) Work holding stage, b) Tool encouraging gadget, c) Control framework, d) Electrolyte stream framework, and e) Power supply framework. The experiments were performed by selecting five parameters viz. Electrolyte Concentration (EC), Machining Voltage (V), Machining Current (C), Duty Cycle (DC), and Frequency (F). It is also found that, numerous investigations were focused mainly on process parameters one after another. Further, it is required that, the Abrasive Flow Machining (AFM) and Electro Chemical Micro Machining (ECMM) procedure is to be streamlined explicitly for every material with respect to MRR, dimensional deviation and machining cost. The present research work is planned by selecting Nickel, SDSS (5 – 6 % of Nickel content) and Inconel 600 (72% Nickel content) as a base material. The machining surfaces were additionally examined by utilizing Atomic Force Microscopy (AFM) and Scanning Electron Microscopy (SEM) to study the erosion mechanisms and machining process.(AFM) and Scanning Electron Microscopy (SEM) to study the erosion mechanisms and machining process.

The Science of Sound and its Quantitative Applications
Authors:- Ananya Roy

Abstract:- Over 2500 years ago, Pythagoras laid down his “Harmony of Spheres” theory. This pervasively ambitious theory cites that all life on Earth is governed by the unique pitches of celestial bodies, beyond the range of the human ear. Simply stated, all the planets and stars in the Silar system move according to rigid mathematical equations,which in turn correspond to musical notes and produce a symphony. The Sun, Moon and planets all possess a unique frequency. The ratios of these frequencies correspond to musical intervals. These are further noticed in the placement of organs within the human body, shells, pinecones, even spiral galaxies. Hence, consonance and dissonance of music intervals manifest themselves in varying proportions through the intonations of the world around us. Music intervals demonstrate a stark similarity to the harmonic orbital resonance exhibited in planetary elements and can find multiple applications in the medical and astronomical field.

Data Security using CloudSplit
Authors:- Jatin Sharma

Abstract:- Cloud computing transport or carry to a place everything as a service over the web supports demand of user anywhere, for example network, software, storage, hardware. Benefits of cloud storage are easy accessibility of data anyplace and at any time cost efficiency, and high reliability of the data. So every company is transferring its data to the cloud, means it uses the storage service provided by the cloud provider. So it is mandatory to protect that data against hackers. In this paper we propose splitting algorithms adoptable to better security for the cloud.

Self Defence Device with GSM Alert and GPS Tracking with Fingerprint Verification for Women Safety
Authors:- D. Samhitha, B. Achyuth, B. Aruna, Asst. Professor K. Sanath Kumar, Hod. Dr. B. Kedarnath

Abstract:- Cloud computing transport or carry to a place everything as a service over the web supports demand of user anywhere, for example network, software, storage, hardware. Benefits of cloud storage are easy accessibility of data anyplace and at any time cost efficiency, and high reliability of the data. So every company is transferring its data to the cloud, means it uses the storage service provided by the cloud provider. So it is mandatory to protect that data against hackers. In this paper we propose splitting algorithms adoptable to better security for the cloud.

Microstructural and Mechanical Characterization of AA7075/(SiC+Al2O3) Hybrid Composites
Authors:- M.Tech. Scholar Swati Yadav, Assistant Professor Parveen Sharma, Assistant Professor Vishal Sharma

Abstract:- This paper presents the behaviour of hybrid composites with aluminium matrix AA7075 alloy, reinforced with silicon carbide (SiC) andAl2O3 .Newly formed AA7075/FA/SiC hybrid composites are the combination of the two different hybrid materials. Material obtained on combining, when two or more materials possessing significantly distinct physical or chemical characteristics, produce a material with properties different from the individual one is known as composite material .These materials are magnificent materials with high strength to weight ratio, highly resistant against corrosion and wear, good stiffness properties etc.

Recent Trends of Fibre Optics in Physics
Authors:-Bidyut Prava Nayak

Abstract:- The optical fibers which are considered as waveguides can be applied to light transmission applications. The core part of the optical fiber is surrounded by a glass or plastic layer called cladding which is characterized by the refractive index that is lower compared to the core refractive index. The total internal reflection phenomena are necessary for the fine confinements of the light within the waveguide. Basically, optical fibers can be categorized based on the structure, modes number, refractive index profile, dispersion, signal processing ability, and polarization. In this report, we focus on the applications of fiber optics in different area of physics.

Effect of Daily News on Stock Fluctuation An NLP-Based Approach
Authors:-Shouvik Dasgupta

Abstract:- Stock market prediction is the act of trying to determine the future value of a company stock or other financial instrument traded on an exchange. The successful prediction of a stock’s future price could yield significant profit. Stock fluctuation prediction is done to determine whether the current stock value will rise, fall or remain the same. One of such ways of predicting the fluctuation can be the news headlines of that particular day. Using an NLP based approach and a baseline classification model, we have tried to determine whether daily news can be used to predict stock fluctuation.

Artificial Intelligence
Authors:-Harshita Abrol

Abstract:- This study examined the impact of Artificial Intelligence on society. System that could undergo recursive self-improvement, might help us to put an end to a war, poverty, disease etc. A system that is able to perform all human-related tasks leaving behind the human intelligence. The question is that creation of such intelligence is guaranteed to be beneficial knowing that it may have disadvantages too. This study was carried out to know the views of people on this. AI has full potential to become more intelligent than any human, we have no such prediction that how it will actually behave.

Enhancing Medical Images using Non-Local MEANS Filter to Detect Abnormalities in the Chest Region
Authors:-Gogul Ram RB,Arthi R,Kalimuthu K

Abstract:- Reading a medical image accurately requires special training and lots of experience. Even radiologists who have trained in this field for several years tend to make mistakes. These mistakes have on many occasions have cost the lives of many people. A study states that about 40% to 54% of the malpractice claims are due to the misinterpretation of radiologic images. The advances in artificial intelligence have paved the way for making the computer learn any kind of pattern just like the human brain and use the acquired knowledge to predict the unknown factors. The main challenge in reading medical images is the noise that is caused while capturing, and storing them. Removal of the noise during the pre-processing step of an image is very essential before feeding it into a neural network. The main intent of the project is to remove noise from the radiologic images using the Non-Local Means (NLM) Algorithm and to build a simple Convolutional Neural Network(CNN) model to detect abnormalities in the radiologic images. In the already existing models, very complex algorithms are used with several layers of neural networks that would result in an increase in time and memory. This paper also focuses on using the same CNN model to detect the abnormalities, in this case, Pneumonia and Breast cancer in both X-rays and Ultrasound images. A result of very high accuracy of 95.11% was obtained while detecting the abnormalities from the medical images.

Design and Control of AMF Panel using WI-FI and Gateway Controller
Authors:-Priyanka Deore, Kunal Jangale, Nilaya Mendhe, Rugved Amrutkar, Prof. Kushal Dhawad

Abstract:- This paper focuses on the development of a Smart Auto Mains Failure (AMF) Panel meant for day to day electrical application. AMF Panel is unavoidable in Industries, Hospitals, Educational industries etc where Generator is Compulsory. It acts as a switching mechanism between the generator, load and the main power supply. It ensures consistent power supply to the load. AMF panel helps in detecting power failures, Overload condition in supply mains and to start generator set automatically hence saving of time and energy is possible. An AMF panel, using microcontroller based M2M GATEWAY controller which can be controlled from distance using WI-FI is presented here. The proposed system displays parameters such as Voltage, Current, Power Factor, Active Power etc on AMF panel as well as on Android mobile phone using MYMQTT App.

Leisure and Stress Coping in Today’s Situation
Authors:-Harshita Singh

Abstract:- A stressful situation alert! as the pandemic has transpired and almost the whole human race is facing a lockdown condition. The people are stressed as the majority of us have elderly at home who are suffering from some kind of diseases which in turn is a bait for the COVID-19. People are away from their loved ones. World economy is deteriorating overall resulting in an extremely stressful situation.

Strategies to Accrete Investors and Startup for Seed Funding through an Android App
Authors:-Tanmay Maity, Anant Balgi, Anand Yadav, Prof. Vaishali Malpe

Abstract:- In the past few years, the startup industry is booming at a faster pace, and the biggest hurdle for a startup is early- stage financing. The startup has minimal access to funds and not bankable without security; the business angel and venture capitalist easily would ensure funds without protection for a high potential business being a partner to make the business success. However, there is a significant communication lacuna between investors and startups. There is no organized digital system in which the investor can get to know about good startup ideas. A system can be developed in which the investor and startup can communicate in a closed environment without regular hassles.

Strategies to Accrete Investors and Startup for Seed Funding through an Android App
Authors:-Tanmay Maity, Anant Balgi, Anand Yadav, Prof. Vaishali Malpe

Abstract:- In the past few years, the startup industry is booming at a faster pace, and the biggest hurdle for a startup is early- stage financing. The startup has minimal access to funds and not bankable without security; the business angel and venture capitalist easily would ensure funds without protection for a high potential business being a partner to make the business success. However, there is a significant communication lacuna between investors and startups. There is no organized digital system in which the investor can get to know about good startup ideas. A system can be developed in which the investor and startup can communicate in a closed environment without regular hassles.

Design and Fabrication of Corn Peeling and Cutter Machine
Authors:-Akhilesh Samudre, Akshay Thubrikar, Hemant Vaidya, Dr. R.K. Pohane (guidance)

Abstract:- There are many maize threshing techniques in India which are used in day to day life. Maize is world’s largest resourceful seed crop. The techniques used to separate seed in old days are removing the leaf by hand or by chopping the corn by wooden rod. The main problems with these machines are that they are not affordable to farmers who are having less acreage farms and which they do not require these big threshing machines. Also, in this process the kernels were getting damaged and the rate of production was less. Many farmers in India are not affordable to use these machine system can be established these machine provides simple mechanical design. The existing machine of corn de-seeding in agriculture industry consist of separation of grains only. But for making the past of corn another machine is required which is not affordable for farmers.so in this concept by keeping these things in mind we design the new concept which consist of three operation like seed separation, seed paste and cob crushing in single assembly. In this concept there is no need of any extra attachment. The concept model of machine was made by using AutoCAD software and required calculation were made .After freezing concept, later it was converted into 3D model using CATIA-software.
The fabrication of model was done and test was conducted.

Overview of Peristaltic Pump Suitable For Various Slurries and Liquids
Authors:-Atish A. Chavan, Amol A. Patil, Aashish S. Patil, Vaishnav N. Chougale, N. S. Patil

Abstract:- A peristaltic pump is a type of positive displacement pump used for pumping a variety of fluids. The fluid is contained within a flexible tube inside a circular pump casing. A rotor with a number of “rollers”, “shoes” or “wipers” attached to the external circumference compress the flexible tube. As the rotor turns, the part of the tube under compression closes, thus forcing the fluid to be pumped to move through the tube. Additionally, as the tube opens to its natural state after the passing of the cam (restitution) fluid flow is induced to the pump. In this paper construction, basic principle of working and pump design specification has been discussed. The advantages and critical application have been presented.

A Novel Sole Design for Astronaut to Stimulate Lower Body Blood Circulation
Authors:- Tvisha Bhavesh Gala, Nischal Patel, Reetu Jain, Shekhar Jain

Abstract:- “Gravity” is a habit that is hard to shake off. This is well-realized by astronauts during their long stay in space, Since there is no gravity to pull blood to lower parts of the body within 2-3 months astronauts have puffy faces and bulging blood vessels in their necks and appearance isn’t the only ugly side effect of microgravity. The lack of blood flowing to and from the brain can cause astronauts to feel dizzy and sometimes even faint when they return to Earth’s gravity. Microgravity has also caused small blood clots in two astronauts which could have been fatal. To prevent this we came up with our solution “Bubble For Foot Trouble” . It is a carefully designed Shoe with a custom sole that ingeniously solves the problem of blood flow. It works on a basic principle of “acupressure”, We have used acupressure points here for the circulation of blood and roller for the friction. Astronauts don’t have a forceful walk in the shuttle, they float and more importantly use their feet for attaching themselves to foot rail. Once astronauts apply force on their feet or move through the foot rail in the ISS (international space station) their heel or toe is pressed and the attached mechanism consisting of leaf spring and gear train will generate the rotation of the roller through the rack & pinion gear thus stimulating the blood circulation.

An Efficient Recommendation System using Collaborative Filtering and BlockChain Technology
Authors:-B.Rajmohan, J.Reshma, M.Nandhini, V.Nivetha

Abstract:- The Web creates excellent opportunities for businesses to provide personalized online services to their customers. Recommender systems aim to automatically generate personalized suggestions for products/services to customers (business or individual). Although recommender systems have been well studied, there are still two challenges in the development of a recommender system, particularly in real- world B2B e-services. In the proposed recommendation technique utilizing the fast diffusion and information sharing capability of a large customer network is used. The proposed method follows the Blockchain technology and collaborative filtering (CF) principle over distributed and local searches for similar neighbors over a customer network to generate a recommendation list to the users according to their previous product search and purchase. Security for Payment confirmation has been implemented with a graphical password verification concept by link chain algorithm.

Real Time Bus Monitoring System
Authors:-Pratima KedarnathYadav, Dr. Neetu Sharma

Abstract:- In this days the daily operation of a bus monitoring system, the travelling of vehicles is affected by some conditions such as traffic jam, unexpected late departure and arrival, and irregular in passenger demand, irregular vehicle departure times, and many other incidents. The real time bus tracking system is designed to serve as a tracking system for the bus passengers using a data fetched by bus conductor. This paper mainly focuses on a system that helps passengers and bus depot administration, to locate the current location of the buses and estimated arrival time of the busses to their next bus stop. The complete system is worked through a single mobile app. The bus depot administrator will keep the complete travelling history of the busses. This paper discusses the real time bus monitoring in India and explores the difference between the real time bus monitoring and other bus monitoring.

Analysis of Single Point Cutting Tool in Plain Turning
Authors:-Murthy Raj R, Prof. Janardhana K

Abstract:- This paper highlights the effect of the change in depth of cut (DOC) cutting forces generated on the tip of the Single Point Cutting Tool (SPCT) while working. The tool is first reduced to standard dimension using the method of grinding and the tool geometry is kept within standard dimensions and all angles and edges are measured. Cutting forces acting on cutting tool are recorded at different depth of cut. Where cutting forces are measured using lathe tool dynamometer. Years of research has conclusively shown that it a process involving plastic deformation in which large strains and strain rates are developed by localized shear deformation of work material immediately ahead of tool. Heat generated during the chip formation process as a result of plastic deformation and friction. The heat influences chip shape, tool wear, surface finish and cutting forces.

Mobile Ad Hoc Network
Authors:-Muni ,Rupali Malhotra

Abstract:- Mobile ad hoc networks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence, routing paths in mobile ad hoc networks potentially contain multiple hops, and every node in mobile ad hoc networks has the responsibility to act as a router. This paper is a survey of active research work on routing protocols for MANET .

Analysis of Multiclass Pesticide Residues in Vegetables using Microwave Assisted Extraction Followed by High Performance Liquid Chromatography with ultraviolet Detection
Authors:-Lema Yadeta Gemechu

Abstract:- Pesticides are found in varies parts of the food matrices in quite small concentration. Vegetables, such as potato and pepper are being consumed in increasing quantities which considered fresh production that is most susceptible to pesticide residues. Due to this, the information on the levels of pesticides residue in vegetables is usually used to assess their quality and safety. Potato and pepper are a type of vegetables that are mainly used throughout the world. The populations of Jimma town and around Kochi market were, one of the users of such vegetables. Therefore, the study was focused on the trace level determination of chlorfenvinphos and diazinon pesticides in potato and pepper. Thus, microwave-assisted extraction (MAE) for the sample preparation and High Performance Liquid Chromatography (HPLC) coupled with Ultraviolet Visible (UV) for the determination of these pesticides residues in these vegetables have been performed. The samples were collected from Kochi local market, Jimma town, Oromia region in Ethiopia. For analysis, the collected samples were washed by nitric acid, chopped, dried at room temperature, ground and kept in refrigerator at (-20ºC) till analysis. The extraction was performed by using methanol and petroleum ether (1:2 v/v) as the microwave extraction solvents. The powders of the samples were digested using micro wave oven under the standard procedure conditions and subjected to HPLC-UV detection after cleanup for analysis. From the standard calibration curve the LOD of the two compounds (Diazinon and chlorfenvinphos) were calculated 1.263 and 2.926 ppm respectively. Under this study, the determined amounts of Diazinon in potato were 1.40 ppm and while that of the chlorfenvinphos was 0.55 ppm, which were below their detection limits.

Review and Analysis of Hydraulic Excavator
Authors:-UG Rashid Jameel,UG Richik Mukhopadhyay,UG Subhajit Mondal,UG Rittik Roy,UG Ritesh Swaroop,Asst. Prof. Kaushal Kishore

Abstract:- Valve-controlled hydraulic actuation systems are favoured in many applications due to their fast response, high power-to-weight ratio, and stability under variable working conditions. Efficiency, however, is the main disadvantage of these systems. Pump-controlled hydraulic actuations, on the other hand, eliminate energy losses in throttling valves and require less cooling. Furthermore, they inherently hold the ability to recover energy from assistive loads. Pump-controlled circuits for double-rod cylinders are well developed and are implemented in many industrial applications, including aviation. However, pump-controlled circuits for single- rod cylinders usually experience performance issues during specific modes of operation. In this paper, a new circuit using two valves to compensate for the differential flow of single-rod actuators is proposed. They have a minimum throttling effect in all other operating regions to preserve the efficiency. The new circuit has been experimentally evaluated. Its performance has also been compared with three other previously proposed circuits. The proposed circuit displays an improved performance, besides being capable of energy regeneration.

A Study on Hollowcore Foam Concrete Wall
Authors:-Prof. Dr. Vijay R. Thombare,Research Scholar Harshada H. Shingate,Research Scholar Varsha S. Jadhav ,Research Scholar Sanjeevani A. Patil,Research Scholar Sagar Chavan,Research Scholar Aishwarya Shinde

Abstract:- Now a days the construction time, improving the quality of concrete work, durability and cost of construction of any structure plays important roll to compensate the cost of project. There are number of new technique and innovative method used, hollowcore foam concrete wall is one of them. Foam concrete is either a cement paste or mortar, classified as cellular light weight concrete, in which air voids are entrapped in mortar by suitable foaming agents. In this study, we are carried out mechanical properties of cellular light weight concrete wall, which made from ordinary Portland cement, fly ash, water and foaming agent admixture. This building methodology for low cost housing and economical advantages achieved by its adoption.

Introduction to Python for Education
Authors:-Smita Shashikant Patil (B.sc.Comp & MCA)

Abstract:- Python is a general purpose and high level programming language. It language use for developing desktop.GUI application websites and web applications. It also use to focus on core functionally of the application by taking care of common programming tasks. It is readable and maintainable. It compatible with major platforms and systems. It have robust standard library and have it open source frameworks and tools.

Bandwidth Approximation in Wireless Ad-Hoc Networks
Authors:-Minakshi Dilware, Dr. Shivangini Morya, Dr. Sudhir Agrawal

Abstract:- Estimation of accessible data transfer capacity for specially appointed systems has consistently been open and dynamic test for the scientists. A ton of writing is proposed over the most recent 20 years to assess the leftover transfer speed. The primary target of the work being confirmation of new stream in the system with the requirement that any current transmission isn’t influenced. One of the prime components influencing the estimation procedure is the crash among parcels. These impacts trigger the backoff calculation that prompts wastage of the usable data transmission. Albeit a ton of condition of workmanship arrangements were proposed, yet they experience the ill effects of different defects and deficiency. Other factor adding to the error in existing arrangement is the portability of hubs. Hub portability prompts unsteadiness of connections prompting information misfortunes and defer which sway the data transmission. The present paper proposes a systematic methodology named Analytical Available Bandwidth Estimation Including Mobility (AABWM) to assess ABW on a connection. The significant commitments of the proposed work are: I) it utilizes numerical models dependent on reestablishment hypothesis to ascertain the impact likelihood of information bundles which makes the procedure straightforward and precise, ii) thought of versatility under 3-D space to foresee the connection disappointment and gives an exact affirmation control. Broad recreations in NS-2 are done to think about the presentation of the proposed model against the current arrangements.

Study of Modelling, Analysis and Testing of Friction Stir Welding of AL Alloys 6061 & 6082
Authors:-MirzaMudassirBaig, JafferBin Khaleel, MdLiyaqath Ullah, Supervision Asst. Prof. Mohd Attalique Rabbani

Abstract:- Aluminum alloy 6061 & 6082 has gathered wide acceptance in the fabrication of light weight structures required a high strength to weight ratio. Compared to fusion welding processes that are routinely used for joining structural aluminum alloys, friction stir welding process is an emerging solid state joining process in which the material that is being welded does not melt and recast. This process uses non-consumable tool to generate frictional heat in the butting surfaces. The welding parameters tool pin profile plays a major role in deciding welding quality. In this project an attempt is made to understand the effect of welding speed and tool pin profile on FSP zone formation in Aluminum alloy 6061 & 6082.Three different tool pin profiles are used to analysis the welding joints. Those profiles are 1.Straight cylindrical, 2.Tapered cylindrical, 3.Square. In this project we are also doing coupled field analysis for both cutting tools and welding plates.
We are also doing experimental work by using milling machine. In that we are preparing fixture, cutting tools and plates. Main parameters taken for this project are Cut feed, spindle RPM.
Machine used for the experimental work are FN2 semiautomatic machine. For modeling we are using Pro/Engineer software, for analysis ANSYS.

Consideration of Traffic Congestion by Using Traffic Flow Analysis in Bogura, Bangladesh
Authors:-Mr. Sajjad Hossain Dinnar

Abstract:- In late time, traffic blockage issue has gotten one of the most expensive, both money related and ecologically, issues in numerous urban communities everywhere throughout the world. It additionally causes important time loss of residents. Numerous specialists proposed that the chief advance to relieve the clog issue is to recognize traffic blockage attributes. This examination has been directed to gauge the force of traffic blockage of Bogura town. Traffic volume study and spot speed study were the fundamental methodological ways to deal with direct the investigation. The information gathered has been broke down using diverse measurable PC bundles. Diverse traffic stream hypotheses and models have likewise been utilized to ascertain traffic stream parameters that uncover traffic attributes. The examination has investigated that auto-rickshaw, cycle-rickshaw, bike, and cruiser are the famous traffic mode and traffic stream turns out to be so escalated during the morning, early afternoon and night hours. It has likewise uncovered that College street is the most blockage inclined course than Thana road and the degree of administrations of all crossing points is F aside from traffic junction which gave a relatively better degree of administrations to the voyagers of the town. The examination has likewise distinguished the serious issues related to various street areas having a poor degree of administrations.


Product Recommendation System
Authors:-Vasudha Mishra, Aditi Rathod

Abstract:- Today the problem isn’t about having paucity of information but rather it’s about how we are efficiently using that information in order to get the best results in the near future. In this research paper, I have enlisted all my findings regarding the recommendation system, how can we prepare its model using machine learning, its importance in today’s technological and commercial sector. I will elucidate about the applications of non- personalized recommenders, content-based recommenders and collaborative recommenders. The proposed model will take input from the customer and as a result will recommend all the relatable products in order to maximize the marketing strategy. After the extraction of the required features which are based on the type of product, the model will quantify the behaviour of the data and apply the concept of cosine similarity, it will transform the data and after arranging it in the decreasing order, it will show the resultant output of the related products. All these are the findings from various different sources which in turn throw insight of my understanding while researching through this topic.


Grid Connected Hybrid Energy Storage Structure with Renewable Energy Sources
Authors:-M.Tech. Scholar Amit Thakur,Prof. Madhu Upadhyay

Abstract:- The structure of AC and DC systems needs to be modernized to meet consumer needs. When DC microgrid is associated with DC renewable energy and storage resources, it is highly praised for its high efficiency, stability, dependability or load contribution performance. The main objective of any DC microgrid is to provide a correct load power balance support on the allocate generator (DG) power supply. Due to the irregular nature of renewable energy, batteries play a main role in load stability between DC microgrids. Existing energy management strategies may be able to meet load demand. However, this technology is not applicable to rural power systems. This research provides an energy management strategy (EMS) for DC microgrids, using solar energy, wind power, super capacitors, and batteries as input sources for rural power. Conventional design methods take into account the nominal super capacitor voltage in the model and design of the controller. The conventional method of control construction can make the system unstable or introduce ringing in the DC bus voltage at the low capacity of the super capacitor. To this end, the sensitivity of the stability of the DC microgrid to the voltage change in the super capacitor is analyzed and a control design method is proposed to ensure the stability of the DC microgrid in all modes of operation. Design and stability analysis of DC microgrid with battery super capacitor storage system under variable supercapacitor operating voltage.


A Review on Mango Leaf Diseases Identification using Convolution Neural Network
Authors:-Reseacrh Scholar Kanak Maheshwari, Assistant Professor Amit Shrivastava

Abstract:- The identification of plant diseases plays an important role in taking disease control measures to improve the quality and quantity of crops. Plant disease automation is very beneficial because it reduces the monitoring of large farms. Leaves are a food source for plants, so it is very important to detect leaf diseases early and accurately. This work includes a deep learning-based method that can automatically identify leaf diseases in mango plant species. Plants have become an important source of energy and a fundamental problem in solving the problem of global warming. However, this important source of livelihood is threatened by plant diseases. Convolutional neural networks (CNN) show unique advantages (advantages) in object recognition and image classification. This article introduces the opportunity to classify plant diseases based on CNN This model will be developed for classification of mango leaf diseases.


Voltage Modulated Direct Power Control for A Weak Grid Connected Voltage Source Inverter Based On Series Voltage Regulator
Authors:-M.Tech. Scholar Md. Kaisar Azam Ansari, Professor & Hod Madhu Upadhyay

Abstract:- This article introduces concept of a new Serial Regulator (SVR) to control the DC bus voltage of the radial DC microgrid. The planned SVR uses an active double-bridge DC-DC converter, tracked by a full-bridge DC-DC converter. Injects a dynamic power in series with the DC network to recompense for the drop in resistance in network As a result, voltage levels at changed points in network become autonomous of load changes and remain within specified limits. Note that nominal power obligatory by the SVR is very low (eg 2.7%) associated to load request since 5% voltage regulation. In this job, the regulator is associated to the midpoint of the network, but it can also be associated to other places to get the same optimal rating. In this document, we have designed a three-phase voltage basis (VSI) inverter with voltage moderated direct power control (VM-DPC) associated to a weak power grid. If conservative vector present control (VCC) technique is applied, PLL system may cause system to be unhinged. Compared to the traditional VCC technique, chief benefit of proposed VM-DPC method is to eliminate the PLL system. Furthermore, to inject nominal active power into the weak grid, VSI system must also produce a convinced amount of reactive power. Analysis based on eigenvalues shows that required power within a specific operating range.


A Review on Heat Transfer Characteristics in a Solar Air Heater Duct with Rectangular Ribs using CFD
Authors:-M.Tech. Scholar Yogesh Ubnare, Professor Punam Kumar Agade

Abstract:- In order to improve performances, in terms of higher thermodynamic efficiency and power output for heat exchanging devices like solar air heaters, heat exchangers and machines like gas turbines, the study of heat transfer mechanism and fluid flow play a vital role. Thermal assessment of heat exchanging devices, computational fluid dynamics (CFD) approach has advantages over the cost effecting practical experiments. To understand the complete phenomenon of heat transfer, heat flow as well as fluid flow must be considered in numerical analysis. Hence, accurate numerical method turbulence model and equation solving approach are required to predict heat transfer behaviour.


Artificial Neural Network Based Position Control of Three-Degree of Freedom (3-DOF) Serial Robot
Authors:-Tadele Tegegne

Abstract:- Artificial neural network based PID controller for 3-DOF serial robot position control is designed and modelled for three-degree of freedom (3-dof) serial robot manipulator and to control a robot arm using PID and ANN controller to acquire the desired position. The necessary process where modelled before applying control techniques to guarantee the execution of any task according to a desired input with minimum error. Both forward and inverse kinematics where derived in robot modeling based on Denavit Hartenberg (DH) representation. PID controller robot taken consists of three rotational joints (3-RRR) driven by motors. The manipulator was forced to track accurately a prescribed trajectory. This is achieved through the application of modern control methods known as artificial intelligent controller. The problem of controlling the joints was more simplified by combining the ANN with PID controller methods and provides the network with more data about the structure and behaviour of the system.


Salesforce Einstein: Artificial Intelligence for Customer Success Platform
Authors:-Naval Kishore Saini, Harshit Sharma

Abstract:- Salesforce Einstein is a set of advanced AI capabilities that help users get smarter insights from their data in order to deliver personalized customer experience, get proactive recommendations for the next best actions, and automate routine tasks. Einstein analyses our historical data against set parameters and creates data models that are further trained on huge data sets. When fresh data comes in, Einstein double-checks whether the previously created operational models are still accurate, and updates them in case they’re outdated. This way, Einstein-based predictions and recommendations always stay up-to-date.


Expert System using Artificial Intelligence
Authors:-Ananya, Ashid N, Joseph Kunjachan, George Devasia, Sowmya K

Abstract:- The idea of expert system as assistant in improving healthcare was a plan to transform industrial robots into precision machines for surgery and beyond. But no matter how impressive, robotics in healthcare is still a system controlled by humans. The real magic of the 21st-century expert system will come from artificial intelligence systems that can learn so much that it will outperform the best doctors by combining all the available knowledge in all medical repositories. However, most experts agree that AI will not replace trained medical staff, just make them more efficient in several areas. Expert System using Artificial Intelligence interacts with the patients with the help of the Natural Language Processing (NLP) and takes the required information or data regarding the disease. The Expert System then calculates the possible outputs or diseases and their root causes and says those predictions back to the patient.


Man in the Middle Attack Prevention using Token Generation Technique
Authors:-V.Gokula Krishnan, B.Ajith Kumar, R.Mohan,V.Mohanasunder

Abstract:- Man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. When we create a new session, the session is can be polluted by a third party The use of token generation both in the server and in the web page of the client is used for matching the session if the web page token pattern dose not match the server token pattern then it is identified to be a attacker .This method prevents a fake user to accessing the data in the database. The goal of the project is to deduct and prevent the attackers who uses duplicate session and tries to access the web site. A random number in both server and website is generated by this way session attack can be prevented.


Angular: One of the Most Popular MVC Frameworks in JavaScript
Authors:-Lokesh Kumar

Abstract:- Angular is one of the widely used MVC frameworks for modern single-page web application development which is designed to support dynamic views in the web applications. JavaScript frameworks are the backbone of single page web applications development and provide superpowers to plain HTML and JavaScript. Angular, release by the search engine Google and uses the MVC architecture with the onset up source JavaScript. Angular is highly enriched in prominent attribute for designing the client side applications with many features and properties. There numerous new mobile and web-based application frameworks have been released and adopted in both communities of software development industry and research. It allows you to decorate your HTML with special markup that synchronizes with your JavaScript leaving you to write your application logic instead of manually updating views. There are various other JavaScript frameworks like VueJS, BackboneJS and ReactJS frameworks competing together with the different versions of ‘Angular’ frameworks. To further assist Angular developers, this research proposes how the concept of model-driven development can be applied to Angular-based development. As the usage and demand of mobile applications increased, the need for cross-platform frameworks has significantly increased as well. This paper totally revolves around the Angular, like a tour to Angular with its important features and also gives the introduction to the versions of Angular.


Angular: Resolving Multi Tenancy Issues Using Cloud Automation
Authors:-Scholar Mangesh Latekar, Prof. Roshna Ravindran

Abstract:- Cloud Computing has gained much importance in past years, and is growing further rapidly. Due to use of virtual machines (virtualization), multiple customers can share one single machine by sharing its hardware, resources and database. This paper discusses the issues involved in multi tenancy cloud environment and suggesting if it can be resolved by using cloud automation.


Speaking System for Mute People using Hand Gestures
Authors:-Aakanksha Shukla Aditya Bambal Akshita Sharma Avanti Dasre

Abstract:- Mute people can’t speak and normal people don’t know the sign language which is used for intercommunication between mute people. This system will be useful to solve this problem. Gestures are in line with people’s habits of communication, so many researchers have done a lot of work in gesture recognition based on vision based approach, hand gestures also known as sign language will be converted into voice for mute people. Gyroscope is used for hand gesture recognition in this system. Using gyroscope to get the hand moment, and then process those gestures using a ARDUINO MEGA 2560, then displaying that gesture on LCD and At last, the template matching is used to realize the hand gesture recognition. The recognized gesture is processed by the hardware and converted to voice.


The Future of Start-ups: Indian Crowdfunder
Authors:-Khemchand Singhadiya, Gunturi Naga Vyshnavy, Shreyash Mishra, Prof. Surekha Janrao

Abstract:- As an impact of globalization, use of internet is increased radically. So, transactions through Internet are established as new trend which is efficient and effective. This project will provide an online platform through which a large number of individuals across the globe can fund a new business venture or projects in small amounts. This project will beneficial for both investors and ventures, investors can fund a variety of new ventures and ventures can present their project to a vast number of investors. This project will also support social media that will bring investors and entrepreneurs together on a single platform, with the potential to increase entrepreneurship by expanding the circle of investors apart from existing traditional ways like loans, lenders and venture capitalists.


Patient Monitoring System from Facial Expressions using Python
Authors:-U.G. Scholar A. Sudharsan, U.G. Scholar A. Yaswanth, Assistant Professor Mrs.K.Hemapriya

Abstract:- In human communication verbal, vocal and non-verbal signals are used to communicate with one another. Usually people tend to precise their emotions either by verbally or vocally, except for those who cannot communicate verbally or vocally, non-verbal signals (Facial Expression) are the only form of communication, which helps to spot the emotions of the person. Basically human facial expressions change with different states of health. Abnormal conditions such as pain is assessed usually through self-reports or by an observer. Reports of pain may be vulnerable to errors due to subjective biases of observers. Moreover, continuous monitoring by humans is impractical. Therefore, automatic pain detection technique have deployed to assist human caregivers and complement their service, thereby improving the standard management, especially for non-communicative patients. Facial expressions are reliable indicator of pain, and are employed in observer-based pain assessment tools. The Remote-target person is monitored by using a webcam to spot the physical condition. The Facial images of the person are captured and analyzed using machine learning. This project proposes a system for recognition of facial expressions using the captured images. This proposed system uses a CNN classifier to differentiate the acquired image into different emotion categories (Happy, Sad, Pain and Normal). Results show that reliable facial expression recognition. If it recognize the person in abnormal condition then alert will be pass to the nearby hospital.


Vehicle To Vehicle Communication using Li-Fi
Authors:- Assistant Professor Gugan I,Ruba Sri P, Hari Krishnan, Srinithi S, Nisha Evangeline.P

Abstract:- The latest technology called as LI-FI is developing a lot in few years. Traffic congestion and tidal flow management are two major problems in modern urban areas which lead to road accident and loss of life. Using the concept of LI-FI two vehicles communicate with the help of LED bulbs using transmitter and receiver circuit and so road accidents can be controlled and many human lives can be saved. A device called ultrasonic sensor which is used to measure the distance and also to detect any obstacles is used here just to communicate the two vehicles when they come into contact within some range. Using LI-FI, data are transmitted from one vehicle to another and the data that is transmitted through LIFI can be an audio, video or text. At present, the day to day activities use lot of LED based lights for illumination, which can also be used for communication because of the advantages like fast switching, high power efficiency and safe to human vision. This system aims at communicating with the vehicle in its surrounding with the help of its location (i.e., using the latitude and longitude) to indicate their proximity. When these vehicles are very close in proximity the drivers are cautioned with the help of a message. In this way the drivers can communicate with each other and act according to the situation.


Fork Lifting Segway
Authors:- MD Amjad Ali Khan, Shaik Abdul Asif, Mohd Mateen, Asst. Prof. Mr. Srinivasa

Abstract:- In this project work, two wheeled and two small supporting wheel Mechanical Segway vehicle is prepared which is also known as a personal transporter Segway. This project focuses on to manufactured Segway without using any type programming & Sensors a state feedback to stabilize system on transporter mode. The system is able to operate in transporter mode and robotic mode. The first goal is to maintain stabilization in pitch dynamic. Small wheel is used so that there is no need of gyroscope for balancing purpose. The system consist of forward and backward movement when the driver operating Double Pole, Double Throw (DPDT) switch in transporter mode in order to stabilize body. The purpose of the project is to fabricate the low cost mechanical segway with high efficient rate and easy to operate in the industries and warehouses which help to lift the light weight material. For lifting purpose we place a Fork arrangement in front of the segway which can Lift materials. The tests are performed on mechanical Segway to confirm that Mechanical Segway operating very well and high efficient rate.


A Robust Digital Watermarking in DWT Low Frequency Region
Authors:-Rishabh Agrawal,Jaspreet Mehra

Abstract:- Digital world has introduced number of flexibility for users to modify and transfer data easily. Hence data proprietorship need to be maintained so placing a watermark in digital data come in existence. This paper focus on image proprietorship where watermark information was embedded in low frequency region of image. Embedding of watermark was done by developing a binary relation in selected vector of DWT low frequency region. Here swapping of data as per watermark information has increase the robustness of the algorithm against attacks. Here proposed model has recover complete watermark in ideal condition. Experiment was done on real image dataset and results were compared with existing methods on various evaluation parameters of PSNR, MSE, Normalized correlation.


Automatic Pneumatic Bumper and Smart Braking System
Authors:-Scholar Anjali Dwivedi,Asst. Professor Saurabh Saxena,Scholar Sachin Kumar,Scholar Harshit Gaur

Abstract:- The Pneumatic technology plays a vital and major role in the area of automation and modern shops of machine, space robot, etc. This develops an aim to develop or design a fully controllable system depends upon electronically intelligent activation of bumper system and is termed as AUTOMATIC PNEUMATIC BUMPER AND SMART BRAKING SYSTEM
BEFORE THE COLLISION. Our project contains Ultrasonic sensor containing both transmitter and receiver terminals, pneumatic bumper, control unit and automatic braking system. The ultrasonic sensor sense the obstacle from a distance of nearly 15 cms and gives command to the automation part of bumper and braking system.


A Novel Contract Based Incentive Framework Model to Avoid WI-FI Network Crowd Sourcing Problems
Authors:-Professor&Principal Dr.P.Chitti Babu, Assistant Professor D.J.Samatha Naidu , Jalli Naveen

Abstract:- In this paper, we provide proper incentives to the users to share their private access point and this mechanism is known as crowdsourced wireless networks. Here the network operator consists of designs and pricing strategies to the user. In our contract model, each user’s best choice depends not only on his private information but also on other user’s choices. This reduces problems in the contract design, as the operator needs to analyze the equilibrium choices of all users, rather than the best choice of each single user. We perform some safety measures to reduce the disclosure of private information of community members and then derive the optimal (and feasible) contract that yields a maximal profit for the operator. Our paper analyses the regardless of the user mobility pattern. Increase in wifi quality the operator can gain more profit, but (counter-intuitively) offer lower Wi-Fi access prices and subscription fees for users.


Sign Language Translation System
Authors:-Rosemary Antony, Silji Simon C, Stephy Paul, Scaria Alex

Abstract:- Communication is the only medium by which we can share or express our thoughts,but for a person with disability faces difficulty in communicating. In our society, communication has a major role. The number of deaf and dumb are increasing in our world. A community consists of abled persons and disabled persons. For dumb people,it is impossible for them to communicate with others. It is difficult for ordinary people to learn the sign language for communication. So this system will help the dumb people to intract with normal people. Still there are some existing methods to overcome this issue,that are sign language to text conversion and using smart gloves. But all these has its on limitations. In the existing systems signs are identified from images. The normal outputs will be numbers or alphabets and connective words like is,are etc may not be handled. Wearing gloves are not comfortable for the users. If signs are converted to voice rather than text,it will be very helpful for dumb people. In this system the person will show the sign language before a webcam and it will capture the hand gesture from video and predict the symbol. Machine learning is the domain of this system. The final result will be voice. Here we are identifying signs from live video. It is the main difference from other methods. The output will be in a sentence which means a collection of words. For handling connectives special languages were implemented.


De-fluoridation of Water by using Laterite Stone
Authors:-Asst. Professor Venkatesh A L, Akshay S, Karthik M S, Chaithra L

Abstract:- Occurrence of elevated concentration of fluoride in Ground water/surface water is a threat to the provision of potable water. The present study intends to use laterite for effective removal of fluoride from water. Samples heat treat at 400ºc performed better in fluoride adsorption. The mechanism for fluoride adsorption in the present study was attributed to process ion exchange between hydroxide ion of the laterite surface and fluoride ion in the solution.


Soil Classification and Crop recommendation using IoT and Machine Learning
Authors:-Varsha A, Midhuna V M,Rilty, Assistant Prof. Divya R

Abstract:- Agriculture is an important part of economy and soil is the most important ingredient of it. There are several kinds of soil. Each type of soil has its own features and characteristics which make them best for particular crop. Soil types like red, black, clay, laterite etc are considered. This project aims at classifying soils based on their characteristics and thus recommending the best crop that could be produced maximum in that soil. Till now soil classification and recommendation of crop for the appropriate soil are done separately. The aim of the project is to combine both the techniques. The project uses IoT and machine learning algorithm to implement the problem stated.


Scrum: An Agile Development Gateway
Authors:-Garima

Abstract:- Scrum is an amalgamation of several processes used in Agile Methodology in order to complete the development of software in a well defined time span which is generally faster and shorter. Scrum is a framework that was introduced with the prime objective of delivering new software capability every 2-4 weeks in an organization. Scrum provides a smooth foundation of fundamental principles in order to achieve the development of high quality software faster and towards a well defined goal.


Innovative Multi-Power Source Device: Product Evaluation and Cost Analysis
Authors:-Christopher T. Dumadag

Abstract:- This study is focused on Overall Acceptability in terms of Product Evaluation (functionality, safety, reliability, efficiency) and Cost Analysis, of the Innovative Multi-Power Source Device. The study made of use of descriptive research design, descriptive statistics (means, percentages and standard deviations). The result showed that the developed Innovative Multi-Power Source Device performs successfully according to its design specification. It can be used as phase converter to operate three-phase motor from a single-phase power supply, change the direction of an electric motor in forward/reverse and be controlled the device manually or by using remote, and time switch and On-delay functions adequately. Aside from it residential and industrial application, it can also be used as a training material for technician teacher educator in teaching electrical motor control and phase converter. It is also worth an investment, as it has low production cost but higher possible profits. It is recommended therefore that this can be used to those end-users with low budget but needs a phase converter both residentials and industrial application. Electrical establishments should have mass production of this device to address the needs of the potential consumer of the device. Electrical instructor should also consider this device as training material in teaching electrical motor control and phase converter.


A Study of Organizational Climate of Self-Financing Teacher Education Institutions of Delhi NCR
Authors:-Research Scholar Jyoti Vats, Prof. Mohd. Yusoof

Abstract:- This paper proposes to find out the organizational climate of Self-Financing Scheme (SFS) Teacher Education Institutions (TEIs) of Delhi NCR. The organizational climate was studied from fourteen dimensions Role Clarity; Respect; Communication; Reward System; Career Development; Planning and Decision Making; Innovation; Relationship; Team and Support; Quality of Services; Conflict Management; Commitment and Morale; Training and Learning; and Direction by adapting the tool developed by Halphin and Croft (Halpin and Croft’s Organizational Climate Description Questionnaire). Data was collected from 100 participating Teacher Educators from Delhi, Ghaziabad, Faridabad, Gautam Budha Nagar and Gurugram. The study reveals that the teacher educators with more than five years of experience perceives that their experience is not valued and respected by TEIs.


Experimental Evaluation of Mechanical Properties of Natural Fibers (Hemp &Wool)
Authors:-Mohammed Asif, Syed Omer, Abdul Rahman Sharief ,Supervision & Assistant Professor Attalique

Abstract:- Composites are in general combinations of two or more material in which the reinforcing the phase is either polymer or ceramic/metallic material. There are different types of fiberswhich are reinforced in the matrix of which natural fibers have gained much importance in recent past. Fiber Reinforced Polymer (FRP) composites play an important role in all spheres of day to day life due to their low cost, processing advantage of lower density and possessing good mechanical behavior over traditional reinforcement materials. In the present investigation natural fibers hemp and woolen is reinforced with epoxy resin. These fiber reinforced composites were successfully prepared by simple and cost effective synthesis methods by hand lay process. The synthesized composites were subjected to different characterization techniques to test it’s suitability in different mechanical components. To test it’s suitability, mechanical properties such as tensile strength and hardness subjected to different composition of the hardener and resin percentage.
They are Epoxy resin 70% + Hardener 30%, Epoxy resin 75% + Hardener 25% and Epoxy resin 80% + Hardener 20%. The mechanical yield for different compositions of fiber and resins is discussed in detail.


The New Cryptography Algorithm with High Throughput
Authors:-Aashish Kumar Singh, Er. Chhavi Gupta

Abstract:- Cryptography is generally an excellent region to look into nowadays. As we realize that security is an essential prerequisite for any business. Also, for that, we need an exceptionally solid and unbreakable calculation that gives high security. For that, we need encryption and unscrambling calculation which is having exceptionally high security with generally excellent throughput. On the off chance that we take a gander at this present reality, there are loads of associations that are having an enormous database with high security. According to security concerns, some encryption and decoding calculations are working behind classified data like DES, 3DES, AES, and Blowfish. In this paper from the start new cryptography (Encryption and Decryption) calculation has been created and new cryptography (Encryption and Decryption) calculation has been thought about by utilizing a few parts like throughput of key age, to produce Encryption content and to produce Decryption content. In the event that any beast power assaults are applied to this calculation, how much security is given by this calculation is incorporated. In this calculation, some number-crunching and intelligent numerical activities are performed.


Overview of Java
Authors:-Ankit Yadav, Hansraj Yadav, Amarjeet Singh

Abstract:- Java technology allows you to work and play in a secure computing environment. Upgrading to the latest Java version improves the security of your system, as older versions do not include the latest security updates. Java allows you to play online games, chat with people around the world, calculate JDK (Java SE Development Kit). For Java Developers. Includes a complete JRE plus tools for developing, debugging, and monitoring Java applications. Administrators running applications on a server: Server JRE (Server Java Runtime Environment) For deploying Java applications on servers.


Confined Flow Study using Smoothed Particle Hydrodynamics
Authors:-José Gustavo Coelho,

Abstract:- – Smoothed Particle Hydrodynamics (SPH) is a Lagrangian meshless method that simulates flow as a set of fluid separation in motion. The forces acting on each particle are available using a spatial filter process. This filter plays an important role in the method. In this study, an analysis of this filter is made in a set confined to the low Reynolds number. The analyzed cases are an analytical equation and situations with Re = 1 and Re = 100 in a cavity. The results found numerically were satisfactory.


Research Paper on Android based Home Automation using Raspberry pi
Authors:-UG Scholar Rohit Kumar, UG Scholar Mohit Yadav

Abstract:- In today’s world automation is playing important role in each and every individuals life. Every individuals want to get the work done fast , save time, put less efforts and make things more and more easier . Smart home automation is a way to have things around your home should work automatically. This automatically will save time. The purpose of this research paper is to control all the home appliances through smart phone. The user can increase or decrease the speed of fan, turn on or off light and many more appliances at home through smart phone or tablet. So this is implemented using Raspberry pi, and relay. The devices are controlled through WIFI or GSM.


Modern Technique to Detect & Prevent SQL Injection
Authors:- Ankit Kumar, Shravan Singh, S Sreeji

Abstract:- As in today’s world most of the developers make mistakes during their web development phase.This leads the attacker to gain unauthorized access of company’s sensitive data.The common vulnerability through which an attacker gains access is SQLi.Web application is very good target for attacker to gain access to sensitive data.If developers fails to deploy protective measures for data protection the attacker will get the data.Developer should think beyond traditional security measures for complete data security in today’s world.The SQLi vulnerability affects any websites or web application.SQLi is one of the oldest and dangerous vulnerability of web application. . Bank and government organizations should take unique and extraordinary steps to protect themselves against SQLi vulnerability.We will use penetration testing to Detect SQLi vulnerability in web applications before Attack.The purpose of this paper is to make developers aware about SQLi attack vulnerability and understand how work attacks and further implement extra security regarding SQLi and protect their organizations from sensitive data leakage.


Design and Fabrication of Soybean Reaping and Collecting Mechanism
Authors:-Vaibhav Pagare, Durgesh Waidande, Saurabh Kakade, Kedar Phadtare, Prof. S. P. Gosavi

Abstract:- The focus of this project is to design a combined reaping and collecting mechanism for the farmers, to harvest soybean more efficiently. Our aim is to reduce the losses during harvesting to zero. The main purpose of our project is to help small scale farmers who having land area less than 4 acres by designing small scale harvester machine to harvest grains very efficiently. Our project work will focus on ease of harvesting operation to the small scale farmers for harvesting varieties of grain in less time and at low cost by considering different factors such as cost of equipment, ease of operation, time of operation and climatic conditions. This mechanism is compact and can cut up to three rows of soybean plant. It has cutting blades which cut the crop in a scissoring type of motion. A collecting mechanism is provided for the collection of crops directly into the trolley to one side after cutting. The power to move the cutting blades and conveyor is taken from the PTO shaft of the tractor. The mechanism is mounted in front of the tractor. It is easy to handle also the maintenance is low. This mechanism is manufactured using locally available spare parts and thus, its cost is less than other machines. This mechanism will be the solution to the problems faced by farmers regarding cost, availability of labour and losses during the harvesting of soybean crop. [2]


Nanomedicine and Nanotechnology
Authors:-Jatin Kapoor

Abstract:- This study was conducted to find out how the merger between technology and medical science i.e. nanomedicine turn to to be beneficial in potentially increasing life expectancy. It is a technique which is able to perform human-related tasks such tasks which involves risk to a persons life like safely conducting a tumor removal not leaving behind ant cell causing to trigger again . The question is that weather it will be good to fully adopt this technology despite some of the areas where it lacks to produce or meet its expectations. Creation of such technique is beneficial knowing that it may have disadvantages too. The technology can turn out to be the best thing in medical science but might lack in some abilities hence we have no such prediction that how it will actually behave.


Modelling and Simulation of Fuzzy Logic Based Expert System for Medical Device Risk Assessment
Authors:-Tadele Tegegne

Abstract:- Safety and reliability are essential issues in modern sciences. Modern devices and systems should meet technical, safety and environmental protection requirements. There are evidences and claims that the public hospitals of Ethiopia are suffering from a lot of problems related to medical device risk management. In this thesis risk assessment of medical device on safety in one of the public hospital has been conducted which is used as an input for the system. A structured questionnaire, interview of key informants and medical device maintenance were used to collect data from the hospital. From the collected data combined percentage rating of different functions of medical device risk and operational performance of medical device were calculated. The study reveals that there were medical device risks on safety caused from patients, health professionals, from medical device itself and the environment in which the health care is delivered. This study deals with modelling and design of fuzzy logic reasoning for medical device risk assessment model to enhance the Risk Assessment (RA) process while considering uncertainties in each phase of RA. The main advantage of using fuzzy reasoning approach is limitations of subjectivity in RA. This model makes risk assessment more convenient in the absence of suitable data. In addition, decision-making will be easier, since its results are more understandable than the results of classical methods. The proposed framework develops a model that optimizes the risk constraints.


A Design and Implementation of Heat Exchanger using Genetic Algorithm
Authors:-Shivam Kanungo, Asst.Proff. Ashish Patidar, HOD Prof. Devendra Singh Sikarwar

Abstract:- The purpose of the study outlined in this is to identify major energy loss areas in India’s thermal power stations and develop a plan to reduce them using energy and exergy analysis as the tools. The energy supply to demand is narrowing down day by day around the world due to the growing demand and sometimes due to ageing of machinery. Most of the power plants are designed by the energetic performance criteria based not only on the first law of thermodynamics , but the real useful energy loss cannot be justified by the fist law of thermodynamics, because it does not differentiate between the quality and quantity of energy. Considering the high capital cost involved in new generation “clean technologies” developing countries like India having an abundance of cheap fossil fuel reserves have to give a major thrust to improvement in fossil-fired power technologies. Steam turbine based generating plants form the backbone of power generation in many countries in our country too, Base load is presently largely generated by fossil fuel based power plants. Most of these plants employ sub-critical coal fired boilers driving steam turbines to generate power. The adoption of “Supercritical cycles” for thermal plants on a wide scale has the ability to improve overall system efficiency, as well as provide benefits of lower emissions both on land & in air. Steam cycles for supercritical application operate at very high pressure & temperatures; these are thus characterized by features that take full advantage of the advanced parameters like higher expansion in turbines, more stages of feed heating & higher input levels to boilers, contributing to higher system efficiency.


Design and Analysis of Wideband Metamaterial Patch Antenna
Authors:-PG Student S.Priyadharshini,Assistant Professor A.Yogeshwaran

Abstract:- A design and investigation of Microstrip patch antenna for X and Ku band operation has been recommended. A square patch metamaterial antenna was designed and fabricated using Arlon AD 1000 ™ substrate. This was designed as a compact size antenna with high frequency and for high gain applications. The antenna ground layer is imposed by metamaterial structure, the top radiating layer have square patch with square shape reflector. The dimension of the radiating patch is 5.4 mm5.4 mm and the square reflector is 9.8 mm9.8 mm and 14 mm14 mm. The proposed antenna has been modeled with square patch and square reflector methods have been adopted for proper wideband operation. The measured results shows that the square patch metamaterial antenna has a return loss of -15.5dB at 11.2GHz, -24.8dB at 13.9GHz, -18.5dB at 16GHz and -13.8dB at 16.7GHz, meanwhile it has a gain of 2.2dB and directivity of 2.5dB. This antenna was designed for the radar, live broadcasting and naval satellite downlink application.


A Systematic Review on Blockchain Technology
Authors:-Associate Professor and Head Neeraj Prakash Shrivastava, Undergraduate Scholar Vishwaroop Shah

Abstract:- Blockchain is the emerging technology and is believed to cause disrupt in various field. Although a lot of research is going on in this field but still the blockchain is in its early stage. The distributed ledger and decentralization are the important features of blockchain which ensures data security and privacy. The blockchain have the potential to have a major impact in the various fields like finance, real estate, and music industry but as of now it has played an important role in the cryptocurrency. After going through several standard papers, we have given in here a proper systematic literature of the blockchain technology. In this paper we have discuss about the architecture, categorization, components, consensus algorithms, its features, and various challenges which it faces. We have also given the future directions for the further research in the blockchain technology.


The Use of Polymer Modified Bitumen Waste in Road Construction
Authors:-Ashik Kadhao

Abstract:- Polymer waste is produced during the day and the need for disposal of such wastes generated additional day in an appropriate manner. This waste, using different methods such as combustion, landfill environmental impact settings; But the polymer is added in an environmentally friendly way process. Dry polymer asphalt bitumen to improve service efficiency. Improved asphalting efficiency will increase if we use polyolefin powder asphalt up to a certain percentage or waste. The use of this innovative technology (polymer to asphalt) will not only strengthen the road construction but also extend the life of the road, but will also help to create an environment and a source of income. Two types of polymer waste disposal technologies can be used in road construction. Because the process corresponding to the plastic waste in combination with 15% by weight of a suitable drying process. But considering the limitations of this process, it only applies to plastic waste, so we configured the total polymer waste eco-friendly environment, not fully achieve their goals. Wet processing requires strong mechanical stirrer and continuous rotation, intermittent production and separation chamber. In which properly controlling to reduce production time, increases productivity and therefore this method is the time for the drying process to remain economically viable and the limits can be exceeded. By actual experiment, we get a different polymer waste composition optimal results.


Strength Properties of Liquid Penetrating Geopolymer No Fines Concrete with Recycled Coarse Aggregate
Authors:- Post Graduate Students V.S.Ananthakrishnan,Associate Professor Dr.V.Sreevidya,Post Graduate Students S.Manoj Prabaakar,Post Graduate Students G.Ezhilarasan

Abstract:- The aim of this study is to explore the possibility of using abundantly available raw materials such as fly ash from thermal power generation plants subsequent to firing of coal and recycled concrete aggregates obtained from demolished concrete buildings in pervious geopolymer concrete along with chemical activator contents as binding agents without the need to use water. Due to increased demand for housing in urban areas,the existing single storey structures are converted into multi-storey structures to create more housing units. From demolished buildings recycled coarse aggregates are generated. Usage of these aggregates not only reduce the requirement of natural aggregates but also prevent us from finding a place for dumping of these aggregates.

Analysis and Implementation of Parameters of CNC Plasma Arc Cutting Machine in a Manufacturing Firm
Authors:-Sanjeev Kumar, Ijlal Ahmad Rizvi

Abstract:- The progress established on the project so far consists of assigning our project in the work schedule of the company, completion of a pilot survey with the senior manager and operators in the company, establishing the time frame of work in the industry with the consent of the company. During this whole time period the background science about the working of plasma, CNC machinery and its maintenance is also being studied with aid from our mentor and the senior members in the industry. The plan consists of conducting a study involving establishing working standards on a machinery of the company and deducing productivity after maintenance activity.


AGCE Amphitheatre
Authors:-
Prof. Ajay B. Kolekar,Anupsinh V. Shinde,Abhishek V. Shinde,Suraj N. Yadav,Tanveer H.Aatar,Abhijeet S.Nikam

Abstract:- This project deals with the analysis and design of the Amphitheatre. Planning and designing with cost estimation are enclosed in this report. Area and other specifications are taken from IS 2526:1963 (Code of practice for acoustical design of Auditorium and conference halls) and NBC (National Building Code). Design and analysis is done manually and the results are verified using Autodesk REVIT Architecture. We have used the AUTO CAD for planning.


A Review Article of Design and Deflection Analysis of Deck Slab using Staad Pro Software
Authors:-Rajendra Soni, Associate Professor Komal Bedi

Abstract:- A review of Designed highly curved concrete ramp bridge, which presented a challenge to bridge engineers due to the problems imposed by the complex environmental and geometric constraints. They maintain the stability of the structure by balancing the dead, pre-stressing and live loads with the reactive forces at supports which is of particular important. They proved that these bridges could be designed and constructed economically. By respecting the geometry of the curved road and the constraints of the underlying elements, these bridges provided both functionality as well as balance of visual elements.


Review of Recent Developments in Ergonomic Design and Digital Human Models
Authors:- B.Tech. Student Priyanshu Ranjan , B.Tech. Student Nishant Kumar, Asst. Professor Devendra Singh Sengar

Abstract:- The paper proposes a literature review on the workplaces ergonomic effective design in the manufacturing systems and industrial plants sector. The main objective is to provide the reader with an accurate overview on the main scientific approaches proposed (during the last decades) by researchers and scientists working in this specific area. The paper passes through the description of several research works as they run through the literature. The initial search identifies a huge number of articles which were reduced to about 50 studies based on content and quality. The descriptive analysis of the literature reveals heterogeneity in the content of the scientific approaches due to the different principles, methods and tools applied for improving the interaction between humans and their working environment.


Multifunctional Transformable Table: A Pedagogical Tool in Industrial Arts
Authors:- Jan Vincent H. Leuteriossor Devendra Singh Sengar,Romeo M. De Asis

Abstract:- This study aimed to develop and evaluate a Multifunctional Transformable Instructional Table for BTLED – Industrial Arts students of the Department of Technology Teacher Education, College of Education, MSU-Iligan Institute of Technology, A. Bonifacio Ave. Tibanga, Iligan City.This developed table was evaluated by fifty (50) respondents composed of forty (40) students and ten (10) teachers via online evaluation. Then, the designed table was assessed based on the following criteria: usability, portability, aesthetics, and safety. The results were analyzed by the use of descriptive statistics such as weighted mean and standard deviation. A five-point scale was used to indicate the respondents’ evaluation. The innovation introduced in this study is the transformable characteristic of a table that can be used not only as a table but one which could be transformed into an instructional board. As a table, it can be used as a teacher’s table as well as a demonstration table and as an instructional board it can be used as a whiteboard or a projector screen for multimedia presentations. Moreover, this instructional board can be used as a holder for trainer sets in electrical wiring installation and full-wave rectifier wiring. Results of the evaluation of this transformable table shows that both teachers and students gave a rating of excellent in terms of its usability, portability,aesthetics, and safety, which was described as highly acceptable. It implies that this transformable table can be utilized as an instructional tool or equipment that will aid teachers and students in the teaching and learning process in Industrial Arts. Moreover, this can be of great help to teachers in making instruction more engaging for students as it simulates real scenarios even those that are outside the classroom scenarios.

Smart Waste Management using Internet of Things
Authors:- Asst. Prof. Bright Gee Varghese, Jaickey Joy Minj, Likhith Reddy

Abstract:- Waste disposal is one of the biggest challenges confronting the world, regardless of the situation in developed or emerging countries. The biggest problem of waste disposal is that the trash bin of public areas is being overflowed well in advance of the start of the next cleaning cycle. This, in effect, contributes to a number of risks, such as foul odour and ugliness, which may be the root cause of the spread of various diseases. This work is installed on a smart waste management system to prevent all these dangerous situations and to ensure public cleanliness and safety. The key focus of the research is the creation of a safe, intelligent garbage monitoring system for proper waste management. Cloud-based, linked, and data-driven IoT technology systems provide customers with a way of incorporating potentially challenging business use cases, such as predictive maintenance, pay-per-use, and analytics. Real-time data transforms into better efficiency of company assets and improved profitability [1] [2]. This paper suggests a smart waste disposal warning system by supplying an alarm signal to the municipal corporation for the urgent cleaning of the dustbin with adequate monitoring depending on the amount of the garbage filling. The sensor interface with Raspberry Pi helps with these processes in testing the amount of waste that is in a waste bin and if the waste is filled, sends an alert to the municipal corporation.The municipal authorities may control and track the actual status of how waste is collected with the aid of this system. Furthermore, the necessary corrections / alternatives could be adapted. An Android program is built and connected to a web server to intimate notifications from Raspberry Pi to the Municipal Corporation Office and to remotely track the cleaning operation conducted by staff, thereby minimizing the manual control and testing phase. The notifications are sent via internet to the Android app.

Automation in IT Industry
Authors:- Anmol Sachan

Abstract:- This document gives information about automation which is a Labor-saving technology by which a process or procedure is performed with minimal human assistance. It performs tasks that were previously performed by humans. Automation is being used in a number of areas such as manufacturing, transport, utilities, defense, facilities, operations and lately, information technology. This document will basically give you insights of automation in information technology.

An Innovative Design of a Multifunctional (Package Drafting Bag) and It’s Cost Analysis
Authors:- Jovena D. Abel,Alenogines L. San Diego

Abstract:- The main focus of this study was to develop a multifunctional bag and to test its functionality, durability, cost-effectiveness, workmanship and aesthetics – to hold various types of drafting materials commonly used in the industry today, and to help drafting students organize their drawing instruments/materials and hassle-free. The study used the descriptive-normative survey, and the respondents were chosen through the total population of the faculty and students’ attendance during the conduct of the study. A pre-survey was conducted to randomly selected drafting students and professionals in order to solicit ideas and suggestions for the design of the proposed drafting bag before the final survey questionnaire was given. The findings revealed that the developed multifunctional bag met the criteria in terms of functionality, durability, cost-effectiveness, workmanship, and aesthetics as the means all fall above 3.51 level. In the overall aspect, the multifunctional bag was rated very acceptable by the respondents. This means that the multifunctional bag could be used conveniently by drafting students as the course requires lots of tools for freehand and mechanical drawings. Based on the findings, it was recommended that the drafting department should endorse this innovative tool to the University administration to consider the product of a careful research that could very well meet the accreditation requirements in the area of productions of innovative learning or instructional materials. Drafting students as well should be encouraged to patronize the outcome of the said study.


Detection and Prevention of SQL Injection
Authors:- Shravan Singh, Ankit Kumar

Abstract:- Penetration testing is widely accustomed to audit the protection of Web applications. This can be an awfully important phase for an online based company/organization since all of their data is stored in their databases and people databases are linked to the online server they own to host their website. More the new functionalities are being introduced day by day, the less secure the system is. Web application penetration testing is introduced for testing the net application for vulnerabilities and countering those using web application security mechanisms. As per current situation, the penetration testers use manual testing for examining the applying and maintaining reports, they face many problems finding vulnerabilities on web applications like they need to go looking on the web for vulnerabilities which may be present within the testing web app. An automated web application penetration testing can help them in some ways like from storing all of the vulnerabilities within the database and using those databases at the time of examination of the online application.

Security and Privacy in Social Networks
Authors:- B.Tech. Student Mohit Sanwal, Associate Prof. Er. Chhavi Gupta

Abstract:-Social media have become a piece of human life. Beginning from sharing data like content, photographs, messages, many have begun share most recent news, and news related pictures in the Media space, question papers, assignments, and workshops in education area, online study, advertising, and focusing on clients in business area, and jokes, music, and recordings in entertainment area. Due to its utilization by internet surfers in every single imaginable ways, even small would make reference to the long range social media as the present internet culture. While getting a charge out of the data sharing on Social Medias, yet it requires a lot for security and protection. The clients’ data that are to be kept undisclosed, ought to be made private.

Enhanced Versatile Secured Data Accesses Control for Cloud in Mobile Computing
Authors:- Professor&Principal Dr.P.Chitti Babu, Assistant Professor, V.Nirmala, Ponna.jyothiswara

Abstract:- In present days handling the data (storing and sharing) is most difficult. Providing the security is difficult task. So the data will be access by any one. Then the data owners are facing the many problems. And also the data owners and data users can be access and share the data is very difficult. Now a days the smart phones are used for all uses. So here they are used mobile cloud computing. By using this technology the data will be sharing and storing is simple. And also mobile networks are very faster and it will connect any ware and any time. There is no restriction on the network issues for mobile cloud.The mobile networks are available 4G network and it will be updated in day by day. So it is user friendly work, With explosive growth of mobile devices including smart phones, PDAs, and tablet computers and the applications installed in them, the mobile-Internet will maintain the development growth trend as 4G communication network is extensively promoted to our lives. It exists mobile cloud computing is provide the data is secure and safe. The flaws of data storing and data computing in mobile-Internet applications can be overcome by mobile cloud computing while the new paradigm can also accomplish cloud based multi-user data sharing, end geographical service limitation, and process real-time tasks efficiently at the same time.

Sentiment Analysis of Consumer Reviews using Multi-Strategy Technique
Authors:-Asst. Prof. Subathra.S, Asst. Prof. Ashwinbalajee.M.S, Harini.P, Krishna Kumar.M

Abstract:-Sentiment analysis is useful in industrial intelligence application atmosphere and recommender systems, as a results of it is a awfully convenient channel for the two ends of the availability to talk. at intervals the sentiment analysis, many ways in which and techniques were used, like machine learning, polarity lexicons, language method, and psychology scales, that verify different types of sentiment analysis, like assumptions created, methodology reveals, and validation dataset. Since internet has become an excellent provide of customer reviews, the realm of sentiment analysis (also noted as sentiment extraction, opinion mining, opinion extraction, Ad sentiment mining) has seen an outsized increase in academic interest over the previous couple of years. As known, the opinions of shoppers unit of measurement expressed in sentiment phrases. ancient machine learning techniques cannot represent the opinion of articles okay. This project proposes a multi-strategy sentiment analysis methodology with linguistics similarity to resolve the matter with partial phrase matching. Naïve scientist category identification is in addition applied to hunt out the chance of information distribution in varied class of information set. The project is meant pattern R Studio one.0. The committal to writing language used is R 3.4.4.

Pre Migration Process for Scheduling Tasks in Cloud
Authors:- Assistant Professor (Sl.Gr.), M.MohanaSundari, V.Adithyan, S.Madhumitha

Abstract:- Cloud computing is the most recent technology in the computing field that makes network access easy. Many Cloud services for mapping Cloud software using virtualization techniques. The users’ requests from various resources will cause a traffic problem at data centers. Thus, a Cloud load balancer that uses an efficient load balancing algorithm. Load balancing is an important factor in cloud computing since users accessing the services is increasing drastically day by day. The cloud is comprised of datacenters since it is very powerful to manage more number of users. But load balancing is a technique of distributing the workloads among different nodes to minimize response time, cost, resource utilization, and overheads. The aim of this project is to briefly analyze about various efficient load balancing algorithms and experimentally test how to minimize response as well as processing time through cloud analyst tool. The project proposes a new algorithm, weighted round robin, which optimizes pre-migration mechanism for load balancing of tasks among the multiple virtual machines in the Cloud server, thereby improving the response efficiency of Cloud servers. The methods and findings used to solve load imbalance issues in Cloud servers. The method used in this study will demonstrate that by applying an effective load balancing technique would improve the throughput and the response time in cloud environment. The main scope of the project is used to analyze and map the best cloud host for the selected virtual machine using Weighted Round Robin based algorithm. Cloud Sim 3.3 is used as the front end language to develop the application. Java 1.7 is used for coding.

Report on Joining of Al- Alloy Reinforced with Al2O3 by Friction Stir Welding
Authors:- Sanjeev Kumar, Ijlal Ahmad Rizvi, Diwakar Kumar

Abstract The friction stir welding process is a method of joining metals in the plastic condition. Metal doesn’t reach to its melting temperature. It enhances the mechanical properties of the base metal. Some of the leading companies adopt the process for the manufacturing of aeroplanes, fuselages and cryogenic tanks for SLV’s (Space launch vehicles).

Interactive and Realistic 3D Assistance for Inside Environment
Authors:- UG Students Krithika. R, UG Students Thabu.U, UG Students Umadevi.C

Abstract : Indoor assistance has gained popular among the globe in recent decades. Various technologies like Wi-Fi, Bluetooth, GPS, GSM, RFID and WLAN etc. has been used to provide direction assistance inside the indoor environment. However the prevailing techniques are often failed in their real time implementation to prove the accuracy and adaptability. During this paper, we proposed a low cost, simplified framework for indoor assistance and that we have developed the indoor assistance as a simplified Application Programming Interface (API) especially for iPhone. We used QR codes printed on the paper, and placed on the floors of the indoor corridor. These QR codes are scanned and detected by a smart phone’s camera. The 3D animated toy is employed to guide the indoor user together with the audio output as voice guidance which may be used for the blind people. This smart indoor assistance System uses augmented reality (AR) in an incorporated iOS-based application. Furthermore, we utilized augmented reality to point out continuous routing information, and a compass to work out the direction towards the destined location.

AGROTES
Authors:- Anitta Simon, Anju Mole, Ashli Augustian C, Chinnu Davis,Assistant Professor Aswathy Wilson

Abstract : The world’s population is flourishing and with that growth, we must out-turn more food. Due to the industrial and photochemical revolution, the agricultural industry has kept up in food production, but only by compromising the soil, the environment, our health and food production system itself. Farmers are the backbone of every society they provide us with food materials. Lack of proper management of resources leads to low yield of harvest and soil contamination, which in turn reduces the profit in the agricultural industry. These requirements also get affected by climatic changes. Farmers don’t have the proper facility to know the resource requirements for the crops, the above reasons result in a reduced number of farmers in our new generation and an increasing suicide rate. The vision of the project is to create open and accessible technology. The goal is to define a decision support system (DSS). The proposed system measures soil nutrients, moisture content, temperature, light, and humidity. Initially, the soil sample from the farm area is submitted to verify which plant is suitable for growing with the help of a nodal officer and it will be referred to the registered farmer. Soil nutrients are tested by 2 ways mainly the NPK testing, which can be done by lab testing and another one by measuring pH using a pH sensor which, determines whether the soil is acidic or alkaline. Using a mobile system it monitors each plants moisture content, temperature, light and humidity. Then the sensed value will be compared with the threshold value, if any deficiency it will inform the registered farmer using the mobile application. The application displays the data as a real- time snapshot of our land and pushes notification and suggestions to maximize the plant health. The system surrounds the field which will help to provide equal care for all crops. The real-time monitoring of pH level guarantees the farmer to provide the correct fertilizer at accurate amount. It helps a new farmer to cultivate the most suitable crops for that area thus it provides him an unpredictable yield. The main advantage of the proposed system is that it can plant poly crops in a machine inefficient manner. It allows for democratization and decentralization of food production, maximum productivity from minimum resources.

Gas Leakage Detection and Prevention using IOT
Authors:- Sanjoy Das, Sahana S, Soujanya K, Swathi M C

Abstract : For the sake of lives safety and fulfilment of social duties, and keeping in focus the life-threatening instances of blasts and injuries due to leakage of gas in industries, vehicles and houses, a gas leakage system has been designed whereby application of embedded systems and involvement of Internet of things (IoT). The main objective of the work is designing micro controller based toxic gas detecting and alerting system. LPG is a significant and effective fuel, for the most part utilized as a part of private spots for cooking. LPG for the most part filled in cylinder which is solid and can’t be harmed effortlessly. In any case, breaks may happen from gas cylinder, controller and gas pipe tube when these are definitely not in a decent condition and may cause a mishap. Mischance’s may prompt medical problems like suffocation and potentially cause an impact on the start of any fire or electric supply. One of the important preventive methods to stop mischance related with the gas spillage is to introduce gas leakage detector at vulnerable places. The main focus of this paper is to present such an outline that can consequently identify and remove gas spillage in defenceless premises. The gas spill sensor is such a gadget which distinguishes the gas spills at beginning levels and cautions the individuals of the same. This paper fundamentally manages the advancement of a straightforward gas spill locator at the underlying stage and after that changing this basic gadget into a most progressive gas identifier framework later on. Gas sensors have been specifically utilized which has high affectability for propane (C3H8) and butane (C4H10). Gas leakage system consists of GSM (Worldwide System for versatile communication) module, which sends SMS as soon as gas leakage is detected. Keywords: Arduino, MQ-6 Gas Sensor, LCD, LPG, Stepper.

Authors:- Attacks and Security Issues in IoT Communication: A Survey
Authors:- Apeksha Gajbhiye, Professor Devkant sen

Abstract : Internet of Things influence our lives to go in a straightforward and simpler way, yet it additionally goes over numerous security issues. The security issues are likewise that this device once made can’t be refreshed, the equipment changes are impossible after the execution we need to think before the usage anyway we can roll out improvements in the software field.. They form an Internet of Things (IoT) that will lead to a completely new set of applications revolutionizing the use of Information and Communication technology in various areas of our living.In this survey of attacks and security scheme some of the solution for different attacks is discuss with including cross layer routing attack in IoT. This paper presents the survey of different challenges and attacker effect. The routing procedure of RPL and security issues is discussed. The interconnectedness of the IoT networks, however, poses a significant risk since the systems will be subject to malicious attacks. An example is denial of service attacks precluding the devices from communicating with other stations. Therefore, security issues must be considered for the engineering and deployment of IoT networks. Security is required in WSN because attacker is consumes the useful energy of nodes i.e. necessary for communication in network. The cross layer attack is flooding the huge amount of packets in network and every node in network is capture and forwards these packets to next neighbor. The packets sending and receiving is consumes the lot of energy. The different previous security scheme function is to detect the attacker on the basis of attacker malicious activities and identified the routing misbehavior in network.

Enhancement of Profit on Mining Low Utility Itemsets
Authors:- Asst. Prof. S.Poovizhi, S.Aishwarya, M.Ajay Prasath, S.Alfazila

Abstract : The Aim of our project is to obtain high profit rate by improving the sales of low utility items (which results as low sales) along with high utility itemsets. In this project we have segregated High/low utility items based on a threshold value which represents the weight utility. The information of itemsets is maintained in an exceedingly tree-based arrangement which is called as utility pattern tree (UP-Tree). A Utility pattern tree consisting of both high and low utility is drawn to represent the segregation, thus improving the performance of utility mining.
The Association Rule analysis helps in sleuthing correct, in advance, affordable information patterns like frequent, weight frequent, high utility pattern. an enormous count of user itemsets for low utility datasets decreases the performance in terms of each execution time and profit. once the info contains several long transactions or long high utility itemsets, things might move to pot. throughout this project, AN rule, particularly utility pattern growth (UP-Growth) is used for mining high any as low utility itemsets with a set of effective methods for pruning candidate itemsets. Candidate itemsets are generated with efficiency with solely 2 scans of info. To facilitate the mining performance and avoid scanning original info repeatedly, a compact tree structure, named UP-Tree is used, to stay up the data of transactions and high utility itemsets. In different words, the additional things a group action contains, the additional utilities are often discarded by minimum support threshold. the appliance is intended victimization Microsoft Visual Studio .Net 2010 as face. The committal to writing language used is Visual C# .Net. MS-SQL Server 2008 is employed as face info.

Automatic Brake Control Device During Derailment
Authors:- Somya Verma

Abstract : The research paper aims to make/introduce a safetydevice which reduces the derailment cases for Indian Railways. The railway is regarded as one of the most economic and safe mode of transport. The running safety of the rail vehicle has become an issue of great concern for the railway community since the railway began to operate in the world.

IOT Based Smart Travel Bag
Authors:- Balaji R, Jebin A, Tharique Ajeez K, Assistant Professor Prof. Anurada T.

Abstract : Travelling is one of the most important aspect for people in day to day life. Generally for travelling purpose people uses normal travel bags or suitcase but in today’s world such types of bags are not safe from the security point of view and also less comfortable of having better journey. Nowadays the field of electronic has designed with advanced electronic technology that can be used for every individual people and also society. Human following robots have been researched and developed for doing more applications in daily life and manufacturing. All the electronic inventions are used to reduce manual effort by mechanical work. Human following bags are one of the finest technologies in electronics and by utilizing its advantages in day to day life. In this paper we have tried to mention all the details related to iot based smart travel bag bag. Several techniques are used to follow bag behind the owner for the following features human detection can be done by ultrasonic sensors. In the privacy point of view the bag can be installed with buzzer and also location can be tracked using GPS and Iot. In this smart bag within a small platform all the operations are implemented together efficiently.

“Modernization of Cryptography : A Quantum Approach”
Authors:- Associate Prof. and Hod. Neeraj Prakash Shrivastava, Sahil Bafna, Tapan Vijayvergiya

Abstract : Secure transmission of message between the sender and receiver is done via cryptography. Traditional cryptographical methods use either public or private key encryption schemes.In either case the esdroppers/attacker can detect the key and hence find the sent message without the awareness of the sender and receiver. Quantum cryptography, also called quantum encryption, applies principles of quantum mechanics to encrypt messages in such a way that it is can’t be read by anyone outside of the predetermined recipient. It takes advantage of quantum’s multiple states, coupled with its “no change theory,” which means it can’t be interfered unintentionally.It uses the distribution of random binary key known as the Quantum Key Distribution (QKD) and hence enables the communicating parties to detect the presence of potential eavesdropper/attacker.

A Review of Attacks and Security Schemes in Cognitive Radio Network
Authors:- Purnima Bairagi, Dr. Abhishek Bhatt

Abstract : Now a day, on the whole communication process totally depends on the wireless medium. Technological improve¬ment reaches the peak level, and their user’s gets increase in the higher rate. The wireless technology greatly depends on the radio frequency spectrum, whereas the available spectrum is low when compared to their utilization. Thus the effective utilization of these spectra becomes a neces¬sity, and so the cognitive radio becomes the promising technology. The cognitive radio is termed as the software defined radio technology that avails the license to the unlicensed users without any inference. In this paper we discuss the various security techniques like IDS (Intrusion Detection System), cryptography and other scheme against different attacks in multihop CRN network. The devices are nodes and these nodes are connected with each other through wireless link and exchange data packets and control information. The packet dropping attack is very harmful and also drops the whole data packets in network. The nodes are not known about the attacker because attacker is forward the fake reply of route in between sender to destination. The attacker is detected through not forwarded the data packets to next node or destination node in network. The proposed security scheme is based the calculate hop count and also maintain the record of hop count till the destination is not found. The reviews provided in this survey article demonstrate the promising future of cognitive radio technology in terms of dynamic spectrum selectivity, high-speed seamless communications, and low deployment cost.

Allocation in CDMA based EONs using DaaS
Authors:- Prof. M. Padmaa, PG Student J. Vinitha

Abstract : In this paper, CDMA technique is proposed for providing physical layer security against eavesdropping in the elastic optical networks(EONs). CDMA technique is used to encode confidential information. Therefore in order to decode the original information, an eavesdropper will now have to lock on the correct frequency, determining the correct code and symbol sequence among the co-propagated overlapped signals. When the spectrum slots are randomly allocated, the gaps between the spectrum slots are created. The compact spectrum is converted into small fragments. Thus fragmentation aware routing and spectrum allocation (FA-RSA) is proposed to find the path having the contiguous spectrum. In this work, defragmentation techniques is used and also called as Defragmentation as a Service (DaaS). Defragmentation is used to satisfy spectrum contiguous constraint by aggregating the spectrum fragments and also reduces blocking probability.

A Survey on Bank Dataset Classification
Authors:- Vishakha Namdev

Abstract : In the present business world, distinguishing the clients and investigation of their conduct is significant for banking industry. Client Relationship Management (CRM) is the way toward keeping up productive client connections by conveying client worth and unwaveringness. In addition, CRM improves the business associations with clients. The objective of CRM is to amplify the lifetime estimation of a client to an association. Client Lifetime Value (CLV) can rank and group clients in view of their lifetime incentive to recognize significant clients and hold them. There are a few models for CLV estimation utilizing the past information of clients. This subject helps associations in their endeavors to hold significant clients. The banks must utilize fitting information mining systems to remove example and data from the current information to increase upper hand. Along these lines, information mining methods have a significant job to extricate the shrouded information and data. The objective of this study is to audit information digging systems utilized for dissecting bank clients so as to assist the manages an account with bettering recognize their clients and structure progressively proficient showcasing methodologies. The writing shrouded in this paper is identified with the previous seventeen a long time (2001–2017) and these methodologies are looked at as far as informational collections, forecast exactness, etc. We likewise give a rundown of informational collections accessible for mainstream researchers to direct research in this field. At long last, open issues and future works in every one of these things are introduced.

Feature Extraction and Modeling on PIMA Data
Authors:- Samarth Gupta,Nikhil Katta,Kush Vashisth

Abstract : Diabetes is a chronic disease with a number of possible contributing factors. In this research, the researchers use multiple ensemblers to improve the accuracy of the models used in the previous studies while using the PIMA dataset. Using feature engineering the accuracy of the K Neighbors Classifier, Random Forest Classifier, SVC, Logistic Regression, Decision Tree Classifier, Bagging, Deep Learning Grid-Search.

Child Safety Wearable Device
Authors:- Shubham Kumar, Associate Prof. Er. Chhavi Gupta

Abstract : This paper talks about the idea of a child safety wearable gadget for little kids. Child wellbeing and following is a significant worry as the more number of wrongdoings on youngsters are accounted for these days. The inspiration for this wearable originates from the expanding requirement for security for little kids in current occasions as there could be situations of the youngster losing all sense of direction in the major swarmed regions. The significant bit of leeway of this wearable over other wearable is that it tends to be utilized in any mobile phone and doesn’t really require a costly advanced cell and not a very technically knowledgeable individual to work. The motivation behind this gadget is to assist guardians with finding their youngsters effortlessly. This gadget is customized for day by day action in kid. As we realize that there are numerous wearable gadgets, for example, (Wi-Fi and Bluetooth) effectively present in the market which helps track the every- day movement of youngsters however they give off an impression of being a questionable vehicle of correspondence between the parent and kid. Our task dependent on SMS arrangement utilizing GPS framework to help guardians to follow their kid’s area continuously. The parent can send a book as SMS with explicit watchwords, for example, “Area”, “TEMPERATURE”, “BUZZ”, and so forth, to the wearable gadget. The gadget will answer back with a book containing the constant precise area of the kid. Since these days, most cell phones are furnished with area administrations capacities permitting us to get the gadget’s geographic situation continuously. Subsequently this undertaking targets giving guardians a suspicion that all is well and good for their kid in the present time.

Fabrication of Foot Ball Launcher Machine
Authors:- Asst. Prof. Prashant, Asst. Prof. D H Pachchinavar, Mohd. Zain Uddin Syed Shabber, Mohd. Khaleel, Malik Moin Ul Haq

Abstract – A football passing machine is configured to eject a prolate-spheroid-shaped football. The football passing machine includes a frame member, an adjustable launch surface mounted to the frame member, a ball magazine positioned above the adjustable launch surface that is configured to contain a plurality of footballs, a moveable escapement arm that is configured to successively dispense footballs that are contained within the ball magazine onto the launch surface, a moveable ball carriage configured to move a football between a first point on the launch surface that is located directly beneath the ball magazine and a second point on the launch surface that is adjacent a football launch mechanism that is configured to eject a football from the football passing machine. An orientation of the adjustable launch surface is configured to be adjusted to change a launch angle of a football while the frame member and the ball magazine remain stationary. The study of the simple Vapour Compression Refrigeration Cycle is much important in order to understand the overall performance of the system with parameters affecting it. An optimized design is possible through theoretical calculations, however may fail due to the reason that the uncertainty and complexity formulation of pressure drop inside the capillary tubes, heat transfer from the refrigerant inside the condenser tube to the ambient air, and hence done practically. Diameter of Capillary tube plays a very important role on the Performance of the vapour Compression Refrigeration System, The VCR System also depends on the type, quantity of the refrigerant charged. The project consists of an experimental performance on a vapour compression refrigeration system with different capillary tube diameters, with R-134a as refrigerant and hermetic sealed compressor of capacity 0.35 H.P and this study examined the effect of capillary tube diameters on the performance of a vapour compression refrigeration system by applying various amount of Refrigerant Charge. The literature review focuses on the effect that the geometrical parameters of Capillary Tube have on the coefficient of performance of vapour Compression Refrigeration System. All the parameters are to be varied and the performance of the refrigeration system will be evaluated. Further to evaluate the cost, the suitable material may be considered.

A Proposed Modelling of a Nigeria Power System with Unified Power Flow Controller
Authors:- Ananti John Egbunike, Nwana Obiora C

Abstract – The problem of power supply in most countries like Nigeria is the ability to maintain steady supply of electricity to every part of the country without first expanding the existing power network. This is achievable with the use of power electronic devices called Flexible alternating current transmission system (FACTS). This paper looked at one of the types of FACTS devices called unified power flow controller (UPFC). The unified power flow controller (UPFC) is a combination of two inverter based compensating device, the shunt compensating static compensator (STATCOM) and a series compensating static synchronous series compensator (SSSC). The combination of the two allows for control of power flow along with independent control of voltage. This paper presents the basis upon which the UPFC operates. It gave the circuit configurations of UPFC, the operating principles, the benefit of making use of UPFC in a power network, modeling of power system with UPFC and then concludes with the proposal on the placement of UPFC on the identified voltage violated areas of the 58 Bus Nigeria 330kv transmission Line network.

Crack Identification and Analysis of Rcc Beam Using Ansys
Authors:- M.Tech. Scholar Shubham Tiwari, Professor Dr. Rakesh Patel

Abstract – Concrete structural components such as beams, columns, walls exist in various buildings and bridges.Understanding the response of these components of structures during loading is crucial for the development ofan efficient and safe structure. Recently Finite Element Analysis (FEA) is also used to analyse these structuralcomponents. In this article, the reinforced concrete beam has been modelled and analysed when subjected to two point loads at one third span from each support, using FEA packages. The modelled and analysed beam having size 5000 mm × 300 mm × 450 mm with 3 numbers of 12 mm diameter bars as main reinforcement, 2 numbers of 8 mm diameter as hanger bars and 8 mm diameter at 100 mm c/c as shear reinforcement. The results of the beam with respect to mesh density, varying depths, reinforcements, crack pattern at various load conditions such as 100 KN, 250KN, 350KN, 450KN, 550KN and 650KN are analysed and discussed. Finite element software ANSYS 15.0 is used for modelling and analysis by conducting linear static analysis.

Characterisation and development of simulation model of 58 Bus Nigeria 330kv Transmission Network during UPFC insertion
Authors:- Ananti John Egbunike, Oguejofor Chigozie Valentine

Abstract – This Paper on the Characterization and development of simulation model of 58 Bus Nigeria 330Kv Transmission Network during Unified Power Flow Controller(UPFC) insertion is a comprehensive analysis of the 58 Bus Network of Nigeria. It is a research on finding the solutions to the constant voltage violations in the network especially loading and off loads. The Nigeria 330kV transmission was obtained from TCN (master plan data, 2014) and was characterized in pu values using 100 MVA as the base power and 330 kV as the rated and the base voltage. The base impedance for the characterization of the transmission line impedance in pu values was calculated from the base power and the base voltage. A model of power flow equation was developed in order to get the procedure to be used during the simulation. The power flow Newton-Raphson algorithm was also presented because the network involves a large scale of area covering 6702km of 330kv in Nigeria. The simulation of 58 Bus Nigeria 330kv transmissions Network without UPFC and with UPFC FACTSS devices were done following the algorithm shown in fig…This is to ascertain the extent of violations and improvement or corrections obtained after the UPFC insertions. The result obtained showed that the seven(7) violated buses; Kano, Kaduna, Gombe, Damaturu, Maiduguri,Yola and Jos were enhanced with the insertion of UPFC on the Kaduna-Jos Bus.

Eavesdropping Aware Routing and Spectrum/Code Allocation in CDMA based EONs using DaaS
Authors:- Prof. M. Padmaa, PG Student J. Vinitha

Abstract – In this paper, CDMA technique is proposed for providing physical layer security against eavesdropping in the elastic optical networks(EONs). CDMA technique is used to encode confidential information. Therefore in order to decode the original information, an eavesdropper will now have to lock on the correct frequency, determining the correct code and symbol sequence among the co-propagated overlapped signals. When the spectrum slots are randomly allocated, the gaps between the spectrum slots are created. The compact spectrum is converted into small fragments. Thus fragmentation aware routing and spectrum allocation (FA-RSA) is proposed to find the path having the contiguous spectrum. In this work, defragmentation techniques is used and also called as Defragmentation as a Service (DaaS). Defragmentation is used to satisfy spectrum contiguous constraint by aggregating the spectrum fragments and also reduces blocking probability.

Advance Methods For Space Debris Management
Authors:- Aniket Nanansaheb Shinde

Abstract – To removing space debris from space there are various methodology are present as well as various techniques also used. There are many ways that this problem might be addressed. In short, this means that active debris removal with a focus on the largest debris elements in low earth orbit as the first priority needs to be given priority. Space situational awareness and maneuvers to avoid collision and perhaps the use of ground or space based directed energy systems to avoid collisions (or near conjunctions) must also likely be a part of this overall strategy to preserve long-term and save access to outer space. This combined need for debris removal as well as collision avoidance is probably essential. In addition to this prime objective, there will be supplementary information provided with regard to in-orbit servicing and space situational awareness. In this paper studied the advance space debris management methods for effective used.

Free Vibration Analysis of Laminated Composite Plate with a Central Hole
Authors:- M.Tech.Scholar Rahul Patel, Professor Dr. Rakesh Patel

Abstract – In this investigation free vibration analysis of a composite plate is presented. An orthotropic plate with symmetric fibre orientation was considered for this study. The material propertieswere fixed. The natural frequencies were computed for different boundary conditions, hole-shape, aspect ratio, and fibre orientation.The effect of these variables on the nature of vibration is analysed and discussed. Also, the natural frequencies of a laminated composite plate with holes of various sizes were considered in order to examine the effect on the fundamental natural frequency. The eight nodedshell 281 was used throughout the analysis. ANSYS 15.0 is used for modelling and analysis of the laminated plates. The Natural frequencies of the finite element (FE) were analysed by the ANSYS software.

Free Vibration Analysis of Laminated Composite Plate with a Central Hole
Authors:- M.Tech.Scholar Rahul Patel, Professor Dr. Rakesh Patel

Abstract – In this investigation free vibration analysis of a composite plate is presented. An orthotropic plate with symmetric fibre orientation was considered for this study. The material propertieswere fixed. The natural frequencies were computed for different boundary conditions, hole-shape, aspect ratio, and fibre orientation.The effect of these variables on the nature of vibration is analysed and discussed. Also, the natural frequencies of a laminated composite plate with holes of various sizes were considered in order to examine the effect on the fundamental natural frequency. The eight nodedshell 281 was used throughout the analysis. ANSYS 15.0 is used for modelling and analysis of the laminated plates. The Natural frequencies of the finite element (FE) were analysed by the ANSYS software.

Detachable Rubik’s Cube as an Innovative Learning Strategy in Drafting Courses
Authors:- Margie R. Mendoza, Alenogines L. San Diego

Abstract – The main focus of this study was to innovate Detachable Rubik’s cube as learning strategy in drafting course for drafting students, especially those in the lower years, who encountered difficulty in visualizing the views given in isometric drawing for orthographic drawing. The IPO (input-process- output) model provided the general structure and guide for the direction of this study. The study used the descriptive method, and the respondents were chosen through purposive sampling. The findings revealed that the developed Detachable Rubik’s cube met the criteria of functionality, durability, aesthetic, convenience, safety, cost and effectiveness in terms of accuracy. In the overall aspects, the Detachable Rubik’s cube was rated very acceptable by the respondents. This means that the Detachable Rubik’s cube could be used as an innovative learning strategy in teaching orthographic drawing in drafting course. Based on the findings, it was recommended that the faculty handling drafting should be encouraged to and use the detachable Rubik’s cube and develop similar device for the same purpose.

A Survey on Wine Dataset Classification
Authors:- Bhavya AG

Abstract – The main focus of this study was to innovate Detachable Rubik’s cube as learning strategy in drafting course for drafting students, especially those in the lower years, who encountered difficulty in visualizing the views given in isometric drawing for orthographic drawing. The IPO (input-process- output) model provided the general structure and guide for the direction of this study. The study used the descriptive method, and the respondents were chosen through purposive sampling. The findings revealed that the developed Detachable Rubik’s cube met the criteria of functionality, durability, aesthetic, convenience, safety, cost and effectiveness in terms of accuracy. In the overall aspects, the Detachable Rubik’s cube was rated very acceptable by the respondents. This means that the Detachable Rubik’s cube could be used as an innovative learning strategy in teaching orthographic drawing in drafting course. Based on the findings, it was recommended that the faculty handling drafting should be encouraged to and use the detachable Rubik’s cube and develop similar device for the same purpose.

Iot Based Multiple Crop Cultivation System Using Open CV
Authors:- Veena Bhirud, Gauri Joshi, Utkarsha Datrange, M. S. Khan

Abstract – Purpose of this project to monitor the growth of multiple crops in the farm as well as providing the water to the particular crop as much it is required. It uses two sensors namely Soil Moisture Sensor(YL-69) and humidity and temperature sensor(DHT11). Soil moisture sensor it sense moisture of soil and DHT11 senses the humidity and temperature. By providing all these information it provides water to the plant. Apart from these image is captured through the pi-camera by which we compared the growth of plant by camera to the data saved on server. For daily water supply if there is rain outside then water is already absorbed by soil then water requirement of plant is change, then according to the need we provide the water to plant. The data of previous water supplied to the plant is stored on server also requirement of water for crop is determined through the information recorded on the server.

Home Automation for Physically Challenged Elder People
Authors:- U.G Scholars K. Praveen Kumar, S. Raghu, M. Suresh, Assistant Prof. B.Thyla

Abstract – Purpose of this project to monitor the growth of multiple crops in the farm as well as providing the water to the particular crop as much it is required. It uses two sensors namely Soil Moisture Sensor(YL-69) and humidity and temperature sensor(DHT11). Soil moisture sensor it sense moisture of soil and DHT11 senses the humidity and temperature. By providing all these information it provides water to the plant. Apart from these image is captured through the pi-camera by which we compared the growth of plant by camera to the data saved on server. For daily water supply if there is rain outside then water is already absorbed by soil then water requirement of plant is change, then according to the need we provide the water to plant. The data of previous water supplied to the plant is stored on server also requirement of water for crop is determined through the information recorded on the server.

Eye Controlled Wheel Chair
Authors:- Assistant Professor Shilpi Rani, Shubham Chitransh, Priyam Tyagi, Prashant Varshney

Abstract – To help paralysed people or patients suffering ALS, an eye movement controlled wheelchair provides a beneficial, efficient and advantageous solution for them to control their mobility. In this paper we describe a system that has a live acquisition feed of the eye. At regular intervals, the camera takes screenshots of the eye, after which the images are sent to a MATLAB script for pre-processing. The eye movement is detected using a camera which is attached to the wheelchair. This concept can be used for multiple applications, but this paper focuses the application to mobile and communication aid for handicapped patients suffering from quadriplegic and paraplegic diseases. The proposed system involves two stages; first eye movement detection and second, sending of control signals to the powered wheel chair.

Newer Technique in Food Processing: High Intensity Light, Pulse Electric Field and Infrared
Authors:- Priyanka Arya, Dr. Devina Vaidya

Abstract – For food processing and preservation demand for minimally processed foods and eco friendliness, various technologies were developed. Preservation is the most important process related to the entire food product. Preservation of food can be achieved by various ways like addition of salt, sugar, preservatives, antioxidants, naturally occurring antimicrobial substances and also by the processes like drying, freezing, refrigerated storage and hurdle technology. Novel technologies like high intensity light (HIL), pulse electric field (PEF) and infrared (IR). The main problem with the ttraditional thermal processing as pasteurization and sterilization are the golden standard protocols to extend the shelf life of food. However, it is known that heating may cause losses in nutritional, physico-chemical, rheological, and sensory characteristics because certain food components are thermally sensitive. The following review article is made for different non thermal processing methods and mechanism of action of the technology in Food Processing.

E-Voting using Blockchain System
Authors:- Priyanka Patil, Shweta Tandel, Dipali Kumbhar

Abstract -The aim of this paper is to show that digital system using blockchain technology is very useful for voting system and also solves the problem of tampering data. E-voting that is electronic voting uses for counting a votes. Present system for election works manually , which takes a lot of effort for conducting the elections and calculate the votes. By using blockchain technology the voting system gives the better result and less efforts will be taken. For security MD5 algorithm is used in these.

Implementation of UFMC Modulation Technique
Authors:- Mitali Dhanori, Shiva Bhatnagar

Abstract -This article gives explanation about the aspects of Universal Filtered Multi Carrier system and gives us an initiative about the merits of latest modulation technique for expanding 5G Communication Systems. In 4G technology, Orthogonal Frequency Division Multiplexing is an excellent choice but it also has some shortcomings. OFDM method has some complications such as high Peak to Average Power Ratio (PAPR), side band leakage is another problem in OFDM. By taking into consideration the above parameters, a stir to another technique called Universal Filtered Multi Carrier (UFMC) is used because of good spectrum usage. This paper also clarifies about the UFMC system model. Based on the Simulation results in MATLAB, the spectrum exploitation of UFMC system is much better than OFDM system.

Performance of Green Ampt’s Model for Simulating Water Infiltration into Soils
Authors:- Ajayi A. S. , Evboifo N. O., Okafor Michael, Ugbodaga M. E.

Abstract – The performance of GreenAmpt’s soil water infiltration model was evaluated and reported in this paper. The study was carried out in Samaru, Zaria. A field size of 200 m2 (20 m by 10 m) under continuous cultivation was cleared. The field was ploughed to a depth of 20 cm. Soil samples were taken from three strips for soils physical property determination; infiltration runs were made using the double ring infiltrometer from six points on each strip. Statistical analyses of the models’ performance showed that the coefficient of determination (R2) between the models simulated and field measured cumulative infiltration ranged from 0.917 to 0.997. The value of the modelling efficiency (E) index ranged from 0.469 to -11.085 while the Mean Absolute Error (MAE) ranged from 1.178 to 20.499. The values of the coefficient of residual mass CRM ranged from -1.317 to 0.331.GreenAmpt’s model can be used for several field and weather conditions, it has the advantage of being a purely physically based model.

A Effective Study on Customer Satisfaction and Provide A Beneficial Deals
Authors:- Himanshu Singhal, Pankaj Kumar Patidar, Ramiz Khan

Abstract – E-commerce is a boom in the modern business. E-commerce means electronic commerce. E-commerce (Electronic commerce) involves buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, predominantly the Internet. E-commerce (Electronic commerce) is a paradigm shift influencing both marketers and the customers. Rather e-commerce is more than just another way to boost the existing business practices. It is leading a complete change in traditional way of doing business. This significant change in business model is witnessing a tremendous growth around the globe and India is not an exception. A massive internet penetration has added to growth of E-commerce and more particularly start-ups have been increasingly using this option as a differentiating business model.
Moreover E-Commerce has significant influences on the environment. Although the model is highly used in current business scenario but the option has not been explored at its fullest. The current research has been undertaken to describe the scenario of E-Commerce, analyze the trends of E-Commerce. The study further examines the key variables imperative for the success of E-commerce business models.

Search-Engine Optimization
Authors:- Associate Prof. and Hod. Neeraj Prakash Shrivastava, Keerti Rajawat

Abstract – Search Engine Optimization (SEO) is the process of affecting the visibility of a web page in a web search engine’s unpaid result. It is the process of getting traffic from the “free”, “organic” or “natural” search results on search engines. Search Engine Optimization is a strategic technique to take a web document in top search results of a search engine. Online presence of an organization is not only an easy way to reach among the target users but it may be profitable too if optimization is done keeping in view of the target users as of the reason that most of the time users search out with the keywords of their use rather than searching the organization name, and if the page link comes in the top positions then the page turns out to be profitable. This works describes the tweaks of taking the page on top position in Google by increasing the page rank which may result in the improved visibility and profitable deal for an organization. Google is most user-friendly search engine proved for the Indian users, which gives users-oriented results. In addition, most of other search engines use Google search patterns. So, if a page is optimized in Google it is optimized for most of the search engines.

Easy Accessibility to Trains From Low Level Platform
Authors:- Sanket Nawale

Abstract – Modern express trains in India face the problem of having a higher floor level than the current platform level. It is also seen in new rakes and coaches that there is a substantial gap in between the train floor and the platform. This proves to be a challenge to some people who needs to climb a set of near vertical exterior steps to reach the train floor level from the platform level. Accidents occur when people misstep and fall down in the gaps too. Simple solutions can eliminate this problem. In India, the floor height of express and long-distance trains is not compatible with the platform height and changes. In most cases, the distance increases beyond comfort limit of the passengers. The problem becomes more prominent when people struggle to climb abroad and get down from trains on to the platforms because of steep exterior steps which often lead to accidents and injuries. This is mostly seen with small kids, women, elderly, people with arthritis and others and also while moving heavy luggage in and out of the train. In all the above cases, a simple construction of platform risers and gap fillers can make a huge difference. So from above problems, the solution is to make a folding step mechanism which will be fill the height and the gap between the platform and the AC 3-Tier Sleeper Coaches.

Analyzing Titanic Disaster using Machine Learning Algorithm
Authors:- Ramandeep Singh

Abstract – Titanic disaster occurred 108 years ago, killing 1496 passengers and crew members. This collision led to curiosity among number of communities of researchers and analysts regarding the factors which could have decided the survival of some passengers and demise of the others. This Titanic dataset consists of various features and we attempt to determine the correlation among various features such as passenger fare , cabin, age , sex, ticket class etc. leading to the survival of the passenger. We use machine learning algorithm namely
Random Forest to analyze correlation between these features and to predict survival of passengers.

A Review Paper on “NLP”
Authors:- Associate Prof. and Hod. Neeraj Prakash Shrivastava, Jiny Jain

Abstract – Natural language processing is a branch of computer science and artificial intelligence which is concerned with interaction between computers and human languages. Natural language processing is the study of mathematical and computational modelling of various aspects of language and the development of a wide range of systems. These includes the spoken language systems that integrate speech and natural language. Natural language processing has a role in computer science because many aspects of the field deal with linguistic features of computation. Natural language processing is an area of research and application that explores how computers can be used to understand and manipulates natural language text or speech to do useful things. The applications of Natural language processing include fields of study, such as machine translation, natural language text processing and summarization, user interfaces, multilingual and cross language information retrieval (CLIR), speech recognition, and expert system.

Pseudonymous not Anonymous – The Forensic and Investigative aspect of Bitcoin Cryptocurrency
Authors:- Dr. Deepak Raj Rao G.

Abstract – Various new technological breakthroughs happened with the advent of Internet which made the Communication, Commerce, Banking and Governance, etc., easy and simple. Ecommerce, online banking, Digital Signature and Cloud Technology changed the Business and Commerce to new height. Online banking offers four benefits to the consumers like speedy, no queue, availability and digital and the invention of Bitcoin [1] in the year 2009 by Satoshi Nakamoto not only bring new avenue for financial transaction but also new challenges for the Law Enforcement Agencies in the investigation of crimes. There are so many myths such as all the transactions done using Bitcoin are anonymous and there cannot be any kind of digital evidence available if a Bitcoin is used while doing a crime. These myths about the Bitcoin need to be addressed for the performing better investigation in any crime done using Bitcoin. A study was conducted to find the availability of digital evidence that is created if Bitcoins are used to do any online financial transaction. This paper will provides the information found from the study on the various traces that gets created when using a Bitcoin for doing any kind of online financial transaction. Using these, it will be very helpful for the investigating officer in investigating the crimes in which Bitcoins are used.

An Efficient Method for Bus Status and Fare Collection
Authors:- Snehal Jose, Daniel Anto, Robin K M, Dr. Satheesh Kumar

Abstract – The rapid growth in the population in India causes more crowding at bus stops. This is due to the long wait for arriving on buses and suddenly gather near the bus when it arrives and travel in overcrowded buses on footboards which leads to accidents. Nowadays lots of passengers are also struggling to find the correct bus which they supposed to travel to. All this happens due to a lack of information about arriving on buses at many of the bus stops. The fare collection system currently in bus transportation is not efficient and corrupted. The conductors collect different amounts of money from different persons also they will not give balance. The objective of this paper is the design of a tracking and management system for a public transportation system using Radio Frequency Identification(RFID). In this work, each bus stop is tagged with a unique RFID card which gets detected by the RFID receivers at bus. The RFID receivers are attached to a NodeMCU module which immediately sends its status to the cloud server. Data from the cloud server is made available to the end-user as a simple user interface in the form of an application. All these technologies will helps the passengers to locate the nearest approaching buses. Also In this paper, we are mainly focusing on different technologies that are available for smart use of bus transportation. Now all around the globe, there are many new technologies that make bus transportation smart. The main technologies like BRTS, Rav Kav card, etc. The system will help passengers to track each bus.that is the main advantage of our system. Also, it helps to anti-corruption and efficient use of the bus transportation system.

Friend Recommendation on Social Media
Authors:- M.Tech. Scholar Gopal Krishan Mohan, Assistant Professor Nidhi Sindu

Abstract Friend recommendation is one of the most popular characteristics of social network platforms, which recommends similar or familiar people to users. The concept of friend recommendation originates from social networks such as Twitter and Facebook, which uses friends-of-friends method to recommend people. We can say users do not make friends from random people but end up making friends with their friends’ friends. The existing methods have narrow scope of recommendation and are less efficient. We put forward a new friend recommendation model to overpower the defects of existing system. For better friend recommendation system with high accuracy, we will use collaborative filtering method to compare similar, dissimilar data of users and will make a recommendation system which gives user to user recommendation based on their similar choices, activities and preferences. Location based friend recommendation system are becoming popular because it brings physical world to digital platform and gives better insight of user’s preferences or interest This recommendation system will increase the scope of recommendation from one user to other with similar set of interest and their location.

Supervised Classification using Gradient Boosting Machine: Wisconsin Breast Cancer Dataset
Authors:- Samyam Aryal, Bikalpa Paudel

Abstract – Gradient boosting is rapidly becoming one of the most used methods for shallow learning. Tuned gradient boosting methods are quickly replacing standard shallow learning methods like random forest. In the current study, we have proposed breast cancer classification, using Wisconsin Diagnostic Breast Cancer Dataset, using gradient boosting machines. The performance of the method is evaluated using accuracy, sensitivity, specificity, confusion matrix, positive predictive value, negative predictive value, receiver operating characteristic (ROC) curve, and area under the curve (AUC). Gradient boost is compared in terms of accuracy and ROC curve with tuned random forests and logistic regression method of classification to showcase its effectiveness. The results show classification accuracy of 98.88% for the GB model without parameter tuning, 97.89% when accuracy was used as metric for choosing best fit, and 99.3% when ROC was used as a metric for choosing the best fit

A Survey of Smart Vehicles on Internet of Things
Authors:- Lecturer Dinesh Bhuriya

Abstract – In a Smart City, all articles should be savvy subsequently would have implanted processors and capacity to speak with one another through wired or remote associations .These inexorably shrewd items would give sheltered and advantageous condition through developing interconnection and interoperability, which is likewise named as Internet of Things (IoT), Within the goals of IoT additionally lies the vehicle to keen item correspondences, vehicles assume a significant job for protected and helpful travel. The principle vision of the Internet of Things (IoT) is to furnish reallife physical articles with figuring and correspondence capacities so they can associate with one another for the social great. As one of the significant individuals from IoT, Internet of Vehicles (IoV) has seen fast improvement in correspondence advancements. Presently, vehicles can without much of a stretch trade security, productivity, comfort-related data with different vehicles and frameworks utilizing vehicular ad hoc networks (VANETs). Where vehicles are the key social elements in the machine-to-machine vehicular informal communities. The close to constant applications offer protected and proficient travel of the vehicle clients, and the disconnected information guarantees savvy conduct of the vehicles and information examination for the vehicle specialists. We have recognized the social structures of IoV segments, their connections, and the collaboration types. We have planned VANETs segments into IoT engineering reference model to offer better reconciliation of IoV with other IoT areas. At long last, we give the usage subtleties and the exploratory investigation to show the productivity of the proposed framework just as incorporate diverse application situations for different client gatherings, down to earth arrangement of the proposed framework and utilizing it to gather genuine IoV related multi-modular tangible data in city or urban zones can be another fascinating heading We imagine that the IoV would be a necessary piece of astute vehicle frameworks later on brilliant urban communities.

Effect of Iron Powder on Partial Replacement of Fine Aggregate in Concrete
Authors:- Aman Raj, Keshav Sharma, Ankit

Abstract – Concrete is the main building material used worldwide. This project is an experimental study on the effects of cast iron powder as a partial replacement of sand (fine aggregate) in concrete. The effects of the iron powder on the concrete’s workability, strength (i.e., compressive strength, split tensile strength and flexural strength), durability via dry and wet strength test and water absorption test were studied. Along with these, analysis in the form of X-Ray diffraction (XRD) test was also conducted. For the aforementioned studies, we replaced the fine aggregate with iron powder in concrete by four different percentages i.e., 0%, 15%, 30% and 45%. Slump cone test was performed to study the impact on the freshened concrete tests. The slump value continuously declined with the increased iron powder percentages from 37 mm in 0% mix to 9 mm in 45% mix. The strength tests on hardened concrete were conducted on varied concrete specimens of different percentages for the following durations: 7, 14 and 28 days. Cubes, cylinders and prisms were casted for compressive, split-tensile and flexural strength tests. It was observed that the compressive strength, split-tensile and flexural strength increased till 30%, 45% and 45% of partial replacement of fine aggregate with iron powder. Also, water absorption test displays that it increased till 30% and then decreased. From all the tests and analysis, we determined that the optimum percentage of partial replacement is 30%. Apart from these tests and analysis, this project deals with showcasing the importance and benefits of using materials to improve the properties of conventional concrete and their impact on the environment..

Architecture and Framework for Machine Learning as a Service
Authors:- Rammohan Vadavalasa, Dr.Gali Nageswara Rao

Abstract – Machine learning is becoming part of every domain, from social media network to autonomous driving. Because of different activities humans are generating indirectly trillions of bytes of data every day in their lives; Different sources like Websites, Social media, Mobile applications, System logs, Sensors, Supermarket purchases, Mobile, and Web application usage are generating huge amount of data in every day.The companies and organizations collect this extensive amount of data for data mining in order to extract valuable information, finding similar patterns in the data, and estimating customer behavior; with this information from data companies generate new income and possibly to expand their markets. However, current trending machine learning frameworks are containing limited services and features.This paper proposes an architecture and framework to create a flexible and scalable system. It includes model creation, validation, training, testing, and serving.

Study of Hybrid Annuity Model ( HAM) Contract in Highway Construction Contractor and Owner Aspect
Authors:-Assistant Professor Shakti Singh

Abstract – Following the policy change in the mid-1990s India has embarked on a brisk pace of highway development that gave a high priority to highway development in country. In 1997 to develop a large highway network in a relatively short period of time the National Highway Development Programme (NHDP) was launched. In India, road projects are awarded via : Build-Operate- Transfer (BOT)-Annuity, BOT-Toll,Design, Build, Finance, Operate and Transfer (DBFOT) model and EPC (engineering, procurement and construction) contract. After the BOT model of Public Private Partnership (PPP), an advanced version of the Model Concession Agreement (MCA), presently called as Hybrid Annuity Model (HAM) is paving way for road projects. Now National Highway Authority of India (NHAI) has adopted Hybrid Annuity Model (HAM) for highway development . The hybrid model is supposed to be a win-win situation for the government and developers. The government is expected to fund up to 40 percent of the project cost while the remaining 60 per cent to be funded by the private player, and thus easing the financial burden on the exchequer as well. This paper discuss the various features of HAM in road sector of India, later it compares the Hybrid Annuity Model (HAM) with the conventional DBFOT model of road construction so as to find out the benefit and risk associated with HAM both for owner & contractor prospective.

Soil Stabilization By using Basalt Fibers
Authors:- Asso. Prof. R. Y. Kale, Neha D. Dahake, Sakshi M. Sahu, Gaurav A. Gawande Pranit J. Wailker, Vaishnavi R. Patekar, Chetan R. Pawar

Abstract – Basalt fiber is an inorganic fiber which uses natural basalt ore as raw material. The basalt fiber has natural compatibility, excellent mechanical properties, high temperature, and acid and alkali resistance. The objective of this study is to explore the potential use of natural basalt fiber in improving the geotechnical properties of soil. Both the content and length of basalt fiber were considered in this study. The study has been conducted with different fiber contents by weight of raw soil. For each fiber content 12mm, 18mm, 24mm lengths of fiber were used. The fiber reinforced soil was then subjected to number of tests. The two major test were Standard Proctor Test and Triaxial Compression Test. The experimental results indicate that basalt fiber can effectively increase the properties and strength of soil.

Analysis of Waste Management For Smart Cities
Authors:- Asst. Prof. S. Revathi, N. Niranjan, A. Raathikha, M. Velmurugan

Abstract – Current waste management trends are not sophisticated enough to achieve a robust and efficient waste management mechanism. It is very important to have a smart way of managing waste. This project introduces an innovative way of integrated sensing system that will help to automate the waste management process which includes the collection of waste. We proposed an IOT based waste collection system based on level of wastes present in the waste bins. The data obtained from waste bins equipped with Ultrasonic sensors is transmitted over the Internet to a server for storage and processing mechanisms. It is used for monitoring the daily status of waste bins. Based on which, the routes to take up several waste bins from different locations are decided. This information can be linked with municipality web server for immediate action. Every day, the workers receive the updated status of bins and routes in their Android application by integrating Google Maps application. The significant feature of this system is that it is designed to update from the previous experience and decide not only on the daily waste level status but also the predict future state with respect to factors like traffic congestion in an area where the waste bins are placed, cost-efficiency balance, and other factors that is difficult for humans to observe and analyze. Based on this historical data, the rate at which waste bins gets filled is easily analyzed. As a result, it can be predicted before the overflow of wastes occurs in the waste bins that are placed in a specific location.

Smart Gym Management System
Authors:- A.V. Dinesh Kumar, K Bhargav Ram Rayal, M.Saraswathi

Abstract – This system about the use of the technology in order to reach a better lorem is to become part of human life, and throughout the year, the technology is available and developed to meet the needs of members of all mankind; this did not stop them. Looking humans always have to wake up and be healthy fitness them. We, therefore, we believe, to resolve on the application of the problem is that users of Android, our thoughts, it is to help the users to administer the health care system in fitness and nutrition. This project was developed by the two methodologies and prototyping model, and a spiral. The system is used to project dramatically android broadcast worldwide, thus allowing access to a large number of people. The people, too, can be done through the provision of a hundred of the same, by means of the application of the questionnaire, however, is suggested by this acceptance of a larger one.

A Review Article of Facts Based Islanding Phenomenon Reduction and Enhancement of Grid Efficiency System
Authors:- M.Tech. Scholar Kanupriya, Asst. Prof. Durgesh Vishwakarma

Abstract – Islanding is undesired because it may impair the safety of maintenance service workers and/or damage load equipment through unsynchronized re-closure. In principle, islanding detection is the monitoring of islanding-indicating changes in inverter output parameters or other system parameters. This paper aims to aid design efforts through its comprehensive review of islanding detection methods (comparing their non-detection zones and detection speeds) and anti-islanding standards. As a result, this paper shall provide a handful information and clearer vision for researchers to determine the best method for their product.

A Concise Study of Cloud Computing Web Servicesin the Real World
Authors:- Ph.D. Scholar Momin M. Nadeem, M. Y., Assistant Professor Dr. Gyanendra Kumar Gupta

Abstract – Cloud Computing makes the dream of computing real as a tool and in the form of service. This internet -based ongoing technology which has brought flexibility, capacity and power of processing has realized service- oriented idea and has created a new ecosystem in the computing world with its great power and benefits.Cloud computing is fast creating a revolution in the way information technology is used and procured by organizations and by individuals.Cloud Computing can be described as web serviceoriented computing that provides an environment whichacts as a service in delivering software and information management in a way that would have typically only been available in product format. This is done throughPersonal devices – such as a laptop – that would access the services available through the network of servers that is called the “cloud”. In this paper we have discussed on study of the motivation factors of adopting cloud computing, web services and their types. It also explores SOAP and REST full messaging styles are considered as adoption reasons for cloud computing environment. We also include web services security, designing web services and WSDL.

A Review Article of Solid Oxide Fuel Cell Connected To Three Phase Electrical Power System
Authors:- M.Tech. Scholar Dinesh Kumarsahu, Asst. Prof. Durgesh Vishwakarma

Abstract – The energy crisis is one of the most critical phenomena happening in today’s world. The depletion of fossil fuels, the rise in oil prices, and the increase in power demand are the main causes of this problem. Concern over environmental conditions and human health make renewable energy one of the most viable alternative solutions to this crisis. Among various types of renewable energy, fuel cell technology shows a great potential in the electrical energy sector for several reasons, such as high efficiency, clean operation, and immunity to the adverse effects of weather conditions. Recent works prove that fuel cell technology is expected to be a better choice for distributed generation purposes. Distributed generation, which is installed near load centers, can moderate the stress of high electricity demand in the mainstream utility grid. This paper presents an overview of fuel cell technology, with emphasis on fuel cell types, characteristics, and applications. The differences among the various fuel cell types and the dynamic models of each type required for simulation are also discussed.

Drunk Driving Prevention and Automatic Bus Pass Tracking by using Image Processing
Authors:- Malarselvam V, James Ashish A, Peranban D, Arun S, Arulmani P

Abstract – Hybrid plants, which are composed of combinations of diesel generators, battery energy storage system and renewable energy resources such as photovoltaic, are outlined as a recommended approach for off grid power supply options for remote areas applications. According to frequency control of stand-alone grids, the output power of the diesel generators and the battery energy storage system are susceptible to variations in order to compensate power fluctuations, which are caused by the variations of the load and power of the PV field. The variations in the loading of diesel generators can have adverse effects on the operation, such as increase of fuel consumption, maintenance and slobbering problems. This paper analyzes different control strategies to improve the operation of stand-alone PV-diesel generator-battery plants, and to reduce the operation cost accordingly. Therefore, four control strategies are proposed according to primary and secondary control of frequency. Each control strategy provides different loading patterns of the diesel generators and the storage system. Dynamic simulations of the plant operation are performed according to each control strategy. The effects of the control strategy are analyzed according to four criterions: the frequency deviations, fuel consumption, lifetime of the batteries and the performance of the diesel generators. Finally, the cost of energy is calculated by considering the difference in fuel consumption according to each control strategy.

Design of Diesel Generator and Solar Plant Hybrid Power Generation System with Improvement of Plant Efficiency
Authors:- M.Tech. Scholar Shahrukh Mansuri, Scholar Hod Nilesh Sharma

Abstract – Handwritten signature verification system is a technology that can improve security in our day to day transaction held in society. Handwritten Signature Verification approach for offline signature verification. In offline signature verification, we are using neural network approach is project. Firstly, we need to train the system from a set of signatures. The images of signature are captured from a camera or it is scanned. The collected images are processed and their geometrical and statistical features are extracted. The extraction process is done using the SIFT algorithm. Then, the signature to be verified is taken as input in the same way. Feature extraction is also done for input image. Now, the input image features and the other images features in database are compared and classified. The classification algorithm used here is SVM and DTC algorithm. The classification process gives an exact classification whether the input signature is accepted or not. Handwritten Signature Verification technique is suitable for various applications such as bank transactions, passports with good authentication results etc.

Emotion Recognition Using Machine Learning Techniques and Edge Detection
Authors:- Manisha Dey, Raunak Sinha, Ritwik Karan, Associate Prof.Naveen Kumar G N

Abstract – Applied Emotions are natural states related with the tangible framework invited on by neurophysiological changes diversely associated with thoughts, notions, lead responses and level of bliss or frustration. Sentiments can be perceived as outrage, disgust, dread, bliss, dismal, shock and unbiased. Programmed outward appearance acknowledgment framework has numerous applications including, however not constrained to, human conduct seeing, direct checking of the impacts of an amusement substance or items on the crowd or client, location of mental issue, and engineered human articulations. Acknowledgment of outward appearance by PC with high acknowledgment rate is as yet a difficult errand. So, we propose a canny strategy utilizing Gabor channels for pre-preparing and CNN (Convolutional neural network) for arrangement.

Modeling and Simulation of Concentric Pipe Heat Exchanger with Varying Inlet Velocities
Authors:-Research Scholar Jasvinder Singh Saluja, Assistant Professor Rahul Vishwakarma, Assistant Professor Vipul Jain

Heat exchanger is a widely used for transfer of heat energy from one fluid to the other fluid. The heat is transferred in form of conduction and convection. Conduction occurs inside the material whereas convection occurs from materials to fluid and from fluid to fluid. The common application of the heat exchangers are like condenser, cooling tower, intercooler, refrigeration, and many other industrial applications. There are many types of heat exchangers wherein parallel and counter flow heat exchangers are extensively used in parallel flow heat exchanger hot and cold fluids are passes through the tubes in the same direction where as in counter flow heat exchanger both the fluids are passes in opposite direction to produce the desired effect. Baffles are sometimes used in heat exchanger to enhance heat transfer efficiency of heat exchangers. The concentric pipe heat exchanger is designed in present work in which different inlet velocities of fluid were taken and study is carried out for the temperature distribution, wall shear stress, and turbulent KE and pressure distribution for those velocities.

Handwritten Signature Verification System
Authors:- Puneeth P, Sagar U, Puneeth P M, Rachana S, Thanvi K C

Handwritten signature verification system is a technology that can improve security in our day to day transaction held in society. Handwritten Signature Verification approach for offline signature verification. In offline signature verification, we are using neural network approach is project. Firstly, we need to train the system from a set of signatures. The images of signature are captured from a camera or it is scanned. The collected images are processed and their geometrical and statistical features are extracted. The extraction process is done using the SIFT algorithm. Then, the signature to be verified is taken as input in the same way. Feature extraction is also done for input image. Now, the input image features and the other images features in database are compared and classified. The classification algorithm used here is SVM and DTC algorithm. The classification process gives an exact classification whether the input signature is accepted or not. Handwritten Signature Verification technique is suitable for various applications such as bank transactions, passports with good authentication results etc.

IoT In Healthcare: A Review Of Technological Interventions And Implementation Models Author: Nithin Nanchari

Authors: Nithin Nanchari

Abstract: The Internet of Things (IoT) is revolutionizing the healthcare industry by enabling unprecedented levels of connectivity, operational efficiency, and patient-centered care. With the help of smart medical devices and real-time data analytics, healthcare providers can now predict, monitor, and automate various clinical and administrative functions more effectively than ever before. This paper introduces the concept of IoT in healthcare, explores its primary applications such as remote patient monitoring, smart hospitals, and medication management, and outlines the benefits it delivers to patients and providers. While challenges such as cybersecurity threats and lack of standardization persist, the overall impact of IoT in healthcare continues to grow, driving improvements in outcomes, access, and efficiency.

DOI: http://doi.org/10.5281/zenodo.15795982

 

The Intelligent Enterprise: How Salesforce Einstein, LLMs, And AI Agents Are Transforming Business

Authors: Daljeet Singh

Abstract: In the contemporary business landscape, enterprises are navigating an increasingly data-driven, customer-centric, and digital-first environment. The evolution of intelligent technologies, particularly artificial intelligence, large language models (LLMs), and AI agents, is transforming how organizations operate, innovate, and deliver value across industries. Salesforce Einstein represents a pioneering initiative that has redefined customer relationship management through the integration of machine learning, predictive analytics, and natural language capabilities within a unified platform. When coupled with the transformative potential of LLMs and AI-powered autonomous agents, businesses gain unparalleled opportunities to become truly intelligent enterprises. These technologies enable organizations to analyze massive volumes of structured and unstructured data, personalize customer experiences at scale, automate complex decision-making processes, and foster collaboration between human expertise and machine intelligence. By aligning technological innovation with strategic objectives, enterprises can unlock resilience, scalability, and sustained competitive advantage. The intelligent enterprise is not simply a technological construct but a holistic approach that reimagines business models, enhances operational efficiency, and accelerates digital transformation. Furthermore, the integration of Salesforce Einstein with cutting-edge AI models brings coherence to data interpretation, supports advanced forecasting, and drives customer engagement while minimizing human intervention. This ultimately translates to higher levels of strategic alignment, customer trust, and adaptive agility required in a fast-changing market. The shift towards an intelligent enterprise also implicates broader socio-economic and ethical considerations, particularly around trust, transparency, inclusivity, and responsible AI deployment. Organizations adopting these technologies must not only focus on competitiveness but also commit to governance standards that ensure fairness and accountability. Through Einstein, LLMs, and AI agents, businesses are reshaping customer engagement paradigms, streamlining internal workflows, and driving predictive insights that inform long-term strategic planning. The future of enterprises rests on leveraging these intelligent systems to move beyond transactional efficiency toward innovative ecosystems that can anticipate, adapt, and co-create value.

DOI: http://doi.org/10.5281/zenodo.17277970

The AI-Enhanced Salesforce: Unlocking New Possibilities With Einstein Copilot And LLMs

Authors: Baljit Singh

Abstract: The digital age has transformed how businesses approach customer relationship management (CRM), with artificial intelligence (AI) now playing an integral role in shaping strategies, streamlining workflows, and enhancing decision-making. Salesforce, as one of the leading CRM platforms, has consistently evolved to meet the growing complexities of modern business ecosystems. The introduction of Salesforce Einstein laid the foundation for intelligent automation, predictive analytics, and seamless customer engagement. With the integration of Einstein Copilot and large language models (LLMs), Salesforce is entering a new era of enhanced functionality, where AI not only supports but actively empowers users to make better decisions, reduce workloads, and personalize customer experiences. Einstein Copilot functions as an intelligent assistant within Salesforce, enabling users to interact with data using conversational commands and receive contextual, real-time insights. Meanwhile, LLMs bring advanced natural language understanding and generative capabilities that revolutionize how employees and customers engage with data, processes, and applications across industries. These advancements signify a paradigm shift in CRM operations, moving from reactive strategies toward proactive, predictive, and automated solutions. Organizations are now equipped to harness conversational AI for sales optimization, customer service, marketing campaigns, and business forecasting. Furthermore, these tools are not limited to a single department but integrate across the enterprise, ensuring productivity gains at scale. The Einstein Copilot and LLM framework thus stands as more than an incremental innovation; it symbolizes the democratization of AI in business, making complex processes accessible to everyone. With these breakthroughs, organizations can anticipate—not simply respond to—customer needs, creating a seamless bond between corporate strategy and consumer experience. This article explores the integration of Einstein Copilot and LLMs in Salesforce, examining their impacts and potential applications in sales, marketing, customer service, and beyond. By highlighting the synergy between AI-driven assistants and data-powered language models, this analysis demonstrates how businesses can unlock new possibilities, build adaptive organizations, and drive sustainable, customer-centric growth in an increasingly AI-first economy.

DOI: http://doi.org/10.5281/zenodo.17277993

The Ethical AI: A Guide To Responsible AI Development On The Salesforce Platform

Authors: Manoj Kataria

Abstract: Artificial Intelligence (AI) has become an integral part of modern digital transformation, influencing decision-making, automating workflows, and redefining customer experiences across industries. As AI technologies continue to evolve within platforms like Salesforce, ethical considerations take center stage, ensuring that responsible and trustworthy AI becomes a reality rather than an aspiration. The Salesforce platform, with its inclusive and customer-centric design, provides organizations with tools that can both empower and challenge ethical standards depending on how AI is implemented. This guide presents a comprehensive discussion on the ethical dimensions of AI development specific to Salesforce, including issues of fairness, transparency, accountability, privacy, inclusivity, and security. It also explores the regulatory frameworks and industry best practices that organizations must follow when embedding AI features into Salesforce ecosystems. The exploration highlights the intersection of machine learning, cloud computing, and ethics, shedding light on potential pitfalls such as biased models, lack of explainability, misuse of data, and short-sighted deployment practices. In doing so, the paper emphasizes a proactive framework where ethical AI is not treated as an afterthought but as a fundamental design principle. The discussion delves into the importance of developing trust with users and stakeholders through transparent algorithms, respectful data stewardship, informed consent, and bias mitigation methods. It also considers the alignment between Salesforce’s AI-powered tools like Einstein AI and global policy directions, making a case for harmonizing technological innovation with moral accountability. Ultimately, the framework presented here equips businesses, developers, and decision-makers with the knowledge for responsible AI integration, ensuring sustainability, trust, and future readiness in their digital strategies. By exploring real-world examples, compliance strategies, and human-centered design models, this guide aims to foster confidence for companies adopting Salesforce AI without compromising on ethical standards. The goal is to build AI systems that are not only technologically advanced but socially responsible, trustworthy, and aligned with Salesforce's vision of equality and ethical digital engagement.

DOI: http://doi.org/10.5281/zenodo.17278004

Intelligent Operations For Cloud And Networked Enterprise Systems

Authors: Nagraja Suresh

Abstract: The rapid expansion of cloud computing, distributed applications, and networked enterprise infrastructures has fundamentally reshaped the operational landscape of modern organizations. As enterprises increasingly adopt hybrid and multi-cloud deployment models, the scale, velocity, and heterogeneity of infrastructure components have grown beyond the effective control of traditional rule-based monitoring systems. Conventional operational frameworks—largely reactive and threshold-driven—struggle to manage the dynamic provisioning, microservices orchestration, elastic workloads, and geographically distributed architectures that define contemporary digital ecosystems. This escalating complexity has necessitated a transition toward data-driven and intelligence-centric operational paradigms. Intelligent Operations (IOps) has emerged as a strategic framework that integrates artificial intelligence (AI), machine learning (ML), advanced analytics, automation, and software-defined networking (SDN) into IT operations to enhance system reliability, performance optimization, security posture, and cost efficiency. Rather than responding to incidents post-failure, IOps emphasizes predictive detection, proactive remediation, and adaptive infrastructure governance. Through continuous telemetry ingestion—including logs, metrics, and distributed traces—IOps platforms apply advanced analytical models to identify anomalies, correlate events across distributed systems, and forecast potential service degradations before they impact end users. This review explores the evolution of cloud-native and networked enterprise architectures, highlighting how virtualization, containerization, microservices, and DevOps practices have increased operational interdependencies. It analyzes the foundational components of intelligent operations, including AIOps (Artificial Intelligence for IT Operations), observability engineering, automation and orchestration frameworks, and programmable network infrastructures. Particular attention is given to the role of advanced technologies such as reinforcement learning, edge computing, digital twins, and Zero Trust security architectures in enabling scalable, secure, and resilient enterprise systems. The application domains of IOps are examined across enterprise use cases including cloud resource optimization, predictive capacity planning, incident management automation, network traffic intelligence, and cybersecurity operations. By correlating high-volume telemetry streams in real time, intelligent systems reduce mean time to detect (MTTD) and mean time to resolve (MTTR), minimize alert fatigue, and enhance operational decision-making. Furthermore, predictive analytics supports dynamic workload scaling and cost governance in multi-cloud environments, while behavioural models strengthen defences against insider threats and anomalous network activity. Despite its transformative potential, the implementation of intelligent operations introduces significant challenges. Issues such as data quality and integrity, model drift, integration complexity across heterogeneous environments, AI system vulnerabilities, and persistent skill gaps within IT teams can limit effectiveness if not addressed systematically. Governance frameworks, explainable AI mechanisms, and continuous model validation are therefore essential to ensure accountability, transparency, and long-term sustainability. Finally, this review outlines future trajectories toward self-driving infrastructure, autonomous data centres, intent-based networking, and AI-optimized sustainable computing.

DOI: http://doi.org/10.5281/zenodo.18670235

 

 

Design And Deployment Of Scalable Microservices And Network Platforms

Authors: Divya Suresh

Abstract: The rapid evolution of cloud computing, distributed systems, and enterprise-wide digital transformation initiatives has fundamentally reshaped modern software engineering practices, leading to the widespread adoption of microservices architecture and scalable cloud-native network platforms. Unlike traditional monolithic architectures, which tightly couple application components within a single deployable unit, microservices decompose applications into modular, loosely coupled, and independently deployable services. This architectural paradigm enhances scalability, agility, fault isolation, and continuous delivery, making it particularly suitable for dynamic and high-demand environments. However, the design and deployment of scalable microservices ecosystems introduce significant technical and operational complexities. Key challenges include efficient container orchestration, reliable service discovery, intelligent load balancing, advanced network virtualization, and robust API gateway management. Furthermore, ensuring system-wide observability, including distributed tracing, metrics aggregation, and centralized logging, is critical for maintaining operational reliability. Security considerations such as Zero Trust Architecture, API security, container security, and micro-segmentation must also be integrated to mitigate distributed attack surfaces and ensure secure service-to-service communication. This review provides a comprehensive analysis of core architectural principles, including domain-driven design, stateless service design, and resilience engineering patterns such as circuit breakers and bulkhead isolation. It evaluates enabling technologies such as containerization, Kubernetes-based orchestration, and service mesh frameworks, alongside deployment strategies including CI/CD pipelines, blue-green deployment, and canary releases. Additionally, the study examines scalability mechanisms such as horizontal auto-scaling, distributed caching, and edge computing integration. The review further explores emerging trends, including serverless microservices, AI-driven auto-scaling, eBPF-based networking, WebAssembly workloads, and 5G-enabled distributed platforms. Finally, it critically analyzes architectural trade-offs, operational overhead, and future research directions aimed at achieving energy-efficient computing, secure multi-cloud orchestration, and self-healing autonomous systems. Collectively, this study contributes to a deeper understanding of designing resilient, secure, and high-performance distributed platforms capable of supporting next-generation digital infrastructures.

DOI: http://doi.org/10.5281/zenodo.18670237

Machine Learning Models For Predictive Cybersecurity Defense

Authors: Manoj Tiwari

Abstract: Machine learning has emerged as a transformative force in cybersecurity, enabling predictive defence mechanisms that move beyond traditional reactive strategies. This review explores the evolution, methodologies, and applications of machine learning models in predictive cybersecurity defence. By leveraging large-scale data, these models can detect anomalies, anticipate threats, and automate responses in real time. Techniques such as supervised learning, unsupervised learning, and deep learning have been widely adopted to identify patterns in network traffic, user behaviour, and system logs. Predictive capabilities allow organizations to mitigate risks before attacks occur, reducing financial and operational damage. However, challenges such as adversarial attacks, data imbalance, model interpretability, and scalability persist. This article also highlights emerging trends, including federated learning, explainable AI, and hybrid defence systems that integrate human expertise with machine intelligence. Through a comprehensive analysis, the review emphasizes the need for robust, adaptive, and ethical frameworks to ensure reliable deployment of machine learning in cybersecurity. The findings suggest that while machine learning significantly enhances predictive capabilities, its effectiveness depends on data quality, continuous model updates, and integration with existing security infrastructures.

DOI: https://doi.org/10.5281/zenodo.19491834

Machine Learning For Packet Flow Classification

Authors: Rakesh Mehta

Abstract: The rapid escalation of global data traffic, catalyzed by the proliferation of 5G, Internet of Things (IoT) devices, and high-definition streaming services, has rendered traditional network management techniques increasingly obsolete. Packet Flow Classification serves as the foundational mechanism for Quality of Service (QoS) provisioning, resource allocation, and security enforcement. Historically, flow classification relied on port-based analysis or Deep Packet Inspection (DPI); however, the widespread adoption of end-to-end encryption protocols, such as TLS 1.3 and QUIC, alongside dynamic port allocation, has nullified these legacy methods. This review examines the paradigm shift toward Machine Learning (ML) and Deep Learning (DL) models as the primary engines for real-time traffic classification. By focusing on statistical flow features and byte-level patterns rather than plaintext payloads, ML models can identify applications and malicious intent within encrypted tunnels with unprecedented accuracy. We categorize current methodologies, ranging from classical supervised learners like Random Forests to advanced neural architectures, including Convolutional Neural Networks (CNNs) for spatial feature extraction and Recurrent Neural Networks (RNNs) for temporal sequence modeling. Furthermore, the review addresses the critical challenges of real-time processing at line speed, data imbalance in network datasets, and the necessity for Explainable AI (XAI) in network operations. By synthesizing recent academic breakthroughs and industrial implementations, this paper provides a strategic roadmap for building autonomous, "self-driving" networks. The findings suggest that ML-driven packet flow classification significantly enhances network visibility and resilience, providing the cognitive intelligence required to manage the complex, opaque traffic landscapes of the modern digital era.

DOI: https://doi.org/10.5281/zenodo.19491852

Published by:

Peer Reviewed Articles

Uncategorized

An international journal has team of reviewer to analyze submitted paper for publication in upcoming volume, issue are termed as peer reviewed articles. Hence this screening of papers are done by different type where journals adopt various measures. So three major class of peer review international journal techniques are :

  1. Single Blind International Journal
  2. Double Blind International Journal
  3. Direct Review

Submit Research / Survey Paper

Paper Publication Charges

So scholars can check any peer reviewed journals adopted process for selection , rejection or updation of submitted papers. Explanation of each type of peer review process is done under following section journals:

Single Blind International Journal In this process general introduction (Name, Department, College / university / company / organization name) of authors who have submit paper for publication are share to the reviewer team. This type of introduction put an impact on reviewer for rejection / selection of paper. While hiding of reviewer’s introduction increase fairness of the paper selection as author has not able to influence the reviewer team.

 

Double Blind International Journal In this process general introduction (Name, Department, College / university / company / organization name) of authors who have submit paper for publication are not share to the reviewer team. In the similar fashion general introduction (Name, Department, College / university / company / organization name) of reviewer who screen submit paper for publication are not share to the authors. So hiding of reviewers and author introduction increase fairness of the paper selection as none of party able to influence the reviewer team. Hence peer reviewed journals should adopt this process of selection.

 

Direct Review Peer Review Process In this process general introduction (Name, Department, College / university / company / organization name) of authors who have submit paper for publication are share to the reviewer team. In the similar fashion general introduction (Name, Department, College / university / company / organization name) of reviewer who screen submit paper for publication are share to the authors.

I suggest authors to publish their paper in Double blind International Journal peer review articles.

Published by:

Journal of Computer Science

Uncategorized

Selection of international journal for publication of research work in field of computer science engineering is depends on number of parameters as many of publishers publish every field of engineering. So Journals of Computer Science should have good reviewer team where most of reviewers are from computer background means there qualification degree should be in field of computer engineering.

Submit Research / Survey Paper

Paper Publication Charges

One more important point for the filtration of International journals depends on type of publication provides means most of publications are from computer background, some of computer topics papers are (Data Mining, Computer Network, Image Processing, Computer architecture, Embedding Circuit, Load Balancing, Artificial Intelligence, Dimension Reduction, Prediction / Forecasting, Data Packet Routing). Hence paper has publication issue with computer topics are consider as journal of computer science. Authors are suggest to consult their mentor or guide for the selection of International journal for the final submission of papers. As journals takes time for the review which directly increase the life of pursuing course. It was also observed that some of journals takes money for the publication but there web portal do provide direct information of those charges to the scholars during submission. So filtration of those journals before the final submission of paper is done by writing a direct mail to the concern journal editor which is generally provide in contact us page of that web portal. It is suggested to the scholars to submit paper as per author guideline provide by the international journal, this reduce review process of the work as well. Publication process of the journal mostly depends on the authors content as well, so plagiarism of the submitted process should be check by the mentor as rejection of paper. Computer field engineering paper are depend on research platforms for the implementation, training, testing, etc. Finally I suggest authors to submit their research work in reputed and fair journals who not only publish paper but also help author to increase work quality as well.

Published by:

Journals For Publication

Uncategorized

Search of a journal for publication is a tough task for the new scholars who have just initiate there research work. As large number of journals are available for the scholars to publish their work in respected area international journal. Hence Journals for Publication are depends on guidance of mentor as well which generally cross check following points:

Research / Survey Paper Submission

Paper Publication Charges

  1. International journal should be at-least four year old.
  2. It should be reviewer team for review of paper.
  3. Publication charges for the publication should be clearly mention.
  4. International journal should have valid impact factor.
  5. Each volume in different year have different issue and paper should be present in each issue.
  6. Response time of the journal for any query should be less, as international journal generally take long time for resolving publication queries.
  7. Authors guideline should be present on website for increasing the chance of paper selection for publication.
  8. Paper template need to be check before submitting the paper in any journal as this might take time and some of journals are strict for their paper submission format.
  9. Type of research area for publication also need to be check as journals do not publish or accept papers from all research area like engineering, pharmaceutical, Biology, Law, commerce, Science, etc. Different branch of research have different publication journals.

Scholars can consult their guide or mentor for the final publication when paper accept by the international journal after publication. Number of authors for publication with respected designation should be clearly mention and correction may be chargeable or time taken process. Hope this article resolve young scholar doubt for research paper or review paper submission in journals for publication. IJSRET journal invites authors to submit there hard work for publication in low cost and less time duration with response in every stage of the publication like submission  mail, reviewer response, paper status acceptance or rejection, publication notification.

Published by:

Journals with The Highest Impact Factor

Uncategorized

Impact factor of any publication journal is measure of paper cited by authors of other journal. Here as per number of journal paper citation in particular period of time is term as Impact Factor of Journal. So authors who are looking for journals with the highest impact factor can submit their paper by checking number of points such as:

  1. Number of papers publishes in different issue of each volume.
  2. Impact factor allot by agencies, who are authorized for this practice.
  3. Reviewer Team for the publication.
  4. Processing charges before submission of paper.
  5. Year of publication start

Submit Paper for Publication

Paper Publication Fees

Paper publication by young author can submit their paper by checking above important points mention above for the publication. Journals who are submitting the paper has to prepare paper with number of points which are need to be covered such as Title, Abstract, Keywords or Index Terms, Introduction, Related work or Literature Survey, Experimental part explanation, Comparison of results with other existing algorithm, Conclusion of paper, Future work, References. Hence a research paper should cover all set of points while other papers type like survey   or review are need to be covered by following points like Title, Abstract, Keywords or Index Terms, Introduction, Related work or Literature Survey, Application, comparison of other related techniques, comparison of other related features used by other researcher of same field, Conclusion of paper, Future work, References. Hence budding author can submit their paper by measuring there content on mention section of papers. This Journal provide number of support for the authors who are looking for publication in Journals with Highest Impact Factor Like:

  1. Publication Support
  2. Paper Formatting
  3. Chat Support
  4. Reviewer Support / comments
  5. Paper Processing charges clarification before taking the paper for review.
  6. Improvement of any research work by discussing authors of same field.
Published by:

Journals On Machine Learning

Uncategorized

Computer Science scholars are working in various field of research such as machine learning, cloud computing, networking, communication, etc. Out of those hot topic machine learning is very famous and innovative field of research for young scholars. Hence publication of research work done by budding researcher need Journals on Machine Learning where most of papers are published in this field. As number of international journals are available for publication which accept paper from filed of engineering, so filtration of specific machine learning journal is done under following points:

Research / Survey Paper Submission

Paper Publication Charges

  1. Reviewer Team Work and there field of Education
  2. Paper Publication Title Specify Machine learning title
  3. Submission form Field of Acceptance

Hence above points help authors to filter international journal before submission of there hard research work. Some of machine learning field of work is accept by this journal IJSRET which include:

  1. Neural Network (Feed Forward, Error Back Propagation, Convolution, Spiking, etc)
  2. Regression (Logistic, Linear, Binary, etc.)
  3. Decision Tree (Random Forest, Spanning, Frequent Pattern Tree)
  4. Support Vector Machine (Linear, Non-Linear)
  5. Naïve Bayes Classifier
  6. Reinforcement Learning

This journal provide publication or accept paper from all above field of research, it is suggested to all scholars who are looking for publication that always consult your guide or mentor before submission of paper in any international Journals on machine learning. Submission of paper is done by preparing the paper having important points which include Abstract, Introduction, Related Work, Methodology, Experimental Setup, Results Section, Conclusion, References. So paper having all points of interest are more liable to get publish. Authors should take advice of the reviewer as well where points are mention to improve quality of work with more details. Scholars who have just start there work in machine learning need to publish their paper in low publication cost journals as hitting the high quality journal for young researcher is tough and frustrating. This small publication improve confidence and validity of researcher as well.

Published by:

IJSRET Volume 6 Issue 2, Mar-Apr-2020

Uncategorized

The New Technology of Genetic Engineering-CRISPR
Authors:- UG Student Rohan Alag

Abstract:- In recent times, the research to edit the genome of different organisms has led to marvelous discoveries. In the late 80s, scientists discovered palindromic sequences in the DNA which has since been used as the base for recombinant DNA technology to help create lab synthesized enzymes and medicines which have slingshot the pharmaceutical field into a whole new world, but now with work been done on the new gene-editing technologies like CRISPR. This is a whole new way of looking at the DNA. Something that we could add a piece to can now be edited to such an extent that we can choose what each gene does.

 

Oil Spills Impact using Image Processing
Authors:- Lavanya P, Priya Dharshini S, Gopinathan B

Abstract:- Marine life may be a huge ecosystem that faces many threats, the most important one being pollution. And one among the main contamination sources are oil spills. Oil spills are often devastating, especially when a large area of the ocean/sea is covered with it. The oil that gets leaked into the ocean pollutes the water and prevents algae from getting sunlight and fish from getting the oxygen trapped in water. The oil also gets trapped within the wings of birds that feed on the fish, making it difficult for them to fly. In short, oil can pose an excellent threat to ocean life if not taken care of. Oil spill incidents occurred outside the Kamarajar Port in Ennore near Chennai in Tamil Nadu, India. The spill occurred on 28 January 2017 when an outbound empty tanker BW Maple collided with an inbound loaded oil tanker Dawn Kanchipuram at 04:00 local time.Image processing may be a rapidly growing technology, which has applications in computer vision also as remote sensing. Identifying oil spill impact with Machine Learning Random forest classifier, K-means algorithm and WebGnome tool using Landsat8 dataset. We aim to broaden its range of applications in controlling global pollution.

Credit Card Fraud Detection Using Adaboost
Authors:- B.Nithin, Rohit Ravula, Shaik Gangina Sulthana

Abstract:- Fraud is cheating or wrongful or a culprit activity, its main aim is focus financial or personal sign. In this proposed system we uses two mechanisms namely, (i) fraud prevention and (ii) fraud detection, for avoiding loss from fraud, that detecting details from fraud. In the first fraud prevention mechanism. Is most defensive and proactive strategy, it prevents the misrepresentation from starting. At that point, the second mechanism fraud detection is guessing the fraudster. This component is required for a fake exchange, but it guesses the fraudster, in the time exchange endeavored by fraudster. Credit card fraud is a serious problem in financial services. Billions of dollars are lost due to credit card fraud every year. There is a lack of research studies on analyzing real-world credit card data owing to confidentiality issues. In this project, machine learning algorithm is used to detect credit card fraud. Standard models are first used. Then, hybrid methods which use AdaBoost . To evaluate the model efficiency, a publicly available credit card data set is used. Then, a real-world credit card data set from a financial institution is analyzed. In addition, noise is added to the data samples to further assess the robustness of the algorithms. The experimental results positively indicate that Boosting Algorithms achieves good accuracy rates in detecting fraud cases in credit cards.

Lpg Leakage Detection and Alaraming System
Authors:- Priyanka Raut, Surbhi Bondre, Vrushab Motghare, Aishwarya Kale , Ankita Girde

Abstract:- Home fires have been taken place frequently and the threat to human lives and properties is growing in recent years. Liquid petroleum gas (LPG) is very inflammable and may burn even at a long way from the source of leakage. Most fire accident are caused due to poor quality rubber tube or the regulator isn’t turned off when not in use. Therefore, developing the gas leakage alert system is extremely essential. Hence, this system presents gas leakage alert system to detect gas leakage and to alarm the people onboard.

A Review of Speed Flow Density Study of Two Different Road Indian Road and Their Comparison
Authors:-M.Tech. Scholar Pranjali Goyal, Asst. Prof. Akshay Gulghane

Abstract:- In this work speed -flow-density study of an Indian road has been conducted. Data has been collected using video camera and later decoded in computer. This data is very essential to estimate capacity of an Indian road. Since the collected data is of a narrow density domain, capacity prediction from this data is not promising. One of the data is collected in mhow pithampur and another data is from indore mhow .Both the data’s were compared statistically. For both the data’s Z-value is calculated and it is compared with Z-critical to define whether both the data’s are same or different.

A Survey on Broad Band Patch Antenna Design by using Different Techniques
Authors:- M.Tech. Scholar Manohar Kumar, Suresh Gawande

Abstract:- This article presents give an general idea of the microstrip patch antenna design by using different techniques for broad the bandwidth of an antenna. Generally the microstrip patch antenna surface is trace of copper on both sides of the substrate. The one side of the patch antenna is a radiator the other side of the antenna is ground work as a reflector. As per survey the researcher are work on the different feeding technique like wise it may coaxial feeding, microstrip feeding, aperture feeding and proximity feeding. Most of the researcher work on coaxial feeding it is easy to used and complexity is less as compared to other feeding. The microstrip patch antenna is used many researcher due to their low weight , easily available, easy to design any type of design either both sides or one side and easy to fabrication and testing. The main disadvantages of microstrip patch antenna is narrow bandwidth due to this they are unsuitable for wireless communication system. From last few decades the researchers are continuously working on microstrip patch antenna how to improve the bandwidth and different parameter of a microstrip patch antenna. The current work is focus on wearable, reconfiguration, 5G applications. This survey give the introduction of the microstrip patch antenna and give the band width enhancement technique by different researchers.

A Review on CFD Analysis of Tube Receiver for Parabolic Trough Solar Collector with Pin Fin Arrays Towards CSP Technologie
Authors:- M.Tech. Scholar Sarabjeet Singh, Prof. Kashiram Kadwe

Abstract:- Solar thermal systems are advantageous since it is easier to store heat than electricity on a large scale. Investigation on the heat flux distribution on the absorber tube is critical to get detailed knowledge on how to improve efficiency with the aim to enhance the overall heat transfer performance. In this study Tube receiver with pin fin arrays inserting was introduced as the absorber tube of parabolic trough receiver to increase the overall heat transfer performance of tube receiver for parabolic trough solar collector system. The Monte Carlo ray tracing method (MCRT) coupled with Finite Volume Method (FVM) was adopted to investigate the heat transfer performance and flow characteristics of tube receiver for parabolic trough solar collector system.

Design Analysis and Optimization of (Direct Injection) Diesel Engine
Authors:- Dharamveer Singh, Er. Rohtash Sharma

Abstract:- This paper focuses on the design, Analysis and optimization of piston which is stronger, lighter with minimum cost and with less time. Since the design and weight of the piston influence the engine performance. Study Design: Analysis of the stress distribution in the various parts of the piston to know the stresses due to the gas pressure and thermal variations using with Ansys. The Piston of an engine is designed, analyzed and optimized by using graphics software. The CATIA V5R16, CAD software for performing the design phase and ANSYS 14.0 for analysis and optimization phases are used. Results indicate that the volume of the piston is reduced by 24%, the thickness of barrel is reduced by 31%, width of other ring lands of the piston is reduced by 25%, Von misses stress is increased by 16% and Deflection is increased after optimization. But all the parameters are well with in design consideration.

Investigations on Sliding Contact Characteristic of FRP Composite Bearing using Artificial Neural Networks
Authors:- Shailesh Rajoria, Assistant Professor Shantanu Roy

Abstract:-In rotary machines vibration is an inherent phenomenon which has the tendency to affect required performance. Amongst the different parameters that affect vibration, selection of appropriate bearing is the most critical component. In this work the effect of different types of bearing on vibration in rotary machines is studied and the magnitude of vibration produced by use of different set of bearings under the same condition of loads and rotational speeds were investigated. Bearings considered in this work were ball bearing, tapered roller bearing, thrust bearing and shaft material considered is of mild steel. From experimental result, it was noted that tapered roller bearing gives the highest amplitude of vibration among all the three bearings whereas the ball bearing gives least amplitude under similar operating conditions.

360 Degree Wheel Rotation Vehicle
Authors:- Mohammad Ubaid Ur Rahmaan, Mohd Jaber, Abdul Rahman, Asst.Prof. Attalique Rabbani

Abstract:- Main function of car is to move from one place to another place. We find that every member of the family have their own vehicle. Car provides us lot of benefits like protect us from sun heat in summer and from rain in monsoon. Travelling is inevitable part of person’s life Car is the most common thing in today’s world. Ha ving a car is the status in the society but Having a costly car is a royal status in the society, with increase in number of vehicle people have to face traffic problems like parking, taking reverse etc. So here we have“DESIGNED a 360 DEGREE ROTATING CAR” for these above mentioned purposes. These problems can be efficiently reduce and eliminated by the use of this application we use. It operates in a clockwise and anticlockwise direction A primary objective of the present invention is to provide a simple, stable, easy control, smaller space needed and a more concise movement of car To better understand the present invention, detailed descriptions shall be given with the accompany drawings.

Optimisation of Helical Gear Power Transmission using Genetic and Pid Controller Hybrid Algorithm
Authors:- Manish Parmar, Assistant Professor Shantanu Roy

Abstract:- This Review Paper gives the information about Bending and Contact Stress Analysis of Helical Gear. Thus, this review paper mainly focus on the MATLAB, finite element methods and GA standards for computation of bending and contact stress on a root of helical gear. In this paper the bending stress and contact stress of the gear tooth are examined and are to be one of the main contributors for the failure of the gear in a gear set. Thus, the analysis of stresses has become popular as an area of research on gears to minimize or to reduce the failures and for optimal design of gears. Authors have use various Approaches and means to conclude their main objective of finding out the contact stresses and gear failure causes in static condition using Finite Element Analysis, GA Standards and MATLAB. This review paper contains theoretical, numerical and analytical methods for the helical gear pair analysis.

Enhancement using Adaboost Algorithm in Machine Learning to Predict ASD in Children
Authors:- Mary Stella. J, Dr. Shashi Kumar. D.R

Abstract:- Autism is a neurobehavioral disorder of development which is seen with social behavioral and interactive behavioral impairments in children. The perspective of detecting and predicting the ASD in the children is to diagnose and treat the children in early age which could be a life saving aspect in leading a normal life. Though different techniques have been studied it did not provide any beneficial conclusion in predicting traits on autism in children of small age groups. Different Data mining techniques and prediction model of ML techniques were explored to performance evaluation and accuracy validation. In our study, the required classification method of ASD diagnosis has been used with children of very early age. Our proposed paper compares many algorithms of machine learning along with AdaBoost algorithm. AdaBoost combines the weak classifiers to a strong classifier and achieves more accuracy finally.

Investigating The Potentials of Wood Charcoal, Groundnut Shell Charcoal and used Toner in Microbial Fuel Cell Electrode Power Generation
Authors:- Akuma Oji, Nwanro Godstime Chinkem

Abstract:- This research is on the potentials of wood, groundnut shell and toner charcoals are investigated to ascertain the best material for microbial cell electrodes. To investigate this, wood, groundnut shell and toner charcoal were used to produce electrodes after mixing each of them in cement in the ratio of 1:1. Agar concentration of 20g/500ml was mixed with 3.5g salt for the production of the Proton Exchange membrane. Voltage and current of the cells were measured three times daily using digital multi-meter and the average was recorded. After 20 days of study the result obtained showed that wood charcoal electrode in close circuit has maximum current, voltage, power and current density of 0.17mA, 0.15V, 2.2024mW/m2, and 14.683mA/m2 respectively. For groundnut shell charcoal the following results were obtained for close circuit- maximum current, voltage, power and current density were 0.07mA, 0.13V, 0.7859mW/m2, and 10.3644mA/m2 respectively, for toner charcoal the results are maximum current, voltage,power and current density 0.1mA, 0.11V, 0.7773mW/m2, and 7.7733mA/m2 respectively. For open circuit, maximum values of wood charcoal for current, voltage, power and current density were 0.017mA, 0.15V, 0.216mW/m2, and 1.445mA/m2respectively. Groundnut shell in open circuit gives the following result, 0.007mA, 0.14V, 0.0833mW/m2, and 0.595mA/m2 for maximum current, voltage, power and current density respectively, toner charcoal in open circuit gives 0.011mA, 0.013V, 0.1216mW/m2, and 1.1056mA/m2for maximum current, voltage, power and current density respectively. All result obtained from the experiment shows that wood charcoal base electrode has the highest potential among the tested materials, thus, would produce more power and has more efficiency than the other materials.

Elimination of Lower Order Harmonics in Multilevel Cascaded Inverters with Equal Dc Sources using Pso
Authors:- K.Meghana, K.Bharghavi, K.Nikhitha, Asst. Prof. Mr.Rathnaiah

Abstract:- This paper presents elimination of lower order harmonics in multilevel inverters withequal DC sources using PSO. To eliminate the selected lower order harmonics from the output voltage or current waveform of a cascaded multilevel inverter, appropriate switching angles were calculated and the power switching devices were switched accordingly. The switching angles were calculated from the non-linear equations derived from the Fourier series expansion of the output voltage of the inverter. A PSO algorithm was developed to solve the nonlinear equations. With the proposed approach, the required switching angles are efficiently computed using PSO to eliminate the lower order harmonics from the inverter voltage waveform for different modulation indices (ma).The PSO algorithm was developed in the Matlab environment, and the three phase multilevel cascaded inverter systems have been simulated using the PSIM software. The performance of the proposed method for a nine-level cascaded H-bridge inverter was evaluated based on simulation and experimental studies. Lower order harmonic up to the 11th order are eliminated.

Modeling of Physio chemical Parameterfor Poultry Wastewater Behavior in Dual Cell Microbial Fuel Unit with Biomass Electrode
Authors:- Akuma Oji, Otaraku Ipeghan Jonathan

Abstract:- This experimental research on the modeling of physiochemical parameter in microbial fuel cell involves physiochemical parameter with a multi- parameter water checker. The parameter analyzed were; Conductivity, Turbidity, Total suspended solid (TSS), Total dissolved solid (TDS) and salinity, standard methods. The raw poultry waste solution which serves as an electrolyte has values of COD 2052mg/l, BOD 493mg/l, pH 6.36, Conductivity 16.36 µs/cm, Turbidity 964 NTU, TSS 1100 mg/l, TDS 9260mg/l and salinity 9.6% as anode electrolyte. The result obtained after 28 days of operating the cell shows poultry waste physiochemical parameter reduction and that using R2 as bases, the model of the physiochemical parameters proposed showed polynomial relationship for all the biomasses apart from the electrode from sawdust that are showed Linear relationship for Salinity and same R2 (0.9877) for TSS and also for The best fit, for is for sawdust with exponential correlation with R2 value of 0.9815 for salinity. The research study has shown that Microbial Fuel Cell has a strong polynomial relationship correlation for different electrode produced of different biomass materials with poultry waste solution as electrolyte.

Efficient Multipath Routing with Multichannel in WSN Network
Authors:- M.Tech. Scholar Raghavendra Kumar, Assistant Professor Devkant Sen

Abstract:- In WSN due to the lack of resources of recharging or replacing of batteries will not be possible. The all nodes working in network is completely depend on the node energy in network by that the energy utilization is major issue in WSN. The efficiency of the network degrades and also responsible for the loss of packets. So routing in the sensor network is one of the important issue and many difficulties are faced during deployment of routing strategies.The dispute in sensor networks is that even if a host does not communicate on its own, it still normally forwards data and routing packets for others, which reduces its battery. Multi-path routing can avoid congestion and improve performance. In this technique the route is selected on the basis of higher energy capacity of nodes ,it means the multiple path are selected on the basis of higher battery capacity and the data ACK is received through the next alternative path that has next higher energy level but lower than the first preferred existing path in Grid WSN. The congestion is controlled by multipath routing. The proposed Enhanced AWMRP load balancing scheme is balance the load in network by selecting the path that has low mobility and higher energy value. The performance of proposed scheme is compare with the normal AWMRP and AWMRP with GECP (Group based Energy Conserving Protocol) routing protocol and provides the better outcome. Grid-based multi-path routing protocol intended to route packets fast, utilize and extend sensor nodes energy in addition to avoiding and handling network congestion when happens in the network.

Collaborative Decision for Wormhole Attack Prevention in WSN
Authors:- M.Tech. Scholar Rajani Kant Tiwari, Assistant Professor Devkant Sen

Abstract:- The dynamic network called WSN is very popular for short range communication between the mobile devices. This research is very useful in field of security to evaluate the network performance in case of attack and proposed previous security scheme. Due to the absence of centralized administration, security is the main issue in WSN and attackers are very easily modified the actual behavior and performance of network. The wormhole attack is creating the tunnel. In this attack two or more malicious colluding nodes create a higher-level virtual tunnel in the network, which is employed to transport packets between the tunnel endpoints. These tunnels emulate shorter links in the network and so act as benefit to unsuspecting network nodes which by default seek shorter routes. In this paper we proposed a scheme against wormhole attack. Worm hole attack is a type of attack that are work as to established path in between sender and receiver but if the sender has start data transmission then in that case the worm hole attacker has create a direct link, referred to as a wormhole tunnel between them and all the data pass through that tunnel. In this research we proposed Wormhole attack Intrusion Detection as well as prevention (IPS) Security Scheme against wormhole attack. For detection we identified the information of intermediate nodes and get attacker node information like node number, number of attacker and infected packets it means trustful communication among the nodes by that the higher successful data communication process rates may well possible. After that we prevent wormhole attack using broadcasting the particular identification (ID) of attacker by that no node in network replies of that request and secure the mobile ad-hoc network communication.

A Review Article of Higher Efficiency Solar and Thermal Hybrid Power Plant Based on Pi Controller
Authors:- M.Tech. Scholar Ayush Verma, Anil Kumar Kori

Abstract:- Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy resources is takes place i.e. PTC, wind and thermal energy. This process reviles the sustainable energy resources without damaging the nature. We can give uninterrupted power by using hybrid energy system. Basically this system involves the integration of two energy system that will give continuous power. Solar panels are used for converting solar energy and wind turbines are used for converting wind energy into electricity. This electrical power can utilize for various purpose. Generation of electricity will be takes place at affordable cost. This work deals with the generation of electricity by using two sources combine which leads to generate electricity with affordable cost without damaging the nature balance.

A Review Article of Hvdc Based Power Loss Reduction and Estimation of Power Transmission
Authors:- M.Tech.Scholar Prashant Sharma, Anil Kumar Kori

Abstract:- Line commuted converter user in HVDC transmission systems inject harmonics into their associated AC and DC systems. A conventional approach to filter these harmonics is to use passive filters on both AC and DC sides of the converter. Apart from their technical problems, harmonic filters constitute a considerable part of the volume and cost of present DC terminal stations. Another possible alternative of harmonic suppression is to increase the number of pulses of AC-DC converters by transformer phase-shifting techniques, but the resulting complicated circuitry together with its problems of insulation produce significant technical and economical disadvantages. This Paper presents an overview of classical HVDC transmission system. It also provides a brief historical development of the technology and state of art in the field of HVDC transmission system. Based on outcome of literature survey, broad research goals are identified.

Survey on Location Privacy in Participatory Sensing Applications
Authors:- Vaishnavi K, Vaishnavi D R, Srujana S K, Vaibhav Talreja, Asst.Prof. Nikshepa T, Asst. Prof.Surabhi K R, Asst.Prof. Lavanya D

Abstract:- Location Privacy is a major apprehension in participatory sensing applications. Here user can both give as well as retrieve valuable information. The major drawback in LBSs (Location Based Services) is the leakage of user’s locality. These applications collect detailed sensor data which compromise user privacy. To solve this problem existing solutions bring in trusted third party (Anonymizer) connecting the user and the Location Service Provider (LSP). In some situations the Anonymizer may compromise which leads to leakage of user information. To deal with this issue, in this paper we adopt an enhanced location privacy preserving system for the LBS atmosphere. The main advantages of our method includes: 1) user can raise queries with secured locations, 2) no need of fully trusted third parties.

Review of Image Search using Hybrid Techniques
Authors:- M. Tech. Scholar Sakina Bohra, Assistant Professor Prof. Lokesh Parashar

Abstract:- The big digital image databases are yielded by the widespread of smart devices along with the exponential growth of virtual societies. If not fused with efficient Content-Based Image Retrieval (CBIR) tools, these databases can be counter-productive. The introduction of promising CBIR systems had been witnessed last decade which promoted applications in various fields. In this editorial, ananalysis on state of the art content-based image retrieval which includes theoretical and empirical work, is propounded. This work comprises of publications that cover aspects of research relevant to CBIR area. That is to say, unsupervised and supervised education and combination techniques along with which the low-level image visual descriptors have been reported. Furthermore, challenges and applications that appeared to carry CBIR research have been discussed in this work.

Evolution of Javascript and its Frameworks
Authors:- Narpat Singh Rawat

Abstract:- The increasing popularity of JavaScript has led to a variety of frameworks that aim to help developers to address programming tasks. However, the number of JS Frameworks has risen rapidly to thousands and more [1].There was a period when the development of the web pages was very hectic job for the browsers, it was early 1990’s when the necessity of new browser programming language is feel which is completed by the Mocha language and renamed into LiveScript and finally it’s become JavaScript, although it is not linked to Java but the name enable JavaScript to get popularity in faster term. When the JavaScriptwidely accepted over worldwide the need of compatible code is needed for all the browsers at that is when first ever JavaScript framework comes into existence named DHTML in 2000 after that most widely used JavaScript library known jQuery comes into existence but developers community felt the need for a complete front-end framework to develop the complex web applications and that was fulfilled by the various new JavaScript based frameworks like – Angular JS, React, Vue JS and other backend like Node JS.

Recommendation System for Career Path using Data Mining Approaches
Authors:- Pratik Devidas Dusane, Nikita Vinayak Bhosale,Vaishnavi Avinash Avhad, Pratik Kailas Naikwade

Abstract:- Nowadays, students are often facing a problem to choose a career in their life. There are several factors that influenced the students while choosing their career path such as their personal aptitudes, educational achievement and their environment. After completing secondary and higher secondary education, students are normally starting to find a career path which may suit their skill and potential the best. However, many students made wrong decision on selecting their career due to the lack of experience, help and advice from friends and relatives, parents and lecturers, or career counseling. So, in order to tackle this situation we are developing such system which will help student to select their career path based on their interests.

Harness Design for Four Wheeler Vehicle using ECAD Tool
Authors:- Pranay A. Sonwane, Amar W. Gakhare, Akshay C. Ghube, Prof. Pravin M. Palkar Komal Tawale, Anjali Uikey

Abstract:-In today’s automotive industry, wire harness fields are employed to increase performance and reduce its manufacturing costs, but they are not successful in that field. We have designed inexpensive, less complex and low weight wire harnesses for HEV (Hybrid Electric Vehicle) to increase performance and reduce the cost of wire harnesses. In today’s wire harness are available for HEV but they are more economical and expensive so indirectly cost of HEV is increased.

Experimental Study of Wear Properties on Aluminum Silicon Alloy
Authors:- Pranay A. Sonwane, Amar W. Gakhare, Akshay C. Ghube, Prof. Pravin M. Palkar Komal Tawale, Anjali Uikey

Abstract:-At present there are many properties of Aluminum Silicon alloy which contain light weight less coefficient of thermal expansion and more weight ratio which is suitable for many industries in past decade it is more accepted in automobile industries as it is useful in cost saving and its Si alloy plays an important role in this study the wear behavior of Al-Si is being studied Aluminum of 86% weight with silicon of 14% of weight,Aluminum of 82% of weight with silicon of 18% weight,Aluminum of 78% weight with silicon of 22% weight were synthesized by casting method.the wear behavior was studied by using pin on disc wear testing machine.the mechanical properties of the alloy has increased.

Sign Language Translation to Voice For Dumb People
Authors:- Rosemarry Antony, Stephy Paul, Silji Simon C, Assistant Prof. Scaria Alex

Abstract:-Communication is the only medium by which we can share or convey our thoughts, but for a person with disabil- ity(dumb) faces difficulty in communicating. It is impossible for them to communicate with others until ordinary people learn the sign language for communication. So this system will help the dumb people to intract with other people. Some existing methods are sign language to text conversion and using smart gloves. In the already existing systems signs are identified from images. The normal outputs will be alphabets or numbers and may not handle connective words like is,are etc. It is more comfortable if it is converted to voice rather than text for dumb people. In this system a webcam will capture the hand gesture from video and perform hand feature extraction. Then predict the symbol. Finally we get the result as voice. So that it would be audible to everyone. Here we are identifying signs from live video. It is the main difference from other methods. The output will be collection of words. For handling connectives special languages want to implement. Machine learning is the domain of this system. This is implemented using python. The main objective of this system is to help dumb people in their communication.

Diabetes Disease Prediction using Retina Scan
Authors:- Kanchan Doke, Rizeen Mujawar, Aditi Patil, Juhi Kamath

Abstract:- One of the foremost causes for the increase in mortality among children and adults in recent years is diabetes. Doctors are using classification systems to analyse and diagnose the medical data. In order to classify diseases, Radial basis function neural networks are more dependable. It is especially helpful in diabetes classification, because of it’s non iterative nature. In Radial basis function neural networks, there are four layers. The four layers are input layer, pattern layer, summation layer and the decision layer. They are feed forward neural networks. Along with the training data set size, the size of the pattern layer increases simultaneously. Although various attempts have made to solve this issue by clustering input data using different clustering algorithms like k-means and k- medoids, the main difficulty in determining the optimal number of neurons in the pattern layer remains unsolved. A new model is applied here in order to classify the data gathered from diabetic patients. This model is made mainly on the basis of cluster validity index and radial basis neural network. In order to determine the optimal number of neurons in pattern layer, cluster validity index is used in class by class fashion. It is important to identify the weights between summation layer and pattern layer for processing. Thus, in order to identify the weights between summation layer and pattern layer, a new convex fitness function has been designed for bat inspired optimization algorithm. For testing the model, Pima Indians Diabetes data set and synthetic data sets are being used. Experimental results proved that our approach performs better in terms of accuracy, sensitivity, specificity, classification time, training time, network complexity and computational time compared to conventional radial basis function neural network. On comparing with familiar classifiers namely probabilistic neural network, feed forward neural network, artificial immune system, GINI classifier, etc, our proposed model has proven to perform better.

Characterization of South Indian Ladies Foot And Generation of Last Thereof
Authors:- Efrem Eyasu Chute

Abstract:- Shoe-last design is a highly significant aspect of footwear design. This project aims to develop a shoe last with an accurate fitting system for young females in Tamil Nadu by collaborating the knowledge of reverse engineering and 3D modelling software. The data will be collected using a 3D foot scanner for better exactness of measurements. After analysing collected data, the existing last will be crossly checked with measured value to realize deviation from actual foot size. The new fitting from scanned data will determine possible discomfort.

Traffic Monitoring System for Hair Pin Bends and Blind Sharp Turns using Plc
Authors:- Assistant professor Ikram N, Deepak Kishor L C, Santhosh P, Karthikeyan G

Abstract:- In this method driver alerting system for vehicle at hair pin bends and blind sharp turns to avoid accident and lose of human life. To give safe journey to tourist and local person while travelling at hill station and blind sharp turns in normal road. The paper mainly focused on the control and monitoring system in hilly area at hair pin bends and sharp turns with new invented technology with the help of automated system. The automated system would reduce the accident at hill station by utilizing the programmable logic controller. Passive infrared sensor takes care of heavy vehicle like lorry, Bus with respect to hairpin bends and sharp turns. To move indication vehicle of opposite side with help of traffic signal the vehicle come from the other end. Automated system take place quality and efficiency output .Thus, the proposed automated technology include PLCs and passive infrared sensor to develop driver alerting system and improve safety in the hair pin bends of hilly roads and sharp turns.

V4 Solenoid Engine
Authors:- Khaleel Ahmed, Mujtaba Razi Ahmed, Mohd Aijaz, Assistant Professor & Supervision Attalique Rabbani

Abstract:- The main objective of our project is to overcome the drawbacks of an ordinary IC engine by replacing it with “SOLENOID ENGINE”. The solenoid engine works on the solenoid, It is a cylinder type case on which the copper coil is wrapped into number of turns, when we passes the current through it, it reciprocates the piston inside the cylinder back and forth and works like an ordinary reciprocating engine. In this engine we are using very less movable parts,hence turbulence is low when compared to an IC Engine. Also due to less components and no fuel is used for power generation it is very economical than other engines. In solenoid we are not using any type fuel combustion as total power is generated by current, hence it doesn’t produce harmful gases like IC engines do, which is very harmful for both human and atmosphere, hence it is very Environmental friendly.

Design Analysis and Optimization of (Direct Injection) Diesel Engine
Authors:- Dharamveer Singh, Er. Rohtash Sharma

Abstract:- This paper focuses on the design, Analysis and optimization of piston which is stronger, lighter with minimum cost and with less time. Since the design and weight of the piston influence the engine performance. Study Design: Analysis of the stress distribution in the various parts of the piston to know the stresses due to the gas pressure and thermal variations using with Ansys. The Piston of an engine is designed, analyzed and optimized by using graphics software. The CATIA V5R16, CAD software for performing the design phase and ANSYS 14.0 for analysis and optimization phases are used. Results indicate that the volume of the piston is reduced by 24%, the thickness of barrel is reduced by 31%, width of other ring lands of the piston is reduced by 25%, Von misses stress is increased by 16% and Deflection is increased after optimization. But all the parameters are well with in design consideration.

AQUA Silencer
Authors:- Mohammed Siraj Ali, Mohd Fasi Uddin , Nabi Ahmed Naveed , Associate Professor Attalique Rabbani

Abstract:- Day by day the Air pollution is goes on increasing. The main source of the pollution is Exhaust from automobiles and industries. Hence to reduce these pollutants from Exhaust of Engine a new technology is introduced called Aqua silencer. An Aqua Silencer is used for control of emission and noise in automobile exhaust. By using activated charcoal, perforated tube and outer shell it is constructed. An aqua silencer is connected to the exhaust pipe of engine. The activated charcoal filters the harmful sulphur oxides and nitrogen oxides content produced from the engine. Sound produced under lime water is less hearable than it produced in conventional silencer. Because of this property lime water is used in this silencer and hence its name AQUA SILENCER. It is tested in single cylinder 4- stroke petrol engine the noise and smoke level is considerable less than the conventional silencer. The main pollutants contribute by automobiles are Carbon monoxide(CO), Unburnt Hydrocarbon(HC),Oxides of nitrogen( Nox) and Lead etc., other sources such as electric power generating stations, industrial and domestic fuel consumption, refuse burning, industrial processing.

Seesaw Power Generation
Authors:-Mohd Azmath Akhtar,Md Tabrez, Supervision Assistant Professor Attalique Rabbani

Abstract:- Since the issue of electricity in India is increasing day by day, we plan to design a system that utilizes the energy that is going to waste and convert it into useful electrical energy. In playgrounds, we see a lot of energy going to waste. We have designed a see-saw that utilizes the mechanical energy and converts it into useful electrical energy. Every day, a large number of people visit parks and playground. The idea is to modify few of these rides in such a way that when they are used, the mechanical energy spent on these rides is converted into electrical energy. The proposed idea can eventually result in a concept of green energy which will base on natural energy that no one is utilizing and then converting it into useful energy. This idea can be used as an alternate of any other energy production idea that requires a lot more money and require a lot more resources. Hence this idea can save a lot of energy in the future. The energy that is converted must be sufficient enough to power the park, if not produced on a much higher scale. The paper is based on the theory behind the proposed method and how we have managed to create a prototype of what the people could install in their playgrounds

Iot in Oil & Gas: Exploring Technology &Firmware Security Techniques
Authors:-Daniel Ekpah, kamalu .A. Ugochukwu, Prince .O. Asagba

Abstract:- The Oil and Gas industry remains the hope of future energy mix and the engine that drives the clean gas initiative. The output of today’s industry now rest on the geometrical change in the technological advancement such as artificial intelligence and IoT. This paper explored IoT applications and solutions that could be applied in the oil and gas industry in creating new value information generated from integrated sensors and actuators, communication channels and data analytics. Large variety of IoT deployments and protocols raises the IoT security assurance way. In this approach, the paper examines security solutions and cases capable of improving the quality and quantity of oil production.

Determining the Countries Prepared for a Future Pandemic Based on Analysis and Visualization of Novel COVID-19 Virus
Authors:-Praffulla Kumar Dubey, Udbhav Naryani, Medhavi Malik

Abstract:- The COVID-19 has been announced as a pandemic by WHO. At the time of writing this paper more than three lakh people have already got infected from this disease. This virus has shown different statistics around the globe. As the virus spread, some countries were able to handle the adverse conditions and were able to control the spread of virus whereas many other countries were not able to handle the spread. Due to this there is a need to determine which countries need to invest more in health care so that they are prepared for similar adverse conditions in the future. We propose to satisfy this need by analysing the number of total patients, recovered patients and total number of deaths in different countries. Using the above three attributes we perform the analysis

Customer Satisfaction Analysis of McDonald’s
Authors:-Gaurav Singh, Vrushabh Raut, Professor Dr. Meenal Pendse

Abstract:- The study has been conducted in order to obtain a brief knowledge about the behavior of customers towards McDonald’s in Pune, Maharashtra, India. The main objectives of conducting the study are:
1. To understand the customer mentality towards the Fast Food Industry and international brands.
2. To understand the demands of the customers towards the Fast Food Industry which they are willing to achieve.
3. To measure the service quality provided by McDonald’s in Pune to its customers with the help of five dimensions of SERVQUAL model namely tangibles, assurance, reliability, empathy, responsiveness.
4. To come up with various Strategies and alternatives which can be utilized by the McDonald’s in Pune in order to increase its sales and quality of its services to delight the customers

Analysis of Second Sound Convective Heat Transfer & Effect of Temperature Gradient in
Super Fluid Helium-II

Authors:-Research Scholar P.V.N. Saichandu, Registrar, Professor, Dr. G. R. Selokar , (Supervision)

Abstract:- Superfluid helium Transport wonders can be portrayed utilizing the two-fluid Landau-Khalatnikov model and the Gorter-Mellink common grating. We have proceeded with our past work gave to the plan of an arrangement of conditions to depict the heat and mass vehicle in superfluid helium, and its numerical arrangement.
The precision of the estimations is at any rate ±0.5 percent. The outcomes are in great concurrence with the theoretical expectations of both Tisza and Landau yet will in general support the previous’ hypothesis over the latter’s. The way that subsequent sound produced in the superfluid can enlist on a mouthpiece stomach drenched in the fluid is examined.
Blend, portrayal, investigation of physical properties – specifically, dependable to high weights – of the accessible high Tc superconducting mixes and endeavors to unwind the instrument in charge of superconductivity have all been useful in accomplishing materials with ever higher superconducting progress temperatures. This has been the significant inspiration to the work detailed in this proposition which gives a record of the amalgamation and characterization of the new superconducting mixes (Y,RE)Ba2Ca3Sr4Cu50x and (Y,RE)Ba2Ca3Cu40x and of high weight considers on some superconducting mixes.

Convective Heat Transfer & Effect of Temperature Gradient in Super Fluid Helium II
Authors:-Research Scholar P.V.N. Saichandu, Registrar, Professor, Dr. G. R. Selokar , (Supervision)

Abstract:- With a reverberation technique, the speed of the temperature waves (second sound) in fluid helium II has been resolved as an element of temperature from about 1.4°K to the λ-point. The speed is observed to be zero at the λ-point, achieves a limit of 20.46 m/sec. at 1.7°K and diminishes to 19.80 m/sec. at 1.42°K. The precision of the estimations is at any rate ±0.5 percent. The outcomes are in great concurrence with the theoretical expectations of both Tisza and Landau yet will in general support the previous’ hypothesis over the latter’s. The way that subsequent sound produced in the superfluid can enlist on a mouthpiece stomach drenched in the fluid is examined.
Heartbeat strategies are connected to the instance of second sound in fluid helium II. Both transmitter and recipient comprise of thermal components and d-c heartbeats are utilized all through. The upsides of beating are counted for the specific instance of second sound. The undifferentiated from electrical circuit is planned for the geometry included. Information is recorded photographically and models for a few cases displayed. Speed of second sound is given as a component of temperature; both the high-temperature and low-temperature reaches are stretched out past those of past examiners utilizing standing wave strategies. Lessening of these d-c heartbeats is given as an element of temperature. The “sifting in time” innate to the beat strategy allows the examination of a few types of coupling between second sound and standard sound

Mapping of Nanorobots with Neuroscience
Authors:-R.DeepakraJ, N.Abinavan, R.Nandhini, J.V.Jaron

Abstract:- In recent days nanotechnology and neuroscience are the emerging fields. Combining these field together, it is able to develop a product which will be innovative and effective. By combining neuroscience and nanotechnology we can develop a mapping nanorobots with neurotransmitters. It was about of building many number of nanorobots, swarms of tiny robots that can link together in any arrangement imaginable which are mapped with neurotransmitters. Due to this, the nanorobotics themselves to form the object which the user thought in his mind. In April, 2014, Ex-president Obama announced a hugely ambitious science project on neurotechnologies. He also promise of hard cash of $100m in 2014 and up to billion of dollars. The research was made by Dr. Paul Weiss, Dr. Anne Andrews. This can be used in many applications like defence, house hold robots, security purpose etc. The interfacing of nanorobots and brain is done with the concept of Brain-Control Interface, Electro encephalogram and electromagnetic field

Advanced Walking AID for Visually Impaired People using Ultrasonic Sensor and Arduino
Authors:-UG Scholar B.Madhan kumar, UG Scholar E. Madubala Pradeep, UG Scholar U.Megha, Asst. Prof. V. Savitha, Prof. T. Kalaikumaran

Abstract:- The internet of things (IoT), is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Some of the IoT applications are Factory Digitalization, Product flow Monitoring, Inventory Management, Safety and Security, Quality Control, Packaging optimization, Logistics and Supply Chain Optimization. And also the significant issue facing by the blind people is the reptiles like snakes and dogs for this we, proposed the walking stick repeller is utilized for outwardly impeded individuals to shield them from snakes and dog . The fundamental is blind individuals to stroll effortlessly and to be cautioned like objects & reptiles by fixing frequency range 25cm to 400cm & >255hz. Obstacle recognizing Distance and occurance of vibration can be monitored in the system . If the blind people loss their usual way means it alerts the guardian through , GPS system that provide the information regarding the location of the blind person using the stick to his family members. SMS system is used by the blind to send SMS message to the saved numbers in the micro controller in case of emergency. The programming of GPS modem, GSM modem, buzzer and vibration motor has been successfully done for this system.This device will be best solution to overcome their difficulties

Catch Action: An IoT Controlling System using Gesture Detection
Authors:-Sulthana Manal,Sruthy KG

Abstract:- Today’s for each and everyone needs the IoT devices and their services. Some of the challenges associated with managing and accessing the services of IOT devices. For controlling IoT devices are nowdays using are voice recognition and others. So, here we uses a method helpful for peoples like childrens, elder peoples and for patients with disabilities. Here we propose an IoT device controlling system using hand gestures. A framework called Catch Action, where user can control an IoT devices by looking at it and doing actions. Object detection, gaze tracking, and hand gesture recognition are the three modules of the system.This paper give u an outline of certain strategies used to execute this framework and furthermore the advantages and disadvantages of it.

Mobile Air Pollution Monitoring System using Fuzzy Logic
Authors:-Sujuda ov

Abstract:- Internet of Things (IoT) is an overall arrangement of “keen gadgets” that can detect and associate with their environment and cooperate with clients and different frameworks. Worldwide air pollution is one of the significant worries of our time. Existing checking frameworks have mediocre exactness, low affectability, and require research facility investigation. Accordingly, improved observing frameworks are required. To beat the issues of existing frameworks, we propose a three-stage air contamination observing framework. An IoT kit was readied utilizing gas sensors, Arduino IDE (Integrated Development Environment), and a Wi-Fi module. This pack can be truly put in different urban communities to checking air pollution. The gas sensors accumulate information from air and forward the information to the Arduino IDE using fuzzy logic. The Arduino IDE transmits the information to the cloud by means of the Wi-Fi module. We additionally built up an Android application named IoT-Mobair with the goal that clients.we use Fuzzy Logic is a method of reasoning that ressembles human reasoning .This method similar to how humans perform decision.


Attacks on Internet of Things
Authors:-Rachana Buch, Dhatri Ganda

Abstract:- The Internet of Things (IoT), similarly called the Internet of Everything or the Industrial Internet, is another development perspective envisioned as an overall arrangement of mama chines and devices fit for teaming up with each other. The IoT is seen as one of the most noteworthy districts of future development and is expanding immense thought from a wide extent of adventures. In any case, most of these IoT devices are definitely not hard to hack and deal. Routinely, these IoT devices are confined in register, amassing, and framework limit, and in like manner they are more vulnerable against ambushes than other endpoint contraptions, for instance, PDAs, tablets, or PCs. Advanced ambushes are not new to IoT, anyway as IoT will be significantly participated in our lives and social requests, it is getting essential to step up and focus on computerized opposition. Along these lines, there is an authentic need to ensure about IoT, which has in this manner achieved a need to altogether grasp the risks and attacks on IoT system


Machine Learning Approach to Classify News Articles Based on Location
Authors:-Shrina Sachin, Monika Kar, Swapnali Shewale, Prof. Shweta Barshe

Abstract:- In this hectic lifestyle, we need to classify news as per user requirements. News are important and things are constantly changing around the world. In this paper, we will be classifying the news articles based on cities and providing set of cities specific news. We have developed our own web crawler for content extraction from the HTML pages of news articles. Random Forests, Naive Bayes and SVM classifiers algorithms are used. Machine learning techniques are used to achieve our goal and helps to classy news articles


Dry Sliding Wear Behaviour Study on Friction Stir Processed of Aluminium 6061 Alloy
Authors:-Md. Thamizuddin, Mirza Sohail Baig, Syed Mohammed MehdiRazvi, Supervision, Asst. Prof. Mohammed Parvez

Abstract:- Recently friction stir processing (FSP) has emerged as an effective tool for enhancing sheet metal properties through microstructure modification. Significant grain refinement and homogenization can be achieved in a single FSP pass leading to improved formability, especially at elevated temperatures. FSP is a solid-state process where the material within the processed zone undergoes intense plastic deformation resulting in dynamically recrystallized grain structure. Most of the research conducted on FSP focuses on aluminium alloys. Despite the potential weight reduction that can be achieved using Titanium dioxide (B4C) alloys. In this work, we examine the possibility of using FSP to modify the microstructure and properties of commercial A7075-B4C&AL2O3 alloy particles. The effect of various process parameters on thermal histories, resulting microstructure and properties to be investigated


Grass Cutter Machine
Authors:-Mohammed Afan Ashraf, Muzzammil Hussain, Mohammed Muzaffar Abdullah,Supervision,Asst. Prof. Mohd Attalique Rabbani

Abstract:- In current days, grass cutter machines are operated by fuel and electrical energywhich are costly and requires high maintenance. Hence, in this study, a hand-held operatedmachine for grass cutting was designed and fabricated by using locally available materials.Important aspects such as durability, strength, and light weight were taken into designconsiderations for better performance characteristics. The lawn mower was powered by a12V/1.35A rechargeable battery which drives the DC motor up to a rotational speed of 19,300 RPM. As a result, the generated torque will be transferred to the cutting headmechanism for efficient grass cutting. The entire configuration set up was mounted on a wooden base which attached together with a bicycle frame and a set of wheel arrangement.This portable lawn mower can be used to maintain and trim grass in gardens, home, schools or yards


Optimization of Reliability System using Solar Energy Grid Integration System ”SEGIS”
Authors:-Scholar Roshan Lal, Associate Professor Ritesh Diwan

Abstract:- The inevitable transformation of the electrical grid to a more distributed generation configuration requires solar system capabilities well beyond simple net-metered, grid-connected approaches. Time-of-use and peak-demand rate structures will require more sophisticated systems designs that integrate energy management and/or energy storage into the system architecture. Controlling power flow into and from the utility grid will be required to ensure grid reliability and power quality. Alternative protection strategies will also be required to accommodate large numbers of distributed energy sources.The scope of the SEGIS program includes improving the reliability and increasing the value of PV inverter/controllers while developing interfaces for advanced grid integration. SEGIS products are needed that will increase the value of solar energy systems in today’s “one-way” distribution infrastructure and/or will increase the value of systems in tomorrow’s two-way” grid or micro-grid. The heart of the SEGIS hardware, the inverter/controller, will manage generation and dispatch of solar energy to maximize value, reliability, and safety. The inverter/controllers will interact with building energy management systems and/or smart loads, with energy storage, and with the electric utility to allow the integration of relatively large amounts of PV energy while maintaining or increasing grid reliability


A Review of Power Factor Compensation in UPQC System
Authors:-M.Tech. Scholar Sourabh sahu ,Assistant Professor Tikeshwar gajpal

Abstract:- The extensive application of power electronic devices induces harmonics in the utility system which generates problems related to the quality of power delivered. Good Power Quality is immensely important for both industrial and domestic sectors. Researchers have tried and implemented much useful technology for removing all the voltage and current related harmonic occurrence problems which in turn improves the quality of power delivered to the customers. In general, these devices are classified as custom power devices UPQC is one such device which is capable of improving power quality by eliminating source as well as load harmonics. This paper presents a review on power quality improvement by employing Unified Power Quality Conditioner


Dustbin Collection & Monitoring System via IOT
Authors:- G.Pavithra, S.Shobana, S.Sushma, S.Thanapriya, R.Saravanan

Abstract:- The uncollected waste material when the waste bin is full is a common problem nowadays. Thus, an efficient waste management for the waste material is essential in ensuring a clean and green surrounding environment. This paper presents an Internet of Things (IoT) based Smart Waste Collection Monitoring and Alert System to monitor the waste material at the selected site of garbage collection area. The system is implemented using an ultrasonic sensor which is connected to PIC IC16F887aas to monitor waste bin garbage level. In this system, waste bin depth level will be sent via Arduino Ethernet Shield with an Internet connection to the Ubidots IoT Cloud. The Ubidots store the collected waste bin level data into IoT database and display the waste bin depth level on online dashboard for real-time visualization. The Ubidots Event manager invoke a notification alert to garbage collector mobile phone via a SMS when the waste bin is nearly filled for immediate waste collection. Therefore, the waste collection became more effective and systematic.


Online Bus Pass System
Authors:- Lecturer Vikas Burgute,Shamrao Ghodake,Priyanka Koradkar,Sonali Dhaware

Abstract:- The project name as “Online Bus Pass System” is useful for passengers who are facing problems with the current manual work of bus pass system and renewal. His/her renewal or registration can be done through online payment. In the existing system the user has to go on particular date and time if they fail then the renewal done. Online bus pass system application will help the user to save their time and renewal bus pass without standing in a line for hours near counters. There are uses need to register with the application by submitting their details through online. The admin will verify the candidate details and if they are satisfied they will approve bus pass. The user can login with their username and password and renewal is performed. The renewal process is carried by paying the money using online payment. The user can give their valuable feedback for further enhancement of this project.


Guardian-Faculty Member Android Application (GFM)
Authors:- Lecturer Salma Shaikh,Siddhi More,Poornima Edke,Shanti Gambhire

Abstract:- This is aimed at developing an Android Application for parent-faculty interaction, which is very important in any educational institution. This system will be useful for both parents and faculty members for effective communication. Faculty members can upload information like maintaining records, attendance, daily activities. Earlier, managing details, a schedule was entirely based on manual effort and it is a time-consuming process. This application has been proposed to overcome such problems. This application has a record of daily activity planning that lists criteria for a piece of work. This application saves a considerable amount of time when instructors creates and manages activities. Overall, this application helps faculty in their work and improve their daily activity planning system.


Analysis of Coaxialdouble Gate Schottky Barrier Carbon Nano-Tube Field Effect Transistors
Authors:- Asst. Prof. Dr. Diwakar Nath Jha

Abstract:- Carbon nanotubes have emerged as promising candidates for nanoscale field effect transistors The contact between metal and CNT may be of Ohmic or Schottky type. Schottky contact CNTFETs operate by modulating the transmission coefficient of the Schottky barrier at the contact between the metal and CNT,but the ambipolar behavior Schottky barrier CNTFETs limits the performance of those devices.we show by employing a double gate structure the ambipolar behavior of those devices may be suppressed.


IOT Based Smart Surveillance using Voice Recognition
Authors:- V.Saravanan, G.Maheswari, G.Aswini, S.Mariya Epsiba

Abstract:- Surveillance has used in lot of applications like home nursing , taking care of elderly people etc. Smart surveillance using voice recognition system is capable of enhancing situational awareness across multiple scales of space and time. It describes IOT based remote control and surveillance architecture using Raspberry Pi. This project make use of sounds around the environment and detect the intrusion using voice recognition technique and using sound sensor detector module we can identify the intrusion using decibel level. Once the recognition is done and the intrusion is found, it sends the alert notification from the server to remote administrator over android application. Then admin can take an appropriate action and alert local security. In this project we use Raspberry Pi as a main source which is the best and efficient platform for IOT. Sound sensor detector module is connected in the raspberry pi board. The data are continuously stored in the cloud. We can able to retrieve the data whenever and wherever we need from the cloud service using internet connection. We use mics to recognize and compare the sounds around the environment.


Livestock Health Monitoring and Tracking
Authors:- Chinmaya.S, Naveen Kumar.K, Nivetha.R, Rakesh.R, Dr. T. Kalaikumaran

Abstract:- Health Monitoring of dairy cattle plays a vital role of increasing the dairy products supply worldwide. Nowadays farmers are showing less interest in dairy sector as animals are suffering from various ailing health issues, unpredictable killing disease, and advance breeding cost. The main objective of this project is to develop an automatic veterinary system for monitoring the cow. The IOT based cattle health and environment monitoring system monitors various cattle health parameters such as body temperature, heartbeat, location of animals and environmental parameters such as temperature, humidity. These all are connected devices to monitors animal’s health, environment of shed and these edge devices communicate with the shed controller through mobile application. Monitoring the activities and health of the cattle continuously and taking corrective measures help in increasing the milk productivity. This helps in preventing the cattle from diseases at early stage and also increases the milk yield.


Automatic Vehicle Speed Control with Wireless in Road Sign Delivery System
Authors:- Bindu Shree A N, Chaithra, Bhargavi B R

Abstract:- Nowadays accidents are occurring frequently, causing demise of many people by making modest mistakes while driving (in school zone, hills area, and highways). But sometimes it may not be possible to view the signboards placed by the Highway Department to alert the drivers in such kind of places and there is a chance for accident. The advancement in the processor technology and microcontrollers has opened a new system designed to prevent the accidents caused due to negligence of drivers in seeing traffic signals alongside the road and other anomalies on the roads. So to intimate the driver about the zones and to automatically maintain the speed is accomplished by means RF technology. The main objective is to design a Electronic Display controller meant for vehicle’s speed control and monitors the zones, which runs on an embedded system and can be custom designed to fit into a vehicle’s dashboard to display information on the vehicle, the vehicle’s Electronic Display Controller Unit warns the driver, to reduce the speed according to the zone, it waits for driver’s response and reduces the speed of vehicle automatically.


A Study of YouTube’s Service Quality
Authors:- Mihir Kulkarni, Mohammed Dilawar

Abstract:- YouTube is the most trending and most widely used video streaming platform in today’s date. Their users are spread across the world. With such a broad user base, it becomes important to survey the quality of service provided by them at global level. In the following paper the researchers attempt to study the relevant literature on the topic and explain their methodology of assessing the quality of service provided by YouTube. They also attempt to state the gaps and shortcomings in the services provided by the streaming platform effectively and come up with relevant suggestions.


An Automated System of Brain Hemorrhage Detection using Deep Learning
Authors:- A. Shalini, P. Veera Vijayashree, S. Vishal, Shiju C Chacko

Abstract:- In our human body, brain is one of the most complex organs that works with billions of cells. A brain hemorrhage is a type of stroke that is caused due to bleeding which occurs due to the result of ruptured artery Medical imaging is used to create a visual representation of the organs and tissues in the body. Either MRI or CT scans for the purpose of diagnosis are suggested by medical experts. The proposed system will employ CT images as they pass X-ray beams in an arc and this enables to take several pictures. The proposed system classifies the CT image of brain is affected or not image using Deep Convolutional Neural Network.


Cranium Armour 2.0
Authors:- Arbaaz Memon, Prathamesh Matte, Monish Shingnapurkar, Sachin Bojewar

Abstract:- The project aims to increase the percentage of riders wearing a helmet in turn ensuring safety of people. The project will make use of microcontrollers such as Arduino nano, Bluetooth module, etc. India has one of the highest number of two wheelers. Yet, a large majority of riders avoid wearing helmets. Reasons for not wearing a helmet are many, some of which are silly, but in the end the price a rider pays for not wearing the protective gear can be life threatening.


Temperature Dependence and Survivorship of COVID 19: “Myth or Fact”
Authors:- Achal Thool , Assistant Professor Ashwini Mankar, Assistant Professor Vijay Harode

Abstract:- A novel Coronavirus, 2019-nCoV, has been identified as the cause of an outbreak of respiratory illness that originated in Wuhan, China, and which has spread to several other countries around the world. Assessment of the risks posed by severe acute respiratory syndrome (SARS) Coronavirus (SARS-CoV) on surfaces requires data on survival of this virus on environmental surfaces and on how survival is affected by environmental variables ph, temperature, relative humidity etc. Scientists are racing to identify the source of the Coronavirus that is causing havoc around the world. Three weeks ago, Chinese scientists suggested, on the basis of genetic analyses, that the scaly, ant-eating pangolin was the prime suspect. In this review we will summarize the current knowledge on whether the virus is really temperature dependent and whether the virus needs an intermediate host as a living or non living particle to survive before it gets transmitted to the one and only susceptible host i.e Human.


Design Concepts of Green and Sustainable Industrial Park
Authors:- Asst. Prof. Tintu Shine A L, Jaison James, Dona Elizebeth Dolly, Mathews Mathew

Abstract:- A sustainable and green industrial park is an area allotted for industries with initiatives to reduce waste, pollution, share resources (such as materials, water, energy, infrastructure, and natural resources), and help achieve sustainable development, with the intention of improving environmental quality. Our study aims at a design process with a flexible and adaptable layout of the park to maximize use of renewable energy and minimize carbon emissions. The work includes impact studies, waste treatment, sustainable processes like carbon capturing, renewable energy sources, eco-friendly construction materials, rain water harvesting, permeable pavements etc. Here we transform a normal area of land into an efficient and eco-friendly industrial zone. The study can be considered as a general design as the technologies adopted here can be applied irrespective of locality.


Finding Smallest Number in a Set Quantum Circuit
Authors:- P.k.Vijay

Abstract:- Finding smallest number in a set which is a simple process which can be performed in a classical computer. Then what is the reason of this paper?
The main motive of this paper is not finding the smallest number using the iterative method i.e. using classical computer but rather using the most power computer ever built i.e. “Quantum computer”. But what is the use of quantum computer for this purpose which can be performed using a normal laptop? So in order to explain this question lets create a situation that you have to find out the hospital which is at the shortest distance in one shot (emergency situation) and you are given with a classical computer and quantum computer. Let’s say you selected a classical computer for this job you don’t succeed because basically normal computers which actually works by iterative method
i.e. going one by one. But if you selected Quantum computer you can find the solution in one shot. Where this power comes from? Basically from two concepts “superposition” and “entanglement”. So this paper explains how to find the smallest number in a set using a quantum circuit.


Semantic Video Mining for Anomaly and Mishap Scrutinizer
Authors:- Rohith G, Vishnu Narayan V, Twinkle Roy, Shery Shaju, Asst. Prof. Ann Rija Paul

Abstract:- Video surveillance is necessary to pull out more interesting and useful information from video data set. From various applications of video surveillance the system works for accident detection from abnormal behavior of multiple vehicles on highways and notifying for the same. it is one of the most active research topics in computer vision. In this work, rapid traffic video surveillance and monitoring system are presented along with dynamic traffic signal control and accident detection mechanism. It works with the objective of producing the complete automatic intelligent system to overcome the delay expected by the human efforts in detecting accidents. To fulfill the objective moving objects are detected using background subtraction. These objects are classified to separate out the desired objects which are positive samples tracked to analyze the behavior and gen- erating the required events. The system detects accident using the vehicles stopped motion, which can be due to accident or vehicle stopped at the roadside. The accident situation can be detected by using the classifier. Thus accidents are classified automatically into major and minor accident classes and the information is sent immediately to the concerned people. For major accidents the message is sent to ambulance, police and relatives, and for minor accidents message is sent to relatives alone. The proposed intelligent traffic video surveillance system renders rapid dynamic control of traffic signals and it raises the identification of accidents correctly.


Modified Effective Materials for Flexible Pavement Pothole Repair: A Review
Authors:- UG Student Swati B. Chavan, UG Student Kshitija M. Shirke, UG Student Rushikesh A. Ghorpade, Asst. Prof. K.H. Ghorpade

Abstract:- One of the most important infrastructure in a progressing country are the communication routes. Since roads indirectly contribute the economic growth. Potholes are the biggest enemy for road users. Government is looking at all options to keep our roads in the best conditions but it is temporary solution for pothole repair. Due to this potholes claimed 30 lives every day in India. Therefore, this preference study need states that to fulfil the need of sustainable repair pothole structure by developing enhanced modified bitumen. There are different kinds of waste materials which satisfy all analysis and strength for pavement performance, significantly it improves asphalt mixture strength when mixed with modified material with bitumen. It contributes to reduce, reuse of waste materials to achieve, economy and develop environment friendly solution to improve pavement strength performance.


Automatic Road Sign Recognition and Alerting on High Way
Authors:- Assistant Professor Rohith M.N, Assistant Professor Shilpa R V

Abstract:- This paper purposed a Road Sign Recognition system which can automatically detect and classified the traffic signs in traffic scene images acquired from a moving car and also alerting based on the recorded voice. It provides an additional level of driver assistance, leading to improved safety for passengers and vehicles. By alerting about the presence of road signs would reduce risks in situations of driving distraction, fatigue, poor sight and weather conditions. First it uses color based segmentation and then further refines the segments using two shape detection based techniques. A color description technique is used to extract the sign information from the segmented part which then finally classified by Neural network– which classify the detected patterns to known traffic signs using standard database the extracted shape and content features are utilized to train a Support Vector Machine polynomial Kernel which is later classified with the input candidate road sign shapes and contents respectively. An automatic voice alert system is also proposed such that a caution is given to the driven about the mandatory road signs that need to be followed and the new vehicle performance has been continuously improved and the study results relating to the safety of vehicle driving have also been continuously reported and demonstrated are also been discussed here.


A Study of Finite Element Analysis on Single Tube Fin Arrangement in Radiator
Authors:- D.Suresh, V. Vigneshwaran, K.Venkatachalam, R. Ashok Kumar, V.Raveendran

Abstract:- Automobiles mostly uses aluminum as a material for radiators fins as it is most economical, but copper has more thermal conductivity with higher performance rate. Hence our main objective in this project is to improve the heat transfer rate in fins by introducing a composite material based on aluminium with copper for the radiators. Finite element model thermal analysis is used for the purpose of studying. Varying shapes of the fins like straight, chamfer and round edges are used and are 3D modeled in CATIA Software and FEA analysis is done on ANSYS WORKBENCH software R15.0.


A Review on Wireless Sensor Networks, Internet of Things, and Their Challenges
Authors:- P.G. Scholar Narendra Kumar, Asst. Prof. Sriram Yadav, Hod. Avinash Sharma

Abstract:- Programmed framework and computerization is the prerequisite of the present innovation. So pushing toward computerization for quite a while. It is one of the tending subjects. Therefore in this research work an automatic electronic appliance on/off using PIR sensor will be provided. In this work, a design is proposed using PIR sensor for automation of lights and fans using Arduino with Internet of Things for smart homes. Now a days there are automation of every little electrical device in homes. Internet of Things is the physical thing embedded with sensors, software etc.., without human interaction and computer interaction transaction of data over a network; however, it scales up to include smart cities with connected sensors. Using PIR sensors, the lights will consequently turn on and off as indicated by the power of light.
The Internet of Things (IoT) is designed for the purpose of multi-hop transmission, collision- free transmission, and high energy efficiency in automated environments by the use of sensor nodes. Today the world deals with major problem in agriculture. The ongoing changes in atmosphere have expanded the significance of agriculture observing, making it a topical and very dynamic research region. This field depends on remote detecting and on remote sensor systems for social occasion information about the farming and post to client through IoT. This information can be refresh often to the cloud and client can screen soil dampness, Temperature, air parameter sensor like humidity. The correspondence of two agribusiness grounds can be imparted utilizing RF handset with 8 channels, 2Ghz specification. In this paper, we briefly study about wireless sensor network and internet of things and its protocols. The detail description of wireless sensor network includes its architecture, applications, etc. The internet of things has been defined architecture and protocols with its related applications. With the help of internet, the sensor can pass its collected information to the users.


Use of Blockchain for Secure E-voting
Authors:- Er. Zainab Mirza,Aalia Shaikh,Sameena Shaikh,Nagama Khalifa,Yasirammar Khan

Abstract:- Implementing a most secured technology based E-voting system which provides the high-level security and privacy to the voting system while still having the best features of current voting systems. In this paper, the technology suggested to be used for offering security is Blockchain. Blockchain is the driving force of the security and it will be used as a service to secure the and implement distributed E-voting systems. The paper addresses and talks about some of the limitations and drawbacks of current not-highly secured and easily tamperable voting systems. Like the case where pressing a button could sometimes send the vote to another unintentional party. The blockchain will help us improve security because of its immutable nature. Some of the various popular blockchain frameworks could be used like Etherium, Hyperledger, etc. In general, we use the blockchain to its full potential to maintain the integrity of the people rights and their votes and also thereby reducing the budget of conducting a voting nationwide.


Review Paper on Pumice for Removal of Turbidity and Total Dissolved Solids from Water
Authors:- UG Student Omkar A. Magar,UG Student Tushar A. Kale,UG Student Manadr S. Baporikar,UG Student Sujata A. Manale,Asst. Prof. Abhishek C. Shirle

Abstract:- Pumice stone is used in construction industries & biomedicine also. Pumice stone is scouring, scrubbing & polishing material available in powder form as well as pumice stone. From recent studies, it is conclude that pumice stone is used in water & wastewater treatment process. As per literature review it is seen that by using the adsorption property pumice stone we can remove Cadmium (Cd), dye & color many other pollutant like heavy metal (Co+2, Cu+2, Fe+2, Cd+2) and earth cations like (Na, K, Ca+2 Mg+2) .In other hand pumice stone has been used as filter media and biological treatment.


Extraction of Crop Cycle Parameter from Multi-Temporal Data
Authors:- Asst.Prof. Poonkodi. P,UG Scholar Keerthana. S,UG Scholar Monisha. S,UG Scholar Ramanan. N,Professor kalaikumaran.T

Abstract:- This work aims to point the simplest way to manage heterogeneous information and data coming from real datasets that collect physical, biological, and sensory values. As productive companies—public or private, large or small—need increasing profitability with costs reduction, discovering appropriate ways to require advantage of information that are continuously recorded and made available are often the proper choice to achieve these goals. The agricultural field is barely apparently refractory to the digital technology and also the “smart farm” model is increasingly widespread by exploiting the online of Things (IoT) paradigm applied to environmental and historical information through time-series. the most target of this study is that the look and deployment of practical tasks, ranging from crop harvest forecasting to missing or wrong sensors data reconstruction, exploiting and comparing various machine learning techniques to suggest toward which direction to use efforts and investments. The results show how there are ample margins for innovation while supporting requests and desires coming from companies that wish to use a sustainable and optimized agriculture industrial business, investing not only in technology, but also within the knowledge and in skilled workforce required to want the only out of it.


A Review Article of Round about Analysis at Bangalore (Bannerghatta Nice Road Junction) City
Authors:- M.Tech Scholar Ankur Bhatt, Assistant Professor Akshay Gulghane

Abstract:- The traffic clogs are the serious issue in any creating city. Bangalore (bannerghatta nice road junction) city being a creating city having traffic issue in a few crossing points that is the reason, Traffic Rotary at street convergences is unique type of level difference in paths to channelize development of vehicles a single way around a focal traffic island. With quick development of traffic it is encountered that enlarging of streets and giving flyovers have gotten basic to conquer significant clashes at crossing points, for example, impact among through and right turn developments. Along these lines, significant clashes are changed over into milder clashes like combining and wandering. The vehicles entering the turning are delicately compelled to move a clockwise way. They at that point weave out of the revolving to the ideal course.


Design and Deflection Analysis of Deck Slab using Staad Pro Software
Authors:- Rajendra Soni, Associate Professor Komal Bedi

Abstract:- Bridges are the lifelines and supporters for the improvisation of the road network. Not only do the bridges help in traffic flow without any interference but also maintain the safety of roads. Due to this reason the bridges design has gained much importance. This paper is basically concerned about the analysis and design of Deck Slab Bridge by STAAD Pro using IRC Loading. Which contains a span of 100m X 16m and has a 4-girder system? The objective is to check the result for particular input design, properties and parameters and the approach has been taken from IS standard design. We also compared of two different materials like as EPS and Steel in deck slab design. The output contains analysis results such as moments, axial forces, shear forces, deformations, Deflection and design results such as reinforcement detailing of bridge structure. From the research it can concluded that the analysis can be done for any span of bridge, grade of concrete and grade of rebar. Hence, this article may help the structural engineer to analyze and design EPS simple span bridges.


Public Opinion Poll Generation using Twitter and Machine Learning Algorithms
Authors:- Chelikani Satya Sankeerth,Sairam Sadu,Assistant Professor Choudari Lakshmi

Abstract:- Today we live in an information age where a lot of data is being generated each minute. Because of quick increment in the measure of client created information via web-based networking media platforms like Twitter, several opportunities and new open doors have been prompted for associations that try hard to keep a track on data. Twitter is an immensely fast emanant micro-blogging social networking platform for clients to communicate their perspectives about various aspects like governmental issues,products,movies,sports etc. Because of the vast opinion rich web asset such as twitter a lot analysis is focusing on the area of sentiment analysis. Individuals are attempting to build a system that can identify and classify opinion or sentiment as given as an electronic text. Sentiment Analysis can be seen as a field of text mining and natural language processing.Sentiment analysis is a process of consequently recognizing whether a client created content communicates positive or negative opinion about an element.A right strategy to predict sentiments could be utilized to separate sentiments from the web and predict online client’s preferences which may prove valuable for economic,market research and also for the government in different ways like keeping a track on customer reviews, government can get the public opinion on their policies easily and efficiently, it can also be used in election analysis and election prediction. Consequently, tweets can be utilized as a significant hotspot for mining public’s sentiment.


Emergency Response Application [ERA]
Authors:- Abhinav Tarhekar, Pratik Jadhao, Prashant Kumar, Pratigya Pal, Megha Kadam

Abstract:- In today’s world, people using smart phones have increased rapidly and hence, a smart phone can be used efficiently for personal security or various other protection purposes. The increasing of incident now-a-days have waken us to go for the safety issues and so a host of new apps have been developed to provide security systems to women and men via their phones. This paper presents Pola, an Android Application for the Safety of People and this app can be activated by a single click, whenever need arises. A single click on this app identifies the location of place through GPS and sends a message comprising this location to the nearby Police Station in that specified area where crime is being taking place. The unique feature of this application is to send the notification to the Police Station which are located in that same area and the notification don’t go away till it has been seen and open in the Pola. Continuous location tracking and will get updated in the app automatically till the location of the victim is found and can be rescued safely.


Real Time Protection for Power Line using OTP
Authors:- UG Student P.Priyadharshini,UG Student P.Swetha,UG Student S.Yageshwaran,Asst. Prof. B.Dhinesh

Abstract:- Safety is one of the primary objective of every humanlife. In order to enhance the safety measure of the line man this project i.e, Real time Protection for Power line using OTP provide solution. It save the life of line man who is working on the power line during repair. Real-time power line protection uses finger print verification and OTP based password generation. In normal, the power line is turned ON/OFF by using the lever, the updated version of this project is password based system. The password can be misused by some unauthorized person knowingly or unknowingly. In order to verify the accessing person, the fingerprint of that person is scanned using fingerprint scanner which provides the solution.


Camera based Home Automation System using OpenCV
Authors:- Arun Gaddam,Pranoti Solat,Revti Zade, Ritesh Kubde,Sakshi Tinkhede

Abstract:- In this project a design and implementation concept for a real-time good smart home automation system based on supported live streaming with digital or IP Webcam camera and OpenCV primarily based human detection algorithm using HOG by Arduino microcontroller board has been presented. The proposed automation system consists of three main hardware components: smart mobile phone which IP Webcam is installed in, laptop or PC to observe and detect the presence of human through IP Webcam and Arduino microcontroller board. The house appliances like light, fan, temperature system, etc. can be monitored, controlled and accessed mechanically or wirelessly by Arduino in response to any signals came from OpenCV algorithm. The human detection formula has been developed using python language with the library of OPenCV package of python. The algorithm used is based on Histogram of Oriented Gradients (HOG) algorithm. The proposed system is shown to be simple, cost effective, sensors free and flexible that produces smart home future.


Blind-Assist
Authors:- Parvathy Mohanakrishnan, Reshma P.G, Shabana Asmi K S, Assistant Professor Aswathy Wilson

Abstract:- The recent survey on the issues faced by the visually impaired suggested self-reliant movement in urban areas as challenge. It also becomes difficult for them to stay a track of their routine environments. So, we proposed a completely unique way of assisting the visually impaired to acknowledge e various objects and to detect obstacles. The system detects obstacle before of the person and also recognize them to assist aid a visually impaired person. This paper proposes an efficient system for both obstacle detection and beholding. We employ image-based recognition supported the visual information obtained from a pi-cam to detect objects. Ultrasonic sensors are accustomed aid the obstacle detection. Ultrasonic waves are emitted by the ultrasonic sensors to detect the presence of an obstacle and therefore the distance thereto. Raspberry pi is common medium for obstacle detection and beholding. Raspberry is connected to ultrasonic sensor via a breadboard and pi-cam is direct connected to Raspberry pi. Raspberry Pi is employed to implement artificial vision using python language on the OpenCV platform, presence of third-party modules, open source, extensive support libraries like characteristics of python adds advantages to the processing part. This paper proposed a modified YOLO algorithm in OpenCV using Python language and COCO dataset which has an additional module for obstacle detection. The camera captures the image of the item and extract the item alone by clearing off the encompassing. The image is them compared with the predefined dataset to spot the item particularly. The output information regarding the item are provided via a headset or ear-bone. Experimental analyses also are provided to match various methods and draw some meaningful conclusions. In obstacle detection, the presence of an obstacle is known via buzzer sound. The system is especially introduced by keeping in mind the most aspects and therefore the difficulties faced by the visually impaired in their day-to-day life.


Empathetic Technology in Workplace Environment
Authors:- Monica Gullapalli, Yadnyesh Mahadeshwar, Mitali Rathod,Ajay Sharma,Amol Dapkekar

Abstract:- Empathy and Technology going hand in hand is an unpredictable combination. We might think that we are capable of hiding our emotions, our internal conflicts, our constant battles but maybe we don’t and this technology is at its best foot forward to help us understand how our bodies react to situations either knowingly or unknowingly. People spend most of their lifetime in office cubicles and cabins thus falling prey to work pressure. Empathetic technology can help in reducing mental stress on employees thus increasing their productivity and efficiency that would in return help the progress of the company and the country in the long run.


Distribution of Microplastics in Estuarine Sediments along Tamilnadu Coast, Bay of Bengal, India
Authors:- A. H. Nabisa Begum, S. Sathish Kumar, K. Gopala Krishnan , M. Srinivasan

Abstract:- The occurrence and distribution of large plastic debris in the marine environment are well documented but up to now, only five studies including the Gulf of Cambay, India on the occurrence of plastic fragments have included true microplastics. In the east coast of India, there was no data for the occurrence and distribution of microplastics. Information on the distribution of microplastics in the Tamilnadu coastal environment is necessary to determine the extent of microplastic pollution input into the sea. This study aims to investigate the occurrence and distribution of microplastics in Tamilnadu coastal sediments collected from three estuarine regions.


Car Park Access Control System
Authors:- Vishva Methaniya, Jishnu Nair, Parth Patel, Ananthanarayanan R, Asst. Prof. Riddhi Mehta

Abstract:- This paper has demonstrated the idea of a programmed vehicle parking framework. Everything in the cutting-edge world is going programmed, we have fabricated a system which can consequently detect the vacant parking spaces through the entryway and after that show the number of vehicles in the parking lot. This computerized vehicle parking system lessens the time taken to check the space for vehicles by showing the accessible spaces for parking on an LCD display at the entry and exit. Using OpenCV we can detect the empty slot for parking. OCR reader is used for user registration by scanning the Smart ID verified and approved by the Govt. A QR code will be generated from this Smart ID and will be sent to the user for verification when he/she re-visit the parking lot.


Speed Detection Violation Deterrent
Authors:- keval Patel, Yash Patel, Hardik Patel, Prudhvi Krishna, Guide Janvi Patel

Abstract:- Road accidents have been very common in the present world with the prime cause being the careless driving. The necessity to check this has been very essential and different methods have been used so far. However, with the advancement in the technology, different governing bodies are demanding some sort of computerized technology to control this problem of over speed driving. At this scenario, we are proposing a system to detect the vehicle which are being driven above the given maximum speed limit that the respective roads limits. A complete violation detection system using python and TensorFlow.


Partial Replacement of Soil by Plastic Waste for Manufacturing of Bricks
Authors:- UG Student Rahil Rafiq Karbhari,UG Student Nilesh Ramlal Choudary,UG Student Saif Ali Yusuf Khan,UG Student Akshay Shantilal Palesha,Prof . Abhishek C Shirle

Abstract:- This paper outlines the use of plastic waste (PW) in construction industries. Utilizing PW as construction materials especially in production of bricks is one of a promising step towards a sustainable resources and waste management. Since the massive demand has been placed on artifact industry especially within the last decade due to the increasing population which causes a chronic shortage of building materials, the civil engineers are challenged to convert waste to useful building and construction material. Recycling of such waste as staple alternatives may contribute within the exhaustion of the natural resources; the conservation of non renewable resources; improvement of the population health and security preoccupation with environmental matters and reduction in waste disposal costs. This reviewed approach on brick making from waste is beneficial to supply potential and sustainable solutions.


A Review of Toll Plaza Density Optimization and Pollution Reduction in ITS
Authors:- M.Tech. Student Abhishek Ankushrao Chavan,M.Tech. Student Pratik kalidas Walke,Professor Dr. B. V. Khode

Abstract:- Interest in the intelligent transportation system comes from problems caused by traffic congestion and a synergy of new information technology for simulation real time and communications networks. Traffic congestion has been increasing worldwide as a result or increased motorization, urbanization, population growth and changes in population density. Congestion reduces efficiency or transportation infrastructure and increases travel time, air pollution and fuel consumption. Now a day’s development of roads has created a new havoc which lead to the increase in the accident cases all across the world, in order to over-come from such a problem, Intelligent Transport System holds a good point. Intelligent Transport System is designed for the urban/state/private road transport organization. The system consists of a backend and a hardware component to provide an integrated solution for the driver console unit, electronic ticking machine passenger information system amid vehicle tracking system. Intelligent Transport System provides a single solution for transport companies to schedule and monitor buses with the help of advance technologies such as GPS, Wi-Fi and GPRS. Intelligent Transport System facilitates better public transport services by considering the bus earning, public safety and security. This paper basically discusses the impact and the various application fields or Intelligent Transport System for road transportation. Also, this paper put forward the implementation or various transportation technologies that will be vital for homeland security, vehicular surveillance along with technologies that can make our ride more safe and economical.


A Review on Efficiency of Geo Grid in Road Pavement Construction
Authors:- M.Tech. Student Pratik Kalidas Walke,M.Tech. Student Abhishek Ankushrao Chavan,Professor Dr. B. V. Khode

Abstract:- Geosynthetics have grown in the civil industry in the past twenty years becoming key materials in the design of new roads and in maintenance programed. Geosynthetics are now widely used for strengthening of in situ soil, mechanical improvement of pavement layers from the subbase up to the asphalt wearing course using different type of geosynthetics, from geotextile to geogrids and geocomposite. Management of stormwater can be achieved using geocomposite for drainage instead of traditional gravel drainage. The paper will discuss the geosynthetic functions in pavements and their use in a pavement structure, highlighting advantages and disadvantages gained from literature and experience.


A Novel idea for monitoring the Performance of Data Extension Control Board for Textile Industry using Embedded Technology
Authors:- A.Gokulapriya, L.Moniga, K.Gokulnath, Associate Professor S.Kalpanadevi M.E.,( Ph.D.)

Abstract:- Textile Industry is one of the most complicated manufacturing industries due to its fragmented and heterogeneous nature mostly dominated by small and medium enterprises. Mostly in textile industry power looms are used which is having electronic jacquard for design printing. In electronic jacquard lot of electronic boards are used such as design inserting board, data extension control board, magnetic module etc…In the proposed idea performance of data extension control board is taken for analysis. Generally the purpose of data extension control board is to split the master data into 16 set of 8 bit serial data. In manufacturing phase, there exists an complication during the testing of data extension control board. During the testing period, the output of this board have the problems like absence of clock, data mismatching, bit storage problem and voltage level variation. Nowadays in the industry testing is done manually. Due to manual testing lot of quality issues araises from the consumer side. To overcome this problem a methodology is proposed to automate the testing of this board which also rectifies the problemof low efficiency and high error rate in manual testing.


Two Module Approach for Surveillance Robots for Better Reusability
Authors:- Vishal Khemnar, Ishan Pandita, Rahul Bhandari, Prof. Amol Dumbare

Abstract:- In the modern world, human life is considered very precious in almost all parts of the world. Pre-modernization this was not a common scenario. People had to risk their lives for menial tasks which are now handled by robots. Robots have replaced humans in many fields which can be either good or bad. Bad – people consider machines have made them jobless by replacing them. Good – machines can work in dangerous situations instead of humans so many lives are saved from being endangered.
Surveillance is one such scenario where many spies had to endanger their lives to get Intel on enemy forces. This task is handled mostly by a country’s intelligence agency and it is considered as one of the most important functions for that agency. Moving robots with a camera can be always better than stationery cameras which are easy to find and disable. Also, if the robot is streaming the live to the source, then even if the robot is found by enemies, the footage is safe at the receiver’s side. If the video is streamed over a wireless network then it is independent on internet availability. This project uses a Raspberry Pi Camera to capture the video and an Arduino UNO to control the motors to move the robot using a L293D H-bridge motor driver.


Spatial Distribution of Fire Service Stations and Service Area Coverage Analysis for Kaduna Metroplois
Authors:- Lugga M.S,Emakoji M.A

Abstract:- Fire is one of the most disturbing problems in urban areas, in Kaduna very large amount of property and lives are unfortunately destroyed by fire annually. GIS technology is a valuable tool in managing fire disaster. This research described the spatial distribution and service area coverage of fire service stations within Kaduna metropolis using GIS. Bing Satellite imagery of 5 meters resolution of the study area was processed and digitized. Handheld GPS was used to obtain locations of the fire service stations. Since response time to a fire incident from fire service station is crucial in managing fire disaster, the service area coverage analysis was used to determine the coverage area of each facility in 3, 5 and 10 minutes. The study shows the spatial distribution and attributes of the fire service stations within the metropolis and concluded by revealing the need for additional fire service stations since there are areas that cannot be accessed in 3 or 5 minutes from the fire service station, this will be able to service the entire metropolis in a maximum of five minutes drive time.


Smart Bin Using IOT for Smart Cities
Authors:- N. Ranjitha,C. Suruthipriya,S. Triveni,R. Deivanai

Abstract:- In past few decades there is a rapid growth in the rate of urbanization and thus there is a need of sustainable urban development plans. Now using new age technology and strategic approach, the concept of smart cities is coming up all around the world. A smart city is incomplete without a smart waste management system. This paper describes the application of our model of “Smart Bin” in managing the waste collection system of an entire city. The network of sensors enabled smart bins connected through the cellular network generates a large amount of data, which is further analyzed and visualized at real time to gain insights about the status of waste around the city. This paper also aims at encouraging further research in the topic of waste management.


Overview of Digital Marketing Services
Authors:- Happy Yadav, Hansraj Yadav, Nivedita Kumari

Abstract:- Understanding the concept of digital marketing and objective of the Internship are to understand the requirements of the client and developing the strategies according to the requirements to achieve the client’s objectives.


Importance of Industrial Training for Technical Student
Authors:- U.G. Student Bhushan, Hod. Dharampal Kataria, Yoginder Kumar Yadav

Abstract:- We all know that in engineering, there is a 4-month or 6-month industrial training program for engineering students. In this paper, we will talk about the importance of training and its benefits. The training program improves the trainee’s (students) ability of performance. They should also know about the new concept and technology. They should also prepare for new projects and learn to deal with critical situations at the industry level. Through this, they can also become a good leader in new projects in industries. In this paper we will share some experiences of trainees and their mentors, we will also see the difference between practical work in industry level and theory classes.


Review of Power System Stability Enhancement using Fact Controller
Authors:- Vidya Sagar Verma, Associate Professor Ritesh Diwan

Abstract:- The machine dynamics response to any impact in the system is oscillatory. In past, the size of power system is smaller; therefor the period of oscillation was not much greater than one second. Today large capacity of generator and system interconnected with the greater system inertias and relatively weaker ties results in longer period of oscillation followed by perturbation. These are the situations in which dynamic stability is concern. The enhancement of dynamic stability becomes very important for reliability and continuity of power system. Now power electronic based FACTS (Flexible AC Transmission system) devices are established to enhance the power transmitting capacity and also mitigation of oscillatory period of system at the time of fault. The case study of two area system is taken for analysis. Fault is created for observation of different parameter of machine and transmission system like rotor angle waveform, settling time, voltage of machine, active power of machine and transmission voltage. The different fault analysis says that FACTS controllers help to improve dynamic stability. Among all FACTS devices, UPFC(Unified Power Flow Controller) seen more suitable for enhancement of dynamic stability of two area and multi area system. MATLAB simulation is used to do analysis for different system.


Review Paper on Study on Process Parameters Influencing the V-Bending to Reduce the Spring Back Effect on Sheet Metal
Authors:- Aswath Kumar.U, Gowtham Ram.V, Hari Prasanth.S, Harshavardhana Murugavhel.M

Abstract:- This study, for the first time, experimentally investigates the factors affecting the spring back resulting from the bending of sheet metal materials in V-bending dies. The formability during the V-bending method was experimentally investigated by using sheet metal of thickness 3mm. The process parameters in the experimental studies were determined to be: holding time (0, 5 and 10 s), bending angle ((15^{circ } 60^{circ }, and (90^{circ })),die radius(5,8and 12.5 mm),and punch radius(5,8 and 12.5 mm). The experimental studies are made and the notes for the process parameters of the v bending are tabled.


Architecture of 8086 Microprocessor
Authors:- Akash Singh, Kishan Singh, Aniket Singh, Rahul Yadav

Abstract:- The commercial design engineers primarily studied the 4004, 8008 and 8080 microprocessors for the needs of building control circuits and consumer products until 1971 to 1975. The introduction of the superior 8-bit 8085 microprocessor in 1976 drew the eye of the academicians who were charmed at the architecture and functionality of this chip and that they shortly included it as a course within the curriculum. As a result, the necessity for 8085 microprocessor Learning/Training System was a real demand and Intel released the SDK-85 Learning Kit without detailed design documentation. In 1978, Intel introduced the 16-bit 8086 microprocessor, which also found its place as a typical course at the tutorial institutions. Intel introduced the SDK-86 Kit for 8086 but once again without any detailed design information. The SDKs helped people learning the 8085/8086 architecture and programming but not knowing the planning methodology of a microprocessor learning system. The planning techniques remained within the realm of business companies. What’s most astonishing thing about the massive success of the 8086, though, is how little people expected of it when it absolutely was first conceived. The history of this revolutionary processor could be a classic tale of what quantity a tiny low team of bright engineers can accomplish when they’re given the liberty to try and do their jobs in innovative ways.


Management of Wastewater in Sugarcane Industry
Authors:- Shrikrushna V. Wadodkar,Arun H. Shelke, Samadhan A. Waghmare,Rushikesh S. Ramteke,Gauri L. Patil

Abstract:- Wastewater from sugar industries is one that has complex characteristics and is considered a challenge for environmental engineers in terms of treatment as well as utilization. Before treatment and recycling, determination of physicochemical parameters is an important mechanism. The main aim of this study is to determine the physicochemical characteristics of sugar industry waste water by the standard method and minimize the fresh water consumption in sugar industry by new method/technique. The consumption of large volume of water and generation of organic compound is liquid effluent are major environmental problems in sugarcane processing industry.


The Space E-wastage Satellites are Rebuilt Process in Earth
Authors:- G.Pavithra, S.Shobana, S.Sushma, S.Thanapriya, Asst. Prof. R. Saravanan

Abstract:- The report aims at providing patentbased evidence on the available technologies and the patenting trends in the area ofelectronic waste (e-waste) recycling and material recovery waste, while it is intended to providebackground and supporting information to the Partnership for Action on Equipment under the Basel Convention and computing complement .a large number of satellites and spacecraft will be lifted and sent into orbital this year, and this will enhance our understanding of space and other phenomena on process in the earth that impacts us, including climate change, natural disasters, and agricultural patterns.
With increasing levels of autonomy, there will be a need for remote communication networks to enable communication between spacecraft. Future space missions are envisioned to become more complex and operate farther from Earth which will need to support autonomous operationsimplementing, Inter-satellite communications based on the Open System Interconnection (OSI) model.


Experimental Study on Bio Brick using Bacillus Pasteurii
Authors:- Asst. Prof. K.Priyanka,UG student S.Mohamed Uvais,UG student A.Salman Khan,UG student CK. Ali Murthaza,UG student S.Muhamed Ashir

Abstract:- This article mainly is focus on manufacturing of eco-friendly bricks using bacteria without undergoing natural process such as heating. It is necessary to induce calcium precipitate to convert clay into solid bricks .The bacteria that have been used in this process is a bacillus type of bacteria (Bacillus Pasteurii). Moreover, it supports the idea in this technology can lead to self-healing materials. Hence there was an increase in 4.29% of the bricks made of with cement and bacteria compared to the bricks made by using without cement and bacteria.


A Review Paper on Comparison of Cooling Pads for Evaporating Cooling Heat Exchanger
Authors:- Assistant Professor Naveen Prabhu,UG Scholar A. Dinesh,UG Scholar K. Gowtham,UG Scholar P. Harish Gowtham,UG Scholar V. Jayaprakash

Abstract:- This paper investigates the performance study of the different types of cooling pads made from agricultural waste. The usage of air conditioners and heaters in the buildings and working spaces should control the sensible heat to make comfort condition. Evaporative cooling is one of the energy efficient and eco-friendly air conditioning technologies. There are many advantages in evaporative cooling when compared to other cooling process due to their non- polluting nature. It is one of the suitable ways to cool a workplace or living place, because it uses fresh air to replaces the air time to time to maintain room temperature. Due to this process, air and some allergens are expelled out. It is based on the natural process of air cooling using normal water. However, evaporative cooling requires abundant water and is more efficient only when the relative humidity is low. Experimental and theoretical research works on feasibility studies; performance test and optimization are considered and then reviewed in detail.


Fire Suppression Systems for Vertical Structures and Cost-Effective Solutions
Authors:- Suhasini Pyarasani, P.E

Abstract:- The present study offers a detailed discussion on active fire protection solutions for storage buildings. These storages are to house only storage items while other building service such as water (except for fire suppression use), fuel, gas etc. are not permitted inside these storage facilities. These storages are usually connecting to other storage facilities.
A case study of such storage facility in Connecticut, USA is carried out. The technical and commercial aspects of different possible fire protection solutions are discussed. This paper presents different configurations such as tree systems, grid systems and loop systems, different pipe sizes and different pipe materials are evaluated to provide cost effective solutions for construction costs of fire suppression systems.


Voice Prescription using Augmented Reality
Authors:- UG Scholar Karthikeyan R,UG Scholar Pavithra S,UG Scholar Rajanandhini R,Asst. Prof. Renuga Devi G,Professor Kalaikumaran T

Abstract:- For patients, correct drug information is important. However, patients always do not possess or comprehend professional drug facts. Many drug recognition systems offer keyword searches based on drug names, which may vary from product to product. A more robust form of search would enable users to describe the features of drugs based on their appearance. In this paper we propose a medicine voice prescriber based on Augmented Reality. This is able to reduce drug identification errors as well provide more accurate drug information .It is also able to retrieve the similar drugs, enabling theuser to identify the specific one.


Smart Mirror using Raspberry PI
Authors:- Prachi.R.Handa,Shailesh kumar,A.Kamble,Suvarna.L.Pawar,Neha.A.Salunkhe

Abstract:- The project has a very broad scope covering some current popular topics in the IT sector such as the Internet of Things, Maker culture and home automation. The main idea of this project is to make a smart table which can display our schedule, events, mails, holidays, etc. Smart Mirror Table is one of the applications of Raspberry Pi. A computer screen embedded in mirror looks very futuristic. While looking at mirror you can look at various notifications from social sites as well news, weather forecast and more things. Such mirrors can be programmed to work as AI and control home appliances by voice input or touchscreen.


Experimental Studies of Silica Fume and Sisal Fibre on Performance of Concrete
Authors:- Asst. Prof. M.Sabarinathan,Asst. Prof. S.Mohanraj,Associate Professor V.Murugesh

Abstract:- The main objective of this project is to investigate effect of silica fume & fiber orientation of sisal fiber on performance of concrete ,which ultimately solve the problems of waste disposal & reduces global warming and increase the strength of concrete .India is a developing country, therefore Infrastructure development is necessary for our country and concrete plays a vital role in it. Concrete is the world’s largest consuming material in the construction field. The emission of carbon-dioxide (CO2) in the atmosphere from the operation and maintenance of structures as well as production of building materials can be reduced by using renewable resources and construction materials .Conventional concrete is relatively strong in compression but weak in tension, in order to overcome the weakness the use of a sufficient volume of certain fibers such as sisal fiber is used in this experiment, which is easily available, renewable and economical and enhance many of the mechanical characteristics of the basic materials such as fracture toughness, flexural strength and resistance to fatigue, impact, thermal shock and spalling .The study focuses on the compressive strength, split tensile strength, in 7, 14, and 28 days of curing containing different percentage of sisal fiber and silica as a partial replacement of OPC. The cement in concrete is replaced accordingly with the percentage of 0%, 10 %, and 20% by volume and 0%,1% , 1.5% and 2% of sisal fiber is added by weight of cement. Finally, the strength performance of silica blended fiber reinforced concrete is compared with the performance of conventional concrete.


Smart Crop Irrigation System using IOT and Detection of Leaf Diseases
Authors:- Asst. Prof. Vinoth G, Vignesh K, Vijay P, Lingesh Kumar C

Abstract:- Agriculture plays an vital role within the development of agricultural country like India, China. That can issues the concerning agriculture are always hindering the event of the country like India. The solution of this problem is sensible agriculture by modernizing the present the traditional methods of agriculture using IoT. Hence the proposed ideas to creating the agriculture smart using automation and IoT to detect the plant leaf diseases using various mobile applications. Internet of Things (IoT) enables the various applications like crop monitoring and selection of irrigation time, irrigation decision support and also uses the fertilizer, analysis and update the data in certain report in thinkspeak ad also detect the leaf diseases etc. A Raspberry Pi is predicated to use the automatic irrigation of IoT system is proposed to modernization and improves production of the crop and growth, which main aim of this proposed crop development on low quantity of water consumption, so we can focus the water available to the plants at the specified time for concern level, to avoid the most of the farmers time within their fields. The management of water should be developed, therefore the system complexity be reduced. The proposed system developed the report which sent from the sensors and estimate the water level needed for the soil to concern on the time. The main target of this work is to implement image analysis & classification techniques for detection of leaf diseases. The two sensors are get the info of the humidity and temperature of the soil, duration the sunshine. The systems support the values and calculate the water quantity for irrigation is required for the crop. The main advantage of the system is implementing of Precision Agriculture (PA) with an cloud computing on thinkspeak, which optimize the water scarcity on during summer. The Raspberry-Pi 3 B model and cloud based IoT system obtain the data from crop field. The system mainly focuses the moisture various correlate with temperature changes data by using smart sensors and controls irrigation systems on the field.


Application Development for Stock Maintenance and Billing System
Authors:- Atusha Nahatkar,Ashutosh Parate,Harshal Chauke,Piyush Shirsat,Vaishnavi
Choudhary,M.S.Chaudhari

Abstract:- This paper presents an Inventory Management System designed in Python language. Managing stock is very difficult in supply chain management, that’s why companies should have inventories to maintain the stock. It helps to avoid overstocks, counts the quantity of inventories, finds out the demand. As it becomes really difficult to search the products manually from warehouses because for detailed searching it requires a lot of efforts. To avoid all these problems inventory management is very important because it maintains the stocks and goods and finds out which product is available.Meanwhile, it makes the billing system easier as well. Inventory management system is playing a very significant key role in the supply chain management.


Cyber-Security for Digital Well-Being
Authors:- Assistant Professor Kumkum Saxena, Manav Vikas Bahl (S.E, I.T, Student)

Abstract:- With the advancement in technology, there has been an increasing urgency and need for security with the rising practices taking place unethically. The technology works as a boon only when users are up-to-date with the updates and the people who lack this quality are often a target to various attacks in the cyber world leading to misuse of data and financial scams. Cyber-security takes the limelight in such cases to avoid these unfortunate events which lead to damage over individuals, business and the world at large. This review paper addresses the various cyber-attacks that exist and go unnoticed to a daily user. It also throws light over the procedures of execution of such malpractices and conveys precautionary and effective ways to avoid these cyber attacks.


Link Utilization for IOT Quality of Service using Hybrid swarm in Wireless Sensor Networks
Authors:- Ubaid Yaseen Wani, Abhinay Singh

Abstract:- The wireless sensor networks (WSN) that find its use in various applications of internet of things(IOT) have been regarded as the norm of today’s world. The wireless sensor networks (WSN) as its name suggests have nodes or sensory nodes that have limited energy for operation, because of their limited battery life and their use in certain unreachable places and hence they have been termed as energy-constrained devices.In order to overcome such restrictions it is need of hour to develop such approach whose focus must be on power optimization by using cross-layer coding and also in turn maintaining the quality of service in data trafficking. The data communication with a high level of accuracy in a wireless sensor network has been required, in order to achieve it, it is a necessary condition to have optimal coding which helps us in achieving a maximum level of intelligence with minimum computation. In order to achieve this we have developed a technique based on particle swarm optimization (PSO),which helps in bettering the link parameters that consists of bit error rate (BER), loss, energy and signal to noise ratio (SNR) and side by side restrains, the utilization of energy by wireless nodes. The infrastructure which has been obtained by this, will consist of a low number of sensors, have low cost, can be deployed fastly, having long lifetime, along with low maintenance, and also have high quality of service (QOS). The method used by us has been tested on two channels like additive white gaussian noise channel (AWGN) and rayleigh channel, that shows better quality of service and hence also improves the utilization of link up to a great extent.


Placement Prediction System using Machine Learning
Authors:- Aaliya Perveen Ansar Javeed Akhter

Abstract:- Every student wants a perfect job and every student has their own dream company. But practically it is not possible for everyone to get into their dream company. The reason behind is that students lack knowledge regarding company placement criteria. To solve this issue this paper represents a placement prediction system with the help of Machine learning, in which we have used a support vector algorithm. We will generate one Google form which contains all students performance like there higher secondary marks diploma score communication skills, area of interest and most imp there dream job on that basis we will provide them necessary guidance to achieve their goal we will track there result each year , also their technical interest and will inform them how much efforts they need to take to achieve their dream job. Even if they miss their dream job due to company criteria our proposed algorithm will develop new data where we can suggest another alternation to students according to their achievements , their skills and also give guidelines at every phase.. Hence the future scope and relevance of the system will be discussed.


Design and Development of Fuzzy Based Inverter Controller for Solar/Battery Hybrid Power System
Authors:-Professor Dr.P.Rajendran, Associate Professor S.Kalpanadevi, UG Student K.Radha

Abstract:- In this paper fuzzy PWM based inverter controller is developed for solar-battery hybrid system. Here fuzzy logic controller is developed for the optimum selection of switching angles for harmonic mitigation in proposed cascaded multi level inverter. These inverters are highly recommended for high power application in the past few years. In order to reduce the harmonic distortion and to improve the RMS value in the inverter output voltage the proposed method is recommended. Here the fuzzy PWM control circuit is used for cascaded multi level inverters which generate the triggering control pulses for switches using sinusoidal pulse width modulation (SPWM). Input variables of FLC are error in voltage and output variable as amplitude of reference sine wave. Rule base generated for FLC control the amplitude of PWM Sine wave with respect to error voltage. Here super capacitors are used for charging and discharging applications instead of battery. The inverter output voltage generated in this proposed method reveals fuzzy PWM controller provides output with minimum distortion and better RMS output. The proposed method is simulated using MATLAB / SIMULINK.


E-Smart Health Prediction System using Datamining Tools
Authors:-Professor Dr. Bindu Garg, Aamir Hafiez, Shalini, Mayank Kumar

Abstract:- This project focuses on medicinal field, educational field, research field and various aspects of human’s physical and mental well-being. Due to the advancement of technology all over the world, availability of computers and digital data is in abundance. This data can be used for various purposes to deal with the modern medical problems because such data is not just collected from a single individual rather by a huge data set of individuals. But there is no need to deal with such a huge amount of data at a single time rather only a part of data is actually required for a certain use. Hence the main objective is to use data mining tools to predict an accurate result that can help to improve various aspects of Clinical Predictions which in turn will help society and doctors to get an automated tool to easily predict the disease. The major objective of this paper is to evaluate data mining tools and techniques in medical field to develop an accurate disease predicting application. Data mining is a totally new and advanced field of Computer Science and Engineering which focuses on large data to extract only useful data sets. It is a process of discovering patterns in large data sets involving techniques of Database systems, artificial intelligence, machine learning and statistics. Its overall goal is to extract information with intelligent methods. Thus with the help of data mining an intelligent software can be developed which will be helpful for all the society members.


Analysis of Generic Flexible Manufacturing Systems
Authors:-Research Scholar Yedulla Anil Reddy, Registrar & Professor Dr. G. R. Selokar (Supervision)

Abstract:- A regular Flexible Manufacturing System (FMS) has been considered under Planning Design and Control (PDC) methodologies. The central target is to test the effect of structure technique (steering adaptability) on system execution under arranging methodology (interchange system burden condition) with control methodologies (sequencing and dispatching rules).
A PC reenactment model is created to assess the impacts of previously mentioned procedures eager for advancement range time, which is taken as the system execution measure. Most limited Processing Time (SPT), Maximum Balance Processing Time (MBPT)are the sequencing rules for choosing the part from the info support while for machine determination the dispatching guidelines are Minimum Number of parts in the Queue (MINQ), and Minimum line with
Minimum Waiting Time of all parts in the Queue (MQMWT).


Evaluation of Generic Flexible Manufacturing Systems
Authors:-Research Scholar Yedulla Anil Reddy, Registrar & Professor Dr. G. R. Selokar (Supervision)

Abstract:- A regular Flexible Manufacturing System (FMS) has been considered under Planning Design and Control (PDC) methodologies. The central target is to test the effect of structure technique (steering adaptability) on system execution under arranging methodology (interchange system burden condition) with control methodologies (sequencing and dispatching rules). A PC reenactment model is created to assess the impacts of previously mentioned procedures eager for advancement range time, which is taken as the system execution measure. Most limited Processing Time (SPT).
These heap conditions are Full Balanced Load (FBL), Balanced Machine Load and Unbalanced Processing Time (BMLUPT), Unbalanced Machine Load and Balanced Processing Time (UMLBPT) and Unbalanced Load (UBL) concerning machine burden and handling time. The aftereffect of the reproduction demonstrates that there is ceaseless decrease in make-range with increment in steering adaptability when both machine burden and handling times are unequal i.e., under UBL system condition.


E-Furnishing using Augmented Reality
Authors:-Er. Swati Ganar, Adnan Dahodwala , Mansoor Bagwala, Tahir Kadiwala

Abstract:- Our Approach seeks to support interaction with real-world so, to ensure the best place position, model and colour for an object into a real-world. By contrast, Augmentation is conventionally in real- time and in semantic context with environmental elements The disadvantage of the existing system was to use markers closer to users in order to generate good results otherwise the system suffers performance degradation. Therefore, the proposed system will try to achieve an Augmented Reality with an instant marker, which will eventually reduce the burden of carrying the marker each and every time closer to objects.


Production of Biosweetner from Stevia Rebaudiana and Feasibility of Incorporating it in Fruit Juice
Authors:-Assistant Professor Gowthami S, Professor Baskar R

Abstract:- Biosweetner, a sugar substitute was extracted from the leaves of the plant species Stevia rebaudiana. Stevia leaves naturally contain a complex mixture of eight sweet diterpene glycosides including stevioside, steviolbioside, rebaudioside (A, B, C, D, E) and dulcoside. The main constituents present were glycosides such as stevioside, steviol and rebaudioside A and B. Fresh Stevia leaves contain a large amount of water 85%. Stevia leaves and steams having several nutritional components such as vitamins, carotenoids, flavonoids, anthocyanin and other phenolic compounds. Stevia is a flavor enhancer and it is 300 times sweeter than sucrose. Stevia is non calorie sweetener. It is stable on low pH. Stevioside can be used as medicine for treating diabetes patients, fighting obesity, preventing tooth decay, preventing throat cancer. Stevia attract to people on carbohydrate-controlled diets. Stevia leaves are dried and powdered by mills. Powdered stevia leaves extracted with different techniques and water as using solvent because it not produce harmful effect to products. Ultrasound assisted extraction condition: temperature 30 to 50 ̊C, time 10 to 30 mins. Microwave assisted extraction condition: power 240 W, time 2 mins. Stevia extract collected and analysis for nutritional values. Glycosides level analysis by HPLC method in hydrophilic column. Crystals of Stevia extract were obtained using evaporative cooling technique. The stevia extract or crystals can be incorporated into the food products like cake, biscuits, soft drinks, and Milk products. In this study stevia extract incorporate in fruit juice.


IOT Based Smart Parking using Fastag
Authors:-Asst. Prof. Kirubhakaran T, Sabarish K, Nishanth K S, Nithish Kumar S

Abstract:- In fast growing world the trends and technologies had been improved a lot. In that population also plays a important role, in this India is the second growing population in the world ranking status. In India one family requires two vehicles that had become a paramount of their life, here traffic congestion became major issue and so parking space are low and that has less requirement for the emptors. For this we consent an IoT that every work today had been done through internet. So that only solution is the smart parking based IoT. Smart parking is a good idea of how the Internet-of-Things (IoT) will be pervasively deployed in our daily living environments to different users, hence the proposed idea is to make the parking easier by detecting and monitoring, security, locate and reserve parking lot using IoT then display the result. An Arduino Mega is based on the automatic control of parking system by using codes. The main aim is to reduce the traffic congestion and to make the parking easier with low and efficient technology. In order to focus on the parking by reducing traffic congestion with less time requirement. The proposal of the smart parking system is that gain information of parking area and book the parking lot and tag by using webpage. In that particular parking area, the sensor detects the vehicles the information given to the main gate of the parking lot and then display in the LCD and tag is read byRFID Tag reader. So that particular car is checked and parked in the particular lot. The Node MCU is used for the purpose to build an IoT product and allows the simple and powerful program in WIFI module with the Arduino IDE software. The main advantage is that reduces time for parking the vehicle, cost efficient and security control.


Fire Detection System using Video Surveillence Based on Facenet
Authors:-Dr. V. Subedha, G.Akash, N.Lokesh,P.Sasikumar

Abstract:- An accidental fire is a mishap that could be either man-made or natural. Accidental fire occurs frequently and can be controlled but may at times result in severe loss of life and property. Fire detection using hand-crafted features is a tedious and time-consuming method. The accuracy of the existing system using Alex net is 78% to 92%.The Project main idea is to detect the fire as soon as possible .The main concept used in the project is facenet pertained model. It is recognition technique to detect the fire on the surroundings. It uses smaller convolutional kernels and contains no dense, fully connected layers, which helps keep the computational requirements to a minimum. Despite its low computational needs, the experimental results demonstrate that our proposed solution accuracies that are comparable to other, more complex models, mainly due to its increased depth. The embedded processing capabilities of smart cameras have given rise to intelligent CCTV surveillance systems. Fire is the most dangerous abnormal event, as failing to control it at an early stage can result in huge disasters, leading to human, ecological and economic losses. Inspired by the great potential of CNNs, propose a lightweight CNN based on the SqueezeNet architecture for fire detection in CCTV surveillance networks. A Project approach can both localize fire and identify the object under surveillance. The accuracy of the system using Facenet is 98%.


Comparative Analysis of Session Features in Session Hijacking and Performance Improvement using OTC
Authors:-Niki Modi

Abstract:- Many web applications are vulnerable to session hijacking attacks due to the insecure use of cookies for session management. The most recommended defense against this threat is to completely replace HTTP with HTTPS. However, this approach presents several challenges (e.g., performance and compatibility concerns) and therefore, has not been widely adopted. In this paper, we propose “One-Time Cookies” (OTC), an HTTP session authentication protocol for improving session hijacking features, easy to deploy and resistant to session hijacking. OTC’s security relies on the use of disposable credentials based on a modified hash chain construction. Our experiments demonstrate the ability to maintain session integrity with a throughput improvement over HTTPS and a performance approximately similar to a cookie-based approach. In so doing, we demonstrate that one-time cookies can significantly improve the security of web sessions with minimal changes to current infrastructure.


Water Spider Monkey Optimization Algorithm for Trust-based MANET Secure
Routing in IoT

Authors:-Sunita Nandgave-Usturge,Dr. T Pavankumar

Abstract:- In Mobile Ad-hoc Network all nodes are moving continuously. Due to dynamic topology routing in MANET is challenging. Nodes are resource constraint so difficult to employ security solutions. Proposed security scheme has two phases, first phase is bi-filtering and other phase is routing. In bi-filtering phase different parameters are used such as direct trust, indirect trust, and historical trust etc. in identifying a secured node. Thus in bi-filtering phase important nodes are filter out for communication. The trust of the nodes evaluated and only the nodes with high trust factor involved in the secure communication using optimization, after identification of secure nodes in next phase routing is done by proposed hybrid optimization algorithm namely, Water Spider Monkey Optimization (WSMO). WSMO, which again finds the better path based on the trust and other factors, like distance, delay, and the overhead parameters so that the security will be further enhanced. This paper addresses a new optimization will be developed based on the WWO and SMO so that the routing in MANET shall be done for which the fitness will be the security factors of the nodes in the network.


Development and Evaluation of Spinach Extarct OAT Flakes
Authors:-Asst.Prof. Neethu C.S ,Sneha Vasudevan Nair,Arundhathy Shabu,K.S Gokul Raj,Shinaz Mehaboob,Meljo Paul,Aiswarya Pani

Abstract:- Oat is well famed for being abundantly nutritious and possessing a wide range of health benefits including decrease in cholesterol levels, improvement of blood sugar control and significant weight reduction. This is primarily because of high concentration of soluble fibers present in oats, mostly a fiber called beta – glucan as well as insoluble fibers such as lignin, cellulose, and hemicellulose. One such product that can be developed is oat flakes which can be made from powdered oat with appropriate proportion of spinach extract, subsequent baking and shaping into flakes. Consumption of spinach enhances eye health, reduce oxidative stress, restores energy, and lower blood pressure levels. The Phytochemicals present in spinach is responsible for anti-inflammatory and anti-cancerous properties. A breakfast cereal meal comprising oat and spinach extract will be an exceptional wholesome food duo for people of all ages and with addition of various flavoring compounds like cocoa to the flakes, it can be made appealing to the adults as well as the children. In this study sensory, nutritional analysis and microbiological property of developed products was investigated. We have emphasized the utmost utilization of nutritive potential of oats and spinach in this developed product.


A Review Article of Partial Discharge Analysis of HV Transformer
Authors:-Neha Sahu (M.E.), Associate Professor Arun Pachori

Abstract:- Electrical networks of power transmission practically deals in the bulk transfer of electrical energy, from generating stations situated many kilometers away from the main consumption centers or the cities. For this reason the long distance transmission cables are of utmost necessity for effective power transfer, which in-evidently results in huge losses across the system. The Reliable electrical network is one that transports the energy with minimal power losses, losses partial discharge effect represent one of causes that hinder reaching this performance in HV lines are either permanent mode or in the transient mode. In this Works we present the phenomenon of partial discharge and its behavior in different climatic and atmospheric conditions such as rain, humidity, the dust, the sand, dry weather of the one part and over-voltages induced by strokes lightning. We deal in this paper, the influence of the partial discharge under these different conditions on the power losses in the power lines and the proposal of a new model of three-phase line with transient partial discharge.


Solar Operated Triple Discharge pump using Epicyclic Gear Train
Authors:-Lecturer Ashish Kamble,Hod Vijay kale Ritik Rahangdale,Omprakash Jha,Vishal Rode,Bhushan Choudhary

Abstract:- In many industrial applications it is required to drive the actuators, hydraulic cylinder or hydraulic motors at variable speed this is only possible by variable discharge from One method employed is to use a pump of higher discharge capacity, but higher capacity means higher cost and higher power consumption hence there is need of special pump system at low cost so that the requirement of variable discharge is met easily with out much cost and setup. This project deals with the design of such pump systems and its calculations. Providing clean, environmentally safe livestock in sufficient Quantities continues to be a major concern for industries. A solar powered Oil pumping system designed for actuators, hydraulic cylinder or hydraulic motors was operated to determine the performance and reliability of the system and components. The system began pumping oil when the solar radiation intensity exceeded. Flow increased linearly with radiation intensity and reached a maximum flow of intensity. Maximum flow was dependent on using the correct controller adjustment as well as the radiation intensity. Solar oil pumping system operates on direct current. The output of solar Power system varies through out the day and with changes in weather conditions. Photovoltaic module, the power source for solar pumping, have no moving parts ,requires no maintenance and last for decades. A properly designed solar pumping system will be efficient, simple and reliable. Solar powered pumping systems are used principally for three applications in industry, water supply, live stock watering and irrigation.


A Review on Suspicious Attack Detection
Authors:-Ranu Dilware, Asst.Prof. Dr Dev Kumar Rai, Dr. Akhilesh Upadhyay

Abstract:- Wireless Sensor Networks (WSN) is a drifting innovation inside the present time and contains a major choice of utilizations, for example, front line observation, traffic reconnaissance, woodland fire recognition, flood location and so forth. A few scientists have led very surprising location strategies and calculations to proposed contrasting sorts of discovery plans. Wireless sensor end up being such a lot of common in numerous fields in view of its handiness in military, current region and so on. The blackhole nodes will dispatch blackhole attack to save its asset or to perform attack that decrease the system. Right now, the current arrangements and talk about the best in class steering strategies. This paper audits the current condition of workmanship strategies to identify the blackhole attack in Wireless Sensor Networks.


Non-Linear Performance of Multi-Storey Flat Slab System with Structural Wall and Perimeter Frames
Authors:-PG Student Shanmugapriya C, Asst. Professor Nithyambigai G

Abstract:- Flat slab system is the most desirable system in the construction of concrete structures due to its added advantages like faster construction, cost effective, clear floor to floor height, larger utilization space by nourishing architectural and MEP intent. Even though the Flat slab system is a proven gravity floor system, it was a most susceptible floor system owing to the nonappearance of lateral load resisting moment frames. Flat slab system in combination with structural wall and perimeter frames offers a stable structural system showing greater response to seismic ground motion. The structural walls often commonly referred as shear wall will possess greater lateral stiffness due to its large in-plane stiffness and strength. In this study a 10 storey commercial building located in Seismic zone – III, comprises of flat slab with a structural wall and perimeter frames are considered for linear analysis and non-linear analysis using FEA software known as ETABS. The model was subjected initially with linear static and dynamic analysis based on the latest provisions practiced by IS 1893:2016 and the structural response like natural time period, base shear, displacement, Lateral drift, storey-drift and slab-column shear capacity will be studied and designed based on Indian codal recommendations. Later the Non-Linear static analysis (NLSA) is performed with respect to the maximum displacement and Non-linear Time-history analysis is performed with Fast Non-Linear Analysis (FNA) method. Corresponding building performance point, structural performance level and the failure behavior of the structural component is observed. From the observation the ultimate performance of the flat-slab structural system is endorsed with respect to the Indian codal provisions.


Devolopement of Geopolyer Concrete by using Different Ingredient at Ambient Temprature
Authors:-Lecturer Shveta A. Bandabe , Omkar P.Patil , Koustubh B. Waingankar, Yash S. Patne, Prof. S.S.Patil

Abstract:- Concrete is the most important aspect in present scenario. All the construction is being done with the help of this binding material. Use of cement is rising on the peak from the last few decades due to enormous demand of construction of mega structures. In addition to that cement is the only material whose demand is increasing day by day in order to meet the needs of mankind. Subsequently the price of cement is also increasing as its demand is increasing profoundly and also it available limited only. Manufacturing of cement results in emission of CO2 and other gases which contribute in global warming and which further contribute in climate change and thus it is one of the most complicated material. Its use cannot stopped but can be limited by using various materials. Compressive strength and water absorption tests were carried out after consequent 7, 28 days respectively.


Digital Voting System using Blockchain Technology
Authors:-S.Kayalvili, P.Keerthana, P.Manickam, G.Archana

Abstract:- Traditional voting systems should be computerized to cut back the vote counting time, to supply evidence that a vote is being correctly accounted, to cut back fraud, remove errors in filling out ballots, to enhance system usability for people with special needs. E-voting increasingly replacing traditional paper based systems. This raises several security issues, providing democratic principles depend upon the electoral process’s integrity. An electronic voting system must make sure the voter’s authenticity, anonymity. It must also ensure audit ability in an exceedingly software or hardware environment that would malfunction. During this System the fingerprints of all voters and details are stored before the election. The voters must register their fingerprints on the day of election through online. This can be compared with the already stored prints. If both matches their votes are be taken in to the account and if not their vote will be discarded. So, nobody one can vote for others this can reduce the illegal votes. User can view all the nominees in their district with their corresponding party symbols. They can also view what percentage votes are registered before they are visiting register their votes, this might be useful to understand the leading result.


Study on Flowable Concrete from Marsh Cone Test
Authors:-Asst. Prof. R.Vinodhkumar, Asst. Prof. P.Vinodhkumar, Asst. Prof. E.Senthil Kumar

Abstract:- In order to satisfy various performance requirements of concrete, admixtures are being used in concrete. The active constituent of concrete is cement paste and largely it determines the performance of concrete. Thus the compatibility of superplasticizer on both Portland Pozzolana Cement and Ordinary Portland cement is studied by performing Marsh Cone Test. Thus the optimum dosage of the superplasticizer is found. The water cement ratio was varied from 0.6 to 0.35 and the amount of admixtures i.e. the super-plasticizers are varied from 0 to 2%, to make a comparative analysis on the effect of admixture.


Multi-Model Attribute Generator (MAG). A Deep Learning Method for Attribute Label Generation for Images
Authors:-Matthew Charles Millar

Abstract:- This paper looks to create a system that will allow for accurate automatic generation of labels for image data of people designed explicitly for ReID problems. There is a lack of research on attribute data generation for images, especially in ReID datasets. Most attribute data are hand-generated and not created from a network. This approach is labor-intensive and prone to errors as well as costly and time-consuming. This paper utilizes a unique method of multiple models to generated separate portions of the attributes for each image. The combination of multiple models allows for a highly accurate method for labels for attributes to be generated. The MAG system has shown to be accurate for particular attribute generation. Gender, Upper-body clothing type, and Object detection are incredibly accurate. While, the other attribute each has outstanding accuracy, just not to the same level as the top three models.


Footstep Electricity Generation by Using Piezoelectric Sensor

Authors:-Aditya Chauhan, Abhishek Vashishtha, Adil Rayees Ansari, Akshat Joshi, Ankit Meena

Abstract:- Human civilizations have been using electricity since last 18th century according to the pace of invention of equipment and later industrialization gave the boom to extent of its use. The aim of this paper is to present a suitable method which can employ the waste energy i.e. energy which is being lost due to human locomotion to produce electricity using piezoelectric sensor (PES). While observing the large energy demands in highly populated countries like INDIA,CHINA,AMERICA energy generation through the non-conventional source is of prime concern .Piezoelectric sensor are used so that the human locomotion energy is concentrated and confined to use according to the demand. The energy stored can easily be used for domestic application.
This framework being used at public places such as platforms, footpath, temples, ticket counter can proved to be of great significance for the mankind and also the mother nature as this method of electricity does not required any fossil fuel .
Our innovation can be made industrially relevant particularly in remote area where it is uneconomical to transmit electricity by traditional means.


Smart Charging Station
Authors:-Asst. Prof. G.Vinoth, Asst. Prof. S. Mohammed Harris, UG Scholar M.K.Reshmashree, UG Scholar G.Thamarai selvi, UG Scholar N.Jeevitha

Abstract:- Solar energy refers to capturing the energy from the sun and subsequently converting it into electricity. We can use that electricity to light up the street, homes and business and power our machines as well. Solar energy is today used in number of ways; as heat for making hot water, cooking and generate the electricity with solar cells or heat engines and to take salt away from the sea water. Electric vehicle is one which is operated by electric energy, instead of internal combustion engines or gases for power. Electric vehicle is used in order to avoid the ozone depletion, global warming, and depletion of fuel and mainly to avoid pollution. PV (Photovoltaic) systems are one of the abundant renewable energy to produce electricity, green, pure and source of energy where power is generated from sunlight converting into electricity by the use of PV solar cell. Here we are developing a solar based coin charging station for electrical vehicles and overcome the disadvantage like charging method and cost. This type of system can use at public places like Bus station, Railway station and also rural areas. This station primarily used for charging the EV and secondarily for charging the electronic devices like phone, laptop, batteries.,etc.


Nigeria Construction Industry Leadership Style and Adaptability Effectiveness: A Case of Civil Engineers
Authors:-Idiata, D.J ,Ehigiamusoe, B.U , Osagie, E.K

Abstract:- The construction industry is an industry that affords various professionals to work together is delivering a project on time, within cost and at the best quality, in other to achieve this leadership plays a critical role in the overall success. This study focuses on the use of Hersey and Blanchard’s Situational Leadership Model which are telling, selling, participating and delegating styles to assess the type and style of leadership predominant among civil engineers in the Nigerian construction industry. From the study it is observed that among civil engineers the most popular leadership style is the selling type with 72 percent and the next is the telling style with 20 per cent and the most unpopular of the styles is delegating with no one subscribing to this type. The selling leadership style is when the leader directs and closely supervises task accomplishment, but also explains decisions, solicits suggestions and supports progress. This style of leadership tends to promote interaction and communication between the leader and the led fostering team work and understanding.


Under Water and Underexposed Image Enhancement via Image Reduce Hazing Algorithm
Authors:-Dr. V. Subedha, M. Purushothaman, R.Tinakar, S.Sunaichandran

Abstract:- Underwater and Underexposed image processing is an intelligence research field that has great potential to help developers better explores the underwater environment. Underwater image processing has been used in a good kind of fields, like underwater microscopic detection, terrain scanning, mine detection, telecommunication cables, and autonomous underwater vehicles. However, underwater imagery suffers from strong absorption, scattering, color distortion, and noise from the artificial light sources, causing image blur, haziness, and a bluish or greenish tone. The large quantities of suspended particles in atmosphere cause scattering of light before it reaches the camera which corrupts the outdoor image quality. It is an annoying problem to photographers as it changes the colors and reduces the contrast of daily photos. Therefore, the proposed system removes the haze and enhances the input image. The enhancement can be divided into 2 methods, underwater image de-hazing and underexposed image color restoration. This Project presents the reason for underexposed image degradation, surveys the state of the art intelligence algorithms like image reduce hazing algorithm. The proposed algorithm uses two different de-hazing Dark Channel Prior (DCP) methods, Simple DCP and Approx DCP to reduce haze in an image. The de-hazing algorithms in imreduce-haze estimates the atmospheric light using a dark channel prior, Estimates the transmission map, Refine the estimated map, Restore the image and Performs optimal contrast.


Innovations in the Sphere of Ventilators—Arsenal to Fight COVID-19
Authors:-Soniya Gupta

Abstract:- The predicament arising with the COVID-19 pandemic has ravaged fragile healthcare systems across the globe. A sudden surge in medical equipment presents many issues, including a shortage of PPE and trained staff, but one issue that is particularly relevant for battling the current situation is the lack of ventilators to properly care for a patient. This acute shortage of ventilators and respiratory equipment has unleashed a wave of innovations at the product, process and organization level. The report aims to present the phenomenal acceleration in innovation across the manufacturing and healthcare sector for the development and well as use of ventilators post coronavirus crisis. This concise review presents an analysis for the innovational developments and past impediments to these technological advancements.


Automatic Letter Writing Machine
Authors:-Dean of academic, Prof. Dr. Ir Asokrajkumar.m, Ranganathan.C, Sathiyaraj.R, Siva. A , Srinivasan.R

Abstract:- In this project “AUTOMATIC LETTER WRITING MACHINE” for accurate building drawing. The main components are Arduino controller, pen writer, Stepper motors, Servo motor, motor drivers and Transformer. This whole system is working based on source codes. Drawing perfect sketch by hand can now be done by machines too. Here we propose an automated image sketching machine that sketches drawings similar to a copy of art /letter but with a lot more accuracy. The proposed system makes use of an Arduino based circuitry that is interfaced with motors and belt- based setup that is used to provide the mechanism needed by a pen to draw the sketch. The Arduino based circuit is interfaced with 2 stepper motors and one servo motor in order to transmit the movement commands as per the image fed to it. It then controls the sketching process through a well-controlled mechanism in order to achieve this task. The pen only touches the paper where a line is to be placed is raised above the paper by the motor where not needed. This motion coupled with the x and y axis movement of the motors allows for a 2D sketching mechanism on the paper free theory the Grammy letter and entire art .


A Review of Bandwith Utilization
Authors:-Minakshi Dilware, Assistant Professor Dr. Shivangini Morya,Prof. & Dean Academics Dr. Sudhir Agrawal

Abstract:- Remote correspondence has multiplied because of the monster growth of PDAs, cell phones, tablets and workstations and so on. Sight and sound applications, for example, live recordings, sounds, despite everything pictures, vivified designs and live interchanges all requires backups of nature of administration just as solid start to finish move of information. Data about the accessibility of assets in divert is should so as to improve the QoS. QoS can be resolved regarding limit of channel, accessible data transmission, and mass exchange limit . Data transfer capacity accessibility is a key check for improving the QoS in a system. The exhibition of an interactive media application is straightforwardly influenced by the transfer speed accessibility. One of the most significant QoS trademark is ABW at a remote course and it very well may be divided as least unused limit of connections initiating a system course. Since now there have been numerous data transfer capacity estimation procedures are accessible in the writing to expand the system execution. Transmission capacity estimation procedures have been organized into three driving arrangements: I) Active examining data transfer capacity estimation strategies, ii) Passive transmission capacity estimation method and iii) Model based data transfer capacity estimation procedures. Every one of these methods are quickly examined in this paper.


Door Unlocking System using Fingerprint Sensor for Home Automation
Authors:-Ganesh Sahithi Murru, Chetan Kakollu, Ashok Kumar Kenguva, P. Surya Chandra

Abstract:- Security is a major issue faced by everyone when we are away from our house. Smart use of various control systems for operating purposes plays a prominent role in providing the security needed. A particular door or a locker can be accessed by a person in many ways. In such a situation, a system that checks for authorization is needed to provide security for the door or the locker. In the modern era we are having many evolving technologies that provide security mechanisms. One of such mechanisms is based on the fingerprint recognition that involves abstraction of the image from the user and grant permission for accessing the door. This mechanism prevents unauthorized users from accessing the door. A validating mechanism that checks the data from a fingerprint sensor and sends an alert message to the admin user in case of continuous mismatch. The major components used to design such a security system include Arduino Uno Board, Solenoid lock, 12V Adapter, R307 Fingerprint Sensor, Tip 122 Transistor.


Impact of Peer Learning and Learning through Networking Sites on the Achievement of Undergraduate Students
Authors:-Research Scholar Amitabh Saxena, Prof. Dr. Sitesh Kumar Sinha

Abstract:- The present paper reports the study conducted to gauge the impact of peer learning and learning through networking sites on the achievement of undergraduate students. The objectives of the study are a) to study the level of achievement of undergraduate students; b) to study the level of achievement of students from peer learning group and social networking group; c) to study the effect of treatment, gender and their interaction on the achievement by taking intelligence as covariate; and d) to study the effect of treatment, type of institution and their interaction on the achievement by taking intelligence as covariate. The present study is an experimental study where Posttest-Only Random Group Design is utilised. The sample consisted of 183 undergraduates from government and private institutions of Bhopal which were randomly assigned to peer learning group and social networking group. The peer learning group had face to face interaction while the social networking group collaborated on social media platforms on selected topics. The results revealed that students belonging to the social networking group were found to have significantly better achievement than those of peer learning group when Intelligence was taken as covariate. Female undergraduate students were found to have significantly higher achievement than the male undergraduate students when intelligence was taken as covariate. Private undergraduate students were found to have significantly better achievement than government undergraduate students when intelligence was taken as covariate.


Monitoring, Analytics, And Optimization Of Distributed Computing Environments

Authors: Sneha Prakash

Abstract: Distributed computing environments have emerged as the foundational backbone of contemporary digital ecosystems, enabling large-scale, data-intensive, and latency-sensitive applications across cloud computing, edge computing, and hybrid infrastructure models. The rapid growth of distributed architectures—characterized by horizontal scalability, geographic dispersion, virtualization, and microservices—has significantly increased system complexity. As these environments expand in scale and heterogeneity, ensuring effective performance management, fault tolerance, resource utilization efficiency, and operational cost control becomes increasingly challenging. Consequently, robust mechanisms for system monitoring, observability engineering, real-time analytics, and adaptive optimization are no longer optional enhancements but essential components of resilient distributed system design. This review provides a comprehensive and structured analysis of contemporary approaches to monitoring architectures, observability frameworks, and analytics-driven optimization techniques in distributed computing ecosystems. Monitoring strategies are systematically categorized into infrastructure-level monitoring, application performance monitoring (APM), network monitoring, and security monitoring, highlighting their distinct roles in maintaining operational visibility. The evolution from traditional reactive monitoring toward proactive and intelligent AI-driven observability (AIOps) is examined, emphasizing the integration of metrics, logs, and distributed tracing as the three foundational pillars of modern observability. The review further explores advanced data analytics methodologies, including real-time stream processing, event-driven architectures, time-series analysis, anomaly detection algorithms, and machine learning-based predictive modeling. Special attention is given to reinforcement learning-based autoscaling, predictive capacity planning, and root cause analysis automation, which collectively enhance proactive system management. Optimization strategies are critically evaluated across multiple dimensions, encompassing dynamic resource allocation, load balancing mechanisms, cost-aware scheduling, multi-cloud optimization, serverless efficiency models, and energy-aware workload placement. These approaches are analyzed in terms of scalability, computational overhead, economic sustainability, and environmental impact. Persistent challenges in distributed system management are discussed in depth, including the scalability of monitoring frameworks, alert fatigue reduction, telemetry data security, multi-cloud interoperability, and observability in ephemeral containerized environments. Emerging research trends such as autonomous self-healing systems, edge analytics for IoT ecosystems, eBPF-based kernel observability, digital twin simulations, and carbon-aware computing strategies are examined as transformative directions shaping next-generation infrastructures. This review identifies critical research gaps in cross-layer observability integration, standardized telemetry governance, AI explainability in AIOps systems, and sustainable infrastructure optimization models. By synthesizing state-of-the-art methodologies and highlighting open research questions, this work provides researchers, system architects, and practitioners with a rigorous framework for designing intelligent, adaptive, and self-optimizing distributed computing environments.

DOI: http://doi.org/10.5281/zenodo.18670139

 

 

Architectural Patterns For Scalable And Secure Enterprise Applications

Authors: Rahul Nair

Abstract: Modern enterprise applications operate within highly dynamic digital ecosystems characterized by exponential data growth, geographically distributed users, hybrid cloud infrastructures, and continuously evolving cyber threats. In this environment, systems must sustain massive transaction volumes, ensure near-zero downtime, and defend against increasingly sophisticated security vulnerabilities. Traditional monolithic architectures, while historically effective for smaller and centralized deployments, often lack the elasticity, resilience, and security modularity required to meet contemporary enterprise demands. Their tightly coupled structures limit independent scalability, complicate deployment cycles, and expand the risk surface during system updates or failures. To address these challenges, modern architectural paradigms have shifted toward distributed, modular, and cloud-native approaches. This review critically examines foundational and contemporary architectural patterns that support scalable and secure enterprise systems, including Layered (N-Tier) Architecture, Service-Oriented Architecture (SOA), Microservices Architecture, Event-Driven Architecture (EDA), and Serverless Computing Models. Each pattern is analysed in terms of structural organization, scalability mechanisms, security implications, operational complexity, and adaptability to cloud environments. Particular emphasis is placed on horizontal scalability, fault isolation, loose coupling, and infrastructure abstraction as core design principles enabling enterprise resilience. In addition to structural architectures, this review explores enabling security-centric practices and cross-cutting operational strategies such as API Gateway integration, Zero Trust Security frameworks, and DevSecOps methodologies. These approaches embed authentication, authorization, continuous monitoring, automated vulnerability scanning, and secure deployment pipelines directly into architectural workflows, thereby reducing attack surfaces and ensuring regulatory compliance. The interplay between architectural design and security enforcement is examined to highlight how proactive integration of security controls enhances system robustness without compromising performance. Furthermore, this study evaluates architectural trade-offs concerning scalability efficiency, security complexity, governance requirements, and operational overhead. Real-world enterprise adoption trends are discussed to illustrate how organizations strategically combine multiple patterns—such as microservices with event-driven communication or serverless components within hybrid cloud environments—to achieve optimal performance and resilience. Emerging advancements including service mesh technologies, AI-driven threat detection, and confidential computing are also considered as future enablers of scalable and secure enterprise systems. By synthesizing structural patterns, operational practices, and evolving technological innovations, this review provides a comprehensive framework for understanding how enterprises can design, implement, and sustain robust digital platforms in increasingly complex environments.

DOI: http://doi.org/10.5281/zenodo.18670147

Removal Of Toxic Heavy Metals From Contaminated Industrial Wastewater By Adsorption Techniques

Authors: Dr. Ekata Singh

Abstract: In the environment and the world of heavy metals discharge into water bodies is still a serious environmental and public health issue, especially in areas of heavy industrial activity. Electroplating, metal finishing, mining, tannery, battery, textile and pigment industry wastewater has toxic levels of lead, cadmium, chromium, nickel, copper, zinc, arsenic, and mercury. These metals are not biodegradable and are commonly deposited in sediments, biota and food chains, and hence pose a greater environmental risk as well as human risk. Adoption of adsorption is one of the most effective ways to remove heavy metals, and the low concentrations, low cost and economic feasibility of adsorption make it the current best treatment method. The heavy metals are present in industrial effluents, and adsorption can be considered as a treatment strategy with lower cost and renewable adsorbents. The performance of activated carbon, natural minerals, agricultural by-products, biosorbents and new nanostructured materials is evaluated in terms of adsorption capacity, removal mechanism, regeneration and real-world applications. pH, contact time, adsorbent dose, competing ions and surface chemistry are also addressed. There is solid evidence that many of the low-cost adsorbents are capable of metal uptake in laboratory settings, but still, a huge amount of work remains on scaling, regeneration efficiency, stability in complex effluents, and disposal of spent sorbents. A great deal of progress in the future will be to compare results, to have realistic wastewater testing, and to integrate adsorption into circular and resource recovery-based treatment processes.

DOI: https://doi.org/10.5281/zenodo.19478874

Published by:

Best Impact Factor Journals

Uncategorized

International journal publication is prior requirement for getting higher education degree from any reputed college / university. As number of journals increases with time so selection of good journal is done by estimating its Impact Factor value. This value is calculate by finding the number of publication in a year, number of published paper citation, publication frequency, etc. Hence Best Impact Factor Journals are prior requirement of mentors when scholars looking for the publication of their research work. Publication offers many advantages such as it validate the work done by author which include proposed algorithm or steps or combination, other benefits of this publication is to globalize this work to other people working in same field of research. Author can submit their survey, review, research letter in a international journal. Publication of journal is depend upon the reviewer comment, where reviewer are expert of particular field of research read paper share their comments to further increase the paper quality. So a good reviewer team also help to increase the international journal impact factor. Some of important points for scholars to check the best impact factor journals are mention below:

Research / Survey Paper Submission

Paper Publication Charges

  1. International Journal should have age of four year, as old journal increase impact factor value.
  2. Citation of paper also increase the journal paper quality.
  3. Author should check the indexing of journal as well, some of sites provide separate link for the indexing of journal.
  4. Impact factor were provide by the authorized sources or agencies. Most of them provide this indexing value for a year.
  5. Submission form should be there for paper submission.
  6. Publication charges of the papers with limitation of number of pages, number of author and area of research are specified.

It is suggested for all young scholar / author to take advise of your respected mentor / guide before paper submission.

Published by:
× How can I help you?